Vol 2 Issue # 54 ****************************************************************************** Vol.Two Issue #54 The Surveillance List Mar.5,1997 Over 1400 Members Worldwide ****************************************************************************** IN THIS ISSUE... ****************************************************************************** 01) Need a potent Spectrum Analyser quick 02) Re: Wiretapped 03) Re: V-Link Communicator 04) Newsletter 05) Second Annual Hackers, Crackers & Sniffers Conference 06) Intro 07) Pocket 36 Min Digitel Recorder 08) missing issues? 09) The List 10) Re: night vision products 11) SFIA updated Journal 12) Where to get a BIN Directory 13) Radio Shack Sale ****************************************************************************** DON'T BE A LURKER.... GET INVOLVED... YOU ARE A MEMBER... MAKE THE MOST OF IT ****************************************************************************** 1)From: ljsaisa@algonet.se Subject: Need a potent Spectrum Analyser quick Panic, need a potent Spectrum Analyser quick! Is there anyone who has a tip on a good wide range spectrum-analyser? We are now using the SCANLOCK 2000 ( up to 2.0GHz ) but it's inadequate for the task we are doing right now. We need one with the absolute minimum range of 10MHz - 2.5GHz, prefareble up to 3.0GHz. So please if there are any who have a tips where it can be bought, mail me straight away! ( Don't forget to CC it to the "Surveillance List Forum" there might be someone wanting the info to!) Thnx! I.S.A. L. J. Strand INTERNATIONAL SECURITY AGENCY http://www.algonet.se/~ljsaisa ljsaisa@algonet.se Tel: Int+46 (0)8-645 22 82 (09.00am-05.00pm C.E.T.) Fax/Data: Int+46 (0)8-645 22 82 (24h) PoBox 167, S-162 12 Stockholm, Sweden ************************************************************************** 2)From: rockhous@ny.frontiercomm.net Subject: Re: Wiretapped >This phone line is completely visible inside and clear to the telephone pole... > >The Ph. co says there is no problem along this line... > >Events? This bus.' enemies are doing things which can only happen if they are >privy to info which has been discussed over the phone. > >Wilgetum In reference to you question about your phone being tapped. Our company, Rock House Products, sells and distributes a large selection of overt and covert surveillance equipment of all types. We carry a product that you might be interested in. It is the TE-4200 All Mode Telephone Analyzer. The TE-4200 tests your phone line for slight voltage and current variations caused by possible parasitic R.F. radio transmitting devices, telephone repair line powered handsets, off hook extensions, or tampering of your phone line in your absence. This unit will digitally display your phone line voltage readings numerically both on and off hook, giving you a constant means of checking line integrity. In addition to the digital display, the Line Alert feature will monitor the phone line voltage when the phone is in use. If it detects changes, it will alarm you by lighting a red L.E.D. and alert tone. The TE-4200 also contains a complete Near-field R.F. transmitter detection system capable of monitoring your phone line for possible illegal radio transmitting devices up to 1,000 feet from the source. Specifications and pricing can be viewed at: http://ny.frontiercomm.net/~rockhous/te4200.html or you can visit our web site at: http://ny.frontiercomm.net/~rockhous/ If you have any questions feel free to contact me. Best Regards! John Palmeri Rock House Products P.O. Box 2001 Monroe, New York 10950 USA Phone 1-914-692-4077 Fax 1-914-692-4299 USA rockhous@ny.frontiercomm.net http://ny.frontiercomm.net/~rockhous/ Visa & MasterCard are Accepted ************************************************************************** 3)From: "Robert H. Eisner" Subject: Re: V-Link Communicator Jorge Rodriguez wrote: > > Looking for frequency and other operating characteristics for the > V-LINK Personal Voice Link System. > Seen in Wal-Mart stores in W Lafayette IN. > It looks like a small cell phone, BUT it only has a keyepad with 0-6 and > works up to a 1,000 foot range. It also says it allows private calls or > party line calls. Units can be set up to ring (beep) or vibrate when the 4 > digit ID you program into the unit is called by another unit. > They sell for about $70. and and are free to use after purchase. ie. No > monthly charges. > > jr The following is a list of frequencies for the new V-Link phones from "YES! Entertainment Corp". The Phones (Walkie-Talkies) run around $70 and can be purchased at Toys R US, WalMart and EBX stores. An optional Nicad Battery with Charger can also be purchased for an additional $30. 916.8750 Calling Channel 1 (Main/Home Frequency) 915.8625 Calling Channel 2 915.0000 Calling Channel 3 914.0875 Calling Channel 4 913.3375 Calling Channel 5 912.0000 Calling Channel 6 910.9125 Calling Channel 7 910.2375 Calling Channel 8 909.3375 Calling Channel 9 908.5000 Calling Channel 10 907.6625 Calling Channel 11 907.0000 Calling Channel 12 906.3375 Calling Channel 13 905.6625 Calling Channel 14 904.5000 Calling Channel 15 904.0000 Calling Channel 16 903.4875 Calling Channel 17 903.0000 Calling Channel 18 902.5000 Calling Channel 19 I obtained a set from Toys R US and found that they're using 916.875 Mhz for the main calling freuquency. The units seem to switch to another freuquency only if you two party lines were active at the same time. If you place the phones in Private mode, they switch frequencies once a link has been established between two phones. The phones do not appear to be using DCS or CTCSS. I've also noticed that if a link goes inactive (you haven't keyed the link switch for over 10 seconds) the units get lost, and unless both parties hit the clear switch, there doesn't appear to be away for the two parties to establish another connection. They also have a maximum range of 1000 feet at best! (NOT 3 blocks!) For the money that you will be paying, I would recomend an FRS radio from Motorola or Midland. Bob ************************************************************************** 4)From: "Gerald Hagerty" Subject: newsletter I haven't heard from the news letter for 2 days. I hope everything is all right. I also hope you didn't follow the advice of the person requesting the newsletter be sent out ounce a week, by the way love your publication. I always look forward to it. thanks. jerry +++Moderator's Note+++ There has been very little traffic on the list lately... The more traffic the more lists... ************************************************************************** 5)From: Christian Valor Subject: Second Annual Hackers, Crackers & Sniffers Conference Second Annual Hackers, Crackers & Sniffer Symposium "Perils of the Internet and Practical Solutions" The Ashford Club Atlanta, GA - April 22-24, 1997 [Please visit our web site for similar conferences scheduled this year in San Diego [3/97], Boston [5/97], Biloxi, Norfolk, Las Vegas, Washington, D.C., Cleveland, Melbourne, and others at: http://www.newdimensions.net] Co-Sponsored by: Information Systems Audit & Control Association National Computer Security Association Internet Security Systems Delta Airlines and Transquest Security First Technologies HomeCom and a Community of Interests Featuring EMERGING INITIATIVES IN COMPUTER SECURITY Dr. Peter Tippett - President, National Computer Security Association INFORMATION WARFARE - CYBERTERRORISM Winn Schwartau - Noted Author and International Authority IMPROVING SECURITY BY VULNERABILITY ANALYSIS Tom Noonan - President, Internet Security Systems INTRUDER IMPACT AND EMERGING SECURITY DIRECTIONS Dr. John Alger, Dean, Information Warfare Institute, National Defense University Scott Charney, Chief of Computer Crimes Unit, U.S. Department of Justice Brent Mead, Network and Computer Security Manager, Jet Propulsion Laboratory Workshops presented by leading Expert Practitioners Special Presentation by Christopher Klaus, Founder, ISS Fee $495.00 Symposium Coordinator NEW DIMENSIONS INTERNATIONAL P.O. Box 897 Cardiff, CA 92007 T - (619) 436-5618 F - (619) 436-2475 E-mail http://www.newdimensions.net ATLANTA WORKSHOPS 0800-0930 & 1000-1130 W1 - Cybercrime This presentation is a revealing discussion of the nature of the criminal element and intrusions into computer systems. Presentation describes statistics and modus operandi. Key cases are addresses: Mitnick, Russian Citibank Hacker, Masters of Deception, and others. W2 - Computer and Network Security A technical manager's description of incident details and assessment of the impact by intruders on project development and support activities. Guidelines and management details are discussed that require responses to incidents and an investigative protocol. W3 - The Hacker Underground Understand the Hacker Underground and meet those who are a part of it. Who Hackers are: Find out Why they hack: Ask them How they hack: They will demonstrate This is a VERY penetrating session presented by members of the Hacker Underground who reveal hacking secrets and describe culture and tricks. They are well-known within the community and will provide candid answers and pointers on protection methods and Hacker Techniques. W4 - ActiveX and JAVA A veteran security expert addresses facts and myths about potential dangers from executable content. Increase of JAVA applets, JAVA Script and ActiveX has generated interest about Internet security. Will JAVA-based business and science applications prove too risky? Find out at this presentation by HomeCom, one of the premier Internet Web application development firms. 1300-1430 & 1500-1630 W5 - NT Security One of the most challenging new system security concerns. The key components, security weaknesses, policies and applications are identified. As NT is more widely used, security holes and precautions must be addressed. This session addresses "the holes," policies, implementation and options. W6 - Security Industry Presentations This workshop is a series of presentations by respective members of the regional security industry. Presentation address the various security software, hardware and devices. In addition, there will be selected exhibits of advanced security technologies. Key presentation by Security First Technologies. W7 - "How to" Scan for Vulnerabilities In this workshop, ISS will demonstrate how to scan for vulnerabilities and present a hands-on experience in a laboratory setting. You will have the chance to see how a scan is conducted step-by-step! W8 - Technology Protection and Control Presented by a leading practitioner in the field. Provides DoD, NASA and industry guidance used to identify and protect critical and competitive technology. Military and NASA hi-tech applications and the use of the Military Critical Technologies List are used as guidance to control technology disclosures. Recent examples of competitive espionage tactics through email and system intrusion are presented. A popular presentation. TENTATIVE AGENDA TUESDAY APRIL 22, 1997 0830 WELCOME - Symposium Planning Committee Jim Sorrell, ISACA 0845 INTRODUCTIONS AND OVERVIEW Fred J. Villella, New Dimensions International 0900 Keynote Address - EMERGING INITIATIVES IN COMPUTER SECURITY Dr. Peter Tippett, President, National Computer Security Association 1020 BREAK 1045 Featured Presentation - IMPROVING SECURITY THROUGH VULNERABILITY ANALYSIS Tom Noonan, President, Internet Security Systems, Inc. 1130 LUNCHEON Security Awareness - Michael Clancy, Transquest, and Jim Sorrell, ISACA 1315 INTRUDER IMPACT AND EMERGING SECURITY DIRECTIONS - A Panel Dr. John Alger, Dean, Information Warfare Institute, National Defense University Scott Charney, Chief of Computer Crimes Unit, U.S. Department of Justice Brent Mead, Network and Computer Security Manager, Jet Propulsion Laboratory 1630 ADJOURN 1700 WELCOME RECEPTION hosted by ISS Presentation by Christopher Klaus, Founder of ISS WEDNESDAY, APRIL 23, 1997 - Concurrent Practical Workshops W1 0800-0930 & 1000-1130 - Cybercrime W2 0800-0930 & 1000-1130 - Computer and Network Security W3 0800-0930 & 1000-1130 - The Hacker Underground W4 0800-0930 & 1000-1130 - ActiveX and JAVA 1130-1300 LUNCHEON hosted by Secure Computing W5 1300-1430 & 1500-1630 - NT Security W6 1300-1430 & 1500-1630 - Security Industry Presentations W7 1300-1430 & 1500-1630 - "How to" Scan for Vulnerabilities W8 1300-1430 & 1500-1630 - Technology Protection and Control THURSDAY, APRIL 24, 1997 - FEATURED PRESENTATION 0800-1130 PROTECTING AGAINST AN "ELECTRONIC PEARL HARBOR" Winn Schwartau, author of "Information Warfare: Cyberterrorism" 1200 ADJOURN Experienced professionals address the exploding nature of intrusions into computer systems and emphasize the actions needed to protect private, proprietary and sensitive information from increasing intrusions into business and government computer systems. Practical workshops provide technical and managerial options to mitigate losses from menacing and malicious intruders. Technologies are needed to protect privacy and electronic commerce over the hazardous electronic superhighway - the Internet. A dramatic finale on potential Cyberterrorism intrusions into vital computer systems across the country will be presented by the internationally-recognized leader in the field, Winn Schwartau, author of "Information Warfare" and the National Information Warfare policy. ************************************************************************** 6)From: "Jay J. Armes III" Subject: Intro I am the president of Brandon Enterprises, an international law enforcement distributor located in the Southwest United States. Our sister company, The Investigators, is an international private investigative organization specializing in hi-profile cases and high risk operations such as kidnapping and hostage rescue. We would be most interested in receiving your newsletter/surveillance list. We may be reached via e-mail at "spygear@spymall.com" or by voice at (915) 533-5746. If we can ever be of service to you, or your associates, please don't hesitate to contact me. By the way, our website should be up and online in approximately two weeks. (www.spymall.com) Respectfully submitted, Jay J. Armes III President ************************************************************************** 7)From: "Richard Leatherwood" Subject: Pocket 36 Min Digitel Recorder Thought this might be of interest to someone out there. Pocket 36 Min Digitel Recorder Flashback Digital Recorder, plays up to 36 minutes on a sound clip. Plays, Reverses, Pauses, Scans, Records, Fast-Forward, and more. Fits in your shirt pocket, no tape, works with an electronic sound clip. Can Fax more information on request. Reg. $249.99 Your Cost $75.00 Contact: maxam78@aol.com (Howard Chernawsky) URL: Not Listed H&J Liquidators and Closeouts 407 Domenic Ct. Franklin Park, IL USA Tel: +1 630 595-7177 Fax: +1 630 595-7199 R. L. Leatherwood, NWBC ************************************************************************** 8)From: "R.Allenn" Subject: missing issues? Used to get surveilance list practically everyday. Lately it seems only every several days. Rick P. r.allenn@centuryinter.net +++Moderator's Note+++ See response below... ************************************************************************** 9)From: ERIC C HART Subject: The List I have not been receiving the List a few days at the end of Feb and two days so far in March. Have you switched over to less than daily postings ? I hope not. I have been having some problems with my mail. I hope thats not it. Please advise. Regards, Eric Hart intell@coqui.net +++Moderator's Note+++ Our ISP has had some problems in the last week resulting in loss of e-mail messages and difficulty logging on... No, we don't subscribe to aol. I've received assurances that the problem is solved. If you have posted something to the list in the last week and have not seen it appear, please resend as it was probably lost... Make sure to checkout the issue number...it is more important than date in checking how up to date you are... ************************************************************************** 10)From: TEDREDLICH@aol.com Subject: Re: night vision products Be wary of "cheap" night vision products! Some units will be permanently damaged from even a short exposure to sun light. I recommend the G2 version of those made by ITT. If you need night vision or Zero Light CCTV cameras that are new, send me some E-mail and I'll return some pricing to you. ************************************************************************** 11)From: Gary Cohen Subject: SFIA updated Journal I've just updated SFIA's Journal page. Go to http://www.angelfire.com/fl/sfia and follow the links to the Journal. There's a new article on Due Diligence, an update on the upcoming SFIA Trade Show and seminar, (vendors and speakers WELCOME!!), and a brief outline of this month's speaker, TCSM expert Jim Toth. AS always, article submissions are encouraged! Thanks. Gary Cohen Investigator International Investigative Associates Ft. Lauderdale/Pompano Beach Florida (954) 726-9685 Pager (954)409-5599 heatgain@mindspring.com Member-FALI & SFIA http://www.geocities.com/WallStreet/5963/ SFIA - http://www.angelfire.com/fl/sfia/ ************************************************************************** 12)From: amaci@starnet.net.ph Subject: I want to ask members of the list where to get a BIN Directory For those who are not sure what that is it's a BANK identfication directory for checking credit cards Can anyone tell me where to buy one. contact at amaci@starnet.net.ph ************************************************************************** 13)From: "Walstrom, Bradley" Subject: Radio Shack Sale Radio Shack has the WaveCom Jr. normal price $199.99 on sale for $149.99. This is a very good 2.4 Ghz audio and video transmitter/receiver that is being sold by several Spy Shops built into wall clocks and clock radios for $600.00. The transmitter can be removed from its case and it will fit into a very small space. Brad Walstrom ************************************************************************** Who are you? What's your specialty and/or interest? Let us know about your company... What would you like to see on the list? Post it. Let us know... Do you have something to contribute? We'd like to hear it... We want to know EVERYTHING and ANYTHING about eavesdropping, surveillance, countersurveillance & privacy related technology, etc... Remember: who, what, where, when, how & why... we want ALL the details... Do you have a question? Post it... A little free time? Help a member... With the INCREDIBLE brain power on this list, someone should have the answer ;-) P.S. Don't be a LURKER... Members take the time to post info for us all... give something back... Don't just take... Your input/knowledge is valued... ************************************************************************** Send Postings to: 6886@mne.net with "Post" in subject field with subject ************************************************************************** Subscribe to: 6886@mne.net In the subject field type: subscribe-surveillance list e-mail address ************************************************************************** Unsubscribe to: 6886@mne.net In the subject field type: unsubscribe-surveillance list e-mail address ************************************************************************** ...The Simple Rules of the Surveillance List... The Surveillance List Owners may Reject any posts that are/contain: 1) Info Unrelated to Eavesdropping, Surveillance or Privacy technology... 2) Flames or Negative posts... 3) E-Signatures that are considered excessive... 4) Advertisements not DIRECTLY related to the list topics... 5) Attached Files... 6) Oversized Posts... (May be edited to save room) **************************************************************************** This publication is copyrighted and is protected by U.S. and International copyright law. The information transmitted on this list may not be reproduced, reposted or forwarded to any non-list member without expressed written permission of the List Owner. Violation of U.S. copyright law is a criminal and civil offense... **************************************************************************** The Surveillance List is moderated by SpyKing@thecodex.com The List Owner will make EVERY effort to protect subscribers from spam... Copyright 1996, 1997 Codex Publishing Inc., All Rights Reserved... **************************************************************************** Vol 2 Issue # 55 ****************************************************************************** Vol.Two Issue #55 The Surveillance List Mar.6,1997 Over 1400 Members Worldwide ****************************************************************************** IN THIS ISSUE... ****************************************************************************** 01) Suppliers? 02) FRS RADIOS 03) CCTV proposal 04) Disguising One's IP Address? 05) Decoding pager messages 06) FTC Announces "look-up" service study, public workshop in June 07) Cell calls & cordless phones 08) Digital encryption 09) Starting a babysitter surveillance business 10) Cellular Intercept Arrest 11) Spectrum Analyzer Software 12) Re: Window Tinting for Video Surveillance ****************************************************************************** DON'T BE A LURKER.... GET INVOLVED... YOU ARE A MEMBER... MAKE THE MOST OF IT ****************************************************************************** 1)From: John Harkin Subject: Suppliers? Could anyone tell me the phone # or address to a company called Shomer Tec. Also i need to know who makes a laser listening device (like in Clear & Present Danger). It is for export. And finally, the moderator once mentioned that he had a database of thousands of suppliers. Is this list for sale? Please let me know, i am very interested in obtaining a copy!!! Thank You! nespy@tiac.net +++Moderator's Note+++ Nope, list is not for sale. I'll be happy to tell you for free where to get what... ************************************************************************** 2)From: trever.kb9nhu@juno.com (Trever C. Trader) Subject: FRS RADIOS To whom this may concern on the list Radio Shack has two FRS radios on the market. One is Clearly a Motorola, and if you buy a pair of the Motorola's, then you get an accessory kit for them. The other, I think is made by Maxon, but I am not 100% sure on that. If anyone is interested in one of these, let me know, and I will have them shipped to you, also, if anyone is interested in the Wavecom JR's, I can have those shipped to you also. Trever C. Trader KB9NHU 2743 S. Veterans Pkwy. #206 Springfield, Illinois 62704-6536 (217) 691-0029 ************************************************************************** 3)From: "Craig Shevlin" Subject: cctv proposal If you are interested in quoting a price for this or comparable equipment, please drop me a quote. two (2) Panasonic B/W 1/3 inch Cameras two (2) Camera transformers two (2) Panasonic 4.5mm Auto Iris Lenses two (2) Pelco indoor camera housings two (2) Pelco indoor Camera Mounts one (1) Panasonic Monitor with built in switcher one (1) Panasonic VCR Craig S. Shevlin Shevlin@staffnet.com ALAM Engineering ************************************************************************** 4)From: "Dan Frezza" Subject: Disguising One's IP Address? Dear List members, How does one disguise one's IP address when he or she surfs the net? I am aware of "cookies" and how to minimize their action and/or use. However, it doesn't prevent another server, albeit, stealthily, of obtaining information from your machine without your permission. For those who are not aware, first try this experiment. Go to the web site listed below and you will see what I mean. http://www.anonymizer.com/cgi-bin/snoop.pl Now my point: Is there a practical way, to disguise or hide one's identity in terms of your IP address, and surf anonymously without going through such a busy site such as: http://www.anonymizer.com to surf? The biggest downside is the slowness of the site. Any other suggestions or ideas would be appreciated. This question is academic in nature but I was wondering if there are any practical solutions to the problem. Dan Frezza Dan Frezza PGP -- An Envelope for Your E-mail Key ID: 0x0B6C9381 Key Fingerprint = 8C E2 78 50 24 80 D7 0C 64 29 D2 3B FE 4B C5 4E ************************************************************************** 5)From: Eggg Subject: decoding pager messages I'm new to the list. Since it seems there is not a lot of discussion recently, I would like to suggest a topic. I want to know more about decoding pager messages with a scanner. If this has already been discussed on the list please disregard but forward the location of any info and I will persue the subject on my own. ************************************************************************** 6)From: Bob Palacios Subject: FTC Announces "look-up" service study, public workshop in June http://www.cdt.org/privacy/FTC_workshop_97.html The Federal Trade Commission (FTC) announced that it will begin to study the collection, compilation, sale, and use of computerized databases known as "look-up services." These services, which are used to locate individuals or provide background information on individuals, have been the focus of scrutiny from privacy advocates and the media. This study will be the basis for a report to Congress. The FTC also announced a four-day public workshop to be held June 10-13, 1997. Session One (June 10) of the workshop will focus on the "look-up service" study. Sessions Two and Three are intended to follow up on last year's workshop and staff report, "Consumer Privacy on the Global Information Infrastructure." Session Two (June 11-12) is entitled "Consumer Online Privacy" and Session Three (June 12-13) is entitled "Children's Online Privacy." The workshop will be open to the public. Those interested in participating in the workshop must submit comments to the FTC by April 15, 1997. More information will be posted at http://www.cdt.org/privacy/FTC_workshop_97.html ----- Bob Palacios, Webmaster bobpal@cdt.org Center for Democracy and Technology http://www.cdt.org/ 1634 Eye Street, NW Suite 1100 http://www.cdt.org/homes/bobpal/ Washington, DC 20006 (v) +1 202 637 9800 (f) +1 202 637 0968 ************************************************************************** 7)From: Dan Subject: Cell calls & cordless phones For cell phone info: http://www.geocities.com/Heartland/6095/CELLFAQS.HTM For cordless phone info: http://www.geocities.com/Heartland/6095/CORDLESS.HTM ************************************************************************** 8)>From: "Tim Bosecker" Subject: Digital encryption Does anyone know where I can get information on Digital Encryption Scrambling. How does it work in DEPTH ? ************************************************************************** 9)From: Waxie888@aol.com Subject: Starting a babysitter surveillance business I am interested in starting a babysitter surveillance business in California. I know it must be legal since I've seen several advertisements for such a service here, but I would like to get the skinny on the exact legalities involved in such a venture. Can anyone point me toward some articles or sources? Or does anyone know of a company that perhaps has franchises for this type of business? Any help would be greatly appreciated! ************************************************************************** 10)From: SpyKing@thecodex.com Subject: Cellular Intercept Arrest Checkout: http://www.dallasnews.com/metro-dfw/dfw419-NF.htm ************************************************************************** 11)From: SpyKing@thecodex.com Subject: Spectrum Analyzer Software Turn your MultiMedia PC into a powerful Real-Time Spectrum Analyzer Download free 30 day trial software at: http://www.telebyte.com/pioneer ************************************************************************** 12)From: "Donald J. Zaroda" Subject: Re: Window Tinting for Video Surveillance The typical films available for tinting automotive glass reduce visible light to as little as 5% for the so-called "limo" shade. I need to apply tint or film to a vehicle in order to do video surveillance. I seek visual privacy so I can wait, unobserved in residential areas. But I also need good lighting for the camera. What can be applied to auto windows to accomplish both privacy and videography day or night? Don Zaroda zarodad@lafayette.edu ************************************************************************** Who are you? What's your specialty and/or interest? Let us know about your company... What would you like to see on the list? Post it. Let us know... Do you have something to contribute? We'd like to hear it... We want to know EVERYTHING and ANYTHING about eavesdropping, surveillance, countersurveillance & privacy related technology, etc... Remember: who, what, where, when, how & why... we want ALL the details... Do you have a question? Post it... A little free time? Help a member... With the INCREDIBLE brain power on this list, someone should have the answer ;-) P.S. Don't be a LURKER... Members take the time to post info for us all... give something back... Don't just take... Your input/knowledge is valued... ************************************************************************** Send Postings to: 6886@mne.net with "Post" in subject field with subject ************************************************************************** Subscribe to: 6886@mne.net In the subject field type: subscribe-surveillance list e-mail address ************************************************************************** Unsubscribe to: 6886@mne.net In the subject field type: unsubscribe-surveillance list e-mail address ************************************************************************** ...The Simple Rules of the Surveillance List... The Surveillance List Owners may Reject any posts that are/contain: 1) Info Unrelated to Eavesdropping, Surveillance or Privacy technology... 2) Flames or Negative posts... 3) E-Signatures that are considered excessive... 4) Advertisements not DIRECTLY related to the list topics... 5) Attached Files... 6) Oversized Posts... (May be edited to save room) **************************************************************************** This publication is copyrighted and is protected by U.S. and International copyright law. The information transmitted on this list may not be reproduced, reposted or forwarded to any non-list member without expressed written permission of the List Owner. Violation of U.S. copyright law is a criminal and civil offense... **************************************************************************** The Surveillance List is moderated by SpyKing@thecodex.com The List Owner will make EVERY effort to protect subscribers from spam... Copyright 1996, 1997 Codex Publishing Inc., All Rights Reserved... **************************************************************************** Vol 2 Issue # 56 ****************************************************************************** Vol.Two Issue #56 The Surveillance List Mar.10,1997 Over 1500 Members Worldwide ****************************************************************************** IN THIS ISSUE... ****************************************************************************** 01) Video Surveillance 02) Missing e-mail 03) Locks 04) A belated response to 'cable bill hacking' 05) Re: mics 06) Motorola SecureClear 07) What happened? 08) Cellular Scanner Conversion 09) Privacy during phone call 10) Home computer snooping 11) To everyone on this list 12) Re: Window Tinting for Video Surveillance 13) Re: Disguising One's IP Address? 14) Maryland PI's in the Columbia area 15) Sony NT-1 Digital recorders 16) Shomer-Tec 17) Reverse phone directory on line.... 18) Upcoming Intelligence Conferences ****************************************************************************** DON'T BE A LURKER.... GET INVOLVED... YOU ARE A MEMBER... MAKE THE MOST OF IT ****************************************************************************** 1)From: Clarence Petzold Subject: Video Surveillance I'm interested in learning if there are any hot new ways to monitor a location from a remote site. This type of surveillance is what I am currently researching. My name is CWP and I spent 30 years in law enforcement, now for the last five years I head Loss Prevention & Safety for a major wholesale distribution center in the midwest. I recently viewed CU-SEE Me software that has great potential to monitor video over the internet. CWP ************************************************************************** 2)From: WWMason@aol.com Subject: Missing e-mail I haven't been receiving the newsletter, what's up! +++Moderator's Note+++ My ISP had a problem granting customers access. Evidently they ran out of phone lines. Access has been terrible the last 2 weeks (no I don't use aol). They also claim that e-mail somehow got corrupted and merged somehow... They are SLOWLY straightening out the problem. I am now being deluged with e-mail messages from weeks ago... if any list member has sent me a message and not gotten a response, please resend me the message... This is the first problem I've had with them (my ISP) in almost three years. I've been told the problem is now solved. The list will continue daily as long as there is traffic... Don't be a lurker... get involved... ************************************************************************** 3)From: WWMason@aol.com Subject: Locks This is re-submitted at recommendation of Moderator. Prior submission may of been lost. I've seen much on electronic items in the newsletter, but nothing on locks. Read somewhere that it was possible to "impression" a key by filing the scratch mark made by the pins on a blank key. Once the correct depth is filed then the pin leaves no scratch marks. Is this feasible, or does it take a huge amount of time and luck? ************************************************************************** 4)From: "John D. Hays" Subject: A belated response to 'cable bill hacking' > From: Rose Lewis > Subject: help > > could you direct me to someone who can get into a cable company's > computer and make it look like the bill is paid?? Oh, if were only that easy my friend. Most companies use an insidious device called 'paper' to prevent honest Americans from getting free cable. Also, any accounting dept. worth its salt will have Internal Controls. These controls are supposed to provied adequate seperations of duties, proper authorization, documentation, physical control over assets, and, most importantly, independent checks on performance. (Forget Big Brother, little bookkeepper is watching you) So, at the end of the month their computer talies up everyone's bills. When a check arrives, with a remittence notice, they match it wto your acct. The person who opens the mail is different from the person who deposits the check, who is different from the person who records the transaction. Every step of the process is printed out (too late!) and a tree dies so the cable company gets their pound of flesh. If you go a hacking and the numbers don't add up, they go a huntin'. So when they're short $37.45, and your remittence notice is missing and they haven't a paper record of your payment. Their going to call you up and demand you pony up a cancelled check. One last thing. Not every company will hook up their computer so you can telnet into their general ledger. What would be the point? "Hey, now when I go to Cancun, I can keep track of our debt to equity ratio. Keen!" Now stop fooling around and go run a splice to your nieghbors house like everybody else. ************************************************************************** 5)From: WWMason@aol.com Subject: Re: mics With all the knowledge out there, I 'd like to hear what type of miniature microphones work best in surveillance situations. I've tried a number of different "spy mics", radio shack mics, and amplifies mini mics. Biggest problem is trying to isolate conversation from other noise. It seems the better the mic, the more peripheral noise it picks up to drown out the subject conversation. whether it's airplanes flying over, cars going buy, or muzak playing over the intercom, I seem to always have trouble getting clear conversation. anyone can get it in a hotel room, or private office. the challenge is in a warehouse settting, or outdoors. What works best for you? ************************************************************************** 6)From: CrACKeD Subject: Motorola SecureClear Is anyone familiar with the SecureClear feature in some Motorola cordless telephones? Is this simply classic speech inversion, or something unique? CrACKeD ************************************************************************** 7)From: Triplaich@aol.com Subject: What happened? Dear Sirs: What happened? I have not received a surveillance list since issue #53. Herb +++Moderator's Note+++ See reply in #2 ************************************************************************** 8)From: jaross@notes.primeco.com Subject: Cellular Scanner Conversion Does anyone know how to program Motorola or Pioneer flip phones so that they "act" like a scanner to pick up other frequencies in the 800mhz area? Programming codes or a location to find this information would be very helpful and appreciated. Thanks James jaross@primeco.com ************************************************************************** 9)From kc8bia@netonecom.net Subject: privacy during phone call Hi I just read your web page about recording laws in Michigan. I have always known that only one person needs to know that the phone call is being recorded to make it legal. My question is could you tell me the michigan statue or law number is so I will have it as a reference. I brought this up at our radio club meeting and many people do not understand or believe this. I look foreward to learning more from your page. Thank you Mike ************************************************************************** 10)From: Tasmanites@aol.com Subject: Home computer snooping Is there software I can put on my unit to determine whether someone is using it without my permission while I'm gone? I've heard of programs that "echo" keystrokes for later perusal. Anyone know? Thanks. ************************************************************************** 11)From: Larry Braden Subject: To everyone on this list Being the first week in March, it is time for me to up date my referral file ( again ). If you are interested in ( possibly ) being sent a case from the State of Colorado area within the next year and you are licensed with a reasonable amount of experience, please send me a private E-Mail with the following information ( in this format please ): Name of company Complete address Telephone number E-Mail / URL address Your area of expertise along with length of experience Fees and turn around times State PI license number, associations you belong to etc........ Anything else you wish to mention about your company I appreciate your time and effort. Respectfully, Larry Braden, Senior Investigator Montrose, Investigations Montrose, Colorado E-Mail at Braden@rmii.com or visit our home page at: http://www.angelfire.com/co/WestCoPI ************************************************************************** 12)From: principal@connect.ab.ca Subject: Re: Window Tinting for Video Surveillance >The typical films available for tinting automotive glass reduce visible >light to as little as 5% for the so-called "limo" shade. I need to apply >tint or film to a vehicle in order to do video surveillance. I seek >visual privacy so I can wait, unobserved in residential areas. But I >also need good lighting for the camera. What can be applied to auto >windows to accomplish both privacy and videography day or night? To get the best effect from video through no tint or light tint glass at night. Avoiding compromise requires only a dutiful amount of consideration. The first thing you must always appreciate is the amount of backlight. If you are using a van that has windows opposed to each other, cover those windows not needed for observation. If you use an older service type van cardboard is ok, if however, you use a new minivan, cardboard would be too obvious, consider black bristol board cut to fit snugly into the window. >From outside this looks like very dark tint. Now reduce the amount of light coming into the back of your vehicle via the windshield and front windows. A curtain strung on a wire will do the trick. If the window you are shooting the video through has no tinting at all, cover it with the black bristol board with a hole big enough to ensure an appropriate field of view. If you have light tinting you may simply dress in subdued color clothes, remove shiny watches and jewelry, keep well back from the window, have all the equipment you will need in place before you arrive, use camera with a decent LUX rating, use as little magnification as you can and most importantly, don't move excessively, better, don't move at all! As a former sniper I can tell you that movement will give you away faster than anything else. In a nutshell, when setting up a covert observation position (OP) always remember that these things give you away; shape, shine, shadow, silhouette, spacing, color, contrast and MOVEMENT. Principal Protection Service Ltd principal@connect.ab.ca ************************************************************************** 13)From: fiveyes@iiiii.com (5-i's = V) Subject: Re: Disguising One's IP Address? In Vol 2 Issue #55 Mar.6,1997 - 4), Subject: Disguising One's IP Address?, "Dan Frezza" , did write: > >Dear List members, > >How does one disguise one's IP address when he or she surfs the net? >I am aware of "cookies" and how to minimize their action and/or use. >However, it doesn't prevent another server, albeit, stealthily, of >obtaining information from your machine without your permission. Some information, as I'll show you in a moment, is required to access the web and some browzers are more generous than others in offering up optional tidbits. Servers, by design, are extremely limited to what info they can obtain. >For those who are not aware, first try this experiment. Go to the web >site listed below and you will see what I mean. > >http://www.anonymizer.com/cgi-bin/snoop.pl Mmmm, it couldn't tell me my email address and then tried to relocate me all the way from New Orleans to San Jose (I refused to go). Not too impressive as a snoop. >Now my point: Is there a practical way, to disguise or hide one's >identity in terms of your IP address, and surf anonymously without >going through such a busy site such as: http://www.anonymizer.com to >surf? The biggest downside is the slowness of the site. Well, I guess that nixes my thought of having the web pages requested and sent to you via an e-mail gateway... :) >Any other suggestions or ideas would be appreciated. This question is >academic in nature but I was wondering if there are any practical >solutions to the problem. Get a dialup account with an ISP, Dan. They'll randomly assign you an IP address from their pool whenever you call and toss it back in whenever you log out. Then just use a third-party browzer that allows you to control the optional info given out. Other than that, you're going to have to go through a middleman/gateway. This logically follows when you consider the fact that your IP Address, whether it be permanent, temporarily assigned for that session, or kept track of by some relay point, is the ONLY way that the web server on the other end is going to be able to send the requested files to you... 5-i's ************************************************************************** 14)From: "Craig Shevlin" Subject: Maryland PI's in the Columbia area I am looking for a PI in the Columbia area of Maryland who specializes in marital investigations. Have an old friend in need of services that I can not provide from Virginia. Email: Shevlin@staffnet.com Please leave your name, address and phone number. I will have him get intouch with you. Craig S. Shevlin ALAM Security Shevlin@staffnet.com ************************************************************************** 15)From: EdShak@aol.com Subject: Sony NT-1 Digital recorders I have a quantity of Sony NT-1 Digital recorders for $795.00, If any one is interested E-Mail me or fax 216-333-0818 ************************************************************************** 16)From: Trace Carpenter Subject: Shomer-Tec Shomer-Tec can be contacted at 360-733-6214. -- Trace Carpenter 214.828.4520 214.828.1917 Facsimile ************************************************************************** 17)From: BADCOFFEE@aol.com Subject: Reverse phone directory on line.... looking to find a RELIABLE reverse phone directory on line that is FREE. Any WEB related FREE services and pages will be a blessing....Thank you.... ************************************************************************** 18)From: "Dominic Palombo" Subject: Upcoming Intelligence Conferences 13-14 March - US "Intelligence Support to Joint Operations" will be conducted by the NMIA at the Defense Intelligence Analysis Center, Bolling AFB. The classified symposium is being sponsored by the DIA. Contact: NMIA Voice: (703) 824-3211 Fax: (703) 824-0334 Email: jonkers@betac.com 18 March 1997 - US The National Imagery and Mapping Agency will hold its first Business Opportunity Day at Fort Belvoir, VA. The unclassified conference is designed to establish a dialogue between industry and the NIMA and to explore the future direction and needs of the agency. The event will be held at the Defense Logistics Agency facility at Fort Belvoir. Contact: Angelo Pappalardo Fax: (301) 227-2218 Email: pappalarda@nima.mil WWW: www.nima.mil Address: 4600 Sangamore Road, Stop D-88, Bethesda, MD 20816-5003 9-10 April - US "Intelligence Strategy 2000: Perspectives on the Future," will be the theme of AFCEA's annual Spring Intelligence Symposium. The symposium will be classified at the Top Secret SI/TK level. It will be held at the Defense Intelligence Analysis Center, Bolling AFB. Contact: AFCEA Voice: (703) 631-6238 Fax: (703) 631-6133 Email: intelligence@afcea.org 20-23 April 1997 - US The Association of Old Crows and AFCEA are holding a symposium and exhibit on "Military Operations in an Information Age" in San Antonio, TX. Contact: Bob Mitchell Voice: (210) 521-2500 Fax: (210) 522-1313 Email: bmcaoc@txdirect.net or exhibits@afcea.org Address: 6100 Bandera Road, Suite 306, San Antonio, TX 78238 4-8 May - US "National OPSEC Conference" will be held in DC by OPS. Contact: OPS Society Web: www.cache.net/~oss/ops 8-9 May 1997 - Belgium InfoWarCon 6: "War By Other Means" on the topics of Economic Espionage, CyberTerrorism and Information Assurance will be held in Brussels, Belgium with a pre-conference tutorial on 7 May. The conference is sponsored by National Computer Security Association (www.ncsa.com), Winn Schwartau, Interpact, Inc. (www.infowar.com), and Open Source Solutions, Inc, (www.oss.net). Contact: Kim Imler Voice: (717) 241-3226 Fax: (717) 243-8642 Email: kimler@ncsa.com WWW: www.Infowar.com or www.ncsa.com 14-15 May - US The NMIA New England Chapter and the NMIA will be conducting a symposium focusing on Intelligence Systems Support to C2. It is being hosted by the USAF Electronic Systems Center (ESC) and will include classified and unclassified tracks. The symposium will be held in Bedford, Massachusetts. Contact: NMIA Voice: (301) 840-6642 Fax: (301) 840-8502 Email: zhi@cais.com Web: www.cache.net/NMIA Address: 9200 Centerway Rd., Gaithersburg, Maryland 20879 28-31 May 1997 - US The Society of Competitive Intelligence Professionals (SCIP) will hold their 12th Annual International Conference and Exhibit with the theme "Global Competitive Leadership in the 21st Century: Competitive Analysis for Winning Strategies." The conference will be held at the Hyatt Regency in San Diego, California. Contact: SCIP Voice: (703) 739-0696 Fax: (703) 739-2524 Email: postmaster@scip.org WWW: www.scip.org/homepage.html Address: 1700 Diagonal Road, Suite 520, Alexandria, Virginia 22314, USA 4-6 June 1997 - US The Association of the US Army's Spring Symposium and Exhibition will be on the topic of C4I. The event will be held in Los Angeles, CA. Contact: Association of the US Army (AUSA) Voice: (703) 841-4300 ext. 660 Fax: (703) 243-2589 Email: ausahq@aol.com WWW: www.ausa.org Address: 2110 Washington Blvd, Suite 210, Arlington, VA 22204 11-12 September 1997 - US InfoWarCon 7 will be held in Washington, DC. Email: Betty@infowar.com 1-2 October 1997 - US AFCEA's Southern Arizona Chapter is hosting a conference at Fort Huachucha, AZ on the theme of Command, Control, Communications, Computers and Intelligence Systems Technology (C4IST). Contact: Rich Besselman Voice: (520) 452-7125 Email: events@afcea.org WWW: www.afcea.org/calendar.html November 1997 - UK Contingency and Operational Procurement Exhibition (COPEX) will hold the SI2 Security Intelligence International conference in London, UK. Contact: COPEX Voice: 44 0 1923 819301 Fax: 44 0 1923 818924 Email: copex@delphi.com WWW: www.demon.co.uk/copex Address: 33A Church Road, Watford, Herts WD1 3PY, UK USA Contact: Osprey USA USA Voice: (202) 429-6836 USA Address: 1825 Eye St. NW, Suite 400, Washington, DC 20006 ************************************************************************** Who are you? What's your specialty and/or interest? Let us know about your company... What would you like to see on the list? Post it. Let us know... Do you have something to contribute? We'd like to hear it... We want to know EVERYTHING and ANYTHING about eavesdropping, surveillance, countersurveillance & privacy related technology, etc... Remember: who, what, where, when, how & why... we want ALL the details... Do you have a question? Post it... A little free time? Help a member... With the INCREDIBLE brain power on this list, someone should have the answer ;-) P.S. Don't be a LURKER... Members take the time to post info for us all... give something back... Don't just take... Your input/knowledge is valued... ************************************************************************** Send Postings to: 6886@mne.net with "Post" in subject field with subject ************************************************************************** Subscribe to: 6886@mne.net In the subject field type: subscribe-surveillance list e-mail address ************************************************************************** Unsubscribe to: 6886@mne.net In the subject field type: unsubscribe-surveillance list e-mail address ************************************************************************** ...The Simple Rules of the Surveillance List... The Surveillance List Owners may Reject any posts that are/contain: 1) Info Unrelated to Eavesdropping, Surveillance or Privacy technology... 2) Flames or Negative posts... 3) E-Signatures that are considered excessive... 4) Advertisements not DIRECTLY related to the list topics... 5) Attached Files... 6) Oversized Posts... (May be edited to save room) **************************************************************************** This publication is copyrighted and is protected by U.S. and International copyright law. The information transmitted on this list may not be reproduced, reposted or forwarded to any non-list member without expressed written permission of the List Owner. Violation of U.S. copyright law is a criminal and civil offense... **************************************************************************** The Surveillance List is moderated by SpyKing@thecodex.com The List Owner will make EVERY effort to protect subscribers from spam... Copyright 1996, 1997 Codex Publishing Inc., All Rights Reserved... **************************************************************************** Vol 2 Issue # 57 ****************************************************************************** Vol.Two Issue #57 The Surveillance List Mar.11,1997 Over 1500 Members Worldwide ****************************************************************************** IN THIS ISSUE... ****************************************************************************** 01) Investigator Needed 02) Mic's Response 03) A question... 04) Re: Lock impressioning 05) Video Surveillance Response 06) "Home Escort" 07) TEMPEST 08) LASER fencing 09) Re: Locks 10) Reverse phone directory on line.... 11) Home computer snooping 12) Hacking AOL accounts and reading email? 13) John the Ripper v1.4 14) Spy on the World ****************************************************************************** DON'T BE A LURKER.... GET INVOLVED... YOU ARE A MEMBER... MAKE THE MOST OF IT ****************************************************************************** 1)SpyKing@thecodex.com Subject: Investigator Needed Licensed investigator or process servers needed for states of Maryland and Virgina. Please contact me directly. ************************************************************************** 2)From: Trace Carpenter Subject: Mic's Response You had asked what mic's work best for surveillance applications. I'm having great luck with the Pegasus Audio Paks. They come with a microphone, however it is a three wire setup. The sound is really good compared to other units I've tried for the money. (Around $150) for the amp & mic. You'll always have problems with background, you just have to try to electronically filter it out of the equation. Give them a try. I've got them running on hidden camera systems all over town. -- Trace Carpenter 214.828.4520 214.828.1917 Facsimile ************************************************************************** 3)From: diablo@jorsm.com Subject: A question... Hey everyone, a quick question for you... Has anyone out there spent time with (US) Army or Navy Intel? I was talking with recruiters for both a few days ago about the various jobs available in military intel, and they really didn't know that much. If anybody out there has spent a coupla' years in the service and wouldnt mind giving me an opinion about the job, could you e-mail me please? Thanks a bunch Jeff -- "Know the enemy and know yourself; in a hundred battles you will never be in peril" - Sun Tzu ************************************************************************** 4)From: BADCOFFEE@aol.com Subject: Re: Lock impressioning I would make an Impression of a lock ONLY if I planned on opening the lock more than a few times. This is like having "your own" key.... If your planing on a ONE time open...NO way...takes way too long. (for me at least). You can't do this without proper lighting (not at night).....picking is something that is easy...somtimes stubborn, but efficient. MOST residential locks can be picked within 2 minutes. Keyword here is : Understand HOW the lock works...without knowing it is close to impossible. Be good. ************************************************************************** 5)From: Trace Carpenter Subject: Video Surveillance Response >I'm interested in learning if there are any hot new ways to monitor a >location from a remote site. I don't know what you're referring to as new, but there are some remote options available. Depending on your range needed there are of course all sorts of signal transmitters. I posted a schematic for one a while back I believe. You may have it on an old list if you save them. Other than that there are some really nice dial up systems where you can be anywhere in the world and dial into the system to monitor it. Give me an idea what you need and I'll try to forward you the info. -- Trace Carpenter,P.I., Tech 214.828.4520 214.828.1917 Facsimile ************************************************************************** 6)From: Stanley Corwin Subject: "Home Escort" Is anyone out there familiar with the BI 9000 Home Escort Monitoring Device? Used to monitor subjects on house arrest. Looking for frequency it transmits(anklet), how it contacts the central station when the subject is out of range, etc. Any info would be helpful. Thank You, Stan Corwin Spy Store www.spy-store.com ************************************************************************** 7)From: "Arny Buckman" Subject: TEMPEST This message is being re-sent per request of the moderator. In reply to Pete Lasky, there's no such thing as a standard "TEMPEST" box. How you approach the problem depends on the size of the device that you're trying to protect. A TEMPEST box can be anything from a shielded room the size of a house or a module smaller than a floppy disk. One of the best shielded enclosure made for a small item is an ordinary paint can (before anyone fills it with paint). The seam is soldered, the steel is plated so that you can easily solder ground connections to it, and the lip on the cover makes an almost perfect seal. If you create any mechanical holes, make sure that they are electrically closed with filters or shielded wiring. The final shielding value is determined by the weakest element. ************************************************************************** 8)From: "David S. 'Greeny' Greenberg" Subject: LASER fencing Does anyone have any info on LASER fencing? Operation, suppliers, cost, etc. Is it bypassable with a few mirrors strategically placed, how about if I aim another beam into the receivier? (kinda like the old electric eyes...)... ************************************************************************** 9)From: "David S. 'Greeny' Greenberg" Subject: re: Locks Yes it is possible, yes it does take *some* time, no it doesn't take much luck. What you want to do is IMPRESSION a key. You need a BLANK key (no cuts) which fits in the lock (visit your local hardware store -- tell them you want a blank because you're having trouble with the lock -- they won't care...), and some GUN BLUING (visit local gun shop), also get a couple of files (ones for sharpening chain saws work nicely), ball-peen hammer. Apply bluing according to instructions to key surface (where the cuts would be). Insert blank key, turn until it won't go any further, smack top of key (the part you turn with your finger/thumb) softly with the hammer. The idea is to get the pins inside the lock to dent/scratch the bluing on the key so you can file it down... Remove key... Look for scratches, file a little bit (like 2-3 files...) where the scratch is... Apply bluing, repeat... Until key works... Note that if there's no scratch on the bluing, you've got the appropriate depth... Don't file too much, you can't build up the material once it's gone! Also, you should have a good understanding about lock internals before attempting this, or it doesn't make much sense. A good place to get info on locksmithing and impressioning is Loompanics Unlimited, out of Port Townsend, WA (moderator, do you have the address?)... Good luck... ************************************************************************** 10)From: Jim Youse Subject: Reverse phone directory on line.... >BADCOFFEE@aol.com: >looking to find a RELIABLE reverse phone directory on line that is FREE. This isn't perfect, but it does have a reverse phone directory. http://www.555-1212.com/ ************************************************************************** 11)From: "M. J. Van Ham" Subject: Home computer snooping > Is there software I can put on my unit to determine whether someone is using > it without my permission while I'm gone? I've heard of programs that "echo" > keystrokes for later perusal. Anyone know? Thanks. Check out: http://www.tordata.se:80/hokum/files2.htm About midway down the page there's a section entitled "Keystroke Recorders". I believe that's what you're looking for. There are several different versions, and I have no idea which one is the best, so I suggest you just pick one and try it. ************************************************************************** 12)From: LazySkillz@aol.com Subject: Hacking AOL accounts and reading email? Hey has anybody found a fool-proof way to "hack" into an AOL account and access the user's email without the user's knowledge? Thanks for any info. ************************************************************************** 13)From: solar@IDEAL.RU Subject: John the Ripper v1.4 I'd like to announce the release of version 1.4 of my UNIX password cracker, John the Ripper. It is currently available for UNIX (tested with Linux x86, FreeBSD x86, Solaris 2.x SPARC, OSF/1 Alpha), DOS, WinNT/Win95. New since version 1.3: - MD5 based password files support; - SPARC V8 assembly version; - a lot of bugfixes. You may wonder, why design one more password cracker, when we already have Crack? Well, when I started working on John, Crack v4.1 was a bit outdated, and I didn't know Crack v5.0 was going to be released. Actually, Crack v5.0 doesn't have much features added since v4.1, it is still lacking a cracking mode John had from the very beginning -- trying all the possible character combinations _in_a_reasonable_order_, using character frequencies based on other real passwords. Crack7 supplied with Crack v5.0 is unlikely to crack a password of 6 or more characters long (it's even supplied with these lines commented out), while John is often able to crack non-word-based 8 character passwords with this mode when running on a single CPU for a day or even less. The encryption routines are also optimized (both the algorithm and the code), and are faster than fcrypt() of libdes supplied with Crack v5.0. However, I must admit that Crack has some features that John doesn't (for example, the network management), and that I used some ideas from Crack and other password crackers while developing John (for example, the wordlist rules syntax). It is not like a competition (who makes the best password cracker), but just an attempt to do some improvements. Finally, John the Ripper v1.4 can be downloaded at: http://www.false.com/security/john/ Signed, Solar Designer ************************************************************************** 14)From: " Dr. Adaire M. Faldmo" Subject: Spy on the World http://www.noord.bart.nl/~mronde/ ************************************************************************** Who are you? What's your specialty and/or interest? Let us know about your company... What would you like to see on the list? Post it. Let us know... Do you have something to contribute? We'd like to hear it... We want to know EVERYTHING and ANYTHING about eavesdropping, surveillance, countersurveillance & privacy related technology, etc... Remember: who, what, where, when, how & why... we want ALL the details... Do you have a question? Post it... A little free time? Help a member... With the INCREDIBLE brain power on this list, someone should have the answer ;-) P.S. Don't be a LURKER... Members take the time to post info for us all... give something back... Don't just take... Your input/knowledge is valued... ************************************************************************** Send Postings to: 6886@mne.net with "Post" in subject field with subject ************************************************************************** Subscribe to: 6886@mne.net In the subject field type: subscribe-surveillance list e-mail address ************************************************************************** Unsubscribe to: 6886@mne.net In the subject field type: unsubscribe-surveillance list e-mail address ************************************************************************** ...The Simple Rules of the Surveillance List... The Surveillance List Owners may Reject any posts that are/contain: 1) Info Unrelated to Eavesdropping, Surveillance or Privacy technology... 2) Flames or Negative posts... 3) E-Signatures that are considered excessive... 4) Advertisements not DIRECTLY related to the list topics... 5) Attached Files... 6) Oversized Posts... (May be edited to save room) **************************************************************************** This publication is copyrighted and is protected by U.S. and International copyright law. The information transmitted on this list may not be reproduced, reposted or forwarded to any non-list member without expressed written permission of the List Owner. Violation of U.S. copyright law is a criminal and civil offense... **************************************************************************** The Surveillance List is moderated by SpyKing@thecodex.com The List Owner will make EVERY effort to protect subscribers from spam... Copyright 1996, 1997 Codex Publishing Inc., All Rights Reserved... **************************************************************************** Vol 2 Issue # 58 ****************************************************************************** Vol.Two Issue # 58 The Surveillance List Mar.12,1997 Over 1500 Members Worldwide ****************************************************************************** IN THIS ISSUE... ****************************************************************************** 01) Need a background check 02) Spy shop owners admit to selling illegal bugs 03) Is this the Surveilance list or a hack list? 04) A first question, and a few things I found about locks ... 05) Caller ID Question 06) re: hacking AOL Email 07) Course on executive protection 08) Optoelectronic XPlorer 09) Mirrors 10) Intro 11) Monitoring a baby's room 12) Publishers 13) Re: A question... 14) Moderator's Note 15) FS PANOSONIC TIME LAPSE VCR MINT ****************************************************************************** DON'T BE A LURKER.... GET INVOLVED... YOU ARE A MEMBER... MAKE THE MOST OF IT ****************************************************************************** 1)From: AKJules@aol.com Subject: Need a background check I have a question. I need a background check and an extensive background check, with finances, criminal history on someone in Philadelphia, PA. Do you know of someone who could help me or do this for me - - a private investigator. Thanks. AKJULES@AOL.COM ************************************************************************** 2)From: jmatk@tscm.com (James M. Atkinson, Comm-Eng) Subject: Spy shop owners admit to selling illegal bugs What fine news, These guys used to brag about how they were so untouchable, and about how they were above the law. Looks like their attorneys weren't as good as they thought? Score one for the good-guys In reality the products they were selling were crappy little toy devices that could be built for under twenty dollars. -jma ====================================================================== Spy shop owners admit to selling illegal bugs -- The Associated Press NEW YORK (Mar 10, 1997 1:13 p.m. EST) -- Three executives of the nation's biggest chain of spy shops pleaded guilty Monday to charges they illegally sold eavesdropping equipment that had been smuggled into the country. The powerful bugs, hidden in functioning ballpoint pens, calculators and electrical outlets, were smuggled through U.S. Customs so The Spy Factory could sell them to anyone rather than just law enforcement officers who were entitled to buy them, prosecutors said. The Spy Factory, based in San Antonio, sold transmitters that were much more powerful and had much greater transmission range than the Federal Communications Commission would allow. The transmitters also operated on frequencies reserved for the U.S. government and military. The pleas entered by Spy Factory owner Ronald Kimball and general manager Marlin Richardson were part of plea agreements that interrupted their two-week trial and resulted in most of the charges being dropped. Kimball also agreed to turn over all the company's assets to the government and close the stores, said Marvin Smilon, spokesman for U.S. Attorney Mary Jo White. "I accept full responsibility for my conduct," Kimball told U.S. District Judge Sonia Sotomayor. Kimball and Richardson pleaded guilty to conspiracy, possession and sale of wiretap devices and possession and sale of smuggled wiretap devices, charges that carry a maximum sentence of 15 years in prison and $750,000 in fines. Spy Factory employee Tracy Edward Ford pleaded guilty to possessing and selling bugging and wiretapping devices, charges that carry up to 10 years in prison and $500,000 in fines. Defense lawyers had portrayed the defendants as patriotic Americans who became overwhelmed by their store's success and growth into a 19-shop national chain. Sentencing was scheduled for July 1. =============================================================== "If it doesn't involve a torque wrench, then it's not TEMPEST" =============================================================== James M. Atkinson Phone: (508) 546-3803 Granite Island Group - TSCM.COM 127 Eastern Avenue #291 http://www.tscm.com/ Gloucester, MA 01931-8008 jmatk@tscm.com =============================================================== The First, The Largest, The Most Popular, and the Most Complete TSCM Counterintelligence Site on the Internet =============================================================== ************************************************************************** 3)From: Bret Watson Subject: Is this the Surveilance list or a hack list? Now before people start chanting "Information just wants to be free" let it be known that I pick-up some 20-odd mail lists related to computer security - after all it is my profession. I've been noticing posts on "how to I hack the cable accounts" and "how do I hack AOL". My comments - don't post it here - the experts on hacking are more likely to be on something like alt.2600 or 8lgm than a surveillance list. And why do you want to hack AOL anyway - get a _real_ ISP! Keep the surviellance and intelligence posts coming! esp. info on conferences! (Thanks Dominic!). A comment of microphones - if you have the oppourtunity - look at the PZM mic from tandy electronics (Radio Shack over in the US I think) The clarity is supurb, and the backplane can be customised for many patterns. Its no good for distance (the pattern is basically a sphere) but it doesn't look like a mic so it can be brought very close in. I use it for interviews - the interviewee doesn't freeze up - because they don't recognise it as a mic. Best still I can plonk it on the table! Cheers, Bret Bret Watson & Associates bwa@usa.net phone +61 41 4411 149 fax +61 9 454 6042 Computer & Information Security Consultants +++Moderator's Note+++ Bret, you are correct. This a is a surveillance, countersurveillance & privacy list but I also think hacking is a viable surveillance/countersurveillance topic. It's used worldwide for surveillance (and other) purposes. Many on this list are interested in both how it's done & how to protect against it. Hacking posts help in teaching both. I also agree with you that there are many computer & hacking lists (which I subscribe to also) and I would also like to keep the list centered on surveillance but such questions and responses fall within our "list rules" guidelines. ************************************************************************** 4)From: icathar@club-internet.fr Subject: A first question, and a few things I found about locks ... Hi all ! I am not on the PI side (anyway, in France, they do not have the same legal status you most have, I think). I am a consultant in C4I problems (computers for the military), and work a lot on open sources intelligence. I was asked by a friend, whose job is driving official guys, to look where to find the following system : a transparent audio-ear with a microphone you can fit in your sleeve, so as to be able to both drive and communicate ... any idea ? About the locksmith thread, I found the following while quicly searching on the Net : Loompanics Unlimited, PO Box 1197, Port Townsend, WA 98368, USA ; I haven't found any Internet adress ; http://www.cs.swarthmore.edu/~weiler/locks/impressioning.html is a document about impressioning keys. I still haven't read it, so I can't tell you bout its quality ... finally, http://www.halcyon.com/cary/webpage07.html is a warning about book publishers like Paladin, Loompanics ... Any comments ? Well, thank you for your help, a bientot ! Jean-Francois LOEWENTHAL, PARIS ************************************************************************** 5)From: David Gutierrez Subject: Caller ID Question I'm very impressed about all your products and mostly about the tricks of tapping , bugging phones, etc. I believe you are the right persons to answer me the following question : Two months ago I was looking for a caller ID device wich could be use in my country. I spoke with some people from my telephone company in order to have the service of decoding phone calls, but they told me that caller ID devices from the States don't work in my country because they decode digital signals; no analogs wich are the ones we use here. So, my question is : is it truth that these kind of Caller ID devices can not be used in my country ? I do not understand it at all, because one of my phone lines works with touch tone. By the other hand, I downloaded caller ID software (callaudit), but it seems like I need a modem with caller ID. A person told me that wether or not our phones lines digital or analog, this kind of sotware will bw able to decode phone calls; is it truth ? And my last question is : is there anyway to decode phone calls without having the service from the telephone company ? Please I would appreciate your prompt answers. Note : forgive my english; I hoped you understood me. Thank you very much. David Gutiérrez email : dagutier@anditel.andinet.lat.net Bogota - Colombia ************************************************************************** 6)From: "Stephen Douglas" Subject: re: hacking AOL Email There is software out there called AOHell. This software allows you to get online under a phoney account, send anon. email, hack email, monitor a chat room unnoticed, put words into other peoples mouths on chat rooms, and a host of other neat little features that are reserved for AOL sysops. Some say you can do more with AOHell than an AOL sysop can do from the server. It is said that AOL has their own Hackers whose sole purpose in life is to find AOHell on the web, hack into that site and destroy it! AOHell is out there but it moves and dissapears often. If anybody know where I can get a copy, I want one. Stephen Douglas K6HZT http://www.dfsystems.com ************************************************************************** 7)From: JoeSleuth@aol.com Subject: Course on executive protection looking for PROFESSONIAL who can write a course on executive protection contact dean Joe Alercia lion investigation academy 434 clearfield st bethlehem pa 18017 or call 610-865-0402 ************************************************************************** 8)From: caldwell Subject: Optoelectronic XPlorer If anyone has some experience with the Opto XPlorer, could I please get a review of what you think about it? Thanx. G.J. Caldwell, VSM ************************************************************************** 9)From: Chuck Wills Subject: Mirrors What kind of two-way mirrors and mirror video-cam setups are available and what are the prices? Thanks CW ************************************************************************** 10)From: Manatau Subject: Intro My name is "Ken" I have over 20 yrs. in investigation, surveillance and detection. I retired about 10 yrs. ago but am now so bored that I opened a new compny in Vegas. Surveillance/Surveillance detection service. I cater to the casino industry and foreign law enforcement. All my old sources for equipment seem to have been put out of business by the Fed's. Looking for new sources for equipment. Only the best no equipment from any place that has the word "Spy"in its name and please no K-Mart stuff. I employee a electronics engineer that can build anything and we are presently working on Ultrasonic transmitters. Hope to hear from some pro's on what is new and where to find it. Thanks Ken (Manatau) ************************************************************************** 11)From: latitude@netcom.com (latitude) Subject: Monitoring a baby's room A friend of mine, who just had a baby, is about to engage the services of a baby-sitter. She would like to monitor the quality of care the baby will receive. If anyone can recommend a good device for this purpose, please let me know. Many thanks, -- Carlos Valdes Latitude@netcom.com ************************************************************************** 12)From: "Karl Kiefert" Subject: Publishers I would like to contact publishers who would supply books to a small British mail order business, dealing in subjects like surveillance, security, privacy, police science, lock smithing, crime, investigation etc. and similar subjects. Thanks ************************************************************************** 13)From: Mark De Leon Subject: Re: A question... Hello Jeff, Here is a general introduction to Intel. Intelligence is defined as the product resulting from the collection, evaluation, analysis, integration, and interpretation of all infromation that concerns one or more aspects of foreign countries or areas, whic is immediately or potentially significant for the developement or execution of plans, policies, and operations. Intelligence information si of three types: 1. Basic Intel - deals with the past and is relatively permanent. 2. Current Intel - deals with present. 3. Intel estimates - deals with future or the unknown by possible present. There are three categories: Startegic, Operational, and Countering. There are four phases: requirements, collection, production, and dissemination. The following are the methods of operations: overt- conducted openly covert-planned and excuted to conceal the id discreete-conducted cautiously to avoid undue couriosity. clandestine-planned and executed to conceal the existence of the operation itself. Primary Intelligence Informeation sources: 1 Imagery (IMINT)-Photo's from ground and air. 2. Electronic (ELINT)- Electronic interception of communications (i.e. Radar, Radio, ect...) 3. Acoustic Disturbances (ACINT)- Sound may be radiated in wave form through fluid media such as air and water. 4. Human Beings (HUMINT)- Here is how the services rate in my opinion: Air Force: Advancement- Slow Standard of living- High Training- Excellent Probably the best in all intel fields except Human Intel. Army is the best. (Don't get me wrong, the Air force is good, but I feel the Army is top notch in this area.) comment: The Air force is structed differently than the other services. The do not advance fast, however the way the treat there people is far above the other services. (plus the training is great). Army: Advancement- good Standard of living- good Training- great They are the best in Humint. There are some changes coming soon but I feel that it will not effect this area that much. (lot of time in the field) Navy advancement- good standard of living-fair training- needs improvement The main problem is that you are mainly a genral intell guy. You realy do not specialize in any one field. The do have speciality schools, however you do not always work in that speciality. Lot of Sea duty. (okay if your single.) Marines advancement- fair standard of living- fair Training- okay. What's to say. Coast Gaurd They have some good training. The guys I've met are sharp. This is if you go Enlisted. If you have college. Go officer!!!!!! Do not let them get you in as Enlisted. (if you go Navy. Officer is the only way to go.) If you do not have a college degree get one while your in. Airforce would be the best pick. Side note. There are plenty of Intel jobs in other gov. agencies and private sector. What you need to do is plan carefully and Know what you Want. (easier said than done.) I hope This helped you out. If you have any questions or comments e-mail me. If I can not help I will get someone that can. MD> ************************************************************************** 14)From: SpyKing@thecodex.com Subject: Moderator's Note MY ISP seems to have ironed out their access problems and service seems to be back to normal. This is the first problem I've had with them in three years so I'm willing to give them the benefit of the doubt. They've even added ISDN which I'm going to explore... If you've mailed something to me in the last two weeks or to the list and it has not appeared or you've gotten no response please resend... The list has grown to a little over 1500 members from approx 28 countries around the world. We have members with very diverse backgrounds and areas of expertise. There is a LOT of brainpower here... We also have a TON of LURKERS... get involved people, this list is what YOU make of it... fj ************************************************************************** 15)From: Tom Goodman Subject: FS PANOSONIC TIME LAPSE VCR MINT $500 Panosonic AG-6040 VHS Time lapse vcr like new. $500 or best offer Tom ************************************************************************** Who are you? What's your specialty and/or interest? Let us know about your company... What would you like to see on the list? Post it. Let us know... Do you have something to contribute? We'd like to hear it... We want to know EVERYTHING and ANYTHING about eavesdropping, surveillance, countersurveillance & privacy related technology, etc... Remember: who, what, where, when, how & why... we want ALL the details... Do you have a question? Post it... A little free time? Help a member... With the INCREDIBLE brain power on this list, someone should have the answer ;-) P.S. Don't be a LURKER... Members take the time to post info for us all... give something back... Don't just take... Your input/knowledge is valued... ************************************************************************** Send Postings to: 6886@mne.net with "Post" in subject field with subject ************************************************************************** Subscribe to: 6886@mne.net In the subject field type: subscribe-surveillance list e-mail address ************************************************************************** Unsubscribe to: 6886@mne.net In the subject field type: unsubscribe-surveillance list e-mail address ************************************************************************** ...The Simple Rules of the Surveillance List... The Surveillance List Owners may Reject any posts that are/contain: 1) Info Unrelated to Eavesdropping, Surveillance or Privacy technology... 2) Flames or Negative posts... 3) E-Signatures that are considered excessive... 4) Advertisements not DIRECTLY related to the list topics... 5) Attached Files... 6) Oversized Posts... (May be edited to save room) **************************************************************************** This publication is copyrighted and is protected by U.S. and International copyright law. The information transmitted on this list may not be reproduced, reposted or forwarded to any non-list member without expressed written permission of the List Owner. Violation of U.S. copyright law is a criminal and civil offense... **************************************************************************** The Surveillance List is moderated by SpyKing@thecodex.com The List Owner will make EVERY effort to protect subscribers from spam... Copyright 1996, 1997 Codex Publishing Inc., All Rights Reserved... **************************************************************************** Vol 2 Issue # 59 ****************************************************************************** Vol.Two Issue #59 The Surveillance List Mar.13,1997 Over 1500 Members Worldwide ****************************************************************************** IN THIS ISSUE... ****************************************************************************** 01) Re: Mirrors 02) Re: Hacking AOL Email - More 03) RE: laser listening device 04) RE: Monitoring a baby's room 05) Re: AoHell 06) Clothing Security "Button's" 07) Three questions 08) Request for info 09) How to? 10) Back Issues 11) Re: Microphones 12) Re: Covert Communications ****************************************************************************** DON'T BE A LURKER.... GET INVOLVED... YOU ARE A MEMBER... MAKE THE MOST OF IT ****************************************************************************** 1)From: rockhous@ny.frontiercomm.net Subject: Re: Mirrors >What kind of two-way mirrors and mirror video-cam setups are available and >what are the prices? >Thanks >CW CW, I have a company on the Internet called Rock House Products. We carry a large selection of Surveillance Cameras, Equipment and Accessories. Up until now I did not have a source for true two way (transparent) mirror glass. I have just started dealing with a company that has such. It looks like the price will be around $30.00 sq/ft plus crating and shipping. This product is not listed on our web site as of yet. You can view our other surveillance products at: http://ny.frontiercomm.net/~rockhous/ We offer unlimited technical assistance and application specifications over the phone. If I can be of any help please feel free to contact me. Best regards! John Palmeri Rock House Products P.O. Box 2001 Monroe, New York 10950 USA Phone 1-914-692-4077 Fax 1-914-692-4299 USA rockhous@ny.frontiercomm.net http://ny.frontiercomm.net/~rockhous/ Visa & MasterCard are Accepted ************************************************************************** 2)From: LazySkillz@aol.com Subject: Re: Hacking AOL Email - More AOHELL is a lame program. AOL has pretty much cracked down on this program rendering it useless. Does anybody know any other ways to hack into an AOL account and read the person's email, etc? Or perhaps a way to intercept Instant Messages that the person sends? ************************************************************************** 3)From: " Lorenzo Castillo Sanchez" Subject: RE: laser listening device >Date: Thu, 06 Mar 1997 18:05:28 -0500 >1)From: John Harkin >Subject: Suppliers? > >Could anyone tell me the phone # or address to a company called Shomer Tec. Also i need to know who makes a laser listening device (like in Clear & Present Danger). The device you saw in that movie - Clear and Present Danger, is too conspicous to be a laser listener. If you've kept track of some of the previous postings about laser listeners, the ones with the red dots are available from Info Unlimited but it has a short range. The "real" laser listeners shoot an invisible laser beam which is not detectable to the naked eye. You can buy it from STG - Surveillance Technology Group, based in California. I'm not too sure about the location. I'll check it up. The ones they sell in STG have a range of about 200 feet. Compared to the one from Info Unlimited which has a 50 feet range, it's much better. However, those are for law enforcement only. And in case you are not with the law enforcement, they are very fond of people who request info and they might check you out. I've been searching for info on home-built laser listeners but the best one available on the market is the construction plan you can order from Info Unlimited. ************************************************************************** 4)From: rockhous@ny.frontiercomm.net Subject: RE: Monitoring a baby's room >A friend of mine, who just had a baby, is about to engage the services of >a baby-sitter. She would like to monitor the quality of care the baby >will receive. If anyone can recommend a good device for this purpose, >please let me know. >Many thanks, >Carlos Valdes Carlos, I have a company on the Internet called Rock House Products. We carry a large selection of Surveillance Cameras, Equipment and Accessories as well as "Nanny Cams". We probably have a Nanny Camera that would work well for your friends application. You can view these products at our web site: http://ny.frontiercomm.net/~rockhous/ We also offer unlimited technical assistance and application specifications over the phone. If I can be of any help please feel free to contact me. Best regards! John Palmeri Rock House Products P.O. Box 2001 Monroe, New York 10950 USA Phone 1-914-692-4077 Fax 1-914-692-4299 USA rockhous@ny.frontiercomm.net http://ny.frontiercomm.net/~rockhous/ Visa & MasterCard are Accepted ************************************************************************** 5)From: diablo@jorsm.com Subject: Re: AoHell Stephen I spent four long (tedious) years with AOL, and it's whole underground scene, and let me tell you, it was extremely disappointing. The AOHell which seems so omnipotent is nothing more than a set of macros. I never found any TRULY useful features. It mostly comprised of such things as sending large amounts of trash e-mail, or vast numbers of IM's (Instant messages, for those who have never been there). In all honesty, I think that the majority of AOL related programs are nothing to write home about, and nothing near the access of theis sys-ops. In fact, the last time I used AOL (9+ months ago), their software disconnected you instantly for the cheesy pranks. I dont think there have been any breakthroughs that carry that much weight throughout the last year. Anybody? Jeff -- Jeff "Know the enemy and know yourself; in a hundred battles you will never be in peril" - Sun Tzu ************************************************************************** 6)From: Jerry Manley Subject: Clothing Security "Button's I bought 12 dozen golf type shirts from a store that went broke. I plan on reselling these at a flea market but they all have the security plastic "buttons" or "rectangular" shapes to prevent shoplifting. Does anyone have any suggestions on how to open these? Do I have to get one of the plastic "guns" and if so where do I get one? Would appreciate any help you could offer. Thanks! ************************************************************************** 7)From: LIAM Subject: Three questions Hi everyone, i have three questions i would like answered if possible, starting with the first. I am ready to purchase a caller ID unit from the USA, but would like to know which countries it will function in. Secondly does anyone have knowledge on fingerprint techniques, for example getting prints of a wine glass or any other object. And last but not least does the moderater or surveillance list members not agree with me that the list should contain more info on," how to obtain more secrets on tricks of the trade and techniques and obtain knowledge in the area of investigation and surveillance ect. P.S. ONCE AGAIN THANKS FOR YOUR CONTINUED SUPPORT. +++Moderator's Note+++ I do agree. The list is what you make it. Post something... ************************************************************************** 8)From: "George Y. de Randich" Subject: Request for info as to the relative ferocity of the "Rhodesian Ridgeback" breed of dog. I have the need to have any information; anecdotal or statistical; as to the ferocity of the breed of dog "RHODESIAN RIDGEBACK" as compared to the German Shepard {Alsacian Hound} or the Collie. I further need to confirm that the breed is an African Hunting Dog used in hunting Lions. George Y. de Randich, George de Randich Investigations, 5600 Poinsettia Avenue; Suite #1102, West Palm Beach, Florida 33407-2649, U.S.A. ************************************************************************** 9)From: Emilio Giberti Subject: How to? Modify an inexpensive tape recorder for Long play ************************************************************************** 10)From: SpyKing@thecodex.com Subject: Back Issues The archive of ALL back "Surveillance List" issues is available. I will send file upon request. Warning... file is now 1.25 MB - Many of the current list questions can be answered by reviewing the back issues... ************************************************************************** 11)From: SpyKing@thecodex.com Subject: Re: Microphones >From: WWMason@aol.com >Subject: Re: mics > >With all the knowledge out there, I 'd like to hear what type of miniature >microphones work best in surveillance situations. I've tried a number of >different "spy mics", radio shack mics, and amplifies mini mics. Biggest >problem is trying to isolate conversation from other noise. >It seems the >better the mic, the more peripheral noise it picks up to drown out the >subject conversation. whether it's airplanes flying over, cars going buy, or >muzak playing over the intercom, I seem to always have trouble getting clear >conversation. anyone can get it in a hotel room, or private office. the >challenge is in a warehouse settting, or outdoors. What works best for you? Try Louroe Systems, 6156 Lemona Ave, Van Nuys, Ca. 91411 Tel: 818-994-6498. They make a number of microphones and amplifier units for surveillance purposes. I've found them very good in the past. The Pegasus system Trace Carpenter mentioned is quite good also. Louroe is MORE expensive but a quality product. If you're serious about recording quality you must explore the various methods of audio tape enhancement. No one microphone or system will do the right job "all the time". Depending on the situation, you must have a "stable" of devices to employ. There are various hardware and software applications that will allow you to "filter out" extraneous background sound, tape hiss, etc. after a recording is made. These are a "must" for the serious professional... ************************************************************************** 12)From: SpyKing@thecodex.com Subject: Re: Covert Communications >From: icathar@club-internet.fr >Subject: A first question, and a few things I found about locks ... > >Hi all ! >I am not on the PI side (anyway, in France, they do not have the same legal >status you most have, I think). >I am a consultant in C4I problems (computers for the military), and work a >lot on open sources intelligence. > >I was asked by a friend, whose job is driving official guys, to look where >to find the following system : a transparent audio-ear with a microphone you >can fit in your sleeve, so as to be able to both drive and communicate ... >any idea ? Try Telex-Magum in Minneaplois, MN Tel: 604-887-5550. They manufacture the Ear-Mike. It's a device that when plugged into a portable belt-worn radio (walkie-talkie) is worn in the ear. It allows for both push to talk and vox (voice activated) communications. It allows the user to both hear and speak through the transducer placed in ear. No need to raise the radio to your mouth to talk. The in-ear microphone/receiver picks-up the vibrations from the inner ear and is quite clear. It's completely hands-free. Several other radio manufacturers such as Maxon market similiar systems as an option... ************************************************************************** Who are you? What's your specialty and/or interest? Let us know about your company... What would you like to see on the list? Post it. Let us know... Do you have something to contribute? We'd like to hear it... We want to know EVERYTHING and ANYTHING about eavesdropping, surveillance, countersurveillance & privacy related technology, etc... Remember: who, what, where, when, how & why... we want ALL the details... Do you have a question? Post it... A little free time? Help a member... With the INCREDIBLE brain power on this list, someone should have the answer ;-) P.S. Don't be a LURKER... Members take the time to post info for us all... give something back... Don't just take... Your input/knowledge is valued... ************************************************************************** Send Postings to: 6886@mne.net with "Post" in subject field with subject ************************************************************************** Subscribe to: 6886@mne.net In the subject field type: subscribe-surveillance list e-mail address ************************************************************************** Unsubscribe to: 6886@mne.net In the subject field type: unsubscribe-surveillance list e-mail address ************************************************************************** ...The Simple Rules of the Surveillance List... The Surveillance List Owners may Reject any posts that are/contain: 1) Info Unrelated to Eavesdropping, Surveillance or Privacy technology... 2) Flames or Negative posts... 3) E-Signatures that are considered excessive... 4) Advertisements not DIRECTLY related to the list topics... 5) Attached Files... 6) Oversized Posts... (May be edited to save room) **************************************************************************** This publication is copyrighted and is protected by U.S. and International copyright law. The information transmitted on this list may not be reproduced, reposted or forwarded to any non-list member without expressed written permission of the List Owner. Violation of U.S. copyright law is a criminal and civil offense... **************************************************************************** The Surveillance List is moderated by SpyKing@thecodex.com The List Owner will make EVERY effort to protect subscribers from spam... Copyright 1996, 1997 Codex Publishing Inc., All Rights Reserved... **************************************************************************** Vol 2 Issue # 60 ****************************************************************************** Vol.Two Issue #60 The Surveillance List Mar.13,1997 Over 1500 Members Worldwide ****************************************************************************** IN THIS ISSUE... ****************************************************************************** 01) Searches available 02) Looking for two quality items 03) COVERT EAR-PIECES 04) Attention Security CCTV Dealers 05) I want to buy DSC Power 832 (Alarm) 06) Norton's FYEO has a backdoor! ~~Verified~~ 07) Security products *** Offers please ! 08) Free Catalog 09) Voice Stress Analyzers 10) Re: Clothing Security Buttons 11) telephone tone ? 12) Sound recordings Re; Request for bst mic's. 13) How To Modify a Recorder Response 14) Laser Microphones 15) Re: Home Computer Snooping 16) Re: Laser Listening Device 17) Reply to fingerprint question ****************************************************************************** DON'T BE A LURKER.... GET INVOLVED... YOU ARE A MEMBER... MAKE THE MOST OF IT ****************************************************************************** 1)From: 01master@gvi.net (THE MASTER) Subject: Searches available HAVE NO FEAR THE MASTER IS HERE!!!!!!!!!!! ******************************************** Hard to get info has never been so easy: THIS MONTHS SPECIALS: RESIDENTIAL TOLL RECORDS $125.00 we will go back up to three months ********************************************** UNLISTED PHONE # $99.00 ADDRESS FROM A PHONE #,THAT YOU GIVE TO US $50.00 BANK SEARCH PER STATE $200.00 BANK SEARCH NATIONWIDE $500.00 *********************************************** we accept all major credit cards ------------------------------------------------ VISIT OUR WEBSIGHT AT THE ESTEEMED CODEX MALL AT: www.thecodex.com/mall/cmi.html ************************************************************************** 2)From: "Seagraves, Glenn" Subject: Looking for two quality items 1. A transmitter that can be attached to a phone line (splice in) that will give good audio transmission. Are the kits available from U-Spy such as the Telephone Transmitter Kit Stock#0332i any good? 2. Voice Type transmitter kit that can be placed in a room and has good audio transmission. Glenn Seagraves glenn.seagraves@ColumbiaSC.ncr.com ************************************************************************** 3)From: "Don Medine" Subject: COVERT EAR-PIECES I am a police officer and have a communications business. I sell Ear-Pieces for portable radios and scanners. The equipment I sell has been tested for reliability, etc... Please email me with you name, address, email address, telephone number, etc... if you would like further information or pricing. The ear pieces I sell consist of a coiled clear audio tube with a fitted ear piece. These are often worn by news-casters, Secret Service Agents, etc... There are other variations available. I have used these communications devices for the past three years as a patrolman. They work great, especially when you don't want to compromise your position with a noisy radio or when you are listening to communication in an area prone to ambient noise. You see, once the ear-piece is plugged into your radio or scanner, the external speaker is deactivated. Complete unit retails for $100-$130. I offer then for around $75.00. Agencies are also invited to inquire. Thanks, Don Medine (510)702.-7500 - Office / Voice Mail ************************************************************************** 4)From: frmrbw@aol.com (Frmrbw) Subject: Attention Security CCTV Dealers Add infrared illuminators to your existing cctv based security systems to gain night vision capabilities. Can be used with any ccd camera. point your browser to : http://members.aol.com/fciampa/online.html ************************************************************************** 5)From: "dmorris" Subject: I want to buy DSC Power 832 (Alarm) Please provide me with a price quote for the following items: 1 ea. DSC Power 832 PC-5010 & LCD-5500 Keypad 1 ea. DSC PC-5508 8 Zone Keypad 1 ea. 12VDC 7 Ah Battery with AC Transformer 2 ea. Interior Motion Detectors 1 ea. 20 Watt Interior siren 1 ea. 30 Watt Exterior siren 3 ea. Roller door contacts to fit in 3/4" hole Please include a shipping price for ground service to Yorktown, VA. 23692 Thanks in advance. Dan Morris ************************************************************************** 6)From: rmplstlskn@flinet.com (Rmplstlskn) Subject: Norton's FYEO has a backdoor! ~~Verified~~ First, some disclaimers. I'm not sure if Norton (Symantics) is the program designer. I believe the program is called "For Your Eyes Only." Now, for the INTEL... According to a Criminal Investigations law enforcement officer (actual agency withheld for his protection) specializing in computer crime and illegal pornography, the popular encryption program, "For Your Eyes Only" has a backdoor available to certified LEO. This officer, in the pursuit of a conviction in an assigned case, was told by Symantics (company name is unsure due to faulty brain cells) that a backdoor to their encryption is available if he possesses a copy of the factory diskettes. A copy of said program was requested at my place of employment. With factory diskettes and specific directions from distributor/programmer, the suspected files encrypted by "FYEO" are said to "break" and become cleartext/binary. The actual sucess of this operation is not verified. Will post results when I get the report on his efforts. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -=> Rmplstlskn <=- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ PGP 2.6.2 Key available from Rmpl's WWW site: ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ "I apprehend no danger to our country from a foreign foe ... Our destruction, should it come at all, will be from another quarter. From the inattention of the people to the concerns of their government, from their carelessness and negligence, I must confess that I do apprehend some danger. ...Daniel Webster, June 1, 1837 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ************************************************************************** 7)From: np61ff@mail.telepac.pt (Augusto Cardoso) Subject: Security products *** Offers please ! We intend to import home security products for the european marketplace. If you are a manufacturer, and interested by export, please send me a message to initiate a more detailed discussion. Thanks. np61ff@mail.telepac.pt ************************************************************************** 8)From: "Dana McCommon" Subject: Free Catalog Ammunition, Clips, Badges, Custom Badges, Badge Accessories, Bail Enforcement Agent Kits, Lots of Books, Bounty Hunter Kits, Certificates, Challenge Coins, The CIA Collection, Clothing and Hats, Custom Id Cards, Document Accessories, Electronics, Federal style Credentials, File Folders, Folio Credentials, Historical Documents, Hologram Laminates, KGB & Stasi Collection, Passports, Press Kits, Self Defense & Security Items, Spy Supplies, Stickers and Signs, Video Library, Windshield Passes and much more. Search for "NIC Law Enforcement Supply CATALOG" http://www.nic-inc.com pres@nic-inc.com ************************************************************************** 9)From: beags@aol.com (Beags) Subject: Voice Stress Analyzers Has anyone had success using a voice stress analyzer for business calls? If so, could you share what type you used, where you got it and how much it was? ************************************************************************** 10)From: Trace Carpenter Subject: Re: Clothing Security Buttons Some of the security buttons can actually be cut off with a pair of dikes. Be careful however, some of them have dye in them which if improperly removed soak into the material rendering them unusable. -- Trace Carpenter,P.I. 214.828.4520 214.828.1917 Facsimile ************************************************************************** 11)From: mfed@ziplink.net Subject: telephone tone ? Hi, I am looking for a device (if there is such a device) that recognizes the dialing tones and can show the number associated with the tone dialed. In effect giving me a tone dialed number by listening to the tone. Is there such a device? Do you have any idea where I can purchase it? Thanks, Mike ************************************************************************** 12)From: Manatau Subject: Sound recordings Re; Request for bst mic's Regardless of the device you use you will always get background etc. I have computer program (expensive) I use to clean up sound recordings and video sound. Can direct you to manufacture or clean up for you cheaper than most sound studios. contact me @ Surveillance/Surveillance Detection Svc. P.O. Box 33653 Las Vegas, NV 89133-3653 Tel. 1-800-368-5655 (code 23) 8AM - 5PM Pacific time USA 702.656.7802 any time K.C. ( Manatau) ************************************************************************** 13)From: Trace Carpenter Subject: How To Modify a Recorder Response You had asked how to modify an inexpensive recorder for long play. If you want to do it cheaply there are a variety of ways but since you seem to be asking for the "bargain basement variety" I'll start there. 1) Go to K-Mart and buy the cheap GE $24 recorder. 2) Open it up and take the motor out. 3) Take a flat-blade screwdriver and pop the bottom off the motor. (you'll break the circuit board in the process, but thats ok) 4) Remove the circuit board and get rid of it. 5) You'll now see two metal contacts. As I recall the one closest to where the wires go in is B+. Try it and if the motor turns the wrong way reverse them. Take two pieces of hook-up wire and push one down in the hole next to each contact to hold them in place, and then place a drop of solder on each one to firmly affix it. 6) Place the motor back in. 7) Now you will need to build a simple circuit to operate the motor. You'll need a couple of diodes to place in series (1N4007 / ECG125), a resistor (50 ohm.2 watt), and a pc board. If you have trouble finding a 2 watt resistor just put 4 1/2 watt 220 ohms in parallel. Hook it up like this: B+----WMW----[ |]----[ |]----Ground | |__________B+ to motor This will give you a stable voltage to control the motor, & with the pc board out it will allow it. If you want to double the amount of time it'll run, take the plastic pulley off of the motor shaft and cut it in half. then place it back on the shaft with the belt running between the two halfs. You'll want to super glue them in just the right spot so you still get good belt friction, or it'll jump. Now for problem control. No two diodes are EXACTLY the same. If you want to make matched sets of recorders, you'll need to be able to calibrate them. To do this, pick one to be the "master recorder" you'll clone the others to match it. First place a potentiometer in line going to the + lead on the motor. This will allow you to speed up and slow down the motor. Now record a tone on the master recorder such as 1000Hz. Play the tape on the recorder to be cloned and use a frequency counter on the speaker lead with the sound. Tune the pot until it reads 1000Hz. Now it's calibrated. This system should cost you about $30 total to build. Hope this helps. Call or send me an e-mail if you have any questions. -- Trace Carpenter PI/Tech 214.828.4520 214.828.1917 Facsimile +++Moderator's Note+++ This is the same type of technique used by the "spy shops" and other vendors of "Long Play Recorders". They basically sell recorders that cost UNDER $50. with this mod for $200.-$375.USD. Not a bad profit... Trace just saved you a bundle list members... and made the "Spy Shop" owners cringe. ;-) ************************************************************************** 14)From: Allan Clearwaters Subject: Laser Microphones I am looking for sources and pricing for laser microphones/eavesdropping equipment in the UK. I'd appreciate it if you could give me any leads. Thanx, Al ----------------------------------------------------------------------- | Email: Address: | | Allan.Clearwaters@btinternet.com Allan Clearwaters | | allan@aclearw.demon.co.uk The Object Forge Ltd. | | Phone: 44+(0)1684-311344 Hanley Workshops | | Fax: 44+(0)1684-311056 Hanley Swan, Worcs. | | WR8 0DX UK | ----------------------------------------------------------------------- ************************************************************************** 15) From: "N.R. Parker" Subject: Re: Home Computer Snooping A recent inquiry on the list was in relation to Home Computer Snooping. A program called RedHand will keep an eye on your PC when no one's home. It is called "RedHand" and comes from the UK. It is available from : www.pavilion.co.uk/harddrive/welcome.htm The latest version is RedH225.zip. ************************************************************************** 16)From: Hfuhs@aol.com Subject: Re: Laser Listening Device Depending on who you try to listen to, I would definitely not recommend to use ANY laser listening device. Even not the most professionally one money can buy! Even laser listening devices which are using an invisible laser beam can be spotted within a few seconds when an knowledgable person is using the right set of optical filters. These filters are making the laser beam visible for the human eye and you can even detect (see) the source of the laser beam (from where the laser is being shot). Appropriate filter sets are relatively easy and cheap available. Greetings from Germany Howard Fuhs ************************************************************************** 17)From: William Sullivan Subject: Reply to fingerprint question Quick and easy way to develop fingerprints is by using superglue. It will adhere to your print making visable on the wine glass. It can then be photgraphed, dusted to enhance it, or lifted with a tape. Put a small amount of superglue in a fairly enclosed area-old aqaurium works nice, or just a bag over object, and in a few minute you will see prints if they are there. WORD OF CAUTION- do not use superglue fuming near your computer-has not happened to us, but I have heard horror stories. If you need more details e-mail me.- William B. Sullivan-Forensic Consulting Specialties 1107 N. McBride St. Syracuse NY 13208 315-472-3113 Fax 315-472-8712 E-Mail medlgl@baldcom.net http://www.f-c-s.com Charter Member Global Investigators Network, Assoc. Lic. Detectives of New York, Fellow American Academy Of Forensic Sciences ************************************************************************** Who are you? What's your specialty and/or interest? Let us know about your company... What would you like to see on the list? Post it. Let us know... Do you have something to contribute? We'd like to hear it... We want to know EVERYTHING and ANYTHING about eavesdropping, surveillance, countersurveillance & privacy related technology, etc... Remember: who, what, where, when, how & why... we want ALL the details... Do you have a question? Post it... A little free time? Help a member... With the INCREDIBLE brain power on this list, someone should have the answer ;-) P.S. Don't be a LURKER... Members take the time to post info for us all... give something back... Don't just take... Your input/knowledge is valued... ************************************************************************** Send Postings to: 6886@mne.net with "Post" in subject field with subject ************************************************************************** Subscribe to: 6886@mne.net In the subject field type: subscribe-surveillance list e-mail address ************************************************************************** Unsubscribe to: 6886@mne.net In the subject field type: unsubscribe-surveillance list e-mail address ************************************************************************** ...The Simple Rules of the Surveillance List... The Surveillance List Owners may Reject any posts that are/contain: 1) Info Unrelated to Eavesdropping, Surveillance or Privacy technology... 2) Flames or Negative posts... 3) E-Signatures that are considered excessive... 4) Advertisements not DIRECTLY related to the list topics... 5) Attached Files... 6) Oversized Posts... (May be edited to save room) **************************************************************************** This publication is copyrighted and is protected by U.S. and International copyright law. The information transmitted on this list may not be reproduced, reposted or forwarded to any non-list member without expressed written permission of the List Owner. Violation of U.S. copyright law is a criminal and civil offense... **************************************************************************** The Surveillance List is moderated by SpyKing@thecodex.com The List Owner will make EVERY effort to protect subscribers from spam... Copyright 1996, 1997 Codex Publishing Inc., All Rights Reserved... **************************************************************************** Vol 2 Issue # 61 ****************************************************************************** Vol.Two Issue #61 The Surveillance List Mar.14,1997 Over 1500 Members Worldwide ****************************************************************************** IN THIS ISSUE... ****************************************************************************** 01) Re: Telephone tone ? 02) Surveillance Tapes 03) PI in Columbia/Baltimore, MD 04) FS: VHF FM Transmitters 05) Pager Decoder 06) Heres my problem & LOCK IMPRESSIONING 07) Re: Telephone tone? 08) Pager Cloning - Need Reference 09) Old classmates and friends 10) Timer for Recorder 11) Want information on CCS 12) Telephone Tones 13) Re: AOLHell 14) Software for video enhancement? 15) Point 'n Crypt Professional 1.5 ****************************************************************************** DON'T BE A LURKER.... GET INVOLVED... YOU ARE A MEMBER... MAKE THE MOST OF IT ****************************************************************************** 1)From: CrACKeD Subject: Re: telephone tone ? > I am looking for a device (if there is such a device) that recognizes > the dialing tones and can show the number associated with the tone > dialed. In effect giving me a tone dialed number by listening to the > tone. Is there such a device? Do you have any idea where I can purchase > it? There is such a device. In fact, there are many such devices, and it just so happens that I recently wrote a review (below) of a few such devices for root zine (http://www.openix.com/~mutter). [begin] I'm sure we all know how critical the ability to decode DTMF tones in real time is to the everyday phreak/hacker/ham. Phone numbers, mailbox and account numbers, security and access codes and signalling tones are just a few examples of what's out there waiting to be decoded. Finding the right DTMF decoder for the right price can be tough since so few of them, and you certainly won't find one in your local grocery store. I've compiled a short list of the most popular units available including a quick summary of their features and current prices. You should have no problem choosing the right decoder for your needs and budget. Ramsey Electronics, Inc. sells a desktop tone decoder kit for $99.95, with a matching case available for $14.95. A fully assembled unit costs $149.95. This decoder features 256 character non-volatile memory, a large 8 digit scrollable LED display, capability of running from 7 to 15 VDC and stable crystal controlled circuitry. It's easy to stack on top of other items and is easy to read thanks to a large LED display. This unit is not well suited for extended portable use due to both its size and also because its LED display will leave you with a dead battery in a short amount of time. Ramsey Electronics has a free catalog available which you may request by phone. You may contact Ramsey Electronics, Inc. at 793 Canning Parkway, Victor, NY 14564 or by phone at 800-446-2295. JDR Microdevices sells the same decoder unit Ramsey Electronics, Inc. sells, but this unit is only available in kit form. Their price is $99.95 for the kit and $14.95 for a matching case. You may order a free catalog from JDR Microdevices by either filling out a form provided on their web site at www.jdr.com or by phone at 800-538-5000. Their mailing address is 1850 South 10th Street, San Jose, CA 95112-4108. DSchmidt Technologies sells two decoder units, the Stealth DTMF decoder and the LCD DTMF decoder. The Stealth features a very compact size, 512 character non-volatile memory and RS232 output either in real time or from previously decoded numbers. A fully assembled and tested unit is available for $40, or the same unit in kit form is available for $30. This unit features no display, so it's best suited for an application which would require you to either carry the unit covertly or leave it somewhere to be picked up later. The second unit sold by DSchmidt Technologies, the LCD DTMF decoder, has all the same features as the Stealth; however, it has a 511 character non-volatile memory and a 16x2 scrollable LCD display. This unit is available for $70.00 assembled, or $50.00 in kit form. Both of these units are well suited for portable use due to their size and low current draw (DSchmidt claims 60 hours from one 9-volt battery). They will run from a power source as low as 5.2 VDC or as high as 40 VDC. Cases for these decoders must be supplied by the purchaser if needed. DSchmidt Technologies may be reached by mail at 191 Madera Ave, Ventura, CA 93003, by phone at 805-676-1092, or you may browse through their web site at www.rain.org/%7Edschmidt to see pictures of their decoders. Motron Electronics sells an assembled DTMF decoder board featuring a 8-digit scrolling LED display, 104 character non-volatile memory, serial ASCII output and included logging software. The assembled board is available for $59.00 and a plastic mounting kit is available for $15.00. This unit requires a 12 VDC power source and is a bit large, making it best suited for stationary applications. This unit will take up a bit more vertical shelf space and isn't going to stack on other equipment easily, but after you compare its price against similar units sold by Ramsey Electronics and JDR Microdevices that may not be a problem. Motron sells two other decoder units, the Tone Master TM-16a Plus and the standard Tone Master TM-16a. Both units feature a scrollable LCD display capable of displaying 16 digits at a time, 80 character memory, rotary decoding ability, black metal cases, a built-in speaker with an amplifier and volume control, two decoder speed settings and the capability to run off a 9 VDC power source. The Tone Master TM-16a Plus has the additional feature of ASCII serial output and remote data entry. The TM-16a Plus will set you back $249.00, and the standard TM-16a will set you back $179.00. These units aren't cheap, but they're packed with features, have durable cases, low current draw and are ideal for serious portable or stationary use. However, the LCD display is not well suited for viewing in low-light conditions and neither unit (measuring 2.75" x 6.1" x 1.2") will fit in your shirt pocket. Motron Electronics may be mailed at 310 Garfield St., Suite 4, P.O. Box 2748, Eugene, OR 97402. You may also request a catalog from Motron Electronics by phone at 800-338-9058 or browse their web site at www.motron.com. Note that every unit covered in this article is capable of decoding all 16 DTMF digits (0-9, A-D, #, *). All accept an audio signal from any device such as a radio reciever or telephone. Now it's time to reach into that bottomless wallet of yours, dig up a soldering iron from your pile of tangled wires and split circuit boards, and get that decoder built which you always wanted as a kid. [eof] Any of those will accept audio from a tape player as well, FYI. HTH. CrACKeD +++Moderator's Note+++ Great article. This article, Trace Carpenter's article on modifying tape recorders for long play which appeared yesterday, and several other recent articles are the reason this list was started. The exchange of "technical information"... We succeed in doing that. That's why this list if having the phenomenal growth rate is is currently experiencing. The word is spreading... Don't be a lurker... Contibute when you can... give something back to the list! ************************************************************************** 2)From: wetsu42@aol.com (Wetsu42) Subject: Surveillance Tapes Can somebody tell me who owns the rights to a security camera video on which a crime has been recorded? What rights does the victom have? The criminal? Can the owner of the building/eqipment/business do with them as he pleases? What if they were used as evidence in a trial, do the rights to ownership change? I know this is a lot of questions but help is needed. Are there any relevant case histories or precidents I could look at? ************************************************************************** 3)From: "Craig Shevlin" Subject: PI in Columbia/Baltimore, MD Looking for PI who specializes in domestic/family survielence in the Columbia/Baltimore area of MD. Email: Shevlin@staffnet.com Craig S. Shevlin ************************************************************************** 4)From: andy.sasc@ukonline.co.uk Subject: FS: VHF FM Transmitters All my transmitters are built to a high specification and are very stable and truly are capable of giving out there rated power. RF Powers available from 0.5 Watts to 150 watts either PLL or VFO Accesories available include * Stereo Encoders * Compressor / Limiters * RDS Encoders (Coming soon) * Link kits * Aerials E-Mail or call me for information and prices Worldwide Export available as i'm based in the United Kingdom Web site hopefully back on line by end of week Telephone +44 (0)976 839548 The operating of a transmitter may require a licence. This is the sole responsibilty of the purchaser All orders are subject to our terms and conditions available on request ************************************************************************** 5)From K34826@aol.com Subject: Pager Decoder Hi Everybody. I am looking for a Pager Decoder for use with a scanner and a PC that supports all protocalls including Flex and ReFlex.I know of a company in Canada that has one but it has many features I dont need and is way out of my price range. Any Info would be appreciated. Thanks Ken ************************************************************************** 6)From: ohm@ozemail.com.au (Owen Murray) Subject: Heres my problem & LOCK IMPRESSIONING I own about 400 acres in the rainforests of Northern Australia and wish to monitor areas of the property that are beening abused by hikers , weed growers ect. The topography is very heavily overgrown (rainforest) and mountianous, resulting in a lot of isolated spots. Because the country is so rough these peolple are almost certian to use certian tracks, ie walking up creeks, following ridgelines ect. The trouble is the only way that i can keep tabs on the comings and goings of people through my property is set alarms on the "tracks" that i can check at the remote site without walking a hundred mile a week :). Remote montitoring is the only way i can achieve my aims , here are the spec's. i think are appropriote- Does not need to be real time. TRIGGER MECHANISIM- The trigger will be simply be a peg with electrical contacts that will close the transmitter circuit when a piece of connected vine is moved to allow passage up the "track" by whomever. TRANSMITTER- needs to be able to send a signal 2km, it will have inimpieded line of sight view across a very deep valley of the reciever. RECEIVER- needs some way of showing that Transmitter has been activated. Could possibly be something like the servos out of a remote controled airaplane; ie if the servo has turned then the transmitter has been activated. The method of read out only needs to be reliable. Im no electonic engineer but am able to wire a few components togeather , i wouldnt like to spend more than a couple of hundred dollars on each of these sites aprox 3 . Now my give. LOCK IMPRESSIONING . A few facts. Lock impressioning is not easy. It takes pratice and perserverance. In most circumstances you are far better off using other techniques. For example , if the targetted room was in a large hotel or Building , the room in normal circumstances is almost certian to be masterkeyed . To work out a master key for example a big hotel like the Hilton ect . The easiest method is simply to book a couple of rooms on different floors and map the masterpins in the room locks. By working out which size masterpins are in which position in each lock it is a simple matter to come up with 2or3 profiles one of which will be the GGMK (Great Grand Master Key)for that hotel only. Pick the lock. Drill the lock. If you are still stuck on impressioning the key then this is how you do it. Use a brass blank , they are easier for the pins to mark than steel keys. Blacken the blank with candle smoke (excluding hadle) and insert key carefully and slowly , when key is fully inserted apply good turning pressure with your hand , this pressure should never be so great as to deform the key. Remove carfully and slowly (to avoid scuffing the key) you will notice shiny patches on the section of the key to be filed down . With a small circular file file these marks down about 1mm each time. Any more and you could file too deep and render the key useless. Once you have filed all the marks and sometimes there will only be one or two marks (ONLY file the key where it is marked) reblacken the blank and continue to repeat the process untill you have no more marks .You now have a key. First timers tip ; get a common house lock and remove all the pins except a couple and pratice .You will find it a LOT easier getting the hang of it. Buy a few spare blanks as you will spoil a few until you get going. This is the way to learn picking locks too. I hope people will take time to suggest ideas for my questions for me , no matter how outlandish , its all food for thought. If you prefer you can email me direct ohm@ozemail.com.au Thanks Owen ************************************************************************** 7)From: Mike Gevaert Subject: Re: Telephone tone? >Hi, >I am looking for a device (if there is such a device) that recognizes >the dialing tones and can show the number associated with the tone >dialed. In effect giving me a tone dialed number by listening to the >tone. Is there such a device? Do you have any idea where I can purchase >it? Well, you _can_ use your computer for it, there is a program call WinTone that works very well. I'm very satisfied with it. YOu can Download a trial version at: http://www.frii.com/~rsmerker/download_wintone.html This program is FOr WIndows95, if anyone know of one for DOS or For WIndows 3.1 could they please drop me a line or reply to this email. Thanks. Mike G |-) Mike Gevaert |-) mgevaert@bfree.on.ca ************************************************************************** 8)From: mjones@nbserv2.dseg.ti.com (Marty Jones) Subject: Pager Cloning - Need Reference Please email me if you know of a pager technician in the Dallas area who can reprogram frequency, features, and capcodes for Motorola and NEC pagers. Marty Jones mjones@nbserv2.dseg.ti.com ************************************************************************** 9)From: mango@treco.net Subject: Old classmates and friends I have used FOUR11 and some other directories in an effort to find old friends and classmates. One difficulty we have had is the location of women whose names have changed due to marriage. Is there an intelligent way to search for people with whom we have lost touch? The inquiry is not based on any "surveillance" on a professional basis, but we often get together with friends and the question seems to come up: "What ever happened to Billy?". And no one SEEMS to know. Thanks for taking the time to read this. ************************************************************************** 10)From: WWMason@aol.com Subject: Timer for Recorder I have need for a battery operated timer that could be preprogrammed to turn-on/off a micro recorder. I've never seen this product in anyone's catalog. Have any of you ever built one? Could it be built for a reasonable price? Must be small. The VOX feature of the recorder is no use in this instance cause there is always sound, but I only need to record during a certain time of the day. ************************************************************************** 11)From: visscom Subject: Want information on CCS Can anybody give me info about CCS INTERNATIONAL. Thanks. ************************************************************************** 12)From: Trace Carpenter Subject: Telephone Tones >I am looking for a device (if there is such a device) that recognizes >the dialing tones and can show the number associated with the tone >dialed. In effect giving me a tone dialed number by listening to the >tone. Is there such a device? Do you have any idea where I can purchase >it? What you're looking for is a DTMF decoder. They can be purchased many places, but they're really overpriced for what they are. There is currently a software program you can download called Wintone95 which will do the job. Just do a search for it. -- Trace Carpenter,P.I. 214.828.4520 214.828.1917 Facsimile ************************************************************************** 13)From: AKJULES@AOL.COM Subject: Re: AOLHell Has anyone know of another program than AOLHell, which doesn't work now. To be able to read other people's email on AOL and Instant messages. thanks, AKJULES@AOL.COM Julie +++Moderator's Note+++ I don't think AOHell performed either of those tasks when it did work. I would be VERY careful if I were you and look into the legality of what you're trying to accomplish. I think you'll find it's NOT legal... ************************************************************************** 14)From: Timothy Poole Subject: Software for video enhancement? Looking for an inexpensive piece of software for video enhancement. I have a store owner that was broken into, and he has video of the guy, but it is fairly poor. I have used a video capture board to pull it into my PC, but Adobe Photoshop and the likes don't do much for enhancement. Any suggestions? Timothy Poole Countermeasures Security Service ************************************************************************** 15)From: Pete Adlerberg Subject: Point 'n Crypt Professional 1.5 Here is a brief introduction to Point 'n Crypt Professional 1.5 (tm). Point 'n Crypt Professional 1.5 is an upgrade from our standard (40 bit exportable) Point 'n Crypt World. This new product supports DES(56 bit), 3DES(168 bit), and Blowfish (168 or 448 bit). It lists for only $39.95, and is the easiest-to-use and lowest priced product of its kind on the market. Point 'n Crypt Professional compresses data before it is encrypted and allows you to encrypt multiple files or an entire directory tree. Your choice. All the above options, among others, are seamlessly controlled through a Windows 95 control panel applet. Point 'n Crypt Professional is available for immediate download from our web site! Just call our toll-free number to acquire your personal and secure confirmation number. Visa, MasterCard and American Express are accepted and all information will be kept strictly confidential. Please give this product a try and let us know what you think of it. I believe you will find it to be the easiest and most practical product around. I hope this answers any questions you may have. If not, please visit our web site or contact me directly via phone or e-mail. Printed materials are also available upon request. Thank you for your time. Sincerely, Pete Adlerberg Marketing Director SoundCode, Inc. pete@soundcode.com (206) 325-1996 (voice) (206) 329-4351 (fax) www.soundcode.com (888) 45-SOUND (76863) (toll-free) ************************************************************************** Who are you? What's your specialty and/or interest? Let us know about your company... What would you like to see on the list? Post it. Let us know... Do you have something to contribute? We'd like to hear it... We want to know EVERYTHING and ANYTHING about eavesdropping, surveillance, countersurveillance & privacy related technology, etc... Remember: who, what, where, when, how & why... we want ALL the details... Do you have a question? Post it... A little free time? Help a member... With the INCREDIBLE brain power on this list, someone should have the answer ;-) P.S. Don't be a LURKER... Members take the time to post info for us all... give something back... Don't just take... Your input/knowledge is valued... ************************************************************************** Send Postings to: 6886@mne.net with "Post" in subject field with subject ************************************************************************** Subscribe to: 6886@mne.net In the subject field type: subscribe-surveillance list e-mail address ************************************************************************** Unsubscribe to: 6886@mne.net In the subject field type: unsubscribe-surveillance list e-mail address ************************************************************************** ...The Simple Rules of the Surveillance List... The Surveillance List Owners may Reject any posts that are/contain: 1) Info Unrelated to Eavesdropping, Surveillance or Privacy technology... 2) Flames or Negative posts... 3) E-Signatures that are considered excessive... 4) Advertisements not DIRECTLY related to the list topics... 5) Attached Files... 6) Oversized Posts... (May be edited to save room) **************************************************************************** This publication is copyrighted and is protected by U.S. and International copyright law. The information transmitted on this list may not be reproduced, reposted or forwarded to any non-list member without expressed written permission of the List Owner. Violation of U.S. copyright law is a criminal and civil offense... **************************************************************************** The Surveillance List is moderated by SpyKing@thecodex.com The List Owner will make EVERY effort to protect subscribers from spam... Copyright 1996, 1997 Codex Publishing Inc., All Rights Reserved... **************************************************************************** Vol 2 Issue # 62 ****************************************************************************** Vol.Two Issue #62 The Surveillance List Mar.16,1997 Over 1500 Members Worldwide ****************************************************************************** IN THIS ISSUE... ****************************************************************************** 01) Re: Pager Cloning - Need Reference 02) Printed Circuit Board Planning 03) Lock pick tools: Home made 04) Missing Posts? 05) Domestic/family Surveillance 06) Re: "Spy Shops" 07) Equipment question 08) Pager Tech in Dallas 09) Old Classmates & Friends Response 10) Timer for Recorder Response 11) Illegal use of scanners to eavesdropp on phone conversations 12) Intro,Technospy,Microsoft,Tracking device,View a screen?,Invisible. 13) Several Responses ****************************************************************************** DON'T BE A LURKER.... GET INVOLVED... YOU ARE A MEMBER... MAKE THE MOST OF IT ****************************************************************************** 1)From: CrACKeD Subject: Re: Pager Cloning - Need Reference > Please email me if you know of a pager technician in the Dallas area who > can reprogram frequency, features, and capcodes for Motorola and NEC > pagers. Marty, check out the newsgroup tnn.comm.pager. It's a popular spot for pager buffs and techs, and I know there are folks in there willing to recrystal and reprogram your pager for next to nothing. CrACKeD ************************************************************************** 2)From: "Tedy" Subject: Printed Circuit Board Planning If any of the subscribers needs help on PCB planning, I am ready to help _free of charge_. Just need the schematics by hand or by ORcad. Tedy, tedi@netvision.net.il ************************************************************************** 3)From: BADCOFFEE@aol.com Subject: Lock pick tools: Home made I have tried professional lock picks , However...to me nothing works better than a piece of spring steel (used at lumber yards to wrap lumber) which is found in home center/lumber yard parking lots in unlimited supply. Cut a peice about 5 inches in length. (use good snips) The cut a peice off to leave you with a "slither" about 1/16" that looks like a finger. Straighten it all up a bit with plyers. Torch this thing till it glows. Then drop it in Ice water to harden it more. Result: One hell of a lock picking tool. Because it doesnt have a handle...the sensitivity is remarkable. It don't work well on stiff springs.... Good idea to have a pick set handy also. Make a torque wrench with same steel. Beginners: LIGHT and easy...from picking to torquing. Be nice to your lock...and it'll open. Be good and send out the Lock advise people :-) Especially combo locks. ************************************************************************** 4)From: "Craig Shevlin" Subject: Missing Posts? Hi, I am not sure if I have violated one of your rules in posting a message on your board. I have left postings asking for any PI's in the Columbia/Baltimore area of MD who may do domestic/family surveillance to drop me a line. I have a friend in that area that is in need of a PI's service. I am in the security surveillance arena for physical properties and many miles away from him. I thought this forum may provide a lead for one of your members. But I have noticed that my postings are not put onto your listing. With all the other information on computer hacking (which really does not seem appropriate for this forum) and sales promotions that are listed, I thought you would welcome some one giving leads to your affiliates. I am curious to your rationale on why my postings were rejected. Sincerely, Craig S. Shevlin +++Moderator's Note+++ Craig, you postings did appear in issue # 56 & 61. I post EVERYTHING except non-related SPAM to the list. I do NOT edit anything... We ABSOLUTELY appreciate every post to the list especially ones that are potential sales leads for list members. I personally get a number of requests for PI services, etc at my Codex Site that I do NOT provide. I generally post them to the list myself (and I don't ask for or want a kickback). We did have a problem with corrupted e-mail a couple of weeks back and I advised the list that anything you posted that did not appear, please resend. I did not get many re-posts. But if you sent something that has not appeared, please resend it and it will. I promise. P.S. Hacking IS a form of surveillance and from the interest on this list I'd continue to post everything although I hope we stay focused on the surveillance/countersurveillance topic. fj ************************************************************************** 5)From: "Craig Shevlin" Subject: Domestic/family Surveillance I am looking for a PI in the Columbia/Baltimore area of MD who specializes in Domestic/Family surveillance. I have an associate in MD who is in need of a PI's services. Please Email: Shevlin@staffnet.com Craig S. Shevlin ************************************************************************** 6)From: EdShak@aol.com Subject: Re: "Spy Shops" Its about time the Feds caught up with the "Spy Shops", These wanna be surviellance so called experts called attention to themselves and thought they were invinceable. If you treat this industry with respect you gain it. Believe me when I say that I think the FCC makes thier own rules but, these guys were just plain STUPID!!! ************************************************************************** 7)From: BADCOFFEE@aol.com Subject: Equipment question Hello all...wishing everyone the best. If any subscribers could assist me in the following: A: A online supplier for general merchandise that accepts COD's and is reasonable priced. B: Is there any software that I can load into a laptop to analize phone lines for taps?? Be good people. ************************************************************************** 8)From: Trace Carpenter Subject: Pager Tech in Dallas >Please email me if you know of a pager technician in the Dallas area >who >can reprogram frequency, features, and capcodes for Motorola and NEC >pagers. Hi Marty, They're all over Dallas, it just depends what part of town you're in. When you're driving around you'll see signs all the time, especially in the Grove & South Dallas area which say "Pagers Reactivated". That's basically a place you take your old pager to and they activate it on their system. They can do it. I keep a clone of mine so if I get out of pager range I still have one here that gets the message so I can retrieve it when I get back. BTW, are you in the Tech/PI business? I'm in Dallas too. Give me a call. -- Sincerely, Trace Carpenter, P.I., Tech Trace Carpenter Investigations Professional Private Investigations 660 Amberton Tower Suspicions Confirmed 4144 N. Central Expy. Problems Solved ! Dallas, Texas 75204 Free Consultations 214.828.4520 214.828.1917 Facsimile ************************************************************************** 9)From: Trace Carpenter Subject: Old Classmates & Friends Response You had asked about locating females whose names had changed through Four11. That is a problem. In fact I try to always keep something like a SS# on many of my friends so I'll always be able to find them. There are some better systems out there which usually yield positive results, but there is a fee for using them. I'd be glad to run a few names for you if you'd like me to. My monthyly bill is so high a few more won't hurt. Give me a call or e-mail. -- Trace Carpenter,P.I., Tech 214.828.4520 214.828.1917 Facsimile ************************************************************************** 10)From: Trace Carpenter Subject: Timer for Recorder Response I don't know how at home you are with a schematic but I'd be happy to sketch one out for you if you don't find anything. If you want something a little easier to assemble you could use a kitchen timer and a relay. -- Trace Carpenter, P.I., Tech 214.828.4520 214.828.1917 Facsimile ************************************************************************** 11)From: Corey Subject: Illegal use of scanners to eavesdropp on phone conversations i live in a small community where privacy is something taken for granted. a family in the town in which we live has a scanner that picks up cordless phone frequencies, the group of individuals has been listening to private phone conversations and then talking to other individuals about the content of these conversations.. i was wondering what action should be taken in a case like this, is there any possible way to resolve this without causing too much commotion. They are well known in the community and have children. A confrontation by concerned individuals would not be enough to stop what they are doing.. What are your insights on the matter, and how would i go about resolving this problem, where do i start? is there any place on the internet i can report the person or persons doing this? A scanner doesnt automatically pick up cordless phone frequencies do they, dont they have to be programmed into the scanner? any info you can give me concerning this matter would greatly be appreciated, the state in which we live is KANSAS. thanks corey ************************************************************************** 12)From: Ken Johnson subject: Intro,Technospy,Microsoft,Tracking device,View a screen?,Invisible. Hi! I've been around for a few months, but felt I didn't have much to contribute. My technical knowlage of computers,electronics,and communications,is limited. Time is also a big factor.Ever since I saw tempest on Cyber Life,and found the codex web sight,I've been bitten by "The Surviellance Bug" (no pun intended).Well,I have some time,info,and questions. On 2/2/97 TLC (www.discovery.com), channel 23, paragon cable,PTLD;OR., aired a show called "Technospy".It was all about surviellance technology! It featured bio-chips that implant in the brain,allows others to see what you see,hear what you here,even sees your thoughts,also will track you by satellite,and control pleasure & pain! This is under developement!!! Other chips that allow animals to be scanned are already in existance and are featured as well.Satellite tracking,robot insects equipped for surviellance,and much more mind blowing tech...I contacted The Discovery Channel,but they aren't planning to air it again in the first 6 mo.of '97. No word on the last half of the year. No video availibility. If any one knows how to get a copy please let me know. Thanks. On 3/4/97 I heard (KEX1190 news)that microsoft internet explorer had a bug that could allow others to read your hard drive!They now have patch at their websight to correct the problem.This brings to mind the question,what motivates a man like Bill Gates,who made $30 million a day last year, now that money isn't a problem?Isn't microsoft the ones who are selling satellite photos? MSNBC news?TIME magazine 1/97 might give some insight.Hmmm, I better shut up, I could be killed for less then an hour of his wages,or my life ruined for less then that! How hard would it be to put a bug or back door into any program,modem,or hard drive?Seems to me manufactures and designers could do a lot of things.I wouldn't have a clue. Got a spot for home inventory,Finances,ect..on your pc? What a great way to get the masses to put all their personal info in one easy to get to spot.Encription,passwords? Anything made by man, can be broke by man! Ask Jonn The Ripper v1.4. In the aug/sep/94 issue of Bow Hunter magazine,they advertised a neat little tracking device. It looked like a small resister or barrel diode on a fish hook. It's affixed to the arrow with the with the point facing foward. When the arrow penitrates the animal, the hook comes loose from the arrow by sticking into its skin. A small transmitter/reciever, with a signature card keyed to that particular diode, is then used to track the animal at a distance up to 5 miles.Only the trans./rcvr. used batteries.The diodes were small enough to put into a laptop ( after the hook's cut off),pager,or sew into a childs clothing,ect...I haven't seen it advertised since. I'm looking into getting a back issue because someone has torn the ad from my mine. It was sold with 3 hook/diodes,3 signature cards,and 1 transmitter/reciever.If anyone else knows about this kind of technology please share it. I think it works on what's called "bounce back", I'm not 100% sure.I'll keep persuing it. I had a thought on how to view an on-line computer screen from a remote location. If you had a "Y" in a regular phone line, a computer with modem connected on one side and a modem connected to a digital phone (radio shack has sprints) on the other side, could you call the digital phone with a pc, connect to the modem and see what's comming through the phone line? If it's not that simple, I bet it could be worked out,even to the point that the digital phone could be programed to call a certain pc when the line was in use.An on line bug? Other uses could be found for that too. Todays science fiction is tomorrows technology! Ever since I was a kid I've been facinated by the thought of invisibility.I believe I have come up with a way to get one step closer to that facination. Electronic camoflage, like in the movie "Predator"! I believe I have an idea that will eventually produce something very similar to this effect.You could blend in,no matter where you were. I say eventually, because I have invented other things.No matter how simple they are, there're always some bugs to work out. The basic idea is fairly simple,and uses already existing,low cost,high technology, that could be applied to most solid objects, cars,air planes,people. I have seen all the seperate components being put to use in everyday situations, but never together or in this way.I have always invented for the love of it,never for money.I have never patented anything, so I don't even know where to start. Any feed back or ideas would be very appreciated! ************************************************************************** 13)From: Willie Teasley Subject: Several Responses Best method I have found for AOL access is bribing a tech at one of the centers. Sorry to say, most are not only underpaid but are younger "free spirits" that are easily impressed. BTW, same goes for hacking Cable ... Billing clerks make little more than minimum wage and are tired of being yelled at. A heck of a lot cheaper than 10 years playing housewife to "Bubba." Teasley Assistant Apentice Wanna-be Guru in training >2)From: LazySkillz@aol.com >Subject: Re: Hacking AOL Email - More > >AOHELL is a lame program. AOL has pretty much cracked down on this program >rendering it useless. Does anybody know any other ways to hack into an AOL >account and read the person's email, etc? Or perhaps a way to intercept >Instant Messages that the person sends? >************************************************************************** Most buttons I have seen lately are held by a metal clip inside the casing. A strong electromagnet is used to seperate the parts. Often the manager at the local (name that mall store) will be glad to remove a legit button just to add to his stock of them (not cheap to replace!). Remember tho, they WILL be suspicious until you explain. >6)From: Jerry Manley >Subject: Clothing Security "Button's > >I bought 12 dozen golf type shirts from a store that went broke. I plan on >reselling these at a flea market but they all have the security plastic >"buttons" or "rectangular" shapes to prevent shoplifting. Does anyone have >any suggestions on how to open these? Do I have to get one of the plastic >"guns" and if so where do I get one? Would appreciate any help you could >offer. Thanks! >************************************************************************** Your request on Caller ID needs a bit of explaination so Mr. Moderator may choose to shorten it. Caller ID is a set of (modem type) tones that a local telephone carrier injects between the first and second ring. This information (and more) is passed from local office to local office for billing and routing. Virtually all countries offer this information on Trunk Lines to PBX's and the like as CND or Calling Number Delivery (aka ANI). When converted from the original digital format to the analog signal that powers most phones, that data is discarded unless the local phone delivery service chooses to re-use it (as Caller ID). So, the desicion is really a matter of asking your local phone company to support the (purely American) Caller ID format. A note to our moderator about ISDN .... As this is often considered a Busines Line, ISDN can often carry the ANI, CND, Route and Billing codes. Check with your rep for availability then make sure your ISDN modem supports both voice (TAPI) and the CND data. Could be VERY valuable. >7)From: LIAM >Subject: Three questions > >Hi everyone, >i have three questions i would like answered if possible, starting with >the first. I am ready to purchase a caller ID unit from the USA, but >would like to know which countries it will function in. > Item last: Thanks for several recent plan postings. Alas, Oklahoma is still in the age of $10.00 solutions and most PI's still have troubles orienting AAA batteries. I need just such "trinkets" to lure people into the 20th century. ************************************************************************** Who are you? What's your specialty and/or interest? Let us know about your company... What would you like to see on the list? Post it. Let us know... Do you have something to contribute? We'd like to hear it... We want to know EVERYTHING and ANYTHING about eavesdropping, surveillance, countersurveillance & privacy related technology, etc... Remember: who, what, where, when, how & why... we want ALL the details... Do you have a question? Post it... A little free time? Help a member... With the INCREDIBLE brain power on this list, someone should have the answer ;-) P.S. Don't be a LURKER... Members take the time to post info for us all... give something back... Don't just take... Your input/knowledge is valued... ************************************************************************** Send Postings to: 6886@mne.net with "Post" in subject field with subject ************************************************************************** Subscribe to: 6886@mne.net In the subject field type: subscribe-surveillance list e-mail address ************************************************************************** Unsubscribe to: 6886@mne.net In the subject field type: unsubscribe-surveillance list e-mail address ************************************************************************** ...The Simple Rules of the Surveillance List... The Surveillance List Owners may Reject any posts that are/contain: 1) Info Unrelated to Eavesdropping, Surveillance or Privacy technology... 2) Flames or Negative posts... 3) E-Signatures that are considered excessive... 4) Advertisements not DIRECTLY related to the list topics... 5) Attached Files... 6) Oversized Posts... (May be edited to save room) **************************************************************************** This publication is copyrighted and is protected by U.S. and International copyright law. The information transmitted on this list may not be reproduced, reposted or forwarded to any non-list member without expressed written permission of the List Owner. Violation of U.S. copyright law is a criminal and civil offense... **************************************************************************** The Surveillance List is moderated by SpyKing@thecodex.com The List Owner will make EVERY effort to protect subscribers from spam... Copyright 1996, 1997 Codex Publishing Inc., All Rights Reserved... **************************************************************************** Vol 2 Issue # 63 ****************************************************************************** Vol.Two Issue #63 The Surveillance List Mar.17,1997 Over 1500 Members Worldwide Happy St. Patrick's Day! ****************************************************************************** IN THIS ISSUE... ****************************************************************************** 01) Got more info on this item? 02) Monitoring System 03) Intro - Looking... 04) Re: cordless phone problem 05) Re: laser listener 06) Just a quick note 07) Re: Invisible 08) Frequency Counter? 09) Re: AOL 10) A challenge? 11) re: phone calls are being monitored 12) New Product Info ****************************************************************************** DON'T BE A LURKER.... GET INVOLVED... YOU ARE A MEMBER... MAKE THE MOST OF IT ****************************************************************************** 1)From: DAK_KOL@cybersol.com (Lull, Joseph) Subject: Got more info on this item? Not a Virus. Not a "V" chip. Not some snoop out on the street in a van reading RF signatures. Not some intruder "monitoring" you electric service. But a standard procedure for Networking that shows all and tells all. IT IS HERE! I had been having problems with my computer at work. Doing a lot of road travel, I thought assumed that the perils of "Planes, Trains, and Automobiles" simply takes it toll on my Dell Laptop Computer about every six months. The problem was that my Win95 profile file was continually (still is) being "degraded" or removed. The only single factor that I could discover was that I network continually - both within the company and outside (we literally live and die by our computers in a high tech engineering center). My I.S. people blamed me for FTP'ing around the planet and getting "sick" - something I'm careful not to do. They thought I had a virus and updated the system protection. Nothing helped. I knew that the problem began to become somewhat chronic around the first of the year when we upgraded our network system. A product called "SMS" (Systems Management Server) had been installed. It is heralded to be designed to increase network system compatibility and efficiency. I probably does - that and a lot more. The problem is complicated by the fact that I log into the NET and company Network using more than one computer. I can literally be at another users system and log in anywhere using my User ID and password and a good Internet Browser or MS compatible mail system. Pretty neat! Very Convenient! .... and very telling. "SMS" works by downloading a copy of the system to the server connected to (have you ever wondered what really goes on while your are watching the little window that says, "Verifying user name and password." ?). After the Verification step, a batch file called a "LOGIN SCRIPT" is run. This sets your computer in a full handshake with the server. If you use more than one computer on certain networks a problem can result - the last system profile has been transferred (at least in part) to the server connected to. When login occurs the last system variables are applied to the computer used to create the new connection and login. The I.S. people said "IMPOSSIBLE" of course. The truth is that my laptop computer has only one hard drive named "C:". My computer at home has two hard drives "C:" and "D:" respectively. I logged into the network using my home desktop last night. When I got back to the office today, I discovered that I had no access to my e-mail - and a few others quirky things. After having to reinstall my mail system ( the third time in a week-and-a-half), I finally got to sit down a write a memo on MS Word. I open the program. Pulled down the file menu ... and surprise!!!! There on the file menu of my laptop computer (working off of the server at the office where I had dialed in only last night) were all of the secure file names from my "D:" drive that I had been working on - only last night. Now remember, I only have a "C:" drive on my laptop computer - and I don't use confidential personal data on that computer. Do you know how it got there yet?? You should! Because everytime you dial into most ISP's (internet service providers) some portion of "SMS" (or similar protocol) is running there. MSN (Micro Soft Network) has used this from the beginning to catch software pirates. Online banks use them to help guarantee that "it is really you" trying to get to the money. I am going on a security search to find out just how much these "SMS" type programs are "selling" to unauthorized onlookers. We'll keep you posted. The security threat is more than real. It appears that in the intent to maintain network uniformity, ease of use, and security the writers of SMS style protocols have abridged the "security of the individual". The "passwords" section under the "user profiles" in "Control Panel" in WIN95 can be set to restrain the passing on of a profile (at least to some extent). SMS style protocols can operate beyond this personal security measure. To date the only countermeasures for individuals are PGP (Pretty Good Privacy or similar) and abstinence from networks of any kind. PGP style securities can only impair and/or slow down a good "specialist". The government limits legal encryption so that they can easily get the information, if needed (so can others). On the flip side of security is the Digital Telephony act of 1994 (Oct 1994) where the Federal Government authorized $500 million+ to bring public scrutiny to a new height. This act secures the ability of the Government to monitor all communications - in the name of national security and the drug war. This has given rise hi-speed line monitors to search for "key-word" strings on networks. If a prescribed string is found then an algorithm searches backwards and forwards to detect an "intent of harm". A security specialist is notified and a routine investigation may follow. As of the fall of 1996, the State of Michigan monitored 5,000 communications per day. No warrant. No notification. Line monitors and disclosure protocols pose a real and present threat to personal security on networks. Let employees and citizens be-ware. Is Windows 95 (Win95) the only vulnerable operating system (O/S)? No. There are some special "back door" capabilities in Win 95, but the SMS and SMS style protocols will run on any system including DOS. The only protection is to not use a computer for any networking. That is to say, that if you are wanting to use a secure computer have one that is NEVER connected to any network. Compose info on the secure, unconnected, computer. Transfer the files by floppy disk, zip tape, etc. to the network computer. Then do file transfers. Sorry. The only safe net - is absti-nets. Kind Regards, Joseph dak_kol@cybersol.com ************************************************************************** 2)From: Dr. Arthur Johnson Subject: Monitoring System I am looking for device that would monitor confused psychiatric patients. Something that they could wear and we could monitor their location and if they leave a method of finding them. Let me know if you have anything like this and how much this would cost. thanks SARAH JOHNSON Phone Number: 210-567-5879 FAX Number: 210-567-5822 +++Moderator's Note+++ I got this request for product info thru my site. I do not handle this product. Seems to me one of the "Prisoner home detention systems" would probably work in this application... any list members handle these things? Contact the doctor directly... P.S. Anyone know the freqs they operate on? ************************************************************************** 3)From: Jim Motes Subject: Intro - Looking... Hi all this is an introductory post. I just received my first Surveillance List and was pleased to see the different topics and the helpful hints other readers are passing on. I'm not an expert in electronics, but am very interested and do know a few things about computers. I'm always looking for knowledge. I'm also looking for a FM phone line transmitter. (preferably the model that looks like a line splitter) Thanks Jim jmotes@mnsinc.com +++Moderator's Note+++ Look no further than: http://www.why.net/home/sr/ You will find the "line splitter" telephone transmitter there... it is a kit. Easy to put together. VERY limited range... and VERY easy to detect during TSCM searches... ************************************************************************** 4)From: BADCOFFEE@aol.com Subject: Re: cordless phone problem Unfortunately, people do stumble across things like cordless phone frequencies and abuse them. YES....you would have to program frequencies in a scanner. The frequencies are so easilly available in most frequency books. HOWEVER, the range... is only about what???? 500 yards at tops. So no...the only people that would be directly affected by the easdropping in the immidiate neighbors. Unless the immidiate neighbors call others in town?? In other words...this is not some type of "super" listening device. This is real advise...what I would do is....forget enforcement agencies. The older phones....use a frequency that just about every scanner can pick up. The newer phone cut the amature listening greaty. that would be my first means of defense. People's first thaught is "involve the authorities". You need to understand that the legal process here is moving at a turtles pace. Simple things...take years and years and MONEY and a hell of a lot of patience. Sometimes'...you need to find a better and more efficient solution. There is also a disolution that ONE phone call...will spark some type of an "investigation"....wrong again. If you chose to procede legally....you '"got to be around" for the duration. Nothing happenes without you pushing the hell out of anything. Good luck. ************************************************************************** 5)From: LIAM Subject: Re: laser listener OK? Nobody so far has replied about obtaining laser listener ( the invisible versions ) manufacturer or contact or prices for that matter. However Trace Carpenter did mention he had a some information on this, from SGT Surveillance Technology Group so if you can point me in the right direction i would be ever so greatful. However i have obtained a contact from Trace regarding this subject, thanks once again for your support Trace, but he was a little expensive. Anyone can reply to this one. to all members on the surveillance list ( THANKS ). - LIAM +++Moderator's Note+++ Surveillance Technology Group is aka (also known as) CCS, CCS Communications Control, Communications Control Systems, The Spy Shop, The Spy Shop Ltd, The Counter Spy Shop, The Counter Spy Shop of Mayfair London, Spyzone and about 20 other names... get a second opinion on their equipment and do some SERIOUS pricing & investigation before purchasing... ************************************************************************** 6)From: BADCOFFEE@aol.com Subject: Just a quick note First....people...please excuse my spelling and grammer in my posts. I either have the time to post...or proof read. I'll try harder...now stop the hate mail regarding my spelling. Second....Trace Carpenter- Just a quick pat on the back. I see your name on a post...and i read carefully. Thank you...you have been quite informative and hoping that you stick around here for a long time to come. Be good ************************************************************************** 7)From: CrACKeD Subject: Re: Invisible > Ever since I was a kid I've been facinated by the thought of > invisibility.I believe I have come up with a way to get one step closer > to that facination. Electronic camoflage, like in the movie "Predator"! > I believe I have an idea that will eventually produce something very > similar to this effect.You could blend in,no matter where you were. I > say eventually, because I have invented other things.No matter how > simple they are, there're always some bugs to work out. The basic idea > is fairly simple,and uses already existing,low cost,high technology, > that could be applied to most solid objects, cars,air planes,people. I > have seen all the seperate components being put to use in everyday > situations, but never together or in this way. I have always invented > for the love of it,never for money.I have never patented anything, so I > don't even know where to start. Any feed back or ideas would be very > appreciated! Better not run out for that patent too quickly, Ken. A show aired on Discovery (I think) recently dealing with aliens and technology. The predator was actually used as an example. Apparently some folks have almost perfected a suit which makes you nearly invisible. It grabs the image(s) behind you and projects them in front of you, making up for the difference in distance between the object behind you and your position. So if you were standing in front of a brick wall, and someone was looking at you from the front, you would blend in with the brick wall fairly well. I wish I could give you more details as to exactly _how_ this is done or what the suit is composed of, but I'm only relaying what a family member told me and I didn't see the show myself. Maybe someone else on the list can fill in the details. CrACKeD ************************************************************************** 8)From BADCOFFEE@aol.com Subject: Frequency counter? Radio Shack makes an inexpensive unit. Could this be used for bug detection? It has a range from 1 to 1Ghz. What is the most common freq's? Handheld scanner usefull for basic non-pro sweeps? I need info :-) Be good people ALSO: Is there a computer program that tests phone lines for taps that i could load into a laptop? <-----very important Also: Anyone else having a problem with WINTONE. I cant seem to figure out how to load a tone wave. +++Moderator's Note+++ Checkout James Atkinson's TSCM.COM - http://www.tscm.com - It is the most complete TSCM page on the net. You will find a very comprehensive list of "commonly used bugging frequencies" as well as a wealth of other information there... ************************************************************************** 9)From: "James Wyninegar Jr." Subject: Re: AOL I am looking for a program that will record all of the chat's, instant messages, and E-mails that go through America Online on my computer. Any help on how this might be done would be helpful. wyninejr@mail.utexas.edu ************************************************************************** 10)From: LValliquet@aol.com Subject: A challenge? There always have been various people at different times in History who have claimed that their agencies or security firms have such vast knowledge of the spy world that mere mortals would not be able to detect what they are capable of doing...so called professionals. My question is that I want to know how good somebody can be at either (A) planting or concealing of a "bug" or surveillance camera etc...and (B) how good some is at being able to detect all these items in a room so that the people they work for are confident that the room is secure...I remember reading about various types of equipment that could be used for counter intelligence that seemed extremely expensive and not very effective. I have also read various books on building offensive surveillance equipment but again how effective can this be...I read about TEMPEST and also saw a documentary on the Discovery channel about the various types of surveillance and counter-surveillance techniques....I have always found these topics quite interesting as I am an electronic technician and probably would like to experiment on perhaps beating these surveillance guys at their own game some how... Thank you very much +++Moderator's Note+++ I love this post. Don't have time to answer it today. I will tomorrow... ************************************************************************** 11)From: Egg Subject: re: phone calls are being monitored In response to the Kansas resident whose phone calls are being monitored.... The best thing to do is get a phone that is not cordless. You can spend extra money on cordless phones that claim to be secure but are not in reality. The frequencies do not have to be "programmed" into a scanner to receive them. A person can simply scan the range between 43.00 and 49.99 and pick up any phone conversations. The specific frequencies can be programmed into the scanners memory very simply. Remember, when you talk on the radio waves always assume someone is listening. ************************************************************************** 12)From: SpyKing@thecodex.com Subject: New Product Info Found these on the net and thought it of interest to the list. I am not associated with or endorse any of these products/companies... Texas Instruments NightSight Technology that gives you an unprecedented advantage in spotting criminals and intruders. And now our special lease purchase program makes this invaluable tool more affordable than ever before. Imagine having the power to spot perpetrators in the thick of night. Through trees and foliage. In darkened buildings. From carmounted system to hand-held units, NightSignt provides a wide range of options to address your needs. To find out more about our products or about our leasing program, call us at 1-800-681-8850 (U.S.) or 214-995-7511 (International). We'll send you a demo disk that clearly shows what this technology can do for you. You'll also find out how to put it to work for you for less than $200 a month*. So call today. And see what you've been missing. http://www.ti.com/thermal Night vision Silent Witness Enterprises Ltd. of Blaine, Washington, has released the V60N Night Hawk camera. The camera is equipped with eight infrared lights that enhance night vision to more than twenty feet in complete darkness. A variety of fixed lenses are available for Night Hawk's 1/3" CCD camera, which has 410 lines of resolution. Wide angle 3.6 mm and 5.7 mm lenses are matched with broad-spread infrared lights, while long range 8.0 mm and 12.0 lenses are matched with directional beam infrared lights. With the Night Hawk's built-in microphone, users will be able to hear as well as see in the dark. 800/877-2407 CCTV design software CCTV Source of Carrollton, Texas, has introduced CCTV Designer software assistant, a software program that allows CCTV professionals to design a complete CCTV system using a Windows-based graphical user interface. The software is menu-based and leads the user through a series of questions to determine the customer's CCTV system requirements. The questions address the type of CCTV coverage needed, the size of the facility the system is being used in, and other issues. The software then automatically dials into CCTV Source's database and, based on the user's answers, recommends the most appropriate CCTV system configuration, providing prices for the selected CCTV system. 800/284-8448 Surveillance module Skaggs Telecommunications Service, Inc., of Salt Lake City, Utah, has added the Surveillance Vehicle Module (SVM) to its surveillance vehicle product line. The self-contained SVM does not require a specific surveillance vehicle fitted with equipment. The 960-pound, 48" x 42" x 32" unit can be transferred from one vehicle to another. It can be used in most minivans, full-sized vans, or utility vehicles. It has an internal gel cell battery pack for up to thirty-six hours of self-contained operation. It includes three CCTV cameras. The rear camera allows full remote control operation of an 8-to-1 zoom lens camera with pan and tilt capability. Three LCD video monitors allow simultaneous viewing while time-lapse video recording and a dual-cassette audio recorder is included for external recording. 800/879-1787 Infrared illuminator Senstar Corporation of Canada has unveiled StarLED 200, a long-range infrared LED illuminator that produces invisible light for covert night-time CCTV applications. It has a range of 280', is eye-safe, and provides uniform coverage. 613/839-5572 ************************************************************************** Who are you? What's your specialty and/or interest? Let us know about your company... What would you like to see on the list? Post it. Let us know... Do you have something to contribute? We'd like to hear it... We want to know EVERYTHING and ANYTHING about eavesdropping, surveillance, countersurveillance & privacy related technology, etc... Remember: who, what, where, when, how & why... we want ALL the details... Do you have a question? Post it... A little free time? Help a member... With the INCREDIBLE brain power on this list, someone should have the answer ;-) P.S. Don't be a LURKER... Members take the time to post info for us all... give something back... Don't just take... Your input/knowledge is valued... ************************************************************************** Send Postings to: 6886@mne.net with "Post" in subject field with subject ************************************************************************** Subscribe to: 6886@mne.net In the subject field type: subscribe-surveillance list e-mail address ************************************************************************** Unsubscribe to: 6886@mne.net In the subject field type: unsubscribe-surveillance list e-mail address ************************************************************************** ...The Simple Rules of the Surveillance List... The Surveillance List Owners may Reject any posts that are/contain: 1) Info Unrelated to Eavesdropping, Surveillance or Privacy technology... 2) Flames or Negative posts... 3) E-Signatures that are considered excessive... 4) Advertisements not DIRECTLY related to the list topics... 5) Attached Files... 6) Oversized Posts... (May be edited to save room) **************************************************************************** This publication is copyrighted and is protected by U.S. and International copyright law. The information transmitted on this list may not be reproduced, reposted or forwarded to any non-list member without expressed written permission of the List Owner. Violation of U.S. copyright law is a criminal and civil offense... **************************************************************************** The Surveillance List is moderated by SpyKing@thecodex.com The List Owner will make EVERY effort to protect subscribers from spam... Copyright 1996, 1997 Codex Publishing Inc., All Rights Reserved... **************************************************************************** Vol 2 Issue # 64 ****************************************************************************** Vol.Two Issue #64 The Surveillance List Mar.18,1997 Over 1500 Members Worldwide ****************************************************************************** IN THIS ISSUE... ****************************************************************************** 01) Baltimore PI 02) Need Advice 03) Scanner 04) re: bug Detection 05) re: Aol Hacking Program's 06) Please help me 07) Pager related info 08) night camera 09) Re: AOL recording things 10) Academic Position at John Jay College of Criminal Justice 11) re: A Challenge? 12) Re: CCS International 13) Re: Microphones 14) Re: Intro,Technospy,Microsoft,Tracking device,View a screen?,Invisible 15) EAVESDROPPING LAWS ****************************************************************************** DON'T BE A LURKER.... GET INVOLVED... YOU ARE A MEMBER... MAKE THE MOST OF IT ****************************************************************************** 1)From: caldwell Subject: Baltimore PI Craig: I thought someone else would have jumped on your request; didn't know that no one had responded. I am a member of INTELNET, an invitation-only assoication of primarily former federal investigators now in private practice. If you visit my web site (listed herein) and click on the link to INTELNET, you will be able to check the investigators in the area in which you are looking for help. http://www.angelfire.com/biz/caldwellgroup Good luck. Greg Caldwell ************************************************************************** 2)From: Forez Subject: Need Advice I am a very young individual wanting to obtain a private investigator's license, the problem is that I have (literally) no time to attend classes, etc.. Are there any cheap or really cheap alternatives such as just taking the test or something I could do and still gain the license and enough knowledge to be competitive.... Thank you.. If there is anyboy who can explain this to me I would appreciate it as well... Would it be possible for me, a normal citizen, to cooperate with the police and bust some drug dealers locally? They are around our local mall and I am sick of their disturbing presence.. Also, I heard such a dealer call going on .... the scanner .. I am almost positive that with my resources, It would be impossible to bust the dealer I heard, if nothing else because of the way the info was received.. But what about the druggies/dealers at the mall, would that be possible? I know I could get anything from them..... Thank you again, and please excuse the inexperienced nature of this message all you pro's out there.. Also, I want to thank everybody for contributing such quality, valuable material on the list, I was impressed from day one... ************************************************************************** 3)From: "Arny Buckman" Subject: Scanner Any standard programmable scanner includes the VHF cordless telephone band in the 40-50 MHz region. There is no hardware modification required to receive these frequencies. There's a lesson here - if you don't want to see your personal information on the 6 o'clock news, protect your communications. There is already court precedence where a criminal was convicted because the police were eavesdropping on his cordless phone call. It was ruled that since the user was broadcasting, he had given up all rights to privacy. It's a good idea to keep a couple of standard wired phones around the house. Everything about new technology isn't necessarily good. ************************************************************************** 4)From: "Ray Randolph" Subject: re: bug Detection > Radio Shack makes an inexpensive unit. Could this be used for bug > detection? It has a range from 1 to 1Ghz. What is the most common > freq's? Handheld scanner usefull for basic non-pro sweeps? I need > info :-) Be good people > I would recommend that you check out the Optoelectronics Scout. It's a far better tool for that application. The range is greater and it also detects nearfield frequencies at a far greater sensitivity. Try http://www.optoelectronics.com/ -Ray M. Ray Randolph -- rayr@ezlink.com -- SP4 w/Clam Cluster Read about Scientology! FREE SEX! http://www.ezlink.com/~rayr/scieno.htm ************************************************************************** 5)From: Nitro45@aol.com Subject: re: Aol Hacking Program's Ok, First of all i just want to say that AOHell does not work at all. There are a couple of ways to hack into AOL. There is a very good program called Magik Online. It is very hard to get. But this works very well. If you cant get a hold of this program then there is a guy that copied it except he put in a different GUI ( Graphic User Interface ). That program is Called AOIce. Now this is very good and will " hack " into AOL acounts. The pw to that program is " ...Iceman rulez AOL". And dont forget the 3 Peirods. Now if this does not work for you ( because there are many editions of aoice that dont work ) you need to get yourself a copy of MAster Aol. That will give you the options that the actual users at aol have !!!! It is very good. But the best way to hack into aol programs is to spy. Get a good Home Camcorder and record them typing their password. I was a party one day and the girl wanted me to stay after and show her how to use aol. So she screemed down to her parents " What is our password for America Online??!?" They Screemed right back up " Rose, honey with a capitel R!" I tried to forget it but it stuck in my head. So my advice to all you people that want aol passwords is to put up survalence. Snoop on them, listen to them. ;>) ************************************************************************** 6)From: Nitro45@aol.com Subject: Please help me i have a client tht wants me to find out what he is doing online. And it just so happens that he is going on a bunch of bbs's. So i have tried to record him type the password, but he always looks around and than gets so close to keybord that you cant see it. Therfore you cant see the password. I think it is very suspicious. Who would look around with that woried face and make it so you cant see the password without doing something very strange online. Well the point is that I Need to know how to hack a BBS. I must. Like if there is commanly used defaoult passwrods or there is just a way to hack in. I would appreciate the help. Thanx ;>) +++Moderator's Note+++ There are many "hacking" newsgroups and web sites that can be of help to you. I suggest you check Usenet and one of the many search engines available. Do a search and find a "keystroke logger" and also read the alt.2600 FAQ which will answer many of the questions you have regarding hacking... ************************************************************************** 7)From: "Punggol Central Zone '2' Rc" Subject: Pager related info Hi! there I am really impressed with you guys and {gals?) with all these tech stuff. I am currently experimenting with POCSAG decoders for decoding pager messages. Would like more info and references in this area. My current resources: 1)Pervisell decoder 2)Decoder built from PD-203 circuit, 3)Decoder from Cylexinc 4)PD-203 pager decoding software from Pete Baston 5)POC32 from D. Fliegl. I need more. Has anybody tried to modify a PC FM Tuner sound card into a scanner. Theoretically it should work if we can increase the frequency range, right. Anyone out there with the expertise or interest to build a FLEX decoder? I have a decoder that is hook to my PC serial port. Strobe test and breakout box indicates active PIN 3(RD), PIN 7(GND), PIN 20(DTR) when run with a paging decoding software. Unfortunately, I am unable to get the same decoder. Another decoder could not run on my software because its PINs are 4(RTS), 5(CTS),7(GND) and 20(DTR). Can someone teach me how to jumper the PINs to get PIN 3(RD) using a breakout box. Please contact me Regards - David ************************************************************************** 8)From: "Daniel R. Butler" Subject: night camera I am a student at virginia tech but also am involved with a voluntary mountain rescue team throughout the blue ridge mountains. I would appreciate any information on thermal imaging cameras to either be hand held or mounted to a helicopter to track lost hikers and such. We maintain a well established budget and would appreciate high and low end model prices or recomedations of models based on performance. Thanks ************************************************************************** 9)From: Nitro45@aol.com Subject: Re: AOL recording things James, that is an option that America online has. When offline go into " File" Then go into " Log Maneger ". Follow the directions ;>) ************************************************************************** 10)From: Donald Goodman Subject: Academic Position at John Jay College of Criminal Justice The Department of Sociology at John Jay College of Criminal Justice announces the following position--- Assistant Profesor of Sociology, PhD required. Areas of specialization to include issues of ethnicity, race and crime in urban communities. To teach in both undergraduate and graduate programs in criminology and criminal justice. Excellent research skills required. Applications must include resume and three letters of reference. Send to David Goddard, Chair, Department of Sociology, John Jay College of Criminal Justice, 445 West 59th Street, New York, NY 10019 The City University of New York is an Equal Opportunity Employer. ************************************************************************** 11)From: SpyKing@thecodex.com Subject: re: A Challenge? >From: LValliquet@aol.com >Subject: A challenge? >There always have been various people at different times in History who have >claimed that their agencies or security firms have such vast knowledge of the >spy world that mere mortals would not be able to detect what they are capable >of doing...so called professionals. Yes. You are correct. A good reason for truth in advertising laws... >My question is that I want to know how good somebody can be at either (A) >planting or concealing of a "bug" or surveillance camera etc...and Some techs are "very good". Most, highly competent, techs are government trained but NOT all. It has been my experience that training is a BIG part of it but I've found that "love" of the craft can go a long way. Just about every "good" tech I've ever met "eats, sleeps and drinks" their craft. You would be hard pressed to stump them on something... this does means that individuals without government training should be taken lightly. I've learned some of my best tricks from techs without a single days formal training... You can learn something new every day from individuals with diverse electronic backgrounds... >(B) how good some is at being able to detect all >these items in a room so that >the people they work for are confident that the >room is secure... You would be suprised at how many ways a room, apartment, office complex, private home can be compromised (bugged) and by how many different types of devices... There is an old saying "Anything that man can invent, man can defeat". For every bug there is an anti-bug or countermeasure. The trick is to know what you're looking for and how to implement the proper search procedures with the proper equipment. "You can't drive a nail without a hammer". If you don't use the proper equipment and you don't have the proper training you are NOT going to find most hidden devices planted by a skilled tech. The truth is MOST TSCM work in this country performed in the private sector is done by private investigators with little or no training and poor equipment. Most areas do NOT require TSCM techs to be licensed or to display ANY level of proficiency in their craft. Here in New York state a license is NOT required. That means ANYONE with a few bucks can purchase some equipment, setup an office and go into TSCM work. How does the customer know what he's getting? He doesn't. Most of the "Sweep" companies are charlatans who wouldn't know an eavesdropping device if it bit them on the rear end... >I remember reading about various types of equipment that could be used for >counter intelligence that seemed extremely expensive and not very effective. Most TSCM equipment is expensive because it is "specialized" and not "mass produced" and because many in the business tend to be a "little greedy" in my opinion. Some of the professional TSCM equipment works quite well while most of the lesser quality devices sold by "spy shops" do not work. I know I'm gonna get flamed for that statement so I'll cut it off right here. If any "Spy Shop" owner wants to demonstrate the effectiveness of one of their "tap detectors" or "bug detectors", I'll be happy to demonstrate several simple methods and devices that their unit WILL NOT detect... Live onstage, anywhere, anytime... >I have also read various books on building offensive surveillance equipment but >again how effective can this be... SOME of the surveillance books are quite informative. Some are just old rehash with nothing new. Ask around. Find the "right" titles before purchasing. Sometimes it's not necessary to re-invent the wheel. There are many devices/technologies out there that were NOT designed to be surveillance devices but will work quite well for that purpose. Sometimes it takes a little modification to get them to do exactly what you need... a little imagination and technical know-how can go a long way and save you a ton of money... >I read about TEMPEST and also saw a documentary on the Discovery channel about >the various types of surveillance and counter-surveillance techniques....I >have always found these topics quite interesting as I am an electronic >technician and probably would like to experiment on perhaps beating these >surveillance guys at their own game somehow... Experiment how? Find something an EXPERIENCED tech planted? As I said before, without proper equipment and training you don't stand much of a chance... Here's a game if you want to play... give me WRITTEN permission to monitor you... to enter your home or office for a few hours... without you or your rep there... to plant one or more devices to monitor you... You and ONLY you search the premises to your hearts content using whatever equipment you like... I will monitor you for one week. If you find everything I plant or use to monitor you... you win... if on the other hand you do NOT find everything I plant and/or use, I get the broadcast rights to the tapes... Deal? You might also like to read my report on this subject on my web site at: http://www.thecodex.com/c_eeaves.html fj P.S. I don't mean this to sound like a flame or to be cocky. But this field IS specialized with too many wannabees trying to jump in without a clue... If you're going to enter this field, learn EVERYTHING you can... then learn some more... ************************************************************************** 12)From: t_robarts Subject: Re: CCS International "CCS INTERNATIONAL" can be contacted at the following : 360 Madison Avenue New York, NY 10017 East Coast U.S. 1-800-722-4490 West Coast U.S. 1-800-779-7055 Overseas 212-688-8500 Fax 212-938-1278 WWW http://www.spyzone.com Email spyzone@webscope.com or in London, England - contact : Peter Hewitt, European Marketing Director Tel. 0171-408-0287 Fax. 0171-629-9538 Email postmaster@spyzone.demon.co.uk ************************************************************************** 13)From: (Bret Johnson) Subject: Re: Microphones >With all the knowledge out there, I 'd like to hear what type of miniature >microphones work best in surveillance situations. I've tried a number of >different "spy mics", radio shack mics, and amplifies mini mics. Biggest >problem is trying to isolate conversation from other noise. >It seems the >better the mic, the more peripheral noise it picks up to drown out the >subject conversation. whether it's airplanes flying over, cars going buy, or >muzak playing over the intercom, I seem to always have trouble getting clear >conversation. anyone can get it in a hotel room, or private office. the >challenge is in a warehouse settting, or outdoors. What works best for you? You might want to try an old trick I used back in my shortwave radio monitoring days. Record your audio, using the most sensitive mic possible, and play it back through a component stereo system's audio equalizer. The equalizer can filter out some of the unwanted noise as well as enhancing the desired frequencies. If you have done the best you can (using either the right OR left channel of the equalizer) and it's not quite good enough, run the OUTPUT of the channel you first used into the INPUT of the previously unused channel (and then out to your amplifier/speaker) for further fine tuning. While this does not give perfect results, it usually provides more than acceptable results for gathering required information. Just remember to record "natural" sound and play with the enhancements later during playback, lest you inadvertently filter out the intended programing at the onset. - johnsonb ************************************************************************** 14)From: Chris Kuethe 768 Subject: Re: Intro,Technospy,Microsoft,Tracking device,View a screen?,Invisible > 12)From: Ken Johnson > subject: Intro,Technospy,Microsoft,Tracking device,View a screen?,Invisible. > > On 2/2/97 TLC (www.discovery.com), channel 23, paragon cable,PTLD;OR., aired > a show called "Technospy".It was all about surviellance technology! It > featured bio-chips that implant in the brain,allows others to see what you > see,hear what you here,even sees your thoughts,also will track you by > satellite,and control pleasure & pain! This is under developement!!! Other > chips that allow animals to be scanned are already in existance and are > featured as well. Rats... looks like I missed a good one. Anyway, I read in scientific american a couple months back that scientists have been able to "read minds" The experiment involved monkeys and what they'd do next. As it turned out, a few _READONLY_ electrodes in the right places and they could predict with "uncanny accuracy" what action the monkey would perform a few seconds in advance. Drawing, moving... whatever. linked into a computer, they could see the monkey visualize the circle seconds _BEFORE_ the circle was drawn. Check this URL out for more info... It's been a while since I read the article, so I'm pretty sure I'm over-dramatizing... http://www.sciam.com/0696issue/0696techbus02.html Now let's all rush out to the library and pick up a copy of Michael Crichton's book _The_Terminal_Man_. A great idea. a computer controls a schitzophrenic mind to pacify the patient... but inevitably there's a bug in the system. the patient learns that every time he goes on a bad trip the computer stimulates the pleasure and relaxation centres... so a learning curve develops. he trips out, he gets happy. and it happens more and more often. It drives him even more insane, and he ends up killing people. oooops. :P And something a bit orwellian now. Let's say we're all implanted at birth. Big Brother and the Thought Police (gak... there's a horrid thought) could read our minds and control our bodies. Imagine Alice wants to hold up a bank. BB sees her go up to the bank with criminal intent. Carol is walking by. BB will instruct Alice to stop, but since she's baked she doesn't listen. BB then can then instruct Carol to come over and grab Alice and the Gun. Dave will also be summoned, a if they get killed, Eve and Fred join the party, while Gillian and Harold are instructed to go away... there's nothing to see here. So we can be watched all the time, and who knows when we will be called on to be a police officer. Then again, BB should have been able to tell that Alice was a bank robber in the first place. PLUR chris -- Chris Kuethe LPGV Electronics and Controls 'finger -l ckuethe@gpu.srv.ualberta.ca' for pgp keys http://www.ualberta.ca/~ckuethe/ RSA in 2 lines of PERL lives at http://www.dcs.ex.ac.uk/~aba/rsa/ print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<> )]}\EsMsKsN0[lN*1lK[d2%Sa2/d0 Subject: EAVESDROPPING LAWS I have a question regarding surrepticious recording. My question is, do federal laws over ride a "TWO PARTY" state ? OR is it true that Federal Laws requires "One Party" consent even if you are in a "Two Party" state? ************************************************************************** Who are you? What's your specialty and/or interest? Let us know about your company... What would you like to see on the list? Post it. Let us know... Do you have something to contribute? We'd like to hear it... We want to know EVERYTHING and ANYTHING about eavesdropping, surveillance, countersurveillance & privacy related technology, etc... Remember: who, what, where, when, how & why... we want ALL the details... Do you have a question? Post it... A little free time? Help a member... With the INCREDIBLE brain power on this list, someone should have the answer ;-) P.S. Don't be a LURKER... Members take the time to post info for us all... give something back... Don't just take... Your input/knowledge is valued... ************************************************************************** Send Postings to: 6886@mne.net with "Post" in subject field with subject ************************************************************************** Subscribe to: 6886@mne.net In the subject field type: subscribe-surveillance list e-mail address ************************************************************************** Unsubscribe to: 6886@mne.net In the subject field type: unsubscribe-surveillance list e-mail address ************************************************************************** ...The Simple Rules of the Surveillance List... The Surveillance List Owners may Reject any posts that are/contain: 1) Info Unrelated to Eavesdropping, Surveillance or Privacy technology... 2) Flames or Negative posts... 3) E-Signatures that are considered excessive... 4) Advertisements not DIRECTLY related to the list topics... 5) Attached Files... 6) Oversized Posts... (May be edited to save room) **************************************************************************** This publication is copyrighted and is protected by U.S. and International copyright law. The information transmitted on this list may not be reproduced, reposted or forwarded to any non-list member without expressed written permission of the List Owner. Violation of U.S. copyright law is a criminal and civil offense... **************************************************************************** The Surveillance List is moderated by SpyKing@thecodex.com The List Owner will make EVERY effort to protect subscribers from spam... Copyright 1996, 1997 Codex Publishing Inc., All Rights Reserved... **************************************************************************** Vol 2 Issue # 65 ****************************************************************************** Vol.Two Issue #65 The Surveillance List Mar.18,1997 Over 1500 Members Worldwide ****************************************************************************** IN THIS ISSUE... ****************************************************************************** 01) Question for the list 02) Help! 03) Re: Microsoft, IE bugs, encryption 04) Re: SMS protocols 05) What is TEMPEST? 06) Re: voice stress analyzers 07) Re: needs advice procuring pvt. det. lic. 08) Just got to get this one... 09) Need Advise Response 10) Eavesdropping Laws Response 11) Re: CCS ****************************************************************************** DON'T BE A LURKER.... GET INVOLVED... YOU ARE A MEMBER... MAKE THE MOST OF IT ****************************************************************************** 1)From: "Bill Waddell" Subject: Question for the list Recently, a friend and I were looking at the strips that are imbedded inside of all the new bills that are being circulated (look into the light through it), and we both heard how these strips can be scanned from a distance and whomever is doing the scanning can tell how much cash you are carrying, all without you even being aware of it. My questions to the list members are: - "What principle do these work on, meaning what exactly is being measured?" (Is it a frequency, an emanating field or what?) - "Can these be blocked with a shielded case or bag, much like shoplifters use to defeat the sensors stuck on clothing, CD's, etc.?" - "Do airports, buildings, etc. scan people without them knowing and is this legal, and how popular is this?" I think George Orwell was right, just a little early in his timeline...................Thanks for any help and keep up the good work!!!!! -Sincerely, Bigsby@Bigfoot.com ************************************************************************** 2)From: ErikReep Subject: Help! First off , I like your site , as a Law enforcement officer I understand the importance of your site. Keep it up! I need help. Im dating a young lady who is recently divorced, from an abusive control maggot who is stalking her. We have done everything we can as far as the law is concerned, but he knows the law too, and unfortunatly isnt stupid. I really dont want anything fatal or injurious to happen to him. I just want him to leave us alone. What can I do that isnt too illeagal to pursuade him?? do you know anyone in the Augusta GA area that would be willing to "lean" ( not hurt) on him a little?????? Thanks and again keep up the great work. Erik +++Moderator's Note+++ First off, I wouldn't do anything that was illegal. Don't fall into this guy's trap... but on the other hand as an ex-LEO I never had a problem getting up close and personal with someone, looking in their eyes and convincing them of my sincerity. A few well chosen words, body language and intent eye contact should convey your point across. Otherwise find a new line of work. You don't have what it takes... ************************************************************************** 3)From: "M. J. Van Ham" Subject: Re: Microsoft, IE bugs, encryption >On 3/4/97 I heard (KEX1190 news)that microsoft internet explorer had a bug >that could allow others to read your hard drive!They now have patch at their I'm not absolutely sure about this, but from what I understand, the bug simply allowed Win '95 style short cuts to do be downloaded and executed through IE, with out the user knowing it. The person on the other end can't read your hard drive, however, he or she could concivibly execute programs with out your knowledge (if he or she knew the name and directory of the program). >his wages,or my life ruined for less then that! How hard would it be to put >a bug or back door into any program,modem,or hard drive?Seems to me >manufactures and designers could do a lot of things.I wouldn't have a clue. >Got a spot for home inventory,Finances,ect..on your pc? What a great way to >get the masses to put all their personal info in one easy to get to Your right. It would be incredibly easy for a software (key point here, hardware would be a tad bit more tricky) company to put a back door in their software. However, no one does. Why do you suppose that is? Well, let me play out a scenario for you: Suppose Microsoft puts a back door in Windows 95, so that whenever a user choses to register online his or her hard drive is read, and Microsoft snoops out all the illegal software. (which is exactly something that many users originally suspected win '95 of doing, however I believe that such claims are unfounded). As soon as the back door is discovered by one of the many computer hackers/crackers out there, the whole thing becomes public knowledge. As soon as the media get's just the smallest wiff of a back door, BOOM, everyone knows, and everyone is all upset, and refuses to use that software anymore. There were actually many people who refused to upgrade to Win '95 when it first came out for fear their hard drive would be read by Microsoft. >spot.Encription,passwords? Anything made by man, can be broke by man! Ask >Jonn The Ripper v1.4. Bah.. ever heard of PGP? PGP has support for up to 2048 bit encryption. It will be ALONG time before anyone can break that type of encryption. And as for John the Ripper, it simply hacks away at UNIX passwords. The UNIX password encryption scheme is well known, and is not really all that incredibly secure. John relies on the fact that you have in your possession a copy of the PASSWD file from a UNIX server. If the server has ANY security at all, you should never even be able to get your hands on that file. ************************************************************************** 4)From: "M. J. Van Ham" Subject: Re: SMS protocols > A product called "SMS" (Systems Management Server) had been installed. It > is heralded to be designed to increase network system compatibility and > efficiency. I probably does - that and a lot more. I'm not familar with this, but I plan to have a look into it after having read your post. However, there are a couple of things I felt that I should point out. > "SMS" works by downloading a copy of the system to the server connected to > (have you ever wondered what really goes on while your are watching the > little window that says, "Verifying user name and password." ?). Again, I must stress that I have no prior knowledge of this "SMS", but it has been my experience that when the dialog box reading "Verifying user name and password" comes up, my computer is simply waiting for confirmation and a final handshake from the other computer. > system profile has been transferred (at least in part) to the server > connected to. When login occurs the last system variables are applied to > the computer used to create the new connection and login. I'm not sure about this.. I can see such a thing happening over a local network within a company (in order to enable you to be able to login from any computer), but I don't see how my system profile could be transferred to my ISP. My ISP neither wants or expects anything other than my login name and password, and thereafter, only passes information between me and whatever site I happen to be visiting. > I open the program. Pulled down the file menu ... and surprise!!!! There > on the file menu of my laptop computer (working off of the server at the > office where I had dialed in only last night) were all of the secure file > names from my "D:" drive that I had been working on - only last night. Now > remember, I only have a "C:" drive on my laptop computer - and I don't use > confidential personal data on that computer. > Do you know how it got there yet?? You should! Because everytime you dial > into most ISP's (internet service providers) some portion of "SMS" (or > similar protocol) is running there. MSN (Micro Soft Network) has used this > from the beginning to catch software pirates. Online banks use them to > help guarantee that "it is really you" trying to get to the money. What would you expect? Word keeps track of the last 4 open files (by default). If you're setup on a network that allows you to logon from any computer, you would want YOUR desktop and settings when you logon, right? So, that's what the computer/protocol/whatever does. It keeps all your settings in a file, accessible by anyone on the network, with your username and password. > measure. To date the only countermeasures for individuals are PGP (Pretty > Good Privacy or similar) and abstinence from networks of any kind. PGP > style securities can only impair and/or slow down a good "specialist". The > government limits legal encryption so that they can easily get the > information, if needed (so can others). Slow down? You'd have to have some SERIOUS compute power and a shitload of time in order to break a document encrypted with a 2048 bit encryption scheme. I realize that lesser encryption schemes can be broken (i.e. 40 bit), but 2048 just isn't breakable at the present time. And, as far as the goverment limiting legal encryption... the government only restricts encryption technology EXPORT to under 40 or 50 (I'm not sure) bit, as it is a "national security risk" or some such thing. For people within the United States (and Canada I believe) however, there is no limit (at least not to my knowledge). You're free to encryption documents using whatever type of encryption pleases you. PS: I may have sounded a bit harsh/critical, so please forgive me. I'm very interested in the information you posted, and any further imformation you may find. I am concerned about this SMS thing, but I don't think it's as big of a threat as you make it out to be. ************************************************************************** 5)From: WWMason@aol.com Subject: What is TEMPEST? OK. I give up. What is TEMPEST? +++Moderator's Note+++ There is no short way to educate on TEMPEST. Checkout this web site for a wealth of information on TEMPEST. EVERYONE who uses a computer SHOULD be aware what TEMPEST is... The Complete Unofficial TEMPEST Information Page by Joel McNamara http://www.eskimo.com/~joelm/tempest.html ************************************************************************** 6)From: LoneWolf Subject: Re: voice stress analyzers In response to the inquiry on voice stress analysers, I have such an animal which I purchased in the mid 80's. It has never been used, and I have no need of it. I would be willing to sell it at a fair price. It is a vsa xii purchased from ccs communications control. I have no idea what value it may have. Hopefully, the list can offer some guidance. It is older technology, but, may still be useful. Any input would be appreciated. ************************************************************************** 7)From: JoeSleuth@aol.com Subject: Re: needs advice procuring pvt. det. lic. there is not an easy wayout , pay your dues like all us hard working investigators if you e mail me ill let you know what your state requirements are im not trying to be a wise guy, but there are enough people out there looking to enter this fast growing realm that do not deserve to be in this profession contact me and i assure you i will help you pay your dues ************************************************************************** 8)From: Bret Watson Subject: Just got to get this one... Let me start from the very top and state that M$ specifically stated that win95/97 was not a secure operating system. To underline it I'll state that it is a toy operating system just like the windows series and DOS - very much like building your house out of straw. >Not a Virus. Not a "V" chip. Not some snoop out on the street in a van >reading RF signatures. Not some intruder "monitoring" you electric >service. But a standard procedure for Networking that shows all and tells >all. IT IS HERE! NO NO NO Not a standard procedure for networking (when will people learn that the internet was not invented by M$ ?) >The problem is complicated by the fact that I log into the NET and company >Network using more than one computer. I can literally be at another users >system and log in anywhere using my User ID and password and a good >Internet Browser or MS compatible mail system. Pretty neat! Very >Convenient! .... and very telling. The telling point, I bet you dial into your office and then connect to the internet. BTW logging in to the network from any terminal has nothing to do with SMS. Its a basic feature of any decent LAN, hell even the Mac servers do it. M$ is still getting it right though as you have found out. >"SMS" works by downloading a copy of the system to the server connected to >(have you ever wondered what really goes on while your are watching the >little window that says, "Verifying user name and password." ?). No what happens is the registry is being modified... unfortunately the registry contains an awful lot of stuff... >The I.S. people said "IMPOSSIBLE" of course. The truth is that my laptop >computer has only one hard drive named "C:". My computer at home has two >hard drives "C:" and "D:" respectively. Guessing here, but do you have a folder called briefcase? Its main intention is to ensure that one computer (i.e. your laptop) has the same stuff as your work computer, which has the same stuff as your home computer - a bit like taking a briefcase around with you. Unfortunately its a bit of a loose cannon at times... >Do you know how it got there yet?? You should! Because everytime you dial >into most ISP's (internet service providers) some portion of "SMS" (or >similar protocol) is running there. MSN (Micro Soft Network) has used this >from the beginning to catch software pirates. Online banks use them to >help guarantee that "it is really you" trying to get to the money. WRONG!! See the comment up near the top. Most good providers don't use MS products - they just don't keep up against something like SUN or SGI, or even Novell. Want another good one? using I.E. and connecting to a NT server on a page that requires authentication. Any other browser would end up giving you a page with fields for username & password. Not Internet explorer - it decides that it can authenticate using the NT challenge response method and proceeds to pass your username, domain name, and several other bits of useful data, in CLEARTEXT to the server. It is a trivial exercise to either issue a constant challenge and predict the password from the response, or broker the challenge from a third party in order to get a vaild response. One day M$ will realise that the world is not run by Bill Gates and will get a real security system, and more importantly, will create an incident response team like all the other OS manufactures. > >Is Windows 95 (Win95) the only vulnerable operating system (O/S)? No. >There are some special "back door" capabilities in Win 95, but the SMS and >SMS style protocols will run on any system including DOS. Lets see, with respect to the internet the M$ products are the worst - they 'help' others to connect to your drive (Win NT is the exception). Next comes Mac - Macs are quite good normally, simply because they don't have an inbuilt mechanism for sharing files over anything other than Appletalk - however if you use telnet you should check to see if a FTP server comes with it. Standard, off the shelf unix is the base level to really use the internet (Macs don't have the performance for a server) You have to keep the patchs up to date though. 'Secure' Unix is really the best. By this I mean a standard unix with the 'C2' options. NT fits under this category too. For a real secure system though you might look at TIS' Trusted Mach - but then again its a mite expensive. Again , if you want to be secure, use a real OS - Red Hat Linux is a similar price to Win 95, has an Office Suite similar to Office 95. The difference - Fast support via an enormous support crew, fast response to security breaches (often less than a week, compared to two years) and best of all - you are running unix! If you want to be paranoid about data security then I'd recommend you burn everything and shoot the messenger. Failing that get a risk anaylist in to do a full risk assessment. Form a team to develope a security policy and get a security consultant to assess it and aid in implementing it. Finally, make sure the policy is adhered to - how do you think the rest of the list gets a fair bit of thier data? from leaky security. Cheers, Bret Bret Watson & Associates bwa@usa.net phone +61 41 4411 149 fax +61 9 454 6042 Computer & Information Security Consultants ************************************************************************** 9)From: Trace Carpenter Subject: Need Advise Response >Are there any cheap or really cheap alternatives such as >just taking the test or something I could do and still gain the license Licensing issues are handled differently by each state. Depending on which state you're in, a license may not even be required. Check with the local agencies. Just be careful. You're playing with other peoples money & lives. You may not have to have a license, but you should have some experience. Trace Carpenter 214.828.4520 214.828.1917 Facsimile ************************************************************************** 10)From: Trace Carpenter Subject: Eavesdropping Laws Response >I have a question regarding surrepticious recording. My question is, >do >federal laws over ride a "TWO PARTY" state ? OR is it true that >Federal >Laws requires "One Party" consent even if you are in a "Two Party" >state? The way it was explained to me at one time is that states may increase laws, but cannot decrease. By that I mean that a state may require two parties to be notified, but cannot lower the standard to say, no party may be notified. **Disclaimer** I'm not an attorney. -- Trace Carpenter ************************************************************************** 11)From: "Richard Leatherwood" Subject: Re: CCS To all thinking of doing business with CCS; About a year ago one of our partners a very high ranking official in the Philippines wanted to set-up a security company after leaving office. Kidnapping is very high there and his own son had been kidnapped for ransom. We contacted CCS, ordered their $80.00+ catalogue and then tried to get prices on various products. No one could or would ever give us a straight answer. We were referred to a distributors agreement which required a $250,000+ investment in stock and training, but they would not release any pricing for the products until we signed up and forked over cash. To make a long story short, I put 3 people on a search mission and found almost every product they offer for sale much cheaper, (we aquired their price list from a pissed off customer) and of better quality, and also a better attitude. Note: I did not call one store, I called three London, L.A. and N.Y. for info. You would think they were the CIA with their secrecy attitude instead of a retail store. The products carried are available elsewhere with less attitude and better pricing with a little research. >From my personal point of view, I would suggest any do their Due Diligence before buying from them. R.L.L. ************************************************************************** Who are you? What's your specialty and/or interest? Let us know about your company... What would you like to see on the list? Post it. Let us know... Do you have something to contribute? We'd like to hear it... We want to know EVERYTHING and ANYTHING about eavesdropping, surveillance, countersurveillance & privacy related technology, etc... Remember: who, what, where, when, how & why... we want ALL the details... Do you have a question? Post it... A little free time? Help a member... With the INCREDIBLE brain power on this list, someone should have the answer ;-) P.S. Don't be a LURKER... Members take the time to post info for us all... give something back... Don't just take... Your input/knowledge is valued... ************************************************************************** Send Postings to: 6886@mne.net with "Post" in subject field with subject ************************************************************************** Subscribe to: 6886@mne.net In the subject field type: subscribe-surveillance list e-mail address ************************************************************************** Unsubscribe to: 6886@mne.net In the subject field type: unsubscribe-surveillance list e-mail address ************************************************************************** ...The Simple Rules of the Surveillance List... The Surveillance List Owners may Reject any posts that are/contain: 1) Info Unrelated to Eavesdropping, Surveillance or Privacy technology... 2) Flames or Negative posts... 3) E-Signatures that are considered excessive... 4) Advertisements not DIRECTLY related to the list topics... 5) Attached Files... 6) Oversized Posts... (May be edited to save room) **************************************************************************** This publication is copyrighted and is protected by U.S. and International copyright law. The information transmitted on this list may not be reproduced, reposted or forwarded to any non-list member without expressed written permission of the List Owner. Violation of U.S. copyright law is a criminal and civil offense... **************************************************************************** The Surveillance List is moderated by SpyKing@thecodex.com The List Owner will make EVERY effort to protect subscribers from spam... Copyright 1996, 1997 Codex Publishing Inc., All Rights Reserved... **************************************************************************** Vol 2 Issue # 66 ****************************************************************************** Vol.Two Issue #66 The Surveillance List Mar.19,1997 Over 1500 Members Worldwide ****************************************************************************** IN THIS ISSUE... ****************************************************************************** 01) Surplus equipment 02) Re: BIN directory 03) PGP 04) Spy Factory busts 05) Telephones are Insecure 06) Multiple-location listening 07) Info on FBI surveillance of the Net 08) Special permit? 09) Neat Gadget 10) Electric/rechargable vibrating picking tool 11) CVSA 12) Type of radio communications? 13) Re: Keyloggers 14) Free Advice 15) Re: SMS protocols 16) Alpha pager cloned? 17) Open letter? 18) VSA Response 19) Some insight into Microsoft SMS ****************************************************************************** DON'T BE A LURKER.... GET INVOLVED... YOU ARE A MEMBER... MAKE THE MOST OF IT ****************************************************************************** 1)From: SpyKing@thecodex.com Subject: Surplus equipment From time to time we all have surplus equipment we don't need anymore and there is a market for it... I've created a page on my site at: http://www.thecodex.com/surplus.html where I liquidate personal surveillance & countersurveillance equipment as I upgrade to newer products... If any list member has equipment they want to liquidate I'll be happy to list it on my "surplus" page FREE of charge for them. Send me specs and a gif if you have one and and I'll list your equipment and I'll also create an e-mail box directly to you. This way I don't have to be involved (I have no time anyway). You never know... that old radio, nightscope or receiver could go pretty fast... P.S. For "surplus" equipment only please... ************************************************************************** 2)From amaci@starnet.net.ph Subject: Re: BIN directory I sent a posting a few weeks back asking if any members could help me get a BIN directory. I got some responces from people also looking for the same item. For those of you that do not know what it is it's a bank identification directory which gives the code number of banks which issue credit cards. It is used for checking the validity of credit cards. I am willing to buy one for $500 u.s. (current}96 / 97 even a photocopy will do; contact at amaci@starnet.net.ph ************************************************************************** 3)From: WindWalker7 Subject: PGP I often hear people refer to PGP being able to encrypt at the 2048-bit level, yet the highest I can get my PGP to encrypt at is the 1024-bit "military grade". I have the latest version. What am I missing? ************************************************************************** 4)From samm@digital-paint.com Subject: Spy Factory busts Hello SLForum-- So what's with the Spy Factory busts last Nov....all three top officers in the news on NPR last week....but nothing in the paper or web? Also, plenty of cameras disguised as clocks are still available, so where are the teeth in the Omnibus Crime Bill of 1968, which is apparently the legal basis for busting the Spy Factory? Someone please set me straight! +++Moderator's Note+++ Checkout: http://www.thecodex.com/invaders.html for the scoop on the "Spy Shop" busts... the 1968 Omnibus Crime Bill was superceded in most part by the 1986 ECPA which is also listed at the above site... ************************************************************************** 5)From: Ray Dillinger Subject: Telephones are Insecure You know, most Americans still believe that there has to be a court-ordered warrant for listening in on phone conversations, but in truth, it's not the case. Consider: 1) International calls are routinely monitored by dictionary computers. Hit enough keywords, and your recorded conversation is handed to a human to analyze. Note, this is routine. Not specific to a person, to a phone, to calls to particular countries or people, nothing. Just if the call crosses a border, it goes. 2) Calls made on Cell phones are on Radio frequencies which are not illegal to monitor. I'd be frankly astonished if they weren't routinely monitored in exactly the same way as international calls. 3) Most calls made on "landline" phones, traverse microwave relays, either between microwave towers or to satellites -- again traversing public airwaves not illegal to monitor. And again, I'm betting they routinely get monitored. 4) Now, since we know those "dictionary" computers exist, I'd like to point out that, from a programming point of view, it's a hell of a lot easier to recognize a particular voiceprint than a particular spoken word. If the person who wants to monitor you has a recording of your voice and access to that system, they've got to know in a matter of SECONDS if you pick up the phone and make a call that ever goes across a radio link. 5) Since caller ID service has gone in, the location of each and every caller is known to the system. It gets transmitted (over that same eminently monitorable radio link) between the first and second ring signals. So, the moral of the story is, never *EVER* believe anyone who tells you that a wiretap order is required to listen in on your phone conversations. -- Bear ************************************************************************** 6)From: artstudio@usa.net Subject: multiple-location listening Are kits avail. for multiple-location listening switchboards, or even schematics? I have microphones at seventeen different spots around the house, and switching between them can be frustrating sometimes. Are there pre-built switching boards avail? ************************************************************************** 7)From: "Azel (S. Mason)" Subject: Info on FBI surveillance of the Net Howdy. I am writing a research paper about FBI surveillance of the internet and it's effects on privacy. Could you supply with some info? I have already gotten a bunch of info off the net (specifically TEMPEST but I have decided to stick with Internet Surveillance). If you could supply me with docs or URLs where I could get info on: 1) Known cases of FBI surveillance on the Net. 2) Techniques used by FBI in Internet Surveillance. 3) Methods of protection from Internet Surveillance. Thanks, I really appreciate it! Samuel Mason ************************************************************************** 8)From BADCOFFEE@aol.com Subject: Special permit? Does anyone know if you need a special permit to carry lock picking tools in NJ? I think I could find Beal's treasure quicker than getting the information from the state. Thank you.... be good people ************************************************************************** 9)From: "Kenneth C. Wood" Subject: Neat Gadget kcw.kcwcc@sympatico.ca Hello all. I am guilty of being a lurker so I thought I'd toss in a neat, cheap little gadget I came up with for a client to detect illegal entry in his warehouse: (wait until I tell you how his thief worked, wow...next post) I took a regular inexpensive FM transmitter and tied a cheap little 555 timer circuit that puts out a 1kHz tone to the input (any Radio Shack can sell you a 2.99 book to show you hundreds of these type circuits) then I used a good quality motion detector to enable the transmitter: Bingo- a cheap, reliable, battery powered, easily concealable wireless intrusion detector - the guard has an FM radio tuned to the station of transmission (say 90MHz) that signals a tone when the detector is engaged. Due to the success of this setup (we got him) we switched to higher frequency transmitters and used a scanner to sweep across all the channels Cost: <$200 including the scanner to cover a very large, very full warehouse! ************************************************************************** 10)From BADCOFFEE@aol.com Subject: Electric/rechgable vibrating picking tool Lockpickers: What's the deal when you get "super" heavy spring and a lot of friction? Back to my WD-40 theory? AND....has anyone (only if your not selling them) had any sucess with the "electric/rechgable vibrating picking tool".. Be good people :-) ************************************************************************** 11)From ssaylor1@juno.com Subject: CVSA Listen as far as CVSA (Computerized Voice Stress Analysis) goes please call my voice mail box at 1-888-438-8684 and go through the boxes to have your questions answered. If ya can't get it there and the ad in P.I. Magazine still isn't enough call me or e-mail me and I answerer all specific questions. I promise. As far as I can tell I am one of the few non (now) law enforcement officers trained on the CVSA. I am also a polygraph person. Sometimes I am slow in getting back to you just bear with me. Mr. A. Joseph Saylor, P.I. Ofc:(561) 998-5388 The Naked Truth Detective Agency Fax: (561)443-4989 Boca Raton, FL 33481 E-Mail:ssaylor1.juno.com P.O. Box 812050, Boca Raton, FL 33481 ************************************************************************** 12)From R0819@aol.com Subject: Type of radio communications? I would like to hear from some other private investigators about the type of radio communications they use and what they have found to work best in a variety of situations. I am presently looking at the Motorola Digital Portable Radio that also functions as a cellular telephone. It is being marketed by the Southern Company who owns power companies in Ga, Fl, Al, Ms and La. All of their towers are linked and when talking to someone in another state it sounds as if they are just around the corner. (They claim that since the signal is digital it is totally secure.) The only problem is that for my application the initial cost of the equipment is a little prohibitive. I would like to hear what type of VHF systems other investigators are using and what type of problems they are experiencing. From my law enforcement days I know that you never seem to be close enough to communicate when you really need to. Thanks in advance for any information you can send. Rick Weatherby Weatherby Investigations 103 Dauphin Street, Suite 701 Post Office Box 608 Mobile, Alabama 36601-0608 (334)432-6100 e-mail - R0819@aol.com ************************************************************************** 13)From: "Seagraves, Glenn" Subject: Re: Keyloggers I have seen a lot of questions/answers about "Hacking AOL". I assume most of you wanted to for the same reason I did. Girlfriend, wife, whoever is Hot Chatting and you want to catch them. Here is how I did it. I placed a program such as keylog95 on my partners PC. I configured it so that it would run at boot time via the startup menu. It leaves a blank icon on the task bar but she never noticed or never thought to ask. If she did I would just tell her it was a virus detector or something. This program captures all keystrokes and places them in a log file. After she did something on the computer, I would look at the log file and see exactly what she typed, including passwords. I would then open AOL, log on with her password, and read her Email. But that is not the best part. I read every thing she wrote while chatting, including talking to her new virtual boyfriend. Hope this helps. Glenn Seagraves glenn.seagraves@ColumbiaSC.ncr.com ************************************************************************** 14)From: (Bret Johnson) Subject: Free Advice >If there is anyboy who can explain this to me I would appreciate it as >well... Would it be possible for me, a normal citizen, to cooperate with >the police and bust some drug dealers locally? They are around our local >mall and I am sick of their disturbing presence.. Also, I heard such a >dealer call going on .... the scanner .. I am almost positive that >with my resources, It would be impossible to bust the dealer I >heard, if nothing else because of the way the info was received.. >But what about the druggies/dealers at the mall, would that be >possible? I know I could get anything from them..... Thank you >again, and please excuse the inexperienced nature of this message all >you pro's out there.. Forez, this is only free advice from a novice such as yourself. It is with great sadness that I am passing on this post, based upon my personal experience. Don't even think about getting involved or be prepared to suffer the consequences. If the local law enforcement are so incompetent that this kind of activity passes for normalcy, they are also incompetent enough to hang you out to dry as an easy target instead of actually investigating criminal activity. Under no circumstances make any comments to anyone in your area regarding your desire to see criminals stopped, as this could be interpreted at a later date as a threat. Do not make ANY statements to law enforcement officers without an attorney present. Anything you may say can be twisted into something totally off-the-wall to be used against you at a later date. Do not actively call law enforcement in response to criminal activity as this makes them work harder and indicates that you "have it in" for someone or some group. Never forget that a criminal has more rights than you do. Resign yourself to the fact that today's law enforcement personnel exist purely to feed the city or municipality dollars gleaned from traffic tickets and extraneous fines -- they are NOT there to protect you, your family, or your property. Finally, in spite of your present faith in God and country, move as far away from the infested area as possible. Lastly, let me remind you that while I am not a lawyer, I (with emphasis) am learning about law the hard (expensive) way. -johnsonb ************************************************************************** 15)From: Chris Kuethe 768 Subject: Re: SMS protocols > > 4)From: "M. J. Van Ham" > Subject: Re: SMS protocols > > > "SMS" works by downloading a copy of the system to the server connected to > > (have you ever wondered what really goes on while your are watching the > > little window that says, "Verifying user name and password." ?). > > Again, I must stress that I have no prior knowledge of this "SMS", but it > has been my experience that when the dialog box reading "Verifying user > name and password" comes up, my computer is simply waiting for confirmation > and a final handshake from the other computer. > > > system profile has been transferred (at least in part) to the server > > connected to. When login occurs the last system variables are applied to > > the computer used to create the new connection and login. > > I'm not sure about this.. I can see such a thing happening over a local > network within a company (in order to enable you to be able to login from > any computer), but I don't see how my system profile could be transferred > to my ISP. My ISP neither wants or expects anything other than my login > name and password, and thereafter, only passes information between me and > whatever site I happen to be visiting. Try this... using a normal terminal program (windows terminal, zterm, whatever) dial up your ISP. wait for the login and password prompts. enter them. presto. instant shell account. well at least that's how it goes with my ISP. I can see this SMS being a loaded in a high-security area... software and hardware development. keeping all the important work on a physically secure server lest you "lose" your laptop near a competitor. :P And SMS would have to detect what kind of hardware you're running so as to be able to d/l the right kind of snoop code. Unless you know of some way to really run RS6000 code on an x86... without emulation. it won't happen. the "internet worm" of a few years back was about 4KB of shell scripts and then a 600KB block of object code compiled for about 10 different platforms. I wouldn't worry too much about it. After all someone did suggest that we do all our important work offline, on an unconnected computer and then transfer over on floppies. Good security precaution. PLUR chris Chris Kuethe LPGV Electronics and Controls 'finger -l ckuethe@gpu.srv.ualberta.ca' for pgp keys http://www.ualberta.ca/~ckuethe/ RSA in 2 lines of PERL lives at http://www.dcs.ex.ac.uk/~aba/rsa/ print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<> )]}\EsMsKsN0[lN*1lK[d2%Sa2/d0 Subject: Alpha pager cloned? Will you be at the dayton, ohio ham and computer fest.. Where is the best place to get a alpha pager cloned.. I just need the code changed. it is on the correct frequency now Sam -- realtor@cdc.net Visit my web page at.... http://TN.Living.net/Realtor/10098810 http://www.geocities.com/BourbonStreet/2222/ CITYS I KNOW Natchez,MS**Chattanooga,TN**WAVERLY,TN INTEREST=Realtor*Scuba*Hang gliding *Netscape3.0*HamRadio N5NVF ************************************************************************** 17)From: kilsdonk@frobus.lkg.dec.com Subject: Open letter? How do you open an envelope so that you can reseal it as it was? -Dan ************************************************************************** 18)From: Trace Carpenter Subject: VSA Response I am familier with the VSA you are referring to. I have done a fair amount of research on different types & styles of these units recently in preperation for purchasing one. I wouldn't have responded but you were looking for input on the unit. Unfortunately, even though it was the first type of unit we considered, after extensive research I believe it is of lesser quality than the other units on the market. I don't know what it sold for when you bought it, but currently you can purchase the PSE2000 for around $6K which is a good unit. There is also another unit out there which is FAR superior to any of them from what I've been able to find out, but good luck trying to get one. We're trying to now. Give me a call if you'd like to. I might consider it if the price was right. -- Trace Carpenter Trace Carpenter Investigations Professional Private Investigations 660 Amberton Tower Suspicions Confirmed 4144 N. Central Expy. Problems Solved ! Dallas, Texas 75204 Free Consultations 214.828.4520 214.828.1917 Facsimile ************************************************************************** 19)From: "Seagraves, Glenn" Subject: Some insight into Microsoft SMS SMS allows you to do many things in a network environment. Some of these include distribution of software, monitoring network activity, etc. And yes, it can force you to run a logon script to install software, etc. Administrators can monitor what you are doing on your computer, i.e. what you are doing under Netscape and what Web Pages you are accessing. From this info. they can prevent you from going places, running apps. etc. Under NT and 95, you can be forced to use what is called a mandatory user profile which can be set to limit what you can do. In the extreme, you can be limited to what is on your desktop. This means you can't run the start/run option, can't run the command prompt, or Explorer. Under 95, you have two registry files, User.dat (user registry) and System.dat (system registry). Administrators can stored these files on a secure server, and when you log on (by the way, when you get the log on prompt, it is only verifying your account within the Domain, if you are in a domain model) if you have any login scripts, mandatory profiles, etc. associated with your account then they are ran. And user profiles will then follow you to any system you log into on that network (including remote log ins). Hope this clears up some of the confusion. Glenn Seagraves glenn.seagraves@ColumbiaSC.ncr.com ************************************************************************** Who are you? What's your specialty and/or interest? Let us know about your company... What would you like to see on the list? Post it. Let us know... Do you have something to contribute? We'd like to hear it... We want to know EVERYTHING and ANYTHING about eavesdropping, surveillance, countersurveillance & privacy related technology, etc... Remember: who, what, where, when, how & why... we want ALL the details... Do you have a question? Post it... A little free time? Help a member... With the INCREDIBLE brain power on this list, someone should have the answer ;-) P.S. Don't be a LURKER... Members take the time to post info for us all... give something back... Don't just take... Your input/knowledge is valued... ************************************************************************** Send Postings to: 6886@mne.net with "Post" in subject field with subject ************************************************************************** Subscribe to: 6886@mne.net In the subject field type: subscribe-surveillance list e-mail address ************************************************************************** Unsubscribe to: 6886@mne.net In the subject field type: unsubscribe-surveillance list e-mail address ************************************************************************** ...The Simple Rules of the Surveillance List... The Surveillance List Owners may Reject any posts that are/contain: 1) Info Unrelated to Eavesdropping, Surveillance or Privacy technology... 2) Flames or Negative posts... 3) E-Signatures that are considered excessive... 4) Advertisements not DIRECTLY related to the list topics... 5) Attached Files... 6) Oversized Posts... (May be edited to save room) **************************************************************************** This publication is copyrighted and is protected by U.S. and International copyright law. The information transmitted on this list may not be reproduced, reposted or forwarded to any non-list member without expressed written permission of the List Owner. Violation of U.S. copyright law is a criminal and civil offense... **************************************************************************** The Surveillance List is moderated by SpyKing@thecodex.com The List Owner will make EVERY effort to protect subscribers from spam... Copyright 1996, 1997 Codex Publishing Inc., All Rights Reserved... **************************************************************************** Vol 2 Issue # 67 ****************************************************************************** Vol.Two Issue #67 The Surveillance List Mar.21,1997 Over 1500 Members Worldwide ****************************************************************************** IN THIS ISSUE... ****************************************************************************** 01) Carrying Case 02) Re: Question for the list 03) Felons on your scanner! 04) Spread spectrum phones - Difficult to decode? 05) Re: PGP 06) Re: PGP 07) Re: FBI Surveillance on the Net 08) Re: Type of radio communications? 09) Re: Bin Directory 10) Re: Letter opening 11) Re: PGP 12) Re: AOL Hacking 13) CVSA Correction 14) Good technique for picking lock ****************************************************************************** DON'T BE A LURKER.... GET INVOLVED... YOU ARE A MEMBER... MAKE THE MOST OF IT ****************************************************************************** 1)From: SpyKing@thecodex.com Subject: Carrying Case I received this product inquiry thru my site. I do not handle this product. If any list member does please contact the subject directly. >From: "Delaney, David" >To: "'SPYKING'" >Subject: CARRYING CASE >Date: Wed, 19 Mar 1997 16:26:20 -0500 > >Sir, > >Wang has a need for an attache type of case to carry spare parts. It >must be about the size of a pilot's case which is used to carry the >flight manuals. It must have a lock that is absolutely secure and has >provision to be able to tell if it has been tampered with, or the case >has been opened. > >Do you have such a thing, or know where it can be obtained. > >My phone number is 508 967 6310. > ************************************************************************** 2)From: "David S. 'Greeny' Greenberg" Subject: Re: Question for the list > 1)From: "Bill Waddell" > Subject: Question for the list > > Recently, a friend and I were looking at the strips that are imbedded > inside of all the new bills that are being circulated (look into the light > through it), and we both heard how these strips can be scanned from a > distance and whomever is doing the scanning can tell how much cash you are > carrying, all without you even being aware of it. > > My questions to the list members are: > - "What principle do these work on, meaning what exactly is being measured?" > (Is it a frequency, an emanating field or what?) > - "Can these be blocked with a shielded case or bag, much like shoplifters > use to defeat the sensors stuck on clothing, CD's, etc.?" > - "Do airports, buildings, etc. scan people without them knowing and is > this legal, and how popular is this?" > I'm not sure about the frequencies or how to block this -- but it's my understanding (and this comes from a Custom's agent) that they can only detect LARGE amounts of cash. Say $5,000 in 20's or something like that. Their scanner isn't able to resolve the actual amount. Or at least it wasn't 2 yrs ago when he mentioned this to me -- technology might now be available to increase the resolution... As for can they be blocked -- sure -- anything can be blocked, how heavy do you want to make your briefcase? ;-> OR, just pull the strip out -- I've seen it done many times as a lunchtime cafeteria trick... 'course, if you need to hide 20K or so, get a case of beer, and start pulling strips out... I definately wouldn't suggest stuffing them into someone's open shopping bag @ the airport -- might cause them some trouble! Is it legal? No. There's plenty of case law surrounding privacy, and one case in particular which says that "that which one seeks to keep private, is considered private under the 4th amendment" was decided by the US Supreme Court. Since you keep your money in a wallet, and keep the wallet in your pocket and don't wear a sign saying "I've got $200 spending money with me, some credit cards, etc." around your neck, I'd say you were trying to keep it private, and that they were invading your privacy by scanning you w/o your direct knowledge or consent. Moreover, carrying cash is NOT A CRIMINAL ACT (well, unless you know it's from the fruits of a criminal act) -- read up on the businessman who was carrying $20K in his briefcase to buy some property with, got nailed by Customs, got it confiscated, they didn't prove he was a drug dealer, he had to sue to get it back... It's on the web somewhere... ************************************************************************** 3)From: "Mayson, John" Subject: Felons on your scanner! Fla. considers felon-tracking satellites TALLAHASSEE, Fla., March 18 (UPI) _ Florida lawmakers are working on a plan (Tuesday) that would let probation officers use satellites to track felons recently freed from state prisons. The plan was hastily crafted amid public outrage over the early release of 500 offenders, including inmates convicted of violent crimes. Their releases were ordered by the U.S. Supreme Court, which ruled Florida could not revoke ``gain time'' credits that had been awarded to inmates for good behavior. The gain time program, which enabled inmates to earn two months off their sentences for each month served, was established in the 1980s to relieve prison overcrowding, but was was scrapped following a prison- building boom that began in the early 1990s. Florida's attorney general directed the state Department of Corrections to strip inmates of gain time earned before the program was abolished, but the high court blocked the move. The resultant early releases have left state legislators scrambling to strap a tighter leash on newly freed inmates. A state Senate panel Monday approved the satellite-tracking plan, which would allow probation officers to keep track of every move made by convicts wearing electronic ankle bracelets. It would be the first such program in the country. The committee also passed a measure that would require most inmates released early to visit their probation officer at least four times a week. The legislation was approved so quickly that no one could say how many millions of dollars the measures will cost. Lawmakers hope to have the bills on Gov. Lawton Chiles' desk within a week. ************************************************************************** 4)From: tyler@cyberia.com (tyler) Subject: Spread spectrum phones - Difficult to decode? I know spread spectrum isn't the easiest thing in the world to break down, but I got a base of one at a hamfest and am curious about how it works. I have a couple of basic SS papers laying around, but am curious how the actual encription works. The phone uses two MC3418 chips. (Continuously variable slop delta modulator/demod) It has some digital inputs/outputs and I was wondering how the handset and the base decide to use the same code? I don't have the handset part so I'm at a disadvantage, but I would be very grateful if anybody would help me out or point me in the right direction. Thanks Tyler ************************************************************************** 5)From: "William H. Geiger III" Subject: Re: PGP >3)From: WindWalker7 >Subject: PGP >I often hear people refer to PGP being able to encrypt at the 2048-bit >level, yet the highest I can get my PGP to encrypt at is the 1024-bit >"military grade". I have the latest version. What am I missing? When you go to generate your key pair you need to manually enter the key size if you want a size different than what is offered to you. William H. Geiger III http://www.amaranth.com/~whgiii Geiger Consulting Cooking With Warp 4.0 Author of E-Secure - PGP Front End for MR/2 Ice PGP & MR/2 the only way for secure e-mail. Finger whgiii@amaranth.com for PGP Key and other info ************************************************************************** 6)From: Mark Beer Subject: Re:PGP > 3)From: WindWalker7 > Subject: > > I often hear people refer to PGP being able to encrypt at the 2048-bit > level, yet the highest I can get my PGP to encrypt at is the 1024-bit > "military grade". I have the latest version. What am I missing? When the menu for generating a key pair appears it gives a choice of 1-3 or you can just type the number of bits, ie 2048. At least it does with the version i'm using (pgp 2.6.3i) Regards Mark -- tbso@thebeer.demon.co.uk ************************************************************************** 7)From: "Young Gun" Subject: Re: FBI Surveillance on the Net I'd also like information on FBI surveillance. I appreciate any responses sent to me as well for research on this topic. Thank you! Frank Pagano Computer Science Major A.S. Criminal Justice-Law Enforcement Auxiliary Police Officer #7144 Nassau County, New York (The Habitation of Justice) http://www.geocities.com/~nocompromise OR http://www.geocities.com/CapitolHill/7245 Disclaimer (I deny everything) ************************************************************************** 8)From: "Anastasios D. Panos" Subject: Re: Type of radio communications? >I would like to hear from some other private investigators about the type of >radio communications they use and what they have found to work best in a >variety of situations. > >Thanks in advance for any information you can send. > >Rick Weatherby >Weatherby Investigations Icom V68 is a portable VHF unit (U68 on UHF) that accepts a PCB with a digital scrabler It is not expensive and we use them in my company for over a year now. We use the Standard C 508A dual banders for VHF/UHF short range communications (surveillances) with ear mikes, Good Luck Anastasios D. Panos Panos & Associates, P. 0. Box 19063, Athens 117 10, Greece, Ph: +30-1-923.7420, Fax: +30-1-923.2787 Contact: Anastasios D. Panos Member of : Intelnet, WAD, CII, ASIS, NAIS, URL: http://www.uklegal.com/panos E-Mail : panosagcy@hol.gr ************************************************************************** 9)From: SpyKing@thecodex.com Subject: Re: Bin Directory I'm not sure this is the book you were requesting info on but this might help. I've found this book to be invaluable in tracing bank assets in the past... R.L. Polk & Company 1155 Brewery Park Blvd. Detroit, Michigan 48207 U.S.A. Publisher of Polk's International Bank Directory ($67.50). This publication, which is updated annually, lists every bank in the world (including its total assets and heads of each department). You may view a copy of this publication at your local library. ************************************************************************** 10)From: SpyCovert@aol.com Subject: Re: Letter opening Dan, I've never actually tried this method but I've heard that holding an envelope over steam from a pot of boiling water would allow the envelope to unseal fairly easily. You just have to be careful not to wrinkle the sealing tab so as not to draw any suspicions when resealing it. Also, if you're having difficulty resealing it to it's original appearance, just repeat the process so that the glue would gum up again. Daniel Spysociety@aol.com +++Moderator's Note+++ You can also view the contents by spraying the envelope with freon... ************************************************************************** 11)From: alpha1@pobox.com Subject: Re: PGP >I often hear people refer to PGP being able to encrypt at the 2048-bit >level, yet the highest I can get my PGP to encrypt at is the 1024-bit >"military grade". I have the latest version. What am I missing? When generating the keys, you may select from the list of three options, or you can enter the key length directly. Instead of picking 1, 2, or 3, enter 2048. Below is a keygen session opening screen: pgp -kg Pretty Good Privacy(tm) 2.6.2 - Public-key encryption for the masses. (c) 1990-1994 Philip Zimmermann, Phil's Pretty Good Software. 11 Oct 94 Uses the RSAREF(tm) Toolkit, which is copyright RSA Data Security, Inc. Distributed by the Massachusetts Institute of Technology. Export of this software may be restricted by the U.S. government. Current time: 1997/03/20 17:12 GMT Pick your RSA key size: 1) 512 bits- Low commercial grade, fast but less secure 2) 768 bits- High commercial grade, medium speed, good security 3) 1024 bits- "Military" grade, slow, highest security Choose 1, 2, or 3, or enter desired number of bits: Type 2048 here. As obvious as it is, many people miss this (including me in the early days of using PGP) so don't feel bad. Also, this will create a 2047 bit key instead (the maximum allowable for 2.6.2). If you want a 2048 bit key, the international version 2.6.3i will create it, or perhaps one of the 2.6.3 versions distributed for domestic use. Some informational links about PGP and PGPn123 are available here: http://www.pobox.com/~alpha1/epgpn123.htm Lynn ************************************************************************** 12)From: Starsheet@aol.com Subject: Re: AOL Hacking I, too, would like to know how to monitor AOL's IMs in real time, or record them for later bathroom reading. However, since I haven't got that one figured out yet, I'll let you in on some interesting if desperate measures to find out something about suspicious AOL traffic. If you have physical access to the system, and the "perp" is kinda unaware, there are lots of things you can do. Re: Legality: If you have legal physical access to the computer, I believe you have legal access to the filing cabinet. It is, after all, as if the other person left opened mail lying around on the desk. It may be tacky, but I believe it's legal to read it. 1. If they depend on flash sessions, they have to leave their password in the flash-session setup. You can set up the session so that it does NOT sign off immediately, and then sign on. Not only are you in, but you can go to Mail>Check mail you've sent (or read) and read the last few days' worth WITHOUT leaving those telltale big red check marks in the file cabinet. Be sure to modify the Buddy List as soon as you get on, though, or one of their buddies may catch on and blow your cover. (Don't forget to modify it back before leaving.) 2. If you can't do the above, go to File Manager (Windows 3.1) or Explorer (Win 95), and open to the AOL files. Go to Organize and find the screen name of interest. Open that file in a word-processing program (it's probably too big for Notepad). Then you can use the Search function to look for key words (products, company or individual names, towns, etc.) to find mail relating to your need-to-know. Remember - if you use MS Word, it records and displays the names of the last 4 files opened. If you don't want to leave tracks, be sure to open at least 4 nondescript documents in Word after you finish. Also, in Windows 3.1, you have to "Associate" the file before you can open it directly from the File Manager. Be sure to erase these footprints also. 3. When you find material of interest, you can highlight it, copy, and d/l to a floppy for later printing. 4. If the screen name's file is small, d/l the whole thing to floppy and read it in detail later. 5. For your own protection in AOL: DON'T leave the system set up for flash sessions; when you send mail, either modify your preferences so sent mail is not saved, or go to your PFC immediately and delete it once it's gone out (you can still access it when you're actually on-line under Check mail you've sent); once you've deleted it from the PFC be SURE to compact the filing cabinet, or it will remain accessible via step 2 above. Question: After having done all this, is the deleted and compressed-out mail still accessible through Norton or other un-delete utilities? ************************************************************************** 13)From: ssaylor1@juno.com Subject: CVSA Correction Listen, as far as CVSA (Computerized Voice Stress Analysis) goes please call my voice mail box at 1-888-438-8684 and go through the boxes to have your questions answered. If you can't get it there and the ad in P.I. Magazine still isn't enough call me or e-mail me and I answer all specific questions. I promise. As far as I can tell I am one of the few non (now) law enforcement officers trained on the CVSA. I am also a polygraph person. Mr. A. Joseph Saylor, P.I. Ofc:(561) 998-5388 The Naked Truth Detective Agency Fax: (561)433-4989 Boca Raton, FL 33481 E-Mail:ssaylor1.juno.com P.O. Box 812050, Boca Raton, FL 33481 ************************************************************************** 14)From: SKMU07A@prodigy.com ( MA T HEMERLEIN) Subject: Question, In DEPTH, what is a good technique for picking lock I recently read a response to a question that told how to make a picking tool from steal wire used to wrap lumber. In this case they were telling you to take a piece of wire, straighten it out, and heat it until it was bright red, then stick it into a glass of ice water. The writer said that professional tools work well, but there is nothing better than homemade ones. Although this letter gave allot of information, I would like to know how to make more of these tools, and where a good place is to buy professional pick tools. Thank you for any info, Peter Hemerlein Skmu07a@prodigy P.S. Do those vibrating lock picks work ok? ************************************************************************** Who are you? What's your specialty and/or interest? Let us know about your company... What would you like to see on the list? Post it. Let us know... Do you have something to contribute? We'd like to hear it... We want to know EVERYTHING and ANYTHING about eavesdropping, surveillance, countersurveillance & privacy related technology, etc... Remember: who, what, where, when, how & why... we want ALL the details... Do you have a question? Post it... A little free time? Help a member... With the INCREDIBLE brain power on this list, someone should have the answer ;-) P.S. Don't be a LURKER... Members take the time to post info for us all... give something back... Don't just take... Your input/knowledge is valued... ************************************************************************** Send Postings to: 6886@mne.net with "Post" in subject field with subject ************************************************************************** Subscribe to: 6886@mne.net In the subject field type: subscribe-surveillance list e-mail address ************************************************************************** Unsubscribe to: 6886@mne.net In the subject field type: unsubscribe-surveillance list e-mail address ************************************************************************** ...The Simple Rules of the Surveillance List... The Surveillance List Owners may Reject any posts that are/contain: 1) Info Unrelated to Eavesdropping, Surveillance or Privacy technology... 2) Flames or Negative posts... 3) E-Signatures that are considered excessive... 4) Advertisements not DIRECTLY related to the list topics... 5) Attached Files... 6) Oversized Posts... (May be edited to save room) **************************************************************************** This publication is copyrighted and is protected by U.S. and International copyright law. The information transmitted on this list may not be reproduced, reposted or forwarded to any non-list member without expressed written permission of the List Owner. Violation of U.S. copyright law is a criminal and civil offense... **************************************************************************** The Surveillance List is moderated by SpyKing@thecodex.com The List Owner will make EVERY effort to protect subscribers from spam... Copyright 1996, 1997 Codex Publishing Inc., All Rights Reserved... **************************************************************************** Vol 2 Issue # 68 ****************************************************************************** Vol.Two Issue #68 The Surveillance List Mar.22,1997 Over 1500 Members Worldwide ****************************************************************************** IN THIS ISSUE... ****************************************************************************** 01) Looking for Good Articles 02) "Gaslighting" 03) Technospy followup 04) Covert pinhole B/W camera 05) Adoption trace 06) Video switch for surveillence? 07) Cell Phone Code Cracked 08) Carrying Case 09) LCD screens, Re-Need Advice, Thanks 10) Steganos for Windows 95 11) ***ISP problem*** ****************************************************************************** DON'T BE A LURKER.... GET INVOLVED... YOU ARE A MEMBER... MAKE THE MOST OF IT ****************************************************************************** 1)From: Statewide Investigations & Protection Subject: Looking for Good Articles If any of you are interested in submitting an article to be published in the "INVESTIGATOR" A Private Investigation Resource Newsletter mailed to Investigators, Lawyers, and Insurance companies please submit them to me via Email or the address below. We also have room for two half page ads. If you are interested let us know. Our next issue goes to print on April 28, 1997 at 11:00 a.m. Mountain Standard time. We won't be able to pay you but you will be given authors credit, a business card ad and a couple copies of the newsletter. We are looking for Investigational related Articles, Resources, and Experiences. Topics on FCRA, New Laws, New Equipment, Tips & Tricks, Computer Info., Tips on Running an Agency, Marketing, Networking, P.I. Lists, News etc... We are also looking for anything interesting in way of Investigating through the INTERNET. Thanks, Marc ************************************************************ Marc Buckley OWNER / INVESTIGATOR / EDITOR STATEWIDE INVESTIGATIONS AND PROTECTION " INVESTIGATOR " BI-MONTHLY NEWSLETTER 2836 STAFFORD PLACE W.V.C. UTAH 84119 OFFICE: 801-967-7136 CELLULAR: 801-860-7610 FAX: 801-967-7136 PAGER: 801-552-8155 E-MAIL: swide@xmission.com WEB sites: http://www.angelfire.com/biz/statewideinvestigate/index.html http://tool-box.com/rc/owa/freeweb.page?id=1039624 Gumshoe: Shadow-UT LICENSED 100122 & 100162 & BONDED ************************************************************ ************************************************************************** 2)From: shadowrunner@voyager.net Subject: "Gaslighting" I'm trying to find some info on "Gaslighting". Can anyone on this list help me? Thanks in advance ShadowRunner ************************************************************************** 3)From:Ken Johnson (Enormus142@aol.com) Subject: Technospy followup A very considerate person named Liam,from Norway, e-mailed me and said he would make me a copy of technospy,if I sent him a tape. I will extend the same courtesy to others after I get the copy. I'll let you know when recieve it. The show also featured mechenical butterflies equiped with surviellance cameras ect.... They use the same motion in flight as real ones! Very realistic. They also featured an electronic "Sniffer" that can detect your chemical scent,even after you've left the premises. These two devices were under development at the time of the show(2/2/97). The U.S.military will be testing them at the University of Florida,Gainsville,Florida, on 4/5/97(Paul Harvey news).Planting bugs will never be the same,you'll have to fly them in now. ************************************************************************** 4)From Spysociety@aol.com Subject: Covert pinhole B/W camera I'm in need for an inexpensive covert pinhole B/W camera for interior automobile applications. Anyone know of any reliable suppliers to fill that need? Daniel Spysociety@aol.com ************************************************************************** 5)From mango@treco.net Subject: Adoption trace A friend of mine is an adult who was adopted. She would like to be able to write her birth mother a letter to say "thanks"----- but only if her mother wants to be located. Who can help? Thanks, Steven Swann ************************************************************************** 6)From: Tim Chown Subject: Video switch for surveillence? Hiya, Can anyone recommend a product which will act as a video switch for a number of signals with control via a PC or workstation? What I'd like to run is a surveillance system which would take images from 4-6 camera points and make them available via some kind of switch box so that I can capture a shot from any input camera. So I could do stuff like difference monitoring on the pictures on a PC. The pictures could then be sent over the net and viewed anywhere. I assume such boxes (and software?) is for sale - if so what sort of ball park figure and where? :-) A more sophisticated box would have a number of video outputs under the control of a PC (or similar) to allow real-time monitoring of the available inputs - how pricey does that start getting? I assume with sound on top of that, we're talking mega $$$ ? If I get a bunch of email replies I'll repost a summary for info. I'd hope the first of the three wishes is pretty cheap these days? Cheers, Tim Chown Southampton, UK. ************************************************************************** 7)From: SpyKing@thecodex.com Subject: Cell Phone Code Cracked I thought this of interest to the list... For details of the crack see the cryptographers' press release at: http://www.counterpane.com/cmea.html ************************************************************************** 8)From: caldwell Subject: Carrying Case > I received this product inquiry thru my site. I do not handle this product. > If any list member does please contact the subject directly. > > >From: "Delaney, David" > >To: "'SPYKING'" > >Subject: CARRYING CASE > >Date: Wed, 19 Mar 1997 16:26:20 -0500 > > > >Sir, > > > >Wang has a need for an attache type of case to carry spare parts. It > >must be about the size of a pilot's case which is used to carry the > >flight manuals. It must have a lock that is absolutely secure and has > >provision to be able to tell if it has been tampered with, or the > >case has been opened. > > > >Do you have such a thing, or know where it can be obtained. > > > >My phone number is 508 967 6310. _________________ I know that Samsonite Corporation has long been a provider of "specialized" type of briefcases and carrying cases, including those provided to LE and even the agency. They are located in Denver, CO and can be reached at (303) 373-2000. I believe their tech division is also located at that location. Greg Caldwell ISC (303) 331.2459 ************************************************************************** 9)From: From:Ken Johnson(Enormus142@aol.com) Subject: LCD screens, Re-Need Advice, Thanks Are L.C.D.screens(laptops)subject to tempest monitoring? Re: Need Advice- If I were in your shoes, I would be very careful! PROTECT YOUR ANONYMITY!!! If you need to do something try this: Any evidence about the drug dealers,scanner recordings, license plate #, pictures or video,ect..., should be sent anonymously to the mall owners,along with a typed letter stating your fears,feelings,and advice. Mall owners want customers,and they will probably have more influence with the police then a private citizen. Let the owners have a chance to take care of it FIRST, If that doesn't work ANONYMOUSLY send the same package to your local news station. Mall owners doing nothing about drugs and crime is a bigger story then drug dealers alone. Let all your intentions be known, but keep your identity secret. Even if your evidence can't be used in court, it will be looked at, if just "out of curiosity". DON'T GO FOR THE FAME OR GLORY, YOU MIGHT END UP THE STORY".X*-P. Drug dealers usually spend little time in jail if they turn over info on their supplier. Once out you could be in real trouble. Revenge is not unlikely. Thanks CrACKeD for responding to my post on invisible. I've tried to contact the Discovery Channel, but they said they need more info on what show.If anyone has more info on this let me know ,thanks. ************************************************************************** 10)From: Fabian Hansmann <100651.3561@CompuServe.COM> Subject: Steganos for Windows 95 Steganos for Windows 95, Version 1.0 Steganos for Windows 95 (native 32-bit application) is now available! Download it from http://www.demcom.com/english/steganos Steganos hides all types of files within image files (BMP, DIB), sound files (WAV, VOC), all types of ASCII text files or HTML documents, and even files of an unsupported format after the user entered some information on the carrier file. Note that Steganos allows encrypting files only (without hiding) and hiding without encrypting, too. Steganos supports compression and wiping files from your hard disk irrevocably. A documented DLL for programmers is included. Regards, Fabian Hansmann (fabian@demcom.com) ************************************************************************** 11)From: SpyKing@thecodex.com Subject: ISP problem We are experiencing the same problem with our ISP again this week. They claim a main link is down. E-mail and service has been sporadic at best. If you have sent a message to me or the list in the last week and you have not seen it appear, please resend. Evidently some e-mail has been returned with error message stating server is down or unknown recipient. Please resend. As soon as problem is fixed list will resume daily. Sorry for interuption but right now it's out of my control... ************************************************************************** Who are you? What's your specialty and/or interest? Let us know about your company... What would you like to see on the list? Post it. Let us know... Do you have something to contribute? We'd like to hear it... We want to know EVERYTHING and ANYTHING about eavesdropping, surveillance, countersurveillance & privacy related technology, etc... Remember: who, what, where, when, how & why... we want ALL the details... Do you have a question? Post it... A little free time? Help a member... With the INCREDIBLE brain power on this list, someone should have the answer ;-) P.S. Don't be a LURKER... Members take the time to post info for us all... give something back... Don't just take... Your input/knowledge is valued... ************************************************************************** Send Postings to: 6886@mne.net with "Post" in subject field with subject ************************************************************************** Subscribe to: 6886@mne.net In the subject field type: subscribe-surveillance list e-mail address ************************************************************************** Unsubscribe to: 6886@mne.net In the subject field type: unsubscribe-surveillance list e-mail address ************************************************************************** ...The Simple Rules of the Surveillance List... The Surveillance List Owners may Reject any posts that are/contain: 1) Info Unrelated to Eavesdropping, Surveillance or Privacy technology... 2) Flames or Negative posts... 3) E-Signatures that are considered excessive... 4) Advertisements not DIRECTLY related to the list topics... 5) Attached Files... 6) Oversized Posts... (May be edited to save room) **************************************************************************** This publication is copyrighted and is protected by U.S. and International copyright law. The information transmitted on this list may not be reproduced, reposted or forwarded to any non-list member without expressed written permission of the List Owner. Violation of U.S. copyright law is a criminal and civil offense... **************************************************************************** The Surveillance List is moderated by SpyKing@thecodex.com The List Owner will make EVERY effort to protect subscribers from spam... Copyright 1996, 1997 Codex Publishing Inc., All Rights Reserved... **************************************************************************** Vol 2 Issue # 69 ****************************************************************************** Vol.Two Issue #69 The Surveillance List Mar.24,1997 Over 1500 Members Worldwide ****************************************************************************** IN THIS ISSUE... ****************************************************************************** 01) List Problem 02) Alert- DOS Software ****************************************************************************** DON'T BE A LURKER.... GET INVOLVED... YOU ARE A MEMBER... MAKE THE MOST OF IT ****************************************************************************** 1)From: SpyKing@mne.com - List Moderator Subject: List Problem My ISP mne.net is still down. I have not been able to get straight answer from them what their problem is. Evidently their main trunk or net connection is down and they are operating on backup system (so they claim). This has affected e-mail to my "thecodex.com" and the lists "6886@mne.net Their mirror site appears to be working OK. For the time being please post list messages to 6886@mne.com I'm still not receiving incoming mail at the other address although outgoing appears to be working. I AM receiving mail at mne.com Sorry for interruption by it's out of my hands until these guys get their act together... P.S. Send posts to 6886@mne.com ************************************************************************** 2)From: Winn Schwartau Subject: Alert- DOS Software You're gonna hate this. A new range of denial of service software is currently being coded by underground people with an attitude and an agenda. We received a copy of this update from our contacts, and given that we know how effective Up Yours has been, this new development raises serious concerns for us all. Please familiarize yourself with this and distribute it. I just though I'd let you know as I have just been alerted myself. Up Yours v4.0 has an announced release date of 30 Mar. I got a look at the Beta, it;s about 50% coded. If all the functions on it work, look out. There will be a new generation of "e-mail bombers" as Up Yours 4 not only has an e-mail bomber, mailing list subscriber but has several diffrent types of denail of service attacks. It has a diffrent type of CRC error sending function, A new ping function that adjustd the TTLs on the packets and sends them at random intervals to avoid ICMP filters looking for times packets. A ton of other stuff that he hasn't coded yet is still to be added to. The most devistating feature of the new Up Yours 4 is that you can attach remove files. I'm sure you know the dangers in that; attaching Netsacpe3 to 50 e-mails, that equals POP server crash. Imagine someone bombing someone with 200 bombs, each with an 5 meg file attached? I'm talking to him about this feature still and he is debating weather or not to add it. This feature would mean hard core internet lag as well as mass destruction of servers. I'm evenn kind of not sure about it myself. Well I though I'd let you and your "anti-email bomb" gang get fired up and ready for this one. BTW, anything you want me to tell Acid Angel? ************************************************************************** Who are you? What's your specialty and/or interest? Let us know about your company... What would you like to see on the list? Post it. Let us know... Do you have something to contribute? We'd like to hear it... We want to know EVERYTHING and ANYTHING about eavesdropping, surveillance, countersurveillance & privacy related technology, etc... Remember: who, what, where, when, how & why... we want ALL the details... Do you have a question? Post it... A little free time? Help a member... With the INCREDIBLE brain power on this list, someone should have the answer ;-) P.S. Don't be a LURKER... Members take the time to post info for us all... give something back... Don't just take... Your input/knowledge is valued... ************************************************************************** Send Postings to: 6886@mne.com with "Post" in subject field with subject ************************************************************************** Subscribe to: 6886@mne.com In the subject field type: subscribe-surveillance list e-mail address ************************************************************************** Unsubscribe to: 6886@mne.com In the subject field type: unsubscribe-surveillance list e-mail address ************************************************************************** ...The Simple Rules of the Surveillance List... The Surveillance List Owners may Reject any posts that are/contain: 1) Info Unrelated to Eavesdropping, Surveillance or Privacy technology... 2) Flames or Negative posts... 3) E-Signatures that are considered excessive... 4) Advertisements not DIRECTLY related to the list topics... 5) Attached Files... 6) Oversized Posts... (May be edited to save room) **************************************************************************** This publication is copyrighted and is protected by U.S. and International copyright law. The information transmitted on this list may not be reproduced, reposted or forwarded to any non-list member without expressed written permission of the List Owner. Violation of U.S. copyright law is a criminal and civil offense... **************************************************************************** The Surveillance List is moderated by SpyKing@thecodex.com The List Owner will make EVERY effort to protect subscribers from spam... Copyright 1996, 1997 Codex Publishing Inc., All Rights Reserved... **************************************************************************** Vol 2 Issue # 70 ****************************************************************************** Vol.Two Issue #70 The Surveillance List Mar.28,1997 Over 1500 Members Worldwide ****************************************************************************** IN THIS ISSUE... ****************************************************************************** 01) List problem solved 02) E-mail Encryption 03) Vehicle Security 04) 900mhz phones 05) Equipment Help 06) Electromagnetic Emanations, The law 07) Re: Hard drive scanning 08) Re: Letter opening 09) Re: Letter opening 10) Manufacturers ****************************************************************************** DON'T BE A LURKER.... GET INVOLVED... YOU ARE A MEMBER... MAKE THE MOST OF IT ****************************************************************************** 1)SpyKing@thecodex.com Subject: List problem solved We're not sure what happened to our former ISP but we have changed ISP's and moved our domain. The new info for subscribing, posting and unsubscribing is at bottom of this digest as usual. There was a MAJOR problem receiving and sending mail for the last three weeks which necessitated the change. If you have sent something to me or the list and have not seen it posted or been responded to, please resend as I did not get the message... Hopefully we'll get the list back on track daily... ************************************************************************** 2)From: Statewide Investigations & Protection Subject: E-mail Encryption I need information on E-mail Encryption. Does anyone currently use Encryption? Name of Program, Software requirements and Price would be great. I also could use some information on Security musts for Small Networks 5-10 Computers using the Internet and E-mail. Virus protection, Encryption, Access Control, and Tempest prevention or like prevention methods. Thanks, Marc Marc Buckley OWNER / INVESTIGATOR / EDITOR STATEWIDE INVESTIGATIONS AND PROTECTION " INVESTIGATOR " BI-MONTHLY NEWSLETTER 2836 STAFFORD PLACE W.V.C. UTAH 84119 OFFICE: 801-967-7136 CELLULAR:801-860-7610 FAX:801-967-7136 PAGER:801-552-8155 E-MAIL:swide@xmission.com WEB sites: http://www.angelfire.com/biz/statewideinvestigate/index.html http://tool-box.com/rc/owa/freeweb.page?id=1039624 Gumshoe: Shadow-UT LICENSED 100122 & 100162 & BONDED ************************************************************************** 3)From: Forez Subject: Vehicle Security I have a flaw with my 96 Ford Ranger, it lacks any forms of security and other desired countermeasure devices.... In order to keep the car from being an easy target while in neighborhoods with that such problem doing under cover work - there needs to be as many things as possible that take little or no time to activate/ arm disarm, etc..... Also, a family member has a Porsche 911 Twin Turbo with a scurity system being none other than a generator - it shocked the living crap out of a kid and he got sued (The reason he went so drastic is because his car had been stolen 5 times in the last year and he wanted it stopped) Is there any legal advice there - or is he just screwed for his actions.. (BTW - It took place in the parking lot of the PD building!) ************************************************************************** 4)From: MHust4450@aol.com Subject: 900mhz phones I have a realistic PRO 2006 scanner which ocasionally I tune into cordless phone calls in the 49 mhz range. How can I tune into those new 900 mhz phones. Do all 900 mhz phones use the same type of scrambling method or are there different types of scrambling methods from different manufactures? mike h ************************************************************************** 5)From: VIPprotect@aol.com Subject: Equipment Help I provide a local personal protection service which also includes some very basic TSCM service. Can anyone recommend some equipment (type/brand) for RF detection and phone testing? Also, does anyone have any experience with the equipment by Optoelectronics? I would appreciate any help. Jason Lee Permian Protection Services VIPprotect@aol.com members.aol.com/VIPprotect/index.html ************************************************************************** 6)From: LIAM Subject: Electromagnetic Emanations, The law This document is a rough draft, but very helpful as to the curent laws pertaining to this subject. (TEMPEST) you can read it at:http://www.randomc.com/~llama/htmls/stor/cjs-tempest.html - LIAM ************************************************************************** 7)From graywolf@fox.nstn.ca Wed Mar 26 10:59:16 1997 Subject: Re: Hard drive scanning > >It appears that as of this morning (3/26/97)mne.net is back up. BTW mail >sent to mne.com last night bounced. > >I sent the attached message to you on 3/12/97 and haven't seen it posted so >I'm assuming it got trashed in your ISP problems. After enough of my own >ISP screw ups, I'm beginning to think a below room temperature IQ is a >prerequisite for becoming an ISP. > >POST >Re: Hard drive scanning > >There is a lot of concern being expressed about netscape cookies and >history files (both of which are easily neutralized). Of much greater >concern to me is the type of hard drive scanning program that our friend >and moderator Spyking has on his website. > >This type of hard drive scanning is not new. Central Points Software is >alleged to have scanned the hard drives of everyone registering PC Tools by >modem as long as 4 years ago. A similar allegation has surfaced regarding >Microsoft Internet Explorer having the ability to do the same thing (See >Sources eJournal Vol. 2 #1 for Jan. 1997 @ http://www.dso.com). Frankly, >this would be a far better explanation than corporate generosity for >Microsoft's willingness to give away copies of the program. See also the >usenet posting below: >FROM: Larry Allen >SUBJECT: Re: Java Script Acessing my HD!! >DATE: Mon, 10 Mar 1997 00:58:23 -0500 >ORGANIZATION: Earthlink Network, Inc. > >Crazy Diamond wrote: >> >> Hello folks. >> >> I understand that a 'cookie' cannot be used to get data from your hard >> drive, get your email address or steal sensitive information about your >> person. But what about Java and JavaScript? >> Could a Java script be used to access my HD, retrieve information from >> it, including copying >> files, altering it or messing around in my HD? > >This week Microsoft announced a 'bug fix' for a security problem in >Internet Explorer. The bug was not a fault, and was only identified >because a college student discovered it on 3/3/97. No doubt most of you >have now heard the face saving press release by Microsoft, providing a >free 'correction' to the IE code. The 'Shortcut' code was deliberately >built so that any web page accessed could in turn access the user's PC >and run programs and modify his files, all without that user having the >slightest awareness of what was being done to him. >Even if you don't have any really sensitive data and don't mind having your >bank balances in your Quicken files read, there is a good deal of >information about you/your company contained in various .ini files for >example. > >How about it Spyking? Specifically 1) What is the program you use to scan >hard drives? 2) How does it actually work in addition to scanning the FAT? >3) It is apparently unable to detect second physical drives. Is it also >unable to detect additional logical drives? 4) Most importantly, how do >you defend against it aside from sanitizing your system as much as possible >and keeping your data files encrypted? > >Regards, >graywolf > > >Richard Hume & Barb Mauthe >graywolf@fox.nstn.ca +++Moderator's Note+++ The "secret program" used to scan your hard drive on my web site is: as you can see it's not a secret program... All it does is tell YOUR browser to look at YOUR C: directory... I can't see it... It was put there for "shock" value to make people a little bit more security concious... and judging by the 40-50 requests I get every day from computer novices to know "how I did it", it works... It's a GOOD reason to encrypt EVERYTHING... ;-) ************************************************************************** 8)From: Leo Subject: Re: Letter opening Just watch out for "piezo electronic seals", they will tell-tale any atempts of opening. Leo ************************************************************************** 9)From: karl kiefert Subject: Re: Letter opening Dan, I alway seem to get wet envelopes when using steam. The self stick envelopes are easy to open. Just run over the seal with a HOT iron. My favorite method is using a hot hair dryer, tweesers and a small knife (scalpel). With this method you can also remove tape and labels. I've used electronic component freezer spay to demonstrate to a friend how to see through envelopes. Unfortunatly there was a check inside and the ink ran. The envalope was noticiably discoloured in green, black and red. Some parts of the check had 'feathered' markings Good Luck! ************************************************************************** 10)From: Enormus142@aol.com Subject: Manufacturers I am opening a business called Surveillance Video Security. I am on the sureillance list. I remember you said on the list, that you had a large list of manufactures & suppliers you would supply for free, all ya had to do is ask, well I'm askin'. I would like to have stock on hand so I'm interested in dealing with manufactures that I could buy wholesale from. I am interested in all the resources possible.I'm not opening a "spy shop", I am doing just what the name says. I am interested in helping poeple protect their homes, autos,and businesses. I plan to make sure each and every custumer knows the law, and liabilities for misuse of the equipment sold. I would also like to say that, I really admire you for the fact that not everything is always about making a buck. I respect your willingness to inform, and help people protect themselves. That is very refreshing to see in this day and age. I think you have set a very good example! Keep up the good work! ************************************************************************** Who are you? What's your specialty and/or interest? Let us know about your company... What would you like to see on the list? Post it. Let us know... Do you have something to contribute? We'd like to hear it... We want to know EVERYTHING and ANYTHING about eavesdropping, surveillance, countersurveillance & privacy related technology, etc... Remember: who, what, where, when, how & why... we want ALL the details... Do you have a question? Post it... A little free time? Help a member... With the INCREDIBLE brain power on this list, someone should have the answer ;-) P.S. Don't be a LURKER... Members take the time to post info for us all... give something back... Don't just take... Your input/knowledge is valued... ************************************************************************** Send Postings to: spyking@con2.com with "Post" in subject field with subject ************************************************************************** Subscribe to: spyking@con2.com In the subject field type: subscribe-surveillance list e-mail address ************************************************************************** Unsubscribe to: spyking@con2.com In the subject field type: unsubscribe-surveillance list e-mail address ************************************************************************** ...The Simple Rules of the Surveillance List... The Surveillance List Owners may Reject any posts that are/contain: 1) Info Unrelated to Eavesdropping, Surveillance or Privacy technology... 2) Flames or Negative posts... 3) E-Signatures that are considered excessive... 4) Advertisements not DIRECTLY related to the list topics... 5) Attached Files... 6) Oversized Posts... (May be edited to save room) **************************************************************************** This publication is copyrighted and is protected by U.S. and International copyright law. The information transmitted on this list may not be reproduced, reposted or forwarded to any non-list member without expressed written permission of the List Owner. Violation of U.S. copyright law is a criminal and civil offense... **************************************************************************** The Surveillance List is moderated by SpyKing@thecodex.com The List Owner will make EVERY effort to protect subscribers from spam... Copyright 1996, 1997 Codex Publishing Inc., All Rights Reserved... **************************************************************************** Vol 2 Issue # 71 ****************************************************************************** Vol.Two Issue #71 The Surveillance List Mar.30,1997 Over 1600 Members Worldwide Happy Easter! ****************************************************************************** IN THIS ISSUE... ****************************************************************************** 01) INEXPENSIVE TELEPHONE TAP 02) Surveillance Question 03) Re: E-mail Encryption 04) Info about torches & fire bugs? 05) Scanner mods 06) Computer interception 07) Microsoft Explanation 08) Re: Equipment Help 09) Bank identification directory? 10) Looking for source 11) 2.6.3 "g" series of PGP? 12) Need ideas 13) Re: 900mhz phones 14) Looking for investigators 15) Used PI Equipment For Sale ****************************************************************************** DON'T BE A LURKER.... GET INVOLVED... YOU ARE A MEMBER... MAKE THE MOST OF IT ****************************************************************************** 1)From: JBull24@aol.com Subject: INEXPENSIVE TELEPHONE TAP FOR THOSE OF YOU INTERESTED IN AN INEXPENSIVE TELEPHONE TAP, I HAVE THE SOLUTION. RADIO SHACK SELLS WIRELESS FM TRANSMITTERS THAT ARE USED WITH THIER WIRELESS MIC SETUP. YOU CAN TURN THIS INTO A TAP BY REMOVING THE MIC AND REPLACING IT WITH ALLIGATOR CLIPS. WHEN PLACING IT ON THE PHONE LINE MAKE SURE TO CONNECT IT IN SERIES. IT WILL OPERATE ON THE LINE CURRENT, SO BATTERIES ARE NEVER NEEDED. IT WILL BROADCAST IN THE 49 MHZ RANGE FOR APPROX. 100 YARDS. ************************************************************************** 2)From: BADCOFFEE@aol.com Subject: Surveillance Question Residential phones have 4 wires. Only 2 are used per line. Installation of a new line is commonly done with something called a split wire...using the other 2 wires in the shield...Ok..the basics.... NOW...what happens if you connect all 4 wires to the same listening device/recorder instead of having 2 seperate recorders? And....can you connect direct from phone to recorder mic input? I need information on E-mail Encryption. >Does anyone currently use Encryption? Name of Program, >Software requirements and Price would be great. I also could >use some information on Security musts for Small Networks >5-10 Computers using the Internet and E-mail. Virus protection, >Encryption, Access Control, and Tempest prevention or like >prevention methods. >Thanks, >Marc I use PGP with Aegis Shell for PGP windows front end (both are free for personal use, reasonable well under $100 shareware fee for business use). Aegis Shell turns PGP into cut and paste to transfer cypher text to Aegis from the email program, and from Aegis to the email program for mailing. Security is EXCELLENT with proper use. Disadvantage, if there is one, is that all parties using pgp need to have the program and the proper pgp public key. You cannot export pgp, but interoperable versions are available on foreign sites for use offshore. Download Aegis shell from http://www.aegisrc.com/ The Aegis help and readme files tell you how to download pgp. Regards, Barrie Brozenske brozenske@juno.com PGP Public Key fingerprint = 98 15 70 56 65 E5 D1 FA A7 AF 1B 9E B8 C0 F4 5E ************************************************************************** 4)From: "George Y. de Randich" Subject: Info about torches & fire bugs? Is there a place where I; as a Licensed Private Investigator working on a case; can go and determine if an individual has ever had a suspicious claim of any sort filed for him or if the person has been suspected of being careless with matches or had the ability of arranging with "God" to have a lightening strike to a building of his? Respectfully yours, George Y. de Randich, George de Randich, Investigations, 5600 Poinsettia Avenue, Suite # 1102, West Palm Beach,Florida 33407-2649 U.S.A. {Agency P.I. License A-96-00289} ************************************************************************** 5)From: Timothy Poole Subject: Scanner mods Bill Cheeks has an excellent series of books on modifiying scanners for various purposes. The book "Cheek3 - The Ultimate Scanner" describes in detail how to modify the PRO-200x series of scanners as well as handhelds. The book is available from Index Publishing Group Inc. for $29.95. ISBN 1-56866-058-8 Index Publishing Group Inc. is always looking for authors in all manners of topics. They can be contacted at indexboox@aol.com for an authors kit. ************************************************************************** 6)From: BADCOFFEE@aol.com Subject: Computer interception if someone tapped a phone line that was currently ON LINE with a service....hooked up a laptop with the same online software as the one being intercepted......and just turned the computer on...what would happen? If something was to happen...would the "interceptor" need to turn on at the EXACT time of the one intercepted? ************************************************************************** 7)From: Ken Johnson (Enormus142@aol.com) Subject: Microsoft Explanation My past post on Microsoft was not ment to be a flame. I just wanted to create an awareness. Power corrupts! It has a way of changing peoples egos,so does money, so be aware. Microsoft reflects the personality of Bill Gates. The story in TIME magizine, I mentioned,1/13/97 issue, is on-line at time.com/gates. You can get a back issue for eight dollars, nonsubscriber, in 3 to 5 working days(in the U.S.).Call 1-800-843-TIME. Fear is a natural emotion that serves a reasonable purpose, it helps protect us from danger. Unreasonable fear could be considered paranoia,but usually just comes from not knowing facts. I recommend getting the back issue.Read page 18 before you read the article,the Editor-in chiefs note,"To our Readers" . He gives insight to Walter Isaacsons qualifications to write the article.Read the article,then decide for yourself if there are enough facts to warrent reasonable fear.Here is an excerpt from the article. "You have to pick someone from your group",he tells mundy(Gates talking)," whose task it is to track Navio full time. They are the ones I worry about. sega is an invester. They may be willing to feed us info." Ask the questions.Is there any reason Bill Gates would be motivated to invade privacy? Anything in his nature or personality or goals, that would make susceptible to this temtation? How long was that bug in the microsoft internet explorer before someone found it,a year?2048 bit encription? Are the poeple at microsoft smart enough to crack it? Could they get a big enough computer? Would they tell? Read the article. These are just questions I ask myself, so excuse me for thinking out loud. ************************************************************************** 8)From: caldwell Subject: Re: Equipment Help > 5)From: VIPprotect@aol.com > Subject: Equipment Help > I provide a local personal protection service which also includes some > very basic TSCM service. Can anyone recommend some equipment > (type/brand)for RF detection and phone testing? Also, does anyone > have any experience with the equipment by Optoelectronics? I would > appreciate any help. > > Jason Lee > Permian Protection Services > VIPprotect@aol.com > members.aol.com/VIPprotect/index.html ************************************************************************ Jason: I recently purchased the Optoelectronics XPlorer and have actually had my hands on it for approximately ten days. Several other members have asked me for a more complete review which I intend to offer in about thirty days. Overall, it performs as stated. However, I am doing some "restoration" on it and experimenting with different antennas for different applications. I heard, before making my purchase, that you could buy a good Frequency Counter and utilize it with certain scanners to achieve the same results as the XPlorer, but I'm not certain you save that much money and you then have two pieces to carrying around. I bought the XPlorer because I knew several people who had purchased the R-10 and liked them. The XPlorer has addressed all the problems with the R-10, including digital frequency readout, freq. lockout and added some new stuff I'm still playing with, like a GPS plug-in. So far, so good. I'll be happy to let anyone know my opinion on it when I am finished tweaking. Anyone else have one? Greg Caldwell ISC ************************************************************************** 9)From: amaci@starnet.net.ph Subject: bank identification directory? I hope this message makes it to the list, I commuicated to the list to ask members to help me locate a bank identification directory that is used by mastercard and visa to come up with the issuing bank. I heard from some members that were also interested in the same item and I did see a posting about a bank directory but thats not exactly what I am looking for This item is really worth something to me so I am willing to pay at least $ 500 for even a photocopy, any list members know where to get one amaci@starnet.net.ph ************************************************************************** 10)From: Jim Motes Subject: Looking for source Hello All, My business is primarity computer consulting, repair and sales. We have one team that does simple investigation work and one team that sells electronics at shows. I am looking for a source for inexpensive (but they must work) electronic devices for my show team. Items that complement computer equipment would be ideal, however non computer related security are also of interest to me. I also do some export so if the item is for export that's fine, just tell me. I don't want trouble with the authorities. I am looking for low end devices, higher cost items would be follow on sales, however not for shows. If you have something, please respond to: jmotes@mnsinc.com Thanks Spyking for a super service. Nice to see the email up again Jim ************************************************************************** 11)From: WindWalker7 Subject: 2.6.3 "g" series of PGP? Does anybody know where I can find version 2.6.3 "g" series of PGP? MIT only releases version 2.6.2 "i" series. I have found a few sites that release version 2.6.3 "i" series, but I have yet to find any site distributing the "g" series. The "g" series (I now know thanx to Al Thompson) is the one that allows for 4096-bit keys. Anyone that knows where I can download version 2.6.3 "g" series of PGP please write me at mailto:WindWalker7@hotmail.com . Download of the source of 2.6.3 "g" series would be great also (in addition to the executable). Thanx. -WindWalker ************************************************************************** 12)From: BADCOFFEE@aol.com Subject: Need ideas Ok...so 3 months ago..while installng a lock...it breaks open ..pins and springs fly everywhere...and I am absolutely amused at the insides of this thing.I take an interest in lockpicking and (thank you internet), learn everything there is to know. I find out...."I'm a natural" at this. I buy high security locks and pop them within 3 seconds. By month 3...I am opening locks faster with a pick, than with a key. Question is....Now what?? I have no intention on being a locksmith...I just love to pick locks. I cant pick enough. I have no intention on using my gift illegally. Any ideas people? I have ingenious ideas on making pin/tumblers a hell of a lot more secure. A consultant? help me out peope....give me some ideas...and if anyone needs specific advise on lockpicking, I would be thrilled to answer your questions. Send your ideas please... ************************************************************************** 13)From: CrACKeD Subject: Re: 900mhz phones > I have a realistic PRO 2006 scanner which ocasionally I tune into > cordless phone calls in the 49 mhz range. How can I tune into those new > 900 mhz phones. Do all 900 mhz phones use the same type of scrambling > method or are there different types of scrambling methods from different > manufactures? I'll assume you're talking about 900 MHz cordless phones and not cellular or V-Link phones. There are three types of these phones: analog, digital, and spread spectrum. The only phone which uses 'scrambling' are some analog phones. I suppose one could combine digital or spread spectrum technology with speech inversion ('scrambling') but I have yet to see a phone combining so many security measures into one package. You can descramble any of these type of phones with a cheap kit from Ramsey Electronics. If you want to listen to digital or spread spectrum phones, you'd better change your hobby before you go bankrupt. There just isn't any cheap, easy, and quick way to do it. As for the frequencies used by many 900 MHz cordless phones, grab this file from my FTP site and it'll give you a few to start with: ftp://ftp.primenet.com/users/c/cracked/radio/cordless.zip Nice scanner, BTW. CrACKeD ************************************************************************** 14)From: "Michael W. Everhart" Subject: looking for investigators How do a post a message on the list??? I am looking for investigators to conduct piracy surveillance for establishments illegally showing fights or sporting events. I handle these events nationwide. Please let me know so I can get the information out. Michael W. Everhart, Owner Central Investigative Services Clinton, Missouri (816) 885-7585 e-mail: cis@smartnet.net http://www.smartnet.net/~cis +++Moderator's Note+++ You did it correctly Mike. Posting info is at bottom of this digest... ************************************************************************** 15)From: WorldPI@aol.com Subject: Used PI Equipment For Sale Greetings, I'm a PI in Oregon and due to being served with some divorce papers I must sell all my equipment ASAP. Have lots of equip from REI, Doppler, Kenwood Mobiles (UHF), and much much more. Do you know of a list where I could post this? Thanks, Peter Sabattini Brazor Investigations, Portland Oregon WorldPI@aol.com +++Moderator's Note+++ Send specs/gif and other info and I will post free of charge to you and any other list member on my "surplus" page at: http://www.thecodex.com/surplus.html ************************************************************************** Who are you? What's your specialty and/or interest? Let us know about your company... What would you like to see on the list? Post it. Let us know... Do you have something to contribute? We'd like to hear it... We want to know EVERYTHING and ANYTHING about eavesdropping, surveillance, countersurveillance & privacy related technology, etc... Remember: who, what, where, when, how & why... we want ALL the details... Do you have a question? Post it... A little free time? Help a member... With the INCREDIBLE brain power on this list, someone should have the answer ;-) P.S. Don't be a LURKER... Members take the time to post info for us all... give something back... Don't just take... Your input/knowledge is valued... ************************************************************************** Send Postings to: spyking@con2.com with "Post" in subject field with subject ************************************************************************** Subscribe to: spyking@con2.com In the subject field type: subscribe-surveillance list e-mail address ************************************************************************** Unsubscribe to: spyking@con2.com In the subject field type: unsubscribe-surveillance list e-mail address ************************************************************************** ...The Simple Rules of the Surveillance List... The Surveillance List Owners may Reject any posts that are/contain: 1) Info Unrelated to Eavesdropping, Surveillance or Privacy technology... 2) Flames or Negative posts... 3) E-Signatures that are considered excessive... 4) Advertisements not DIRECTLY related to the list topics... 5) Attached Files... 6) Oversized Posts... (May be edited to save room) **************************************************************************** This publication is copyrighted and is protected by U.S. and International copyright law. The information transmitted on this list may not be reproduced, reposted or forwarded to any non-list member without expressed written permission of the List Owner. Violation of U.S. copyright law is a criminal and civil offense... **************************************************************************** The Surveillance List is moderated by SpyKing@thecodex.com The List Owner will make EVERY effort to protect subscribers from spam... Copyright 1996, 1997 Codex Publishing Inc., All Rights Reserved... ****************************************************************************