****************************************************************************** Vol.Two Issue #124 The Surveillance List June 1,1997 Over 2100+ Members Worldwide Representing 46 different countries ****************************************************************************** IN THIS ISSUE... ****************************************************************************** 01) Big Software is watching... 02) Great Book Deal 03) Re: Challenge the global hacker community 04) TIP OF THE DAY 05) Re: Voice Changer 06) Vocabulary? 07) Increase the power? 08) I.G.I.D.R. 09) "Smart water" 10) Re: Magstripe cards 11) A burger and fries for class spying eyes 12) Password Location? 13) Re: Cookies 14) SFIA Journal update 15) Investigation Services List ****************************************************************************** DON'T BE A LURKER.... GET INVOLVED... YOU ARE A MEMBER... MAKE THE MOST OF IT ****************************************************************************** 1)From: Jason Thorpe Subject: Big Software is watching... Wow, I'm glad that: (a) I work at a place that wouldn't care anyhow, (b) I maintain my own workstations. ...course, I guess it's not like accounting hasn't existed on UNIX systems for a while... Subject: Programs that I'm glad I don't have to write... *** Computer use monitored with new application SilverStone Software Corp. Wednesday announced the release of com.Policy 1.0, a management tool and software application designed to monitor computer-misuse on the job. com.Policy helps managers develop, deploy and enforce a computer usage policy. It also monitors all computer activity, not just Internet activity. The software documents each user's activity with random screen captures (as frequent as one every five minutes), logs of programs executed and on-line activity. The ScreenShots show exactly what the user was viewing at that point in time. For the full text story, see http://www.merc.com/stories/cgi/story.cgi?id=3166953-10f Jason R. Thorpe thorpej@nas.nasa.gov NASA Ames Research Center Home: 408.866.1912 NAS: M/S 258-6 Work: 415.604.0935 Moffett Field, CA 94035 Pager: 415.428.6939 ************************************************************************** 2)From: Ted Phelps Subject: Great Book Deal I have been able to aquire several copies of Criminal Interrogation and Confessions by Inbau, et al. It is on the reading list for those studying for the Certified Fraud Examiners Examination. The book goes into interrogation techniques, both of violent criminals and "white collar" suspects. It explains what to look for in the way of verbal and non-verbal responses (body language) to give an indication as to whether or not the subject is being truthful, and strageties by which to maneuver a person toward a truthful statement. It also goes into interviewing techniques, legal considerations, etc. Please email me at tphelps@phelpsnet.com if you want ordering instructions. I am able to offer this book at more than 30% off the publisher's suggested retail price of $58.00 US. Ted Phelps Phelps Associates __________________________________________ Visit our Website at http://www.phelpsnet.com ************************************************************************** 3)From: BADCOFFEE@aol.com Subject: Re: Challenge the global hacker community >>VANCOUVER, BC - From June 01 to July 15, 1997, VirTech Communications >>Inc. will challenge the global hacker community to bypass the security of >>its Macintosh World Wide Web server. Similar contests have been conducted >>previously in the US and Sweden (snip) If ANYONE is aware of a similar challange in building security please advise me a/s/a/p. Augie Badcoffee@AOL.com Your very own.......Not-quite-yet-Certified, or-bonded-or-Insured-or-lisenced ENTRY SPECIALIST ************************************************************************** 4)From: BADCOFFEE@aol.com Subject: TIP OF THE DAY Save a buck? Why not right? Garage sales, flea markets, tag sales.....ALL have surveilance related items. Binoclears, recorders, telephones. Nothing that cant be "modified" a bit to suit your needs. I Picked up an old collection (about 25) of skeleton keys today for $7. On lockouts....if I ever come across a door that might fit a key that I have on the set......entry is chargable and hey.....the key is for sale at $35. (thats reasonable right?) Another mans garbage...........(I forgot how the rest of it goes, sorry) Augie ************************************************************************** 5)From: CrACKeD Subject: Re: Voice Changer > I'm looking for a device that would change a male voice to a > female when spoken through to someone over the phone.. The Edge Company (www.edgeco.com) sells a couple inexpensive voice changing units, one portable and the other which plugs in with your line. IMO, they don't work too great when trying to change a low voice to a high voice, but they work very well in the other direction. If you don't care about sounding realistic or not, they'll be fine. You can jump directly to www.edgeco.com/protect.html where the voice changers are listed. CrACKeD ************************************************************************** 6)From: Tim Johnson Subject: Vocabulary? I realize this is probably petty of me, but is the reference to human waste required on a public forum. Typically, I return such postings which have been submitted to my little newsletter, asking that they be submitted in a format I wouldn't mind my grandchildren reading. Curious--anyone else feel the same or is it just that I'm not one of the permissive society that overlooks such vocabulary. Tim Johnson Tim Johnson dbugman@amug.org Technical Security Consultants Inc http://www.amug.org/~dbugman/ What you say in private is your business. Keeping it private is ours. (c)TSCI 1987 ************************************************************************** 7)From: Mutter Subject: Increase the power? The other day, while looking through some CDs at Sam Goody's I saw an interesting little device. The device was a small (about the size of a computer mouse) FM transmitter made by 'OTOMEK.' It has the ability to broadcast a weak signal (can only be received maybe a few feet away from an FM radio) anywhere between 95 and 105 MHz. It totally complies with FCC regulations. It was only $20 and seemed like a nice little gadget to have. It was being advertised as a way to play CDs in your non-CD equipped car (you would plug it into a portable CD player and then tune your car's FM radio to the station the device was broadcasting the CD at). Of course, I'm sure people see the alternative uses for such a device (i.e. a cheap convenient, little short range room bug). A friend had suggested that there were kits available to increase the power, as I'm sure there are. A more powerful transmitter would be great (think of all the fun you can have with your neighbors :) I wouldn't try to modify it but I am curious as to how easy/difficult it is to increase the power of such a device. How would this be done? Oh, and to the gentleman who was asking about voice-changers, a friend of mine had gotten a cheap toy-like one as a gag gift for Christmas. It was pretty interesting. Once hooked to the phone line, it would allow you to employ an assortment of childish sound effects and allow you to change the pitch of your voice. From what I heard the cost was pretty cheap. Funny thing is, the device might not have been one of these $149 Sharper Image voice changers but it accomplished the same result - so much delight can be gotten from calling up someone who has talked with you everyday and realizing they have no idea who you are. Anyway, be sure to shop around and remember, most of the cheaper voice-changers can be easily reversed to your recognizable voice if the called party so wishes (and has the resources). - M u t t e r Ed. root zine (http://www.openix.com/~mutter) mutter@openix.com ************************************************************************** 8)From: William Roche Subject: I.G.I.D.R. Intern once again reminds you from time to time, that if your an Investigator, Security pro, Surveillance or Intelligence wiz, you are welcome to register for life for free with I.G.I.D.R, Interns Global Investigater Database Register. "One day you will be sorry you did`nt". Email at: wroche@sn.no. Regards to the "Mod" & List members. Intern. ************************************************************************** 9)From: William Roche Subject: "Smart water" Anybody familiar with Smart Water, you know that invisible stuff you paint on everything, and bonds to the human skin and is virtually impossible to remove. This stuff has its own DNA Fingerprint, so to speak, so when the subject comes into contact with it, it leaves an invisible trace and can be detected by UV light. So in effect, you will know where he`s been, what he`s done, or what he`s taken. There is a database somewhere that when analysed can recognize the millions of different types of smart water, making it easier to I.D.the subject or stolen merchandise. Does anybody else know more about this, please enlighten us all, and if you do, where can it be obtained. Intern. ************************************************************************** 10)From: Ben Norman Subject: Re: Magstripe cards Brad and other interested parties, look at: http://eucmdx.gae.ucm.es/~padilla/extrawork/card-o-rama.txt for considerable detail on magstripe formats. Ben Brad Ediger wrote: > i need those 7,5bit codes 4 the magstripe cards. > Thanx. ************************************************************************** 11)SpyKing@thecodex.com Subject: A burger and fries for class spying eyes Found this on the net and thought it of interest. >>>> A burger and fries for class spying eyes >>>> Primary school children are being offered Big Mac burgers to inform on their class mates. School governors have launched the scheme at Monkwick school in Colchester, Essex, in an attempt to cut vandalism and stealing from the school. The initiative is being backed by police and the town's two McDonald's restaurants. Chairman of the governors, Ms Lynn Knight, said that the names of informants and any children reported would be kept confidential. She said: "If we are able to find out who has done some damage or stolen from the school the person providing the information will be treated to a meal." <<<< ************************************************************************** 12)From: BADCOFFEE@aol.com Subject: Password Location? Greetings, Is AOL's passwords stored in PC and what file to look in, if so. Augie ************************************************************************** 13)From: bennett2@iquest.net Subject: Re: Cookies To whom it may concern: If you are interested in cookies and additional files left on your computer my internet browsers look at: http://www.wizvax.net/kevinmca/ bye ************************************************************************** 14)From: Gary Cohen Subject: SFIA Journal update The new South Florida Investigators Association Journal is out, and excerpts from it can be seen by following the links to the Journal from http://www.webcircle.com/users/sfia/ Gene Schuler, our President, has returned from the Dominican Republic and has written an article on how that government has chosen SFIA to help them, and how that partnership will benefit SFIA members. Membership apps are available. We are experiencing a slight increase in our ads (VERY inexpensive advertising) and as a thank you to our advertisers, we are providing a link to either their home page or e-mail in the Web edition of the month they advertise. My special thanks to Security Management Investigations, Merlin Information Services for their 1/2 page ad this month and to Atlas Information Services for their ad last month. Thanks also to Webcircle for hosting our pages. A business card ad (photo ready) is a mere 5.00 a month or 50.00 a year and now will get you NATIONAL exposure. Other sizes are of course available. Thank you all for your continuing support to our small but growing Association, thank you for your continuing article submissions, for your past and future advertising and your membership applications. SFIA will continue to educate and work with the public and governments, to advance and promote professional Private Investigators, and to make our Profession the best that it can be. Gary Cohen Investigator Ft. Lauderdale/Pompano Beach Florida heatgain@mindspring.com Member-FALI & SFIA Chairman, Internet Committee SFIA SFIA - http://www.webcircle.com/users/sfia/ ************************************************************************** 15)From: "Lorenzo Castillo Sanchez" Subject: Investigation Services List I just found this website on the net for those of you who might need some PI services. Check out http://www.litnet.com/pi.html The list is in a state by state category. The list is kinda small. But, you just might wanna check it out just in case. ************************************************************************** Who are you? What's your specialty and/or interest? Let us know about your company... What would you like to see on the list? Post it. Let us know... Do you have something to contribute? We'd like to hear it... We want to know EVERYTHING and ANYTHING about eavesdropping, surveillance, countersurveillance & privacy related technology, etc... Remember: who, what, where, when, how & why... we want ALL the details... Do you have a question? Post it... A little free time? Help a member... With the INCREDIBLE brain power on this list, someone should have the answer ;-) P.S. Don't be a LURKER... Members take the time to post info for us all... give something back... Don't just take... Your input/knowledge is valued... ************************************************************************** Send Postings to: spyking@con2.com with "Post" in subject field with subject ************************************************************************** Subscribe to: spyking@con2.com In the subject field type: subscribe-surveillance list e-mail address ************************************************************************** Unsubscribe to: spyking@con2.com In the subject field type: unsubscribe-surveillance list e-mail address ************************************************************************** ...The Simple Rules of the Surveillance List... The Surveillance List Owners may Reject any posts that are/contain: 1) Info Unrelated to Eavesdropping, Surveillance or Privacy technology... 2) Flames or Negative posts... 3) E-Signatures that are considered excessive... 4) Advertisements not DIRECTLY related to the list topics... 5) Attached Files... 6) Oversized Posts... (May be edited to save room) **************************************************************************** This publication is copyrighted and is protected by U.S. and International copyright law. The information transmitted on this list may not be reproduced, reposted or forwarded to any non-list member without expressed written permission of the List Owner. Violation of U.S. copyright law is a criminal and civil offense... **************************************************************************** The Surveillance List is Moderated by SpyKing@thecodex.com The List Owner will make EVERY effort to protect subscribers from spam... Copyright 1996, 1997 Codex Publishing Inc., All Rights Reserved... **************************************************************************** ****************************************************************************** Vol.Two Issue #125 The Surveillance List June 2,1997 Over 2100+ Members Worldwide Representing 46 different countries ****************************************************************************** IN THIS ISSUE... ****************************************************************************** 01) Re: Another mans junk 02) Re: Transmitters 03) Re: Increase the power? 04) A-Z Terrorist Directory 05) Re: Voice changer 06) Re: I need help 07) Free Texas DMV Lookups 08) Re: Question about AOL passwords 09) Re: Voice Changer 10) New Computer Forensics Web Page ****************************************************************************** DON'T BE A LURKER.... GET INVOLVED... YOU ARE A MEMBER... MAKE THE MOST OF IT ****************************************************************************** 1)From: Duece6x6@aol.com Subject: Re: Another mans junk Bad Coffee is right -- another mans junk----- I hit any and all {convient} sales and swap meets. I have found unbelievable deals. It's best to look for out of market items because the seller usually doesn't know a realistic value. {ie electronics at a church flea market instead of an electronics swap} meet. It takes good determination to keep going to them once and awhile, when you don't find something right away. Most would rather watch the game than waste time saving money. I found 4 cassette recorders as new for $1 each and one had the radio shack phone tapper on it. Saturday may 31st stopped on the way home at the church flea market down the street. The guy in front had a box of watches for $5 each, picked up a $200 watch. THE DUECE ************************************************************************** 2)From: John Bruni Subject: Re: Transmitters The type of transmitter written about here is not worth trying to boost in power and literally has a range of only a few feet. It *does* make a good Walkman-to-Car Stereo link. (quote follows) >The other day, while looking through some CDs at Sam Goody's I saw an i>nteresting little device. The device was a small (about the size of a >computer mouse) FM transmitter made by 'OTOMEK.' It has the ability to >broadcast a weak signal (can only be received maybe a few feet >away from an FM radio) anywhere between 95 and 105 MHz. It totally >complies with FCC regulations. It was only $20 and seemed like a nice If one wants a more powerful FM transmitter for the broadcast band, try Ramsey Electronics. They make a very stable stereo transmitter for less than $150, in kit form. They also have cheaper transmitters available, but I don't recommend them; they drift. You can also try "Radio Free Berkeley" in Berkeley, CA. They sell very sophisticated FM transmitters in the $100-200 range. You can get ones for around $600 from them that would cover *miles* of territory. In the US that's known as "Pirate Radio." Can you say "FCC Inspector?" Sorry, I have no addresses or phone numbers, but a search of the Web should turn up Ramsey's website, and a call to information should elicit the Berkeley #. These rigs make dandy repeaters for your CD player (if you want to hear it across the street while you're helping a neighbor with his car) but I doubt they'd have much use in surveillance work. Of course, if you've just stumbled upon the transmitter mentioned as being seen in Sam Goody's, this might be just the thing for you. My ears perked up when I was first reading this post because I thought the writer was going to talk about anti-theft transmitters. I'm aware of transmitters that fit in a stack of cash. Rob a bank and it goes with you when you take the cash. This device must be quite small, I would think. Anyone know more about it? And finally, there's nanotechnology. From the same lab in Berkeley that brought you motors so tiny they can't be seen without an electron microscope (not related to "Radio Free Berkeley") comes microchips so small they look like dust. But each one has a sound transducer on it and a way of getting power...solar is one option, microwave induction is another. You simply dust the target with these microscopic bugs and Voilà...they're on the air! Not available in any store. ************************************************************************** 3)From: CrACKeD Subject: Re: Increase the power? > The other day, while looking through some CDs at Sam Goody's I saw an > interesting little device. The device was a small (about the size of a > computer mouse) FM transmitter made by 'OTOMEK.' It has the ability to > broadcast a weak signal (can only be received maybe a few feet > away from an FM radio) anywhere between 95 and 105 MHz. It totally > complies with FCC regulations. It was only $20 and seemed like a nice > little gadget to have. It was being advertised as a way to play CDs in > your non-CD equipped car (you would plug it into a portable CD player > and then tune your car's FM radio to the station the device was > broadcasting the CD at). Of course, I'm sure people see the alternative > uses for such a device (i.e. a cheap convenient, little short range room > bug). A friend had suggested that there were kits available to increase > the power, as I'm sure there are. A more powerful transmitter would be > great (think of all the fun you can have with your neighbors :) I > wouldn't try to modify it but I am curious as to how easy/difficult it > is to increase the power of such a device. How would this be done? I've bought simple broadcast band phone/room bugs for as little as $8 brand new. Why bother with low-power CD interfaces? There's no need to broadcast in stereo or pay much. Increasing the power of the CD interface could be done with a kit available from several electronics companies. I've got one listed in a catalog somewhere. But doing so would either cost as much if not more than the CD interface itself. If you need to transmit further than about a quarter mile away (the distance typical $8 bugs will cover) then you would have to go the add-on amplifier route. I would first try a decent little bug and a decent antenna. CrACKeD ************************************************************************** 4)From: johnr50505@aol.com (JohnR50505) Subject: A-Z Terrorist Directory The Terrorist Directory is provided at http://www.survivalguide.com/info/terrorist_directory.html as a free service by Emergency Data Systems. This A to Z directory describes known terrorist groups, activities, strength, political objectives, etc. Additional special reports are provided. Reports available include: Violent Personality Profile, Telephone Threat Guide, Bomb Detection Guide, FBI Report to Congress, Technical Security and Office Security. http://www.survivalguide.com ************************************************************************** 5)From: ProvRhode@aol.com Subject: Re: Voice changer Hi, Thanks for the responses about the voice changer everyone, however I was wondering if yuo could give me more specific information on where to locate one ************************************************************************** 6)From: "Jose A. Duarte" Subject: Re: I need help >3)From: "karl kiefert" >Subject: Re: I need help Jose, Yep, I saw the message and nearly replied but it was far too vague as so are some of the other postings. I have to take my hat off to most of you out there, but some people could be a bit more verbose. Also please remember there are people on all sides of the pond, so asking for comments on the technology used in "last nights ??? tv program" is not so meaningful to us on this side or to the people whom missed the prog. What type of network os is it? Pc, mac, sun... etc. or terminal? Dos , windows, nt, unix (type of unix), vms, OS2 etc How is it currently being used - standalone /network? What type of security is currently in efferct and what access rights (privelidges, or what is he allowed do on the system) Does the user have to his pc and network. Hard disk/remote boot prom/floppy What type(s) of programs is he interferring with i.e. concurrent operating system or 1 to 10 counter and what is his skill level? Age of person? Were all the "vanished files" in one dir Does the station he sits at have special access rights? Does the user have access to where the aministrators and equivelents sit? Let the administrators know of your problem? You should be able to get the files back from a backup. Some system have a salvage option that shows who deleted them. How much clout within the organization do you have to change system setups on servers, terminals etc. The quick answer is to confront him, his faculty head, his parents, the people whos work has gone missing and make it public knowledge what the chap is doing. Yes, get him thrown out of class! Here is a memo I sent to the Principle: Memo to: Mr. J. ******* From: Mr. B. ********* cc: Mr. J. Duarte Re: Hacking within the communications lab May 29th 1997 This is to inform you of the recent incident that occurred in the new communications lab in room 112. At the beginning of the semester the lab was ready and secure from students accessing anyone's files except their own. By Tuesday May 27th 1997 it was noticed that students had full access to all files on the server,( students and teachers). This could allow a student to steal, delete, or move files that did not belong to him or her. Previous to that only teachers or people with administrative access could change system settings or access other students files. To acquire this access a person would have to have administrative rights, which students did not have. These rights were only assessable by an administrator's password. On the same Tuesday it was also noted that students files were now missing or deleted. Prior to that, only a teacher or the student owning the work could delete anything of theirs. Approximately two weeks ago we acquired a copy of a students disk. On the Wednesday May 28th we looked the disk and found a suspicious file. That same file was found on the local drive which the student was working on. The file is a program which captures the keystrokes of a user and saves them to a file. Later the file can be opened and the characters that were keyed can be read and displayed. This program is intended to capture a users keystrokes that would be used in a login and password. Later, to read and used by another user. This is called hacking. Once the system is hacked the student can change what ever he or she wants as they now have administrative rights. It now seems more than a coincidence that the student had this program on one of their disks and computer they were working at. This program would never have been noticed by anyone else if we hadn't acquired a copy of the students disk, as it is designed to run in the background unnoticed. No student is allowed to install or load any unauthorized programs. The students were all warned of this and signed an agreement stating such. It is not our goal to have this student suspended but maybe have his computer rights revoked for some time. the student in question is ********* B. *********** J. Duarte The system we are working with is a Novell Netware 4.10, Pentium Pro 200 server. The computer he was working at is the same computer we work from to do our admin stuff. We are going to change that. We are going to set up a computer that will only be used for Admin stuff in the server room. All students have access to their local drives C:\ but I hope that is going to change as well. Unfortunately they also have access to a:\ but I don't think there is anything we can do for that. The admin program is going to have to be restricted from any students getting at it. I don't know if this will help you. But this is all I can remember. Any Ideas? I think the kid is going get tossed. Thanks in advance, Jose Duarte ************************************************************************** 7)From: SpyKing@thecodex.com Subject: Free Texas DMV Lookups Checkout: http://www.thecodex.com/search.html We've just updated our search page...You'll find over 6000 FREE searches ranging from search engines to investigative resources... P.S. Tonight we've added the Surveillance Forum Chat Page online at: http://www.thecodex.com/chat.html - so stop by and say hello... Maybe we can setup a standard night and time for list chat... ************************************************************************** 8)From: LazySkillz@aol.com Subject: Re: Question about AOL passwords The AOL program only stores the password on the computer if you have put the password in your Preferences. The Preferences are located under the "Members" pull down menu in AOL 3.0. If you input your password in the Preferences, then you don't need to input your password everytime you sign on, but instead you can just click on "Sign On". However, that also means anybody with access to your computer can use your account. Also, your password is stored in the MAIN.IDX file, so anybody could check this file and find out your stored password. If you want ways to obtain somebody's AOL password, email me to find out how. ************************************************************************** 9)From: "ray bobbitt" Subject: Re: Voice Changer Can anyone suggest a brand or company where I can find a better portable voice changer than the one that Edge Co. carries? Thanks, Ray ************************************************************************** 10)From: Peter Stephenson Subject: New Computer Forensics Web Page InfoSEC Technologies is pleased to announce that we have implemented our computer forensics and Intrusion Management page on our web site at: http://www.versalink.com/forensic.htm We have included links to Intrusion Management information, sites and products with a heavy emphasis on investigation and forensic analysis and tools. The page is new, so we expect that we will be adding more links, papers and information as time passes. Suggestions for additions are always welcome. --P ---------------------------------------------------------------------- Peter Stephenson, InfoSEC Technologies div. of Sanda International Corp. Rochester Hills, MI - (810) 650-2699, (810) 375-2717 fax http://www.versalink.com - info@versalink.com ---------------------------------------------------------------------- ************************************************************************** Who are you? What's your specialty and/or interest? Let us know about your company... What would you like to see on the list? Post it. Let us know... Do you have something to contribute? We'd like to hear it... We want to know EVERYTHING and ANYTHING about eavesdropping, surveillance, countersurveillance & privacy related technology, etc... Remember: who, what, where, when, how & why... we want ALL the details... Do you have a question? Post it... A little free time? Help a member... With the INCREDIBLE brain power on this list, someone should have the answer ;-) P.S. Don't be a LURKER... Members take the time to post info for us all... give something back... Don't just take... Your input/knowledge is valued... ************************************************************************** Send Postings to: spyking@con2.com with "Post" in subject field with subject ************************************************************************** Subscribe to: spyking@con2.com In the subject field type: subscribe-surveillance list e-mail address ************************************************************************** Unsubscribe to: spyking@con2.com In the subject field type: unsubscribe-surveillance list e-mail address ************************************************************************** ...The Simple Rules of the Surveillance List... The Surveillance List Owners may Reject any posts that are/contain: 1) Info Unrelated to Eavesdropping, Surveillance or Privacy technology... 2) Flames or Negative posts... 3) E-Signatures that are considered excessive... 4) Advertisements not DIRECTLY related to the list topics... 5) Attached Files... 6) Oversized Posts... (May be edited to save room) **************************************************************************** This publication is copyrighted and is protected by U.S. and International copyright law. The information transmitted on this list may not be reproduced, reposted or forwarded to any non-list member without expressed written permission of the List Owner. Violation of U.S. copyright law is a criminal and civil offense... **************************************************************************** The Surveillance List is Moderated by SpyKing@thecodex.com The List Owner will make EVERY effort to protect subscribers from spam... Copyright 1996, 1997 Codex Publishing Inc., All Rights Reserved... **************************************************************************** ****************************************************************************** Vol.Two Issue #126 The Surveillance List June 3,1997 Over 2100+ Members Worldwide Representing 46 different countries List Chat at: http://www.thecodex.com/chat.html ****************************************************************************** IN THIS ISSUE... ****************************************************************************** 01) Re: Passwords 02) Video Transmitter 03) Lion Investigation Academy 04) Nanny Cams 05) Some Interesting Wiretap Case History 06) Re: Transmitter 07) Car stereo zapper? 08) Subliminal Recording device? 09) Re: Executive Options 10) Re: Voice changers 11) Re: I need help 12) Re: Free Texas DMV lookups 13) Excessive long distance calls ****************************************************************************** DON'T BE A LURKER.... GET INVOLVED... YOU ARE A MEMBER... MAKE THE MOST OF IT ****************************************************************************** 1)From: BADCOFFEE@aol.com Subject: Re: Passwords Aloha, I did receive an answer to my question: Where are AOL passwords stored....... ANSWER: AOL FILE- MAIN.IDX Thanks %$^^M*&^&^U*&^^T*&%%$T*&&^E&%$%R! <----encripted My research: When in file: Go to EDIT, Go to Search, enter screen name. Let it bring you to screen name found in text and see if you get lucky and there might be a NON encripted password next to it. Mostly encripted. I got lucky on my endevors. PS- No computer questions directed to me. Runing a calculator is a 50/50 here. Augie Note: RE- slang for excrament- I somewhat agree on the gentleman that wanted to see a few words missing from our text. I for one..will certainly try. :-) Augie again.. ************************************************************************** 2)From: TH Subject: Video Transmitter My company recently purchased a VIDLINK 100 UHF video transmitter for use with a watch camera, as well as other cameras. Has anyone had any experience with these transmitters? Anyone had good luck? It seems to work pertty well when the receiver is a cable ready TV w/UHF antenna, or a manually tuned portable. I was hoping I could get it to work with my Sony GVS-50, (8mm VCR w/monitor, and TV tuner) but I cannot seem to get the tuner to pull in the transmission properly. It's almost as if the tuner is not "wide" enough and looking for a narrower signal. Any suggestions? ************************************************************************** 3)From: JoeSleuth@aol.com Subject: Lion Investigation Academy LION INVESTIGATION ACADEMY 434 CLEARFIELD ST BETHLEHEM PA. 18017 LICENSED PENNSYLVANIA DEPARTMENT OF EDUCATION A.S.T. DEGREE IN INVESTIGATIONS . FORENSIC COURSES AVAILABLE , FIRST DISTANT LEARNING PROGRAM , (PREVIOUS COURSE CREDITS GIVEN ) SECURITY OFFICER COURSES diploma and certificate programs ADVANCED AND MASTERS PROGRAMS IN SECURITY HOME STUDY 1 610 865 0402 ************************************************************************** 4)From: SpyKing@thecodex.com Subject: Nanny Cams Found this in an old issue of Time Magazine. >>>> EYE SPY...THE BABY-SITTER! THE "NANNYCAM" MARKET IS BOOMING, AND CARE GIVERS WON'T SIT STILL FOR IT With its button nose and tartan bow, it looks at first glance like a typical teddy bear. But this huggable toy does more than dress up a bed. It comes equipped with a hidden camera to watch the baby-sitter while the baby-sitter watches the kids. A few examples of horrific treatment caught on camera and widely publicized have created a boom in the nanny-surveillance industry. Babywatch Corp., a company based in Spring Valley, New York, has sold $5,000 hidden-camera setups to entrepreneurs in 20 cities, who rent them out for about $200 a pop. Other anxious parents are buying their own devices. Quark International, a New York-based manufacturer, has seen its sales of nannycams triple during the past few years. The Counter Spy Shop in Manhattan sells about a dozen a month, including teddy bears at $649 each, as well as those in the form of clock radios, eyeglasses and gym bags. One customer spent $12,000 there to modify his home computer so he could observe the house from his office terminal. Such surveillance rarely uncovers serious abuse or dereliction, says Richard Heilweil of Babywatch. Yet about 70% of parents who hire Babywatch wind up dismissing the care giver for some minor transgression, such as talking on the phone or watching TV. "It is troubling to see so many peopletreating their domestic employees in a way they would never tolerate being treated themselves," says Lewis Maltby, a lawyer with the American Civil Liberties Union who is working with outraged nanny groups to find "the right case" to challenge the surveillance. He will argue that federal laws prohibiting undisclosed audiotaping should apply to video as well--and that the spying invades privacy. "Hidden cameras," he says, "are a seductive gimmick that gives us the illusion of safety without the reality." <<<< P.S. It's also interesting that two of the companies mentioned were busted by US Customs for selling illegal eavesdropping devices... ************************************************************************** 5)From: SpyKing@thecodex.com Subject: Some Interesting Wiretap Case History Checkout: http://fatty.law.cornell.edu/ny/ctap/085_0151.htm ************************************************************************** 6)From: Mutter Subject: Re: Transmitter Okay, thanks for the info. I am quite familiar with Free Radio Berkeley (in fact a few months ago a friend had bought one of their transmitters). Micro-broadcasting is something that I find interesting and (last time I heard) certain pirate stations were making a lot of legal process in fighting for their right to braodcast. But, anyway, back to the CD-FM transmitter, I knew it was not practical to sink in money to increase the power, I was just curious as to how easy or difficult (or possible). Again, thanks for the responses. Anyway, I mentioned this before, to the administrator who had the key logger on the LAN problem I think going to his parents and kicking him out of the class would be overreacting a bit. If the kid is doing no damage and just logging passwords you might just want to confront him one day (not in the "I KNOW WHAT YOU'VE BEEN DOING AND NOW I CAUGHT YA!" sense). Simply tell him you don't want him doing it anymore. See? Problem solved. No more playing cat-and-mouse like some admin with too much time on their hands, and hey, you might have just made a new friend :) - M u t t e r Ed. root zine (http://www.openix.com/~mutter) mutter@openix.com ************************************************************************** 7)From: sonnymac@worldnet.att.net (William C Mcdonald) Subject: Car stereo zapper? I realize that this is an off topic post but if anybody would know where I can get help with this, the members here would know. I live in S. California and it seems like everytime I stop at a red light some car with unbelievably powerful bass pulls right next to me. If it's a long light, well you probably know what it's like to hear this. Are there any sort of electronic "zappers" that you can aim at the car that would so distort the sound that these bass- heads would have to turn the volume down or risk their speakers blowing up? Thanks hopefully for this making the list and someone knowing of a way to handle this. Bill Mcdonald ************************************************************************** 8)From: "Jan Bohman" Subject: Subliminal Recording device? Hello! I am looking for a device or software for PC that enable me to make audiorecordings with subliminal voice messeges integrated into the music, not an ordinary mixer function. I am from Sweden: Jan Bohman Tel/fax +46 8 560 31 560 E-mail jan.bohman@wineasy.se ************************************************************************** 9)From: browngrp@southeast.net Subject: Re: Executive Options I am WAY behind in my list reading as well as everything else but I don't believe that anyone answered your query about EO unless it was direct. It is my understanding that everyone left well before the overthrow. I believe that the military moved them out of place prior to acting to protect their "seperation" from such actions. Robert Plance Investigator@Private-Eye.com href="http://www.Private-Eye.com" Criminal Records-Driving Histories-Background Checks-Locate Individuals On-Line order form for Investigative Services. Protect Yourself, your family, your business, your customers. ************************************************************************** 10)From: "karl kiefert" Subject: Re: Voice changers Not too sure if you end up sounding like sexy Samatha or Donald Duck but is alterable through 17 steps. Kit is £13.10 + vat or £19.95 or a populated pcb £19.95. You have to find your own case. It is called a msm6322 speach pitch controller. No, I do not have shares etc. in the company. http://www.maplin.co.uk. Take major cards and can supply to over 200 countries. Get their catalogue too. ************************************************************************** 11)From: "karl kiefert" Subject: Re: I need help Jose, Looks like your students of the group have acuired 'Admin' rights or perhapse just rights to the volume? The quickest way to get passwords is by using a keystoke logger, but this is not the only way. There are password capture progs and progs that keep trying passwords until the correct one is found. The below should fix about 90% of the probs. Part 2 will be more advanced and probable will not be needed. Fix 1: ****Always have a spare 'ADMIN' type name available. Do not make this name equiivalent to admin, but give this name the same rights to all containers including root. If it is made 'equivalent' and the ADMIN is deleted then the name also becomes useless.**** 1) Make a new user equivalent to your prize student (called say FRED) and test that this FRED is acutually has the same rights. 2) Change the 'Admin' password to something longish and put in a number i.e spyking97Rus. 3) Enable AUDITCON and select everything. Remember to look at the log regularly and delete it if it is ok, else it will get too large and tiresome. 4) Change all the users rights back to what they should have and test it with FRED. Make your administrators use a terminal that is out of students reach and is secure (so should you). Perhaps UIMPORT??? 5) Make the users log in between set realistic times e.g from 8am to 8pm and no weekends. Make the number of connections they can be connected to be logged in once. Limit the amount of space they can use on the server. Change the number of times thay can retry their password to about 5 and if they get it wrong then it should make them wait for 5 mins. If the waiting is too long then you will end up up logging in and clearing it for them which is a risk. (password checker: in 1 hour a password checker can try about 5(tries)*60(mins)/5(min wait) = 60 combinations in an hour. 6) Check the AUDITCON log that it has records your changes! Delete the log file. 7) If the user(s) has any savvy, they will have created backup users say JDuarte or JDuarte_admin or SUP_J.Duarte or Duarte etc. and given this user ADMIN rights. 8) Print out a list of people etc by typing cx /r/a/t (this command works for any one even if not logged into the network - unless it is disabled) and get lecturers to 'Sign off' which bellongs to them and they know about. Sign off the student yourself if you are sure it is theirs Delete the rest. Also check that they have not made one of the teachers an equiv to ADMIN and then made users equiv to that teacher. Bait a trap: make directory called GRADES, PERSONAL, CONFIDENT, PRIVATE etc., which should be out of their normal access rights and in ther copy a windows swap file, renameing it something like ALL_STUD.DAT. This should get them motivated. Search the internet for netware hacking faq there are many and are the majority were out of date, so have a good look around. As not to take up too much space (and I'm sick of typing!) part 2 will follow in a few days. How about mentioning what the w/s is running on i.e. dos, os2, mac, unix, 311, 95, nt? K ************************************************************************** 12)From: China Subject: Re: Free Texas DMV lookups Since this morning, the URL indicated on the last listing has been inaccessable. Does anyone know whether this service has shut down permanently, or is it merely down for maintenance ? Thank you. China ************************************************************************** 13)From: MHust4450@aol.com Subject: Excessive long distance calls I have trouble stopping the kids from making excessive long distance calls. Blocking really doesn't work because of all the long distance access codes out there. I have heard of a device that installs on your phone line in which a password must be used to call out to anywhere. I know this isn't really a survielance question but I 'm sure someone on this list can recomend a solution to my problem. thanks mhust4450@aol.com ************************************************************************** Who are you? What's your specialty and/or interest? Let us know about your company... What would you like to see on the list? Post it. Let us know... Do you have something to contribute? We'd like to hear it... We want to know EVERYTHING and ANYTHING about eavesdropping, surveillance, countersurveillance & privacy related technology, etc... Remember: who, what, where, when, how & why... we want ALL the details... Do you have a question? Post it... A little free time? Help a member... With the INCREDIBLE brain power on this list, someone should have the answer ;-) P.S. Don't be a LURKER... Members take the time to post info for us all... give something back... Don't just take... Your input/knowledge is valued... ************************************************************************** Send Postings to: spyking@con2.com with "Post" in subject field with subject ************************************************************************** Subscribe to: spyking@con2.com In the subject field type: subscribe-surveillance list e-mail address ************************************************************************** Unsubscribe to: spyking@con2.com In the subject field type: unsubscribe-surveillance list e-mail address ************************************************************************** ...The Simple Rules of the Surveillance List... The Surveillance List Owners may Reject any posts that are/contain: 1) Info Unrelated to Eavesdropping, Surveillance or Privacy technology... 2) Flames or Negative posts... 3) E-Signatures that are considered excessive... 4) Advertisements not DIRECTLY related to the list topics... 5) Attached Files... 6) Oversized Posts... (May be edited to save room) **************************************************************************** This publication is copyrighted and is protected by U.S. and International copyright law. The information transmitted on this list may not be reproduced, reposted or forwarded to any non-list member without expressed written permission of the List Owner. Violation of U.S. copyright law is a criminal and civil offense... **************************************************************************** The Surveillance List is Moderated by SpyKing@thecodex.com The List Owner will make EVERY effort to protect subscribers from spam... Copyright 1996, 1997 Codex Publishing Inc., All Rights Reserved... **************************************************************************** ****************************************************************************** Vol.Two Issue #127 The Surveillance List June 4,1997 Over 2100+ Members Worldwide Representing 46 different countries List Chat at: http://www.thecodex.com/chat.html ****************************************************************************** IN THIS ISSUE... ****************************************************************************** 01) Re: Car stereo zapper? 02) Re: Free Texas DMV lookups 03) What frequencys a scanner stops on? 04) WANTED AZ PI!! 05) Re: Video Transmitters 06) NT Password 07) Monitoring an office phone system 08) Re: Car stereo zapper 09) Recieving e-mail? 10) Find someone online fast... 11) Re: Car bugs 12) Need Info ****************************************************************************** DON'T BE A LURKER.... GET INVOLVED... YOU ARE A MEMBER... MAKE THE MOST OF IT ****************************************************************************** 1)From: CrACKeD Subject: Re: Car stereo zapper? > I realize that this is an off topic post but if anybody would know > where I can get help with this, the members here would know. > I live in S. California and it seems like everytime I stop at a red > light some car with unbelievably powerful bass pulls right next > to me. If it's a long light, well you probably know what it's like > to hear this. To me, it's great. > Are there any sort of electronic "zappers" that you can aim > at the car that would so distort the sound that these bass- > heads would have to turn the volume down or risk their speakers > blowing up? > > Thanks hopefully for this making the list and someone knowing > of a way to handle this. Jealous of those with bigger and better stereo systems than you, huh? If you really want to waste your time and money annoying them, you can grab a device from Information Unlimited (www.amazing1.com) which will disrupt FM stereos and televisions. If your victim is listening to a tape or CD then you're out of luck, and you certainly aren't going to blow anything up. You may get the guy/gal to turn the volume down, thinking their stereo system just developed a big problem. If your goal is to blow things up, you may try directing a few kilowatts of VLF/HF RF at their car, although that's pretty unrealistic. CrACKeD ************************************************************************** 2)From: China Subject: Re: Free Texas DMV lookups For the general info of those who have not yet tried the URL for "Free Texas DMV Lookups." The original URL was given as http://www2.publiclink.com/jtexasdlname.html? and up until mid-morning of 6.3.97 this URL worked correctly. However, there were 2 flaws: some data presented were outdated, and the internal links presented with each record failed to work as suggested. After mid-morning that URL did not respond and continued to fail thoughout the day. Subsequent to my earlier posting, I tried a variation of the aforementioned URL http://www.publiclink.com/jtexasdlname.html? and received the following notice: "This server has been placed off-line by the operator. Please, try again later." Perhaps this will help any others who experience a similar problem. Thank you. China ************************************************************************** 3)From: "WILLIAM W.MOODY JR," Subject: What frequencys a scanner stops on? can law enforcement monitor what frequencys a scanner stops on from a distance by monitoring your scanner antenna. no known bugs within radio rooms walls.every since the local law found out i monitor every channel they have including body mics ,state and federal freqs in my state,they have tried to shut me down by rf saturation and atomatic paging of all local freqs , sabatoge , and breaking in and stealing equipment. i do know that one of my scanners have been modified to tx as soon as it is turned on by hooking it to a freq. counter and have also found audio bugs previuosly in my radio room. if i key up my cb base station with 1200watts of rf power they have to send a tech out to reset thier equipment. is thier a simple white noise device i can build to put close to the structure that houses thier equipment??need all suggestions fireking@alaweb.com ************************************************************************** 4)From: "Shadow Chasers" Subject: WANTED AZ PI!! Having no luck with tracing an old flame, last seen in 1989 in Arizona and believed still currently residing in the Phoenix/Flaggstaff area. Sure I could do leg work, but worth the few bucks for a PI in AZ to find her for me! Interested? Send email with credentials and I reveal name, dob, ssn! Shadow Chaser ************************************************************************** 5)From: Martin Pask <100142.3101@CompuServe.COM> Subject: Re: Video Transmitters Try using the ext ant socket on the GV50 and a more directional antenna. That may work but I dont find the tuner on the GV50 that sensitive and it will sometimes tune past normal broadcast channels. Regards M.P.I ************************************************************************** 6)From: Phua Kok Yang CCEPKY Subject: NT Password Where does the NT workstation stored the local administrators password ? Is there anyway for a normal user copy it and try decryping it ? ************************************************************************** 7)From: Trace Carpenter Subject: Monitoring an office phone system > Mr. Carpenter, > > I have been reading your posts to The Surveillance List for some time > and have enjoyed them very much. I'm sending you this e-mail privately > as I didn't want my name to appear publicly but feel free to post the > response if you can help me so that others may also benefit. > > I own my own company which is next door to my home. We have an Intertel > IMX 2460 phone system which is in both the offices and in the house. In > my state it is permissable to monitor a minor child's > telephone conversations so I had an investigator come out who has done > work for us before. However when he arrived he could not figure out how > to hook up the equipment on an office phone system. > > I hate to ask for free advice from professionals, feel free to invoice > me if you need to. I'm not a distrustful person, but my child is in > some kind of trouble and I can't just do nothing. PLEASE Help. You're in luck. The Intertel system which you are referring to is one that I'm rather familier with. It's phones and parts by the way interchange with the Premier system if you ever need parts. Anyway down to business. The switch or "brain" which is in your telco room has a card in it marked CPU. If you want, you can plug a serial cable into it and the other end of the cable into an old serial printer and it'll keep a laundry list of every call that is made and tell you which extension it came from, what number was dialed and how long you talked. You can also plug a modem into that port and call it from the computer in your office and see the same info. You can also monitor calls from any phone on that system. What I mean by that is that it has a supervisory monitoring system built right in as many systems do. You can monitor any extension's conversation from your phone by picking up the intercom and enter the following code: SPCL 396 and then the extension number you need to monitor. It'll tell you on your screen what extension name you're monitoring, what number they dialed, and how long they've been talking as well as allowing you to hear the conversation. They will not hear you. If for some reason your system is not programmed for the supervisory option let me know and I'll either send you directions on how to do it, or if you'll take an old external modem and plug it into the serial port I can call in from here and program it for you. One last note, with a minor child I'm sure you're within your rights. Just be careful, and make sure no one uses the monitoring for illicit purposes. -- Trace Carpenter Investigations ****** 2926 Maple Ave., Ste. 200 Friends help you move; Dallas, Texas 75201 Real friends help you move bodies. 214.828.4520 ****** ************************************************************************** 8)From: nobody@huge.cajones.com (Huge Cajones Remailer) Subject: Re: Car stereo zapper >Are there any sort of electronic "zappers" that you can aim at the car that would so distort the sound that these bass- heads would have to turn the volume down or risk their speakers blowing up? Look into the creative use of magnetrons (the part that generates the 700+ Watts of microwave energy in your household microwave oven). Careful with these things - they step-up the 120VAC to several thousand volts to operate, and your own equipment (especially a satellite dish) is history if it gets illuminated. Also, this wavelength is well known for causing blindness and sterility, depending on where it's aimed, and will drop a bird in flight. Nasty stuff. Find yourself a local hardware hacker (one that doesn't visibly tremble when you mention the FCC) to put one together for you and show you how to use it. This one in particular was put together in an afternoon by a former navy avionics tech using the parts from a cheap oven. Ugly, but effective. ************************************************************************** 9)From: "WILLIAM W.MOODY JR," Subject: Recieving e-mail? could you please explain what im doing wrong. i have recieved email from a member and cannot get my password to work. i hope i was correct in sending my e-mail in care of post. ************************************************************************** 10)From: SpyKing@thecodex.com Subject: Find someone online fast... I found this nice little program/service at: http://www.mirabilis.com/ it helps you contact people while they are online... >>>> ICQ is a revolutionary, user-friendly, Internet program that tells you who's online at all times. No longer will you search in vain for friends & associates on the 'net. ICQ does the searching for you, alerting you in real time when friends or colleague sign on. In addition, ICQ continually tells you which of your friends & colleagues are online. With ICQ, you can chat, send messages and files, play games or just hang out with your fellow 'netters while still surfing the net. The program runs in the background, taking up a minimum amount of memory and net resources. While you work on other applications, ICQ alerts you when friends and associates sign on, allowing you to work efficiently while having a whole range of Internet functions at your fingertips.Among the functions available are: chat, message, e-mail, URL and file transfer. ICQ also supports a variety of popular external Internet applications. With ICQ, launching an Internet phone or video call is a breeze. With a click of a button, you and a friend (or friends) are instantly connected. These events may be executed among multiple users, so you can conduct a conference or just hang out online. All these functions are organized in one easy to use program that integrates easily into your desktop. <<<< I've installed this program and it seems to work fairly well. Could be a useful tool for list members to contact each other... P.S. We also did a new list member .gif for anyone who wants one... it's at: http://www.thecodex.com ************************************************************************** 11)From: Marvin Hagan Subject: Re: Car bugs Need Help Can somebody tell me where I can find information on car bugs? For example, how do they work? How far can they detect? Does a car have to be running in order to be detected, etc? Thanks, Mhagan@sprintmail.com ************************************************************************** 12)From: "George Y. de Randich" Subject: Need Info Ladies & Gentlemen; I need to know if anybody out there has ever heard of; within the past 5 years; of any alligation of Forgery on the part of a firm Called "Medical Determination, Incorporated" doing business out of the State of New York and forty-one others? Rumor has it that they were investigated by the State of New York for forging doctor's reports. I need to know if anybody has heard of this alligation and if anybody has any other instances to report in any other State or Territory of the United States? Respectfully yours, George y. de Randich, Licensed Private Investigator, George de Randich Investigations (Agency License A-96-00289) 5600 Poinsettia Avenue; Suite # 1102, West Palm Beach, Florida 33407-2649 Telephone # (561) 844-6008. ************************************************************************** Who are you? What's your specialty and/or interest? Let us know about your company... What would you like to see on the list? Post it. Let us know... Do you have something to contribute? We'd like to hear it... We want to know EVERYTHING and ANYTHING about eavesdropping, surveillance, countersurveillance & privacy related technology, etc... Remember: who, what, where, when, how & why... we want ALL the details... Do you have a question? Post it... A little free time? Help a member... With the INCREDIBLE brain power on this list, someone should have the answer ;-) P.S. Don't be a LURKER... Members take the time to post info for us all... give something back... Don't just take... Your input/knowledge is valued... ************************************************************************** Send Postings to: spyking@con2.com with "Post" in subject field with subject ************************************************************************** Subscribe to: spyking@con2.com In the subject field type: subscribe-surveillance list e-mail address ************************************************************************** Unsubscribe to: spyking@con2.com In the subject field type: unsubscribe-surveillance list e-mail address ************************************************************************** ...The Simple Rules of the Surveillance List... The Surveillance List Owners may Reject any posts that are/contain: 1) Info Unrelated to Eavesdropping, Surveillance or Privacy technology... 2) Flames or Negative posts... 3) E-Signatures that are considered excessive... 4) Advertisements not DIRECTLY related to the list topics... 5) Attached Files... 6) Oversized Posts... (May be edited to save room) **************************************************************************** This publication is copyrighted and is protected by U.S. and International copyright law. The information transmitted on this list may not be reproduced, reposted or forwarded to any non-list member without expressed written permission of the List Owner. Violation of U.S. copyright law is a criminal and civil offense... **************************************************************************** The Surveillance List is Moderated by SpyKing@thecodex.com The List Owner will make EVERY effort to protect subscribers from spam... Copyright 1996, 1997 Codex Publishing Inc., All Rights Reserved... **************************************************************************** ****************************************************************************** Vol.Two Issue #128 The Surveillance List June 5,1997 Over 2100+ Members Worldwide Representing 46 different countries List Chat at: http://www.thecodex.com/chat.html ****************************************************************************** IN THIS ISSUE... ****************************************************************************** 01) Re: NT Password 02) Possible phone tap 03) Linux 04) DATALINK, MINI TSCM? 05) Intro - Portugal 06) Scanner mods needed for Rs Pro-60 07) ICQ for MacIntosh? 08) Missing FBI Van 09) Re: What frequency a scanner stops on? 10) HOW TO HACK YOUR WAY ACROSS THE BORDER 11) A little security tip 12) INTERMEDIATE LOCKPICKING 13) List Chat ****************************************************************************** DON'T BE A LURKER.... GET INVOLVED... YOU ARE A MEMBER... MAKE THE MOST OF IT ****************************************************************************** 1)From: Marcus Blankenship Subject: Re: NT Password >Where does the NT workstation stored the local administrators password ? >Is there anyway for a normal user copy it and try decryping it ? There is a good utility at the L0pht (www.l0pht.com) that will decript your NT password. It's called l0phtcrack.zip ( I think). Look around. ************************************************************************** 2)From: "W.Lively" Subject: Possible phone tap Need info on possible phone tap. New client is concerned that a neighbour has tapped the house phone . Is this possible and if so what should I be looking for when doing an inspection? I don't believe it would be to hi-tec if at all. Equipment needed for basic sweep? Thanks in advance. Wayde Mainview Investigation Services suite 100, unit 104, 1600 Bedford Hwy., Bedford, Nova Scotia, Canada. B4A 1E8 Bus: (902)- 864 -0220 Fax: (902)- 864 -3619 Cel: 499-7232 E-mail: mainview@istar.ca ************************************************************************** 3)From: Steve Bishop Subject: Linux Would like to know if any wone would have any linux box that are open to newusers . Would like to learn linux more. ************************************************************************** 4)From: "Shadow Chasers" Subject: DATALINK, MINI TSCM? Techincal Wizards; Knowing that most "high-tech" electronics stem from most government funded projects that spin off into the civilian sector, i.e GPS military to the redneck's use of GPS as "fish finder" curious as to what technical wizard at Motorola had when they designed the Computer Chip inside the Datalink Watch made by Timex that allows the watch to read the Signal being generated by the Computer Monitor with the use of the Datalink Software to the Watch? DATALINK in principal is a minute TSCM device if you allow your thought process to think the way mine is. I wonder if such a computer program on a LARGER SCALE could be implanted into a LAN for instance, and with a unsuspecting device like DATALINK WATCH have someone walk by your computer and capture your information as easily as done with DATALINK? Using a Freq counter was able to read the Rf signal being generated by the DATALINK program to the watch, so what "black project" was Motorola upto, with the invention, makes ya think!!!!!!!! SHADOW CHASER ************************************************************************** 5)From: "Navarra" Subject: Let us know about your company... >Who are you? What's your specialty and/or interest? Let us know about your >company...What would you like to see on the list? Post it. Let us know... Securecorp is a young company From Portugal, dedicated to technology development, consulting and services. Our activities are protecting data, programs, installations,computer's equipment, people, communications. Other activities are counter-surveillance, counter-Intelligence, sabotage, espionage and implementing precautionary measures that guarantee reliability of equipment's, logical supports and integrity of information. With my best regards McDell Van Navarra. ************************************************************************** 6)From: Wes Hobgood Subject: Scanner mods needed for Rs Pro-60 Does anybody know if there are any mods available for the RS Pro-60 handheld model? Thanks, Wes ************************************************************************** 7)From: Glenn Beauregard Subject: ICQ for MacIntosh? I read in the last issue about ICQ for tracking your on-line friends. After visiting the website, I found it to be available for the PC user only. Does anyone know of such a program for MacIntosh?? Thank you in advance. Glenn ************************************************************************** 8)From: Ron Moore Subject: Missing FBI Van THIS IS A SATIRE THIS IS A SATIRE THIS IS A SATIRE THIS IS A SATIRE (With Sincere Apologies To The Kingsmen) Louie, Louie, oh no, SWAT van be gone, Louie, Louie, oh no, SWAT van be gone, We park de van, leave de weapons inside, We enter hotel just to spend de night, When we come out, de weapons, dey gone, We turn our portable radios on (to moan), Louie, Louie, oh no, SWAT van be gone, Louie, Louie, oh no, SWAT van be gone, We leave de guns, unguarded, mon, They disappear before de dawn, Now Louie, we know, you be real mad, About dis loss, we, too, be sad, Louie, Louie, oh no, SWAT van be gone, Louie, Louie, oh no, SWAT van be gone, Eddie de Eagle soon be training us, If we see gun, we must not touch, We run to find a grown up adult, For safety to be de end result, Louie, Louie, oh no, SWAT van be gone, Louie, Louie, oh no, SWAT van be gone, With guns no longer, us, you trust, Because we lost de "weapons bus", Bows and arrows, mon, yes, now we tote, As we head up ---- creek, in leaky boat, Louie, Louie, oh no, SWAT van be gone, Louie, Louie, oh no, SWAT van be gone, Now, ATF, dey be chasing us, Because we lost de "weapons bus", We lost full autos and, yes, grenades, We hear, yes, dat some careers may fade, Louie, Louie, oh no, SWAT van be gone, Louie, Louie, oh no, SWAT van be gone, SWAT van be gone ... SWAT van be gone. ______________________________________ THIS IS A SATIRE THIS IS A SATIRE THIS IS A SATIRE THIS IS A SATIRE Ron Moore ************************************************************************** 9)From: CrACKeD Subject: Re: What frequency a scanner stops on? > can law enforcement monitor what frequencys a scanner stops on from a > distance by monitoring your scanner antenna. No, scanning is a passive activity. > no known bugs within radio rooms walls.every since the local law found > out i monitor every channel they have including body mics ,state and > federal freqs in my state, they have tried to shut me down by rf > saturation and atomatic paging of all local freqs , sabatoge , and > breaking in and stealing equipment. Huh? Your local police department is breaking into your home and stealing your equipment? Just because you're a scanner enthusiast? What is RF saturation and automatic paging of all local frequencies? > i do know that one of my scanners have been modified to tx as soon as it > is turned on by hooking it to a freq. Scanners can't be modified to transmit, at least not without an insane amount of extra circuitry which would most likely not even fit inside the radio. And even if such a stunt was pulled off, the radio wouldn't be transmitting as soon as you turned it on, and you wouldn't be able to use the scanner to receive if it were transmitting. > counter and have also found audio bugs previuosly in my radio room. if i > key up my cb base station with 1200watts of rf power they have to send a > tech out to reset thier equipment. What equipment? Where? Who are "they?" > is thier a simple white noise device i can build to put close to the > structure that houses thier equipment??need all suggestions If I'm thinking of what I think you're thinking, yes. There are devices available which will "jam" any microphone nearby using noise the human ear can't hear. I think The Edge Co. sells the things. Keep in mind it'll kill any microphone on anything, including your radios and telephone. As for the rest of your problems, I think you're a little nutty. Your local police department isn't going to do things like plant room bugs and steal your gear. You've probably pissed some CB operator off because you use such an insane amount of power on the band. Having CBers pulling stupid stunts like that isn't too uncommon. If you're dealing with simple room bugs, you know someone nearby must be listening or recording. CrACKeD ************************************************************************** 10)From: "Betty G.O'Hearn" Subject: HOW TO HACK YOUR WAY ACROSS THE BORDER A Lesson in Customs Customs for the Net-Savvy Traveler By Winn Schwartau (First published by Internet Underground, Ziff Davis, May, 1997. All rights reserved. The electronic version of this article may be freely distributed anywhere in the world without permission as long as (1) it is not edited, modified or truncated, and (2) this and the copyright notices remain.) OK, OK, so some people think I'm a Net Personality, but really. I mean really! Phil Zimmerman was under serious investigation. Dan Farmer made headlines. All I did was write a few books and redefine war. I mean, really! With a fever of 102 degrees and my nose dripping with a contagion I had acquired in Poland a few days before, I handed the customs official my official "I'm Carrying No Illegal Drugs" form. "Anything to declare?" he asked indifferently. "A bottle of Bulgarian Merlot," I snorted while wiping my reddened proboscis on a sweaty denim shirt sleeve. At that, he pointed me towards the darkened, most feared section of the vast customs receiving station, Secondary Inspection. Over to the x-ray machine I trundled my ailing body, a pair of wheeled suitcases, two laptop computers, a maze of wires and telco equipment and a wide assortment of materials that were to soon be my undoing. The month prior I had in fact cracked three ribs in an oversized London bathtub, so I had no choice but to ask the next customs man in the "Welcome to America" gauntlet to hoist my 60 kilo luggage for me. They stopped the x-ray conveyer belt and doubled, then tripled and then, yes, quadrupled the ion storm power bombarding my belongings -all in search of a hidden compartment hiding a golden corkscrew for the Merlot. They peered, and twisted their heads to the side and invited other Inspectors to crane their necks and point at the insidiously obvious contraband I was attempting to bring into the United States. "Tertiary Inspection," they declared and my luggage was hoisted this time onto a long slick aluminum tray some three feet wide that was perfectly suited to carry out bovine autopsies. And there waiting for me was a snarling young peach-fuzzed Customs Inspector with an attitude and a gun. His hands were covered with Playtex Living gloves to protect him from any of the myriad diseases we netizens carry home with us. He had heard about boot sector viruses, obviously. Finish the laughs at: http://www.infowar.com/humor/humorza.html-ssi ************************************************************************** 11)From: BADCOFFEE@aol.com Subject: A little security tip On a jobsite I had to pick a Master lock that was on a chain. The chain was between 2 swinging chain link gates to more or less "keep them together". I would assume th owner of the gate figured that making the chain "tight as hell' it would prevent any excess space between the gates if they were to be pushed. Good theory.......BAD idea. A problem with padlocks are that they are not in a "FIXED" position. They sometimes do tend to be a pain to pick simply because most of the time they are in an awkward position. The tight chain anabled me to , more or less, just lift the lock to a comfortable position (keep it there) to pick it that much easier. Although all locks are pickable........it takes a burlgar "that much" LESS time to manipulate if you make it easier for her. Time is everything.....Every SINGLE second adds to the chances of her getting caught. Augie Professional something I do something, havent quite figured it out yet. ************************************************************************** 12)From: BADCOFFEE@aol.com Subject: INTERMEDIATE LOCKPICKING No time for "terminology" please refer to MIT site for terminology: http://www.lysator.liu.se/mit-guide/mit-guide.html Raking/scrubbing- Absolutely FIRST aproach. Insert tention wrench and apply VERY LIGHT pressure. Your concentration should be devided as follows: 80% tention, 20% picking. In raking it is the TORQUE that you apply that is the critical factor. With the other hand....you are simply doing nothing more than inserting, lifting slightly and pulling out. Increase torque "ever so slightly" after eah pull out. When you feel SOLID pins (no more spring) MAINTAIN pressure and see what happens. Incease as needed. (slightly) TIP: By your 4th pull out....if your not getting anywhere, Release and start over again. TIP- If you ARE getting somewhere....and it just doesnt open-> Rapid Side to side, up and down...just stir things up a bit (gently).and most of this times...it's yours. Nice and easy..keep your hands nice and loose. PS- I have been working HEAVY on safe manipulation. When I can put tis to words.....I certainly will. Augie Entry Specialist for hire ************************************************************************** 13)From: SpyKing@thecodex.com Subject: List Chat The Chat page is up and working at: http://www.thecodex.com/chat.html You need a Java capable browser... feel free to use it whenever... I'll be online Sunday nite June 8,1997 at 1900 hrs EDT if anyone wants to stop by and chat... maybe we can get a weekly thing going... P.S. We are finalizing our two day "Methods of Eavesdropping & Surveillance" seminar plans for first or second week in August in New York... if anyone wants info please contact me directly... there will be a lot of "how-to" and I've got one of the best info guys in the business who will speak about how-to get "Hard to get" confidential info... ************************************************************************** Who are you? What's your specialty and/or interest? Let us know about your company... What would you like to see on the list? Post it. Let us know... Do you have something to contribute? We'd like to hear it... We want to know EVERYTHING and ANYTHING about eavesdropping, surveillance, countersurveillance & privacy related technology, etc... Remember: who, what, where, when, how & why... we want ALL the details... Do you have a question? Post it... A little free time? Help a member... With the INCREDIBLE brain power on this list, someone should have the answer ;-) P.S. Don't be a LURKER... Members take the time to post info for us all... give something back... Don't just take... Your input/knowledge is valued... ************************************************************************** Send Postings to: spyking@con2.com with "Post" in subject field with subject ************************************************************************** Subscribe to: spyking@con2.com In the subject field type: subscribe-surveillance list e-mail address ************************************************************************** Unsubscribe to: spyking@con2.com In the subject field type: unsubscribe-surveillance list e-mail address ************************************************************************** ...The Simple Rules of the Surveillance List... The Surveillance List Owners may Reject any posts that are/contain: 1) Info Unrelated to Eavesdropping, Surveillance or Privacy technology... 2) Flames or Negative posts... 3) E-Signatures that are considered excessive... 4) Advertisements not DIRECTLY related to the list topics... 5) Attached Files... 6) Oversized Posts... (May be edited to save room) **************************************************************************** This publication is copyrighted and is protected by U.S. and International copyright law. The information transmitted on this list may not be reproduced, reposted or forwarded to any non-list member without expressed written permission of the List Owner. Violation of U.S. copyright law is a criminal and civil offense... **************************************************************************** The Surveillance List is Moderated by SpyKing@thecodex.com The List Owner will make EVERY effort to protect subscribers from spam... Copyright 1996, 1997 Codex Publishing Inc., All Rights Reserved... **************************************************************************** ****************************************************************************** Vol.Two Issue #129 The Surveillance List June 6,1997 Over 2100+ Members Worldwide Representing 46 different countries List Chat at: http://www.thecodex.com/chat.html ****************************************************************************** IN THIS ISSUE... ****************************************************************************** 01) Re: Possible phone tap 02) Spy Stuff from the newswire... 03) Securing Cell Phones To Dial Into Central Comuter Site 04) Re: Missing SWAT Van 05) Re: possible phone tap 06) Re: Possible Phone Tap 07) Fibbie van 08) To access the list chat? 09) Re: What frequency a scanner stops on? 10) Re: What frequency a scanner stops on? 11) Re: Video Transmitter 12) 399 MHz range were used for bugging? 13) TSCM Seminar in Boston 7-8 August 14) Re: A friend in AZ ****************************************************************************** DON'T BE A LURKER.... GET INVOLVED... YOU ARE A MEMBER... MAKE THE MOST OF IT ****************************************************************************** 1)From: CrACKeD Subject: Re: Possible phone tap > Need info on possible phone tap. New client is concerned that a > neighbour has tapped the house phone . Is this possible and if so what > should I be looking for when doing an inspection? I don't believe it > would be to hi-tec if at all. Equipment needed for basic sweep? > Thanks in advance. Wayde If it's a low-tech job, then you're probably dealing with a cheap tap installed either in the phone box on the side of the house or somewhere else along the part of the line accessable to a bad guy. You may need a screw driver and pair of needle-nose pliers for this task. Such devices are available at most hardware stores for fairly reasonable prices. A portable frequency counter could help, but it shouldn't be absolutely necessary. You should also consider the possibility of recording equipment being hooked up somewhere as opposed to a transmitter. And be sure this client of yours isn't being a nitwit by doing something like using a cordless telephone. CrACKeD ************************************************************************** 2)SpyKing@thecodex.com Subject: Spy Stuff from the newswire... CIA Double Agent Jailed for 23 Years ALEXANDRIA, Va. - Confessed double agent Harold Nicholson, the most senior CIA officer ever convicted of spying, was sentenced Thursday to 23 years and seven months in prison for selling secrets to Russia. Before sentencing, Nicholson, a 46-year-old divorced father of three, told the court he regretted having sold out his country for 2 1/2 years for payments totaling $300,000. He described his sellout as an effort to compensate his children for the time he spent away from them on undercover missions. He said he had reasoned that his ill-gotten gains would make up to his children for his long hours at work and for "failing to keep my marriage together.'' "I won't ask for the forgiveness of my colleagues and countrymen for I know they cannot give it,'' Nicholson said. "I will ask for the forgiveness of my family and children because I know they will.'' "I am in so many ways so very sorry,'' he added. U.S. District Judge James Cacheris said he would recommend to the Bureau of Prisons that Nicholson, an Oregon native, serve his time in an appropriate maximum security facility on the West Coast. Nicholson pleaded guilty March 3 to selling national security secrets, including the identity of Central Intelligence Agency covert operatives he helped train. The CIA said it was gratified by the sentence, which means Nicholson will be nearly 70 when he is eligible for release from prison. "Mr. Nicholson deserves every day of the sentence the judge has imposed,'' the spy agency said in a statement. The acting director of central intelligence, George Tenet, said in a pre-sentencing letter to Cacheris that Nicholson's espionage had seriously damaged the CIA's ability to perform its mission and to safeguard undercover operatives. "Mr. Nicholson revealed or planned to reveal the names and positions of a large number of CIA officers whose jobs depend on their ability to work clandestinely,'' Tenet wrote. He said some had been working under "our deepest cover program'' and had to be withdrawn because their lives were put at risk. Nicholson's espionage forced the CIA to abort promising intelligence missions and left permanent uncertainty about the contribution he made to Russian spy operations, Tenet added. The 16-year CIA veteran was arrested at Dulles International Airport outside Washington Nov. 16, carrying film and a computer disk of classified information to pass on to Russian agents in Switzerland. He began cooperating with Russian agents while serving as deputy CIA station chief in Malaysia in 1994 and continued after he returned to Washington where he helped train recruits at Camp Peary, the CIA boot camp near Williamsburg, Virginia. At the time of his arrest, Nicholson was earning about $73,000 as a branch chief in the CIA counterterrorism center, the highest pay grade he held during his career. The 283-month sentence met the request of federal prosecutors, who had struck a deal with Nicholson under which he admitted guilt and agreed to cooperate in exchange for a recommended sentence of less than life imprisonment. Nicholson acknowledged that he met his Russian handlers four times - in India, Indonesia, Switzerland and Singapore - to hand over classified information. Cacheris rejected a plea from Nicholson's court-appointed lawyers for a sentence of no more than 262 months. Jonathan Shapiro, one of two defense counsels, urged Cacheris to consider Nicholson's contributions as an Army Ranger and covert officer before becoming a turncoat. Nicholson served as CIA station chief in Romania from 1990 to 1992 before becoming deputy chief of station and operations in Malaysia. Earlier, he was posted to the Philippines, Thailand and Japan. More from the newswire... Russia Advertises for Double Agents MOSCOW - The head of Russian intelligence has made a public offer to Russians spying for foreign powers - call the special hotline and become a double agent. In a sign the old KGB is adapting to the new market economy, the deal from Moscow's chief spycatcher is simple - own up and you can go on taking money from your foreign paymasters, keep quiet and we will get you in the end. "We will find them all otherwise, sooner or later,'' General Nikolai Kovalyov, head of the Federal Security Service (FSB), the successor to the Soviet KGB, said in an interview on Moscow television channel MTK late on Tuesday. The Moscow telephone number he gave - 224-3500 - was constantly busy on Wednesday morning. "That means a lot of people are calling,'' an FSB spokesman said. Another spokesman told that Itar-Tass news agency that Kovalyov was exemplifying how Russia's new criminal code, introduced this year, may pardon those who make amends for misdeeds. "There is an old Russian saying - the sword does not chop off a repenting head,'' the spokesman told Tass. He made no mention of preserving foreign fees for remorseful double agents. The Cold War may be over but foreign intelligence services are still active in Russia. And economic hardship has tempted many Russians to sell secrets. "The FSB head has more than once said in the media that Russia's counter-intelligence service has not seen any decline in foreign spying activities in Russia,'' Tass quoted the spokesman as saying. The spokesman said that during the past six months alone the service had caught 11 foreign agents and thwarted 39 attempts to send secret information abroad. The FSB says it caught 39 Russian agents of foreign powers in 1995 and 1996 and 400 foreign spies. Last week, a former Russian defense industry official went on trial in Moscow, charged with treason after allegedly spying for London in 1994 in return for large payments. He faces the death penalty if convicted. Nine British diplomats were expelled last year after the FSB arrested another Russian accused of passing secrets to them. Kovalyov said the FSB had discovered British intelligence's latest method for debriefing their moles without making contact - the agent can transmit the data by remote control while his British handler "sips his beer in a bar a hundred metres away.'' More from the newswire... Drug cartels have best technology money can buy KEY WEST, Fla. (AP) - If you've ever wondered what happened to James Bond, he might be working for one of the drug cartels in Asia or Latin America. Drug traffickers are spending fortunes on the latest technology to spy on and elude authorities. And they're hiring former intelligence officers to work for them, drug enforcement officials said Tuesday at the opening of a four-day conference. "Drug traffickers have the best technology that money can buy,'' said a Drug Enforcement Administration agent who spoke on condition of anonymity. "And they hire people from the intelligence community in some countries to operate it for them or teach them how to use it.'' Drug barons have an added advantage - tons of cash and no rules on how to spend it. "The cartels are ahead of us a lot of the time in having state-of-the-art technology because they can just go out and spend what it takes as soon as it is available,'' the agent said. "We have to get contracts, take bids, get approval.'' The United States has a spying network of satellites, paid informants and AWACS radar surveillance planes, which can detect traffickers' aircraft from 200 miles away. But traffickers know the opposition - and cartels rival the CIA in sophisticated information gathering. Drug traffickers can intercept telephone calls, set up bugging devices inside trucks from which they can record indoor conversations and encrypt their cellular phone calls so that they cannot be decoded by enforcement authorities, the agent said. Traffickers spend millions to buy off government authorities all over the world, said a Pentagon official who also spoke on condition of anonymity. In Colombia, many participants in a constitutional congress several years ago were paid off by drug traffickers who wanted to make it impossible to extradite them from their homeland, the official said. Bugging devices often have been found in the offices of Colombian government officials and prosecutors. But authorities have one new tool that traffickers are having trouble counteracting. The device "can sniff out drugs. You point it at something and it will tell you if there are drugs there,'' the Pentagon official said. The hefty price tag is a major drawback. "It costs millions and millions of dollars. There are only a very few of them. The problem is that they can cover only a very small area at any one time, and to build one that could cover a whole ship's container would cost too much,'' the Pentagon official said. "There are millions of containers a year coming into this country, and a lot of them have drugs in them,'' he said. Traffickers are hiring brilliant chemists to try to find ways to foil detection of smuggled drugs, said Air Force Col. Sam Reed, who soon will take over as director of counter-drug operations at the U.S. Southern Command in Panama. It is one of five regional military commands and is responsible for coordinating military operations in Central and South America. "They do things like make a bathtub out of material that contains cocaine and then they break it down and extract the cocaine in the United States,'' Reed said. They also make furniture with fiberboard containing cocaine and then extract the drugs chemically. Barry McCaffrey, the Clinton administration's drug policy chief, said the next big threat will be methamphetamines, frequently called designer drugs or boutique drugs, which can be made easily by traffickers. "There is no reason to grow coca when boutique drugs can be produced with $100 and a recipe off the Internet,'' he said. ************************************************************************** 3)From: Vincent D Vinci Subject: Securing Cell Phones To Dial Into Central Comuter Site We have a large number of people that dial into our comupter system from out of the office. Some portion of these people need to do so using cell phones. I am looking for a way to secure this entry into our system. Do you know of products or services that can provide this? Vince Vinci vincent_d_vinci@amoco.com ************************************************************************** 4)From: Trace Carpenter Subject: Re: Missing SWAT Van >Louie, Louie, oh no, SWAT van be gone, >Louie, Louie, oh no, SWAT van be gone, Encore. ************************************************************************** 5)From: richard Subject: Re: possible phone tap depending on neighbors expertise, it could be a simple xmitter in your client's protector [the box on the out side of the dwelling] or at the serving terminal, the point where the phone drop is connected to the phone cable , also , its possible that the tap could be hard wired from the serving termnial[ the ariel or buried connection point , for the customers [phone] of the neighbor, using the second pair of the suspected tappers drop ....return e-mail me if i can be of help good luck ..... sincerely , juju@texoma.com aka richard ************************************************************************** 6)From: Trace Carpenter Subject: Re: Possible Phone Tap > New client is concerned that a >neighbour has tapped the house phone . Is this possible and if so what >should I be looking for when doing an inspection? I don't believe it >would be to hi-tec if at all. Wayde, When dealing with TSCM a little knowledge is a dangerous thing. Tools needed are going to run in the thousands to do a good job, but since you feel that it's not going to be "hi-tec" we'll try a few basics. First, try taking an ohm meter and reading across the tip and ring wires at the interface. The commonly used RadShk parallel switch will read almost a dead short if it's on the line. If you do get a short try unplugging everything out of the jacks until the short goes away, as it could be a bad phone also. If you've unplugged everything and it's still there, start looking. Next try line voltage drops. Take a reading from the interface of voltage drop when you go off hook. Compare that to other phones close by from the same phone company office and compare them. "Leach" type bugs rob voltage from the line. Also, check the stump at the alley or the pole depending on if it's above or below ground to see if his line has been bridged over to an empty wire pair going to the neighbors house. That'll get you started. Oh and don't forget. The ever exhausting physical search. Follow each wire into the house, through the attic and down the wall. Look behind every jack. What are you looking for? Something that doesn't look like it should be there. -- Trace Carpenter Investigations ****** 2926 Maple Ave., Ste. 200 Friends help you move; Dallas, Texas 75201 Real friends help you move bodies. 214.828.4520 ****** ************************************************************************** 7)From: Jim Ray Subject: Fibbie van We needn't worry, the President had them put locks on the M16s and MP5s so we are safe. JMR Regards, Jim Ray DNRC Minister of Encryption Advocacy One of the "legitimate concerns of law enforcement" seems to be that I was born innocent until proven guilty and not the other way around. -- me http://shopmiami.com/prs/jimray/ PGP id.A7D63DA9 98 1F 39 BA 93 86 B4 F5 57 52 64 0E DA BA 2C 71 ************************************************************************** 8)From: Spysociety@aol.com Subject: To access the list chat? How can one get a java browser to allow one to access the list chat? I don't really understand the concept of browsers, is it considered software? ************************************************************************** 9)From: Tim Johnson Subject: Re: What frequency a scanner stops on? The following came in from CrACKeD with the subject dealing with What frequency a scanner stops on? > can law enforcement monitor what frequencys a scanner stops on from a > distance by monitoring your scanner antenna. CrACKeD wrote: No, scanning is a passive activity. To the contrary, you can monitor the frequency a scanner stops on (with the proper equipment) With a CM receiver or spectrum analyzer, you can follow the signal radiated by a scanner as it tunes automatically up or down the frequency spectrum. My theory is very fuzzy, but you either add or substract the IF to get the actual frequency. (I hope I haven't stuck my neck out to far on this one ) > no known bugs within radio rooms walls.every since the local law found > out i monitor every channel they have including body mics ,state and > federal freqs in my state, they have tried to shut me down by rf > saturation and atomatic paging of all local freqs , sabatoge , and > breaking in and stealing equipment. CrACKeD wrote: Huh? Your local police department is breaking into your home and stealing your equipment? Just because you're a scanner enthusiast? What is RF saturation and automatic paging of all local frequencies? RF saturation is simply flooding a designated area with energy from a transmitter. The Russians did (do) it all the time with the US Embassy in Moscow; that's how they operated the resonant cavity hidden in the Great Seal. It also works well on other electronic equipment, such as telephones, radios, etc. Automatic paging is sweeping the frequency spectrum a with a transmitter, covering a portion of the frequency spectrum to either disrupt transmissions (jamming) or activate receivers. > i do know that one of my scanners have been modified to tx as soon as it > is turned on by hooking it to a freq. CrACKeD wrote: Scanners can't be modified to transmit, at least not without an insane amount of extra circuitry which would most likely not even fit inside the radio. And even if such a stunt was pulled off, the radio wouldn't be transmitting as soon as you turned it on, and you wouldn't be able to use the scanner to receive if it were transmitting. Modifying a scnner to transmit is not difficult at all. On the other hand, you would probably get some interference. > counter and have also found audio bugs previuosly in my radio room. if i > key up my cb base station with 1200watts of rf power they have to send a > tech out to reset thier equipment. CrACKeD wrote: What equipment? Where? Who are "they?" He just RF flooded their equipment with an illegal transmitter. CB units (to the best of my knowledge) are not authorized 1200 watts of power. > is thier a simple white noise device i can build to put close to the > structure that houses thier equipment??need all suggestions If I'm thinking of what I think you're thinking, yes. There are devices available which will "jam" any microphone nearby using noise the human ear can't hear. I think The Edge Co. sells the things. Keep in mind it'll kill any microphone on anything, including your radios and telephone. CrACKeD wrote: As for the rest of your problems, I think you're a little nutty. Your local police department isn't going to do things like plant room bugs and steal your gear. You've probably pissed some CB operator off because you use such an insane amount of power on the band. Having CBers pulling stupid stunts like that isn't too uncommon. If you're dealing with simple room bugs, you know someone nearby must be listening or recording. With the exception of the language used (weak minds and all that) I agree with CrACKeD, the individual appears to be paranoid, is using illegal equipment and should be reported to the FCC. I would be tempted to insert a T commector into the antenna lead in and route a portion of that power back into a directional antenna pointed at his home. After a few days, his sexual capacity would diminish, future off spring would look wierd, and he might glow in the dark. Male pattern baldness would develop and his blood count would change drastically. Other than that, it doesn't sound as if it would affect his mental capacity. Tim Johnson dbugman@amug.org Technical Security Consultants Inc http://www.amug.org/~dbugman/ What you say in private is your business. Keeping it private is ours. (c)TSCI 1987 ************************************************************************** 10)From: Martin Pask <100142.3101@CompuServe.COM> Subject: Re: What frequency a scanner stops on? Nice one CRACKED it takes all sorts!!! M.P.I. ************************************************************************** 11)From: Ian Simons Subject: Re: Video Transmitter >My company recently purchased a VIDLINK 100 UHF video transmitter for >use with a watch camera, as well as other cameras. Has anyone had any >experience with these transmitters? Anyone had good luck? It seems to >work pertty well when the receiver is a cable ready TV w/UHF antenna, or >a manually tuned portable. I was hoping I could get it to work with my >Sony GVS-50, (8mm VCR w/monitor, and TV tuner) but I cannot seem to get >the tuner to pull in the transmission properly. It's almost as if the >tuner is not "wide" enough and looking for a narrower signal. Any >suggestions? Sony TVs need a good strong signal to overcome the signal threshold you really need a different TV. Ian Simons ************************************************************************** 12)From: Vic Rohret Subject: 399 MHz range were used for bugging? On a recent Discovery Channel report the frequencies in the 399 MHz range were used for bugging? Is this common? Are there freqs that are more "used" than others? Thanks! Vic Rohret, Naches WA +++Moderator's Note+++ I believe that 399.000 Mhz is in the Military band in this country although this same frequency is used by a Japanese company, Micro Electronics who manufactures eavesdropping equipment. They were recently busted by US Customs for illegally shipping their wares into the USA which in turn was being sold by the "Spy Shops". Most illegal bugging devices are found in the VHF and UHF range althought devices have been found around 1800 - 2400 & 2800Mhz and above... The ENTIRE radio spectrum must be inspected during a TSCM survey... ************************************************************************** 13)From: Tim Johnson Subject: TSCM Seminar in Boston 7-8 August For more info, go to http://www.amug.org/~dbugman/seminar.html Please check the restrictions before applying (corporate security and law enforcement only, unless prior exceptions are made). Thanks Tim Johnson dbugman@amug.org Technical Security Consultants Inc http://www.amug.org/~dbugman/ What you say in private is your business. Keeping it private is ours. (c)TSCI 1987 ************************************************************************** 14)From: MX5678@aol.com Subject: Re: A friend in AZ if you want to give me her name I will see what I can do.....about finding your friend in AZ. Brad ************************************************************************** Who are you? What's your specialty and/or interest? Let us know about your company... What would you like to see on the list? Post it. Let us know... Do you have something to contribute? We'd like to hear it... We want to know EVERYTHING and ANYTHING about eavesdropping, surveillance, countersurveillance & privacy related technology, etc... Remember: who, what, where, when, how & why... we want ALL the details... Do you have a question? Post it... A little free time? Help a member... With the INCREDIBLE brain power on this list, someone should have the answer ;-) P.S. Don't be a LURKER... Members take the time to post info for us all... give something back... Don't just take... Your input/knowledge is valued... ************************************************************************** Send Postings to: spyking@con2.com with "Post" in subject field with subject ************************************************************************** Subscribe to: spyking@con2.com In the subject field type: subscribe-surveillance list e-mail address ************************************************************************** Unsubscribe to: spyking@con2.com In the subject field type: unsubscribe-surveillance list e-mail address ************************************************************************** ...The Simple Rules of the Surveillance List... The Surveillance List Owners may Reject any posts that are/contain: 1) Info Unrelated to Eavesdropping, Surveillance or Privacy technology... 2) Flames or Negative posts... 3) E-Signatures that are considered excessive... 4) Advertisements not DIRECTLY related to the list topics... 5) Attached Files... 6) Oversized Posts... (May be edited to save room) **************************************************************************** This publication is copyrighted and is protected by U.S. and International copyright law. The information transmitted on this list may not be reproduced, reposted or forwarded to any non-list member without expressed written permission of the List Owner. Violation of U.S. copyright law is a criminal and civil offense... **************************************************************************** The Surveillance List is Moderated by SpyKing@thecodex.com The List Owner will make EVERY effort to protect subscribers from spam... Copyright 1996, 1997 Codex Publishing Inc., All Rights Reserved... **************************************************************************** ****************************************************************************** Vol.Two Issue #130 The Surveillance List June 7,1997 Over 2100+ Members Worldwide Representing 46 different countries List Chat at: http://www.thecodex.com/chat.html ****************************************************************************** IN THIS ISSUE... ****************************************************************************** 01) Re: Securing Cell Phones To Dial Into Central Computer Site 02) Re: "Jamming" car audio equipment 03) Things You Don't Want to Hear 04) Surveillance Van Periscopes 05) Manhatten Cyber Project & IRA Disruption of Electricity in London Plan 06) Spy Stuff from the Newswire... 07) MS Autheticode 2.0? 08) In Ear Surveillance Monitoring Devices 09) Federal Privacy Legislation 10) Texas DMV + 11) PCS - Eavesdrop proof? 12) Receive TV video thru scanner? 13) Are You Already a Criminal? 14) Toll-Free ANI Readback Number 15) Drugs, etc ****************************************************************************** DON'T BE A LURKER.... GET INVOLVED... YOU ARE A MEMBER... MAKE THE MOST OF IT ****************************************************************************** 1)From: CrACKeD Subject: Re: Securing Cell Phones To Dial Into Central Computer Site > We have a large number of people that dial into our comupter system from > out of the office. Some portion of these people need to do so using > cell phones. I am looking for a way to secure this entry into our > system. Do you know of products or services that can provide this? What needs securing, the cell phone transmissions or the route these remote access users must take to dial into the computer system? In the case of the former, why not try PCS? The combination of using 1.9 GHz and digital transmissions will make the communications quite secure. CrACKeD ************************************************************************** 2)From: CrACKeD Subject: Re: "Jamming" car audio equipment As an aside to my previous reply concerning "jamming" car audio gear, I'd like to take back what I said about VLF being the band of choice. I've noticed that my UHF-Lo gear really kills most modern electronic equipment. My CD player switches tracks, jumps around in the track it's playing, pauses, squeals, beeps, buzzes, etc. My telephone throws out DTMF tones, redials, squeaks, etc. Not that this only happens when I chuck at least a few watts at this equipment at no more than a couple feet away. VHF can accomplish the same thing, but based upon my experiments, more power is needed. If you back off more than a few feet, speakers will thump every time you transmit. This happens just about anywhere with any equipment. At work, I can sit at the opposite end of a wall and key a UHF transmitter. All the subwoofers in the next room will give out a loud "thump" every time I key, driving my co-workers nuts. Same thing happens to my PC speakers and stereo speakers. Again, VHF works, but it doesn't seem to work as well. Even an HF signal very close to my PC speakers will make them buzz like mad. If you pulled up next to someone with their stereo blaring and threw a couple hundred watts of UHF RF at them, you'd probably hear results. I wish I could give you more scientific proof that what I'm saying is true, but I'm just telling you what I've seen during my own doodling time. CrACKeD ************************************************************************** 3)From: SpyKing@thecodex.com Subject: Things You Don't Want to Hear I found this on the net and thought it would bring a smile... Things You Don't Want to Hear During Surgery Better save that. We'll need it for the autopsy. Someone call the janitor - we're going to need a mop "Accept this sacrifice, O Great Lord of Darkness" Bo! Bo! Comeback with that! Bad Dog! Wait a minute, if this is his spleen, then what's that? Hand me that...uh...that uh.....thingie Oh no! I just lost my Rolex. Oops! Hey, has anyone ever survived 500ml of this stuff before? Damn, there go the lights again... "Ya know, there's big money in kidneys. Hell, the guy's got two of 'em. Everybody stand back! I lost my contact lens! Could you stop that thing from beating; it's throwing my concentration off What's this doing here? I hate it when they're missing stuff in here. That's cool! now can you make his leg twitch?! I wish I hadn't forgotten my glasses. Well folks, this will be an experiment for all of us. Steril, shcmeril. The floor's clean, right? What do mean he wasn't in for a sex change...! Anyone see where I left that scalpel? And now we remove the subject's brain and place it in the body of the ape. OK, now take a picture from this angle. This is truly a freak of nature. This patient has already had some kids, am I correct? Nurse, did this patient sign the organ donation card? Don't worry. I think it is sharp enough. What do you mean "You want a divorce"! She's gonna blow! Everyone take cover!!! FIRE! FIRE! Everyone get out! Damn! Page 47 of the manual is missing! ************************************************************************** 4)From: TH Subject: Surveillance Van Periscopes My company is thinking about putting together another surveillance van and we are interested in looking at periscope systems. Any information would be welcomed, i.e. names of manufacturers, web site addresses, casts, brochure info. etc. ************************************************************************** 5)From: "Betty G.O'Hearn" Subject: Manhatten Cyber Project & IRA Disruption of Electricity in London Plan PRESS CONFERENCE: The Manhattan Cyber Project will be announced Monday, June 9, 1997, at the National Press Club in Washington, D.C. The mission of this project is to improve on the availability and effectiveness of technology, people, and processes that safeguard critical infrastructure areas and U.S. corporations from the "cyber threat." Additional information is available at http://WWW.WarRoomResearch.com Please TAKE THE TIME to read to visit that site. Comments by Winn Schwartau: "The Electronic Civil Defense of the United States is one of this country's most pressing concerns as we redefine our national security assets to include critical infrastructures and economic well being. In June of 1991, I described to Congress the means and the potential for an Electronic Pearl Harbor, but the idea was dismissed as 'far fetched' and 'too much like Chicken Little.' It took five years to the day, an eternity in political terms, for our national leaders to rally behind that phrase in similar Congressional testimony. The threat is clear: the information-age driven convergence of the commercial and private sectors with law enforcement, the government and military create opportunities for adversaries to severely harm the national security interests of the United States. The specter of massive economic espionage and non-military infrastructure-crippling strikes conducted by nation-states and other groups or organizations clearly mandates that we redefine our current defensive posture. It is time for the government to get serious about cooperation with industry and our global partners to reduce the possibility of the Electronic Pearl Harbor I posited over six years ago. Through efforts such as the Infrastructure Protection Task Force and PCCIP, we hope to see a national coalition form to address and solve these issues head-on, without either partisanship or national isolationism. We at Interpact/WWW.Infowar.Com are proud and honored to have been catalytic to the creation of the Manhattan Cyber Project. I personally commit ourselves to supporting those efforts that will strengthen the defensive posture of the United States, and help maintain our future global competitiveness." ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~: IRA Disruption of Electricity in London Plan and Failure Bailey was the site of testimony yesterday that revealed the IRA felt it could accomplish more by causing a disruption of electricity than an actual bombing. Visit the IWAR Situation Report which you may link from the home page of http://www.infowar.com OR surf over to http://www.iwar.org ************************************************************************** 6)From: SpyKing@thecodex.com Subject: Spy Stuff from the Newswire... Germany to place Scientology under counter-intelligence surveillance BONN, Germany (AP) - The German government decided Friday to put the Church of Scientology under nationwide surveillance by counterintelligence agents because it contends the church is a threat to democracy. "All means available to the state'' will be used to observe Scientology's members in Germany, Interior Minister Manfred Kanther said. He refused to say exactly how the church's 30,000 German members would be monitored. Friday's decision marks the first nationwide action against Scientology, although individual German states, political parties and Cabinet ministers have spoken out against the group and organized boycotts against its members. The Los Angeles-based Scientology organization denounced "this senseless decision that violates human rights,'' and said its lawyers would file a legal action against it. Germany contends Scientology's mission is to infiltrate the government and says the group is a threat to democracy. Scientologists deny any such goal and say their members face job discrimination, are denied bank loans and their children have been banned from private schools in Germany. Scientology members protested outside the federal Interior Ministry building Friday, holding placards accusing Germany of encouraging "hate and violence against religious minorities.'' The decision to put Scientology under surveillance by Germany's main counterintelligence agency was made by Kanther and the interior ministers of Germany's 16 states. The counterintelligence agency, which has primarily gathered information on right-wing and left-wing extremists, often uses informers or electronic surveillance systems. Friday's decision got a mixed reception from German politicians. "I emphatically support this decision. It was long overdue,'' said Renate Rennebach, a member of the Social Democrats - Germany's main opposition party - who is on a parliamentary commission that has been examining religious sects. But Greens party member Angelika Koester-Lossack called the move "state repression'' that could "make martyrs'' out of Scientology members and "make the organization more radical.'' More Spy Stuff... Futuristic scanners identify people by hands, eyes or voice NEW YORK (AP) - Forgot your bank card? No sweat. The automated teller machine pans a camera across your eyeballs to verify your identity. Checking out of work? Just press your palm on the surface, and your hours are clocked. What sounds like high-tech fantasy is starting to show up in real life, giving rise to a new class of futuristic gadgets that can scan a person's eyes, hands or voice and instantly verify identity. Among other uses, the "biometric identity'' devices are being tested in automated teller machines as a substitute for plastic bank cards and personal identification numbers. The trend is driven by improvements in technology that are pushing down costs, as well as by heightened fears about security. Indeed, the recent torture-slaying of Jonathan Levin - a New York City high school teacher and son of Time Warner chief Gerald Levin - apparently for his bank card number, has emphasized the need for a better method of screening bank account holders. "I think it's going to make people think a little bit more about security,'' said Erik Bowman, an industry analyst with Personal Identification News, an industry newsletter. "Biometrics is a way to solve that.'' Demand for the scanning devices, while still small, is growing rapidly. Up to $25 million in biometric identity devices are expected to be sold this year, up 45 percent from 1996, according to Personal Identification News. That is expected to double by 1999. A variety of factors are at work. Improvements in technology are driving down prices for the devices, making them more affordable to banks and other security-conscious businesses. And word is spreading about the benefits at a time of heightened concern about flaws in traditional methods such as ATM bank cards. In the Levin slaying, New York police theorize that his killer forced him to reveal his personal identification number by repeatedly stabbing him in the neck, then shot him and used his bank card to withdraw $800 from an ATM. Investigators were analyzing a grainy security videotape from the ATM where the withdrawal took place. Friday, they searched for a 19-year-old suspect described as a convicted drug seller, parolee and former student of Levin's who apparently left a message on the teacher's answering machine the day police believe Levin was killed. In an attempt to thwart such crimes, new technology uses sophisticated scanning devices to identify people, instead of bank cards and PIN numbers. Currently being tested by Citicorp and other banks is a gadget developed by Sensar Inc., that enables an ATM to read a person's iris to verify their identity. Sensar's IrisIdent system uses special cameras to scan the bank holder's face. A computer processes the image and reduces its components to digital code, figuring out which part of the face is actually the iris. The code for the iris and all its unique physical characteristics - representing everything from color to tiny indentations in the tissue - is matched against a database of codes for all bank holders. No match, no transaction. An advantage of Sensar over other gadgets is that a person can stand up to three feet away from the camera to be identified, unlike technology that requires people to touch a sensor, such as fingerprint identification systems. "You don't want to see people at ATMs having to put their finger in a hole,'' said Tom Drury, president and chief executive of Sensar. "The real underlying issue is ease of use and related accuracy.'' Not surprisingly, sensing devices first found a market in companies and government agencies concerned about security. The business market is growing fast. Already, companies such as Coca-Cola and American Airlines are using Recognition Systems' hand-recognition technology for some employees instead of time cards and security badges. The devices "read'' a hand's characteristics, such as size of knuckles and width, to identify employees. One possible bump in the road for the devices are worries among privacy groups that use of these devices will encourage a sort of Big Brother ability to monitor an individual's activities in unseen ways, eroding privacy. "I think these technologies are really a double-edged sword,'' said David Sobel, legal counsel at the Electronic Privacy Information Center, a non-profit group based in Washington. "There will need to be a public debate about what the right way to use these systems might be.'' ************************************************************************** 7)From: "GYPSY" Subject: MS Autheticode 2.0? Does anyone know if MS Autheticode 2.0 is really for our security or perhaps...nah... surely Bill wouldn't do that? Would he? I was thinking of past discussions concerning security and "cookies". I am somewhat of a novice so please answer in a level most would understand (I might get it then). Pardon my skepticism. gypsy@dakotacom.net ************************************************************************** 8)SpyKing@thecodex.com Subject: In Ear Surveillance Monitoring Devices A while ago there was a thread on surveillance earpieces. I found an interesting product at: http://precisionweb.com:80/ ************************************************************************** 9)From: "Prof. L. P. Levine" Subject: Federal Privacy Legislation In an article in todays 'www.onwis.com' the Journal Sentinel Online discussed privacy legislation at the federal level. The proposed Legislation would outlaw sale of private information about individuals. Sweeping legislation to outlaw the distribution or sale of private information about individuals will be introduced in the House today by Rep. Jerry Kleczka. Joining the Milwaukee Democrat on the bill will be Rep. Bob Franks (R-N.J.). It is identical to legislation introduced in the Senate by Sens. Dianne Feinstein (D-Calif.) and Charles Grassley (R-Iowa), both of whom were to appear at a news conference today with Kleczka and Franks. The so-called Personal Information and Privacy Act would prohibit credit bureaus from giving out or selling Social Security numbers, unlisted telephone numbers, dates of birth, past addresses and the maiden names of individuals' mothers. Maiden names often are used as passwords to obtain information. It also would make it illegal for state motor vehicle departments to disseminate Social Security numbers in bulk for use in surveys, marketing or solicitations. Commercial use of Social Security numbers without an individual's consent would be banned under the bill. Kleczka said the Social Security Administration had tallied 4,900 incidents of fraudulent use of Social Security numbers since last Oct. 1. He said that was up from about 2,400 the previous year. Under the legislation, victims could sue violators for up to $50,000 in damages and attorneys' fees. In a prepared statement, Kleczka quoted from a Time magazine article that said, "Snooping on your friends has never been easier." He said that governments, credit bureaus and the Internet "are lining up to dish out private information to anyone who asks or pays, with little regard for the harm it might cause." Also in a statement, Franks said: "A Social Security number is the key to unlocking a whole host of personal information. It must be protected." Kleczka noted that Wisconsin already allowed motorists to block public dissemination of their driver's license information. However, he said, at least five states still make their records accessible to mailers and other private parties. A number of interest groups already have endorsed the legislation, including the Privacy Rights Clearing House, the U.S. Privacy Council, the Consumer Federation of America and the Electronic Privacy Information Center. Feinstein, in a prepared statement, said her staff had been able to obtain her Social Security number and other personal information from a commercial data base in less than three minutes. "This is the information criminals use to open bank accounts, get credit cards and make purchases -- all without an individual's knowledge or permission," she said. ************************************************************************** 10)From: Brent Heustess Subject: Texas DMV + This is a really spooky web site . You can search 17 million Texas drivers by name, driver's license number or license plate number. When you find a person, you can then find everyone at that address with a license. You can even find everyone with the same 9-digit zip code. The record does not have a GIF of the photo, but it has everything else on the license. Did Psychos-R-Us request this site? "Could you create a database so I don't miss anyone when I go on a killing spree on the 900 block of Rosewood?" "28 my ass. I just checked the web and it says you were born 1965. Not ready to admit to be post-30? I'm not buying the 'I weigh 110' either. I read 118 plain as day." "I can't believe it. That asshole just cut me off. Well, Mr. ZBW-446, I guess a little midnight visit is in order to 1918 Grover St. Prepare to be stalked." "Johnny, I looked up your record last night and I couldn't believe my eyes. You're livin' in sin with that Sally Jenkins slut. How could you do this to your Dad & me? You move out now or we're gonna cut off your college money!" Public Link says this is public information, but where are the good old days when you had to have a friend down at the Dept of Public Safety who would look plate numbers up for you? If it was good enough for Rockford, it's good enough for me. Suprress your phone number & address from the phone book, but then it shows up in a searchable database on the web. Lot of good that did you. Now all those 7th Day Adventists know exactly where you live. Privacy, schmivacy. Ta, Brent Public Link Corporation Public Databases on the Internet 5930-E Royal Lane Ste 173, Dallas, TX 75230 (214) 890-6817 Welcome to Public Link Corp., the Information Source of the Internet. We are here to provide public access to public information and public databases. The company uses data obtained from public sources currently available through the Freedom of Information Act and Open Records Laws. We believe it is the citizen's right to have this information available for their use. We expect to grow our database offerings to you over the next several months. Many times you have needed the type of information we provide and have had to use varous methods to obtain the information. Some of these methods you would prefer not to have to use again. Not any more! Just sit back and let us do the work for you. If you have a special suggestions or request, please let us know. Come and join us as we enter the information age! TexasDriverLink State of Texas Licensed Drivers. Over 17,000,000 Texas Drivers License Information. Updated weekly. This database contains the information contained on a person's drivers license. Data included are Name, Address, Weight, Birth Date, Sex, Expiration Date, Status (Active or Suspended), Class of License, and Restrictions. This database does not contain information on a person's traffic tickets, DWIs, or Insurance information. Search either by name or if you know the drivers license number, search by number. TexasTagLink State of Texas License Plates. Over 16,000,000 license plates with accompaning information. Updated weekly. This database contains the information about the owner of a vehicle. This database does not contain insurance information. Search currently only available by plate number. TexasDallasVoterLink Registered voter role for Dallas County Texas. This database also contains voting history for each of the one million registered voters. This database is updated quarterly. TexasArrestLink EvictionLink CivilCourtLink PropertyOwnerLink MarriageRecordLink ************************************************************************** 11)From: riverline@aol.com (Riverline) Subject: PCS - Eavesdrop proof? Sprint is running ads in the NY papers that their PCS service is eavesdrop proof. "And it's secure, too. So you don't have to worry about cloning or eavesdropping." Sounds to me like they are assuring their customers of a privacy that doesn't exist, and maybe setting themselves up for a lawsuit from the next mogul who finds out somebody taped his insider trading or congressional fix. Comments? Paul ************************************************************************** 12)From: travlinman@hotmail.com Subject: Receive TV video thru scanner? Is it possible to tune in broadcast TV thru a scanner? Provided the scanner covers the video portion of the radio spectrum wouldn't it be possible? What extra equipment would be needed if any? Any sites for this or mods? also Smallest commercially available CRYSTAL receiver? I have an application that calls for a TINY receiver with speaker that I can transmit to from a walkie talkie and person wearing receiver can hear... I am NOT looking for receiver worn on belt into wire/wireless up to ear... I'm looking for something very inexpensive for this application. Any help would be appeciated. Where do I get it? ************************************************************************** 13)From: wtbridgman@radix.net (William T. Bridgman) Subject: Are You Already a Criminal? I like to submit this idea to the online community and see what kind of discussion crops up. The U.S. judicial system is (theoretically) built around the concept of innocent until proven guilty. There have been a number of recent high-profile situations where a suspect was abused and other cases where police and prosecutors railroad a person into prison while sitting on evidence that proves them innocent. I've encountered a number of "conservative" individuals who occasionally justify such actions because the suspect was "probably guilty of something." Well, yeah. I suspect just about everyone in the country is "probably guilty of something", especially with the proliferation of local, state and federal laws banning this, requiring registration of that, etc. I don't mean guilty of things like murder, rape, robbery, etc. I mean really innocouous(sp?) stuff that you might not even think twice about. Here's just a few possibilities that come to mind: * Your spouse has a prescription for, say Valium, and you take one when your feeling particularly stressed (drug abuse?). What about the product labels that say things like "It is a federal offense to use this product in a method other than prescribed"? * Your boss' copy of Microsoft Office crashed and he wants to reload it from your original disks. Your company does not have a site license. Do you refuse? (software piracy). * You purchased a gun legally but then moved to a state/locality which required registration or your own state/locality changed its laws and you didn't bother to register (or it wasn't clear that you had to?). With the number of laws on the books, I'm sure there are many other cases like these. Is there a web site that keeps track of the kinds of laws that people wouldn't think about twice? Then of course there are the implications. With all the changes in the "search & seizure" provisions, such simple acts as paying cash for airline tickets makes one a drug suspect and the cash subject to seizure, even without charging the suspect. Suppose police have a warrant to search your home for drugs but find an unregistered gun instead? Do those types of situations make you "guilty by association" because drug dealers tend to have unregistered guns? When I travel, I often pay for hotel stays with cash since when I budget my trips, cash is easier to control. Have I made myself a "suspect" of some crime automatically? Is this paranoid or what? Just some food for thought. Tom Tom Bridgman Physics & Astronomy ************************************************************************** 14)From: Gordon S. Hlavenka Subject: Toll-Free ANI Readback Number I received an email today from someone selling "Breakthrough" products. While I didn't order anything from them today, I did discover that they offer a free ANI readback service -- how very kind of them. When you dial (888) 212-8846 you will hear a message telling you that you have reached a "bulletproof" order line which will only accept two calls from your number. Then they read back your number. This should be useful for nailing down all those unmarked extensions in your wiring closet. It could also be useful for determining the number of any payphone you may be at, where the number tag is missing or illegible. Gordon S. Hlavenka www.crashelex.com gordon@crashelex.com Grammar and spelling flames welcome. Some of us still think it's important. ************************************************************************** 15)From: JbarD Ranch Subject: Drugs, etc 1. Drugs are a major problem in the "land of the free" 2. Prohibition doesn't work. All the money in the world cannot prevent "free enterprise" from engaging in such an immensely profitable trade. Imagine the consequenses if the U.S. of A were to (a) legalize, (b) tax up to current trade prices and (c) spend the income from these new tax dollars not used to offset the budget deficit on developing honest and accurate education in our grade schools to show children the actual effects of drug and alcohol usage. I'm not talking here about scare tactic propaganda per se, although much of this stuff is very scary. Maybe I've just gone too long without sleep, it's been a rough week. My only justification for posting this to the list is that so much money is spent on surveillance/counter surveillance in the so-called drug war. I personally don't believe that any government agencies (ours) would ever profit from selling confiscated contraband (smirk) Don't post this if you don't feel it fits. I just have to say this whenever I have the opportunity. Speak out against organized or government sanctioned stupidity. yers, Joe +++Moderator's Note+++ This is ALWAYS a hot topic and bound to start a thread... I'll be the first to jump in... It is my PERSONAL belief that the war on drugs could be won VERY easily... All it takes is someone in the White House to take a FIRM stand, convince Congress to back it up and issue a proclamation to the drug producing countries of the world. The proclamation would sound something like this... "You have 90 days to stop the flow of death from your country to our shores..." "If you do not, a state of war will exist between our countries..." "The US will use the full force of it's military to eradicate your drug producing fields and facilities. Your leaders will stand trial for crimes against humanity..." "There will be NO war reparations..." All we need to do is elect officals with some backbone ;-) P.S. Maybe you think this is a LITTLE extreme? I don't. However I DO have similar solutions to a host of problems facing our country today? Prison overcrowding? NO problem... How about a "Tough Man" contest... a fight to the death of ALL current prisoners in US jails with the winner going free (whatever his or her crime). The bouts could be televised on Saturday night Pay per views with the proceeds going to the victims of crime... just think, we can empty our jails in no time and take proper care of the victims... OK. I solved two problems. Any more? ;-) "I love the smell of napalm in the morning... it smells like... victory! ************************************************************************** Who are you? What's your specialty and/or interest? Let us know about your company... What would you like to see on the list? Post it. Let us know... Do you have something to contribute? We'd like to hear it... We want to know EVERYTHING and ANYTHING about eavesdropping, surveillance, countersurveillance & privacy related technology, etc... Remember: who, what, where, when, how & why... we want ALL the details... Do you have a question? Post it... A little free time? Help a member... With the INCREDIBLE brain power on this list, someone should have the answer ;-) P.S. Don't be a LURKER... Members take the time to post info for us all... give something back... Don't just take... Your input/knowledge is valued... ************************************************************************** Send Postings to: spyking@con2.com with "Post" in subject field with subject ************************************************************************** Subscribe to: spyking@con2.com In the subject field type: subscribe-surveillance list e-mail address ************************************************************************** Unsubscribe to: spyking@con2.com In the subject field type: unsubscribe-surveillance list e-mail address ************************************************************************** ...The Simple Rules of the Surveillance List... The Surveillance List Owners may Reject any posts that are/contain: 1) Info Unrelated to Eavesdropping, Surveillance or Privacy technology... 2) Flames or Negative posts... 3) E-Signatures that are considered excessive... 4) Advertisements not DIRECTLY related to the list topics... 5) Attached Files... 6) Oversized Posts... (May be edited to save room) **************************************************************************** This publication is copyrighted and is protected by U.S. and International copyright law. The information transmitted on this list may not be reproduced, reposted or forwarded to any non-list member without expressed written permission of the List Owner. Violation of U.S. copyright law is a criminal and civil offense... **************************************************************************** The Surveillance List is Moderated by SpyKing@thecodex.com The List Owner will make EVERY effort to protect subscribers from spam... Copyright 1996, 1997 Codex Publishing Inc., All Rights Reserved... **************************************************************************** ****************************************************************************** Vol.Two Issue #131 The Surveillance List June 9,1997 Over 2100+ Members Worldwide Representing 46 different countries List Chat at: http://www.thecodex.com/chat.html ****************************************************************************** IN THIS ISSUE... ****************************************************************************** 01) Re: 399 MHz range were used for bugging? 02) ECM Question 03) Car Bugs 3rd Request 04) Lockpicking, Don't make yourself nut's- 05) Thanks for the Jokes 06) Re: Possible phone tap 07) Modular-splitter bugs 08) Re: Detecting phone tap 09) Re: Recieving TV broadcast through scanner 10) Re: Drugs 11) Can we work out a system between us? 12) VERY excellent idea 13) Need help, recieving threats 14) PCS - Eavesdrop proff? 15) Re: Receive TV video thru scanner? 16) The inevitable drug trafficking thread 17) Computer Crime & Investigation Center 18) Re: Executive Outcomes/Sandline 19) Re: Drugs, etc 20) Re: Drugs, Prisoners etc... 21) Need info 22) List of phone prefix locations - U.S. and Canada 23) On-line PI listing 24) SFIA Caribbean Basin Memberships 25) Re: The Drug War 26) Re: Car bugs 27) Car Bug Response ****************************************************************************** DON'T BE A LURKER.... GET INVOLVED... YOU ARE A MEMBER... MAKE THE MOST OF IT ****************************************************************************** 1)From: Jean-Pierre Forest Subject: Re: 399 MHz range were used for bugging? Recently here in Canada, a device transmitting at 300MHz was found during a sweep of an office. It was disguised in a Levinton AC plug splitter with no ground plug, ie. older model splitter which converted one outlet to three. Anyhow, the investigation is not over so that's all I have to say about that. As the moderator stated earlier the whole RF/IR spectrum has to be inspected during a sweep, followed by a physical and NLJD. ************************************************************************** 2)From: Jean-Pierre Forest Subject: ECM Question I was wondering, I'm presently using an ETA-3 telephone analyser, and a home made one. But what I found is that although they serve a purpose todays technology has surpassed the analyser. Taking into consideration that some digital telephone system has there CPU(switch) doing random test on each unit such as mic test, speaker test, keypad test, etc... during off hours. One can access the system default and remotely have it make a Mic test and monitor room audio or use the supervisor function and monitor calls. My questions is, is there any telephone analyser(s) out there which has the capacity to analyse any changes made to the system original defaults or which could do full analytical examination of digital phones. Inquiring minds want to know where to get one. Thanks for any help from the great white north. Blue Skies J.P. ************************************************************************** 3)From: Marvin Hagan Subject: Car Bugs 3rd Request I Need Help!! Does anyone out there know anything about car bugging devices? For example, how do they work, how far can they track, does the engine have to be on to track a vehicle, etc? If you don't know, do you know of a website that I may surf so I can find the information? (3rd request) Thanks, ************************************************************************** 4)From: BADCOFFEE@aol.com Subject: Lockpicking, Don't make yourself nut's- Some locks are made to highly resist picking. It is extremely important to know wich ones they are. The Quickset Titan with it's aditional pin (6) states "highly effective against manipulation.......but it is NOT true. One more pin....that's all. On the other hand........if something states that it has modified driver pins such as "Spool, serrated, Mushroom, interlocking" Be prepared for the time of your life to pick it. Thank God that the greater majority of locks are simple pin tumblars. It is actully very rare to come across a higher quality lock these days. It is a prety good idea to spend time surfing the net and possibly getting a lock catalog from somewhere to get the traits on different manufacturers locks and what's inside. Again, rare.....but if you do some across a spool or mushroom pin set up........it WILL make you a bit nuts. Barring the occational stubborn one......my average picking time had dropped to between 20 seconds and 1 minute. Yep.....I'm not embarrased to say, I have a Master Pro Series Padlock with spool pins ($25 and highly recomend it) that has aproximately 200 of my hours in it........and it's still locked. I'll get this puppy under control and loving every second of it. Spoooooollllll pins......if your reading this.....please read on..... Dear Spool pins, I have to say, Thank you. You certainly have put the excitement back in my love for picking. You'r not responding well to me sweet talking you like the other locks. In fact.....you laught at me when I try. However, I have the patience of a saint.........I'll hold you in my hands, talk to you, carress you, touch the right buttons in you....and you'll pop like the rest of them. Then I will be sharing our experience with 2,100 people in 49 countries so they'll be able to do the same. :-) Love always, Augie ************************************************************************** 5)From: cardoc@hhs.net Subject: Thanks for the Jokes Spyking, Thanks for the jokes about the operating room. They did hit the spot. Did you get the Ultimate Yo Mamma Joke List yet? I have it- the largest I've ever seen- 129k I think. Let me know if you want it. I got it from the alt.tasteless.jokes newsgroup. This is one of my favorite NG's. I do hope that you are well, and happy. Take care, and as always.... good luck to you. Edward -- Edward E. Dunlevy Vanguard Inspection Services ....."with confidence and integrity"! P.O. Box 695 Keeney Row Republic, Penna. 15475-0695 Phone/Fax- 412-246-9804 E-mail- cardoc@hhs.net URL- http://www.hhs.net/cardoc ************************************************************************** 6)From: rockhous@ny.frontiercomm.net Subject: Re: Possible phone tap >Need info on possible phone tap. New client is concerned that a >neighbour has tapped the house phone . Is this possible and if so what >should I be looking for when doing an inspection? I don't believe it >would be to hi-tec if at all. Equipment needed for basic sweep? >Thanks in advance. Wayde Wayde, Rock House Products offers an FCC Approved All Mode Telephone Analyzer, the TE-4200 This unit would detect possible phone taps as well constantly check the integrity of the phone line. We sell the TE-4200 well below list price for $399.95. You can view full specifications and pricing at: http://www.rock2000.com/counter/te4200.htm or visit our web site at: http://www.rock2000.com If you have any questions feel free to contact me. Best Regards! John Palmeri Rock House Products P.O. Box 2001 Monroe, New York 10950 USA Phone +01-914-692-4077 Fax +01-914-692-4299 sales@rock2000.com http://www.rock2000.com Visa & MasterCard are Accepted ************************************************************************** 7)From: Steven Martin Subject: Modular-splitter bugs I have seen telephone bugs that are disguised as modular jack splitters on the web for about $50... that seems kinda high, I was wondering what the cheapest anyone has found these for (or would be willing to build one for). /\O/\ Night Hawk /\O/\ ************************************************************************** 8)From: John P Trotter Subject: Re: Detecting phone tap If simple check of wiring does not show tap - arrange conversations about subjects sensitive to tapper and wait for response - how his wife is in bed - or how boring she says he is - his company is laying off or closing - etc sudden response will confirm tap JPT ************************************************************************** 9)From: Supafuz Subject: Re: Recieving TV broadcast through scanner As a matter of fact i was just muddling over the same question. (To use a scanner to tune in t.v. broadcasting). It would be quite handy for us who build their own devices (transmitters) to be able to use a scanner to tune in reception and be able to view it via monitor. A thread was sent by the moderator a month or so ago explaining how to build a computer sync. generator to view electromagnetic radiation from CRTs. It would seem that this device (or a simpler vs. there of) could be capable of stripping the signal of sync and then resyncing it for use in a monitor. The device was a basic 555 timer (2). Rat shack could supply you with everything needed. What do you think Mr. Moderator?? ______________ supafuz@tamu.edu I do not feel obliged to believe that the same God who has endowed us with sense, reason, and intellect has intended us to forgo their use. -Galileo Galilei +++Moderator's Note+++ I believe some the higher priced receivers do offer a video option. ************************************************************************** 10)From: diablo@jorsm.com Subject: Re: Drugs Very well said. When I'm president, how would you like a job as chief drug-policy maker? :> jeff >SpyKing wrote: > It is my PERSONAL belief that the war on drugs could be won VERY easily... > All it takes is someone in the White House to take a FIRM stand, convince >Congress to back it > up and issue a proclamation to the drug producing >countries of the world. The proclamation would sound something like this... > >"You have 90 days to stop the flow of death from your country to our shores..." > >"If you do not, a state of war will exist between our countries..." > >"The US will use the full force of it's military to eradicate your drug producing fields and facilities. Your leaders will stand trial for crimes against humanity..." > >"There will be NO war reparations..." +++Moderator's Note+++ No thanks. I'd rather be Mayor of New York City ;-) But... see china's post below. He might be interested... ************************************************************************** 11)From: BADCOFFEE@aol.com Subject: Can we work out a system between us? 2,100 members, 46 countries. Every technical expert in every field from all corners of the globe. We are individual fingers. As the fingers close...they become a hand. Each finger is usefull. As a hand......we are a global force of which NOTHING is out of reach. My proposal: I would like to see this global family come together as one. Can we work out a system between us to "barter" our services between us? Is that possible? Would it one day be possible to have a problem that needs attention 2,500 miles away from me and POST it.......and get a positive reply within hours of my cry? I am an entry specialist. Nothing can stop me from gaining entry to anything in my chosen path. Be it a simple lockpick, a tunnel, swinging from a vine, crawling out of a toilet if that's what it takes. That is my specialty. YOU will need me for something one day.....I will not charge you a dime more than my expenses...providing you return the favor and all is reasonably legal. Is this dreamland? Your thoughts on the "barter" system. You are "there" and I am "here". But "WE" are everywhere. Augie ************************************************************************** 12)From: BADCOFFEE@aol.com Subject: VERY excellent idea As soon as I get a "camera" for my computer I "might" put together a series of AVI's on lockpicking down-loadable from a web site or sent direct to inquirer's. No sound, nothing fancy. Probably each 20 seconds in length (that's a long download) on about 15 or so different manipulation tecniques and briefcases. If I have a "whole lot of time", I might put together a quickie video. A picture is worth a thousand words. Augie Entry specialist for hire Todays personal quote- "You don't have to tell me why they call them safes" ************************************************************************** 13)From: "Casey Visco" Subject: Need help, recieving threats All, I have been recieving e-mails from someone who keeps saying that they are the God of Computers and that they have hacked me. If anyone can help me figure out who this little punk is, let me know. -->C ************************************************************************** 14)From: CrACKeD Subject: PCS - Eavesdrop proff? > Sprint is running ads in the NY papers that their PCS service is > eavesdrop proof. "And it's secure, too. So you don't have to worry about > cloning or eavesdropping." > > Sounds to me like they are assuring their customers of a privacy that > doesn't exist, and maybe setting themselves up for a lawsuit from the > next mogul who finds out somebody taped his insider trading or > congressional fix. > > Comments? When you find a remotely affordable receiver or other equipment capable of monitoring spread spectrum and/or encrypted digital transmissions in 1.9 GHz, you be sure to let us all know. CrACKeD ************************************************************************** 15)From: CrACKeD Subject: Re: Receive TV video thru scanner? > Is it possible to tune in broadcast TV thru a scanner? Provided the > scanner covers the video portion of the radio spectrum wouldn't it be > possible? What extra equipment would be needed if any? Any sites for > this or mods? You want to listen to TV video on your scanner? Whatever floats your boat. Check out the FAF (Frequently Asked Frequencies) at this URL: ftp://ftp.oak.oakland.edu/pub/hamradio/docs/misc/scanner.faf > also > > Smallest commercially available CRYSTAL receiver? I have an application > that calls for a TINY receiver with speaker that I can transmit to from > a walkie talkie and person wearing receiver can hear... I am NOT looking > for receiver worn on belt into wire/wireless up to ear... I'm looking > for something very inexpensive for this application. Any help would be > appeciated. Where do I get it? Have you considered just using a toy walkie talkie? Since you didn't specify what frequency you need to listen to, I'm going to assume you're referring to toy walkie talkies in the 49 MHz band. They're usually under 10 bucks in local toy stores and are crystalled, not synthed. When taken out of their attractive designer cases, they'll swish into just about any space you need to fit them into. Replacement crystals are also easy to find and are pretty inexpensive. CrACKeD ************************************************************************** 16)From: China Subject: The inevitable drug trafficking thread Since I have had the dubious distinction of experiencing the smell of naplam more times than I can count and since that which I experienced from the ensuing carnage was something distinctly dissimilar to "victory," I assume that Spyking has chosen to play the devil's advocate in this thread which will certainly evolve from "JBARD's" posting. Contrary to the extant and popularly romanticized notion, war is a methodology of last resort; in war people really die, never to been seen on Part II of the continuing saga, and they die horribly. Even more tragically, the mechanisms of war cannot, of necessity, differentiate between combatants and non-combatants except within a very narrow spectrum. This is not to say that there never exists a justification of war, because obviously events sometimes deteriorate to the point where the only viable remedy is the application of "last resort" measures. In the case of illicit drug trafficking, however, this is not the situation. This government has the resources to summarily and preemptively eradicate the illicit drug problem in this country and to do so easily within the timeframe given-- 90 days. Such a solution requires only a clandestine and coordinated surgical strike against the production and distribution networks of the entire illicit drug trafficking organizations, regardless of physical or pecuniary dimensions. The general concept for such an ops is standard and simple: Locate, Isolate, and Terminate. It goes without saying that given the sophisticated technological and HUMINT resources available to this government the location and complete hierarchical structure of major production and distribution networks are intimately known; the EPIC facility in El Paso is reportedly on a par with the world's best. Consequently, the target is located. Even within the "surgical" concept, isolation is a relative term and must by guided by the parameters of the ops, but applying the "isolation" theory is no major feat or obstacle when viewed against the backdrop of the ensuing carnage of general war. Finally, target acquisition and termination is the simplest of the three considerations and needs no elaboration. This approach can be justified from many perspectives since it is the least "intrusive" method and since the purveyors of drugs are for all intents and purposes engaging in a capital offense; if they are not physically killing their consumers, then they are most assuredly doing so from an intellectual and psycological perspective. Moreover, the purveyors of illicit drugs are fanning the flames of a general social malignancy which endangers the entire fabric of our society. It is the belief of this writer that neither geography nor demography should have any bearing on the determination of target viability and acquisition; it should make no difference whether the target is living in a luxurous penthouse or a spartan prison cell, and it should make no difference whether he derived a billion dollars of revenue from his nefariuos pursuits or merely one hundred dollars. Likewise, neither politics nor "world opinion" should affect such a determination or agenda-- should some country decry its humane aspects or presume to censure the underlying principle, it should be invited to become the surrogate host for any vestigial illicit drug trafficking. It is also important that the phrase "illicit drug traffickers" be absolutely and catagorically refined and should not be subject to discretionary abuse; there has been a curious trend to justify a number of constitutional intrusions upon the general population, usually through the mechanism of "fine print" hidden within so-and-so's Omnibus Crime Bill. While, in the opinion of this writer, the actual drug trafficker has with premeditation placed himself/herself outside the protection of the Constitution of this country, the government has no legitimate interest in knowing how many narcotic prescriptions one might have received from his physician in his treatment of one's particular medical condition. Likewise, having that information should not be interpreted as "probable cause" and justify a summary search of one's property. Within the same vein as offered by Tom Bridgman, the use of a spouse's prescription medication in such a manner as described should not carry with it the danger of labeling one an "illicit drug trafficker", notwithstanding the fact that such practice is proscribed by Federal law-- et cetera, ad nauseum. This brings me to my conclusion (grin), the problem that we have experienced with our stated objective of winning a war on drugs is that, sadly, there has never BEEN a "war on drugs." The so-called "war on drugs" has proven to be nothing more than a political artifice designed to accomplish a host of other objectives wholly unrelated to a war on drugs. To be certain, the field operative perceives it to be a war, and for the most part his engagement with the problem has a noble motive. However, his efforts have proven to be an exercise in futility since the real agenda has little to do with a war on drugs. The specter of increasing drug trafficking is used as a political whip to garner for each agency greater legislative funding, to reduce unemployment through the creation of more job titles and descriptions, to encourage the populace to accept the incremental divestiture of their individual constitutional guarantees, and to facilitate the inexorable militarization of our civil law enforcement agencies in an attempt to blur the line of demarcation between "civil" and "military" authority. Sometimes, I find myself asking, "What's up Doc?" Ps-- not enough time or room to address the "prison overcrowding" problem :> China ************************************************************************** 17)From: "Duncan C. Kinder" Subject: Computer Crime & Investigation Center I would like to announce my website: The Computer Crime & Investigation Center. URL: http://www.ovnet.com/~dckinder/crime.htm Topics covered include: What problems can arise An ounce of prevention How it is done Detecting whether you have a problem Search and seizure of computer equipment Is Big Brother watching you? The enigma of encryption Viruses UNIX security tools NT security Articles and law reviews Newsgroups and discussion General sites Duncan Kinder dckinder@ovnet.com ************************************************************************** 18)From: Jenn Saint-John Subject: Re: Executive Outcomes/Sandline Robert -- Thanks for your reply; no, no one had responded as yet. But I was able to contact my friend the next day; his email had been, um, temporarily interrupted. ;) And he's fine and outta there, so I feel better. But I appreciate your response. >It is my understanding that everyone left well before the overthrow. >I believe that the military moved them out of place prior to acting >to protect their "seperation" from such actions. EO works under individual contracts, for either a job or a time period, with exception of key officer positions. When they pulled out of Sierra Leone, a number of those contracts had expired, and a few people stayed behind, taking contracts with other companies. This is pretty typical for EO, and it works well for all parties concerned. If I remember correctly, about 20 EO people had remained behind in Sierra Leone, concentrated mainly around the diamond mine area, but were no longer serving as members of EO. Does anyone have any information about Sandline, by any chance? I've got some, but not enough... ************************************************************************** 19)From: "Dr Jamie Love" Subject: Re: Drugs, etc Spyking's proposed presidential statement to stop drug trafficking such as "You have 90 days to stop the flow of death from your country to our shores..." "If you do not, a state of war will exist between our countries..." is an entertaining thought, but it's appeal and rightgousness diminish when you realise that many Third World countries would LOVE to be making this same threat to the USA! Fact is, they (the tiny little nations) would of course be ignored by the USA if they did make such grand threats. And what would motivate them to make those kind of threats? How about a USA government backed industry which exports deadly drugs to its country while using sophisticated advertising to promote it as "cool" and "sexy". I'm speaking, of course, about the number one drug ring on the planet. Tobbaco companies! Nicotine is a dangerous, addictive drug whose cancer-casuing properties cannot be separated from the "high". It kills millions of lives each year (world wide). It costs billions in sick-leave. It is an export industry supported by the USA. Hell, you might have thought the Colombians were the global troublemakers! The ONLY reasons it is OK to smoke a cig is because 1) it's been going on for years. 2) our parents did it. 3) the government has made a fortune off of it (in taxes). 4) it's legal (because of points 1 to 3). Spyking closed with the comment "All we need to do is elect officals with some backbone ;-) " Well, I'll drink to that! but that's another story ; - ) Jamie Jamie Love (PhD, MBA, MD in progress) Scientist for Hire "Life is my business" http://www.virtual-pc.com/mindweb/merlin/sci4hire.html EMAIL jamie@enterprise.net OR merlin@megatropic.com +++Moderator's Note+++ As I put out a cigarette to type this... I agree... tobacco goes to... what's good for the goose is good for the gander... ************************************************************************** 20)From: JbarD Ranch Subject: Re: Drugs, Prisoners etc... So okay you've solved our drug problem (maybe) by annexing the remains of most of South and Central America, not to mention Southeast Asia. You've also managed to release the most deadly and violent criminals back to the streets of our fair nation, as if there weren't enough out there already. BTW, do we also shut down manufacture of one of the more deadly drugs produced legally (since the Volstead Act was repealed) right here at home? Well, I'm very much looking forward to continued discussion on this subject, as I know there are holes in my argument and am looking to have them illuminated. Just don't take away my cigarettes until I'm ready to quit again. Oh yeah, and my coffee. Somebody might get hurt. yers hoping for a better society Josef ************************************************************************** 21)From: BADCOFFEE@aol.com Subject: Need info Hi, Need info: There is a realtor lockbox that has the label "AE II" on the front of it.It apears as if a seperate peice attaches to the front where there are 2 "prongs" on the top. I have never seen the second part, just the lockbox itself. What is this? How does this work? Where can I get one to play with? Certainly looks interesting...... Augie ************************************************************************** 22)From: nwdirect@netcom.com Subject: List of phone prefix locations - U.S. and Canada Come to http://www.thedirectory.org/pref/ for a very large listing of telephone prefixes and their locations in the U.S. and Canada. The listings are updated about once a month. Also included is information on the new area codes and their prefixes as soon as we have the info available to us. Note that we post that info close to the actual change so we can have the latest info (changes are often made at the last minute). Come by and take a look. The site's usage is growing! * Internet Access Providers - Web Presence Providers - BBSes * * http://www.thedirectory.org/ - largest directory on the web * * tens of thousands of listings - over 7,600 Access Providers * * Telephone Prefix Locations - "The BBS Corner" - Web Banner Creation * ************************************************************************** 23)From: Karl Rominger Subject: On-line PI listing RLS is currently developing an on-line research site for attorneys. Its attracting alot of positive responses, and we will be advertising it heavily in the next few months. We have a PI's directory on the site, with only one firm listed for each state. We still have some states open, including yours as of this e-mail. The cost is $50.00 for a one year listing. We either connect straight to your web page or we will make a lisiting for you. The test address is http://site100134.primehost.com Just go to the PI directory there to see an example. No listings are up yet, but we officially launch on July 1. Please e-mail or call to reserve your spot. We also have a Process Server Directory and a Document Retrieval Directory. Two slots are $90.00 and three slots are $120.00. Thank You for your time. Karl Rominger RLS Please note that this e-mail is also being copied to those already listed on the directories to update you on the address and the site development. The permanent address will be www.romingerlegal.com, which should be running by the middle of this week. ************************************************************************** 24)From: Gary Cohen Subject: SFIA Caribbean Basin Memberships If you've read our latest Journal, (follow the links to the Journal from http://www.webcircle.com/users/sfia/ ), you know that the SFIA is helping the Dominican Republic with certain security problems. Our President, Gene Schuler, would like to extend an invitation to our neighbors in Puerto Rico, Nassau, Freeport, Costa Rica, Jamaica , Haiti and the Dominican Republic and all the other Caribbean Islands to join us in SFIA. Our International Affairs Committee can offer networking opportunities, educational seminars, and help boost business on all sides. Thank you ************************************************************************** 25)From: Ted Johnson Subject: Re: The Drug War >+++Moderator's Note+++ > >This is ALWAYS a hot topic and bound to start a thread... I'll be the first to jump in... > >It is my PERSONAL belief that the war on drugs could be won VERY easily... >All it takes is someone in the White House to take a FIRM stand, convince Congress to back it up and issue a proclamation to the drug producing countries of the world. The proclamation would sound something like this... > >"You have 90 days to stop the flow of death from your country to our shores..." > >"If you do not, a state of war will exist between our countries..." > >"The US will use the full force of it's military to eradicate your drug producing fields and facilities. Your leaders will stand trial for crimes against humanity..." > >"There will be NO war reparations..." > >All we need to do is elect officals with some backbone ;-) > >P.S. Maybe you think this is a LITTLE extreme? I don't. However I DO have similar solutions to a host of problems facing our country today? > >Prison overcrowding? NO problem... How about a "Tough Man" contest... a fight to the death of ALL current prisoners in US jails with the winner going free (whatever his or her crime). The bouts could be televised on Saturday night >Pay per views with the proceeds going to the victims of crime... just think, >we can empty our jails in no time and take proper care of the victims... > >OK. I solved two problems. Any more? ;-) > >"I love the smell of napalm in the morning... it smells like... victory! Love the movie but I don't think you'll win the war. Possibly, if you nuked the entire planet you would may reach the final objective but then you would find the survivors seeking out and preparing potions to ease there pain and suffering; the process would begin again. Again a drug problem? I just heard a pronouncement on the T.V.; "Guess which drug killed the most people last year? Choices are Heroin, Crack, Cocaine, PCP, methamphetamine, marijuana or alcohol. The winner with more than 5 times the combined death rate was the most ancient drug alcohol. You need more than bombs and threats to win. When you get rid of pain and suffering and take the money factor out of the trade you may get rid of drugs but there will still be the weekend warrior just having fun. If they made cigarettes illegal today do you think the smokers would disappear? If you burned all the tobacco fields do you think smoking would stop? You may not know this little fact but there has never been another plant species discovered in North America that contained nicotine that the native Indians did not already know about. It is human nature to alter their reality, it is part of our search for knowledge, drugs have played a role in this since the beginning of time. You can't stop them. Take the money out of the equation and the distribution will drop significantly. Money is the motivator, no money = no motivation; no motivation = reduced usage. For instance, if a cost of a pound of cocaine was similar in price to a pound of flour how many high school students would be financing their new car by the sale of cocaine. These students would find that working a fast food restaurant would put them closer to their monetary goal much sooner than dealing. No dealing = a much lower rate of usage. Of course all drug use would not disappear and in the beginning it would probably increase but the novelty would fade and social pressure would limit the increase. Employers could still demand sobriety on the job. No job = no income. The cure is a matter of motivation. One of the best examples of this comes from MADD "mothers against drunk driving". These MADD mothers launched a most successful social awareness campaign, I don't think it was the courts or the penalties that lowered the drunk driving rate but all the pressure put on individual responsibility. I once made a bet with the wife a district attorney. Her claim was that not enough money was being made available to combat drug crime. This bet came at a time when our leaders in Washington just made available to the city of Washington D.C. 50 million dollars earmarked solely for law enforcement to stop the drug problem. I told her with this much money thrown at the problem you should see, in a years time, at least 0.1 of a percent drop in the rate of drug use. I also told her that if the rate did drop I would stop saying that our current methods are useless and support current policy. Needless to say, the rate of use increased by more than 2 percent that year. She never changed to support my theory as she said she would, but pointed out in a politically correct manner, "that wasn't it wonderful the increase was so small and the 50 million was very effective and the public should support future efforts" noting this success and spend more money. It is funny how a reduced rate of increase is a reduction; these are the same people working on the national debt. More spin doctors. I'm sure this will get me flamed to no end but I don't think we need to wage a world war (I don't think anyone would have the stomach for it anyway) for a problem that causes 5 times fewer deaths than alcohol. I see the trend toward abolishment of nicotine containing products and in the trenches are the cold, hungry, huddled masses of the third world waiting with their tobacco seeds, looking for a slice of the pie (can you blame them?). Just a thought. Sincerely, Ted Johnson ************************************************************************** 26)From: Alan & Teresa Greatorex Subject: Re: Car bugs > Need Help > Can somebody tell me where I can find information on car bugs? For > example, how do they work? How far can they detect? Does a car have to > be running in order to be detected, etc? > > Thanks, > Mhagan@sprintmail.com > I'd also like to add my voice to Marv's, because this is his second post and no one seems to know anything about this subject. What's the deal with this, dosen't anyone bug cars? Neither of us are PI's, but we'd just like some information or at least where to find out something on the Net. After all, why should the dirtwads who stole our privacy know more about this than we do? Thought the purpose of this list was to help other members obtain knowledge. Anyone???? Thanks, Teri and Marv ************************************************************************** 27)From: SpyKing@thecodex.com Subject: Car Bug Response There have been several requests for info on vehicle surveillance devices so I'll take a stab at this one... There are two MAIN reasons to "bug" a car... first... to listen to conversation of vehicle inhabitants and second...to ascertain vehicles location. Listening can be accomplished by placing a wireless microphone inside vehicle in a number of ways... 1. Simple battery type operated device that requires retrieval and battery replacement. Requires moving listening post in proximity of target vehicle. 2. Wiring a device into vehicles power source. Device draws it's power from car battery. Requires moving listening post in proximity of target vehicle. 3. Pager activated device. Wireless microphone that is activated silently by being "paged". Advantage is transmitter is dormant when no active surveillance. 4. Cellular car bug. Wireless microphone that is cellular activated. This is a circuit that contains wireless microphone attached to cellular phone components. Listener simply "calls" bug and "bug" silently answers and connects to wireless microphone in car. Audio is transmitted over cellular network. These devices are normally scrambled. Listening post is "anywhere" one can make phone call from. Active listening is terminated by simply "hanging up". Advantage: No physical tail necessary. 5. Hidden voice activated recorder tape recorder... The poor man's way... but it works (as long as the radio isn't on ;-) ... usually used by a suspicious spouse... Vehicle location can be accomplished in a number of ways: 1. Radio beacon homing device. Either battery operated and placed under vehicle normally by means of a powerful magnet or wired into vehicles power source. Disadvantage. Requires physical tail in close proximity. 2. GPS tracking. Requires a transmitter placed on vehicle. Advantage is some systems require no physical tail. 3. Trackdown System (invisible spray). Advantage is no radio beacon. Tail can follow from great distance. The high tech answer to a bucket of paint underneath with a hole in it... 4. Infra Red Strobe. Placed on vehicle. IR Strobe flash is invisible to human eye but can be seen for many miles at night from the air by using night vision equipment... ************************************************************************** Who are you? What's your specialty and/or interest? Let us know about your company... What would you like to see on the list? Post it. Let us know... Do you have something to contribute? We'd like to hear it... We want to know EVERYTHING and ANYTHING about eavesdropping, surveillance, countersurveillance & privacy related technology, etc... Remember: who, what, where, when, how & why... we want ALL the details... Do you have a question? Post it... A little free time? Help a member... With the INCREDIBLE brain power on this list, someone should have the answer ;-) P.S. Don't be a LURKER... Members take the time to post info for us all... give something back... Don't just take... Your input/knowledge is valued... ************************************************************************** Send Postings to: spyking@con2.com with "Post" in subject field with subject ************************************************************************** Subscribe to: spyking@con2.com In the subject field type: subscribe-surveillance list e-mail address ************************************************************************** Unsubscribe to: spyking@con2.com In the subject field type: unsubscribe-surveillance list e-mail address ************************************************************************** ...The Simple Rules of the Surveillance List... The Surveillance List Owners may Reject any posts that are/contain: 1) Info Unrelated to Eavesdropping, Surveillance or Privacy technology... 2) Flames or Negative posts... 3) E-Signatures that are considered excessive... 4) Advertisements not DIRECTLY related to the list topics... 5) Attached Files... 6) Oversized Posts... (May be edited to save room) **************************************************************************** This publication is copyrighted and is protected by U.S. and International copyright law. The information transmitted on this list may not be reproduced, reposted or forwarded to any non-list member without expressed written permission of the List Owner. Violation of U.S. copyright law is a criminal and civil offense... **************************************************************************** The Surveillance List is Moderated by SpyKing@thecodex.com The List Owner will make EVERY effort to protect subscribers from spam... Copyright 1996, 1997 Codex Publishing Inc., All Rights Reserved... **************************************************************************** ****************************************************************************** Vol.Two Issue #132 The Surveillance List June 10,1997 Over 2100+ Members Worldwide Representing 46 different countries List Chat at: http://www.thecodex.com/chat.html ****************************************************************************** IN THIS ISSUE... ****************************************************************************** 01) The Spy who came in on the phone 02) HAHNS & SCIENTOLOGY 03) Re: Ear Mic 04) Restoring JUSTICE 05) Re: War on drugs 06) Re: ECM Question 07) Re: Car Bugs 3rd Request 08) Re: Need Info 09) Re: Need help, recieving threats 10) Re: Need Info, Realtor Lock Box 11) War on Drugs 12) Re: War on Drugs 13) Re: Drugs 14) Re: GSM Phone Security 15) Vehicle Surveillance Devices 16) Computer monitoring of individuals 17) EPIC Releases Web Privacy Report 18) THANKS ****************************************************************************** DON'T BE A LURKER.... GET INVOLVED... YOU ARE A MEMBER... MAKE THE MOST OF IT ****************************************************************************** 1)From: SpyKing@thecodex.com Subject: The Spy who came in on the phone From The Journal of Commerce The Spy who came in on the phone Michael S. Lelyveld Last year, U.S. officials wanted to let Russia know they were considering a plan for peaceful uses of atomic energy, but they weren't ready at that time to float it as a formal proposal through diplomatic channels. Suddenly, someone hit on a simple solution. Why not just send a fax of a draft of the proposal to the State Department? U.S. intelligence agencies have the technology to monitor Russian government messages, and they assume the Russians are doing exactly the same thing at their embassy in Washington, a senior official said recently. What better way to put a bug in the ear of the Russians, since they bug everything in Washington anyway. The orchestrated leak between two unsecured fax machines at U.S. government agencies was a new trick in a spy game that has been going on for years. But it is also a cautionary tale for private companies seeking to guard against the hijacking of their intellectual property. "You have to assume that everything is being listened to," the U.S. official said, referring to the Russians. "They never seem to be surprised when we're proposing something new." By now, most citizens and corporations know that their cellular phone calls or faxes sent by microwave transmission are easy pickings for scanners and other surveillance knickknacks. Yet, many are surprised when their private communications go public, as in the case of House Speaker Newt Gingrich who was overheard by a Florida couple with a scanner, information that reached The New York Times. Officials and security experts say that companies can be targeted by many of the same kinds of electronic interception that worry government officials and agencies. The FBI is investigating some 800 cases of suspected economic espionage involving 23 countries, according to a presidential report to Congress last year. Security lags behind Yet, corporate awareness and security precautions often lag far behind those of governments. At the U.S. Embassy in Moscow, for example, official visitors are reportedly guided through a secure area and told to leave coats, notebooks and even pencils behind. They are then led through a beveled door like the entrance to a bank safe, then another, then a third. Sensitive conversations take place only inside the innermost sanctum of "the tank," with the door shut. Experts say that, in theory at least, surveillance techniques have made very little information absolutely safe. Even without telephone interception, conversations inside buildings can be picked up and recorded from a distance by detecting the vibrations of window glass. W.J. Holland Jr., a retired rear admiral and president of the Armed Forces Communications and Electronics Association Educational Foundation in Washington, said that emanations from electromagnetic devices or radiation can also make electric typewriters, faxes and computers vulnerable to surveillance, whether they're linked to microwave phone lines or not. For some 20 years, U.S. government agencies have used a system known as "Tempest" for secure faxes and typewriters to create an electronic "white noise" shield and thwart high-tech snooping. There are even indications that U.S. intelligence has technology to read signals sent over hard-wired copper phone lines without using conventional taps. Expensive overkill But security experts see the use of "vaults" and Tempest systems as overkill for companies with precious intellectual property. The use of Tempest shielding, for example, can double a computer system's cost, said FBI Agent Ken Warner, who works as part of the government's "Awareness of National Security Issues Response" program. The FBI tries to raise consciousness about the industrial spying problem without urging adoption of a particular system, Mr. Warner said. But more common safeguards are also frequently neglected despite the growing threat of industrial espionage. A survey sponsored last year by the American Society for Industrial Security (ASIS) found that most U.S. companies still do not use encrypted voice, data and fax equipment as part of their security, despite information losses that cost U.S. industry an estimated $2 billion a month. Only 42% of responding high-tech firms used such encoding equipment to scramble information before transmission. Encryption gear was used by only 28% of manufacturers and 19% of corporations engaged in services. Yet, 40% of the companies report that they have experienced known, attempted or suspected information thefts. The apparent gap between threat and response seems strange in light of the high-tech industry's intense campaign to liberalize U.S. export limits on encryption last year. Is the threat real? The explanation may lie in the difficulty of assessing how much of the threat is real. Richard Heffernan, a Connecticut-based security consultant and co-author of the ASIS study, said it is a leap to assume that all messages are monitored just because Russia may read State Department faxes. "To say that this happens to all communications is the wrong conclusion," he said. Low-tech theft is likely to be far more common, as in the case of Volkswagen AG's alleged diversion of General Motors Corp. trade secrets through the hiring of a top GM manager. In the ASIS study, three-fourths of information losses were blamed on trusted workers or former employees. Only 2% were traced to foreign intelligence and less than 5% to foreign competitors. Less than 2% of the thefts were due to electronic surveillance, although another 5% to 7% were from computer hacking. In cases involving foreign nationals, the top five countries identified were China, Canada, France, India and Japan. The former Soviet Union ranked eighth. Under the Economic Espionage Act of 1996, theft of trade secrets for a foreign entity is punishable by fines up to $500,000 or up to 15 years imprisonment for individuals. Fines for organizations range up to $10 million. Although the government's National Counterintelligence Center has cited "military critical technologies" as the most likely targets, others have also been on the listen-in list. One U.S. manufacturer who planned to have a product fabricated in Hong Kong made the mistake of transmitting the design by ordinary fax, said Mr. Heffernan. It was intercepted by a competitor. "With the 12-hour time difference, it was out on the street the next day," he said. Firms learn to be careful Many corporations have learned to be more careful. The precautions taken by Maynard, Mass.-based Digital Equipment Corp. may represent the norm for aware high-tech companies. "We assume that we're targeted," said Vic Thuotte, Digital's information security manager, although he said he knows of no instance of successful spying against the computer maker. The company's Alpha microprocessor chip, introduced in 1993, was the result of work by engineers in countries around the world who communicated electronically. Digital has a large private network for proprietary information, which includes satellite transmission as well as hard-wired lines. Encrypted fax machines are used by the company's executive offices. Such machines are automatically set to observe the U.S. limits on encryption for messages overseas. Confidential messages within the United States might use complex 128-bit encryption, for example, but be knocked down to 56-bit keys for faxing to France. Until this year, exports of encryption products were largely restricted to those with 40-bit keys so that U.S. intelligence agencies could easily read international messages. In January, the limit was raised to 56 bits for companies pledging to develop "key recovery" systems for government access. Critics of encryption curbs say they pose a basic conflict for the government, which promotes industrial security on the one hand while restricting use of a basic tool. At Digital, the U.S. limits on encryption exports can lead to assigning some parts of a project to countries where information is felt to be most secure. The most sensitive data may also be carried by individuals rather than transmitted, said Mr. Thuotte. Banks, which have been allowed higher encryption limits for international communications, frequently use both dedicated phone lines and encoding to keep their financial transactions secret, Adm. Holland said. A matter of time But despite the relative rarity of foreign espionage against U.S. companies by electronic surveillance, it is probably only a matter of time before the intelligence tricks of governments are played more often on industry. Mr. Heffernan recommends conducting "technical surveillance countermeasures," commonly known as "sweeps," on a quarterly basis for most companies. The operations may be conducted weekly or before key meetings in cases of companies involved in merger negotiations, he said. ************************************************************************** 2)From: "Shadow Chasers" Subject: "HAHNS & SCIENTOLOGY" Germany's earmarked decision to monitor SCIENTOLOGIST's is not new, the fact that they have been caught in public using thier CI assests in Germany leaves question's that ought to be asked here in the STATES!! You can bet your ass that HAHNS (German CI) is monitoring if not moled in the LA office of SCIENTOLOGY along side of Big Brother; Uncle Sam! ************************************************************************** 3)From: ISG Subject: Re: Ear Mic Just a note to say you have a great service. Pls check our sight www.isg-web.com for some products that you might be interested in. The MER is a stand alone ear receiver/mic. Thank you for your news letter. Regards Richard DiSabatino ************************************************************************** 4)From: "Ken Lowndes" Subject: Restoring JUSTICE One effective means, SpyKing, for you to deplete the surplus PRISON population is to Order the immediate Execution of all Death Row immates, on Day 2 of your New Administration. [By the END of Day 2, all will have been executed. Any innocents executed will lead to the same penalty (Death) for those whose perjured testimony resulted in a wrongful death by the system. Then, to eliminate all child molestation, Order all of known offenders ON the streets to be Re-Arrested, and declare an Order (based on Common Law-or whatever), for ALL to be executed on Day 3. Include those in custody. Add to this list all known rapists, and kidnappers (includes car-jackers). You'll be re-elected on Day 4 of your New Administration, even with the election still 4 more years down the road.... No one will have to wait that long!:) One more thing....Godspeed! Kenneth L Lowndes royal@fullnet.net ************************************************************************** 5)From: bennett2@iquest.net Subject: Re: War on drugs Before anyone decides to help the government by offering suggestions on how to solve the drug problem, read "The Big White Lie" by David Levine, a former DEA agent. He had an earlier book called "Deep Cover". He has lost a son to the drug war and is a very sincere and serious man. bye. ************************************************************************** 6)From: Trace Carpenter Subject: Re: ECM Question >My questions is, is there any telephone analyser(s) >out there which has the capacity to analyse any changes made to the >system original defaults or which could do full analytical examination >of digital phones. J.P. The changes made to the CPU in that type of system is a programming one. 0's & 1's. The easiest way to see if anything has been changed is to compare the settings. You can back up a copy of the switch's programming to disk in case you ever get a system fault. Then you just upload the programming from your laptop and the system is back up. If you have a copy of the "correct" programming, and then you want to see if there's been any changes, just download the "current" programming and compare the two. I use a small program called cab.com Cab is a pgm that will compare two files in hex and will stop at the first point that there is a difference. I usually use it to compare IC chips, but it also works well to find where a password or something like that is. Anyway, if you need a copy let me know and I'll e-mail it to you. -- Trace Carpenter Investigations ****** 2926 Maple Ave., Ste. 200 Friends help you move; Dallas, Texas 75201 Real friends help you move bodies. 214.828.4520 ****** ************************************************************************** 7)From: Trace Carpenter Subject: Re: Car Bugs 3rd Request Obviously no one is responding so I'll jump in. The reason your probably not getting much of a response is that this subject has been hammered on the list to death in past issues which have some really good info in them, so you might want to do some research. Anyway, down to your questions. >Does anyone out there know anything about car bugging devices? On this list, you could probably have ANY question you ever wanted answered about them. >For >example, how do they work, how far can they track, does the engine have >to be on to track a vehicle, etc? Are you asking about a listening device or a tracking device? The engine only has to be on if the person who attached it wired it to a wire that's only hot when the engine is on. I always hook mine into a continuous current so it doesn't matter. As for range, it depends on the type system and terrain. Some of the old homeing devices were only good for a few miles. The system I use utilized triangulation off towers and is good over this part of the state. Others use GPS and are good anywhere. -- Trace Carpenter Investigations ****** 2926 Maple Ave., Ste. 200 Friends help you move; Dallas, Texas 75201 Real friends help you move bodies. 214.828.4520 ****** ************************************************************************** 8)From: "dataFLEX Associates" Subject: Re: Need Info >Need info: There is a realtor lockbox that has the label "AE II" on the >front >of it.It apears as if a seperate peice attaches to the front where there >are 2 >"prongs" on the top. >I have never seen the second part, just the lockbox itself. >What is this? How does this work? Where can I get one to play with? >Augie, I saw one of these devices in Home Depot this weekend. They are relatively inexpensive keysafe/lockboxes meant for home use I assume. They take a 4 digit pushbutton code set my tightening screws on the back panel of the lockface. When you enter the code, the entire lockface/assembly with the buttons on it comes off, revealing the inside where keys are kept. The company of the one _I_ saw has a web page on them at: http://www.keysafe.com/keysafe.htm Hope this helps, -Brian ************************************************************************** 9)From: Nathan Cummings Subject: Re: Need help, recieving threats >All, >I have been recieving e-mails from someone who keeps saying that >they are the God of Computers and that they have hacked me. If >anyone can help me figure out who this little punk is, let me know. > -->C Send me the mail messages with _full_ headers and we will see what we can do. Nathan Cummings Key fingerprint = 77 1D 84 8C 52 DE 86 B0 B3 A4 C3 8A 40 33 10 3B For PGP Key send mail with "send pgp key" in subject header ************************************************************************** 10)From: Trace Carpenter Subject: Re: Need Info, Realtor Lock Box Augie, I'm not famalier with the number, but is this the one that doesn't have the lock dial on the front? If it's the one I'm thinking of it uses the entry card which is laid on the front of it. It then sends a signal to the main computer letting the system know which lower life form, I mean Realtor is in the house at that time. They don't even trust each other. They want to know whose showing their houses. ************************************************************************** 11)From: Trace Carpenter Subject: War on Drugs O.K, I hate to fuel a not tech discussion, but I agree with SpyKing. In fact when I was with the P.D. we had this discussion one day. How about this. An officer pulls you over and see's a joint in your ash tray. He escorts you out of the car, into the bar ditch you kneel down and he executes you. Then on the next BUSINESS day animal control picks you up. What do you think Frank? The FAA has a zero tollerance policy and so should the police. As a pilot, if I EVER caught ANYONE trying to get in any plane I was flying with one seed, well never mind. ************************************************************************** 12)From: Spyking@thecodex.com Subject: Re: War on drugs and a few other things... There have been a number of thought provoking responses in this thread... I apologize to the list as it is probably not list related but sometimes a little controversy gets the lurkers out of the closet ;-) Trace Carpenter asked in the previous post, "What do I think?"... OK. Lookout. Here's what I think... On Drugs: Declaration made by Congress to drug producing countries of the world. You have 90 days to stop flow of death from your shores to our country. If you do not, a state of war will exist between our countries. We will use full force of our military to eradicate your drug producing fields and facilities. After which your leaders will be tried here for "crimes against humanity"... Tobacco producers in this country will be simultaneously eradicated unless they comply (that means us)... Prison System: Off shore "Devils Island" type colonies. Different communities for various levels of crime and sentences... You work or you starve. Prisoners would be given tools and livestock to become self sufficient. See how many become "Farmer Green" quickly... Public executions for prisoners sentenced to die... No LETHAL injection... How about something like a "hand grenade" injection? Cruel and unusual? What did they do to deserve a death sentence? Wasn't that cruel and unusual? The present prison system and rehabilitation doesn't work... It's time we gave some new incentives to be "law abiding"... National Policy: All things to be decided by REFERENDUM... After all, We are the people and the politicians answer to us right? Well they keep passing laws that infringe on our rights or some don't agree with... We should have veto power (aside from voting THEM out of office) that allows the people to "vote out" on election day a law that they don't agree with... for instance: Let's say a law is passed by Congress that makes wearing hats illegal. Next election day BY LAW that bill would be on the ballot. If 51% of the people want to wear hats that law is stricken... Also requires laws stand by themselves. No more tacking on hidden bills and sneaking them through... OR as an alternative a referendum BEFORE laws are enacted to make sure our elected officals ONLY introduce laws that are APPROVED by 51% of the people... Foreign Aid: Although I realize the need for foreign aid and I empathize in SOME cases with those nations receiving it, I would like to see it ended for about 4-8 years... Let's re-tool our factories, rebuild our own infrastructure, educate our young, create jobs for the jobless, create decent housing for those who need it... I cannot imagine why one dime of our money is going "overseas" while Americans go to bed at night without a job, hungry, illiterate or without hope... It is the duty of our elected politicians to implement the will of the people... Let's have a referendum and see if our tax dollars used as foreign aid money should be spent here first... I realize the liberals and bleeding hearts will scream about this one but is OUR duty to take care of our OWN first... ONLY then should we worry about the rest of the world... ONLY in America can a homeless veteran sleep in a cardboard box in the street while a draft dodger sleeps in the White House with his "red" Chinese friends... The Manchurian Candidate? Corrupt Public Officials: Face treason charges and penalties... Health Care: Free Military or National Service: Mandatory for male & female... Taxes: Straight percentage from everyone... Illegal Aliens: Let them EARN citizenship... the list could go on forever... just MY opinions... I'm sure I'm gonna get flamed but "You asked"... that's what I think... It was not my intention to start another thread but I guess we all need to vent once and a while... ************************************************************************** 13)From: "Dwight C Rardon JR" Subject: Re: Drugs In response to the email on DRUGS and the "If I Were President"......Let it be.,like sandpaper and wood,go with the grain.There are and enuff systems in place to oversee about anything your human mind can or would produce as a thought.. ;) T1 ************************************************************************** 14)From: Mutter Subject: Re: GSM Phone Security > > Sprint is running ads in the NY papers that their PCS service is > > eavesdrop proof. "And it's secure, too. So you don't have to worry about > > cloning or eavesdropping." > > > > Sounds to me like they are assuring their customers of a privacy that > > doesn't exist, and maybe setting themselves up for a lawsuit from the > > next mogul who finds out somebody taped his insider trading or > > congressional fix. > > > > Comments? > > When you find a remotely affordable receiver or other equipment capable of > monitoring spread spectrum and/or encrypted digital transmissions in 1.9 > GHz, you be sure to let us all know. > > CrACKeD Well, if you want to get technical, any notion of privacy is ultimately a false sense of security. But CrACKeD is certainly right that the chance of your call being intercepted is remarkably slim. Actually, at the moment I'd trust a PCS/GSM phone more than a landline (which is kind of ironic when you think about it) - granted, of course that it's true GSM and not an imitation GSM (like AT&T's PCS service). Of course, it's always good to remember that while PCS is relatively safe in the air, it has to interface with the phone network somewhere (where authorized people, i.e. law enforcement participating in investigations, can listen in with relative ease). - M u t t e r Ed. root zine (http://www.openix.com/~mutter) mutter@openix.com ************************************************************************** 15)From: "M. GERON" Subject: Vehicle Surveillance Devices A professional (and probably expensive) vehicle surveillance device is available from: Ituran Ltd. - in Israel Fax their export sales department +972 3 5571393 Tel. is +972 3 5571333 Its manufactured by Tadiran Electronics in Israel M. GERON ************************************************************************** 16)From: "Steven R. Price" Subject: Computer monitoring of individuals -----BEGIN PGP SIGNED MESSAGE----- I've noted several posts asking about monitoring computers with various devices. I was walking through ICU today and was watching the monitors for individual patients in ICU as well as telemetry of patients on the med/surg wings...so I was thinking, if we can monitor patients in this fashion, couldn't the same be placed on terminals, which afterall, give both binary and imagery output? Any thoughts? Regards; SRP -----BEGIN PGP SIGNATURE----- Version: 4.5 iQCVAgUBM5w8ceOn6X0ia817AQEmsgP9Et5U4fqbWwdHJkpsHkLda752hjg+AHIV de8nJrN6Um656+BxAPSPMqFYvlxzApQ6NHelDDoIq9Yk0JfC7XxwgXjIBldiGzgB V6E04+KA7GlTcpNAV3UUzKeqJx5rwQY/bgneeeh9oDZS75wsOZRBN/+yOhgWc0hI g8E0KKk3vdo= =aeUz -----END PGP SIGNATURE----- ************************************************************************** 17)From: "EPIC-News List" Subject: EPIC Releases Web Privacy Report June 9, 1997 Washington, DC The Electronic Privacy Information Center (EPIC) today released a major report on consumer privacy and the Internet. "Surfer Beware: Personal Privacy and the Internet" is based on a review of the privacy practices of top Internet web sites. The report examines the current state of privacy policies on the Internet and includes recommendations to protect online privacy. The release of the report precedes a week of hearings, to be held by the Federal Trade Commission, on consumer privacy and the Internet. EPIC will be participating in those proceedings. EPIC reviewed 100 of the most frequently visited web sites and checked whether sites collected personal information; had established privacy policies; made use of cookies; and allowed people to visit without disclosing their actual identity. The survey found that few web sites today have explicit privacy policies (only 17 of the sample) and none of the top 100 web sites meet basic standards for privacy protection. However, anonymity continues to play an important role in online privacy, with many sites allowing users to access web services without disclosing personal data. EPIC recommends in its report that sites continue to support anonymity while developing policies and practices to protect information privacy. The report is available at: http://www.epic.org/reports/surfer-beware.html The Electronic Privacy Information Center is a non-profit, public interest research organization based in Washington, DC. ************************************************************************** 18)From: "WILLIAM W.MOODY JR," Subject: THANKS WELL I DIDNT GET TO SEE YOUR REPLY TO MY NOTE ON MY TROUBLES WITH MY LOCAL LAW ENFORCEMENT BUT I DID GET TO SEE PARTS OF YOUR COMMENTS IN ANOTHER PERSONS REPLY. I WOULD LIKE TO SAY THAT FOR TWO YEARS I ENJOYED MY HOBBY OF SCANNING WITHOUT ANY PROBLEMS AT ALL. FOR THOSE TWO YEARS I MONITERED THE AIR WITH TWO AOR8000S AND TWO OTHER RADIO SHACK SCANNERS ALONG WITH A OPTOELECTRONICS CUB THAT WAS DEDICATED TO ITS OWN ANTENNA AND A OPTOELECTRONICS SCOUT THAT WAS HOOKED DIRECTLY TO ONE AOR8000. DURING THAT TIME I COULD NOT GET EITHER ONE OF MY FREQ COUNTERS TO LOCK ONTO A RADIO THAT WAS TRANSMITTING UNLESS IT WAS WITHIN A COUPLE BLOCKS OF MY HOME . THE REASON WHY ?? I LIVE 1000YARDS FROM A FM RADIO TQWER TRANSMITTING ON 103.7 WFM AND THIS IS THE ONLY FREQUENCY THAT THEY WOULD PICK UP. HOW ABOUT NOW??? AFTER LOSING ONE TO R.F. DAMAGE I NO LONGER PUT THE OTHER ON AN EXTERNAL ANTENNA. BUT I CAN SIT IN MY RADIO ROOM AND MY CUB FREQ COUNTER NEVER SEES 103.7 , IT JUMPS ALL OVER ,HEY! AS IF SOMEONE NEXT DOOR HAS A WIDE BAND RF GENERATOR TURNED ON AND ITS TUNING UP AND DOWN ITS BANDWIDTH, OR MAYBE A WHITE NOISE GENERATOR?? PARANOID??? WELL I GUESS SO WHEN YOU START NOTICING YOUR DOORS HAVE BEEN JIMMIED AND PIECES OF YOUR SPECIFIC EQUIPMENT ARE MISSING? NO BIGGY ,YOU JUST CHANGE THE LOCKS -- RIGHT ? WRONG! HEY I KNOW YOU JUST SET UP A FEW INEXPENSIVE TAPERECORDERS AND SET YOUR MIND AT EASE -- RIGHT? WRONG! NOW I HAVE TAPES FULL OF SOMEONE COMING IN AND DOING SOME MODIFICATIONS TO MY RADIO ROOM . YOU KNOW, TURNING A PASSIVE RECIEVE ONLY RADIO ROOM INTO A RECIEVE/TRANSMIT ROOM . WELL , LITTLE O PARANOID ME!!! AND WHO WAS THAT PERSON TALKING TO ON HIS RADIO TO WHILE HE WAS IN MY ROOM??? HIS MOTHER ? IS HER NAME CONTROL? WELL IT DID NOT TAKE LONG TO FIND THE TRANSMITTER THE FIRST TIME . JUST TUNE THROUGH WITH MY SCANNER AND AN AMPLIFIED SPEAKER AND THE OLD FEEDBACK GAVE IT AWAY RIGHT OFF THE BAT. OH, AND FIGURING OUT MY PHONE WAS GIVEN A LITTLE MASSAGE THE SAME DAY WASNT TO HARD EITHER. NO PROBLEM. I JUST MOUNT ME A LITTLE BITTY VIDEO BOARD COURTESY OF A GOOD FRIEND AND WAIT TO SEE WHAT HAPPENS. NOW I MAY BE STUPID AND PARANOID BUT THAT TAPE THATS LOCKED IN A SAFE RIGHT NOW AS I TYPE SURE HAS A CERTAIN FELLOW ON IT THAT AS FAR AS I CAN RESEARCH THROUGH FRIENDS , EX-LAW ENFORCEMENT AND COUNTY PAYROLL STATEMENTS WORKS FOR AND SPECIALIZES IN A CERTAIN LAW ENFORCEMENT AGENCYS , HOW DO YOU SAY "COVERT OPERATIONS" DEPARTMENT? OH YEAH! ITS COMMUNICATIONS... WELL YOU SAY THATS THAT RIGHT? NO, I WENT STRAIGHT TO THE LOCAL OFFICE OF LAW AND FILED A BREAKING AND ENTERING/BURGLARY COMPLAINT AND TOLD THEM I NEEDED AN INVESTIGATOR TO COME TO MY HOME THAT I NOT ONLY HAD THE WHOLE THING ON AUDIO BUT ALSO VIDEO AND THAT I WAS SURE IT WOULD ONLY BE A FEW MINUTES BEFORE THEY WOULD BE ABLE TO I.D.THE SUBJECT,AND TO ALSO BRING OUT THE FINGERPRINT KIT BECAUSE IT WAS PLAIN ON THE VIDEO THAT THE SUBJECT DID NOT WERE ANY GLOVES. YOU SAY THATS THAT? WRONG! I HAVE NOT SEEN ANY ONE TO THIS DATE COME TO MY DOOR TO INVESTIGATE OR MUCH LESS CALL AND LEAVE A MESSAGE. YOU SAY WELL YOU NEED TO SUE, RIGHT?? WELL I WENT TO ONE OF THE FEW LAW OFFICES THAT I COULD TRUST TO HAVE MINIMUM TIES TO LAW/SUBJECT.TOLD HIM OF MY MANY TROUBLES TRYING TO ENJOY MY HOBBY. THIS LAWYER DOES A LITTLE DIGGING AROUND AND SENDS A COPY OF ANOTHER VIDEO TAPE OF WHAT THE RF SPECTRUM AROUND MY HOUSE LOOKS LIKE VIA A SPECTRUM ANALYZER TO A RECENTLY RETIRED FIELD INVESTIGATOR FOR THE F.C.C. . THIS PERSON HAS NO PROBLEM IDENTIFYING MY PROBLEM AS WHAT THEY REFER TO AS A "FIRE MEETING " IN THIER FIELD. THIS IS WERE , ACCORDING TO MY LAWYER , A SUBJECT FOR WHATEVER REASON IS LISTENING TO SO CALLED SENSITIVE TRANSMISSIONS AND THE LAW ENFORCEMENT PEOPLE TRY TO EXTENQUISH THE FIRE/ RECIEVER. NOW ACCORDING TO MY LAWYER , YES , I HAVE A HELL OF A LAWSUIT BUT HE IS ONLY A CIVIL LAWYER AND HE SAYS THAT WHAT HAS BEEN DONE TO ME IN THE PAST AND IS BEING DONE TO ME NOW IS CRIMINAL AND I NEED A LAWYER FROM OUT OF THE COUNTY. SO I AM LOOKING. BUT IN THE MEANTIME SINCE IM DISABLED AND LIE ON MY BACK BECAUSE OF MANY BACK SURGERYS I STILL LIKE LISTENING TO MY RADIOS. WELL I SURE AS HELL CAN NOTICE WHEN SOMEONE AT THE "ALARM COMPANY " IS DISPATCHED OUT TO THE DWELLING BEHIND ME NO MATTER WHAT TIME OF THE DAY OR NIGHT I TURN MY SCANNERS ON. AND YEAH , I HAVE FRIENDS AND FAMILY THAT MONITOR SCANNERS ALSO AND THEY TOO HERE THEM REPORT OVER AND OVER ABOUT ME AND THE " ALARM COMPANY" GOING TO THE HOUSE AND SETTING THE " PUMP " ON OR TO RESET THE ALARM AND HEY, WHAT IS THAT LOG PERIODIC ANTENNA LOOKING THING THE ALARM COMPANY MOUNTED ON THAT POLE THAT POINTS STRAIGHT AT MY ANTENNAS???? AND WHY DOES MY FLUKE VOLTMETER JUMP FROM JUST A FEW VOLTS AC BETWEEN MY ANTENNA COAX AND GROUND TO 80-140VAC WHEN THE "ALARM COMPANY " TURNS THIER "PUMP" ON??? HEY WHY DID MY TV/COMPUTER REPAIRMAN FOR THE INSURANCE COMPANY ASK ME WHAT ELSE WAS HIT BY LIGHTING WHEN HE LOOKED AT THE RF DAMAGE INSIDE MY TV AND MONITOR THAT WHENT BLANK WHEN THE "ALARM COMPANY " HAD TO ADJUST THIER EQUIPMENT . WHY IS IT THAT YOU CANT TOUCH THE METAL ON MY COAX CONNECTOR WITHOUT GETTING SHOCKED OR SHOULD I SAY BURNT BY RF RADIATION?? OH AND THE FCC FIELD OFFICER IN ATLANTA GEORGIA, HE TOLD ME THAT THIER IS NO WAY THAT MY MAGNAVOX PORTABLE RADIO/CD PLAYER COULD BE TRANSMITTING ROOM AUDIO ON THE FREQUENCY I GAVE HIM. THIS IS FOR ACARS GOVERNMENT USE ONLY AND MUST BE APPROVED BY WASHINGTON DC FOR USE AT THAT. AND AS FAR AS THE RF COMPLAINT YOU HAVE ,WELL YOU HAVE TO UNDERSTAND THAT OUR AGENCY WAS CUT BY 50% ON FIELD OPERATIVES AND RIGHT NOW WE HAVE A BACKLOG OF 3 YEARS TO WORK WITH. THIER IS NO WAY WE CAN COME TO INVESTIGATE YOUR PROBLEM. SO I DECIDED TO FIGHT FIRE WITH FIRE. YES I DID GO PURCHASE A CB BASE AND A "KICKER". GUESS WHAT ?? IT SURE BACKS THEM OFF SETTING MY EQUIPMENT ON FIRE. OH WELL. I GUESS IM JUST PARANOID.OH YEAH DID I SAY THAT I HAVE WORKED ONLY IN ELECTRONICS COMMUNICATIONS FOR THE PAST 17 YEARS?? HEY I COULD BUY SOMETHING I GUESS FROM THE EDGE, BUT I AM ON A FIXED INCOME AND MY WIFE HAS SEEN THE LIMIT ON BUYING SO CALLED "STUFF" SO I FIGURED SOME ONE ON THIS FORUM WOULD HAVE SOME CIRCUT IDEAS THAT WERE SIMPLE TO BUILD WITHOUT COSTING TOO MUCH AND POSSIBALY A FEW ANSWERS TO THE OTHER QUESTIONS I POSED. ITS OBVIOUS YOU ARENT TO FAMILIAR WITH WHAT THE MILITARY TRAINS PEOPLE IN EVERY DAY AT KEESLER A.F.B.IN BILOXI MS. YOU KNOW, ECM. I WILL KEEP UP WITH YOUR WORDS OF WISDOM ON THE FORUM "CRACKED" SINCE YOU HAVE SEEN IT ALL AND KNOW EVERYTHING ABOUT SURVIELLANCE/COUNTERSURVIELLANCE. FIREKING@ALAWEB.COM ************************************************************************** Who are you? What's your specialty and/or interest? Let us know about your company... What would you like to see on the list? Post it. Let us know... Do you have something to contribute? We'd like to hear it... We want to know EVERYTHING and ANYTHING about eavesdropping, surveillance, countersurveillance & privacy related technology, etc... Remember: who, what, where, when, how & why... we want ALL the details... Do you have a question? Post it... A little free time? Help a member... With the INCREDIBLE brain power on this list, someone should have the answer ;-) P.S. Don't be a LURKER... Members take the time to post info for us all... give something back... Don't just take... Your input/knowledge is valued... ************************************************************************** Send Postings to: spyking@con2.com with "Post" in subject field with subject ************************************************************************** Subscribe to: spyking@con2.com In the subject field type: subscribe-surveillance list e-mail address ************************************************************************** Unsubscribe to: spyking@con2.com In the subject field type: unsubscribe-surveillance list e-mail address ************************************************************************** ...The Simple Rules of the Surveillance List... The Surveillance List Owners may Reject any posts that are/contain: 1) Info Unrelated to Eavesdropping, Surveillance or Privacy technology... 2) Flames or Negative posts... 3) E-Signatures that are considered excessive... 4) Advertisements not DIRECTLY related to the list topics... 5) Attached Files... 6) Oversized Posts... (May be edited to save room) **************************************************************************** This publication is copyrighted and is protected by U.S. and International copyright law. The information transmitted on this list may not be reproduced, reposted or forwarded to any non-list member without expressed written permission of the List Owner. Violation of U.S. copyright law is a criminal and civil offense... **************************************************************************** The Surveillance List is Moderated by SpyKing@thecodex.com The List Owner will make EVERY effort to protect subscribers from spam... Copyright 1996, 1997 Codex Publishing Inc., All Rights Reserved... **************************************************************************** ****************************************************************************** Vol.Two Issue #133 The Surveillance List June 10,1997 Over 2100+ Members Worldwide Representing 46 different countries List Chat at: http://www.thecodex.com/chat.html ***SPECIAL ISSUE*** ****************************************************************************** IN THIS ISSUE... ****************************************************************************** 01) Important Issue Concerning ALL in the Surveillance Business... ****************************************************************************** DON'T BE A LURKER.... GET INVOLVED... YOU ARE A MEMBER... MAKE THE MOST OF IT ****************************************************************************** 1)From: SpyKing@thecodex.com Subject: Important Issue Concerning ALL in the Surveillance Business... I received this post from Gilbert Walz and thought it of immense importance to the list. He's asked me to post and I am complying... Read this carefully as it could affect all... If you agree that something needs to be done I urge you to contact you congressman and let them know about this situation... >>>> From: GilbertWa@aol.com Date: Sun, 18 May 1997 01:56:48 -0400 (EDT) To: SpyKing@thecodex.com Subject: US CUSTOMS BUST Greetings, My partner Jude Daggett was recently arrested by US Customs in a sting set up by Bill Fischer of E.C.I. Calgary Canada,for allegedly selling a chip that enabled a panasonic cell phone to receive 800-900 mhz.Mr. Fischer was apparently set up as well by Cellular Tecnology , a company that sell's the CT-1000 a Hand Held cell test piece. There is much more to the story,including an upcoming trial in San Jose Ca, for violations of section 2512, I am the defendant in this case. If you are interested in more detail please page me@ 415-979-7353. Regards, Gilbert Walz <<<< From: GilbertWa@aol.com Subject: Section 2512 FYI MAJOR THREAT TO STATE AND LOCAL LAW ENFORCEMENT CAPABILITIES State and local law enforcement bodies have begun to find it difficult to procure the latest in Title III equipment, i.e. equipment "...primarily useful for the surreptitious interception of ... communication". Unless action is taken at the highest levels of the federal government, there is no question that serious harm will be done to the abilities of state and local law enforcement to properly perform technical surveillance. This is an extremely serious matter, and I urge you to take the time to study this information. Law enforcement's ability to properly perform its duties faces a serious and a real threat, and correcting the situation will not be easy, but it is something that MUST be done. We're in this sorry state for two real reasons and one possible reason, viz: Real Reason #1. The federal law that deals with monitoring that which has been transmitted by radio is irrational, poorly written, unthinkably stupid, incomplete, technically impossible to enforce, vague where it should be specific, specific where it covers unenforceable prohibitions, and primarily of value to vendors of cordless and cellular telephones (because they can lie to their potential customers telling them: "nobody can listen to you; it's against the law). Real Reason #2. Some federal government entities have chosen to reinterpret elements of a law enacted almost thirty years ago (and amended many times since then). Possible Reason. There is great suspicion that some privileged companies are steering some of the federal government's minions toward small companies in order to remove possible competition from the marketplace -- in other words it is possible that the law is being selectively enforced for the benefit of some firms. Professionals who know their way around in this arena are aware of some targeting that had been orchestrated by entities that, although they deal in a big way with Title III equipment, have remained unaffected by the federal government elements that have suddenly developed real zeal to punish those who they say sell Title III equipment. Background. During the past TWENTY-NINE YEARS (since passage of Public Law 90-351, "The Safe Streets Act of 1968"), law enforcement at all levels in this country has benefited because of a reasonable interpretation of the elements of that law. That has now all changed. To allow you to understand the situation we must first cover the specifics of the law, and the way it has been interpreted over the years. First, the prohibitions. The law proscribes the use, possession and even advertising of equipment "knowing or having reason to know that the design of such device renders it primarily useful for the surreptitious interception of ... communication". Obviously there are categories of people who are exempted from these prohibitions - such as the very law enforcement people who would use it in investigations. However, one of those exemptions is now being reinterpreted. I refer specifically to the interpretation of the exception relating to "...an officer, agent, or employee of, or a person under contract with, the United States, a State, or a political subdivision thereof..." For almost thirty years that phrase has been interpreted that honest businessmen (manufacturers or dealers) who sold Title III equipment only to law enforcement agencies were "agents under contract to...". Small business entrepreneurs and their dealers have, since passage of the PL 90-351, operated under the belief that, if their customers were federal, state or local law enforcement organizations, they were operating legally when they designed, built and sold such equipment (or marketed it as agents of the builder). Never having had any notice by any government body that a specific item could be considered "Title III", sellers felt no compunction to refrain from advertising and no concern about selling to non-law enforcement (except for obvious Title III items such as body wires). This dogma has been reinforced and solidified by almost thirty years of practice. Before covering the 1996/7 reinterpretation of this law, let's review some recent events. Enforcement History. In 1991 or 1992 several businesses received a certified letter from the FCC that began "It has come to our attention that you are marketing..." and went on to accuse all of us of various felonies. My written request to be told the specific product and the specific accuser is to this day still unanswered. However, one man, whose letter was ignored and whose FOIA inquiry was ignored, finally inquired through his congressman. He was then informed that his FOIA action was sent to the wrong address (!), and that the FCC accusations were based on "anonymous telephone tips". Yeah, Right. (Those of us who are knowledgeable of the players have a good idea of how those "anonymous" tips were received; we remember seeing the guy who was siccing his FCC toady on various exhibitors at more than one trade show. Ah well.) Then about two years ago a bunch of stores with "spy" in their names were raided by the Customs Department for importing and selling forbidden radio transmitting equipment. (Personal comment: Good riddance; they were mostly rip-off artists preying on people who wanted to spy on others.) However, the serious reinterpretation that is tying up resources started last year. In 1996 and 1997 there has been a lot of activity based on 1) lawyers pretending to be all-knowing technical experts and 2) a reinterpretation of the exception clause quoted above. Current Status. To the best of my knowledge, the first activity in this "reinterpreting" arena was the indictment of Gilbert Walz and Jude Daggett by US Attorney Michael J. Yamaguchi in the US District Court of Northern California. The indictment accuses them of selling devices "whose [sic] design renders them primarily useful for the purpose of the surreptitious interception of wire, oral and electronic communications". (The paper I have in front of me is called "SUPERSEDING INDICTMENT" and is dated May 2, 1996.) There is no reference in this indictment - or in any of the other government papers I have - to the expert on whose opinion these indictments are based. Therefore, I have the terrible suspicion that Michael J. Yamaguchi took it upon himself to make the kind of determination that can only be made by a technical expert with education and experience in the field. Both Walz and Daggett have been "out on bail" until the very recent past. Then, within the past few months, it appears that various players in this arena have been pressured to "set up" those gentlemen. Walz took a telephone order for a piece of equipment, ordered it shipped from Canada, and was arrested when it arrived in the hands of the man who ordered it. He never saw it, never touched it, never got paid one cent, but was arrested and jailed for about one month before bail was set at one hundred thousand dollars. (By the way the man who ordered the equipment and who received it, is still free as a bird.) Daggett also was arrested (after also apparently being set up) and jailed, but released after a week or two on personal recognizance. I think it is important to note that these men have been selling these items for years, and had asked one government official after another if there was any question as to their legality. The only answers they received were non-committal. Deleterious Results from These Actions. These (and possibly other) actions by various entities at the federal level have caused the "unarrested" members of this community to pull in their horns. They will no longer even admit to possessing equipment that might be capriciously classified as Title III. The net result, unless some sensible order is created from this miasmic mess, will be a set back for state and local LE bodies of five to ten years in procurement of Title III equipment. I say that because some of the federal people involved have stated that "only people under contract to the federal government" are covered by the exception noted above. Even if that is softened to the state and local governments as specified in the law, any law enforcement agency that needs Title III equipment will have to totally technically specify its needs in a request for proposal, distribute the RFP to a list (Where does it come from?) of competent firms, take proposals, evaluate proposals, award contracts, evaluate products delivered; and finally, years after the need was recognized, receive the product. MY PERSONAL INVOLVEMENT Last month, while Jude Daggett was locked up in jail, his partner Gilbert Walz called and asked for my help in getting him out. Jude called also, and I agreed to do what I could. The letter I sent to Jude's lawyer follows. Dear *******, I am writing this on behalf of Jude Daggett, an honest man and a good friend of more than ten years. However, the opinions I express are not generated by that friendship; they are based on my education and experience and are totally consistent with my stated positions, writings and testimony over the years. Let me introduce myself and briefly list my qualifications to comment on this case and the law under which it was brought. I am an electrical engineer with almost fifty years of professional experience in communications and electronics. (A short resume follows.) I have been called as an expert witness in federal and state courts in civil and criminal cases relating to electronic communication, eavesdropping, etc. The Office of Technology Assessment of the United States Congress contracted with me to study and report on the vulnerability of our telephone system to secret monitoring. I believe I am the only engineer ever to provide an expert opinion in federal court on the meaning of "...knowing or having reason to know the design of which renders it primarily useful for the surreptitious interception of ... communications" as it relates to a specific item of electronic equipment. The law that applies originated as the Safe Streets Act of 1968, PL 90-351. The specifics relating to "primarily useful for" were printed under the heading "Title III" in that law, and that equipment has come to be known as Title III equipment by those in this field. 90-351 and its later versions were attempts to codify questions relating to monitoring the communications of others, but all are flawed in many, many ways - primarily due to the influence of lobbyists for the cellular telephone industry and cordless telephone manufacturers. They wanted to be able to tell their customers "No one can listen; it's against the law." In truth, despite any laws that can be written, that which has been transmitted by radio, can and will, be listened to. That is as immutable as water running down hill. Common, ordinary and essential electronic parts and systems, useful for many other purposes, can be used to monitor radio transmissions; and no series of laws or regulations can change that verity. There will always be people who will listen, regardless of any laws on the books or lies told to potential customers. People who choose to broadcast their thoughts by radio should not be lied to; they should be cautioned that every word can be heard by others. In fact, the United States Supreme Court, in an eminently fair and reasonable ruling, said that the man who had been imprisoned based on material his neighbors heard him say over his cordless phone had "no reasonable expectation of privacy". The court ruled that no one invaded his privacy, but, rather, that the signal received by his neighbors' cordless phone had been transmitted by his deliberate act, and the content of his messages was in no way privileged. Radio transmissions are radio transmissions, and although cellular transmissions are on different frequencies and handled differently than cordless, they are still transmissions that can be received by anyone. I'll opine that, when the law regarding cellular is tested at the supreme court level, the ruling on the validity of the law will be the same as it was in the cordless phone case. So, I present the idea above as something that could be called a "global defense" of Mr. Daggett and anyone else caught in the net that has recently been cast. However, let's consider the specifics of Mr. Daggett's case. With regard to the specific case at hand I believe the most important consideration is the legislative history of the federal law in question. Although I do not have a copy in front of me as I write this, the essence of the legislative history that applies is: "...Because this is such a specialized field, it's obvious that the services of an expert will be required in considering whether the design of a device renders it primarily useful for surreptitious interception of communication." I have read the documentation on this case, and I am appalled at the fact that technical laymen with no education or experience in this specialized field have bluntly stated as a fact that the devices under consideration are primarily useful for surreptitious interception of communication. In my opinion such statements are a travesty. As a man with an education and a lifetime of experience in the field, if I were asked that question, my answer would be that I would have to: have possession of each device for some time so I could operate it and compare it with other, technical equipment with similar capabilities, evaluate the cost vs. benefit of each possible equipment for the many possible uses, (to explain, let's consider the monitoring equipment that could be used on fax transmissions: There is a two-channel fax monitoring system from Denmark that costs $60,000 and has the capability of recognizing the formats used by all fax manufacturers. Also, it is possible to use a $30 tape recorder and $150 fax machine to reproduce faxes transmitted by a machine of the same make. With no other information to influence my opinion, I would conclude that the person trying to collect information illegally on someone else would opt for the inexpensive approach; and that the company that needs to monitor communication between the headquarters and divisions located in countries all over the world would use the expensive system so as to be sure it can decipher all messages from all machines.) discuss uses with others who have had experience with the equipment for various functions; and finally, spend time to allow my brain to reach a logical conclusion. From my point of view it is unconscionable to have a man jailed based on the unsupported technical conclusions of laymen - laymen with no education or experience in even basic design of electronic communication equipment much less the kind of specialized electronic communication equipment referred to in this case. Based on what I have learned about this case, I believe this was a setup, designed to result in the arrest of Mr. Daggett. There was absolutely no intent or effort on his part to violate any law; in fact, material I have in hand indicates that he and his partner had frequently asked law enforcement people and even a US Attorney to tell them if any of their equipment fell into the Title III category (primarily useful for...), and were always answered ambiguously. Mr. Daggett was the target, and men who were being pressured to do so by law enforcement authorities arranged to meet him in a place that had been prewired so as to videotape the whole activity while they pressured him into assembling the equipment and turning it on - while not a word was spoken about any illegal use of the equipment. Perfectly legal equipment can be used illegally. An ordinary hammer can be used to kill someone, but that doesn't mean it is primarily useful for killing a person. The bayonet I was issued in WWII, on the other hand, is designed for just that purpose and no other. In this case, serious consideration should be given to the "primarily useful for" clause. Is someone interested in illegally eavesdropping on cellular conversations going to buy a $100 scanner or an instrument designed to fight cellular toll fraud that costs thousands of dollars? I have no idea whether the following thoughts are material, but I present them because, as a legal layman, I regularly wonder about the uneven application of some criminal laws. For instance, while Jude Daggett is in jail for possibly having sold a Title III piece of equipment: the Martins (who said they had monitored and recorded Newt's conference call that Rep Boehner was on with his cellular) were fined $500 each for the deliberate illegal recording and distribution of a cellular phone conversation. Where's the justice? Westinghouse (and a raft of other companies) advertise Title III equipment regularly and continuously. In that such advertising is also proscribed by 18 USC 2512, I wonder how they get away with it. Does our federal law enforcement shy away from the bigger companies because they have bigger budgets to defend themselves with? Where's the justice? Finally, let me go back to my original comments about this law. It is so ambiguous as to be farcical. Examples: It uses the word "intercept" incorrectly so it has to contain a special definition of it. It refers to "audio subcarrier" a complete nonsensical combination of words - audio is sound, a longitudinal wave and subcarrier must be RF, a transverse wave. It could even be interpreted in some circumstances to mean it is a federal crime to "intentionally" listen to Muzak while on an elevator or on hold on the telephone. POST SCRIPT Additional Considerations. Since writing the letter above, I have continued thinking about that silly law. Sure, the legislators will tell you they passed it to protect our privacy. That's hogwash. If they were honest, they would have listened to Bob Grove when he was invited to testify. Instead they pilloried him, accusing him of all kinds of nasty things. Had they listened to him, or to anyone with education and experience in this field, they would have heard that the law is unenforceable. That which has been broadcast by radio will be monitored by parties other than the intended receiver. Unless encryption or some modern modulation techniques are used, every broadcast can be monitored - despite the lies of the sellers. Two more possible lines for the defendants to take: #1. I am an expert and allowed, therefor, to offer an opinion in court testimony. However, when I have offered an opinion, I have buttressed it with arguments and even demonstrations. I doubt the lawyers who have expressed opinions as facts have done, or even can do, the same. There is nothing in their writings other than unsupported conclusions. 2. I think a careful evaluation of the words in the law and the legislative history might lead to the conclusion that the " communication" referred to by the law writers is solely communication between humans. If that's so, the operation of the specific item should be carefully examined. For instance, the cellular monitoring systems print out tons of communication between the CMTs and the MTSOs (cellular mobile telephones and mobile telephone switching offices). Line after line on the printout specifies the status of all active CMTs in its area, and the details of what number called what number, etc. etc. If these things primarily monitor machine communications, can they be called "primarily useful for surreptitious interception of {human} communications? TWO POSSIBLE SOLUTIONS #1. The congress could pass a new law - one based on inputs from people who know what they're talking about and have the interests of our citizens in mind. (The elements of this law that cover monitoring [the law calls it "intercepting"] of radio broadcasts is not necessary. 47 USC 705 has served us well for many years, and makes sense.) #2. As long as the stupid law stays on the books, the federal government should establish a qualified, non-government body of experts to rule on what is and what is not a Title III device or system. This would allow manufacturers and dealers to know who they can sell to. James A. Ross +++Moderator's Note+++ I agree with Ross. The law IS unclear and can result in select prosecution of anyone who manufactures Title III equipment OR ANY TYPE of communication equipment that could POSSIBLY be used for interception... Several years ago I asked a personal friend who was the BOSS of a "three Letter agency" (Federal) in New York City for clarification of TITLE III because I had developed a new surveillance device and wanted to manufacture and sell... My friend told me (after checking with Justice Department Legal Counsel) that there was "no license" which would "hold harmless" a "surveillance device" manufacturer or distributor. That they operated at the discretion of the government and could be indicted at any time... He advised me (as a friend) against developing the new device since I could be indicted for simply offering it for sale to "bona fide" law enforcement agencies... The fact of the matter is "certain" companies that are on the "in" thrive while circulating "false" data about competition and "dropping dimes" to the feds to cause competitors "problems"... Ma Bell should also be indicted as well as MANY other companies for "manufacturing" devices which allow the "interception" of communications... See how stupid this gets?... This type of case affects us ALL... I hope the list will support Daggett and Walz and let there Congressman know about this farce... ************************************************************************** Who are you? What's your specialty and/or interest? Let us know about your company... What would you like to see on the list? Post it. Let us know... Do you have something to contribute? We'd like to hear it... We want to know EVERYTHING and ANYTHING about eavesdropping, surveillance, countersurveillance & privacy related technology, etc... Remember: who, what, where, when, how & why... we want ALL the details... Do you have a question? Post it... A little free time? Help a member... With the INCREDIBLE brain power on this list, someone should have the answer ;-) P.S. Don't be a LURKER... Members take the time to post info for us all... give something back... Don't just take... Your input/knowledge is valued... ************************************************************************** Send Postings to: spyking@con2.com with "Post" in subject field with subject ************************************************************************** Subscribe to: spyking@con2.com In the subject field type: subscribe-surveillance list e-mail address ************************************************************************** Unsubscribe to: spyking@con2.com In the subject field type: unsubscribe-surveillance list e-mail address ************************************************************************** ...The Simple Rules of the Surveillance List... The Surveillance List Owners may Reject any posts that are/contain: 1) Info Unrelated to Eavesdropping, Surveillance or Privacy technology... 2) Flames or Negative posts... 3) E-Signatures that are considered excessive... 4) Advertisements not DIRECTLY related to the list topics... 5) Attached Files... 6) Oversized Posts... (May be edited to save room) **************************************************************************** This publication is copyrighted and is protected by U.S. and International copyright law. The information transmitted on this list may not be reproduced, reposted or forwarded to any non-list member without expressed written permission of the List Owner. Violation of U.S. copyright law is a criminal and civil offense... **************************************************************************** The Surveillance List is Moderated by SpyKing@thecodex.com The List Owner will make EVERY effort to protect subscribers from spam... Copyright 1996, 1997 Codex Publishing Inc., All Rights Reserved... **************************************************************************** ****************************************************************************** Vol.Two Issue #134 The Surveillance List June 11,1997 Over 2100+ Members Worldwide Representing 46 different countries List Chat at: http://www.thecodex.com/chat.html ****************************************************************************** IN THIS ISSUE... ****************************************************************************** 01) Eavesdropping device? 02) Re: x-phone 03) Cracking Word Passwds 04) Re: Modular-splitter bugs 05) Re: PCS - Eavesdrop proff? 06) Re: VERY excellent idea 07) Re: SPECIAL ISSUE / Title III 08) E-Mail your Congressman in Support of Changing Title III laws 09) Simple e-mail encryption 10) Correspondance from Walz/Dagget Re: Title III problems 11) More Title III Stuff from Walz/Daggett 12) Daggett and Walz 13) Re: Drug war, facists and Title III with Moderator's rebuttal... 14) Lockpicking techniques 15) Those stupid stupid people (laws) 16) Re: lockpicking does make me nut's! 17) Re: Special issue 18) Who is behind the words? 19) Re: GSM Phone Security 20) 21) 22) 23) 24) ****************************************************************************** DON'T BE A LURKER.... GET INVOLVED... YOU ARE A MEMBER... MAKE THE MOST OF IT ****************************************************************************** 1)SpyKing@thecodex.com Subject: Eavesdropping device? What do you think? Check this out: wysiwyg://28/http://www.dresearch.com/trap.htm or how about this? http://www.pimall.com/digdirt/mo00007.htm >>>> The 800 Sting Card: $63 ~ Imagine having the same resources federal agents enjoy ~ knowing who the subject is calling, where they are calling from, and the date and time of the conversation. And knowing all this within 24 hours. <<<< Evidently these two guys don't know the law... ************************************************************************** 2)From: gary.smith@wmcmail.wmc.ac.uk Subject: Re: x-phone CAN ANY BRAINS OUT THERE SUPPLY ME WITH SOME INFO REGUARDING THE X-PHONE ? I KNOW THERE WAS SOME GOOD INFO A FEW MONTHS BACK BUT I NEED TO KNOW IF I CAN USE THIS THING IN THE U.K. OR WILL I HAVE TO ADAPT IT TO OUR TELEPHONE SYSTEM . ALSO IS THE SYSTEM EXPORTABLE ? ************************************************************************** 3)From: "Christopher C. Larson" Subject: Cracking Word Passwds Is there a relatively simple way to crack Word 6.0 & up passwords (document specific password)? As this is business related, I'm hoping you can respond soon. Thanks! Chris Larson, Wage Slave. ************************************************************************** 4)From: Martin Pask <100142.3101@CompuServe.COM> Subject: Re: Modular-splitter bugs If you think $50 is a high price to pay you want to have a look how much the real thing costs! M.P.I. ************************************************************************** 5)From: Martin Pask <100142.3101@CompuServe.COM> Subject: Re: PCS - Eavesdrop proff? I am in contact with someone in the UK who is at the leading edge on this subject. Apparently the system used in the USA has been cracked and it is posible to monitor even the digital network, however the cost of the equipmet puts it out of most users price bracket I belive around 20,000 pounds sterling. The digital system used in the UK and across most of Europe is still as of last week unbreakable. From what I can gather if for some reason you are targeted by the government over here there have the capability to decode your conversation but it takes them around two days to do so. M.P.I. ************************************************************************** 6)From: Martin Pask <100142.3101@CompuServe.COM> Subject: Re: VERY excellent idea I think a video would sell for you, however you cant beat personal training from an expert and hands on. Some people just dont have the feel for it. M.P.I. ************************************************************************** 7)From: Greg Caldwell Subject: Re: SPECIAL ISSUE / Title III Bravo for a well written piece on a frightening subject. I have met James Ross at an INTELNET seminar and know that he speaks the truth. I would urge everyone to follow both his and SpyKing's advice on contacting their representatives. There is a fundamental problem with unequal enforcement of many laws in this country, archaic or not. If Customs and the FCC are going to start acting like the IRS and the SEC, we have a whole new set of problems. Anytime an enforcement agency has the ability and inclination to re-write the rule book without due process, we will have a significant and troublesome situation which can begin to affect the freedom of otherwise law-abiding citizens. The SEC has long been able to look at a business offering, say it is not a Securities issue, then turn around later and reverse themselves and hit the "offender" with huge fines and penalties for not registering the security. The IRS' actions require no further comment (witness the recent succesful lawsuit brought against them). Now the FCC has jumped in. Let's face it. Many times state and federal agencies create problems and, therefore, also create lawbreakers, by manipulating existing laws in order to justify the refunding of their budget. If they can show a problem, they can justify their existance. It is not that much different than the Security Director of a Corporation trying to justify his/her budget. The difference is that if the Security Director changed the rules, or suddenly applied the rules differently, he AND the company would promptly be sued by all affected employees. We don't have that option but we sure can raise a stink with our reps! Greg Caldwell Investigations & Security Consulting Colorado ************************************************************************** 8)SpyKing@thecodex.com Subject: E-Mail your Congressman in Support of Changing Title III laws Send them a message to stop this farce. Checkout: http://www.feminist.org/cgi-bin/congress.pl You can lookup your congressman and let them know that law enforcement will suffer when no one manufactures surveillance equipment... ************************************************************************** 9)From: Brian Poirier Subject: Simple e-mail encryption Does anyone know of a simple e-mail encryption program that is OK for export to non-US locations. I do not need PGP style protection, something simple will suffice. Also I have to teach a non-computer literate person to use this program, one who has english as a second language. He uses netscape 3.0 for his mail, although he also has Eudora Pro 3.0 (as do I), so anything that can work with either of these is desirable. Thanks, ----------------------------------------- Brian Poirier Paladin Investigations 502 Freeport Houston, Texas 77015 Phone: (713) 450-9340 Fax: (713) 450-3105 Steelsun@wt.net or Paladin@wt.net Http://www.pimall.com/paladin/ ************************************************************************** 10)From: SpyKing@thecodex.com Subject: Correspondance from Walz/Dagget Re: Title III problems I received a copy of this letter that was sent to several members of Congress... April 25, 1997 To Whom It May Concern: Recently our company Tech Support Systems was indicted for conspiracy to sell, manufacture, and distribute equipment whose alleged design rendered it primarily useful for the interception of oral or electronic communications in violation of 18 USC 2512. The equipment in question has been available through our company since its inception in 1992. Our products were advertised in police and security magazines. We sold to and cooperated with many federal agencies including the G.S.A., D.E.A., F.B.I., local and state police, and others. All who were fully aware of our product line for approximately five years before being indicted. About a year ago, along with our counsel, we asked the U.S. Attorney of San Jose for guidelines regarding the legality of our equipment. His response was he did not know and could not advise us. Early this month a partner in this company, Gilbert Walz was arrested by U.S. Customs for conspiracy to sell equipment that allegedly falls under this statute. He was held for thirty days before being released on $200,000.00 bail. At the arraignment Magistrate Patrica Trumble asked the government if the equipment was illegal. The prosecutor responded by saying he thought it was, but was not sure as there was no case history. Our small company is totally financially exhausted and under the scrutiny of the government for a law that has no apparent track record and in the opinion of many is unconstitutionally vague. At no time during the execution of our marketing plan did we intend on violating any state, local, or federal laws. We sought to market and promote our product in a competitive environment under normal channels of trade with diligence and integrity. We simply want the government to tell us what we can and cannot sell without being harassed or arrested. Does it sound reasonable that we face many years of jail for sales of equipment that the government has been buying, but cannot decide whether it's legal or illegal? If possible we would like to make an appointment to see you. Since Congress wrote this statute, maybe you can shed some light on the interpretation of this law. Thank you in advance for your response. Sincerely, Gilbert Walz Jude Daggett ************************************************************************** 11)From: SpyKing@thecodex.com Sunject: More Title III Stuff from Walz/Daggett Dear Frank Enclosed is information related to our case and defense, which are as follows: "Readily Accessible to the General Public" 1) The indictments filed against us relate to cellular communications which we will contend are readily available and accessible to the general public, Please see Electronic Communications Privacy Act page 12 of 70 (i). "Design Not Primarily Useful for Interception" 2) 2512 the statute we are charged with violating states it's illegal to manufacture, assemble, possesses, or sell any electronic, mechanical, or other device knowing or having reason to know the design of such device renders it primarily useful for the purpose of the surreptitious interception of wire, oral, or electronic communications. Notice design, we did not design any of our equipment. Information sheets on the original manufacturers are enclosed. The design and application of the equipment in question was not for secret listening of communications. "Implied Consent" 3) Advertising has been limited to law enforcement and security magazines. Efforts where made by Tech Support Systems to contain sales to law enforcement and government, on our own volition. Tech Support systems sold to D.E.A., F.B.I., G.S.A., Army Intelligence, state and local police and cooperated with others since our inception in 1991. We believe these organizations gave their implied consent to sell our equipment, perhaps they should become co-defendants? "Selective Prosecution" 4) Enclosed find other ad's from much larger and well known companies. Are we being singled out for a specific reason? "Unconstitutionally Vague" 5) We and many others believe 2512 of The Electronic Communications Privacy Act is unconstitutionally vague. Any thoughts or idea's contributing to our defense are appreciated. Sincerely, Jude Gilbert +++Moderator's Note+++ How about it list? Any ideas? I have several... let's hear it... if these guys are convicted, no one in this industry is safe and I predict that public law enforcement is going to take it on the chin as a result. Prices will SKYROCKET to cover the costs of POSSIBLE criminal litigation... A device that costs $500. today will cost law enforcement $5000. tomorrow... As a former LE tech I can tell you that equipment money is hard enough to get without skyrocketing costs... From this point on... the Codex will explore the legality of raising it's prices to government and public law enforcement agencies by 25% to cover POSSIBLE litigation costs... ************************************************************************** 12)From: GilbertWa@aol.com Subject: Daggett and Walz Thanks for the good words, its a difficult thing that has been draining us in many ways for sometime.I would like to add that after my partner was set-up by Customs he was offered a deal that would have included only diversion in return for his testimony against me, he turned it down... Gilbert ************************************************************************** 13)From: ApriI19th@aol.com Subject: Re: Drug war, facists and Title III with Moderator's rebuttal... You're right spyking, after lurking since the inception of this list, the posts on this subject compel me to speak out. I was totally amazed at the number of fascists on this list and that out of 2000 people nobody spoke up against them. To the person who wanted to give the cops the right upon pulling you over and finding a joint in the ashtray, having the power to put you in a ditch and execute you, you would of made a good SS death camp guard. I would quote others but I don't have the posts available, they are at work, but some of you others spouted equally despicable thoughts and ideas. Then we have spyking supporting fascists on the subject of drugs, if I remember correctly he was for war against suppliers, death to people in prison, and then lo and behold, the fascists have arrested friends of his under some arcane law about title III equipment, now he is asking us to support these people. Just two days ago if the law had listened to you people, your friends should of been summarily executed, no trial, why let those soft judges decide your friends might not be guilty, they broke the law according to the people that arrested them, shoot them immediately. Now for those of you that aren't fascists, but didn't analyze what you were asking for, try *thinking* next time before you spout off. Just imagine that the fascist that comes to power decides the most dangerous people are private investigators, the people on this list would be the first to go into the ovens. Desire fascism at your own risk people, for once it's here, it will be too late. April 19th +++Moderator's Note+++ First off. We appreciate you "coming out of the lurker's closet". Second, we appreciate your point of view and welcome your post and hope there will be more... Third. Let me try and set the record straight. I have NEVER met Walz and Daggett. I doubt seriously if I have ever spoken to either one of them in person... They are not "friends"... They ARE people who happen to work in the same industry as I do... I feel for them... and I will do what I can to try to enlighten those in the dark... As a professional I am naturally concerned about "happenings" in my industry. This matter should be of concern to ALL in the industry who use ANY type of surveillance, communications or investigatory devices... There is an old saying "There but for the grace of God, go you or I"... What happened to them could just as easily happen to ANY of us if this is allowed to stand... When I woke up this morning this was still America... Where a man or woman is presumed innocent until proven guilty... (that's why I'm not ready to shoot these guys or worse like I proposed for drug dealers in a different thread). The law they "allegedly broke" is highly technical in nature and it was written by lawmakers who don't know what they are talking about when it comes to nomenclature of surveillance equipment. The fact that they (Daggett & Walz) sold this equiment for years to law enforcement agencies only COMPOUNDS the problem for the government. If they want to get technical, they themselves could be on VERY shakey legal grounds... The Law enforcement agencies that bought equipment from them could ALSO be in hot water IF the charges against Daggett & Walz are pursued... Here is a quote from the law in question: "any person who manufactures, assembles, possesses, or sells any electronic, mechanical, or other device, knowing or having reason to know that the design of such device renders it primarily useful for the purpose of the surreptitious interception of wire, oral, or electronic communications," I urge you EVERYONE on this list to read this law: http://www.law.cornell.edu/uscode/18/ch119.html The way the law is written right now YOU could be indicted, arrested and CONVICTED for possession or sale of such common items as: tape recorders, wireless microphones, radio scanners, software, recievers, tracking beacons, logging recorders,etc. How about the clerk at the local electronic supply house that sells you a linemans handset? What about the companies that manufacture them? Think I'm going soft in the head? How about software? How long do you think it would take to indict Bill Gates? His DOS and Windows operating systems make it possible to intercept electronic communcications. I know of SEVERAL software packages that "surreptitiously intercept" electronic communications... They are sold openly... Have they been indicted yet? Pager and cellular companies are in immediate trouble... They cannot LEGALLY use the software and equipment necessary to maintain a normal business because that SAME equipment is primarily designed for maintenance, diagnostics and surveillance of cellular and pager communciations... The same with most telephone logging software used by thousand of companies daily... How long do you think it would take to indict everyone on the net who uses "cookies"? How about Microsoft's Win95 Registration Wizard? Isn't Bill Gates "surreptitiously intercepting" electronic data from your hard drive? What about cgi scripts that tell web surfers where they came from? Aren't these all illegal under this law? Read the law. I think you will find that "technically" they are... "technically" can translate into 5 years of your life... are you willing to gamble? How long do you think the media would stand for it if a zealous federal agent walked into a TV studio and grabbed Mike Wallace off the set of 60 minutes and arrested him for possesion of a wireless microphone commonly used in news broadcasting? There are probably one hundred thousand radio scanners in use in this country by scanner enthusiusts who could be arrested if the government has their way... Why? Because under this same law "technically" a radio scanner is illegal... If you are going to indict one or two, why not all? How about the Chairman of the Board and executive staff of Sony? Tandy? Uniden? Bearcat? Or maybe Motorola? Microsoft? Every computer company in the world? Every radio communciations device manufacturer in the world? Every tape recorder manufacturer in the world? What about the minimum wage store clerk in Radio Shack who sells you a dropout relay to tape your phone calls? What about the tape cassettes themselves? See how silly this gets? But READ the LAW... EVERY ONE of these companies manufactures a product that "fits the bill" and COULD get them arrested, indicted, convicted and sentenced to FIVE YEARS IN JAIL... I would be HAPPY to debate this issue with ANY lawmaker at ANY time... If this "flawed" law is enforced, it could result in the demise of hundreds or thousands of products manufactured (and those who manufacture them) in this country and throughout the world today... Frank Jones ************************************************************************** 14)From: BADCOFFEE@aol.com Subject: Lockpicking tecniques It is important to have a few different tecniques up your sleve. If one doesnt work....move to another. Pick, bounce, light torque, heavy torque, floating torque (what the heck is floating torque?....see next issue) Here's a new one to me........ With the pick "scoop" the pins and make sure you hit the back of the keyway on each stroke. Light torque. RAPID motion. I have no idea what happens inside...but it is woking well sometimes in some situations. Here's a twist for the badCoffee Bag---------> (This is good) Screwing around..... I applied HEAVY torque (real heavy) on a Quickset deadbolt lock last night. It seemed to pick from rear to front. I inserted pick all the way to back, HEAVY torque, presses upwards pretty hard pulled back and the thing opened on ONE stroke every time. The ONE STROKE theory has been proven. Amazing, Master this and your looking at 1/2 second entry's. Very amazed here. The HEAVY torque did not give the pins a chance to false set (I think). The back pin just hit the sheer line and immediately moved the plug to the next pin. Amazing stuff.......just when you think the cat has been skinned......there is another way to do it. My posts have been slowing up for 2 reasons: Nothing new to pass. There are a LOT of new members onboard (welcome) and I am probably going to start repeating soon (the brief case was my favorite to write, got a LOT of mail on that one with sucess stories) 2: I've been up to my ass in Safes and combo's and the Spool pins are killing me. I PROMISE.....within the next 2 weeks I WILL absolutely have a SIMPLE tecnique to open Master Padlocks. I got this thing down to numbers..but I am REAL close to a SOUND only tecnique....NO number crunching. Also: Looking into all types of Realtor Lock Boxes and cheap combo lockboxes. This is going to be a good Lockpicking post month here. Stay tuned and everyone tell a friend to jump in. The more people..the more chances on getting multiple answers on same questions to cross check. PS- You nice people know you can put a stethescope just about anyplace on your body and hear something??? (my new toy) Augie Entry Specialist for hire Send me MONEY or send me MAIL....... Bad enjoy's receiving both from you. :-(I) <------Ok, PI's....who is this? (Hint- NO Satasfaction) :-) ************************************************************************** 15)From: Allen Crisell Subject: Those stupid stupid people (laws) G'day again, Just listening to midi stuff Codex is sending thru, Mick Jagger stuff. Anyway thanks for the Special report on the stupid laws. It's just unbelievable how I see this everywhere - People in control who really don't understand and make judgements by using nitwits to be their resource. These are the type of people who would outlaw pens 'cause "they can be used as a weapon". Maybe so, but I'm sure the legal and professional would have good sense not to "suspiciously" use certain technology. I know it's unfortunate here in Australia that it takes ages to get a warrent from the Director of Security or the Attorney Gen and use gear in a hurry to gain immediate info but that's the fault of the system but to "blindly" assume and to threaten the capability of the legal PI and others is a step which show their stupidity and lack of intelligence in this matter. Grrrrr! Anyway prob 2: A while ago, whilst "cleaning" a place for bugs, came across a battery operated FM bug slung under the client's bed. After much perusing at that time, the client didn't know if it was a professional job or just a joke (not very funny). I couldn't hang on it for reasons and the client has since moved to another location. But I still have a few numbers to chuck to try and identify the unit for curiosity sake. It transmitted on about 47.200 Mhz and crystal locked. It looks like a professional unit and has the id "UA-581". It was "boxed" in a see thru plastic but not all was visible because of some epxoy over a few components (I remember because I wrote it down on the day for future reference). The device measure approx 1" by 1" and power by a 3 volt lithium battery. Can anybody identify whom the maker is? I've checked most kits available but nothing comes close to "UA-581" which was part of the copper etched on it. Any replies = thankyou! Allen mulder@tolstoi.saccii.net.au allenc@usa.net ************************************************************************** 16)From: BADCOFFEE@aol.com Subject: Re: lockpicking does make me nut's! Cory, my response was sent back to me as "unknown", this is the only wway to get this to you........ Subject: Re: lockpicking does make me nut's! In a message dated 97-06-10 21:01:56 EDT, you write: << i have tried so hard and practiced so much,i just can not pick a master lock! I have tried bobby pin's,paperclip's,and i have tried bicycle spokes!(i don't remember where i heard that one)but is there a web site out there that explain's EXACTLY what to use and HOW TO do it? >> Cory..... First question.has a lock ever opened in your hands? If not...the first time it does a mental block is lifted and it becomes a LOT easier and less frightning. Second: Try this site..... http://www.lysator.liu.se/mit-guide/mit-guide.html Cory, Master (with exception to the pro series) is a fantastic lock to practice on because the majority of the locks out there are Master locks. Each manufacturer does have certain reliable characteristics. They are very easy locks to pick also. Remember, NOT too much tention on the torque wrench. I want you to stick to the paper clips. Once you move on to professional picks you definately loose ability to use anything else. Let me know how I can help you further. Augie ************************************************************************** 17)From: China Subject: Re: Special issue If I may, I would suggest a supportive gesture for messieurs Daggett and Waltz. Since the fate of these two gentlemen seems to have the potential to touch upon each and every professional on this membership, it seems that there exists a case for uniform concern, and given that assumption, by extension a similar case for uniform support. If this is true, I would suggest to Mr James A. Ross that he set up a legal defense fund for his friends. It may be presumptuous of me, but I feel that there are few adults and professionals within this membership who could not afford to contribute one or two hundred dollars towards such a goal-- hell, more than that is wasted on non-essential items by every single man and woman here. I hasten to add that I have nothing personally to gain either way since I am not a practicing member of your profession. However, a time may someday arrive when I will need the help of one of you gentlemen, and I would hate to think that you were foreclosed the very latest technological contrivances necessary as you set about to resolve such a hypothetical problem for me. Empathy is nice, but as they say, "Money talks and bullshit walks." With 2000 members contributing, the arithmetic would be attractive to a well connected legal firm...just ask O.J. :> More than the financial support, the rally of professionals who utilize such equipment as he sells and which professionals might someday find themselves in a similar predicament, would send a resounding signal of solidarity. In any event, if Mr Ross is amenable and the rest of this membership is likewise amenable, I would pledge the first two hundred dollars. Again, I apologize if this is inappropriate or presumptuous. China ************************************************************************** 18)From: BADCOFFEE@aol.com Subject: Who is behind the words? http://members.aol.com/BADCOFFEE/SlowLoadBadcoffee.html Your turn, mail me direct or post. :-) Augie ************************************************************************** 19)From: CS CUSTOM Subject: Re: GSM Phone Security From: Mutter Subject: Re: GSM Phone Security > > Sprint is running ads in the NY papers that their PCS service is > > eavesdrop proof. "And it's secure, too. So you don't have to worry about > > cloning or eavesdropping." > > > > Sounds to me like they are assuring their customers of a privacy that > > doesn't exist, and maybe setting themselves up for a lawsuit from the > > next mogul who finds out somebody taped his insider trading or > > congressional fix. > > > > Comments? > > When you find a remotely affordable receiver or other equipment capable of > monitoring spread spectrum and/or encrypted digital transmissions in 1.9 > GHz, you be sure to let us all know. > > CrACKeD Well I don't know how it was done but a client of mine was the target of a prime investgation in Va. He had one of those sprint spectrum phones and the phone was tapped by the FEDS. They taped all conversations that were placed from his phone to land, cellular and to other sprint phones. When the FEDS played the tapes back he told me he almost past out. I think that sprint either had something to do with it or there is also a possibility the smart cards can be cloned just like they do the dss tv cards. The next time I speak to him I will try to find out if his lawyers had figured it out yet. ************************************************************************** Who are you? What's your specialty and/or interest? Let us know about your company... What would you like to see on the list? Post it. Let us know... Do you have something to contribute? We'd like to hear it... We want to know EVERYTHING and ANYTHING about eavesdropping, surveillance, countersurveillance & privacy related technology, etc... Remember: who, what, where, when, how & why... we want ALL the details... Do you have a question? Post it... A little free time? Help a member... With the INCREDIBLE brain power on this list, someone should have the answer ;-) P.S. Don't be a LURKER... Members take the time to post info for us all... give something back... Don't just take... Your input/knowledge is valued... ************************************************************************** Send Postings to: spyking@con2.com with "Post" in subject field with subject ************************************************************************** Subscribe to: spyking@con2.com In the subject field type: subscribe-surveillance list e-mail address ************************************************************************** Unsubscribe to: spyking@con2.com In the subject field type: unsubscribe-surveillance list e-mail address ************************************************************************** ...The Simple Rules of the Surveillance List... The Surveillance List Owners may Reject any posts that are/contain: 1) Info Unrelated to Eavesdropping, Surveillance or Privacy technology... 2) Flames or Negative posts... 3) E-Signatures that are considered excessive... 4) Advertisements not DIRECTLY related to the list topics... 5) Attached Files... 6) Oversized Posts... (May be edited to save room) **************************************************************************** This publication is copyrighted and is protected by U.S. and International copyright law. The information transmitted on this list may not be reproduced, reposted or forwarded to any non-list member without expressed written permission of the List Owner. Violation of U.S. copyright law is a criminal and civil offense... **************************************************************************** The Surveillance List is Moderated by SpyKing@thecodex.com The List Owner will make EVERY effort to protect subscribers from spam... Copyright 1996, 1997 Codex Publishing Inc., All Rights Reserved... **************************************************************************** ****************************************************************************** Vol.Two Issue #135 The Surveillance List June 12,1997 Over 2100+ Members Worldwide Representing 46 different countries List Chat at: http://www.thecodex.com/chat.html ****************************************************************************** IN THIS ISSUE... ****************************************************************************** 01) Realtor Lock Boxes 02) Identify the bug 03) Monitoring Digital and PCS 04) Supra AEII locklbox 05) Casey Visco - problem w/ "Computer God" 06) Legal Funding Support !! 07) FCC rules 08) Enough with the drug thread 09) NY Sen Moynihan Responds... 10) Re: Eavesdropping device? 11) Secret Message Contest 12) Re: Cracking Word Passwds 13) RE: Simple e-mail encryption 14) Looking for better video equipment 15) Re: Sandline 16) Re: GSM Phone Security 17) New Website 18) PCN Security 19) FTC Workshop 20) Cybersleuths president interview 21) Video Surveillance Detector 22) Re: Identify the bug 23) Re: PCS - Eavesdrop? 24) "Coffee Break" ****************************************************************************** DON'T BE A LURKER.... GET INVOLVED... YOU ARE A MEMBER... MAKE THE MOST OF IT ****************************************************************************** 1)From: Trace Carpenter Subject: Realtor Lock Boxes Hey Augie, I have one of the old ones here. I'll send it to you along with that disk if you don't already have one of these. It's the old type with the alpha combo lock on it. ************************************************************************** 2)From: Trace Carpenter Subject: Identify the bug It transmitted on about 47.200 Mhz and crystal locked. >It looks like a professional unit and has the id "UA-581". It was >"boxed" in a see thru plastic but not all was visible because of some >epxoy over a few components (I remember because I wrote it down on the >day for future reference). The device measure approx 1" by 1" and >power by a 3 volt lithium battery. Can anybody identify whom the maker >is? If it's the one I'm thinking of, it's a foreign import. It comes in a blue and white cardboard box, and inside that is a red plastic box. When you open the plastic box, there's blue felt inside incasing the bug like a fine jewelry box. I've been looking for the manufacturer but can't find a file I'm looking for. I recently moved and haven't unpacked that yet. Maybe this info will help jar someone else's memory until I can find my info. Hope this helps. -- Trace Carpenter Investigations ****** 2926 Maple Ave., Ste. 200 Friends help you move; Dallas, Texas 75201 Real friends help you move bodies. 214.828.4520 ****** ************************************************************************** 3)From: Trace Carpenter Subject: Monitoring Digital and PCS >Apparently the system used in the USA has been cracked and it is >posible to monitor even the digital network, however the cost of the >equipmet puts it out of most users price bracket Yes, you can, and yes, it is. -- Trace Carpenter Investigations ****** 2926 Maple Ave., Ste. 200 Friends help you move; Dallas, Texas 75201 Real friends help you move bodies. 214.828.4520 ****** ************************************************************************** 4)From: BADCOFFEE@aol.com Subject: Supra AEII locklbox If anyone would like a "bit" more info on the Supra AEII locklbox, here is the direct link. (Thank you Brian) www.keysafe.com/keysafe.htm Augie ************************************************************************** 5)From: Max Subject: Casey Visco - problem w/ "Computer God" Save the msgs with full header info and e-mail me a copy. I'll see what I can do. Max ************************************************************************** 6)From: "Lorenzo Castillo Sanchez" Subject: Legal Funding Support !! >17)From: China >Subject: Re: Special issue >, I would suggest to Mr James A. Ross that he set up a >legal defense fund for his friends. It may be presumptuous of me, but >I feel that there are few adults and professionals within this membership >who could not afford to contribute one or two hundred dollars towards >such a goal-- hell, more than that is wasted on non-essential items by >every single man and woman here. >Empathy is nice, but as they say, "Money talks and bullshit walks." With >2000 members contributing, the arithmetic would be attractive to a well >connected legal firm...just ask O.J. :> Is anyone here familiar with Paladin Press ?? Not long time ago, they were being sued for aiding and abetting the murder of this contract killer. He bought this book - "Hitmen: A Technical Manual" about a year ago before he did his job. If you are a reader of "underground" books, you'd notice that on the front page of the book they always put this little warning - "The procedures written in this book maybe punishable by law." There is a clear warning to the readers. It's up to the reader to carry out things and take the risk of getting busted in jail. I think it's a similar situation in Mr.Daggett's case. They were playing by the rules by sticking to LE customers. I'm sure Mr.Daggett and Mr.Waltz's policy was "Sales Available to Law Enforcement Only". In times when the given right of freedom of speech is being oppressed, we should make sure that we guard our freedom of communication. I just checked the laws regarding electronic surveillace on the Cornell University website. Someday our kids might not get to play with their walkie-talkies because of some FUBAR (F--- Up Beyond Repair, excusez-moi, for getting a little excited here) law stating that radio communications devices can somehow be "used" for interception(??!!). Well, it's not just the legit industries suffering severe blowbacks because of a FUBAR adminstration which doesn't know JS about setting legal standards on what the heck should be legit and illegit. The citizens who go shopping for a little protection of privacy could also get busted for purchasing "illegal"(?) electro-goodies. Count me in and I'll be sending a few hundred bucks ASAP. It's OK if you wanna be a cheapo and don't contribute at all. But, the thing is when we join the list, SpyKing never bills us a subscription fee because it is FREE - $0.00. I think this newsletter I get everyday is certainly worth the bucks. Even those monthly surveillance newsletters would cost you more than at least 6-70 bucks/year. If it was a daily newsletter, you might have to add an extra 0 at the end of the 2-digit number. Well, you get the idea. Even if it's just $20 per member we could easily sum up 40 K ! By contributing to the legal defense fund, we're also making sure that "bullshit doesn't walk away". ("Money talks and bullshit walks" - I like that) Hmm, by the way, I was wondering if we could make a special site on the net for Mr.Daggett and Mr.Waltz. :-) +++Moderator's Note+++ Re: Special Site on the net for this case... Sounds ike a good idea to me... it should be brought to EVERYONE's attention... The final decision would be up to Dagget & Walz but if they are interested I'll donate the web space and my meager html skills to construct the page for them... ************************************************************************** 7)From: "self destruct" Subject: FCC rules hello everyone i have a question involving fcc rules. Under part 15 your electronic devices must 1 not emit any interfere with radio comunications. 2 (this is the one i have a question about)it must accept any interference including that which may cause undesirable operation. Why must your electronic devices accept interference? any info would be appriciated.thanks self destruct at slfdstrct@msn.com ************************************************************************** 8)From: "David S. 'Greeny' Greenberg" Subject: Enough with the drug thread Please, please, please... let the drug thread die a natural death and send it to alt.drugs or some other such list... thanks! ************************************************************************** 9)From: SpyKing@thecodex.com Sunject: Sen Moynihan of NY Responds... I received this from the Senator's office in response to my communication concerning Dagget & Walz and the unclarity of the current Title III law... Still waiting for Sen D'Amato's office to respond... >>>> Date: Wed, 11 Jun 1997 11:05:34 -0400 From: Senator Subject: Rule: Re: Title III Case To: SpyKing Content-Description: cc:Mail note part Dear Internet User: Thank you for contacting my office via the Internet. I look forward to hearing from all New York State constituents on issues which may concern them. Due to staff and resource limitations, I am unable to provide an individual reply to your Internet message at this time. However, New York State constituents who have included their name and postal address in their e-mail message will receive a reply through the U.S. Mail as soon as possible. If you have received this message and had not originally included your name and postal address, please resend your ENTIRE note and include the address information. Should your request pertain to an emergency with an agency (i.e., Immigration, Veteran's affairs, IRS, etc) please contact my appropriate state office by phone at: New York City 212-661-5150 Buffalo 716-551-4097 Oneonta 607-433-2310 Thank you again for contacting my office. Sincerely, Daniel Patrick Moynihan United States Senator <<<< As you can see, this apparently is a standard form letter from an automatic reply bot. We also sent a fax and will post any responses... ************************************************************************** 10)From: CrACKeD Subject: Re: Eavesdropping device? > What do you think? Check this out: > wysiwyg://28/http://www.dresearch.com/trap.htm I'd become a little suspicious if I received a free calling card in the mail with 60 minutes of talk time tagged to it, wouldn't you? > or how about this? > http://www.pimall.com/digdirt/mo00007.htm Great services alright, but a bit pricy. Some of those lookups you could do yourself, but others may be worth it. I wouldn't pay the guys to look up a listed number, though. CrACKeD ************************************************************************** 11)From:SpyKing@thecodex.com Subject: Secret Message contest No one has won yet... that FREE prize for the winner is still available ;-) Checkout: http://www.thecodex.com/cypher.html AND we've created a logo for the winner to PROUDLY display at: http://www.thecodex.com/list.html - Winners logo at the bottom of page Don't forget to stop by and chat at: http://www.thecodex.com/chat.html Send me an instant page from my Main page and if I'm online I'll join you ************************************************************************** 12)From: CrACKeD Subject: Re: Cracking Word Passwds > Is there a relatively simple way to crack Word 6.0 & up passwords > (document specific password)? Sure, for a price. Check out CRAK Software first at www.crak.com, and then give AccessData a try at www.accessdata.com. CrACKeD +++Moderator's Note+++ There are several shareware crackers out there on some of the hacking sites... or try an ftp search at: http://www.thecodex.com/warez.html and enter "crack" or other "keywords"... ************************************************************************** 13)From: L J Strand Subject: RE: Simple e-mail encryption > Does anyone know of a simple e-mail encryption program that is OK for > export to non-US locations. I do not need PGP style protection...etc Get a "1st Class Digital ID" from Verisign, it's free and easy to use. It does handle 128bits encryption, and may be used with NS or IE. Sincerely yours L J Strand INTERNATIONAL SECURITY AGENCY http://www.algonet.se/~ljsaisa ljsaisa@algonet.se Tel: Int+46 (0)8-645 22 82 (09.00am-05.00pm C.E.T.) Fax/Data: Int+46 (0)8-645 22 82 (24h) PoBox 167, S-162 12 Stockholm, Sweden ************************************************************************** 14)From: "David Martin" Subject: Looking for better video equipment Well, I did it! I am out of the "LURKER" closet. I work for an agency in the Pittsburgh. Pa. area. It will remain nameless. My specialty is surveillance. My interest is in both stationary and moving surveillance. I also do alot of video work, so I am always looking for better video equipment, including body cams, etc. It's not as dark out here as it is int the closet!(*grin*) Dave P.S. Anybody else in there, come on out. ************************************************************************** 15)From: Bruce P Hall Subject: Re: Sandline >Does anyone have any information about Sandline, by any chance? I've >got some, but not enough... Can you post what info you have for the rest of us that are interested Bruce Hall Elite Systems ************************************************************************** 16)From: CrACKeD Subject: Re: GSM Phone Security >> When you find a remotely affordable receiver or other equipment capable >> of monitoring spread spectrum and/or encrypted digital transmissions in >> 1.9 GHz, you be sure to let us all know. > > Well I don't know how it was done but a client of mine was the target of > a prime investgation in Va. He had one of those sprint spectrum phones > and the phone was tapped by the FEDS. They taped all conversations that > were placed from his phone to land, cellular and to other sprint phones. > When the FEDS played the tapes back he told me he almost past out. I > think that sprint either had something to do with it or there is also a > possibility the smart cards can be cloned just like they do the dss tv > cards. The next time I speak to him I will try to find out if his > lawyers had figured it out yet. I doubt we're dealing with an over the air tap here. Anybody should know that the "feds" have the authority to skip right on down to the telco and monitor your communications where they're in their unencrypted state. Much easier than setting up equipment to follow and decode your transmissions over the air, wouldn't you think? Even if your friend was calling another mobile user, his phone still has to go through the telco gear which will at some point either deals with his audio in an unencrypted state or is able to convert his audio into "plainaudio," if you will. It's just a matter of logging the communications from there. We're not dealing with some breakthrough PCS/GSM crack here, don't worry yourself too much about Joe Neighbor listening in. CrACKeD ************************************************************************** 17)From: "The Swordsman" Subject: New Website I redeveloped my website, which now contains over 23 pages over links. The site is specifically designed to serve as a directory to the most richest and most powerful resources of information on the Internet, complete heaven for those in the Intelligence field or in private investigative work. Check it out at http://www.geocities.com/CapitolHill/7245 Check out the links to databases and directories on the Net at http://www.geocities.com/CapitolHill/7245/archive.html and http://www.geocities.com/CapitolHill/7245/find.html Dont forget to sign the Guestbook!!!! Stay safe, Frank Pagano (a.k.a. The Swordsman) A.S. Criminal Justice-Law Enforcement Auxiliary Police Officer #7144, Nassau County, New York CyberAngels(#IRC226)--Director of Cybercops Team http://www.geocities.com/CapitolHill/7245 "And whosoever shall offend one of these little ones that believe in me, it is better for him that a millstone were hanged about his neck, and he were cast into the sea." (Mark 9:42) ************************************************************************** 18)From: Bruce P Hall Subject: PCN Security The PCN 1800mhz network in the UK is considered to be reasonably secure, BUT there are products available to intercept calls and decode the digital signal with extreme ease - the units are very expensive, around $6000 and are supplied with the usual Official government orders only rider. This should put this technology out of the reach of your average eavesdropper but be aware that digital is not totally secure. this also applies to standard gsm cellular. Bruce Hall Elite Systems Bruce P Hall Elite Systems bhall@elite.u-net.com elite@compuserve.com -----BEGIN PGP PUBLIC KEY BLOCK----- Version: 2.6.2 mQCNAjA53DsAAAEEANaL/n1EBessakXmrH9rQ/+MEP/VDMIHUIvfNftVX7dQE1nO P44LSU2RtD2Zht4vApPuk88j6Jl9KiXpo5pM3HCBIts74cgX8RZzna1nRLc/Xv/y J/GqPt1c055qdz2yAyBfHDM+xzjWsz8DvheK8ACD4puMHFhNW6jQV4AQNO41AAUR tClCcnVjZSBQLiBIYWxsIDwxMDA2NzYuMjExQGNvbXB1c2VydmUuY29tPokAlQMF EDLX4xGo0FeAEDTuNQEBi30D/2CLbn6iSiNN6UkNEv0HQiyqM5TNuNXIQBQ1zA33 xaSd4zB385ijtvr1xf1sU51ukj4wfjXCU2rnNsjDQh1OUD4Fk1BM4JjhVcjKrfbA MzQpO8YKm8Q3bnF76isgYRh6RrneAx9MdHykhZ0/gJPZaVxlVccMdEgJA3/j9rvY kjdy =CTBR -----END PGP PUBLIC KEY BLOCK----- ************************************************************************** 19)From: Robert Biggerstaff Subject: FTC Workshop PRESS RELEASE Database Expert Exposes Invasive Databases at FTC Workshop WASHINGTON, D.C. -- At a Federal Trade Commission workshop on privacy concerns of computer databases and "look up" services, Robert Biggerstaff, an expert in computers and computer databases stated that "There are databases out there that scare me to death. I have even turned down clients that wanted me to work on projects that I felt were immoral or a threat to society." When asked to elaborate, Mr. Biggerstaff gave several examples of information that can be obtained. "We as a society have decided that an employer can not ask you certain questions such as 'are you married', 'do you have children', 'what political party are you in', 'do you purchase birth control or alcohol'? But today employers can get the answers to these and other questions from other sources. You no longer have a choice of who knows your intimate secrets." Mr. Biggerstaff produced documents from a company in Florida that provides electronic database services to over 10,000 retail stores across the country including Winn-Dixie, Safeway, Kroger and others. This company claims to reach over "144 million shoppers each week." These documents stated at one point "Each time a shopper uses a frequent shopper or similar card, purchase data is filed under a customer household identification number and logged into the database. With access to a database like that" says Mr. Biggerstaff, "an insurance company could deny you coverage for heart attack because you have a purchase history of buying fatty foods, or an employer could generate a list of women who buy birth control or pregnancy tests - then compare that list to unmarried female employees and then find a reason to fire women the employer thinks have an immoral lifestyle." Mr. Biggerstaff is also concerned about security and who has access to invasive databases. "There are tons of them. The ones represented here [at the FTC workshop] are the best of breed and generally know who is accessing their information. But the vast majority of the industry is pure scum. They will provide anything they can get their hands on for a price." He produced pages and pages of database services that accept requests for information without requiring or verifying the identification of the requestor. Using advertisements from one of these services, Northern Research, as an example, Mr. Biggerstaff demonstrated "This company offers a 'Personal Profile' search for $50" and showed that the advertising indicated such a profile would include 'SSN, telephone listings, driver's licenses, relatives and neighbors.' " The advertisement Mr. Biggerstaff referred to included a form for ordering searches by credit card, check, or money order. "By using a money order" concluded Mr. Biggerstaff, "it is possible to obtain this sensitive information anonymously. From any number of sources using only ten to fifteen dollars and a phone call, I can get the SSN of any person in the United States." When he was on the database workshop panel on Tuesday, Mr. Biggerstaff also disputed the claims of one national database provider also on the panel, Lexis-Nexis, that their product does not contain mother's maiden names. "You can use P-TRAK to find mother's maiden names" he stated. Using documents from their own presentation earlier in the day, Mr. Biggerstaff demonstrated that it was very easy to find someone's mother's maiden name using Lexis-Nexis, even if the system doesn't identify the information as such. Mr. Biggerstaff was also critical of the practices of some of the other database services represented at the FTC workshop. "Commissioner Varney pinned them down well. Responding to her questions, they essentially said that 'we'll tell a consumer that we have a file on them but we won't let them see what is in it.'" "That" says Mr. Biggerstaff, "violates every concept of fairness I know of. You are going to compile a file on me but I can't see it? Even the CIA can't do that." Mr. Biggerstaff further explained that all government agencies, including the CIA, FBI, and others, have to provide a copy of any file they have on a person to that person if they request it. "They also shot themselves in the foot with regard to any credibility of 'self regulation'" he continued. He pointed out that during one session, one member of the DMA said they were selling marketing data as a lookup service - a practice that is specifically prohibited by the DMA's self regulatory guidelines. "Commissioner Varney caught it too... and she pressed them on it.... you could see them squirm" Mr. Biggerstaff pointed out. "But in the past, such violations of the DMA's rules have resulted in no consequence to the offender. The DMA is a complete toothless tiger, and no amount of dentistry work can fix it. Their history of enforcing their guidelines - even on their own members - is abysmal" he said. Mr. Biggerstaff is also troubled by the trend of computerizing public records. "In 1966, Congressman Frank Horton of New York said that "One of the most practical of our present safeguards of privacy is the fragmented nature of personal information. It is scattered in little bits across the geography and years of our life. Retrieval is impractical and often impossible. A central data bank removes completely this safeguard." "That safeguard is rapidly being obliterated" Mr. Biggerstaff said. "It is one thing to be able to go to a courthouse in the county where I was born to get a copy of my birth certificate. You pretty much have to have talked to me or my family to find out where to obtain that birth certificate and we could have decided not to give you the information necessary to find it. Soon however, you will be able to put in my name from a computer anywhere in the world, and find out where and when I was born. Then obtaining a birth certificate is easy..... and so is identity fraud." "There is a new site in Texas that has driver's license, tags, and voter registration available for free and anonymously. With this system, I found President Bush's home address, and the former first lady's age and weight. If you want an information revolution" he predicted, "tell millions of American men and women that their age, weight, and home addresses either already are or will soon be available free and anonymously on the internet. You can use this service at www.publiclink.com to look up the information of someone you saw in traffic you want to harass. With just a tag, you can get their name, address, age, what primaries they have voted in, and even whether or not they live alone. When only the police or DMV had access to these records, you generally had to present identification and a good reason obtain access to this type of information. But no longer. This is a stalker's dream." When asked what steps he felt were necessary to protect consumers from invasive database and information practices, Mr. Biggerstaff said that one key lies in identification of the recipient. "Caller ID, by eliminating anonymous phone calls has cut obscene and harassing telephone activities by 90% in some areas. Eliminating anonymous access to sensitive data, I believe is mandatory if there is to be any access control at all. People have been stalked, raped, and even murdered by people who got the victim's information from these type of databases. There must not be anonymous access. I have even gotten credit reports with a simple telephone pretext, and had them sent to a drop box in a different city, under a different name." A recent Equifax/Harris survey has shown a steady increase in concerns of consumers over privacy issues. Over 80% of Americans are "either very or somewhat concerned about threats to their personal privacy" and "one in four people say they have personally experienced a privacy invasion." Robert Biggerstaff holds a BS in engineering and has worked in the field of computers and computer databases for over 17 years. He has worked designing and developing advanced database systems in both the public and private sector, including the US Navy and Fortune 500 companies. As a consultant, Mr. Biggerstaff conducts security evaluations for business computer systems and practices - pointing out not only risks to the clients, but risks to their customers and employees as well. He also operates an Internet web site at http://bitsmart.com/privacy as a public service to help people take steps to protect access to their personal and private information, as well as educate the public about careless information industry practices and pending legislative agendas. Mr. Biggerstaff can be reached at E-mail to nobigge@hotmail.com. ************************************************************************** 20)From: "Carney, Brian" Subject: Cybersleuths president interview OK. I am coming out of the lurker closet. I found this article that everyone must read. It is an interview with the president of cybersleuth in computerworld weekly. To put it lightly it was an eye opener. Any one out there want to enlighten me on some of her tricks and secrets i.e. Hidden directory in windows 3.11??? (certainly she is not referring to the TEMP. subdiretory?). What proprietary tools is she referring to? How do they work? Any ideas post them. http://www.computerworld.com/features/970609sleuths.html ************************************************************************** 21)From: "Lorenzo Castillo Sanchez" Subject: Video Surveillance Detector I just found this stuff on the net in the American Innovations website. I've seen audio surveillace detectors before but is it really possible to detect video surveillance? If it's a wireless video transmitter, it is possible. But what if it was a video camera with cables hooked up to a VCR next room? If anyone on the List used this stuff before and if it's good as it says then let the List know. Here's the website - http://www.spysite.com/counter.html ************************************************************************** 22)From: Allen Crisell Subject: Re: Identify the bug Trace Carpenter wrote: > If it's the one I'm thinking of, it's a foreign import. It comes in a > blue and white cardboard box, and inside that is a red plastic box. > When you open the plastic box, there's blue felt inside incasing the bug > like a fine jewelry box. I've been looking for the manufacturer but > can't find a file I'm looking for. Thanks!!! That's heaps more than what I have. It could be the same type cause I remember felt but color Hmmm and the plastic box was clear although differences like these would be just a different batch from the same supplier. And thanks for the time, pity you didn't have the file. I might start looking around for a few foreign catalogues me thinks! Allen ************************************************************************** 23)From: Mutter Subject: Re: PCS - Eavesdrop? > > I am in contact with someone in the UK who is at the leading edge on this > subject. Apparently the system used in the USA has been cracked and it is > posible to monitor even the digital network, however the cost of the equipmet > puts it out of most users price bracket I belive around 20,000 pounds sterling. > The digital system used in the UK and across most of Europe is still as of last > week unbreakable. From what I can gather if for some reason you are targeted by Well, not really. See, the system you use in Europe for PCS is called the Global System for Mobile communication (GSM) (and guess what?) this system is not used exclusively in Europe. In fact a company in New York City comes to mind called Omnipoint which uses the exact wireless system that you guys use. Of course, then there's AT&T's service (and I also believe Sprint Spectrum) that uses some GSM-wannabe protocol. I remember reading about a team of cryptanalysists who were able to decrypt the signalling info on AT&T's digital-cellular network with relatively little computing power -- maybe that's what your friend was thinking of. I would remember hearing if they found a significant hole in GSM's digital encryption. But if they did, then it was most likely not GSM (which I'm still considering the only true PCS) but one of the other systems in use for "PCS" phones. > the government over here there have the capability to decode your conversation > but it takes them around two days to do so. that's bull. If your government wants your conversation, they'll get it (and in real time too). See, what everyone keeps assuming is that if law enforcement has proper authorization to tap your PCS phone they'll grab it from the air and decrypt it, which is not the case -- remember, from your phone to the site it's digitally encrypted (not to mention hops around from freq to freq), but from there on it's listen-ready. - M u t t e r Ed. root zine (http://www.openix.com/~mutter) mutter@openix.com ************************************************************************** 24)From: Paul Longo Subject: "Coffee Break" OK, how many list members think that Augie/BadCoffee looks NOTHING like what you had imagined? Thanks, Augie, for sharing your picture page with us. You are definitely one of the most colorful contributors here! Paul >18)From: BADCOFFEE@aol.com >Subject: Who is behind the words? > >http://members.aol.com/BADCOFFEE/SlowLoadBadcoffee.html > >Your turn, mail me direct or post. :-) > >Augie ************************************************************************** Who are you? What's your specialty and/or interest? Let us know about your company... What would you like to see on the list? Post it. Let us know... Do you have something to contribute? We'd like to hear it... We want to know EVERYTHING and ANYTHING about eavesdropping, surveillance, countersurveillance & privacy related technology, etc... Remember: who, what, where, when, how & why... we want ALL the details... Do you have a question? Post it... A little free time? Help a member... With the INCREDIBLE brain power on this list, someone should have the answer ;-) P.S. Don't be a LURKER... Members take the time to post info for us all... give something back... Don't just take... Your input/knowledge is valued... ************************************************************************** Send Postings to: spyking@con2.com with "Post" in subject field with subject ************************************************************************** Subscribe to: spyking@con2.com In the subject field type: subscribe-surveillance list e-mail address ************************************************************************** Unsubscribe to: spyking@con2.com In the subject field type: unsubscribe-surveillance list e-mail address ************************************************************************** ...The Simple Rules of the Surveillance List... The Surveillance List Owners may Reject any posts that are/contain: 1) Info Unrelated to Eavesdropping, Surveillance or Privacy technology... 2) Flames or Negative posts... 3) E-Signatures that are considered excessive... 4) Advertisements not DIRECTLY related to the list topics... 5) Attached Files... 6) Oversized Posts... (May be edited to save room) **************************************************************************** This publication is copyrighted and is protected by U.S. and International copyright law. The information transmitted on this list may not be reproduced, reposted or forwarded to any non-list member without expressed written permission of the List Owner. Violation of U.S. copyright law is a criminal and civil offense... **************************************************************************** The Surveillance List is Moderated by SpyKing@thecodex.com The List Owner will make EVERY effort to protect subscribers from spam... Copyright 1996, 1997 Codex Publishing Inc., All Rights Reserved... **************************************************************************** ****************************************************************************** Vol.Two Issue #136 The Surveillance List June 13,1997 Over 2200+ Members Worldwide Representing 46 different countries List Chat at: http://www.thecodex.com/chat.html ****************************************************************************** IN THIS ISSUE... ****************************************************************************** 01) Phone Taps prove Huang spied for Chinese 02) First Look News Bulletin 03) Re: Car Bugs 04) Re: Cracking Word Passwds 05) My choice of lock 06) RE: PCS - Eavesdrop? 07) Re: Identify the Bug 08) Re: Secret Message contest 09) The old way....still works 10) Re: Video Surveillance Detector 11) Re: Looking for better video equipment 12) Upcoming Seminars & Conventions 13) Re: Identify the bug 14) "HELP WANTED" Sporting Event Surveillance 15) Controversy 16) Info on HERF and van eck equipment? 17) Netscape Bug - +++Special Moderator's Note+++ ****************************************************************************** DON'T BE A LURKER.... GET INVOLVED... YOU ARE A MEMBER... MAKE THE MOST OF IT ****************************************************************************** 1)From: SpyKing@thecodex.com Subject: Phone Taps prove Huang spied for Chinese An article from the New York Post... >>>> Phone Taps prove Huang spied for Chinese By BRIAN BLOMQUIST Post Correspondent WASHINGTON -- A key Republican last night said there's electronic eavesdropping evidence that Democratic funny-money man John Huang passed classified spy data to a China-linked company. "We believe that the intercepts that we have, show that Mr. Huang was passing on classified information... dealing with the economy, espionage and breaches of national security," House Rules Committee Chairman Gerald Solomon (R-N.Y.) told CBS. Huang worked for the Indonesia's Lippo Group, which has ties to China, before moving to the Commerce Department and then becoming a funny-money fund-raiser at the Democratic National Committee. He was also able, for reasons that haven't been explained, to keep his topsecret security clearance after leaving Commerce for the DNC. It has been reported that electronic eavesdropping shows China plotted to funnel illegal campaign contributions to affect last year's elections. Meanwhile, the White House yesterday acknowledged that its controversial ex-security boss, Craig Livingstone who was at the center of Filegate, did advance work on a meeting between President Clinton and another shady fund-raiser. But Livingstone denied that he actually "arranged" the meeting between Clinton and Yogesh Gandhi at the Sheraton Carlton Hotel on May 13, 1996, where Huang also was present. "I did not arrange a meeting between anyone and the president at any time that I worked at the White House," Livingstone said, disputing that characterization of his role by The Wall Street Journal yesterday. Livingstone said he continued to do some advance work while serving as security chief (where he was involved in improperly getting FBI files on hundreds of Republicans) but didn't remember this meeting -- although other White House officials confirmed he handled it. White House spokesman Lanny Davis said the "vetting process" for the meeting at the hotel -- where Gandhi got to give Clinton his award and the Democratic National Committee a check for $325,000 -- "was inadequate" but didn't blame Livingstone. The White House also confirmed there is a photo of Clinton with Gandhi and Huang at the event -- but denied Livingstone is in the picture, as the Journal said. The DNC took that picture but has declined to release it. As an "advance man" for the hotel event, Livingstone's job was to know who the president was meeting as well as attending to other security matters, White House official added. An ex-bar bouncer Livingstone had been hired because of his connections to First Lady Hillary Rodham Clinton, according to an FBI agent who screened applicants at the White House. Mrs. Clinton denies it. Livingstone is now in public relations -- he does not dispute that his salary is about $70,000 -- with a Califirnia company Adler-Droz Inc., run by two Democratic donors. Its owners, Howard Adler and Fred Droz, contributed more than $12,000 to Democratic campaigns in 1995 and 1996, according to Federal Election Commission records. <<<< Well, if they've got "proof" through electronic eavesdroppping what are they waiting for? ************************************************************************** 2)From: "'Surplus Traders'" Subject: First Look News Bulletin NEWS BULLETIN FROM SURPLUS TRADERS Here are new items added to the "NIGHT VISION EQUIPMENT" (page 0244) ----- FOR SALE ----- ULTRA COMPACT 2.1 MAGNIFICATION NIGHT VISION DEVICE Ultra compact (only 46 x 63 x 127mm) and is complete with I/R illuminator, cap, case, and charger. Field of view 20 deg. recognition range is 150m and dyoptric correction is +-4. Scope is powered by 3 x 1.5V Varta V60R (rechargeable) and the I/R illuminator is powered by 2 x 1.5V Varta V170R rechargeables. Weighs only 0.4kg. Metal body construction. Limited qty available. $159.00 Ea /200 , $169.00 Ea /100 , $179.00 Ea /50 . TE573 ULTRA COMPACT, ULTRA LOW COST 2ND GENERATION MONOCULAR Probably the least expensive 2nd generation device currently available. Magnification 4.7x, field of view 10 deg., Lens system 1.2, recognition range 300m. interpupillary distance 58 - 72, dyoptric correction +-4. Powered by 9 volt battery (approx 8 hr battery life). Weighs only 1.9kg. Compact size 300 x 140 x 110mm. Very limited quantity available. Can be adapted to camera mount (optional - $69 ea ), I/R illuminator (optional - $39 sold only with monocular). $529.00 Ea /50 , $569.00 Ea /20 , $599.00 Ea /10 . TE574 If you have any questions regarding the offers in the news bulletin you are invited to contact us. This news bulletin is brought to you by Surplus Traders P.O. Box 276 Alburg, VT U.S.A. 05440 TEL - 01-514-739-9328 FAX - 01-514-345-8303 E-MAIL - WEB SITE - http://www.73.com/a/ ************************************************************************** 3)From: Alan & Teresa Greatorex Subject: Re: Car Bug >>>> > Need Help > Can somebody tell me where I can find information on car bugs? For > example, how do they work? How far can they detect? Does a car have to > be running in order to be detected, etc? > > Thanks, > Mhagan@sprintmail.com > I'd also like to add my voice to Marv's, because this is his second post and no one seems to know anything about this subject. What's the deal with this, dosen't anyone bug cars? Neither of us are PI's, but we'd just like some information or at least where to find out something on the Net. After all, why should the dirtwads who stole our privacy know more about this than we do? Thought the purpose of this list was to help other members obtain knowledge. Anyone???? Thanks, Teri and Marv <<<< 27)From: SpyKing@thecodex.com Subject: Car Bug Response There have been several requests for info on vehicle surveillance devices so I'll take a stab at this one... There are two MAIN reasons to "bug" a car... first... to listen to conversation of vehicle inhabitants and second...to ascertain vehicles location. Listening can be accomplished by placing a wireless microphone inside vehicle in a number of ways... 1. Simple battery type operated device that requires retrieval and battery replacement. Requires moving listening post in proximity of target vehicle. 2. Wiring a device into vehicles power source. Device draws it's power from car battery. Requires moving listening post in proximity of target vehicle. 3. Pager activated device. Wireless microphone that is activated silently by being "paged". Advantage is transmitter is dormant when no active surveillance. 4. Cellular car bug. Wireless microphone that is cellular activated. This is a circuit that contains wireless microphone attached to cellular phone components. Listener simply "calls" bug and "bug" silently answers and connects to wireless microphone in car. Audio is transmitted over cellular network. These devices are normally scrambled. Listening post is "anywhere" one can make phone call from. Active listening is terminated by simply "hanging up". Advantage: No physical tail necessary. 5. Hidden voice activated recorder tape recorder... The poor man's way... but it works (as long as the radio isn't on ;-) ... usually used by a suspicious spouse... Vehicle location can be accomplished in a number of ways: 1. Radio beacon homing device. Either battery operated and placed under vehicle normally by means of a powerful magnet or wired into vehicles power source. Disadvantage. Requires physical tail in close proximity. 2. GPS tracking. Requires a transmitter placed on vehicle. Advantage is some systems require no physical tail. 3. Trackdown System (invisible spray). Advantage is no radio beacon. Tail can follow from great distance. The high tech answer to a bucket of paint underneath with a hole in it... 4. Infra Red Strobe. Placed on vehicle. IR Strobe flash is invisible to human eye but can be seen for many miles at night from the air by using night vision equipment... <<<< Dear Frank, Thanks for taking the time to answer my request, as well as Marv's. I received an e-mail from my buddy, and he was very happy that you replied. It was also good to see the post from Jim on your site. All your list members would benefit from his knowledge as well. I'm very fortunate to receive post's from you both. If you think writing a Congressman is worth it, then I will do so. Thank's again, SpyKing. Teresa +++Moderator's Note+++ You are very welcome... I do think it's worthwhile letting your congressman know about the "flawed" Title III law... I've personally sent a few messages in the last two days... ************************************************************************** 4)From: strider@mail2.quiknet.com Subject: Re: Cracking Word Passwds There is software to crack winwowrd password. I used to have it but lost it when I formatted, I got it from www.silitoad.org, it's proably still there. > Subject: Cracking Word Passwds > > Is there a relatively simple way to crack Word 6.0 & up passwords > (document specific password)? > > As this is business related, I'm hoping you can respond soon. > > Thanks! > Chris Larson, Wage Slave. > ************************************************************************** 5)From: BADCOFFEE@aol.com Subject: "My" choice of lock Hi guy's. I know this is not alt.locksmith but I did feel this was a security issue. Gentleman asked a question of "my" choice of lock....... He writes- << Therefore, if you had a facility that needed to be secured and you were forced to use a padlock, what kind would you use for your own peace of mind? >> Greg, Ow my......UNQUESTIONABLY the Master PRO series. This thing is a monster. Spool pins, hardened and completely encased shackle (cant get to it to cut). Sears carries them (cant miss it, it looks like no other padlock). Home Depot carries them also. Price is $25 bucks and worth a LOT more. Here is the Pro Series site: http://www.masterlock.com/proseries.html This is the lock that I would use to secure a chasity belt. No question about it. Funny.....Master is one of the least secure of all locks on the market........and then they come up with this monster. Hope it helped :-) Augie ************************************************************************** 6)From: CrACKeD Subject: RE: PCS - Eavesdrop? > I remember reading about a team of cryptanalysists who were able to > decrypt the signalling info on AT&T's digital-cellular network with > relatively little computing power -- maybe that's what your friend was > thinking of. I would remember hearing if they found a significant hole > in GSM's digital encryption. But if they did, then it was most likely > not GSM (which I'm still considering the only true PCS) but one of the > other systems in use for "PCS" phones. This crack only applies to CMEA which is used for American PCS systems. If I remember correctly, GSM uses the TDMA protocol, whereas PCS uses the CDMA protocol, so this may only apply to PCS as of yet. The fact that a vunerability has been fuond still doesn't mean your actual voice comms can be monitored, it only means your dialed numbers can be decoded. Much more info is available at www.l0pht.com/radiophone/cmea.html. CrACKeD ************************************************************************** 7)From: Jim Motes Subject: Re: Identify the Bug Is there an FCC label on the item? If so take the number, call the FCC and ask who the manufacturer is. Jim Motes Managed Information Technologies 10855 Lee Highway, Suite 325 Fairfax, VA 22030 703-218-0765 ************************************************************************** 8)From: "M. J. Van Ham" Subject: Re: Secret Message contest >No one has won yet... that FREE prize for the winner is still available ;-) >Checkout: http://www.thecodex.com/cypher.html Maybe a hint as to what program you used? ;) We've already discovered that the message is indeed inside the logo .GIF on the page, but with so many different programs out there that do the same thing, the numerous software/password/encryption-type combinations are daunting. +++Moderator's Note+++ I'll do better than that... I tell you that the password is a simple "phrase" in plain sight, on one of the pages located at the Codex Site ;-) ************************************************************************** 9)From: BADCOFFEE@aol.com Subject: The old way....still works Im sure a LOT beats the old fashoned way of doing things. BUT, don't feel powerless if you are not a electronics engineer, a specialist, a computer guru or have contacts in the CIA. The old way....still works and works very well. Don't find yourself caught up with the super high tech enviroment and feel a bit of pitty simply because you don't have when the "big boy's have" (Not an ounce of disrespect intended to the professionals here, NOTHING replaces experience) A piece of a letter that I sent to a friend.... Starts here: "A friend of mine needed a personal adress of a business owner for legal reasons. Let the Pi's do the computer thing........I'll do things MY way. I took 3 bags of his garbage and found his home adress, licence number, ss#, His wifes name, His kids names and personal information that you would NOT believe. (lucky bags) BUT..........Michael......i will remember the odor for the rest of my life." (end) Did i get the jobe done? You bet i did. My friend didn't know a damm thing about what I went through, nor did I care to tell him. People don't care much how you get information.....just as long as you get it. On a different note: I am NOT qualified to make any comment on the activities of a PI. They certainly do amaze me with the "raw" knowledge that they hold within. If something is serious, it is very foolish to take care of the problem yourself unless qualified or p*ss poor like me. My personal note: If you get into any trouble in your lifetime........Think about hiring a good PI as well as a lawyer. A lawyer knows the law. The PI knows how to get the information that a lawyer could never on his own. "The secrets of the world are right under your nose" :-) Augie ************************************************************************** 10)From: SpyKing@thecodex.com Subject: Re: Video Surveillance Detector >>>> I just found this stuff on the net in the American Innovations website. I've seen audio surveillace detectors before but is it really possible to detect video surveillance? If it's a wireless video transmitter, it is possible. But what if it was a video camera with cables hooked up to a VCR next room? If anyone on the List used this stuff before and if it's good as it says then let the List know. Here's the website - http://www.spysite.com/counter.html <<<< Yes it is possible to detect video surveillance but highly unlikely that this device will do it... The device depicted on this web site is basically a high priced field strength meter with some bells and whistles... It is prone to false alarms and not dependable... It was designed to be worn on the body to alert the user by silently vibrating if someone in the users presence is wearing a "body wire" (RF wireless microphone) or operating tape recorder... It was NOT designed to do TSCM... The unit has an operating detection range for RF of: Frequency Response: 10Khz to 1000Mhz (1 Ghz) The units range for Operating tape recorder detection is: VLF Magnetic Response: 38-45 kHz This units optimal detection range for tape recorders is one to three feet. That means handshake distance. It will NOT detect a briefcase recorder or recorder hidden somewhere in a room unless you are within 1-3 feet from the operating device... I have worn recorders in an ankle holster that this unit did NOT detect... It ONLY detects tape recorders with a magnetic bias oscillator. One such recorder is the Panasonic RN-36 It is also interesting that this fellow sells the unit for $100. less than the manufacturer... apparently it's a knockoff... ************************************************************************** 11)From: John Palmeri Well, I did it! I am out of the "LURKER" closet. > >I work for an agency in the Pittsburgh. Pa. area. It will remain nameless. >My specialty is surveillance. My interest is in both stationary and >moving surveillance. I also do a lot of video work, so I am always looking for >better video equipment, including body cams, etc. > >It's not as dark out here as it is int the closet!(*grin*) > >Dave > >P.S. Anybody else in there, come on out. > Dave, Rock House Products offers a wide selection of covert and overt video surveillance equipment. You can visit our new Web Site at: http://www.rock2000.com We are still in the process of adding the equipment we carry to our Web Site so if you need something you do not see feel free to contact me. Best Regards! John Palmeri -- Rock House Products P.O. Box 2001 Monroe, New York 10950 USA Our NEW Web Site and E-Mail address is: http://www.rock2000.com sales@rock2000.com Phone +01-914-692-4077 Fax +01-914-692-4299 Visa & MasterCard are Accepted ************************************************************************** 12)From: SpyKing@thecodex.com Subject: Upcoming Seminars & Conventions Hacking in Progress in the Netherlands: http://www.hip97.nl/ August 8,9,10 H.O.P.E. Hackers on Planet Earth in New York City: http://www.hope.net/ August 8,9,10 Methods of Surveillance & Eavesdroppping in New York City: http://www.thecodex.com/methods.html August 6,7 ************************************************************************** 13)From: Allen Crisell Subject: Re: Identify the bug Allen wrote: > >It could be the same type > > cause I remember felt but color Hmmm and the plastic box was clear > > although differences like these would be just a different batch from the > > same supplier. Trace wrote: > If it's the company I'm thinking of, they also made > some with brown plastic boxes and red felt inside. Also they were made > in China. > -- Thanks Trace, now I have a definite start! Thanks again. 8-) Allen Crisell ************************************************************************** 14)From: "Michael W. Everhart" Subject: "HELP WANTED" Sporting Event Surveillance INVESTIGATORS WANTED FOR PIRACY SURVEILLANCE Central Investigative Services, is again seeking Investigators, nationwide, to conduce spot checks(surveillance) of sports bars and other establishments for places illegally showing fights and sporting events. Central Investigative Services pays competative rates, per establishments illegally showing these events. The next "BIG" event is on June 28, which will be one the the biggest events this year. If you are interested in completing this type of service or wish to receive additional information, please return the following information, via email, asap. Agency Name: Owners Name: State of City Licensed: Address: Telephone: FAX NUMBER: Area you are interested in covering: Number of Investigators you will have avaliable: Do you have experience in this type of surveillance: Central Investigative Services posted this notice a few months ago, and the response was overwelming. Those who provided the requested information were contacted. Most of the initial information is sent via fax, and some of the responses did not include their fax number. We a looking to heavily cover this event, with as many investigator as possible. Michael W. Everhart, Owner Central Investigative Services Clinton, Missouri (816) 885-7585 e-mail: cis@smartnet.net http://www.smartnet.net/~cis ************************************************************************** 15)rom: "Ken Lowndes" Subject: Controversy:[Post] Frank; First of all, why are you HQ'd in NYC? Is it that secure? I recently left New Jersey.....close enough! I see that someone is thinking your list is infested with "facists." Maybe he or she thinks this of you as well. What criteria is defining "facists."? Anyone who proposes solutions? Or dares to "imagine" what they are? I doubt that opposing the drug trade, intelligently, is enough to be descriptive of what is or is not a "facist." To be historicly accurate, as well as controverial to the Max, =>every<= 20th Centruy Tyrant has been fundamentally a facist. From Hitler to Stalin to Lenin to Mao Se Tung to Pol Pot to Ho Chi Ming to Musolini [help me with the spelling, Frank], to the current administration, the US supreme Court, ect., et al, ad nausem. There is just ONE item that WithOut a single Exception, all believe or belived in---and it is currently taught, BY LAW [or under color thereof], exclusively, throughout our nation's government schools.... and it is a blind Belief in Evolution. Evolution is the single thread that ties all of these various individuals and entities, together. [If you look at the results for the common thread, you are not looking at where and how it all begins]. But now, in the midst of the world's leading scientists all wanting to bail out and off the sinking ship of Evolution, and board the lifeboats, along comes some of the world's most infuential religious "leaders" to the mothballed 'good ship' Evolution's rescue. What will they think of next? [Aaaah! It is True then that history repeats itself!]!!!! ==>Why jump on the Titanic AFTER it is clearly sinking? Thanks, Boss Frank....I finally know your name, or do I? Sincerely, Ken L Lowndes royal@fullnet.net +++Moderator's Note+++ Why base in NYC? Simple. Like the song sez "My kind of town, Manhattan is..." Regarding someone thinks I'm a "facist"? I don't mind... I've been called a lot worse ;-) You can call me anything you want as long as you post something of value to the list... ************************************************************************** 16)From: "John K." Subject: Info on HERF and van eck equipment? I know THECODEX has some excellent info on the Van Eck and Herf but I am trying to find something more detailed on both subjects. So far I can not find anything on Herf except by Thecodex. There is a lot of talk on what these items can do but I would like to see more than coversation, I am looking for actuall experiments, plans, tests, etc... I have done some searching on the net, but so far nothing really comes close to what Thecodex and tsc-global carry. And I really want more information than that. Thanks! ************************************************************************** 17)From: Julian Assange Subject: Netscape Bug Netscape NEW YORK (CNNfn) - A serious new flaw that affects all versions of Netscape Communications Corp.'s popular Navigator Internet browser software -- including the final test version of its Communicator Suite released Wednesday -- has been uncovered by a Danish software firm, CNNfn has learned. The bug was reported by Cabocomm, a software company located about 100 miles west of Copenhagen, Denmark. The bug makes it possible for Web-site operators to read anything stored on the hard drive of a PC logged on to the Web site. After the firm reported the bug to CNN Financial News, CNNfn and PC Magazine tested the bug by creating and storing a document on a PC's hard drive in New York. Seconds later, the Danish company read it. As further proof, CNNfn and PC Magazine created another document which the Danish company was also able to read. Larry Seltzer, technical director of PC Labs, was among those who helped verify the bug report. He said it would take a somewhat savvy computer user to exploit the bug. "They have to be seeking information from your system and they also have to know the file name. It's not that hard for somebody who's looking to make trouble, but they do have to be looking for it," Seltzer said. "It's serious in that it's in the [actual] browser ...whereas previous bugs generally required the user to have downloaded an additional product," Jim Wise, UNIX administrator for CNNfn, said. CNNfn's test showed that Internet security firewalls offer no protection from the bug. Mike Homer, vice president of marketing for Netscape, said the company takes this and all bug reports seriously. (83K WAV) or (83K AIFF) The Danish company says the reward of $1,000 and a T-shirt is "insultingly low" considering the extent to which the bug report is likely to worry Netscape users. Cabocomm said it would accept "reasonable compensation" for the technical information -- or they can send a Netscape representative to Cabocomm and get it for free. CNNfn, PC Magazine and the Danish company will not release technical details on the bug until Netscape has prepared a bug fix. The reason CNNfn is not reporting the specifics of the bug is to avoid anyone exploiting it. Until the bug is fixed, confidential letters, business spreadsheets -- everything on your PC -- can potentially be pilfered. The Danish company says it won't exploit the bug, but has no idea if someone else has found the same bug and is compromising a system's integrity. +++Moderator's Note+++ Interesting development and how timely... please read this segment of the current Title III law and give me your feelings if you think Netscape violates this statute... Here is a quote from the law in question: "any person who manufactures, assembles, possesses, or sells any electronic, mechanical, or other device, knowing or having reason to know that the design of such device renders it primarily useful for the purpose of the surreptitious interception of wire, oral, or electronic communications," I urge you EVERYONE on this list to read this law: http://www.law.cornell.edu/uscode/18/ch119.html What do your think list? Does this "bug" in Netscape allow for the "surreptitious interception" of electronic communications? Should the government indict Netscape like they did Daggett & Walz? Maybe Netscape knew about the "bug" maybe it didn't... But it still exists and allows "surreptitious interception"... I would REALLY like to hear from ALL list members who can give examples of common everyday items, products, mechanical or electronic and/or software that in your opinion would be in violation of this law... I will compile and post results to the list... ************************************************************************** Who are you? What's your specialty and/or interest? Let us know about your company... What would you like to see on the list? Post it. Let us know... Do you have something to contribute? We'd like to hear it... We want to know EVERYTHING and ANYTHING about eavesdropping, surveillance, countersurveillance & privacy related technology, etc... Remember: who, what, where, when, how & why... we want ALL the details... Do you have a question? Post it... A little free time? Help a member... With the INCREDIBLE brain power on this list, someone should have the answer ;-) P.S. Don't be a LURKER... Members take the time to post info for us all... give something back... Don't just take... Your input/knowledge is valued... ************************************************************************** Send Postings to: spyking@con2.com with "Post" in subject field with subject ************************************************************************** Subscribe to: spyking@con2.com In the subject field type: subscribe-surveillance list e-mail address ************************************************************************** Unsubscribe to: spyking@con2.com In the subject field type: unsubscribe-surveillance list e-mail address ************************************************************************** ...The Simple Rules of the Surveillance List... The Surveillance List Owners may Reject any posts that are/contain: 1) Info Unrelated to Eavesdropping, Surveillance or Privacy technology... 2) Flames or Negative posts... 3) E-Signatures that are considered excessive... 4) Advertisements not DIRECTLY related to the list topics... 5) Attached Files... 6) Oversized Posts... (May be edited to save room) **************************************************************************** This publication is copyrighted and is protected by U.S. and International copyright law. The information transmitted on this list may not be reproduced, reposted or forwarded to any non-list member without expressed written permission of the List Owner. Violation of U.S. copyright law is a criminal and civil offense... **************************************************************************** The Surveillance List is Moderated by SpyKing@thecodex.com The List Owner will make EVERY effort to protect subscribers from spam... Copyright 1996, 1997 Codex Publishing Inc., All Rights Reserved... **************************************************************************** ****************************************************************************** Vol.Two Issue #137 The Surveillance List June 14,1997 Over 2200+ Members Worldwide Representing 46 different countries List Chat at: http://www.thecodex.com/chat.html ****************************************************************************** IN THIS ISSUE... ****************************************************************************** 01) Dummy Cameras 02) 11th Annual Police/Security Expo 03) Re: Car bugs 04) State Reps Response / Title III 05) Re: Netscape Bug 06) Re: Identify the bug 07) Legal defense fund 08) FTP snooper search 09) Re: Invisible ink pen 10) Re: Title III law 11) Re: Need help, recieving threats 12) Van eck, etc... 13) Car Bug Response 14) Federal Surveillance Equipment Manufacturer/Dealer License 15) Company Introduction - Israel 16) Thanks on Car Bugs 17) W A R N I N G: NETSCAPE SPY "BUG" ****************************************************************************** DON'T BE A LURKER.... GET INVOLVED... YOU ARE A MEMBER... MAKE THE MOST OF IT ****************************************************************************** 1)From: "Lorenzo Castillo Sanchez" Subject: Dummy Cameras I was looking for something like this before and I finally found it. What if there was a fake security camera ? It looks real on the outside but it's empty with no circuitry inside. It wouldn't record anything but it might discourage people to try jumping over your fence. It's about UKP 25.00(About $40, I guess). It won't cost me that much compared to the actual security cameras. Then again, maybe I'll order a small video transmitter for about $120 and put it inside the dummy cam. Here's where the dum-cam is ===>> http://www.maplin.co.uk/dissp97/dumcam.htm BTW - Is anyone going to try out the new TRVD-900 Tape Recorder+Video Detector($495) ?? Check it out ==> http://www.spysite.com/counter.htm +++Moderator's Note+++ Why don't you just order a "dummy" video transmitter to attach to the "dummy camera... it will probably be cheaper and you won't get a picture anyway... regarding the "tape recorder-video camera detector" see my post yesterday and save yourself some money... ************************************************************************** 2)From: SpyKing@thecodex.com Subject: 11th Annual Police/Security Expo On June 24 & 25, 1997 the 11th Annual Police/Security Expo will take place in its new home, the brand new "state-of-the-art" Atlantic City Convention Center. Police/ Security Expo'97 is the only show of its kind created with the sole purpose of displaying the latestproducts and services available to Law Enforcement, Security and Government Professionals. Over 6,500 Law Enforcement and Security Professionals are expected to attend this two day event. The Exposition is heralded as a "supermarket of information" unveiling the latest technology to serve and protect. Exhibits range from the common flashlight, uniforms and accessories, to elaborate command centers, tactical vehicles and fully equipped police cars. Specialty items such as imaging systems, interrogation techniques training, secure communication systems, body armor, access control devices are among the 300+ different exhibits and educational items on display. Police/Security Expo'97 will showcase the tools of the trade, offering products and ideas to make the Law Enforcement or Security Professional safer on the job. Different seminar programs are offered every hour. Highlights will be a seminar on Computer Crime: "An Investigative Dilemma"; Come and witness a live "wireless video transmission" from a Police car in the expo linked to a location in California; A First-Responders presentation on the TWA Flight 800 disaster; Defensive Shooting Techniques . . . and more! Police/Security Expo'97 is open to the trade during the following hours: Tuesday, June 24, 1997 11:00 am to 5:00 pm Wednesday, June 25, 1997 10:00 am to 4:00 pm The Exposition is sponsored by the New Jersey State Association of Chiefs of Police. For additional information, call Sitework Associates, Inc., Exposition Coordinators, at (609) 466-2111. ************************************************************************** 3)From: mike kessler Subject: Re: Car bugs Dear mhagan, You asked for info on "car bugs," which is somewhat vague. Do you mean vehicle tracking transmitters, which track a car's location, or do you mean audio transmitters for deployment within the interior of a vehicle? If you mean the former, then I see you've already gotten a few intelligent responses and no doubt will receive many more from this knowledgeable group. But if you mean the latter, there are very few voice xmtrs on the market which are specifically designed for use in autos. Actually, any good quality (fixed freq.) device is suitable, but it MUST be modified for attachment to either the vehicle's existing radio antenna, or to a dedicated antenna which is concealed or disguised. The device must put out at least .5 Watt to be effective at a reasonable distance. Mike Kessler ************************************************************************** 4)From: Greg Caldwell Subject: State Reps Response / Title III I received a very similar reply to Sen Moynihan's from Rep. Dan Schaefer. I will let you know of any follow up correspondence. Greg Caldwell ISC Colorado ************************************************************************** 5)From: "The Swordsman" Subject: Re: Netscape Bug Ive heard news very similar to this, a while back but it was INTERNET EXPLORER, not Netscape that had the bug you described. Microsoft was too cocky to admit the software had a flaw that had been uncovered by a group of nerdy college students. ;-) Frank Pagano (a.k.a. The Swordsman) A.S. Criminal Justice-Law Enforcement Auxiliary Police Officer #7144, Nassau County, New York CyberAngels(#IRC226)--Director of Cybercops Team http://www.geocities.com/CapitolHill/7245 ************************************************************************** 6)From: Rick Kidd Subject: Re: Identify the bug The unit you two are discussing sounds like it may be a device manufactured by CONY out of Japan or one other company. Scratch the Cony reference they have models in the 87MHz-108Mhz (FM band) range. The other company is based in Germany, and I can't find the info on them. Rick Confidential Security Services (CSS) Association of Counter Intelligence Professionals (ACIP) ************************************************************************** 7)From: BADCOFFEE@aol.com Subject: Legal defense fund Ok, whatever we do..let's do it quickly shall we. Just DO it and then we'll take it all apart into little peices via forum. My quick comments: When you say a couple of hundred...people run When you say $20......HEY! Anyone and EVERYONE can do that. My personal thaughs: With the most respect, was he a member of this family here? If not, is there any particular reason why not? Doing this makes us somewhat a lobby orginization against the United States Government's actions against this individual. Could we (not individually) be possibly targeted as such if this is sucessfull? Or are we already on that list of honors. I beleive serious matters are NOT to be dealt with in a "I helped a little" way. Hit this thing with the force of an elephant and with the speed of lightning. I once said we are individual fingers.....together we make a hand. In this case a fist. However, we here as a whole represent One little finger to the global surveilance/security force. Someone make quick friends with other forums, get info on organazations where this is in discussion and join forces to do this thing correctly. Let's put some brass knuckles on that fist. Please do NOT turn this thing into a "trust" issue. If this money is use for alternate means there is nothing you can do to stop it. It is quick and simple to not even have to set up a formal "fund". Just make checks out to "cash" and send to his partner. (This is the last place ANYONE would try to pull one over on anyone, I'm sure "someone" here will be following up on that money in their spare time) Do it and lets do it NOW and talk about it later. Mr. Spyking: Ask permission to post his office address or Location to send checks to. Final note: Please......do not EVER feel to hold back anything (ever) that might contrast another members opinion. We would never cast you for saying "ah let him rot, I don't care". If we did, wer'e not worth talking to. Speak up. Fund: Be it $200 or even ONE dollar. Help out. ONE last thing and VERY important: I would assue the majority of us are men. If this was a "little lady in distress"......how would your feelings toward financial contribution be effected? Ok then..me too. Just put a little skirt and cowboy boots in your visual and send a check then. (you should see my visual......my wife would kill me) Augie Anyone know anything about prison locks? <----kidding! ************************************************************************** 8)From: Jason William RENNIE Subject: FTP snooper search To the SpyKing, Are you aware your FTP snooper finds lots of hits when told to search for passwd ?? In particular it finds a lot of world readable (chmod 444) /etc/passwd files. It also finds some root only readable (chmod 400) shadow files. I'm not sure if you know and dont care or were unaware of this but i felt i should bring it to your attention. I enjoy viewing your site and would hate to see it closed down through the actions of some cretin somewhere doing something stupid. Jason =8-] +++Moderator's Note+++ My File Snooper at: http://www.thecodex.com/warez.html is NOT responsible for lack of security at remote sites... THEY ARE... if someone wants to exploit that lack of security how can I stop them? By shutting down a resource at my site? I don't THINK so... The FILE Snooper was created to assist Net Surfers in legitimate research... I do NOT endorse it's use for any other purpose... Question: Regarding the recent thread on the "flawed" Title III law: Does anyone think the File Snooper in violation of Title III laws? What do you think list? ************************************************************************** 9)From: "Charles Branstool" Subject: Invisible ink pen? I'm looking for a pen (preferably ball point) with ink that vanishes over a 24 hour period. Anyone with information please contact me. Thank you. ************************************************************************** 10)From: "M. J. Van Ham" Subject: Re: Title III law >possesses, or sells any electronic, mechanical, or other device, knowing >or having reason to know that the design of such device renders it primarily >useful for the purpose of the surreptitious interception of wire, oral, or >electronic >Maybe Netscape knew about the "bug" maybe it didn't... But it still exists >and allows "surreptitious interception"... The law reads: "knowing or having reason to know". I don't speak legalise very well but it seems to be that as long as Netscape can prove that they didn't know about the bug then they're out of harms way. >I would REALLY like to hear from ALL list members who can give examples >of common everyday items, products, mechanical or electronic and/or software >that in your opinion would be in violation of this law... I will compile >and post "renders it primarily useful for the purpose of the surreptitious interception of wire, oral, or electronic". Wouldn't that include mini-tape recorders? I use mine to record lectures in school, but it could be just as easily slipped in someone's car or knapsnack to "surreptiitously intercept" oral communication.. Seems like a rather constraining law. As I live in Canada I assume this doesn't apply to me, but does anyone know if there is a similar type law in Canada? +++Moderator's Note+++ >"Wouldn't that include mini-tape recorders"? Yes it would... can you imagine the ramifications if overzealous law enforcement officals starting arresting people for possesion of a tape recorder? ... or ANY recording device? According to this law it MAY be possible... Are you starting to see the problem? The fact that you "record lectures in school" could ALSO be illegal in this country. See http://www.thecodex.com/consent.html for details on one or two party consent states for "surrepticious recording" of conversations... If any non U.S. list members can get a copy of their country's law on eavesdropping and/or possesion or sale of eavesdropping equipment, we'd appreciate it if you would send to list and we will post... ************************************************************************** 11)From: graywolf@fox.nstn.ca Subject: Re: Need help, recieving threats >From: "Casey Visco" >Subject: Need help, recieving threats >All, >I have been recieving e-mails from someone who keeps saying that >they are the God of Computers and that they have hacked me. If >anyone can help me figure out who this little punk is, let me know. To: Casey and those who have offered to help There has been someone posting to usenet calling himself "computer god" and claiming to be a system engineer for a company I haven't been able to find. Check the host names in the headers. If you are not sure what you're looking for, forward me the complete post with all headers. If it comes from either htonline.com or uu.net let me know either by posting to the list or direct email - I may have a name address and phone number for you. He wouldn't be the first one who couldn't outrun the wolfpack. Regards graywolf ************************************************************************** 12)From: Chris Kuethe 768 Subject: Van eck, etc... i have about a meg (compressed) of pdf and text files i can post to the list... ok, i'll stop threatening your mailboxes like that. mail me if you want them. alternatively, check http://www.ualberta.ca/~ckuethe/crypto.html it's the section on TEMPEST and anything else with van eck in it's name. PLUR chris Chris Kuethe LPGV Electronics and Controls 'finger -l ckuethe@gpu.srv.ualberta.ca' for pgp keys http://www.ualberta.ca/~ckuethe/ RSA in 2 lines of PERL lives at http://www.dcs.ex.ac.uk/~aba/rsa/ print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<> )]}\EsMsKsN0[lN*1lK[d2%Sa2/d0>>> It shall not be unlawful under this section for - (a) a provider of wire or electronic communication service or an officer, agent, or employee of, or a person under contract with, such a provider, in the normal course of the business of providing that wire or electronic communication service, or (b) an officer, agent, or employee of, or a person under contract with, the United States, a State, or a political subdivision thereof, in the normal course of the activities of the United States, a State, or a political subdivision thereof, to send through the mail, send or carry in interstate or foreign commerce, or manufacture, assemble, possess, or sell any electronic, mechanical, or other device knowing or having reason to know that the design of such device renders it primarily useful for the purpose of the surreptitious interception of wire, oral, or electronic communications. <<<< If I interpret this law (I am NOT an attorney) correctly, it discourages free trade by outlawing development of new products (without specifically saying so). How can one with a good idea for a NEW type of surveillance device LEGALLY design, advertise, assemble, manufacture or sell his idea? According to the law he must FIRST be under contract with a governmental agency... There are MANY trade shows around the country with surveillance equipment vendors attempting to sell their products to bona fide law enforcement agencies. Without a "License" and one does not presently exist... these companies, their employees AND the people who run the trade shows could be criminally charged at the discretion of the government. If this "flawed" law is not changed to "license" bona fide surveillance equipment design and manufacturing firms I predict that public law enforcement and the security industry as a whole will suffer. Surveillance equipment engineers will be discouraged from designing, and eventually the design experts will seek other avenues of revenue. The surveillance industry's design infrastructure will simply cease to exist. Selective prosecution of surveillance equipment companies will cause prices to skyrocket at least... providing the industry does not grind to a halt in protest. Suppose homicides were to cease in this country for a five year period. Through normal attrition we would lose some of our best homocide detectives. Let's say that at the end of that five year period there was a rash of homocides nationwide... Who would investigate? Would the retired homocide detectives still be as sharp after five years of no work if they were to be "brought back"? Would the inexperienced homocide detective working his or her way up the ladder be able to step in and investigate the crime with the same amount of savvy? Profileration of electronic surveillance equipment is certainly politically correct in SOME circles; its price tag a few years down the road may produce sticker shock (or worse). It is time for the "flawed" Title III law to be amended to include a licensing provision for bona fide vendors. Frank Jones ************************************************************************** 15)From: "Amir " Subject: Company Introduction - Israel Hotam Investigations Israel. TL: 972-3-6963060 FX: 972-2-6722234 http:\\www.hotam-il.co.il E- mail : hotam@inter.net.il Hotam began operation in 1982 concentrating on for investigations financial institutions and insurance companies. Hotam currently has 30 employees whose duties are within the framework of the following three departments: Customer Service Department Department of Detection and Investigations Department of Security and Data Protection Hotam is managed by Gideon Narkunski, a former detective from "Yamar", the central squad in the Tel Aviv area of the Israeli police, Ronen Tzirin, whose former army service was in the central squad of special investigations of the investigative division of the Israeli army police- "Metzach", and Menashe Shemesh, a former officer of the elite commando unit in the Israeli army. Hotam's clients include governmental institutions, financial institutions, insurance agencies, public companies, private businesses, local chains, city municipalities, kibbutzim, health institutions, universities, law offices, accountants, economists and more. The company employs licensed private investigators, economists, computer specialists, former Israeli army police investigators from "Metzach", personnel from special elite army units and general security services. In the company there exists defined subdivisions between the different departments. These subdivisions are the basis of all company action in order to maintain the highest standards of confidentiality concerning the company's clients and operations. HOTAM ltd (israel) TL : 972-3-6953060 FX : 972-3-6722234 E-mail: hotam@inter.net.il http:///www.hotam-il.co.il ************************************************************************** 16)From: Marvin Hagan Subject: Thanks on Car Bugs Thanks to all of you that replied to my request on 'car bugs'. Your information was more than informative it was extremely helpful in giving me a better understanding of what I expected; Yes-cars can be bugged for both survellance and listening. Special thanks to Teresa,(I know our out there somewhere), for your support as well. (They didn't respond to me (smile)-:) ************************************************************************** 17)From: Ian Goddard Subject: W A R N I N G: NETSCAPE SPY "BUG" SPREAD THIS FAR & WIDE CNN just ran a special report revealing the existence of a so called "bug" in NETSCAPE that allows a host's system from which you download a webpage to access any file on your computer. CNN proved that this bug does exist. As CNN states: The bug makes it possible for Web-site operators to read anything stored on the hard drive of a PC logged on to the Web site. The host site must know what files to look for. Interesting that, in the course of my TWA 800 research, while accessing some U.S. military webpages that once existed but now would no longer come in, the small icons on the lower right hand side of my screen would indicate that quite a lot of data was being uploaded to the host server. The lights would go from the icon representing my computer to the host computer for almost a minute, the opposite of the normal download light sequencing. My hard drive would also be activated during this time. Gee whiz... ?? Such as this military URL on CEC: http://130.163.113.252/cec_eng.htm Probably there's another explanation for the reverse sequence, but in light of this report, it's worth pondering. I find it rather strange that there would be a "bug" that just happens to perform such an underhanded function. Is not a "bug" defined as something that prevents, not facilitates, a function? Something that would allow me to target and acquire a file on a remote computer would seem to be a function. It would therefore seem that this function cannot be defined as a "bug." If the host can target a given file, this is not a bug but a secret program in the program. I further suspect that the host could enter a command to find all files that are for example twa*.* and thus all files with "twa" at the beginning would be lifted off one's system. I wonder what other convenient "bugs" might lurk inside the rat-fink NETSCAPE program. I wonder if this is not grounds for a class-action law suit, if it could be proven that the "bug" is no accident. That it just happens to be in all versions of Netscape including their latest version released yesterday is a little hard to dismiss as error. I'm sure any qualified programmer could determine if it is by error or design. It could be a means by which to steal the source codes of programers that they develop, where the thief has a clue about possible file names for those codes. NETSCAPE BUG: http://cnnfn.com/digitaljam/9706/12/netscape_pkg/ ************************************************************************** Who are you? What's your specialty and/or interest? Let us know about your company... What would you like to see on the list? Post it. Let us know... Do you have something to contribute? We'd like to hear it... We want to know EVERYTHING and ANYTHING about eavesdropping, surveillance, countersurveillance & privacy related technology, etc... Remember: who, what, where, when, how & why... we want ALL the details... Do you have a question? Post it... A little free time? Help a member... With the INCREDIBLE brain power on this list, someone should have the answer ;-) P.S. Don't be a LURKER... Members take the time to post info for us all... give something back... Don't just take... Your input/knowledge is valued... ************************************************************************** Send Postings to: spyking@con2.com with "Post" in subject field with subject ************************************************************************** Subscribe to: spyking@con2.com In the subject field type: subscribe-surveillance list e-mail address ************************************************************************** Unsubscribe to: spyking@con2.com In the subject field type: unsubscribe-surveillance list e-mail address ************************************************************************** ...The Simple Rules of the Surveillance List... The Surveillance List Owners may Reject any posts that are/contain: 1) Info Unrelated to Eavesdropping, Surveillance or Privacy technology... 2) Flames or Negative posts... 3) E-Signatures that are considered excessive... 4) Advertisements not DIRECTLY related to the list topics... 5) Attached Files... 6) Oversized Posts... (May be edited to save room) **************************************************************************** This publication is copyrighted and is protected by U.S. and International copyright law. The information transmitted on this list may not be reproduced, reposted or forwarded to any non-list member without expressed written permission of the List Owner. Violation of U.S. copyright law is a criminal and civil offense... **************************************************************************** The Surveillance List is Moderated by SpyKing@thecodex.com The List Owner will make EVERY effort to protect subscribers from spam... Copyright 1996, 1997 Codex Publishing Inc., All Rights Reserved... **************************************************************************** ****************************************************************************** Vol.Two Issue #138 The Surveillance List June 16,1997 Over 2200+ Members Worldwide Representing 46 different countries List Chat at: http://www.thecodex.com/chat.html ****************************************************************************** IN THIS ISSUE... ****************************************************************************** 01) Methods of Eavesdropping & Surveillance Seminar 02) Re: W A R N I N G: NETSCAPE SPY "BUG" 03) NON-LETHAL GUN? 04) Netscape target of blackmail 05) Netscape Exploit... with technical details 06) Canadian Criminal Eavesdropping Law 07) FCC rules? 2nd request 08) Re: Netscape bug 09) Battery 10) POCSAG Decoder - pocdec1.zip - v1.00: Multiple bps decoding 11) Spectre Press 12) Info Update 13) Danny Boy!! 14) Hidden Camera Recordings 15) Need Private Investigator for fraud case 16) Manipulation of Spool and Mushroom pins? 17) Re: HERF ****************************************************************************** DON'T BE A LURKER.... GET INVOLVED... YOU ARE A MEMBER... MAKE THE MOST OF IT ****************************************************************************** 1)From: SpyKing@thecodex.com Subject: Methods of Eavesdropping & Surveillance Seminar Live from New York it's the event of the year! Thursday, August 7th in New York City The Methods of Eavesdropping & Surveillance Seminar... will include demonstrations of the latest surveillance equipment & techniques plus how to obtain "Hard-to-Get" confidential information... Read all about it at: http://www.thecodex.com/methods.html Special Discount for List Members... This event will coincide with the H.O.P.E.- Hackers on Planet Earth conference in New York City starting Friday Aug 8 through Aug. 10th. http://www.hope.net/ If you are in the business or just "interested" these two events are something you don't want to miss. Rarely do you get a chance to knockoff two birds with one stone and come away with a wealth of information that you can use... If anyone would like to exhibit their products, let me know... ************************************************************************** 2)From: Mutter Subject: Re: W A R N I N G: NETSCAPE SPY "BUG" > SPREAD THIS FAR & WIDE > > CNN just ran a special report revealing the existence of > a so called "bug" in NETSCAPE that allows a host's system > from which you download a webpage to access any file on your > computer. CNN proved that this bug does exist. As CNN states: > > The bug makes it possible for Web-site > operators to read anything stored on the > hard drive of a PC logged on to the Web site. > > The host site must know what files to look for. Interesting > that, in the course of my TWA 800 research, while accessing > I find it rather strange that there would be a "bug" that > just happens to perform such an underhanded function. Is not > a "bug" defined as something that prevents, not facilitates, > a function? Something that would allow me to target and > acquire a file on a remote computer would seem to be a > function. It would therefore seem that this function cannot > be defined as a "bug." If the host can target a given file, > this is not a bug but a secret program in the program. Seems like you're playing the old Microsoft 'bug? nahh, that's a feature' game. :) Take a look around, my friend. There are bugs in many different software packages which cause serious security holes. This is, in no way (depite the media hype) a rare discovery to find a security hole which "performs such an underhanded function." The reason it's gaining so much attention is because of the sheer number of end-users who make use of navigator. > > I further suspect that the host could enter a command to > find all files that are for example twa*.* and thus all > files with "twa" at the beginning would be lifted off > one's system. I wonder what other convenient "bugs" I haven't gotten a chance to read in detail or experiment with the bug but I will refer you to the part of your own post where you say "The host site *must* know what files to look for." If the bug allowed you to grab "twa*.*" or (taking it a logical step foward) "*.*" then I hardly think that the "site must know what files to look for." The point is chances are they need _exact_ filenames, i.e. "C:\autoexec.bat" Of course, this hardly makes the bug any better... > might lurk inside the rat-fink NETSCAPE program. > > I wonder if this is not grounds for a class-action law > suit, if it could be proven that the "bug" is no accident. Ha! Good luck. Paranoia is good. But in this case it is unfounded. If people sued software companies for releasing software with security bugs some of the big name software companies would be a lot less successful and I'd be a rich man... > NETSCAPE BUG: http://cnnfn.com/digitaljam/9706/12/netscape_pkg/ - M u t t e r Ed. root zine (http://www.openix.com/~mutter) mutter@openix.com ************************************************************************** 3)From: "Navarra" Subject: NON-LETHAL GUN? To drop off to sleep Can somebody tell me where I can find NON LETHAL GUN with Sleeping dart for humans use only :-) From Navarra at Lisbon SecurCorp@IP.PT ************************************************************************** 4)From: anarchie@heartland.suburbia.net (Peter Tonoli) Subject: Netscape target of blackmail Danish consultant seeks cash for details on apparent bug in Web software Published: June 13, 1997 BY DAVID L. WILSON Mercury News Staff Writer [INLINE] An individual claiming to be a Danish computer consultant has identified what appears to be a serious security problem in Netscape Communications Corp.'s widely used Web-browsing software. But in an apparent case of global high-tech blackmail, he is refusing to help Netscape fix the flaw unless the company hands over far more than the $1,000 bounty it typically pays people who find significant bugs, the Mountain View-based company said. The consultant, whose identity remains unknown, Thursday made good on his threat to take the glitch public and embarrass Netscape during the company's developers' conference in San Jose this week unless he was paid. Netscape had refused to wire money to the Dane's overseas bank account, as he had allegedly demanded earlier this week. The flaw, which Netscape engineers have not yet studied, lets a malevolent Web site designer build a Web page that is capable of reading files stored on the hard drive of computer users who visit the page using Netscape's browser software -- the most widely used in the world. In order to gain access to the user's material, the intruder must know the name of the files, but files in many off-the-shelf programs can be easily guessed by an outsider. For example, if electronic mail is stored using some popular e-mail programs, the file names are often the same on every user's personal computer. Traditional methods of security, such as ``firewalls'' intended to prevent break-ins to many corporate computer systems, offer no protection from the reported bug. Mike Homer, Netscape's senior vice president of marketing, said late Thursday that the company is working on a repair but is progressing slowly because its programmers don't exactly know what part of their software code is flawed. But the company will not bow to extortion, he said. ``We don't bargain with terrorists. It would just encourage this type of behavior.'' Netscape has communicated with the consultant by e-mail but hasn't confirmed the person's real name. Netscape officials have taken to calling the Dane ``he'' even though gender and other identifying characteristics are impossible to determine in cyberspace. The defect was confirmed by PC Magazine at the request of CNNfn, an offshoot of Cable News Network that focuses on financial news. The consultant approached CNN with the information earlier this week. It isn't clear which versions of Netscape's browser software are affected by the problem, but PC Magazine confirmed through its own testing with the Dane that it exists in version 3.01, which is commonly referred to as ``Navigator.'' Navigator and other browsers enable users to locate, read and download information stored on the global Internet. The Danish consultant claims the bug exists in all versions of the software back to 2.0, and in Netscape's new 4.0 product introduced this week, called ``Communicator.'' Engineers can often patch such security holes within hours after they are shown how the flaw is exploited, but because Netscape's software specialists haven't received detailed information about how the flaw works, the detective work is somewhat slower than normal. It's not exactly clear how the hole works, but a Netscape representative confirmed that a Web page built using standard techniques -- using the hypertext mark-up language, or HTML -- would probably not be capable of reading a user's files, as described by PC Week and CNNfn. Assuming that the description of the problem is accurate, it is possible that the flaw is exploiting some vulnerability in techniques used in Java or JavaScript. Java is a programming language. If that's true, users may be able to reduce their immediate risk by turning off the browsing software's ability to interpret Java. In most versions of the Netscape software, that can be done by clicking on the ``Options'' button, then choosing ``Network Preferences'' and finally, ``Languages.'' Removing the checkmarks from ``Enable Java'' and ``Enable JavaScript'' will disable both those functions. They can be easily reactivated if the user needs them to get information from certain Web sites. For example, animated stock tickers on a site might be made possible by Java. The Netscape problem is similar to a series of security flaws that have plagued Microsoft Corp.'s competing browser, Internet Explorer. A Netscape official said the company has not yet decided whether to involve law enforcement. The company never received the Dane's bank account number because it never agreed to pay the consultant. And the consultant hadn't specified exactly how much money he wanted. Extortion attempts have become increasingly common in cyberspace. Blackmailers identify a bug, then threaten to distribute an automated script that exploits the problem unless the manufacturer pays them. Last year, one enterprising person regularly distributed a security flaw each week on the Internet. Each distribution contained an unsuccessful plea for a job from the company that manufactured the products he was targeting. ************************************************************************** 5)From: Rusty Conover Subject: Netscape Exploit... with technical details A vulnerability has been found in all Netscape Web Browsers Version 2.0 - 4.0 that can read files off of the clients machine. Only restriction is that the filename that is desired must be known beforehand. More information about this bug are found here: http://www8.zdnet.com/pcmag/news/trends/t970612b.htm http://cnnfn.com/digitaljam/9706/12/netscape_pkg/ After you have read these so called articles with no real description of the bug I started of thinking of a way to do exploit the bug... In my method JavaScript would have to be used to automatically submit a HTML Form to the server. In these forms a page writer could have already coded the file name into the source document, such as "autoexec.bat". When the browser loads the page off of the server, it submits the form which transmits the file to the server via the HTTP-File upload procedure. The SERVER now has the file the author wanted. To fool the user, the CGI program sends the location of the real web page to the client, and the client doesn't know otherwise. This method would require the files to be small or else the user will notice this is taking a long time to load the page over a modem. But the potential for this exploit to be used over faster transmission lines is greater. To have a solution to this problem would be a warning dialog box, telling the user that they are transmitting a file not just a regular HTTP form. I have not written a single line of code exploiting this potential vulnerability, I might get around to it if I have time. Please note: I sent this original message 1 day (June 12) before to Netscape and now they confirm that my hypothesis was correct on the URL: http://home.netscape.com/misc/security_update.html Wow, and not a letter from Netscape to me personally, I didn't even ask for money. Thank you for your time, Rusty Conover RConover@wyellowstone.com Just another High School student. West Yellowstone, MT 59758 http://www.wyellowstone.com ************************************************************************** 6)From: Jean-Pierre Forest Subject: Canadian Criminal Eavesdropping Law DISCLAIMER: The contents of this post is meant for educational purposes only. I will not be held responsible for anyone's actions but mine. I am not, never have been, and never will be a lawyer. Any resemblance to real persons living or dead is purely coincidental. NOW Here's a few quotes from the Canadian side of the border. If you need additional info you can always e-mail me privately or visit the Department of Justice at " http://canada.justice.gc.ca " Blue Skies CONSOLIDATED STATUTES OF CANADA Criminal Code PART VI INVASION OF PRIVACY Definitions "private communication" « communication privée » "private communication" means any oral communication, or any telecommunication, that is made by an originator who is in Canada or is intended by the originator to be received by a person who is in Canada and that is made under circumstances in which it is reasonable for the originator to expect that it will not be intercepted by any person other than the person intended by the originator to receive it, and includes any radio-based telephone communication that is treated electronically or otherwise for the purpose of preventing intelligible reception by any person other than the person intended by the originator to receive it; Possession, etc. 191. (1) Every one who possesses, sells or purchases any electro-magnetic, acoustic, mechanical or other device or any component thereof knowing that the design thereof renders it primarily useful for surreptitious interception of private communications is guilty of an indictable offence and liable to imprisonment for a term not exceeding two years. Forfeiture 192. (1) Where a person is convicted of an offence under section 184 or 191, any electro-magnetic, acoustic, mechanical or other device by means of which the offence was committed or the possession of which constituted the offence, on the conviction, in addition to any punishment that is imposed, may be ordered forfeited to Her Majesty whereupon it may be disposed of as the Attorney General directs. Possession of device to obtain telecommunication facility or service 327. (1) Every one who, without lawful excuse, the proof of which lies on him, manufactures, possesses, sells or offers for sale or distributes any instrument or device or any component thereof, the design of which renders it primarily useful for obtaining the use of any telecommunication facility or service, under circumstances that give rise to a reasonable inference that the device has been used or is or was intended to be used to obtain the use of any telecommunication facility or service without payment of a lawful charge therefor, is guilty of an indictable offence and liable to imprisonment for a term not exceeding two years. Interception in exceptional circumstances 184.4 A peace officer may intercept, by means of any electro-magnetic, acoustic, mechanical or other device, a private communication where (a) the peace officer believes on reasonable grounds that the urgency of the situation is such that an authorization could not, with reasonable diligence, be obtained under any other provision of this Part; (b) the peace officer believes on reasonable grounds that such an interception is immediately necessary to prevent an unlawful act that would cause serious harm to any person or to property; and (c) either the originator of the private communication or the person intended by the originator to receive it is the person who would perform the act that is likely to cause the harm or is the victim, or intended victim, of the harm. 1993, c. 40, s. 4. Interception of radio-based telephone communications 184.5 (1) Every person who intercepts, by means of any electro-magnetic, acoustic, mechanical or other device, maliciously or for gain, a radio-based telephone communication, if the originator of the communication or the person intended by the originator of the communication to receive it is in Canada, is guilty of an indictable offence and liable to imprisonment for a term not exceeding five years. Other provisions to apply (2) Section 183.1, subsection 184(2) and sections 184.1 to 190 and 194 to 196 apply, with such modifications as the circumstances require, to interceptions of radio-based telephone communications referred to in subsection (1). 1993, c. 40, s. 4. One application for authorization sufficient 184.6 For greater certainty, an application for an authorization under this Part may be made with respect to both private communications and radio-based telephone communications at the same time. 1993, c. 40, s. 4. Application for authorization 185. (1) An application for an authorization to be given under section 186 shall be made ex parte and in writing to a judge of a superior court of criminal jurisdiction or a judge as defined in section 552 and shall be signed by the Attorney General of the province in which the application is made or the Solicitor General of Canada or an agent specially designated in writing for the purposes of this section by (a) the Solicitor General of Canada personally, if the offence under investigation is one in respect of which proceedings, if any, may be instituted at the instance of the Government of Canada and conducted by or on behalf of the Attorney General of Canada, or (b) the Attorney General of a province personally, in any other case, and shall be accompanied by an affidavit, which may be sworn on the information and belief of a peace officer or public officer deposing to the following matters: (c) the facts relied on to justify the belief that an authorization should be given together with particulars of the offence, (d) the type of private communication proposed to be intercepted, (e) the names, addresses and occupations, if known, of all persons, the interception of whose private communications there are reasonable grounds to believe may assist the investigation of the offence, a general description of the nature and location of the place, if known, at which private communications are proposed to be intercepted and a general description of the manner of interception proposed to be used, (f) the number of instances, if any, on which an application has been made under this section in relation to the offence and a person named in the affidavit pursuant to paragraph (e) and on which the application was withdrawn or no authorization was given, the date on which each application was made and the name of the judge to whom each application was made, (g) the period for which the authorization is requested, and (h) whether other investigative procedures have been tried and have failed or why it appears they are unlikely to succeed or that the urgency of the matter is such that it would be impractical to carry out the investigation of the offence using only other investigative procedures. Extension of period for notification (2) An application for an authorization may be accompanied by an application, personally signed by the Attorney General of the province in which the application for the authorization is made or the Solicitor General of Canada if the application for the authorization is made by him or on his behalf, to substitute for the period mentioned in subsection 196(1) such longer period not exceeding three years as is set out in the application. Disclosure of information received from interception of radio-based telephone communications 193.1 (1) Every person who wilfully uses or discloses a radio-based telephone communication or who wilfully discloses the existence of such a communication is guilty of an indictable offence and liable to imprisonment for a term not exceeding two years, if (a) the originator of the communication or the person intended by the originator of the communication to receive it was in Canada when the communication was made; (b) the communication was intercepted by means of an electromagnetic, acoustic, mechanical or other device without the consent, express or implied, of the originator of the communication or of the person intended by the originator to receive the communication; and (c) the person does not have the express or implied consent of the originator of the communication or of the person intended by the originator to receive the communication. ************************************************************************** 7)From: "self destruct" Subject: FCC rules? 2nd request i have a question concerening fcc rules.in part 15 it says your electronic equipment MUST accept interference even if it causes undesirable operation. my question is why must it accept such interference? any info would be appreciated thankyou self destuct at slfdstrct@msn.com ************************************************************************** 8)From: sleepy@vinet.com Subject: Re: Netscape bug Does anyone know if there's a patch for the reported netscape bug that would let the host server to look at the files in your PC? If you know the exact siteaddress, I would really appreciate it. Thanks. ************************************************************************** 9)From: Patrick Counahan Subject: Battery Looking for SANYO "Laser Lithium" Battery CR12600SE(3V) Thank you, Patrick ************************************************************************** 10)From: galak@gulliver.fr (Bernard Galasso) Subject: pocdec1.zip - POCSAG Decoder v1.00: Multiple bps decoding I have uploaded to Simtel.Net: http://www.simtel.net/pub/simtelnet/msdos/commprog/pocdec1.zip ftp://ftp.simtel.net/pub/simtelnet/msdos/commprog/pocdec1.zip 20824 bytes pocdec1.zip POCSAG Decoder v1.00: Multiple bps decoding POCSAG Decoder v1.00 is a decoder which allows 512, 1200 and 2400 bps POCSAG decoding. It can log RIC's and a little sender is included. Freeware. Uploaded by the author. Bernard Galasso galak@gulliver.fr --------------------------------------------------------------- I am Geek Spice, and you're not! Who do you wanna be? ? --------------------------------------------------------------- Western Pennsylvania Scanner Frequency Page http://www.geocities.com/CapeCanaveral/Lab/1060/ Radio Scanner Web Ring - Find a scanner web site quickly! http://www.geocities.com/CapeCanaveral/Lab/1060/scnrng.htm ************************************************************************** 11)From: bennett2@iquest.net Subject: Spectre Press I want to pass along to the group a recent experience I have had with Spectre Press. One of the members said he had received some good stuff from them so I thought I would give them a try. I ordered two books from them. The Phone Hackers Bible and the Cellular Hackers Bible. I've been around these fields for many years but based on the input from the other member I thought may be something new was available in print. A lot of my electrical engineering projects for data acq. systems are in Asia. A fourteen hour plane ride is a good time to read. What I received were a four floppy disks which contained the same old tired files that have been available on the net forever. I was hoping in the area of general phone hacking there would be information relative to new systems currently being installed. I was wrong. The vintage of the files ranged from old to very very old. Some of it was no more than edited hacker files. I will say there is a lot of stuff but overall I would say the only person they will impress is fourteen year old hacker wannabe. I was sure the press in the name Spectre Press had something to do with a printing press. I wasn't expecting something from Simon and Schuster but I did expect a printed and bound document containing current information writtn by a technical author. SHAME ON ME!!! ************************************************************************** 12)From: Gary Cohen Subject: Info Update I'm updating my PI and InfoBroker Contact pages (I have 68 pages so far). If you'd like to be in it (I may publish it), please send your info in the following format--- Thanks. Name: E-mail: Title: (Investigator, Owner, Director, etc.) Agency: Address: City State Zip: Phone: Specialties, Memberships: Web Page URL: Gary Cohen Investigator Ft. Lauderdale/Pompano Beach Florida heatgain@mindspring.com Member-FALI & SFIA Chairman, Internet Committee, SFIA SFIA - http://www.webcircle.com/users/sfia/ ************************************************************************** 13)From: "Leah " Subject: Danny Boy!! HI! You All! I am now the very proud mother of Daniel Lee Wesolowski! Danny was born 6/12/97 @ 12:45 PM and weighing 6 lbs. 11 oz. 20 inches tall. He as a full head of hair, he is very sweet. I am totally enamored with him. We are both home and resting comfortably. thanks for caring. Leah Leah Wesolowski ACME Information 164 Manningham Dr. MADISON, AL. 35758 (205)464-0506 FAX (205)464-0230 http://www.ACMEInform.com ************************************************************************** 14)From: Mike Subject: Hidden Camera Recordings SpyKing, Thanks for the list; Its very informative and interesting. The reason I am writting is that I have a question you could help me with. First, some background. I have a a hidden camera (looks like a speaker) that monitors my home-office area. The thing is it also happens to be my bedroom. Well, I usually leave the recorder running, and one weekend my girlfriend (now ex-girlfriend) came into town and well... lets just say I now have a VHS tape with explict moments of us together. Is this tape illegal? I live in Texas, and know that it is a one party state for oral recordings (no pun intended)...is this also true for video? Your help on this matter would be greatly appreiciated. Thanks, Mike ************************************************************************** 15)From: Donintel@aol.com Subject: Need Private Investigator for fraud case To our PI listmembers: My CPA has a client who suspects, with due reason, his partner of commiting fraud against the company. Significant amounts of money have gone missing, etc. The company is located in Central Pennsylvania and the CPA has asked me to query the list to see if any PI members, familiar with PA, would be interested in the assignment. Thanks for your attention, Don MacDonald donintel@aol.com ************************************************************************** 16)From: BADCOFFEE@aol.com Subject: Manipulation of Spool and Mushroom pins? If anyone here has very specific information on the manipulation of Spool and Mushroom pins, I urge you to contact me. I am interested in actual tecniques used to manipulate the above. I know the diference between skill and getting lucky on these pins. My "getting lucky" is getting verry annoying. For those of you who do not know what spool pin is: If your not familliar with terminology, please go to MIT site at: http://www.lysator.liu.se/mit-guide/mit-guide.html My definition of a spool pin- You can't break the sheer line with the pins and keep them there without aplying torque. If you apply torque, your scr*wed. No torque, no open If you aplly torque, your scr*wed No torque, no open If you apply torque, your scr*wed.........guess what come's next. Say this a lot of times, let your hair grow. Talk to yourself in public and you will be me. Waiting patiently for replies. Augie Badcoffee@aol.com ************************************************************************** 17)SpyKing@thecodex.com Subject: Re: HERF Someone was looking for information on HERF (High Energy Radio Frequency). Checkout: http://www.forbes.com/asap/6396/hack.htm http://rhet.agri.umn.edu/Rhetoric/misc/dfrank/destruct.html ************************************************************************** Who are you? What's your specialty and/or interest? Let us know about your company... What would you like to see on the list? Post it. Let us know... Do you have something to contribute? We'd like to hear it... We want to know EVERYTHING and ANYTHING about eavesdropping, surveillance, countersurveillance & privacy related technology, etc... Remember: who, what, where, when, how & why... we want ALL the details... Do you have a question? Post it... A little free time? Help a member... With the INCREDIBLE brain power on this list, someone should have the answer ;-) P.S. Don't be a LURKER... Members take the time to post info for us all... give something back... Don't just take... Your input/knowledge is valued... ************************************************************************** Send Postings to: spyking@con2.com with "Post" in subject field with subject ************************************************************************** Subscribe to: spyking@con2.com In the subject field type: subscribe-surveillance list e-mail address ************************************************************************** Unsubscribe to: spyking@con2.com In the subject field type: unsubscribe-surveillance list e-mail address ************************************************************************** ...The Simple Rules of the Surveillance List... The Surveillance List Owners may Reject any posts that are/contain: 1) Info Unrelated to Eavesdropping, Surveillance or Privacy technology... 2) Flames or Negative posts... 3) E-Signatures that are considered excessive... 4) Advertisements not DIRECTLY related to the list topics... 5) Attached Files... 6) Oversized Posts... (May be edited to save room) **************************************************************************** This publication is copyrighted and is protected by U.S. and International copyright law. The information transmitted on this list may not be reproduced, reposted or forwarded to any non-list member without expressed written permission of the List Owner. Violation of U.S. copyright law is a criminal and civil offense... **************************************************************************** The Surveillance List is Moderated by SpyKing@thecodex.com The List Owner will make EVERY effort to protect subscribers from spam... Copyright 1996, 1997 Codex Publishing Inc., All Rights Reserved... **************************************************************************** ****************************************************************************** Vol.Two Issue #139 The Surveillance List June 17, 1997 Over 2200+ Members Worldwide Representing 46 different countries List Chat at: http://www.thecodex.com/chat.html ****************************************************************************** IN THIS ISSUE... ****************************************************************************** 01) Secure Data Removal Software (Shredder95) 02) Re: Netscape Bug... 03) Re: Battery 04) So people are finally waking up 05) Netscape's Bug and Java disabling? 06) Re: Hidden camera 07) Radio codes? 08) Spook Book II 09) Laser Listening device plans wanted 10) Re: battery 11) Re: Fraud Case 12) Phone Transmitter and Reciever 13) PC Expo In New York 14) Re: Spectre Press 15) Take the First Amendment Pledge 16) Police procedures 17) Re: SANYO Battery 18) Prying eyes in UK 19) Question on surveilance ****************************************************************************** DON'T BE A LURKER.... GET INVOLVED... YOU ARE A MEMBER... MAKE THE MOST OF IT ****************************************************************************** 1)From: ShredderInfo@Gale-Force.com Subject: Secure Data Removal Software (Shredder95) "Norton Can't Touch This!" You may be surprised why you need this FREE DOWNLOAD (402k) software! If you have Windows (95/NT), you need the ultimate SHREDDING shareware called Shredder95 at http://www.gale-force.com/shredder95/ (Coming soon (JULY 1st, 1997) for Windows 3.1x) Obviously, you are interested in Security... You may even have another (more expensive) product that 'wipes' or 'zaps.' However, Shredder95 is better & more secure... here's why: 1. Yes, we surpass the requirements of the Department of Defense. (some others do not) 2. Yes, we do not buffer our shredding, so no inadvertant copies are created. 3. We don't just Shred, we truncate & rename too! NO TRACE REMAINS. Other software packages leave the name and size behind. 4. We have an excellent interface allowing drag-and-shred or drag-and-(list-to-shred) with many options. 5. It doesn't cost anything to test our software. And, if you like what you see, it doesn't cost much to become registered ($19.95 now, or $29.95 later). As you may already know, when you DELETE a file, it is still ON your hard drive, and completely intact except for the first byte of the filename. That's why Norton Disk Doctor & Norton UnErase can retrieve it so easily! If you want to remove a file.. the worst thing you can do is DELETE it. The problem is that the computer doesn't forget. The solution is to SHRED your electronic documents using Shredder95! And, again, now you can try Shredder95 FREE! At http://www.gale-force.com/shredder95/index.html If you like it and if the software can do the job for you, you can get the license at the currently discounted price of $19.95. And when we upgrade the software, it's yours FREE too (Normally $29.95). All the details are at http://www.gale-force.com/shredder95/ One way or another, if you want to Securely remove your documents, do it properly. Fortunately, we have the proper remover : Shredder95! Sincerely, James Gale Gale-Force Software email: ShredderInfo@Gale-Force.com web: http://www.gale-force.com/shredder95/ ************************************************************************** 2)From: net_security@geocities.com Subject: Re: Netscape Bug... Come on folks, everyone is acting like this is something unbelievable. How many of us are able to do the same thing? If its easy to go to a website and go through their directories, even directories they don't have pointers to, even the password protected ones. How much easier is it going to be for them to do the same to us? It doesn't surprise me one bit they can do it to us, whats good for the goose is good for the gander. gnu ************************************************************************** 3)From: "KcW" Subject: Re: Battery Sanyo USA 619-661-6620 Canada 416-421-8344 UK +44 895-810-18 Ask for their largest distributor near your location. Regards, KcW ************************************************************************** 4)From: Crazy DJ Subject: So people are finally waking up I feel sorry for people when they have a reality overdose, Netscape is not the only browser full of holes. They all have them, it is just a matter of finding them. Let's take a moment and think about things; I paid about $60.00 for Netscape Gold, I could have downloaded Netscape from their sight, my ISP is giving Netscape to any customer who signs up with them. Browsers are not secure.... Any program which is as complicated as a browser takes too long to work all of the "bugs" out of it so they get it to the market, sell it to us, and then offer patches (maybe) to plug the holes. The only truly secure computer is one which is isolated in a Faraday cage not connected to anything else. One can take steps to slow crackers down but that is all. There are programs to encrypt your data on your storage media (McAfee sells a security suite which is very good) there are programs which you can use to secure all data in a "vault" so the only information which can be seen is that on the outside of the vault. The thing to remember is if your computer is connected to a telephone line or since the advent of TEMPEST technology if it is on, people are able to access the information you have. Check out the hacker and cracker pages on the net. The best defense is information and knowledge. ************************************************************************** 5)From: "Dr Jamie Love" Subject: Netscape's Bug and Java disabling? I need a wee bit of instruction for turning of Java. I ain't sure what Java does, but I'd like to try living without it and see if I'm missing all that much. With all this talk about the Bug using Java I figure it's time to give Java a vacation. But I can't seem to disable it! Some directions for doing that are " turning off the browsing software's ability to interpret Java. In most versions of the Netscape software, that can be done by clicking on the ``Options'' button, then choosing ``Network Preferences'' and finally, ``Languages.'' Removing the checkmarks from ``Enable Java'' and ``Enable JavaScript'' will disable both those functions." Well, I use Netsacpe 2.0 and there's nothing in "Languages" about Java. However, in "Option-Security Preferences- General" there's a box called Java and a wee tic-box which reads "Disable Java", but it is in grey (not black) type and totally unresponsizve to clicking on it. Help me turn off Java in Netscape 2.0 and I'll right a nice letter to Netscape asking that they mail you a T-shirt and $1,000. : - ) Regards Jamie Jamie Love (PhD, MBA, MD in progress) Scientist for Hire "Life is my business" http://www.virtual-pc.com/mindweb/merlin/sci4hire.html EMAIL jamie@enterprise.net OR merlin@megatropic.com ************************************************************************** 6)From: John P Trotter Subject: Re: Hidden camera Mike, I used to teach a course in photo releases The Key point is either publication ( with out a release there are money damages) or holding someone up to public disgrace or ridicule. DO NOT SHOW THE TAPE TO ANYONE ELSE If you do you can either 'publishing' or ridiculing her There are cases in Texas - guy showed the tape to his fraternity and friends somewhere around $100,000 level - Also the defendants law firm showed the tape to the office staff at a party or something and also paid up. John Trotter Keep the tape to your self - if word gets back to her - you are up the creek without a paddle on a very poor raft. Also tape if lost and played by someone else you are still dead The safest course is to erase the tape JT ************************************************************************** 7)From: "Jose A. Duarte" Subject: Radio codes? Does anyone know where I can get a list of the official ten codes and other radio codes used by emergency services? I already know most of the ten codes but I'm looking for the dispatch codes. Codes used to described a B&E, A trespassing, man with a gun..... If any one know please e-mail me back!! Thanks in advance, Jose Duarte +++Moderator's Note+++ I'm fairly sure that you will find that there is no one set of codes that will apply to ALL agencies... If you do a search of scanner related pages you will probably find brevity codes relative to the area... Here in New York City for instance NYPD code for officer needing assistance (cop in trouble) is 10-13. When 10-13 is called ALL hands drop what they are doing and respond to scene... a few other NYPD codes are: 10-04 Received/Understood 10-05 Repeat Transmission 10-10 Investigate unknown situation 10-15 DMV Check on Subject 10-16 Stolen Vehicle 10-30 Robbery in Progress 10-31 Larceny in Progress 10-32 Burglary in Progress 10-33 Explosion/Fire in Progress 10-34 Assault in Progress 10-54 Aided Case (Man down/Sick/Injured) 10-59 Fire 10-85 Officer Needs Assistance/Rendevous (Non-Emergency) 10-98 Unit finished Assaignment/Back on Patrol If you're thinking about riding around in your car listening to a scanner I would first check the applicable laws at: http://www.afn.org/~afn09444/scanlaws/ ************************************************************************** 8)From: paul.bulmer@nestlegb.nestle.com Subject: Spook Book II Can anyone tell me the isbn number of spook book II so i can order it in the Uk ? Regards paul ... ************************************************************************** 9)From: paul.bulmer@nestlegb.nestle.com Subject: Laser Listening device plans wanted I'm interested in how laser listening devices work and want to build one, where can i locate circuit diagrams ? Regards Paul ************************************************************************** 10)From: Trace Carpenter Subject: Re: battery >Looking for SANYO "Laser Lithium" Battery CR12600SE(3V) Have you tried crossing that number to a generic number? If you haven't you'll probably find that it's readily available. If on the other hand it's that hard to find locally, contact Batteries Plus in Irving, Texas. The area code is 972. They also have a store in Arlington, Texas which is in the 817 area code. -- Trace Carpenter Investigations ****** 2926 Maple Ave., Ste. 200 Friends help you move; Dallas, Texas 75201 Real friends help you move bodies. 214.828.4520 ****** ************************************************************************** 11)From: Trace Carpenter Subject: Re: Fraud Case >My CPA has a client who suspects, with due reason, his partner of commiting >fraud against the company. Significant amounts of money have gone missing, >etc. The company is located in Central Pennsylvania and the CPA has asked me >to query the list to see if any PI members, familiar with PA, would beinterested in the assignment. Hey Don, I doubt that he's that familier with PA, but in a case like that I'd contact Bobby Jones at 214-631-8766. He's a Certified Fraud Examiner and does forensic accounting and it very good as is his partner Bill Parker. -- Trace Carpenter Investigations ****** 2926 Maple Ave., Ste. 200 Friends help you move; Dallas, Texas 75201 Real friends help you move bodies. 214.828.4520 ****** ************************************************************************** 12)From: ProvRhode@aol.com Subject: Phone Transmitter and Reciever HI, I know we have all beat this issue to death, but would like to hear the specifics of where to locate the following items. Ok ..heres the situation. Need to monitor the phone conversations in a room that i have access to.. My plan is to get a transmitter that gets its power from the line, one i can hook up on the back of a telephone outlet. It then needs to transmit to another room (no more than 50 feet away where a reciever and voice operated recorder is located... I have the recorder but need the reciever and transmitter. The reciever needs to be fairly small so it may be placed in side lets say the back of the sofa. I would greatly appreaciate the specifics of where to locate these items (transmitter and reciever) and the fair price such units would cost. Thanks so much everyone ************************************************************************** 13)From: SpyKing@thecodex.com Subject: PC Expo In New York This week at the Javits Convention Center... If any list members are attending and would like to get together let me know. I've always found this show to be loaded with information, some relative to our business... Further info at: http://www.pcexpo.com/ ************************************************************************** 14)From: quilliam@pen.net Subject: Re: Spectre Press I would like to confirm my own bad experience with Spectre Press. I also ordered a "book" regarding Van Eck and Tempest devices. I also received no paper, but instead two floppy disks with 4 articles which had been taken off the net (i.e. Tempest in a Teapot). I was quite angry because I had paid for this "book", gotten information that was easily obtainable in the public domain, and I am sure that the authors (who's names were removed from the Spectre material), received neither recognition nor payment. I feel this is not only unethical but possibly illegal. I emailed my concerns to Spectre Press and got back a reply saying they were sorry I was unhappy, but three months later I have yet to get a refund. I recommend that no one on this list waste their money on this company. I receive more good info in one edition of the list then is in any of their "publications". If you are looking for good technical info, John Williams at Consumertronics (505) 439-8551 is a much better deal. In my experience he is honest and gives you what you pay for. ************************************************************************** 15)From: "EPIC-News List" Subject: Take the First Amendment Pledge JOINT PRESS RELEASE: American Civil Liberties Union Electronic Privacy Information Center ACLU, EPIC Call on Congress and Clinton to "Take the First Amendment Pledge" FOR IMMEDIATE RELEASE Monday, June 16, 1997 NEW YORK -- As the nation awaits a Supreme Court decision on the future of free speech on the Internet, the American Civil Liberties Union and the Electronic Privacy Information Center today launched http://www.firstamendment.org, a website dedicated to upholding the First Amendment in cyberspace. The groups called on President Clinton and members of Congress to be among the first to "Take the First Amendment Pledge" and cease any further attempts to draft legislation to censor the Internet in the event the Supreme Court upholds a lower court decision striking down government regulation of the Internet as unconstitutional. "In our view there is no such thing as a 'Constitution-proof' law criminalizing so-called indecency in cyberspace," said Chris Hansen, ACLU Senior Staff Attorney and lead counsel in Reno v. ACLU. The launch of the website comes as Clinton Administration officials have begun publicly discussing a shift in policy on Internet regulation, saying that "industry self-regulation" -- not laws criminalizing certain Internet communications -- is the solution to shielding minors from online "indecency." Hansen added that if the Administration had indeed adopted such a policy, it is obligated to announce it to the Court before they rule in the case. "If the report in this morning's New York Times is indeed true, it would appear that the Clinton Administration is preparing to take the 'Pledge,'" Hansen said. Reno v. ACLU challenges censorship provisions of the Communications Decency Act aimed at protecting minors by criminalizing so-called "indecency" on the Internet. The ACLU, along with EPIC and 18 other plaintiffs, filed a challenge to the law the day it was enacted. A ruling on the case could come as soon as Thursday, June 19, the next scheduled day for release of Supreme Court decisions. "Attempts to censor the Net will not end with the Supreme Court decision ," said David Sobel, legal counsel for EPIC and co- counsel in Reno v. ACLU. "Proponents of Internet content regulation have already indicated their desire to take a 'second bite of the apple' if the Communications Decency Act is struck down." In anticipation of such new attempts at online censorship, visitors to www.firstamendment.org are invited to "Take the First Amendment Pledge," which reads: "I pledge to support free speech and free expression for all Americans and to urge Congress to uphold the First Amendment to the United States Constitution and pass no law abridging our freedom of speech." Online users can capture the "First Amendment Pledge" GIF (graphic image file) for placement on their own website. Other features planned for the site include an "action alert" that informs users of legislative threats to the First Amendment and allows them to instantly e-mail or fax their member of Congress, and an online "postcard" that can be e-mailed to friends, relatives and elected officials, urging them to "Take the Pledge." The ACLU is a nationwide, non-partisan organization dedicated to defending and preserving the Bill of Rights for all individuals through litigation, legislation and public education. The ACLU can be found online at www.aclu.org and through America Online at keyword: ACLU. EPIC is a non-profit, education and research organization based in Washington, D.C. EPIC examines civil liberties and privacy issues that arise in new electronic media. It maintains a website at www.epic.org. ************************************************************************** 16)From: Lawrence Wood Subject: Police procedures I am trying to find a source (manual) that spells out the proper action police are to take when they arrive on the scene of a crime. Their priority list at the scene should differ depending on Location Federal or state The nature of the crime Life & death issues Hostage crisis weapon(s) on the scene and a wide variety of other factors where can this information be found?? LHW Thanks ************************************************************************** 17)From: "Donald J. Zaroda" Subject: Re: SANYO Battery If that is a video camera battery, you may do well to take a look at VIDEO magazine at your local library. Also, try Bescor Video Accessories, Ltd., 244 Route 109, Farmingdale, NY 11735-1505 Phone: 516-420-1717 They will have it, tell you where to get it, or make it. ************************************************************************** 18)From: SpyKing@thecodex.com Subject: Prying eyes in UK London Sunday Times June 15 1997 There is a computer somewhere that knows all about you, from your debts to your sex life, and it is getting ever easier and cheaper for the unscrupulous to take a peek. Report by Peter Millar, Stephen Grey and Nicholas Rufford Prying eyes The business was dirty, the customer shady, the dialogue straight from a bad B-movie. "This could be the start of a beautiful relationship," said the private dick in cheerful cockney. He was offering information ­ confidential information that would have to be acquired illegally. The target was a businessman, a director of Richard Branson's Virgin Group, but it could have been any of us. Virgin's Will Whitehorn had been done over by private investigators before, during a British Airways dirty tricks campaign codenamed Operation Covent Garden. Now, the customer ringing the private detective from a public telephone and claiming to represent another business rival was demanding Whitehorn's itemised telephone bill for the past three months, showing every number he had called, plus print-outs of his latest Barclaycard statements and details of his bank accounts. The detective was complacent, even glib. "Yeah, I can find out what his assets are, his status . . . it depends on how far you want it to go really." The credit card request took a moment's reflection, clearly related to pricing policy: "I could do, but that is quite expensive . . ." He asked his customer to pay £300 into a private bank account, "and then after that we'll talk". Could he do more? "It would come a lot easier once I got to know you a bit better. It's not a problem. A lot of this I can get straight away." Whitehorn need not worry, this time at least. He had given his consent to the operation in advance. The "customer" was a Sunday Times reporter calling to see if private investigator Gavin Rhodes was as ready as he seemed from his advertisement in Brighton Yellow Pages to break the law by obtaining private computer records without authorisation. Rhodes's advertised services include the procurement of ex-directory telephone numbers, the secret use of a telephone voice stress evaluator "as currently used by the FBI ­ your subject will never be aware a lie detector device is in operation" ­ and "new identities built and un-built". Which may be just as well because the details of our own identities are up for sale. Who you are and what you are can be bought on the open market, for a few hundred pounds. The information society is about to hit the hypertension barrier. Already networks are in place that will enable anyone who wants to ­ and is willing to ignore the toothless legislation that is supposed to protect us ­ to build up a profile that includes not only our age, sex, race, religion, bank details, mortgage, medical history, creditworthiness and driving habits, but also spending trends, likelihood to commit fraud or go bankrupt, alcohol consumption, diet, even sexual preferences. WE have known for years that reams of information is stored by official bodies: the police, with their huge fingerprints library, newer DNA-tracing archive in Birmingham and old-fashioned criminal records; the health service and social security offices; the Driver and Vehicle Licensing Agency, with details of our fines as well as number plates; the Department for Education and Employment, with its records of examination results we may have "improved" upon to our employers; and the great mine of financial information put together by the Inland Revenue and Customs and Excise ­ responsible for Vat ­ and the Contributions Agency, which deals with National Insurance. High-speed, high-capacity computerisation has created the potential for all these to be correlated ­ and penetrated ­ by the unscrupulous. Beyond the official databases, and possibly even more important, are the mushrooming numbers of private ones interacting with them and each other. Most obvious targets are the big credit reference companies with computers in Nottingham, Manchester and Glasgow, which take data from the electoral roll and the credit card companies, and monitor bankruptcy proceedings at county courts. More insidious still are the computer "traces" that the average modern lifestyle leaves in cyberspace. Every time a shopper uses a Tesco or Sainsbury loyalty card, gaining points and earning discounts as well as helping the supermarkets tailor their service to customers' requirements, he or she is helping to build up an image of how their family unit lives. Sainsbury has issued 9m loyalty cards. The company now offers banking, credit cards and loan services, which have attracted 225,000 customers, and mortgages start next month. Anyone with all of these would have surrendered to Sainsbury almost every detail of their family, although Diane Lamb, a spokesman, said the separate services' databases were kept apart, as legally required. "We use it for sending customers details of new products and offers, but we don't sell it to outside companies." In an even more advantageous position, however, are the big privatised utilities, including British Gas and the electricity companies, which are tempted to use their monopoly mailing lists to offer associated business, from high street shops to financial services. The threats to privacy are multiplying all the time as the technology advances. The really big potential growth industry is online marketing: home shopping from anywhere in the world via the family PC over the Internet. Experts predict a market of at least £4 billion by the turn of the century, and retailers in cyberspace are as inquisitive about their customers as the supermarkets. The Net's much-vaunted anonymity has already been cracked by "cookies" ­ the web-surfer's jargon for programmes planted remotely from the web site onto the user's hard disk that feed back information. A study by the Electronic Privacy Information Center in Washington DC found that while almost half of Web users left a site when asked for personal information, half the site operators attempted to seduce their visitors into providing personal details. One in four planted a "cookie", which effectively stole it. More dangerous still is "thinking software", described anthropomorphically as a neural network but known colloquially by boffins as a "bot" ­ a non-physical robot ­ which can hunt down specific information in a computer system and "learn" what is required as it goes along. Examples, given the user-friendly face of a digital doggy, are already on sale commercially to track down information on the Net. As with a real dog, its behaviour depends on how it is trained. Web anonymity was in any case never guaranteed. In Unix, the system operated by mainframe computers which run most of the Net, the commands "finger" and "who is" can point out who was looking at a particular site at a particular time. One American has been complaining vociferously ­ if anonymously ­ in Net newsgroups that he was effectively blackmailed by a Japanese sex site operator to whom he had given his credit card number, only to find himself extortionately overcharged. He was told he could do nothing about it or the operator would reveal that he had looked at pictures of underage girls. Not much of a subject for sympathy, but an illustration of the risks. A DIFFICULT decision will have to be made soon about the extent to which the police should be allowed to monitor e-mail, which for many people has become a form of communication as common as the telephone or a "snail mail" letter. The government has promised a freedom of information act but is also considering whether Internet operators should be obliged to provide police on demand with all e-mail passed over their wires. Freedom of information and data protection are opposite sides of the same coin. Sealed brown envelopes passed in pubs can open some of these electronic doors. The private investigator who offered to provide illegal information to our reporter gave a clue that he had a source inside BT. Producing Whitehorn's itemised telephone bill, he said apologetically, would take an extra day. "My guy has a bit of a delay because he is on flexi-time. It's easier for him to do it on Saturday . . . he says he's going in tomorrow, because he has a few to do." Yellow Pages promised an immediate investigation into the detective's advertisement. Rhodes himself insisted it no longer accurately represented his company's business: "I have never actually broken any laws. It is very unfair of you to target me," he said. "My main business is actually tracing missing people and helping to reunite families." Since 1995, in an attempt to toughen the law, it has been an offence to procure the disclosure of personal data and sell it on. There is, however, no shortage of self-styled investigators willing to do the business. With the prior permission of Maurice Frankel, director of the Campaign for the Freedom of Information, The Sunday Times obtained details of his mortgage, telephone and private utility bills. Frankel was astonished. The internal security of companies holding information about him was "obviously completely inadequate", he said. "Each of these organisations promises that they will not pass the information on to a third party, so people are misled into a false sense of security . . . There is an enormous gulf between what you are told is the practice and what people can get about you for a fairly modest outlay." The Data Protection Act, which requires every company with computers to register the type of information they hold on individuals, was brought on to the statute book, appropriately enough, in 1984. Its central principle was that personal information collected for one purpose should not be used for another. Elizabeth France, the data protection registrar, said this was being challenged by a growing number of organisations wanting to share information about us. "The technology makes it far easier and cheaper than in the 1980s," she said. "It is not a case of a Big Brother, but lots of little brothers." France's office recently warned banks and building societies to tighten data security. So how secure are her own secrets with such organisations? Last Friday, she was shocked to be confronted by The Sunday Times with details of her outstanding mortgage, monthly repayments, telephone, water, gas and electricity bills. "My immediate thought was that the leak was the bank," said France. "But you have given me details of a bill that has not been paid yet." The truth is out there. For the taking. Additional reporting: Ciaran Byrne and Steve Connor Who knows what about you? Britain's biggest data bases FINANCE Credit reference agencies keep comprehensive files on almost every household in the country for easy access by money lenders HEALTH Hospitals store our records on health authority computers, and more and more GPs store intimate details in surgery data banks INLAND REVENUE, BENEFITS Information about our jobs, tax and benefits paid are accumulated over a lifetime from the age of 16 UTILITIES Gas, water and electricity company records reveal patterns of lifestyle as well as names and addresses POLICE Each force has its own data bank linked to a national computer with files on every vehicle and driver SUPERMARKETS Loyalty cards provide a vivid picture of us, our families and how we choose to spend our money +++Moderator's Note+++ I hope no one on this list believes that this type of stuff doesn't happen here... there... and everywhere... hmmm... I think I heard that song before ;-) ************************************************************************** 19)From: DBoone1164@aol.com Subject: Question on surveilance Id like to know how I can monitor my wifes chat room behavior to see how manogomous our relationship is? thanks ************************************************************************** Who are you? What's your specialty and/or interest? Let us know about your company... What would you like to see on the list? Post it. Let us know... Do you have something to contribute? We'd like to hear it... We want to know EVERYTHING and ANYTHING about eavesdropping, surveillance, countersurveillance & privacy related technology, etc... Remember: who, what, where, when, how & why... we want ALL the details... Do you have a question? Post it... A little free time? Help a member... With the INCREDIBLE brain power on this list, someone should have the answer ;-) P.S. Don't be a LURKER... Members take the time to post info for us all... give something back... Don't just take... Your input/knowledge is valued... ************************************************************************** Send Postings to: spyking@con2.com with "Post" in subject field with subject ************************************************************************** Subscribe to: spyking@con2.com In the subject field type: subscribe-surveillance list e-mail address ************************************************************************** Unsubscribe to: spyking@con2.com In the subject field type: unsubscribe-surveillance list e-mail address ************************************************************************** ...The Simple Rules of the Surveillance List... The Surveillance List Owners may Reject any posts that are/contain: 1) Info Unrelated to Eavesdropping, Surveillance or Privacy technology... 2) Flames or Negative posts... 3) E-Signatures that are considered excessive... 4) Advertisements not DIRECTLY related to the list topics... 5) Attached Files... 6) Oversized Posts... (May be edited to save room) **************************************************************************** This publication is copyrighted and is protected by U.S. and International copyright law. The information transmitted on this list may not be reproduced, reposted or forwarded to any non-list member without expressed written permission of the List Owner. Violation of U.S. copyright law is a criminal and civil offense... **************************************************************************** The Surveillance List is Moderated by SpyKing@thecodex.com The List Owner will make EVERY effort to protect subscribers from spam... Copyright 1996, 1997 Codex Publishing Inc., All Rights Reserved... **************************************************************************** ****************************************************************************** Vol.Two Issue #140 The Surveillance List June 18, 1997 Over 2200+ Members Worldwide Representing 46 different countries List Chat at: http://www.thecodex.com/chat.html Seminar Info at: http://www.thecodex.com/methods.html ****************************************************************************** IN THIS ISSUE... ****************************************************************************** 01) Bodyguard Manual 02) Keyloggers and RoboSpy 1.0 03) Monitoring conversation response 04) Re: Police Procedures 05) Re: Netscape undocumented feature.(Final conclusion 4 me) 06) Re: Question on surveilance 07) Re: Police Procedures 08) Re: Netscape Bug... 09) Advice about bugging on a personal level 10) Looking for coiled cord earpiece 11) Countermeasures against Cloned Cellphones 12) Re: Spook Book II 13) Thanks for doing a great job 14) Re: Spool Pins 15) Re: Phone Transmitter and Receiver 16) Nightvision ****************************************************************************** DON'T BE A LURKER.... GET INVOLVED... YOU ARE A MEMBER... MAKE THE MOST OF IT ****************************************************************************** 1)SpyKing@thecodex.com Subject: Bodyguard Manual I received a copy of a bodyguard manual from a list member last night and after a cursory view think it's worth a good study... you can download a copy yourself at: http://www.freeyellow.com/members/rag1/ ************************************************************************** 2)From: Trace Carpenter Subject: Keyloggers and RoboSpy 1.0 I have a case coming up in which we're going to utilize loggers and try out robospy to monitor the chat rooms. First, we've had a lot of requests here about keyloggers. Does anyone have anything to add as far as loggers. I have all the URL's but haven't had time to read them all. I'd like to hear from other tech's or users who have actually tried them and have found one they like. Most of the ones I've used don't hide very well in Win 95. Also, we're ordering RoboSpy. Does anyone have any experience with it? How well does it work? Is it lethargic? What about any other programs like it? Thanks. -- Trace Carpenter Investigations ****** 2926 Maple Ave., Ste. 200 Friends help you move; Dallas, Texas 75201 Real friends help you move bodies. 214.828.4520 ****** ************************************************************************** 3)From: Trace Carpenter Subject: Monitoring conversation response First be careful about the legal aspects. After that, the easiest thing for you to do is go to Radio Shack and purchase a parallel type trip switch and place it on the phone line. RF devices cause all kinds of problems. BTW, I wouldn't recommend this type of switch for a professional application just because they stand out like a sore thumb on a TSCM sweep. On the other hand, if you're just trying to monitor your kid you should have no problems. ************************************************************************** 4)From: Greg Caldwell Subject: Re: Police Procedures > I am trying to find a source (manual) that spells out the proper > action police are to take when they arrive on the scene of a crime. This may seem like a simplistic answer, but usually the most up-to-date material can be found at any college library offering a degree (associates or bachelors) in Criminal Justice. I sit on the Criminal Justice Advisory Council (Curriculum Committee) for one of our state colleges in Colorado. The course taught there, at several levels, is Criminal Investigations. There are hundreds of books available to explain the basics and the details. You don't mention what state you are in, but almost every state has a POST (Police Officer Standards Training) certification course with their own materials and books. These schools can be state run or privately offered, depending on the state. Their libraries are also good sources. If you are looking for a more specific answer, then I suppose I would need a more specific question, i.e. What is the purpose of the information; are you comparing a specific case against a national standard? Is it for litigation or information? If I can answer any other questions, feel free to e-mail me. Good luck. Greg Caldwell Investigations & Security Consulting Colorado ************************************************************************** 5)From: Judge@innocent.com SUBJECT: Re: Netscape undocumented feature.(Final conclusion 4 me) Good grief! I have never seen such an unfortunate amount of hype about an alleged bug which has surfaced in Netscape Navigator. I couldn't care less if they looked at my Hard Drive, call me irresponsible but what the hell can they do about it? To be afraid that some 'Web Designer' (thats nearly everyone btw) can peek a look at your drive is silly, once they have looked then what? The main thing they can't do is say we want to look at that one persons hard drive since we suspect something, they would have to make you browse their page then be able to verify that info. If you're all that paranoid then keep the software contents you wish to keep undisclosed on a separate file system (I have). It's worth noting that a good Javascript can do the same without informing the browser, I know I've done it. You just create a script that stores a brief bit of text onto your server and you can build up a far better & more stealth-like routine. I won't even go into Java applets since they are pratically mini-programs which can conceal all manner of routines (mail back to this address with file//c:/*.* for one). Just be prepared for the shock of Netscape 4 then since that has more of a feature to read HD's than previously thought. If you want a false trail to be left then I suggest you get a hold of IP SPOOFER which is a great little program which can fake your email address to any system trying to gain an address from you. I never go anywhere without it. If they get the drive contents of RolfHarris@paint.com.au then what? There is always a solution to such unwanted peeks so CNN can stop trying to increase their ratings by scaring Internet users off the Web since that is a world-wide occurance (and it's true) that TV has been losing ratings since the Internet has gained worldwide appeal so it's in CNN's own interests to create such a news story. Didn't reckon on that did you? PS: Windows NT4 server can monitor which programs any web a/c is using on their provider services so what next? I would like to see some response from Internet Service Providers in this DISCUSSION list. Mailto:Judge@innocent.com Striving to stop Mis-information Worldwide. ************************************************************************** 6)From: Jim Motes Subject: Re: Question on surveilance If your wife is using a client for chat like MIRC, there is an option that will allow you to log all chat and messages. If she is on aol or some other chat use a key stroke recording software program to keep track of all key strokes after the computer is turned on. I have been testing the keystroke programs and have found one that seems to work pretty well. There are still several more I want to test, but if you can't find one on the net, just email me jmotes@mnsinc.com and I will send you a copy. I owe another member a copy, but wanted to send the best of all of them to him. If you want a copy now, I will send you what I have so far. Please remember that what she types on her keyboard is not what she may do in the real world. Unless she is setting up meetings, you don't have any problems. Women like the safety and the "supposed" annonimity (sp) of virtual sex (cyber sex, ect..). Your first concern should be that she is taking steps to prevent her chat friends from tracking her down. There are steps you can take to block your identity from the masses, but it's very hard to keep the seriously computer gifted from finding you if they want to. If you want to have some real fun, get a separate account and link up from the office, don't let her know it's you and see what's she's like on the net. Might just liven up your sex life :) Jim Motes jmotes@mnsinc.com ************************************************************************** 7)From: Lawrence Wood Subject: Re: Police Procedures I am interested in a specific case involving a murder in Memphis TN. The circumstances involved in this case are suspect, and I am doing background work to find out what the police are supposed to do, versus what they actually did. The person who shot him had fled, the victum was on the floor bleading to death, no first aid was given, in fact the officers never even touched him. This involved a shooting (twice) in the back of a healthy individual at a night club around 4:00 in the morning, in which 911 was called and the police took over 30 minutes to arrive, and upon arrival did nothing to help the victum. The victum was being supported on the floor by his cousin, and was conscious the entire time talking with him. The ambulance arrived about 15 minutes after the police and according to witnesses roughly threw the victum face down on the stretcher, would not allow anyone to ride with them to the hospital, took off without lights and siren and the victum was eventually pronounced DOA at the hospital. Upon claiming the victums personal effects, a large sum of money was missing. People who were with him had seen a large sum of money and this was missing from his personal effects. In short an innocent man is now dead, in which it took over 45 minutes for him to be in the presence of a trained medical person who apparently did nothing to help him. ************************************************************************** 8)From: Mutter Subject: Re: Netscape Bug... > Come on folks, everyone is acting like this is something unbelievable. How many of us are able to do the same thing? If its easy to go to a website and go through their directories, even directories they don't have pointers to, even the password protected ones. How much easier is it going to be for them to do the same to us? It doesn't surprise me one bit they can do it to us, whats good for the goose is good for the gander. > > gnu I'm not sure I follow your logic. Are you saying just because I'm able to access files using http it only stands to reason that they can do the same thing thing to my computer? That's like saying "Hey, you shouldn't dial up BBS's because it only stands to reason that the sysop will be able to go through your files." Maybe I'm misunderstanding what you're trying to say but I don't think so. The computer you are grabbing html files from has to make a concious decision to offer that service to the network. Thus, your computer who's acting as the client (trying to receive those files) shouldn't be sending files to the remote computer. That's why it's a bug and that's why we should all be surprised (well, not really). - M u t t e r Ed. root zine (http://www.openix.com/~mutter) mutter@openix.com ************************************************************************** 9)From: phreaker@technologist.com Subject: Advice about bugging on a personal level Be very careful about the data you get. We always edit what we say for the person we are talking to. It is very easy to forget this. Bugging on a personal level is akin to knowing the future. Be careful what you wish for. Be sure you put the data in the proper context. I ALWAYS reccommend against bugging wives, husbands, girlfriends, etc. The data is poor at best. Besides, if you have to do it, its too late anyway except to destroy what little might be left of a relationship. P ************************************************************************** 10)From: "Gruver, Don" Subject: Looking for coiled cord earpiece Anyone know where we can get some coiled (read: spring cable) mono earpieces with a mini plug, just long enuf to go from a speaker mic to the ear with some slack? I have been manufacturing some for our officers using some cords off a mini cassette recorder playback speakers and some RS earbuds, but we exhausted our supply of coiled cords. Any of course now everybody wants one. Anyone know of any commercially available? Thanks for any assistance. ************************************************************************** 11)From: "Lorenzo Castillo Sanchez" Subject: Countermeasures against Cloned Cellphones How do I guard my cellphone against those who have my cloned cellphone? I don't think scramblers would work against someone who's got the exact replica of my cellphone. Cellphone cloning is a serious problemo here in East Asia but people are just being wishy-washy and don't seem to be taking serious action here. Well, if I had something to say on the cellphone, I would assume that someone is listening thru the unlimited radio space. I use a phone equipped with a tap jammer+detection device when I have something important to say BUT it's still annoying to know that someone out there is using cloned cellphones for privacy prying purposes. BTW - any List members in Asia ? :-) ************************************************************************** 12)From: "Lorenzo Castillo Sanchez" Subject: Re: Spook Book II >8)From: paul.bulmer@nestlegb.nestle.com >Subject: Spook Book II >Can anyone tell me the isbn number of spook book II so i can order it in the Uk ? > >Regards paul ... Paul, I have that book and it does not really contain a wealth of info compared to it's predecessor, Spook Book I. They do have "censored" schematics but it's not going to be helpful. It's not my personal choice. However, if you are looking for a book with schematics I would recommed Tom Larsen's "Bench-tested Circuits for Surveillance and C-surveillace Technicians". Check it out - http://www.concentric.net/~will6988/books.htm ************************************************************************** 13)From: pbis@usa.net Subject: Thanks for doing a great job Thanks for doing a great job, I really enjoy the list. My only suggestion, could you please format the text to 50 or 60 characters. I find it difficult to keep using the scroll bar to move along those lines of very long text without CRs Thanks ************************************************************************** 14)From: mike kessler Subject: Re: Spool Pins Augie, The most effective approach to spool pins (or mushrooms) is reverse picking: Instead of using a hook or diamond pick to elevate the combination pins above the shear line, you use a straightedge to push all of the pins above the shear line at once as far as they will go. Then, while maintaining moderate tension to hold them there, use a short hook under each combo pin and gradually relax tension. Repeat this until you find the first combo pin to fall BELOW the shear line (leaving its driver pin elevated ABOVE the shear). Then look for the second pin to fall, and so on. This method takes a while, but once you develop the feel it's almost foolproof. Another approach to spools and mushrooms is, of course, the pick gun. With sufficient practice, this tool will usually snap open a spooled cylinder in a few seconds. The trick is extremely light tension with a rigid torsion wrench. Hope this helps. Mike ************************************************************************** 15)From: "Walstrom, Bradley" Subject: Re: Phone Transmitter and Receiver >HI, >I know we have all beat this issue to death, but would like to >hear the specifics of where to locate the following items. Ok ..heres the >situation. Need to monitor the phone conversations in a room that i have >access to.. My plan is to get a transmitter that gets its power from the line, >one i can hook up on the back of a telephone outlet. It then needs to >transmit to another room (no more than 50 feet away where a receiver and >voice operated recorder is located... I have the recorder but need the receiver >and transmitter. The receiver needs to be fairly small so it may be placed >in side lets say the back of the sofa. I would greatly appreciate the >specifics of where to locate these items (transmitter and receiver) and the >fair price such units would cost. Thanks so much everyone You may be thinking to high tech. If you are that close and you have access to the phone jack, I would use a recorder switch like the ones sold by Radio Shack for around $20.00 that will plug into any extension and will start the recorder when the phone goes off hook. Just plug the switch into any extension jack or run a pair of wires from the back of one of the jacks to a location where you can place the recorder. Then all you need is a recorder with a remote jack and a mic. jack. The remote jack is usually 2.5mm and the mic. jack is usually 3.5mm. This will eliminate the expense of the transmitter and receiver which will be several hundred dollars if you get something good that is crystal controlled. You will also eliminate the problem of someone else picking up the transmission of a transmitter. Remember that in all states it is against the law to record the conversation of two parties unless at least one of them knows about it, and some states require that both parties are aware of the recording. Be sure to check the law in your state. Brad Walstrom ************************************************************************** 16)From: diablo@jorsm.com Subject: Nightvision Howdy all. I know that a nightvision has come and gone since the list's inception, but... I have money now :> I'm looking to spend between $200-$300 dollars on a light-amplification system. For that price, I'm expecting no better than a monacle . Definitely something that won't fry if light's go on. Preferrably something with 1 yr+ warranty. Nothing in particular as far as range goes. About 100-200 feet is fine. More than that is a bonus. I've checked out the usual suspects (Edge Co., US Cav, etc...), but I dont really know all that much about the quality of various systems (and I dont think that, for the most part, they do either). I would most appreciate any reccomendations on brands, models, and suppliers. Thanks alot, Jeff -- Jeff "Know the enemy and know yourself; in a hundred battles you will never be in peril" - Sun Tzu ************************************************************************** Who are you? What's your specialty and/or interest? Let us know about your company... What would you like to see on the list? Post it. Let us know... Do you have something to contribute? We'd like to hear it... We want to know EVERYTHING and ANYTHING about eavesdropping, surveillance, countersurveillance & privacy related technology, etc... Remember: who, what, where, when, how & why... we want ALL the details... Do you have a question? Post it... A little free time? Help a member... With the INCREDIBLE brain power on this list, someone should have the answer ;-) P.S. Don't be a LURKER... Members take the time to post info for us all... give something back... Don't just take... Your input/knowledge is valued... ************************************************************************** Send Postings to: spyking@con2.com with "Post" in subject field with subject ************************************************************************** Subscribe to: spyking@con2.com In the subject field type: subscribe-surveillance list e-mail address ************************************************************************** Unsubscribe to: spyking@con2.com In the subject field type: unsubscribe-surveillance list e-mail address ************************************************************************** ...The Simple Rules of the Surveillance List... The Surveillance List Owners may Reject any posts that are/contain: 1) Info Unrelated to Eavesdropping, Surveillance or Privacy technology... 2) Flames or Negative posts... 3) E-Signatures that are considered excessive... 4) Advertisements not DIRECTLY related to the list topics... 5) Attached Files... 6) Oversized Posts... (May be edited to save room) **************************************************************************** This publication is copyrighted and is protected by U.S. and International copyright law. The information transmitted on this list may not be reproduced, reposted or forwarded to any non-list member without expressed written permission of the List Owner. Violation of U.S. copyright law is a criminal and civil offense... **************************************************************************** The Surveillance List is Moderated by SpyKing@thecodex.com The List Owner will make EVERY effort to protect subscribers from spam... Copyright 1996, 1997 Codex Publishing Inc., All Rights Reserved... **************************************************************************** ****************************************************************************** Vol.Two Issue #141 The Surveillance List June 19,1997 Over 2200+ Members Worldwide Representing 46 different countries List Chat at: http://www.thecodex.com/chat.html Seminar Info at: http://www.thecodex.com/methods.html ****************************************************************************** IN THIS ISSUE... ****************************************************************************** 01) Re: Keyloggers and RoboSpy 1.0 02) Looking for my little girl 03) Re: Bodyguard Manual 04) Re: Night vision devices 05) Veeeeeerrrrrrrrryyyyyyy interesting 06) Need background check 07) Re: Countermeasures against Cloned Cellphones 08) The Most Realistic Looking Dummy Camera Available 09) Release of PGP 5.0 FreeWare 10) Re: RoboSpy et Al 11) Re: Laser Listening device plans wanted 12) Re: Police procedures 13) Re: I'm not sure I follow your logic.. 14) NY Seminar/FAQ ****************************************************************************** DON'T BE A LURKER.... GET INVOLVED... YOU ARE A MEMBER... MAKE THE MOST OF IT ****************************************************************************** 1)From: "M. J. Van Ham" Subject: Re: Keyloggers and RoboSpy 1.0 I'd like to hear from other tech's or users who have actually tried them and have found one they like. Most of the ones I've used don't hide very well in Win 95. -------------------------------------------------------------------- I think that the best keystroke logger available for Win '95 is Key Log '95 v2.0. The first version wasn't so great, but since version 2 came out this is the only one I use. It hides excellent under win '95. Does not show up on the taskbar, starts "stealthily", and when you do a CTRL+ALT+DEL it shows up as WinMEM (so as not to arouse suspision from curious users). The only thing I don't like about the program is that it creates the log file in the directory - c:\win\logx. Suppose the computer you're running it on doesn't have a win dir (I have a windows dir instead)? Then it looks rather suspiscious to a semi-knowledgeable user. Other than that this program is definatley the way to go for Win '95 key stroke logging. You said you were going to monitor chat rooms? Do you know which program the person you're monitoring is using? Most IRC programs have the abililty to log everything. Could come in handy? -------------------------------------------------------------------- Also, we're ordering RoboSpy. Does anyone have any experience with it? How well does it work? Is it lethargic? What about any other programs like it? -------------------------------------------------------------------- Sorry.. never heard of it. What does it do? Maybe I can point you to some other similar programs... ************************************************************************** 2)From: CPUTERIO@aol.com Subject: Looking for my little girl I am searching for my daughter who I have not seen for 14 years, her mother left me when I went into the service. my daughter was 6 months old then. my exwife has changed her name several times since then and her location. she is somewhere in florida at the last recollection. my daughters name is jenise lynn puterio, her name is still the same her mothers maiden name is julie ann pepper. how can i find their social security numbers? and maybe a location. please respond immediately. thank you james puterio CPUTERIO@aol.com ************************************************************************** 3)From: "John " Subject: Re: Bodyguard Manual If anyone is seriously interested in Bodyguarding or Surveillance as a career visit our web site at: http://www.qpage.com/host/pba.shtml and follow the links. There are also details on how you can obtain a copy of our 800 page Bodyguard Training Manual, copies of which were recently requested by the Pentagon. Unfortunately, ours is not 'free'. *SMILE* Keep up the good work, XSAS ************************************************************************** 4)From: China Subject: Re: Night vision devices Diablo, Given your criteria, your best bet might be as follows: Company: Moonlight Night Vision Scopes Model: 1400 Select Scope URL link: http://members.aol.com/nightvis/index.html Regards, China ************************************************************************** 5)From: BADCOFFEE@aol.com Subject: Veeeeeerrrrrrrrryyyyyyy interesting Read on I am in NJ, this may not work elsewhere Recently having a problem with my MCI bill I was given the folowing number for customer service: 1-800-444-3333 Because it is quicker to pretend you don't have a rotary phone....I didnt press any numbers that would forward me to any voice mail systems. For whatever God known reason....... Mr. Computer voice man sweet-talked me as follows: "Our system indicates that you are calling for 201-# # # -# # # # " "Wowwie!" I said. That number sounds familliar. hey??? It's mine. God Bless America and it's fine way of securing our personal information. Again..... 1-800-444-3333 and make sure to that MCI for this free service. Let's go see if this works on payphones also.....be right back. (back) Yep...it works there too. Please.......let me know is this number works from all over the country. Augie :-) +++Moderator's Note+++ Hey Augie, How good are you at opening locks? Trace and I were discussing it and would like to know if you'll take our challenge? ;-) ************************************************************************** 6)From: kevina@citynet.net Subject: Need background check i need to help in doing a simple criminal background check on an individual, i have a phone number and i need an address to it, also maybe past military and birth cerificates, it is in tennessee. willing to pay reasonable fee. need asap. reply to kevina@citynet.net. thanks, kevin ************************************************************************** 7)From: CrACKeD Subject: Re: Countermeasures against Cloned Cellphones > How do I guard my cellphone against those who have my cloned > cellphone? I don't think scramblers would work against someone who's got > the exact replica of my cellphone. Cellphone cloning is a serious > problemo here in East Asia but people are just being wishy-washy and > don't seem to be taking serious action here. Well, if I had something to > say on the cellphone, I would assume that someone is listening thru the > unlimited radio space. I use a phone equipped with a tap > jammer+detection device when I have something important to say BUT it's > still annoying to know that someone out there is using cloned cellphones > for privacy prying purposes. It's more likely that someone will simply use a scanner for privacy prying purposes, but to answer your original question, no. If you want to keep your ESN secure, don't use cellular. You can scramble and encrypt your communications over and over, but as long as you're using a cellular telephone, you're broadcasting your ESN in the clear. If PCS is offered if your area, you may want to go with it instead. CrACKeD ************************************************************************** 8)From: John Palmeri Subject: The Most Realistic Looking Dummy Camera Available >From: "Lorenzo Castillo Sanchez" >Subject: Dummy Cameras > >I was looking for something like this before and I finally found >it. What if there was a fake security camera ? It looks real on the >outside but it's empty with no circuitry inside. It wouldn't record >anything but it might discourage people to try jumping over your >fence. It's about UKP 25.00(About $40, I guess). It won't cost me >that much compared to the actual security cameras. Then again, maybe >I'll order a small video transmitter for about $120 and put it inside >the dummy cam. Lorenzo, Rock House Products offers The Most Realistic Looking Dummy Camera Available. Models are available with or without a blinking LED. These units are under $50.00 US You can view full specifications and pricing at: http://www.rock2000.com/dummy/t0813.htm or visit our web site at: http://www.rock2000.com If you have any questions feel free to contact me. Best Regards! John Palmeri -- Rock House Products P.O. Box 2001 Monroe, New York 10950 USA Our NEW Web Site and E-Mail address is: http://www.rock2000.com sales@rock2000.com Phone +01-914-692-4077 Fax +01-914-692-4299 Visa & MasterCard are Accepted ************************************************************************** 9)From: "Jason E.J. Manaigre" Subject: Release of PGP 5.0 FreeWare Hello everyone, just wanted to drop a line and let everyone know that PGP 5.0 Freeware is now available for Download at:: http://web.mit.edu/network/pgp.html or directly at: http://web.mit.edu/network/pgp-form.html Built from scratch for Win95 NT and MacOS. For those who didn't want the hassles, it's a dream come true. Enjoy Everyone... ___________________________________________________________________ GarGoyle Securities -Intrusion Assessment Systems -Security Consultation/Education/Curriculum Development -Project Management/Research/Analysis World Wide... -Member of CITDC (Canadian International Trade Development Council) -Email: ratak@GargSec.mb.ca (Jason E.J. Manaigre) -Web: www.GargSec.mb.ca -Email for PGP key with phrase 'Get Public Key' as Subject ************************************************************************** 10)From: Ivor Rankin Subject: Re: RoboSpy et Al A tool I've recently tested for the above type scenario is Surveillance Agent available at http://www.formlogic.com I would interested to know of any other keystroke recorders avail for the Win95/Win Nt environment if anyone could assist. Please reply to: ivorr@samara.co.zw (Yep, Zimabwe! - I guess that is now 47 countries on the Spyking List). Regards, Ivor R ************************************************************************** 11)From: "KcW" Subject: Re: Laser Listening device plans wanted Try Information Unlimited at 603-673-4730.The plans are also published in a book by Robert Ianinni (spelling?) so chek out your local library-mine has it It's called something like trite like "Amazing Devices and Futuristic Somethings". i think that the plans were also published in one of the hobbyist magazines so again, check your local library. Regards to the list. ************************************************************************** 12)From: "KcW" Subject: Re: Police procedures Paladin Press has a few titles on police procedures. They have a website where you can order a catalogue: http://www.paladin-press.com/ I've ordered a couple of books and they were of good quality. ************************************************************************** 13)From: net_security@geocities.com Subject: Re: I'm not sure I follow your logic.. What I'm talking about is not directories and files open to public viewing. For instance; you visit a website that has pages you can visit, but you have to pay for those pages. You can get around the password "protection" they have on the pages. Maybe they have pages on their server that aren't for "public" viewing such as intranet pages. Or maybe they have pages they haven't finished developing and they haven't put a link to them yet. Thats what i'm talking about getting access to. If we can do that to them, then I am not surpirsed they can do it to us. Last public post on this :). gnu ************************************************************************** 14)From: SpyKing@thecodex.com Subject: NY Seminar/FAQ We've already gotten reservations from list members from as far away as Korea, Germany and Australia. Wow! I'm impressed... this promises to be quite an event... Read about it at: http://www.thecodex.com/methods.html P.S. We've put together a rough FAQ. It only consists of Links to sites which give info on list topics. Hopefully these sites can answer some of the repetitive questions we get on the list. There is also a software section which should of interest to all. If you know of a link that should be there please let me know and I will add... Checkout: http://www.thecodex.com/faq.html It will be online sometime today... I'm going to bed ;-) (Even Spyking must sleep) ************************************************************************** Who are you? What's your specialty and/or interest? Let us know about your company... What would you like to see on the list? Post it. Let us know... Do you have something to contribute? We'd like to hear it... We want to know EVERYTHING and ANYTHING about eavesdropping, surveillance, countersurveillance & privacy related technology, etc... Remember: who, what, where, when, how & why... we want ALL the details... Do you have a question? Post it... A little free time? Help a member... With the INCREDIBLE brain power on this list, someone should have the answer ;-) P.S. Don't be a LURKER... Members take the time to post info for us all... give something back... Don't just take... Your input/knowledge is valued... ************************************************************************** Send Postings to: spyking@con2.com with "Post" in subject field with subject ************************************************************************** Subscribe to: spyking@con2.com In the subject field type: subscribe-surveillance list e-mail address ************************************************************************** Unsubscribe to: spyking@con2.com In the subject field type: unsubscribe-surveillance list e-mail address ************************************************************************** ...The Simple Rules of the Surveillance List... The Surveillance List Owners may Reject any posts that are/contain: 1) Info Unrelated to Eavesdropping, Surveillance or Privacy technology... 2) Flames or Negative posts... 3) E-Signatures that are considered excessive... 4) Advertisements not DIRECTLY related to the list topics... 5) Attached Files... 6) Oversized Posts... (May be edited to save room) **************************************************************************** This publication is copyrighted and is protected by U.S. and International copyright law. The information transmitted on this list may not be reproduced, reposted or forwarded to any non-list member without expressed written permission of the List Owner. Violation of U.S. copyright law is a criminal and civil offense... **************************************************************************** The Surveillance List is Moderated by SpyKing@thecodex.com The List Owner will make EVERY effort to protect subscribers from spam... Copyright 1996, 1997 Codex Publishing Inc., All Rights Reserved... **************************************************************************** ****************************************************************************** Vol.Two Issue #142 The Surveillance List June 20,1997 Over 2200+ Members Worldwide Representing 50 different countries List Chat at: http://www.thecodex.com/chat.html Seminar Info at: http://www.thecodex.com/methods.html Surveillance List Pseudo FAQ at: http://www.thecodex.com/faq.html ****************************************************************************** IN THIS ISSUE... ****************************************************************************** 01) Key Log95 Where is it? 02) Re: Release Of PGP 5.0 Freeware 03) Re: Transmitter and reciever 04) Re: MCI 1-800-444-3333 05) SPY VS. SPY 06) Re: RESPONSE TO POLICE PROCEDURES 07) Re: Key Log '95 v2.0. 08) MCI ANI number 09) Re: Panel Chief: Computer attacks Are Inevitable 10) They found out what they didn't really want to kno 11) Toy Cell Phone Makes Great Project Case 12) Looking for my little girl 13) Re: Police Procedures 14) Location of List Members 15) Re: MCI ANI 16) Re: Fix for Netscape Bug ****************************************************************************** DON'T BE A LURKER.... GET INVOLVED... YOU ARE A MEMBER... MAKE THE MOST OF IT ****************************************************************************** 1)From: Mike Gevaert Subject: Key Log95 Where is it? Also, to the person who posted that Key Log '95 v2 is the best keylogger. WOuldn't it be a good idea to post where someone could find it. THanks, I've looked for it, and it seems that key log '95 v1 is all over, never seen keylog v2. MIRC does have its own capture "utility" and it can become very handy, I also have heard of a few programs, or plugins, that will record all website visited. Very useful. I have no idea where to find these....Sorry |-(. Also, I'm looking for a program to be able to decode the cache in MSIE 3.02a for win31. I know there is a product for Netscape which allows you to "surf the cache" (surf is overused, how 'bout purused (sp?). Anyhow, L8r, BTW, great job to: Augie, Trace Carpenter (gotta email ya sometime), Cracked, and Mutter, and all other frequent posters that I don't remember the names. L8r Mike ************************************************************************** 2)From: Ivor Rankin Subject: Re: Release Of PGP 5.0 Freeware Re: Release Of PGP 5.0 Freeware "Jason E.J. Manaigre" Wrote: Hello everyone, just wanted to drop a line and let everyone know that PGP 5.0 Freeware is now available for Download at:: http://web.mit.edu/network/pgp.html .... The International version will unfortunately only be available "legally" In early July. If anyone is interested in updates regarding availablity of the international version - take a look at the PGP International Home Page at : http://www.ifi.uio.no/pgp/ Thank you the info Jason. Regards - Ivor R ************************************************************************** 3)From: ProvRhode@aol.com Subject: Re: Transmitter and reciever HI, Thanks everyone for your responses. Yet, I think I need to be more specific. It is essential that I have a wireless transmitter and reciever setup. The items some of you mentioned from radio shack are not wireless. I can't just plug a vox recorder into the phone line. I need to transmiter and recieve so there will be no wire to detect. Hence I need this to be done as clandestine as possible. Some of you mentioned a crystall type unit , perhaps that is what I need. I don't mind spending a couple of hundred at most on such a system. ************************************************************************** 4)From: crudgmar@sprynet.com Subject: Re: MCI 1-800-444-3333 TO:BADCOFFEE@aol.com RE:MCI 1-800-444-3333 I live in Conn. and tried your 1-800 number for MCI. After listenining to the usual junk announcement, I got to the part where they say: You are calling from.... (and then they spiel-off a number)....well they did not have my correct number. (They did have the correct area code and first 3 digits) .....just thought I would pass along some feedback. ************************************************************************** 5)From: Mike Gevaert Subject: SPY VS. SPY I am forwarding this post from C|Net's Shareware digest. I weekly publication detailing the best shareware. I would suggest everyonw to subscribe, its a great list, and as far as I can tell, they don't sell their info on you or junk mail you (thank Goodness). To subscribe by email: 1. Send an email message to listserv@dispatch.cnet.com 2. In the body of the message put the following: subscribe shareware-dispatch; Anyhow, this is pretty interesting... SPY VS. SPY Desktop Surveillance offers a unique approach to solving system access problems and minimizing the potential for abuse of computer hardware and software. The program is the software equivalent to a surveillance camera, and it works by logging any or all desktop activity. Two modes are available: one displays warning signs in order to discourage misuse; the other surreptitiously monitors activity. While Desktop Surveillance can store days of activity logs at a time, the program's settings can be tailored for virtually any situation. It addresses more than just Web browsing concerns; it can be activated the instant someone visits particular Web sites or even specific Internet Relay Chat (IRC) channels. Desktop Surveillance can also be controlled from a remote location, either via local network or the Internet, and in both cases it's possible to observe activity on the local desktop in real time. FACT FILE: Program name: Desktop Surveillance Version: 2.0 Size: 2780K Developed by: Omniquad License: Shareware ($55) Requirements: Windows 95/NT Catch a hacker red-handed: http://search.shareware.com/code/engine/Find?archive=cnet-win95&cfrom=power& search=spy32.zip&and=&orfile=on&name=&hits=25&sort=by+date+-+new+files+first Have fun, L8r, Mike G |-) ************************************************************************** 6)From: JBull24@aol.com Subject: Re: RESPONSE TO POLICE PROCEDURES SIR, EACH DEPARTMENT WRITES ITS OWN PROCEDURE MANUAL. FOR YOU TO FIND OUT IF THE OFFICERS FOLLOWED DEPARTMENTAL POLICY AND PROCEDURE YOU WOULD NEED TO CHECK WITH THE DEPARTMENT. I AM AN EX-POLICE OFFICER AND HAVE WORKED FOR THREE DIFFERENT DEPARTMENTS, EACH WITH DIFFERENT PROCEDURES. THE CITY OF WINSTON-SALEM, NC HAD THE MOST UP TO DATE POLICY MANUAL WHICH COVERED EVERY STEP OF EVERY MAJOR CRIME INVESTIGATION. THE LAST PLACE I WAS EMPLOYED WAS THE TOWN OF MADISON, WHOSE POLICIES WERE A JOKE. THE OFFICERS THERE CAME VERY CLOSE TO VIOLATING PEOPLES RIGHTS DUE TO THE LACK OF POLICY. IF YOU THINK SOMETHING WAS NOT DONE CORRECTLY, CONTACT THE INTERNAL AFFAIRS DIVISION OF THE DEPARTMENT. THOSE GUYS ARE CHOSEN BECAUSE OF THEIR INTEGRITY AND HATE DIRTY COPS AS MUCH AS THEY DO CRIMINALS. ************************************************************************** 7)From: "Martin Rosa" Subject: Re: Key Log '95 v2.0. I think that the best keystroke logger available for Win '95 is Key Log '95 v2.0. The first version wasn't so great, but since version 2 came out this is the only one I use. It hides excellent under win '95. Does not show up on the taskbar, starts "stealthily", and when you do a CTRL+ALT+DEL it shows up as WinMEM (so as not to arouse suspision from curious users). ----------------------------------------- KeyLog '95 v2.0 is almost excellent. In fact, you can see it in the task list when you do CRTL+ALT+DEL. It doesn't show up in the taskbar as you mentionned, but you can see it when you do switch task with ALT+TAB. Not very great... Suspicious enough. Anyway, this version works very well on Windows 3.1/3.11. The only place you can see it is *REALLY* only in the Tasklist (CTRL+ESC). However, it also logs everything in \win\logx, that can also be suspicious. Martin Rosa Analyst/Programmer DMR Consulting Group Inc. -=( My thought doesn't reflect those of my employer )=- ************************************************************************** 8)From: "M. J. Van Ham" Subject: MCI ANI number > 1-800-444-3333 and make sure to that MCI for this free service. > Please.......let me know is this number works from all over the country. Works in Southern Ontario, Canada. ************************************************************************** 9)From: Judge@innocent.com SUBJECT: Re: Panel Chief: Computer attacks Are Inevitable I know this is from a surveilance forum but I thought this may interest a few people. More info about AccessAllAreas mailing List available from mailto:Judge@innocent.com >WASHINGTON (June 18, 1997 7:20 p.m. EDT) -- It is "only a matter of >time" before critical U.S. computer systems face major attack, said the >head of a White House panel on the nation's infrastructure systems. > >"There's isn't a nation out there with a war plan ... but it's sure to >evolve," said Robert Marsh, the head of the President's Commission on >Critical Infrastructure Protection. > >"It is only prudent that we take action to close the door on those >opportunities," he said, adding, "It is only a matter of time. ... We >must address it. " > >Marsh told a group of reporters that his panel is expected to make its >report to the White House by October, and will make recommendations on >how the government and private sector can make vulnerable systems >more secure. > >At present, most intrusions are carried out by "recreational hackers," >he said. > >Marsh said his panel has been holding hearings around the country to >"raise the awareness" -- particularly among the private sector -- of >problems that could face the nation's telecommunication, power, banking, >finance and other systems that are dependent upon computers. > >Marsh, a retired Air Force general and a former aerospace consultant, >said he does not believe that there are so-called "fire walls" that >protect computer systems that experts can't get around. > >For example, he said, the banking industry doesn't deny it has lost >billions of dollars to computer hackers and has accepted this as the >cost of doing business. > >At present, there are no "tools to identify what is going on. ... We are >at a very primitive phase of understanding," Marsh said. > >One major hurdle is getting the government and the private sector to >cooperate in order to identify weaknesses, which many companies are >loathe to acknowledge, Marsh said. Another problem is the global >aspect of international businesses and their computer networks, he said. > >[Copyright 1997 Nando.net] >[Copyright 1997 The Associated Press] ************************************************************************** 10)From: Lawrence Wood Subject: They found out what they didn't really want to know Ditto to item # 10 in the Vol two Issue # 140 I work part time at Radio Shack during the Christmas holidays and the number of people coming in to get the phone listening devices, minature wireless mikes and recorders is very large indeed. The sad part about it is most of them return the items after about two/three weeks with very sad expressions on their faces. They found out what they didn't really want to know, and now they have to decide what to do about it. Live with it, work to correct it,or join the ranks of divorced and seperated. Just remember, whatever you do, if you EVER let the other half know that YOU know because you bugged them, if it wasn't over, it is now P.S. Do not get mini recorders, get the flat desktop kind that are voice activated, and use a battery eliminator on the recorder. If you use cheap equipment and it causes problems on the line, they will hunt until they find your device and hell hath no scorn like a lady that has been bugged.... LHW ************************************************************************** 11)From: Harold Peach Subject: Toy Cell Phone Makes Great Project Case While at Toys-R-Us the other day I came across a toy cellular telephone that looks EXACTLY like a real Motorola Flip Phone. I purchased one with the idea that my Opto Cub might be modified to fit inside, making it less conspicuous in certain public situations. Unfortunately, the Opto boards are about 1/2" too wide to fit. But, the phones might be used for other radio projects when similar concerns are involved. The phones are called "Talking Play Phone," Item No. 11007, and are made in China for 200 Toy, Inc., Milford, Massachusetts 01757. They are packaged in a clear hard plastic shell, attached to a piece of cardboard that is blue and white. The Toys-R-Us sticker looks like this: 11007 54 1 081213 $4.99 They come in many colors. Gray will most closely match a real Flip Phone. A small screw in the back allows the phone to be easily disassembled and re-assembled. A nibbling tool can be used to create more space inside the case. At $4.99 the price is right. --- Harold hpeach@pop.uky.edu ************************************************************************** 12)From: Trace Carpenter Subject: Looking for my little girl We'd be happy to help you find her if we can. Florida is one of the easier states to locate people in, so if we can help please give me a call. Since you are a list member, I'll keep charges down to expenses only. -- Trace Carpenter Investigations ****** 2926 Maple Ave., Ste. 200 Friends help you move; Dallas, Texas 75201 Real friends help you move bodies. 214.828.4520 ****** ************************************************************************** 13)From: Duece6x6@aol.com Subject: Re: Police Procedures In response to Greg Caldwell on Police procedures and others requesting this info. Most agencys have thier own S.O.P. and you need to contact them through the 1984 Freedom of information and privacy act., usually through the city attorneys office requesting the Police depts. administrative proceedures which by law are public record. If you want a great reference try online at www.ira2000.net/ira/ira.htm and www.copsonline.com/ and www.caliberpress.com THE DUECE ************************************************************************** 14)From: SpyKing@thecodex.com Subject: Location of List Members We currently have list members from the following countries. If you are a list member and you are not represented here it's because your e-mail address does not show a country code. Let me know and I will add you... ar Argentina au Australia bm Bermuda br Brazil ca Canada ch Switzerland cl Chile cn China cz Czech Republic de Germany dk Denmark eg Egypt es Spain fi Finland fr France gr Greece hk Hong Kong hr Croatia hu Hungary id Indonesia ie Ireland il Israel it Italy jp Japan kr South Korea lv Latvia mx Mexico my Malaysia nl Netherlands no Norway nz New Zealand pe Peru ph Philippines pl Poland pr Puerto Rico pt Portugal ro Romania ru Russia sa Saudi Arabia se Sweden sg Singapore si Slovenia th Thailand ua Ukraine uk United Kingdom us United States yu Yugoslavia za South Africa zw Zimbabwe The largest membership is the USA followed by Australia, Netherlands, Canada and the United Kingdom. Keep up the good work list and let's hear from everyone... We want to hear EVERYONE's opinion... ************************************************************************** 15)From: Paul Longo Subject: Re: MCI ANI >1-800-444-3333 and make sure to that MCI for this free service. > >Let's go see if this works on payphones also.....be right back. (back) >Yep...it works there too. > >Please.......let me know is this number works from all over the country. > >Augie :-) Hey, List: Augie's MCI number works in Connecticut.... (Nice catch!) Paul ************************************************************************** 16)From: Jim Motes Subject: Re: Fix for Netscape Bug Netscape version 4.01 can be downloaded with a fix for the bug the has consumed so much cyber-ink lately. You can get it at: www.hotfiles.com/?000FT5 Jim Motes ************************************************************************** Who are you? What's your specialty and/or interest? Let us know about your company... What would you like to see on the list? Post it. Let us know... Do you have something to contribute? We'd like to hear it... We want to know EVERYTHING and ANYTHING about eavesdropping, surveillance, countersurveillance & privacy related technology, etc... Remember: who, what, where, when, how & why... we want ALL the details... Do you have a question? Post it... A little free time? Help a member... With the INCREDIBLE brain power on this list, someone should have the answer ;-) P.S. Don't be a LURKER... Members take the time to post info for us all... give something back... Don't just take... Your input/knowledge is valued... ************************************************************************** Send Postings to: spyking@con2.com with "Post" in subject field with subject ************************************************************************** Subscribe to: spyking@con2.com In the subject field type: subscribe-surveillance list e-mail address ************************************************************************** Unsubscribe to: spyking@con2.com In the subject field type: unsubscribe-surveillance list e-mail address ************************************************************************** ...The Simple Rules of the Surveillance List... The Surveillance List Owners may Reject any posts that are/contain: 1) Info Unrelated to Eavesdropping, Surveillance or Privacy technology... 2) Flames or Negative posts... 3) E-Signatures that are considered excessive... 4) Advertisements not DIRECTLY related to the list topics... 5) Attached Files... 6) Oversized Posts... (May be edited to save room) **************************************************************************** This publication is copyrighted and is protected by U.S. and International copyright law. The information transmitted on this list may not be reproduced, reposted or forwarded to any non-list member without expressed written permission of the List Owner. Violation of U.S. copyright law is a criminal and civil offense... **************************************************************************** The Surveillance List is Moderated by SpyKing@thecodex.com The List Owner will make EVERY effort to protect subscribers from spam... Copyright 1996, 1997 Codex Publishing Inc., All Rights Reserved... **************************************************************************** ****************************************************************************** Vol.Two Issue #143 The Surveillance List June 23,1997 Over 2200+ Members Worldwide Representing 50 different countries List Chat at: http://www.thecodex.com/chat.html Seminar Info at: http://www.thecodex.com/methods.html Surveillance List Pseudo FAQ at: http://www.thecodex.com/faq.html ****************************************************************************** IN THIS ISSUE... ****************************************************************************** 01) Re: MCI 1-800-444-3333 02) Re: MCI 1-800-444-3333 03) Mitsubishi video printer 04) Re: Key Logger v2.0 05) BadCoffee Accepts Challenge 06) Re: MCI ANI Number 07) Get KeyLog95 v2.0 Here 08) Question About PGP 5.0 Freeware 09) Re: MCI 1-800-444-3333 10) Bug detecting 11) Re: Panel Chief: Computer attacks Are Inevitable 12) Re: MCI 1-800-444-3333 13) SL Forum 14) Keyloggers 15) "HELP WANTED" Sporting Event Surveillance 16) Phone Line Voltages? 17) [Fwd: Viruses] 18) Unix? 19) Scanlock 2000 for sale 20) To post or not to post 21) I would like to capture audio and video 22) Your listing 23) RE: MCI 1-800-444-3333 24) AOL Passwords? 25) Re: Military Encryption Cracked 26) Another ANI (Possibly Houston 713 Specific) 27) PGP 5.0 (will it work for Aegis Shell?) 28) KEYLOG2! Download site 29) Want to purchase 30) RE: Key Log95 v2 Where is it? 31) PI job? 32) Forewarned is forearmed 33) Re: Veeeeeerrrrrrrrryyyyyyy interesting 34) Boost the signal output? 35) Re: Tracking/catching cloned cell phones 36) Sentury Fire Safes 37) BCWipe for Windows 95 / Windows NT 4.0 38) Americans vs. Canadians (fwd) 39) Upcoming visit to Hong Kong and TSCM Seminar in Boston ****************************************************************************** DON'T BE A LURKER.... GET INVOLVED... YOU ARE A MEMBER... MAKE THE MOST OF IT ****************************************************************************** 1)From: Tohru Watanabe Subject: Re: MCI 1-800-444-3333 That is an ANI #. Should work everywhere in the US. The reason that the other guy got the area code and the first 3 digits right but the last 4 digits wrong is because he called from a PBX or something. There are many numbers e.g. 800-4blockme . Most of the companies that have 800 or 900 numbrs get your number wether it be a month after your call or right at the moment you place your call like the ANI #'s. For 800 # they pay for your call so they have a right to know who's calling. For the 900 #'s, they still get your #. They need your number for any reason. Tohru ************************************************************************** 2)From: Michael MacDonald Subject: Re: MCI 1-800-444-3333 >Subject: Re: MCI 1-800-444-3333 >TO:BADCOFFEE@aol.com > RE:MCI 1-800-444-3333 > > I live in Conn. and tried your 1-800 number for MCI. > not have my correct number. (They did have the correct > area code and first 3 digits) .....just thought I would > pass along some feedback. Well I just had to try it, seeing as how I'm a Canadian. It worked. I live in the Toronto region, ontario, Canada. FYI ************************************************************************** 3)From: Ronald Pentecost Subject: Mitsubishi video printer To whom it may concern: I have procured via auction, a Mitsubishi Video Printer, Model no. p5ou. Manufactured December, 1984. I have little idea of what, if anything, this thing is worth. In fact, I don't even know if it works. If it is in working order, do you have any idea of it's value? I would appreciate any help. Thank you. Ronald. ************************************************************************** 4)From: "M. J. Van Ham" Subject: Re: Key Logger v2.0 Sorry folks.. apparently I neglected to mention where to get v2.0 of KeyLogger (I didnt' realize it was so hard to come by). I got it from http://www.silitoad.org. In my opinion one of the best sites on the 'net, hands down. ************************************************************************** 5)From: BADCOFFEE@aol.com Subject: BadCoffee Accepts Challenge In 6/19's forum at 9:53 am, Augie reads something that might go like this......... >>+++Moderator's Note+++ >>Hey Augie, How good are you at opening locks? Trace and I were discussing it >>and would like to know if you'll take our challenge? ;-) At 9:54 am, he responds like this: (I know he's going to give me spool pins, I know he's going to give me spool pins, I know he's going to give me spool pin, I'm going to hate him if he gives me spool pins, He knows I'm choaking on spool pins, I know he's going to give me spool pins....) ONLY because I have a fantastic day job that allows me to oversleep 7 of 7 days....LOL, I have to say: YES :-) Providing you POST the results and Trace doesn't pee pee his pants watching me loose my mind on a lock that "he" has modified by replacing a pin with bubble gum. Quickie story: Last night I went to Home Depot to buy a good practice lock for my wife to pick. The Quickset Titan was a good choice. Coming back, I didnt have key to get back in my front gates. I picked it in 15 seconds. Very happy...but spun the plug the wrong way. Start again. 5 frustrating minutes went by on this peice of Kaa Kaa. Nope, it just did not want to open the right direction. (must have been broken) I eventually got in the gates. Later that night, I was poping the Titan....Mrs. High security nonsence lock time after time within 5 seconds. Somtimes you feel like a nut......somtimes you don't. The answer to the question is "yes, please" :-) PS- I'm going to start proof reading my posts soon.....The first MCI post in the last forum was a mess. Let me make correction here, This is what it should have said: Call 1-800-444-3333...don't touch a single button and see what happens. Augie ************************************************************************** 6)From: Chris Kuethe 768 Subject: Re: MCI ANI Number > 1-800-444-3333 and make sure to that MCI for this free service. > Please.......let me know is this number works from all over the country. it works in edmonton, alberta, canada -- Chris Kuethe | finger -l for my pgp key remove the square brackets to mail me | http://www.ualberta.ca/~ckuethe/ GoCS3Sb5Th2 TJtFe9 PStGR B10/22Bk!"2 cDbr-c6 V6s3 M3p1D C9oecp a19- b64 ZTeiTetTezClbCls p3)1(ZZZZZz H183 v6MRS r6BP D64! h8(TAnFeD) w6! sM10M SrNn n5 LcaAB5 k3)7(BdMDspNW N1290PFLEH RzS*2p3 g5L??94A m@Z4? ************************************************************************** 7)From: WindWalker Subject: Get KeyLog95 v2.0 Here Thanks to M. J. Van Ham sending it to me, you can get v2.0 of KeyLog95 at my site. The direct URL is http://www.dynanet.com/~wieland/keylog95.zip -WW To reply you must remove the .antispam from the email address. Or just click here -> mailto:WindWalker@peacefire.org My ICQ UIN is 1430880. -=WindWalker Access=- -=PeaceFire=- http://www.dynanet.com/~wieland/ http://www.peacefire.org/ ************************************************************************** 8)From: WindWalker Subject: Question About PGP 5.0 Freeware I'd like to know what the advantage or purpose of PGP 5.0 Freeware is compared to previous 2.6.x versions. Does PGP 5.0 support 4096-bit keys? Does this version have several flavors like the 2.6.x version did? I'd appreciate any info anyone can give me. -WW -- To reply you must remove the .antispam from the email address. Or just click here -> mailto:WindWalker@peacefire.org My ICQ UIN is 1430880. ************************************************************************** 9)From: POMal123@aol.com Subject: Re: MCI 1-800-444-3333 In a message dated 97-06-20 07:21:39 EDT, someone wrote: << I live in Conn. and tried your 1-800 number for MCI. After listenining to the usual junk announcement, I got to the part where they say: You are calling from.... (and then they spiel-off a number)....well they did not have my correct number. (They did have the correct area code and first 3 digits) .....just thought I would pass along some feedback. >> It worked from my home phone in No. Virginia. The flub noted above could be a PBX switch problem if the poster called from work, depending on the size of the business phone system. The outbound number picked up by Caller ID (and presumably the MCI number) off PBX switches is almost never the correct extension, in fact often a different exchange. Same glitch with the Bell "Return Call" feature. Best you get is the name to which the number is assigned, and that only with "Deluxe" Caller ID. FWIW. O'Malley ************************************************************************** 10)From: "Carney, Brian" Subject: Bug detecting Anyone know how to detect an line type bug with a voltohm meter?? Please any information Brian ************************************************************************** 11)From: Mutter Subject: Re: Panel Chief: Computer attacks Are Inevitable > 9)From: Judge@innocent.com > SUBJECT: Re: Panel Chief: Computer attacks Are Inevitable > > >WASHINGTON (June 18, 1997 7:20 p.m. EDT) -- It is "only a matter of > >time" before critical U.S. computer systems face major attack, said the > >head of a White House panel on the nation's infrastructure systems. > > > >Marsh, a retired Air Force general and a former aerospace consultant, > >said he does not believe that there are so-called "fire walls" that > >protect computer systems that experts can't get around. > > > >For example, he said, the banking industry doesn't deny it has lost > >billions of dollars to computer hackers and has accepted this as the > >cost of doing business. > > > >At present, there are no "tools to identify what is going on. ... We are > >at a very primitive phase of understanding," Marsh said. > > I'd encourage list-members to question figures like "billions of dollars" for they are often greatly exaggerated in order to spread fear to get funding to "close the doors on the opportunities." To me, it sounds like Mr. Marsh is just spreading paranoid delusions of the evil hacker threat taking over the world, reminiscent of the movie, The Net. - M u t t e r Ed. root zine (http://www.openix.com/~mutter) mutter@openix.com ************************************************************************** 12)From: Mutter Subject: Re: MCI 1-800-444-3333 Okay, we can all stop telling each other where it works because it works nation-wide. The number is by no means unusual. _EVERY_ 800 number you dial receives the number you're calling from (because, remember, they have to pick up the bill for your call). Most 800 numbers'll get you number on their bill at the end of the month (or whenever) but a lot can afford to get number-delivery in real time. Quite a few (like this one) will actually read back your number to you. It is using a system called ANI (Automatic Number Identification) which I believe I've mentioned on this list before. It is NOT callerid (it is sent differently, works differently, and most importantly *67 does not do anything to it). Augie, if you want to play with an even easier method of getting the line number just pick up a phone and dial 958 -- that's your local ANI readback number -- each area has its own -- for telco linemen to identify lines... - M u t t e r Ed. root zine (http://www.openix.com/~mutter) mutter@openix.com ************************************************************************** 13)From: phreaker@technologist.com Subject: SL Forum I wanted to tell you how much I enjoy the SL Forum. It has to be alot of work. I ask just one thing of you. Most systems like this tend to become rife with dissension, please don't let this happen. Your method of screening posts is great. It keeps everyone on point. Thanks, Phreaker ************************************************************************** 14)From: Trace Carpenter Subject: Keyloggers There has been alot of talk around here lately about keyloggers and keylog95. I hadn't had much time to play with them until recently when I had to have one to do a specific task and had to find the time. First, thanks to Frank (SpyKing) for his help and M.J. Van Ham for e-mailing me a copy of Keylog95 Version 2. For those of you who need a keylogger for Win 3.11 the old Keylogger software is fine. I quickly found you can make it run tranparent by using the load instead of the run command in the win.ini file. It'll load into memory and not place that stupid icon on the desktop which tells you to minimize this window. For 95 logging, Keylog95 V2 is an excellent choice. The first thing you want to do when you get it is to rename the executable file (keylog2!.exe) something else, like winstak.exe. They say to rename it winmem.exe but I don't want to lead anyone to the file and that's what it's called in the close program menu. More on that in a minute. Version 2 will run transparent and will NOT put that blank box on the taskbar. Further, when you do a Ctrl-Alt-Del from the desktop and you get that close program menu it'll display itself as Winmem, not keylog. Also, just in case someone does find the executable file, (which would be hard if you put it in the windows directory instead of it's own directory) and they type the executable name to run it, it comes up invalid password unless you know the "secret switch" to put after the command. By that I mean you have to type keylog2 -s to get it to run. Or Winstak -s depending on what you rename it. MAJOR NOTE: the switch "-s" is case sensitive. There is also one more switch which is "-hacker" which will cause the program to run in overt or visible mode. The only bad thing about the program is that it places the logged files in a directory called C:\win\logx. That could be a problem if the Target knows his computer and his windows directory is Windows instead of Win. I have a case coming up which that may be a problem and if so we'll probably modify the executable file to use the Windows directory. If so we'll put out a posting. As for where to get it, sorry. I didn't go find it. It was e-mailed to me, but I'll be glad to pass it on if you need it let me know. If the requests get to be too many, that perhaps Codex will place it on the site. -- Trace Carpenter Investigations ****** 2926 Maple Ave., Ste. 200 Friends help you move; Dallas, Texas 75201 Real friends help you move bodies. 214.828.4520 ****** ************************************************************************** 15)From: "Michael W. Everhart" Subject: "HELP WANTED" Sporting Event Surveillance I AM SENDING THIS MESSAGE AGAIN, DUE TO PROBLEMS WITH MY INTERNET PROVIDER. SINCE I HAVE CHANGED INTERNET PROVIDERS, WHICH IN TURN CHANGED MY EMAIL ADDRESS. NEW ADDRESS EFFECTIVE 06/16/97: cis@idir.net > >**************** INVESTIGATORS WANTED FOR PIRACY SURVEILLANCE****************** > > Central Investigative Services, is again seeking Investigators, nationwide, to conduce spot checks(surveillance) of sports bars and other establishments for places illegally showing fights and sporting events. > Central Investigative Services pays competative rates, per establishments illegally showing these events. The next "BIG" event is on June 28, which will be one the the biggest events this year. > If you are interested in completing this type of service or wish to receive additional information, please return the following information, via email, asap. > >Agency Name: >Owners Name: >State of City Licensed: >Address: >Telephone: >FAX NUMBER: >Area you are interested in covering: >Number of Investigators you will have avaliable: >Do you have experience in this type of surveillance: > > Central Investigative Services posted this notice a few months ago, and the response was overwelming. Those who provided the requested information were contacted. Most of the initial information is sent via fax, and some of the responses did not include their fax number. We a looking to heavily cover this event, with as many investigator as possible. > > Michael W. Everhart, Owner Central Investigative Services Clinton, Missouri (816) 885-7585 e-mail: cis@idir.net ************************************************************************** 16)From: BADCOFFEE@aol.com Subject: Phone Line Voltages? Ok guys, i'll put my neck out and say that I have received a TON of mail from all over the USA and Canada confirming the MCI 1-800-444-3333 is an acurate means of identifying the phone number that you are at (including payphones.) For those that are lost, I tripped onto something last week: Just call and dont press any buttons. Question: What is the normal voltage (range) of a phone line in the US. Is canada the same? What would the voltage fluctuate to is there was a tap sucking power from the line? Multi tester ok? Digital? What's with those $100 phone tap detectors? Bad move? Do Hotels/offices that have "switchboards" (?) run off same range in power through lines? Augie ************************************************************************** 17)From: "Richard A. Kinkopf" Subject: [Fwd: Viruses] >>>> From: Gerald Wheatley Subject: Viruses Hi Rick, I heard about some insidious computer viruses that are invading our systems. I thought you should know about: Paul Revere Virus: A revolutionary virus that doesn't horse around. It warns you of impending hard disk attacks --- once if by LAN, twice if by C. Ted Turner Virus: Colorizes monochrome monitors. Government Economist Virus: Nothing works, but all of your diagnostic software says everything's okay. Oprah Virus: Your 200MB hard drive suddenly shrinks to 100MB -- then slowly expands back to 200MB. PBS Virus: Stops your computer every few minutes and asks for money. Freudian Virus: Your computer becomes obsessed with its motherboard. And finally, The Federal Bureaucrat Virus: Divides your disk up into hundreds of little units, each of which does practically nothing, but all of which claim to be the most important part of the operating system. Keep your mouse on alert, THEY ARE EVERYWHERE ! Paranoically Yours, Jerry <<<< ************************************************************************** 18)From: bcarr@datalynxil.com (DLIL-Carr, Barry) Subject: Unix? how do you hack a unix if you dont have a dpmi driver wich means 3/4 of the password cracking utilities dont work and how do you get a dpmi driver or a password cracking program that does not use a dpmi driver but still explain to me how do you hack a unix i would really appriciate it ************************************************************************** 19)From: "the Gateway" Subject: Scanlock 2000 for sale I have a Scanlock 2000 (2nd hand) for sale. Prize R 18 000-00. Are you interested? Phone me in South Africa at tel +270824918899. ************************************************************************** 20)From: BADCOFFEE@aol.com Subject: To post or not to post POST!!!! A little something that a few thousand lurkers do not know about....... Your opinion on things, and I don't care if you are a PI or a student is just as valuable as specific techinical knoledge. There is not ONE field that does not have something that might contain information that is usefull to this list. Life boils down to those stupid little tid bits that make us hit ourselves over the head and say "Oh you've got to be kidding me.....why didn't I think of that". The beauty of this list is that there are so many opinions that if say "I" am wrong......someone else will catch it and make correction. Being WRONG here is just as important if not more so than being right. In real life, when sometimes you only have ONE shot at something......that little lady in the back of the room whispering "No....not that way...I have a better way" is worth her weight in diamonds. As your reading every word whispered, every shake of your head, every nod, every thaught..........if it is usefull even "this" much.....should be considered for post. Keep an eye out throughout the day for the "thousands" of lifes experiences that are certainly a major contribution. Remember, sometimes "small and useless" to you.....saves someone's butt in Pakistan. Post it! Augie :-) ************************************************************************** 21)From: Jerry Subject: I would like to capture audio and video Guys (a generic term) I need some help. I need a (cheap) way to facilitate the equivilent of a nanny cam only I need one that will either last 48 hours before tape changes or if at all possible one that is motion activated. It is to go into a private office that is being breached. I would like to capture audio and video, if this possible with out selling the farm to be able to afford the equipment. Any help or suggestions will be greatly appreciated. I acan be reached by e-mail at ILQQK4DOE@worldnet.att.net or just post. Thanks Jerry ************************************************************************** 22)From: Gary Cohen Subject: Your listing If anyone would like to see their listing from my list, (for your corrections), e-mail me privately. If you'd like to add your listing, please submit it in this format: Name: E-mail: Agency: Address: City: State: Zip: Phone: Fax: Specialties: Memberships: URL: Thanks Gary Cohen Investigator Ft. Lauderdale/Pompano Beach Florida heatgain@mindspring.com Member-FALI & SFIA Chairman, Internet Committee, SFIA SFIA - http://www.webcircle.com/users/sfia/ ************************************************************************** 23)From: BADCOFFEE@aol.com Subject: RE: MCI 1-800-444-3333 crudgmar@sprynet.com getting wrong number from MCI thing. BadAugie's response: Whoa! Thats not nice of them. CA has tried it sucessfully. Keep sending me feedback please so I can compile a reasonably acurate picture of this thing for future posts. Someone else in Conneticut try this thing please and post or let me know. :-) Augie ************************************************************************** 24)From: "Zman5@idt.net" Subject: AOL Passwords? Hello, I would really like to know where The Filez for all the AOL passwords are, cause i need to know. Thank you!! -SiVa ************************************************************************** 25)From: Judge@innocent.com SUBJECT: Re: Military Encryption Cracked Reply-To: aaa-list@lists.netlink.co.uk Computer Group Unites To Break Computer Code But It Took 4 Months June 19, 1997 SAN FRANCISCO (AP) -- Using the Internet to harness the combined power of their machines, thousands of computer users broke a government-endorsed code that protects electronic money transfers. The group, organized by programmer Rocke Verser, took four months to read a message that had been scrambled using the code, known as the Data Encryption Standard. The code was finally broken Tuesday. The national standard, or DES, was considered almost unbreakable when introduced in 1977. It is required in most federal agencies but not the military, and is also widely used in the private sector. Critical information in computers is protected by the national standard and other encryption programs that use very large numbers to scramble information. Only the correct "key" can unlock the encrypted information. The longer the key, the harder it is to crack. Given the fact that it took four months to break through the standard code, experts say the nation's financial institutes are hardly at risk. Most of them use what it known as dynamic key exchange, which changes the keys almost constantly during a transaction. Taking months to crack the code wouldn't do thieves much good. Verser and his group were responding to a $10,000 challenge offered in January by RSA Data Security Inc., a Redwood City, California, company that sells encryption programs. The actual attack on the code was quite simple. Verser wrote a program that ran through every possible combination that might unlock the coded message -- 72 quadrillion of them in all. Then he put a copy of the program on his Web site and invited others to work on cracking it. Anyone could download the program, which would then run in the background as they went about their work. The project began with 20 computers and ended with 14,000 working on the problem. All told, they used 10 million hours of computer time. Had they started with 14,000 computers it would have taken about 30 days, Verser said from his Loveland, Colorado, home. While the code-cracking doesn't have much practical uses, it's a harbinger of things to come, said David Weisman, director of money and technology strategies for Cambridge, Massachusetts-based Forrester Research. "It's not something to cause a panic. But people have known that as computing power increases, key lengths have to increase," he said. The incident is likely to prompt more calls for relaxing U.S. laws that restrict the export of longer codes. [AP] ************************************************************************** 26)From: phreaker@technologist.com Subject: Another ANI (Possibly Houston 713 Specific) In the Houston 713 area ANI will work by dialing 380 plus 7 of the same digit, e.g. 380-222-2222 or 380-777-7777. I don't know if it works anywhere else but would like to. P ************************************************************************** 27)From: "The Swordsman" Subject: PGP 5.0 (will it work for Aegis Shell?) Im glad they updated PGP but I need to know if it will still work with my PGP shell application Aegis Shell. In addition, Im also using PGPJN which is a PGP interface for Pegasus Email, but again I dont know if the new version will work well with these two applications. Can anyone help? Thanks, Frank Pagano (a.k.a. The Swordsman) A.S. Criminal Justice-Law Enforcement Auxiliary Police Officer, New York CyberAngels(#IRC226)--Director of Cybercops Team http://www.geocities.com/CapitolHill/7245 "And whosoever shall offend one of these little ones that believe in me, it is better for him that a millstone were hanged about his neck, and he were cast into the sea." (Mark 9:42) ************************************************************************** 28)From: Trace Carpenter Subject: KEYLOG2! Download site Sorry folks, I do have the URL. When M.J. Van Ham sent me the file he also attached the following URL http://www.silitoad.org Go grab it. -- Trace Carpenter Investigations ****** 2926 Maple Ave., Ste. 200 Friends help you move; Dallas, Texas 75201 Real friends help you move bodies. 214.828.4520 ****** ************************************************************************** 29)From: bryan bass Subject: Want to purchase Hi guys;I'm trying to find a directerial transmitter[hand held]or CD rom electronic map[gps] for computers for the purpose of tracking children to help prevennt kidnapping;also lost hikers;plane crash victims etc.could you guys help with this project...see ya!sincerely E.S. ************************************************************************** 30)From: Ivor Rankin Subject: RE: Key Log95 v2 Where is it? Mike Gevaert Wrote: "Also, to the person who posted that Key Log '95 v2 is the best keylogger. WOuldn't it be a good idea to post where someone could find it." An excellent resource for such & similar tools is "Silicon Toad's Infinity Void". The site has recently re-located & therefore searching for it on certain search engines may render it's previous URL(s). The site currently has an Australian mirror site if anyone is interested. The current address is: http://www.silitoad.org - some parts are still under construction. The Key Log 95 v2 is in File Archive 3 - URL: http://www.silitoad.org/arch3.html , together with some interesting email programs et al. Regards - Ivor R ************************************************************************** 31)From: Gary Cohen Subject: PI job? PI with CC License (intern,Florida), 46 years old, interested in possible employment, perhaps leading up to partnership, anywhere. I've sold my primary business (non-PI) and have decided to immerse myself in this new career. My wife and I have an empty nest now and can relocate within 1 month. I live in Ft. Lauderdale, and am looking to move at LEAST an hour north, but will consider anywhere. PI course from ICS almost completed, I'm a quick learner, am computer literate (SFIA Internet Chairman). Please e-mail me privately with any questions or offers. Gary Cohen Investigator Ft. Lauderdale/Pompano Beach Florida heatgain@mindspring.com Member-FALI & SFIA Chairman, Internet Committee, SFIA SFIA - http://www.webcircle.com/users/sfia/ ************************************************************************** 32)From: Tim Johnson Subject: Forewarned is forearmed I feel that any of you who have responded (or who respond with information on how to accomplish this) may be in violation of federal statutes by aiding and abetting an individual in an illegal endeavor. Maybe I'm missing something, but everything I have read points to an illegal eavesdropping act and providing the information to accomplish such an act makes you liable when the law suit is brought up. Speaking of lawsuit, if you ever need a lawyer with a track record in seeking restitution in a bugging case, contact me. I served as a "expert" witness in one involving two small businesses in which "our side" won and was awarded big bucks from the insurance company. If you've never been involved in such a lawsuit, you'll learn that they aren't all that easy to present and win. Anyhow, regarding the information being sought, forewarned is forearmed. Tim Johnson >>>> 3)From: ProvRhode@aol.com Subject: Re: Transmitter and reciever HI, Thanks everyone for your responses. Yet, I think I need to be more specific. It is essential that I have a wireless transmitter and reciever setup. The items some of you mentioned from radio shack are not wireless. I can't just plug a vox recorder into the phone line. I need to transmiter and recieve so there will be no wire to detect. Hence I need this to be done as clandestine as possible. Some of you mentioned a crystall type unit , perhaps that is what I need. I don't mind spending a couple of hundred at most on such a system. <<<< ************************************************************************** 33) From: Freedom Fighter Subject: Re: Veeeeeerrrrrrrrryyyyyyy interesting It works all over the country, for both 800 and 888 numbers. The telephone companies said so in their own inserts they add to your bill. Not only that, 'Call-Blocking' doesn't work if you call an 800 or 888 number. Don Cline, WB6OCO http://www.primenet.com/~frdmftr/ (Last updated 5/26/97) PGP Public Key available upon request. ************************************************************************** 34)From: Manatau Subject: Boost the signal output? I am familure with FCC rules regarding RF signal strength... but I would still like to boost the signal output, just a little, on some of my transmitters. Can anyone out there tell me how to do so? My Elect. Tec. went and got himself a "real time job" now I am back to doing my own work until I can find a new one. Thanks K.C. ************************************************************************** 35)From: Duece6x6@aol.com Subject: Re: Tracking/catching cloned cell phones Tracking/catching cloned cell phones. The most cost effective way to catch cloned phones is a little complicated but it can be done. It is a common technique used by the govt. and others. You need 2 setups 1. a transmitter identifier, the best cost is in the amatuer radio market and can be found in most ham radio magazines. It is a software/firmware package that uses a laptop and a reciever for cell phones. When the person uses the phone once capture the trans signature then when he trans again the computer signals you he is online. 2. you need a Doppler systems Trans locator for 800-900 mhz they are inPhoenix, Ariz. I have one for VHF/UHF and it works great. You can almost drive to them {depending on distance} right away. Some cell companys have this trans ident system in some major cities now. I can't make the expo, but I would like a list of vendors and addresses if possible. The DUECE ************************************************************************** 36)From: BADCOFFEE@aol.com Subject: Sentury Fire Safes I am going to USE this list for what it was intended for. The ability to further research and testing of various tecniques. WE get to fugure things out together and this list and it's members get rich and famous. If you have a Sentury Fire Safe tell me if this works for you. Just a hunch: Guaranteed 3rd number: HEAVY and I mean HEAVY pressure on the latch (if it has one). Start at Zero (no need to clear dial). Back and forth 0-4 (or so) Dial hard to turn?? Note: NO, your not going to be able to "turn" it. It's Just going to turn about 5 spaces. There are "bumps" in the 3rd number disk called False Gates that prevent a smooth surface on the disk. False gates (bumps) ARE the reason why safes are called "safes". Yes...just go to next set of numbers in same direction. Between 4- and 8 say. Heavy torque...again...dial hard to turn?? The idea is when the Pawl (??) hits the groove cut out in the 3rd number it is SOLELY going to be hitting the 2nd and 1st disks and there should be NO resistance on the dial when you spin back and forth that little bit (within the 5 number range) even with the heaviest of pressure on the latch. This is your GUARANTEED 3rd number. NO doubts about it. Buy me something expensive if I am wrong. ok...lets go on here...... Note: The 3rd number is the disk attached to the dial. Remember how to get that 3rd number. Ok.... Let me know your results for my reserch please........ Take your third number and Add 68 points (just do 70 and a little less to keep it simple) Is this YOUR first number? Now, if your 3rd number is say 50, the dial only goes to 100. 50+68 is 118. What ever the last 2 digets are in this case it would be 18. Take your 3rd number again and add 34. Is this your second number??? The people at the Home Center are starting to raise an eyebrow at me for all the returned safes and locks.....and it is getting to be a pain in the butt doing reserch that way. Need YOU! Please........I hope not to see this on a Phreak web page somplace untill it is at least proven correct. Again, Sentury Safe owners....give this a pop and let me know. Augie ************************************************************************** 37)From: dan@frezza.org (Dan Frezza) Subject: BCWipe for Windows 95 / Windows NT 4.0 -----BEGIN PGP SIGNED MESSAGE----- Dear List members, There's been some discussion about using programs to "shred" or "wipe" files that are sensitive. However, I have found this to be only half the problem. If you are using programs, such as PGP or any other type of encryption programs under window's 95, you should be advised that these programs sometimes write temporary files to your hard drive. You may not see them but they may still be there under temporary files that have been deleted. Have you ever thought of this? I have been made aware of this problem some time ago for Dos and Window's 3.1 operation where this problem isn't quite as bad as for Window's 95. Most of the specialized software that takes care of Dos and Window's 3.1 wiping doesn't work very well under Window's 95, in so far as wiping the extra space on your hard drive where temporary files have been written and deleted. I have found BCWipe for Window's 95 /Window's NT 4.0 to be the answer to this problem. It does a very good job of deleting /wiping files BUT in addition, it can wipe all of the free space left on your hard drive after some very sensitive data encryption operation. BCWipe is free. Here's the information on BCWipe: "BCWipe for Windows 95 / Windows NT 4.0 is a very useful freeware utility designed by Jetico, Inc. to securely delete files from your disk. Standard file deletion leaves the contents of the "deleted" file on your disk. Unless it has been overwritten by files subsequently saved, it can be recovered using standard disk utilities. BCWipe deletes all traces of the file in accordance with the United States Department of Defence recommendations (DoD 5220.22-M). BCWipe utility provides 3 ways to shred the contents of the files: a. Delete with wiping. Once you've installed BCWipe, this item will appear in the Windows 95 Explorer context menu (when you right click on a file or group of files). b. Wipe free disk space. If you have deleted sensitive files using a standard operating system command, you can wipe the free space on the disk where these files were stored - the contents of all previously deleted files will be erased. c. Swap file wiping. BCWipe automatically wipes the content of the Windows Swap file when you run 'Wipe free disk space' command." Here's the URL: http://www.jetico.sci.fi/ Dan Frezza -----BEGIN PGP SIGNATURE----- Version: PGP for Personal Privacy 5.0 Charset: noconv iQCVAwUBM6x9cpYHeakLbJOBAQGs/gP/SM2n8K/MN1WtAurF7K6HVprZ1LmNQWct 8aGwaZ10yH0bcTXnDvbwDQ2YuPfrgGOhLY3QwKnuGnXkG8sDs9SZbEnGYD4LTT+n EZmaOMS9T+DtOI318civbDY7O9zWiJOCq8VlbDy5ZaqqlO93RHiewWxukC39tPXb St8BdqoNt10= =sUDA -----END PGP SIGNATURE----- ************************************************************************** 38)From: BADCOFFEE@aol.com Subject: Americans vs. Canadians (fwd) This is the transcript of an ACTUAL radio conversation of a US naval ship with Canadian authorities off the coast of Newfoundland in October, 1995. Radio conversation released by the Chief of Naval Operations 10-10-95. Americans: Please divert your course 15 degrees to the North to avoid a collision. Canadians: Recommend you divert YOUR course 15 degrees to the South to avoid a collision. Americans: This is the Captain of a US Navy ship. I say again, divert YOUR course. Canadians: No. I say again, you divert YOUR course. Americans: THIS IS THE AIRCRAFT CARRIER USS MISSOURI, WE ARE A LARGE WARSHIP OF THE US NAVY. DIVERT YOUR COURSE NOW! Canadians: This is a lighthouse. Your call. ************************************************************************** 39)From: Tim Johnson Subject: Upcoming visit to Hong Kong and TSCM Seminar in Boston To the membership: Upcoming visit to Hong Kong and TSCM Seminar in Boston I will be in Hong Kong, leaving on 24 June and rteturning on 4 July. If you can e-mail me with a phone number before 5 PM Pacific time, I'd like to get together while there, if our schedules allow. Also, for those of you either fitting the pre qualifiers, or knowing someone who does and would be interested in the upcoming TSCM Seminar on 7-8 August in Boston, check out the info at http://www.amug.org/~dbugman/seminar.html TSCM training is available to corporate security departments and government agencies at your location. Contact me for more information. English (or a technical translator) required. Tim Johnson Tim Johnson dbugman@amug.org Technical Security Consultants Inc http://www.amug.org/~dbugman/ What you say in private is your business. Keeping it private is ours. (c)TSCI 1987 ************************************************************************** Who are you? What's your specialty and/or interest? Let us know about your company... What would you like to see on the list? Post it. Let us know... Do you have something to contribute? We'd like to hear it... We want to know EVERYTHING and ANYTHING about eavesdropping, surveillance, countersurveillance & privacy related technology, etc... Remember: who, what, where, when, how & why... we want ALL the details... Do you have a question? Post it... A little free time? Help a member... With the INCREDIBLE brain power on this list, someone should have the answer ;-) P.S. Don't be a LURKER... Members take the time to post info for us all... give something back... Don't just take... Your input/knowledge is valued... ************************************************************************** Send Postings to: spyking@con2.com with "Post" in subject field with subject ************************************************************************** Subscribe to: spyking@con2.com In the subject field type: subscribe-surveillance list e-mail address ************************************************************************** Unsubscribe to: spyking@con2.com In the subject field type: unsubscribe-surveillance list e-mail address ************************************************************************** ...The Simple Rules of the Surveillance List... The Surveillance List Owners may Reject any posts that are/contain: 1) Info Unrelated to Eavesdropping, Surveillance or Privacy technology... 2) Flames or Negative posts... 3) E-Signatures that are considered excessive... 4) Advertisements not DIRECTLY related to the list topics... 5) Attached Files... 6) Oversized Posts... (May be edited to save room) **************************************************************************** This publication is copyrighted and is protected by U.S. and International copyright law. The information transmitted on this list may not be reproduced, reposted or forwarded to any non-list member without expressed written permission of the List Owner. Violation of U.S. copyright law is a criminal and civil offense... **************************************************************************** The Surveillance List is Moderated by SpyKing@thecodex.com The List Owner will make EVERY effort to protect subscribers from spam... Copyright 1996, 1997 Codex Publishing Inc., All Rights Reserved... **************************************************************************** ****************************************************************************** Vol.Two Issue #144 The Surveillance List June 24,1997 Over 2200+ Members Worldwide Representing 50 different countries List Chat at: http://www.thecodex.com/chat.html Seminar Info at: http://www.thecodex.com/methods.html Surveillance List Pseudo FAQ at: http://www.thecodex.com/faq.html ****************************************************************************** IN THIS ISSUE... ****************************************************************************** 01) List FAQ Updats 02) Re: Bug detecting 03) Request for Info 04) Monitoring conversation response 05) Dog repellant? 06) Re: MCI thing... 07) Difference between ANI and Caller ID 08) Re: augie's call for posting 09) Why was "Americans v Canadians" even posted? 10) Re: Unix? 11) Re: PGP 5.0 Freeware / shell programs 12) Re: PGP 5.0 Freeware 13) Re: Phone Line Voltages 14) Re: ANI 15) RE: INVESTIGATORS WANTED FOR PIRACY SURVEILLANCE 16) Re: Boost the signal output? 17) Re: Bug detecting 18) Badcoffee accepted an unknown challenge 19) Spun it the wrong way 20) Re: PGP 5.0 Question 21) The LAPD, The FBI, and the CIA 22) Re: Bug detecting 23) Several Responses 24) Re: PGP 5.0 25) Customer Numbers Australia 26) Alarm information for .au 27) Re: Mitsubishi Video Printer 28) AP & "journalist in general don't have a clue 29) Re: microsoft mail 30) Re: Boost the signal output? ****************************************************************************** DON'T BE A LURKER.... GET INVOLVED... YOU ARE A MEMBER... MAKE THE MOST OF IT ****************************************************************************** 1)From: SpyKing@thecodex.com Subject: List FAQ Updates I've updated our pseudo FAQ at: http://www.thecodex.com/faq.html and added some links to download the following software: SOFTWARE OF INTEREST PGP - Pretty Good Privacy PGP Phone Nautilus Secure Phone Software WinTone 2.0 RM100 Radio Page Transmission Decoder Shredder95 ICQ Internet Pager POCSAG Pager Decoder Scanner Recorder ScanCat FaxTrace for Windows Misc Security Programs Misc Sound & Audio Programs Telecommunications Programs & Utilities Integrator CCTV Facial Composite Software KeyLogger95 V. 2.0 BCWipe for Windows 95/Windows NT 4.0 . Password Cracking Programs If anyone knows of any sites that would be of interest to the list please send and I will place on FAQ page. ************************************************************************** 2)From: CrACKeD Subject: Re: Bug detecting > Anyone know how to detect an line type bug with a voltohm meter?? Please > any information Bugs which use the line for power obviously take their power from the line, and you can see the difference on your meter. Take a reading on a line (or more than one, preferably) in your area while their connected telephones are off hook (only take one phone off hook, of course). Next, test your suspect line. Lower voltage = leech on the line. CrACKeD ************************************************************************** 3)From: misfitt@mail.tss.net (Jeff Caldwell) Subject: Request for Info I'm looking for either a device or intel-based software that will defeat call-blocking, or calls that are untraceable. We've been having problems with a caller who shows up on caller-id as "Unknown Name, Unknown Number"... and when we try to have US WEST do a last-number trace, it's ALWAYS unsuccessful. I need something that will UNFAILINGLY trace the last number that called me. Hope you can help! ************************************************************************** 4)From: ProvRhode@aol.com Subject: Monitoring conversation response Hi, Thanks again for your patients. I looked at the wireless phone jack from radio shack. It won't do. First of all you need to plug it into the wall, thereby making it obvious to anyone who looks around. I need something that can not be seen. Something that I can wire into the phone line (hidden in the wall) and then have it transmit to a little recorder hidden inside a sofa. Thanks for working with me on this. ************************************************************************** 5)From: principal@connect.ab.ca Subject: Dog repellant? A few months ago someone contributed a post about using tennis balls to trip a auto alarm. Simple, imaginative, effective and cheap, all the things I like to focus on. Now I have a situation I had to deal with and could use some insight by people with a similar focus. As a matter of course I have had to deal with naturally inquisitive dogs who in the couse of protecting their owners property have picked up an unusual scent and discoverd my observation position. Personally I can't justify killing a loyal, barking or growling dog just because he may be compromising my position. Killing an agressive dog that is attacking me is another matter. I returned this morning from an operation where I spent several days in a "green" OP. The subject lives in a secluded house with dense woods surrounding. At one point I was approx 25' away from the home of the subject and a dog (husky) was let out of the house. Previously it had been kept in a run at the back. It was raining heavily posibly supressing my scent. I froze where I was and pondered my best options. I was wearing a "Gillie suit" so the chances of my movement being observed by the Subject were slim. Due to the heavy rain it was unlikely the owner would be joining the dog for a romp in the puddles. On this job compromise was not an option. Silent retreat would be unlikely as the dog was so close. My vehicle was parked several km away. The dog however did pick up my scent and came bounding toward me. I had given this very situation a lot of thought over the years and had prepared for it. In the following way. In the top of my pack, nice and handy, I have OC spray and a atomizer of skunk scent in a zip lock bag. In the 15-20 seconds from the time the dog was let out until he was coming at me I had eased the flap open and removed the OC and atomizer. As the dog bounded toward me I went into action. I stuffed the skunk scent into my jacket pocket and armed the OC cannister. The barking dog reached me I grabbed for the long fur at the front of his throat. The fur was so thick I couldn't even see a collar. In this position I could flip the dog onto it's back. Believe me this dog struggled like crazy. It was like trying to hold onto an eel. When I hit him with the OC spray he went wild. I dropped the canister and grabbed the skunk scent I squeezed the tube so hard the snap on lid popped off, skunk scent everywhere, and fortunately all over the dog, which I was loosing the grip on anyway. Well, the dog made it to the house after much pawing at his face. Whinning and howling to get in. The owner bid the do enter with a string of obscenities intersperced with skunk, stupid, mongrel etc. Now, I still smell like skunk and though it worked I am looking for others with experience who may have other options. Several years ago I saw a device advertized that sent out a high frequencey sound that was supposed to repell dogs. This might be worth a look, if I could locate a supplier. There may be other methods as well. I know I will be faced with this situation again. If there had been multible dogs??? Larger more vicious breeds??? etc. ************************************************************************** 6)From: crudgmar@sprynet.com Subject: Re: MCI thing... I replied to you about a week ago, after trying the ANI # for MCI... For what it's worth, (at the time), I called from a business phone, that has only one main number, but has 15 extensions internally,....The system is one by Northern Telecom, and while the MCI verification DID have the area code and first 3 digits correct, the last four were NOT even remotely associated with the business's extension numbers,...so I called the number that MCI says it thought I was calling from, and what happened from there, was "odd", there was no usual "ringing" of a "normal" phone...just a pause of about 10 seconds, then a single short tone, followed by silence....so I hung up, and dialed a number times for the duration of the rest of the day, and subsequently got nothing but a busy signal. Kinda strange. (?) ************************************************************************** 7)From: "Jon Harrison" Subject: Difference between ANI and Caller ID Recent postings have mentioned that 1-800 and 1-900 subscribers get callers' phone numbers through ANI, a different system from Caller ID. I have Caller ID (and non-identified call blocking supposedly enabled) on my home phone, and I have noticed that when a salesman is calling his call gets through and his number and name are often "not available." Likewise, somebody keeps calling me and when I answer there is an open line (no voice, no obvious computer), and this caller's or callers' ID is also "not available." SW Bell tells me that Caller ID is not available in all areas of the country, and these people must be calling from places where it is not yet implemented. Of course I'm paranoid, but I don't think I believe this answer. Is Caller ID really not implemented in large sections of the country, or does "the phone company" sell some sort of service to conceal calls' origins and still bypass unidentified-call blocking? Is there some sort of phone hack which has this effect? Or is there some other simple explanation? Thanks for your comments and help. JPH ************************************************************************** 8)From: the mechanic Subject: Re: augie's call for posting well my fellow lurkers, I have come out of the closet, I'm GAY!! no, j/k, I am not a lurker anymore, in fact, I am going to post maybe a few times a week now, from stuff I have written before... to any of the other things I have written, compiled, or just thought about, visit : http://www.javanet.com/~mechanic/view.html the things on that page are for INFORMATUIONAL PURPOSES ONLY. I am interested in the field of hacking/phreaking, and I knopw a great deal about both, this does not mean I DO this stuff, I just know alot about it. And that is what is bad for society today... many people know how to build a bomb, yet the people who jusy know about it, but do not actually use it, sometimes get into trouble. This is commie bulls**t! anyhow, i will copy a few of my already written files a week to this list, because not all people will get a chance to view trhem at the site... here's numero uno for now... and if anyone has any questions on anything h/p related, please e-mail me and i'll see if i can help you out. Or, if you would like to write for us (DMS), then mail us with your submission, and, if you have anything, like little tibits of info, please share, that's what helps us all out in whatever we are striving for, and is the base point for this list, dispersal and sharing of knowledge. -mechanic Automatic Number Identification (ANI): Refers to the process that identifies the phone number of callers provided by service bureaus or carriers. The public switched telephone network (PTSN) can send the telephone number of the calling party directly to the destination telephone in either dual tone multi- frequency (DTMF) or dialed number identification service (DNIS) sig- nalling. Call Pickup Group (CPUG): A CPUG is whe multiple telephone extensions ring when the same phone number is dialed and the calls are evenly distributed between the appearances of the telephone exchanges. The most common example of CPUGs are the operator stations that answer all the calls made to main telephone number or answer all internal calls directed to the operator. Centrex: Any one of a number of large telephone switching systems that the telephone company might deploy to provide telephone service to an area. DMS100, DMS200, 5AESS, DEX 600, and 400, are among the more common modern centrex switches used today. Class Of Service (COS): In order to let one telephone be able to access certain outbound facilities, features, and functionality, while another phone is given to a different group of facilities, features, and functionality, a class of service is assigned which defines these criteria. An example of a COS difference is a hall phone that can only make calls within an organization, and the phone of the president of the company, which can make calls anywhere in the world and has voice mail, call forward- ing, and a host of other features. COS can also be assigned to auth- orization codes to temporarily increase the COS of a telephone for a single call. Demarcation Point: The location where two seperate ends of telephone cable or wiring meet. Typically used to mean the place where the telephone company's wiring and the customer premesis come together. This is where the responsibility of the local phone company endsand the customer's responsibility begins. Dialed Nuimber Identification Service (DNIS): A more adavanced method of delivery of automatic number identification that uses out-of-band signalling (signals that can not be heard by the human ear), DNIS also provides the capability to T-1 telecommuni- cations equipment to accomodate simultanious calls to independant phone numbers connected through computer technology. This feature pre- vents callers from getting busy siginals when the call. DNIS can in- clude the calling parties telephone number withing the siginal and can also tell the recieving system what telephone number was dialed so that many calls coming over the same telephone lines can be broken apart to seperate destiations, such as an operator, IVR (interactive voice response) system, or voice mail. DNIS can also pass a host of other information in a similar fashion to telephony devices to gather further information. Direct Inward System Access (DISA): The method for dialing into a telephone system. DISA can be used for everything from accessing one's voice mail to connecting to an out- bound trunk to make long-distance calls. DISA cn be the cause of toll fraud if not properly implemented. (this is what us phreaks use when we call into a PBX to make free calls) E&M Signalling: Uses separate paths for signalling and voice signals. The E lead (derived from the ear) recieves incoming signals as either ground or open condition. The M lead (derived from the mouth) transmits ground or battery towards the switch. Lead Retrieval: A system that will capture the caller ANI, theif fax number, name of caller, and company name. Local Exchange Carrier (LEC) lines: Local Exchange Carrier or local phone company telephone lines used to supply telephone service to a location. LEC lines are needed by all organizations to handle local telephone traffic. Local telephone traffic is defined as telephone calls that do not leave the lata (intralata). Local Loop: The transmission path between a user's premesis and a central office (CO). The connection between the local telephone company's network and the customer premesis equipment is formally called the network inter- face, or point of termination (PoT). PCMCIA: People Can't Memorize Complex Industry Acronyms. Public Switched Telephone Network (PSTN): The telecommunications network commonly accessed by all of us vir- tually every day of our lives when we make a telephone call. The PSTN is a gigantic maze of switching computers that can connect any two (sometimes more) telephony points in potentially hundreds of different ways. Trunk: A single circuit between two points, both of which are switching centers or individual distribution points. Trunk Group: A set of telephone circuits provided by any number of telecommunica- tions firms for a specific purpose, such as to place long distance toll calls, to provide local calling capability, to provide WATS service, to provide inbound calling, etc. (sorry if this looks REAL messed up... my term program sucks and it does not like pasting into pine, on my unix server... oh well!) ************************************************************************** 9)From: phreaker@technologist.com Subject: Why was "Americans v Canadians" even posted? 38)From: BADCOFFEE@aol.com Subject: Americans vs. Canadians (fwd) What does this post have to do with the SL Forum? I'm not sure if it is more insulting to Americans or Canadians. This is an actual response to a so-called actual radio conversation. The accompanying post is rife with errors and stupidity. As a former Radarman in the US Navy, I thought you might like to know. !. The USS Missouri (BB-63) is a battleship 2. The USS Missouri has been decommissioned 3. Call signs define the message participants 4. Where is the destroyer screen that was there, be it the Missouri or an aircraft carrier? 5. In an attempt to make the US Navy look foolish, a phoney scenario was created. Why would you want to embarrass Canadians with an obviously incorrect post? The US Navy does enough stupid things that are real without someone trying to make things up that only make the person telling the story look foolish. To put the post in context, it should be filed with the one about the guy who lit off a JATO unit in his car in Arizona or the new Cadillac you can buy for $100 because the owner died in the car or the one about the ghost ship and the lighthouse. P ************************************************************************** 10)From: "M. J. Van Ham" Subject: Re: Unix? > how do you hack a unix if you dont have a dpmi driver wich means 3/4 of > the password cracking utilities dont work and how do you get a dpmi > driver or a password cracking program that does not use a dpmi driver > but still explain to me how do you hack a unix i would really > appriciate it By the tone of your message I get the impression that you already have in your possession a copy of a unix passwd file, and are having trouble cracking it. The program I recommend is called "John the Ripper". An excellent unix passwd cracking program, which runs under Win '95. You can get john at: http://www.false.com/security/john/ If you want to learn more about unix, how it works, security flaws, etc. then you should read the alt.2600/#hack FAQ. You can find it here: http://www-personal.engin.umich.edu/~jgotts/hack-faq/ ************************************************************************** 11)From: "M. J. Van Ham" Subject: Re: PGP 5.0 Freeware / shell programs > I'd like to know what the advantage or purpose of PGP 5.0 Freeware is > compared to previous 2.6.x versions. Does PGP 5.0 support 4096-bit > keys? Does this version have several flavors like the 2.6.x version > did? I'd appreciate any info anyone can give me. I think the biggest advantage of PGP 5.0 over previous 2.6.x version is the simple fact that it's a full fledged Win '95 program now. The arcane DOS commandline options are gone. It's an easy to use graphical interface now. And, it tightly integrates with popular email clients (i.e. Eudora). And yes, it does support 4096-bit keys. ------------------------------------------------------------ {In response to another post regarding the same topic} > Im glad they updated PGP but I need to know if it will still work > with my PGP shell application Aegis Shell. In addition, Im also > using PGPJN which is a PGP interface for Pegasus Email, but again > I dont know if the new version will work well with these two > applications. Can anyone help? Thanks, Being as PGP 5.0 is a complete Win '95 program, it no longer needs shell programs to make it easy to use. I don't imagine that your shell program will work at all with the new version (although I'd think you'd be happy to be rid of the cumbersome shell program). As for your interface program, I don't think you'll need that anymore either. PGP 5.0 is designed to integrate seamlessly with popular email clients. Personally I use Eudora (which it works great with), but I imagine it also works well with Pegasus. ************************************************************************** 12)From: dan@frezza.org (Dan Frezza) Subject: Re: PGP 5.0 Freeware -----BEGIN PGP SIGNED MESSAGE----- >From: WindWalker >Subject: Question About PGP 5.0 Freeware > >I'd like to know what the advantage or purpose of PGP 5.0 Freeware is >compared to previous 2.6.x versions. Does PGP 5.0 support 4096-bit >keys? Does this version have several flavors like the 2.6.x version >did? I'd appreciate any info anyone can give me. > >-WW" PGP 5.0 supports the newer DSS/Diffie-Hellman keys that goes up to 4096. RSA keys, for compatibility with older versions of PGP, will only accomodate up to 2048 bits. However, my advice would be to upgrade to PGP 5.0. Why? There's one BIG reason for it: In PGP 5.0 and later, the message digest uses "SHA" ie, "Secure Hash Algorthm" (only when using the newer DSS keys) instead of the MD5 hash algorthim found in older versions of PGP, when signing your messages. So what? The "SHA" hash uses a 160 bit algorithm instead of MD5's 128 bit.. Phil Zimmerman said, in the manual that comes with PGP 5.0 (Adobe Acrobat) that the MD5 cannot be trusted anymore since it has a likelyhood of being broken. In fact he stated that very soon to expect this to happen. MD5 was place in public domain by RSA Data Security, Inc. I can see one reason why Phil has chosen to slowly break away from RSA, Inc. from this point of view. PGP 5.0 is also much faster than the older PGP that I was using. In fact, I was very suprised to see when signing messages, it was so fast, I thought something was wrong! I am only using a DX4 100 here, which is just under the grade of a Pentium! Dan Frezza >From: WindWalker >Subject: Question About PGP 5.0 Freeware > >I'd like to know what the advantage or purpose of PGP 5.0 Freeware is >compared to previous 2.6.x versions. Does PGP 5.0 support 4096-bit >keys? Does this version have several flavors like the 2.6.x version >did? I'd appreciate any info anyone can give me. > >-WW" PGP 5.0 supports the newer DSS/Diffie-Hellman keys that goes up to 4096. RSA keys, for compatibility with older versions of PGP, will only accomodate up to 2048 bits. However, my advice would be to upgrade to PGP 5.0. Why? There's one BIG reason for it: In PGP 5.0 and later, the message digest uses "SHA" ie, "Secure Hash Algorthm" (only when using the newer DSS keys) instead of the MD5 hash algorthim found in older versions of PGP, when signing your messages. So what? The "SHA" hash uses a 160 bit algorithm instead of MD5's 128 bit.. Phil Zimmerman said, in the manual that comes with PGP 5.0 (Adobe Acrobat) that the MD5 cannot be trusted anymore since it has a likelyhood of being broken. In fact he stated that very soon to expect this to happen. MD5 was place in public domain by RSA Data Security, Inc. I can see one reason why Phil has chosen to slowly break away from RSA, Inc. from this point of view. PGP 5.0 is also much faster than the older PGP that I was using. In fact, I was very suprised to see when signing messages, it was so fast, I thought something was wrong! I am only using a DX4 100 here, which is just under the grade of a Pentium! Dan Frezza -----BEGIN PGP SIGNATURE----- Version: PGP for Personal Privacy 5.0 Charset: noconv iQCVAwUBM66Mn5YHeakLbJOBAQFY9AQAxH7NTK2wU0N4ryfPGx2X49sQfwlgGSFW TMPAvoUMlwZ2usaaPmw5RkOU1O/J81lmhe5L2LE2MCm/JuusXg+DjZVeR0OTcnD2 fSkQU+7exRAiI/Wrg610DnY54cshVn1Nna2Iypt/ecF4MFFSP74nojRZ+JMX9bHB uW5j5x0EPcw= =vTW9 -----END PGP SIGNATURE----- ************************************************************************** 13)From: Trace Carpenter Subject: Re: Phone Line Voltages >Do Hotels/offices that have "switchboards" (?) run off same range in >power through lines? Augie, knowing what's up let me tell you, the line voltage for that location should not be used as the benchmark. Use the house phone. -- Trace Carpenter Investigations ****** 2926 Maple Ave., Ste. 200 Friends help you move; Dallas, Texas 75201 Real friends help you move bodies. 214.828.4520 ****** ************************************************************************** 14)From: BADCOFFEE@aol.com Subject: Re: ANI >>>Augie, if you want to play with an even easier method of getting the line >>>number just pick up a phone and dial 958 -- that's your local ANI readback >>>number -- each area has its own -- for telco linemen to identify lines... To answer Mutter's ANI post...... :-) Quick! CA.......Semi Vally CA...whats your LOCAL ANI number? Quick! Calgary, CDA....what's your LOCAL ANI number? Quick! FT. Myers, FL...whats your LOCAL ANI number? 1-800-444-3333 You know where i am going with this. :-) IMPORTANT NOTE: I know Mutter a bit closer than I do the others on this list and I have to reach out and say........ He's got a great head on his shoulders and is the publisher of a fantastic hard copy newsletter that impressed the hell out of me. I've never heard him mention it in here. He might kick my butt for doing so without his permission but if he wont share this mega-source of info with you........I will. E-mail me for details or simply go to his link for more information. Augie ************************************************************************** 15)From: BADCOFFEE@aol.com Subject: RE: INVESTIGATORS WANTED FOR PIRACY SURVEILLANCE Guys...Im sorry to this agency for this and I post with the utmost of respect to you but I have to speak my mind here solely from experience and for the protection of my family of list members. 3rd time I wanted to make this post and here it goes...... To the individuals responding to this solicitation: At least here in NJ. Even turtle races are Mob controled. Sporting events represent MONEY for organized crime. Even ONE dime that is lost or misplaced or "prevented" from getting in ANY way......put's somehing on your ass called a "contract". Contracts are very real and are more or less like "open game" for ANYONE who would like to make a few extra dollars. Contracts can start on you as little as $100.....the more damage you do, the higher the price goes up. You take down a multi million dollar a year establishment and I'de say there isnt a place on earth that can shelter you well enough. If not YOU.......it is next of kin. Never underestimate the thing that does not exist........organized crime. NOW you can....respond to the solicitation and again to the agency, my apologies for this post against your solicitation. Augie ************************************************************************** 16)From: CrACKeD Subject: Re: Boost the signal output? > I am familure with FCC rules regarding RF signal strength... but I would > still like to boost the signal output, just a little, on some of my > transmitters. Can anyone out there tell me how to do so? My Elect. > Tec. went and got himself a "real time job" now I am back to doing my > own work until I can find a new one. You'll need to give a couple more specifics than that. What type of transmitter? What band? How much power does it put out as-is with no modifications or amplifiers? What is the maximum power rating on your antenna? CrACKeD ************************************************************************** 17)From: Trace Carpenter Subject: Re: Bug detecting >Anyone know how to detect an line type bug with a voltohm meter?? >Please any information By line type, are you referring to an inline transmitter which get's its power from the phone line? If so, check your line voltages on and off hook. Then compare them to other lines coming from the same telco office and preferably close by, like a neighbors house. If the leach is drawing power, the target line will have lower voltages. You can also check different places on the line to locate the leach. A voltage drop differential of >1.5% should throw up a red flag. On the other hand, were you talking about a parallel type trip switch that starts and stops the recorder? Take a ohms reading across the tip and ring and compare it also the same way. Hope this helps. -- Trace Carpenter Investigations ****** 2926 Maple Ave., Ste. 200 Friends help you move; Dallas, Texas 75201 Real friends help you move bodies. 214.828.4520 ****** ************************************************************************** 18)From: Trace Carpenter Subject: Badcoffee accepted an unknown challenge Hey Frank, Looks like Augie accepted without even knowing what we had planned:-) Tee Hee! Have you called Letterman yet? -- Trace Carpenter Investigations ****** 2926 Maple Ave., Ste. 200 Friends help you move; Dallas, Texas 75201 Real friends help you move bodies. 214.828.4520 ****** +++Moderator's Note+++ As I rub my hands together and giggle devilishly ;-) OK Augie... you DID accept our challenge... I quote you here... scroll down to see what we have in mind... ;-) >>>> From: BADCOFFEE@aol.com Subject: BadCoffee Accepts Challenge In 6/19's forum at 9:53 am, Augie reads something that might go like this......... >>+++Moderator's Note+++ >>Hey Augie, How good are you at opening locks? Trace and I were discussing it >>and would like to know if you'll take our challenge? ;-) At 9:54 am, he responds like this: (I know he's going to give me spool pins, I know he's going to give me spool pins, I know he's going to give me spool pin, I'm going to hate him if he gives me spool pins, He knows I'm choaking on spool pins, I know he's going to give me spool pins....) ONLY because I have a fantastic day job that allows me to oversleep 7 of 7 days....LOL, I have to say: YES :-) Providing you POST the results and Trace doesn't pee pee his pants watching me loose my mind on a lock that "he" has modified by replacing a pin with bubble gum. <<<< We promise. No bubble gum. Our Challenge is: Knowing your "passion" for locks, locking devices, etc. we would like to... On August 7th, 1997 in the evening hours following the New York Seminar (List Get Together) http://www.thecodex.com/methods.html Trace and I will "attach" you to a common chair using several locks and chains "ala Harry Houdini style". We will cover you with a sheet, blanket, etc and give you a specified amount of time (to be negotiated) to "free" yourself... We will NOT use spool pins ;-) If you do "free" yourself we will bow in awe, you will become "World Famous", we will sing your praises forever, We will wear "I was there when Augie freed himself" T-shirts, etc, etc, etc... P.S. You will also be hoisted in mid-air by a crane upside down over Times Square while attempting this escape and this event will POSSIBLY be televised on the David Letterman Show "Live" from New York... I say "possibly" because we do have a producer friend on the show who is ALWAYS looking for this type of "Event" and he has displayed interest... ************************************************************************** 19)From: Trace Carpenter Subject: Spun it the wrong way >I picked it in 15 seconds. Very happy...but spun >the plug the wrong way. Start again. Hey Augie, you know there's a neat little tool that if you spin it the wrong way, will reverse it for you without having to repick. It's spring loaded and spins it around so fast, the pins don't reset. Works well, I've tried it. -- Trace Carpenter Investigations ****** 2926 Maple Ave., Ste. 200 Friends help you move; Dallas, Texas 75201 Real friends help you move bodies. 214.828.4520 ****** ************************************************************************** 20)From: "Jason E.J. Manaigre" Subject: Re: PGP 5.0 Question >I'd like to know what the advantage or purpose of PGP 5.0 Freeware is >compared to previous 2.6.x versions. Does PGP 5.0 support 4096-bit >keys? Does this version have several flavors like the 2.6.x version >did? I'd appreciate any info anyone can give me. --PGP5.0 has it's own GUI, cleaner code, runs faster / smoother and has a few more options. The freeware ver. also uses DSS Keys as apposed to the old PGP that used RSA keys. (The Freeware ver. can handle RSA, but can't generate them, all part of the Patent war between RSA Inc and PGP Inc, to my knowledge anyway) There is a debate right now between which is better, RSA or DSS, no one really knows yet.. There are no other flavors of PGP right now, and there is only the international ver. in the development stages from PGP Inc. And as for larger keys, DSS supports larger keys and boast better security, but again it's being debated also. It supports 2048, 3072 and 4096 keys. DSS keys are also only recognized by PGP 5.0 so users of older vers. won't be able to use the new DSS keys. Hope that helps Jason E.J. Manaigre ************************************************************************** 21)From: CS CUSTOM Subject: The LAPD, The FBI, and the CIA The LAPD, The FBI, and the CIA are all trying to prove that they are the best at apprehending criminals. The President decides to give them a test. He releases a rabbit into a forest and has each of them try to catch it. The CIA goes in. They place animal informants throughout the forest. They question all plant and mineral witnesses. After three months of extensive investigations they conclude that rabbits do not exist. Then the FBI goes in. After two weeks with no leads they burn the forest, killing everything in it, including the rabbit, and they make no apologies. The rabbit had it coming. Then the LAPD goes in. They come out two hours later with a badly beaten raccoon. The raccoon is yelling: "Okay! Okay! I'm a rabbit! I'm a rabbit!" ************************************************************************** 22)From: phreaker@technologist.com Subject: Re: Bug detecting Take the VOM in your hand and follow the line with your eyes. If you see a suspicious device or lump in the line, take the VOM and smash the lump with it. Note: It might be cheaper to use a hammer. All kidding aside, for every bugging device you think you can find, there are others you won't find. To find line type bugs which generally have input impedence in excess of 100MegOhms, visual detection is best but not always possible. A time domain reflectometer is very helpful to find anything attached to a line. If you think you are being bugged, heed the following advice: Don't say anything over the phone you wouldn't mind being repeated in Federal Court. Use encryption, buy a brand new phone and seal it, move to a new location, don't meet in the same place all the time, and pray. A question you might ask yourself is: Am I worth the cost and the potential jail time for someone to run a bugging operation on me? Chances are, you're not. If you are, get expert help and keep your mouth shut. P ************************************************************************** 23)From: "Anastasios D. Panos" Subject: Several Responses >10)From: "Carney, Brian" >Subject: Bug detecting > >Anyone know how to detect an line type bug with a voltohm meter?? Please >any information > >Brian Brian try a Voltmeter and see what is the normal voltage in the telephone lines in the building, Then choose the target line, Usually a bugged telephone has 2-4 volts drop. >16)From: BADCOFFEE@aol.com >Subject: Phone Line Voltages? > >Question: 1........ is there was a tap sucking power from the line? >2........ Do Hotels/offices that have "switchboards" (?) run off same range in >power through lines? 1......Tap drains 2-4 volts of the telco line, 2. ....Switchboards do have diferent voltage and need custom made taps. >21)From: Jerry >Subject: I would like to capture audio and video > >Guys (a generic term) I need some help. I need a (cheap) way to >facilitate the equivilent of a nanny cam only I need one that will >either last 48 hours before tape changes or if at all possible one that >is motion activated. It is to go into a private office that is being >breached. I would like to capture audio and video, if this possible with >out selling the farm to be able to afford the equipment. Any help or >suggestions will be greatly appreciated. I acan be reached by e-mail at >ILQQK4DOE@worldnet.att.net or just post. Thanks Jerry A cheap way to do it is ... get a cheap VCR a PIR and a camera, and a timer similar to VOX for audio. Connect the camera's audio and video out to the VCR. Modify the VCR so when PIR is trigered to have the VCR start. It keeps regording all the time the sensor is trigered and stops when there is no activity Regards Anastasios D. Panos ============================================================ Panos & Associates, P. O. Box 19063, Athens 117 10, Greece (est.1973) Ph. : +30-1-923.7420, Fax : +30-1-923.2787 Contact : Anastasios D. Panos Members of : ABI, Intelnet, WAD, CII, ASIS, NAIS, PAPD E-mail : panosagcy@hol.gr URL: http://www.uklegal.com/panos/ ============================================================ ************************************************************************** 24)From: "Jason E.J. Manaigre" Subject: Re: PGP 5.0 >Im glad they updated PGP but I need to know if it will still work >with my PGP shell application Aegis Shell. --Nope, you don't need any front-end shells anymore, PGP 5.0 has it's own GUI. It runs in the Traybar on 95/NT Systems. >In addition, Im also using PGPJN which is a PGP interface for Pegasus Email, >but again I dont know if the new version will work well with these two >applications. Can anyone help? Thanks, --Yeah they won't work, you'll have to rely on the clipboard features of PGP 5.0 to use it with your email. As of now only Eudora and Outlook have plugins. And there is no Stego in PGP5. Hope that helps. Jason E.J. Manaigre ************************************************************************** 25)From: "quovadis" Subject: Customer Numbers Australia A bit of info for .au readers If you need find out the number (for technical reasons ie alarm installers) size=2>you are dialing from the number I found to be the most useful is 018 018 222 this works from all unprotected phones ie. work/home/ some gold phones if they havn't been protected ie. the voice doesn't say "customer number is unavailable" otherwise the voice will say "customer number is zero-eight-eight-four-whatever-whatever-whatever" This may be usless info for alot of people but I decided to post it to all because that is what makes this list--->someones junk is anothers treasure quovadis ************************************************************************** 26)From: "quovadis" Subject: Alarm information for .au Ok another bit of junk :-) I am offering a little bit of information to ppl if they are stuck in an alarm situation where they have bought an alarm and need to get into it without contacting the supplier/installer and getting charged $50 - $100 for the push of 2 buttons. ie an alarm needs to be changed to another monitoring station you need to change the phone dialler number, the security company will not give you the information because they hold you to ransom "we will change the number for you but it will cost $$$" I say freedom of information you bought the alarm you own the alarm So just default the alarm to manufacturer default code x'ing a jumper and bang you are the installer --->catch you need the default codes -----> I can help So if you are genuine and need help email me quovadis ************************************************************************** 27)From: "quovadis" Subject: Re: Mitsubishi Video Printer The last price I saw these at in an old catalogue was about $4800 Aus$ If it is the same one they are normally designed to hook up to a multiplexer used in time lapse recording..depending what you paid for it I would say it is a good buy, I will hunt around the workshop and see if I can find any other details like instructions on it for you. Nowa days you can pick up ones for about $3,000 to $5,000 depending on what you need them for the last great little buy I saw was a hitachi Vy170Vse going for bout $3300 from Vicam systems Australia regards M Deaville quovadis@taunet.net.au moving soon from alice to perth quovadis@bigfoot.com ************************************************************************** 28)From: "William H. Geiger III" Subject: AP & "journalist in general don't have a clue -----BEGIN PGP SIGNED MESSAGE----- In <3.0.32.19970623004636.00b9b538@admin.con2.com>, on 06/23/97 at 01:00 AM, SpyKing said: >Given the fact that it took four months to break through the standard >code, experts say the nation's financial institutes are hardly at risk. >Most of them use what it known as dynamic key exchange, which changes the >keys almost constantly during a transaction. Taking months to crack the >code wouldn't do thieves much good. What can I say except this is complete crap. DES has been known to be weak for years now. I don't think you could find a single reputable cryptologist that would say that DES is secure. Several years ago a special purpose computer was designed that could crack DES keys in real time costing $1 Million. This is a drop in the bucket for someone going after the trillions of dollars in financial transactions. You can bet every major spook agency has such machines and has had them for years now. These public attacks on DES 56 & DES 40 (broken months earlier) are more for publicity to show how flawed the current US export restrictions on cryptology are. I doubt that any financial instution is still using DES for anything. - -- - --------------------------------------------------------------- William H. Geiger III http://www.amaranth.com/~whgiii Geiger Consulting Cooking With Warp 4.0 Author of E-Secure - PGP Front End for MR/2 Ice PGP & MR/2 the only way for secure e-mail. OS/2 PGP 2.6.3a at: http://www.amaranth.com/~whgiii/pgpmr2.html - --------------------------------------------------------------- -----BEGIN PGP SIGNATURE----- Version: 2.6.3a Charset: cp850 Comment: Registered_User_E-Secure_v1.1b1_ES000000 iQCVAwUBM644Ro9Co1n+aLhhAQFmZQP/RbovMkKC9D7jK/lUrLyN/8hmdyR6NhJX a76yzk723P9uhvD9cXRH0BBloOGvsotyAlxN3eCTP+SoMuILwei7Tfhrs65Kx8W3 i6aLfh9olU8nrWZukEMXw+AUYGoUJW1HrgGX7ldFnaiJ63RPyX40BbFFp5pSy/+x Pnpkj3MxDV8= =bC+3 -----END PGP SIGNATURE----- ************************************************************************** 29)From: peter henss Subject: Re: microsoft mail does anyone know how to get passwords for microsoft mail on an intranet? peter ************************************************************************** 30)From: Tim Johnson Subject: Re: Boost the signal output? >>>> 34)From: Manatau Subject: Boost the signal output? I am familure with FCC rules regarding RF signal strength... but I would still like to boost the signal output, just a little, on some of my transmitters. Can anyone out there tell me how to do so? My Elect. Tec. went and got himself a "real time job" now I am back to doing my own work until I can find a new one. Thanks K.C. <<<< Sometimes, it is as simple as increasing the input voltage. Other times, you'll have to change the power amp/circuitry. tj Tim Johnson dbugman@amug.org Technical Security Consultants Inc http://www.amug.org/~dbugman/ What you say in private is your business. Keeping it private is ours. (c)TSCI 1987 ************************************************************************** Who are you? What's your specialty and/or interest? Let us know about your company... What would you like to see on the list? Post it. Let us know... Do you have something to contribute? We'd like to hear it... We want to know EVERYTHING and ANYTHING about eavesdropping, surveillance, countersurveillance & privacy related technology, etc... Remember: who, what, where, when, how & why... we want ALL the details... Do you have a question? Post it... A little free time? Help a member... With the INCREDIBLE brain power on this list, someone should have the answer ;-) P.S. Don't be a LURKER... Members take the time to post info for us all... give something back... Don't just take... Your input/knowledge is valued... ************************************************************************** Send Postings to: spyking@con2.com with "Post" in subject field with subject ************************************************************************** Subscribe to: spyking@con2.com In the subject field type: subscribe-surveillance list e-mail address ************************************************************************** Unsubscribe to: spyking@con2.com In the subject field type: unsubscribe-surveillance list e-mail address ************************************************************************** ...The Simple Rules of the Surveillance List... The Surveillance List Owners may Reject any posts that are/contain: 1) Info Unrelated to Eavesdropping, Surveillance or Privacy technology... 2) Flames or Negative posts... 3) E-Signatures that are considered excessive... 4) Advertisements not DIRECTLY related to the list topics... 5) Attached Files... 6) Oversized Posts... (May be edited to save room) **************************************************************************** This publication is copyrighted and is protected by U.S. and International copyright law. The information transmitted on this list may not be reproduced, reposted or forwarded to any non-list member without expressed written permission of the List Owner. Violation of U.S. copyright law is a criminal and civil offense... **************************************************************************** The Surveillance List is Moderated by SpyKing@thecodex.com The List Owner will make EVERY effort to protect subscribers from spam... Copyright 1996, 1997 Codex Publishing Inc., All Rights Reserved... **************************************************************************** ****************************************************************************** Vol.Two Issue #145 The Surveillance List June 25,1997 Over 2200+ Members Worldwide Representing 50 different countries List Chat at: http://www.thecodex.com/chat.html Seminar Info at: http://www.thecodex.com/methods.html Surveillance List Pseudo FAQ at: http://www.thecodex.com/faq.html ****************************************************************************** IN THIS ISSUE... ****************************************************************************** 01) Re: Bug Detection 02) New Face of Terrorism: HERF - Radio-Frequency Weapons 03) Increase Range 04) Re: Military Encryption Cracked 05) Re: Video Surveillance Detector 06) My opinion about the whole lock challenge thing 07) Monitoring conversation response 08) Re: Dog Repellant 09) Caller ID request for info 10) Re: MCI thing... 11) Re: Request for Info 12) Detecting in-line phone taps with a VOM 13) Americans V. Canadians Response 14) Re: Dog Repellant 15) Re: Dog repellant? 16) Re: Boosting RF Signals/Tap Detection 17) Underground extract: System X 18) A note for Principal 19) WWW Password Cracking 20) Re: Police procedures 21) Re: Looking for coiled cord earpiece 22) Re: Fraud Case ****************************************************************************** DON'T BE A LURKER.... GET INVOLVED... YOU ARE A MEMBER... MAKE THE MOST OF IT ****************************************************************************** 1)From: SpyKing@thecodex.com Subject: Re: Bug Detection >>>> From: "Carney, Brian" Subject: Bug detecting Anyone know how to detect an line type bug with a voltohm meter?? Please any information <<<< There are several methods of detecting "eavesdropping devices" attached to a telephone line. Aside from a complete physical inspection of the telephone line, associated switching equipment and telephone instruments, the use of a good digital multi-meter may be the best. I prefer the Fluke. There are several models depending on your budget to choose from. Wiretaps can have a direct electrical affect on telephone line circuits. Depending on the type of wiretap, it's affects may be significant or minuscule. It is important for the TSCM tech has a thorough understanding of voltage, current, resistance, capacitance, impedance and voltage drops in order to properly interpret the DMM's measurements. You should bear in mind that the meter should ALWAYS be set to measure DC voltage. A DMM requires a pair of tests leads to connect the meter to the circuit being analyzed. These test leads are lengths of flexible wire insultated and are colored black (+) for positive and red (-) for negative. When performing telephone line inspections, your DMM will be measuring the difference of potential across the negative and positive sides of the telephone line and it's battery. When connecting the test leads to the telephone line, you should ALWAYS connect the Red lead to the Ring (-) side of the line and the Black lead (+) to the Tip side of the line. Failure to make the proper connections will result in the DMM's display to indicate a positive voltage versus a negative. To measure current it is important to remember the meter only measures the current flowing through the DMM itself. Unlike voltage and current measurements, the resistance of a circuit cannot be measured by a DMM when the circuit is connected to the battery or another power supply. Therefore, to measure the resistence of a telephone cable pair , the line must be disconnected from the battery and shorted together. Failure to disconnect the line from the meter may damage your meter. The easiest way to determine the telephone line's loop resistance would be to apply Ohm's Law to the voltage and current measurements. You can quickly measure these values at the telephone line's terminating point. A series wiretap can add 50 to 500 ohms of resistance to a telephone line circuit. I would recommend you perform: On-hook and off-hook voltage, current, resistance and capacitance measurements as well as perform a Resistance Line Balance Test. There are several formulas for determining if and what type of device might be present. We discussed the "HOW MANY" types of telephone compromises in a previous thread. The use of a good DMM and calulator armed with a working knowledge of electronics and telephone circuits will assist you greatly. ************************************************************************** 2)From: "Victor Healey, ki4je" Subject: New Face of Terrorism: HERF - Radio-Frequency Weapons New Face of Terrorism: Radio-Frequency Weapons By ERIC ROSENBERG c.1997 Hearst Newspapers ASHINGTON -- It's early on a Sunday morning and a minivan prowls the streets of a major U.S. city, perhaps Washington, D.C., or New York. In the back is a tube-like device, about two feet in length, connected to several boxes of electronics. The vehicle drives around its target, a building full of government computer systems. The device fires off electromagnetic pulses aimed at the building. Unlike the Oklahoma City or World Trade Center attacks, there's no explosion, no noise, no deadly calling card, no forensic evidence. But the damage is nonetheless severe. Electronic brains in computers in the building are burned out or crippled for days. If the attack were to take place in New York, electronic money transactions might be wiped clean; confidence in the U.S. banking system could be undermined. This hypothetic scenario, described in recent congressional testimony by a retired three-star Army general, makes U.S. planners nervous - because the threat isn't science fiction. While intrusions by ``hackers'' - experts who can electronically tap into computers - are a well-known threat to computers, electromagnetic pulse weapons are relatively unknown. According to published reports, British military officials suspect that these devices, also known as radio frequency or high-powered microwave weapons, already are in the arsenal of the Irish Republican Army. In fact, the British government suspects that radio frequency ``guns'' may have been fired last year against computers used by the London futures market. In Russia, mobsters ``have successfully used high-energy devices to put alarm systems out of operation,'' Manuel Wik, a Swedish military scientist, told a computer warfare conference last month. ``One Russian general I know is worried about the increasing number of cases in which terrorists have been using electromagnetic devices,'' Wik said. The Swedish banking industry has asked the military to advise banks on how to counter the weapons. Meanwhile, Swedish scientists recently demonstrated a large-scale radio frequency weapon by focusing a beam on a car's electronics, stopping the vehicle at more than 100 yards. The Pentagon is developing high-powered microwave weapons to disable cruise missiles, aircraft or artillery fire in mid-flight, according to a report by the Defense Research and Engineering office. But it's not the high-tech systems that concern defense planners as much as it is the low-tech systems, as represented by the van scenario. ``You could take a surplus radar transmitter and concentrate a beam and just sit out on the street corner and blow away virtually any computer facility that had no protection,'' said John H. Hall, an electromagnetic pulse expert and president of the Fremont, Calif.,-based company Integrated Wave Technologies Inc. ``This stuff has been around for years but nobody has talked about it. And for every amateur saboteur, it's a new and exciting technology,'' Hall added. As the technical know-how proliferates around the world - some Internet sites tell how to build crude variants of the devices - scientists are worried about the consequences. ``Terrorists, by electromagnetic means, could create chaos,'' said Wik. ``They could direct their weapons against computer centers, upsetting those functions depending on computers. They could direct microwave guns towards traffic on highways and cause malfunctions in cars.'' There are two basic classes of these weapons. One uses amplifiers and antennas similar to radio transmitters, but they shoot concentrated microwaves. These transmissions destroy electrical components by inducing voltage surges in the target. A less-known class uses explosives wrapped in special antennas to create a much more dense and effective electromagnetic pulse. These devices can be made to fit in the palm of the hand. The United States is starting to take notice of the potential threat. Rep. Jim Saxton, R-N.J., the chairman of the Joint Economic Committee, which last week held a hearing about electromagnetic pulse technology, called it ``a devastating new weapon ... currently in enhanced development today in Russia.'' The head of the President's Commission on Critical Infrastructure Protection, Robert Marsh, said he was not aware that such a weapon had been used against United States facilities but he warned: ``We have to keep our eye on that as a potential weapon for the future.'' Retired Army Lt. Gen. Robert L. Schweitzer, who was on the Reagan administration National Security Council staff, is calling for greater government attention. He said the government should impose the strictest possible export controls on the technology to prevent proliferation. ``Today, there is a new class of radically new and important radio frequency weapons,'' Schweitzer warned Saxton's panel. ``And in this case, the horse is out of the barn. Transfers have occurred and are occurring.'' Schweitzer is working with the Alexandria, Va.-based defense consulting firm Eagan, McAllister Associates on a study of radio frequency weapons for the Pentagon. While the devices are worrisome to planners, experts say countermeasures exist, including specialized building construction materials and unique voltage protectors. In addition, fiber optics, which are immune to most pulses, could be used to replace cabling in buildings. Government facilities that rely almost exclusively on computers such as the code-breaking National Security Agency, are believed to have countermeasures in place. But most office buildings do not. ``There could be defenses against this, but today most people are ignoring it,'' Hall said. 73 de Victor Healey Ki4je SPAM BUSTER/HACKER Please use this free worldwide ICQ pager to reply ;>} http://wwp.mirabilis.com/1341701 ************************************************************************** 3)From: Travis Lee Subject: Increase Range I've got one of those generic RadioShack 2 way FM Communicators and it only has a range of 1/4 mile. Is there a way to increase the range on this? it operates at 49Mhz Thanks ************************************************************************** 4)From: William Xu Subject: Re: Military Encryption Cracked I think some people has missed the whole point of this operation. It has proved Publicly now that DES can be cracked, and by your average Home Computers. Suspicion about that DES system was already raised in the 80's. Especially, when they captured the infamouse hacker Kevin Poulsen, who used a commercial encryption program to encrypt his hardrive for 3 times. Some how the FBI/NSA was able to unencrypt it in 4 or 5 month? I saw the post in BUGTRAQ by Verser, who said that it tried 25% of the possible keys, so say if he did have 14k of computers working for him, it would take 120 days to try all 100% of the possible keys. So if you think your computer is safe because you used some DES software to encrypt everything you have, Think Again. These days, with powerful super computers, I would imagine it will take just weeks to crack the key. -- H0lo ************************************************************************** 5)From: principal@connect.ab.ca Subject: Re: Video Surveillance Detector >>>> From: "Lorenzo Castillo Sanchez" Subject: Video Surveillance Detector I just found this stuff on the net in the American Innovations website. I've seen audio surveillace detectors before but is it really possible to detect video surveillance? <<<< I bought one piece of equipment from American Innovations and was disappointed in it's quality. I had to open the equipment to fix a loose connection and discovered GLOBS of silicon and loose components. The housing was much larger than required. Personally I question the quality and capabilities of their equipment based on this experience. You can Build Bridges all your life, but suck one "*@^&# and they don't call you a bridge builder! ************************************************************************** 6)From: Mutter Subject: My opinion about the whole lock challenge thing Lock picking and escape acts are two different things. If you tie an average locksmith to a chair and say "escape" you will probably be dissapointed. To test this theory, I kidnapped a locksmith, tied him to a chair and, well, I've said too much already :) The point is, though, this is not a fair test of one's lockpicking skills. There is more to escaping a chair hung upside down by a crane than just lockpicking... In other news, thanks to Augie for the great endorsement. :) About local ANI numbers, people have compiled lists before (one of which is part of the 2600 faq -- do a net search). - M u t t e r Ed. root zine (http://www.openix.com/~mutter) mutter@openix.com +++Moderator's Note+++ Mutter, you are correct. I agree with you that an escape artist and a lockpick expert ARE two different things. Trace and I have the UTMOST confidence that Augie will prevail in undoing the locks but we're pretty sure he won't get out of the black leather Spandex outfit "Crazy Glued" to the chair... ;-) ************************************************************************** 7)From: John P Trotter Subject: Monitoring conversation response Look take the Radio Shack Box apart and hide the pieces John Trotter ************************************************************************** 8)From: Martin Pask <100142.3101@CompuServe.COM> Subject: Re: Dog Repellant A brilliant story and I can only feel for you in that situation. I would say that on the rare occasion that we get a compromise!! its normally down to a dog picking up your scent. A friend of mine suggests Lion Piss, but I dont fancy asking the lion to piss in a bottle for me. A few other suggestions and some that we have used are WD40 which is a lubricating spray. Dogs hate the stuff and wont come near you once you have given them a quick shot in the face. There are also dog repellants available from garden centres to stop dogs and cats digging up plants. They are little plastic pods which are made to look like leaves. all you have to do is hang a few around your OP. They are quite effective but only last a few days. On the sonic repellant, I have tried these and be warned all they seem to do is make the animal more aggressive and although for the most part they wont come to close they just bark at you from a distance. Hope your Gillie suit dried out. Regards M.P.I. ************************************************************************** 9)From: "Walstrom, Bradley" Subject: Caller ID request for info >From: misfitt@mail.tss.net (Jeff Caldwell) >Subject: Request for Info >I'm looking for either a device or intel-based software that will defeat >call-blocking, or calls that are untraceable. >We've been having problems with a caller who shows up on caller-id as >"Unknown Name, Unknown Number"... and when we try to have US WEST do a >last-number trace, it's ALWAYS unsuccessful. >I need something that will UNFAILINGLY trace the last number that called >me. If you have caller ID, US West should be able to set up you line so that it will not accept blocked calls. I have blocked my Caller ID and I have a friend that does not accept blocked calls. Unless I dial *82 (which unblocks my number) before I dial her number my call will not go through. Sorry but nothing is fool proof because she still does get "unavailable" calls that come from out of state where they don't provide caller ID. Also when I call her from my cell phone it shows up as "unavailable". In the US West service area, *69 should also call back the last number that called your phone. So if you set up your line to not accept blocked calls you should be able to narrow down where the calls are coming from. By the way, calls from a payphone will show up on Caller ID as "payphone" and the number. Brad Walstrom ************************************************************************** 10)From: "Walstrom, Bradley" Subject: Re: MCI thing... The reason you had this result is because a business can get three different types of trunk lines to connect to your PBX. There are incoming, outgoing and two-way trunks. Depending on the size of your phone system and the calling patterns of your business the phone system can be configured with all three types of trunks. The incoming are reserved for customers to call into your business, the outgoing are reserved for calling out and the two-way handle the overflow from both incoming and outgoing. My guess is that when you called the MCI number your call was placed on an outgoing trunk that was identified by the ANI equipment. An outgoing trunk will not accept an incoming call, that's why you were getting the strange results when you tried to call it. Brad Walstrom. ************************************************************************** 11)From: graywolf@fox.nstn.ca Subject: Re: Request for Info >I'm looking for either a device or intel-based software that will defeat >call-blocking, or calls that are untraceable. >We've been having problems with a caller who shows up on caller-id as >"Unknown Name, Unknown Number"... and when we try to have US WEST do a >last-number trace, it's ALWAYS unsuccessful. Jeff - I've had more experience with this one than I care to remember. I realize that the phone systems in Canada & the US are different but I would be willing to wager that your problem calls are coming from a cell phone. If so, Call ID and Call Trace are useless. The phone company can trace the cell phone calls but it has to be set up on their end and they normally will only release the results to the police. I have also had them use an interesting device they install on the switcher. Normally calls are caller priority - the connection is broken when the calling party hangs up. This device reverses that so the connection is maintained untill the called party hangs up. I don't know if this will work with a cell phone but, if it does, leaving him connected for several days @ $20/hr might cause him to rethink harrassing you. Phone companies (especially) and the police take this kind of thing quite seriously. In some jurisdictions, this is sufficient to lay stalking charges. Whatever you do - DON"T TAKE IT! Enlist the help of the phone folks and be prepared to lay charges. Most of these dick heads are cowards and at the first sign of someone being prepared to fight back they will run so fast you'll get whiplash watching them go by. Unfortunately, I know of no DIY solution. Perhaps the godfather of the list, Trace Carpenter, has some ideas. Regards graywolf ************************************************************************** 12)From: phreaker@technologist.com Subject: Detecting in-line phone taps with a VOM >10)From: "Carney, Brian" >Subject: Bug detecting > >Anyone know how to detect an line type bug with a voltohm meter?? Please >any information Brian, If you test a phone line and get a 2 to 4 volt drop due to a tap, your phone probably won't even work. The off-hook voltage is around 5 volts without a tap. The detection of in line taps by using changes in the off-hook voltage is questionable at best. Visual inspection is better and discretion far better still. Another way, albeit crude, is to disconnect all phones and electronic devices from your phone wiring, disconnect the phone line to your local c.o. as far down the line toward the c.o. as possible and hook your local 110AC wiring to the phone lines for a few seconds. Since the phone lines should be open, no damage will occur. On the other hand very few bugging devices can handle this voltage. This is not a reccommended way but it can work. I must say, however, that people who use VOMs to detect bugs are wonderful targets. Remember, if you are a target or suspect you might be, the best thing to do is to let you find a bug or bugs. For every one you find there should be several you won't. Just because you don't get a 2-4 volt drop in off-hook voltage doesn't mean you are not being bugged. It just means you are not getting a 2-4 volt drop in the off-hook voltage. There are in-line rf xmitters that cause a drop of less than .5v and are small enough (<3mm thick and 10mm long with solder tabs at each end) to be placed in the standard phone wire under the insulation. Try finding that one with a VOM. HOW TO DRIVE A TARGET CRAZY or BUGGING A TARGET DOESN'T HAVE TO MEAN CAPTURING DATA. 1. Set up a bugging receiver system (radio receiver, tape unit, etc.) 2. Make the receiver or tape unit fail (it has to look like a legimate failure that the installer was not aware of). 3. Put a blank tape in the failed unit with a current date on the tape. 4. Install the unit in a location close enough to the target that it would pick up a transmitter if a transmitter were there. This can be outside or in a public accessible area. 5. Let the unit get found (on purpose). But, don't make it too obvious. And make sure the target becomes aware of the unit that was found. Altho you will lose the unit (personally I consider placed equipment lost equipment), the target will go nuts looking for a transmitter that doesn't exist. I have had people move or change offices under these conditions. The laws broken to do this are trespassing at worst since 1) the equipment doesn't work and 2) you have no intention of bugging anyone (at least not in that sense). P ************************************************************************** 13)From: Trace Carpenter Subject: Americans V. Canadians Response In a recent posting it was said: Why was "Americans v Canadians" even posted? Well here we go again. That was a joke, people laughed at it and it would have been gone. If we're going to censor things than there have been a LOT of threads that shouldn't have been posted as they didn't have anything to do with tech & surveillance. Guess now we've fueled a what should be posted thread. Augie submitted a joke. LET IT GO!! PLEASE!!! ************************************************************************** 14)From: Trace Carpenter Subject: Re: Dog Repellant You asked about the electronic repellants. As a former K-9 officer and a tech I can tell you that I've yet to see one that will ward off a focused trained animal. In fact the electric shock collars often won't bring a trained police dog off of an attack sleeve. BTW, CS doesn't work on them either, and as for pepper spray, I'll it did to my partner on a call one night was PISS HIM OFF. -- Trace Carpenter Investigations ****** 2926 Maple Ave., Ste. 200 Friends help you move; Dallas, Texas 75201 Real friends help you move bodies. 214.828.4520 ****** ************************************************************************** 15)From: BADCOFFEE@aol.com Subject: Re: Dog repellant? Publicaly, I must say that I absolutely LOVE reading endevours of this field. Thank you to Principal, that was a hell of a story and I hope MORE is to follow from you, me and all others on the list. PS: RE: Subject: Why was "Americans v Canadians" even posted? Anyone else see that coming? :-) Arleen......send back the "lightbulb" post please. :-) Augie ************************************************************************** 16)From: Duece6x6@aol.com Subject: Re: Boosting RF Signals/Tap Detection To: Cracked It is very easy to boost an RF signal. The easiest is to attend a few local amateur radio flea markets and talk to a few of the vendors there. First you must know the frequency you are dealing with and usually most commercial equip. is near the amateur range and the Ham stuff will work acceptably. You are looking for a linear amplifier. Most require a minimum signal input. When you talk to these guys don't take no for an answer. Someone will help you out. Keep asking around. The DUECE To: Trace Carpenter Yes you can use a VOM to detect all wire taps except proximity inductive taps which have to be visually found. I have met some hotdogs who talk about mil. / gov. equipment called a reflectometer which places a signal on the line gradually then measures the reflected power, If you do have a base line. This equip. is worthless and is very expensive. I tested this stuff and it is neat but in an uncontrolled real world enviroment it does not work, because most analog phone lines are cabled or cabled trayed with data/computer lines and this is a changing impedance all the time. Also testing off hook and on hook voltages is worthless because you cannot compare anyone elses line voltage against the reference due to the type of cable/wire used and the distance from the CO {central office}. Voltage difference could be only a few micro volts.For this reason all the neat little phone tap detecter boxes are just a gimmick and will only detect taps usually on the premises. Most CO equipment is required by the FCC to have the same operating parameters. The cable length to the CO can vary to much and go through several SACK / junction points and split blocks to get any real reading for taps. Most offpremise taps will have to be visually found, so get a sack box wrench, junction box lock key, and anything else you may need to gain access. All non law enforcement taps off premise I have found are installed between the building and the first sack point. After that the installer can't figure out the comm pair wires because the IDF/intermediate distribution frame is too large and the pairs are not marked. {unless he has access to the teleco computer. And I have only found this once in 20 years! To test phone lines on premise with the VOM first be honest with the customer! What type of system does he have? A single line use phone {residence}? Then isolate the line at the pole or junction {unhook it form the phone company}. unhook all phones in the house/office this basically leaves you with NO load or line hook ups. Use your VOM on its highest resistance setting at least 100meg ohms and put it across the line it should be open or no resistance, because you have unhooked everything--right? A clean line--any resistance would show a comprimise. A business usually has a phone system somewhere {the phone switch} locate it and the MDF/main distribution frame-unhook the phone line and all equip. then test for resistance again. Should be no resistance. This system of testing will show anything hooked between the pair to the phone jack. works good on capacitance, realy and direct coupling. Try it. Now what about this HONESTY thing? Most large businesses have upgraded to Northern Telcom-NEAX-NEC-ect systems. These new systems turn the audio/voice to digital format on the talk pair. This is called a digital prioritized system. I am a certified factory tech on many systems and not even the factorys have equipment to intercept and decode in real time the conversations. I've tried to record conversations and play them back through the system and the recording didn't even work. If your cust. has a system like this tell him not to worry it can't be tapped. Most large businesses have least cost routing programmed into the switch computer and the Demarkation {teleco hookup areas} areas are nearly impossible to figure out which CO line will be used for any given conversation. I have met few PI's that really know what they are doing, most are dog and pony shows! THE DUECE ************************************************************************** 17)From: proff@iq.org Subject: Underground extract: System X Anyone read this book? Apparently the first in-depth investigation into the international computer underground to come out of the Southern-Hemisphere - or so I'm told ;) - J.A Extracts from Underground - The true nature of System X Extracted from Chapter 10 - "Anthrax - The Outsider" Note: System X's name has been changed for legal reasons. Sometimes the time just slipped away, hacking all night. When the first hint of dawn snuck up on him, he was invariably in the middle of some exciting journey. But duty was duty, and it had to be done. So Anthrax pressed control S to freeze his screen, unfurled the prayer mat with its built-in compass, faced Mecca, knelt down and did two sets of prayers before sunrise. Ten minutes later he rolled the prayer mat up, slid back into his chair, typed control Q to release the pause on his computer and picked up where he left off. This company's computer system seemed to confirm what he had begun to suspect. System X was the first stage of a project, the rest of which was under development. He found a number of tables and reports in System X's files. The reports carried headers like 'Traffic Analysis', 'calls in' and 'calls out', 'failure rate'. It all began to make sense to Anthrax. System X called up each of the military telephone exchanges in that list. It logged in using the computer-generated name and password. Once inside, a program in System X polled the exchange for important statistics, such as the number of calls coming in and out of the base. This information was then stored on System X. Whenever someone wanted a report on something, for example, the military sites with the most incoming calls over the past 24 hours, he or she would simply ask System X to compile the information. All of this was done automatically. Anthrax had read some email suggesting that changes to an exchange, such as adding new telephone lines on the base, had been handled manually, but this job was soon to be done automatically by System X. It made sense. The maintenance time spent by humans would be cut dramatically. A machine which gathers statistics and services phone exchanges remotely doesn't sound very sexy on the face of it, until you begin to consider what you could do with something like that. You could sell it to a foreign power interested in the level of activity at a certain base at a particular time. And that is just the beginning. You could tap any unencrypted line going in or out of any of the 100 or so exchanges and listen in to sensitive military discussions. Just a few commands makes you a fly on the wall of a general's conversation to the head of a base in the Philippines. Anti-government rebels in that country might pay a pretty penny for getting intelligence on the US forces. All of those options paled next to the most striking power wielded by a hacker who had unlimited access to System X and the 100 or so telephone exchanges. He could take down that US military voice communications system almost overnight, and he could do it automatically. The potential for havoc creation was breathtaking. It would be a small matter for a skilled programmer to alter the automated program used by System X. Instead of using its dozen or more modems to dial all the exchanges overnight and poll them for statistics, System X could be instructed to call them overnight and reprogram the exchanges. --- No-one would be able to reach one another. An important part of the US military machine would be in utter disarray. Now, what if all this happened in the first few days of a war? People trying to contact each other with vital information wouldn't be able to use the telephone exchanges reprogrammed by System X. THAT was power. It wasn't like Anthrax screaming at his father until his voice turned to a whisper, all for nothing. He could make people sit up and take notice with this sort of power. Hacking a system gave him a sense of control. Getting root on a system always gave him an adrenalin rush for just that reason. It meant the system was his, he could do whatever he wanted, he could run whatever processes or programs he desired, he could remove other users he didn't want using his system. He thought, I own the system. The word 'own' anchored the phrase which circled through his thoughts again and again when he successfully hacked a system. The sense of ownership was almost passionate, rippled with streaks of obsession and jealousy. At any given moment, Anthrax had a list of systems he owned and that had captured his interest for that moment. Anthrax hated seeing a system administrator logging onto one of those systems. It was an invasion. It was as though Anthrax had just got this woman he had been after for some time alone in a room with the door closed. Then, just as he was getting to know her, this other guy had barged in, sat down on the couch and started talking to her. It was never enough to look at a system from a distance and know he could hack it if he wanted to. Anthrax had to actually hack the system. He had to own it. He needed to see what was inside the system, to know exactly what it was he owned. The worst thing admins could do was to fiddle with system security. That made Anthrax burn with anger. If Anthrax was on-line, silently observing the adminsÕ activities, he would feel a sudden urge to log them off. He wanted to punish them. Wanted them to know he was into their system. And yet, at the same time, he didnÕt want them to know. Logging them off would draw attention to himself, but the two desires pulled at him from opposite directions. What Anthrax really wanted was for the admins to know he controlled their system, but for them not to be able to do anything about it. He wanted them to be helpless. Anthrax decided to keep undercover. But he contemplated the power of having System X's list of telephone exchange dial-ups and their username - password combinations. Normally, it would take days for a single hacker with his lone modem to have much impact on the US military's communications network. Sure, he could take down a few exchanges before the military wised up and started protecting themselves. It was like hacking a military computer. You could take out a machine here, a system there. But the essence of the power of System X was being able to use its own resources to orchestrate widespread pandemonium quickly and quietly. Anthrax defines power as the potential for real world impact. At that moment of discovery and realisation, the real world impact of hacking System X looked good. The telecommunications company computer seemed like a good place to hang up a sniffer, so he plugged one into the machine and decided to return in a little while. Then he logged out and went to bed. When he revisited the sniffer a day or so later, Anthrax received a rude shock. Scrolling through the sniffer file, he did a double take on one of the entries. Someone had logged into the company's system using his special login patch password. He tried to stay calm. He thought hard. When was the last time he had logged into the system using that special password? Could his sniffer have logged himself on an earlier hacking session? It did happen occasionally. Hackers sometimes gave themselves quite a fright. In the seamless days and nights of hacking dozens of systems, it was easy to forget the last time you logged into a particular system using the special password. The more he thought, the more he was absolutely sure. He hadn't logged into the system again. Which left the obvious question. Who had? ________________________________________________________________________ [This extract may be reposted non-commercially and without charge only] Underground; Tales of Hacking, Madness and Obsession on the Electronic Frontier, by Suelette Dreyfus; published by Mandarin (Random House Australia); (P) 475 pages with bib. http://www.underground-book.com/ or http://underground.org/book ************************************************************************** 18)From: Brad Leonard Subject: A note for Principal Sportsmans Guide has the audio dog repellents for US$24.95. I don't have their regular phone, but try 800-458-3006 to request a catalog. They also sell closeout outdoor/military surplus gear, clothing, and footwear. They have a full satisfaction guarantee and are good folks to do business with. (No, I don't own stock in the company). Brad ************************************************************************** 19)From: Jesse Subject: WWW Password Cracking I have a question about WWW sites with no ftp servers or any such, just a site and that is all: Are there any ways to bypass or get the password for them ? (These are the web sites that, when loaded, another box pops up(I suppose it is a javascript?) and asks for username and password... There has to be a way around them.. Thank you ************************************************************************** 20)From: Rick Kidd Subject: Re: Police procedures Lawrence, You need to consult with an organization called ASLET. Each departmernt/agency has different procedures for response to certain situations. Most are based upon prior litigation and training. ASLET is the American Society of Law Enforcement Trainers. Sincerely, Rick Kidd Confidential Security Services (CSS) Association of Counter-Intelligence Professionals (ACIP) ************************************************************************** 21)From: Rick Kidd Subject: Re: Looking for coiled cord earpiece Don, I know of two companies that distribute these products. Radio Equipment Corp in Buffalo New York and MCM Electronics in OHIO. If you stillneed the equipment or more information email me. Sincerely, Rick Kidd Confidential Security Services (CSS) Association Of Counter-Intelligence Professionals (ACIP) ************************************************************************** 22)From: Rick Kidd Subject: Re: Fraud Case Don, We specialize in forensic accounting. Please contact us and we will be more than happy to describe our services. rkidd@localnet.com 716-934-7158 Sincerely, Rick Kidd Confidential Security Services (CSS) Association of Counter Intelligence Professionals (ACIP) ************************************************************************** Who are you? What's your specialty and/or interest? Let us know about your company... What would you like to see on the list? Post it. Let us know... Do you have something to contribute? We'd like to hear it... We want to know EVERYTHING and ANYTHING about eavesdropping, surveillance, countersurveillance & privacy related technology, etc... Remember: who, what, where, when, how & why... we want ALL the details... Do you have a question? Post it... A little free time? Help a member... With the INCREDIBLE brain power on this list, someone should have the answer ;-) P.S. Don't be a LURKER... Members take the time to post info for us all... give something back... Don't just take... Your input/knowledge is valued... ************************************************************************** Send Postings to: spyking@con2.com with "Post" in subject field with subject ************************************************************************** Subscribe to: spyking@con2.com In the subject field type: subscribe-surveillance list e-mail address ************************************************************************** Unsubscribe to: spyking@con2.com In the subject field type: unsubscribe-surveillance list e-mail address ************************************************************************** ...The Simple Rules of the Surveillance List... The Surveillance List Owners may Reject any posts that are/contain: 1) Info Unrelated to Eavesdropping, Surveillance or Privacy technology... 2) Flames or Negative posts... 3) E-Signatures that are considered excessive... 4) Advertisements not DIRECTLY related to the list topics... 5) Attached Files... 6) Oversized Posts... (May be edited to save room) **************************************************************************** This publication is copyrighted and is protected by U.S. and International copyright law. The information transmitted on this list may not be reproduced, reposted or forwarded to any non-list member without expressed written permission of the List Owner. Violation of U.S. copyright law is a criminal and civil offense... **************************************************************************** The Surveillance List is Moderated by SpyKing@thecodex.com The List Owner will make EVERY effort to protect subscribers from spam... Copyright 1996, 1997 Codex Publishing Inc., All Rights Reserved... **************************************************************************** ****************************************************************************** Vol.Two Issue #146 The Surveillance List June 26,1997 Over 2300+ Members Worldwide Representing 50 different countries List Chat at: http://www.thecodex.com/chat.html Seminar Info at: http://www.thecodex.com/methods.html Surveillance List Pseudo FAQ at: http://www.thecodex.com/faq.html ****************************************************************************** IN THIS ISSUE... ****************************************************************************** 01) Re: WWW Password Cracking 02) Re: Frequency weapons 03) Re: Detecting in-line phone taps with a VOM 04) Re: Military Encryption Cracked 05) Re: WWW Password cracking 06) Re: Tap Detection Post by Duece 07) Lock picking and escape acts are two different things. 08) Re: Increase Range 09) Re: Lock picking challenge 10) Re: H.E.R.F. 11) Spam hater software 12) Another .au ANI 13) Re: HERF - Radio-Frequency Weapons 14) Investigators Needs Assistance -Code 3 15) Going to the Dogs!!!! 16) Re: Investigators Needs Assistance - Code 3 17) To all list members 18) Re: HERF 19) Digital Cameras? ****************************************************************************** DON'T BE A LURKER.... GET INVOLVED... YOU ARE A MEMBER... MAKE THE MOST OF IT ****************************************************************************** 1)From: CrACKeD Subject: Re: WWW Password Cracking > I have a question about WWW sites with no ftp servers or any such, just > a site and that is all: Are there any ways to bypass or get the password > for them ? (These are the web sites that, when loaded, another box pops > up (I suppose it is a javascript?) and asks for username and password... > There has to be a way around them.. Thank you Yes, there is. But first things first. It's not JavaScript. If the password protected site you're after is set up by a typical ISP (like Primenet) then it's using a .htaccess file to protect its contents. You cannot perform some sort of trick over the web to bypass the password unless you exploit some sort of CGI script, and I'm not going into details about exploting CGi scripts just because there are too many details to go into. Say you wanted to access one of my password protected web directories. You would have to log into Primenet using a valid account. Once you're there, you simply login to your UNIX shell and change to my protected directory. It's password protected from the web, but not from the prompt. Anyone can go in there and browse the contents. CrACKeD ************************************************************************** 2)From: Robson Steve Subject: Re: Frequency weapons >New Face of Terrorism: Radio-Frequency Weapons >By ERIC ROSENBERG > >c.1997 Hearst Newspapers > >The Pentagon is developing high-powered microwave weapons to disable cruise >missiles, aircraft or artillery fire in mid-flight, according to a report by >the Defense Research and Engineering office. > High-powered microwave weapons disabling/altering cruise missile and aircraft electronics and guidance systems I can believe. Disabling artillery fire in mid flight (with no electronic guidance) I find hard to believe. With all three what happens after being disabled, the momentum built up by the traveling speed is not going to just disappear, they have to continue along a given trajectory (even if that given trajectory is not the intended flight path) it's a combination of the momentum and gravity. What would be the effective range of these weapons and would it be enough to render the target (missile, aircraft, artillery fire) useless by having it drop short by a safe enough distance. ONE cruise missile can do a nice amount of damage (you only need one to hit the target). Research Eric Research. Please correct me if I'm wrong. I would be interested in possible effective ranges of such a weapon. Meanwhile, Swedish scientists recently demonstrated a large-scale radio frequency weapon by focusing a beam on a car's electronics, stopping the vehicle at more than 100 yards. Sorry, 100yrds no cigar - go directly to jail do not collect $200. Do you know how long it takes a cruise missile to travel 100 yards. BEEEP TOO LATE! Stephen, Ps. These views do not reflect the views of my employer. They are my own opinion. ************************************************************************** 3)From: "Anastasios D. Panos" Subject: Re: Detecting in-line phone taps with a VOM >12)From: phreaker@technologist.com >Subject: Detecting in-line phone taps with a VOM > >RE : From: "Carney, Brian" >> Subject: Bug detecting >> >>Anyone know how to detect an line type bug with a voltohm meter?? Please >>any information > >Brian, > >If you test a phone line and get a 2 to 4 volt drop due to a tap, your >phone probably won't even work. The off-hook voltage is around 5 volts >without a tap. The detection of in line taps by using changes in the >off-hook voltage is questionable at best. Visual inspection is better >and discretion far better still. I am sorry to say but in Greece I have found a number of transmitters on the TelCo lines that suppose to have 62,5 Volts abd were working fine on 58,5 Volts !! > >Another way, albeit crude, is to disconnect all phones and electronic >devices from your phone wiring, disconnect the phone line to your local >c.o. as far down the line toward the c.o. as possible and hook your >local 110AC wiring to the phone lines for a few seconds. Since the >phone lines should be open, no damage will occur. On the other hand >very few bugging devices can handle this voltage. This is not a >reccommended way but it can work. It works 100% in Greece we have 220 Volts ac !!!! >I must say, however, that people who use VOMs to detect bugs are >wonderful targets. Remember, if you are a target or suspect you might >be, the best thing to do is to let you find a bug or bugs. For every >one you find there should be several you won't. If more that one transmitter on the line, if powered by TelCo then the line goes dead for sure > >Just because you don't get a 2-4 volt drop in off-hook voltage doesn't >mean you are not being bugged. It just means you are not getting a 2-4 >volt drop in the off-hook voltage. There are in-line rf xmitters that >cause a drop of less than .5v and are small enough (<3mm thick and 10mm >long with solder tabs at each end) to be placed in the standard phone >wire under the insulation. Try finding that one with a VOM. Really ?? can you recomend a supplier ? (e-mail privately pls ) >HOW TO DRIVE A TARGET CRAZY or BUGGING A TARGET DOESN'T HAVE TO MEAN >CAPTURING DATA. > >1. Set up a bugging receiver system (radio receiver, tape unit, etc.) I am sorry I can not understand the rest to make comments, my Enlish is not this Good, (I hope this is not all Greek to you !!) Regards Anastasios D. Panos ============================================================ Panos & Associates, P. O. Box 19063, Athens 117 10, Greece (est.1973) Ph. : +30-1-923.7420, Fax : +30-1-923.2787 Contact : Anastasios D. Panos Members of : ABI, Intelnet, WAD, CII, ASIS, NAIS, PAPD E-mail : panosagcy@hol.gr URL: http://www.uklegal.com/panos/ ============================================================ ************************************************************************** 4)From: Mutter Subject: Re: Military Encryption Cracked > 4)From: William Xu > Subject: Re: Military Encryption Cracked > > I think some people has missed the whole point of this operation. > It has proved Publicly now that DES can be cracked, and by your average > Home Computers. Suspicion about that DES system was already raised in > the 80's. Especially, when they captured the infamouse hacker Kevin > Poulsen, who used a commercial encryption program to encrypt his > hardrive for 3 times. Some how the FBI/NSA was able to unencrypt it in > 4 or 5 month? I saw the post in BUGTRAQ by Verser, who said that it > tried 25% of the possible keys, so say if he did have 14k of computers > working for him, it would take 120 days to try all 100% of the possible > keys. So if you think your computer is safe > because you used some DES software to encrypt everything you have, > Think Again. These days, with powerful super computers, I would > imagine it will take just weeks to crack the key. > -- > H0lo Well, you do a keysearch of any encryption technique and you'll eventually crack the message. The point is, it's now *not* unheard of to attempt a 72 quadrillion key search ... (scary, eh?) The DES algorithm wasn't broken, the message was. Yeah, the DESCHALL group proved the limitations of the Data Encryption Standard by employing the use of hundreds of thousands of pc's (notice the sheer numbers...not just "your average pc") on the net dedicated to using a ditributed attack to search the entire keyspace (if that's what the situation called for). They succeeded. It is important to remember that as computer technology advances so should the need for stronger encryption/longer keys. About the NSA being able to decrypt Poulsen's HD, you shouldn't be surprised. The government has so much technology classified relating to encryption/decryption (for instance, the skipjack algo) that they are (and probably always will be) 10-15 years ahead of any techniques or technology which the public is aware of. You never heard about the existence of radical quantum computer technology in area 51, have you?? (once again, I've said too much. :) This means the best way to keep your information secure is not to put it anywhere in the first place ... - M u t t e r Ed. root zine (http://www.openix.com/~mutter) mutter@openix.com ************************************************************************** 5)From: "The Swordsman" Subject: Re: WWW Password cracking The only password javascript I know of is designed that the password would be the name of the html file that is password protected. For instance, if you typed Mommy into the field, the script would look for an html file called Mommy.html You can make it more secure by changing your html file to 8934c309e or other to keep em guessing. If a window pops up asking for a password my guess is that it is a CGI script, not a javascript. There's a reason a site is password protected, might be better for you to respect the privacy and security of a site unless you have probable cause to believe they are breaking the law. Frank Pagano (a.k.a. The Swordsman) A.S. Criminal Justice-Law Enforcement Auxiliary Police Officer, New York CyberAngels(#IRC226)--Director of Cybercops Team http://www.geocities.com/CapitolHill/7245 "And whosoever shall offend one of these little ones that believe in me, it is better for him that a millstone were hanged about his neck, and he were cast into the sea." (Mark 9:42) ************************************************************************** 6)From: Trace Carpenter Subject: Re: Tap Detection Post by Duece Enjoyed your reply, however, It wasn't me who had asked. I think it was B. Carney, so you may want to cc him. Anyway, one note. You mentioned that you couldn't find the proper pair at a sackbox without access to the telco computer. Just put a tone in the line and go to the box with an inductance amplifier. You'll find it. ************************************************************************** 7)From: Trace Carpenter Subject: Lock picking and escape acts are two different things >Lock picking and escape acts are two different things. Hey, we're letting him take his picks with him. ************************************************************************** 8)From: Trace Carpenter Subject: Re: Increase Range >I've got one of those generic RadioShack 2 way FM Communicators and it >only has a range of 1/4 mile. Is there a way to increase the range on this? >it operates at 49Mhz As I recall, it's only a matter of raising the B+ to 12V. That's if it's the unit I'm thinking of. ************************************************************************** 9)From: BADCOFFEE@aol.com Subject: Re: Lock picking challenge My dearest Frank and Trace, Houdini? Sheets? chains? cranes? T shirts? Times Square? Letterman? Damm...I thought I was going to Frank's place and letting him in the front door. Here I am thinking (for whatever God unknown reasons) "If this loser of a lock doesnt open.....Frank's gonna look at me like Im a jerk. :-) Ok guys... Be afraid! Verrrrry afraid! Like somewhere down the road there is'nt going to be payback for this one. :-) Run that coffee wer'e having through a urine test before drinking it :-) Remember about 4 years ago...the fat guy that was caught by hidden camera peeing in the office coffee pot?? Badcoffee?? hmmmmm :-) Ok back to business........ You bet ya! A little more dramatic than what I had in mind.......but sounds like a walk through the park. :-) If Time Square thing happens.....I get a bullet proof vest. I'll be just a little to "irresistible" of a target up there. Coffee at bad's house still on? Augie :-) ************************************************************************** 10)From: mulder@tolstoi.saccii.net.au Subject: Re: H.E.R.F. Why worry about exports with microwave stuff. Why not just use a 12 volt to 240 volt converter with enough watts and power up a element via the circuitry from a Micro-wave oven???? We once done an experiment with an old micro-oven element etc... stuck a parabolic around it and aim it at tree branch afar... whooooaaaaaaa!!!!!!! Although we were a bit scared about the radiation because of the flimpsy handle we made for it (suddenly fell off and pointing to us whilst on!). Hmmm now where can I get a second hand oven these days... 8-) Allen Crisell ************************************************************************** 11)From: Leah Subject: Spam hater software I was watching some CNET show over the weekend, and they showed a freeware program called "Spam Hater", which will analyze the headers of incoming spam messages, figure out where they really originate, and then let you, with the click of a button, send back your choice of canned/customizable response messages. It can be configured for various e-mail programs, including MSExchange. BTW Baby Daniel and Mom are fine, resting, and even sitting a the 'puter for a few minutes (as you can tell). He is a doll, sleeps four four hours late at night, which is better than his usual feeding schedule of every 1 1/2 to 2 hours in the waking hours. I wish men could do this. Leah Leah Wesolowski Private Investigator Adoption Search Specialist (leahwes@ACMEInform.com) ACME Information 164 Manningham Drive Madison, AL. 35758 (205)464-0506 TEMPORARY Office Hours: When I can! (Baby due 6/23!) (205)464-0230 fax 24 hours a day, 7 days a week. Check out our web site: http://www.acmeinform.com/ACMEInf.htm ************************************************************************** 12)From: "quovadis" Subject: Another .au ANI Well as trying another test today found out that 191234 will work on land line phones where as mentioned 018 018 222 will work on all phones including mobiles quovadis ************************************************************************** 13)From: "J.D. Abolins" Subject: Re: HERF - Radio-Frequency Weapons >2)From: "Victor Healey, ki4je" >Subject: New Face of Terrorism: HERF - Radio-Frequency Weapons > >New Face of Terrorism: Radio-Frequency Weapons >By ERIC ROSENBERG Victor, thank you for the article. For people wanting to read a general description of HERF and some ways it could be used, there's Winn Schwartau's book _Information Warfare_. (Winn also has the Infowar.Com site at http://www.infowar.com.) Not quite HERF but loosely related to negative impact of electronic emissions was a posting made to Risks Digest back in the early 1990's about the possibility of problems with munitions using electronic triggers and radio transmissions. The phenomenon was called HERO (if I remember correctly, it stood for Hazards of Electronic Radiation to Ordinance). I'll have to dig through the Risks archives for that item. Tagline: "Ouch! That HERFs!!!" On to another item in that SL issue... >19)From: Jesse >Subject: WWW Password Cracking > >I have a question about WWW sites with no ftp servers or any such, just a >site and that is all: Are there any ways to bypass or get the password for >them ? (These are the web sites that, when loaded, another box pops up(I >suppose it is a javascript?) and asks for username and password... There >has to be a way around them.. Thank you The login prompts could be CGI/PERL or various other things. JavaScript, in itself, doesn't do the ID password validation. Some options, coming early morning foggy ponderings: Crack into the server itself. Get root access. Etc. (There are means other than ftp loopholes.) Set up a routine to try different IDs and passwords against the prompts. Helps if you know what the IDs might be from other sources. It is possible that one or more ID-password sets are circulating on the Usenet and elsewhere. People tend to be very loose with Web site passwords because usually there is no perceive benefit to keeping the info secret AND no pereceived penalty for disclosing it. It looks like something that can be shared with others as a favor. (Some Web sites are responding by checking the domains from where each ID-PW set comes from, if it is more than 3-5, they send a warning to the registered user. Other methods are being used. But there is a window left open for a while.) Social engineer somebody who has an ID-password. As noted above, many people tend to be less guarded with Web site registration passwords. J.D. Abolins ************************************************************************** 14) From: PI12900@aol.com Subject: Investigators Needs Assistance -Code 3 Earn top dollars working Commerical Broadcast surveillence and/or on-site inspections.Tyson vs Holyfield, June 28, 1997. We still need investigators in the following states: Alaska, Deleware, Iowa, Maine, Michigan, Nebraska, South Carolina, Washington, D.C., Connecticut, Oaklahoma and New Hampshire. Please contact me as soon as possible: Richard Harris, P.I. East Bay Detective Agency 2600 Fruitvale Avenue Oakland, CA 94601 1-800-563-1707/Fax:510-535-0331 http://www.quikpage.com/E/eastbayda email.PI12900@aol.com Commerical Broadcast Surveillence Services since 1994. 24 years combined law enforcement & investigative experience. ************************************************************************** 15)From: Duece6x6@aol.com Subject: Going to the Dogs!!!! Dog problems? I appreciate the guy getting caught by the MARKS dog, It's happened to me! I talked to an old time PI and found the best reppellent possible. OC-CN-CS type sprays don't work on all dogs. The best mix is to use 90% ammonia availible at industrial cleaner suppliers and chemical supplies. Not the sudsy store type. Mix in Iodine 10% by volume and Formaldahyde 10% by volume. Put this in a squeeze squirt bottle. Like a kechup bottle. Do not use a squirt gun! They leak. You can squeeze hard on the ketchup bottle and shoot it over 30 feet. Squirt this in and around your area and upwind of you ops area. With in a mile upwind will stop his scent. It will ruin the dogs scent ability for days! They run home and the owner has no idea whats going on. If you squirt the dog it evaporates before they get home. This was a chemical defense mix for women before canned OC type stuff came out. The Iodine Stings the face , marks the person or dog and the Ammonia burns the eyes, the formaldahyde defeats skin oils to let the other stuff work. Try it. THE DUECE ************************************************************************** 16)From: PI12900@aol.com Subject: Re: Investigators Needs Assistance - Code 3 WE ALSO HAVE DONE NFL FOOTBALL,COMMERCIAL BROADCAST SURVELLANCE ASSIGNMENTS AND WE ARE ALWAYS LOOKING FOR QUILFIED INVESTIGATOR(S) NATIONWIDE TO ASIST US.. Richard Harris, P.I. East Bay Detective Agency Oakland, CA. 94601 1-8000-563-1707/Fax 535-0331 http://quikpage.com/E/eastbayda ************************************************************************** 17)From: Larry Braden Subject: To all list members I don't want to be accused of being a " lurker " and never posting anything. I ran across this on page 60 of the latest " American Legion " magazine and thought it might put a smile on your face. Actual lawyers questions, compiled by the Massachusetts Bar Association Lawyers Journal : * How many times have you committed suicide ? * How far apart were the cars when the collision occurred ? * Now doctor, isn't it true that when a person dies in his sleep, he doesn't know about it until the next morning ? * The youngest son, the 20 year old, how old is he again ? * Were you present when your picture was taken ? * Were you alone or by yourself ? * Was it you or your younger brother, who was killed in the war ? * You were there until the time you left, is that true ? * These stairs that went down to the basement, did they go up also ? * So what were you doing when your baby was conceived ? * Did he kill you ? and we all work for them one time or another ! Respectfully, Larry Braden Montrose Investigations Montrose, Colorado http://www.angelfire.com/co/WestCoPI ************************************************************************** 18)From: "John K." Subject: Re: Bug detecting > If you test a phone line and get a 2 to 4 volt drop due to a tap, your > phone probably won't even work. The off-hook voltage is around 5 volts > without a tap. The detection of in line taps by using changes in the > off-hook voltage is questionable at best. Visual inspection is better > and discretion far better still. Line voltage over here in about 6 volts off-hook. Pick up an extension and that drops another 2 volts. The phone still works fine. I could have two or three extensions picked up without a problem. On top of that, I've got an answering machine, recorder controller and other audio manipulation tools inline already. If your goal is to detect a tap (or extension) which uses the line for power, using your VOM will work just fine. Just know where the needle should be when everything is normal. Granted, relying on your VOM exclusively to detect taps would be pretty foolish. It should be used in combination with several other detection techniques, as you described. CrACKeD ************************************************************************** 2)From: Travis Lee Subject: Re: Increase Range >>I've got one of those generic RadioShack 2 way FM Communicators and it >>only has a range of 1/4 mile. Is there a way to increase the range on this? >>it operates at 49Mhz >As I recall, it's only a matter of raising the B+ to 12V. That's if >it's the unit I'm thinking of. Its one of those Headset Walkie Talkies. is that the one your thinking of? and whats a B+ ? =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- "Duh... huh ¿" 8~Þ duckman@lava.net ************************************************************************** 3)From: "mage2" Subject: Re: Going to the Dogs Umm ammonia and iodine react and form a unstable compound. That when dry could explode from the friction of air blowing along the top of the stuff. When Wet is is less Senstive. Now i dont know about Formaldahyde it might stop the reaction also is it pure solid iodine or the solution. If you make this and you find a red-brown sluge at the bottom of the contaner and it is still wet with ammonia set it down and get away from it! If it is dry try to get rid of it fast and pray. See i am not a lurker any more. i will ask around and see about the Formaldahyde in the mixture. I think salt would be a good replacement for the iodine. Because it burns in a cut or in the eyes pretty good anyway. > 15)From: Duece6x6@aol.com > Subject: Going to the Dogs!!!! > > Dog problems? . The best mix is to use > 90% ammonia availible at industrial cleaner suppliers and chemical supplies. > Not the sudsy store type. Mix in Iodine 10% by volume and Formaldahyde 10% by > volume. Put this in a squeeze squirt bottle. Like a kechup bottle. Do not use > a squirt gun! They leak. You can squeeze hard on the ketchup bottle and shoot > it over 30 feet. Squirt this in and around your area and upwind of you ops > area. With in a mile upwind will stop his scent. It will ruin the dogs scent > ability for days! They run home and the owner has no idea whats going on. If > you squirt the dog it evaporates before they get home. This was a chemical > defense mix for women before canned OC type stuff came out. The Iodine Stings > the face , marks the person or dog and the Ammonia burns the eyes, the > formaldahyde defeats skin oils to let the other stuff work. Try it. > > THE DUECE ************************************************************************** 4)From: "William H. Geiger III" Subject: Re: Spam hater software -----BEGIN PGP SIGNED MESSAGE----- In <3.0.32.19970626003623.00b4b610@admin.con2.com>, on 06/26/97 at 12:42 AM, SpyKing said: >11)From: Leah >Subject: Spam hater software >I was watching some CNET show over the weekend, and they showed a >freeware program called "Spam Hater", which will analyze the headers of >incoming spam messages, figure out where they really originate, and then >let you, with the click of a button, send back your choice of >canned/customizable response messages. It can be configured for various >e-mail programs, including MSExchange. Unfortunatly such programs do little good. :( A large percentage of spam has fake mail header so they cannot be traced back to the orriginators. Those who you can get a valid e-mail address dump all such mail directly into the trashcan never read. And even on the slim chance that your message gets read it does no good. Spamers are a think skined bunch. Anything you may have to say to them has alread been said 1,000's of times before and worse. - -- - --------------------------------------------------------------- William H. Geiger III http://www.amaranth.com/~whgiii Geiger Consulting Cooking With Warp 4.0 Author of E-Secure - PGP Front End for MR/2 Ice PGP & MR/2 the only way for secure e-mail. OS/2 PGP 2.6.3a at: http://www.amaranth.com/~whgiii/pgpmr2.html - --------------------------------------------------------------- -----BEGIN PGP SIGNATURE----- Version: 2.6.3a Charset: cp850 Comment: Registered_User_E-Secure_v1.1b1_ES000000 iQCVAwUBM7IdJ49Co1n+aLhhAQFcQwQAn/rXByQcuXVnzo+j1P66xkFc53Q0IXEQ yKe0ruN8eSWsRC1Uuc16WOZnjl1le6JZENdYCpZ7OMIq8Auy7z++kqGXTox1EYvl U+zIKn2/3HadcKw/ZSlnjKwGhLbPlSx6Ur+cWMbmNtEPzf9+qx9OnRPh0cy5Nrl0 PtM1ddGfphQ= =0QbU -----END PGP SIGNATURE----- ************************************************************************** 5)From: John Palmeri Subject: Re: Digital Cameras >From: SpyKing@thecodex.com >Subject: Digital Cameras? > >I going to add a digital camera to my arsenal. I am not too concerned >with price but I would like to get the most bang for my bucks. Any >suggestions? This camera would be used for general photography... Please contact me regarding your digital camera needs. I carry the most popular cameras at affordable prices. Best Regards! John Palmeri -- Rock House Products P.O. Box 2001 Monroe, New York 10950 USA Our NEW Web Site and E-Mail address is: http://www.rock2000.com sales@rock2000.com Phone +01-914-692-4077 Fax +01-914-692-4299 Visa & MasterCard are Accepted ************************************************************************** 6)From: Simon Johnson Subject: Re: Radio-Frequency Weapons Hello, If anyone has any information into these weapons / technology I'd be very interested in hearing from them. Send me email at simon@magnet.com.au ... Its a must have. :-) ************************************************************************** 7)From: Simon Johnson Subject: Help With Eudora Password Hello Again, I've got an old copy of Eudora with the password in its configuration file. Unfortunately I've forgotten the password. I know there is a way of decoding them - similiar to the Word password hacker. If anyone can point me in the right direction I'd apprecaite it... because I cant get into my account !!! ************************************************************************** 8)From: anthony LE ROUX Subject: RE: REPLY TO DUECE'S COMMENT ON INTERCEPTION OF DIGITAL TELEPHONE THIS CAN BE CARRIED OUT AS FOLLOWS: ACCESS TARGET TELEPHONE. OPEN AND ESTABLISH AUDIO CIRCUT BY USING AUDIO AMP. (CLUE:SPEAKERPHONE FOR HANDS FREE OPERATION ETC. MAY DIFFER FROM PHONE TO PHONE) TAP AUDIO USING SPARE PAIR OR MAKE UP NEW CABLE WITH A SPARE. OR AS ABOVE BUT WITH A TRANSMITTER (PARALLEL TAPPED OFF THE AUDIO) USING POWER FROM THE TELEPHONE. VEHICLE TRACKING REQUIRE COVERT GPS/GSM TRACKING EQUIPMENT. ANY IDEAS. HAS ANYONE USED THE ONE FROM CCS. LIMITATIONS/ CAPABILITIES? ALSO REQUIRE THE ADDRESS OR CONTACT NUMBER FOR MICRO ELECTRONICS JAPAN AND OTHER ASIAN SURVEILLANCE EQUIPMENT MANUFACTURERS. DO YOU HAVE ANY REQUIREMENTS IN SOUTH AFRICA? CONTACT ME AT spycom@iafrica.com ************************************************************************** 9)From: Paul Longo Subject: Re: Sentry Fire Safe In response to BADCOFFEE's post from 6/23--A client uses a Sentry fire safe for storing backup tapes. With that client's permission (and knowledge of the combination) I worked with the safe using Augie's technique. Here's what I found: 1. Augie's method for determining the third number worked with this unit. Moderate pressure on the latch allowed the dial to turn with a range of only three units. Letting up on the latch, moving the dial slightly, then restoring pressure resulted in another three-unit range of movement. But, when the dial moved with a range of SIX units, the third number was found to be at the upper end of this particular range. 2. Adding 68 to the third number did not give the first (or second) number. (Sorry, Augie.) 3. Adding 34 to the third number did not give the second number, but it DID give the first number (after truncating the "hundreds" digit, as Augie had stated). However, this may be a coincidence. Looks like Augie might be onto something here. Other list members might want to try his technique and report their findings. In any case, I wouldn't want to rely on one of these safes for real security.... ************************************************************************** 10)From: "Venom x" Subject: Re: Cracking WWW passwords Could the person that was asking about cracking WWW passwords please repost their email address and I will help them out (cracking java protected sites) Shadow Dancer ************************************************************************** 11)From: crudgmar@sprynet.com Subject: Re: Going to the dogs I happened to see your "formula" for keepin' the canines away,....and noticed that 2 of your ingredients in the ole' squirtbottle can be, and are, used to make an explosive of sorts. While I will not go into specifics,...(even though the "recipie" can be found on the net)...I was wondering if you were aware of the composition, and also, if there were any inherent dangers of having these 2 ingredients mixed together in liquid form? I am not a chemist, but do have knowledge of chemicals. Just a thought.......there may be no reason for concern. ************************************************************************** 12)From: secret-agent@usa.net Subject: Good story, now let me tell you one... Just kidding.....if I talked, they'd kill me CIA Section Chief Harwell ************************************************************************** 13)From: "Dark Lord Behemoth Ch'kar Brahma Lamma Lamma" Subject: Re: Key Log Anyone have any idea where i can find Key Log '95 v2.0. It was mentioned a few posts back. I have no idea where to get it. Any info will be gratefully appreciated. PS: Anyone willing to take a budding phreaker/hacker into apprenticeship? :-) sTan email:staine@usa.net Ichat: chat.yahoo.com Username: Braniac7 World Wide Pager: http://wwp.mirabilis.com/1414257 +++Moderator's Note+++ You can find the link to keyLog95 and other software of interest at: http://www.thecodex.com/faq.html ************************************************************************** 14)From: PI12900@aol.com Subject: Still Looking For A Few Good Investigatiors!! Qualified Investigators earn good money working commercial broadcast surveillance. A few STATES left: Alaska, Delware, Maine, Michigan, Iowa, Nebraska, South Carolina, Vermont. Top dollars paid to qualified investigators. I also have worked NFL Football Commercial Broadcast Surveillace assigments. These assigments pay by the hour. And we are always looking for a few good Investigators, nationwide, before the footballl season starts. Working commercial broadcast surveillance assigments, since 1994. Richard Harris, P.i. East Bay Detective Agency Oakland, CA 1-800-563-1707/Fax 510-535-0331 http:www.quikpage.com/E/eastbayda ************************************************************************** 15)From: "Jon Harrison" Subject: Re: Radio-frequency weapons > Robson Steve , said in part > High-powered microwave weapons disabling/altering cruise missile and > aircraft electronics and guidance systems I can believe. Disabling > artillery fire in mid flight (with no electronic guidance) I find hard > to believe. With all three what happens after being disabled, the > momentum built up by the traveling speed is not going to just disappear, > they have to continue along a given trajectory... A radio-frequency weapon probably could not deflect the shell, but it probably could damage an electronic fuse rendering the shell a dud. An artillery counter-measure could be to use conventional impact or time fuses, but that would greatly reduce the effectiveness of the bombardment. JPH ************************************************************************** 16)From: China Subject: Re: Anti-dog brew Principal, Since I do not know the conditions or circumstances under which you might be working to concoct this brew, my comments will only be empirical. It is to be duly noted that a 27.0 - 30.0 % (w/w) solution of ammonia is designated by the USP as Stronger Ammonia Water, and given that you would be working with a product which purports to contain 90% ammonia, you might wish to consider the following: an explosive iodide of nitrogen may easily be formed with ammonia water-- as well as some other substances. Regards, China ************************************************************************** 17)From: Manatau Subject: F.Y.I. Been around over 20 yrs and have been had. There is a person operating out Las Vegas claiming to be a writer for a mag. called "Electronics This Week" or D.J. Enterprises. Uses the name of David Abramson. He went so far as to take my Tech. and myself to San Jose to look at equipment. this guy is good. He contacted me and offered to pay me to review equipment, which I do anyway and post on my site and put in my News letter, and ask me to reccomend companies and equipment for review by his Mag. I did so but do not know how many of you he has contacted.. The hook is he offers to review your company and equipment for the Mag, do a company profile if you will provide him with the item for free or at cost. he sends a phoney "tear" sheet but the article never gets published. I have initiated an investigation and am gethering info for the State Attorney. If you have been contacted or have shown him equipment please contact me by e-mail or at one of the below numbers P.S.T. Surveillance/surveillance Detection Services 1-1800-368-5655 (enter code # 23) or 702- 656-7802 thanks K.C. (Manatau) ************************************************************************** 18)From: Deadly Jester Organization: To: Spyking@con2.com Subject: POST Re: Military Encryption Cracked Content-Disposition: inline Message-ID: <33B2A8E6.6A7C4AFB@quiknet.com> Date: Thu, 26 Jun 1997 10:37:42 -0700 From: Deadly Jester Subject: Re: Military Encryption Cracked Mutter, I'd like to know the lodgistics of brute forcing the DES algorithim if you have 'em handy. I would especially like info on some of the lower DES standards (like 64 bit). I know little about DES, as most of the limitted encryptuion reaserch has been done on pgp (completly and totaly, amazingly, infeasable to be cracked from a PC or any computer known for the matter). As I recall it generally is a lot cheaper to emply other means of gaining the encryption key such as breaking into an office and/or computer that has it somwhere on disk/hard drive. Or simply intercepting the data from the source before it's encrypted. Any info you could give me would be greatly apreciated. ************************************************************************** 19)From: BADCOFFEE@aol.com Subject: Question? Last SN, I noticed a post made that incorporated a "spike" sent through phone lines 120v hooked up to house current. I LIKE. Question: Wouldnt this fry the phone wiring seeing that it (wiring)is so small? Is there a damage factor to consider in any area providing none of "your" phones/answering machines/computers/etc are attached to line? Would a battery (??current) do the same thing? PS- Frank...Trace..... I can't pretend I didnt see this------> :-) +++Moderator's Note+++ (from the last S.N) Mutter, you are correct. I agree with you that an escape artist and a lockpick expert ARE two different things. Trace and I have the UTMOST confidence that Augie will prevail in undoing the locks but we're pretty sure he won't get out of the black leather Spandex outfit "Crazy Glued" to the chair... ;-) Augie ************************************************************************** Who are you? What's your specialty and/or interest? Let us know about your company... What would you like to see on the list? Post it. Let us know... Do you have something to contribute? We'd like to hear it... We want to know EVERYTHING and ANYTHING about eavesdropping, surveillance, countersurveillance & privacy related technology, etc... Remember: who, what, where, when, how & why... we want ALL the details... Do you have a question? Post it... A little free time? Help a member... With the INCREDIBLE brain power on this list, someone should have the answer ;-) P.S. Don't be a LURKER... Members take the time to post info for us all... give something back... Don't just take... Your input/knowledge is valued... ************************************************************************** Send Postings to: spyking@con2.com with "Post" in subject field with subject ************************************************************************** Subscribe to: spyking@con2.com In the subject field type: subscribe-surveillance list e-mail address ************************************************************************** Unsubscribe to: spyking@con2.com In the subject field type: unsubscribe-surveillance list e-mail address ************************************************************************** ...The Simple Rules of the Surveillance List... The Surveillance List Owners may Reject any posts that are/contain: 1) Info Unrelated to Eavesdropping, Surveillance or Privacy technology... 2) Flames or Negative posts... 3) E-Signatures that are considered excessive... 4) Advertisements not DIRECTLY related to the list topics... 5) Attached Files... 6) Oversized Posts... (May be edited to save room) **************************************************************************** This publication is copyrighted and is protected by U.S. and International copyright law. The information transmitted on this list may not be reproduced, reposted or forwarded to any non-list member without expressed written permission of the List Owner. Violation of U.S. copyright law is a criminal and civil offense... **************************************************************************** The Surveillance List is Moderated by SpyKing@thecodex.com The List Owner will make EVERY effort to protect subscribers from spam... Copyright 1996, 1997 Codex Publishing Inc., All Rights Reserved... **************************************************************************** ****************************************************************************** Vol.Two Issue #148 The Surveillance List June 30,1997 Over 2300+ Members Worldwide Representing 50 different countries List Chat at: http://www.thecodex.com/chat.html Seminar Info at: http://www.thecodex.com/methods.html Surveillance List Pseudo FAQ at: http://www.thecodex.com/faq.html ****************************************************************************** IN THIS ISSUE... ****************************************************************************** 01) Need help from audio techs 02) Crack Win95 ScreenSavers 03) It's not a keylogger, but might be better 04) 110 Volts on phone lines 05) I am not a lurker any more 06) Re: Military Encryption Cracked 07) and whats a B+ ? 08) Help with Eudora password 09) chat lines 10) Carpenters at the surveillance seminar 11) CC# Formula? 12) Ammonium triiodide... 13) SFIA Seminar & Trade Show 14) Interns Register 15) Misinformation to a receiving "caller ID" unit? 16) Re: Augies response to the PI's needed 17) TAGGING+INFRA-RED 18) Scanlock & Projectile Tracking Devices(is this possible ?) 19) Re: Digital Camera 20) Key boxes? 21) Re: Radio-Frequency Weapons 22) Re: Spam Hater S/W 23) Re: Digital cams 24) Australian Info ****************************************************************************** DON'T BE A LURKER.... GET INVOLVED... YOU ARE A MEMBER... MAKE THE MOST OF IT ****************************************************************************** 1)From: Trace Carpenter Subject: Need help from audio techs Does anyone have any first hand knowledge of good PC based forensic audio software. I'm upgrading our equipment and need some for a case. It needs to be able to manipulate files and bring out whispers and voices. +++Moderator's Note+++ D.A.R.T. Digital Audio Restorative Technology is the program... I use it with great success. They have a web site on the net... ************************************************************************** 2)From: John Boyd Subject: Crack Win95 ScreenSavers I provide tech support to about 50 users where I work. Generally, the scenario plays out like this. They call, and ask if I can come by and do some task. Invariably, when I get to their office, they're out, in a meeting, etc, and the machine has kicked into one of the supplied screensavers. Due to a recent wave of paranoia around there, everyone has password protected their screensavers. I know that re-booting the machine will bring everything back except network logons, of course, but most generally what they've asked me to do only requires access to the physical machine, and not the net. Also, if they left with a document or other application file open, rebooting it can be hazardous to that file. How can I sit down in front of a Win95 machine that has kicked into screensaver mode, and get back to the desktop?? Thanx for any assistance! ************************************************************************** 3)From: Trace Carpenter Subject: It's not a keylogger, but might be better OK folks. We've had a lot of talk about keyloggers and after needing one on a recent case I think we decided that Keylog2 is probably the way to go in win95. That's probably what I'd use if I was leeching a password, which we did, but wanted to do more. So in addition to the keylogger we ran a desktop surveillance unit. You can download it at http://www.omniquad.com and it's great for spying on someone in chat rooms or reading their e-mail. It takes a snapshot of the screen every so often. You can set the interval. When you play it back, you see the whole screen just as if you were working on the computer yourself. Give it a try. Hey Stan, this may work for you too. +++Moderator's Note+++ I experimented with DeskTop Surveillance software. In 3 days of normal use it ate up 200 megs of space on my hard drive... ************************************************************************** 4)From: Manatau Subject: 110 Volts on phone lines Rumor has it that the phone company will run 2000 volts thru your phone lines if you think you are being bugged. Do not know if it is true or not but any Tech. worth his pay will put a surge protector on any listening device he builds. I recently listened to a tape made from a phone tap and heard the person say " The phone company came out and put enough current on the phone line to destroy anything on it." The tag seems to work better now than ever. No matter how good your equipment is if you do not look you will not find them. :-( Remember detection equipment is only a starting point. Y'all be good now -- ya hear? Manatau ************************************************************************** 5)From: Trace Carpenter Subject: I am not a lurker any more >See i am not a lurker any more. >i will ask around and see about the Formaldahyde in the mixture. Welcome out of the lurker zone. Sounds like you've got some valuable knowledge. Look forward to reading your posts. -- Trace Carpenter Investigations ****** 2926 Maple Ave., Ste. 200 Friends help you move; Dallas, Texas 75201 Real friends help you move bodies. 214.828.4520 ****** ************************************************************************** 6)From: Mutter Subject: Re: Military Encryption Cracked > 18)From: Deadly Jester > Subject: POST Re: Military Encryption Cracked > > Message-ID: <33B2A8E6.6A7C4AFB@quiknet.com> > Date: Thu, 26 Jun 1997 10:37:42 -0700 > From: Deadly Jester > Subject: Re: Military Encryption Cracked > > Mutter, I'd like to know the lodgistics of brute forcing the DES > algorithim if you have 'em handy. I would especially like info on some Well, as I understand it, there was a challenge presented to break a DES-ecrypted message (winner receives $10,000 I believe) so a group of programmers decided to show the world how a keysearch was not out of the question. They made a system where anyone who wanted to participate could go to their web page, download a small applet, and try a limited key range. Late one night, someone hit the correct key and decrypted the message ("Strong Encryption makes the world more secure" or something to that effect..) If you want to hear it from the horse's mouth (wasn't this url posted earlier?) http://www.frii.com/~rcv/deschall.htm > of the lower DES standards (like 64 bit). I know little about DES, as > most of the limitted encryptuion reaserch has been done on pgp > (completly and totaly, amazingly, infeasable to be cracked from a PC or > any computer known for the matter). As I recall it generally is a lot > cheaper to emply other means of gaining the encryption key such as > breaking into an office and/or computer that has it somwhere on > disk/hard drive. Or simply intercepting the data from the source before > it's encrypted. Any info you could give me would be greatly apreciated. Well, if you are interested in how DES works, I suggest you borrow the book (which is generally recognized as the best textbook on cryptography) 'Applied Cryptography' by Bruce Schneier. - M u t t e r Ed. root zine (http://www.openix.com/~mutter) mutter@openix.com ************************************************************************** 7)From: Trace Carpenter Subject: and whats a B+ ? Sorry. B+ is basically just the input voltage. ************************************************************************** 8)From: Trace Carpenter Subject: Help with Eudora password >I know there is a way >of decoding them - The only experience I have had on Eudora was an old version of Eudora Lite which the password was in an *.ini file and was not encrypted. I don't remember the name of the file. However, if that's not the case, I have a small program called cab.com which will compare two files and stop at the first differrence in the two. What that will allow to do, is load a new version of Eudora. Do a print screen from the directory. Place a password in it and then go do another directory print. Look for files that were modified via date and time and then byte size. If you find which file houses the password, run cab on a virgin copy of the file which has no password and the modified version. At the first point of difference it'll stop and show you the difference in the files. Very often it's only a matter or removing the password or placing blank spaces over it. When you've found where it's housed go back to your locked copy and try it. *BE SURE TO KEEP A CONTROL COPY OF THE ORIGIONAL FILE LEST THIS NOT WORK*. It's not as difficult as it may sound. If you want cab just e-mail me and I'll e-mail it back. It's a small program. I use it primarily to compare IC chips. -- Trace Carpenter ************************************************************************** 9)From: tooshort2@webtv.net (cory traxler) Subject: chat lines There are some chatlines that give you a password that allow's you access to chat. A while ago someone cracked mine and used my handle to do trouble with,now they changed the password and is bribing me with the password(because i don't know it)can someone tell me how to crack a password like that? any help will be appreciated. ************************************************************************** 10)From: Trace Carpenter Subject: Carpenters at the surveillance seminar Hey gang, Our own host, SpyKing himself has asked me to speak at the Surveillance Seminar in August. After a brief chat on Mirabilis we decided that a good topic might be, (true to my MacGyver nickname), how to modify generic low priced merchandise into professional surveillance equipment. It never ceases to amaze many of us how much markup is placed on a basic instrument that has been modified for "surveillance use". I'd appreciate it if list members would give me some feedback on what type things they'd like to see. I'll be bringing some prototypes, showing how to modify them and passing out schematics, so feel free to e-mail me privately with requests. If you're even considering making the trip I encourage you to do so. It's apparently going to be a great seminar with some fantastic speakers. I understand that Retsheriff is also going to be there teaching a session. I think on TSCM. Many of us have benefited from his experience and it should be very interesting. Let me hear from you with requests. -- Trace Carpenter Investigations ****** 2926 Maple Ave., Ste. 200 Friends help you move; Dallas, Texas 75201 Real friends help you move bodies. 214.828.4520 ****** ************************************************************************** 11)From: Brad Ediger Subject: CC# Formula? Now, for my once-a-week ANTI-LURKERDOM: Does anybody have formulas for CHECKING, not GENERATING credit card numbers? FOR EDUCATIONAL PURPOSES ONLY ************************************************************************** 12)From: Duece6x6@aol.com Subject: Ammonium triiodide... Yes the Iodine / ammonia mixture is called amonium triiodide and is veery unst able and explosive. The iodine can be deleted from the mixture if it becomes a concern. The iodine is suspended in alcohol and the PI that gave me this formula used it for years. The amount of Iodine vers ammonia can be researched by reading the POOR MANS JAMES BOND by KURT SAXON. The formula he uses is pure Iodine crystals. The formula I mixed had no residue in the bottom, however the dog repellent formula I had wasn't around that long. I wouldn't recommend leaving this stuff on the shelf. The ammonia at this strength is stored in glass or metal only and is corrosive in metal. THE DUECE ************************************************************************** 13)From: Gary Cohen Subject: SFIA Seminar & Trade Show The SFIA (South Florida Investigators Association) Seminar & Trade Show has been scheduled for April 18, 1998 All individuals and/or companies interested in speaking, sponsoring, or being a vendor (or ATTENDING) please contact heatgain@mindspring.com or dci@deception.com for details. The new monthly journal is out. Follow the link from http://www.webcircle.com/users/sfia/ to see an article about NCISS effort to fight Sen. Diane Feinstein proposal of blocking public records. Also, thanks to our advertisers; R.H. ROFFMAN & ASSOCIATES | JHL INVESTIGATIONS, INC. | DECEPTION CONTROL, INC. | SECURITY MANAGEMENT SERVICES | BOMBET, CASHIO & ASSOCIATES Article submissions are ALWAYS appreciated. Thank you all for your support. Gary Cohen Investigator Ft. Lauderdale/Pompano Beach Florida heatgain@mindspring.com Member-FALI & SFIA Chairman, Internet Committee, SFIA SFIA - http://www.webcircle.com/users/sfia/ ************************************************************************** 14)From: William Roche Subject: Interns Register Just another Reminder to Register for free with Interns Global Investigator Database Register. Email your Business info to wroche@sn.no Regards to list Members and the "Moderator". ************************************************************************** 15)From: Wire Editor Subject: Misinformation to a receiving "caller ID" unit? Do you know of any "boxes" out there that can be placed inline with a phone, and used to send misinformation to a receiving "caller ID" unit? Thanks Budd Bewee, Wire Editor Arkansas Chronicle chronicle@usa.net ************************************************************************** 16)From: HtPursuit@aol.com Subject: Re: Augies response to the PI's needed I have not been to the east coast so I may be talking out of school, but the organized crime threats here in the Chicago area are slowly becoming just a good story about the good old days. Organized crime now a days is slowly disappearing to legitimate businesses, for the most part its drying up and threats go unanwsered. Look at the hard core gansters that have taken to being a prosecution witness and refusing witness protection. Its happening alot here, more and more government witnesses testify and put there ganster buddies in jail and dont bother with witness protection. In fact in one case, the witness put 9 others in jail and still lives in the same loction as before. In years of working cases, directly and indirectly, in most cases there just like the punks in high school, one on one they avoid conflict like the plaque. Of course the wave of indictments keep wiping out street crew after street crew here. I bet more wannabe gansters then real are now running there mouth. And more real gansters have a S/A's card in there wallet then there attorneys. So if there are any jobs to be had here regarding possible OC connected joints pirating special events, count me in, or just call for some intel, always ready to have fun, especially with da boys. Augie, if I ever do make back east, lets go hit one of those social clubs for an expesso, I'll buy. Bill ************************************************************************** 17)From: Hickmaj@aol.com Subject: TAGGING+INFRA-RED Thanks for a great forum. Here is a request that your readers may have some information on:- What equipment is available that can provide a tagging (RF etc) and Direction finding caperbility, for use in packets that would comply with Aviation Regulations as well as other regulatory bodies. What options are available to track in event of theft these items. The modern CCTV camera is well known for is sensitivity at near infra-red and therfore its ability to "see" IR emitters (such as TV remote handsets)but is there :- A substance such as a paint that would radiate (safely) at infra-red frequencys. An Electroluminessence system similar to the cycle harness emitting at infra-red. Thanks in advance. ************************************************************************** 18)From: "Lorenzo Castillo Sanchez" Subject: Scanlock & Projectile Tracking Devices(is this possible ?) A few days ago, I witnessed a kidnapping. Fortunately, it wasn't anyone I knew. Two guys were forcing this lady in a car, her mouth was taped(so that's why nobody heard her screaming for help)and I wasn't that close to stop them anyway. Well, there was no use screaming because those guys obviously didn't care about the speed limit. I did get their license plate number and called the cops. They told me that it was a stolen vehicle and it was obvious that the owner didn't have a tracking device for his stolen car. As a concerned citizen, all I could do was to report but I wish that I had done more. If I had a Scanlock at that time, would I be able to lock into their cellphone frequencies ? I remember the guys were calling someone with their cellphones when they saw me chasing after their car. People don't really use cellphone scramblers where I live so if I did have a device that locked into their cellphone frequency I could at least hear what they're up to. If the Scanlock can do the job in this type of situation, please let me know. Well, the downside of Scanlock would be price - in the 8000+ range. So after that incident I kept on thinking and this popped in my mind. What if I had some sort of a gun that would fire transmitters contained in an adhesive projectile that would stick to the back trunk of a car ?? Well, if it is possible to get this kind of custom-made device, please let the List know. I feel that we the people in the List, should be concerned with what goes around our neighborhood(i.e.eavesdropping on dope dealers,gangs, etc. around your neighborhood schools) and make use of our knowledge and techniques to keep our neighborhood a safe place for us, our families, the nice old lady living across the street,and the kids who would constantly be bullied and victimized. BTW - How about B&E'ing in a drug warehouse and dumping their stuff down the river ? - maybe Augie might wanna try this challenge. :-) ************************************************************************** 19)From: lazlo@shadowlink.net Subject: Re: Digital Camera I just bought a Casio QV-10A for $260. They normally cost $400, but prices got slashed because the QV-300 just came out. This model is selling for $650, and there is hardly a difference between the two. I wasn't in terrible need of a digital camera, but $260 seemed like a good deal compared to $650. This kind of camera is probably not quite what you are looking for, (i.e. they are not the best for general photography) but they have a lot of unique features that make them worth checking out. http://www.casio-usa.com/html/whatsnew/cwhatsnew25.html -Lazlo ************************************************************************** 20)From: CrACKeD Subject: Key boxes? Augie, this one is probably best suited for you to answer. I've got one of those boxes which hold house keys attached to a faucet outside my home. It's made by Multacc Corporation, has a rotary combo on the top which ranges from 1-20, and a row of 5 vertical combos below that which range from 1-9. Below that is a door which swings open horizontally to give one access to the key inside. I'm not sure which combo releases the key and which releases the box from the faucet. Is there any way to get into one of these things without using a blow torch or axe? And as for Sentry safes. I've got a model 1100 which can be opened in all of a half second with any butterknife. Security is nonexistant, but the fact that the things are so fire resistant is great. Excellent way to store volatile materials, as they'll burn up all their fuel before they make it thru the material those safes are made out of (assuming these materials react/ignite while in storage). CrACKeD ************************************************************************** 21)From: pjan2@student.monash.edu.au Subject: Re: Radio-Frequency Weapons > If anyone has any information into these weapons / technology I'd be > very interested in hearing from them. Send me email at > simon@magnet.com.au ... Its a must have. :-) Simon, I'm with you all the way. It's not like I could ever build a high-tech EMP gun. But the thought that all the governments out there have been playing with this for years, while we've been left in the dark, is not one that appeals to me. ************************************************************************** 22)From: Kerry Brown Subject: Re: Spam Hater S/W I have had good experience with Spam Hater software during the past 6 months and 30 Spams. Spam Hater performs header analysis, references a growing list of abuse sites, and produces a response message to all identified sites. This list is constantly developing and can sometimes track spammers to new sites. Approximately 40% of responses I've sent have generated an appropriate reply from their postmaster (they warned or closed the spammers account) and another 30% of spammers personally replied to me. The following information was copied from the abuse.net registration form that was identified in the Spam Haters program installation text. "HOW DOES ABUSE.NET WORK ?" "Once you've registered, when you send a message to @abuse.net, the system here automatically re-mails your message to the best reporting address(es) we know for that domain. For many domains it's postmaster@, for some it's abuse@, for some it's something else. Some particularly unpleasant domains ignore all their mail; when we're aware of that we use the address for their next-level-up provider." "When we don't know anything about the domain, we mail to postmaster at that domain and all suffixes of that domain, so if you sent mail to a.b.com@abuse.net, we'd re-mail that to postmaster@a.b.com and postmaster@b.com." "Not being omniscient, we don't know about every domain on the net. Our current list is on the web site at http://www.abuse.net. If you know of a reporting address not on our list, please tell us about it at update@abuse.net." ************************************************************************** 23)From: Phon-E Subject: Re: Digital cams If you want tiny/cheap, get the Sony - good image quality, works well is low light, serial or IRDA file exchange, only problem is batteries only last 30mins or so - buy extras. The other one to consider is the ricoh, it also records an audio clip along with your pix, and its pretty good quality - it records on pc cards If you want zoom but still want pretty cheap go for the Sony ID1, 12x, scsi interface - i think around $1300 - pretty new The Kodak has a low end model around $3000 or so with nice lens, flash, etc - but its kinda awkward. If you have $10k or so the high end Kodak is ok, the Nikon back is even sweeter. ************************************************************************** 24)From: lvassall Subject: Australian Info i have some information for the .au people in australia. I saw on yur forum that someone had a number that would tell the person the number from where they were calling from. i have a different number and tha is 19123 for au residents only. What is the ANAC? A: ANAC's (Automatic Number Announcement Circuit) that are known in OZ are: 19123 1800 801 920 Q18: What is the callback #? A: 199 But it will not work in phones that are resistered as a payfone at Telstra. Q19: What are some payfone #'s? A: (Taken from various neurocactus issues) West Australia 09-490-3530 Telecom Payphone Gosnells Shopping Centre Carpark, Ashburton Road,Gosnells 09-322-4510 Telecom Payphone 1 Murry St Perth (Opposite Fast Eddies/Zone3) 321-061P2 09-322-4512 Telecom Card Phone 2 Murry St Perth (Opposite Fast Eddies/Zone3) 321-060S2 09-339-8054 Private Blue Phone Action Food Barns East Fremantle Foyer 09-300-0419 Telecom Payphone 1 (Closest to Ticket Counter) Joondalup Train Station 09-300-0417 Telecom Payphone 2 Joondalup Train Station 09-276-7645 Cant Remember Morley Area 09-384-7799 Telecom Payphone Outside Red Rooster at Robinson Pavillion , Perth Royal Show 09-221-3427 Telecom Payphone Outside Sinatras Pub, Perth Train Station 09-221-2748 Telecom Payphone Next to vending Machine at Perth Train Station Main Platform 09-325-8686 Telecom Payphone Hay St Mall (Cinema City End) 09-221-5886 Telecom Payphone Hay St Mall (Opposite Hoyts Cinema) 09-316-2160 Telecom Payphone Garden City Shopping Centre (Food Hall) 09-339-5277 Telecom Payphone Outside Red Rooster in East Fremantle 09-221-2642 perth train station center platform 09-221-2645 perth train station outside 09-221-3426 perth train station outside old sinatras pub 09-221-3189 st georges terrace, inside concert hall 09-221-3802 st georges terrace, facing law courts 09-221-5702 forest chase, upper walkway 09-221-5703 forest chase, upper walkway South Australia 08-642-3447 Private Blue Phone BP Port Augusta (The Right One) Melbourne Some boring corner - 03-562-2683 Balwayn Milkbar opposite library. Milk||---||St| box closest to the Bar||1|2||re| milkbar (ajoining ---'`-----et| one facing the street) - 03-836-6097 Monash Univeristy Carpark - 03-543-1748 Flinders St Platform 8 in the street part not the actual platform? - 03-614-4003 CBD Somewhere (Flinders St?) - 03-614-0364 Flinders St Platform 6 or 7 - 03-614-4603 Elizabeth St Outside Met Shop - 03-602-4839 Card/Coin (next to Ringer silent card only) Near Avalon (Princess HWY) - 052-83-1206 BlueFone Exhibition (outside exchange/242) - 03-670-9689 Elizabeth Street Payfone building - 03-650-1518 - 03-650-1462 Green/Speaker fone Old Dandenong Rd Oakleigh South - 03-579-2837 Kingsway Glen Waverly - 03-561-6255 Poath Rd Hughesdale - 03-568-3384 Dandenong Rd Oakleigh - 03-586-0033 S'Vale Rd Springvale - 03-562-3539 Wanda St Mulgrave - 03-561-6555 Chadstone Rd Chadstone - 03-568-1766 Atherton Rd Oakleigh - 03-568-3037 Neerim Rd Carnegie - 03-568-2291 Warrigal Rd Chadstone - 03-568-3348 (Homesglen) S'vale Rd Springvale - 03-562-3539 South Rd Moorabin - 03-555-1273 Main St Mordialloc - 03-580-3109 Post Office Pl Glenroy - 03-306-3320 CreditCard Fone 1 phone of 5 Top of Batman Ave - 03-654-2254 Card/Coin (rings) (Not flinders) Shopping Center Vermont South - 03-803-2330 Card/Coin Milkbar Cnr Overland/Weeden Vermont South - 03-886-1627 Card/Coin Installed 7/1/94 Swanston St Top of Batman Ave (Flinder St Stn) - 03-614-5946 CreditCard fone Service Calls only (13/1/94) College of Arts School of Music St Kilda Rd Melbourne - 03-686-9113 Card/Coin Burke St Mall Melbourne - 03-650-8730 Card Canberra -------- |Impact| | |Recrds| | Bus -------- | Inter ------- ------- | change | 7|5?| | 6|4 | | ------- ------- ------------ Civic bus interchange - 06-257-xxx4 Next door to xxx6 and Impact Records - 06-257-xxx6 CreditCard Fone Next door to xxx4 - 06-257-xxx5 Next door to xxx7? - 06-257-xxx7 Next door to xxx5? ? - 06-257-xxx8 Dickson Shopping - 06-257-xxx9 Center ? - 06-257-6468 Civic G.P.O. - 06-257-3702 CreditCard Fone - 06-257-3703 Woden one is next to coke machine - 06-281-5854 06-281-4632 Woodend, VIC Outside Train Station - 054-272-153 Outside Milkbar - 054-271-902 Outside PostOffice #1 (Normal) - 054-271-904 Outside PostOffice #2 (Handicapped) - 054-271-903 Adelaide Adelaide Railway Station Main Concourse 1 231 8315 212 512P2 Adelaide Railway Station Main Concourse 2 231 8314 212 511P2 Adelaide Railway Station Main Concourse 3 231 8328 212 513P2 Adelaide Railway Station Main Concourse 4 231 8329 212 514P2 Adelaide Railway Station 1 211 7321 212 385P2 Adelaide Railway Station 2 212 3032 212 313P2 Adelaide Railway Station 3 211 7309 212 386P2 Adelaide Railway Station 4 212 6698 212 353P2 Adelaide Railway Station 5 212 3187 212 319P2 Rundle Mall / James Pl 211 8009 212 408P2 Rundle Mall / Gawler Pl 212 1298 212 301B2 Rundle Mall / Gawler Pl 212 1054 212 300P2 Rundle Mall / Gawler Pl 410 5329 212 404P2 Rundle Mall / Gawler Pl 231 1371 212 346S2 Rundle Mall / Harris Scarfe 232 2809 223 361S2 Rundle Mall / Harris Scarfe 232 1542 223 362P2 Rundle Mall / Pultney St 232 3179 232 360P2 Myer Centre Terrace level west 410 1785 212 446P1 Myer Centre Terrace level west 410 1874 212 447P1 Myer Centre level 1 east 410 1751 212 457P1 Myer Centre level 3 east 410 1829 212 452P1 Myer Centre level 4 east 410 1628 212 455P1 Myer Centre level 5 east 410 1832 212 456P1 Myer Ground Floor - Enquiry Desk 410 0773 212 458P1 Myer level 1 410 0925 212 461C1 Myer level 2 410 0076 212 462C1 Myer level 3 410 0093 212 463C1 Myer level 4 410 0305 212 464C1 Myer level 5 410 1294 212 467C1 Myer level 6 410 1734 212 459C1 Commonwealth Cntr.55 Currie East Wing 1 231 1942 231 131C4 Commonwealth Cntr.55 Currie East Wing 2 231 1843 231 128C4 Commonwealth Cntr.55 Currie West Wing 3 231 1872 231 129C4 Commonwealth Cntr.55 Currie West Wing 4 231 1879 231 138C4 Casino Foyer Booth Phones 1 211 8032 211 995C4 Casino Foyer Booth Phones 2 211 8708 211 992C4 Casino Foyer Booth Phones 3 211 8817 211 994C4 Casino Foyer Booth Phones 4 211 8943 211 993C4 King William St / Festival Centre 212 3898 212 321P2 King William St / Pirie St 212 3290 211 309P2 GPO - north foyer 211 8721 212 390P2 GPO - north foyer 212 1321 212 372B2 GPO - phone room 212 3941 212 377B2 GPO - phone room 211 8632 212 396T2 Hyatt Regency lobby 212 5543 212 137C4 Hyatt Regency lobby 212 5659 212 128C4 Terrace Intercontinental 2 231 3917 231 168C4 Terrace Intercontinental 3 231 3961 231 169C4 John Martins ground floor 223 3146 223 392P1 Currie St / Elizabeth St 212 3328 212 378S2 Flinders St / Victoria Sq 212 3182 212 308P2 Victoria Sq arcade 212 3587 212 337P2 Gilbert St / Russell St 212 1032 212 340P2 Angas St Police station 212 3750 212 310P2 Playhouse Theatre 212 1239 212 944C4 Telecom House - reception 231 6658 212 478C2 Greater Union 5 cinemas 231 1185 231 040C4 Franklin St / Bus Station 231 1199 231 402M7 Franklin St / Bus Station 231 1203 231 403M7 Franklin St Bus Station (inside) 231 1198 231 902L7 Target Centerpoint CITY 232 6283 223 380P1 Millers Arcade 212 6721 212 334B2 Rundle arcade west Gawler Place 410 1897 212 471P1 Rundle Arcade east Stephens Place 410 1905 212 470P1 Gilbert St / Winifred St 410 1596 212 329P2 Gilbert St north side / russell st 212 1032 212 340P2 Gillies St / west Hallet St 223 5343 223 326P2 Adelaide Uni / Upper refectory 232 4280 P2 North Adelaide O'Connell St Burger Bar 267 4410 267 314P2 O'Connell St / Nth of Gover St 267 3054 267 320P2 Childers St / Nth Adelaide Wst of Oconnell St 267 4910 267 307P2 Childers St / Jeffcott St 267 4301 267 302P2 Jefcott St Nth Montefiore Hill N.Adelaide 267 5309 267 316P2 North Adelaide Post Office 2 267 5365 P2 North Adelaide Post Office 3 267 3365 267 301P1 North Adelaide Post Office 267 4878 267 317P2 North Adelaide 7 Day Supermarket 267 1064 267 905C4 North Adelaide Village 1 267 4103 267 323P1 North Adelaide Village 2 267 4405 267 322P1 Hotel Adelaide 267 2987 267 917C4 Ward st. North Adelaide West of O'connell 267 3096 267 306P2 O'connell St.North Ad. East side sth of Tynte 239 1760 267 338P2 North Adelaide Aquatic Centre (Foyer) 269 6965 269 910C4 North Adelaide Aquatic Centre (Inside) 269 7244 269 911C4 La Piazza North Adelaide 267 5836 239 232L6 Archer st North Adelaide Wst Marg.St. 267 4958 267 305P2 Jerningham st North Adelaide 267 4859 267 313P2 North Adelaide Road Pantry 239 1796 239 238L6 Outside Adelaide Zoo (Frome Road) 267 5965 267 311P2 Suburban numbers Nile St Glenelg 376 0673 294 341S2 The Grand Hotel Glenelg 295 6957 295 976C4 Winchester St St.Peters 363 0550 362 331P2 Stephen Tce St.Peters 363 0795 362 339P2 Bedford Ave Devon Pk 340 2984 340 340P2 Taminga Ave Regency Park 347 2981 268 269P2 Kateena Ave Regency Park 347 2762 268 304P2 Torrens Rd / Drayton St Bowden 340 2973 340 327P2 Marion Westfield - east mall 377 0357 296 404P1 Keswick interstate railway terminal 211 8278 212 432P2 Keswick interstate railway terminal 211 8283 212 433P2 Fenden Rd Salisbury 258 2632 258 319P2 Burbridge Rd Brooklyn Park 234 3456 234 302P2 Park St. Woodville 268 5965 268 318M7 Henley Beach Rd. /Thebarton Theatre 352 2309 P2 Grandview Drive Panorama 276 8165 277 392M7 Regency TAFE 346 2593 340 366P2 Regency TAFE 346 2405 340 365P2 Regency TAFE outside 346 2601 340 367P2 Goodwood road / Lilly st Goodwood 272 3098 272 303M2 Hawker st / Gibson st Brompton 340 2975 340 329P2 Gibson st / Seventh st Brompton 340 2991 340 345P2 Hawker st / Drayton st Brompton 340 2990 340 344P2 Second St / Hocking St Brompton 340 2976 340 331P2 Cheif St / Third Ave Brompton 340 2978 340 333P2 Blanford / Rosetta West Croydon 340 2970 340 324P2 Henry St / Elizabeth St Croydon 340 2951 340 301P2 Henry St / Elizabeth St Croydon 340 2952 340 302S2 Westlakes Mall 356 0109 356 373M7 Westlakes Mall 242 1154 49 375P2 Railway Tce / High St Dry Creek 260 2501 P2 Sussex Tce / Egmont St Westbourne Park 272 2898 272 358M7 Eaton St and Leicester Ave Kilburn 269 4889 269 368M7 Leader Ave Kilburn 269 4032 269 311M7 Regro and Millers St 269 2947 269 330P2 Arndale shopping centre 268 9367 P2 Arndale Adj. John Martins 347 4289 268 448P1 Outside North Park south of Regency Rd Prospect 1 269 4601 269 365P2 Outside North Park south of Regency Rd Prospect 2 269 3454 269 370P2 Prospect Rd. North of Brentnall st / Movieland 269 3965 269 358P2 Prospect Food Plus 342 0002 269 309C1 Sizzler Prospect 344 9309 344 926C4 Prospect Road Pantry 344 1183 344 233L6 this was taken from an australian phreaking page. ************************************************************************** Who are you? What's your specialty and/or interest? Let us know about your company... What would you like to see on the list? Post it. Let us know... Do you have something to contribute? We'd like to hear it... We want to know EVERYTHING and ANYTHING about eavesdropping, surveillance, countersurveillance & privacy related technology, etc... Remember: who, what, where, when, how & why... we want ALL the details... Do you have a question? Post it... A little free time? Help a member... With the INCREDIBLE brain power on this list, someone should have the answer ;-) P.S. Don't be a LURKER... Members take the time to post info for us all... give something back... Don't just take... Your input/knowledge is valued... ************************************************************************** Send Postings to: spyking@con2.com with "Post" in subject field with subject ************************************************************************** Subscribe to: spyking@con2.com In the subject field type: subscribe-surveillance list e-mail address ************************************************************************** Unsubscribe to: spyking@con2.com In the subject field type: unsubscribe-surveillance list e-mail address ************************************************************************** ...The Simple Rules of the Surveillance List... The Surveillance List Owners may Reject any posts that are/contain: 1) Info Unrelated to Eavesdropping, Surveillance or Privacy technology... 2) Flames or Negative posts... 3) E-Signatures that are considered excessive... 4) Advertisements not DIRECTLY related to the list topics... 5) Attached Files... 6) Oversized Posts... (May be edited to save room) **************************************************************************** This publication is copyrighted and is protected by U.S. and International copyright law. The information transmitted on this list may not be reproduced, reposted or forwarded to any non-list member without expressed written permission of the List Owner. Violation of U.S. copyright law is a criminal and civil offense... **************************************************************************** The Surveillance List is Moderated by SpyKing@thecodex.com The List Owner will make EVERY effort to protect subscribers from spam... Copyright 1996, 1997 Codex Publishing Inc., All Rights Reserved... ****************************************************************************