Vol 2 Issue # 99 ****************************************************************************** Vol.Two Issue #99 The Surveillance List May 1,1997 Over 1800 Members Worldwide Representing 42 different countries ****************************************************************************** IN THIS ISSUE... ****************************************************************************** 01) The cybernetic education of a Hacker 02) Locks 03) FREE Trial Issue of the Professional Investigator 04) Cellular phones 05) Info/post 06) Re: Telephone Question 07) NEW FORENSIC COURSES 08) Thought this would be of interest to all list readers ****************************************************************************** DON'T BE A LURKER.... GET INVOLVED... YOU ARE A MEMBER... MAKE THE MOST OF IT ****************************************************************************** 1)From: Genocide Subject: The cybernetic education of a Hacker +++Moderator's Note+++ I received this post and because of the number of requests we get for hacking info I decided to post this in it's entirety. I make no comment on it's content but thought the list would find it interesting... -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= meme: (pron. 'meem') A contagious idea that replicates like a virus, passed on from mind to mind. Memes function the same way genes and viruses do, propagating through communication networks and face-to-face contact between people. Root of the word "memetics," a field of study which postulates that the meme is the basic unit of cultural evolution. Examples of memes include melodies, icons, fashion statements and phrases. -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= http://memex.org/meme3-02.html "I was in after school doing make up work in my chem class as usual when I noticed one day my teacher, Miss Ricker, entering grades through an Apple network using a fairly simple grade program. She wasn't very security minded and I used that as a window. Through a little use of "Social Engineering" I quick thought something up to ask her and walked up and started asking her info right when she was entering her login and password into the mac. I was looking down into my notebook and pretended to write stuff as I asked her, what I really did was write down her login and password." --The cybernetic education of a Hacker, in MEME 3.02 "Hackers." The word means something different, depending on whom you ask. People at CERT, the Computer Emergency Response Team at Carnegie Mellon University in Pittsburgh (http://www.cert.org/), might say, "a hacker is someone who breaks into computers." My great-aunt, who recently turned 91, associates hackers with people who drive taxis, from the days when a "hack" meant an unpleasant, or distasteful job. Richard Stallman, founder of the Free Software Foundation, who was interviewed in MEME 2.04 (http://memex.org/meme2-04.html), calls himself a hacker. To him "hacking" means developing software in an open, collaborative environment, with a strong ethical sense of right and wrong. The New Hacker's Dictionary defines hacker as "someone who enjoys exploring the details of programmable systems and how to stretch their capabilities, as opposed to most users, who prefer to learn only the minimum necessary." (http://murrow.journalism.wisc.edu/jargon/jargon_22.html#TAG831) Hacking, hackers, hack-- whatever the form, these words are the Rorschach test of cyberspace: what you think hacker means says as much about you as it does about hackers. Are hackers good? Are hackers bad? It all depends on what definition of hacking you have. In this issue of MEME, I send you one of the rare, lucid examples of a hacker-memoir from the breaking-into-computers variety of hacker. The story is written by someone whose nom-de-hack is "Genocide," and is a founder of Genocide2600, a hacker-clan based in Alaska and the Northwest of the United States. The piece came my way via another hacker, named WiZDoM. He could well be the same person as Genocide, or not. That's part of this game-- uncertainty. With hackers you can't be sure what's true, and what's not. Nor does it really matter. Hacker-tales are meant to be heroic. They are yarns, and this one's one of the best I've received in a long, long time. I think you'll enjoy it as well. A brief cautionary note: those readers who take umbrage at "curse words" should be forewarned, Genocide likes to use them. Spelling is left as received. I make no moral judgment about this essay, other than to say breaking into computers is bad, and you shouldn't do it. You, however, may want to discuss the issues raised by Genocide's essay, and you're invited to do so in the MEME discussion area, on Electric Minds: (http://www.minds.com/cgi-bin/EMPane.cgi?c=21&f=0&i=1&t=9) --dsb Date: Fri, 18 Apr 1997 16:42:43 -0800 (AKDT) From: -=* WiZDoM *=- To: The_World@universe.com Cc: gen2600@aracnet.com Subject: Thought you may want to read. The Genocide2600 Group History Writtin by Genocide 4/1/97 http://www.aracnet.com/~gen2600 http://www.Genocide2600.com /* Some of the contents of this document may be fictional. I leave the reader to themselves to figure out what is true and not true and what you will believe. Since it covers possibly illegal topics and events, I will not swear that any of the following content is true in any way. All events herein may or may not have happened, for obvious reasons I must leave it up to the reader to choose whether or not anything the read contains even a grain of truth. As for the members, we all know what really happened. */ --- A: Intro 1. What a hacker is. What a hack is. 2. Who we are. 3. The Genocide2600 Manifesto 4. How it started. --- A: Intro Well, people have been asking me for about a three years or so, how did you start the Genocide2600 group...how did you get into hacking, how, how, how, how...etc...Well, I'm going to make a damn good effort to "tell all". Right now it's April 1st, April Fools day of 1997, I've been a h/p/v/a/c'er for over 8 years now. Today the Genocide2600 group is over 150people strong and we occupy Alaska, Washington, Oregon and are now expanding into the East coast area. We have made many friends in our business/field and have tought many people. Shout outs go out to: -Silicon Toad, Bishop, MODul8r, Jester, Tim Wilde, Xer0 Tolerance. --- 1. First let me start by defining what I consider a hack, or a hacker. A "Hack":= The act of doing an action when there is no known way to do it. The act of doing something that can't be done. The act of doing something that is totally against the odds. A "Hacker":= Someone who can overcome, against the odds. Someone who can figure a way out of a game that can't be won. Someone who teaches others and spreads knowledge when no one wants to hear it. Someone who doesn't quit. Those who rise in the face of thier advesaries when they are grossely outnumbered. You don't have to know how to "Crack a password file to be a hacker" "Use what you have got, and you will not need what you have not..." -Quote from "Around the world in 80 days" --- 2. Who we are. Let me describe what we are and what we do. We are simply a group of talented people. Nothing more nothing less. A group of people from all walks of life, from 14years old to 52years old. Some of the group don't even know what a password file is, hell some of them don't even know how to turn on a computer. But the point is, everyone specializes in something and they offer thier services to the rest of the group. We even have lawyers that assist us...should the need arise. Everyone helps everyone else in whatever they do, however they an offer thier expertise in thier chosen field. Most of the group was chosen by my hand, but now our numbers have grown so large, I have appointed "heads" that manage areas, ie: one head per Alaska, Washington and now the East coast. Most of our members choose to stay behind the viel, in other words they don't choose to be public thus they are protected and they speak to those of us who are in the open. There are a handfull of us that do choose to be public: -DoXaVG, BernZ, Astroboy, WiZDoM, Alexu, OvErLoRD and me - Genocide Some members of the group are long married and have kids, some are single, the point is, we could be your neighbor or your babysitter for all you know. We could be the kid filling your gas in your car, it doesn't matter, all you really need to know is we are spreading, as fast as knowledge, faster then light, the speed of information. The Social Base of the Hacker: The Genocide2600 Manifesto. People generally believe that hackers have a milicious intent as a general rule. This, pardon my language is a crock of shit and obviously the idea/ramblings of the most generally uninformed people on the net, I do admit that "YES" there are those that are out to only destroy, and yes this group does occasionally add to that at a very small percentage (this will be explained later), but for the most part, we are in the persuit of knowledge. I do not claim to be a 100% law abiding person, nor does the group, obviously if you have heard of us, or even after reading this you will be shaking your head at this point. As a whole that we believe in a collective good, we believe that people who try to shut out other are people so others can't listen to them or people who try to censor our actions/language/activities are the people who deserve none of the above. We cling to our most basic civil rights. We also believe in retrobution for what is lost. Eye for an eye mentality is spoken here, take back what is yours. Bottom line is this, don't fuck with us, we do fuck back. Trying to turn peoples minds away from truth or trying to hide whats REALLY going on is something that is not tollerable no matter what and that therein is the true crime, not trying to rip the viel from the sheeps eyes. We're here to show you. We aren't the criminals that need to be put away. We are the ones you should praise. People for all time have feared what they did not understand...what they did not know. You don't know us...you don't understand us. Some have labeled us as terrorists, others as criminals. Ok. Sure. Whatever. Go ahead take the criminals and terrorists away that fight for your rights. After you have lost the battle because your soldiers are gone at your own hand, you'll have no one to blame but yourself. We fight with the greatest tools of all, our intellect and courage. --- 3. How it all started. I started when I was 14, I had never heard of hacking, phreaking or any of the lot. People really didn't pay much attention to me and that suited me just fine. I was able to be more an observer then the person who screwed up and got nailed for something, I would shake my head and learn from how they fell. I guess I was what you would call now a phreaker then...I heard that funny sound when you put coins into the pay phones... found it curious and I bought a hand recorder for $20.00 and went to town, I called places I didn't even know about, because I could. Me and my close personal friends dabbled in Blue Boxing once we discovered BBS' on our brand new 1200baud modems. I learned telephony from my cousin, the resident criminal in our town. As I look back now, the first phreaker I ever knew was my cousin. He tought me the magic of Ma' Bell and how it could be turned on her. I understood true telephony and hadn't even seen a computer. I had met my first hacker. My phreaking died with the end of the blue box. I gave up on it when those friends whome I surrounded myself with began to be picked off one by one by the local law. I decided to survive I had to adapt, I knew what I was doing was generally thought of as criminal. But I finally found a knowledge that made my mind hunger, made me stay up night after night. I wanted to learn for the first time in my life. Although this hunger didn't lead me in the ways of most law abiding talented computer learners, it did teach me how to make it and not loose no matter what pieces of the art of survival. I was in after school doing make up work in my chem class as usuall when I noticed one day my teacher, Miss Ricker, entering grades through an Apple network using a fairly simple grade program. She wasn't very security minded and I used that as a window. Through a little use of "Social Engineering" I quick thought something up to ask her and walked up and started asking her info right when she was entering her login and password into the mac. I was looking down into my notebook and pretended to write stuff as I asked her, what I really did was write down her login and password. If I failed Chemistry, I wouldn't be able to graduate highschool because it was a required class. Later that day I had a speech class that I did the grades for on the same network on a similar mac. I came in 10minutes early, just like normal and no one was in there. I entered her name and password into the computer and accessed the class grades via her saved information in her personal directory on a restricted network hard drive. I found my name and double clicked on it, there was all my work info, I added extra credit wherever I could. On a test, I moved it from 63% to a 73%, it was just enough to boost my grade into the low "D" area. I graduated almost a year later. Right on time. My mother was going back to school to get her degree at the local college in Fairbanks Alaska when I really discovered computers. I used her access (which, yes I got from a yellow sticky) to the local VAX to wet my lips with the taste of the computer age. I explored and learned for about two to three years there in that simple student VAX lab, then they went to OSF/1 or Digital UNIX as most know it and something happened. This was a chance at a virgin system, the system administrator didn't know exactly how to use/manage a actual UNIX system vs. a VAX system. Before he had a chance to secure the server to any reasonable level, I had already discovered the unshadowed /etc/passwd file and in a matter of hours had also discovered my first version of crack. My first successfull run of my now compiled crack was nearly my last. I was not aware of the system requirements that crack used at that time. It was a rather extensive resource hog and after I had set crack to run I put it in the background and hit "w" to see what everyone was doing. The lab was full. I had about 40 more seconds before it would finally be done with the passwd file when I hit "w" the last time. I noticed the system admin doing a "w fstbo" I knew what was happening. He saw I was using crack on the passwd file and he also knew I was only around the corner by looking at my terminal number. I freaked, foregrounded the processes, killed it and ran. I only looked back after I had completely left the building, there in the computer lab was the system admin talking to a student at my terminal. My luck those computers were in such high demand. I loved that taste of adrenaline. It was also in that room where I would meet Alexu, WiZDoM and Astroboy. The first members of the Genocide2600 group, they didn't even know it yet, niether did I. The following year yielded many systems, mostely criminally broken into, but none were damaged other then our initial breakins. I guess we were also lucky that Fairbanks Alaska was a great region to begin such a spree. Two military bases, one Army and one AirForce were only a half hour in each direction, three highschools and a huge college with multiple Cray computers. Contests between us all, then about up to 10, began and we realized we had formed an actual group. We wrote virii in assembly that would take each other out on the system while eating resources eventually crashing the computer. If you won, it was your virii left standing. One of the guys in the group "Malcom" had knowledge of a 2600 magazine and brought up the idea of actually holding a 2600 group meeting on Fridays at 7pm like in the mag. We all agreed and took turns teaching whomever would care to listen about computer security, telephony, media, cryptography, government whatever was our specialty. This was my first year of College. I was a freshman. We actually were recognized as a educational group by the University at that point and were encouraged to hold group meetings and givin areas where we could meet. The group continued on like that for about two years. Usually after the 2600 meetings we would either find a secluded computer room or go over to one of the members houses and "try out" our newfound info, or trick, we scowered documented holes in unix operating systems looking for other holes that may have been similar. One Friday we held the proceedings at my house and planned a breakin. I had a Pent75 with 16megs of ram (badass at that point in time) with a 1.275 gig hard drive. The fastest computer of the group. As standard proceedure we would dialup from an anonymous number in the "Great Hall" of the University onto "PolarNet" under a hacked PPP account. After connect we proceeded to telnet to a student account at the local school network where we had already gotten root access. We would do anything we really had to do from there usually, but sometimes we were lazy and would telnet straight out of "PolarNet" or "AlaskaNet". That night We snooped a commercial server which we will call "moon" and found we could gain root access remotelly. We got root access after approxamately 1hour of scanning the target system. We however did not know that this was one of the foremost computer security systems in the U.S. We gained root access at approxamately 11pm.. Upon entry it looked like a simple corperate computer, perhaps only a webhosting machine. Upon closer inspection we noticed that it was a server designed for information storage that is used by system administrators to crack into systems in order to secure them. This server also had programs used to crack systems, so we took them all. We took the programs and the info they had within the system. It was a total of about 14megs of it, we downloaded it to the local system which was through a T1 so it didn't take long, we broke connection to "moon" and proceeded to download the info from the local server to our computer. Where we passed the info to eachother. From then on we couldn't access that "PolarNet" account. We proceeded to share our new found info with the group members that friday night and brought disks full of info to give away at the price of the disks themselfs, the information was spreading. I had the Genocide2600 webpage up for almost a year at this point, and the attack on "moon" had yielded some incredible info, so the page grew amazingly fast. As did the requests for it's removal by the system administration by of school. At this time the page was then mentioned by several German underground magazines at the address: http://icecube.acf-lab.alaska.edu/~fstbo With email going to: fstbo@aurora.alaska.edu The next Friday I recieved an official warning at my schools account to "please remove your page from the system" well...I changed it a little and hid it a little deeper on my account, and the requests stopped for a little while. Also that next Friday we had a visitor at the meeting. This was not uncommon because us being a University group, anyone could come in and sit in. At times like these we would obviously speak of nothing illegal. This was, however, different from the rest of the "visits" by faculty and staff, this was a man in a navy blue suit. After the meeting was over and everyone was leaving he came up to me and asked if we could talk, I agreed, and we walked. He informed me he was here to prove that I had broken into "moon" and that he would be heading up the investigation. He also informed me that they suspected me because of my page, my affiliation of the group etc... I was honestly scared. I called my mother and told her I had been approached by the FBI and that there was a possibility that I may be put away as a result. She asked me if I did what they were accusing and I told her no. Which turned out to be a damn good idea, because she spent over two hours speaking to them. They froze my account to view the contents and review what I had on the system. They were looking for info that would point to me as the person who broke into the system, they found plenty. The one thing that saved my neck was that they couldn't tie me to the broken account on "PolarNet" they could prove that the call came from the University but not where. They could prove that I had info that was regarded as secret but they couldn't prove where I had gotten it. I told them I got it off the internet. After the entire thing was done and overwith, it had taken up around 3 weeks and alot of missed classes on my part. My account was unfrozen right in time for them to barage me with numerous requests to move the page off of the server again. I burried it deeper into my account and the requests subsided again. After the FBI left, the group wasn't quite the same, around half the "not so into it" members left, probably out of fear for thier school status. The school slammed the door on the school 2600 group on campus. The remaining members and I formed the formal Genocide2600 group we didn't meet in any publically known places or in schedualed places after that. We would just get together and decide where to go on the fly. The 2600 group dropped from site and the Genocide2600 group went under viel, away from view after the papers stopped publishing stories about some loose internet terrorist at the University. A couple months later, I got a job at a local internet service provider, I had alot more time on my hands to surf the web and check out areas that I didn't know about and discovered news groups I was looking through the usual alt.2600, alt.warez etc... and noticed people peddling serial codes and numbers for software, this intrigued me and I added the "service" to my webpage. The Genocide2600 group's page was the basic hub for serial numbers at that time and that is what probably what really put us on the map. We made friends of other net going hackers by trading info, programs and knowledge. The big web areas on the net were: SiliconToad, Materva, CandyMan and us, the Genocide2600 group. CandyMan dissappeared and we have been asked by certain parties to not really say anything regarding his silence. Materva is currently out of the scene and revamping his pages. This left SiliconToad and our group of the original few on the web, pre the movie "Hackers" and the influx of everyone and thier dog wanting to be 3l33t3, er rather elite, sorry. I had plenty of free time while waiting for people to call at the ISP I worked at (ImagiNet) I discovered a strong regard to the freedom of speech, after all, it was what was keeping me from going to jail. Now there are those that abuse the theory of freedom of speech, some say it's us, the hacker, but what I am referring to are the child pornography dealers on the net. I know it has been deemed illegal now, but it still goes on. We were kicking the shit out of these people on AOL (the primary front) we would get onto AOL with our AOHell programs and start scanning the chat rooms, when we found someone whome we suspected or who was talking about it, we would flood them with email and kick them off, causing them to actually have thier connection break have to logon and have to deal with a paralyzed mailbox and as soon as we would see them, WHAM again, they would be gone again. Sure we'd get caught and kicked off but that was half the fun, we were back on within 10minutes. What I always thought was entertaining were the agents AOL hired to look for hackers, they would be in the SAME room as us and the child porno runners and we'd attack the porno runner, who would the agent go after? Us. They would let the porno runner go 90% of the time without even a warning. Sure we were breaking the law too, but we do have some ethics. >;) Enter BernZ, a young prospective hacker who wrote to me on one of my last days in Fairbanks, and asked me to help him learn the trade. Now, I get around 500 emails a week, from non-member sources and half of them are asking me the same thing. But something was different this time. He had a style that I liked. He defined what it was he could do, I told him this was called "Social Engineering" or standard old manipulation. I could hear him grin over the email. He asked to join the group after a couple of weeks of correspondence and I finally asked him where he was. East coast. The group was primarilly a west coast operation. East coast was a good idea though, both coastal areas were the biggest expanding computer related areas on the map. So we decided that yes he should indeed head up the East Coast movement. And so he did and is. My job moved to Portland, Oregon, so I followed. I needed a webserver so I moved it to it's current home: http://www.aracnet.com/~gen2600 This is where our hits really began to grow. Also our international image. Magazines started printing our address as a contriversial/underground webpage. We started turning heads. Somewhere along the line someone out there (Cheyenne Software) noticed that we carried serial numbers on our page and the real flame storm started that day. My account was frozen instantly. They froze the account to review what was really on the page and see if there was really any serial numbers, which all of you know is bigtime bad. I was facing around 2,000 counts of software piracy. The Oregon chapter of the Genocide2600 group got together that night and cracked the server, moving any evidence of the serial numbers off of the system. We got away again. Almost 3 days later I was at work at about 10am when my pager went off and told me to call home for messages, I did. Found a message from someone only identifying themselfs as "Mr. Jerkins" and that I should give him a call. I did, he said that he wanted to meet with me at my Gladstone Oregon home and that they would like to bring me somewhere to talk. I freaked, I don't care what anyone says, if they say that the hair on the back of thier necks doesn't stand on end when they get a call from the FBI, they are lying. I called a emergency meeting at my house of the Genocide2600 members from Oregon for later that night. We probably wore that recording out listening to it, trying to find out if it was indeed a joke. We finally decided, no it wasn't a joke. So I called him back and setup a time. They were five minutes early. Mr. Jerkins was with 4 other men dressed in suits, all smiling. They wanted to take me to some place I didn't recognize, which is no shock seeing I only had lived there 3 months. But I wasn't going to chance it. I told them I wanted to go to Burgerville down the street at GlennEcho street. Hey, I know it sounds corney, but if you have ever seen "MoHolland Falls" you would understand. We packed into a late model Ford Royal Crown Victoria and headed to the burgerhouse. My leg was uncomfortable because of the Gerber MarkII boot knife pushing into my ankle and my right hand was on my switch blade the entire time. They didn't say a word while we got out of the car. We walked into Burgerville and everyone behind the counter followed us with thier eyes and heads. We had to look out of the norm, 4 suited guys all under 6 foot and me, black leather jacket and jeans, and a black "Skellum" shirt that says, "Un-natural disaster, can you feel hells laughter?" and six foot tall. We sat, I ate and we talked for almost one hour. Only two of the four talked. Mr. Jerkins and someone else whome I can't remember his name. As soon as they opened thier mouths, I began to sweat. It seems I was dropped off at home as rapidly as they had picked me up. I sat there at my computer, my hands shaking, dialed up and jumped into my email program, pine. I wrote all members of the Genocide2600 group, in Alaska, Washington and Oregon and informed them, I had just been offered a job. That was only a couple of months ago now and I sit here at midnight typing away and not even wanting sleep anymore. In two weeks the Genocide2600 server goes up, the new dawn. http://www.Genocide2600.com -Genocide Head of the Genocide2600 Group *Embrace Freedom* gen2600@aracnet.com [EOF] Genocide Head of the Genocide2600 Group ============================================================================ **Coming soon! www.Genocide2600.com! ____________________ *---===| |===---* *---===| Genocide |===---* "Courage is not defined by those who *---===| 2600 |===---* fought and did not fall, but by those *---===|__________________|===---* who fought, fell, and and rose again." Email: gen2600@aracnet.com Web: http://www.aracnet.com/~gen2600 ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ It is by caffeine alone that I set my mind in motion. It is by the Mountain Dew that the thoughts acquire speed, the lips acquire stains, the stains become a warning. It is by caffeine alone that I set my mind in motion. =============================================================================== ************************************************************************* 02)From: Stuart Krone Subject: Locks I have found that if you are attempting to pick a lock and it won't open; you can still get an idea as to what is going on. If you slowly ease up the pressure you can hear the pins click back down. This will give you an idea as to how close you are getting. If you reach in with a simple lifter pick you can determine which pins are sticking. ************************************************************************* 03)From: Statewide Investigations & Protection Subject: FREE Trial Issue of the Professional Investigator THE SECRET IS OUT!! The "INVESTIGATOR" Newsletter has OFFICIALLY changed its Name to The "PROFESSIONAL INVESTIGATOR" YOUR NATIONAL PRIVATE INVESTIGATIONAL RESOURCE NEWSLETTER with articles on: A broad spectrum of investigative services and techniques Internet Online searches Case profiles PI profiles Latest Technology Equipment Reviews Related Laws & Updates That's right we are now a National Newsletter. We would like to thank the following people for helping us go National and making this issue jam packed with informative resource articles and PI goodies: Julius (BUDDY) Bombet Patrick Adams Witness Statement Strategies Getting Paid CJ Bronstrup Martin Goslar Plugging the Leaks Internet Alert (tm) CDB Infotek Merlin Information Services PI Magazine ION Spy Headquarters Statewide Investigations and Protection To receive a complimentary issue send an E-mail to: swide@xmission.com and put "Professional Investigator" in the subject area of the E-mail, In the Main Body of the message include: Ful First and Last Name Company Name or Profession Mailing Address City, State, Zip Daytime Phone Number All the above must be present to receive a Free issue. You will not be called for solicitation it is a precaution incase we have trouble with your information or address. The "Professional Investigator" is intended for Private Investigators, Law Enforcement, Lawyers, and Insurance Investigators & Attorneys. $25.00 for 1 Year subscription (6 Issues) $42.00 for 2 Year subscription (12 issues) Marc Buckley OWNER / EDITOR STATEWIDE INVESTIGATIONS AND PROTECTION "PROFESSIONAL INVESTIGATOR " BI-MONTHLY NEWSLETTER 2836 STAFFORD PLACE W.V.C. UTAH 84119 OFFICE: 801-967-7136 CELLULAR: 801-860-7610 FAX: 801-967-7136 PAGER: 801-552-8155 E-MAIL: swide@xmission.com WEB sites: http://www.angelfire.com/biz/statewideinvestigate/index.html http://tool-box.com/rc/owa/freeweb.page?id=1039624 Gumshoe: Shadow-UT LICENSED 100122 & 100162 & BONDED ************************************************************************* 04)From: Judge@innocent.com SUBJECT: Cellular phones Ok, I haven't seen many postings on cellular phones, I would like more info on triangulation and coverage conflicts, frequency setters aswell, does anyone know what I'm on about! Then let me know! I've got some postings to put up but I need to know if it's what ppl want to read (ie:waste of time or what) Thanks Mailto:Judge@innocent.com +++Moderator's Note+++ Yes, we want your postings... anything and everything to possibly do with surveillance or countersurveillance technology... ************************************************************************* 05)From: Duece6x6@aol.com Subject: Info/post I need J Elandsson's email address. We have had a team together for many years. Some of us are part time PI's and do security and countermeasures for corporations. Yes these teams do exist. We have been turned down on many occasions because the agencies and companys feel we are to advanced. We would like to train with other teams around the country. NO RADICALS only proffesionals. THANX THE DUECE ************************************************************************* 06)From: Mutter Subject: Re: Telephone Question > 1) Cool web site. > > 2) Maybe this isn't a Question About Surveillance, etc. but I > thought I'd give it a try: > As a kid, I seem remember watching the telephone repair man was > able to dial a telephone number on our phone that then caused > our > telephone to ring. This "feature" would come in handy in our > house - am I crazy or does such a number exist? Can you help? > Thanks - one way or another. > > steve@cadc.uscourts.gov This telephone test is typically referred to as "ringback." The number you use to reach this test number is different from switch to switch and area to area. To use it, you would dial the number, wait until you receive a dialtone, flash the switchook of your phone, then you should hear a solid tone which is your signal to hang up. If you did everything right the phone should ring a second later. Here's a small (relatively outdated) list of ringback numbers courtesy of the 2600 faq: An 'x' means insert those numbers from the phone number from which you are calling. A '?' means that the number varies from switch to switch in the area, or changes from time to time. Try all possible combinations. If the ringback for your NPA is not listed, try common ones such as 954, 957 and 958. Also, try using the numbers listed for other NPA's served by your telephone company. 201 551-xxxx Hackensack/Jersey City/Newark/Paterson, NJ 202 958-xxxx District of Columbia 203 991-xxxx CT (All) 209 890-xxxx Stockton, CA 213 1-95x-xxxx Los Angeles, CA 301 579-xxxx Hagerstown/Rockville, MD 301 958-xxxx Hagerstown/Rockville, MD 303 99X-xxxx Grand Junction, CO 305 999-xxxx Ft. Lauderdale/Key West/Miami, FL 312 511-xxxx Chicago, IL 312 511-xxx-xxxx Chicago, IL 312 57?-xxxx Chicago, IL 315 98x-xxxx Syracuse/Utica, NY 317 777-xxxx Indianapolis/Kokomo, IN 317 yyy-xxxx Indianapolis/Kokomo, IN /* y=3rd digit of phone number */ 401 98?-xxxx RI (All) 401 98?xxx-xxxx RI (All) 404 450-xxxx Atlanta, GA 407 988-xxxx Orlando/West Palm Beach, FL 412 985-xxxx Pittsburgh, PA 414 977-xxxx Fond du Lac/Green Bay/Milwaukee/Racine, WI 414 978-xxxx Fond du Lac/Green Bay/Milwaukee/Racine, WI 415 350-xxxx San Francisco, CA 417 551-xxxx Joplin/Springfield, MO 501 721-xxx-xxxx AR (All) 502 988 Frankfort/Louisville/Paducah/Shelbyville, KY 504 99x-xxxx Baton Rouge/New Orleans, LA 504 9988776655 Baton Rouge/New Orleans, LA 512 95X-xxxx Austin, TX 516 660-xxx-xxxx Hempstead/Long Island, NY 601 777-xxxx MS (All) 609 55?-xxxx Atlantic City/Camden/Trenton/Vineland, NJ 616 946-xxxx Battle Creek/Grand Rapids/Kalamazoo, MI 619 331-xxxx San Diego, CA 619 332-xxxx San Diego, CA 703 958-xxxx Alexandria/Arlington/Roanoke, VA 714 330? Anaheim, CA /* GTE */ 716 981-xxxx Rochester, NY /* Rochester Tel */ 719 99x-xxxx Colorado Springs/Leadville/Pueblo, CO 801 938-xxxx Utah (All) 801 939-xxxx Utah (All) 804 260 Charlottesville/Newport News/Norfolk/Richmond, VA 805 114 Bakersfield/Santa Barbara, CA 805 980-xxxx Bakersfield/Santa Barbara, CA 813 711 Ft. Meyers/St. Petersburg/Tampa, FL 817 971 /* Press 2# */ 906 951-xxx-xxxx Marquette/Sault Ste. Marie, MI 908 55?-xxxx New Brunswick, NJ 914 660-xxxx Peekskill/Poughkeepsie/White Plains/Yonkers, NY Canada: 416 57x-xxxx Toronto, Ontario 416 99x-xxxx Toronto, Ontario 416 999-xxx-xxxx Toronto, Ontario 514 320-xxx-xxxx Montreal, Quebec 613 999-xxx-xxxx Ottawa, Ontario Australia: +61 199 United Kingdom: 174 - M u t t e r Ed. root zine Check us out at ... http://www.openix.com/~mutter mutter@openix.com ************************************************************************* 07)From: JoeSleuth@aol.com Subject: NEW FORENSIC COURSES REMEMBER LION INVESTIGATION ACADEMY (LICENSED PA. DEPT OF EDUCATION) HAS NEW FORENSIC COURSES BESIDES THE 60CREDIT A.S.T. DEGREE PROGRAM I SEE EVERYONE LOOKING FOR TRAINING INFO .HERE IS YOUR HOMESTUDY ACADEMY EST 1974 LIC. AND APPROVED.FOR COURSE INFO. CONTACT LION INVESTIGATION ACADEMY 434 CLEARFIELD ST BETH PA. 18017 ONLY INTERESTED NEED APPLY ************************************************************************* 08)From: "Richard A. Kinkopf" Subject: Thought this would be of interest to all list readers Here's a small article I found in a column of The Telegraph recently: POLICE TRAP OUT OF THIS WORLD Police hunting eavesdropping radio hams broadcast a message that a flying saucer had crashed in a field in Appleton, near Warrington. Five eager alien spotters turned up to find a police squad which reported them for telecommunications offences. ************************************************************************* Who are you? What's your specialty and/or interest? Let us know about your company... What would you like to see on the list? Post it. Let us know... Do you have something to contribute? We'd like to hear it... We want to know EVERYTHING and ANYTHING about eavesdropping, surveillance, countersurveillance & privacy related technology, etc... Remember: who, what, where, when, how & why... we want ALL the details... Do you have a question? Post it... A little free time? Help a member... With the INCREDIBLE brain power on this list, someone should have the answer ;-) P.S. Don't be a LURKER... Members take the time to post info for us all... give something back... Don't just take... Your input/knowledge is valued... ************************************************************************** Send Postings to: spyking@con2.com with "Post" in subject field with subject ************************************************************************** Subscribe to: spyking@con2.com In the subject field type: subscribe-surveillance list e-mail address ************************************************************************** Unsubscribe to: spyking@con2.com In the subject field type: unsubscribe-surveillance list e-mail address ************************************************************************** ...The Simple Rules of the Surveillance List... The Surveillance List Owners may Reject any posts that are/contain: 1) Info Unrelated to Eavesdropping, Surveillance or Privacy technology... 2) Flames or Negative posts... 3) E-Signatures that are considered excessive... 4) Advertisements not DIRECTLY related to the list topics... 5) Attached Files... 6) Oversized Posts... (May be edited to save room) **************************************************************************** This publication is copyrighted and is protected by U.S. and International copyright law. The information transmitted on this list may not be reproduced, reposted or forwarded to any non-list member without expressed written permission of the List Owner. Violation of U.S. copyright law is a criminal and civil offense... **************************************************************************** The Surveillance List is moderated by SpyKing@thecodex.com The List Owner will make EVERY effort to protect subscribers from spam... Copyright 1996, 1997 Codex Publishing Inc., All Rights Reserved... **************************************************************************** Vol 2 Issue # 100 ****************************************************************************** Vol.Two Issue #100 The Surveillance List May 2,1997 Over 1800 Members Worldwide Representing 42 different countries ****************************************************************************** IN THIS ISSUE... ****************************************************************************** 01) How to build a Benchtop TEMPEST Interceptor 02) Re: Lock picking supplies 03) Requesting Information 04) Lockpicking basics... excellent site Rated 5 stars 05) Re: Telephone Question 06) Telephone prefix database 07) Don't take it personally 08) Re: Lurking...? Absolutely tremendous this List!!! 09) RE: Alien Chaser 10) Re: Best types of car alarm 11) Seeking someone in electronics 12) Convention? 13) Just a personal note 14) Telephone tones ****************************************************************************** DON'T BE A LURKER.... GET INVOLVED... YOU ARE A MEMBER... MAKE THE MOST OF IT ****************************************************************************** 1)From: SpyKing@thecodex.com Subject: How to build a Benchtop TEMPEST Interceptor There has been a lot of interest on this list about TEMPEST. This should stimulate a thread ;-) Somehow I have the feeling that this article will show up on a lot of bulletin boards & web sites overnight... Oh well, information wants to be free. This device will not allow you to peer into computer secrets from across town but will provide you with a working benchtop demo unit for laboratory demonstrations... How to build a Benchtop TEMPEST Interceptor by Frank Jones aka SpyKing@thecodex.com http://www.thecodex.com Copyright 1997 The is very little public knowledge about TEMPEST. Most infomation, including how to safeguard against monitoring, has been classified by the government. You can view an article I wrote on TEMPEST at: http://www.thecodex.com/c_tempest.html and another at: http://www.thecodex.com/rise.html In order to protect computers and CRT's from electromagnetic emission monitoring (interception, recontruction and viewing) it is necessary to use shielding. This shielding is available in several forms but that is another article... Once the shielding is installed, how do you test it for leakage? It is necessary to see if you can monitor the device yourself. Since TEMPEST monitoring equipment is normally very expensive and hard to come by, here is a simple way to construct a "simple" monitoring device that will help you detemine if your computer can be "snooped" on by outside sources... this device was designed for "defensive" purposes and should NOT be used offensively... it does not have the distance capability of my DataScan device but it WILL work as a laboratory benchtop demo device... Like Van Eck and Moller, I have deliberately flawed the article for the technically challenged... After all, we don't want everyone to have one of these, do we? TEMPEST Interceptor - Follow my instructions... You need to learn something about electronics to make this happen. The first lesson will be to construct a sync generator to drive the computer monitor without any signal or video. To start this you must take your spectrum analyzer, turn off every appliance in the area. Put the analyzer near the computer monitor, turn on the monitor but NOT the computer. Start searching around 15Khz. You should get a strong signal somewhere between 14Khz & 17Khz. Log that frequency. Next try looking around 30Hz to 60Hz. Which is stronger 30 or 60? Log that. Next we're gonna build a "computer sync generator" (video gear will not work). Most technician's who have tried to build a TEMPEST interceptor have been trying to use "off-the-shelf" products. Don't believe what you read or hear, they won't work. You've got to build a computer sync generator. It isn't really so hard to do. Get yourself a copy of the "CMOS Cookbook". It's around. In there it shows how to build a 555 timer. It is a small and simple circut. Maybe 5 components. The 555 has in it all the clock and electronics to make a timer from 1Hz to 10Mhz. Follow the instructions and make a variable timer (it is really simple). Make the first one run at the exact frequency of the monitor, say 16 Khz. Next make a seperate one at the second frequency say 30 Hz. Then tie them together with a .o1 Mfd cap. The output should drive your monitor (generator is done). Two minor things I forgot to mention. The output of the 555 is about 5 to 12 volts. You will need to attenuate it to about .3 volts. Several resistors will do. The other thing is that you need a negative pulse out of the 555. The normal output of a 555 is a square wave. On and off . You must vary the duty cycle to create a square wave which is most of the time on and the sync duration off. You now need a seperate dedicated computer monitor. Open the input plug and find the shielded cable inside. Attach the output of your circut to the center-conductor and the battery minus from your circut to the shield. You have a solid black screen on the monitor. Turn up the brightness. There should be no rolling and weaving. If so... adjust the pot in YOUR CIRCUIT not the monitor, to stop it. Next step. Collect the signal you hear and see on your anaylzer/receiver. Take the output of your reciever tuned to those frequencies. Connect the output through a .01 mfd cap to the output of the sync generator and "viola" you should start to see the monitors radiated signal on your monitor. Shielding your viewing monitor from the recieving monitor and small adjustments in your generator frequency should do it. In fact no adjustments should still do it. The antenna that you use is critical. Make sure you use the right one... ;-) ************************************************************************** 2)From: BADCOFFEE@aol.com Subject: Re: lock picking supplies Majestic lock, Hackensack NJ 1-800-441-9234 Be advised...they are a LOCKSMITH supply company. The do COD's. Ask for a catalog...it is big and has a TON of usefull information on different locks...and lock pick tool section. Beginners- 2 tools open a lock, not 600. Basic 13 pc set cost about $15 dollars. 10 of those pieces in my set dont have any fingerprints on them. :-) Pick a favorite... :-) Im sure there are on line companies also..... They are a bit carefull on sending to other than locksmiths. Badcoffee- Austonaut ************************************************************************** 3)From: hotshot Subject: Requesting Information Hello, I am interestered in how to Decode Phone Numbers from a Tape Recording" Thanks: Bill ************************************************************************** 4)From: BADCOFFEE@aol.com Subject: Lockpicking basics... excellent site Rated 5 stars MIT GUIDE TO LOCKPICKING http://www.lysator.liu.se/mit-guide/mit-guide.html Again, nothing happens until you know what is happening..... :-) Augie badcoffee@aol.com ************************************************************************** 5)From: CrACKeD Subject: Re: Telephone Question > As a kid, I seem remember watching the telephone repair man was able to > dial a telephone number on our phone that then caused our telephone to > ring. This "feature" would come in handy in our house - am I crazy or > does such a number exist? Can you help? Read the document I've attached below. And while I'm at it, I'd like to know if anyone knows the ringback for the 520 NPA. It was changed some time ago and I haven't figured out the new one to date. 12. What is a ringback number? A ringback number is a number that you call that will immediately ring the telephone from which it was called. In most instances you must call the ringback number, quickly hang up the phone for just a short moment and then let up on the switch, you will then go back off hook and hear a different tone. You may then hang up. You will be called back seconds later. 13. What is the ringback number for my area? An 'x' means insert those numbers from the phone number from which you are calling. A '?' means that the number varies from switch to switch in the area, or changes from time to time. Try all possible combinations. If the ringback for your NPA is not listed, try common ones such as 954, 957 and 958. Also, try using the numbers listed for other NPA's served by your telephone company. NPA Ringback number Geographic area --- --------------- --------------------------------------------- 201 55?-xxxx Hackensack/Jersey City/Newark/Paterson, NJ 202 958-xxxx District of Columbia U 203 99?-xxxx CT N 208 99xxx-xxxx ID 213 1-95x-xxxx Los Angeles, CA N 216 551-XXXX Akron/Canton/Cleveland/Lorain/Youngstown, OH 219 571-xxx-xxxx Gary/Hammond/Michigan City/Southbend, IN 219 777-xxx-xxxx Gary/Hammond/Michigan City/Southbend, IN 301 579-xxxx Hagerstown/Rockville, MD 301 958-xxxx Hagerstown/Rockville, MD 303 99X-xxxx Grand Junction, CO 304 998-xxxx WV 305 999-xxxx Ft. Lauderdale/Key West/Miami, FL 312 511-xxxx Chicago, IL 312 511-xxx-xxxx Chicago, IL 312 57?-xxxx Chicago, IL 315 98x-xxxx Syracuse/Utica, NY 317 777-xxxx Indianapolis/Kokomo, IN 317 yyy-xxxx Indianapolis/Kokomo, IN (y=3rd digit of phone number) 319 79x-xxxx Davenport/Dubuque, Iowa 401 98?-xxxx RI 404 450-xxxx Atlanta, GA 407 988-xxxx Orlando/West Palm Beach, FL 412 985-xxxx Pittsburgh, PA 414 977-xxxx Fond du Lac/Green Bay/Milwaukee/Racine, WI 414 978-xxxx Fond du Lac/Green Bay/Milwaukee/Racine, WI 415 350-xxxx San Francisco, CA 417 551-xxxx Joplin/Springfield, MO N 501 221-xxx-xxxx AR 501 721-xxx-xxxx AR 502 988 Frankfort/Louisville/Paducah/Shelbyville, KY N 503 541-XXXX OR 504 99x-xxxx Baton Rouge/New Orleans, LA 504 9988776655 Baton Rouge/New Orleans, LA 505 59?-xxxx New Mexico 512 95X-xxxx Austin, TX 513 99?-xxxx Cincinnati/Dayton, OH N 513 955-xxxx Cincinnati/Dayton, OH 516 660-xxx-xxxx Hempstead/Long Island, NY 601 777-xxxx MS 609 55?-xxxx Atlantic City/Camden/Trenton/Vineland, NJ 612 511 Minneapolis/St.Paul, MN 612 999-xxx-xxxx Minneapolis/St.Paul, MN N 614 998-xxxx Columbus/Steubenville, OH 615 930-xxxx Chatanooga/Knoxville/Nashville, TN 616 946-xxxx Battle Creek/Grand Rapids/Kalamazoo, MI 619 331-xxxx San Diego, CA 619 332-xxxx San Diego, CA 703 958-xxxx Alexandria/Arlington/Roanoke, VA N 708 511-xxxx Chicago/Elgin, IL 714 330? Anaheim, CA (GTE) 714 33?-xxxx Anaheim, CA (PacBell) 716 981-xxxx Rochester, NY (Rochester Tel) N 718 660-xxxx Bronx/Brooklyn/Queens/Staten Island, NY 719 99x-xxxx Colorado Springs/Leadville/Pueblo, CO 801 938-xxxx Utah 801 939-xxxx Utah N 802 987-xxxx Vermont 804 260 Charlottesville/Newport News/Norfolk/Richmond, VA 805 114 Bakersfield/Santa Barbara, CA 805 980-xxxx Bakersfield/Santa Barbara, CA 810 951-xxx-xxxx Pontiac/Southfield/Troy, MI 813 711 Ft. Meyers/St. Petersburg/Tampa, FL U 817 971 Ft. Worth/Waco, TX (Flashhook, then 2#) 906 951-xxx-xxxx Marquette/Sault Ste. Marie, MI 908 55?-xxxx New Brunswick, NJ 908 953 New Brunswick, NJ N 913 951-xxxx Lawrence/Salina/Topeka, KS 914 660-xxxx Peekskill/Poughkeepsie/White Plains/Yonkers, NY Canada: 416 57x-xxxx Toronto, Ontario 416 99x-xxxx Toronto, Ontario 416 999-xxx-xxxx Toronto, Ontario N 506 572+xxx-xxxx New Brunswick 514 320-xxx-xxxx Montreal, Quebec 613 999-xxx-xxxx Ottawa, Ontario 705 999-xxx-xxxx North Bay/Saulte Ste. Marie, Ontario Australia: +61 199 U Brazil: 109 or 199 New Zealand: 137 Sweden: 0058 United Kingdom: 174 or 1744 or 175 or 0500-89-0011 CrACKeD ************************************************************************** 6)From: Paul Ciccarello Subject: Telephone prefix database Great Page, I'm looking for a database that searches for telephone prefix's. NTC has suspended this service recently due to LEGAl REASONS. I found this service very useful especially in identifying incomming calls on caller I.D. box. Could you find out who currently has this service? Thanks, keep up this wonderful site. ************************************************************************** 7)From: BADCOFFEE@aol.com Subject: Don't take it personally Dear FRIENDS, Don't take it personally if you make a responce post and somone else's contradicts your answer. I might say...NO..you can not pick a lock with a pair of scissors. Directly underneith me there might be a post on how to pick locks with scissors. A bit awkward....but I wont make it a situation that I will not share your knoledge in fear that credibilty was lost. YOU have something we need......someplace we havent gone, something we havent thaught about. EVERY post I read teaches me something. Keep teaching me :-) ************************************************************************** 8)From: CrACKeD Subject: Re: Lurking...? Absolutely tremendous this List!!! > Anyway, 1) Instead of paying $1700 here in Aus for the "Explorer" > (Unit which sweeps 30-1300mhz in one second with digi and FM > demodulator), I wonder if anybody has a "block description" of how these > circuits work and without to much hassle, get an old scanner and connect > up to allow to sweep? I know it wouldn't be worth it but how much would > it take? The Explorer's overkill. A handheld frequency counter from Startek or Optoelectronics (they make the Explorer, right?) will cover the same frequency range and achieve similar results for a couple hundred bucks. Startek: (800) 638-8050 > 2) I'm dried out of the up to date frequencies used for bugging > allocations used here in Aussie. I know the wireless mics for studio > etc but not the bands used here anymore. I remember what they used to > call professional 120 mhz, use to just put on WFM/FM and drive down to > the city and pickup a few fade in/out on the way. Can't tell you for sure, I live in the US. Check the TSCM site on the web. A list is there, although I doubt it's very accurate and complete. Any frequency can be used, and any frequency will be used by someone who wants to outsmart you. Of course, the FM broadcast band and business or itinerant frequencies are popular amongst amateur buggers. > 3) For tracking sigs while driving, just thinking poor mans direction > finder: have four close antennas (bundle) with a shield separating the > four (think of a cross looking at the top) I haven't seriously looked > into it but one could attach a unit which looks at a specific freq > while your scanner is on the same frequency and have a comparator > circuit to determine with of the four antennas get the strongest signal > so you have a visual indication instead of trial and error with signal > strengths, what do you think? Stupid????? Doppler Systems beat you to the patent on that one. They market several models of similar systems. They use a phased array of four vertical antennas and an circle of LEDs on a console with a 3-segment LED display to tell you just what degree your signal is coming from. With a bit of driving, or two or more units and a map and ruler (or software), these things help out a lot. I've had the opportunity to play with these units during transmitter hunts, and they're usually a piece of equipment used by the winning team. Then again, they also don't care about reflected signals and other nasties, which means it's a good idea to have experience with a couple other direction finding techniques as well. I've been out for hours chasing reflections with one of the things, while people with antennas made from tree limbs, electrical tape and coat hangers (no joke) beat our team by well over an hour. Doppler Systems: (602) 488-9755 > 4) What is the spray called that shows infrared transmission? > I currently use a solar cell connected via a capacitor to a portable > amplifier - very good for testing remotes etc seems to be sensitive I've never heard of the spray, but you may want to try one of the IR detector cards Radio Shack sells. Or you could grab an IR detector circuit out of a TV or VCR, attach a 9-volt battery and an LED, and be able to detect IR at a good distance away (20 feet, more or less). CrACKeD ************************************************************************** 9)From: trever.kb9nhu@juno.com Subject: RE: Alien Chaser It is not illegal to listen to the Amateur Radio bands if you don't have a license. It would only be illegal to transmit on the bands of you don't have a license. Trever C. Trader 2743 S. Veterans Pkwy. #206 Springfield, Illinois 62704-6536 (217) 691-0029 Pager (217) 691-1315 Cellular ************************************************************************** 10)From: "Bigsby" Subject: Re: Best types of car alarm Greetings, This is in response to a recent inquiry as to the "best" or "safest" types of car alarm systems. I have installed over 500 alarms, and must say that I have found that the most secure seem to be the ones that use a small slot mounted in or under dash where you have to insert a coded "key" or "chip" to start the car. Most of these types utilize fusable links in the critical circuits of the car(starter, fuel pump, etc.), and will "blow-out" these links if an incorrect "key" is inserted and render the car immobile. This type of alarm often doesn't protect against entry, just theft of the automobile. As for entry protection, make sure you utilize an alarm with "code-hopping", where the transmitter changes it's code every time you use it to prevent "code-grabbers" from working. Most of these also will have an interrupt relay that is put on the starter wire to prevent someone from breaking the steering column & turning the linkage. Make sure you mount the red L.E.D. that comes with most of these in a very visible place, as this alone will deter most of the amateur thieves. As for the professional ones, some of them simply hook your car to a winch on a flatbed & pull it on. There's not much you can do against this method. If someone wants your car bad enough, the most you can do is slow them down. I would say the Club-type deterrents are rather useless, as you can cut a noch in the steering wheel and remove these in seconds with a cordless reciprocating saw(sawz-all). For the ultra-paranoid, I would recommend getting a Lo-Jack system installed, where you can activate a locating transmitter after you car is stolen and it can be tracked. This isn't available everywhere though. If I can be of further assistance, please drop me a line. -Bigsby@Bigfoot.com ************************************************************************** 11)From: BADCOFFEE@aol.com Subject: Seeking someone in electronics I am seeking someone in electronics to build/modify certain electronic items. I have NO electronics knoledge and to be frank....I'd rather pay you to do it than try myself. One item I would like to have is a SUPER universal remote control for out jobsite TV. As powerfull as you can make it. Size or apearance doesnt mater. Range does. Another: The super universal remote for our jobsite stereo. Same concept. Special note: "If the space shuttle has a stereo and a TV...." I want RANGE. Name your price, the job site fellas will love you..... Augie +++Moderator's Note+++ Sommy two, Bad? ;-) ************************************************************************** 12)From: Duece6x6@aol.com Subject: Convention? Do you have an annual Spyking Convention? Would it be a great idea? Everyone meeting for seminars and a convention. Possilby at a central location for everyone. The Duece +++Moderator's Note+++ First of all Deuce, this is NOT the "SpyKing" list... it is the "Surveillance List Forum"... It is "our" list... I am just the moderator... I like to moderate as little as possible... it makes for "friendly" exchange of info... A convention? Sounds good to me... It will require some thought and a LOT OF WORK... if anyone is interested, contact me directly and we'll see if we can put one together... let's hear your ideas about where, when, what we'll do, if we want... Vendor's? Speakers? Workshops? etc. With 1800 plus members it doesn't take much to make it a rousing success... ************************************************************************** 13)From: BADCOFFEE@aol.com Subject: Just a personal note Just a personal note on theGenocide Subject: The cybernetic education of a Hacker article.......... Just a part of the post that forced me to comment. ;-) Hacking got a VERY tarnished reputation. Unfairy...very unfairly. My personal comments are that the hackers are the very reason why program security exists. NO ONE knows more. Now...to a sence....I am a lock hacker. I violate locks using back door meatods and LEARN as much as I can. Like myself...you have the option to use your powers illigally or to HELP the industry by sharing your knoledge of defects/breaches/ likewise. Here's my punchline...... If there was about 20 or so million "children" pretending to be hackers and terrorizing people on line because they have some bull shit program like FATE <---sue me, your reputations would NOT in the least bit be tarnished. I help people every day online with their struggles in keeping "MY" skills..that i have passed on....for uses that do no harm. This is what i want everyone to do........ Any time you see someone tampering with serious items....DONT take it away..... "Educate them". Give them a sence of pride. Help the whole indusrty...and I guarantee you there will be a hell of a lot less regulations on whatever you do. What to do if idiot mentality interferes and someone wants to use powers for harm?? "...take em out..." As a professional, YOU have the OBLIGATION to protect the reputation of your field. Wishing you the best, I have not judged you. Here is the key...use it with caution....because I put my trust in you. Badcoffee, scientist ************************************************************************** 14)From: "Craig Markillie" Subject: Telephone tones Somebody recently asked about a program to tran. the tones of a phone to numbers. Has anybody seen the movie Hackers(I think)? The scene was a kid recording the sounds of dropping coins into a pay phone. He then dialed a number in another country. When asked to deposit the $5.00, he replayed the sounds from the tape. Here's my question: If someone was to record the tones while I am dialing my cell. phone, would they be able to dial/convert the tx. number? Now, I know this movie is fiction but, how much? jester@pcl.net ************************************************************************** Who are you? What's your specialty and/or interest? Let us know about your company... What would you like to see on the list? Post it. Let us know... Do you have something to contribute? We'd like to hear it... We want to know EVERYTHING and ANYTHING about eavesdropping, surveillance, countersurveillance & privacy related technology, etc... Remember: who, what, where, when, how & why... we want ALL the details... Do you have a question? Post it... A little free time? Help a member... With the INCREDIBLE brain power on this list, someone should have the answer ;-) P.S. Don't be a LURKER... Members take the time to post info for us all... give something back... Don't just take... Your input/knowledge is valued... ************************************************************************** Send Postings to: spyking@con2.com with "Post" in subject field with subject ************************************************************************** Subscribe to: spyking@con2.com In the subject field type: subscribe-surveillance list e-mail address ************************************************************************** Unsubscribe to: spyking@con2.com In the subject field type: unsubscribe-surveillance list e-mail address ************************************************************************** ...The Simple Rules of the Surveillance List... The Surveillance List Owners may Reject any posts that are/contain: 1) Info Unrelated to Eavesdropping, Surveillance or Privacy technology... 2) Flames or Negative posts... 3) E-Signatures that are considered excessive... 4) Advertisements not DIRECTLY related to the list topics... 5) Attached Files... 6) Oversized Posts... (May be edited to save room) **************************************************************************** This publication is copyrighted and is protected by U.S. and International copyright law. The information transmitted on this list may not be reproduced, reposted or forwarded to any non-list member without expressed written permission of the List Owner. Violation of U.S. copyright law is a criminal and civil offense... **************************************************************************** The Surveillance List is Moderated by SpyKing@thecodex.com The List Owner will make EVERY effort to protect subscribers from spam... Copyright 1996, 1997 Codex Publishing Inc., All Rights Reserved... **************************************************************************** Vol 2 Issue #101 ****************************************************************************** Vol.Two Issue #101 The Surveillance List May 5,1997 Over 1900+ Members Worldwide Representing 42 different countries ****************************************************************************** IN THIS ISSUE... ****************************************************************************** 01) Re: How to build a Tempest intercept device 02) Re: Telephone prefix database 03) Re: Telephone tones 04) Image Enhancement 05) Re: Lock picking supplies 06) Re: Telephone Tones 07) Re: Telephone tones 08) I been thinking... 09) Words & Evidence 10) Terrorism bill in House 11) The Surveillance List Forum FAQ 12) Self destructing e-mail? 13) Reminder 14) Answering machines 15) RE: Lockpicking Warded locks and master padlocks 16) Freelance entry specialist ****************************************************************************** DON'T BE A LURKER.... GET INVOLVED... YOU ARE A MEMBER... MAKE THE MOST OF IT ****************************************************************************** 1)From: william.c.mcdonald@ns1.con2.com (sonnymac@worldnet.att.net) Subject: Re: How to build a Tempest intercept device I guarantee the government agencies involved in that program will be sweating bullets if this device actually works. I agree the article will end up plastered all over the net. To the author, not meaning to be paranoid, remember what happened to Phil Zimmerman when his PGP was posted to the net. Usually the point man is the target. Good luck. Bill Mcdonald ************************************************************************** 2)From: Al Hays Subject: RE: Telephone prefix database > Great Page, I'm looking for a database that searches for telephone > prefix's. NTC has suspended this service recently due to LEGAl REASONS > I found this service very useful especially in identifying incomming > calls on caller I.D. box. Could you find out who currently has this > service? Thanks, keep up this wonderful site. Bellcore's Traffic Routing Administration has a complete list of all NPA/NXXs, free updates downloadable online, and a subscription service including quarterly updates to NPA/NXX splits, additions, and removals. Information may be obtained at Bellcore's Traffic Routing Administration Catalog website (specifically: http://www.bellcore.com/NANP/tracat.html). To order a copy of the TRA Catalog, or to obtain information on other available Bellcore products and services, including licensing fees for any of Bellcore's products, email them at tra@notes.cc.bellcore.com, or call 1-908-699-6700. regs, .al. Alan H. Hays The Mark Travel Corporation Senior Telecommunications Analyst 8907 N. Port Washington Road Voice: +1 414 934 2600 PO Box 1460 Fax: +1 414 351 5837 Milwaukee, WI 53201-1460 Email: ahays@marktravel.com http://www.onlinevacationmall.com ************************************************************************** 3)From: Mutter Subject: Re: Telephone tones > Somebody recently asked about a program to tran. the tones of a phone to > numbers. > > Has anybody seen the movie Hackers(I think)? The scene was a kid recording > the sounds of dropping coins into a pay phone. He then dialed a number in > another country. When asked to deposit the $5.00, he replayed the sounds > from the tape. > > Here's my question: If someone was to record the tones while I am dialing > my cell. phone, would they be able to dial/convert the tx. number? > Now, I know this movie is fiction but, how much? > > jester@pcl.net If I understood your question right ... Sure they would. Your phone uses what's referred to as dual tone multi freq. (DTMF) to route your calls (a.k.a. touchtones). If you are using an analog cellular phone it is remarkably easy for someone to record the call. Why wouldn't they be able to convert the tones to numbers? Maybe I'm just not understanding your question right. Play a tape recording of the tones that designate your number into your phone. Hear that busy signal? Something to think about next time you enter a PIN over a cell phone. Interesting side note to the (fictionous!) movie "hackers," the film makers were originally going to use the real tones used to tell the phone that you deposited the money but at the last moment replaced them with dummy tones (I heard that the reason for this was because of pressure put on them by several phone companies...) - M u t t e r Ed. root zine (h/p newsletter/zine) (http://www.openix.com/~mutter) mutter@openix.com ************************************************************************** 4)From: witzend@peganet.com Subject: Image Enhancement 1. I am Still looking for contacts in the image enhancement field. I would appreciate the mathematical transformations and the out comes they produce. Any suggestions of hardware, peripherals, software, sources and techniques would also be appreciated directly. 2. Send directly or post as your comfort zone dictates. to >> witzend@peganet.com R&D weenie + instructor ************************************************************************** 5)From: Mutter Subject: Re: Lock picking supplies Majestic lock, Hackensack NJ 1-800-441-9234 ^^^^^Leads to some co. in Detroit. The _real_ number is 800-441-9324 (it took quite an adventure in directory assistance land to get that number so be thankful:) Thanks for the info, though, Badcoffee. I look forward to getting their catalog. - M u t t e r Ed. root zine (http://www.openix.com/~mutter) mutter@openix.com ************************************************************************** 6)From: William Xu Subject: Re: Telephone Tones What you saw in the movie "Hackers" is called red boxing my phreakers. It only works with regular pay phones. this is how it works: each time you deposit coins into your/telcos payphones it produces a freq so the switch knows that you deposited the money for your call. what if you can fool the computer switch into thinking you have deposited the money but really didnt? well long time ago someone found out the freqs for the coins. a nickle 1700hz+2200hz for 66millisecs dime is 66msecs on and off and on quarter is 33msecs of and off for 5 times. So the answer to your question is no, people cant record your cellphone tones or whatever to make free calls. but it is possible to make free calls from a cellphone with somone elses min and esn (mincro indentification number and electronic serial number) those are programmed inside your cellphone's eprom chip or whatever. so when you turn of you cellfone and try to make a phone call it send its min and esn to the base to see if you are a subscriber if you are you get a dial tone. people can capture these min/esn #s by building a DDI box or basically using a scanner with the right computer software. to find more about cellfone infos can be found at http://www.l0pht.com it is in the radiophone archive also check out alt.cellular? alt.oki? so do a search. ************************************************************************** 7)From: CrACKeD Subject: Re: Telephone tones > Somebody recently asked about a program to tran. the tones of a phone to > numbers. > > Has anybody seen the movie Hackers(I think)? The scene was a kid > recording the sounds of dropping coins into a pay phone. He then dialed > a number in another country. When asked to deposit the $5.00, he > replayed the sounds from the tape. FYI, the tones in the movie were very flawed (just like any other attempt at technical detail). You can hear the real ACTS tones if you grab a copy of BlueBeep or other "red box" software out there. They aren't DTMF tones, but are 2200Hz + 1700 Hz MF tones. The sound of a quarter is 5 of these tones outpulsed at 12 - 17 PPS (pulses per second), a dime is 2 tones at 5 - 8.5 PPS, and a nickle is 1 tone at 5 - 8.5 PPS. What the movie didn't take into account is that payphones now mute the mic until the tones are heard from your coins being inserted. You don't hear the tones because the earpiece is muted while the coins are being dropped in, although there are some payphones out there which still let you hear the beeps (plenty of payphones in my city do this). There are ways around this and tricks to try, but that could take up my entire evening. The best thing to do is to just browse the internet for some information and doing a little plinking on your own. And a tape recorder isn't going to do the job, either. Either a high-quality digital recorder (high sampling rate) or a modified Radio Shack tone dialer (must have memories and speed-dial) will do the job. There is plenty of information about these things floating around on the internet as well. > Here's my question: If someone was to record the tones while I am > dialing my cell. phone, would they be able to dial/convert the tx. > number? Now, I know this movie is fiction but, how much? The movie, wasn't horribly fictional, but the Hollywood fluff managed to kill the reality behind what they were doing. DTMF tones (what your analog, cordless and cellular telephone chuck out when you dial) can be decoded very easily. Any 14 year-old kid with his dad's scanner and a piece of free software can figure out what any of your dialed digits are in real-time. CrACKeD ************************************************************************** 8)From: BADCOFFEE@aol.com Subject: I been thinking... is building electronic items with a part list and a schematic that difficult? Can someone get me started in assembling something interesting and simple. I have an interest :-) Augie Badcoffee@aol.com ************************************************************************** 9)From: Arlene Manduca Subject: Words & Evidence Pay attention, don't make assumptions, a good "lie" is evidence too. Humorous example. A married man and his secretary were having a torrid affair. One afternoon they couldn't contain their passion, so they rushed over to her place where they spent the afternoon making passionate love. When they were finished they fell asleep and didn't wake up till 8 o'clock. They got dressed quickly. Then the man told his secretary to take his shoes outside and rub them on the lawn. Bewildered, she does as he asks (thinking him pretty weird). The man finally gets home and his wife meets him at the door. Upset, she asks where he's been. The man replies "I cannot tell a lie. My secretary and I are having an affair. Today we left work early, went to her place, spent the afternoon making love then fell asleep. That's why I'm late." The wife looks at him, takes notice of his shoes and says, "I see those grass stains on your shoes. You've been playing golf again, haven't you!?" ************************************************************************** 10)From: Anon Subject: Terrorism bill in House Freely redistribute, but without my e-mail address This bill will open your records at the phone company, miniwharehouse, and other places to FBI inspection without a warrant. It also authorises the use of weapons of mass destruction against terrorist. Good God! I can't tell the terrorists from the government! H.R.275 SPONSOR: Rep Schumer, (introduced 01/07/97) DIGEST: (AS INTRODUCED) Effective Antiterrorism Tools for Law Enforcement Act of 1997 - Amends the Federal criminal code to apply provisions regarding pen registers and trap and trace devices to foreign counterintelligence and international terrorism investigations conducted by the Federal Bureau of Investigation (FBI). Requires any common carrier, public accommodation facility, physical storage facility, or vehicle rental facility to comply with a request for records in its possession by the FBI under specified circumstances. Provides that provisions prohibiting the use as evidence of intercepted wire or oral communications in violation of the Federal criminal code shall not apply to the disclosure by the United States in a criminal trial or hearing or before a grand jury of the contents of a wire or oral communication, or evidence derived therefrom, unless the violation involved an interception under provisions covering specified emergency situations or bad faith by law enforcement. Grants: (1) wiretap authority in cases of terrorism-related or explosives felonies; and (2) temporary emergency wiretap authority involving terrorism crimes. Expands authority for multi-point wiretaps. Authorizes the Attorney General to request, and the Secretary of Defense to provide (if specified conditions are met), technical assistance in support of Department of Justice activities in situations involving biological or chemical weapon emergencies. Sets penalties for the use without lawful authority of, or attempts or conspiracy to use, chemical weapons. Modifies Federal prohibitions against the use of weapons of mass destruction to prohibit and penalize only such use without lawful authority. ************************************************************************** 11)From: SpyKing@thecodex.com Subject: Surveillance List Forum FAQ We are going to create a SLF FAQ. Many of the information requests here are redundant. An FAQ will assist us in answering many questions. I have outlined a brief table of contents and would like the list members to let me know if this covers most topics of interest to the list... What do you think? Ideas? If any list member would like to contribute to the FAQ, please contact me directly. Contibutors will be given full credit. THE SURVEILLANCE LIST FORUM - FAQ Beta .01 CONTENTS 01) INTRODUCTION 02) ELECTRONIC SURVEILLANCE - AN OVERVIEW 03) MICROPHONES AND HARDWIRING 04) RADIO TRANSMITTER BUGS 05) EXOTIC LISTENING DEVICES 06) AUDIO RECORDING DEVICES 07) LISTENING THRU WALLS 08) RECEIVERS, SCANNERS & INTERCEPTORS 09) THE PHONE COMPANY 10) TELEPHONE INTERCEPTION 11) PREMISES MONITORING THRU THE TELEPHONE 12) CELLULAR PHONE INTERCEPTION 13) PAGER, FAX AND DATA INTERCEPTS 14) VIDEO SURVEILLANCE 15) NIGHT VISION 16) VEHICLE/PARCEL TRACKING 17) SURVEILLANCE PHOTOGRAPHY 18) COMPUTER CRACKING 19) TEMPEST 20) INFORMATION TRACKING 21) DETECTIVE DATABASES 22) LOCKPICKING 23) AUDIO/VIDEO TAPE ENHANCEMENT & AUTHENTICATION 24) SOFTWARE OF INTEREST 25) SOURCES ************************************************************************** 12)From: WWMason@aol.com Subject: Self destructing e-mail? Does a program exist that could be attach to an e-mail message that would prevent the receiver of the e-mail message from printing, saving, or recalling it? Occasionally we all have something we may want to share with someone, but we're not sure we want them to have it forever. It would be comforting to the sender to know that the receiver was able to read it on screen once, but couldn't print it or save it. Kinda like Mission Impossible "This E-Mail will self destruct in 60 seconds." Any Ideas? ************************************************************************** 13)From: William Roche Subject: Reminder Once again dont forget to register your professional Investigative service with Intern, the registration is FREE. PS. Pass it on. Thanks Intern. ************************************************************************** 14)From: patriot Subject: Answering machines Also a fellow lurker of this list I decided to come out. To tell you all a little about myself, I am not at all affiliated "career" wise with investigations or surveillance, but am and always have been interested in the field. I install commercial audio/video systems and am somewhat knowledgable in a wide variety of subjects from locks to electronics to computer security. Basically anything and everything that can keep me one step ahead {or as much as I can be} of the next guy. One question I have for anyone out there is of answering machines. I came across a while back ago of an ad of a "device" that cracked 3 digit security code answering machines remotely. I have a sequence of numbers that contains all possible combinations for two digit codes, but it seems that a sequence for three digit codes would be fairly large and almost unpractical. None the less if anyone out there has this sequence or knows of a better way, please let me know. BTW... most common answering machines let you "overlap" digits. That way making it a much smaller sequence. ie: 001020= 00, 01, 10, 02 etc.. Al "patriot" ************************************************************************** 15)From: BADCOFFEE@aol.com Subject: RE: Lockpicking Warded locks and master padlocks Here's a neat tip passed along to me someone from this list a few days ago. Make a master key to those supposedly "cheap" warded (keyhole looks like this----> VVVV ) locks by filing/grinding the teeth off of one side of any warded key. I haven't tried it yet......but I see no reason why this wouldnt work. My professional warded key pick set has the same principals. Play with a few keys and alter spacing. Thank you to the person that passed that to me. Personal note: Those cheap warded locks in my eyes carry more security than pin tumblers, of which can be manipulated with just about anything you find on the ground. Just my thaughts....I'm sure I'm wrong. Quick tip: Wondering if the term "Master Key" came from The Master Lock.,....... It must....because It wouldnt be the first time that one Master Lock key opened a completely different Master Lock. In fact...Ive got better than 80% sucess on this one. Keep a key or 2 in your kit......and try it for yourself. Please give me feedback on this one. I need to know if I have the "golden" key or are they all golden. PS- I post and ask for YOUR results...because this is the finest way to bench test tecniques on a mass scale. Please....DO respond...it helps me tremendously. Peekin in your window...., Badcoffee@aol.com ************************************************************************** 16)From: BADCOFFEE@aol.com Subject: Freelance entry specialist Freelance entry specialist in NJ available for commercial/residential site analasis. This is a free service, I am NOT a substitute for a professional security service. Let me show you in person "how" a "profesional" burglar would realistically gain entry and what you can do to protect yourself. I have yet to "mentally" NOT gain acess to anything in my path...and I'm on your side. Commercial sites are specialty. All requests will be discretely verified for authenticity....so use your real name :-) Any deceptive requests will be forwarded to State presecutors office.....OR....I might be waiting for you IN your home one day. This is a legit thing...let's keep it that way all the way around. E-mail with desription Pressed for time? GOOD...me to, one phone chat and I'll e-mail my report. Local and lisenced PI's- Here is your 1 year.... PRO BONO entry card. Badcoffee@aol.com ************************************************************************** Who are you? What's your specialty and/or interest? Let us know about your company... What would you like to see on the list? Post it. Let us know... Do you have something to contribute? We'd like to hear it... We want to know EVERYTHING and ANYTHING about eavesdropping, surveillance, countersurveillance & privacy related technology, etc... Remember: who, what, where, when, how & why... we want ALL the details... Do you have a question? Post it... A little free time? Help a member... With the INCREDIBLE brain power on this list, someone should have the answer ;-) P.S. Don't be a LURKER... Members take the time to post info for us all... give something back... Don't just take... Your input/knowledge is valued... ************************************************************************** Send Postings to: spyking@con2.com with "Post" in subject field with subject ************************************************************************** Subscribe to: spyking@con2.com In the subject field type: subscribe-surveillance list e-mail address ************************************************************************** Unsubscribe to: spyking@con2.com In the subject field type: unsubscribe-surveillance list e-mail address ************************************************************************** ...The Simple Rules of the Surveillance List... The Surveillance List Owners may Reject any posts that are/contain: 1) Info Unrelated to Eavesdropping, Surveillance or Privacy technology... 2) Flames or Negative posts... 3) E-Signatures that are considered excessive... 4) Advertisements not DIRECTLY related to the list topics... 5) Attached Files... 6) Oversized Posts... (May be edited to save room) **************************************************************************** This publication is copyrighted and is protected by U.S. and International copyright law. The information transmitted on this list may not be reproduced, reposted or forwarded to any non-list member without expressed written permission of the List Owner. Violation of U.S. copyright law is a criminal and civil offense... **************************************************************************** The Surveillance List is moderated by SpyKing@thecodex.com The List Owner will make EVERY effort to protect subscribers from spam... Copyright 1996, 1997 Codex Publishing Inc., All Rights Reserved... **************************************************************************** Vol 2 Issue #102 ****************************************************************************** Vol.Two Issue # 102 The Surveillance List May 6,1997 Over 1900+ Members Worldwide Representing 42 different countries ****************************************************************************** IN THIS ISSUE... ****************************************************************************** 01) E-Mail Bomb protectors 02) Need Info 03) Re: Telephone question 04) Locksmiths 05) Two Recent Articles Of Interest 06) Ancient Safe 07) FREE PROMOTION 08) Re: Self destructing e-mail? 09) Re: Answering Machines 10) Re: email self destruct 11) HOW TO BUILD A RED BOX 12) Re: GPS Tracking 13) Australian Redboxs 14) 800 numbers as Caller ID? ****************************************************************************** DON'T BE A LURKER.... GET INVOLVED... YOU ARE A MEMBER... MAKE THE MOST OF IT ****************************************************************************** 1)From: "Mike Dilts" Subject: E-Mail Bomb protectors Is there any way to protect yoour e-mail from E-mail bombs and bombers. Mike Dilts raptordilts@hotmail.com ************************************************************************** 2)From: William Roche Subject: Need Info Ive recently discovered that my mail is being stolen and sometimes destroyed, and i have a pretty good idea as to who it possibly is. What i plan to do is to plant some dummy mail, but where i need the help is as follows: I need to know if there is a dye that when a letter is opened, the one i have planted, will spray them in dye or cover them in dye so that i can identify the mail thief and so on. The dye needs to be very difficult to remove, aleast for a few days so that i can gather my evidence, and hand them and the person/s to the authorities. Can anyone advise. Thanks Intern. ************************************************************************** 3)From: marcusb@mail.jeld-wen.com (Marcus Blankenship) Subject: Re: Telephone question DTMF Decoders: There are many different types, both hardware and software. Ham radio folks use these for legit purposes, as for others... Use altavista to search for "DTMF decoder". In 5 minutes I found both shareware for my soundblaster, and companies that sell portable units. Fun thing: Radio Shack sells a digital memo recorder, that many people are using to record CC numbers on payphone calls. I guess they get about 5 minutes of time from these little things. Move 'Hackers' response: a _Red Box_ simulates the sounds of coins entering a payphone. The Radio Shack portable dialer can be modified, by replacing the tone generation crystal, to make these sounds. And it doesn't have to be to another country, it works just fine in many parts of the US for local and LD calls. The red box technology is well over 20 years old. Cell Phone response: If your TX is transmitted via DTMF (telephone tones), then anyone with a properly tuned scanner can grab them. My gut feeling is they are NOT, but I would have to look it up. I think they are transmitted differently. Marcus Blankenship Jeld-Wen, Inc Titan Development Team Data Processing Dept Phone: 882-3451 ex 558 marcusb@jeld-wen.com ************************************************************************** 4)From: VIPprotect@aol.com Subject: Locksmiths For BADCOFFEE and any other practicing locksmiths, I came across the following site which lists locksmith associations by state and nation. It's located at www.clearstar.com/assoc ************************************************************************** 5)From: gaugusti@hqgbcs.attmail.com (Grant Augustine x4058) Subject: Two Recent Articles Of Interest Read 'em while they're hot -- 1. "Can e-mail be evidence?" at http://www.herald.com/business/digdocs/038322.htm 2. "Caution: Anything you post may be used against you" at http://cnn.com/TECH/9705/04/web.libel.ap/ Grant Augustine ************************************************************************** 6)From: lazlo@shadowlink.net Subject: Ancient Safe I have this ancient safe that was in our house when we moved in. The previous owners don't know the combo and don't have any idea what is inside. It is about 2.5ft. sq. and weighs a ton. It says "York Safe and Lock Co." on the front. Does anyone know any tricks for taking on a project like this? Would a guy with minor lock experience even have a prayer of getting it open, or should I be getting out the dynamite instead? -Lazlo ************************************************************************** 7)From: "L. J. Strand" Subject: FREE PROMOTION I.S.A. is still offering free advertising space for Companies and Organizations related to the security industry! Interested in promoting your web-site? visit our LINK PAGE and find out how you can promote your company world wide, for free. Sincerely yours L. J. Strand INTERNATIONAL SECURITY AGENCY http://www.algonet.se/~ljsaisa ljsaisa@algonet.se Tel: Int+46 (0)8-645 22 82 (09.00am-05.00pm C.E.T.) Fax/Data: Int+46 (0)8-645 22 82 (24h) PoBox 167, S-162 12 Stockholm, Sweden ************************************************************************** 8)From: CrACKeD Subject: Re: Self destructing e-mail? > Does a program exist that could be attach to an e-mail message that > would prevent the receiver of the e-mail message from printing, saving, > or recalling it? Yes, but it certainly isn't anywhere near universal. The only e-mail system I've seen that can do this is some very new, probably beta, software a Windows NT/95 intranet at my office uses. It will allow you to delete a message in someone's inbox providing they haven't already read it. So when you're pissed off at your boss and send him threats and put-downs through your company's intranet e-mail, and then realize you've really screwed up your career, you can undo the damage before you're booted out of your job. Unfortunately, you can't do this with any e-mail client out there. My UNIX e-mail client (Pine) certainly wouldn't allow you to remotely mess with anything in my inbox or mail me something I wouldn't be free to do whatever I wished to. Even if there was a mail client out there which would allow someone to place a read-only tag on their e-mail, there would be ways around it. Hit the print screen button. Take a screen snapshot. Write the message down. You get the idea. But it all depends on what the client supports, and few, if any, will do what you want them to do. Maybe you should try postal mail and disappearing ink, maybe also on edible paper which will eventually turn into mush in a humid environment? Or mail this person a metal box, welded shut, that will allow enough time for a self-contained message to play, and then ignite a block of thermite inside of itself? Alright, maybe I'm getting a bit carried away, but I'm sure you see the options you have available. But hey, the melting box idea really wouldn't be too tough. Could be a fun project, but with costly results. CrACKeD ************************************************************************** 9)From: "dataFLEX Associates" Subject: Re: Answering Machines : One question I have for anyone out there is of answering machines. : I came across a while back ago of an ad of a "device" that cracked 3 digit : security code answering machines remotely. I have a sequence of numbers ...snip... I'm not sure if this will help, but, you never know. I have noticed that in a certain model of answering machine, every unit uses the same code... I've seen one model that uses '10' and one that uses 741. 741 is very popular, Its worked 3 out of the 4 times I've tried this sort of thing, give it a shot. Most moderately/inexpensively priced units do not possess the capability to switch codes, so they make it something easy to remember, 741 runs up the left side of the keypad. Sucks huh? -WeThree ************************************************************************** 10)From: Michael Jenkins Subject: Re: email self destruct Someone recently asked about email self destruct. I was recently experimenting with encryption programs and found one that had a time bomb feature. I had settings of 3 minutes, 3 hours and three days. Sopposedly the email message would self destruct after the elected period of time. The program was either DATASAFE, KREMLIN or GUI4PGP, Im sorry I cant remember which, Ive already wiped it from my computer. You can download afew of them at: http://www2.windows95.com/apps/encrypt.html Regards Johan Erlandsson ************************************************************************** 11)From: Spysociety@aol.com Subject: HOW TO BUILD A RED BOX This may help all those questions about Red Boxes HOW TO BUILD A RED BOX What is a red box? When a coin is inserted into a payphone, the payphone emits a set of tones to ACTS (Automated Coin Toll System). Red boxes work by fooling ACTS into believing you have actually put money into the phone. The red box simply plays the ACTS tones into the telephone microphone. ACTS hears those tones, and allow you to place your call.The actual tones are: Nickel Signal 1700 + 2200 0.060s on Dime Signal 1700 + 2200 0.060s on, 0.060s 0ff, twice repeating Quarter Signal 1700 + 2200 33ms on, 33ms off, 5 times repeating How do I build a red box? Red boxes are commonly manufactured from modified Radio Shack tone dialers, Hallmark greeting cards, or made from scratch from readily available electronic components. To make a red box from a Radio Shack 43-141 or 43-146 tone dialer, open the dialer and replace the crystal with a new one. The purpose of the new crystal is to cause the * button on your tone dialer to create a 1700 hz and 2200 hz tone instead of the original 941 hz and 1209 hz tones. The exact value of the replacement crystal should be 6.466806 to create a perfect 1700 hz tone and a 6.513698 to create a perfect 2200 hz tone. A crystal close to these values will create a tone that easily falls within the loose tolerances of ACTS. The most popular choice is the 6.55 36 hz crystal, because it is the easiest to procure. The old crystal is the large shiny metal component labeled " 3.579545 hz." When you are finished replacing the crystal, program the P1 button with five *'s. That will simulate a quarter tone each time you press P1. Which payphones will a red box work on? Red boxes will work on TelCo owned payphones, but not on COCOT's (Customer Owned Coin Operated Telephones). How do I make calls with a red box? Payphones do not use ACTS for local calls. To use your red box for local calls, you have to fool ACTS into getting involved in the call. One way to do this, in some areas , is by dialing 10288-xxx-xxxx. This makes your call a long distance call, and brings ACTS into the picture. Get the picture? Red boxes are illegal to use! ************************************************************************** 12)From: Jerry Subject: Re: GPS Tracking I have one of the tripmate units and they are great if you keep a couple of things in perspective: 1st) thay are not extremely accurate, your posistion can be off by more than 360 feet in the city (in the city 360 feet is a lot.) 2nd) it has a slight delay that is magnified by speed. Meaning if you are on the highway moving fast do not rely on this alone. On the plus side: this toy is great! I have used it when I have been doing MV surveillances and it tracts your movement to a log by real time. If you stop at a light or other interruption it marks you space with a green dot. When I coupled this with a voice activated recorder sitting on my front seat I was later able to accurately (second by second) write out my reports for my client. The best feature of this little box so far is this: I deliver a lot of subpoenas in the Boston area and due to gang turf (and kids in general) it seems a lot off the areas I need to visit have no street signs. This device pipionts your address for you down to the side of the street for you. I don't know about you but this saves me a fortune in lost travel time. This thing has paid for itself in stress reduction alone 20 times over. ILQQK4DOE ************************************************************************** 13)From: "Eric Draven" Subject: Australian Redboxs Just a question for anyone who might know. After reading the majority of mail posted about red boxes and free calls in America I was wondering if the frequencies for Australian payphones were the same? I'm not sure about any of the details of Australian payphones but am interested in any information anyone might have. Thanks Dumbangel ************************************************************************** 14)From: MOONSET1@aol.com Subject: 800 numbers as Caller ID? I heard once that 800 numbers list where the originating call comes from and this is reflected on the monthly bill. So essentially, it is caller ID. How does this work? Can callers block their number from appearing? I would like any information that you can provide me. Thanks. Todd ************************************************************************** Who are you? What's your specialty and/or interest? Let us know about your company... What would you like to see on the list? Post it. Let us know... Do you have something to contribute? We'd like to hear it... We want to know EVERYTHING and ANYTHING about eavesdropping, surveillance, countersurveillance & privacy related technology, etc... Remember: who, what, where, when, how & why... we want ALL the details... Do you have a question? Post it... A little free time? Help a member... With the INCREDIBLE brain power on this list, someone should have the answer ;-) P.S. Don't be a LURKER... Members take the time to post info for us all... give something back... Don't just take... Your input/knowledge is valued... ************************************************************************** Send Postings to: spyking@con2.com with "Post" in subject field with subject ************************************************************************** Subscribe to: spyking@con2.com In the subject field type: subscribe-surveillance list e-mail address ************************************************************************** Unsubscribe to: spyking@con2.com In the subject field type: unsubscribe-surveillance list e-mail address ************************************************************************** ...The Simple Rules of the Surveillance List... The Surveillance List Owners may Reject any posts that are/contain: 1) Info Unrelated to Eavesdropping, Surveillance or Privacy technology... 2) Flames or Negative posts... 3) E-Signatures that are considered excessive... 4) Advertisements not DIRECTLY related to the list topics... 5) Attached Files... 6) Oversized Posts... (May be edited to save room) **************************************************************************** This publication is copyrighted and is protected by U.S. and International copyright law. The information transmitted on this list may not be reproduced, reposted or forwarded to any non-list member without expressed written permission of the List Owner. Violation of U.S. copyright law is a criminal and civil offense... **************************************************************************** The Surveillance List is moderated by SpyKing@thecodex.com The List Owner will make EVERY effort to protect subscribers from spam... Copyright 1996, 1997 Codex Publishing Inc., All Rights Reserved... **************************************************************************** Vol 2 Issue # 103 ****************************************************************************** Vol.Two Issue #103 The Surveillance List May 7,1997 Over 1900+ Members Worldwide Representing 42 different countries ****************************************************************************** IN THIS ISSUE... ****************************************************************************** 01) Accessing a laptop 02) Re: Self destructing e-mail? 03) Red Boxing 04) Need Info 05) Re: 800 numbers as Caller ID? 06) Re: 800 numbers as Caller ID? 07) Re: Antique Safe 08) Copex Show Washington D.C. 09) Re: I've been thinking... (Basic Electronics) 10) Re: Convention? 11) Re: Lockpicking warded locks 12) Re: Cracking an Answering Machine 13) Recording phone conversations under Norway law? 14) Bank Account Searches for Under 75.00? 15) How can one be absolutely sure? 16) Re: Redboxing in Australia? ****************************************************************************** DON'T BE A LURKER.... GET INVOLVED... YOU ARE A MEMBER... MAKE THE MOST OF IT ****************************************************************************** 1)From: bamotech@juno.com (Bruce A. Matthews) Subject: Accessing a laptop The Machine: 1994 Dell Latitude XP 475c The Problem: Power on password recently enabled (so easy a child could do it!) password unknown. The usual course of action is to call Dell and request Master password. This won't work however because it has changed hands at least twice over the years and as the original owner is unknown, Dell assumes that the unit is stolen and will not help. CMOS battery disconnection does not help, password is stored elsewhere. No visible EPROMs on motherboard. I thought with all the talented minds in the forum one of you would have usable ideas. (I've gotten plenty of useless suggestions) With thanx in advance, Bruce (bamotech@juno.com) ************************************************************************** 2)From: marcusb@mail.jeld-wen.com (Marcus Blankenship) Subject: Re: Self destructing e-mail? We used to use Novell's Groupwise email package, and it has this ability. You could send mail, check to see if it had been opened, and if not, then you could delete it. Marcus Blankenship Jeld-Wen, Inc Titan Development Team Data Processing Dept Phone: 882-3451 ex 558 marcusb@jeld-wen.com ************************************************************************** 3)From: ddraig@kuntrynet.com Subject: Red Boxing Here is something I heard about, but not sure if it is true or even works. I don't exactly remember where I heard it from, but it goes like this. The red box in the payphone that makes the ACTS tones, it mutes the ear peice. However, I heard that there was a number that is used by the phone guy and that you could dial to put the red box in the phone into a diagnostic test state, to then test the phone to see if it creates the correct tones. I have this number, but need to find it and test it. Is this true or not??? Owen Morgan ddraig@kuntrynet.com ************************************************************************** 4)From: ProvRhode@aol.com Subject: Need Info Hello, There is someone who owes me money..of which they are not paying.. However, I have their drivers license number and social sercurity #. Is there anything, having these numbers, that I can do to get their attention..anything at all.. ************************************************************************** 5)From: Mutter To: SpyKing Subject: Re: 800 numbers as Caller ID? > 14)From: MOONSET1@aol.com > Subject: 800 numbers as Caller ID? > > I heard once that 800 numbers list where the originating call comes from and > this is reflected on the monthly bill. So essentially, it is caller ID. How > does this work? Can callers block their number from appearing? I would like > any information that you can provide me. Thanks. > > Todd Ahh, the wonders of ESS... No, what you are referring to is NOT callerid. It's Automatic Number Identification (ANI). Your ANI is sent to every 800 number you dial. Blocking it is a bit harder than dialing *67. Operator assisted calls to 800 numbers sometimes result in ANI failure, but this is rare nowadays. If you want to learn more about ANI I suggest doing a little reading up on modern telecommunications. - M u t t e r Ed. root zine (h/p newsletter mag) (http://www.openix.com/~mutter) mutter@openix.com ************************************************************************** 6)From: Jim Ray Subject: Re: 800 numbers as Caller ID? [Not PGPsigned because the list software munges it when I do.] >I heard once that 800 numbers list where the originating call comes from and >this is reflected on the monthly bill. Yes. >So essentially, it is caller ID. Yes. >How >does this work? Can callers block their number from appearing? Easy. Imagine you own an 800 number, and the telco tells YOU that the number that called can't be traced. You aren't too happy. The telcos are in the business of keeping *paying* customers happy. (I know, how well they accomplish this alleged goal is a matter for much spirited debate...) If you still want anonymity, there are 900 toll numbers that will give you a dialtone and anonymity, or payphones, or those prepaid cards, or other, shadier methods (which could lead to problems). JMR Regards, Jim Ray D.A.R.E. To keep shoveling money into a failed program. http://www.shopmiami.com/prs/jimray/ PGP id.A7D63DA9 98 1F 39 BA 93 86 B4 F5 57 52 64 0E DA BA 2C 71 ************************************************************************** 7)From: BADCOFFEE@aol.com Subject: Re: Antique Safe RE: LAZO ----------> lazlo@shadowlink.net Please...tell me you are local (NJ). Ide LOVE to give it a pop! :-) If not, make post in a locksmith forum too and do NOT pay a dime. :-) There are planty of eager individules that would just love to take a peek at that. Any idea what's inside? If there is anything of decent value and want to go in 1/2's....let me know. I'll travel. Sorry if i was not able to directly answer your question, this is a difficult to put in words one. If you DO decide to give this a shot on your own do NOT attmpt brute force methods. There are easier ways. If you do go brute force, use steel wedges (very dificult to decribe where to place without seeing safe> Other methods: Poor man's method: Drill 2 holes in the back. one for light, one for YOUR EYE. Hope and pray the back mechanicals are visible and you can manipulate visually. This will also give you an idea on whats inside and where you might place wedges if needed. Using a scope: Same concept Gosh....love to be there and help ya out with this one. Sounds exciting. ATTN: Locksmiths, any corrections and additions to this post is welcomed :-) Badcoffee@aol.com ************************************************************************** 8)From: SpyKing@thecodex.com Subject: Copex Show Washington D.C. I've gone to this show in the past both here and in England. It's a wealth of info for those interested... Visitor Information COPEX DC 97 CONTINGENCY & OPERATIONAL PROCUREMENT EXHIBITION 12th & 13th May 1997 09.00-16.00 hrs daily Venue: Sheraton Washington DC Hotel, 2660 Woodley Rd, Washington DC 20008 TEL 202 328 2000 Accomodation: Single \ Double room rate $165 US$ + tax TEL 202 328 2900 (US Residents only 1 800 325 5353) FAX 202 387 5397 GENERAL ATTENDEE INFORMATION COPEX, is a private,(ie non-public) trade exhibition organised for three specific, international end ser groups: Tri service special operations forces, including peace keeping. Specialist law enforcement operations, including corrections and federal agencies. Intelligence agencies. ENTRY QUALIFICATIONS Presentation of military warrant card, law enforcement or government service I\D material. Industrial visitors must apply in advance to the ticket unit for a special invitation and will require business ID plus supporting government issued picture I\D. (ie- drivers licence, passport, ID card.) Media and Press need to contact Public Relations the organisers for accreditation details If you do not have official ID or a valid invitation you will not be admitted. NB- There is no charge for entry to any COPEX exhibition for official I\D holders. There may be a charge for admittance to conference programmes. TYPICAL CATEGORIES OF VISITOR Military Special Forces, Spec-Ops Groups, Army, Navy, Marines, AirForce, Specialist Law Enforcement Groups, Intelligence Agencies, Customs & Immigration, DEA, FBI, EEC Central Enforcement Institiutions, Reserve Forces, Marshalls and Sherriffs, National Guard, State Troopers, BATF, CIA, Security Agencies, Port\Transportation Police International Security Agencies Corrections, Training Commands & Groups, Rapid Reaction Forces, NATO, Medical Support Staff, Peace Keeping Forces, Diplomatic & Liaison Staff, Logistics Planners and Agencies, Secret Service, R&D Organisations, Government and Federal Agencies, Close Protection Groups, SAR, UN. Communications Agencies,Border Security. The Assistant Secretary of State for Defence has determined that COPEX exhibitions meet the standards of participation for DoD personnel in accordance with directives 5410.20 and 5500.7" TYPICAL EXHIBIT PROFILE SO\LIC, EOD\IEDD, Communications, Surveillance, Peace Keeping,. Land Systems, Counter Insurgency, Survival, Retrieval Systems, Land\Sea\Air Mobility and Delivery, Control and Restraint, Riot Control, Training Systems, Public Order, Body Armour, Seige and Assault, Vehicle Armor and Building Hardening, Target Acquisition, Internal Security, Anti terrorist, Electro Optics, Medical and Medical Training, Personal Protection, Weapons, Reconaissance, Ordnance, Ballistics, Camaflague, Boundary & VP Protection, Counter Mine, Threat Evaluation, Drug Interdiction, Trans National Crime. Osprey USA, 1825 Eye St NW, Suite 400, Washington DC, 20006 TEL 202 429 6836, FAX Intl +44 1923 818924 COPEX DC 97 33A Church Rd, Watford, Herts, WD1 3PY. UK TEL +(44)(0)1923 819301 FAX +(44)(0)1923 818924 Compuserve 100010,3545 E-mail copex@delphi.com ************************************************************************** 9)From: Spyking@thecodex.com Subject: Re: I've been thinking... (Basic Electronics) >>>> From: BADCOFFEE@aol.com is building electronic items with a part list and a schematic that difficult? Can someone get me started in assembling something interesting and simple. I have an interest :-) Augie Badcoffee@aol.com <<<< If you really want to experiment and get involved with electronics you need a good foundation. The book I list below will give you that foundation. It covers everything from Ohm's Law to symbols, color codes, terms, etc. It has a number of simple starter circuits for you to build. The book is over 20 years old but some things never change... BASIC electronics... This book will give you the base to construct just about anything... The book is 368 pages... "Transistor Electonics" by Howard Gerrish & William Dugger, Jr. published by The Goodheart-Willcox Company, Inc of South Holland, Illinois ISBN # 0-87006-394-4 >>>> INTRODUCTION TRANSISTOR ELECTRONICS is intended to fulfill today's need for basic instruction in electricity and electronics with major emphasis on solid state components. Its depth of coverage will provide you with a comprehen- sive background in the field of electronics. This revised text features new chapters on "Integrated Circuits" and "Microcomputers." It explores the use of solid state components in the fields of communication, industrial controls, automation. computer technology and space technology. It shows how solid state electronics has made possible the miniaturization of electronic equipment and improved circuit reliability to a remarkable degree. TRANSISTOR ELECTRONICS also includes many new projects and experiments. Each completed project will aid you in understanding the theory presented and help develop your manipulative skill in electronic construction. In addition, a comprehensive course in personal safety is presented for students working with electricity and electronics. Carefully follow this safety program, both to insure maximum learning and also to assist in the development of safe working habits. A TRANSISTOR ELECTRONICS LABORATORY MANUAL that is correlated to this textbook is available for the student or experimenter. This laboratory manual contains numerous experiments that help clarify the theory presented in TRANSISTOR ELECTRONICS. Howard H. Gerrish William E. Dugger <<<< I highly recommend this book for beginners and those who want to brush up on the basics... ************************************************************************** 10)From: Duece6x6@aol.com Subject: Re: Convention? If anyone is interested in an annual convention, Email me to determine if it's feasable and to see how many may participate. I could organize one in Omaha, Nebraska or Kansas City, Mo. Duece6x6@AOL.com THE DUECE +++Moderator's Note+++ Omaha? Kansas City? To us New Yorkers everything west of the Hudson River is New Jersey... ;-) Any other site recommendations? What about it list? ************************************************************************** 11)From: "Richard A. Kinkopf" Subject: Re: Lockpicking warded locks BADCOFFEE - I have enjoyed reading your posts on lock-picking, although for the life of me, I do not have the touch (patience actually) to pick a lock. Years ago I solved the warded lock problem, I do not know what the warded key pick look like, but I took a key from a warded lock, and filed all of the teeth off, except the top pair, so instead of looking like this ## it looked like this ## ###### ###### ## ## ###### ## ## ## ###### ## ## ## #### ## ###### ##### ####### ###### ####### ###### With the "master key", I just tried the three or four different levels that worked. Of course, the locks I used only required one level of teeth, the other teeth were just 'dummy teeth' on the key. rkinkopf@concentric.net ************************************************************************** 12)From: CChrist373@aol.com Subject: Re: Cracking an Answering Machine To data flex (?) Hope I got your e mail name right To crack an answering machine us a pocket speed dialer from radio shack. They have two models. Only one has a speed dial frequency. You plug in an 101 digit code in sequence. ( found in the book How To Get Anything On Anybody book 2 by Lee Lapin ) ah heck, heres the code. 011223344556677889913579024680369258147159370494838272616051739506284085529630 074197531864209876543210 . plug this into the dialer using the three priority buttons plus another bank. as soon as you here the machine click on for the greeting...go. Long winded messages are best 'cause you have more time torun the numbers. You can get the program from the machine's voice (?) to give you the menu. Be careful of two things! Caller ID and the damnable call return. You know, where you hit a button to call back the last call a person gets. That can oops ya. Use a pay phone. be careful running a op on someone who is paranoid. They love cid and call return. You are also busting a law of some kind doing this. One more tidbit. remember Bernard Spindels rule ( he was a great wire man of the sixties, invented the harmonica bug ) Never eavesdrop on someone you know and or love. They wll not always say something kind about you, no matter how much they love you. Yes, the above does bust an answering machine, yes, Bernard, rest his soul, was right. MC ************************************************************************** 13)From: Scott Fendrich Subject: Recording phone conversations under Norway law Do you have info (or know where I can get it) regarding these laws for Norway? Is Norway a "One Party" or "Two Party" Country? Looking forward to a quick reply, Thanks, Scott Fendrich - "scott_fendrich@compuserve.com" ************************************************************************** 14)From: Located@aol.com Subject: Bank Account Searches for Under 75.00? Dear Fellow PI's: I would like to know....Online or Not... If there is anyway to obtain bank account locates. I am currently being charged 75.00 per account locate. I would like to get rid of the middle man and conduct my own searches. I am aware of pre-text calling, but would rather not obtain the information in this manner. Any suggestions would be greatly appreciated. In added note, the searches are for a collection agency and they usually provide me with the subjects crdit report. Thanks for your help. Michael Weisenberg Discovery Investigations 1-800-393-7794 ************************************************************************** 15)From: Spysociety@aol.com Subject: How can one be absolutely sure? How can one be absolutely sure if a so-called surveillance product is legal or illegal to possess, without compromising yourself to the authorities? ************************************************************************** 16)From: Brian Herlihy Subject: Re: Redboxing in Australia? > Just a question for anyone who might know. After reading the majority of mail > posted about red boxes and free calls in America I was wondering if the > frequencies for Australian payphones were the same? > I'm not sure about any of the details of Australian payphones but > am interested in any information anyone might have. Unfortunately, Australian phones work quite differently. Since I don't know much about it myself, I suggest you try to track down Neurocactus mag, and have a look at that. It seems to have vanished from the last place I saw it though.. Phrack 47 mentions a bbs at +617-855-2923 with a Neurocactus conference, but that was quite some time ago.. ************************************************************************** Who are you? What's your specialty and/or interest? Let us know about your company... What would you like to see on the list? Post it. Let us know... Do you have something to contribute? We'd like to hear it... We want to know EVERYTHING and ANYTHING about eavesdropping, surveillance, countersurveillance & privacy related technology, etc... Remember: who, what, where, when, how & why... we want ALL the details... Do you have a question? Post it... A little free time? Help a member... With the INCREDIBLE brain power on this list, someone should have the answer ;-) P.S. Don't be a LURKER... Members take the time to post info for us all... give something back... Don't just take... Your input/knowledge is valued... ************************************************************************** Send Postings to: spyking@con2.com with "Post" in subject field with subject ************************************************************************** Subscribe to: spyking@con2.com In the subject field type: subscribe-surveillance list e-mail address ************************************************************************** Unsubscribe to: spyking@con2.com In the subject field type: unsubscribe-surveillance list e-mail address ************************************************************************** ...The Simple Rules of the Surveillance List... The Surveillance List Owners may Reject any posts that are/contain: 1) Info Unrelated to Eavesdropping, Surveillance or Privacy technology... 2) Flames or Negative posts... 3) E-Signatures that are considered excessive... 4) Advertisements not DIRECTLY related to the list topics... 5) Attached Files... 6) Oversized Posts... (May be edited to save room) **************************************************************************** This publication is copyrighted and is protected by U.S. and International copyright law. The information transmitted on this list may not be reproduced, reposted or forwarded to any non-list member without expressed written permission of the List Owner. Violation of U.S. copyright law is a criminal and civil offense... **************************************************************************** The Surveillance List is moderated by SpyKing@thecodex.com The List Owner will make EVERY effort to protect subscribers from spam... Copyright 1996, 1997 Codex Publishing Inc., All Rights Reserved... **************************************************************************** Vol 2 Issue # 104 ****************************************************************************** Vol.Two Issue #104 The Surveillance List May 8,1997 Over 1900+ Members Worldwide Representing 42 different countries ****************************************************************************** IN THIS ISSUE... ****************************************************************************** 01) Individuals credit report 02) Re: I've been thinking... (Basic Electronics) 03) Re: Accessing a laptop 04) Re: Cracking an Answering Machine 05) Do-It-Yourself Espionage - Long 06) Re: Antique Safe 07) Modify a normal camcorder? 08) Sources E-Journal 09) Find the Hidden Message 10) Re: Nonpayment of Debt 11) Antique Safe Cont 12) Re: Lockpicking warded locks 13) Re: Accessing a laptop 14) Transmitter? 15) LIST CONVENTION 16) Re: Copex 17) Re: Ancient Safe 18) I NEED the immediate attention 19) Who someone is? 20) Anti-virus protection? ****************************************************************************** DON'T BE A LURKER.... GET INVOLVED... YOU ARE A MEMBER... MAKE THE MOST OF IT ****************************************************************************** 1)From: ProvRhode@aol.com Subject: Individuals credit report HI.. How can I obtain an individuals credit report...thank you ************************************************************************** 2)rom: Nathan Cummings Subject: Re: I've been thinking... (Basic Electronics) Get "The Art of Electronics" by Horowitz/Hill, ISBN: 0521370957. It is by far, one of the best books on electronics. It takes a very non-mathematical approach to circuit design and is equally suited to both the novice and the expeienced. It would be hard to find an EE that doesn't have it or hasn't used it. Nathan Cummings Key fingerprint = 77 1D 84 8C 52 DE 86 B0 B3 A4 C3 8A 40 33 10 3B For PGP Key send mail with "send pgp key" in subject header ************************************************************************** 3)From: CrACKeD Subject: Re: Accessing a laptop > The Machine: 1994 Dell Latitude XP 475c > The Problem: Power on password recently enabled (so easy a child could > do it!) password unknown. > > The usual course of action is to call Dell and request Master password. > This won't work however because it has changed hands at least twice over > the years and as the original owner is unknown, Dell assumes that the > unit is stolen and will not help. > CMOS battery disconnection does not help, password is stored elsewhere. > No visible EPROMs on motherboard. > > I thought with all the talented minds in the forum one of you would have > usable ideas. (I've gotten plenty of useless suggestions) Well, here's an idea at least. Don't just disconnect the battery that keeps your CMOS settings alive, but short the two contacts the battery plugged into as well. Often, a bit of current sticks around in the circuit and supports the CMOS settings for a while, so shorting the contacts out will stop that from happening. CrACKeD ************************************************************************** 4)From: CrACKeD Subject: Re: Cracking an Answering Machine > To crack an answering machine us a pocket speed dialer from radio shack. > They have two models. Only one has a speed dial frequency. You plug in > an 101 digit code in sequence. ( found in the book How To Get Anything > On Anybody book 2 by Lee Lapin ) ah heck, heres the code. > > 011223344556677889913579024680369258147159370494838272616051739506284085 > 529630074197531864209876543210 . plug this into the dialer using the three > priority buttons plus another bank. as soon as you here the machine > click on for the greeting...go. Long winded messages are best 'cause you > have more time torun the numbers. FYI, this method only works if the answering machine you're up against uses a 2-digit security code (fewer and fewer are out there now). CrACKeD ************************************************************************** 5)From" SpyKing@thecodex.com Subject: Do-It-Yourself Espionage I found this on the net and thought it of interest to the list. Do-It-Yourself Espionage By Christian Mass translated by Darrell Reed Telephone from Baghdad In countries subject to a trade embargo there are always winners and losers. We see the losers each day in the evening news - the impoverished population. The winners stay out of sight. They occupy high positions in the boycotted country, their counterparts being both small and large trading companies and manufacturers of military equipment, every day articles and industrial goods. To ensure that their good name is not dragged through the mud they naturally use agents. These people are specialists in avoiding any export restrictions and any other adversities which might prevent trade. When the goods finally arrive at their destination, their original value will have increased by around 100%. The manufacturer was more expensive than usual (i.e. the risk has to be covered), the agent's commission can easily be as much as 20 % of the goods and transport costs are increased by the circuitous routing, which in turn incurs another risk surcharge. Once arrived at the destination the purchaser makes arrangement for distribution, however he will already have added his extremely immodest profit margin to the price. This means that everyday articles are now available but the population can't afford them. They become annoyed, firstly with the people who imposed the embargo and later with their own government. The same is true of military goods, the only difference being that the boycotted country pays the excessive prices from the already depleted state coffers. The result is increasing inflation and national debt - as is the intention of those that imposed the embargo. When an extreme breach of the embargo comes to light it is the journalists who discover it that become outraged. The official bodies immediately promise a thorough investigation and sometimes they find a scapegoat. The responsible offices of the intelligence services blame their lack of knowledge on the bad weather over the region in question. They claim that their satellites couldn't see anything and that their newspaper analysis service has read nothing suspicious. Searching for clues The technical equipment of such services is often superior to the intellect of the employees. Certainly, no satellite can make out trading papers or read a fax on its way from A to B. However, the satellite does play a decisive role in modern international communication. The spoken word, data and pictures are transmitted around the world, offering scope for specific information to be picked out. We wanted to prove that this was possible even with fairly conventional means by carrying out a test. Our chosen victim was a boycotted country, Iraq. It has been subject to international boycotting since 1990 and this prolonged campaign is making an impact i.e. a badly supplied population and an inflation rate of 250%..It is known that spare parts and military equipment still find their way into Iraq. These deals have to be arranged and this was our starting point. Which satellite? Iraq does not work with dated equipment but uses modern uplink stations. As a member of the INTELSAT organisation it participates in international telecommunication. I somehow remembered the close links Iraq had with the former Soviet Union and so I referred to the INTERSPUTNIK manual. I found that there is a type C1 uplink station in Dujail on the outskirts of Baghdad. C1 indicates a 9-12 m dish which can broadcast and receive in the C-band. The station is equipped to handle audio, video, data and FDM. The only trouble is that there is more than one GORIZONT which makes the search for FDM signals broadcast from Iraq that much more difficult. It's times like these that you need the Internet and the ITU in Geneva. I gave up pretty quickly with the ITU as the search system is too complex but on the Internet I made a remarkable discovery. The telecommunications company there is called COMGEN BAGHDAD and one over eager employee was apparently happy to receive an email and replied to my question regarding which satellite was used within 20 minutes. He said that GORIZONT 31 was the satellite in question and it was no longer FDM but SCPC. Cheers! The only thing left to find out was the INTELSAT connection. My source of information was the tomb bearing the name EARTH STATION SERVICE CAPABILITIES. With the aid of five book markers to indicate cross references I found the uplink stations and the correct satellites. The dishes are also in Dujail. DJL02A is an ancient dish dating from 1976 which is pointed at 24.5° West (INTELSAT 605) and works in FDM, IDR, TDMA and video. DJL03N from 1991 (how did it get there during the embargo?!) is 11 m in diameter and is limited to FDM to 1° West. I managed all this relatively quickly but now came the difficult part. Hard and Soft SCPC is no problem. The editorial receiver, ICOM 7000, has always been a faithful servant but it doesn't have an AFC to compensate for the fluctuations in the LNC oscillator. A high quality AFC is a must for data acquisition. GORIZONT satellites can function below 3.6 GHz in the C-band which requires an IF of more than 1550 MHz which the R7000 has difficulties reaching. The first and authentic SCPC explorer receiver from the company SATSCAN, recently imported from the USA, has a normal IF range of 950-1450 MHz; the original version was intended only for SCPC radio reception which it did admirably. The modified European version featuring a second filter switch for telephone and data reception was at this time still en-route. Enger-based company VHT came to the rescue with the brand new AOR 5000, a super receiver with a range of 10 kHz - 2.6 GHz, seven IF filters and a programmable AFC. With this we could kill two birds with one stone as the AOR can also handle FDM. This is usually broadcast between 10 kHz to ~5 MHz and in the case of SCPC reception it has no limits. The people at VHT were obviously delighted to take part in the project. I was well aware that such delicate telephone negotiations would be encoded. However I doubted that our RAMA sound inverter from the bargain basement would be able to do the job satisfactorily. Realising our problem, VHT sent us its C1-DIGITAL which is actually supplied to service workshops for mobile radio and BOS units. This C1 later proved to be indispensable. Data can be transported in simple baudot or ASCII. Other alternative are SITOR and FEC which guarantee error free transmission. Yet another possibility is FAX. All these can be made legible with simple amateur programs and the users and service providers are well aware of this. They also use various types of ARQ, Autospec, FEC and TDM. It then becomes much more difficult to find a suitable decoding program. From my amateur days only Hoka's Code-3 sprang to mind. It is known that the Dutch firm, HOKA also offers a commercial (or military) version known as Code-30 but I thought that the DM 4,500 (£2000) was a little too much to pay. As luck would have it HOKA also supported our project and provided us with Code-3 Gold, an intermediate stage between the old Code-3 and the commercial/military version. Action! INTELSAT 605 is an old friend and has revealed many a secret between Europe and the USA. The well-known transponders for transatlantic communication could be ignored. This left transponders 22 and 23 but we still had a problem. Our Arabic speaking friend, Maruan, was not available so we simply concentrated on English-language conversations. The first job was to discover the identities of the senders of numerous telephone calls. This could largely be ascertained from the content of the call. Surprisingly the Code-3 Gold program also allowed the recipient of the call to be identified. As tone dialling is used world-wide for telephone communications the program simply decoded these tones and displayed all the numbers on the screen. Ninety per cent of the phone calls were of a business nature and after identifying the European business partners (after all what are the national telephone directories on CD-ROM for?) we had a collection of addresses closely resembling the who's who of Industry. Going on the content we had to assume that Sadam's people either make an awful lot of purchases or are already submitting advance orders for when the embargo comes to an end. Around 30% of the phone calls were scrambled and this is where VHT's C1 digital showed what it could do. Not one call was lost. Fax and data communication was also pretty lively. However, poor connections meant that the letters were smudged and we can't discuss their content here. For data reception the TDM 324 (synchronous ARQ method) in duplex in time division multiplex with up to four channels and FEC CCIR 476 in FEC mode (error correction) were used. Remarkably enough we even received a few pagers at 1200 baud complete with message and telephone number. Booty The test on INTELSAT 605 lasted for 5 days, sampled throughout each day to a total of around 2 hours per day. All the information was then destroyed, only the make-up of the orders negotiated remain in our memory. A supposedly Chinese operation (00 86 591 xxxxx) is to supply (or has already supplied) ammonium perchlorate (on the embargo list). Chemists have informed me that the stuff can be used in the propulsion element of solid fuel rockets. A French oil company negotiated advanced contracts for the exploitation of any deposits at Nahr Umar. A total of four representatives of large well-known US firms, who evidently live in a large hotel in Baghdad sent some memos home. The subject matter covered was spare parts for aircraft (on the embargo list), cars or car components (on the embargo list) and medical apparatus (?). The latter are to be delivered to the Ibn al-Haytham laboratory. The CIA lists this new complex as a research laboratory for the SAD-16 rocket. At least what I noted down phonetically is in agreement with this. An obviously German agent, on a mobile number, sent notification of handscanners and stationary air radios for both bands, both civil and military, made in England and specified a transport route. The dispatch and transport arrangements were confirmed by fax. I had linguistic problems with many of the 'phone calls and in many cases the things being discussed were goods freely available on the international market. This "shopping list" is the result of no more than ten hours work using minimal specification apparatus and only one satellite. It also proves, however, that in the age of satellite communication virtual-spying is possible. The era of the secret service agents is past and is being replaced by the PC, satellite reception system and additional hard- and software. The experiments described here were just that and are not to be repeated without knowing the legal situation in ones own country. ************************************************************************** 6)From: "Carney, Brian" Subject: Re: Antique Safe Safe cracking Paliden press offers a book on this subject. Can't coment on the technical merits of this book but it might be worth looking into. Paliden has a web sight but I cant recall the URL. Bcarney@ix.netcom.com(nospam) ************************************************************************** 7)From: "Integris International, Ltd." Subject: Modify a normal camcorder? Does anyone know how to modify a normal camcorder (Sony CCD-TR99) so that it can be used as a "hidden" camera (i.e. w/ mini lens attachment that can easily be concealed)? Thank you, Joe - JPC@TradeBrokers.com ************************************************************************** 8)From: SpyKing@thecodex.com Subject: Sources E-Journal This is a great site & publication for anyone interested in intelligence... SOURCES eJOURNAL on the World Wide Web http://www.dso.com in-depth original reporting, currently featuring: ---CYBER SNOOPING:As the NSA reads your email and plots an encryption monopoly, intelligence agencies ratchet up to wage covert operations on the Net ---IS THE WHITE HOUSE COMPROMISING NATIONAL SECURITY? Campaign dirty tricksters unqualified for a White House pass are put in charge of White House personnel security. ---ARMY PLANNING A RETURN TO GARDEN PLOT-STYLE DOMESTIC SPYING? During the rioting in L.A., the pentagon activated its plan for dealing with civil insurrection, but the army found it needs intelligence on troublemakers. ---THE PENTAGON BRINGS WAR HOME: As the military increasingly becomes entangled in internal peace-keeping, anti-drug operations, and support of civil authorities to maintain law and order, the military's Operations Other Than War initiative could lead to a greater entanglement of the Joint Chiefs in domestic law enforcement ---NARCO-TERRORISM: THE EXECUTION: During the Cold War, the KGB turned the political use of drugs to destabilize its enemies into an art form. Today, terrorists schooled by the KGB in using drugs to finance terror have joined with criminal cartels to become the world's biggest security threat. ---INTERVIEW:Steve Aftergood and John Pike - of Federation of American Scientists AND MUCH MORE!!! SOURCES eJOURNAL--http://www.dso.com ************************************************************************** 9)From: SpyKing@thecodex.com Subject: Find the Hidden Message We're running a contest at: http://www.thecodex.com/cypher.html See if you can find the hidden message, de-crypt it and send it to us to win a FREE prize... Let's see how good you are list... P.S. It's easy... you won't need a Cray ;-) ************************************************************************** 10)From: mjones@nbserv2.dseg.ti.com (Marty Jones) Subject: Re: Nonpayment of Debt > From: ProvRhode@aol.com > Subject: Need Info > > Hello, > > There is someone who owes me money..of which they are not paying.. > However, I have their drivers license number and social sercurity #. > Is there anything, having these numbers, that I can do to get their > attention..anything at all.. If you had an agreement for the loan, and a payback agreement (I don't think it has to be written), then "get their attention" by noting that you'll deduct the "bad debt" from your income on your tax return. Be sure to remind them that they have to report the "forgiven" loan as income and pay taxes on it. Mention that you may inform the IRS if you suspect they did not report the income. If they're not going to pay you back anyway, might as well get your 30 percent or so back on taxes. Marty Jones ************************************************************************** 11)From: lazlo@shadowlink.net Subject: Antique Safe Cont Thanks for the response BADCOFFEE. Actually, my priority is saving the safe. It is probably more valuable than what is inside. I am looking for a non-destructive means, and I am not in any hurry. Oh yea, I'm located in Utah, so if any locals want to try their hand, just drop me a line. -Lazlo ************************************************************************** 12)From: BADCOFFEE@aol.com Subject: Re: Lockpicking warded locks In a message dated 97-05-07 12:27:16 EDT, you write: << 11)From: "Richard A. Kinkopf" Subject: Re: Lockpicking warded locks BADCOFFEE - I have enjoyed reading your posts on lock-picking, although for the life of me, I do not have the touch (patience actually) to pick a lock. >> RICHARD!!!!!!! OH YES you can!!!!! A lock is like a "fine" woman. Take your time..... NO pressure and enjoy her . Go easy, respect your lock. Talk to your lock. Kiss your lock....."Hi precious, how was your day my love......" is proper lingo. If it has mushroom pins you might have to give it a "I love you" once or twice. Get yourself "MENTALLY" prepared for your experience. NOW.......gently insert your tool slowely and deeply.... <---by author, don't need more of that kind of mail! :-) OK....now that i got everyones attention...... It is a mental thing. I assure you. YOU are NOT lifting 5-6 pins. You are lifting.......ONLY one, then another....then another.... Can you get one pin up to sheer line??? Then you can get 6. When they make locks with 20 pins....what difference does it make...ONE at a time. How do you eat a cow??? ONE steak at a time. :-) Richard, I hate to say it. PATIENCE is the KEY (Pun intended). Before you know it.......it actully relaxes you. The first thing to happen when you get frustrated is your muscles get tence. Concentrate on keeping loose, even when frustrated. TENSE=too much of everything is applied. Special note: If your into meditation but just can not sit still for one second. Allways need to be doing something?? Can't just focus about nothing? Try lock picking and youll see a bg improvement in your life. Hope this helps. :-) Now...go buy her some flowers :-) Augie ************************************************************************** 13)From: Jim Motes Subject: Re: Accessing a laptop The poweron password is almost always stored in the cmos battery. If you didn't take the battery out for at least 20 min and preferably overnight, you may have had a capicitator (I think that's what its called) or some internal power storage holding the cmos info intact. If you did unplug it overnight and still get a password prompt, it's probably not the poweron password, but would be a password program. Have you tried to boot to a diskette? There is one other source but I have to look it up. I read about a site that will give you a file to bypass the bios password, but I don't remember the site url. If you want me to look for it I'll need the bios (i.e. award, ami....) BTW did you try password as the password? It's more common than you may think. Jim ************************************************************************** 14)From: Sebalite Subject: Transmitter? I read an arcticle at one time where it gave the plans to create a simple phone tap that you can make in which you place on the phone line (preferably outside where the phone box is located) and have it transmitted over a radio frequency. Then all you have to do is get a portable radio and tune in on the conversation. I read the plans ofr it a while back but I can't find it anymore. Oh another thing it is obvious that the transmitter would have a great range so you would have to camp out near the house. If anyone can respond I would be greatful -=Sebalite=- ************************************************************************** 15)From: BADCOFFEE@aol.com Subject: LIST CONVENTION First, Duece.....EXCELLENT. I applaud you. My recomended site: Anyplace where there is other things to do if things get a bit boring. I think where ever we have this....will be the most secure place in the world at that time. :-) Vegas??????? Note: We only need to pay for ONE room, then I'll get the doors open for the rest of you. Aditional note: I'll need a safe in my room so I can kick back and relax at the end of the day. Augie ************************************************************************** 16)From: Martin Pask <100142.3101@CompuServe.COM> Subject: Re: Copex Have to agree this exhibition is very good, however gaining acsses without ID is difficult and security is tight. MPI ************************************************************************** 17)From: "Eric Draven" Subject: Re: Ancient Safe If you aren't interested in keeping the safe something you may try is thermite. I am not sure it would work nor am I sure of the exact contents but a slightly primitive version can be made using one part aluminium powder and one part magnesium powder. It cannot be lit with a normal flame. Thermite can melt through most metals because it burns so hot, try it on the safe. Dumbangel ************************************************************************** 18)From: BADCOFFEE@aol.com Subject: I NEED the immediate attention of EVER SINGLE READER. NOW!!!! I am getting personal advise from absolute MASTER MINDS with EXPERIENCE that I could not even dream of myself ever having. How many of you people out there are just sitting on your asses JUST READING and......you are probably BRILLIANT! I just had a gentleman correct me privately on DRILLING safes. I was absolutely impressed with the knowledge this person had. My first question to myself was....."Why didnt he answer the "Antique Safe" post....and "Me"...an idiot sure as hell tried?? OK....I said it many times...my words are NOT bible. They are just MY experiences. Locksmiths....please...step forward...we'de like to know who you are. :-) PS- Sorry about all the bad things I says about you all in alt.locksmith, I do have a tremendous amount of respect for your knowledge. Can I come back??? :-) EVERYONE- Step to the plate......being wrong is better than being silent. PS- DO NOT DRILL SAFES :-) DO NOT DILL SAFES DO NOT DRILL SAFES ok, just a teeny little hole if you really want to. :-) Always on top, Badcoffee@aol.com ************************************************************************** 19)From: ProvRhode@aol.com Subject: Who someone is? HI.. Is there a way that I can find out who someone is if I have their pager number and cell phone number..Can I find out whos name is in those accounts..or get an address.. ************************************************************************** 20)From: Klint Bailey Subject: ANTIVIRUS PROTECTORS? ARE THERE ANY GOOD ANTIVIRUS PROTECTORS FOR FREE? IF SO, WHERE ************************************************************************** Who are you? What's your specialty and/or interest? Let us know about your company... What would you like to see on the list? Post it. Let us know... Do you have something to contribute? We'd like to hear it... We want to know EVERYTHING and ANYTHING about eavesdropping, surveillance, countersurveillance & privacy related technology, etc... Remember: who, what, where, when, how & why... we want ALL the details... Do you have a question? Post it... A little free time? Help a member... With the INCREDIBLE brain power on this list, someone should have the answer ;-) P.S. Don't be a LURKER... Members take the time to post info for us all... give something back... Don't just take... Your input/knowledge is valued... ************************************************************************** Send Postings to: spyking@con2.com with "Post" in subject field with subject ************************************************************************** Subscribe to: spyking@con2.com In the subject field type: subscribe-surveillance list e-mail address ************************************************************************** Unsubscribe to: spyking@con2.com In the subject field type: unsubscribe-surveillance list e-mail address ************************************************************************** ...The Simple Rules of the Surveillance List... The Surveillance List Owners may Reject any posts that are/contain: 1) Info Unrelated to Eavesdropping, Surveillance or Privacy technology... 2) Flames or Negative posts... 3) E-Signatures that are considered excessive... 4) Advertisements not DIRECTLY related to the list topics... 5) Attached Files... 6) Oversized Posts... (May be edited to save room) **************************************************************************** This publication is copyrighted and is protected by U.S. and International copyright law. The information transmitted on this list may not be reproduced, reposted or forwarded to any non-list member without expressed written permission of the List Owner. Violation of U.S. copyright law is a criminal and civil offense... **************************************************************************** The Surveillance List is moderated by SpyKing@thecodex.com The List Owner will make EVERY effort to protect subscribers from spam... Copyright 1996, 1997 Codex Publishing Inc., All Rights Reserved... **************************************************************************** Vol 2 Issue #105 ****************************************************************************** Vol.Two Issue #105 The Surveillance List May 8,1997 Over 1900+ Members Worldwide Representing 42 different countries ****************************************************************************** IN THIS ISSUE... ****************************************************************************** 01) Re: Self destructing e-mail? 02) Re: Getting Even with Bad Debts 03) Re: Cracking Answering Machines 04) Re: Transmitter 05) Re: Thermite 06) Spying Devices 07) Digital Wiretapping Update 08) What to do if you're stopped by the police 09) Re: LAPTOP pwd 10) Re: Ancient Safe (Thermite) 11) Re: Contest 12) PGP Question 13) I gotta problem.... 14) Seeking to establish relationship 15) It's absolutely wonderful 16) Re: List Convention 17) Modify a normal cam corder? 18) Re: Antivirus Protectors 19) Re: Bypassing Laptop Password 20) Delayed Responsed from Trace Carpenter ****************************************************************************** DON'T BE A LURKER.... GET INVOLVED... YOU ARE A MEMBER... MAKE THE MOST OF IT ****************************************************************************** 1)From: "William H. Geiger III" Subject: Re: Self destructing e-mail? -----BEGIN PGP SIGNED MESSAGE----- >2)From: marcusb@mail.jeld-wen.com (Marcus Blankenship) >Subject: Re: Self destructing e-mail? >We used to use Novell's Groupwise email package, and it has this ability. >You could send mail, check to see if it had been opened, and if not, >then you could delete it. Are you looking for this ability for Internet E-Mail? If so you will not find it. This kind of ablility would be seen as a serious security risk and I doubt that any ISP would enable such a feature. - ----------------------------------------------------------- William H. Geiger III http://www.amaranth.com/~whgiii Geiger Consulting Cooking With Warp 4.0 Author of E-Secure - PGP Front End for MR/2 Ice PGP & MR/2 the only way for secure e-mail. Finger whgiii@amaranth.com for PGP Key and other info ************************************************************************** 2)From: Greg_Smith@matrixres.com Subject: Re: Getting Even with Bad Debts You need to deduct the bad debt as a "non-business bad debt" on the Short Term Capital Gains/Losses section of your Schedule D form FOR THE YEAR IN WHICH YOU DETERMINED THAT THE DEBT BECAME BAD and be prepared to provide the IRS either a good explanation or provide documentation, in case of an audit, showing WHY you determined the debt became bad in that particular tax year. At the same time, send a 1099-MISC form to the debtor AND to the IRS reporting the forgiveness of debt as income. You will need to put the person's Social Security or Taxpayer ID number on the form, and if the person will not provide you the number, write "Request Denied" in the blank for the number (another penalty for the IRS to charge!). If the person does not report the income on his tax return, and unless he is a sophisticated person he will probably blow it off, then the IRS will come after him with penalties and interest for unreported income and for past due taxes. It's a really nasty way to get revenge! GREG SMITH Email: greg_smith@matrixres.com ************************************************************************** 3)From: Hfuhs@aol.com Subject: Re: Cracking Answering Machines Answering a post from >From: patriot >Subject: Answering machines The following translation was published in German a few years back in my book "Telecommunication Security". ------------------------------------------------------------------------------ Answering machines are nothing special. We are using answering machines with a daily routine even without reading their operating manual. That's why we know mostly nothing about a few special features which are build into an answering machine to make our living more comfortable. One of this features is the remote access to the answering machine for checking who called and left a message, or for changing the answering text. This remote access is been done with a tone dialer and a two or three digit access number. That makes it easy for a stranger to hack the access number within minutes, gain access to the answering machine and listen to the recorded messages. And it is no big secret in the Phreaker scene that the default factory access code for most of the answering machines is 147 or 741. There is also a digit sequence for three digit access codes available which fits 99% of the needs. The digit sequence is as followed: 900 102 030 405 060 708 091 121 314 151 617 181 922 324 252 627 282 933 435 363 738 394 454 647 484 955 657 585 966 768 697 787 988 99 This sequence was made by a tiny little Turbo Pascal program and both were published over computer networks. For certain reasons it happens very rare that a Phreakers tries to hack an answering machine. First, it costs him money to hack the answering machine because normally no private person owns a toll free number and second, in 99% there are no big secrets to find on an answering machine. The average message on a answering machine is "Hey, here is ... please call me back". So it's a waste of time for the Phreaker spending money for nothing. Another build in feature of a modern answering machine is a monitoring option. This monitoring option is normally protected by a two or three digit code and allows a caller to listen to the room in which the answering machine is installed. This is a very usefull option for parents which are away from home and wants to listen what the children are doing (sleeping mode or party time mode) and it is a very usefull option for a curious Phreaker to invade the privacy of people. The problem becomes even bigger when the answering machine is installed in the office of a small/big company. In that case it is possible for the Phreaker to get vital and/or confidental informations about the company and their future plans. The only method to prevent the misuse of these options and features is to buy an answering machine without these options and features. Copyrights (C) 7/94 by Howard Fuhs ------------------------------------------------------------------------------ ------------------------------------------- In the meantime I have received a lot more informations about this topic. State of the art hacking of an answering machine is done today by a small program which will dial up the answering machine and will issue all necessary dial tones within a few seconds. Greetings from Germany Howard ************************************************************************** 4)From: CrACKeD Subject: Re: Transmitter > I read an arcticle at one time where it gave the plans to create a > simple phone tap that you can make in which you place on the phone > line (preferably outside where the phone box is located) and have it > transmitted over a radio frequency. Then all you have to do is get a > portable radio and tune in on the conversation. I read the plans ofr > it a while back but I can't find it anymore. Oh another thing it is > obvious that the transmitter would have a great range so you would > have to camp out near the house. If anyone can respond I would be > greatful Just about any electronics shop sells those kits for under 10 bucks. They'll suck their power from the line and output about 100-300 mW somewhere in the FM broadcast band, as you already know. Call around your local outlets, they should sell what you need. If you still can't find one (unlikely) then check out Information Unlimited at www.amazing1.com. And BTW, I hope you just want to play with the thing, because they really are toys. I wouldn't depend on one to work properly or efficiently for the life of me. CrACKeD ************************************************************************** 5)From: (Bret Johnson) Subject: Re: Thermite >...something you may try is thermite. I am not sure of the exact contents but a >slightly primitive version can be made using one part aluminium powder and one part >magnesium powder. It cannot be lit with a normal flame. Thermite can melt through >most metals because it burns so hot, try it on the safe. Being a member of the military, I have to cringe a bit when I read this. Thermite DOES indeed burn extremely HOT -- not something I would want to combat in my home! Actual composition is approximately 1 part (by volume) aluminum powder and 1 part black iron oxide (red iron oxide didn't work for me). A "booster" which provides more heat than an ordinary match must be used to ignite the actual thermite. Now that I've set that record straight, let's go back to discussing non-destructive methods and projects, shall we? -Bret ************************************************************************** 6)From: Noonz@aol.com Subject: Spying Devices Do you know of any way a person can record what is being said in someone else's home via their answering machine without placing anything directly in the home? I have the suspision that someone was listening to things being said in my home because the phone would ring and the answering machine would start making a faint buzzing sound when we went to pick up the phone no one was there. When we unplugged the phone from the wall completely the buzzing sound would stop. If you do not know do you know of anywhere I can get some information on this if this is even possible? Thank You ************************************************************************** 7)From: Spyking@thecodex.com Subject: Digital Wiretapping Update Of interest to the list from the EPIC Site: The FBI filed a notice in the Federal Register on May 6 requesting comments on implementation of the Communications Assistance for Law Enforcement Act (CALEA). The notice responds to earlier comments submitted by telephone carriers relating to the scope of the FBI's demand for increased wiretapping capacity. In the last Congress, after several years of refusing to fund CALEA, Congress appropriated $60 million for implementation. It also authorized the creation of a "Telecommunications Carrier Compliance Fund" that could receive money from law enforcement and intelligence agencies. However, Congress required that the FBI provide an implementation plan before the funds could be spent. In March, the Bureau issued the required plan. The telephone companies have objected to the FBI's proposal, citing issues such as the requirement that cellular phones be able to track location information for individuals, and the amount of funding required to make the required changes to the telecommunications network. More information on the Digital Telephony issue is available at: http://www.epic.org/privacy/wiretap/ The ACLU has set up a free Internet-based fax service for individuals who wish to contact their member of Congress to express opposition to funding the Digital Telephony program. The URL is: http://www.aclu.org/action/calea_act.html ************************************************************************** 8)From: SpyKing@thecodex.com Subject: What to do if you're stopped by the police From the ACLU Web page... What To Do If You're Stopped By The Police Be polite and respectful. Never bad-mouth a police officer. Stay calm and in control of your words, body language and emotions. Don't get into an argument with the police. Remember, anything you say or do can be used against you. Keep your hands where the police can see them. Don't run. Don't touch any police officer. Don't resist even if you believe you are innocent. Don't complain on the scene or tell the police they're wrong or that you're going to file a complaint. Do not make any statements regarding the incident. Ask for a lawyer immediately upon your arrest. Remember officers' badge & patrol card numbers. Write down everything you remember ASAP. Try to find witnesses & their names & phone numbers. If you are injured, take photographs of the injuries as soon as possible, but make sure you seek medical attention first. If you feel your rights have been violated, file a written complaint with police department's internal affairs division or civilian complaint board. 1. What you say to the police is always important. What you say can be used against you, and it can give the police an excuse to arrest you, especially if you bad-mouth a police officer. 2. You don't have to answer a police officer's questions, but you must show your driver's license and registration when stopped in a car. In other situations, you can't legally be arrested for refusing to identify yourself to a police officer. 3. You don't have to consent to any search of yourself, your car or your house. If you DO consent to a search, it can affect your rights later in court. If the police say they have a search warrant, ASK TO SEE IT. 4. Do not interfere with, or obstruct the police you can be arrested for it. IF YOU ARE STOPPED FOR QUESTIONING 1. It's not a crime to refuse to answer questions, but refusing to answer can make the police suspicious about you. You can't be arrested merely for refusing to identify yourself on the street. 2. Police may "pat-down" your clothing if they suspect a concealed weapon. Don't physically resist, but make it clear that you don't consent to any further search. 3. Ask if you are under arrest. If you are, you have a right to know why. 4. Don't bad-mouth the police officer or run away, even if you believe what is happening is unreasonable. That could lead to your arrest. IF YOU'RE STOPPED IN YOUR CAR 1. Upon request, show them your driver's license, registration, and proof of insurance. In certain cases, your car can be searched without a warrant as long as the police have probable cause. To protect yourself later, you should make it clear that you do not consent to a search. It is not lawful for police to arrest you simply for refusing to consent to a search. 2. If you're given a ticket, you should sign it; otherwise you can be arrested. You can always fight the case in court later. 3. If you're suspected of drunk driving (DWI) and refuse to take a blood, urine or breath test, your driver's license may be suspended. IF YOU'RE ARRESTED OR TAKEN TO A POLICE STATION 1. You have the right to remain silent and to talk to a lawyer before you talk to the police. Tell the police nothing except your name and address. Don't give any explanations, excuses or stories. You can make your defense later, in court, based on what you and your lawyer decide is best. 2. Ask to see a lawyer immediately. If you can't pay for a lawyer, you have a right to a free one, and should ask the police how the lawyer can be contacted. Don't say anything without a lawyer. 3. Within a reasonable time after your arrest, or booking, you have the right to make a local phone call: to a lawyer, bail bondsman, a relative or any other person. The police may not listen to the call to the lawyer. 4. Sometimes you can be released without bail, or have bail lowered. Have your lawyer ask the judge about this possibility. You must be taken before the judge on the next court day after arrest. 5. Do not make any decisions in your case until you have talked with a lawyer. IN YOUR HOME 1. If the police knock and ask to enter your home, you don't have to admit them unless they have a warrant signed by a judge. 2. However, in some emergency situations (like when a person is screaming for help inside, or when the police are chasing someone) officers are allowed to enter and search your home without a warrant. 3. If you are arrested, the police can search you and the area close by. If you are in a building, "close by" usually means just the room you are in. We all recognize the need for effective law enforcement, but we should also understand our own rights and responsibilities especially in our relationships with the police. Everyone, including minors, has the right to courteous and respectful police treatment. If your rights are violated, don't try to deal with the situation at the scene. You can discuss the matter with an attorney afterwards, or file a complaint with the Internal Affairs or Civilian Complaint Board. Produced by the American Civil Liberties Union. www.aclu.org KEEP THIS CARD HANDY! IF YOU HAVE A POLICE ENCOUNTER, YOU CAN PROTECT YOURSELF. ************************************************************************** 9)From: "karl kiefert" Subject: Re: LAPTOP pwd Often the circuit or chip has built-in diodes which even if the contacts are shorted, the cmos still holds enough charge to keep it 'working' for a few hours, so leave the batteries (motherboard and rechargeable one) disconnected overnight . I haven't worked on this DELL, but the 4100Le have a jumpers on the motherboard marked epwd & CRDBIOS. If you have only the cmos security passworded, so that the system boots then a bios prog can be used but mostlikely it is the full shooting match and it won't even boot of floppy. Alternatively.. Go into a store/business/dell and write down the serial no of a similar laptop and then give dell a call. Make sure you know the name & address of the company who has the valid serial no. ******************* Does any one know how to find a valid code for a coded car radio? The only one I have heard of was to put it in the freezer for a few days. ************************************************************************** 10)From: Ben Norman Subject: Re: Ancient Safe (Thermite) I do not recall the ratios offhand, either, but I belive it is a combination of aluminum OR magnesium powder with finely powdered iron oxide (rust). The metal is oxidized by the rust in a VERY exothermic reaction. And yes, it is very hard to start. Aluminum powder can be found (with a little effort) at a painting supply store. It can also be recovered from aluminum roofing compound (very messy). Finely powdered iron oxide (red) can be had from a masonry supply center. The ratio will depend on the type of iron oxide used, I believe. One is Fe203, and one is Fe0, if I recall. Ben (ok, so I like fire) Norman > If you aren't interested in keeping the safe something you may try is thermite. > I am not sure it would work nor am I sure of the exact contents but a slightly > primitive version can be made using one part aluminium powder and one part > magnesium powder. ... > Dumbangel ************************************************************************** 11)From: nickh@webexpert.net (Nicholas Hreno) Subject: Re: Contest SpyKing you won... i spent 4 hours straight on your page i have no clue you win i lose.....all i have to say is what a headache i got at looking at all those numbers and letters. +++Moderator's Note+++ Here's some clues... the phrase contains 95 words... the PGP type block might not be PGP... sometimes the answer is looking right at you... Try your skill at: http://www.thecodex.com/cypher.html and win a FREE MicroChip Video Pinhole camera if you find and decode the secret phrase ;-) ************************************************************************** 12)From: Michael Jenkins Subject: PGP Question Dear list members, I need to know how to encrypt picture files, bmp, jpg etc.. using PGP and then emailing them to other collegues. Im using PowerPGP windows 95 shell, to now I have been using the PGP File manager to encrypt the file, then copy it to the notepad the cut and paste it to Eudora. Is that the only way or is there a better way ?? Thanking you in advance, J Erlandson ************************************************************************** 13)From: artman@theonramp.net (steven harless) Subject: I gotta problem.... for some reason(s) I cannot upload when sending jpegs to other people???? wonder why.....by the way that was a wonderful article on lockpicking.....best regards, artman ************************************************************************** 14)From: BADCOFFEE@aol.com Subject: Seeking to establish relationship Are there any professionals in the security business located in New Jersey that would like to sit down and talk to me??? Seeking to establish relationship with professional, lisenced and established firm in relation to "true" security surveys. Take me along fellas. :-) At worst....I am a complete waist of your time. At best??? PS- NOT looking for a position with any firms. When it turns into a job, I get bored. Look through my eyes and smile, augie ************************************************************************** 15)From: Jerry Subject: It's absolutely wonderful Bad coffee I think it's absolutely wonderful that you have all this patience and love to dispell on a lock.then again once in a while inanimate objects were meant to be on this earth for nothing more than a stress relief.The more time and patience you spend being challenged by this object will make you grow as a person. BULL PUCKY take a cold chisel to the back of this bitch and end the discussion. The hard work invovled will be your stress relief. Jerry ;-) ************************************************************************** 16)From: Michael Jenkins Subject: Re: List Convention Count me in. Ill travel to Vegas for a List Convention any time. Actually Ill travel to Vegas any time but if a convention was there, even better. For the gentlemen with the antique safe, bring it with you, I'll open it for you then. trust me, the Saint has nothing on us !! Regards Johan Erlandsson ************************************************************************** 17)From: Martin Pask <100142.3101@CompuServe.COM> Subject: Modify a normal cam corder? I dont know the particular cam corder you are talking about, but as far as I know most cam corders are able to be used to record from an external source but in the UK this facility is removed prior to import due to tax reasons. I have a good contact who assures me that it is only a matter of turning the system back on via a switch inside the machine and then feeding your external camera into the old video out socket. A switch could be externally mounted so that you have the facility of either using the camera standard or the covert external camera. Regards M.P.I. ************************************************************************** 18)From: Jim Motes Subject: Re: Antivirus Protectors Klint, You can go to McAfee's site and download their viruscan program or do a search on Fprot and get it from the web as well. I prefer McAfee's. There are others, such as Dr. Solomons (my favorite) but I don't believe it's a free download. Jim ************************************************************************** 19)From: Jerry Subject: Re: Bypassing Laptop Password Please help me as I do not understand all the confussion with bypassing the password on a laptop computer. The computer in question has changed hands several times so the necessary info has been lost. What the hell is this? Call Dell, the only way they won't be helpful is if you dont give them the serial number. If you are not willing to give them a legitimate serial number and a legal address then it's not your computer.If it's not their computer don't help them break into it. This is the internet don't promote unacceptable behavior.Do we have to start screening procedures. Man think liability/responsibility. I know this won't endear me to a lot of people but hey we have to watch out for ourselves ************************************************************************** 20)From: Trace Carpenter Subject: Delayed Responsed from Trace Carpenter My apologies to the MANY people who have tried to contact me by phone and e-mail. We have recently moved our offices to a new location above the historic Stonleigh P in Dallas and what a job it has been. Southwestern Bell had some major problems getting the lines up due to some old trunks not being properly dc'd. To add to the problem, I had several FX lines coming in. Anyway, as of yesterday we have communications and I'm starting the endless task of responding to e-mail. Many of you have submitted tech questions and I'll try to get to those first but please be patient. Feel free to call if you need to. -- Sincerely, Trace Carpenter Trace Carpenter Investigations Professional Private Investigations 2926 Maple Ave., Ste. 200 Suspicions Confirmed Dallas, Texas 75201 Problems Solved ! 214.828.4520 Free Consultations 214.740.0112 Facsimile ************************************************************************** Who are you? What's your specialty and/or interest? Let us know about your company... What would you like to see on the list? Post it. Let us know... Do you have something to contribute? We'd like to hear it... We want to know EVERYTHING and ANYTHING about eavesdropping, surveillance, countersurveillance & privacy related technology, etc... Remember: who, what, where, when, how & why... we want ALL the details... Do you have a question? Post it... A little free time? Help a member... With the INCREDIBLE brain power on this list, someone should have the answer ;-) P.S. Don't be a LURKER... Members take the time to post info for us all... give something back... Don't just take... Your input/knowledge is valued... ************************************************************************** Send Postings to: spyking@con2.com with "Post" in subject field with subject ************************************************************************** Subscribe to: spyking@con2.com In the subject field type: subscribe-surveillance list e-mail address ************************************************************************** Unsubscribe to: spyking@con2.com In the subject field type: unsubscribe-surveillance list e-mail address ************************************************************************** ...The Simple Rules of the Surveillance List... The Surveillance List Owners may Reject any posts that are/contain: 1) Info Unrelated to Eavesdropping, Surveillance or Privacy technology... 2) Flames or Negative posts... 3) E-Signatures that are considered excessive... 4) Advertisements not DIRECTLY related to the list topics... 5) Attached Files... 6) Oversized Posts... (May be edited to save room) **************************************************************************** This publication is copyrighted and is protected by U.S. and International copyright law. The information transmitted on this list may not be reproduced, reposted or forwarded to any non-list member without expressed written permission of the List Owner. Violation of U.S. copyright law is a criminal and civil offense... **************************************************************************** The Surveillance List is moderated by SpyKing@thecodex.com The List Owner will make EVERY effort to protect subscribers from spam... Copyright 1996, 1997 Codex Publishing Inc., All Rights Reserved... **************************************************************************** Vol 2 Issue # 106 ****************************************************************************** Vol.Two Issue #106 The Surveillance List May 10,1997 Over 1900+ Members Worldwide Representing 42 different countries ****************************************************************************** IN THIS ISSUE... ****************************************************************************** 01) Laptop password 02) Re: Sources E-Journal 03) Re: BULL PUCKY 04) Re: Bypassing Laptop Password 05) Installing that vehicle tracking system 06) Re: Laptops 07) Someone posted a list 08) Re: Antique Safes 09) Civil Restitution Laws 10) Special alert for MONEY TRANSFER SERVICES 11) Cordless security ****************************************************************************** DON'T BE A LURKER.... GET INVOLVED... YOU ARE A MEMBER... MAKE THE MOST OF IT ****************************************************************************** 1)From: "KcW" Subject: Laptop password Subject: Re: Accessing a laptop > The Machine: 1994 Dell Latitude XP 475c > The Problem: Power on password recently enabled (so easy a child could > do it!) password unknown. > re: shorting out battery pins As Cracked mentioned, the CMOS contains a certain amount of charge that is held in absence of a battery. If you intend to short the battery connection pins, always short through a resistor, say 1K, to avoid problems. Also, I seem to remember a program, well, actually a snippet of virus code, that hides in the CMOS and could most likely be used to read the CMOS were an alternate boot possible. KcW ************************************************************************** 2)From: Jim Ray Subject: Re: Sources E-Journal >---NARCO-TERRORISM: THE EXECUTION: During the Cold War, the KGB turned the >political use of drugs to destabilize its enemies into an art form. Today, >terrorists schooled by the KGB in using drugs to finance terror have joined >with criminal cartels to become the world's biggest security threat. I hope this doesn't mean you believe the CIA (etc.) don't do it too, but on the off chance you do, there is some nice land 'round these parts for sale, cheap... JMR Regards, Jim Ray D.A.R.E. To keep shoveling money into a failed program. http://www.shopmiami.com/prs/jimray/ PGP id.A7D63DA9 98 1F 39 BA 93 86 B4 F5 57 52 64 0E DA BA 2C 71 +++Moderator's Note+++ Uh, yup! and I believe that we are alone in the universe... and that someday someone is gonna walk up to me in the street and give me a large bag of money because I'm a nice guy... and that list lurkers don't post because they believe it will cause hair to grow in the palms of their hands... How much is that land? ;-) ************************************************************************** 3)From: BADCOFFEE@aol.com Subject: Re: BULL PUCKY >>>>>>> Jerry, last surv. Post stated.....---> >>more time and patience you spend being challenged by this object will >>make you grow as a person. BULL PUCKY take a cold chisel to the back of >>this bitch and end the discussion. The hard work invovled will be your >>stress relief. Jerry ;-) LOL, come on Jerry! ALL my practice locks cringed when they read that. :-) In fact, they all stoped talking to me. Thermite? Dynamite? Cold chisils?? Atomic ball lightning? LOL, NOW...none of my locks are even talking to me let alone opening for me. They mad at me for reading even that much. Your pennance: Send a donation to A.L.O.A. (don't confuse this with the other ALOA :-) OH- had to make this post somwhat usefull: TIP OF THE DAY- Older MASTER Combo locks--------> One good wack on the body of this thing in a downward blow with a RUBBER mallot WILL absolutely pop this lock and leave it unharmed. (see, unharmed is the key) :-) :-) Brought to you by...the weakest link in the chain.... Augie ************************************************************************** 4)From: Mutter Subject: Re: Bypassing Laptop Password > From: Jerry > Subject: Re: Bypassing Laptop Password > > Please help me as I do not understand all the confussion with bypassing > the password on a laptop computer. The computer in question has changed > hands several times so the necessary info has been lost. > > What the hell is this? > Call Dell, the only way they won't be helpful is if you > dont give them the serial number. If you are not willing > to give them a legitimate serial number and a legal address > then it's not your computer.If it's not their computer don't > help them break into it. This is the internet don't promote > unacceptable behavior.Do we have to start screening procedures. > Man think liability/responsibility. I know this won't endear me > to a lot of people but hey we have to watch out for ourselves Now, I'm not really sure what point you are trying to make as you've seem to have forgotten some key punctuatuion. But, my guess is that you're saying that if this guy for some reason doesn't have/want to give out his serial number and address to any idiot who answers tech support we should all leave him in the cold. Gee, I wonder what this list would be like if we were all such information elitists... BTW, this _IS_ the internet, a place where information should flow freely, not restricted by your standards of "unacceptable behaivor." If I misunderstood what you were saying, please excuse me. - M u t t e r Ed. root zine (http://www.openix.com/~mutter) mutter@openix.com ************************************************************************** 5)From: BADCOFFEE@aol.com Subject: Installing that vehicle tracking system Private investigators only please....every else close your eyes...... Damm! You cant even get close to installing that vehicle tracking system on your suspects car because every time you get within 10 feet of it you hear some itiot computer voice yell! *******STOP!!!!! YOU ARE TOO CLOSE TO THE VEHICLE************ Whoa! READY FOR THIS! I have invented an invisible lotion that I spread all over my body that actully "makes me completely invisible" Because it causes large WARTS that grow hair after the 3rd day....... I don't use it often.... But i do have 4 tennis balls and I love to ride in my car.......... Professionals, a tennis ball driveby "throwing" will disable most vehicle alarms within 2 throws. I have special balls? Well yes.....but my tennis balls are nothing special. By the "suspects" 2nd time out to turn his alarm off........I'll bet you he'll just turn it off for you. Whats the other 2 balls for?? Bad aim :-) If this happenes to you, don't be so quick to turn off your system. It worked fine just last night. Badcoffee ************************************************************************** 6)From: "karl kiefert" Subject: Re: Laptops Hi Jerry Having dealt with Dell at least once a week, I have found the following: 1) You have to quote the s/n to them twice. Sometimes the owners details twice too. 2) Dell check upon serial number, owner and what type of pc you have. The first two must both be what they have down on their database. 3) The system must still be under warranty. If the system has been sold, one person left and the pc is passed on, company become bankrupt, someones 18 month old baby got hold of it (no, I did not make this one up!) or out of the standard one year warranty, then the above are valid. I hope this chap is not breaking the law. I hope all the people who have made thermite and delved into locks have appropriate licences (if required) as this would be 'unaceptable' behaviour? Perhaps all of us here that have done nothing illegal, not like those whom have downloaded a s/w patch, built unaproved transmitter, broke the speed limit on the way to work this morning, trashed dustbins (does not the junk we throw away belong to the city), tapping phones - not even our own! and those chemical compounds too ... Basically what I'm trying to say is that all the 'good' people should get together and use that age old, time-tried, tested and traditional technique for determining if one is innocent or guilty. By binding the offending persons feet together and their hands behind their back, the person is then thrown into a lake. If he drowns he is innocent and if he survives he is guilty and should be punnished. ;>) Want to re-record the message on an answer phone and stuck what to say? Some of those sex phone type numbers have a "Mr Grumpy" . PS. Pls Mr Spyking next time you give a list out of how many countries receive your good list would you also add the number or percentage of persons there who receive it. ************************************************************************** 7)From: steague@iquest.com (Steve Teague) Subject: Someone posted a list Hello All, A few months ago someone posted a list of information brokers and private investigators across the country. Would that wonderful person please post the list again. Also, I need price and turn-around time for finding a person's place of employment. Can someone help me out here?! I have lost the help of my usual broker and need another. Big Thanks DDA ************************************************************************** 8)From: "Craig H. Rowland" Subject: Re: Antique Safes We need to separate the wheat from the chaff here on the subject of Thermite and opening safes. This is a ridiculous idea for several reasons: 1) Thermite is extremely hot and will almost certainly destroy all the contents in the safe that one is trying to obtain. 2) Because of the intense heat generated by thermite you may (depending on the size and condition of the safe) cause it rupture injuring people nearby as the internal pressure builds. 3) The intense heat generated by the thermite may cause certain metals and materials that the safe is composed of to begin oxidizing *themselves* to create a totally uncontrollable reaction. 4) It's just stupid as there are better ways of doing this. I did not read the original post that brought up the subject (some person wanted a safe open I suppose), but I can only recommend the following: a) Find someone who knows lock manipulation and open the safe. If the safe is old then this is possible. Newer safes equipped with a "Group I" manipulation proof lock will not allow this to happen. b) Find someone who can professionally drill the safe and disable the locking mechanism using the correct tools. If you don't want to do the above then you can go crazy and try these: c) Grab a circular saw with an abrasive blade (several) and cut a hole in the thing from the rear (no, I'm not kidding, I've seen this before and it's scary). d) Use an acetylene torch to cut the safe open (I wish you luck and lots of tanks of gas..) e) Use a crowbar and "peel" the safe open starting at the door corners (this I've only seen work on very old safes). f) Use a cold steel chisel in an air tool to attack the walls and corners. Several things you should know about safes that TV doesn't teach you: (Good) safes are made not to open except via a correct combination. This means they incorporate a wide range of defense mechanisms in the form of re-lockers (devices which automatically activate and lock the bolts if tampering is detected), hard plate (a very hard tempered steel insert located at strategic points to resist drilling), ball bearings (usually sandwiched between hardplate such that a drill bit, upon hitting the bearings, will become jammed and will break in the hole [nasty]), multiple layers of varied materials to resist impact tools (Steel), heat (copper), drills (hard plate, concrete, ball bearings, tear gass [no I'm not kidding]), and manipulation (good locks). Re-lockers take a variety of forms, but are generally activated in one of many ways: - Excessive impact. - Excessive heat. - Attacks on the locking mechanism (punching the lock, drilling) - Attacks on the handle. - Thoughtlessly slamming the door shut on a safe (very common) before locking it. - Thinking evil thoughts when you are nearby. Once a re-locker activates even the correct combination will not open the door! If you set off a re-locker on a safe you should really call someone who knows what they are doing to open it. Sometimes to open a safe you have to set off all the relockers and manually release them one at a time by drilling in strategic locations. In a nutshell, you should really just hire a good locksmith to open the safe for you. I'd expect to pay a good sum to have it done if you want to preserve the safe as well as the contents. If you are gung-ho on throwing some thermite at this project (unwise) ..then might I suggest the ultimate safe cracking tool: The Thermal Lance. This device is basically a length of iron pipe stuffed with a thermite-like substance with an oxygen feed attached to the end. It will vaporize 18 inches of concrete in less than 10 seconds. I wouldn't stand near it once it starts burning. This is the only device that Underwriters Laboratories doesn't test safes against because it is always assumed that it will work. That's my advice.....now let's get back to reality.. -- Craig ************************************************************************** 9)From: Willie Teasley Subject: Civil Restitution Laws Okay, I confess to watching trash tv (at 2am, I can plead "lack of input"). Inside Edition just did an "expose' on the tactics of retailers (tho claiming "many", only Eckerd Drug and Disney Corp were identified) under the "Civil Restitution Demand" laws available in 49 states. In the report, these identified companies used this law to convince people to "pay $200.00 or go to jail for shoplifting" ... product valued under $2.00). Also listed was a letter to an Eckerd Regional Office congratulating that district for bringing in more than $900,000.00 "civil restitution fees". It occurs to me that even the most basic list member could have utilized this method, that at only 10% "finder fee" this could be lucrative ... so i ask for input before I try the same thing in Oklahoma City. Teasley p.s. Even if not used, I would like conversations, thoughts, and pinions. ************************************************************************** 10)From: BADCOFFEE@aol.com Subject: Special alert for MONEY TRANSFER SERVICES Forgive me for not using complete sentences, read between the lines. Saving time here... Im sure this is an OLD gig but it is still verry effective. TRUE STORY, Date 5-2-97 My friend Linda working at Supermarket courtesy counter. Handles Western Union wire transfers among other things... this particular date........ (few days ago) Female called acted as Western Union rep.... Wanted to know if Linda received new computer disk for system upgrade. Linda said no. Con-woman: "You should have gotten it by now, but let me FAX you the code numbers, you enter them and the system will upgrade". Linda: Fax is down (sends FIRST call to management..ignored) Conwoman: Thats ok, well do it over the phone Linda: Ok, shoot (second call to management...ignored) Linda's not suspicious, she just never did this before and wanted management to assist her. Linda enters sequence of numbers which sets off a series of $$ wire transfers to several locations in several states. Linda: No idea how to stop this, the shit's just sending money all over the place. YELL for manager! Manager: SHUT DOWN system NET: Over $30,000 in 4 minutes Lessons: Linda should have never been allowed to even look at the Western Union Machine without TRAINING in fraud protection. AFTER TRAINING: Store manager or store security should be the ONLY people to have access and INPUT any information that is NOT EXACTLY step by step handling fund procedure. If you are a manager or security personele to any locations that handle wire transfers.....YOU might be a ball of wisdom. Are your employees? My vote: Security and management in that location should consider dish washing positions. ANYTIME something leaves your store that is unauthorized/not paid for...it is ABSOLUTELY the responsability of Security. That's what they do..."secure" things. This wouln't have happened on my time. (ps-I am a carpenter, not security) I'll be happy to contact store security and have em join the list....they need it badly. Always on my toes, Augie ************************************************************************** 11)From: "larry g. clapp" Subject: Cordless security How secure is my 900 mhz digital (not spread sprectrum) cordless phone? Are there now digital receivers or digital scanners now available that would all allow someone to monitor my private phone conversations? Your expertise appreciated. Thank you! ************************************************************************** Who are you? What's your specialty and/or interest? Let us know about your company... What would you like to see on the list? Post it. Let us know... Do you have something to contribute? We'd like to hear it... We want to know EVERYTHING and ANYTHING about eavesdropping, surveillance, countersurveillance & privacy related technology, etc... Remember: who, what, where, when, how & why... we want ALL the details... Do you have a question? Post it... A little free time? Help a member... With the INCREDIBLE brain power on this list, someone should have the answer ;-) P.S. Don't be a LURKER... Members take the time to post info for us all... give something back... Don't just take... Your input/knowledge is valued... ************************************************************************** Send Postings to: spyking@con2.com with "Post" in subject field with subject ************************************************************************** Subscribe to: spyking@con2.com In the subject field type: subscribe-surveillance list e-mail address ************************************************************************** Unsubscribe to: spyking@con2.com In the subject field type: unsubscribe-surveillance list e-mail address ************************************************************************** ...The Simple Rules of the Surveillance List... The Surveillance List Owners may Reject any posts that are/contain: 1) Info Unrelated to Eavesdropping, Surveillance or Privacy technology... 2) Flames or Negative posts... 3) E-Signatures that are considered excessive... 4) Advertisements not DIRECTLY related to the list topics... 5) Attached Files... 6) Oversized Posts... (May be edited to save room) **************************************************************************** This publication is copyrighted and is protected by U.S. and International copyright law. The information transmitted on this list may not be reproduced, reposted or forwarded to any non-list member without expressed written permission of the List Owner. Violation of U.S. copyright law is a criminal and civil offense... **************************************************************************** The Surveillance List is moderated by SpyKing@thecodex.com The List Owner will make EVERY effort to protect subscribers from spam... Copyright 1996, 1997 Codex Publishing Inc., All Rights Reserved... **************************************************************************** Vol 2 Issue # 107 ****************************************************************************** Vol.Two Issue #107 The Surveillance List May 12,1997 Over 1900+ Members Worldwide Representing 42 different countries ****************************************************************************** IN THIS ISSUE... ****************************************************************************** 01) Under $50? 02) Re: Lurkers? 03) From their website 04) Lurking, Delurking, and the Group Mind 05) Spectre Press 06) Re: Cordless Security 07) Found a new Lockpicking Web Page 08) The best search engines? 09) Micro Electronics Inc. 10) Re: PGP Question 11) Other PIs out there? 12) How to trace? 13) BarCode? 14) Re: Cordless security 15) Re: Cordless phone security 16) Is someone out there confused? 17) What is BONDING? 18) I NEED an explanation... 19) Trade schematics on-line! 20) Fraud and Scam Site ****************************************************************************** DON'T BE A LURKER.... GET INVOLVED... YOU ARE A MEMBER... MAKE THE MOST OF IT ****************************************************************************** 1)From: crcteg@juno.com (Craig R Caskey) Subject: Under $50? I was wondering. Is there any surveillance equipment such as small cameras or listening devices priced under $50? If so, where could I find them? Thanks, Crcteg ************************************************************************** 2)From: Duece6x6@aol.com Subject: Re: Lurkers? I have a 4 letter word for lurkers. Most are all talk--no go---no show. I had only 1 response to the convention idea. Maybe a meeting for the first gathering? I had no responses to the building entry teams, again people with big heads, big ideas, big mouths. THE DUECE ************************************************************************** 3)From: Jim Ray Subject: From their website [And paid for by your taxe$.] Does the Central Intelligence Agency engage in drug trafficking? No. To the contrary, the Central Intelligence Agency assists the U.S. Government effort to thwart drug trafficking by providing intelligence information to the Department of Commerce, the Drug Enforcement Administration, and the State Department. ++++ Sure, this is believable...Riiiight... [Obviously, that day they were consuming some good product.] JMR -- Regards, Jim Ray D.A.R.E. To keep shoveling money into a failed program. http://www.shopmiami.com/prs/jimray/ PGP id.A7D63DA9 98 1F 39 BA 93 86 B4 F5 57 52 64 0E DA BA 2C 71 ************************************************************************** 4)From: Jenn Saint-John Subject: Lurking, Delurking, and the Group Mind Come on, guys, don't hammer on us lurkers so hard. I post when I've got something to say. My specialty is human intelligence, and, at the moment, we seem to be primarily discussing electronic intel and safecracking (all of which I'm thoroughly enjoying, btw -- on a couple of occasions I've wished that the information was presented in a bit more basic terms, but I've saved the posts and should I require the info, will buy some books for the appropriate background). When you guys get around to asking questions about the human aspects of running ops, then you'll get to pick my brain. I do have a couple basic questions about lockpicking, though. From previous posts I've read, I'm afraid these may be reruns, but since I only recently joined the list, cut me some slack, ok? Paladin Press does have quite a selection of texts on locks and lockpicking. While some of their stuff is hit and miss, I've had pretty good luck with them. (A side note: Their book HIT MAN is so basic that if you need that info and the author's "advice", then you really shouldn't go into the business.) If worst comes to worst, I'll take my chances there. But it'd be nice if someone can recommend a title or two...for beginners, please. I haven't picked a lock in, oh, 17 years. The next question involves tools. I've found lots of people who are willing to sell me a set. Problem is that I know none of these stores, and have no idea what a good set of tools should include, of what they should be made, yatta yatta yatta. That information would be awfully helpful to have. I've always believed in buying quality, and I have the utmost dislike of being ripped off. If someone can suggest a retailer, that'd be handy as well. Thanks for your help! ************************************************************************** 5)From: Machine928@aol.com Subject: Spectre Press Im curious if anyone in the group has ever bought a book from a company called Spectre press. They sell books on atm fraud, along with hacker and phreaker how to books. If you could tell me and the group whether these guys are a source of good info, then I think the site they have on the internet could be used by alot of us who are interested in that sort of thing. Thier order phone listing is 1-616-766-5076 Internet site http:\\www.spectre-press.com ************************************************************************** 6)From: Mutter Subject: Re: Cordless Security > From: "larry g. clapp" > Subject: Cordless security > > How secure is my 900 mhz digital (not spread sprectrum) cordless phone? > Are there now digital receivers or digital scanners now available that > would all allow someone to monitor my private phone conversations? Your > expertise appreciated. Thank you! Fairly secure from casual monitoring. But I've heard of devices which can successfully decode certain digital cordless phones. It's true that spread spectrum adds yet another level of security to cordless phones, but the problem is that such a feature usually adds quite a bit to the price tag of the phone. The thing is, if you're that concerned about what you are saying why not just use a land-line? - M u t t e r Ed. root zine (http://www.openix.com/~mutter) mutter@openix.com ************************************************************************** 7)From: BADCOFFEE@aol.com Subject: Found a new Lockpicking Web Page http://www.cs.swarthmore.edu/~weiler/locks/impressioning.html Enjoy ************************************************************************** 8)From: Spysociety@aol.com Subject: The best search engines? Where are all the best search engines to post surveillance equipment web sites? Do they all charge a fee? http://members.ao l.com/spysociety/covert/home.htm ************************************************************************** 9)From: "douglas b. hewitt" Subject: Micro Electronics Inc. Thanks for sharing the 'Spy Shop Bust' information. Why wasn't Ben Jamiel of CCS busted? Something very political going on there. It's about time Phil Rosen, government informer himself got busted. As for Ken Taguchi of Micro Electronics, How could he be so stupid to travel to the United States, after the DBH Communications bust? ************************************************************************** 10)From: WindWalker Subject: Re: PGP Question If you're using Eudora, just encrypt the files as you normally would and attach the encrypted file to the email. Don't bother with all of that cutting and pasting. If you're using email as your method of transfer, use as high an encryption level as possible. (4096-bit for PGP v2.6.2g) -WindWalker > need to know how to encrypt picture files, bmp, jpg etc.. using PGP and > then emailing them to other collegues. > > Im using PowerPGP windows 95 shell, to now I have been using the PGP File > manager to encrypt the file, then copy it to the notepad the cut and paste > it to Eudora. Is that the only way or is there a better way ?? ************************************************************************** 11)From: RetSheriff@aol.com Subject: Other PIs out there? I am a Private investigator. I would like to say lurking on this list is real fun. The surveillance list is unique and deals with diverse and interesting topics. I am always amused. I look foward to reading it each day. And there is no back-biting. Until reciently I was a silent member of another list. The PI List, owned and moderated by Joseph Senior. This list was a good pipeline to other PIs. Until reciently I lurked there unencumbered until I was accidently bumped off the list. After 4 weeks of attempting to sign back on I recieved an e-mail from the moderator Mr. Senior, asking what my screen name meant. He wrote that he was trying to clean up his list. (I posted one time in one year, ok maybe twice). My explanation wasn't good enough apparently because I am not allowed back on his list. Go-Figure. SpyKing, are there many PIs on this list? Can we network with them here? If I need a PI somewhere out of my area can I find one here? Sorry this ran soooo long. Jim Marino J. MARINO ASSOCIATES Private Investigators 203 MAIN STREET SUITE 245 FLEMINGTON, NJ 08822 Call toll free (800) 600-9551, or e-mail RetSheriff@aol.com P.S. It means retired sheriff +++Moderator's Note+++ There are a few hundred PI's on this list. The list makeup (1900+ strong) is quit eclectic with a wealth of diverse backgrounds worldwide. I am confident that just about any list topic could be answered in-depth by one or more list members... We've got a lot of good minds... and the list grows each day... the word is speading that THIS is the place to get the correct answer without a lot of chest thumping... ************************************************************************** 12)From: "101311 239195" Subject: How to trace? Hello I'v been having some troubles with my web security and was wondering how to trace hox E-mail from freaks. I have tried the normal trix but I need something better. I mostly encounter 1 time pranks and would like to be able to tell who I am dealling with. Please send information to b10131122@hotmail.com ************************************************************************** 13)From: jaross@notes.primeco.com Subject: BarCode? Recently I was told of a website where you could type in a number and it would print it up in the form of a BarCode(UPC CODE) This sounds fun Does anyone have this address. Thanks in advanced James jaross@primeco.com ************************************************************************** 14)From: "Anastasios D. Panos" Subject: Re: Cordless security >How secure is my 900 mhz digital (not spread sprectrum) cordless phone? >Are there now digital receivers or digital scanners now available that >would all allow someone to monitor my private phone conversations? Your >expertise appreciated. Thank you! >************************************************************************** Well there were a number of articles on the subject and I can tell you that the only "secure" digital is the GSM type , other digital were decoded and software is available in Internet !! There are not any GSM monitors/decoders available to the public but goverment only. Anastasios D. Panos P.S. I would love to put my hands on such a device !! ============================================================ Panos & Associates, P. O. Box 19063, Athens 117 10, Greece (est.1973) Ph. : +30-1-923.7420, Fax : +30-1-923.2787 Contact : Anastasios D. Panos Members of :ABI, Intelnet, WAD, CII, ASIS, NAIS, PAPD E-mail : panosagcy@hol.gr URL: http://www.uklegal.com/panos/ ============================================================ ************************************************************************** 15)From: CChrist373@aol.com Subject: Re: Cordless phone security The government can overhear a digital conversation but your neighborhood scanner buff can't. The gov' probably isn't listening unless you use key words to trigger their system. Don't start talking about the President and bad accidents . Sometimes people are too paranoid. Yes, I know how easy it is to invade someones privacy. But is someone really taking the time and effort to check ou out? If you want to discuss very sensitive matters over the phone, DON'T. Use no phone of any kind. Then you don't have to sweat it. MC ************************************************************************** 16)From: datacat@ptialaska.net Subject: Is someone out there confused? I have a friend that "suggested" that this telephone # 619-222-0003, once called will scan your phone line for taps. Answers to the tap question go as follows: Busy Signal = Local Tap; Ringing = Federal Tap; Siren (or high freq pitch) = OK. So, I have tried it on many different phones (including some pay phones) and everyone so far has come up busy. My friend says he has heard the siren on other occasions. This number thing is what led me to your organization. I have been doing Internet searches for references on this number. The closest I have been to an exact match as been in an article by Jolly Roger in a Usenet news group. He was speaking about Telephone Co. Line Detection and gave a number that is 619-748-0002. In the same article, mention was made of another # (415-BUG-1111) that will perform a "sweep tone test" to find taps. If the proper tone is sent and there is a bug on the line, besides the tones you will here a "click". So, the question is: Is any of this real? Can this be done or is someone out there confused? Thanx so much for helping me. ************************************************************************** 17)From: BADCOFFEE@aol.com Subject: What is BONDING? I have had a few people answer this already for me....and i still don't get it....... Question: What is BONDING, how does one become BONDED, Cost? where? Time period? Like purchasing insurance? Is there a dollar amount? Any organizations that offer bonding as part of membership in Security field? Lots of questions....I think your answers would help a LOT of people...including the general public. Augie ************************************************************************** 18)From: BADCOFFEE@aol.com Subject: I NEED an explanation... Ok, please bear with me. this has NOTHING to do with this forum. However, it "might" just have something to do with "frequencies" or something sonic of some nature. You, out there are masters at this and could possible put this incident to rest for me with an explation........ (Please.....I a NOT a nut, no drink, no drugs, no medication and always stress free) I was witness to a glass exploding on its own. It did not shatter like saftey glass. Force from one direction send glass flying 2-3 feet in one direction. Glass filled with 7-UP, 3/4 full. Regular soda glass, with handle. Not thin glass. Quick background: The house had shown signs on paranormal activity. <---understatement) Positive sightings by 3-5 different adults over 20 years. Ok, remember guys...not dumb questions right......here it is..... Could "possibly" a military type aircraft send out transmition/frequency/sonar something that "this" glass filled with 7-UP at just the right amount..... picked up ....that could possibly make this glass occurance/incident possible? PS- This post is not a spoof. Hoping to re-gain your confidence one day after this post, :-) Augie Badcoffee@aol.com ************************************************************************** 19)From: Tedd Subject: Trade schematics on-line! e-mail me a schematic of a working device (INFINITY TRANSMITTER,Bug, wire tap, bumper beeper, etc) and I will send you e-mail with schematics. these schematics are for reference only. ************************************************************************** 20)From: STS Subject: Fraud and Scam Site Here is an Internet Fraud and Scam Site the list may want to take a look at.. http://www.geocities.com/SiliconValley/Vista/9765 ************************************************************************** Who are you? What's your specialty and/or interest? Let us know about your company... What would you like to see on the list? Post it. Let us know... Do you have something to contribute? We'd like to hear it... We want to know EVERYTHING and ANYTHING about eavesdropping, surveillance, countersurveillance & privacy related technology, etc... Remember: who, what, where, when, how & why... we want ALL the details... Do you have a question? Post it... A little free time? Help a member... With the INCREDIBLE brain power on this list, someone should have the answer ;-) P.S. Don't be a LURKER... Members take the time to post info for us all... give something back... Don't just take... Your input/knowledge is valued... ************************************************************************** Send Postings to: spyking@con2.com with "Post" in subject field with subject ************************************************************************** Subscribe to: spyking@con2.com In the subject field type: subscribe-surveillance list e-mail address ************************************************************************** Unsubscribe to: spyking@con2.com In the subject field type: unsubscribe-surveillance list e-mail address ************************************************************************** ...The Simple Rules of the Surveillance List... The Surveillance List Owners may Reject any posts that are/contain: 1) Info Unrelated to Eavesdropping, Surveillance or Privacy technology... 2) Flames or Negative posts... 3) E-Signatures that are considered excessive... 4) Advertisements not DIRECTLY related to the list topics... 5) Attached Files... 6) Oversized Posts... (May be edited to save room) **************************************************************************** This publication is copyrighted and is protected by U.S. and International copyright law. The information transmitted on this list may not be reproduced, reposted or forwarded to any non-list member without expressed written permission of the List Owner. Violation of U.S. copyright law is a criminal and civil offense... **************************************************************************** The Surveillance List is moderated by SpyKing@thecodex.com The List Owner will make EVERY effort to protect subscribers from spam... Copyright 1996, 1997 Codex Publishing Inc., All Rights Reserved... **************************************************************************** Vol 2 Issue # 108 ****************************************************************************** Vol.Two Issue #108 The Surveillance List May 13,1997 Over 1900+ Members Worldwide Representing 42 different countries ****************************************************************************** IN THIS ISSUE... ****************************************************************************** 01) Re: Antique Safe Problem; Picking warded locks 02) Radio Show - YOU BE THE DETECTIVE! 03) Opening old safe 04) Which states are one party consent? 05) Re - Lurkers? 06) Re: Cracking an Answering Machine 07) Reciprocity? 08) Identification and SSN's 09) Re: What is BONDING? 10) Re: Is someone out there confused? 11) Re: Barcode web site 12) Re: Lurkers 13) Re: Spectre Press 14) Re: Cordless security 15) Re: Entry Teams 16) Intern Register. 17) Window tinting for fun(!)and profit 18) Re: Lockpickng books and tool purchase 19) Bonding and/or business Insurance 20) RE: Convention 21) WEB-SEARCH ENGINE? 22) Re: PGP 23) Re: GSM monitors/decoders 24) Re: PGP Question ****************************************************************************** DON'T BE A LURKER.... GET INVOLVED... YOU ARE A MEMBER... MAKE THE MOST OF IT ****************************************************************************** 1)From: "Roper Carl A." Subject: Re: Antique Safe Problem; Picking warded locks FOR lazlo...: I've got a variety of safe books I use for reference that refer to safes back into the 20's. If you can provide manufacturer, dimensions, wheels/no wheels, and any information printed on an exterior label, etc., I may well be able to help you. Realize that, just given the safe's age, and assuming it is in very good condition, you would want to save it for the future, I'll do what I can for you WARDED LOCKS: For ten bucks you can pick up a set of warded lock picks. Actually cheaper if you hit the right places. I have a couple sets, but went into an antique/second-hand shop in S. Georgia several years ago and came across several 5-gallon cans of old keys, etc. Going thru them I found several sets, though only bought one ... at fifty cents a pick. The store owner considered them just "old keys" and had no idea what they really were. On the other hand, you can make your own set in less than a couple hours. ************************************************************************** 2)From: JoeSleuth@aol.com Subject: Radio Show - YOU BE THE DETECTIVE! anyone on the list i need some good intelligent information to pass on to the public,via my radio show YOU BE THE DETECTIVE the show is all about the private sector (THATS WHAT MOST OF THE LIST HERE IS ALL ABOUT) you and /or your company will get credit for the info.,we talk about everything from homicide investigations to home security often time we have guest , such as authors and learning channel producers we are not network (YET) so i'll only reach a local audience 50 mile radius INTO PARTS OF PHILIDELPHIA PA. anything to contribute e.mail joesleuth@aol.com thanks for reading OH!!!! thank you spyking for your service joe alercia +++Moderator's Note+++ Joe, when are you on? What times, dates, frequency? ************************************************************************** 3)From: "Jon Harrison" Subject: Opening old safe That fellow who is considering thermite, a thermal lance, dynamite, or other Draconian methods to open an old safe with unknown contents should be informed that it is fairly common for people to store explosives or blasting caps in safes. If he uses drastic methods to open the safe he may very well get more than he is bargaining for. He'd be better off finding a locksmith who knows what he is doing. JPH ************************************************************************** 4)From: Rick Hofmann Subject: Which states are one party consent? At one time there was a list floating around which had information regarding which states are one party consent, which states are two party consent, etc., when it comes to monitoring telephone conversations. Does anyone still have that list, or know where I can find it? Thanks in advance for the assistance. Best regards, Rick Hofmann, CCO ______________________________________________________________________ MICROSEARCH - Electronic Surveillance Detection * Counter-espionage Business Espionage Controls and Countermeasures Association, Calif.Assn.of Licensed Investigators, American Society for Industrial Security +++Moderator's Note+++ Rick, you can find the info you require at: http://www.thecodex.com/consent.html There is a state by state breakdown and the federal law as well... We're also looking to list foreign (non-USA) laws, if list members can volunteer the info... we'll post it to the site... ************************************************************************** 5)From: "John " Subject: Re - Lurkers? First I would like to say Hi, to everyone. We have been lurking for about 4 weeks now and find some of your posts 'enlightening'. However, DEUCE some of you are obviously college kids who have read a few books but have no practical experience of 'Covert Operations'. That is probably why a lot of us are not going to turn up at some 'Convention' somewhere in the future. The COPEX exhibition is a prime example of a well run convention where you HAVE to have security clearance. Even these are too public for 'some' of us. Its one thing messing about on a more or less anonymous e-mail list, but people in our field of work do not tend to get together for 'drinks and a chat', especially with a lot of strangers. This is not meant to offend, but this is certainly the way we do things in the UK. Please visit our Website at: http://www.qpage.com/host/pba.shtml John (London UK) PS. Keep up the good work SPYKING (Lets open the topics up more) +++Moderator's Note+++ Thank you XSAS, Your point is well taken. As moderator I'm happy to entertain the idea of a "get together" or "convention" but experience tells me there would not be a great turn-out from the "pros" on the list... that's OK, I would expect it... Many list members ARE professionals in the field and a number of members have those .edu addresses (universities). ALL are welcome. We once were "novices" and we had to learn somewhere... the importance of a list like this is for networking and exchange of timely info... I would think that ALL can "be enlightened" once and a while... I know I am... Most of us have specialties and need answers from others on other topics from time to time... hopefully this list can continue to provide that resource...regarding "opening up the topics", pick one... we edit nothing except obvious non-list related spam... ************************************************************************** 6)From: Michael Stutz Subject: Re: Cracking an Answering Machine > > To crack an answering machine us a pocket speed dialer from radio shack. > > They have two models. Only one has a speed dial frequency. You plug in > > an 101 digit code in sequence. ( found in the book How To Get Anything > > On Anybody book 2 by Lee Lapin ) ah heck, heres the code. > > > > 011223344556677889913579024680369258147159370494838272616051739506284085 > > 529630074197531864209876543210 . plug this into the dialer using the three > > priority buttons plus another bank. as soon as you here the machine > > click on for the greeting...go. Long winded messages are best 'cause you > > have more time torun the numbers. Does anyone know the algorithm used to generate this code? I would like to come up with a basic algorithm to determine the least-possible number of digits to stream to a device that accepts (touch tone/numeric/whatever) codes as a password and ignores all other input -- for instance if you dial "12345" when a 3-digit-password answering machine is waiting for a password, and that password happens to be "234," the 1 and 5 digits will be ignored and the machine will be compromised. Exploiting this knowledge, I would think it fairly trivial to come up with an algorithm that would generate the proper code stream for a system that uses digits 0-9 as password info, passing the variable (n) to the algorithm, which is the number of digits in the password field. Anyone care to help/comment? ************************************************************************** 7)From: allamosa@roanoke.infi.net (happydog) Subject: Reciprocity? In about two months I intend to move from SW VA (Roanoke area) to Rock Hill, SC. I have a concealed handgun permit as well as a Private Investigator Certification, a Personal Protection Specialist Certification and PPS Handgun Certification from the Commonwealth of Virginia. Rock Hill, SC is about twenty miles from Charlotte, NC and I would like to know if these certifications and permit are transferrable or recognized by SC and NC. Any help on this query is appreciated. Happydog:) and don't forget to look at http://www.qpage.com/host/search.shtml Douglas Chandler Graham 3114 Carvins Cove Road Salem, VA 24153-3356 Phone (540)384-7360 Fax (540)384-7040 ************************************************************************** 8)From: ProvRhode@aol.com Subject: Identification and SSN's hi, How can one identify someone through their cell number and pager number only? Also someone who may want to cuase me harm had my social security number and other vital statistics about myself, such as license #, address, name and last name, mother maiden name. What malecious things can they due with this information.. Thanks ************************************************************************** 9)From: "William H. Geiger III" Subject: Re: What is BONDING? -----BEGIN PGP SIGNED MESSAGE----- >>Question: What is BONDING, how does one become BONDED, Cost? where? Time >>period? Like purchasing insurance? Is there a dollar amount? Any >>organizations that offer bonding as part of membership in Security field? >>Lots of questions....I think your answers would help a LOT of >>people...including the general public. Bonding is similar to being insured. Basically what the bonding company is saying when they bond you is that you are trustworthy and we will cover loss caused by you (theft,damage,loss, ..ect) up to the amount you are bonded for. Most people working in the security or banking fields will be bonded (if a bonded security guard robs the place he is guarding the bonding co. will cover the loss). I doubt that just by joining an orginization will get you bonded. It's done on an individule bases (for good reasons). You will have to go through some type of security check as part of the bonding process. Often if you are hired by a company that requires you to be bonded they will cover the cost of doing so. As far as the who, how, where and how much I can't help as I have never needed to be bonded for the work that I do (though I probably should have on a few jobs). Sorry I couldn't be of more help, - ----------------------------------------------------------- William H. Geiger III http://www.amaranth.com/~whgiii Geiger Consulting Cooking With Warp 4.0 Author of E-Secure - PGP Front End for MR/2 Ice PGP & MR/2 the only way for secure e-mail. Finger whgiii@amaranth.com for PGP Key and other info - ----------------------------------------------------------- Tag-O-Matic: If you want it done right, forget Microsoft. -----BEGIN PGP SIGNATURE----- Version: 2.6.2 Comment: Registered User E-Secure v1.1 ES000000 iQCVAwUBM3eB5o9Co1n+aLhhAQG3vwP6Aid1eJEkxZBDZUMpSGQ3Fij2cJKTh7BF bCZ34/h2UJ8xNvaLug/uAzgVQVIBmGfK+T2Xv37KY1RG6mGPzcLf8vRcEYHYUU0J 06qfcRy6qSMiOISRjPIogt28n9xvNpRntRAx4p2dj/CcpVgEm1Q96uhfRpRFJmu8 EF2rC4fZ7yg= =fXoK -----END PGP SIGNATURE----- ************************************************************************** 10)From: Sebalite Subject: Re: Is someone out there confused? That very same number 619-222-0003 appeared in the lastest issue of 2600 and from what they say it that is bogus. About tapping that is. All that number represents is a sweep tone test phone number for the local phone company. It doesn't tell you whether or not you are being tapped. It seems to me that this is some sort or high-tech urban legend among hackers and the like. Anyway I hope this helps. -=Sebalite=- ************************************************************************** 11)From: "M. J. Van Ham" Subject: Re: Barcode web site > Recently I was told of a website where you could type in a number and it > would print it up in the form of a BarCode(UPC CODE) This sounds fun > Does anyone have this address. I'm not familiar with any such web sites (that's not to say they don't exist, just that I haven't seen them). However, I have seen several Bar Code generator programs for Windows. They work the same way.. type in the number, it kicks out the UPC code. You should be able to find one such program on the 'net by doing a search for "bar code program" or something like that. If you can't find one, let me know, I think I have an archived copy of one around here somewhere. ************************************************************************** 12)From: strider@mail2.quiknet.com Subject: Re: Lurkers Well this is my first attempt to post to a mailing list so let's hope I do this right ;). I would like to say I lurk because I feel it would be impolite for me to comment on subjects I'm less knowledgeble than 90% of the people who read this list are. I am suprised you say lurkers are all talk, seeing as how lurking is hanging arround and not saying anything. I'm just absorbing info, if someone asked a question directly related to some thing I'm knowledgeable about I would be more than happy to help out. Anyway that's my two cents and attempted post to no longer fall under the "lurker" catagory ;). ************************************************************************** 13)From: Silicon Subject: Re: Spectre Press I've ordered a number of resource books from them in the past, and they were what they said they were...no hoaxes attached. Personally, as a resource for controversial and unique reading material, they were great. For even more information, a couple of other companies that also specialize in 'underground' related books are Loompanics Unlimited (http://www.loompanics.com/) and Paladin-Press (http://www.paladin-press.com/) Good luck... Regards, ST /oO-----------| beginshortsig |-----------Oo\ [ T H E I N F I N I T Y V O I D ] http://www.silitoad.org | silicon@netwalk.com \oO------------| endshortsig |------------Oo/ ************************************************************************** 14)From: Chris Kuethe 768 Subject: Re: Cordless security Anastasios D. Panos wrote: > Well there were a number of articles on the subject and I can tell you that > the only "secure" digital is the GSM type , other digital were decoded and > software is available in Internet !! > > There are not any GSM monitors/decoders available to the public but > goverment only. > P.S. I would love to put my hands on such a device !! i wouldn't even bet on the fact that GSM decoders aren't available to the public. i'm just guessing here, but i think this would be a workable system... i trust you all know about pgpfone, nautilus, and other 'secure' computer phones. browsing through the freely available source for nautilus, i found the source code for gsm compression and decompression. i should think that you could fire up your scanner, and suck the raw digital into a sufficiently powerful computer, pipe it through a gsm decoder and out your sound card. similar hacks are done with pager decoding (sniff & process) but i'm probably stretching things a bit, due to the sync requirements on the audio bitstream (watch out for getting shifted to another cell channel) and the audio data format once decompressed... well it'll give me something to think about this summer. :) PLUR chris Chris Kuethe LPGV Electronics and Controls 'finger -l ckuethe@gpu.srv.ualberta.ca' for pgp keys http://www.ualberta.ca/~ckuethe/ RSA in 2 lines of PERL lives at http://www.dcs.ex.ac.uk/~aba/rsa/ print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<> )]}\EsMsKsN0[lN*1lK[d2%Sa2/d0 Subject: Re: Entry Teams It's good to see BADCOFFEE taking such an interest in the use and deployment of specialist entry teams. The idea of using specialist teams is slowly catching on around the world in a civilian sense. As team leader of the only (now) civilian team in Australia and the southern Hemisphere(as far as I know), I can say that 90% of our clients who thought they had, modern airtight security, now understands that a security systems is only as good as the humans that design and install it, and lets face it anything human cannot be perfect. It's our job to covertly penetrate the building, without damaging anything, perform a predetermined task, then retreat from the premises without being detected. To date we have a 100% sucess rate. We have done buildings such as Bank of America, AWA Defence Industries, Kodak/Eastman Chemicals to name but a few. We work all over the world, and like BADCOFFEE is now experienceing, there are many people that think we are merely criminals and propose very illegal and dangerous assignments. As a specialist team we take on many assignments all over the world, even if the legal issues are not clear we are guided by our moral senses. We rescue people from cults, kidnappers, etc as well as provide valuable information to those who need it for moral and proper grounds. We can be contacted at lmntry@ozemail.com.au or phone +61 0418975567 -----BEGIN PGP PUBLIC KEY BLOCK----- Version: 2.6.3i mQCNAzNyepwAAAEEANA1xRS/rKa95fGLZzr92D59aSghub72JlHI1soSCdm+F29C XY+fggIyvjlzVyrv1+xMIUbkK29Yg1/j+bgta+DpzNeYFYrLbt3o14uLk+nJfuaY VPR/lkZbUJiIkq3w2CZuYAME/gCoD2V/ayPUNb82N4xJu7gBtoch/bYGJtldAAUR tCFUaGUgU2FpbnQgPGxtbnRyeUBvemVtYWlsLmNvbS5hdT6JAJUDBRAzcnqchyH9 tgYm2V0BAVQ+A/4rWcf9P1R6Ge2RYSFjEOLYKO6bslJ05KZbC+sAdmVSudMrexsX pfcZ/RCW6NRo6s2tjC+ubD1BESOO7KkZaSMBPFbX9sXAmkhK9upZScuXP3my+FTZ 6+JtOmEvFEf7Ll8VadrdS32RM4Q80SeUMO5l52nt0xwjB6jAPE65+FJxkA== =HDrT -----END PGP PUBLIC KEY BLOCK----- Regards J Erlandsson ************************************************************************** 16)From: William Roche Subject: Intern Register. A constant reminder to all 1900+ List Members to register FREE with Intern`s Register Database. You may also reffer this notice to as many of your collegues in the Investigative, Security, and Intelligence Professions. Email me at: wroche@sn.no Thanks to the rest who have already done so. Intern. ************************************************************************** 17)From: "Donald J. Zaroda" Subject: Window tinting for fun(!)and profit Every so often the experience someone else had can be a source of great learning, if you are willing to hear. In that spirit, I offer this bit of advice to any of you who are thinking about creating your surveillance vehicle from scratch. You will need to tint your windows, of course. The question becomes: do you go have a pro install the tint film at $30-45 a pane? Or do it yourself, thinking you'll save money and do almost as good a job? Now, I am very handy around home and auto. On a 90-degree day recently, I painted my entire Volvo out in a gravel parking lot and did a very nice job, even using enamel! So I shopped, compared and estimated before deciding to do it myself. My results are "adequate", meaning, yes, I now can conceal myself in my SV and get very good video, even at dusk! I caution you though, that you need four hands, much humility, a willingness to try, try again to put this over-the-counter tint film on by yourself, and still be willing to accept inferior workmanship. Even after much care, you will have bubbles, creases, trapped dirt particles, and poor adheasion at the edges. Plus, it took me so long to find enough of the film (no store seemed to have more than a couple of rools at a time) and then to install it (much taking it of and re-trying)that what I thought I would save in material cost, I blew in time away from my business.....No work = no eat, See? My experienced advice: Yes you can do this yourself and it will conceal you in the field....but, take your vehicle to a pro and pay the going rate. You'll undoutedly like the results much better than your own. The time you trade off from earning in order to do this yourself balances out the perceived savings in sweat equity versus paying somebody else. The $13.99 for a 6.5 LF roll of this tint film (Gila Sunshine brand, HiPro Series available at Wal-Mart) looks like a bargain! Until you buy about six rolls because only the first four LF of it is really usable (you don't really want to try to apply this in strips), and you are going to waste a lot or mess up some of it (in four-foot increments!). After you add in the loss of your hourly rate that your are NOT earning because you are fighting creases, puckers and inevitable mis-alighnments, well --just take my advice and go get it done by somebody who installs this stuff every day as second nature to him as when you butter your toast. Don Zaroda Zaroda and Company 117 Nelson Avenue Easton, PA 18040-1217 610/258-2015 zarodad@lafayette.edu ************************************************************************** 18)From: BADCOFFEE@aol.com Subject: RE: Lockpickng books and tool purchase posted from : minx@azstarnet.com Tools can be ordered online at: http://www.my-secret.com/ <---I havent tried them, at your own risk. Or by getting a lock catalog from MISTIC LOCK, NJ by calling: 1-800-441-9324 Mit site: Nothing else to know about the basics, check here for anything that is not there :-) MIT SITE: http://www.lysator.liu.se/mit-guide/mit-guide.html Augie ************************************************************************** 19)From: "Donald J. Zaroda" Subject: Bonding and/or business Insurance I, too, am interested in learning about bonding. (not bail-bonding, but becoming insured for surveillance/PI business.) I have seen other anencies insured for up to $2 Million, but what are the coverages needed? Whho are good companies? Where can this type of coverage be obtained? How does a small agency go about figuring out what protection is needed to: 1) protect personal and business assets from liability and, 2) show insurance coverage as comfort to potential clients that if you screw up, THEY won't be attatched? Thanks, Donald J. Zaroda, President Zaroda and Copmpany zarodad@ lafayette.edu ************************************************************************** 20)From: BADCOFFEE@aol.com Subject: RE: Convention More RE: Duece6x6@aol.com Guy's....hear me out on this one. Pick a date, pick a place and I'd really like to see this thing leave the ground. Cummon guys, 2,000 strong. 300 seats should be a breeze. Augie ************************************************************************** 21)From: "L. J. Strand" Subject: WEB-SEARCH ENGINE? Anyone who know if there are any good search engines related to the surveillance and/or security business? There must be some good spiders or directories out there! Come on list members, help us all to improve our web marketing!!!! Sincerely yours L. J. Strand INTERNATIONAL SECURITY AGENCY http://www.algonet.se/~ljsaisa ljsaisa@algonet.se Tel: Int+46 (0)8-645 22 82 (09.00am-05.00pm C.E.T.) Fax/Data: Int+46 (0)8-645 22 82 (24h) PoBox 167, S-162 12 Stockholm, Sweden ************************************************************************** 22)From: "Steven R. Price" Subject: Re: PGP -----BEGIN PGP SIGNED MESSAGE----- There is a plug-in program from PGP.COM called PGPMail 4.5 which integrates into the Eudora-Pro version [although not sure about Eudora-light]. This is a shareware version. You can check out http://pgp.rivertown.net for a plethera of pgp helps and plug-ins for all types of mail program for all operating systems. Regards; SRP > need to know how to encrypt picture files, bmp, jpg etc.. using PGP and > then emailing them to other collegues. > > Im using PowerPGP windows 95 shell, to now I have been using the PGP File > manager to encrypt the file, then copy it to the notepad the cut and paste > it to Eudora. Is that the only way or is there a better way ?? -----BEGIN PGP SIGNATURE----- Version: 4.5 iQCVAgUBM3d9auOn6X0ia817AQGWowP7BRThlq+mcmDjIDiJ9Az6HkTXs9FaNK+3 mv87a1+KrD/ahIEfg3imRdCfanHg2/6k3hqlPeDUxGuVjJJN/4EeZw9lAHQLsd+o zur6Aiq+c8CAY/W7dMjOvQvH+sDINVrOw40GiM+I4cZvG5lseceAD27MTuaxnlQn rqHXkZcz02M= =HMlz -----END PGP SIGNATURE----- ************************************************************************** 23)From: Mutter Subject: Re: GSM monitors/decoders > Well there were a number of articles on the subject and I can tell you that > the only "secure" digital is the GSM type , other digital were decoded and > software is available in Internet !! > > There are not any GSM monitors/decoders available to the public but > goverment only. > > Anastasios D. Panos > heh, It's true that no one has ever come forward to announce that they've found a practical solution to breaking the encryption of GSM, but I don't know if that makes it the only "secure" digital technology (especially since our friend was talking about purchasing a home cordless (I assume) and not a mobile (if you want to draw the distiction)). BTW, I haven't heard of any device used by the gov't to monitor GSM phones. Having one would be quite unpractical. If they wanted to listen to your conversation they'd go to your GSM provider and listen to your line at the switch (a much easier approach than trying to follow (and decrypt) an encrypted digital signal as it hops from frequency to frequency over 1 Ghz.). - M u t t e r Ed. root zine (http://www.openix.com/~mutter) mutter@openix.com ************************************************************************** 24)From: "Memory H. Turner" Subject: Re: PGP Question I've been using PGP for quite some time now, but have never heard of PGP v2.6.2g or any PGP that will allow 4096-bit keys. Please provide me with a URL or FTP site address where I can obtain such versions. Thanks! Memory ************************************************************************** Who are you? What's your specialty and/or interest? Let us know about your company... What would you like to see on the list? Post it. Let us know... Do you have something to contribute? We'd like to hear it... We want to know EVERYTHING and ANYTHING about eavesdropping, surveillance, countersurveillance & privacy related technology, etc... Remember: who, what, where, when, how & why... we want ALL the details... Do you have a question? Post it... A little free time? Help a member... With the INCREDIBLE brain power on this list, someone should have the answer ;-) P.S. Don't be a LURKER... Members take the time to post info for us all... give something back... Don't just take... Your input/knowledge is valued... ************************************************************************** Send Postings to: spyking@con2.com with "Post" in subject field with subject ************************************************************************** Subscribe to: spyking@con2.com In the subject field type: subscribe-surveillance list e-mail address ************************************************************************** Unsubscribe to: spyking@con2.com In the subject field type: unsubscribe-surveillance list e-mail address ************************************************************************** ...The Simple Rules of the Surveillance List... The Surveillance List Owners may Reject any posts that are/contain: 1) Info Unrelated to Eavesdropping, Surveillance or Privacy technology... 2) Flames or Negative posts... 3) E-Signatures that are considered excessive... 4) Advertisements not DIRECTLY related to the list topics... 5) Attached Files... 6) Oversized Posts... (May be edited to save room) **************************************************************************** This publication is copyrighted and is protected by U.S. and International copyright law. The information transmitted on this list may not be reproduced, reposted or forwarded to any non-list member without expressed written permission of the List Owner. Violation of U.S. copyright law is a criminal and civil offense... **************************************************************************** The Surveillance List is moderated by SpyKing@thecodex.com The List Owner will make EVERY effort to protect subscribers from spam... Copyright 1996, 1997 Codex Publishing Inc., All Rights Reserved... **************************************************************************** Vol 2 Issue # 109 ****************************************************************************** Vol.Two Issue #109 The Surveillance List May 14,1997 Over 1900+ Members Worldwide Representing 42 different countries ****************************************************************************** IN THIS ISSUE... ****************************************************************************** 01) Re: Antique Safes & Bonding 02) Re: I need an explanation 03) Re: Locks 04) Re: Is someone out there confused? 05) This might just make a bit of sense 06) Ring back number for Texas? 07) Re: I need an explanation 08) Re: Convention 09) Boosting standard Wavecom signal strength 10) Re: Cracking Answering Machines 11) Track an e-mail? 12) Electronic picks? 13) Surveillance Software? 14) UK Electronics Store 15) DTMF decoder 16) The LOCK PICK GUN fully explained. AKA- Lock Aid Tool 17) Re: Bar codes ****************************************************************************** DON'T BE A LURKER.... GET INVOLVED... YOU ARE A MEMBER... MAKE THE MOST OF IT ****************************************************************************** 1)From: Jerry Subject: Re: Antique Safes & Bonding l if you guys havent figured out yet that I might be just a little bit sarcastic.(If any one needs to be motivated to learn how to open a safe by manipulation just try having to open one with a cold chisel because you set off one of the added locking devices by accident.) And with all the complaining about lurkers not joining in well I guess I helped put a stop to that lately. On a serious note though,to: badcoffee. A bond is basiclly an insurance policy for a fixed amount, $5K, $10K and so on. It is designed to give some assurance to your customers that in the event of you doing your job and something goes wrong that they would be able to collect the amount of the bond in damages.A $5K bond usually costs about a hundred dollars. I hope this explanation is of some help. Jerry ************************************************************************** 2)From: fthome@amug.org (Alex Thome) Subject: Re: I need an explanation Ok, what happened is that everything vibrates at a certain frequency. Ever notice how a plane flies over head, and everything is still but one plate, that is shaking. It has to do with freq. You just have to hit the right one. I have no doubt either that the govt has devices that can do that. But come on, even ppl can do that (I shit you not), how do you think some opera singers make glasses explode? Shadow Runner -Believe nothing, until you question everything- ************************************************************************** 3)From: CChrist373@aol.com Subject: Re: Locks To Jenn Saint-John try www.gun-room.com for Steve Arnolds Gun Room. They have a lot of pick sets. I use the same set as the md16, I alos use a jcak knife pick set for carry and a warded pick set. You do not need a set w/ a lot of picks. A couple different size tension tool ( some call them wrenchs ) a diamond point pick, a rake or two, a curved tip pick and maybe a ball pick. Also practice withe bobby pins ( the kind that are flat on one side a wavy on the other and paperclips. It is easier with lock picks but what if you can't carry them? Learn to improvise. Mc ************************************************************************** 4)From: fthome@amug.org (Alex Thome) Subject: Re: Is someone out there confused? Ok, this apparently is an old hoax. The first number you're talking about sounds like a busy number. The phone companies use these, and they will always ring busy no matter what. The second one could be a variety of things, although I am sure it's also something the TelCo uses to test something. If you think you're bugged, you can either get a bugger checker (I'm not sure what these are, or if they work), or just measure the line voltage. It will usually be a little above or below normal voltage. Sorry, I can't remember the exact voltage right now, i'll send it to you if I remember though. You could probably ask the phone company to just check your line if you feel something wrong with it. My friends phone used to always hang up on him etc, and there was a slight amount of static, sometimes there was no voltage at all. Although our local provider has known to have problems like this, he felt somethign was amiss. So he called a lineman or whatever, out, and they found a bug. Someone later removed it. He was under investigation be the FBI, so.... . Any idea what type of bug this was? Shadow Runner P.s.: Please excuse my spelling I just got dome writing 2 ten page papers. ************************************************************************** 5)From: BADCOFFEE@aol.com Subject: This might just make a bit of sense The lurking issue has been it's own topic for a few days now. It is important to understand that we are not just here to answer each others questions...but to give "any" insite on anything that might help us preform our jobs with greater accuracy. Throw out tips....observations...and something overlooked....is "Human charasteristics". Even a librarian can make a very usefull post here. Tech talk is good, but equally as good are "observations". Everything fits a profile. If your observations and mine...being across the world from eachother are the same......there is a good bet that even further away...the same thing fists the same profile and we now have a "profile" something we can lean on. Electronics are a tool......"people" are what were all after. How they think, how they move, how the sit. We all fit into a handfull of "mentalities" that are VERY predictable. <---facinating shit (excuse me, "stuff") Predict your opponents moves before he does.....and you won the game. Spend a week making a profile on....a squirrel. $20 bucks says they all act the same. Nothing is useless information....NOTHING. Augie- Inmate #263435 <----marriage license number ************************************************************************** 6)From: Klint Bailey Subject: RING BACK NUMBER SPECIFIED FOR TEXAS? I WAS WONDERING IF THERE IS A RING BACK NUMBER SPECIFIED FOR TEXAS? IF ANY ONE HAS IT IT WOULD BE HELPFUL, THANKS. P.S. I HEARD THAT YOU DIAL A CERTAIN 3 NUMBERS AND THEN THE LAST 4 DIGITS OF THE PHONE, BUT I'M NT SURE IF THIS IS VALID INFORMATION? ************************************************************************** 7)From: witzend@peganet.com Subject: Re: I need an explanation Augie, BADCOFFEE@aol.com : 1.There are several possibilities that could have caused the phenomena that you have mentioned. (a) Harmonic Subsonics is only one possible explaination. This is when vibrations are at a resonant frequency and cause harmonic oscillation to destruction. The master of mechanical resonance was a chap named Nikoli Tesla, later Dr. Theodore von Karmen of rocketry fame. (b) the far more likely explaination involves thermal differences and imperfections in glass. I have seen the results when conditions are just right. They can be quite spectacular; much as you've described. The mechanics are as follows: when glass is cast (particularly the inexpensive variety) there are several imperfections that are left in because of the use and cost of manufacture. Thermal differences, when just right, would be the culprit: hot glass... cold beverage.... right type of temperature and humidity, a greater physical difference that causes physics to take over and "Kerpow". What makes me think thermal differences are the other "sightings" usually involve thermal differences and the development of vapors of all kinds. 2.As to the haunting, I am rather dubious. Please understand that you are perfectly free to "Believe" what ever you will. My experience is that there are usually quite ordinary explainations to extra-ordinary event. I have yet to have compelling evidence that would make it likely to be otherwise. Personally, I am inclined to believe Dr. Carl Sagan's quote about extraordinary events requiring extra evidence. Please don't let it dampen your enthusiasm for these sorts of curiosities. They make wonderful diversions and are generally quite fun to contemplate. : ) ************************************************************************** 8)From: Michael Jenkins Subject: Re: Convention Im going to apologise right now in case I offend anyone. My cynical comments come in light of some list members that feel they are too secret and covert to attend a List Convention. (Members of certain Intelligence Services (you know who you are) are excluded from these comments) Sure there are some professionals who couldn't bother participating in such an event, There are some that feel they are too good to attend, but just because some of us operate in a covert field doesn't mean all our identities are a secret. There are many ways to protect the nature of our confidential assignments, including not talking about them. There are many Investigators and other professionals on the list that will not feel threatend by appearing. If you are all so discreet and covert, then there aren't many people who know what you really do, so you should have no problems sharing some of your less covert secret mission with others. There are many newbies who would relish the experience of true professionals, Pardon my cynical view, but anyone who refuses to attend because they are too top secret, should be put out in the pastures to dry because they are relics of the cold war. For gods sake, use a pretext, dont talk about the more confidential assignments, whatever, but dont refuse to attend for those reasons. If a convention was organised, and it could be guaranteed that it would be worthwhile to attend, I personally have no problem flying from Sydney to any part of the world. M Jenkins Australian Counter Intelligence Agency ************************************************************************** 9)From: Michael Kenny Subject: Boosting standard Wavecom signal strength I've got a Wavecom Sr xmitter. Everyone has seen these little babies around. They allow you to send audio and video about 300 ft at 2.4 GHZ and work great for sending TV around the house - or wherever. Except when you or the neighbors run the microwave :-) SuperCircuits sells a set of these that they claim will require an ATV license to operate, while the standard set do not. I've had no luck getting any info from them or from RF-TECH (the manufacturers)on how to do this. Both claim it's "against FCC rules" for them to tell me how. I don't buy that. SC obviously does not want to tell me how, as they sell the juiced up set for 600 bucks. For RF it may just be a matter of standard customer relations, that is, some vendors of some products just don;t tell you how to modify their products to do things it wasn't meant for, just as a matter of course. I really want to know how to do this. Does anyone know how I might go about finding out a way to do it? I know squat about radio transmission. There are a couple of exposed pots on the top of the little sealed box that houses the xmit. According to engineers at RF (via the phone support guy) these are for modulating the audio subcarrier and I shoudln't mess with them, they won't give me any more xmit power. Also, neither SC nor RF would send out a schematic. Anyone have any ideas on this one? Or thoughts on how to find someone interested in figuring it out? Since SC charges 350 to make what I'm sure is a little tweak (169 or so for the standard Wavecom vs 600 for the juiced up set), this is information that definitely wants to be set free. ************************************************************************** 10)From: "The Fone Phreak" Subject: Re: Cracking Answering Machines I read that a way to crack 3 diget answering machines is to dial 123234345456567678789890901012. Now all you boys and girls don't run over to your fones and try it. I tried it on my machine and it worked twice. ONLY TWICE. The code is 471 one of the popular ones. Is this a acurate way , or was some idiot talking his head off. I also want to know if this worked ecause alot of codes are 471 and another number that dosen't come to mind. ************************************************************************** 11)From: CChrist373@aol.com Subject: Track an e-mail? Hello, Anybody out there know how to track an e mail? Meaning a search engine that can tell you what sites a certain e mail has gone to? Thanks, MC ************************************************************************** 12)From: BADCOFFEE@aol.com Subject: Electronic picks? Someone toss me a bone on elec pick guns. What is the action...a snap or vibrating? Sorry, where are my manners... :-) Hi, how is everyone :-) Augie ************************************************************************** 13)travlinman@hotmail.com Subject: Surveillance Software? Need a program that will act as transparent keystroke logger and periodically transmit data via modem to target computer. Possible? Target computer must accept data. How? ************************************************************************** 14)From: Richard@lowe.co.uk (Richard McLachlan) Subject: UK Electronics Store Having lurked on this list for a while I would like any UK readers to note that we are now stocking some relevant items here. We have the Bionic Ear from the US, Night Vision image intensifiers from Russia, wide band full coverage scanners, GPS equipment, mapping software etc. have a look at our web site at http://www.lowe.co.uk Lowe Electronics Chesterfield Road Matlock Derby DE4 5LE UK 01629 580800 ************************************************************************** 15)From: R Sutherland Subject: DTMF decoder As an electronics hobbyist with a particular bent towards surveillance i have played with,built and tested many DTMF decoders and by far the best is a unit made by Motron Electronics.The unit comes as a stand alone unit with an RS-232 serial interface built in and a logging soft ware package avialable.Total cost of the unit with interface cable and software is about $130-00.The unit has proved a very robust cost effective piece of equipment serving me well over the last 5 years. Keep up the chatter!!!!!! Motron Electronics, 310 Garfield St.,Suite4 Eugene,OR 97402. Dr.Bob ************************************************************************** 16)From: BADCOFFEE@aol.com Subject: The LOCK PICK GUN fully explained. AKA- Lock Aid Tool What it does: Non tech terms- Like shooting pool. The stick is the pick, the cue is the key pins (bottom) and the target ball is the driver pins(the only pins left) You pull the trigger on a lock aid it snaps the tip upward (stick hitting cue) hitting the key pins. The Key pins (cue) now transfer the force to the driver pins (target ball). If you hit the ball incorrectly.....it might cause you to scratch (false set...sent too far and caught up on the sheer line) Done correctly: Snap, key pins don't even flinch ALL the force is transfered to the driver pins shooting them right out the top of the lock and right into your eye. NO....not that far, there is a plate to prevent this. But thats how this works. The tecnique: EXTREME light torque (tention) on the plug. So little that you might loose the tention wrench a few times.Just enough to apply pressure...this is NOT a turning thing. The job of the tention wrench is only to take up slack. The pick itself has to go is STRAIGHT. Remember, this thing snaps at exactly 90 degrees, if you have this thing twisted a bit...your transferring the force to the sidewalls and it takes the "snap" out of it. My professional opinion: When I become a profesional....I'll give it to you. My humble opinion: When I become humble, Ill give it to you What I think about the Lock Aid tool: Absolutely fantastic. A bit to get used to. I am used to extreme sensitivity in when I hold picks and this tool threw me off at first. I recomend that this is part of a toolbox but picking should be first priority. Picking will give you the information and "feel" of what your lock is all about inside. You can get frustrated with a lock aid tool because if it does not work...you have no idea why. Picking tells you why....every time. Purchase: Definately Make it a primary tool: Absolutely not Use it on autos: NEVER EVER USE ON AUTOS, Some makes- the pins will shoot out the top completely disabling the lock. Caution on locks: YES, ive ruined several Master padlocks with this tool. I still don't know where the pins disapear to after the first click. Kwickset, Schlage and generic locks......works well, no damage. Covert Opp's- Bring a siren or a loud radio at full power to disguise a "CLICK" that is louder than hell when all is silent. Woke me little boy one too many times...wife takes it away at night. :-) Contact me if there is anything else I did not cover. In NORTH JERSEY- When the hell is anyone going to hire me!!!! :-) Cover your eyes, Augie ************************************************************************** 17)From: "KcW" Subject: Re: Bar codes Just a note to buddy who wants the bar codes: be aware that UPCA is only one of a myriad of bar code types. Find a program that prints them all. Try Channel1.Com in the Visual Basic section. ************************************************************************** Who are you? What's your specialty and/or interest? Let us know about your company... What would you like to see on the list? Post it. Let us know... Do you have something to contribute? We'd like to hear it... We want to know EVERYTHING and ANYTHING about eavesdropping, surveillance, countersurveillance & privacy related technology, etc... Remember: who, what, where, when, how & why... we want ALL the details... Do you have a question? Post it... A little free time? Help a member... With the INCREDIBLE brain power on this list, someone should have the answer ;-) P.S. Don't be a LURKER... Members take the time to post info for us all... give something back... Don't just take... Your input/knowledge is valued... ************************************************************************** Send Postings to: spyking@con2.com with "Post" in subject field with subject ************************************************************************** Subscribe to: spyking@con2.com In the subject field type: subscribe-surveillance list e-mail address ************************************************************************** Unsubscribe to: spyking@con2.com In the subject field type: unsubscribe-surveillance list e-mail address ************************************************************************** ...The Simple Rules of the Surveillance List... The Surveillance List Owners may Reject any posts that are/contain: 1) Info Unrelated to Eavesdropping, Surveillance or Privacy technology... 2) Flames or Negative posts... 3) E-Signatures that are considered excessive... 4) Advertisements not DIRECTLY related to the list topics... 5) Attached Files... 6) Oversized Posts... (May be edited to save room) **************************************************************************** This publication is copyrighted and is protected by U.S. and International copyright law. The information transmitted on this list may not be reproduced, reposted or forwarded to any non-list member without expressed written permission of the List Owner. Violation of U.S. copyright law is a criminal and civil offense... **************************************************************************** The Surveillance List is moderated by SpyKing@thecodex.com The List Owner will make EVERY effort to protect subscribers from spam... Copyright 1996, 1997 Codex Publishing Inc., All Rights Reserved... **************************************************************************** Vol 2 Issue # 110 ****************************************************************************** Vol.Two Issue #110 The Surveillance List May 15,1997 Over 1900+ Members Worldwide Representing 42 different countries ****************************************************************************** IN THIS ISSUE... ****************************************************************************** 01) Re: Lock Aid Tool 02) Online Crashing... 03) Re: Surveillence Software 04) Shatter Glass? 05) Anonymous E-mail 06) Equipment Questions 07) Re: Boosting standard Wavecom signal strength 08) Response to Convention 09) Re: melting down safes 10) Re: THE CONVENTION - can we get together ? ; ) 11) Re: Cracking an Answering Machine 12) Re: Convention and telephone bugs 13) Re: Electronic Lockpicks 14) I do this because i like it 15) Re: Opening up that ol' safe~ 16) May I have your help please? 17) List chat anyone? 18) Magnetic Card Reader/Writer 19) Re: Phone numbers that answer with an oscillating tone 20) Re: Surveillance Software 21) Re: Convention Post 22) Re: Is someone out there confused 23) Because I forgot my keys 24) Re: Boosting Signal Strength 25) I've got a snoop! 26) English Coal Mines & Para-Bolic Solar Mirror Electric Power Plants 27) Response to Track an Email 28) "Search for key word" feature? 29) Re: Lockpick sources & convention ****************************************************************************** DON'T BE A LURKER.... GET INVOLVED... YOU ARE A MEMBER... MAKE THE MOST OF IT ****************************************************************************** 1)From: "Matthew J. Cherry" Subject: Re: Lock Aid Tool I have been lurking for sometime and just read BadCoffee's post on the Lock Aid Tool. Nice Job. I just have a couple points to add. I have had just as good results with a homemade tool called a snapper. I have been sitting here for five minutes trying to figure out how to describe in words how to make it - I can't. If this list can support a graphic file, I would be happy to post both pictures and instructions. The snapper also uses inertia as a picking method, however, it is less forceful (you control it by hand) and less damaging to locks (it is also relatively silent for those of you who are worried about waking the kids). The other BIG factor is it can be made in a few minutes from readily available materials and then easily destroyed afterwards. This is definitely an advantage for those of us with extensive travel plans out of the country. I have been going back and forth deciding whether or not to try the Cobra Electronic Pick tool. This works on vibration as opposed to straight inertia and is probably better. I don't know if it will offer such a substantial reward over manual picking that it is worth the risk of carrying. Although I guess you could modify it to look like an electric toothbrush :). Any comments? Matthew J. Cherry Intelex, Ltd. ************************************************************************** 2)From: net_security@geocities.com Subject: Online Crashing... It is possible to remotely trigger a bug on any Windows 95 or Windows NT system which has rather unpleasant ramifications. It is done by sending OOB (Out Of Band) data to an established connection with a Windows user. NetBIOS [139] seems to be the most effective since this is a part of Windows. Apparently Windows doesn't know how to handle OOB, so it panics and crazy things happen. Reports have been heard of everything from Windows dropping carrier to the entire screen turning white. Windows also sometimes has trouble handling anything on a network at all after an attack like this. A reboot fixes whatever damage this causes. This information, and how to combat it, can be found at http://www.secant.net There is a sniffer you can download that will sniff port 139 and let you know when someone is trying to crash your system. It will also give you their IP address. If anyone doubts the validity of this bug, well...I've had someone crash my system twice over the Internet. All they have to know is your IP address. One minute you are reading a web page, the next..BAM! time to reboot. sincerely, gnu ************************************************************************** 3)From: "M. J. Van Ham" Subject: Re: Surveillence Software > Need a program that will act as transparent keystroke logger and periodically > transmit data via modem to target computer. Possible? Target computer must > accept data. How? I am aware of various keystroke recorders for DOS, Win 3.x, and Win '95, but I have yet to see one that will transmit the data via modem. It wouldn't be a difficult feature to implement, however the authors of said programs probably don't realize there is call for such a feature. Anyways, check out: http://www.tordata.se:80/hokum/files2.htm for a list of several regular key stroke recorders (note: to my knowledge none of these will transmit via modem). ************************************************************************** 4)From: "mage2" Subject: Shatter Glass? what frwq. and what db level would it take it shatter a glass like a window i have heard of water at like 130db at a freq will vaporize. is this the same with windows? thank you mage =X 281.Texas.USA "Just Because Your Paranoid Doesn't Mean They're Not After You" K.S. ************************************************************************** 5)From: stdtxp01@shsu.edu Subject: Anonymous E-Mail Can someone tell me whether we can send e-mail to anyone without displaying our e-mail address? And if we can disguise our e-mail address, can someone find ways to identify it? Thank you. ************************************************************************** 6)From: "mage2" Subject: Equipment Questions In the movie "Hackers" "Zerocool" has a headset that covers one eye like a patch and has a small screen in there for his computer. What is this or do the not exist. Also i have seen a VR head set called Cybershades )or something like that( they sell for around $40 U.S. I had catalogs with them in them but have lost them. Does an one know where i could get either of these items. And i got a PRO-38 scanner from a yard sale it works but i want to know if i got ripped off. I paid $50 U.S. for it. It works fine. This compny sells a RF direction finder. Take a look here and tell me if i should get this! It seems to be cool. Also look at the other stuff they have. http://www.radio-ware.com/rdf.html And i hope that i did not scurry to far from the subjects on the list. mage =X ************************************************************************** 7)From: "Walstrom, Bradley" Subject: Re: Boosting standard Wavecom signal strength Michael, I have the wavecom Jr. and the easiest way to get better range is to change the antenna on the receiver. Cushcraft has a patch antenna (part # S2406PL) that has 6db of gain for about 63.00. Or you could try a Yagi type antenna which is more directional. Without a license you are able to operate RF devices with a very low power output. There is no way to increase the output of the wavecom without modifying the circuit, which would void the warrantee (if you are worried about that). I have the wavecom receiver with high gain antenna from SuperCircuits (MVR-3 299.95). They claim 2500' but I have realistically seen maybe 1000', and it is just a standard wavecom receiver that they have removed the little paddle antenna and installed an SMA connector and then provided a high gain patch antenna. SPI sells the same high gain antenna without the receiver for 100.00. (http://www.thehost.com/spi/index.html) Turning any of the exposed pots will negatively effect the operation of your unit and it will take expensive test equipment to get it tuned back up. Brad Walstrom ************************************************************************** 8)From: Rick Kidd Subject: Response to Convention This response is for Mike Jenkins. Please understand Mike that there are still some dinosaurs in the intelligence community. My motto has always been "Knowledge Is Power!" The "gentleman" who so curtly dismissed your idea is atypical of the "old school cloak and dagger" that no longer prevails. Networking is the key to crucial intelligence gathering. I, as well as other "experts" (and I use the term loosely, very loosely) have no problem in meeting with the public or others interested in my chosen carreer field. I have been on counter-terrorist teams, insertion teams and various other "not to be discuseed with the common man" teams. This arrogance and superiority facade is mearly a cover for insecurity. Our organization wants to host a convention as soon as we have a sufficient membership base and enough interested parties to attend. I will be the first to inform you of the tentative dates, as well as the entire list, for our first "get-together". Tell the old "Spy vs. Spy" generation to stay home. In todays world, "Arrogance breeds Ignorance." Sincerely, Rick Kidd Confidential Security Services (CSS) Association of Counter-Intelligence Professionals (ACIP) ************************************************************************** 9)From: Illuminati Primus Subject: Re: melting down safes With all this talk about melting through safes, it got me wondering about how well freezing a safe would work.. ie. pouring liquid nitrogen on a spot until it cracked open.. Or maybe newer safes are invulnerable to freezing.. I have no idea.. I do know that bicycle thieves use this technique to break the locks on bicycles around here, but the metal on bicycle locks is probably much different from the metal on high quality safes.. Anyhow its an idea, I'd like to know if anyone has tried it! -vermont@gate.net ************************************************************************** 10)From: "Lorenzo Castillo Sanchez" Subject: Re: THE CONVENTION - can we get together ? ; ) >8)From: Michael Jenkins >Subject: Re: Convention >There are many newbies who would relish the experience of true >professionals, Pardon my cynical view, but anyone who refuses to attend because they are too top secret, should be put out in the pastures to dry because they are relics of the cold war. For gods sake, use a pretext, don't talk about the more confidential assignments, whatever, but dont refuse to attend for those reasons. >If a convention was organised, and it could be guaranteed that it would be worthwhile to attend, I personally have no problem flying from Sydney to any part of the world. I think holding a convention together would be a really neat idea. There are many newbies who'd like to see the real world of surveillance from the real-world professional perspective rather than from those typical Hollywood-BS type(or from fictional sources). Now that the Cold War is over and the Berlin Wall crumbled down, there is a new job market for ex-KGB and former Eastern Bloc spies private espionage. Well, I think the 20th century would be an era of Privacy Wars and that private citizens who are unalert to these types of invasion would be caught off guard. Like Mr.Jenkins said, if you are in the intel biz and you don't want to expose some vital info about your missions then simply keep your mouth shut. I'd like to go to Las Vegas but how about NYC ? Let's bring that ol' safe and hmmm.. I'd like to see TEMPEST in action in the convention. :) ************************************************************************** 11)From: fiveyes@iiiii.com (5-i's = V) Subject: Re: Cracking an Answering Machine > > an 101 digit code in sequence. ( found in the book How To Get Anything > > On Anybody book 2 by Lee Lapin ) ah heck, heres the code. > > > > 011223344556677889913579024680369258147159370494838272616051739506284085 > > 529630074197531864209876543210 . plug this into the dialer using the three > > priority buttons plus another bank. as soon as you here the machine > > click on for the greeting...go. Long winded messages are best 'cause you > > have more time torun the numbers. >Does anyone know the algorithm used to generate this code? I would like to >come up with a basic algorithm to determine the least-possible number of >digits to stream to a device that accepts (touch tone/numeric/whatever) >codes as a password and ignores all other input -- for instance if you dial >"12345" when a 3-digit-password answering machine is waiting for a password, >and that password happens to be "234," the 1 and 5 digits will be ignored >and the machine will be compromised. Exploiting this knowledge, I would >think it fairly trivial to come up with an algorithm that would generate the >proper code stream for a system that uses digits 0-9 as password info, >passing the variable (n) to the algorithm, which is the number of digits in >the password field. Anyone care to help/comment? Where: k = number of elements in alphabet (10 in the case of decimal digits) n = length of words to be considered. We have: k^n + (n -1) = length of shortest possible string in which all possible permutations of words of length n may be found. So, for two digit "words", we have: 10^2 + (2 - 1) = 100 +1 = 101 elements required (which agrees with the given solution above, which is not unique). Three digit words would require a string of digits of length 1.002 and 4 digit words would require 10,003 elements, etc. If one was trying to break a byte of binary code, you'd have to generate a string only 263 binary digits long (2^8 + (8-1) ). To form one of these strings, one best consider a computer, anything else will be both too tedious and error-prone. Perl is a good programming language to use, for both its string manipulation and dynamic array capabilities. One possible algorithm would be: Accept n and the alphabet Form an array of all possible permutations of length n using that alphabet. Skipping the first word, go through the array and find a word in it whose last n-1 elements match the first n-1 elements in the first word. If you find one, chop the last n-1 elements of that entry and append the first element of the array to it. Delete the first element of the list and repeat until there is only one entry left or no matches are found. If there's only one entry, you're done! However, not all possible initial orderings of a list will yield one "compressed string" using this algorithm. So you'd have to have a way to reorder the starting list for another attempt whenever a match wasn't found. If someone actually has need of this algorithm and isn't capable of writing it themselves, let me know and I'll give you a quote for doing it. 5-i's ************************************************************************** 12)From: "John " Subject: Re: Convention and telephone bugs Michael (Australian Counter Intelligence Agency) ??? Dream on Buddy! ALEX THORNE (Re-Bugging) In the UK your telephone should be using 50volts of power. You can test this by simply plugging a voltmeter into your wall socket. A 'trickle feed' bugging device will probably draw 2-3volts off your line. So any reading under 48volts may need investigating. Be warned though, that you can bug a phone without using power off the line! XSAS PS Does anyone in the UK know where we can get hold of a "Burst transmission" bug, where the audio is digitized, compressed, and held for burst transmission. Must be under a 4 second data burst, say every 6 hours. ************************************************************************** 13)From: "Lorenzo Castillo Sanchez" Subject: RE: Electronic Lockpicks >Someone toss me a bone on elec pick guns. What is the action...a snap or vibrating? I haven't really tried this lockpicking device yet - The Cobra Pick III+. From what it says on the ads, it could open any lock (well, almost any padded locks, etc) within seconds. It costs around $500 and comes with a briefcase along with other accessories. I know that this particular electro-pick can be ordered from many different companies but you might get a bonus video on lockpicking if you order it from Intelligence Incorporated(San Mateo, CA - I'm not 100% sure but you could ask !). I've seen this ad from several magazines for years and I guess I should try it out someday ! :) ************************************************************************** 14)From: the mechanic Subject: I do this because i like it I am interested highly in surveillence/eavesdropping, but i was wondering, as i do this because i like it, is there a way I could get paid for it? LEGALLY!? please reply to list or pooch@lineman.org pooch ************************************************************************** 15)From: "Lorenzo Castillo Sanchez" Subject: Re: Opening up that ol' safe~ I've seen a lot of postings here regarding this particular issue - someone suggested opening up the safe with THERMITE!! I don't like to repeat things here but if any of you saw this movie - The Rock - they were gonna blow up Alcatraz(is this the correct spelling?) with Thermite Plasma. So, unless there is a terrorist situation(well, General Hummel was doing it for a just cause and he wasn't really gonna blow away San Francisco with VX-armed rockets) THEN don't even think about using thermite ! ************************************************************************** 16)From: BADCOFFEE@aol.com Subject: May I have your help please? I have a small shot at an oportunity of a lifetime. A friend has convinced Vice president of operations at a MAJOR stock transfer company (billions$$) to give me a 10 minute shot to "impress....or depress" him. He is big cheese, controls security...creates positions that don't exist kinda fellow. My problem: "Hi Bob, I am an entry specialist. I can probably get in here with my eyes closed and I'd like for you to hire me" <-----------I dont think this will work. Guys, if I have helped YOU in ANY way...........I would like for you to assist me in impressing this cheesball. Can I safely ask for you to send me a letter via e-mail or regular mail with a bit of a "push". In my office now...stands letters of appreciation from past customers that impresses the shit out of new customers. I think the same angle just might work here. If I had any "formal" training a cracker jack box resume is all that i would need. You know my angle on this......toss me a bone here. I've responded to 264 of your letters this month...and its only the 15th. Locks, alternate entry tecniques, fraud protection, scams, profiling, stereotyping, surveying, risk assessment, and even 2 "G" spot questions (opps, wrong list sorry) :-) This is in my heart. If there is a way into a building......"I would absolutely" know about it. The security secrets of the world are in this building. The security must be as intense as presidential escorts. This is a good one guys. What I learn....gets passed along. E mail: Badcoffee@aol.com Snail Mail: Augie Racanti P.O. Box 745 Ridgefield Park, NJ 07660 ************************************************************************** 17)From: SpyKing@thecodex.com Subject: List chat anyone? Suggestions for list chat? Best way? Time? Day? How often? Etc. When online I generally run & minimize Pow-wow and have found it useful... Any other ideas? ************************************************************************** 18)From: Simon.Johnson@mail.mel.aone.net.au Subject: Magnetic Card Reader/Writer Hello, Does anyone know where I can order a magnetic card reader and writer ? I've been looking all over the Internet but havn't found a source. If anybody has any pointers to sites or information I'd appreciate it. Regards Simon Johnson ************************************************************************** 19)From: antihero@sinister.com Subject: Re: Phone numbers that answer with an oscillating tone Those are called "Sweeps" by the phone company, which is one reason why people may think that they can "sweep" for bugs. In actuality they are/were used for testing purposes by the phone company. In the old days of X-bar switching systems they might have been useful in detecting taps, since the tone sweep performs a line voltage test. With today's digital switching systems however, connection is not actually established between parties until the called party goes off-hook. The call is then digitized and multiplexed and sent to the switch at the called party's switch. You can see why a remote line voltage test would be useless in such a case. In order to sweep for bugs on a phone line i would NOT recommend any of the devices that you would find in magazines and mail order catalogues that supposedly check for bugged lines. Most of these devices simply measure voltage and notify you of any drop. A skilled surveillance technician will install a phone tap that does not cause a voltage drop signifigant enough to register with a low end detection device. An effective way to check for active taps on a line (passive, or inductive taps are a whole different story) is by using TDR (Time Domain Reflectronomy) Unfortunately good TDR equipment is costly enough to be out of most peoples price range. Oh well, i guess the best bet is to use end to end encryption and let the snoopy people of the world tap, bug and monitor to their hearts content. ;-) Antihero@sinister.com ************************************************************************** 20)From: Jim Motes Subject: Re: Surveillance Software Travlinman, If you put a program on the machine and it sends automatically, It could be a real problem for you. What if the subject is home and the computer starts to dial out? If you know the subject and you have access to the system, (BTW with a name like Travlinman would this be your wife?)you can set up a program (I'll get the name for you and a copy, just email me and let me know you want it)that logs all activity on the computer after it boots on. If you set the computer up as a host and yourself as a remote machine you can dial in when you know the subject is not home and read the files as if you are on the host machine. It's just like a network sharing files. You could use Norton PC anywhere to do this. If you know enough about slip connections you could set it up without norton, but if you don't I'd use norton. Windows 95 also has a remote capability, but you have to do some reading to figure it out. Good luck. Jim Motes President MITEC Managed Information Technology 10855 Lee Highway, Suite 325 Fairfax, VA 22030 ************************************************************************** 21)From: Jim Motes Subject: Re: Convention Post I for one would like very much to meet with several members of the list and spend a few hours listening and learning, but unless I'm just paranoid, I suspect there are some members on this list who are lurking and collecting names and addresses for their agency and would love an opportunity to add photographs to the dosier. I don't hide my identity, but there are some people on this list who have a very real reason for hiding theirs. It's a great idea to get together for those of us who can, but for those who can't, cut them some slack. Just look at what's happening in this country right now. Militias and bombings are just a few. The people don't trust the government and the government is seeing a "threat" everywhere they turn. It would be a real bad time to get arrested or harassed just for attending a convention. For our friends on the list that work in classified/secure environments, it would be the end of a career. We also don't want to push these guys away from the list. If you want to have it in DC I'll help set it up. Jim Motes spyking, I kind of ran on here, cut what you want out or don't post it at all if you think it will just cause more problems. Jim +++Moderator's Note+++ You are posted in it's entirety... ************************************************************************** 22)From: Trace Carpenter Subject: Re: Is someone out there confused Sorry I must have missed the first of this thread, during my move, but apparantly you think you have a line bugged. TSCM Sweeps (Debugging) is a very complex trade and it's not as easy as just plugging in a bug detector but as Shadow Runner stated, line voltage is a good place to start. Ring voltage is usually between 45-52 volts and talk is around 4.2-5.1. However it can vary from place to place. The best thing to do is check other lines in your neighborhood that are coming from the same CO and find out what their voltage is. Then you'll have a good benchmark. Also check the ohms across the lines. Sorry I missed the origional question, but if I can help let me know. -- Sincerely, Trace Carpenter Technician at Large BTW, to everyone..Below is my new address & fax line. The voice line is an FX and stayed the same. Trace Carpenter Investigations Professional Private Investigations 2926 Maple Ave., Ste. 200 Suspicions Confirmed Dallas, Texas 75201 Problems Solved ! 214.828.4520 Free Consultations 214.740.0112 Facsimile +++Moderator's Note+++ Welcome back Trace ;-) Don't you hate moving? ************************************************************************** 23)From: BADCOFFEE@aol.com Subject: Because I forgot my keys As I stood by my front gates ringing the intercom because I forgot my keys a 12 year old child was in the same position . No one was answering in his unit either to buz us in. 10 minutes go by, I tell him to stay put, i have somethig in the truck that can help us out (I didn't want to pick the lock in front of him). He say's "Hold on....." looks at me, smiles and says, "I can get in" I said "Whaaaat?" I can get in, he repeats. I just smiled and took a step back...... let him, I gotta see this. Keep in mind, this place "looks" like Fort Knox He reaches between the double gates where one gate is stationary with a metal rod that goes into the ground. There is a master padlock on it to prevent it from being lifted. YANKS on the lock, the lock pops off, pulls the rod out, pushes the gates and in the meantime.......I am just pissing on the ground saying to myself "How many times have I seen that lock and said "That cheap assed lock on this huge gate??" AND it didn't even work! :-) 2 lessons: 1: The entry specialist took a step back and let a smiling 12 year old go to work. He knew something that I didn't and I gave him the oportunity to prove it to me. 2: What you see is NOT what you get, just because something "Looks" secure....doesn't mean it is. I would have never thaught about pulling on the lock....why should I have? Locks "lock", BAD move on my end. Change our thinking. This reminded me of when I took 20 minutes to gain entry on a 2 dollar lock only to "lock" it because my "mind" said "it is locked...unlock it". but it was unlocked...and I ended up locking my ass out. Augie ************************************************************************** 24)From: Trace Carpenter Subject: Re: Boosting Signal Strength Hi Michael, You mentioned you wanted to boost the signal strength on a Wavecom. I haven't taken apart THAT particular unit, however, if you're trying to just send an AV signal cheaply I posted a response sometime back which works rather well. I'll post it again here in case this helps you out. If not, let me know and we'll try to solve the problem another way. Trace, > Have you ever established a WIRELESS video surveillance link? I am curious > -- if I plug the video out of a CCD camera into the video input of a common > VCR (to make use of the RF modulator), then take the RF output to a long > wire antenna, how much range would you expect me to get? Maybe 200 feet? > Do you think an inline RF amplifier (the kind used for weak television > reception) would boost the signal by any appreciable amount or might they > have limiter circuitry within them? > > Don't you just hate all these theoretical questions? First, I usually use a 900Mhz type transmitter for these type applications. You an get a cheap one from Wal-Mart and work it from there. However, regarding your question: The modulator on your basic VCR is trying to shoot enough signal to power about 4 tv's, that's all. So you're not going to get any power there. On the other hand, if you want to do it, here's how you would go about it. There is a mining company in East Texas that had the same delima and they needed to protect their equipment at night. First, take the video (and audio if you want to) output and put it into a UHF Modulator. We use the USM8 UHF Modulator from DSI in Dallas, Texas. I think retail price on it's around $49. It comes preset to channel 19 but you can change it. From the modulator pipe the signal into a Yagi type antenna. You can use a UHF roof top antenna if you have the room. Point the signal at another roof top antenna which recieves the signal and into the TV. Now as far as boosters go. First let's differentiate between the type of amps. You have a post signal amp and a preamp which is basically a booster. A post signal amp is what the cable companies use. It takes a useable signal and sends it down the line. That's what you would use on the transmitter end. If you really want to pump it up, I use the AIM Model 14-4900 from Wiltronics in Paris, Texas. It's a UHF Amp that'll give you about 20db of power that only has one place to go. Out the antenna. If you still get a fuzzy picture; (I don't think you will), slap a signal booster on the other end between the antenna and the TV. Now, a neet little tech tip. Take a video splitter and turn it around backwards, so that you are taking the input to your television. Then take the two outputs and put one to your recieving antenna. The other to your rooftop antenna for regular television. Make sure you set the signal modulator on the transmitter to a channel that doesn't have anything on either side. That way your bleedover won't trash someone's rerun's of Gilligan's Island and call the FCC. I guess I should have mentioned to put the backwards splitter at the central connection point where the main feed from your regular tv breaks off to each television in the house. If you have done this correctly, then when you're inside you can turn any tv in the house to your reciever channel (we'll say channel 19) and look at the camera's view. Sorry. Did I go overboard with the answer? I get carried away. Guess it's a good thing I don't have a government budget. I'm beginning to see why a toilet seat cost's hundred's of dollars. Let me know if you have any questions. Sincerely, Trace Carpenter ************************************************************************** 25)From: "Jose A. Duarte" Subject: I've got a snoop!! hi, I got a little problem and was wondering how I should deal with it. I'm a teachers assistant with one of my local high schools and manage a computer network. In one of the class's there is this kid who is really smart but I have to keep a really good eye on. He likes to hack into the system and steal passwords and change his access. The reason I know this is that one day while he went to the bathroom, he left his disk in the computer he was working on. Quickly I copied what was on the disk and put it on another disk. Later I browsed through the disk and found a Character capture program, you know the ones designed to capture peoples passwords when the login. Now I'm wondering how to protect myself and also get back at him. The Network doesn't contain any really important info, but that's not the point. He's not supposed to be in there and I want to stop him. any Ideas? Thanks in advance, Jose A. Duarte ************************************************************************** 26)From: "Ken Lowndes" Subject: English Coal Mines & Para-Bolic Solar Mirror Electric Power Plants Our Family Legend has it that the Lowndes family in England used to own English Coal Mines. Yet I have never been able to verify or refute this family legend. Anyone in the UK-or elsewhere- have knowledge on this one? Yes, I do know that all of the English Coal Mines were nationalized in the 1940's. Para-Bolic Solar Mirror Electric Power Plants The first one built was built 12 miles Southeast of Barstow, California, and went on-line on or about August of 1982. Since then, many others have been built around the world. Do you know of any in your part of the world? Would you send me info on any in your area(s)? --Including the one located in Barstow, CA ? Any info most appreciated! Kenneth L Lowndes PO BOX 55 Glenpool, OK 74033-0055 USA royal@fullnet.net Thanks to One and All: ************************************************************************** 27)From: Trace Carpenter Subject: Response to Track an Email If I understood your question right just send your e-mail and screw up the name. For instance instead of sending me a mail to trace@onramp.net, send it to trcea@onramp.net. As long is it's not a real user name you'll get a returned mail with all the stops along the way being shown. Trace Carpenter,P.I. 214.828.4520 214.740.0112 Facsimile ************************************************************************** 28)From: WWMason@aol.com Subject: "Search for key word" feature? Mr. Moderator: (Its got a nice ring to it, don't you think?) How's it coming with the "search for key word" feature? +++Moderator's Note+++ Coming? Right now it's only breathing heavy... ************************************************************************** 29)From: Jenn Saint-John Subject: Re: Lockpick sources & convention Mc wrote: > try www.gun-room.com for Steve Arnolds Gun Room. They have a lot of pick > sets. Thanks. I got another source from Audie as well, so thanks to him, too. > > I use the same set as the md16, I alos use a jcak knife pick set for Again, excuse my ignorance, but I don't know what md16 is. And is jcak a typo for jack? (If these questions are too basic, and you can recommend a book, I'd be happy to go do the basic reading -- I intend to, but Real Life has been kicking my tail a bit and I can barely manage to keep up with email. Forget shopping. ) >practice withe > bobby pins ( the kind that are flat on one side a wavy on the other and > paperclips. It is easier with lock picks but what if you can't carry them? > Learn to improvise. A long time ago, in a life far, far away, I wasn't too bad with bobby pins. But I was given to understand that most locks now are too sophisticated for them. False info? Hey; improvisation is my life. Augie wrote: > Throw out tips....observations...and something overlooked....is "Human > charasteristics". Even a librarian can make a very usefull post here. Tech > talk is good, but equally as good are "observations". Everything fits a > profile. If your observations and mine...being across the world from > eachother are the same......there is a good bet that even further away...the > same thing fists the same profile and we now have a "profile" something we > can lean on. This is certainly true, and from my previous existence in human intel, I could tell you quite a bit about human behavior and profiling. The thing is, it's such a vast field, and so dependent upon individual characteristics, that it's next to impossible for me to just "throw out" a post on the matter. Even answering specific questions would probably result in a post too long for this list, but I'd try to make a stab at it and take the rest to private email. >From what I understand, lockpicking is somewhat similar. There's a point at which one has to feel their way, and nothing short of practice will get you past that point. It's the same thing with profiling, or any form of behavioral or situational analysis. But again, I'm more than willing to serve as a source for anyone with questions about interrogations, behavorial analysis and prediction, and the like, or even operations planning. Michael Jenkins wrote: > There are some that feel they are too good to attend, but just > because some of us operate in a covert field doesn't mean all our identities > are a secret. There are many ways to protect the nature of our confidential > assignments, including not talking about them. My personal discretion isn't the problem. I have problems with the idea of attending something advertised as a survelliance group. Now, if you want to call it a gathering of Friends of Italian Opera (sorry, flashback to the movie "Some Like It Hot") or something along those lines, my objections would be fewer, but there's still the following problem: > There are many Investigators and other professionals on the list that will > not feel threatend by appearing. If you are all so discreet and covert, > then there aren't many people who know what you really do, so you should > have no problems sharing some of your less covert secret mission with others. Call me paranoid, but since I heard about this list via a web site open to just about anyone, what makes you think that someone who was interested in compiling a list of identities and affiliations couldn't also sign up for this list, then attend this gathering and match names and faces, etc.? In fact, that's just what I'd do. I'm out of The Game, and have been for some years, so I don't have anything at stake per se, but I'd still be uncomfortable. This isn't meant to discourage anyone who'd like to hold such a gathering, by any means -- there are certainly enough folks here who =aren't= in the game and thus aren't at any risk. For those who are (and even joining a list such as this is behavior that would, er, not be encouraged by the sponsoring agencies for their agents), then if they attend such a gathering, they're playing not only with their missions, but human lives. I don't think it's fair to malign them for it. In fact, I think it's downright rotten to do so. > Pardon my cynical view, but anyone who refuses to attend > because they are too top secret, should be put out in the pastures to dry > because they are relics of the cold war. For gods sake, use a pretext, dont > talk about the more confidential assignments, whatever, but dont refuse to > attend for those reasons. Sorry, Michael, but things must be very different Down Under in the spook biz than they are here. If anything, the stakes are even higher for those in the Game than they were before...there's more players, and they're playing by different rules. At least with the Soviets you could count on both sides using roughly the same rule book, and it just doesn't work that way anymore. ************************************************************************** Who are you? What's your specialty and/or interest? Let us know about your company... What would you like to see on the list? Post it. Let us know... Do you have something to contribute? We'd like to hear it... We want to know EVERYTHING and ANYTHING about eavesdropping, surveillance, countersurveillance & privacy related technology, etc... Remember: who, what, where, when, how & why... we want ALL the details... Do you have a question? Post it... A little free time? Help a member... With the INCREDIBLE brain power on this list, someone should have the answer ;-) P.S. Don't be a LURKER... Members take the time to post info for us all... give something back... Don't just take... Your input/knowledge is valued... ************************************************************************** Send Postings to: spyking@con2.com with "Post" in subject field with subject ************************************************************************** Subscribe to: spyking@con2.com In the subject field type: subscribe-surveillance list e-mail address ************************************************************************** Unsubscribe to: spyking@con2.com In the subject field type: unsubscribe-surveillance list e-mail address ************************************************************************** ...The Simple Rules of the Surveillance List... The Surveillance List Owners may Reject any posts that are/contain: 1) Info Unrelated to Eavesdropping, Surveillance or Privacy technology... 2) Flames or Negative posts... 3) E-Signatures that are considered excessive... 4) Advertisements not DIRECTLY related to the list topics... 5) Attached Files... 6) Oversized Posts... (May be edited to save room) **************************************************************************** This publication is copyrighted and is protected by U.S. and International copyright law. The information transmitted on this list may not be reproduced, reposted or forwarded to any non-list member without expressed written permission of the List Owner. Violation of U.S. copyright law is a criminal and civil offense... **************************************************************************** The Surveillance List is moderated by SpyKing@thecodex.com The List Owner will make EVERY effort to protect subscribers from spam... Copyright 1996, 1997 Codex Publishing Inc., All Rights Reserved... **************************************************************************** Vol 2 Issue # 111 ****************************************************************************** Vol.Two Issue #111 The Surveillance List May 16,1997 Over 1900+ Members Worldwide Representing 42 different countries ****************************************************************************** IN THIS ISSUE... ****************************************************************************** 01) Re: Surveillance Software? 02) Back Issues & the FAQ 03) What a fantastic lock pick 04) Re: List chat anyone? 05) PowWow 06) BadCoffee's Buying ;-) 07) Re: The Surveillance List Chat 08) Re: Restitution 09) Re: Conventions 10) Re: Magnetic Card Reader/Writer 11) Re: Anonymous E-Mail 12) Re: Magnetic Card Reader/Writer 13) Re: Convention 14) LPIA-NALI Professional Development Seminar 15) Re: Equipment Questions 16) Re: Anonymous E-Mail 17) EARTH CAM UPDATE ****************************************************************************** DON'T BE A LURKER.... GET INVOLVED... YOU ARE A MEMBER... MAKE THE MOST OF IT ****************************************************************************** 1)From: "KcW" Subject: Re: Surveillance Software? What you propose is definitely possible. Actually, it is a fairly uncomplicated programming exercise. Try to find someone who programs and give them the following info on your target: operating system, normal hours of usage and any tsr's they run. Do they turn off their PC when not in use? Do they use any telephone monitoring software (like Delrina Comm Suite)? Are they on a network? Any decent programmer can readily hook the keyboard interrupt and intercept keystrokes and store them in memory (so as not to flash the hard drive LED) or on disk. The program would kill the modem's loudness (ATL0M0), dial your target at a specific time and download the keystroke queue. If you wish this all to happen in real time (as the user is performing the keystrokes) then there will be a LOT more problems to worry about (what if they want to use the modem and you have it online for instance). I have written software that performs all of these functions (although admittedly not all at the same time) and recommend either Microhelp's Comm VBX (tough to find) or Crescent's Com VBX for Visual Basic to handle all the communications stuff. You will, naturally, have the program call a neutral number won't you? As well, if you have enough access to put this software on the machine in the first place, why not install a keystroke queue routine and just periodically copy the file? Saves a lot of hassle. Greetings to the list! Ken Wood KcW Custom Communications ************************************************************************** 2)From: SpyKing@thecodex.com Subject: Back issues & the FAQ The Surveillance List archive is available by e-mail if any new (or old) list members want it. It is currently 2.26 Megs (927 pages) and is current to last issue. We are currently working on the FAQ and need your input. If anyone wants to help, contact me directly... ************************************************************************** 3)From: BADCOFFEE@aol.com Subject: What a fantastic lock pick <>>>>chuckle> A long time ago, in a life far, far away, I wasn't too bad >>>>>with bobby pins. But I was given to understand that most locks now are >>>>>too sophisticated for them. False info? Jenn, VERY FALSE INFO. In fact, I picked up a bobby pin the other day and said...hmmmmmm, what a fantastic lock pick. (really) Pull the wax tip off the end, straighten it out. It already has a little lip on the end. 2nd to a real pick. Hope that answered your question PS- NOT to you jen, but I WILL mention to a lot of people out there. During the comission of a crime, something as little as a bobby pin or paperclip bent "the wrong way" just added a seperate charge called "posession of burglary tools". You do NOT need a 400 pc pick set to be nailed for posession of burglariy tools. NOR can you go to jail for having a professional pick set if you have NO INTENT on using them in a comission of a crime. Not a lawyer, this is a carpenters advise. Augie ************************************************************************** 4)From: WindWalker Subject: Re: List chat anyone? Something I've seen that I think is cooler than chat is a message board. There seems to be a standard among them, so you should be able to find out how to set one up. Also, I have WWW.Chat on my site and think its okay. The URL for WWW.Chat is http://beseen.com/chat/ . -WindWalker ************************************************************************** 5)From: Ddraig Subject: PowWow Hey there SpyKing, I just set up PowWow and saw the last listing telling me that you were connected. I think this is a wonderful idea, to create a chatroom. +++Moderator's Note+++ Pow-Wow Seems fairly easy to setup and use. I always have it on at night and I'm available for chat USUALLY between the hours of 2200-0200 EDT... I don't think it will accomodate 1900 users in one chat room but I'll find out... ;-) ************************************************************************** 6)From: BADCOFFEE@aol.com Subject: BadCoffee's Buying ;-) Here is a good idea. What do you all think about having a get together? A list convention? I think this thing could actully work. Let me know what you think. :-) Coffee and cake at Bad's house. No charge, stay as long as you like. That's as close as were going to get. Let me know if any of you are going to any other conventions/seminars, I'll be honored to be there. :-) Your contact in North Jersey, Augie ************************************************************************** 7)From: "Lorenzo Castillo Sanchez" Subject: Re: The Surveillance List Chat >Suggestions for list chat? Best way? Time? Day? How often? Etc. >When online I generally run & minimize Pow-wow and have found it useful... >Any other ideas? I've been with the list group since the beginning and it's amazing to see that within 4 months we're already getting close to 2000. I think it was about 1100 in the beginning. It seems that we all come from international diverse backgrounds which means different time zones for different group of list members living in different continents around the world. Well, I think there are quite a lot of members in Europe and in USA. I was wondering if there were other members in Asia ? I've seen some members from Australia contribute to the postings. Anyone in the Far East ? :-) ************************************************************************** 8)From: BADCOFFEE@aol.com Subject: Re: Restitution In responce to willyum@super.zippo.com that wanted feedback on the $200 "restitution" paid to retail stores for shoplifters. Disney??? OH cummon! Mom and pop stores YES! A $20 lifting hurts them and a $200 restitution is warrented to make up for the ones that got away. Disney and other major outlets: This is another example of CORPORATE GREED. I'll bet you they are now "hoping" that shoplifting increases in their stores. I personally do not like it. Product goes back...shoplifter arrested and faces the criminal justice system. That makes more sence. Please.... Disney Reps here??? You tell me why I paid $46 dollars for a stuffed animal for my son??? Who's robbing who?? Yes........I'll back the bad guys on this one fellas..... NO restitution greater than value of item. Should be based on SIZE of company also. Augie ************************************************************************** 9)From: Michael Jenkins Subject: Re: Conventions There have been points for and against the convention, sorry to stir up such a hornets nest, I understand that some people are not able to attend for various reasons as have been outlined. Surely there are several P.I or Investigative conventions running in the states from time to time. It doesn't need to be advertised as the spook gathering of the century, in fact I agree that the whole concept should be kept confidential ( as best as possible) from persons outside the industry. The industry here in Australia is very different, we are many years behind in crime and terrorism, however I have worked in the USA, EUROPE and several other places on highly confidential assignments, to this date my identity has never been placed in jeopardy, Anyway for those who wish to attend, Great ! Those who dont, far enough no hard feelings. I'll be there anyway. P.S If anyone goes to the convention simply to take my photo, please email me and Ill send you an autographed picture ! M Jenkins ************************************************************************** 10)From: xhq@juno.com (Midnight Coder) Subject: Re: Magnetic Card Reader/Writer These are common items for use with inventory/customer point-of-sale systems. Try a company called Americam Microsystems 800.648.4452 - if they don't have it, they might be able to direct you. I know they have readers, and I can see how many applications would require read/write capability, so they might have those too. MC ************************************************************************** 11)From: "Anton L. Bevington" Subject: Re: Anonymous E-Mail >Can someone tell me whether we can send e-mail to anyone without >displaying our e-mail address? And if we can disguise our e-mail >address, can someone find ways to identify it? Thank you. Why not use an anonymous account? You can get semi-anonymous e-mail accounts through Hotmail and Rocketmail. Or you can set up a more secure account with nym.alias.net and route it through several servers. Easy set-up info can be found at: http://www.stack.nl/~galactus/remailers/nym.html. If you want to just send mail anonymously without being able to receive, route it through one of the anonymous servers found here: http://www.cs.berkeley.edu/~raph/remailer-list.html. Ok, are you happy Mr. SpyKing? I am no longer a lurker. ;-) +++Moderator's Note+++ Sure I am... You gave something back to the list ;-) Don't you feel better? Tomorrow you're gonna have a good day... food will taste better, beautiful women will smile at you, etc. and just because you stopped lurking... ************************************************************************** 12)From: "KcW" Subject: Re: Magnetic Card Reader/Writer Try Mag-Tek. 310-631-8602 1-800-788-6835 Also, try searching on "smart card" and follow the links. KcW ************************************************************************** 13)From: "N. J. myer-smith" Subject: Re: Convention Hi, I've been 'lurking' for a while now, but I would welcome the opportunity to attend a convention. I admit that I'm a novice but I am willing to listen and learn. Myersmith (Germany) ************************************************************************** 14)From: "JULIUS \"Buddy\" and LIZCA S BOMBET" Subject: LPIA-NALI Professional Development Seminar Visit http://www.intersurf.com/~lpia/laLeg2.htm for details on the joint LPIA - NALI Professional Developpment Seminar & Convention in the New Orleans French Quarter, September 11-13, 1997. -- Your LOUISIANA Connection Bombet, Cashio & Associates http://www.bombet.com ************************************************************************** 15)From: "KcW" Subject: Re: Equipment Questions On the headgear, go to the library and check out Popular Electronics Feb 1997, page 30. Supplier: Computer Products and Services Inc. 703-631-6925 Man, I knew that gift subscription would come in handy some day. KcW ************************************************************************** 16)From: Trace Carpenter Subject: Re: Anonymous E-Mail >Can someone tell me whether we can send e-mail to anyone without >displaying our e-mail address? And if we can disguise our e-mail >address, can someone find ways to identify it? Thank you. You can take your address out of most of the browsers and it will not post, however you still transmit your identity to the server. You may want to use a remailer which takes your mail and resends it. They are all over the web and you may want to visit www.anonymizer.com. -- Trace Carpenter 214.828.4520 214.740.0112 Facsimile ************************************************************************** 17)From: "Shadow Chasers" Subject: EARTH CAM UPDATE Having stepped into the private sector after 10+ years in the "GAME" have had to make allowances for my own surveillance equipment. 1 piece of equipment that I find very both useful and cost effective for remote surveillance is EARTHCAM; a $700 dollar self-contained unit allows for plug-and-play usage--a digital capture chip, 28.8K modem and transfers at 3-4 FPS over standard telephone lines to your PC. Using a TRJ solves the sound issue. I have removed the EarthCam from it's original shell and placed into one of my design. Each camera comes with a security number which affords access to the camera only to those individuals you choose. I have been field testing the Earthcam for the last 4 months for all of my surveillance needs. Reducing significantly the amount of time and money to conduct a surveillance op, the EartchCam has allowed me to pass the savings onto my client base, which keeps them coming back! I can monitor from either my office, home or while mobile via celluar modem! Obviously not the best surveillance equipment in the industry, but to those starting from fresh from using provided "high-tech" surveillance equipment from their previous employers, is a low cost, effective means of surveillance. Those interested in the specs of EarthCam, check: www. earthcam.com SHADOW CHASER ************************************************************************** Who are you? What's your specialty and/or interest? Let us know about your company... What would you like to see on the list? Post it. Let us know... Do you have something to contribute? We'd like to hear it... We want to know EVERYTHING and ANYTHING about eavesdropping, surveillance, countersurveillance & privacy related technology, etc... Remember: who, what, where, when, how & why... we want ALL the details... Do you have a question? Post it... A little free time? Help a member... With the INCREDIBLE brain power on this list, someone should have the answer ;-) P.S. Don't be a LURKER... Members take the time to post info for us all... give something back... Don't just take... Your input/knowledge is valued... ************************************************************************** Send Postings to: spyking@con2.com with "Post" in subject field with subject ************************************************************************** Subscribe to: spyking@con2.com In the subject field type: subscribe-surveillance list e-mail address ************************************************************************** Unsubscribe to: spyking@con2.com In the subject field type: unsubscribe-surveillance list e-mail address ************************************************************************** ...The Simple Rules of the Surveillance List... The Surveillance List Owners may Reject any posts that are/contain: 1) Info Unrelated to Eavesdropping, Surveillance or Privacy technology... 2) Flames or Negative posts... 3) E-Signatures that are considered excessive... 4) Advertisements not DIRECTLY related to the list topics... 5) Attached Files... 6) Oversized Posts... (May be edited to save room) **************************************************************************** This publication is copyrighted and is protected by U.S. and International copyright law. The information transmitted on this list may not be reproduced, reposted or forwarded to any non-list member without expressed written permission of the List Owner. Violation of U.S. copyright law is a criminal and civil offense... **************************************************************************** The Surveillance List is moderated by SpyKing@thecodex.com The List Owner will make EVERY effort to protect subscribers from spam... Copyright 1996, 1997 Codex Publishing Inc., All Rights Reserved... **************************************************************************** Vol 2 Issue # 112 ****************************************************************************** Vol.Two Issue #112 The Surveillance List May 17,1997 Over 1900+ Members Worldwide Representing 42 different countries ****************************************************************************** IN THIS ISSUE... ****************************************************************************** 01) Surveillance List FAQ 02) Other Anonymous WWW Surfing Sites 03) Re: Magnetic Card Reader/Writer 04) Spy people on the Net 05) SFIA Journal 06) Re: Bad's Buying 07) Re: Convention 08) Re: I've got a snoop!! 09) Re: I've got a snoop!! 10) Re: Restitution 11) Out of the closet 12) Get past a bounce script? 13) Re: CHAT 14) AUTO REPO BUSINESS 15) Re: Equipment Questions ****************************************************************************** DON'T BE A LURKER.... GET INVOLVED... YOU ARE A MEMBER... MAKE THE MOST OF IT ****************************************************************************** 1)From: SpyKing@thecodex.com Subject: Surveillance List FAQ We need the list's expertise to help with the FAQ... This is a working directory for the FAQ. What do you think list? Additions? Deletions? Sub-chapters? THE SURVEILLANCE LIST FORUM - FAQ Beta .01 CONTENTS 01) INTRODUCTION 02) ELECTRONIC SURVEILLANCE - AN OVERVIEW 03) MICROPHONES AND HARDWIRING 04) RADIO TRANSMITTER BUGS 05) EXOTIC LISTENING DEVICES 06) AUDIO RECORDING DEVICES 07) LISTENING THRU WALLS 08) RECEIVERS, SCANNERS & INTERCEPTORS 09) THE PHONE COMPANY 10) TELEPHONE INTERCEPTION 11) PREMISES MONITORING THRU THE TELEPHONE 12) CELLULAR PHONE INTERCEPTION 13) PAGER, FAX AND DATA INTERCEPTS 14) VIDEO SURVEILLANCE 15) NIGHT VISION 16) VEHICLE/PARCEL TRACKING 17) SURVEILLANCE PHOTOGRAPHY 18) COMPUTER CRACKING 19) TEMPEST 20) INFORMATION TRACKING 21) DETECTIVE DATABASES 22) LOCKPICKING 23) AUDIO/VIDEO TAPE ENHANCEMENT & AUTHENTICATION 24) SOFTWARE OF INTEREST 25) TSCM 26) SOURCES OF EQUIPMENT We want to compile a tutorial on these topics aimed at the novice and professional alike. It has been my experience that even seasoned security professionals are sometimes not "up-to-par" on a variety of investigative skills. Just because an investigator might be skilled at "skip-tracing" or "physical surveillance" doesn't mean he/she knows how to "wire" an undercover or setup a surveillance camera...or even what equipment to use or where to get it... likewise someone skilled in computer investigations might not know how to use a night scope or how to attach it to a 35mm or video camcorder... Where infomation is available on the web we will not attempt to duplicate (if info is correct) but advise members as to the location or URL. The second purpose of this FAQ is to answer common repetitive questions posed by list members. Contributors will be given full credit when the FAQ is finished and posted... If you have a specialty and would like to share your knowledge in a "How-to" with the list, I urge you to contribute... we have a LOT of pros on this list who are lurking... dazzle us with your brillance... or forever keep your trap shut when someone else does... ;-) Contact me to coordinate what you will contribute and your background in that subject... and we'll get the best minds working... ************************************************************************** 2)From: m3.sweatt@autodesk.com Subject: Other Anonymous WWW Surfing Sites I have bookmarked and used the "anonymizer" web site which allows you to surf the web without revealing any personal information. I was wondering if anyone knows.. 1) of other sites like http://www.anonymizer.com/ 2) if there is an automatic utility or plug in (other than the off-line DeCookie) to keep your cookies file empty or anonymous 3) of a cookie editor which allows you to enter or track information passed to and from the cookie. Thanks for your input! ---M3 ************************************************************************** 3)from: militant@goodnet.com Subject: Re: Magnetic Card Reader/Writer Simon: Spy Head Quarters in phoenix,az carries them, not sure for how much. The MiLiTaNt **************************************************************************** 4)From: SpyKing@thecodex.com Subject: Spy people on the Net I found this on Usenet and thought it of interest to the list. It was also contributed by: gaugusti@hqgbcs.attmail.com (Grant Augustine x4058) alt.technology.misc From: benh@hotmail.com (Future-NET) Subject: Spy people on the Net I present here my two most recent software which I hope they interest you. they are progammed by Turbo C++ and run under Windows(3.11 and 95). here is a short description of these two software. 1-Robot Spy 1.0 at my knowledge, this software is the first and the unique of its kind. This software allow you to spy your friends who are on the net at the same time of you, it permits to see exactly what they do on their screen, pixel by pixel, anywhere, in the world, at the condition they are connected to the internet. how does-it work? it's simple, you send a file to the person you want to spy telling to him it's a game or everythings else, the objectif is this person run the file. from this time, a batch file is installed on his computor, and everytime this person use internet, this batch connects him secretly on our server. on your side, you , after the installation of the other part of the software every time you want, you can connect on our server with your password and have the list of all the persons who received your batch and who are connected at this time. the only thing you have to do is to click on the name of the person you want to spy. a window opens containing exactly the screen of the person spied, you can have ten pictures per second with 256 colors, if you switch to balck and white mode you can onbtain a real time sequence, approximatly 30 pictures by second. Robot Mailer 1.1 The message you are reading presently is sent to more then 20,000 newsgroups with this software. This program automates FreeAgent, and reach with a connection of 28,8 Kbauds 5,000 news per hours. It can also find a maximum of 50,000 e-mail adresses from internet and send a message in 4 or 5 hours. You can obtain with this sofware the most powerful tool of mass transmittion on the internet. Robot Spy 1.0..................20 US$ Robot Mailer 1.1..............20 US$ Both..................................30 US$ I'm sorry i can't accept credit card, but you can send an international money order to: Ben Hedi Nassef 1481 Ste-Catherine est #7 Montreal, PQ, H2L-2H9 Canada Don't forget to include your e-mail on a paper, you receice the software ordered in your e-mail the day we receive the money order. <<<< ************************************************************************** 5)From: Gary Cohen Subject: SFIA Journal The SFIA Journal page has been updated with excerpts from our May issue. An editorial by our President, Gene Schuler, discussing pricing by PI's and other security professionals and an excellent article by CJ Bronstrup regarding magnetic striping on ATM and credit cards. Thanks to CJ of Atlas Information Systems, to Merlin Information Services, and Security Management Investigations of Canada for advertising in the SFIA Journal. We really appreciate it. We have a special on business-card size ads in the Journal...5.00 a month (30.00/6 months) or 50.00 a year. Where else can you get good exposure for so cheap? We also highly appreciate all the fine article submissions we've gotten, and keep 'em coming! Follow the links from http://www.webcircle.com/users/sfia/ Gary Cohen Investigator International Investigative Associates Ft. Lauderdale/Pompano Beach Florida (954) 726-9685 Pager (954)409-5599 heatgain@mindspring.com Member-FALI & SFIA http://www.geocities.com/WallStreet/5963/ SFIA - http://www.webcircle.com/users/sfia/ ************************************************************************** 6)From: Trace Carpenter Subject: Re: Bad's Buying Coffee & cake at Bad's house??? No Charge?? Have you ever seen tech's eat? I'll try to get there a day ahead of time to set up all the extra phone lines you'll need for the laptops. Trace Carpenter 214.828.4520 214.740.0112 Facsimile ************************************************************************** 7)From: Trace Carpenter Subject: Re: Convention >P.S If anyone goes to the convention simply to take my photo, please >email me and Ill send you an autographed picture ! > >M Jenkins LOL, Now here's a guy who has it in perspective! If I can get free, I'll be there. If anyone wants to meet in Dallas, I'll be here. ************************************************************************** 8)From: CrACKeD Subject: Re: I've got a snoop!! > I got a little problem and was wondering how I should deal with it. > I'm a teachers assistant with one of my local high schools and manage a > computer network. In one of the class's there is this kid who is really > any Ideas? Probably, but not with the information you gave the list. You need to specifiy your hardware type, operating system, network software, and the software the "attacker" was using. Give us details like version numbers wherever possible. A patch or fix may exist to stop this guy from playing around, but just like a new pair of denim jeans, there's no "one size fits all" patches (software patches, that is) out there. CrACKeD ************************************************************************** 9)From: Mutter Subject: Re: I've got a problem > I got a little problem and was wondering how I should deal with it. > I'm a teachers assistant with one of my local high schools and manage a > computer network. In one of the class's there is this kid who is really > smart but I have to keep a really good eye on. > any Ideas? > > Thanks in advance, > > Jose A. Duarte My personal opinion is that if you spend your time trying to figure out how to "get back at" a highschool kid for capturing passwords on a high school LAN where no "really important info" is stored then I think you've got bigger problems to worry about ... Personal eperience tells me that kids like to fool around with computers. As long as he's not damaging anything, I'm sure you could afford to turn your attention elsewhere... (perhaps teaching?) Or, if you are really intent on stopping this "really smart" kid why not (here's a novel approach) tell him to stop... - M u t t e r Ed. root zine (http://www.openix.com/~mutter) mutter@openix.com ************************************************************************** 10)From: Willie Teasley Subject: Re: Restitution I know you and I talked privately about this and I am glad to see it brought up here as well. Okay, I do not agree with this (and many other laws) but a WWW search indeed revealed it as a fact. In fact, Texas seems to have some type of similar law with regards to wildlife and hunting. Now for reality, I am not as rich as I would like to be and in Oklahoma, PI's want a tracker no larger than a quarter that will superimpose a map and GPS location on the full color video returned. Once I can deliver this in their $10.00 budget, I am set! If however, I can contact Mr. Corporate (and Mrs. Mom-N-Pop), work out a deal with increased "recoveries" from my equipment .... everyone stands to profit at the expense of the would-be (or successful) criminal. ************************************************************************** 11)From: BADCOFFEE@aol.com Subject: Out of the closet Last issue the Moderator wrote about a lurker that came out of the closet.....: >>>Tomorrow you're gonna have a good day... food will taste better, beautiful women >>>will smile at you, etc. and just because you stopped lurking..." Mr. Moderator.......I have to disagree. Each time I make a post-----> Beautiful Woman run away from me I have attacks of Verps (vomit burps) I gain 12 pounds I loose another tooth and one of my glass eyes pop out. Nose hair grows more rapidly Still looking for the chicks. (now doin 4 minute mile away from me). My voice squeeks My nose whistles Making posts also USED TO, but no longer: (to me at least) Gave me VD Atracted head lice Gave me crabs Made hairy warts grow from my palms (got medication) and cause other things to happen that I can not mention for they are real gross! I'm a tough one eh? :-) This place will kill me one day :-) Augie Badcoffee@aol.com +++Moderator's Note+++ Augie, this is not caused by posting to the list. Your symptoms are caused by execessive and compulsive mental masturbation. I have no doubt you will BEAT this thing (the compulsiveness Augie, don't beat anything else)... ;-) If you do, please visit http://www.thecodex.com/fessup.html and tell the world all the sordid details... ;-) P.S. You can also just sit back, kick off your shoes and sing along... ************************************************************************** 12)From: "Steve Bishop" Subject: Get past a bounce script? Would like to know if anyone has any way to get past a bounce script or how to change our bounce shell to a bash shell. mindbomb ************************************************************************** 13)From: "John " Subject: Re: CHAT Anyone on this list is welcome to visit our website where we have our own 'chat room' just for guys like us. Follow the link on our home page (Open 24hrs) http://www.qpage.com/host/pba.shtml Regards, XSAS PS. Give the 'chat' time to load!!!!! ************************************************************************** 14)From: BADCOFFEE@aol.com Subject: AUTO REPO BUSINESS Could someone fill me in please on how this business works. Details are critical, need knowledge, quickly. Making review of my future options here and I am looking at a LOT of possibles. Repo's just seem too easy and I need to know....."what's the catch?" (besides getting shot at) How is this business as far as payment? Does it have a "rep" as a pull tteeth to get paid? More you tell me.....better :-) Locksmiths: There's a sidebar in ingnition locks isn't there? :-) "Something" is definately there. Can't seem to find a auto-lock web site, is there one??? Out of time:-) Augie ************************************************************************** 15)From: CrACKeD Subject: Re: Equipment Questions > And i got a PRO-38 scanner from a yard sale it works but i want to know > if i got ripped off. I paid $50 U.S. for it. It works fine. How many memories? What frequency range(s)? > This compny sells a RF direction finder. Take a look here and tell me if > i should get this! It seems to be cool. Also look at the other stuff > they have. http://www.radio-ware.com/rdf.html That's fine, but it's really an entry-level kit most serious folks wouldn't bother playing with. Check out the RDF units sold by Doppler Systems (6024889755). They're used by professionals as well as serious amateurs who want to get a bearing and find what they're looking for fast. CrACKeD ************************************************************************** Who are you? What's your specialty and/or interest? Let us know about your company... What would you like to see on the list? Post it. Let us know... Do you have something to contribute? We'd like to hear it... We want to know EVERYTHING and ANYTHING about eavesdropping, surveillance, countersurveillance & privacy related technology, etc... Remember: who, what, where, when, how & why... we want ALL the details... Do you have a question? Post it... A little free time? Help a member... With the INCREDIBLE brain power on this list, someone should have the answer ;-) P.S. Don't be a LURKER... Members take the time to post info for us all... give something back... Don't just take... Your input/knowledge is valued... ************************************************************************** Send Postings to: spyking@con2.com with "Post" in subject field with subject ************************************************************************** Subscribe to: spyking@con2.com In the subject field type: subscribe-surveillance list e-mail address ************************************************************************** Unsubscribe to: spyking@con2.com In the subject field type: unsubscribe-surveillance list e-mail address ************************************************************************** ...The Simple Rules of the Surveillance List... The Surveillance List Owners may Reject any posts that are/contain: 1) Info Unrelated to Eavesdropping, Surveillance or Privacy technology... 2) Flames or Negative posts... 3) E-Signatures that are considered excessive... 4) Advertisements not DIRECTLY related to the list topics... 5) Attached Files... 6) Oversized Posts... (May be edited to save room) **************************************************************************** This publication is copyrighted and is protected by U.S. and International copyright law. The information transmitted on this list may not be reproduced, reposted or forwarded to any non-list member without expressed written permission of the List Owner. Violation of U.S. copyright law is a criminal and civil offense... **************************************************************************** The Surveillance List is moderated by SpyKing@thecodex.com The List Owner will make EVERY effort to protect subscribers from spam... Copyright 1996, 1997 Codex Publishing Inc., All Rights Reserved... **************************************************************************** Vol 2 Issue # 113 ****************************************************************************** Vol.Two Issue #113 The Surveillance List May 19,1997 Over 1900+ Members Worldwide Representing 42 different countries ****************************************************************************** IN THIS ISSUE... ****************************************************************************** 01) Sidebar locks 02) Re: Equipment Questions 03) Other Anonymous WWW Surfing Sites 04) Re: Out of closet 05) Re: Civil Recovery 06) Re: Equipment Question 07) PLEASE READ THIS 08) Portable Power for Camcorder 09) How to ID my Callers? 10) Re: Surveillance Software? 11) 1-900 Numbers.... 12) Micro-chip that hears? 13) Dear Mr. Moderator 14) CB Jammer? 15) Security Camera VCR 16) Cookie control software 17) Re: Surveillance List FAQ / Conference 18) Hacking and Spying 19) The more enjoyable aspects of this business? 20) Where in the world is Spyking? ****************************************************************************** DON'T BE A LURKER.... GET INVOLVED... YOU ARE A MEMBER... MAKE THE MOST OF IT ****************************************************************************** 1)From: CChrist373@aol.com Subject: Sidebar locks To Badcoffe Augie, chevys have had sidebar locks in the ignition since they went into the steering column. Not sure on newer cars. I was taught on older cars a long time ago MC ************************************************************************** 2)From: "mage2" Subject: Re: Equipment Questions ok a pro-38 has 10 programible channels and the freq. ranges are 29-50mhz (VHF LO) 50-54mhz 136-144 144-148 148-174 406-450 450-470 470-512 That is what the book has in it. and no it is not modable to recive 800-900mhz. OK i know it is not the best but how bad is it for a newbie in scanning? i have found a "toy" that recives 800-950 bands and drops the freqs 400 mhz so say a 812 wound be on your scanner 412 so that the blocking thing cant stop you! so the 800-950 would come up on your scanner as 400-550mhz has any one heard of this and does it work? thanx mage =X 281.Texas.USA "Just Because Your Paranoid Doesn't Mean They're Not After You" K.S. ************************************************************************** 3)From: "M. J. Van Ham" Subject: Other Anonymous WWW Surfing Sites > 2) if there is an automatic utility or plug in (other than the > off-line DeCookie) to keep your cookies file empty or anonymous If you're using Netscape you can disable cookies, if you're using IE, I think the best you can do is ask IE to warn you every time, and then manually deny every cookie. ************************************************************************** 4)From: peter henss Subject: Re: Out of closet G'day all. It appears that lurkers are taboo. Well I am no more. I can't really add anything because I know very little but I have been jotting down sites and listening and learning. Who knows one day I may have useful info. But here's what Im interested in. Learning to lock pick (looking for picks without attracting Australian attention covert video protable cameras, anon email, basic hacking internet spying. Just learning of course, nothing more.. peter ************************************************************************** 5)From: Greg Caldwell Subject: Re: Civil Recovery Sorry Augie, but I just had to jump in on this one. (Besides, I was overdue to come out of my lurkshell) Civil Recovery exists in about 43 states, but most have fairly strict limitations on how it can be used and how it is collected. For instance, in Colorado the amount collected is equal to the replacement cost of the item(s) or $100, whichever is greater. Additionally, many states allow the store (or Civil Recovery Firm) to go after the parents of a minor. This obviously has pros and cons, but for first time shoplifters I know it can be an effective teaching tool. This presumes responsible parents, however. The purpose of Civil Recovery is a form of restitution. A letter is sent out to the perpetrator stating that "although payment of the demand has no bearing on the outcome of the pending criminal case, the plaintiff (store) will let the criminal court know that restitution has been paid. It is the "velvet hammer" used to get the thief to take some responsibility which the courts won't always do. >I personally do not like it. Product goes back...shoplifter arrested >and faces the criminal justice system. That makes more sence. As far as the use of the funds, many states require the store or victim to use these funds only in Loss Prevention areas; more cameras, security guards, whatever, so it actually is a way to reduce, not encourage, further thefts. Also, what happens when someone shoplifts something and it is destroyed or damaged? Just because the store got it back does not necessarily balance the scales. I think you know this next point in your heart. Most shoplifting is handled by the courts with simple probation, including for multiple offenses; "the courts are clogged, what good would jail time do, etc. etc." Unfortunately, if there is no (parental) punishment (in the case of minors) there is no incentive to quit stealing and it does escalate. Finally, when a shoplifter is caught, some jurisdictions keep the goods as evidence until court which can be many months. This has the effect of a further loss for the store; not being able to re-sell the merchandise and, in the case of seasonal goods, it completely prevents the store from recouping their losses. I would add only that my firm caught an embezzler who stole over $1 million from his employer. Do you know how hard it is to get the courts to order complete restitution? A federal court jumped to convict him of income tax evasion which gave the IRS everything it needed to go after his money. My client, in the meantime, could have spent more money suing him civilly and wound up with nothing since the government got theirs first. Sorry, I don't disagree with Civil Restitution. Otherwise, I do agree with everything you say. ;} Greg Caldwell Investigations & Security Consulting Colorado Sorry if this was a little long Spyking. Keep up the good work. . . ************************************************************************** 6)From: CChrist373@aol.com Subject: Re: Equipment Question Your Pro 38 is a bargain at $50.. They sold for $250. new. You have twenty memory channels ( look at your bank buttons and they are nember bank one is 1 - 20 etc, ) your frequencies are 30-54, 108-136, 136.05-174, 380-512, and 806-960 with a cellualar block built in. This block can be undone in 45 minutes BUT you better know how to work a circuit board and solder real well. You have to open up the unit and remove the boards to get to the one diode you need to snip to restore cellular. MC ************************************************************************** 7)From: RFrench274@aol.com Subject: PLEASE READ THIS AND OBEY! This message is originally from Keith Pavlick from the Office of Representative Wolf of the United States House of Representatives. Phone: (202) 225-5136 A destructive virus is spreading via Internet E-mail. Don't open any E-Mail with the subject line "Deeyenda". Delete it immediately. For more detail, please see below. ******************************VIRUS ALERT***************************** VERY IMPORTANT INFORMATION, PLEASE READ! There is a computer virus that is being sent across the Internet. If you receive an e-mail message with the subject line "Deeyenda", DO NOT READ THE MESSAGE, DELETE IT IMMEDIATELY! Some miscreant is sending e-mail under the title "Deeyenda", if you get anything like this DON'T DOWNLOAD THE FILE! It has a virus that rewrites your hard drive, obliterating anything on it. Please be careful and forward this e-mail to anyone you care about. >>Please read the message below. FCC WARNING!!!!!-------DEEYENDA PLAGUES THE INTERNET The Internet community has again been plagued by another computer virus. This message is being spread throughout the Internet, including USENET posting, E-Mail, and other Internet activities. The reason for all the attention is because of the nature of this virus and the potential security risk it makes. Instead of a destructive Trojan virus (like most viruses!), this virus referred to as the Deeyenda Maddick virus, performs a comprehensive search on your computer, looking for valuable information, such as e-mail and login passwords, credit card numbers, personal information, etc. The Deeyenda virus also has the capability to stay memory resident while running a host of applications and operating systems, such as Windows 3.11 and Windows 95. What this means to Internet users is that when a login and password are sent to the server, this virus can copy this information and SEND IT OUT TO AN UNKNOWN ADDRESS (it varies). The reason for this warning is because the Deeyenda virus is virtually undetectable. Once the virus attacks, your computer will be unsecure. Although it can attack any OS (Operating System), this virus is most likely to attack those users viewing Java enhanced Web pages (Netscape 2.0+ and Microsoft Internet Explorer 3.0+ which are running under Windows 95). Researchers at Princeton University have found this virus on a number of World Wide Web pages and fear its spread. Please pass this message on as soon as you get this message, for we must alert the general public at the security risks of this virus. ************************************************************************** 8)From: "Donald J. Zaroda" Subject: Portable Power for Camcorder Quick! I need suggestions for how to buy or build a negatively grounded 12-volt DC supply to a Hitachi VM-E510A, 8MM camcorder that will give 5 hours of recording time and be easily transportable by rucksack. I will be far from any auto-DC or home AC recharging station. Hitachi only makes a 1-hour battery for this unit (I don't feel like buying four more at $40 a pop!) A reliable camera shop showed me a 5-hour external camcorder power supply, but this camcorder doesn't accomodate it. I have the automobile cigarete lighter adapter/charger unit for the camera. To some degree, this thing also regulates the power from the automotive battery. I thought some of you might know a way to design an external power source (with a cigarette lighter terminal). Or, better yet, point me to an existing external battery pack that is compatable with this camcorder. I keep thinking that a small motorcycle battery could be used, if the problems of grounding, overheating, regulating and acid leakage could be solved at little additional weight and maximum safety, of course. (Some of these batteries weigh under 4 pounds.) Then there is the question of how much capacity would be needed? Is 56 amps enough, for example? Here are the camera's specs: (I don't know what they mean...) Power requirements: 6V DC Power consumption 5.4W (when recording) Operating temperature: 32F to 104F (0 degrees C to 40 degrees C) Format: 8mm Video signal: EIA standard NTSC color Tape speed: 14.3mm / sec Video input: 1.0Vp-p,75ohm Video output: 1.0Vp-p, 75ohm Audio input: -7.8dBs (316mVrms) Audio output: -7.8dBs (316mVrms) Scanning: 525 lines / 60 fields / 30 frames Req. min. illumination: 1lux Pickup device: 1/4" C.C.D. Lens diameter: 46mm (just in case you were wondering) Taking all suggestions for ready-made or home-made solutions. Thanks, Don Zaroda Zaroda and Company Video Surveillance ************************************************************************** 9)From: Lesa Becker Subject: How to ID my Callers? Hi, I got Caller ID a few months ago when I started getting hangup calls several times a day. The problem is, the caller's number shows as "unavailable." The phone company says this means the calls are from an area which doesn't have Caller ID or from a Centrex-type network. I let my answering machine screen my calls. This caller always listens to my machine message (which only gives the phone number and asks for a message to be left), then hangs up before the tone. So nothing registers on the answering machine, and only "unavailable" shows on the Caller ID box. Is there a better device or phreak-type method to determine where the calls are coming from? Even knowing the area code would help. ************************************************************************** 10)From: Ziv Dascalu Subject: Re: Surveillance Software? Hello, if the machine is connected to the network you don't even have to install a software on that machine, all you have to do is install a monitoing and a session logger on one of the machine on the network. AbirNet SessionWall-3 does this and you can install it on any windows 95 or NT machine(does not have to be a gateway or a server)you can download an evaluation version from http://www.AirNet.com Hope this helps Ziv -- SessionWall-3 offers an effective means of preventing employees or intruders from abusing the network. By monitoring all session traffic, it opens a unique window into how employees are using the network, and can pinpoint the need for defenses against outside threats = Get an EVALUATION COPY at = ************************************************************************** 11)From: net_security@geocities.com Subject: 1-900 Numbers.... A while ago someone posted a message about 1-900 numbers that will give you a dial tone and let you call from there. Thus, bypassing call trace and caller ID. Anyone knowing more about this, would you please post a little more detailed message about it or email me. Thanks in Advance Sincerely, gnu ************************************************************************** 12)From: "Lee Cabeza de Vaca" Subject: Micro-chip that hears? I have been a lurker for awhile and enjoying the discourse that has occurred within this group. The question I have is as follows: Does anyone know of a computer chip, that is small, capable of amplifying all types of sounds or a broad frequency range. It must have the ability to go from omni-directional to uni-directional . Let me say thank you in advance for the groups assistance on my question. Lee Cabeza de Vaca As far as we can disern, the sole purpose of human existence is to kindle a light of meaning in the darkness of mere being. C.G. Jung ************************************************************************** 13)From: JbarD Ranch Subject: Dear Mr. Moderator Thanks for a job well done. I enjoy the list very much. I respond whenever I feel I have anything of value to add. Although I understand the motivation for lurker bashing, I have to ask what would happen if all 2000+ members began to respond to every posting. Lordy, I believe your IP would have a fit. Knowledge is Freedom. Yours, Josef +++Moderator's Note+++ Thanks for the compliment. I wouldn't call it "lurker bashing", maybe just a subtle hint to get the list more involved... ;-) Regarding posts from the ALMOST 2000 members at once... Great... no problem... Let it happen... the more the merrier... We like to hear more than one opinion... ************************************************************************** 14)From: "Anton L. Bevington" Subject: CB Jammer? I visited an old friend just recently and encountered something very disturbing. The tenants below him talk on their CB constantly and it comes through on my friends stereo and telephone very loudly. He asked the tenants (and the landlord) to do something about the problem but they haven't. He said it has been going on for over 6 months now!! I don't think it is coming through the electrical system because the neighbors complain about it too. Anyway, I told my buddy there were several knowledgable fellows on the SpyKing list that could probably help him out. The Question: is there any way to JAM this guy so his shit just stops working??? If such a device is not available by retail, I will pay an industrious electrician to make it (a modest price of coarse). I think this whole thing bothers me more than my friend. :-) ************************************************************************** 15)From: Greg_Smith@matrixres.com Subject: Security Camera VCR Who has VCR's available designed to be attached to security cameras? I am looking for one of 3 features: 1) a time lapse VCR (captures and image every x seconds) 2) an endless loop tape for a regular VCR, or 3) a 24 hour or 48 hour VCR/tape combination so I can have a long period of time on tape. GREG SMITH email: greg_smith@matrixres.com ************************************************************************** 16)From: "Christopher Smith" Subject: Cookie control software I was wondering if anyone knows.. 1) of other sites like http://www.anonymizer.com/ 2) if there is an automatic utility or plug in (other than the off-line DeCookie) to keep your cookies file empty or anonymous 3) of a cookie editor which allows you to enter or track information passed to and from the cookie. I like Ziff-Davis' CookieMaster, which offers a variety of cookie management tools. You need to join ZDNet to get it at http://community.zdnet.com/hotfiles/exclusiv.cgi. Note also that most newer browsers will allow you to refuse cookies or notify you when they are written to your disk. This takes care of #2. I don't think anything will help you with #3, because cookies are generally encrypted to help prevent you from tampering with them and thereby confusing the site that issued them. _____________________________________ Christopher Smith. Chief Investigator Heartland Information Services, Inc. http://www.heartlandinfo.com ************************************************************************** 17)From: Greg Caldwell Subject: Re: Surveillance List FAQ / Conference It looks like you have a fairly complete list. Maybe add (new and used) to item 26 "Sources of Equipment". My only other suggestions would be to add a "Reference Material" section which could contain all of the books and publications that have been read, reviewed and recommended by other list members. OR, add specific publications to specific topics. Thought of several others, but they would/could fall under the headings you already have. With regard to a gathering. I am not opposed to it and, in fact, I could host it in Colorado which is "fairly" centralized. I have put on a similar conference in Keystone Resort years ago for INTELNET members. If done in the spring or fall (off season) prices can be more reasonable than Denver, particularly with the Summit of Eight and the bombing trial(s) going on in town. Hotels are at a premium. However, no matter where it is, if it is going to happen, someone needs to take some initiative, get some hotel room prices with discounts for an estimated number of people, figure out which list members want to make a presentation, get local presenters involved. (I think you would want it labled as a "seminar" with some educational value so that your expenses are tax deductable). Last but certainly not least, deposits have to be taken to determine who, if any, are really serious. My gut feeling is that there would probably be 10 - 20 people at the most who would attend. I am not casting negative aspersions on anyone; I am speaking from experience. People have to work for a living, some will end up in the middle of a case they can't interrupt, flight costs, hotels and meals are outrageous these days, family demands may prohibit attending or a spouse may want to come along. Now that I think about it, Colorado Springs may be the perfect place. You are at the base of Pike's Peak, it is a beautiful city with very reasonable airline ($89 from Chicago) and hotel rates. It is scenic, yet practical. I'm game. . .let me know. Greg Caldwell Investigations, Security & Consulting 303.331.2459 ************************************************************************** 18)From: CS CUSTOM Subject: Hacking and Spying "THE MOST EXTRAODINARY HACKING, SPYING AND PHREAKING CATALOG IN THE WORLD" http://www.cscustom.simplenet.com ************************************************************************** 19)From: "Gerard O. Hemmerle" Subject: The more enjoyable aspects of this business? Greetings to all, I've just left lurking behind and am asking am asking a very simplistic question of you. I am on the threshold of retiring from a dark side of "the game" and would like to continue along a lighter path. My application for PI licensing is in process. What are the more enjoyable aspects of this business, and how about some reflections on the prospects for the onset of the new millenium? Understanding one's need for privacy, what is the earnings picture? Your Newly, GOH ************************************************************************** 20)From: SpyKing@thecodex.com Subject: Where in the world is SpyKing? For those of you who have not broken the hidden message game at: http:/www.thecodex.com/cypher.html We've added a new game and another chance to win a FREE prize at: http://www.thecodex.com/game.html Use your noodle list... these are not THAT hard... and we're trying really hard to give out a few FREE prizes... ************************************************************************** Who are you? What's your specialty and/or interest? Let us know about your company... What would you like to see on the list? Post it. Let us know... Do you have something to contribute? We'd like to hear it... We want to know EVERYTHING and ANYTHING about eavesdropping, surveillance, countersurveillance & privacy related technology, etc... Remember: who, what, where, when, how & why... we want ALL the details... Do you have a question? Post it... A little free time? Help a member... With the INCREDIBLE brain power on this list, someone should have the answer ;-) P.S. Don't be a LURKER... Members take the time to post info for us all... give something back... Don't just take... Your input/knowledge is valued... ************************************************************************** Send Postings to: spyking@con2.com with "Post" in subject field with subject ************************************************************************** Subscribe to: spyking@con2.com In the subject field type: subscribe-surveillance list e-mail address ************************************************************************** Unsubscribe to: spyking@con2.com In the subject field type: unsubscribe-surveillance list e-mail address ************************************************************************** ...The Simple Rules of the Surveillance List... The Surveillance List Owners may Reject any posts that are/contain: 1) Info Unrelated to Eavesdropping, Surveillance or Privacy technology... 2) Flames or Negative posts... 3) E-Signatures that are considered excessive... 4) Advertisements not DIRECTLY related to the list topics... 5) Attached Files... 6) Oversized Posts... (May be edited to save room) **************************************************************************** This publication is copyrighted and is protected by U.S. and International copyright law. The information transmitted on this list may not be reproduced, reposted or forwarded to any non-list member without expressed written permission of the List Owner. Violation of U.S. copyright law is a criminal and civil offense... **************************************************************************** The Surveillance List is moderated by SpyKing@thecodex.com The List Owner will make EVERY effort to protect subscribers from spam... Copyright 1996, 1997 Codex Publishing Inc., All Rights Reserved... **************************************************************************** Vol 2 Issue # 114 ****************************************************************************** Vol.Two Issue #114 The Surveillance List May 20,1997 Over 1900+ Members Worldwide Representing 42 different countries ****************************************************************************** IN THIS ISSUE... ****************************************************************************** 01) Alarm Techs 02) Re: CB Jammer? 03) Re: CB Jammer 04) Re: Please Read This and Obey 05) Portable Power for Camcorder 06) About the Deyenda "Virus" 07) Re: Cookie Control 08) Intern 09) Encryption Contest 10) Re: PLEASE READ THIS (virus warning - hoax) 11) Virus alerts 12) I messed up the other day 13) Re: Other Anonymous WWW Surfing Sites 14) Re: Frank Gifford 15) "Program using quickcam to catch burglars" 16) Re: C.B. Jamming 17) Re: Handcuff locks; locksmith licensing 18) Re: Need a battery 19) Re: "PLEASE READ THIS AND OBEY!" 20) Re: CB Jammer 21) For the right answers 22) Response to CB Jammer 23) Re: Camera Supply 24) Re: PLEASE READ THIS AND OBEY! ****************************************************************************** DON'T BE A LURKER.... GET INVOLVED... YOU ARE A MEMBER... MAKE THE MOST OF IT ****************************************************************************** 1)From: BADCOFFEE@aol.com Subject: Alarm Techs Several questions: 1- Do magnetic door contacts work off reverse polarity? 2- If an alarm keypad is located inside a dwelling, what is the usual pre set delay. 3- Motion sencors.....heat or motion? Or different kinds for different applications? 4- Is there a visual difference visually between open and closed circut? Mr. Moderator, are we covered under our second amentment rights on this news forum? Is there a liability issue here? Thanks! :-) PS- Coffeman with 3 of 4 strikes for over-qualified resume on PT internal security positions today. :-) Oh well, there's allways tomorrow. The fourth.....just looked at me with no response. NJ professionals: PI's, security companies- Give me a pop. Let me forward you a resume via e-mail. P/T, 3 days, on call, special sit's, money not an issue. Augie ************************************************************************** 2)From: "Russel C. Eckert" Subject: Re: CB Jammer? The least expensive/most effective CB Jammer I have ever seen is a simple straight pin. Perform the following while you are CERTAIN that the transmitter will not be activated as you are working! Find the transmitters antenna lead. Press the pin gently through the insulation of the lead. With the point of the pin feel for the solid center conductor. Push the pin all the way through the antenna wire while making sure that it rubs against the center conductor. Stand by and wait for the smell of frying circuit board! ************************************************************************** 3)From: Rick Dixon Subject: Re: CB Jammer A few years back a friend had a similar problem with a neighbor who was running a CB with about a 500 watt linear amp setup. It caused all kinds of problems, including sound coming out of an electric organ which wasn't even on. Following an "anonymous" suggestion, he waited until his neighbor was gone to work and walked over to the tower the guy had his antenna array on and stuck a small needle in through the coax making sure to hit the center conductor and then broke it off flush with the cable. The next day the offending party keyed his mic and blew out the amp. He replaced the amp and blew another before finally giving up on the CB hobby. Now of course this requires access to the antenna cable. Alternatively, acquiring/borrowing a CB rig and just keying the mic every time he tries to use his works pretty well (even better with a high powered rig). Of course the snitching to the FCC might work although I don't think they treat that with too high a priority. Legally, the landlord is obligated to provide you with some measure of peace and quiet in most localities, although I have always preferred the quiet, "Allen Funt" approach (somewhere, sometime, when they least expect it) myself. Good Luck. P.S. An arc welder puts out some pretty strong signals that will jam about any radio signal nearby although it is kind of hard to use in an apartment. ************************************************************************** 4)From: dan@frezza.org (Dan Frezza) Subject: Re: Please Read This and Obey The Deeyenda virus is a hoax. Check this web site out: http://ciac.llnl.gov/ciac/bulletins/h-05.shtml Dan Frezza Dan Frezza PGP -- An envelope for your email PGP Key fingerprint =8C E2 78 50 24 80 D7 0C 64 29 D2 3B FE 4B C5 4E ************************************************************************** 5)From: CS CUSTOM Subject: Portable Power for Camcorder I keep thinking that a small motorcycle battery could be used, if the problems of grounding, overheating, regulating and acid leakage could be solved at little additional weight and maximum safety, of course. (Some of these batteries weigh under 4 pounds.) A sealed maintanance free motorcycle or (kids)big wheel battery with a regulated voltage power supply should do it. ************************************************************************** 6)From: Illuminati Primus Subject: About the Deyenda "Virus" A good explanation of this hoax (and several others) is on this page: http://ecco.bsee.swin.edu.au/text/virus/ciac-vir.htm Please help to stop the spread of misinformation. PD This is more like a virus that spreads through the exploitation of human psychology rather than computer systems. ************************************************************************** 7)From: WindWalker Subject: Re: Cookie Control One of the best cookie control programs I've seen is PGP Inc.'s CookieCutter. PGP CookieCutter can not only block cookies but encrypt them using PGP encryption technology. PGP has also bought up another company that developed a program called Internet Fast Forward, which has adaptive technology to block* ads as simple as LinkExchange to ones embedded in other wise free services, such as web-based email and search engines. (*Note: "block" in the sense that they do not waste your time downloading, but the site still receives credit for the hit. It's kinda like having a special TV that cuts out all of the comericals, but the companies paying the networks to show their commercials never know.) PGP plans to merge these two programs into one in the near future and estimates the cost of the program to be about $30. If you would find either of these enhancements to your web browser useful, I suggest buying it. PGP Inc.'s web site is http://www.pgp.com/ . PGP Inc. is owned by the developer of Pretty Good Privacy, Philip Zimmerman. This is not an ad. I just found the software very useful. -WindWalker ************************************************************************** 8)From: William Roche Subject: Intern Your Invitation to Register with Interns Global Register Database for the Investigative, Security and Intelligence Industry. Send your Registration via email to: wroche@sn.no Its FREE to register. Best regards Intern. ************************************************************************** 9)From: "M. J. Van Ham" Subject: Encryption Contest > For those of you who have not broken the hidden message game at: > http:/www.thecodex.com/cypher.html > Use your noodle list... these are not THAT hard... and we're trying really > hard to give out a few FREE prizes... Well, I've spent several hours now trying to find the hidden message, but have had little luck. So, I've decided to share what I've learned with the rest of the list in hopes that someone can use the knowledge better than I. Here goes: I'm nearly certain that the message is inside the codex logo .GIF file on the cypher page. For those of you that aren't familiar with the concept it's called Steganography. There are several links to info. pages on the Codex links page. Anyways, my reasoning behind this: I noticed that the logo file on the cypher page had a different name from the logo on the main page (the main page is: CODEX3D.GIF and the cypher page is CODEX3D1.GIF). That seemed a little odd to me. So, I saved both images and discovered that the logo on the cypher page was about 3k larger than the logo on the main page. Also odd. So, I loaded both images into Paint Shop Pro looking for discrepencaies, and found only one. Both images are exactly the same size, etc. but the number of colours was different. While I was puzzling over this I happened to stumble upon some information concerning Steganography. I thought to myself: 'Cool, I just won myself a tiny camera'. However, I haven't been able to find the message in the .GIF file. There are several different programs available for hiding data inside .GIF files, and I haven't a clue which one SpyKing used. I did try several (including: s-tools, hide seek (v3.1, 3.5, 4.1, 5.0), Steganos, and some others I can't remember). But I had no luck. All of the programs offer the option of using a password to secure the data, and I did try several with each program (codex, thecodex, spyking, etc.), but had no luck. I did not by any means exhaust every possible password (but hey, this is supposed to be easy, right?), so to anyone who would like to try their hand at it, I recommend you download several steganography programs and get busy. Good luck! +++Moderator's Note+++ Just goes to show you that "anything man can invent, man can defeat"... But is SpyKing beaten yet? Has "M. J. Van Ham" won himself a FREE pinhole camera? Take a look and see if he's right... and if he is... maybe he should keep going and not give up so easily... he just might find something, crack the code and decypher the hidden message... ;-) ************************************************************************** 10)From: "M. J. Van Ham" Subject: Re: PLEASE READ THIS (virus warning - hoax) >7)From: RFrench274@aol.com >Subject: PLEASE READ THIS AND OBEY! > >This message is originally from Keith Pavlick from the Office of >Representative Wolf of the United States House of Representatives. >Phone: (202) 225-5136 > >A destructive virus is spreading via Internet E-mail. Don't open >any E-Mail with the subject line "Deeyenda". Delete it immediately. For >more detail, please see below. The Deeyenda virus (AKA Good Times virus) is a hoax. For more info see: http://www.symantec.com/avcenter/data/deeyenda.html ************************************************************************** 11)From: Chris Kuethe 768 Subject: Virus alerts concering any and all of those virus alert emails: please delete them. don't forward them. if you must warn us check with CIAC first and then point us to their warning. if they say the FCC issued a warning. those are hoaxes. bad ones at that. the FCC did not issue the warning. the FCC has nothing to do with the internet. CIAC (computer incident advisory capability) does. don't post a warning without their PGP signature. it's available at http://ciac.llnl.gov/ y'know those virus warnings are viruses. they feed on helpless net.neophytes, they spread, they mutate to survive, and they are useless if not harmful. -- Chris Kuethe LPGV Electronics and Controls 'finger -l ckuethe@gpu.srv.ualberta.ca' for pgp keys http://www.ualberta.ca/~ckuethe/ RSA in 2 lines of PERL lives at http://www.dcs.ex.ac.uk/~aba/rsa/ print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<> )]}\EsMsKsN0[lN*1lK[d2%Sa2/d0 Subject: Re: Other Anonymous WWW Surfing Sites > > 2) if there is an automatic utility or plug in (other than the > > off-line DeCookie) to keep your cookies file empty or anonymous > > If you're using Netscape you can disable cookies, if you're using IE, I > think the best you can do is ask IE to warn you every time, and then > manually deny every cookie. Hey guys, write protect your cookie.txt file (make read only) and VOILA! ... no more cookies! Dark Lord Behemoth Ch'kar Brahma Lamma Lamma ************************************************************************** 14)From: WWMason@aol.com Subject: Re: Frank Gifford Could some of the PI's provide more insight to this soap opera? How does the video (taken by the PI) get in the hands of the media? Is it likely that the woman's husband (who hired the PI) ok'd the release of the video? Obviously the video is worth a lot of money. Who gets paid? Since the husband hired the PI, isn't the video his property? Could the PI lose his/her license for selling the video to the media without husbands permission? ************************************************************************** 15)From: sonnymac@postoffice.worldnet.att.net Subject: "Program using quickcam to catch burglars" To the group: I came across this program recently and forgot to bookmark the site.If anyone has the url please email it to me. Basically the program compares still photos looking for differ- ences and if I recall pages you.Thanks for any info. Bill Mcdonald ************************************************************************** 16)From: Trace Carpenter Subject: Re: C.B. Jamming You can jam his signal but guess what. You're only transmitting additional noise over the frequency which isn't going to help you. I know this isn't what you want to hear, but you're probably better off just buying a good filter. RadShk has them and their not expensive. ************************************************************************** 17)From: "Roper Carl A." Subject: Re: Handcuff locks; locksmith licensing "Government issue" handcuffs is a quezy term. USGovt purchases handcuffs just like any police dept., i.e., for a manufacturer. There is no particular difference in their handcuffs as with any other. "Over the counter" cuffs, on the other hand can be one of two types: first, the 'standard'cuffs that are a quality type, and second, a cheap knock-off like a pair that is 'made in Japan' and sells for $5-15.00. The latter type is not worth it. The first type is! In terms of keys there are only 2-3 out there. Any of these can be obtained from a number of magazine sources or walk in shops that sell "police/security-related" equipment. It used to be just a standard key opened the cuffs, but within the past 15 or so years, they have added a couple additional protective methods. What is interesting is that these methods are commonly known and the additional methods are just a factor in requiring more than one turn of the key to open the lock. Get to a standard security type store and you can pick up the various type keys for less that $30-40.00. You might also want to consider a set of handcuff lock picks; they can be made from a dozen or so hairpins. My set is becoming dusty from lack of use, but I always keep it [or at least a couple specific picks concealed on my person when I travel...just in case; reason here is that there are other persons besides law enforcement that may carry/use handcuffs. Somewhat infrequently used, but they have been used for criminal activities such as home/business break-in's. It's a lot easier to lock up the people in cuffs, then to have a person watching them while the home or business is being ransacked. Now as to other item relative to licensing for an "entry" specialist. There t'aint no such thing!! Depending upon the state involved, licensing occurs at the state, county, or city level. Sometimes, in more than one area. The ALOA [Associated Locksmiths of America] can point you in the right direction. I think they have a web site, but since I haven't been affiliated with them for several years, can't really say. The possession of lockpicking tools in just about every state requires a locksmithing license; it also requires a background check and bonding. As an ALOA member you have a ALOA minimum bond. Background check to ensure you don't have a criminal record. Depending upon state, you get a journeyman/beginner's license, work for someone else, and have a qualifying test taken. Note that auto reposession businesses and auto dealers have tools; they have a license to carry them, and are limited to when/here they can be used. Re your homemade locksmith license; depending upon the state you are stopped in, it won't work, and you are looking at a minimum of 5 years for possession of burglary tools!!!! [not the way to go, I'm sure]. As for being involved in construction company, you might get a carry&possession type license that would fall into the same realm as that of an auto repossession business. It won't be cheap, depending upon state, but may well be worth it. NY/NJ have the most stringent laws relative to possession of locksmithing tools; the burglary tool possession laws and penalties are not very good either if caught with them. NJ has one of the top three ALOA chapters in the USA; check it out!!! the contacts and advantages of being an ALOA member would outweigh the costs of joining and maintaining membership. AND they have a real snazzy state seminar each year in addition to numerous meetings and workshops where locksmithing professionals can teach you a lot!!! By the way, did you check out the locks & locksmithing book I spoke of a couple weeks ago? Also, check Soldier of Fortune magazine. Several advertisers there have lock books, handcuff keys, etc that would be of value to you. I could probably go on, but best stop for now. I've got so many irons in the fire that relate to the numerous subject of privacy, surveillance, eavesdropping, countersurveillance and other personal and professional security practices and technologies, it's hard to get time to respond, but when I do.... ************************************************************************** 18)From: Trace Carpenter Subject: Re: Need a battery Your problem was powering a camcorder. I've had the same situation and went to Batteries Plus here in Dallas, but there are similar stores everywhere. I took a 12 Volt gel-cell and hooked a cigarette lighter up to it. Then I can plug the car adapter in. I also use it for my GPS when I'm flying a plane which the cigarette lighter doesn't work. ************************************************************************** 19)From: "Robert C. Casas Ph.D." Subject: Re: "PLEASE READ THIS AND OBEY!" It is disappointing to see this post, here. Messages such as this are typically hoaxes as is obvious from the manner in which the alleged "virus" is described. This one is, without question, a hoax. See: http://ciac.llnl.gov/ciac/CIACHoaxes.html ). The "Deeyenda virus" has been known to be a hoax for quite a while. Robert Casas ************************************************************************** 20)From: "Arny Buckman" Subject: Re: CB Jammer The best CB jammer is available for free. While the CB band is essentially unregulated, CB users are not allowed to interfere with other services. Your interference problem may be partially your fault (any non-linear device will act as a detector and demodulate the RF carrier), the FCC almost always considers interference as a problem of the source. Send in a complaint to the FCC. I don't know how long they will take to respond but they can make the owner of the transmitter responsible for fixing your equipment. If you try to use some kind of RF jammer, you would find yourself in the same fix as the CB user - running an improper transmitter. When I was in school, I lived in a dormitory where the fellow downstairs would play his radio exceeding loud. His antenna line ran past my window. I wrapped a few turns of wire around the line and connected it to an old ignition coil and a six volt battery. It didn't do any damage but he found listening to his radio so unpleasant that he eventually turned it off or turned it down to the point where it didn't bother me anymore. Arny Buckman arny@ultranet.com ************************************************************************** 21)From: BADCOFFEE@aol.com Subject: For the right answers Greetings, Too long a search for a simple item....as usual, I end up turning to you guy's for the right answers........ Looking for a (program) combination calculator ( Win 95.) Example: If you go to a lottery agent and ask him to "wheel" 3 certain numbers, the "computer" prints out a ticket of all possible combination for the numbers you have chosen. It would be nice to have something also that is able to "wheel" my inputed numbers using a (I don't know) Tollarance?? EX- Give me me all possible combinations using a factor of 3. <------forget this part if i was't able to explain it properly. Hope EVERYONE is doing fine, Augie ************************************************************************** 22)From: rkidd@localnet.com Subject: Response to CB Jammer Anton, If you have repeatedly asked for this person to turn off or shield their CB and they have refused, I suspect you have no other alternative, but to respond to protect you friend's equipment. The best way to remedy your problem, which may be a permenant one, is to find the transmission antenna. With a transmitter operating, more likely than not, above the maximum transmission power authorized by the FCC for this bandwidth, your solution is quick, painless and the damndest thing to find. Place a finishing nail through the transmiiter cable connected to the antenna. Make sure the nail goes directly through the center-conductor of the cable, "Do Not Cut The Cable"!!!!!. When the party in question keys the transmitter, the resulting VSWR will shut down the front end of the unit. If the individual attempts to increase the power output, he'll blow up the front end of the transceiver. Rick Kidd Confidential Security Services (CSS) Association of Counter-Intelligence Specialists) ACIP ************************************************************************** 23)From: RetSheriff@aol.com Subject: Re: Camera Supply In reference to the question from Donald Zaroda about a 5 hour camera power supply there are several solutions. You can cascade several Gates 2 volt sealed lead acid batteries and build a belt. These batteries come in several different power or amperages. You may have to add several in parallel for current (amps) or in series for voltage. Your camera draws about 1 amp. To run your camera for 5 hours you will need to build a supply which can supply about 7 amps because a quicker discharge lowers a batteries ampere capacity. These are available from any good industrial electronics supply house. Another solution is to use a gel cell. These are available from electrical supply houses. One battery of the right voltage and current will do it. This may be your cheapest solution. Alarm equipment suppliers will have these in stock and although slightly more cumberson then the smaller Gates batteries, they are very pratical. You can by a charger with these batteries for only a few dollars more. You should be able to pich these up with the charger for about $50. Good luck. Jim Marino J. MARINO ASSOCIATES Private Investigators 203 MAIN STREET SUITE 245 FLEMINGTON, NJ 08822 Call toll free (800) 600-9551, or e-mail RetSheriff@aol.com Serving Private Citizens, Corporations, Law Firms, & Government Civil Matters, Major Crimes, Trial Prep, Fraud, Loss, Missing Persons, Background Checks Find us on the WEB in the Codex Mall: http://www.thecodex.com/mall/jmarino.html ************************************************************************** 24)From: John Boyd Subject: Re: PLEASE READ THIS AND OBEY! Mr French, et. al. Don't go off the deep end on this one. First of all, any message that starts either from the press, or anyone who's not a recognized authority on viruses should be viewed as questionable to start with. This message is about three months old as one of the variants to the 'Good Times' et. al. hoax that's already been through the net in the last few months. These things percolate out of AOL with regularity. As I'm sure most people on the list already know, your computer CANNOT become infected with a virus simply by reading the text of an email message. However, if the message contains enclosed files or program macros, and you are not absolutely certain of the sender, you'd be a complete fool to run them without checking them first. FYI, there are mailing lists, and at least two governement sites, one from CIAC and one from CERT devoted to providing current computer virus information and updates. I would have included that information here, but I didn't have it on this machine. When I get the info, I'll post to the list. But I did feel that it was necessary to squelch the initial histeria anyway. Regards... ---------------------------------------------------------------------------- "For every complex situation there will be a simple answer -- and it will be wrong!" Email: jboyd@bigfoot.com SnailMail: PO Box 45603 Tinker AFB, OK 73145-0603 GPS coordinates on request. Please send chocolate chip cookies. ************************************************************************** Who are you? What's your specialty and/or interest? Let us know about your company... What would you like to see on the list? Post it. Let us know... Do you have something to contribute? We'd like to hear it... We want to know EVERYTHING and ANYTHING about eavesdropping, surveillance, countersurveillance & privacy related technology, etc... Remember: who, what, where, when, how & why... we want ALL the details... Do you have a question? Post it... A little free time? Help a member... With the INCREDIBLE brain power on this list, someone should have the answer ;-) P.S. Don't be a LURKER... Members take the time to post info for us all... give something back... Don't just take... Your input/knowledge is valued... ************************************************************************** Send Postings to: spyking@con2.com with "Post" in subject field with subject ************************************************************************** Subscribe to: spyking@con2.com In the subject field type: subscribe-surveillance list e-mail address ************************************************************************** Unsubscribe to: spyking@con2.com In the subject field type: unsubscribe-surveillance list e-mail address ************************************************************************** ...The Simple Rules of the Surveillance List... The Surveillance List Owners may Reject any posts that are/contain: 1) Info Unrelated to Eavesdropping, Surveillance or Privacy technology... 2) Flames or Negative posts... 3) E-Signatures that are considered excessive... 4) Advertisements not DIRECTLY related to the list topics... 5) Attached Files... 6) Oversized Posts... (May be edited to save room) **************************************************************************** This publication is copyrighted and is protected by U.S. and International copyright law. The information transmitted on this list may not be reproduced, reposted or forwarded to any non-list member without expressed written permission of the List Owner. Violation of U.S. copyright law is a criminal and civil offense... **************************************************************************** The Surveillance List is moderated by SpyKing@thecodex.com The List Owner will make EVERY effort to protect subscribers from spam... Copyright 1996, 1997 Codex Publishing Inc., All Rights Reserved... **************************************************************************** vol 2 Issue # 115 ****************************************************************************** Vol.Two Issue #115 The Surveillance List May 21,1997 Over 1900+ Members Worldwide Representing 42 different countries ****************************************************************************** IN THIS ISSUE... ****************************************************************************** 01) How to I.D. my callers 02) Deeyenda is a hoax! 03) Hey Infonauts 04) Not wanting to lurk 05) Re: Portable Power for Camcorder 06) Re: Spectre-Press 07) FYI, the FCC doesn't issue virus warnings 08) Virus Hoax 09) Transmitting video +GSM +heeeelp 10) Re: CB Jammer? 11) Re: PLEASE READ THIS AND OBEY! 12) Re: Cobra lock pick tool 13) Re: Equipment Question 14) Deeyenda Maddick Virus 15) Re: Caller ID 16) Real Psychological Viruses 17) CB jammer 18) Does anyone know what this is? 19) Re: Cookie Control 20) Re: CB Jammer? 21) Checking out the market for scanners 22) Re: Licensing 23) Re: Scanners 24) 7 digit zip code 25) Computer's for the Gods 26) Re: Right Answers 27) I won! ****************************************************************************** DON'T BE A LURKER.... GET INVOLVED... YOU ARE A MEMBER... MAKE THE MOST OF IT ****************************************************************************** 1)From: Trace Carpenter Subject: How to I.D. my callers It can be done, but you may not want to go to the trouble. We set up a line sometime back on a case in which we had the phone company forward the Target line to out Trap-Line. A trap line is an 800 number which records all calls going to it. Since the switches have been up dated we haven't had to have the phone company do the switching. Last time we were able to use regular call forwarding. Trap lines will work regardless of what area the callers calling from. You probably don't want to purchase one, but I could give you a friend of mine in Colorado who rents his out from time to time. -- Trace Carpenter Trace Carpenter Investigations Professional Private Investigations 2926 Maple Ave., Ste. 200 Suspicions Confirmed Dallas, Texas 75201 Problems Solved ! 214.828.4520 Free Consultations 214.740.0112 Facsimile ************************************************************************** 2)From: Jim Youse Subject: Deeyenda is a hoax! The Deeyenda virus is a hoax. Visit Mcafee's web page for more info. http://www.mcafee.com/support/hoax/deeyenda.html Jim Youse - mailto:jyouse@omicron.com - http://www.omicron.com - mailto:jimyouse@prodigy.com - http://pages.prodigy.com/JimYouse ************************************************************************** 3)From: Silicon Subject: Hey Infonauts If you're willing to spend $20 (ok, $19.95) then you can look into Phillip Zimmerman and his gang's (http://www.pgp.com/) new product PGPcookie.cutter 1.0 which uses the following features for cookie control (in short): * Selective Blocking and Access - * Instant Delete - * Choice of Privacy Levels - * Noninvasive Cookie Warning - * Easy Viewing of Cookie Contents - * Identify Cookie Web Sites - * Cookie Man - While you're on-line, an icon on the browser tallies how many cookies Web servers have attempted to set. Currently only a WindowsNT 4.0 version is available, with Win95 coming soon. For ordering info check out: http://www.pgp.com/products/PGPcookie.cgi and for the complete run-down of features look into: http://www.pgp.com/products/PGPcookie-info.cgi Man, you'd think I was a marketing agent for various companies, this makes two posts in which I inadvertently plug a product...that _has_ to be taboo Take it easy gang... Regards, ST _________.___.____ .____________ ________ _______ / _____/| | | | \_ ___ \ \ \ \ \ \_____ \ | | | | / \ \/ | | \ / | \ / \| | |___| \ \____| | \/ | \ / _____ /|___|________|____|\________/\______ /\____|__ / | / \/ [ T O A D ] \/ \ | |( )| (' oOo "There is no gravity, the Earth just sucks" oOo ') oOo oOo oOoOo [ T H E I N F I N I T Y V O I D ] oOoOo oOoOo http://www.silitoad.org oOoOo oOoOo PGP Public Key Available Upon Request oOoOo oOo 1B 21 F3 B5 F8 97 24 B8 B4 18 0E 9E 3B CB CD 6F oOo oOo silicon@netwalk.com oOo oOo ____________________________________ oOo | A U S T R A L I A N M I R R O R | http://www.infinity.webhost.com.au ************************************************************************** 4)From: "self destruct" Subject: Not wanting to lurk hello everyone;...i dont want to just lurk so ive decided to give 2 cents of my brain.....but...as for electronics my knowlage is scarce to say the most. but in automobiles i have a great amount ...if anyone has a vehicle problem i will be happy to help anyway i can... if i do come up with an electronics fix of any kind i will post it thanks spyking im sure i'll be able to learn much here thanks again self destruct at slfdstrct@msn.com ************************************************************************** 5)From: Ron Lander Subject: Re: Portable Power for Camcorder Try using a "Gel Cell" Battery. They come in 6, 8, 9 and 12 AH versions and can be connected through the "lighter" plug and socket arrangement. They are, however, pretty heavy. You can also get a pretty reasonably priced charging unit. These are available at electronic stores and alarm suppliers... Ron Lander, CPP Southern California ************************************************************************** 6)From: Silicon Subject: Re: Spectre-Press Just FYI, you'll find Spectre-Press (http://www.spectre-press.com/) about 54% cheaper (I'm not trying to plug Spectre but there was just a related post awhile back, for those who skimmed over it) e.g. Computer Hackers Bible: Spectre ($21) - CS ($39) But that's the nature of competition, so to each their own...take it easy gang. Regards, ST ************************************************************************** 7)From: Silicon Subject: FYI, the FCC doesn't issue virus warnings It's amazing these things still get around...Deeyenda, along with a number of other ('Good Times' ring a bell?) email virus hoaxes have been circulating the Net for a period of time. It was either earlier this year or the end of last year that the cDc (Cult of the Dead Cow - http://www.l0pht.com/cdc/update21) admitted to starting the Good Times virus hoax (which ran rampant through the Net) to prove a point, which I think they did with great success. Deeyenda falls along the same lines as far as hoaxes go...below is a small blurb from "CIAC Bulletin H-05: Internet Hoaxes" concerning the Deeyenda email virus (hoax)...follow the URL for the complete bulletin: Deeyenda Virus Hoax =================== The "Deeyenda" virus warnings are a hoax. CIAC has received inqueries regarding the validity of the Deeyenda virus. The warnings are very similar to those for Good Times, stating that the FCC issued a warning about it, and that it is self activating and can destroy the contents of a machine just by being downloaded. Users should note that the FCC does not and will not issue virus or Trojan warnings. It is not their job to do so. As of this date, there are no known viruses with the name Deeyenda in existence. For a virus to spread, it must be executed. Reading a mail message does not execute the mail message. Trojans and viruses have been found as executable attachments to mail messages, but they must be extracted and executed to do any harm. CIAC still affirms that reading E-mail, using typical mail agents, can not activate malicious code delivered in or with the message. More at: http://ecco.bsee.swin.edu.au/text/virus/ciac-vir.html Hopefully this will provide a little insight for those who were unaware. Take it easy gang... Regards, ST ************************************************************************** 8)From: Dale Davis Subject: Virus Hoax Dear Fellow List Members, Please be aware that Virus Hoaxes are now more rampant than Virii on the Net. As yet there is no such thing as a self-starting virus which is what would be required for a virus to access your computer via an email message. Reading an email does not involve download, without download there is no access for the Virus. Hoaxes are easily identified by two common threads. The first being the a competent sounding source...such as the special assistant of some senator or the security manager of a large corp such as IBM. Second, a description of the virus as being able to invade via the reading or opening of an email message. Why the hoax? To what end? They are intended to kill specific email chain letters. (Note to Moderator: This is common knowledge, I'm surprised you allowed the hoax to be perpetuated through the list) Adieu, Dale Davis Casablanca, Morocco +++Moderator's Note+++ I've heard about the hoax but not being 100% sure I let it go thru (I only bounce obvious non-list related spam, anyway). Better to be safe than to be sorry. Judging by the size of the thread it's created I guess many were aware... ************************************************************************** 9)From: Aeneid Subject: Transmitting video +GSM +heeeelp Hi, could someone tell me what interface between a CCD cam and a GSM would i need to transmit kinda real-time video (e.g 1-2pics/sec) Where do i buy it? i guess interface unit should also implement some video Compression (image/sec: 320x200x8bps) Here is my complete plan: CCD cam ->interface->GSM ..... GSM->notebook->me happy :) first i wanted to use a wireless sender/receiver system sth. like http://www.007eleven.com/video.htm#ghz24 ,but u have to add a battery togetrealsize, "up to" 500 feet might be much less case used in a building GSM`s are small, have long time batteries, offer a great range, you can trust their specifications, can stick one right to notebook, usefull for other purposes, less suspicious Does someone know of some internet computer shops? ( need a notebook ) (asking cause some internet shops offer really cool discounts e.g http://www.bookpool.com ) Does someone know of commercial implementations/availability of this size http://popularmechanics.com/popmech/sci/tech/U026U.html /smaller cameras? THanx *damn to late to school again.. ************************************************************************** 10)From: CrACKeD Subject: Re: CB Jammer? > I visited an old friend just recently and encountered something very > disturbing. The tenants below him talk on their CB constantly and it > comes through on my friends stereo and telephone very loudly. He asked > the tenants (and the landlord) to do something about the problem but > they haven't. He said it has been going on for over 6 months now!! I > don't think it is coming through the electrical system because the > neighbors complain about it too. Anyway, I told my buddy there were > several knowledgable fellows on the SpyKing list that could probably > help him out. The Question: is there any way to JAM this guy so his > shit just stops working??? If such a device is not available by retail, > I will pay an industrious electrician to make it (a modest price of > coarse). I think this whole thing bothers me more than my friend. :-) Only using another CB radio to overpower his received signals would "jam" him, but would require both a lot of time as well as law breaking. Your friend should contact these tenants again and let them know the problem is still happening. Have him suggest they install a low-pass filter inline with their feedline to their antenna. That should reduce or eliminate the interference, and is an inexpensive way to go. Otherwise, your friend can install filters on his telephones and ferrites around his speaker cables (also inexpensive). Check out any of the radio type magazines out there like PopComm, Monitoring Times, CQ, etc., and you'll find ads for everything I've mentioned. Contacing the FCC is probably out, FYI. They already do a half-assed job handling ham radio problems, let alone CB problems. But if worst came to worst, and you had LOTS of people complain about this interference, you just may end up with satisfactory results (fines, confiscations, etc.). HTH. CrACKeD ************************************************************************** 11)From: CrACKeD Subject: Re: PLEASE READ THIS AND OBEY! > This message is originally from Keith Pavlick from the Office of > Representative Wolf of the United States House of Representatives. > Phone: (202) 225-5136 > > A destructive virus is spreading via Internet E-mail. Don't open > any E-Mail with the subject line "Deeyenda". Delete it immediately. > For more detail, please see below. [snip] Uh-oh, not this one again. It's been beaten to bloody death for years now. Please check out http://kumite.com/myths/ to read about the old hoax you just warned us all about with such urgency. CrACKeD ************************************************************************** 12)From: amaci@starnet.net.ph Subject: Re: cobra lock pick tool I saw the post on the cobra lock pick tool, but It did not mention an address I sent a letter to an address that I found in a magazine but my mail was returned as undeliverable, Can anyone help me with the current address of this outfit, I always wanted one of these items, Thanks Raymond Jackson amaci@starnet.net.ph ************************************************************************** 13)From: CrACKeD Subject: Re: Equipment Question > Your Pro 38 is a bargain at $50.. They sold for $250. new. You have > twenty memory channels ( look at your bank buttons and they are nember > bank one is 1 - 20 etc, ) your frequencies are 30-54, 108-136, > 136.05-174, 380-512, and 806-960 with a cellualar block built in. This > block can be undone in 45 minutes BUT you better know how to work a > circuit board and solder real well. You have to open up the unit and > remove the boards to get to the one diode you need to snip to restore > cellular. You must be thinking of a different scanner. The PRO-38, now that I took a minute to look it up, is only a 10 channel unit with coverage up to about 512 MHz. There is no cellular mod unless you use a downconvertor (if that's the buzzword they're using right now) to convert 800 MHz frequencies down to 400 MHz frequencies (yes Mage, this is what you've found, they're quite common and work just fine). As for this scanner being a bargain at $50, I'd have to disagree. Considering I just grabbed a PRO-50 20-channel unit for twenty bucks, you can see what I mean. I would have offered about $20 for the PRO-38, but hey, live and learn. CrACKeD ************************************************************************** 14)From: "Walstrom, Bradley" Subject: Deeyenda Maddick Virus Notice to all! According the Computer Virus Information Page. The Deeyenda Maddick Virus is a HOAX. http://www.datafellows.fi/v-descs/deeyenda.htm There are many postings like this that are a hoax used to create paranoia and/ or to sell anit-virus software. Brad Walstrom ************************************************************************** 15)From: ThE WhiTeStaR Subject: Re: Caller ID RE:9)From: Lesa Becker RE:Subject: How to ID my Callers? Hey Lesa, for one, never put your phone number on your answering machine, unless you are on a bussiness line, because any one who really wants to talk to you and you want to talk to them already has your phone number. Most people evade the person they are calling's Caller ID by pressing *67 on a touch tone phone, or 1167 on a rotary dial phone. Caller ID is not as advanced, or sophisticated as we would like it to be just yet, but it'll get better in time (as soon as I figure out how to make some damn hardware adjustments on my caller ID). You might be able to buy some utility from some spy site that allows you to "grab" the numbers before they become unavailable, but I have yet to see such a device. -The WhiTeStaR WhiTeStaR TeKnologieS ************************************************************************** 16)From: Judge@innocent.com SUBJECT: Real Psychological Viruses If you ever receive mail with the subject that says 'Money 4 free' , or 'Be rich now' DON'T open them! It's a virus which is spreading rapidly called the mailshot virus. These won't mash your HD but this will most certainly waste your time. (and probably aid some dumb f**k company to gain a bigger mailshot list.) This is not a Hoax, and ppl should campaign in the way of mail bombing each one to dis-courage the spread of such waste of band-width. Hope this saves you a few tics on your clock. Judge@innocent.com campaigning against misinformation ************************************************************************** 17)From: "Walstrom, Bradley" Subject: CB jammer Anton, The legal way to take care of the problem would be to contact the local FCC office and report the problem, and wait for them to take action. Getting a list of the neighbors that are also being affected may help to speed up things. The FCC is not known for their speedy reaction to problems like this (under staffed over worked government agency etc.) The FCC has on line a manual called INTERFERENCE HANDBOOK. It outlines some ways your friend may be able to cure his problem. It can be found at: http://www.fcc.gov/Bureaus/Compliance/WWW/tvibook.html Something that was going around in the 60's when everyone had CB's and you wanted to disable a rivals radio was to stick straight pins into the coax going from the radio to the antenna in many places. Cut off the excess pin sticking out of the cable and then use a pair of pliers to work the pin into the insulation to make the pin impossible to find. This effectively shorts out the braided outer shield to the inner conductor going to the antenna. They would spend days trying to figure out what was wrong with their radio and finely end up having to replace the coax. Disclaimer: The last paragraph has been provided for historical and educational purposes only. Destruction of someone else's property would be illegal. Brad Walstrom ************************************************************************** 18)From: Judge@innocent.com SUBJECT: Does anyone know what this is? On a more serious note, does anyone know what this is? It's called X0po3q4c.tmp and appears on Netscape 3 launch. (c:\windows\temp\) I'm curious are you? Any feedback would be appreciated. ID: 8a 5a ff e0 ef dd 05 0e e5 ac 6a f9 6a f7 c2 [Version Information] LockVersion=1.0 Found using mcafees scan all option & saving a log. BTW Sorry about the lack of cellular stuff, my friend has just been awarded a large contract as Cellular Security Chief and has asked me to refrain from posting things he's looking out for. Sorry guys , you'll have to do that one without me! Judge@innocent.com ************************************************************************** 19)From: shadowrunner@voyager.net Subject: Re: Cookie Control Recieved this e-mail the other day regarding cookie control. Thought it might be of interest to the list. ShadowRunner >>> Subject: Privacy alert: Do you know your cookies ? >>> >>> >>> Just a useful tip on how to keep your privacy when you surf the web using >>> Netscape 3 or MS-Internet Explorer 3: >>> (Yes, your browser is spying on you. No, I am not a paranoid lunatic, and >>> Yes you can do something about it.) >>> >>> SHORT VERSION: >>> ============== >>> Disable your browser "cookie" feature. >>> >>> LONG VERSION >>> ============= >>> I am quite sure that most of you are not aware that every time you visit a >>> popular web site, information is gathered about your actions and is >>> correlated to you *personally*, and kept in a few central databases common >>> to all the advertisers. >>> >>> Whenever you run a search engine (Alta-Visa, Lycos and effectively all >>> others) visit the Dilbert Zone, Doonesbury, classified2000 and almost any >>> site that have commercial advertisement (and which one doesn't today?), you >>> are identified *uniquely* through a little >>> known feature of the browser called "cookie" (Site Certificate). >>> >>> This feature let the advertiser leaves a unique signature ON YOUR HARD DISK >>> that is the digital equivalent of Social Security number. Everytime >>> thereafter, whenever you visit a site that is affiliated with one of the >>> few big gathering agencies (almost all are), your browser send AUTOMATICALY >>> your "cookie", and then you are exposed. >>> >>> After you are uniquely identified than the sites you visit, the *search >>> strings* you enter, the pictures you select, the links you follow, and >>> everything else they can get; all are collected and recorded in a private >>> database of the syndicated ad agency. >>> >>> Yes, they have a file on me (name deleted), and they know my: >>> 1) Email address (sent by Netscape automatically to their FTP site) >>> 2) My phone number (from the car ad I placed in classified2000) >>> 3) My organization (from my site domain) >>> 4) My O/S (NT 4.0, from the browser id string) >>> 5) My zip code (from the nodename registration in rs.inetrnic.net) >>> 6) My airlines preferences (from the sites I visit) >>> 7) My current interests (from my Alta-Vista search strings) >>> 8) Actually there is quite a little they don't know. >>> (Don't chuckle, they know much more about YOU - such as the time of your >>> last visit to XXX site. *I* ofcourse never do such a thing...) >>> >>> The above is not some hypothetical future scenario. It's already going on >>> for more than a year. >>> >>> Don't believe me? Do a simple check: >>> 1) Find your "cookies" file (normally in the directory above >>> the "netscape.exe". On PC the default is >>> "c:\Program files\netscape\Navigator\cookies.txt". >>> On a Mac do a file search. >>> (May be empty if you just recently installed Netscape) >>> >>> 2) Open it (it's a regular text file) and look for the >>> signature of the advertisers such as "DoubleClick.net" >>> (one of the better known collection agencies) >>> The "id" number you see there is your unique identifier. >>> You will find there probably several other lines for >>> similar data collection agencies such as "linkexchange.com". >>> If you found any, then you have been a subject for data gathering. >>> >>> 3) Disable this feature (explained below), restart your >>> browser and go for example to the Dilbert Zone: >>> (http://www.unitedmedia.com/comics/dilbert/archive/) >>> and see what happens. >>> >>> >>> You may have noticed that every time you search something in a search >>> engine (try for example: "travel", "book", "WinNT", "rental" "insurance" >>> etc. on AltaVista or Yahoo) the small banner ad above changes to something >>> relevant (try it if you don't believe). >>> >>> How does it work? Your search string is sent by AltaVista to >>> "doubleclick.net" with your unique id, and doubleclick.net changes the >>> advertisement. This way your search string travel without your knowledge >>> out of the altavista and to other interested parties. >>> Whenever you visit now a site that is affiliated with "doubleclick" (most >>> commercial sites are), your browser send your "Site Certificate" (unique >>> cookie id) to that site, which forward it to doubleclick, which add it to >>> the records they keep on you. >>> >>> Although most of this gathering is done in secrecy, it has been known for a >>> while in the Internet community. >>> DoubleClick, for example, justify their actions by claiming that they "keep >>> your privacy" by not keeping your name in the database. >>> This ofcourse is bullshit. They keep your unique id, nodename (try "whois >>> -h dir.stanford.edu samypc.stanford.edu"), email (try "finger >>> samy@leland.stanford.edu") phone-number and a lot of other details which >>> are more than enough to get your name and address on the fly. >>> >>> A short citation from "DoubleClick" promos: >>> >>> "Utilizing the industry's largest database of Internet users >>> and companies, DoubleClick's DART offers advertisers the >>> ability to target users by Domain, SIC, editorial content, >>> search keywords, affinity, Web page and more. >>> >>> Another more enlightening citation: >>> ("http://www.doubleclick.com/frames/adinfo/dartset.htm") >>> >>> "By recognizing and registering *unique users* as they enter >>> DoubleClick Network sites, DoubleClick has compiled the most >>> comprehensive Internet user profile database. <...> >>> By registering and tracking these unique users, DoubleClick >>> is able to dynamically match advertiser-selected target >>> profiles with *individual* user profiles and dynamically >>> deliver an appropriate, targeted banner. >>> This way, only an advertiserÌs selected target will see their >>> ad banners. >>> Additionally, because we recognize unique users, we can >>> track how many times an individual user has viewed a particular >>> banner, allowing advertisers to set and control ad banner >>> frequency. <...>" >>> >>> Don't think that "DoubleClick" is unique, they are relatively >>> one of the more honest in the gang. >>> >>> The original reason for this feature ("Site Certificates" or "cookies") was >>> to let you reconnect to sites that require access control without >>> resubmitting your password. >>> However, no self respected access control will actually use the Site >>> certificate for a login/password after the current session. >>> Your cookies file may contain legitimate certificates for sites that >>> require you to enter with password, but this should be anyway associated >>> with a nearby expiration date, so you can go away and just delete it. >>> >>> >>> How can you protect yourself? >>> ============================= >>> 1) Delete your current certificates. On Netscape 3: >>> "Options"-> "Security preferences"-> "Site certificates" >>> and "Personal certificates". >>> >>> 2) Delete your "cookies file". >>> >>> 3) Setup Netscape/MS-IE so it will require your permission >>> before accepting certificates. On Netscape 3 it's in: >>> "Options"-> "Network preferences"-> "Protocols" >>> and enable the "Show alert before accepting a cookie". >>> >>> >>> For additional privacy: >>> ======================= >>> 1) Make sure your email is not sent as your FTP password: >>> "Options"-> "Network preferences"-> "Protocols" and disable >>> the "Send your Email address as Anonymous FTP password". >>> I would also recommend not to use Netscape for Emails >>> (Eudora is better anyway) and so you can go and delete your >>> email address if you have it in: >>> "Options"-> "Mail/News preferences" -> "identity" >>> >>> 2) For a better convenience, use a tool that protects your >>> "cookie" file. Mac users get the freeware "cookie-cutter" >>> from "http://www.shareware.com/. For PC users, unfortunately, >>> I know only on a commercial product (~$20?). Look at: >>> "http://www.pgp.com/products/PGPcookie.cgi" >>> >>> 3) Forms: Almost all sites that let you download "demos" >>> and "evaluation" S/W through the Web, requires you to >>> fill out some forms. >>> Always fill the required fields with junk, or even better >>> go directly to the company FTP site. Most chances are that >>> you will have there a full access to the S/W without any forms. >>> >>> 4) If you have not disabled your "JavaShit" and "JavaBlaBla" >>> ("Options"->"network preferences"-> "Languages") >>> then I don't even want to bother start telling you about all >>> the nice exploits available out there. >>> >>> MS-IE users: >>> A word of advice: Security wise, even Netscape is better. >>> (e.g. >>> "http://www.ee.washington.edu/computing/iebug/" - NT >>> "http://www.efsl.com/security/ntie/" -NT >>> "http://www.security.org.il/msnetbreak/" - Win95 >>> "http://www.eliashim.com/presrel/pr030497.html" - NT+W95) >>> The number of MS-IE exploits discussed in the hackers circuits is >>> staggering. >>> >>> >>> Last but not least: >>> =================== >>> Althouge the more knowledgeable users (me ...) knew about >>> this all along, a recent article in today "Consumer Report" >>> prompted me to send this message to the ISO list. So thank >>> CU, not me. I just got tired of waiting for someone else to >>> do the job. ************************************************************************** 20)From: Chancellor Subject: Re: CB Jammer? Sure it is possible it jam 'em out. But, I think you would run into a problem. If their cb transmissions are being recieved by his sterio then construction of a "jammer" would like-wise jam yourfriends ability to pick up anything (at least on said channel). But, if you still want to jam them you could modify one of those TVjammers the list was talking about a few weeks ago. In addition to altering the inductor windings you would probably have to add a stronger power source ?? Anyway i have seen such kits with in the last few weeks. If interested i will dig through my mags and send you the info. Good luck!! --------- supafuz ************************************************************************** 21)From: "Erik C. Smith" Subject: Checking out the market for scanners Hello list, I have been checking out the market for scanners. What i am looking for has broad-band recieving capabilities, high selectivity/accuracy, and portability.I desire to use this scanner for low-band reception (lHF-hHF), cellular monitor, decoding, and reception for various hz transmissions. So, it naturally brought me to the AOR 8000. It has a range from 500kHz-1.9ghz, a computer interface (easy for decoding), push-button functions that can do everything from locking desired channels (passwd) to dancing the jig (with additional modules...). It is availabe with unblocked range (cellular ready). Plus, there are tons of available software (some free) and hardware modifications to alter for specific applications. Well, on the down side. It has O.K. satisfactory low-range selectivity, and cost about $600 USD. My questions to the list are: 1) Is it worth it 2) Have you used it, in practice (surveillance) 3) How good was the HF selectivity 4) any other items you may see fit to add. I would appreciate any input on this subject or any experiences!! This would be my first scanner. On one side of the coin i dont wont to go overboard but on the other i would like to the best money could buy. Thanks listies. ---------------- supafuz ************************************************************************** 22)From: "Thomas F. Kroenke" Subject: Re: Licensing Reply to Vol. Two Issue #113 Item 19) Gerard O. Hemmerle: I am a PI in Southern California, also had been licensed in New York, working in NYC. What state are you attempting licensing in? In Cal. & NY you need to verify your experience. How does one document time on the "DARK" (whatever the hell that means) side for licensing purposes? Don't confuse TV PI's with the real world. The only key to success in this business is the ability to get clients, otherwise you just have a hobby. Thomas F. Kroenke Kroenke01@worldnet.att.net ************************************************************************** 23)From: Larry & Anne Bennett Subject: Re: Scanners One of the memebers had a question about a "toy" that could alter cell phone range frequencies down into the 400 MHz range. The question was do they work? My experience is yes they work quite well. I have a device built by GRE called a Super Converter II. It work great! The only problem is it is no longer available. I have tried to buy another and was told by the manufacturer they do not have them available anymore. That brings up an interesting question concerning cell phone listening devices and their availability. 1. I have an old RS Pro 34 scanner. I modified it to open up the 800 MHz range. It works great but most companies that were doing the mods have stopped. 2. I bought the afore mentioned convertor and now they are not available at least through normal American channels. I'm sure they are available through Canada. 3. On May First I ordered and received an AOR AR8000 from Atlantic Ham Radio in Ontario Canada. They are still selling the wide open, every frequency from 100 KHz to 2GHz, model that is illigal in the US. They garrantee delivery or you don't pay. Other radio outlets charge you and if your radio is confiscated by your government coming through customes, your still out over $700.00. All three methods work well once a decent antenna has been installed. It is also worth mentioning my AR8000 has the Opto Electronics Scout reactive tune modification. I have a Scout and the combo works great. For those of you not familiar with the package I'm talking about it is as follows. Opto Electronics manufactures a frequency counter called a Scout. It is an intelligent device with many features, one of which is when it senses a strong RF signal that meets all criteria as determined by the on board software and has been to be a ligitimate RF Source it outputs that sensed frequency over a serial communications link to the AR8000 and programs it to that frequency. The AR8000 senses the modulation type and your listening just as though you set up the receiver specifically for that transmission. It is really cool. The only short coming is the antenna selections from Opto Electronics. A good antenna for 800 MHz will cost about $40.00. Well, until I have something to share I think I'll go back to lurking. Knife Thrower I would say all methods will remain available for a long time to come, however the more the US government raises hell about cell phone privacy the more these toys and modifications will cost. ************************************************************************** 24)From: "PSYCHEDELIC GYPSY" Subject: 7 digit zip code I just got of the telephone with a representitive from the IRS. We had a disagreement that was worked out to my satisisfation (kind of-do you ever win?). During the course of the conversation the most intresting response came from this person. He was asking my address and so forth and asked for my zip code. I was reading from the letter that the IRS had sent to me and made a statement that there where was a seven digit code after my zip code as apposed to a four digit code. This person seemly replied with all sinserity "the last four digits are so the FBI can track you". Does anyone know anything about this? gypsy@caverns.com ************************************************************************** 25)From: Jim Motes Subject: Computer's for the Gods Hi everyone, I just wanted to let everyone know I left my cozy position with a computer firm and have set up my own business in Fairfax, Virginia. I would like to ask a favor, besides the obvious "buy computers from me", I'm looking for what the members here think is an excellent machine for the security specialist. What software packages, what types of backup and storage do you prefer, Please let me know if you prefer tower, desktop, or laptop, how much ram, hard drive, etc... I want to get a feel for the "perfect computer" for surveillance, protection, entry specialists, and the other security fields. Please state which field you are recommending the system for. After I get the information sorted , I'll build one or more. VR, Jim Motes President Managed Information Technology MITEC 10855 Lee Highway Suite 325 Fairfax, VA 22030 jmotes@mnsinc.com ************************************************************************** 26)From: Trace Carpenter Subject: Re: Right Answers Hey Augie, What you're looking for is a random number generator. I'll look around and see if I have one around here. -- Sincerely, Trace Carpenter Trace Carpenter Investigations Professional Private Investigations 2926 Maple Ave., Ste. 200 Suspicions Confirmed Dallas, Texas 75201 Problems Solved ! 214.828.4520 Free Consultations 214.740.0112 Facsimile ************************************************************************** 27)From: John Hamernick Subject: I won!! You must be refering to the www.cjnetworks.com/~mikep/music/midi/classic_rock/bachman-turnerover_drive_you aintseennothinyet.mid And for a minute I thought I was gonna have to decipher the digits...ha +++Moderator's Note+++ ha? Well, HA HA! you're wrong... upside down, back in the hole... keep looking... ;-) P.S. Try the "other" side of the page... ************************************************************************** Who are you? What's your specialty and/or interest? Let us know about your company... What would you like to see on the list? Post it. Let us know... Do you have something to contribute? We'd like to hear it... We want to know EVERYTHING and ANYTHING about eavesdropping, surveillance, countersurveillance & privacy related technology, etc... Remember: who, what, where, when, how & why... we want ALL the details... Do you have a question? Post it... A little free time? Help a member... With the INCREDIBLE brain power on this list, someone should have the answer ;-) P.S. Don't be a LURKER... Members take the time to post info for us all... give something back... Don't just take... Your input/knowledge is valued... ************************************************************************** Send Postings to: spyking@con2.com with "Post" in subject field with subject ************************************************************************** Subscribe to: spyking@con2.com In the subject field type: subscribe-surveillance list e-mail address ************************************************************************** Unsubscribe to: spyking@con2.com In the subject field type: unsubscribe-surveillance list e-mail address ************************************************************************** ...The Simple Rules of the Surveillance List... The Surveillance List Owners may Reject any posts that are/contain: 1) Info Unrelated to Eavesdropping, Surveillance or Privacy technology... 2) Flames or Negative posts... 3) E-Signatures that are considered excessive... 4) Advertisements not DIRECTLY related to the list topics... 5) Attached Files... 6) Oversized Posts... (May be edited to save room) **************************************************************************** This publication is copyrighted and is protected by U.S. and International copyright law. The information transmitted on this list may not be reproduced, reposted or forwarded to any non-list member without expressed written permission of the List Owner. Violation of U.S. copyright law is a criminal and civil offense... **************************************************************************** The Surveillance List is moderated by SpyKing@thecodex.com The List Owner will make EVERY effort to protect subscribers from spam... Copyright 1996, 1997 Codex Publishing Inc., All Rights Reserved... **************************************************************************** Vol 2 Issue # 116 ****************************************************************************** Vol.Two Issue #116 The Surveillance List May 22,1997 Over 2000+ Members Worldwide Representing 46 different countries ****************************************************************************** IN THIS ISSUE... ****************************************************************************** 01) Re: The more enjoyable aspects of this business? 02) 7 digit ZIP add-on 03) Help with scanner 04) Re: alarm techs 05) The search is over... 06) Keystroke queue? 07) Re: Portable power for camcorder 08) Getting even 09) CB jammers & more... 10) The Cook Report 11) Understudy anyone? 12) Eavesdrop on a third party in New Jersey? 13) Importing Scanners 14) Re: The more enjoyable aspects 15) E-Mail Tracer 16) We had a great time at the Hamvention! 17) Re: Caller ID 18) Cookie Control 19) Re: Spy people on the net 20) Going to freelance 21) Re-introduction time 22) Random number generator 23) I have a situation 24) Cookie management system ****************************************************************************** DON'T BE A LURKER.... GET INVOLVED... YOU ARE A MEMBER... MAKE THE MOST OF IT ****************************************************************************** 1)From: SpyKing@thecodex.com Subject: Re: The more enjoyable aspects of this business? >>>> From: "Gerard O. Hemmerle" Subject: The more enjoyable aspects of this business? Greetings to all, I've just left lurking behind and am asking am asking a very simplistic question of you. I am on the threshold of retiring from a dark side of "the game" and would like to continue along a lighter path. My application for PI licensing is in process. What are the more enjoyable aspects of this business, and how about some reflections on the prospects for the onset of the new millenium? Understanding one's need for privacy, what is the earnings picture? Your Newly, GOH <<<< Enjoyable aspects? There are many depending on which end of the business you're in and what services you offer... some of my favorite things about the business are... * You meet great people * You learn something new everyday * Depending on your speciality, there is generally a wealth of clients * You get to travel (sometimes to great places) * No two days are the same * Financially rewarding if you're willing to work hard However there is a darkside... * You meet a lot of low-lifes * Long hours in strange places * A lot of new firms go broke because of inexperience in business * As you get successful, competitor jealousy is aroused The best advice I can offer you is pick a specialty (you cannot be all things to all people) and concentrate on being the best at it. The world WILL find it's way to your door if you employ sound business practices. And as you grow successful and incur the wrath of competitors who feel you have violated their private domains... ignore them and work harder... after all, they don't pay your bills, you do ;-) Good Luck. ************************************************************************** 2)From: Brad Leonard Subject: 7 digit ZIP add-on To Psychedelic Gypsy: You were the recipient of some IRS humor. If you look at the 7 digit addon, you'll find the regular 4 digits issued by the Postal Service, the last 2 numbers of your house number, and a check digit to make the whold ZIP add to an even multiple of 10. Most mailers don't show the check digit. Also, when the USPS sprays on a barcode, it puts on the human-readable ZIP+4, a space, and a 2-digit number. That number is the carrier route. Those guys at the IRS are a laugh a minute - almost as funny as us Postal folks... ************************************************************************** 3)From: Mark Deaville Subject: Help with scanner Hello all just a short question does anyone know anything about a Realistic Pro-50 20 channel programable scanner as I just got one for $50 and wanted to know can it be changed and the freq list for it. Cheers quovadis ************************************************************************** 4)From: Mark Deaville Subject: Re: alarm techs 1- Do magnetic door contacts work off reverse polarity? depends on type most are a magnetic switch that have a normally closed (nc) or normally open (no)switch in place when you remove the magnet the switch will either open or close thus closing or opening the resistance over the zone which will be responded to by the alarm panel as either closed or open and then into alarm state. (hope you understand my way of explanation) ;-) 2- If an alarm keypad is located inside a dwelling, what is the usual pre set delay. Ok well depending on the tech who puts it in, most panels are factory default at 30 seconds on entry sensors, but if the tech is security concious it can vary from 10 secs to 120 secs, But this delay is normally only on entry sensors and all others should be set up to an instant alarm. 3- Motion sencors.....heat or motion? Or different kinds for different applications? Wow want a huge list (hahah) well basically 3, PIR - Passive Infa Red, Motion - Vibration Sensed Motion detector & Dualtech - Combination of Motion and PIR. You can also get others to measure certain Levels,Heat,Sound,Breakages,magnetism and more. 4- Is there a visual difference visually between open and closed circut? Well not on a detector board (no) & (nc) represents the contact between resistance and the panel - other words think of it like a river (flowing water) resisters = (dams), controling the flow through dams if the dam has a larger/lesser amount of water the panel will detect problem then act on the amount wether less/more thus giving you various alarm signals ie tampers and alarms. (hope this helps) Cheers quovadis ************************************************************************** 5)From: BADCOFFEE@aol.com Subject: The search is over... After 3 frustrating weeks of seeking alternative employment BADCOFFEE and Elvis have left the building. Newbies pay attention here: As a man that has never had to call anyone "boss" in his life, it is fair to say that i am qualified to make such a statement. It is 10 times easier to "bust your ass", learn and train on your own and gain experience through DOING IT ON YOUR OWN than to even remotely think that you are going to get paid "even close" to what you are worth under employment of others. Why??? Because there are just too many damm people out there unemployed and just throwing their knoledge in the trash.......just to be employed. Employers (not all) are just downright taking advantage of employees. Benifit's are a thing of the past. "Bossman" get's to tell you how he can't affort to pay you more as he pulls away in his Jaguar 12 cyl.. I had a getleman yesterday that owned a locksmith company (large) boast about charging $250 for after hours lockouts and then in the same breath boasts on how one of his top men is making $10 dollars an hour. I DRINK more than $10 bucks an hour in coffee. Gentleman, this was time and time and time again. This man turned down several lockout in the ONE hour that i was interviewing simply because he did not have anyone to preform them. I Cringed, to see a man turn down work and then tell me how fantastic the salary was. Real bad experience when you want something so badly buy you have someone else in control. So.....If your anctious in getting into ANY field, make a step FIRST to trying to pull it off on your own. In comparison to what you'll be making being "hired"....how much do you think you have to work to make the same $$$? About 10 minutes a day. Note: Like dog years...........One year on your own=7 years in experience and cash working for another....... OPPORTUNITY IN NORTH JERSEY- If you live near the GWB or so and are interested in teaming up to do nothing but lockouts, can help me produce work, help me cover this legally, GIVE ME A SHOUT while this thing is in the begining stages. $250 for after hours??? Cummon now locksmiths, shame on you.....actully, God bless you, I envy you. Heck......Just be motivaed, have the basics, be bondable, transportation and a bit of fun.....I'll train you myself. That should take a whole 15 minutes. We'll work out the details. Please, locksmiths.....I do understand your overhead and expences. This is not a post that is meant to insult anyone. Just the plain facts. 100% respect is given here to you and your field. <---sincerely Seeing dollar signs, Augie Badcoffee@aol.com Entry and Lockout specialist <-------hey, that has a nice ring to it. ************************************************************************** 6)From: Shrub17400@aol.com Subject: Keystroke queue? I was wondering if anyone could get me in contact with such a program (keystroke queue ) ************************************************************************** 7)From: Martin Pask <100142.3101@CompuServe.COM> Subject: Re: Portable power for camcorder The current drain on your camcorder would only be just over 1Amp per hour which means that if you had a 10 AMP battery it would run it for approx 10 hours depending on the condition of the battery. As the unit runs on 6v this should not be a problem and I would suggest purchasing a sealed lead acid battery say 6v 10 Amp which should easily run the equipment for the duration you require. Regards MPI ************************************************************************** 8)From: "The Dark One" Subject: Getting even Is there anyway to completely ruin someone's real life, by doing something over the internet? This guy who is a lot bigger than me threatened me, and I want to do something that will really tick him off, but I don't want him to know it was me. Any Suggestions would be appreciated? Thanks +++Moderator's Note+++ You could get to know his livestock in the biblical sense... ;-) Seriously, getting even often isn't worth it. The best revenge is ignore the jerk and be successful. That will really piss him off... ************************************************************************** 9)From: (Bret Johnson) Subject: CB jammers & more... With all the talk on CB jammers going on, I thought I might add my two cents worth. First, jamming equipment need not be Mega-powered stuff, since you will be most interested in jamming the target's RECEIVE mode. With your transmitter placed physically closer to the target's antenna than the distant transmitter, 250 milliwatts of power is all you need. Having said that, I must add that I agree with Trace Carpenter on proper filtering being the best course of action. (CB radios can be a good thing -- Ever heard of channel 9 being used for emergency traffic or travellers receiving directions from locals who monitor particular channels?) Lastly, and perhaps dearest to my heart, is in regards to the U.S. Constitution. The first ammendment covers the right to free speech, the second addresses the right to keep and bear arms (so that the first may not be taken away), and so on. Let me urge all readers to at least read what this document says at: http://www.law.cornell.edu/constitution/constitution.overview.html Pay particular attention to your fourth ammendment rights which have already gone to the wayside and then try identifying the others which are rapidly going that way as you read the texts. ************************************************************************** 10)From: Martin Pask <100142.3101@CompuServe.COM> Subject: The Cook Report Did any Uk detectives see the Cook report last night, certainly makes you think twice before taking on that big job offer. Cador Pendry was really set up well. I just wonder how close we all may have come to being caught out like that. We all like to think that we are on a high level of alertness but if the plot is convincing enough, who knows. As for Cook himself, I thinks is a case of double standards and he must use similar method to gain the information he produces. For the most part I used to think he done a good job but now, maybe I'm not so sure. I will be asking a lot more questions in future and watching my back before taking on anything! REGARDS MPI ************************************************************************** 11)From: SpyKing@thecodex.com Subject: Understudy anyone? I received this thru my site. If anyone is interested, please contact him directly. >>>> From: Ross Crandall Subject: Attention I hate to be a bother hear, but I am currently residing in the Las Vegas area (as if that wasn't obvious) but I am looking to learn the trade and would appreciate any information about someone here that would not mind teaching me. Since you appear to be the one with the connections I have come to you. I would prefer kind of a apprenticeship type training. If you happen to know anyone if you would not mind informing me or them I would sincerely appreciate it. Thank you in advance. <<<< ************************************************************************** 12)From: Mkamal@ix.netcom.com Subject: Eavesdrop on a third party in New Jersey? What are the legal guidelines of using a wireless transmitter to eavesdrop on a third party in New Jersey? If it is illegal then how can the public use these devices that are being sold by the spy shops? ************************************************************************** 13)From: Chancellor Subject: Importing Scanners I was scanning the last issue in which i posted info reguarding scanners, namely the AOR 8000. I read Larry & Anne Bennett 's statement that only a few companies verify shippment on ALL their products. Apparently, if customs snatches your parcel they are in the clear by keeping it indefinately. So, i scanned the Web page of the company in which i was interested in purchasing the AOR 8000 from: http://www.demon.co.uk/javiation/ IMPORTANT NOTE FOR POTENTIAL CUSTOMERS NOT RESIDENT IN THE UNITED KINGDOM Potential Customers in countries outside the United Kingdom would be advised to checkon any regulations regarding the importation of scanning receivers or restrictions on frequency coverage. We are NOT the importer and are in no way responsible for complying with any Import Regulations in countries outside the UK. The customer is responsible for complying with ANY local regulations with regard to the importation of any equipment. Refunds cannot be given on goods not delivered due to any orders held by Customs in the country of destination, should good be returned in the condition sent full refunds will be given. I contacted them to verify this and ask if any "insurance" could verify shipping arrival. Ill let any interested one know their response. With this in mind I now question the merit of ANY dealer/importer. Does anyone know of , or have experience with, a company that guarrantees delivery (perhaps COD...doughtful). I looked up Atlantic Ham Radio page and they state that: "You can always find something cheaper, but remember, you get what you pay for." True their prices are rather inflated: The AOR 8000 is $760 plus $55 for the scout mod there. The AOR 8000 is 583.79 USD with leather case and scout mod at Javiation. So distraught, i turn to the list for help. Does anyone have any experience w/ Javiation. Anyone know of any other company who guarantees delivery (w/o overinflating the cost to pay off cumstoms ;) )? Thanks again -------- supafuz ************************************************************************** 14)From: "Gerard O. Hemmerle" Subject: Re: The more enjoyable aspects Greetings Thomas F. Kroenke, Thank you for your posted reply. My apologies for using the very vernacular `dark side`, I did not want to publish my present occupation at this time. I was really just making some initial inquiries. I intend to practice in the NYC area. I'm particularly interested in the maritime field, and am currently completing my preparations for USCG Master licensing. As regards my NYS PI license, I believe I'm qualified, as I understand the requirements, and am awaiting licensing. This is a time of transition for me, and I'm very enthused. Being green---`it's not easy`---I understand your commentary on TV PI's & Hobbies. Let me say that as for the hobby association, I find this field interesting and therefore, enjoyable in this informational and formational period. Can this change?~~~all things change with time. When it comes to TV PI's, I'm not much of a sleuth watcher, however, I do like some of the internet site PI music, Peter Gunn, Pink Panther, Mission Impossible....Oh yeah!, before I forget, Peter Falk as Columbo..."...ohhahh...let me ask you one more thing...". Would you be kind enough to inform/instruct me on the most lucrative aspects of this business, and just what that means in practical terms? Much Appreciated, Jerry H. ************************************************************************** 15)From: "Ken Lowndes" Subject: E-Mail Tracer Does anyone on this list know how to trace an e-mail message to find out who is the one "owning" the address, but not automaticly displaying their name? I am trying to determine the sender on certain e-mails who declines to identify themselves. For security reasons, I need to determine who it is that is sending me these messages. Thanks! The Roslow Group of Moes Kenneth L Lowndes PO BOX 55 GLENPOOL, OK 74033-0055 -USA- Royal@fullnet.net ************************************************************************** 16)From: Duece6x6@aol.com Subject: We had a great time at the Hamvention! Two people from the list stopped by. We found some great bargains. The conference idea is a dead issue, only 2 responses to me about it. As always a lot of talk no action. We saw all types of covert transmitters, for voice and some cutting edge techonolgy for video. Got one of the worlds smallest cameras and remote transmitter for under 200$. Talked to a slug of high tech wizards. Talked to some law enforcement whizzes too. Every time I go I come back with a headache. Bought some self encryp/decrypt speakermics for my walkies for 15$ ea.! Should ahve been there! THE DUECE ************************************************************************** 17)From: Mutter Subject: Re: Caller ID > RE:9)From: Lesa Becker > RE:Subject: How to ID my Callers? > > Hey Lesa, for one, never put your phone number on your answering machine, > unless you are on a bussiness line, because any one who really wants to > talk to you and you want to talk to them already has your phone number. Well, that's not really the point. The point is that giving your number (instead of you name) is a lot safer and it allows anyone who has a legitimate reason for talking to you to know they dialed the right number. > Most people evade the person they are calling's Caller ID by pressing *67 > on a touch tone phone, or 1167 on a rotary dial phone. Caller ID is not as > advanced, or sophisticated as we would like it to be just yet, but it'll > get better in time (as soon as I figure out how to make some damn hardware Heh, I think they actually have to start sending more 'sophisticated' data down the line before your modified hardware will be able to pick it up. I don't own a callerid (I tend to think they're a ripoff) but name-delivery (which is now available in many areas) looks like a real nice feature. I think I'll just wait until they offer callerid info on call-waiting calls before I acutally consider buying the service ... > adjustments on my caller ID). You might be able to buy some utility from > some spy site that allows you to "grab" the numbers before they become > unavailable, but I have yet to see such a device. > That would be quite a feat considering that your local switch never sends the private number down the line on *67 calls. What happens is that you call your friend, Bob, using *67. Your number is sent to your local switch, then passed to the target switch at which point it sees that you want to keep your number private, strips your number off and replaces it with a 'P' (I believe for private) and then sends the call off to Bob's CAllerID unit which interprets the 'P' as 'Call Blocked' or whatever the message it gives you. In short, such a utility does not exist. - M u t t e r Ed. root zine (http://www.openix.com/~mutter) mutter@openix.com ************************************************************************** 18)From: shadowrunner@voyager.net Subject: Cookie Control Here's a freeware program for Windows 95 useres that is supposed to be similar to Cookie Cutter. I don't know anything more about it. If anyone tries it please let the rest of the list know how it works. http://www6.zdnet.com/cgi-bin/texis/swlib/hotfiles/info.html?fcode=000CKP ************************************************************************** 19)From: strider@mail2.quiknet.com Subject: Re: Spy people on the net There is simply no way I can thin kof that the first program named here could POSSIBLY work over a 28.8(or probably even x2 or ISDN) data connection. There just is not enough bandwith to transmit any kind of viewable real time video, especially in the background while they are browsing. For this kind of program to work the victim would probably have to have a t-1 line or greater internet connection. If you doubt this just think about it for a little bit. Ever used real-audio (which realies HEAVILY on sophisticated data compression techniques)? If so you must have noted how much slower web pages load while the player is just receiving sound. If you realy want to spy on someone via the internet there are other more reliable and much harder to detedct methods. The second program is nothing more than a spamming made easy kit. This looks like a rip off to me. ************************************************************************** 20)From: BADCOFFEE@aol.com Subject: Going to freelance Hi guy's the job search is over Im going to freelance in what I do best...... I am organizing a entry service. Mainly lockouts, office complex's, breifcase combo's, file cab's, car's, safes and so on........ Focusing on the professional workplace. Strictly lockouts and entry. SEEKING: ***Referral on a safe-man to open complex safes ***I NEED a computer crack/hack for password cracks. <----NEED. Basically, if I get a job for someone that lost their password, I need you to gain entry (crack it). Unique oportunity on as needed basis. You name your price per job, I'll pitch it...if we get the job........75% is yours. I get 25% finders fee. (proposed, not less than $200 per service) *** Locksmiths- I plan on being busy. I would like to establish a relationship with several local locksmiths or an individual that would like to do a bit of freelancing here to give business to that is not entry related. Although locksmiths do entry's, I would like to have your entry overflow when a tech is not available. I give you referals and you don't give me something back.......our relationship ceases. E-mail me please, this is a good oportunity for both of us. ***Auto specialist: Specilized high end autos (Im not touching anything over a Datsun). Insurance required ***PI's and security profesionals- Special service offered: We send a mute to do your entries. I want your business. Special rates and the first one on the house. ***Storage facilities: We send the same mute. Special rates and first one on the house. NJ, I wan't to hear from you. Augie Badcoffee@aol.com ************************************************************************** 21)From: Larry Braden Subject: Re-introduction time MONTROSE INVESTIGATIONS Is located at 900 Mountain View Ct. Montrose, Colorado. Our staff is pleased and honored to personally serve the western half of Colorado. We also have well used, professional contacts throughout the United States when needed. We specialize in Missing persons, Finding biological parents, Surveillance, Worker's Comp., General Investigations, Process Serving and over 80 types of computer information searches. Also convenient through our local coalition is a complete hairs, fibers and textile Forensic Laboratory, a well experienced Aviation Inspector and a Narcotics Expert. Our fees are competitive and all assignments are guaranteed completely confidential. We are licensed ( even when not needed in our state ) and a proud member of the Professional Private Investigators Association of Colorado, the National Association of Investigative Specialists and the Association of Christian Investigator's. Consider us your Colorado Internet Connection and you will not be disappointed. If we are unable to complete a case for you we have a professional contact in the state of Colorado that can ! Respectfully, Larry Braden, Senior Investigator Tel.# 1-970-249-0593 voice & fax E-Mail at braden@rmii.com or visit our home page at http://www.angelfire.com/co/WestCoPI co-supervisor of http://www.ppiac.org CO Lic. # L10-85587 ************************************************************************** 22)From: Mark Deaville Subject: Random number generator Hi all, I saw a message for a random number generator and would like to ask is on available that you can choose how many numbers eg. 4 and also one that does not repeat a number already generated, reasons for this are that I would like to generate codes for alarms and sometimes it becomes heavy after doing 1000 or so codes. Cheers quovadis * Mark Deaville quovadis@taunet.net.au * * Unit 60/6 Stephens Rd,Alice Springs,NT Australia 0870 * * Work:61 8 89530366 A/H:61 8 89524661 * * THIS IS NOT THE OPINION OF CHUBB SECURITY * ************************************************************************** 23)From: "Bigsby" Subject: I have a situation Greetings everybody, I have a situation where I could use some insight, and hopefully somebody will have the answer(s) for this situation. I am setting up a pinhole camera for monitoring an upscale estate for the owner, and was wondering the best way to achieve my goals. I need to place a pinhole camera and transmit to a hidden recorder. My questions are: What is the easiest and cheapest way to transmit wireless video @200 ft. ? Is there an inexpensive wireless transmitter/reciever I can use, or what about using the house wiring to transmit the signal, much like the plug-in TV antenna's that use your house wiring as an antenna by isolating the current with a transformer? Could I do this with a video signal and transmit it over the AC house lines to a remotely hidden recorder on the same circuit? I guess I would have to hide the camera and transmitter inside some electronic device where I could paralell power from the cord inside. Any other suggestions or methods? Thanks in advance. Bigsby@bigfoot.com ************************************************************************** 24)From: Chancellor Subject: Cookie management system Thought this might be of interests to the list. Its a free (shareware) cookie management system for Netscape AND IE (among many others). They give a good description of cookies and their effects for anyone who doesn't know already. http://www.kburra.com/cpal.html ____________________ supafuz@tamu.edu ---------- ************************************************************************** Who are you? What's your specialty and/or interest? Let us know about your company... What would you like to see on the list? Post it. Let us know... Do you have something to contribute? We'd like to hear it... We want to know EVERYTHING and ANYTHING about eavesdropping, surveillance, countersurveillance & privacy related technology, etc... Remember: who, what, where, when, how & why... we want ALL the details... Do you have a question? Post it... A little free time? Help a member... With the INCREDIBLE brain power on this list, someone should have the answer ;-) P.S. Don't be a LURKER... Members take the time to post info for us all... give something back... Don't just take... Your input/knowledge is valued... ************************************************************************** Send Postings to: spyking@con2.com with "Post" in subject field with subject ************************************************************************** Subscribe to: spyking@con2.com In the subject field type: subscribe-surveillance list e-mail address ************************************************************************** Unsubscribe to: spyking@con2.com In the subject field type: unsubscribe-surveillance list e-mail address ************************************************************************** ...The Simple Rules of the Surveillance List... The Surveillance List Owners may Reject any posts that are/contain: 1) Info Unrelated to Eavesdropping, Surveillance or Privacy technology... 2) Flames or Negative posts... 3) E-Signatures that are considered excessive... 4) Advertisements not DIRECTLY related to the list topics... 5) Attached Files... 6) Oversized Posts... (May be edited to save room) **************************************************************************** This publication is copyrighted and is protected by U.S. and International copyright law. The information transmitted on this list may not be reproduced, reposted or forwarded to any non-list member without expressed written permission of the List Owner. Violation of U.S. copyright law is a criminal and civil offense... **************************************************************************** The Surveillance List is moderated by SpyKing@thecodex.com The List Owner will make EVERY effort to protect subscribers from spam... Copyright 1996, 1997 Codex Publishing Inc., All Rights Reserved... **************************************************************************** Vol 2 Issue # 117 ****************************************************************************** Vol.Two Issue #117 The Surveillance List May 23, 1997 Over 2000+ Members Worldwide Representing 46 different countries ****************************************************************************** IN THIS ISSUE... ****************************************************************************** 01) A little about ANI... 02) Magnetic Card Reader/Writer 03) I need a name 04) Netscape 3 ID's you 100% 05) PICK GUN TIP 06) Re: Need a battery 07) Re: CB Jammer? 08) Grim Reaper? 09) Page Alarm 10) Comments on Cookies 11) Re: Getting even 12) Need info 13) Where to get scannner info 14) Illegal phone use? 15) Re: E-Mail Tracer 16) Re: Help with scanner 17) Re: Caller ID ****************************************************************************** DON'T BE A LURKER.... GET INVOLVED... YOU ARE A MEMBER... MAKE THE MOST OF IT ****************************************************************************** 1)From: net_security@geocities.com Subject: A little about ANI... Automatic Number Identification (ANI) has been discussed quite a bit in this forum. I would just like to cover some of its practicalities. Some companies use ANI to record the number for future use, to route the call to a specialized telephone sales agent, or to send it to an Interactive Voice Response (IVR) unit. For example, if the call came in on a certain set of 800 numbers, it will route it to the IVR; but if it shows that the call came in from a normal area code like 305 or 415, it will route the call to a telephone sales agent. The callers telephone number can also be passed to a microcomputer which uses it to retrieve the caller's records for a database so the telephone operator can have immediate access to all needed information. Another usage of ANI is in Network Security. Call-back modems have been used with success. In this case, the user dials the organization's modem' telephone number, and logs into his account. Once the user enters the correct password, the modem automatically hangs up and dials the user's modem's telephone number. In this way, unauthorized intruders cannot access others' accounts (theoretically, barring tapping into the line) because the host computer or communications server will only permit access via modems calling from prespecified numbers. The drawback to this is that only one remote telephone number can be defined for each account. If users have several locations from which they wish to have access, call-back modems won't work. This is where ANI is useful. The network administer can specify several telephone numbers authorized to access each account. When a user successfully logs onto an account, the source of the incoming phone call is identified using ANI and if it is one of the authorized numbers, the login is accepted; otherwise; the host computer or communications server disconnects the call. Sincerely, gnu ************************************************************************** 2)From: Leah Subject: Magnetic Card Reader/Writer Dear List: I am very interested in this card reader stuff. How much data is encoded into the magnentic strip on the credit card? What is encoded onto the calling cards? Also, from the MOVIES (yeah I know probablly total BS) remember Terminator two? The kid, has some type of ribbon attached to a magnentic card, he presumably made, and is able to trick the ATM into giving him money. Is this possible or pure hollywood? and if possible, the ribbon and card would have to actually be related to a real account at the bank correct? Anyway, furnish information, this is facinating to me. Leah Leah Wesolowski Private Investigator Adoption Search Specialist (leahwes@ACMEInform.com) ACME Information 164 Manningham Drive Madison, AL. 35758 (205)464-0506 TEMPORARY Office Hours: When I can! (Baby due 6/23!) (205)464-0230 fax 24 hours a day, 7 days a week. Check out our web site: http://www.acmeinform.com/ACMEInf.htm ************************************************************************** 3)From: BADCOFFEE@aol.com Subject: I need a name Hi all, First: VERY special thanks to "the man!" Mutter for creating a random number generator specifically for my needs. If anyone want's a copy, please e-mail me. Second: Anyone have a stethoscope that they would like to sell? Trade? PS- Suggestions on a name for entry service? Im stuck at Shady Mountain Entry....the "Shady" is not good for business. PSS- Since NJ has no certification, or lisencing, or anything for that matter.....could someone here please "ordaine" me as "Certified", sprinkle some glitter on me and I'll have enerything I need. OR, please better yet........... Is there a place that has a "real" certification in NJ. It could be either "security or entry". A training school that has an invidual corse for entry/lockpicking or security?? I hate to go for a full fledged locksmith certification just to have a certification on entry. I think that some where along the lines, It might be handy to have "formal" training...and a document to prove it. Security certification/credentials would just about cover all passages of my journey. Augie ************************************************************************** 4)From: Judge@innocent.com SUBJECT: Netscape 3 ID's you 100% ID: 8a 5a ff e0 ef dd 05 0e e5 ac 6a f9 6a f7 c2 [Version Information] LockVersion=1.0 This is included for you in your TCP/IP Packets by Netscape, isn't that nice? Judge@innocent.com ************************************************************************** 5)From: BADCOFFEE@aol.com Subject: PICK GUN TIP Just toying around with the rapid clicking and it seemed to work very well. As fast as you can click with light/moderate torque and you'll see the plug spin to freedom. Beginers: Pick gun is not the key to the city. In fact it is very difficult to use properly. Easier than picking....but far from simple. Frustrating on some days....a blessing on others. Also- I did not get feedback on the Golden Master padlock key post. If anyone has tried using one Master key to open another Master padlock and it worked, please e-mail me. Augie Badcoffee@AOL.com Sending and receiving the stupidest questions on earth.......... Your very own.......Not-quite-yet-Certified, or-bonded-or-Insured-or-lisenced PROFESSIONAL ENTRY SPECIALIST ************************************************************************** 6)From: Trace Carpenter Subject: Re: Need a battery > >No, there's no problem. Mine is in a nice nylon pack with a custom fitted pocket for the lighter, but it doesn't have to be. Just go to Radio Shack and tell them you need a cig. lighter outlet. Either stock number 270-1527 or 270-1536. They're about $6 ea. Just get whichever one they have in stock. Cut the cord and hook it to your battery. Make sure you observe the polarity. Plug your cigerette lighter adapter for your camcorder into it and you'lll be fine. -- Trace Carpenter Trace Carpenter Investigations Professional Private Investigations 2926 Maple Ave., Ste. 200 Suspicions Confirmed Dallas, Texas 75201 Problems Solved ! 214.828.4520 Free Consultations 214.740.0112 Facsimile ************************************************************************** 7)From: Leah Subject: Re: CB Jammer? >I visited an old friend just recently and encountered something very >disturbing. The tenants below him talk on their CB constantly and it comes >through on my friends stereo and telephone very loudly. Dear Anton, You can cheaply do this by buying a CB and a signal amplifier and everytime the dude starts up, simply pick up the CB and "stomp all over his signal". If you have ever been listening on the road you can tell when a trucker has an amplified signal, it sounds very different when he talks... anyway that should be cheap and effective for your buddy. Leah Leah Wesolowski Private Investigator Adoption Search Specialist (leahwes@ACMEInform.com) ACME Information 164 Manningham Drive Madison, AL. 35758 (205)464-0506 TEMPORARY Office Hours: When I can! (Baby due 6/23!) (205)464-0230 fax 24 hours a day, 7 days a week. Check out our web site: http://www.acmeinform.com/ACMEInf.htm ************************************************************************** 8)From: "Ken Lowndes" Subject: Grim Reaper? Has anyone heard of Registered Microbiologist, Larry Harris? Claims to have been in the employment of the C.I.A. Was on a Texas based TV Talk Show, [interview & commentary format], Sunday, and makes the claim that since at least 1993, students from Iraq have been smuggling into the USA, the Blubonic Plague, and Anthrax, originally sold to them [Iraq], by our government, prior to the Gulf War. Claims that sometime in July of this year, 1997, they are going to release these toxins into the atmosphere from over 1,000 different localities, around the nation, [Inside the USA], to wipe out "the great satan." According to Mr Harris, the Pentegon projects that if they know the precise time this will occurr, which they do not, it will wipe out about 180,000,000 American Citizens, et al. Not knowing, and NO immeadiate prevenative action, that figure could be much higher. As the report goes, If that was bad enough, many of these students have also been trained on how to create make-shift hand grenades from over the counter products, and have been trained on how to place them inside electrical power plants and sub-stations to cripple the nation's power grids, nation-wide, and plan to do it at the same time they release the toxins. Says there is nothing that can now be done to stop it, and whatever the government may alledgedly know, it is doing nothing to stop these impending events. [Sounds like OK City all over again]! Is this report credible? Die in July? [Sorry this post is so long, but how can it shortened?] Kenneth L Lowndes royal@fullnet.net ************************************************************************** 9)From: Ron Smalley Subject: Page Alarm This is an idea for some P.I.s involved in "difficult stake out situations". As well as a request. Some years ago there was available a " Page Alarm", which was a vehicle alarm system that came with a pager with a range of 2 miles... The alarm unit could be connected to a door contact or a pressure pad to silently trigger a pager. An example might be a building in a country location with no comfortable / near location to watch. One could be in a van or distant building, and carry on with other tasks, to be alerted by the pager when the observed location was entered. I have used these many times, but never for its intended purpose. Now the request .. these are no longer available here. I would like to source these again. I do have a new system without its pager, if anyone could help with that. Contact me .. I would be happy to work out some deal. Ron Smalley rons@ns.planet.gen.nz ************************************************************************** 10)From: Michael MacDonald Subject: Comments on Cookies I too really do not like getting cookies (especially the ones with nuts) and have a rather simple solution. Make the cookie file/dir read only. For unix users: chmod a-w cookie.txt For dos users: attrib -r cookie.txt Hope this helps. Cheers, Michael MacDonald MacDonald Comprehensive Services ************************************************************************** 11)From: JbarD Ranch Subject: Re: Getting even "revenge ain't sweet"--usually true in my experience but not always "The best revenge is living well" no foolin. Josef ps geeze I look forward to reading this list every day ************************************************************************** 12)From: "Hal Damron" Subject: Need info Who markets the TA 2000 telephone with remote/wireless sensors and pre-programmed numbers to call when sensor circuits are activated? Some of my business customers need incognito prompting for employee monitoring. Go ahead and deluge me with info........... Haltron@nxs.net ************************************************************************** 13)From: Jim Youse Subject: Where to get scannner info >Hello all just a short question does anyone know anything about a >Realistic Pro-50 20 channel programable scanner as I just got one for >$50 and wanted to know can it be changed and the freq list for it. You may get a better response to this question on the SCAN-L list. This is a list devoted to scanning. To subscribe, send a message to LISTSERV@UAFSYSB.UARK.EDU with the text subscribe SCAN-L in the message body. You may also want to check out http://www.radioshack.com/ Radio Shack has a lot of information about their products online. Bill Cheek also has several books about scanner modification. His URL is http://ourworld.compuserve.com/homepages/bcheek/ Jim Youse - mailto:jyouse@omicron.com - http://www.omicron.com - mailto:jimyouse@prodigy.com - http://pages.prodigy.com/JimYouse ************************************************************************** 14)From: Wilgetem@aol.com Subject: Illegal phone use? Some of you must have ideas to help me. I had a "friend" ask to use my phone. Then while I was elsewhere he called a 900 number. Turns out he was trying to get a date and gave his first name, description, and phone No.. The agency that billed me had a recording of the call; which I now have. I want to charge him with something like "theft by deceit". The bill was for $33. What do you think. Incidentally, this guy is a lawyer and either knows I can't do anything or didn't know the call would be recorded. Wilgetem ************************************************************************** 15)From: CrACKeD Subject: Re: E-Mail Tracer > Does anyone on this list know how to trace an e-mail message to find out > who is the one "owning" the address, but not automaticly displaying > their name? I am trying to determine the sender on certain e-mails who > declines to identify themselves. For security reasons, I need to > determine who it is that is sending me these messages. Thanks! Look at the full headers of the message. Sometimes, the real sender is identified flat-out in a header, but most of the time you'll just see the host the message originated from in the "received" or "message-id" headers. Use the UNIX "whois" utility to look up administrative contact for the host and send a copy of the message with the full headers to that address. Cc the message to admin@host, abuse@host, postmaster@host, and hostmaster@host as well. Along with the administrative contact, one of those addresses will lead you to someone who has the ability to find out which user on their system sent the forged message. CrACKeD ************************************************************************** 16)From: CrACKeD Subject: Re: Help with scanner > Hello all just a short question does anyone know anything about a > Realistic Pro-50 20 channel programable scanner as I just got one for > $50 and wanted to know can it be changed and the freq list for it. There are no (useful) mods for this scanner. The frequency range is printed on the back. CrACKeD ************************************************************************** 17)From: Jim Youse Subject: Re: Caller ID > I don't own a callerid (I tend to think they're a ripoff) but >name-delivery (which is now available in many areas) looks like a real >nice feature. I think I'll just wait until they offer callerid info on >call-waiting calls before I acutally consider buying the service ... Call-waiting caller-id is available. It may not be available everywhere yet. Jim Youse - mailto:jyouse@omicron.com - http://www.omicron.com - mailto:jimyouse@prodigy.com - http://pages.prodigy.com/JimYouse ************************************************************************** Who are you? What's your specialty and/or interest? Let us know about your company... What would you like to see on the list? Post it. Let us know... Do you have something to contribute? We'd like to hear it... We want to know EVERYTHING and ANYTHING about eavesdropping, surveillance, countersurveillance & privacy related technology, etc... Remember: who, what, where, when, how & why... we want ALL the details... Do you have a question? Post it... A little free time? Help a member... With the INCREDIBLE brain power on this list, someone should have the answer ;-) P.S. Don't be a LURKER... Members take the time to post info for us all... give something back... Don't just take... Your input/knowledge is valued... ************************************************************************** Send Postings to: spyking@con2.com with "Post" in subject field with subject ************************************************************************** Subscribe to: spyking@con2.com In the subject field type: subscribe-surveillance list e-mail address ************************************************************************** Unsubscribe to: spyking@con2.com In the subject field type: unsubscribe-surveillance list e-mail address ************************************************************************** ...The Simple Rules of the Surveillance List... The Surveillance List Owners may Reject any posts that are/contain: 1) Info Unrelated to Eavesdropping, Surveillance or Privacy technology... 2) Flames or Negative posts... 3) E-Signatures that are considered excessive... 4) Advertisements not DIRECTLY related to the list topics... 5) Attached Files... 6) Oversized Posts... (May be edited to save room) **************************************************************************** This publication is copyrighted and is protected by U.S. and International copyright law. The information transmitted on this list may not be reproduced, reposted or forwarded to any non-list member without expressed written permission of the List Owner. Violation of U.S. copyright law is a criminal and civil offense... **************************************************************************** The Surveillance List is moderated by SpyKing@thecodex.com The List Owner will make EVERY effort to protect subscribers from spam... Copyright 1996, 1997 Codex Publishing Inc., All Rights Reserved... **************************************************************************** Vol 2 Issue # 118 ****************************************************************************** Vol.Two Issue #118 The Surveillance List May 24,1997 Over 2000+ Members Worldwide Representing 46 different countries ****************************************************************************** IN THIS ISSUE... ****************************************************************************** 01) Re: Alarm Systems 02) Re: The Cook Report 03) Re: tracking E-mail 04) Re: email tracing 05) How do I do a background check 06) Re: Magnetic Card Reader/Writer 07) Assasins 08) Re: Keystroke queue? 09) Re: Biochemical Weapons 10) What do you guys think? 11) Real question here 12) Re: Grim Reaper? 13) Re: Real Psychological Viruses 14) Re: Pager alert 15) Re: Cobra lock pick 16) Interference problem ****************************************************************************** DON'T BE A LURKER.... GET INVOLVED... YOU ARE A MEMBER... MAKE THE MOST OF IT ****************************************************************************** 1)From: BADCOFFEE@aol.com Subject: Re: Alarm Systems Special thanks to THE MAN! ----->brk@a2z.net for this e-mail response to my questions. Thanks again brain. >1- Do magnetic door contacts work off reverse polarity? Meaning what? Is the polarity one way for locked, and another way for unlocked? Usually they have one of two 'normal' states. Fail Safe or Fail Secure. As you can probably tell by the name, this determines if the unit is locked or unlocked during the event of a power failure. They usually require a voltage of about 10-24v to change state. Typical locks are Fail Safe, requiring a trigger voltage to unlock. >2- If an alarm keypad is located inside a dwelling, what is the usual pre set >delay. This can vary widely. Typical delay would be in the area of 30-40 seconds, usually 40seconds is the max the delay can be set for. Be carfeful though, most decent alarm systems can be set to have 'delay' and 'instant' zones. If you kick my front door open, you have 15 seconds to disarm the alarm. If you break a window or set off a motion sensor, you have 0 seconds to disarm the alarm. >3- Motion sencors.....heat or motion? Or different kinds for different >applications? Either/Or or a hybrid 'both' IR for heat, Microwave for motion. Cheapies are usually IR only. >4- Is there a visual difference visually between open and closed circut? No visual difference, and it's not always only one or the other. Most decent alarm systems use a 'resistive check', my alarm system has a resistor at the end of each zone. This sort of 'floats' the zone between 0 and infinite resitance. This way, I can have both N.O. and N.C. units in the same zone. Badcoffee for Brain at brk@a2z.net ************************************************************************** 2)From: Greg Caldwell Subject: Re: The Cook Report >Did any Uk detectives see the Cook report last night, certainly makes you think >twice before taking on that big job offer. Cador Pendry was really set up well. How about a synopsis for us Yanks about what happened. Who Pendry is, what he does, how was everyone "set up" and by whom, etc. What happened to Pendry might be a good lesson for PIs everywhere. Greg Caldwell Investigations & Security Consulting ************************************************************************** 3)From: Mike Banks <75300.2721@compuserve.com> Subject: Re: tracking E-mail Regarding questions from Kenneth Lowndes and others over the past several issues on the subject of tracking E-mail: My new book tells you exactly how to trace an E-mail message to its source, and track down the identity of the sender. The book is "Web Psychos, Stalkers, and Pranksters: How to Protect Yourself in Cyberspace." It is published by The Coriolis Group, and should be in your local bookstore now. Or, visit http://www.coriolis.com/webpsychos/ for more info, plus samples and links from the book. In addition to providing step-by-step instructions for tracing E-mail, the book offers all sorts of how-to and advice on tracking down people who think they're anonymous online; using Internet tools to trace and compile a dossier on someone; finding addresses and phone numbers on the Internet and online services; recognizing online scams and con games; keeping your own private information off the Net; and lots more. --Michael Banks ************************************************************************** 4)From: Chancellor Subject: Re: email tracing Not sure if this is as sophisticated as you want to get but it will possibly give you some useful info. on your mailer. The list has spoken of a program (free..do a search) called Traceart (or tracart) that allows for several options. One of which is the Finger utility which may bring back a name, time of last logon, mail in inbox ... You can also just use this option in your favorite UNIX shell. For instance type "finger supafuz@tamu.edu" and a wealth of information will flow. If they have a firewall up this will not work. Plus Tracart has other options. You can "see" all the servers that he/she had to go through to get to you. Hope this helps. ____________________ supafuz@tamu.edu ---------- ************************************************************************** 5)From: "Dark Lord Behemoth Ch'kar Brahma Lamma Lamma" Subject: How do I do a background check Hi gang, greetings to all. Just one question... how do I do a background check on someone? I have the guy's name and address. I'd like to check out if the services that he is offering are legitimate and not some kind of "con" or scam. Please advise. Regards, Dark Lord Behemoth Ch'kar Brahma Lamma Lamma ************************************************************************** 6)From: "Jon Harrison" Subject: Re: Magnetic Card Reader/Writer I'll bet the only data on magnetic strip cards (because of the size and the inaccuracies involved in manually dragging them through a reader) is an account number. Smart cards (with integral IC chips) are another matter. Here is a tale of antique 1970's technology... At one point I was employed as a programmer in a shop with less than astute management. As an internal control, the manager decreed that programmers could not enter the machine room (mainframe) at any time, he put a magnetic lock on the door, and he gave keys only to the operations staff. The only way we could get a test run done was, however, to run it personally; said operations staff was not competent to do anything non-routine. ASIDE: If you're a manager, never give an order your subordinates can't obey and get their jobs done. You won't be obeyed, and your employees will think (know) you're an idiot. Anyway, we immediately made arrangements with the operations folks to get around the system. In the process we borrowed one of their cards and tried to forge a copy. At the time there was a liquid which you could brush on magnetic tape, and which would let you read the 1's and 0's as wide or narrow dark bands. Using this liquid on the card, we found out how it was magnitized. We took a piece of computer tape and passed a small magnet over it crosswise until we had the same pattern, then Scotch-taped the magnetic tape fragment to a piece of plastic. It worked. JPH ************************************************************************** 7)From: ProvRhode@aol.com Subject: Assasins Hello, This list is about security servalliance and spying..that must also include assasinations. As we all know killing is a large part of what the CIA does, in this country and in other countries. I have often been intrigued with how they conduct this activity, especailly in a manner which never reveals who did it. If any of you could point out any web pages on the topic of, "taking someone out" or if you have personel knowledge you could share that would be much appreciated. +++Moderator's Note+++ Hey Prov... You must understand that that because of the secret nature of the intelligence business you probably won't find any list members willing to discuss services performed for their country... and besides if we told you we'd have to kill you... ;-) ************************************************************************** 8)From: WindWalker Subject: Re: Keystroke queue? I have found KeyLog to be the best keystroke recorder program. Search http://www.filez.com/ for keylog31.zip or keylog95.zip (31 for Win31 and 95 for Win95). -WindWalker ************************************************************************** 9)From: Jenn Saint-John Subject: Re: Biochemical Weapons > Has anyone heard of Registered Microbiologist, > Larry Harris? Nope; never heard of him, but since there are literally millions of microbiologists out there, that's not really surprising. You could always check with the professional organizations and see if he's a member. But if he's what he claims to be, you won't find him, and if he's not what he claims to be, you won't find him. :) > makes the claim that > since at least 1993, students from Iraq have been > smuggling into the USA, the Blubonic Plague, and Anthrax, > originally sold to them [Iraq], by our government, prior to the Gulf War. > Claims that sometime in July of this year, 1997, they > are going to release these toxins into the atmosphere Hooey. Biologicals are actually fairly delicate critters. They're also extremely unpredictable and difficult to work with; these students would have to already have advanced micro training as well as the money and equipment to build the launching systems and equipment for the production and containment of the critters ,or the critters would already have to be in their carrier form (and if the latter, I really doubt they'd get through customs, certainly not in any great amount). Btw, the US did extensive testing of Anthrax on its own populations in the late 1950s, including releasing Anthrax into the NY City Subway system, and of course we all know how millions died in that debacle. One of the major reasons we have NOT had a major use of biologicals is the difficulty with delivery systems. Seriously, while the terrorist use of biochemical weapons is a real and dangerous threat, the scenario this guy presented is just nonsense. First of all, you don't need to smuggle BP and Anthrax in to the States, and even if you did, you wouldn't bring it in in quantity, you'd just grow your own. Heck, most college microbiology students can gain access to those critters. I know we had Anthrax in my lab, though I don't recall BP. (Those also aren't the critters I'd choose for terrorism, either, btw -- they're not nearly quick enough or fatal enough. Anthrax is generally considered a "battlefield" biological, and while untreated cases have a 85-95% fatality rate, the vaccine works, and treatment is available with common antibiotics. Anthrax can be spread by skin to skin contact, but it is difficult, often requiring multiple exposures. To get an effective fatality rate, you've got to have pulmonary infection, and that means direct inhalation.) If my desire was to kill, I'd release Tularemia; if it was to both kill and throw the country into economic disarray, I'd release multiple genetically engineered strains of influenza. Secondly, all the models show that the most efficient use of biologicals on the US is a sea launch. Inland launches tend to wind up in "pockets". There are other factors involved in the carrier mechanism as well. Thirdly, terrorists have avoided large-scale acts with biologicals with good reason. The public outcry and backlash against such an act would destroy their own base of support (we've seen this time and time again with use of biochem). The retaliation response from the target's government would be extreme. As a rule, individual terrorists are not particularly well-trained or well-educated (we're not talking leadership here, but rank and file), and as a rule, those individuals are fearful of personal risks associated with biochem weapons (and well they should be). Again, there are other reasons. This reply's already too long, and I'm going to be late for a date. May I suggest a study by Jeffrey D. Simon, prepared for the US Armed Forces Medical Intelligence Center, "Terrorists and the Potential Use of Biological Weapons"? It's available through Rand for the general public. ISBN#0-8330-0987-7. Another good resource is NO FIRE, NO THUNDER: The Threat of Chemical and Biological Weapons, by Sean Murphy, Alastair Hay, and Steven Rose, ISBN#0-85345-662-3. Both are available from Amazon.com; there are also some very good web sites which feature information on terrorism and biochem. But I wouldn't worry about this one. ************************************************************************** 10)From: Jesse Subject: What do you guys think? What do you guys think? I really think it is just a way of trying to tell people not to drink or something?? Not too sure though... Please don't go flame crazy, jut try to figure if it is a real situation or not.. >Dear Friends: >I wish to warn you about a new crime ring that is targeting business >travelers. This ring is well organized, well funded, has very skilled >personnel, and is currently in most major cities and recently very >active in New Orleans. The crime begins when a business traveler goes >to a lounge for a drink at the end of the work day. A person in the bar >walks up as they sit alone and offers to buy them a drink. The last >thing the traveller remembers until they wake up in a hotel room bath >tub, their body submerged to their neck in ice, is sipping that drink. >There is a note taped to the wall instructing them not to move and to >call 911. A phone is on a small table next to the bathtub for them to >call. The business traveller calls 911 who have become quite familiar >with this crime. The business traveller is instructed by the 911 >operator to very slowly and carefully reach behind them and feel if >there is a tube protruding from their lower back. The business >traveller finds the tube and answers "Yes" The 911 operator tells them >to remain still, having already sent paramedics to help. The operator >knows that both ot the business traveller's kidneys have been harvested. >This is not a scam or out of a sciencee fiction novel, it is REAL. It >is documented and confirmable. If you travel or someone close to you >travels, please be careful. > >Regards, >Jerry Mayfield >Austin Ops Engineering Manager >(512) 433-6855 >Pager: (512) 613-3710 > > >From: Patty Radford@Desktop@PCPD Hou, on 12-16-96 > >Yes, this does happen. My sister-in-law works with a lady that this >happened to her son's neighbor who lives in Houston. The only "good" >thing to his whole story is the fact that the people doing this horrible >crime are very in tune to what complications can happen afterwards >because of the detailed precautions they take the time to set up before >leaving the room. The word from my sister-in-law is that the hospital >in Las Vegas (yes, Vegas) prior to transferring him back to Houston >stated that these people know exactly what they are doing. The >incision, etc. was exact and clean. They use sterile equipment, etc. >and the hospital stated that other than the fact that the victim looses >a kidney there has not been any reports of other complications due to >non-steril, etc. tactics that were used. > >Please be careful. > > >From: Kathy White@OS Dev@Sys Hou > > >Sadly, this is very true. My husband is a Houston Firefighter/EMT and >they have received alerts regarding this crime ring. It is to be taken >very seriously. The daughter of a friend of a fellow firefighter had >this happen to her. Skilled doctor's are performing these crimes!! >(which, by the way have been highly noted in the Las Vegas area) >Additionally, the military has received alerts regarding this. >________________________________________________________________________ > >This story really blew me away. I really want as many people to see >this as possible so please bounce this to whoever you can. > >Please think when you drink. > >A friend of mine from UT passed this story on to me from the "Daily >Texas" --the University of Texas newspaper. Apparently, it occurred >during Fall Premier -- a UT tradition that is a celebration of the end >of midterms. > >"Reason not to party anymore"-- > >This guy went out last Saturday night to a party. He was having a good >time, had a couple of beers and some girl seemed to like him and invited >him to go to another party. He quickly agreed and decided to to along >with her. She took him to a party in some apartment and they continued >to drink, and even got involved with some other drugs (unknown which). > >The next thing he knew, he woke up completely naked in a bathtub full of >ice. He was still feeling the effects of the drugs, but looked around >to see he was alone. > >He looked down at his chest, which had "CALL 911 OR YOU WILL DIE" >writted on it in lipstick. He saw a phone was on a stand next to the >tub, so he picked it up and dialed. He explained to the EMS operator >what the situation was and that he didn't know where he was, what he >took, or why he was really calling. She advised him to get out of the >tub. He did, and she asked him to look himself over in the mirror. He >did, appeared normal, so she told him to check his back. He did, only >to find 2 nine inch slits on his lower back. She told him to get back >in the tub immediately, and they sent a rescue team over. > >Apparently, after being examined, he found out more of what had >happened. His kidneys were stolen. They are worth $10,000 each on the >black market. (I was unaware this even existed.) Several guesses are >in order: The second party was a sham, the people involved were at least >medical students, and it was not just recreational drugs he was given. > >Regardless, he is currently in the hospital on life support awaiting a >spare kidney. The University of Texas in conjunction with Baylor >University Medical Center is conducting tissue research to match the >sophomore student with a donor. > >Any information leading to the arrest of the individuals may be >forwarded to the UT Campus Police or the Texas Rangers. > >Kim Antell, Editor of the Daily Texan >UT Austin >Mechanical Engineering, Graduate Office > >Phone: (512) 471-7571 >Voice: (512) 475-9794 >Fax: (512) 471-8727 > > >PLEASE DON'T TAKE DRINKS FROM STRANGERS..... >It's medically absurd. The lady knows the man's blood and tissue type? >His medical history? The ring removes BOTH kidneys but wouldn't think >of killing the patient, who could identify the decoy? Then they give >this >kidney, presumably containing chloral hydrate or some other knock-out >preparation, to an anesthetised kidney patient who conveniently has > the same tissue type? I hope they get the patient's check BEFORE >the surgery.>\ >I've seen this before as an example of urban legend, complete with the >usual friend-of-a-friend citations. > >(I do wonder whether this version is someone's scare tactic for reducing >drinking. As a teacher, perhaps I should forward the story, claiming >that it >happened to a student cutting class.) >Carolyn >My husband, an M.D., corrects me that the tissue type isn't essential, >but >the blood type certainly is. So either the ring would have to house >lots >of potential patients, or it would have to throw away many kidneys. >(I'm >AB negative, so only 1 in 200 bar patrons would have the right type of >kidney-- >and what if that 1 had some kidney problem?) >He also thought an anesthetist >could handle the mickey along with the other anesthesia. However, >he does add that this cabal would have to keep a chain of secret >hospitals. >Kidney transplantation is not a simple outpatient procedure to be >performed >by one larcenous vascular surgeon and a few friends. >Then, presumably, the news media would have to be prevented from >covering >any of these supposedly frequent events. Not a plausible conspiracy. >Carolyn sorry it is so long, but it is so strange... ************************************************************************** 11)From: BADCOFFEE@aol.com Subject: Real question here Am I the only person here that has become a bit more paranoid since the inception of this list? Im getting over it quite slowely but has anyone ever heard normal clicks in their phone and insisted it was tapped? My phone sometimes Calls the other party back on it's own after I hang up. What's this all about?? I know...because then they usually call me back and ask why I just called and hung up. (???nope) Has anyone else here also faced these symptoms: The "entry specilist's" glove box was mysteriously locked to my truck yesterday. (picks inside). I drove around all day "insisting" there was a bomb in there. Thank you to the piss they now call "gasoline" my engine ticks. lol "HEY....don't stand next to that truck....! Scram Don't worry about it...just keep a distance" (son locked it....loves keys) A creditor or supplyer might call and you interrogate this shit out of them for 25 minutes......just to give them information like. Yes...this is Augie. If you have 2 dogs........ever wonder.... When they're biting each other on the ears...ARE THEY??? Or are they passing secrets???? A bark??? Or is that some encripted message? Dogs.......PROOF! Dial a number with a Faxtone....drop it on speaker phone, the dog's ears go WAY up...like an antenna, head tilts to one side...then the other (I see...adjusting antenna to get best reception huh). When the call is done......runs to the other dog and bites its ears. Hmmmm? I kicked a pile of leaves that were aparently sprayed by some info passing cat. (information broker) Now, my boots smell like cat piss for 3 weeks. Or was this a plan?? To get that information encripted in the scent.....across borders? Hmm.... My 3 year old started barking........yours? When you nice people come over for coffee.......carefull what you say around my pup's. I don't trust them. This isn't just me right? Augie<---scratch that John Doe ************************************************************************** 12)From: "Dr Jamie Love" Subject: Re: Grim Reaper? >Has anyone heard of Registered Microbiologist, >Larry Harris? Nope. Registered through whom? My bet would be the Americam Microbiology Association, but if I were telling fibs, I'd simply say "I'm registered (at Dayton's?) as a Microbiologist." >Claims to have been in the employment of the C.I.A. Everyone's favorite fib. [snip] >smuggling into the USA, the Blubonic Plague, and Anthrax, [snip] >are going to release these toxins into the atmosphere >from over 1,000 different localities, around the nation, [snip] >will wipe out about 180,000,000 American Citizens, et al. The "problem" with germwarfare (from the murders' point of view) is delivery. It's easy to grow most medical-microbes in large quantity, but hard to get them around effectively. Bulbonic Plague is spread by flea bits, not inhalation. Even the BW (biowarfare) literature of the 1960s discounted bulbonic as a viable weapon. You'd have to hatch, feed and distribute huge amounts of hungery fleas! Life on the flea-farm would be very difficult to manage. Imagine thousands of dogs/cats infected with millions of fleas and trying to infect the fleas, collect them live and distribute them! Anthrax is a much better way to "destroy the great satan". The anthrax bacteria "sporulates", so it's easy to collect, pack and distribute. More importantly, it's spread by inhalation and lingers for years! But, as with most of these BW plans, the problem comes back to distribution. You need a large airforce to spray enough around each city. Or, you would need to get into the air-systems of lots of buildings. Thousands of Iranians renting crop-dusting planes or doing maintaince on air-conditioners in the big cities might look suspicious. If you see this activity, contact the FBI and stock up on penicillin! (Anthrax is killed by most easy to aquire antyibiotics.) >Is this report credible? No. But it would make a good movie or excuse to get some clown on TV. >Die in July? If there is any truth to this at all (I doubt it as it has "bullshit" written all over it) one might cause some local deaths and a lot of panic. Much like sarin in a subway. But millions of people! No way. I think Mr Harris (or his script writer) found an old Mico-book, read the part about "famous diseases in history" but never made it through chapter on epidemiology (because it has a lot of math!). Seriously, the major concern among health professionals (both civilian and military) is that the multi-drug resistant tuberculosis currently festering in the lungs of the "down-and-outs" of Americas big cities, will explode into an epidemic. The enemy is within. Indeed, perhaps Iranians have infiltrated the commitities responsible for financing inner city health programs and are responsible for the (insane) budget cutting and optimism about TB programs. But Mr Harris (or a real doctor) wouldn't get much air time discussing that threat because it sounds like some left-wing nutter who wants to save the bums of New York with tax payers money. It's a funny world. Jamie Jamie Love (PhD, MBA, MD in progress) Scientist for Hire "Life is my business" http://www.virtual-pc.com/mindweb/merlin/sci4hire.html EMAIL jamie@enterprise.net OR merlin@megatropic.com ************************************************************************** 13)From: "Dr Jamie Love" Subject: Re: Real Psychological Viruses >If you ever receive mail with the subject that says >'Money 4 free' , or 'Be rich now' [snip] > should campaign in the way of mail bombing each one to dis-courage the spread of such waste of band-width. Hope this saves you a few tics on your clock. It has been my experince that mail bombing these bastards wastes _more_ bandwidth and tics. Most of these clowns (somehow) have phony reply emails (they ask the sucker to snail mail them the check for thier "book", "method", etc.). So all I get is my mail returned, including the venom I've sent! (postmaters says "user unknown") Or, _any_ reply to their email address brings a autoresponded message telling me more about their "fantastic offer". (At least Jehovah's Witnesses are polite enough to go away!) I'm very irritated at these clowns because (unlike those of you who live in a civilized country with flat rate monthly phone bills) I pay by the second to collect their rubbish as I collect the email (that I DO want!). And these spammers often have hundreds of Cc on thier list so I get a long download of many other victims! So, (assuming Spyking hasn't decided I'm way off subject) do any of you folkd have a suggestion as to how I can avoid wasting my time with this kind of email? (Don't suggest "filtering" because I have to download it in order to filter it! Or at least that's how my Pegasus seems to work.) About the "user unknows".... I've wonder if there is a way to set up (on my host's email "collector") an autorepsonder to all received messages that would just send the person a quick "check out" (finger?). Is the it bounces back "user unknown, then this (mythical?) program on my host's machine would just delete it. (Because if I can't respond to it I don't have much of a reason to read it! I realize that may not be true of all of you but it would work for me.) Suggestion welcome. Jamie Jamie Love (PhD, MBA, MD in progress) Scientist for Hire "Life is my business" http://www.virtual-pc.com/mindweb/merlin/sci4hire.html EMAIL jamie@enterprise.net OR merlin@megatropic.com ************************************************************************** 14)From: Spysociety@aol.com Subject: Re: Pager alert >>>> This is an idea for some P.I.s involved in "difficult stake out situations". As well as a request. Some years ago there was available a " Page Alarm", which was a vehicle alarm system that came with a pager with a range of 2 miles... The alarm unit could be connected to a door contact or a pressure pad to silently trigger a pager. An example might be a building in a country location with no comfortable / near location to watch. One could be in a van or distant building, and carry on with other tasks, to be alerted by the pager when the observed location was entered. I have used these many times, but never for its intended purpose. Now the request .. these are no longer available here. I would like to source these again. I do have a new system without its pager, if anyone could help with that. Contact me .. I would be happy to work out some deal. Ron Smalley rons@ns.planet.gen.nz <<<< Hi Ron, I owned an alarm just like that, except I left it installed in my truck when I traded it in. But the good news is I still have the pager! It's a Crimestopper Crime Page model CP4900. It's in excellent condition too, it also has an adjustable frequency range in the battery compartment. It runs off of a 9-volt battery or 9-volt DC adapter. I paid about 100 bucks for the entire system about 7 years ago, don't know what the pager part would be worth these days though. Interested? Spysociety@aol.com ************************************************************************** 15)From: amaci@starnet.net.ph Subject: Re: Cobra lock pick I sent an message to the list members asking for an address for the company selling the Corbra lock pick tool Can anyone help? Raymond Jackson amaci@starnet.net.ph ************************************************************************** 16)From: TaaDOOW@aol.com Subject: Interference problem HI....How is everybody? I needed some info or suggestions on radio waves. I had recently bought a mini-stereo system with radio, tapedeck, and cd-player and every time I switch it to play a tape I hear radiostations in the back ground! It seems like it's picking up the stations from the speaker wire. I know that that's how walkmans pick up radio stations, but is it the sam for a mini- boombox? Could some give me suggestions on what I should do or tell me if theirs something I can do or get to cover the speaker wire with! Or someting else? Thankyou you all for you time! Keep up the good work with the list! Seeya!!!! Jaron Lamot taadoow@aol.com ************************************************************************** Who are you? What's your specialty and/or interest? Let us know about your company... What would you like to see on the list? Post it. Let us know... Do you have something to contribute? We'd like to hear it... We want to know EVERYTHING and ANYTHING about eavesdropping, surveillance, countersurveillance & privacy related technology, etc... Remember: who, what, where, when, how & why... we want ALL the details... Do you have a question? Post it... A little free time? Help a member... With the INCREDIBLE brain power on this list, someone should have the answer ;-) P.S. Don't be a LURKER... Members take the time to post info for us all... give something back... Don't just take... Your input/knowledge is valued... ************************************************************************** Send Postings to: spyking@con2.com with "Post" in subject field with subject ************************************************************************** Subscribe to: spyking@con2.com In the subject field type: subscribe-surveillance list e-mail address ************************************************************************** Unsubscribe to: spyking@con2.com In the subject field type: unsubscribe-surveillance list e-mail address ************************************************************************** ...The Simple Rules of the Surveillance List... The Surveillance List Owners may Reject any posts that are/contain: 1) Info Unrelated to Eavesdropping, Surveillance or Privacy technology... 2) Flames or Negative posts... 3) E-Signatures that are considered excessive... 4) Advertisements not DIRECTLY related to the list topics... 5) Attached Files... 6) Oversized Posts... (May be edited to save room) **************************************************************************** This publication is copyrighted and is protected by U.S. and International copyright law. The information transmitted on this list may not be reproduced, reposted or forwarded to any non-list member without expressed written permission of the List Owner. Violation of U.S. copyright law is a criminal and civil offense... **************************************************************************** The Surveillance List is moderated by SpyKing@thecodex.com The List Owner will make EVERY effort to protect subscribers from spam... Copyright 1996, 1997 Codex Publishing Inc., All Rights Reserved... **************************************************************************** Vol 2 Issue # 119 ****************************************************************************** Vol.Two Issue #119 The Surveillance List May 26,1997 Over 2000+ Members Worldwide Representing 46 different countries ****************************************************************************** IN THIS ISSUE... ****************************************************************************** 01) Re: Hidden message contest 02) Tx ringback number? 03) Bio war scenario 04) Re: Random Number generator 05) Re: What do you guys think 06) Re: moderator's response to "assasins" post 07) Homing Device? 08) Passports 09) Re: Stolen Kidneys 10) Re: Interference Problem 11) Crime Ring 12) SPY SHOP BUSTED... 13) Re: Magnetic card, pic and smart card readers/writers 14) Be Rich Now? 15) Re: The Cook Report 16) Re: Alarms 17) Need Info 18) Re: Assassinations 19) Organ Harvest 20) Tracking E-mail 21) Re: Cobra Pick Address 22) Re: Name for Entry Services 23) Re: Getting Even 24) Perimeter entry sensor? 25) Re: Interference Problem 26) The trouble with business 27) Bugs 28) Getting past the keypad 29) Spying on people on the Internet ****************************************************************************** DON'T BE A LURKER.... GET INVOLVED... YOU ARE A MEMBER... MAKE THE MOST OF IT ****************************************************************************** 1)From: thesaint Subject: Re: Hidden message contest I agree with the gentleman who believes the hidden message is in the CODEX logo. Ive tried 3 different logos but CODEX3D1.GIF has extra goodies inside. Ive also tried a few steganography programs to no avail. Ive even gone into MS DOS editor to try my hand at the files to no avail. All the 3D.GIF files are the same throughout the website, 3D1.GIF has 107 pages as apposed to 42 pages. Ive tried altering the gamma controls and many other possible resolution and graphical alterations to see if it is hidden that way. NO LUCK. I noticed a program called ghostship or similar which strips away the signature and identifying features of an encryption program, could this have been used so that none of our encryption programs recognise the algorythm ?? I'm still trying, but no getting very far ! Regards Johan +++Moderator's Note+++ OK, enough have found something in the .gif It's there... now find it and decode it to win... ************************************************************************** 2)From: Klint Bailey Subject: Tx ringback number? DOES ANYONE KNOW THE RINGBACK NUMBER FOR TEXAS? ************************************************************************** 3)From: witzend@peganet.com Subject: Bio war scenario 1.Please be advised about a couple of things that I have personally run across: a) the folks who work for the "agency" are basically a cagey lot; particularly those who work in the Bio war fields. b) With respect to the research done: it is usually done via contract and 3rd parties. c) the folks who oversee such programs seldom are seen and never heard outside their own agencies save a professional journal or 2. d) pieces are so arranged as to make transparent the full motives of the individual letting the contract. e) the full impact and implications are taken on by a special staff in the military, or desk in the agency. 2.The scenario of which you speak is one that has been "gamed" since the fall of the Shaw at war colleges throughout the world. The problem with an open society is that of it's vulnerability to it's own freedoms. One of these type of scenarios included a terriorist with a suitcase sized device. what would happen in a major city. While it is not pretty to contemplate, these folks do and must. Those on the periephry of the gaming circuit probably get a different view. As would any good individual it is a daunting thought. 3. As to whether or not some operation has actually been set into motion. There are several telegraphs to their punch. Manufacture of bio specifics require tagged type items. These are monitored. As are the principal delivery vehicle they too are monitored as non resident aliens. Specifically for the reasons mentioned. 4. Sorry to be a damper. It is a fun plot for a Robin Cook type book, don't you agree ? ************************************************************************** 4)From: "Richard A. Kinkopf" Subject: Re: Random Number generator If you want to see all permutations of digits, you can use a simple basic program: x=4 (say you just want the digits one thru four) for i=1 to x for j=1 to x for k=1 to x for m=1 to x print i;j;k;k next m next x next j next i This program will print the numbers 1111, 1112, 1113, 1114, 1121,....4444 Just change the value of x to change how many digits you want. Hope this helps, rkinkopf@concentric.net ************************************************************************** 5)From: John Boyd Subject: Re: What do you guys think >10)From: Jesse >Subject: What do you guys think? > [snip] >>Dear Friends: >>I wish to warn you about a new crime ring that is targeting business >>travelers. This ring is well organized, well funded, has very skilled >>personnel, and is currently in most major cities and recently very >>active in New Orleans. The crime begins when a business traveler goes > Organ theft is another Urban Legend. Check out the following URL: http://www.urbanlegends.com/medical/organ.theft/bit_listserv_transplant_faq_ organ_theft.html Please people -- get a bigger bulb for your skeptic light!! Don't take stories from your sister-in-law's neighbor's brother-in-law's cousin's mailman at face value. Use a good search engine like www.metacrawler.com, or others and check this stuff out for yourself! Cheers! ---------------------------------------------------------------------------- "For every complex situation there will be a simple answer -- and it will be wrong!" Email: jboyd@bigfoot.com ************************************************************************** 6)From: China Subject: Re: moderator's response to "assasins" post Very good. ROFLMAO :> china ************************************************************************** 7)From: "The Dark One" Subject: Homing Device? Does anyone out there know where I can get a device, to place on someones car, and then it would emit a signal that would let me see wherever he went? Within a given range of course. I appreciate any ideas. ************************************************************************** 8)From: "nwbc" Subject: Passports Ocean Imports International, Inc. is an Authorized Agent for several South American and Caribbean countries "Economic Passport Programs" (second passports.) For information about one of these programs, please contact: R.L.Leatherwood, CEO at 808-575-9137, FAX 808-575-9150 or Email your fax number for further information. Sincerely, R.L.Leatherwood President & CEO ************************************************************************** 9)From: lazlo@shadowlink.net Subject: Re: Stolen Kidneys This topic really doesn't interest me, so here is a little more info to help cloud it with skepticism: In every story, a businessman wakes-up in a tub, with a sign that says, "don't move and call 911". If this is true, how is the guy susposed to tell them where he is; he might not even be in the same town! He doesn't know the name of the hotel, he doesn't know the room #, Etc. Etc. Etc. He was drugged the entire time, remember. Someone wasn't thinking when they made-up this tale. If I have been mis-informed, please correct me, and drop this topic ASAP. -Lazlo ************************************************************************** 10)From: "Arny Buckman" Subject: Re: Interference Problem Before you go too far with complex solutions, try one little test first. While you're in tape mode, tune your radio to different stations. If the output of your tape player follows the tuning control, you're dealing with a very poorly designed mode switch that doesn't provide sufficient isolation. arny@ultranet.com ************************************************************************** 11)From: alexb@echo-on.net (Mr. Cay Sal) Subject: Crime Ring I am not overly shocked by the message regarding the new crime ring on kidneys. And I am hardly surprised that reports came from New Orleans. New Orleans has a real bad reputation for crime and a questionable police force. The broken window theory is simple. If not fixed, criminal break more windows. A police 'presence' is important. Look at New York City. Beef up police force, crime goes way down. Surprise. Surprise. Although this movie did not need to educate me on this crime, an excellent one dealing with this issue was DEATH WARRANT with Jean Claude Van Damme. Prison inmates begin dying for no apparent reason. The warden is running a prison scam whereby inmates are killed for body parts so that he can first, rescue his wife, and second sell the others on the market for the benefit of all. Similar story and recent. EXTREME MEASURES with Gene Hackman as neurologist. Attacking the homeless for nerve tissue in neurology research. It disgusts me as to how low society has gone in the pursuit of money. But where there is a way, there is a will. ************************************************************************** 12)rom: alexb@echo-on.net (Mr. Cay Sal) Subject: SPY SHOP BUSTED... Toronto Spy shop is busted for selling surveillance equipment. Metro Police go undercover to investigate. Ask store owner that he has a problem with cheating wife. Store owner 'explains' what to do (illegal) and gets busted. Shop raided. Some items found that are illegal to use in Canada ************************************************************************** 13)From: "karl kiefert" Subject: Re: Magnetic card, pic and smart card readers/writers This company sells them all. They are well established in the UK but their web pages are small. The address //www.maplin.co.uk ************************************************************************** 14)From: "karl kiefert" Subject: Be Rich Now? Well perhaps? I bought 4 pints of oil and got cheap minature krypton bulb torch. Days later I went to the petrol station, put in a couple of gallons, paid my cash and got a scratch card. So that evening having nothing better to do, in a dark room, I put the torch on the silver-grey scratch surface and looked behind at the carboard side. I feintly saw the answer, unscratched it and won a keyring. Of the 3 gifts all that I got were keyrings and so many that I could not even give them away. Since then I have tried a lotto scratch card but with no sucess. The card or coating is too thick I am wondering if these can be read in any way or with any special frequency/method of light radiation. Things that have crossed my mind are MRI, infra red, utra violet. laser or an extra bright magna light? Anybody tried it or any suggestions? Karl ************************************************************************** 15)From: Martin Pask <100142.3101@compuserve.com> Subject: Re: The Cook Report I did not think I would get this response from the other side of the pond, but her is a brief summary. Well this guy Roger Cook is a self styled do gooder in the UK fitted out with the latest surveillance equipment and the backing of one of the main television channels he goes about the world highlighting frauds and corruption. For the most part he does a good job. However, the last program that he done was on Private Investigators. What he done, was to employ the services of a London Based investigator (Cador Pendry ) to suposidly look into the background of the protesters who are currently disrupting work at Manchester airport. He was asked if he could put phone taps in, which he agreed to do. When the investigation company team went to place the taps in the BT main junction box, the television crew were waiting covertly filming. They then arranged a spurious meeting with Pendry and his partner. As this meeting was taking place in walks Cook with the film crew camera running. As I have said double standards on Cooks part as He must have used the same methods himself in the past and will do in the future. Regards M.P.I ************************************************************************** 16)From: "karl kiefert" Subject: Re: Alarms Badcoffee, That resistive alarm uses something called a "window discriminator" circuit. Usually they hace a bit of tollerence built into them as changes in heat can cause the tolerance of the circuit to vary. Each part of the circuit can have its own "resistive Key" If the value say rizes or falls say bellow 5% then you are detected. Thse types of circuits are often used in stores and are those wires that they place through the handles of radios. If the wire is cut the alarm triggers and if someone places a pin through it then it also triggers. Karl ************************************************************************** 17)From: William Roche Subject: Need Info Hello, and Greetings from Intern Investigations Norway. This is just a reminder to those of you who wish to be included in Intern`s Global Register Database for the Private Ivestigative Industry, and those of you in the Security , Protection Intelligence Business, you can register free with Intern. Email To: wroche@sn.no Any Private Investigators from : Finland, Sweden, England, Eire, Spain, France, Germany, Portugal, Brazil, Canada, Scotland, Wales, Africa, South Africa, Japan, Holland, Denmark, Israel, Russia, Hungary, Poland, Jamaica, India, Pakistan, Saudi Arabia, Italy, South Korea, Belgium, Luxemborg, U.A.E., Australia, Austria, Carribean Islands, Alaska, Greenland, Thailand, Malaysia, Greece, Cyprus, Turkey, Jordan, China, ect. Are Welcome. Interns Database will be available to all in the Investigative related Industry, making contacting each other for enquiries, or business, or conducting Agency fee work a lot easier across the entire world. It will be available in the near future when completed. Thanks for your co-operation Intern. ************************************************************************** 18)From: Jenn Saint-John Subject: Re: Assassinations For: ProvRhode@aol.com > As we all know killing is a large part of what > the CIA does, in this country and in other countries. Actually, no, I would not consider assassination a "large part" of what the CIA does. They're far too public an organization; there are other smaller units that operate without the CIA's problem of being in the limelight. But in any case, imo, the US as a whole does in fact tend to stay away from this method of implementing policy changes. That's not to say that we never do it, by any means, but we're certainly not in the top ten countries. The CIA likes to =talk= about doing it... >I have often been intrigued with how they conduct this activity, especailly in >a manner which never reveals who did it. It's not particularly difficult to kill someone and get away with it, especially if it's an impersonal murder where there's absolutely no connection between the hit man/woman and the victim. I'm not really certain what sort of information you're asking for here. Every situation is different, so every method of assassination will be different. There's no "handbook" for termination (as in the sense of no formula per se). You learn the mission parameters (witnesses/no witnesses ok; "natural" death or doesn't matter; yatta yatta yatta), you study the victim, you make your plan, you execute it, you get the hell outta there. >If any of you could point out any web pages on the > topic of, "taking someone out" or if you have personel knowledge you could > share that would be much appreciated. And then SpyKing jumped in with: >> Hey Prov... You must understand that that because of the secret nature of the intelligence business you probably won't find any list members willing to discuss services performed for their country...and besides if we told you we'd have to kill you... ;-) SpyKing has it right, at least as far as I go. Given the recent legal battles Paladin Press has been going through, I'm even slightly reluctant to discuss general techniques and whatnot, but I suppose if you had specific questions I'd consider answering them. I just don't want to wind up in court charged as an accessory to murder for teaching someone I don't know how to make a hit. I infinitely prefer to make my own decisions on who I do or do not kill or help kill. :) ************************************************************************** 19)From: Jenn Saint-John Subject: Organ Harvest Jesse wrote: > Not too sure though... Please > don't go flame crazy, jut try to figure if it is a real situation or > not.. > > >Dear Friends: > >I wish to warn you about a new crime ring that is targeting business > >travelers. Jesse, this was circulating around about six months ago. I was interested in it for various personal reasons, and did some preliminary digging. As far as =I= was able to ascertain, it's pure urban legend. I spoke with all the major ERs in New Orleans (which is where the version I heard originated; Texas hadn't been added to the mix yet) and no one had heard of such a thing. There was also no newspaper or other media accounts that I could find. One key to urban legends is that no one ever says, "Yes, this happened to me (or to my husband, child, whatever)". It's always the relative of a friend, often a friend of a friend of a friend. (Remember the stories about Richard Gere and the gerbil? Those all originated with "a friend who has a friend who's a nurse at Oakhurst"...) Another key to identifying urban legends is that the stories grow in dramatics over time. Your version has them losing both kidneys. Mine was always one. (You can live just fine with one, but losing both is a problem). Other than bar employees, I never let strangers handle my food or drink anyhow. :) My best paranoid guess is that as the anti-genetic and organ research fervor increases we'll see more and more disinformation stories like this one. But if you're worried, don't let anyone buy you a drink or pick you up in a bar. ************************************************************************** 20)From: Robson Steve Subject: Tracking E-mail Delurk mode activated: Anyone wanting to track email should take a look at this: http://ddi.digital.net/~gandalf/spamfaq.html or http://digital.net/~gandalf/spamfaq.html This should give you a starting point and an understanding of how to find your target. Hope this points you in the right direction. Spyking :- Keep up the good work, You are a legend. Lurk mode activated: ************************************************************************** 21)From: "Lorenzo Castillo Sanchez" Subject: Re: Cobra Pick Address I know two companies which offer that lock pick. Intelligence Incorprated in San Mateo(California) and Southern Ordnance in Miami. If you really wanna know the address check the SOF(Soldier Of Fortune) magazine. They always advertise on that magazine. By the way, you'd better check your local state laws because you'd have to be a professional locksmith or in law enforcement to order this. ************************************************************************** 22)From: "Lorenzo Castillo Sanchez" Subject: Re: Name for Entry Services >3)From: BADCOFFEE@aol.com >Subject: I need a name > >PS- Suggestions on a name for entry service? Im stuck at Shady Mountain Entry....the "Shady" is not good for business. I know this sounds trite but how about ---- "Professional Entry Services" ?? Well, maybe you can add your name and call it "Augie and Associates - The Professional Entries" ??? If any one of you on the list can come up with a creative name to help Augie out then keep posting for ideas. :-) ************************************************************************** 23)From: "Donald J. Zaroda" Subject: Re: Getting Even You asked how to use the internet to get back at someone. There is an answer that requires no $20/month ISP service. And the time you would otherwise spend on the internet or e-mail, or whatever can be better invested.....all from the confines of your own bedroom! Unless you have forgotton, or did not know, here is the most reliable way to respond to your enemy. From a real authority, I submit the following for your consideration: Romans 12:14,20 (nrsv) 12:14 Bless those who persecute you; bless and do not curse them. 12:20 No, "if your enemies are hungry, feed them; if they are thirsty, give them something to drink; for by doing this you will heap burning coals on their heads." New Revised Standard Version Matthew 5:43-48 (nrsv) 5:43 "You have heard that it was said, "You shall love your neighbor and hate your enemy.' 5:44 But I say to you, Love your enemies and pray for those who persecute you, 5:45 so that you may be children of your Father in heaven; for he makes his sun rise on the evil and on the good, and sends rain on the righteous and on the unrighteous. 5:46 For if you love those who love you, what reward do you have? Do not even the tax collectors do the same? 5:47 And if you greet only your brothers and sisters, what more are you doing than others? Do not even the Gentiles do the same? 5:48 Be perfect, therefore, as your heavenly Father is perfect. New Revised Standard Version Luke 6:27-36 (nrsv) 6:27 "But I say to you that listen, Love your enemies, do good to those who hate you, 6:28 bless those who curse you, pray for those who abuse you. 6:29 If anyone strikes you on the cheek, offer the other also; and from anyone who takes away your coat do not withhold even your shirt. 6:30 Give to everyone who begs from you; and if anyone takes away your goods, do not ask for them again. 6:31 Do to others as you would have them do to you. 6:32 "If you love those who love you, what credit is that to you? For even sinners love those who love them. 6:33 If you do good to those who do good to you, what credit is that to you? For even sinners do the same. 6:34 If you lend to those from whom you hope to receive, what credit is that to you? Even sinners lend to sinners, to receive as much again. 6:35 But love your enemies, do good, and lend, expecting nothing in return. Your reward will be great, and you will be children of the Most High; for he is kind to the ungrateful and the wicked. 6:36 Be merciful, just as your Father is merciful. New Revised Standard Version "The scripture quotations contained herein are from the New Revised Standard Version of the Bible, copyright 1989, by the Division of Christian Education of the National Council of Churches of Christ in the U.S.A. Used by permission. All rights reserved." Quotations and/or reprints in excess of five hundred (500) verses (as well as other permission requests) must be approved in writing by the NRSV Permissions Office, the National Council of Churches of Christ in the U.S. Don Zaroda Zaroda and Company Video Surveillance ************************************************************************** 24)From: damon <"damon"@psinet.net.au> Subject: Perimeter entry sensor? I teach and conduct LRRP'S and because of a lack of resources and budget I am contemplating trying to design and build a perimeter entry sensor for a five man team in LUP's and OP's. It has to be usable in urban and bush areas.It has to be passive in the sense that it is to let the team detect enemy movement without alerting the enemy of the detection,unlike a trip flare or booby trap does. It must be very small,light,robust and cheap to build(as I don't want to use to much of my own money). Some problems that need to be overcome are, detection of movement of foilage and to some extent animals. So far my ideas are a trip wire system that is attached to a radio transmitter that sets of a small reciever with an alarm.The reciever would be held in a shirt pocket and attached to a walkman ear piece.Different alarms for each side of perimeter. Any suggestions,help or plans would be much appreciated. Damon, damon@psinet.net.au ************************************************************************** 25)From: "Donald J. Zaroda" Subject: Re: Interference Problem I have the same problem. I live underneath a powerful AM radio tower and have to hear "Oldies" no matter what! (Not my favorite music even). I have been invited to talk with the station's engineer about what to do. If I get a solution, I'll let you know. Don Zaroda Zaroda and Company Video Surveillance ************************************************************************** 26)From: "Donald J. Zaroda" Subject: The trouble with business Do any of you have this problem? Your good reputation is getting around. So now you are getting calls from new clients giving you new cases. Business is growing; life is good. Then you discover you are spending 40% of your time in the office writing investigation reports. You are weeks behind in your invoicing. Two weeks have gone by and you haven't even bugun the two new cases you have been given over the phone by that new client. And your feeling guilty for not spending a greater ratio of your time "in the field", or, worse still, returning just three minutes of the subject on video because the day you sat outside their house, that is all the time he ventured outside? You used to spen your time preparing for and "working the case". Now, your solving computer glitches and wishing you had applied yourself better during that high school typing class. Is anybody else concerned about quality control? About business management? About giving your clients the biggest bang for their bucks, while growing your business at the proper speed? Spyking, I thought you could add topics like these to your FAQ list: Managing Your Business (time management, quality control, what your clients expect, insurance/legal/licensing issues, how to write your contract,when, who and how to hire, bringing in a contractor, partner or merging, etc. Prospecting (marketing & sales) The Personal Side of the Business (dealing with issues of stress, loneliness, being away from home, being in personal danger, finding somebody you can talk to about your joys and sorrows in doing your business because, after all, you can't discuss it with everybody,etc.) Don Zaroda Zaroda and Company Video Surveillance P.S. I agree with someone who recently posted the opinion that your are better off to specialize and do a few thing better than anybody else, than to try to be all things to all clients. At least, that is what is working for me....My clients are even suggesting "new lines" of work I could start up that play off my main business. And do I have the time to explore them? ************************************************************************** 27)From: Steven Martin Subject: Bugs Hi, I am new to this list, and I must say; I am impressed with the level of knowledge contained in the posts. I guess I have been on some really sucky lists in the past or something. Anyway, on to the question... :) Can someone post or send to me directly, plans on how to build a small listening device that transmits somewhere in the 108-137MHz band, instead of the normal FM band which is what most bugs you can buy from spy stores sell. ANY info about this would be greatly appreciated. Thanks, /\O/\ Night Hawk /\O/\ ************************************************************************** 28)From: Trace Carpenter Subject: Getting past the keypad > I've checked everything you told me to. > > 1) The keypad is the one that you described to me > > 2) The magnetic lock does have a battery back-up > > 3) The wires are ran in parrallel > > 4) I can't get to the control panel as it's inside the area > protected by the magnetic lock. > > 5) I can access the hot wire running to the keypad through the false > ceiling, and I checked it for voltage just like you said. > > What next MacGyver? Piece of cake. That particular keypad is a self contained unit. What I mean by that is that it doesn't go to the control center to see if the entered code is correct. It's all in the keypad. Remove B+ from the pad by breaking the hot wire going to it. This will not open the door since it's wired in parrallel, but it will reset the pad. When you restore voltage, the pad will have reset to the factory default code which is 1-2-3-4 for that unit. Replace the voltage, enter the code and you're in. Let me know if you have anymore problems. -- Sincerely, Trace Carpenter Trace Carpenter Investigations Professional Private Investigations 2926 Maple Ave., Ste. 200 Suspicions Confirmed Dallas, Texas 75201 Problems Solved ! 214.828.4520 Free Consultations 214.740.0112 Facsimile ************************************************************************** 29)From: "Timothy F. Poole, Jr." Subject: Spying on people on the Internet I would have to agree that this sounds like a rip off. Just try a program that performs that LEGALLY (i.e. the other person knows you're doing it) and you'll see what I mean. I use Stac's Reachout v6.0. This package allows you to connect by modem, direct cable conection, or via Internet. I have used this package for my not so local customers so that if htey experience a problem with their compuetr, network, etc. I can connect via Reachout to try and troubleshoot the problem without having to make a trip. It's specific intention is to allow you to control the other machine, but you could use it for surveillance as well. The problem again is SPEED. Both machines noticeably CRAWL when connected because of the amount of data that has to be transmitted to keep them in sync. Reachout is only one of several packages. Another example is the latest release of the ProComm Plus for Windows Suite. Timothy Poole We Do Computers 2, Inc. ************************************************************************** Who are you? What's your specialty and/or interest? Let us know about your company... What would you like to see on the list? Post it. Let us know... Do you have something to contribute? We'd like to hear it... We want to know EVERYTHING and ANYTHING about eavesdropping, surveillance, countersurveillance & privacy related technology, etc... Remember: who, what, where, when, how & why... we want ALL the details... Do you have a question? Post it... A little free time? Help a member... With the INCREDIBLE brain power on this list, someone should have the answer ;-) P.S. Don't be a LURKER... Members take the time to post info for us all... give something back... Don't just take... Your input/knowledge is valued... ************************************************************************** Send Postings to: spyking@con2.com with "Post" in subject field with subject ************************************************************************** Subscribe to: spyking@con2.com In the subject field type: subscribe-surveillance list e-mail address ************************************************************************** Unsubscribe to: spyking@con2.com In the subject field type: unsubscribe-surveillance list e-mail address ************************************************************************** ...The Simple Rules of the Surveillance List... The Surveillance List Owners may Reject any posts that are/contain: 1) Info Unrelated to Eavesdropping, Surveillance or Privacy technology... 2) Flames or Negative posts... 3) E-Signatures that are considered excessive... 4) Advertisements not DIRECTLY related to the list topics... 5) Attached Files... 6) Oversized Posts... (May be edited to save room) **************************************************************************** This publication is copyrighted and is protected by U.S. and International copyright law. The information transmitted on this list may not be reproduced, reposted or forwarded to any non-list member without expressed written permission of the List Owner. Violation of U.S. copyright law is a criminal and civil offense... **************************************************************************** The Surveillance List is moderated by SpyKing@thecodex.com The List Owner will make EVERY effort to protect subscribers from spam... Copyright 1996, 1997 Codex Publishing Inc., All Rights Reserved... **************************************************************************** Vol 2 Issue # 120 ****************************************************************************** Vol.Two Issue #120 The Surveillance List May 27,1997 Over 2000+ Members Worldwide Representing 46 different countries ****************************************************************************** IN THIS ISSUE... ****************************************************************************** 01) Re: Kidneys 02) Re: Jesse`s Disturbing discovery of a new crime 03) Re: CARD, Reader, writer 04) Re: Magnetic Card Reader/Writer 05) Re: NJ Recordings, Spying on Net, Locksmithing 06) A public thanks 07) Re: Homing Device? 08) Re: The trouble with business 09) Re: Homing device 10) Re: Homing Device? 11) Bugs 12) 5-watt video tx kit 13) Re: Stolen Kidneys 14) Re: Be rich now 15) Re: The Cook Report 16) And the winner is? 17) Executive Outcomes ****************************************************************************** DON'T BE A LURKER.... GET INVOLVED... YOU ARE A MEMBER... MAKE THE MOST OF IT ****************************************************************************** 1)From: brk@a2z.net Subject: Re: Kidneys It's fairly well known now that this 'kidhe... kidney thief thing is an urban legend. Disregard and drink at will. For more good urban legends, check out http://www.urbanlegends.com. Might be a good place to look before sending old legends to the list... ************************************************************************** 2)From: William Roche Subject: Re: Jesse`s Disturbing discovery of a new crime Well Jesse, I am shocked at this report, but i must say that i believe that it is probably genuine. Even though i dont live in the States i feel that this must be stopped as soon as possible, and the perpetraiters must be caught, and in my opinion should be locked away for a mighty long time. It has been in third world countries a simular practice, where people actually sell parts of their organs to a buyer who already has a desperate donor waiting. But to drug an innocent person into Unconciousness and Steal their organs, then dumping them in a bath of ice and running the risk of them dying as a result of this calous act, and then, if they survive possibly leaving them with massive complications. It is PURE HUMAN RAPE, and it must be STOPPED. I wonder if there is a Nationwide reward for capturing these Most Foul People, then i guess we can get our P.I. Colleagues to Investigate this matter. If you have enough info or other list members have simular information on this matter, then we should all come together and take action, Possibly getting The big talk shows Involved,i.e 60 minutes, CBS, you know who i mean. Lets inform the public about this horrific crime, and most of all stop it. One last note, i cant believe it`s on america`s door step, i only wish personally, it were science fiction, but the tip of the iceberg is melting on this matter, and waves of horror may be stalking us, and "YOU", maybe their next victim, IT`S TIME TO ACT. Most Concerned Intern. ************************************************************************** 3)From: William Roche Subject: Re: CARD, Reader, writer Dear List members you can apparently buy these Card readers, and they say they may write as well, at: Bull@pavilion.co.uk Att: Jim Payne when ordering. They Cost about $13-14.00s each, very cheap if they do the job, however i cannot give you any garantee that they are what they say they are. Current stock as of this notice is about 1000-Card reader writers. Regards Intern. ************************************************************************** 4)From: Ben Norman Subject: Re: Magnetic Card Reader/Writer Hi all, OK, I'll step out of lurkdom for the second time to add some info. This isn't particularly earth-shattering, but nobody else posted it yet: A standard credit (or phone or debit or whatever) card in the US with a magstripe has 3 tracks: Track 1: 76 Alphanumeric (7 bit) characters @ 210 bits/inch Track 2: 40 Numeric (5 bit) characters @ 75 bits/inch Track 3: 107 Numeric (5 bit) characters @ 210 bits/inch Actually, I think some cards may only have tracks 1&2. Anyway, I doubt this was the format used by your company to secure your work area because 210 bpi would be really hard to duplicate by hand. But you are quite correct in guessing that there's not room for a whole lot of info on that magstripe. And like you say, Smart cards are a whole different ballgame. If anyone wants specifics on the 7 and 5 bit codes used, I can post. Ben > Here is a tale of antique 1970's technology... > We took a piece of computer tape > and passed a small magnet over it crosswise until we had the same > pattern ************************************************************************** 5)From: CChrist373@aol.com Subject: Re: NJ Recordings, Spying on Net, Locksmithing to Mikamal Yes, there are regulations about third party phone recordering in New Jersey, about ten years. You cannot intercept any phone conversation without a nice big arrest. Some states have a one party record law where you can record a conversation on a phone that you are privy to, all you'r doing is making a electronic log of your conversation. But that is not all states. ( don't bother to ask the phone co they'just say you can't ) One problem is if you have a recorder on your phone and some in your household or a neighbor uses your phone and they and the other party don't know they're being recorded, oops! If you have to do a wire ( transmitter ) use a long range crystal job like from Deco Electroincs. If your succesful in getting it hooked up do not!, go back for it later. If it is discovered and you don't know it "friends " will be waiting for you. Technically, any electronic device used to "steal" a conversation withou the parties involved knowing it is highly illegal! Even if it's a doctored up hearing aid. MC To Strider@ mail2.Quicknet.com Saw your post on spying on people on the net. Okay, let me know how if you will. I'm new to computers ( slow getting around to learning ) and I'm a snoop ( why else am I on this newsleter ). I'd like to know how its done. MC To Badcoffee: Augie, if your going to show companies how vulnerable they are I hope your up on electronics and alarm systems. Just picing a lock won't get it. I havent seen a business yet that had looks I couldn't compromis but the alarms systems are a different mater. Some companies have alarms so sophisticated they don't really need to lock the doors, You can't help but trigger them. Think about it, some places are set up so when you come through the door you just triggered several types of detectors. by the way, locksmiths charge alot sometimes for one reason. They know HOW to open the lock, the customer can't. They also have to pay for specilaised equipment to rekey locks on buldings, cars, install locks etc. It's not all lock picking. Plus its no fun t go out at two am to unlock some drunks car just to find out all he had was the quarter to call you. Picking a house lock in a thirty below wind chill ain't fun either. MC ************************************************************************** 6)From: BADCOFFEE@aol.com Subject: A public thanks My Guess on Trace Carpenters age: Over a thousand at least. With 90% of those years under your belt as a PI. Brother, a public thanks.....and I am speaking for all here......there has not been a single keystroke from your compter to this survellance family that has NOT been absolutely fabulous. He does't have to....but he does. Thank you, Trace. We have one hell of a group here Mr. Moderator. Good job also. Congradulations. PS- When all you come over for coffee, it is going to be "my" pleasure. A day that the whole town will remember, I'm sure. Again, the dogs....shhhhh! Augie ************************************************************************** 7)From: Greg_Smith@matrixres.com Subject: Re: Homing Device? >Does anyone out there know where I can get a device, to place on someones >car, and then it would emit a signal that would let me see wherever he >went? Within a given range of course. I appreciate any ideas. I have found 2 places with homing devices: 1) CCS Communications, Inc. (Office in New York, Houston, and elsewhere) The people are pretty arrogant and not very customer-oriented, but they have 2 devices for sale. The $6,000 device displays the subject's location on a city map (I guess it uses GPS technology- they guy in "Executive Sales" was so unfriendly I didn't want to stay on the phone with him any longer). The $2,500 device tells you the compass direction of the subject and the approximate distance. 2) Other places are at spystuff.com http://www.pimall.com/nais/e.track.html http://ally.ios.com/~cna/uspy/htmls/surv17.htm http://www.eurohost.com/007eleve/ I know one of the following sites also sells one, but I forgot which place: spybase.com stryker-ent.com http://ally.ios.com/~cna/uspy/htmls (this site has a TON of cool stuff, including wiretapping equipment- for legal use only, of course) dbcity.com spy-vs-spy.com techmall.com almexltd.com hiddencamera.com scx.com spyguys.com spylab.com spydepartment.com http://www.canadamalls.com/associated/ http://shop_tgm.aeinc.com/global/bgi/catalog/ http://www.mindspring.com/~stancom/ http://www.eurohost.com/007eleve/ spyzone.com http://www.hightech-store.com/surveil.html spytec.com http://www.veol.com/spy_supply/video.html One of the above places will even rent a vehcle tracking device to residents of certain California counties. These sites sell much of the same equipment, but SCX.com and techmall.com seem to have the best prices, especially with cameras. ************************************************************************** 8)From: "Dr Jamie Love" Subject: Re: The trouble with business >Do any of you have this problem? >Your good reputation is getting around. [snip] You're wasting your time and skills with routine business crap! [my summary] Congradulations Donald, Your business is now ready to expand! There comes a CRITICAL time in the life of each (successful) small businessman when he (she) must "cut the cord". It hurts and you're damn sure that either no one can do the job right, or there's no one you can trust to do it at all. But, if you resist the expansion, you will begin to fail in your duties to your clients, turn away clients, and generally hurt your business. Perhaps fatally. >From the description of your troubles I would suggest you hire (part-time to begin with) two people: 1) a computer literate secretary with some accounting (billing, etc.) experience. Try to find one who has "run the show" elsewhere. If she is good, she will be worth her salary at any price. 2) an "apprentice" who can be your "go-fer" and understudy (for those times when you'd like to be away enjoying your salary, or simply concentrating all your efforts on your favorite client). Depending on exactly what you have in mind, you might find an "eager-beaver" who will work for peanuts for the experience. (Perhaps all you need is the secretary.) I understand that you probably want to be a one-men operation and enjoy the flexability of being "responsible" only to yourself. But if you don't _delegate_ your authority to others, you will continue to waste your time (being your own secretary and "go-fer"). Your suggestions and queries about books, or topics on management , etc. are a possible fall back position, but do your _really_ want to do that kind of work? Think about it. The only "book" I would suggest is "how to hire". Contact your local small business association and tell them you want info on : 1) how to recruit 2) how to set up the taxes and insurance. Hope this helps. Jamie Jamie Love (PhD, MBA, MD in progress) Scientist for Hire "Life is my business" http://www.virtual-pc.com/mindweb/merlin/sci4hire.html EMAIL jamie@enterprise.net OR merlin@megatropic.com ************************************************************************** 9)From: Crazy DJ Subject: Re: Homing device There are many different types of equipment currently available, form a simple transmitter and receiver to a full blown GPS system which records the position at predetermined time intervals, stores them, and can be accessed by a cell telephone to down load the information to a computer with a mapping program to see exactly where the subject was (is). The deciding factor in which type to use is "How much money do you wish to spend". ************************************************************************** 10)From: Trace Carpenter Subject: Re: Homing Device? >Does anyone out there know where I can get a device, to place on >someones >car, and then it would emit a signal that would let me see wherever he >went? Within a given range of course. I appreciate any ideas. You are obviously new to the list as this subject has been beat to death. In fact, it's been discussed so much you are probably going to have trouble getting many responses. However, there have been excellent postings on this subject in the past. I suggest you access old copies of the list and research it. In fact there are several people on the llist that keep an ongoing zip file you may request with all the old postings. Personally I just keep mine in text form so I can do an internal search for a keyword and then go read that posting. Good luck. If you have any specific questions about the tracking units e-mail me. ************************************************************************** 11)From: Trace Carpenter Subject: Bugs Nighthawk, I don't know how proficient you are with a soldering iron, but if you just want something easy head to RadShk. Buy the 170 Mhz wireless mic, and remove it from its case. The up the input voltage to 12V. You'll be amazed at the clairity and range. -- Sincerely, Trace Carpenter Trace Carpenter Investigations Professional Private Investigations 2926 Maple Ave., Ste. 200 Suspicions Confirmed Dallas, Texas 75201 Problems Solved ! 214.828.4520 Free Consultations 214.740.0112 Facsimile ************************************************************************** 12)From: xhq@juno.com (Midnight Coder) Subject: 5-watt video tx kit Thought this might be of interest to some of you. While going through an old copy of Electronics Now (July, 1994), I spotted this Amature TV Station project. There were about a dozen pages of theory, schematics, construction info, and a supplier of kits. Once again, this is from way back, so I don't know if they're still around or what it might cost today, but it seems that a 5-watt transmitter would be handy for many of you, thought you might think about getting a license to run it. There were four kits, the first a 5-watt transceiver (tx/rx audio/video), a 5-watt transmitter (tx audio/video), a 3/4-watt transmitter (tx audio/video) and finally, a 3/4 transmitter with no audio. I have a 100K B/W GIF of the finished camera/transmitter - it's about 3"x3"x5" - if you want it, I'll send you a copy. Scanned this from the article, so apologies for any typos (I checked the address, freqs and prices for accuracy): The following items are available from North Country Radio, PO box 53, Wykagyl Station, New Rochelle, NY 10804-0053. - 5-watt transceiver kit [contains PC boards, all parts that mount on them, chassis connectors suitable for basic operation, and three crystals for 439.25, 434.0, and 426.25 MHz. $179.00 - 5-watt transmitter kit [contains PC boards, all parts that mount on them, suitable chassis connectors for basic operation, and three crystals for 439.25, 434.0, and 426.25 MHz. Downconverter and line sampler components and RF switching relay NOT included. $149.00 - 3/4-Watt Mini-ATV kit (contains PC board and all parts that mount on it with crystal for 439.25 MHz operation. $79.00 - 3/4-Watt ATV Jr. kit - Same as Mini-ATV, but without audio (contains PC board and all parts that mount on it and crystal for 439.25 MHz operation. $59.00 - Test Crystals (CHl4,15,16,17,18, for test or export only-not legal for on the air transmission in the USA) end others for 434.0-, 427.75-, 426.25-, and 421.25-MHz are available. $8.50 each, specify channel. - Other ATV kits for 440- and 915-MHz and CCD cameras are available. Contact North Country Radio for details. - A complete catalog of kits is available from North Country Radio. Send $1.00 with a self addressed stamped (52 cents) envelope. ************************************************************************** 13)From: mjones@nbserv2.dseg.ti.com (Marty Jones) Subject: Re: Stolen Kidneys Lazlo, I agree that this is probably an invented story, but the detail you cite is not necessarily a giveaway. Whenever you call 911 from a hardwired phone, they know where you are without asking. Marty Jones *From: lazlo@shadowlink.net *Subject: Re: Stolen Kidneys * *This topic really doesn't interest me, so here is a little more info to *help cloud it with skepticism: * *In every story, a businessman wakes-up in a tub, with a sign that says, *"don't move and call 911". If this is true, how is the guy susposed to *tell them where he is; he might not even be in the same town! He *doesn't know the name of the hotel, he doesn't know the room #, Etc. *Etc. Etc. He was drugged the entire time, remember. * *Someone wasn't thinking when they made-up this tale. * *If I have been mis-informed, please correct me, and drop this topic *ASAP. * *-Lazlo ************************************************************************** 14)From: mjones@nbserv2.dseg.ti.com (Marty Jones) Subject: Re: Be rich now Karl - If the coating is too thick to respond to your flashlight, next step is to make a plate with a hole in it and put a much more powerful light behind it. The plate shields your eyes from the light spillage. If this also fails, you can gradually "thin" the coating by pulling it off a little at a time with a piece of adhesive tape. I have seen very few that do not respond to this method. Marty Jones ************************************************************************** 15)From: SpyKing@thecodex.com Subject: Re: The Cook Report >>>> Re: The Cook Report I did not think I would get this response from the other side of the pond, but her is a brief summary. Well this guy Roger Cook is a self styled do gooder in the UK fitted out with the latest surveillance equipment and the backing of one of the main television channels he goes about the world highlighting frauds and corruption. For the most part he does a good job. However, the last program that he done was on Private Investigators. What he done, was to employ the services of a London Based investigator (Cador Pendry ) to suposidly look into the background of the protesters who are currently disrupting work at Manchester airport. He was asked if he could put phone taps in, which he agreed to do. When the investigation company team went to place the taps in the BT main junction box, the television crew were waiting covertly filming. They then arranged a spurious meeting with Pendry and his partner. As this meeting was taking place in walks Cook with the film crew camera running. As I have said double standards on Cooks part as He must have used the same methods himself in the past and will do in the future. Regards M.P.I <<<< Every once and a while these "stings" backfire on the media... About a year ago I was contacted by a "foreign national" who told me he was referred to me by an "overseas client" of mine (he refused to name the client)... He stated he was interested in obtaining "a record of what transpires" at a meeting of several "high level" software executives which would take place in a hotel room in New York City. He further stated that his client, a "foreign multi-national corporation" was very interested in the development of this U.S. software company's new product and would pay very well... A very large computer show was exhibiting at the Javitts Center in New York at the time lending credence to his scenario... He was staying at the Waldorf Astoria Hotel in New York and wanted to setup a meeting with me to discuss the plan, negotiate fees and deliver the "time & place" of the meeting he wanted me to "bug"... I told him myself and one of my associates would meet with him and that we would "discuss" his problem... Several days later we did meet. He was alone and we discussed his "offer" and he reinterated his desire for us to "steal trade secrets" from this U.S. software company... We told him that this was not a difficult assiagnment, agreed in principle to help him and that we would research it and get back to him... As the meeting was ending, the door opened and we were faced with a film crew from a major network and they laughed stating they "had us" in a conspriracy to "steal trade secrets" and sell them to a "foreign national". My associate shook his head and called for the backup team to enter... Several agents from a "three letter" agency entered the room weapons drawn, as I displayed the Nagra I was wearing which had everything on audio tape. My associate informed the "news crew" they were coming "downtown" for questioning in regards to "conspiracy to steal trade secrets"... You should have seen the looks on their faces when they realized they didn't have me but we had them... It turned out that a popular news-show was trying to "sting" PI's by setting them up... I didn't go for the bait. I was rather pissed-off that someone would think they could bribe me to be a traitor. When contacted by this individual I picked up the phone and contacted an agent (he is a SAIC) friend of mine who opened a case and we went to the meeting together... complete with backup team, etc. The whole thing was straightened out downtown and the news crew was not charged, I got a pat on the back and a few months later the show aired with a few "bad" PI's who took the bait... Not one word or mention about the "honest" one that got away... ************************************************************************** 16)From: BADCOFFEE@aol.com Subject: And the winner is? And the winner of the Augie/Badcoffee name search for a name for the entry gig goes to.............. And the winner is.......... For the name that "stuck" with me........ Matt INVESTIGATIVE STRATEGIES, INC. (investigative_strategies@ibm.net) With the name: THE ENTRY SPECIALISTS. Matt.......someone broke in and stole the prize. Extended thanks to all that sent some absolutely fantastic names. Hat's off to you. :-) Augie ************************************************************************** 17)From: Jenn Saint-John Subject: Executive Outcomes Does anyone on the list have a connection in Sierra Leone and/or can tell me if all of Executive Outcomes' people got out of Sierra Leone before this latest coup? My usual sources appear to be having trouble getting information out over the closed border. Let's see, to make this strictly on-topic (though I suppose mercs and intel ops qualify on their own, don't they?), we could throw open discussion about the (relatively) low-tech equipment EO uses, and how they've managed to be so effective using stuff most modern armies sneer at... ************************************************************************** Who are you? What's your specialty and/or interest? Let us know about your company... What would you like to see on the list? Post it. Let us know... Do you have something to contribute? We'd like to hear it... We want to know EVERYTHING and ANYTHING about eavesdropping, surveillance, countersurveillance & privacy related technology, etc... Remember: who, what, where, when, how & why... we want ALL the details... Do you have a question? Post it... A little free time? Help a member... With the INCREDIBLE brain power on this list, someone should have the answer ;-) P.S. Don't be a LURKER... Members take the time to post info for us all... give something back... Don't just take... Your input/knowledge is valued... ************************************************************************** Send Postings to: spyking@con2.com with "Post" in subject field with subject ************************************************************************** Subscribe to: spyking@con2.com In the subject field type: subscribe-surveillance list e-mail address ************************************************************************** Unsubscribe to: spyking@con2.com In the subject field type: unsubscribe-surveillance list e-mail address ************************************************************************** ...The Simple Rules of the Surveillance List... The Surveillance List Owners may Reject any posts that are/contain: 1) Info Unrelated to Eavesdropping, Surveillance or Privacy technology... 2) Flames or Negative posts... 3) E-Signatures that are considered excessive... 4) Advertisements not DIRECTLY related to the list topics... 5) Attached Files... 6) Oversized Posts... (May be edited to save room) **************************************************************************** This publication is copyrighted and is protected by U.S. and International copyright law. The information transmitted on this list may not be reproduced, reposted or forwarded to any non-list member without expressed written permission of the List Owner. Violation of U.S. copyright law is a criminal and civil offense... **************************************************************************** The Surveillance List is moderated by SpyKing@thecodex.com The List Owner will make EVERY effort to protect subscribers from spam... Copyright 1996, 1997 Codex Publishing Inc., All Rights Reserved... **************************************************************************** Vol 2 Issue # 121 ****************************************************************************** Vol.Two Issue #121 The Surveillance List May 28,1997 Over 2000+ Members Worldwide Representing 46 different countries ****************************************************************************** IN THIS ISSUE... ****************************************************************************** 01) Re: FBI Surveillance on the Net 02) Re: Magnetic Cards 03) It's quite normal to be paranoid 04) I stole Matt's Prize 05) Thanks 06) McGyver Wannabee 07) Bubonic plague note 08) Re: Pager Alarm 09) I need help 10) Body Wire 11) NS Cookie Cutters 12) Join The ISA Link Exchange Program 13) Follow-up on Cookies 14) Re: NJ Recordings, Spying on Net, Locksmithing 15) Business Bug's 16) Phone Numbers ****************************************************************************** DON'T BE A LURKER.... GET INVOLVED... YOU ARE A MEMBER... MAKE THE MOST OF IT ****************************************************************************** 1)From: shadowrunner@voyager.net Subject: Re: FBI Surveillance on the Net I would also like info on this subject. Please send responses to me as well. Thanks. ShadowRunner >7)From: "Young Gun" >Subject: Re: FBI Surveillance on the Net > >I'd also like information on FBI surveillance. I appreciate any >responses sent to me as well for research on this topic. Thank you! ************************************************************************** 2)From: Trace Carpenter Subject: Re: Magnetic Cards >Ben Norman >Subject: Re: Magnetic Card Reader/Writer > >Hi all, > >OK, I'll step out of lurkdom for the second time to add some >info. This isn't particularly earth-shattering, but nobody else posted >it yet: > >A standard credit (or phone or debit or whatever) card in the US with a >magstripe has 3 tracks: >Track 1: 76 Alphanumeric (7 bit) characters @ 210 bits/inch >Track 2: 40 Numeric (5 bit) characters @ 75 bits/inch >Track 3: 107 Numeric (5 bit) characters @ 210 bits/inch Thanks for the info Ben. I was beginning to wonder if anyone had cosidered the different formats before they ran out to spend $$$ on a writer. -- Trace Carpenter Investigations ****** 2926 Maple Ave., Ste. 200 Friends help you move; Dallas, Texas 75201 Real friends help you move bodies. 214.828.4520 ****** ************************************************************************** 3)From: allamosa@roanoke.infi.net (happydog) Subject: It's quite normal to be paranoid With the Government closing down the "Spy Shops", apparently they want to be the only one's with that capability, it's quite normal to be paranoid since the rules and regulations are constantly being redefined according to circumstances. I got a call from someone that asked to speak to.... which was me. Immediately someone else got on the line and started making statements such as "when you ordered the surveillence equipment from us" and "we now have the equipment you asked us to find", etc. It really sounded like a set-up to me and I told the person I didn't know what he was talking about and send me the information and if it was something I could use I would consider it. I write a lot of stuff on the local newsgroup and it's no secret that I think very little of the Government and it's agencies. I flat just don't trust any of them. I've had one visit from the FBI and they wanted a place to sit and talk which got them in my house. Then they wanted to know if I was alone(?). It turned out that I had asked someone for information and they said it might jeapordise their informant. It had been over six months and I had even forgotten about the conversation. Strange? I thought so. I'm wondering if anyone else has a situation like my phone call. Doug Graham Salem, VA ************************************************************************** 4)From: Trace Carpenter Subject: I stole Matt's Prize >Matt.......someone broke in and stole the prize. Extended thanks to all >that >sent some absolutely fantastic names. Hat's off to you. :-) I admit it Augie, I stole the prize. Your locks were great, but the alarm and video system stunk. Guess we need to form an entry alliance. You deal with the mechanics & I'll do the electronics. What do ya think? -- Trace Carpenter Investigations ****** 2926 Maple Ave., Ste. 200 Friends help you move; Dallas, Texas 75201 Real friends help you move bodies. 214.828.4520 ****** ************************************************************************** 5)From: Trace Carpenter Subject: Thanks I would like to voice my sincere thanks to Augie aka BADCOFFEE for the kind words which he posted in the last list. I would also like to apologize for the delayed responses many of you recieved during my recent move to the new offices. We have a great list with a fantastic brain power and I'm proud to be a part of it. To the moderator, GREAT Job. Keep up the good work. Also to Augie, thanks for coming out of the Lurk Zone. Your lock posts have really been an asset. -- Trace Carpenter Investigations ****** 2926 Maple Ave., Ste. 200 Friends help you move; Dallas, Texas 75201 Real friends help you move bodies. 214.828.4520 ****** ************************************************************************** 6)From: Leah Subject: McGyver Wannabee Hello all, As the end of the gestation period approaches I know I will be bored stiff while recovering. I would like to take the time that I will not be working and put it to good use by learning some new stuff. Specifically, I would like to learn how some of the high tech stuff you guys always talk about work, how to use them, how to hide them and how to make them. Things like microphones and video cameras. As a complete beginner (but I did pass shop and electronics in High school:){Yeah, I flunked Home Economics!} I would like to learn with the most basic and inexpensive models to try of the hidden video camera and microphone, capable of transmitting at short range. I would like to build these from basic parts available CHEAP (if possible) in case I screw them up I won't be out $500. and I would like them to be easy to understand. So all of you guys into these tech gadgets please send me some good starting places, like books for beginners, and parts lists from Radio Shack or similar outlet. BTW: Some of you may also be interested in a catalog I get fairly regularly called "Black Box Catalog" the number is 412-746-5500 and they have a lot of stuff for computers and such... just FYI. Thanks. 20 days and counting... Leah Wesolowski Private Investigator Adoption Search Specialist (leahwes@ACMEInform.com) ACME Information 164 Manningham Drive Madison, AL. 35758 (205)464-0506 TEMPORARY Office Hours: When I can! (Baby due 6/23!) (205)464-0230 fax 24 hours a day, 7 days a week. Check out our web site: http://www.acmeinform.com/ACMEInf.htm ************************************************************************** 7)From: Tasmanites@aol.com Subject: Bubonic plague note <> Not entirely true. Bubonic plague has a form known as "pneumonic plague" - spread by cough-and-sneeze droplets, and it's far more contagious and dangerous and fatal and all that than the regular stuff. ************************************************************************** 8)From: "Walstrom, Bradley" Subject: Re: Pager Alarm I checked with my local car alarm shop and found a pager alarm system, model 795T with three zones for 149.95 installed. It is made by DEI Direct Electronics Inc. they are at 2560 Progress St. Vista, CA 92083-8422 they also can be reached on 800-477-1373. It transmits on 27Mhz and claims to have a one mile range. good luck Brad Walstrom ************************************************************************** 9)From: "Jose A. Duarte" Subject: I need help I don't know if you remember me, I wrote that E-mail re: I've got a snoop, well it's gotten worse. It's the end of the semester and the students are finishing and handing in their work when files are starting to go missing, students, all of a sudden have access to all the files on the server and their computers. The Keystroke capture program works, I've tested it out and I couldn't believe how this was being done. I've got to catch him in the act. Any Ideas? I tried to set up a surveyance software but it's only a demo. It doesn't work I need to end this. Please help. Thanks in advance, Jose Duarte ************************************************************************** 10)From: Tim Johnson Subject: Body Wire I have an associate who has a legal requirement for a body wire system. His company's business is performing legal undercover operations for major corporations, utilizing video and personnel to detect theft, drug use and other illegal activity within an organization. In order to provide for the safety of their personnel, they wish to purchase several transmit/receive/record systems. At present, the only provider they are aware of are the ones that will sell only to law enforcement. If you know of providers of such systems who can legally sell to private industry, please provide me with a telephone number and/or name. They are interested in a minimum of 2 and probably 4 sets at this time wit other orders to follow. Thanks in advance Tim Johnson dbugman@amug.org Technical Security Consultants Inc http://www.amug.org/~dbugman/ What you say in private is your business. Keeping it private is ours. (c)TSCI 1987 ************************************************************************** 11)From: Kerry Brown Subject: NS Cookie Cutters I have used the zdnet cookie cutter: http://www6.zdnet.com/cgi-bin/texis/swlib/hotfiles/info.html?fcode=000CKP but this utility only addresses the issue of NetScape cookies, allows a security note when requested by a site (NS also has this option), and allow modification of hte cookie.txt file. Another program, NSClean, actually addresses many other files and information that can be requested when you visit a site. NSClean is quite interesting in that it will demo how much information on your PC is covertly passed to sites you visit. Paranoia may encourage you to purchase the actual product: I did. Info can be found at: http://www.wizvax.net/kevinmca kbrown@strider.stanford.edu ------------------------------------- Name: Kerry Brown E-mail: kbrown@strider.stanford.edu Office: (66-2) 993-7250 Home: (66-2) 993-6146 Cellular: (66-1) 404-0974 Fax: (66-2) 531-5393 ************************************************************************** 12)From: L Strand Subject: Join The ISA Link Exchange Program What are the requirements for the exchange program? The sites accepted must: Be related to security, surveillance, closeprotection or eavesdropping; Have sufficient depth of content; Have content and form comprehensible to general public; Contain decent language and material; Once you have added yourself to the queue, you will get a smart HTML code to add onto your site. When you have added the HTML code, send email to isa.hq@usa.net saying that you have posted the code. I will activate your ID number and your connection. If you are having trouble with the HTML code, I will e-mail the proper code (ID included) back to you. How is Ring Integrity Ensured? There is a utility in this system which tests the ring. This utility checks every member of the ring to make sure their pages are still up and that the pages contain the required Ring HTML. If any page is found lacking- I will e-mail the owner of the page to inform them of the problem. They will have 72 hours to correct the problem or inform me of when the corrections should be expected. If no answer is received the page will be removed from the ring. When a page is linked to this ring, the link graphic will be displayed *Note: You must have a RELATED WEB SITE!!! That is the only way to join the web ring. Sorry. Want to Join? New Members please fill out the form at: < http://www.algonet.se/~ljsaisa/linkdir/adtoring.htm > Join the ring and get more potential clients to visit your site! And of cause, it's totally free! Sincerely yours L Strand INTERNATIONAL SECURITY AGENCY http://www.algonet.se/~ljsaisa ljsaisa@algonet.se Tel: Int+46 (0)8-645 22 82 (09.00am-05.00pm C.E.T.) Fax/Data: Int+46 (0)8-645 22 82 (24h) PoBox 167, S-162 12 Stockholm, Sweden ************************************************************************** 13)From: Paul Longo Subject: Follow-up on Cookies I forwarded the post on cookies to a knowledgeable associate. His comments appear interspersed with the original post below: From: Markgarry@aol.com Date: Tue, 27 May 1997 11:29:20 -0400 (EDT) To: plongo@erols.com cc: Markgarry@aol.com Subject: Cookies: Did you know all this? Paul - Yes ... But its not as bad as it seems; take a look at my notations below. > Just a useful tip on how to keep your privacy > when you surf the web using Netscape 3 or > MS-Internet Explorer 3: It is all new browsers, including AOL's, and earlier AND later versions of the two mentioned. > No, I am not a paranoid lunatic, Yes you are! Don't try to kid me!!! > SHORT VERSION: > ============== > Disable your browser "cookie" feature. Absolutely. (Can't disable the earlier versions, so first get a current version) > LONG VERSION > ============= > > I am quite sure that most of you are not aware > that every time you visit a popular web site, > information is gathered about your actions and is > correlated to you *personally*, and kept in a few > central databases common to all the advertisers. Somewhat true. Actually, cookies are specific to each web site you visited. Others can search for a specific cookie in your cookie folder, but cannot easily do anything with it unless they know where the cookie relates to. And not all cookies are well known (certainly not all the XXX ones, which must number millions!) > Whenever you run a search engine (Alta-Visa, Lycos > and effectively all others) visit the Dilbert Zone, > Doonesbury, classified2000 and almost any site that > have commercial advertisement (and which one doesn't > today?), you are identified *uniquely* through a > little known feature of the browser called "cookie" > (Site Certificate). True. I can even do this from my own web page. > This feature let the advertiser leaves a unique > signature ON YOUR HARD DISK that is the digital > equivalent of Social Security number. Everytime > thereafter, whenever you visit a site that is > affiliated with one of the few big gathering > agencies (almost all are), your browser send > AUTOMATICALY your "cookie", and then you are exposed. True ... any site can access your cookies. > After you are uniquely identified than the sites > you visit, the *search strings* you enter, the > pictures you select, the links you follow, and > everything else they can get; all are collected > and recorded in a private database of the > syndicated ad agency. This is NOT true as stated. Once you leave the search engine (i.e., follow a link) you are now on a new web server. It in turn can look at your cookies (and leave some of its own) but the search engine has NO WAY OF KNOWING where you went beyond the first link from its site. And by inference... this is all NOT stored at the ad agency, since they have NO IDEA where you went after the first link. > Yes, they have a file on me (name deleted), and they know my: > > 1) Email address (sent by Netscape automatically to their FTP site) Paul ... are you using FTP? It is true that the browsers will supply your email address for some anonymous servers running FTP, but usually I only use HTTP addresses, not FTP sites. And HTTP sites CANNOT get your email address. (They can get your IP address, but on ISP's the IP's are rotated so this is useless info. > 2) My phone number (from the car ad I placed in classified2000) This guy was a total idiot to do that! > 3) My organization (from my site domain) Big shit. So my organization is AOL ... so? > 4) My O/S (NT 4.0, from the browser id string) Big shit, so you use NT ... so? > 5) My zip code (from the nodename registration in rs.inetrnic.net) Big shit ... thats like saying since I use AOL I live in US. > 6) My airlines preferences (from the sites I visit) No ... they only know what airlines you looked at. Means didlee. > 7) My current interests (from my Alta-Vista search strings) Very true. Is this a problem? > 8) Actually there is quite a little they don't know. Yeah ... how about his name and address? (Or did he post that in the ad too?) > The above is not some hypothetical future scenario. > It's already going on for more than a year. Very true > Don't believe me? Do a simple check: > 1) Find your "cookies" file (normally in the directory above > the "netscape.exe". On PC the default is > "c:\Program files\netscape\Navigator\cookies.txt". In I.E. its a folder called windows/cookies, I think. Same with AOL's browser >... > You may have noticed that every time you > search something in a search engine (try > for example: "travel", "book", "WinNT", > "rental" "insurance" etc. on AltaVista or > Yahoo) the small banner ad above changes to > something relevant (try it if you don't believe). But thats the whole idea ... don't you get it fella? The idea is to find out what you are looking for and tailor the ads for you. Did you expect less? And they do NOT need cookies to do this ... they've always done this based on search content (whats this got to do with cookies?) > How does it work? Your search string is sent > by AltaVista to "doubleclick.net" with your > unique id, and doubleclick.net changes the > advertisement. This way your search string > travel without your knowledge out of the altavista > and to other interested parties. Ah ... thats your point. Yes ... they can "remember" that you searched for a string if they ever "see" that cookie from you again. > Whenever you visit now a site that is affiliated > with "doubleclick" (most commercial sites are), Whats your basis for saying this? I don't think so. > your browser send your "Site Certificate" (unique > cookie id) to that site, which forward it to doubleclick, > which add it to the records they keep on you. Possible. > Although most of this gathering is done in secrecy, > it has been known for a while in the Internet community. Very true. > DoubleClick, for example, justify their actions by > claiming that they "keep your privacy" by not keeping > your name in the database. This ofcourse is bullshit. > They keep your unique id, nodename (try > "whois -h dir.stanford.edu samypc.stanford.edu"), > email (try "finger samy@leland.stanford.edu") > phone-number and a lot of other details which > are more than enough to get your name and address on the fly. Also true. But this guy (samy) was using public access (a university) to do this stuff. The university has a policy of no secrets which is why you can run whois and finger. You cannot use these to find out more info about "me", since AOL refuses to give out this info. (I should check your new address Paul!) I just did ... EROLS.COM does not allow finger commands. > A short citation from "DoubleClick" promos: > > "Utilizing the industry's largest database of Internet users > and companies, DoubleClick's DART offers advertisers the > ability to target users by Domain, SIC, editorial content, > search keywords, affinity, Web page and more. > > Another more enlightening citation: > ("http://www.doubleclick.com/frames/adinfo/dartset.htm") > > "By recognizing and registering *unique users* as they enter > DoubleClick Network sites, DoubleClick has compiled the most > comprehensive Internet user profile database. <...> > By registering and tracking these unique users, DoubleClick > is able to dynamically match advertiser-selected target > profiles with *individual* user profiles and dynamically > deliver an appropriate, targeted banner. > This way, only an advertisers selected target will see their > ad banners. > Additionally, because we recognize unique users, we can > track how many times an individual user has viewed a particular > banner, allowing advertisers to set and control ad banner > frequency. <...>" This is fine ... remember to never POST your name or tel number and it shouldn't be a problem. > Don't think that "DoubleClick" is unique, they are relatively > one of the more honest in the gang. True. > The original reason for this feature ("Site Certificates" > or "cookies") was to let you reconnect to sites that > require access control without resubmitting your password. Part True. It was really to let sites customize their pages for users. (e.g., set up a default window size, and remember the window size the next time you logged in.) > However, no self respected access control will actually > use the Site certificate for a login/password after the > current session. Wrong! Again, the cookies are not the "password" to protected info ... only to a set of default window sizes, etc. (E.g., more specifically, in some search engines you can customize your searches ... and the cookies let the search engines keep those customized options for the next time you do a search. > Your cookies file may contain legitimate certificates for > sites that require you to enter with password, but this > should be anyway associated with a nearby expiration date, > so you can go away and just delete it. Totally agree ... nothing really ever lost by deleting cookies. > How can you protect yourself? > ============================= > 1) Delete your current certificates. On Netscape 3: > "Options"-> "Security preferences"-> "Site certificates" > and "Personal certificates". > > 2) Delete your "cookies file". > > 3) Setup Netscape/MS-IE so it will require your permission > before accepting certificates. On Netscape 3 it's in: > "Options"-> "Network preferences"-> "Protocols" > and enable the "Show alert before accepting a cookie". Totally agree ... I very rarely accept cookies > > For additional privacy: > ======================= > 1) Make sure your email is not sent as your FTP password: > "Options"-> "Network preferences"-> "Protocols" and disable > the "Send your Email address as Anonymous FTP password". > I would also recommend not to use Netscape for Emails > (Eudora is better anyway) and so you can go and delete your > email address if you have it in: > "Options"-> "Mail/News preferences" -> "identity" I agree ... god idea (AOL does not allow this option) > 2) For a better convenience, use a tool that protects your > "cookie" file. Mac users get the freeware "cookie-cutter" > from "http://www.shareware.com/. For PC users, unfortunately, > I know only on a commercial product (~$20?). Look at: > "http://www.pgp.com/products/PGPcookie.cgi" There are freebies ... but just disable cookies rather than getting software to delete them! > 3) Forms: Almost all sites that let you download "demos" > and "evaluation" S/W through the Web, requires you to > fill out some forms. > Always fill the required fields with junk, or even better > go directly to the company FTP site. Most chances are that > you will have there a full access to the S/W without any forms. I agree to fill out with junk. But don't use FTP unless you use your own sign in info (versus using email name) > 4) If you have not disabled your "JavaShit" and "JavaBlaBla" > ("Options"->"network preferences"-> "Languages") > then I don't even want to bother start telling you about all > the nice exploits available out there. I agree. In IE, turn off all JAVA applets and all ActiveX. > MS-IE users: > A word of advice: Security wise, even Netscape is better. > (e.g. > "http://www.ee.washington.edu/computing/iebug/" - NT > "http://www.efsl.com/security/ntie/" -NT > "http://www.security.org.il/msnetbreak/" - Win95 > "http://www.eliashim.com/presrel/pr030497.html" - NT+W95) > The number of MS-IE exploits discussed in the hackers circuits is > staggering. Unfortunately, this is also true. > Last but not least: > =================== > Althouge the more knowledgeable users (me ...) knew about > this all along, a recent article in today "Consumer Report" > prompted me to send this message to the ISO list. So thank > CU, not me. I just got tired of waiting for someone else to > do the job. New to me ... I'll read the new CU to see ... Later - Mark ************************************************************************** 14)From: strider@mail2.quiknet.com Subject: Re: NJ Recordings, Spying on Net, Locksmithing > To Strider@ mail2.Quicknet.com > > Saw your post on spying on people on the net. Okay, let me know how if you > will. I'm new to computers ( slow getting around to learning ) and I'm a > snoop ( why else am I on this newsleter ). I'd like to know how its done. > Well it depends upon what kind of access you have to someone computer, and how much you know about them. It would be fairly easy (and there is plenty of documentation more authoritive than I on the subject) to set up a program on someones computer that logs every packet sent and received while the person is on the net. This log could be trimmed down to just give ip adresses data whatever. The problem is getting this data from the indiividual's computer. IF it's small enough it would be possible (but somewhat traceball) to have there computer send out this data via e-mail or some other medium to an adress. ************************************************************************** 15)From: witzend@peganet.com Subject: Business Bug's 1. Forte' of mine. Don, permit me to make the following suggestions: Technology application; employee leasing; or subcontracting. What you are experiencing is the growth phase of any small business. BE- AWARE. What choices you make next could either enhance your reputation, or destroy the love of your work. My mistake was hiring an employee, too soon. If you think that things are terse now: imagine a plethora of government forms and paper mandates taking you from your first love: your specialty. Hire too soon and this Orwell-IRS-Huxley vision can be yours. 2. To prevent the above the following options are tendered for your consideration. Use technology. Many of the legal firms will tell you "Billing is the Key". Isolate your work computer from your business computer (the less powerful). Put your records, taxes, and billing reports on the lesser. Tie the main workstation on to a log resident in the system. (These are usually available in billing, legal, and project type software sections of your favorite supplier). Done correctly a log feature will allow phone conversations, faxes, and "reports" to be billed against a single account. The account backs up to your office work section. Bingo. come time to bill, or time to settle accounts: neat 'n' tidy. Also isolated from the onerous problems that plague your full time work station: soft ware conflicts, bugs, etc. Another nice feature is that the office model can be "power off" and isolated, or hot and continuous. In addition, with speech technology, you can get messages anywhere. In fact you could go so far as to dictate directly. There are several software programs available. Be sure to research one for continuous speech patterns. Some require a "pause" between words. You have no idea how breathless this can leave you. 2.a. The other obvious technology suggestion is laptop and modem to main. This gives a continuous backup or written report to your primary without the problems associated with loss. If you have to sit: why not get the most of it? Heck you could even dictate using a "hand set" it makes you look like a fellow in a discussion with someone if spotted. Further there is some pretty special software that will let you prep on other client requests and proposals while you wait. 3. So much for the soft end. What about employee leasing? Just as you are hired for specific problem resolution in a short time. So too can you hire "expertise" for a short specified period of time. Often at rates that are quite reasonable which a) may be billed back to a client, (b) reduce your tax exposure, and (c) allow you to do what you do best: wrangle more business by reputation or swift, efficient service delivery. Expertise that it is best to hire includes: secretarial. Particularly for brief swamped periods, Tax preparation by someone WELL VERSED in the nuances of your particular line of work. Specific Legal interpretation (Not necessarily a Lawyer). Oddly enough, schools with legal students are a source for researches, (Be specific, set job limits, Pay Only for results, expenses out of their pocket, reimbursement subject to interpretations). Another source could be a retired Judge. As if these guys didn't get enough sitting on the bench, they can be a well spring of how to proceed. The Banking end can best be winnowed out by either retired IRS examiners, or retired Bureau folk. These folks not only give good advice: their credentials make them useful witnesses for occasional legal clients. As can be noticed; specifically large job requirements often require particular expertise hence subcontracting. The leasing aspects put the onus of self employment onto the hourly earner provided you do not make certain demands. 4. Who said you had to type? Welcome to the world of tomorrow. Even in it's infancy; textual speech allows you to rummage your voice mail, dictate letters and notes from afar. Let technology do for you. What still requires personal re-assurance, hire the Expertise for no longer than you need it. You will have more time to do, and play. 5. One last note about computer glitches. Most are caused by operator error or mis-information. A number of others are caused by conflicts within software packages. That is why I suggest the isolation of the 2 portions of your business. The work end and the Money end. It will let you sleep at night. Oh back up Often. Computer expertise is least expensive near the source. Ask around the local Community colleges. Often as not, there are some bright lads that will be willing to work to solve your problems for you. Don't offer too much. Negotiate for intangibles. Like all the soda you can drink. or Lunch. Who knows maybe your temp will become a full time expertise partner. You grew the expert. 6. From you memos your place is in the field or making deliveries to clients. Happy viewing, good positioning. Witzend@peganet.com ************************************************************************** 16)From: Whicker Subject: Phone Numbers I need a good source for getting unlisted phone numbers. Do you have any ideas as to where would be a good place? I would like to find a place on the net but if that isn't possible then any place would work. Thanks doc please reply to doc@indirect.com ************************************************************************** Who are you? What's your specialty and/or interest? Let us know about your company... What would you like to see on the list? Post it. Let us know... Do you have something to contribute? We'd like to hear it... We want to know EVERYTHING and ANYTHING about eavesdropping, surveillance, countersurveillance & privacy related technology, etc... Remember: who, what, where, when, how & why... we want ALL the details... Do you have a question? Post it... A little free time? Help a member... With the INCREDIBLE brain power on this list, someone should have the answer ;-) P.S. Don't be a LURKER... Members take the time to post info for us all... give something back... Don't just take... Your input/knowledge is valued... ************************************************************************** Send Postings to: spyking@con2.com with "Post" in subject field with subject ************************************************************************** Subscribe to: spyking@con2.com In the subject field type: subscribe-surveillance list e-mail address ************************************************************************** Unsubscribe to: spyking@con2.com In the subject field type: unsubscribe-surveillance list e-mail address ************************************************************************** ...The Simple Rules of the Surveillance List... The Surveillance List Owners may Reject any posts that are/contain: 1) Info Unrelated to Eavesdropping, Surveillance or Privacy technology... 2) Flames or Negative posts... 3) E-Signatures that are considered excessive... 4) Advertisements not DIRECTLY related to the list topics... 5) Attached Files... 6) Oversized Posts... (May be edited to save room) **************************************************************************** This publication is copyrighted and is protected by U.S. and International copyright law. The information transmitted on this list may not be reproduced, reposted or forwarded to any non-list member without expressed written permission of the List Owner. Violation of U.S. copyright law is a criminal and civil offense... **************************************************************************** The Surveillance List is Moderated by SpyKing@thecodex.com The List Owner will make EVERY effort to protect subscribers from spam... Copyright 1996, 1997 Codex Publishing Inc., All Rights Reserved... **************************************************************************** ****************************************************************************** Vol.Two Issue #122 The Surveillance List May 29,1997 Over 2000+ Members Worldwide Representing 46 different countries ****************************************************************************** IN THIS ISSUE... ****************************************************************************** 01) Stolen Kidneys 02) Process Server needed in Corpus Christi, Texas 03) Re: I need help 04) Credit 05) C.A.R.I.S. (Child Abuse Reporting Information System) 06) MDT Samples 07) Los Angelas Police Dept. WWW Hacked 08) Newbot Search Robot 09) Just might be interesting ****************************************************************************** DON'T BE A LURKER.... GET INVOLVED... YOU ARE A MEMBER... MAKE THE MOST OF IT ****************************************************************************** 1)From: Jeff Pristelski Subject: Stolen Kidneys Does anyone know how much a kidney would go for on the black market? Hell, I've got two of 'em. ************************************************************************** 2)From: Trace Carpenter Subject: Process Server needed in Corpus Christi, Texas Process Server needed in Corpus Christi, Texas for service of several papers immediately. All Targets will be in one location. -- Trace Carpenter Investigations ****** 2926 Maple Ave., Ste. 200 Friends help you move; Dallas, Texas 75201 Real friends help you move bodies. 214.828.4520 ****** ************************************************************************** 3)From: "karl kiefert" Subject: Re: I need help Jose, Yep, I saw the message and nearly replied but it was far too vague as so are some of the other postings. I have to take my hat off to most of you out there, but some people could be a bit more verbose. Also please remember there are people on all sides of the pond, so asking for comments on the technology used in "last nights ??? tv program" is not so meaningful to us on this side or to the people whom missed the prog. What type of network os is it? Pc, mac, sun... etc. or terminal? Dos , windows, nt, unix (type of unix), vms, OS2 etc How is it currently being used - standalone /network? What type of security is currently in efferct and what access rights (privelidges, or what is he allowed do on the system) Does the user have to his pc and network. Hard disk/remote boot prom/floppy What type(s) of programs is he interferring with i.e. concurrent operating system or 1 to 10 counter and what is his skill level? Age of person? Were all the "vanished files" in one dir Does the station he sits at have special access rights? Does the user have access to where the aministrators and equivelents sit? Let the administrators know of your problem? You should be able to get the files back from a backup. Some system have a salvage option that shows who deleted them. How much clout within the organization do you have to change system setups on servers, terminals etc. The quick answer is to confront him, his faculty head, his parents, the people whos work has gone missing and make it public knowledge what the chap is doing. Yes, get him thrown out of class! ************************************************************************** 4)From: "Terry Rodgers" Subject: Credit Hi Does anyone know how to fix bad credit? Please let me know blaster ************************************************************************** 5)From: Trace Carpenter Subject: C.A.R.I.S. (Child Abuse Reporting Information System) Is anyone familiar with the database known as CARIS, (Child Abuse Reporting Information System), not to be confused with another database with a similar name? -- Trace Carpenter Investigations ****** 2926 Maple Ave., Ste. 200 Friends help you move; Dallas, Texas 75201 Real friends help you move bodies. 214.828.4520 ****** ************************************************************************** 6)From: Joseph Cardani Subject: MDT Samples Here is a sample of output form the MDTSTUFF program that decodes MDC-4800 systems. I changed some of the output from its original transmission, but the format is the same. I also editied out several status messages that were not relevant. This transmission was from the Philadelphia Fire Department digital dispatch to printers in the fire stations. Frequency 857.7375 Enjoy, 75 C0 00 09 B6 5C AB 10 68 07 68 C7 54 58 46 46 6C 30 uÀ..¶\«.h.hÇTXFFl0 00 2A 2A 44 49 53 50 41 54 43 48 20 4E 4F 54 49 46 49 .**DISPATCH NOTIFI 43 41 54 49 4F 4E 2A 2A 20 2F 32 30 33 38 0D 4D 32 32 CATION** /2038.M22 42 0D 33 37 33 35 20 4E 20 31 30 54 48 20 53 54 20 4E B.3735 N 11TH ST N 45 41 52 20 57 20 45 52 49 45 20 41 56 0D 42 20 20 20 EAR W ERIE AV.B 20 20 20 28 4C 49 53 54 20 41 4C 53 20 42 4C 53 20 4E (LIST ALS BLS N 4F 20 46 49 52 53 54 20 52 45 53 50 29 20 41 4C 41 52 O FIRST RESP) ALAR 4D 3A 20 31 0D 46 23 30 36 30 31 20 42 41 4E 44 3A 20 M: 1.F#0601 BAND: 32 20 47 52 49 44 3A 20 32 38 4A 30 32 0D 42 4F 58 23 2 GRID: 28J02.BOX# 20 32 38 38 32 0D 4C 4F 43 3A 20 31 30 54 48 20 53 54 2882.LOC: 10TH ST 2E 20 26 20 45 52 49 45 20 41 56 45 2E 0D 2F 32 30 33 . & ERIE AVE../203 38 20 45 4E 54 52 59 20 49 4E 4A 20 48 45 41 44 20 42 8 ENTRY INJ HEAD B 4C 45 45 44 45 52 20 30 35 2F 30 35 2F 39 37 0D 2F 32 LEEDER 05/05/97./2 30 33 38 20 44 49 53 50 20 28 36 38 33 29 20 4D 32 32 038 DISP (683) M22 42 20 30 35 2F 30 35 2F 39 37 0D 0C 2A 2A 2A 2A 74 02 B 05/05/97..****t. 75 C0 00 02 65 E2 A8 04 08 07 04 61 54 58 46 46 6C 30 uÀ..eâ¨....aTXFFl0 00 2A 2A 44 49 53 50 41 54 43 48 20 4E 4F 54 49 46 49 .**DISPATCH NOTIFI 43 41 54 49 4F 4E 2A 2A 20 2F 32 30 34 31 0D 4D 38 0D CATION** /2041.M8. 57 20 43 41 4D 42 52 49 41 20 53 54 20 2F 48 4F 50 45 W CAMBRIA ST /HOPE 20 53 54 20 3C 31 30 30 2F 32 39 30 30 3E 0D 54 20 20 ST <100/2900>.T 20 20 20 20 28 54 52 41 55 4D 41 20 52 45 53 50 4F 4E (TRAUMA RESPON 53 45 29 20 41 4C 41 52 4D 3A 20 31 0D 46 23 30 36 30 SE) ALARM: 1.F#060 32 20 42 41 4E 44 3A 20 32 20 47 52 49 44 3A 20 32 39 2 BAND: 2 GRID: 29 41 30 34 0D 42 4F 58 23 20 34 31 39 34 0D 4C 4F 43 3A A04.BOX# 4194.LOC: 20 48 4F 57 41 52 44 20 26 20 43 41 4D 42 52 49 41 20 HOWARD & CAMBRIA 53 54 53 2E 0D 2F 32 30 34 31 20 45 4E 54 52 59 20 49 STS../2041 ENTRY I 4E 4A 20 41 53 53 2F 42 4C 44 52 20 30 35 2F 30 35 2F NJ ASS/BLDR 05/05/ 39 37 0D 2F 32 30 34 31 20 44 49 53 50 20 28 36 38 33 97./2041 DISP (683 29 20 4D 38 20 30 35 2F 30 35 2F 39 37 0D 0C 2A 01 5F ) M8 05/05/97..*._ 75 C0 00 61 F8 B3 AB 04 20 07 3A A9 54 58 46 46 6C 30 uÀ.aø³«. .:(c)TXFFl0 00 2A 2A 44 49 53 50 41 54 43 48 20 4E 4F 54 49 46 49 .**DISPATCH NOTIFI 43 41 54 49 4F 4E 2A 2A 20 2F 32 30 34 37 0D 4D 33 30 CATION** /2047.M30 0D 30 32 20 50 49 41 20 2D 2D 20 50 49 41 20 4D 41 49 .02 PIA -- PIA MAI 4E 20 54 45 52 4D 49 4E 41 4C 0D 41 20 20 20 20 20 20 N TERMINAL.A 28 4C 49 53 54 20 41 4C 53 20 42 4C 53 20 46 49 52 53 (LIST ALS BLS FIRS 54 20 52 45 53 50 4F 4E 44 45 52 29 20 41 4C 41 52 4D T RESPONDER) ALARM 3A 20 31 0D 46 23 30 36 30 36 20 42 41 4E 44 3A 20 34 : 1.F#0606 BAND: 4 20 47 52 49 44 3A 20 33 36 45 31 32 20 28 48 29 0D 42 GRID: 36E12 (H).B 4F 58 23 20 31 39 38 38 0D 4C 4F 43 3A 20 50 48 49 4C OX# 1988.LOC: PHIL 41 20 49 4E 54 45 52 4E 41 54 49 4F 4E 41 4C 20 41 49 A INTERNATIONAL AI 52 50 4F 52 54 0D 2F 32 30 34 37 20 45 4E 54 52 59 20 RPORT./2047 ENTRY 43 4F 4E 43 4F 55 52 53 45 20 42 2F 47 41 54 45 20 31 CONCOURSE B/GATE 1 33 2F 4E 45 52 56 4F 55 53 0D 43 4F 4E 44 49 54 49 4F 3/NERVOUS.CONDITIO 4E 2D 45 4D 50 4C 4F 59 45 45 20 30 35 2F 30 2A 22 91 N-EMPLOYEE 05/0*"' 75 C0 00 13 6D E3 AB 04 50 07 FE 59 54 58 46 46 6C 30 uÀ..mã«.P.þYTXFFl0 00 2A 2A 44 49 53 50 41 54 43 48 20 43 41 54 49 4F 4E .**DISPATCH CATION 2A 2A 20 2F 32 30 35 30 0D 4D 39 0D 34 34 31 34 20 53 ** /2050.M9.4414 S 41 4E 53 4F 4D 20 53 54 20 4E 45 41 52 20 53 20 34 34 ANSOM ST NEAR S 44 54 48 20 53 54 0D 20 28 4C 49 53 54 20 41 4C 53 20 42 TH ST. (LIST ALS B 4C 53 20 4E 4F 20 46 49 52 53 54 20 52 45 53 50 29 20 LS NO FIRST RESP) 41 4C 41 52 4D 3A 20 31 0D 46 23 30 36 30 37 20 42 41 ALARM: 1.F#0607 BA 4E 44 3A 20 34 20 47 52 49 44 3A 20 32 37 4B 31 31 0D ND: 4 GRID: 27K11. 42 4F 58 23 20 30 37 33 33 0D 4C 4F 43 3A 20 34 34 54 BOX# 0733.LOC: 45T 48 20 26 20 43 48 45 53 54 4E 55 54 20 53 54 53 2E 0D H & CHESTNUT STS.. 32 4E 44 20 46 4C 52 0D 2F 32 30 35 30 20 45 4E 54 52 2ND FLR./2050 ENTR 59 20 43 48 49 4C 44 20 49 4E 20 44 49 54 52 45 53 53 Y CHILD IN DITRESS 20 31 31 4D 54 48 53 20 30 35 2F 30 35 2F 39 37 0D 2F 11MTHS 05/05/97./ 32 30 35 30 20 44 39 34 29 20 4D 39 20 30 35 2A 19 5A 2050 D94) M9 05*.Z 75 C0 00 38 BC 7C AB 04 60 07 5C EF 54 58 46 46 6C 30 uÀ.81/4|«.`.\ïTXFFl0 00 2A 2A 44 49 53 50 41 54 43 48 20 4E 4F 54 49 46 49 .**DISPATCH NOTIFI 43 41 54 49 4F 4E 2A 2A 20 2F 32 30 35 30 0D 4D 31 30 CATION** /2050.M10 0D 36 36 35 36 20 47 45 52 4D 41 4E 54 4F 57 4E 20 41 .6656 GERMANTOWN A 56 20 4E 45 41 52 20 45 20 48 4F 52 54 54 45 52 20 53 V NEAR E HORTTER S 54 0D 50 4D 46 20 20 20 20 28 50 52 49 56 41 54 45 20 T.PMF (PRIVATE 4D 45 44 49 43 41 4C 20 46 41 43 49 4C 49 54 59 29 20 MEDICAL FACILITY) 41 4C 41 52 4D 3A 31 0D 46 23 30 36 30 39 20 42 41 4E ALARM:1.F#0609 BAN 44 3A 20 32 20 47 52 49 44 3A 20 31 37 43 30 37 0D 42 D: 2 GRID: 17C07.B 4F 58 23 20 31 36 39 39 0D 4C 4F 43 3A 20 47 45 52 4D OX# 1699.LOC: GERM 41 4E 54 4F 57 4E 20 41 56 45 2E 26 50 48 49 4C 2D 45 ANTOWN AVE.&PHIL-E 4C 4C 45 4E 41 20 53 54 0D 44 49 41 4C 59 53 49 53 20 LLENA ST.DIALYSIS 43 45 4E 54 45 52 0D 2F 32 30 35 30 20 45 4E 54 52 59 CENTER./2050 ENTRY 20 44 42 2F 32 4E 44 20 46 4C 52 20 30 35 2F 30 35 2F DB/2ND FLR 05/05/ 39 37 0D 2F 32 30 35 30 20 44 49 53 50 20 28 2A FF 37 97./2050 DISP (*ÿ7 75 C0 00 06 41 A4 AB 04 10 07 98 1F 54 58 46 46 6C 30 uÀ..A¤«...˜.TXFFl0 00 2A 2A 44 49 53 50 41 54 43 48 20 4E 4F 54 49 46 49 .**DISPATCH NOTIFI 43 41 54 49 4F 4E 2A 2A 20 2F 32 30 35 32 0D 4C 32 35 CATION** /2052.L25 20 4D 31 36 0D 30 30 20 4D 4F 4E 54 47 4F 4D 45 52 59 M16.00 MONTGOMERY 20 44 52 20 2D 2D 20 42 45 4C 4D 4F 4E 54 20 50 4C 41 DR -- BELMONT PLA 54 45 41 55 0D 41 43 43 20 20 20 20 28 41 43 43 49 44 TEAU.ACC (ACCID 45 4E 54 29 20 41 4C 41 52 4D 3A 20 31 0D 46 23 30 36 ENT) ALARM: 1.F#06 31 31 20 42 41 4E 44 3A 20 31 20 47 52 49 44 3A 20 32 11 BAND: 1 GRID: 2 37 4A 30 35 0D 42 4F 58 23 20 37 31 31 36 0D 4C 4F 43 7J05.BOX# 7116.LOC 3A 20 42 45 4C 4D 4F 4E 54 20 4D 41 4E 53 49 4F 4E 20 : BELMONT MANSION 26 20 43 48 41 4D 4F 55 4E 49 58 20 44 52 0D 2F 32 30 & CHAMOUNIX DR./20 35 32 20 45 4E 54 52 59 20 54 4F 50 20 4F 46 20 50 4C 52 ENTRY TOP OF PL 41 54 45 41 55 20 30 35 2F 30 35 2F 39 37 0D 2F 32 30 ATEAU 05/05/97./20 35 32 20 44 49 53 50 20 28 36 35 38 29 20 51 45 31 36 52 DISP (658) QE16 20 4C 32 35 20 42 31 31 20 4D 31 36 20 30 35 2A 0B 57 L25 B11 M16 05*.W 75 C0 00 06 41 A4 AB 04 10 07 98 1F 54 58 46 46 6C 30 uÀ..A¤«...˜.TXFFl0 00 2A 2A 44 49 53 50 41 54 43 48 20 4E 4F 54 49 46 49 .**DISPATCH NOTIFI 43 41 54 49 4F 4E 2A 2A 20 2F 32 30 35 32 0D 4C 32 35 CATION** /2052.L25 20 4D 31 36 0D 30 30 20 4D 4F 4E 54 47 4F 4D 45 52 59 M16.00 MONTGOMERY 20 44 52 20 2D 2D 20 42 45 4C 4D 4F 4E 54 20 50 4C 41 DR -- BELMONT PLA 54 45 41 55 0D 41 43 43 20 20 20 20 28 41 43 43 49 44 TEAU.ACC (ACCID 45 4E 54 29 20 41 4C 41 52 4D 3A 20 31 0D 46 23 30 36 ENT) ALARM: 1.F#06 31 31 20 42 41 4E 44 3A 20 31 20 47 52 49 44 3A 20 32 11 BAND: 1 GRID: 2 37 4A 30 35 0D 42 4F 58 23 20 37 31 31 36 0D 4C 4F 43 7J05.BOX# 7116.LOC 3A 20 42 45 4C 4D 4F 4E 54 20 4D 41 4E 53 49 4F 4E 20 : BELMONT MANSION 26 20 43 48 41 4D 4F 55 4E 49 58 20 44 52 0D 2F 32 30 & CHAMOUNIX DR./20 35 32 20 45 4E 54 52 59 20 54 4F 50 20 4F 46 20 50 4C 52 ENTRY TOP OF PL 41 54 45 41 55 20 30 35 2F 30 35 2F 39 37 0D 2F 32 30 ATEAU 05/05/97./20 35 32 20 44 49 53 50 20 28 36 35 38 29 20 51 45 31 36 52 DISP (658) QE16 20 4C 32 35 20 42 31 31 20 4D 31 36 20 30 35 2A 0B 57 L25 B11 M16 05*.W 75 C0 00 64 55 E4 AB 04 20 07 3A A9 54 58 46 46 6C 30 uÀ.dUä«. .:(c)TXFFl0 00 2A 2A 44 49 53 50 41 54 43 48 20 4E 4F 54 49 46 49 .**DISPATCH NOTIFI 43 41 54 49 4F 4E 2A 2A 20 2F 32 31 30 33 0D 45 31 20 CATION** /2103.E1 53 35 20 42 31 0D 31 33 30 20 53 20 31 31 54 48 20 53 S5 B1.130 S 11TH S 20 53 41 4E 53 4F 4D 20 53 54 0D 48 49 52 49 20 20 20 SANSOM ST.HIRI 28 48 49 47 48 20 52 49 53 45 20 42 4C 44 47 20 49 4E (HIGH RISE BLDG IN 43 49 44 45 4E 54 29 20 41 4C 41 52 4D 3A 0D 31 0D 46 CIDENT) ALARM:.1.F 23 30 36 31 39 20 42 41 4E 44 3A 20 31 20 47 52 49 44 #0619 BAND: 1 GRID 3A 20 32 38 47 31 33 20 28 48 29 0D 42 4F 58 23 20 30 : 28G13 (H).BOX# 0 35 31 33 0D 4C 4F 43 3A 20 31 31 54 48 20 26 20 57 41 513.LOC: 11TH & WA 4C 4E 55 54 20 53 54 53 2E 0D 53 45 43 2D 39 31 36 20 LNUT STS..SEC-916 50 41 56 49 4C 49 4F 4E 0D 2F 32 31 30 33 20 45 4E 54 PAVILION./2103 ENT 52 59 20 31 36 54 20 30 35 2F 30 35 2F 39 37 0D 2F 32 RY 16T 05/05/97./2 31 30 33 20 44 49 53 50 20 28 36 35 38 29 20 2A 02 F6 103 DISP (658) *.ö 75 C0 00 19 37 4C AB 04 40 07 6F CC 54 58 46 46 6C 30 uÀ..7L«.@.oÌTXFFl0 00 2A 2A 44 49 53 50 41 54 43 48 20 4E 4F 54 49 46 49 .**DISPATCH NOTIFI 43 41 54 49 4F 4E 2A 2A 20 2F 32 31 30 33 0D 45 31 31 CATION** /2103.E11 0D 31 33 30 20 53 20 31 31 54 48 20 52 20 53 41 4E 53 .130 S 11TH R SANS 4F 4D 20 53 54 0D 48 49 52 49 20 20 20 28 48 49 47 48 OM ST.HIRI (HIGH 20 52 49 53 45 20 42 4C 44 47 20 49 4E 43 49 44 45 4E RISE BLDG INCIDEN 54 29 20 41 4C 41 52 4D 3A 0D 31 0D 46 23 30 36 31 39 T) ALARM:.1.F#0619 20 42 41 4E 44 3A 20 31 20 47 52 49 44 3A 20 32 38 47 BAND: 1 GRID: 28G 31 33 20 28 48 29 0D 42 4F 58 23 20 30 35 31 33 0D 4C 13 (H).BOX# 0513.L 4F 43 3A 20 31 31 54 48 20 26 20 57 41 4C 4E 55 54 20 OC: 11TH & WALNUT 53 54 53 2E 0D 53 45 43 2D 39 31 36 20 50 41 56 49 4C STS..SEC-916 PAVIL 49 4F 4E 0D 2F 32 31 30 33 20 45 4E 54 52 59 20 31 36 ION./2103 ENTRY 16 54 48 20 53 54 59 2F 39 54 48 20 46 4C 20 30 35 2F 30 TH STY/9TH FL 05/0 35 2F 39 37 0D 2F 32 31 30 33 20 44 49 53 50 20 28 36 5/97./2103 DISP (6 35 38 29 20 50 32 30 20 45 2A 26 A4 00 00 00 00 00 00 58) P20 E*&¤...... 75 C0 00 49 B2 1E AB 04 60 07 5C EF 54 58 46 46 6C 30 uÀ.I².«.`.\ïTXFFl0 00 2A 2A 44 49 53 50 41 54 43 48 20 4E 4F 54 49 46 49 .**DISPATCH NOTIFI 43 41 54 49 4F 4E 2A 2A 20 2F 32 31 30 33 0D 52 31 0D CATION** /2103.R1. 31 33 30 20 53 20 31 31 54 48 20 53 54 20 4E 45 41 52 130 S 11TH ST NEAR 20 53 41 4E 53 4F 4D 20 53 54 0D 48 49 52 49 20 20 20 SANSOM ST.HIRI 28 48 49 47 48 20 52 49 53 45 20 42 4C 44 47 20 49 4E (HIGH RISE BLDG IN 43 49 44 45 4E 54 29 20 41 4C 41 52 4D 3A 0D 31 0D 46 CIDENT) ALARM:.1.F 23 30 36 31 39 20 42 41 4E 44 3A 20 31 20 47 52 49 44 #0619 BAND: 1 GRID 3A 20 32 38 47 31 33 20 28 48 29 0D 42 4F 58 23 20 30 : 28G13 (H).BOX# 0 35 31 33 0D 4C 4F 43 3A 20 31 31 54 48 20 26 20 57 41 513.LOC: 11TH & WA 4C 4E 55 54 20 53 54 53 2E 0D 53 45 43 2D 39 31 36 20 LNUT STS..SEC-916 50 41 56 49 4C 49 4F 4E 0D 2F 32 31 30 33 20 45 4E 54 PAVILION./2103 ENT 52 59 20 31 36 54 48 20 53 54 59 2F 39 54 48 20 46 4C RY 16TH STY/9TH FL 20 30 35 2F 30 35 2F 39 37 0D 2F 32 31 30 33 20 44 49 05/05/97./2103 DI 53 50 20 28 36 35 38 29 20 50 32 30 20 45 31 2A 8C 9E SP (658) P20 E1*Œž 75 C0 00 27 CA 94 AB 04 00 07 09 8A 54 58 46 46 6C 30 uÀ.'Ê"«....ŠTXFFl0 00 2A 2A 44 49 53 50 41 54 43 48 20 4E 4F 54 49 46 49 .**DISPATCH NOTIFI 43 41 54 49 4F 4E 2A 2A 20 2F 32 31 30 35 0D 50 36 20 CATION** /2105.P6 4C 31 36 0D 41 52 41 4D 49 4E 47 4F 20 41 56 20 2F 45 L16.ARAMINGO AV /E 20 4F 4E 54 41 52 49 4F 20 53 54 20 3C 33 34 30 30 2F ONTARIO ST <3400/ 32 34 30 30 3E 0D 53 54 4F 52 45 20 20 28 53 54 4F 52 2400>.STORE (STOR 45 20 46 49 52 45 29 20 41 4C 41 52 4D 3A 20 31 0D 46 E FIRE) ALARM: 1.F 23 30 36 32 31 20 42 41 4E 44 3A 20 33 20 47 52 49 44 #0621 BAND: 3 GRID 3A 20 32 39 46 30 35 0D 42 4F 58 23 20 32 34 37 35 0D : 29F05.BOX# 2475. 4C 4F 43 3A 20 4D 45 4D 50 48 49 53 20 26 20 54 49 4F LOC: MEMPHIS & TIO 47 41 20 53 54 53 2E 0D 2F 32 31 30 34 20 45 4E 54 52 GA STS../2104 ENTR 59 20 4E 4F 20 4D 4F 52 45 20 49 4E 46 4F 52 4D 41 D4 Y NO MORE INFORMAÔ 49 4F 4E 20 30 35 2F 30 35 2F 39 37 2F 32 31 30 35 20 ION 05/05/97/2105 44 49 53 50 20 28 36 38 30 29 20 45 32 38 20 45 37 20 DISP (680) E28 E7 50 36 20 45 32 35 46 20 4C 31 30 20 4C 31 36 2A BB 76 P6 E25F L10 L16*»v 75 C0 00 09 B6 5C AA 04 48 07 14 1E 54 58 46 46 6C 30 uÀ..¶\ª.H...TXFFl0 00 2A 2A 44 49 53 50 41 54 43 48 20 4E 4F 54 49 46 49 .**DISPATCH NOTIFI 43 41 54 49 4F 4E 2A 2A 20 2F 32 31 31 38 0D 50 35 30 CATION** /2118.P50 0D 38 31 34 20 57 20 49 4E 44 49 41 4E 41 20 41 56 20 .814 W INDIANA AV 4E 45 41 52 20 4E 20 38 54 48 20 53 54 0D 41 20 20 20 NEAR N 8TH ST.A 20 20 20 28 4C 49 53 54 20 41 4C 53 20 42 4C 53 20 46 (LIST ALS BLS F 49 52 53 54 20 52 45 53 50 4F 4E 44 45 52 29 20 41 4C IRST RESPONDER) AL 41 52 4D 3A 20 31 0D 46 23 30 36 33 34 20 42 41 4E 44 ARM: 1.F#0634 BAND 3A 20 32 20 47 52 49 44 3A 20 32 38 4A 30 34 20 28 48 : 2 GRID: 28J04 (H 29 0D 42 4F 58 23 20 31 36 38 31 0D 4C 4F 43 3A 20 39 ).BOX# 1681.LOC: 9 54 48 20 53 54 2E 20 26 20 49 4E 44 49 41 4E 41 20 41 TH ST. & INDIANA A 56 45 2E 0D 2F 32 31 31 37 20 45 4E 54 52 59 20 4F 44 VE../2117 ENTRY OD 2F 55 4E 43 20 30 35 2F 30 35 2F 39 37 0D 2F 32 31 31 /UNC 05/05/97./211 38 20 44 49 53 D0 20 28 36 38 33 29 20 50 35 30 20 30 8 DISÐ (683) P50 0 35 2F 30 35 2F 39 37 0D 0C 2A 3D 8A 00 00 00 00 00 00 5/05/97..*=Š...... 75 C0 00 54 D6 D5 AB 04 70 07 CD 7A 54 58 46 46 6C 30 uÀ.TÖÕ«.p.ÍzTXFFl0 50 41 54 43 48 20 4E 4F 54 49 46 49 43 41 54 49 4F 4E PATCH NOTIFICATION 2A 2A 20 2F 32 31 32 35 0D 50 33 0D 54 41 4E 20 53 54 ** /2125.P3.TAN ST 20 4E 45 41 52 20 53 54 0D 41 20 20 49 53 54 20 41 4C NEAR ST.A IST AL 46 49 52 53 54 20 52 45 53 50 4F 4E 44 45 52 29 20 41 FIRST RESPONDER) A 4C 41 52 4D 3A 20 31 0D 46 23 30 36 33 35 20 42 41 4E LARM: 1.F#0635 BAN 44 3A 20 34 20 47 52 49 44 3A 20 33 37 48 30 33 0D 42 D: 4 GRID: 37H03.B 4F 58 23 20 30 36 32 38 0D 4C 4F 43 3A 20 34 54 48 20 OX# 0628.LOC: 4TH 54 4F 4E 20 53 54 32 34 20 45 4E 54 52 59 20 54 4F 4F TON ST24 ENTRY TOO 4B 20 50 49 4C 4C 53 2D 53 55 49 43 54 45 4D 50 54 20 K PILLS-SUICTEMPT 30 35 2F 30 35 2F 39 37 0D 2F 32 31 50 20 28 36 39 34 05/05/97./21P (694 29 20 50 33 20 4D 31 34 20 30 35 2F 30 35 2F 2A FA 35 ) P3 M14 05/05/*ú5 ************************************************************************** 7)From: "Betty G.O'Hearn" Subject: Los Angelas Police Dept. WWW Hacked The LAPD WWW site was hacked last evening. Check out the URL below for a mirror of the hacker handiwork at: http://www.dis.org/se7en ( mirrored ) The LAPD WWW site is http://www.lapd.org Betty ************************************************************************** 8)From: sonnymac@worldnet.att.net (William C Mcdonald) Subject: Newbot Search Robot The people at Wired magazine have come up with a great search "robot". I use it quite often with real results. For example, I requested info on Quick Cam video surveillance and it gave 100 Web responses. I typed in Lock picking and got 100 responses. It gives you a choice of news sources, the Web, and Usenet. If you have a dedicated internet line, it can run all the time, if you have dialup access you run it manually. It's a free download from: www.wired.com/newbot/ This is a free d/l, I know they have a Win 95 version. Good luck and to the lurkers, Let's post! Bill Mcdonald ************************************************************************** 9)From: BADCOFFEE@aol.com Subject: Just might be interesting Note from Badcoffee: Please take the rest of the week off work to read this post. Just might be interesting...... Response to CChrist373@aol.com, (every one else close their eyes) Last post MC wrote something that might go like this.....(I cut out some things out, to shorten this up a bit.) To Badcoffee: Augie, if your going to show companies how vulnerable they are. I hope your up on electronics and alarm systems. Just picking a lock won't get it. I haven't seen a business yet that had looks I couldn't compromise but the alarms systems are a different mater. Some companies have alarms so sophisticated they don't really need to lock the doors, You can't help but trigger them. Think about it, some places are set up so when you come through the door you just triggered several types of detectors. My Response: (brace yourself, this is long as hell) MC- My job is to find the weakest link. Compromise it, make it then the strongest link. Start all over- Find the weakest link....blah blah blah blah...... Until, The WEAKEST link....and there will always be one....is of such strength that it is unpenetrable. It is IMPOSSIBLE to fully secure a building on anything less that a government budget. Alarms: I laugh as 99% of alarm systems that are "clustered" in "groups" ALL in ONE area...like the front door. One front door might have....2 separate door contacts, a tamper sensor, machine guns, a trap door, and 2 naked and armed hamsters guarding what you would "think" is the way in. I have NEVER looked at any front door as a primary option. This is where they expect you to come in from. That would be insanity. I would like EVERYONES attention here that is in the security business in NEW JERSEY. (this "might" have something to do with you) 2 weeks ago, I was given the opportunity to interview (employment) with one of NJ's finest and largest security firms.(Guard service and security alarm systems) All I wanted to do....was get firmly into the security business. Starting from THE BOTTOM. When I pulled up to the parking lot, I was greeted by 2 giant roof cameras. The front door had an ARSENAL of security safeguards. The lock??....who the hell knows....didn't even look at it. First impression of this place said........."LOOK UP!! AUGIE"...... Sure enough, I found what I was looking for......4 story building, roof was "hookable", Windows were awning type without the crank. Just unlatch and your in. Picking??? NO MC.......rappelling. Picking in good for things like file cabinets. Nothing securing the windows. This place is secure.....but NOT foolproof. Considering this all took about 14 seconds to inspect........3 weeks planning on this and I would have known EVERYTHING I need to know to sucessfully complete an entry. Such as....... a: Is the roof secure (alarms) b: Does the upper floors have motion sensors, alarms etc. (doe's you're building???) C: Is there a dictionary inside the building to correct my spelling for posts. d: And most importantly........I provided DETAILED PLAN and ENTRY with FULL Recon. That is MY specialty. An ALARM specialist would then be called in, with the information that I have provided including: A: ANYTHING that had to do with alarms to the best of my knowledge. B: FULL video C: Where the dictionary is. D: Most importantly, AREAL SHOTS. 500 feet of building. 2,500 feet of surrounding and as HIGH as we can fly. For a escape route. This ONE item give us more information than ANY other. Question for you all....... Did you know that building departments can give you the original blueprints to ANY building???? BY LAW, this is public information. Hey?? We have ourselves a layout now dont we. Maybe.....and a long shot....a wiring diagram that "might" include...alarm system specs?? Electrical- Hard wired alarm 1-2-3-4-5-6th floor? MY weakest link would be to flatter ONE of the many young ladies in the building......and get the secrets of the world just by coming to her workplace and "giving her roses". OK...I'm real ugly so that wont work......but I'd make a hell of a delivery person? Gee.....who is on the upper floors? NOT hard to find employee information. ONE 30 second "fake" delivery is all I would need to have ALL the information I would need to proceed. I'm sure SPYKING could hook me up with one of those "fantastic" pin hole cameras. Let's take it to the office and see what we have on VIDEO. ':-) Starting to get an idea how this thing works? Yes....details to the NICKEL, with NO detail left unchecked 100 times. 3 weeks and ABSOLUTE entry is gained. That was just this building. But you have the idea. THE ENTRY SPECIALISTS. ANY way possible. Doors, above ground, dig a tunnel, hover craft, ESP...whatever it takes to get the job done. BUT IT Gets DONE. As you can see.....Lockpicking was not mentioned ONCE in this entry specialist post. It is a combination of knoledge, reserch, contacts, a hell of a lot of investigative work, outside PI's, security consultants, alarm programers, Rental cars/trucks, special equipment, an army of lookouts, comunications specialists, equipment, more contacts, and a HELL of a lot of money....spent on ONE gig. ONE postponement for the "slightest" overlooked detail would cost a 8 man team (3 specialists, 4 lookouts and a mobil comunications coordinator) OVER $12,000 on "D" day. ONE DAY. One little detail....could set the clock back...as long as it takes to correct. You tack on PI's, consultants, freelancers, pizza, informants and atorney fees....and it turns into a BIG buck operation. That is REFUNDABLE if we fail. The secret.....have enough...and charge enough NOT to fail. A five dollar specialist is worth FIVE dollars. If sucessfull........then the real money come's. The contract for "securing" the place that was just violated. Could include: heavy construction, reinforcement...and related items. Why would someone pay and go through this much trouble?? Beleive it or not MC, some people in the world...have money to BURN. They are protective of their possesions and their lives. One million in security restructuring....is a "day's" pay for the chosen few....pocket change. Especially if their government is paying for it. I personally know people that have no trouble dropping $100,000 in a night at Vegas...but wouldnt "give" you a dime. It's THEIR money...and they they protect it at any expense. Then there are the mobsters, the drug dealers, the political figures, the individuals.....that simply can not "make a bank deposit"....... It's a wide market. PS- NO, I PASSED on the "security" job. I needed a bit more than $5.40 an hour. PSS- If anyone in NJ has an interviewer named "Lisa" and a young hairy gentleman came in for a BASIC security job (with high recommendations from high level contacts no less) and left her a resume (that she didn't even look at).........I'll be waiting for your call and BY THE WAY.....my price went up considerably.....just for you :-). PSSS- Dreamland Augie? Rapelling, delivery people, ropes, SPYKING pin hole cameras, tunnels, airplanes......?? Dreamland? Again....I am quite sure that there are PLENTY of companies, diplomats, government personnel and PEOPLE that spend a million plus dollars EACH year on security that would just LOVE to see how easy we make it to "breach their" Fortress and leave a rose for their wife by her bed. Eddie Murphey??? Can you hear me! I laughed at your security personnel. (They let me pull right up....stand on my truck, over the shrubs and cap off 18 pictures in 5 whole minutes before the cops came lol) Can you hear me Eddie!!!! :-) Whitney!!!! Right down the street babe, 2 for one special. MC, I hope this answered your questions :-) This is BIG on everything imaginable. BIG bucks....and it might take ME if I am lucky....about 10-15 years before I become a "professional" Another PS- The ENTRY business that has just been started is simply a lock out service for extra cash. That's all. THAT has everything to do with locks. Little do they know who is getting them in their house...lol) If were NOT good enough to gain entry..... Then were NOT good enough to take a DIME of your money. NO ENTRY NO FEE Take your heart pills long before you get the good news...."Were in". MC, any relation to MC Hammer? 3 for the price of 2 special this week...ok? :-) Badcoffee Augie ************************************************************************** Who are you? What's your specialty and/or interest? Let us know about your company... What would you like to see on the list? Post it. Let us know... Do you have something to contribute? We'd like to hear it... We want to know EVERYTHING and ANYTHING about eavesdropping, surveillance, countersurveillance & privacy related technology, etc... Remember: who, what, where, when, how & why... we want ALL the details... Do you have a question? Post it... A little free time? Help a member... With the INCREDIBLE brain power on this list, someone should have the answer ;-) P.S. Don't be a LURKER... Members take the time to post info for us all... give something back... Don't just take... Your input/knowledge is valued... ************************************************************************** Send Postings to: spyking@con2.com with "Post" in subject field with subject ************************************************************************** Subscribe to: spyking@con2.com In the subject field type: subscribe-surveillance list e-mail address ************************************************************************** Unsubscribe to: spyking@con2.com In the subject field type: unsubscribe-surveillance list e-mail address ************************************************************************** ...The Simple Rules of the Surveillance List... The Surveillance List Owners may Reject any posts that are/contain: 1) Info Unrelated to Eavesdropping, Surveillance or Privacy technology... 2) Flames or Negative posts... 3) E-Signatures that are considered excessive... 4) Advertisements not DIRECTLY related to the list topics... 5) Attached Files... 6) Oversized Posts... (May be edited to save room) **************************************************************************** This publication is copyrighted and is protected by U.S. and International copyright law. The information transmitted on this list may not be reproduced, reposted or forwarded to any non-list member without expressed written permission of the List Owner. Violation of U.S. copyright law is a criminal and civil offense... **************************************************************************** The Surveillance List is Moderated by SpyKing@thecodex.com The List Owner will make EVERY effort to protect subscribers from spam... Copyright 1996, 1997 Codex Publishing Inc., All Rights Reserved... ****************************************************************************** Vol.Two Issue #123 The Surveillance List May 30,1997 Over 2100+ Members Worldwide Representing 46 different countries ****************************************************************************** IN THIS ISSUE... ****************************************************************************** 01) Magnetic strip info 02) Re: I need help 03) Re: Credit 04) Dictionary 05) Challenge the global hacker community 06) Equifax - Sour Grapes from Aristotle (FYI) 07) Dis-information on the Internet and Apology 08) Introduction 09) Re: Los Angelas Police Dept. WWW hacked 10) Re: Magstripe cards 11) Voice changer 12) Re: Kidney crimes 13) Interesting article ****************************************************************************** DON'T BE A LURKER.... GET INVOLVED... YOU ARE A MEMBER... MAKE THE MOST OF IT ****************************************************************************** 1)From: lee Subject: Magnetic strip info If anyone is interested in this subject, take a browse on my company's website. Follow links down to Credit Card & Banking Fraud, then down to Table of Contents...if there's anything you find interesting drop me an email. All best Lee lee@infoplus.demon.co.uk Web site: http://www.ibmpcug.co.uk/~oak/info/ ************************************************************************** 2)From: John Hamernick Subject: Re: I need help >I don't know if you remember me, I wrote that E-mail re: I've got a snoop, >well it's gotten worse. It's the end of the semester and the students are >finishing and handing in their work when files are starting to go missing, >students, all of a sudden have access to all the files on the server and >their computers. The Keystroke capture program works, I've tested it out >and I couldn't believe how this was being done. I've got to catch him in >the act. Any Ideas? I tried to set up a surveyance software but it's only a >demo. It doesn't work I need to end this. Please help. Jose Maybe I can help. I am a network administrator for a state university. We have a 29 client ethernet lan with a novell 3.12 server. This is tied to campus lan via tokenring card. We have had many attemps at..ah how shall I say..data discovery?...but we have squashed all attempts...yet it is fun watchin' them. I need to know what type network, where, and all other pertinet information...Email me at jammer@linknet.net with details, or leave them on the list John Hamernick ************************************************************************** 3)From: Trace Carpenter Subject: Re: Credit >Does anyone know how to fix bad credit? Please let me know Hi Blaster, It's not that difficult. Most anyone can do it, but it's time consuming. I could try to explain how to do it, but I'll refer you to someone whose better at explaining it than I am. Call Stacy Notley at The Manning Group. 214.458.9100. I think that's still the correct number. If not, his area code may have changed to 972 in the area code split. Notley has a radio show that teaches you how to repair your credit and he'll be the first to tell you that you can do it yourself; but if you want it done, he'll be glad to handle it. -- Trace Carpenter Investigations ****** 2926 Maple Ave., Ste. 200 Friends help you move; Dallas, Texas 75201 Real friends help you move bodies. 214.828.4520 ****** ************************************************************************** 4)From: Trace Carpenter Subject: Dictionary >C: Is there a dictionary inside the building to correct my spelling for >posts. LOL!!!! Can anyone figure a way for Augie and I to move NJ & Texas closer to each other? -- Trace Carpenter Investigations ****** 2926 Maple Ave., Ste. 200 Friends help you move; Dallas, Texas 75201 Real friends help you move bodies. 214.828.4520 ****** ************************************************************************** 5)From: Frans Susilo, Subject: Challenge the global hacker community VANCOUVER, BC - From June 01 to July 15, 1997, VirTech Communications Inc. will challenge the global hacker community to bypass the security of its Macintosh World Wide Web server. Similar contests have been conducted previously in the US and Sweden, but VirTech's challenge is unique in that it addresses popular Internet security issues that are plaguing the media today. By launching the challenge, VirTech wants to overturn the notion that the Internet is vulnerable to credit card number snatching. Additionally, VirTech also wants to prove its server can withstand the type of vandalism attacks that have been successfully directed against the NASA and CIA Web servers. The rules are simple and the prize is big. Whoever breaks into the server, snatches the credit card number, and changes the phrase found on the page will win a hefty CAD $10,000 or an equivalent of US$7,500 prize. The credit card number will have an extra four digits appended to it in order to verify that the credit card number has indeed been snatched from the challenge page. Moreover, there will be a special phrase in the page that a challenger must change to claim the prize. The phrase could be something like "Cats chase dogs". The hacker should change it to something else, for example "Dogs chase cats". In anticipation of VanHacking contest, the World Wide Web server that VirTech employs will in no way be modified. No security beefing up (firewalling for example) will be done to protect the server. The server will run a network suite known as Apple Internet Server Solution 2.0 that consists of WebStar 1.3.2 server software from Starnine Technologies, Inc., and several prepackaged CGIs (Common Gateway Interface), which are special programs that enhance the functionality of the server. On the opening day of the challenge, a third party accountancy official will verify that the page exists. The page will then be immediately assigned a password in the presence of the official in order to mark the beginning of the challenge. During the course of the challenge, the official will be called upon bi-weekly to re-verify that the page is still exists. Further information can be obtained from the VanHacking challenge Web site at: when it is fully operational in mid-May. Cheers, ************************************************************************** 6)From: Leah Subject: Equifax - Sour Grapes from Aristotle (FYI) Here is more on CDB InfoTek's Troubles with Aristotle, posted for discussion: Equifax board asked to investigate officers' misconduct; shareholder demand cites fraud, cover-up; possible illegal acts, misuse of consumer data, management competence questioned BusinessWire, Sunday, May 25, 1997 at 13:18 WASHINGTON--(BUSINESS WIRE)--May 25, 1997--The board of directors of Equifax, Inc. (NYSE:EFX) has received a formal shareholder demand asking for an independent investigation into questionable practices at the Atlanta credit reporting company. The demand was made by Equifax shareholder John Phillips, whose company, Aristotle Publishing, Inc. filed a lawsuit in December alleging fraud and improper sales of restricted voter registration data in violation of state privacy laws at the company's CDB/Infotek unit. A board investigation would come while efforts are underway to spin-off Equifax's insurance division, including the CDB unit. The demand asks the board: -- to determine why company officers failed to detect the sale of data for illegal purposes at the time CDB was acquired; -- to require officers to make full disclosure to shareholders and to government authorities who are reportedly investigating CDB's conduct; -- to identify for government authorities the company or companies that sold CDB the restricted data for unlawful uses; and -- to audit the use of all 2.5 billion of CDB's "public records" to insure that its data offerings are in compliance with all applicable laws, regulations and ethical standards. The letter states that the demand for an appropriate due diligence investigation that "should have been performed when CDB was acquired, cannot be deemed inappropriate." The demand also asks the board to order CDB to return to the respective states "all revenues derived by CDB from improper sales of voter data for unlawful purposes." Even if not required by law, says Phillips, not to do so places at risk Equifax's "substantial investment" in attempting to earn a reputation as an ethical company that respects individual privacy. In asking for independent and impartial investigators, the shareholder demand states: "there is obviously a high likelihood of conflict of interest if the investigation is performed by those who are defending Mr. Rozar's fraud in the litigation, or who otherwise may be involved in any of the conduct being investigated." Additional revelations and investigations may further prove troublesome for Equifax management, and in particular its CEO Daniel McGlaughlin. On April 30, at the company's annual shareholder meeting in Atlanta, Equifax executives, citing the advice of legal counsel, refused to answer questions about the scandal, and days later an attorney for Equifax, Michael de Janes, stated that McGlaughlin was not involved in "a cover-up." Equifax's problems stem from the acquisition last fall of 70% of the stock in a controversial southern California company, CDB/Infotek. News organizations that specialize in privacy, Privacy Times and The Privacy Journal, have reported that Rozar, a controversial former private investigator, had entered into a 1993 FTC consent decree over CDB's sale of data protected under the Fair Credit Reporting Act. In 1995, his firm was also caught selling Arizona voter records for prohibited purposes, and was the subject of criticism in last summer's widely-publicized flap over the improper sale of Social Security numbers. The lawsuit brought by Aristotle Publishing in DC Federal court alleges that Equifax subsidiary California Data Bureau (CDB) offered databases on millions of registered voters in states such as Georgia and California to skip tracers and bill collectors in violation of privacy laws. CDB advertising materials also document that the firm has sold non-listed telephone numbers obtained from magazine subscription lists. In response to the Aristotle lawsuit, Equifax quietly removed dossiers on millions of American voters from CDB's computers. Questions about management competence at the publicly-traded Equifax would arise if officers assert that they were ignorant of the unlawful data usage when Equifax reportedly paid CDB president Rick Rozar and others millions of dollars to acquire a controlling interest in his Santa Ana, California database company in 1996. The demand asks the board to determine whether the company could be exposed to fines or private lawsuits as a result of CDB's conduct. CONTACT: Aristotle Publishing John Phillips, 415/882-9924 Leah Wesolowski Private Investigator Adoption Search Specialist (leahwes@ACMEInform.com) ACME Information 164 Manningham Drive Madison, AL. 35758 (205)464-0506 TEMPORARY Office Hours: When I can! (Baby due 6/23!) (205)464-0230 fax 24 hours a day, 7 days a week. Check out our web site: http://www.acmeinform.com/ACMEInf.htm ************************************************************************** 7)From: "Betty G.O'Hearn" Subject: Dis-information on the Internet and Apology Yesterday, I forwarded some information about a hacked LAPD website. I know you all must have gotten a chuckle when you heard thru the grape vine it was a hoax. I was the victim of IW in the area of "dis-information." I checked out the links... they were there. The source was known to us and always solid. Still, it was a hoax. It does not feel good. I am glad that Winn Schwartau was in Luxembourg with NATO and won't hear about this till next week. There was also a recent report on the hacked site of a major movie "Lost World." Some things have come out of this. It makes us look a bit further... and wonder why? I am including three posts that give us background. "Lost World" turned out to be a publicity stunt. The movie grossed over a 100 million to date, and I suspect this stunt was not the brainchild of Steven Spielberg. First: "Declan McCullagh" Second:"Glen Lipka" Third: "Ira Machefsky" I would encourage you to give Ira Machefsky some feedback on the social psychology of these events. First: Date: Fri, 30 May 1997 08:07:02 -0700 (PDT) From: Declan McCullagh To: fight-censorship-announce@vorlon.mit.edu cc: risko@csl.sri.com, betty@infowar.com, Maria_Seminerio@zd.com, se7en@dis.org, glen@kokonet.com Subject: Media hacks, publicity stunts, and hardcore pornography Recently I forwarded information about two hacks: The Lost World and the LAPD. Now it turns out that both could be fakes, publicity stunts. The only thing that appears to have been "hacked" here has been the media. Now, this isn't the first time this happened. "Hackers" (the movie) did it, and did it better, two years ago: http://www.suck.com/daily/95/09/02/ I guess the moral of this story is don't trust any hacks that don't include swastikas, anti-government diatribes, or hardcore pornography... -Declan Second: Date: Thu, 29 May 1997 20:39:51 -0400 (EDT) From: "Glen Lipka" To: Multiple recipients of list Subject: The lost-world scam Just some thoughts on media-whoring. http://www.commadot.com/beta/index.htm Glen Lipka K O K O P E L L I http://www.kokonet.com Recently I forwarded information about two hacks: The Lost World and the LAPD. Now it turns out that both could be fakes, publicity stunts. The only thing that appears to have been "hacked" here has been the media. Now, this isn't the first time this happened. "Hackers" (the movie) did it, and did it better, two years ago: http://www.suck.com/daily/95/09/02/ I guess the moral of this story is don't trust any hacks that don't include swastikas, anti-government diatribes, or hardcore pornography... -Declan Date: Thu, 29 May 1997 20:39:51 -0400 (EDT) From: "Glen Lipka" To: Multiple recipients of list Subject: The lost-world scam Just some thoughts on media-whoring. http://www.commadot.com/beta/index.htm Glen Lipka K O K O P E L L I http://www.kokonet.com text at http://www.commadot.com/beta/index.htm "The lost-sense of journalism" Three: From: "Ira Machefsky" To: betty@infowar.com Date: Thu, 29 May 1997 16:45:17 -0500 Subject: Re: Los Angelas Police Dept. WWW Hacked Betty, As you've probably already read in C/Net, this story appears to be about a mysthical event that never occurred. In fact, did this message even originate from you and is it authentic. If it is authentic, I'm interested in the social psychology of how rumors like this spread eon the Internet. What was your source of the story? Did you check it out before you sent this off to your contact list? I think this is a relatively common on-line phenomenon, and I'm trying to explore its dynamics. Regards, Ira Betty O'Hearn Assistant to Mr. Winn Schwartau 813-518-0600 Voice 813-518-0602 FAX http://www.infowar.com http://www.info-sec.com ************************************************************************** 8)From: "W.Lively" Subject: Introduction I would like tke opportunity to introduce myself and company to the list. While lurking for some time I have really enjoy some of the posts. I have been an investigator for 4 years speciallizing in surveillance and investigating personel injury claims. Recently I formed Mainview Investigation Services. We are a full service private investigation firm, licensed and insured, serving all of Nova Scotia. I would like to invite your request for our brochure, in the event you may have an upcoming assignment or perhaps you work for a firm that may require assistance in this area, Iam sure we could work out a mutual arangement. Also, you could forward any information about your firms relvent for a possiable referal for your area. Only professionals please. Thank-You for your time, I will continue reading the list, keep up the good work. Wayde Mainview Investigation Services suite 100, unit 104, 1600 Bedford Hwy., Bedford, Nova Scotia, Canada. B4A 1E8 Bus: (902)- 864 -0220 Fax: (902)- 864 -3619 Cel: 499-7232 E-mail: mainview@istar.ca ************************************************************************** 9)From: Ben Meynell Subject: Re: Los Angelas Police Dept. WWW hacked |7)From: "Betty G.O'Hearn" |Subject: Los Angelas Police Dept. WWW Hacked | |The LAPD WWW site was hacked last evening. Check out the URL below for a |mirror of the hacker handiwork at: | |http://www.dis.org/se7en ( mirrored ) | |The LAPD WWW site is http://www.lapd.org | |Betty The LAPD homepage was *NOT* hacked...it was just a hoax...see http://www.news.com/News/Item/0,4,11070,00.html for more information... -- Ben Meynell Security http://www.webhosters.com ************************************************************************** 10)From: Brad Ediger Subject: Re: Magstripe cards Ben Norman- i need those 7,5bit codes 4 the magstripe cards. Thanx. ************************************************************************** 11)From: ProvRhode@aol.com Subject: Voice changer Hi all, I'm looking for a device that would change a male voice to a female when spoken through to someone over the phone.. ************************************************************************** 12)From: ProvRhode@aol.com Subject: Re: Kidney crimes I heard from a friend that the crime was dissiscussed on 60 minutes, which certainly gives it more creadibility.. ************************************************************************** 13)SpyKing@thecodex.com Subject: Interesting article SAN FRANCISCO (May 23, 1997 00:19 a.m. EDT) -- Federal agents arrested a 36-year-old man who allegedly stole information from the credit card accounts of 100,000 people by hacking into the database of an undisclosed major business, the FBI said. Carlos Felipe Salgado Jr., of Daly City, Calif., was arrested Wednesday as he was trying to sell information related to more than 100,000 accounts that contained names, card numbers and other personal information about the card holders, said FBI spokesman George Grotz. "We believe that he had access to at least 100,000 in terms of credit card numbers -- perhaps even more," Grotz said. "He was trying to sell it" to an undercover agent, Grotz said. "We had determined that he was in the market to sell this information, and we were able to contact him via the Internet and set up a meeting to discuss terms of the sale. ... Based on those negotiations, he was placed under arrest." Salgado was scheduled to be arraigned in federal court in San Francisco on at least one charge of unlawfully intruding into a computer network database for the purpose of theft and a separate charge of selling confidential credit card information via the Internet. If convicted of both charges, Salgado could face a maximum of 15 years in federal prison and a fine of up to $250,000 on each count, according to the FBI. Under federal law, Salgado could be charged with separate felony counts for information theft of each of the 100,000 accounts that were illegally obtained. But so far, Grotz said, authorities plan to file only one count. The investigation remains ongoing and more charges could be added later. The FBI still does not know how he allegedly obtained the information. Agents contacted Salgado on-line and "did some business with him," Grotz said. But investigators were unable to find out his identity until they set up the in-person meeting at the airport. "We believe that he has been hacking into various protected computers for at least five years," Grotz said. "We don't know the extent of the damage that he has done. He has gotten these credit card numbers via the Internet and he has tried to sell them via the Internet. ... But we still don't know the extent of his activities." Authorities said that the Salgado case does not appear to be linked to the recent theft of information on about 20,000 employees of Levi Strauss, when a hard drive was taken from the firm's San Francisco headquarters last month. Grotz said that after Salgado's arrest, agents were planning to search his residence and his personal computer for evidence related to the information theft. Agents did not have any information about Salgado's employment or where he developed his hacking skills, Grotz said. "The guy obviously has knowledge," he said. Grotz said federal agents have seen young males try to gain access to credit databases more as a lark, but this is believed to be one of the first cases where someone hacked into an encrypted business database expressly for the purpose of robbing for a profit. "We found out about it from some vigilant technicians doing routine maintenance" on an Internet service provider, Grotz said. That tip prompted an FBI probe on the Internet that led to Salgado on Wednesday, he said. ************************************************************************** Who are you? What's your specialty and/or interest? Let us know about your company... What would you like to see on the list? Post it. Let us know... Do you have something to contribute? We'd like to hear it... We want to know EVERYTHING and ANYTHING about eavesdropping, surveillance, countersurveillance & privacy related technology, etc... Remember: who, what, where, when, how & why... we want ALL the details... Do you have a question? Post it... A little free time? Help a member... With the INCREDIBLE brain power on this list, someone should have the answer ;-) P.S. Don't be a LURKER... Members take the time to post info for us all... give something back... Don't just take... Your input/knowledge is valued... ************************************************************************** Send Postings to: spyking@con2.com with "Post" in subject field with subject ************************************************************************** Subscribe to: spyking@con2.com In the subject field type: subscribe-surveillance list e-mail address ************************************************************************** Unsubscribe to: spyking@con2.com In the subject field type: unsubscribe-surveillance list e-mail address ************************************************************************** ...The Simple Rules of the Surveillance List... The Surveillance List Owners may Reject any posts that are/contain: 1) Info Unrelated to Eavesdropping, Surveillance or Privacy technology... 2) Flames or Negative posts... 3) E-Signatures that are considered excessive... 4) Advertisements not DIRECTLY related to the list topics... 5) Attached Files... 6) Oversized Posts... (May be edited to save room) **************************************************************************** This publication is copyrighted and is protected by U.S. and International copyright law. The information transmitted on this list may not be reproduced, reposted or forwarded to any non-list member without expressed written permission of the List Owner. Violation of U.S. copyright law is a criminal and civil offense... **************************************************************************** The Surveillance List is Moderated by SpyKing@thecodex.com The List Owner will make EVERY effort to protect subscribers from spam... Copyright 1996, 1997 Codex Publishing Inc., All Rights Reserved... ****************************************************************************