****************************************************************************** The Official Newsletter of W.A.S.P. The World Association of Surveillance Professionals http://www.thecodex.com/wasp.html ****************************************************************************** Vol.Two Issue #209 The Surveillance List Oct.1,1997 Over 3000+ Members Worldwide Representing 53 different countries List Chat at: http://www.thecodex.com/chat.html ****************************************************************************** While we STILL feel there is NO SUCH THING as a stupid question... We suggest the newer list members AND the technically challenged browse through the FAQ before posting a question... Surveillance List Pseudo FAQ at: http://www.thecodex.com/faq.html P.S. If you have something to add to the FAQ, let us know... ****************************************************************************** IN THIS ISSUE... ****************************************************************************** 01) AOL Account Information 02) Intelligence Incorporated 03) Re: Poor Boy's Vehicle tracking Device and Cement Trucks 04) FM pulsed transmitter/FM direction finder receiver 05) Need Help Locating Someone 06) Sting operation 07) A few reminders 08) Re: Drive by kidnappings 09) Second Vehicle Battery Installation 10) Re: Drive-by kidnappings 11) Camcorder battery problems & inverters 12) FL & NY; PI INFO! 13) CNN's REPLY to GPS STORY! 14) Researching IDs 15) Case scenario ****************************************************************************** DON'T BE A LURKER.... GET INVOLVED... YOU ARE A MEMBER... MAKE THE MOST OF IT ****************************************************************************** 1)From: trace@onramp.net Subject: AOL Account Information Recently lost a contact. If anyone has a source to obtain BILLING ADDRESS INFORMATION on an AOL account please contact me. Again, I need the actual billing account info, not the info available in the aol subscriber guide. Thanks. -- Trace Carpenter Investigations ****** 2926 Maple Ave., Ste. 200 Ignorace of the law is no excuse; Dallas, Texas 75201 Ignorance of the law-makers apparently 214.828.4520 is. 214.740-0112 Facsimile ****** ************************************************************************** 2)From: Andrew Teoh Subject: Intelligence Incorporated Does any body know if the company Intelligence Incorporated is still in operation and whether they are contactable over the Net by email? Thank you. Regards, Andrew andrewte@pacific.net.sg ************************************************************************** 3)From: "KcW" Subject: Re: Poor Boy's Vehicle tracking Device and Cement Trucks I just gotta ask, why and how often do you find yourself following cement trucks, full or otherwise? KcW ************************************************************************** 4)From: tzechingyeoh@cctr.umkc.edu Subject: FM pulsed transmitter/FM direction finder receiver hi, i'm new to this mailing list. i was doing some research on radio direction finding and i stumbled onto this mailing list. i'm trying to build a FM pulsed transmitter and a FM direction finder/receiver pair, i haven't had much experience with wireless device, though currently i'm doing a communications course, i'll probably be taking antenna theory next semester. BTW, i'm an EE senior at UMC. anyway, i was wondering how i could get started to build a "fox-box" to use as a beacon, and the corresponding direction finder. ************************************************************************** 5)From: Matt Walker Subject: Need Help Locating Someone I need help locating someone. Have limited information, but I think it could be done. Email me at mailto:mattw@mail.com for more info. ************************************************************************** 6)From: SpyKing@thecodex.com Subject: Sting operation Found this at news.com and thought it of interest. The dark side of computing... Child porn sting snags suspects By Janet Kornblum Federal and state authorities have nabbed more than 120 people suspected of sending child pornography over the Net, according to the New York state attorney general's office. Authorities have also identified more than 1,500 people worldwide who are suspected of the same crime. The ongoing probe, conducted by New York state attorney general Dennis Vacco's office along with U.S. Customs officials and local authorities, already has resulted in 31 convictions nationwide, according to Vacco. Dubbed Operation Rip Cord, authorities conducting the 18-month sting found the alleged child pornographers by posing as trading partners online. America Online (AOL) assisted investigators in their pursuit. Child pornography has long been one of the Internet's hot buttons. Supporters of the Communications Decency Act had used the issue to try to rally support to their cause. But even die-hard cyberlibertarians have supported efforts to arrest and convict those who would use the relative anonymity of the Net to trade in child porn. They have argued that child pornography is already banned and illegal in the United States and many countries, so no special laws are needed to control it on the Net. The Federal Bureau of Investigation has an ongoing probe of child pornographers on the Internet, dubbed "Innocent Images." That probe is separate from Operation Rip Cord, according to FBI Special Agent Larry Foust, who applauded the efforts of New York and Customs officials. "We still have done nothing but scratch the surface," he said. "We need all the help we can get. I think anonymity is certainly something that pedophiles strive for and the Internet can do just that. They can remain anonymous and penetrate the sanctity of anyone's home." Those referred to prosecutors in the New York-based sting include a school administrator, a school janitor using a stolen computer identity, a college student training to become a kindergarten teacher, a pizza deliverer, and a used car salesman. Some have already pleaded guilty. The probe also lead to a Swiss couple who were arrested in Buffalo, New York, last month and accused of "masterminding an international child pornography manufacturing and distribution ring," according to the state attorney general's office. The investigation was launched in 1996 by a team of former squad detectives in the Buffalo office eventually expanded to include Customs officials, who had launched a similar probe. As a result of the probe, investigators have amassed over 200,000 child porn images and seized over $137,000 in computer equipment. ************************************************************************** 7)From: SpyKing@thecodex.com Subject: A few reminders When posting to the list PLEASE put "Post" in the subject line along with your article title... It is time consuming to read posts without titles and have to put a title on them... When responding to posts you need not repost the entire previous article just the relevant part in quotes... It makes the reading much easier... Remember we are interested in ANYTHING to do with surveillance & privacy issues... If you find something somewhere let the list know about it... ************************************************************************** 8)From: "John " Subject: Re: Drive by kidnappings Visit our page at : http:www.qpage.com/host/pba.shtml or e-mail us at: xsas@msn.com For details of our Bodyguard Training Manual which covers in-depth the subject of physical counter surveillance. Better still attend one of our courses and not only will you learn how to recognise when you are under surveillance, we will show you how to turn the tables on THEM ! Until then, watch your back! XSAS ************************************************************************** 9)From: "Donald J. Zaroda" Subject: Second Vehicle Battery Installation M. J., Exactly how did your friend hook up that second battery in his van? I want to do that in my 1984 Olds Custom Cruiser station wagon (surveilance vehicle) so I can run my camcorder and a ceramic heater. Local mechanics give conflicting opinions, worry about oertaxing the alternator, etc. So, what's the scoop? >14)From: "M. J. Van Ham" >Subject: Re: Power inverters > >badcoffe wrote: >> Power inverters facinate me. Can you sucessfully hook up VCR's, TV's..ect >> without real complications if the rating is correct? > >You sure can. A friend of mine has an old GMC van that he has converted to >be a travel home (kinda like a motor home only smaller.. ). Anyways, he >has run T.V. and VCR of an inverter. > >The only thing you have to watch for is that you don't kill your battery. >Having a T.V. and VCR on will eat juice a lot faster than normal vehicle >use. This friend actually installed a second battery solely for this >purpose.. that way he never kills the important battery.. Donald J. Zaroda Surveillance Video for the Insurance Claims Function ************************************************************************** 10)From: "Borracho" Subject: Re: Drive-by kidnappings My question is: Is there any device I could use in order to counteract or prevent such an event from happening to me? Yes. It's called a gun. ************************************************************************** 11)From: "hormone derange" Subject: Camcorder battery problems & inverters Inverters will run any device that does not draw more than the rated output of the inverter--with the caveat that the cheaper inverters produce a less than perfect sine wave, this may create significant noise on sensitive electronic devices. Also, for extended use you'll need a second battery in your vehicle, or you may find yourself without enough juice to crank the engine which could be a severe bummer in certain circumstances. It is mighty nice to have 110V AC capability in a vehicle, I like to crank up the old electric guitar and just ignore the funny noises in the amp while I serenade the bullfrogs. Josef ************************************************************************** 12)From: "Shadow Chasers" Subject: FL & NY; PI INFO! KENOBI>> wants to know where to obtain the licensing requirements to become a PI in both FL & NY, the below URL represents the Division Of Licensing (DOL) for the the two states! FL's DOL sight, is very informative and you can even request the necessary Class 'C'(PI), 'CC' (PI INTERN) & A (AGENCY) license applications online and the officials there are very quick to respond. FL's DOL URL: http://www.dos.state.fl.us/dol/index.html NY's DOL URL: http://www.dos.state.ny.us/lcns/licensing.html ************************************************************************** 13)From: "Shadow Chasers" Subject: CNN's REPLY to GPS STORY! If an SL member wants to go through the hassle of trying to obtain the GPS newstory, I mentioned in earlier post's (GPS TRACKING) here's CNN's reply: "Thank you for contacting CNN Interactive. Transcripts of CNN programs are available on our web site at http://cnn.com/TRANSCRIPTS for 10 days from the time the program aired on CNN. After that, you may obtain a transcript and/or video of a CNN program or segment from any of the following sources: For online CNN transcripts via subscription, contact LEXIS-NEXIS 1-800-543-6862 (Lexis) or 1-800-346-9759 (Nexis) or visit their web site at http://www.lexis-nexis.com. For a video tape or transcript of CNN programs that aired after October 1996, contact FEDERAL DOCUMENT CLEARINGHOUSE, INC. at 1-800-CNN-NEWS or 313-416-8201. You may write them at 1100 Mercantile Lane, Landover, Maryland 20785. Transcripts from CNN Headline News are available through VMS at (212) 564-2887. CNN's Viewer Source and Image Source provides stock video footage and licensing for commercial use of CNN footage. You may contact them at 404-827-1335. Thank you for watching CNN and for visiting CNN Interactive's Web site." My next step is to create some social engineering by wrting the SEC MGR at ROLEX HQ, Biel/Bienne in Switzerland! Will keep SL posted!!!!!!!!! ************************************************************************** 14)From: mguerra Subject: Researching IDs How do the sites on the Web that offer skip trace and other research on people access the info? I have visted several that for a fee will obtain SS#, bank accounts, credit history, criminal/civil judgements...If this is publ;ic domain, it must be available to anyone willing to do the leg work. Anyone know where to point me to find out address and military record of someone I have a SS# for? Anyone know where these services get the info? ************************************************************************** 15)From: boersema@mail.gte.net (President William Jefferson Clinton) Subject: Re: Case scenario >On 8/14/97 at 4:30 a.m., truck travelling eastbound on I80 near Clarion, >Pennsylvania dropped a steel block on the road and continued on, apparently >unknowing. > >The block weighs about 2000 pounds and is 18"x12"x45" and has six 4" holes >along one side. A metallurgist surmises that the block was made to hold a >blade which planes steel. In fact, it looks like a large razor, without the >blade. It has no serial numbers on it. The block appears to be used. >However, it also appears to be in usuable shape and the metalurgist >estimates that it may be worth approximately $8,000. We have posted photos >of it on our website at: > >http://www.paragon-pi.com/case_scenario.html > >We are currently holding the block and I am trying to detemine ownership of >it. Any help would be greatly appreciated, and a reward is being offered >for information that leads to the positive identification of the owner. >Please contact: > >Ralph Bergin >Paragon Investigations, Inc. >Phone: 800-767-1964 >Email: pi@paragon-pi.com >http://www.paragon-pi.com I'm no expert but this looks a little like an upper or lower jaw for a small brake press. Granted there are some minor differences but that looks way to close for coincidence. Scott Boersema ************************************************************************** Who are you? What's your specialty and/or interest? Let us know about your company... What would you like to see on the list? Post it. Let us know... Do you have something to contribute? We'd like to hear it... We want to know EVERYTHING and ANYTHING about eavesdropping, surveillance, countersurveillance & privacy related technology, etc... Remember: who, what, where, when, how & why... we want ALL the details... Do you have a question? Post it... A little free time? Help a member... With the INCREDIBLE brain power on this list, someone should have the answer ;-) P.S. Don't be a LURKER... Members take the time to post info for us all... give something back... Don't just take... Your input/knowledge is valued... ************************************************************************** Send Postings to: spyking@con2.com with "Post" in subject field with subject ************************************************************************** Subscribe to: spyking@con2.com In the subject field type: subscribe-surveillance list e-mail address ************************************************************************** Unsubscribe to: spyking@con2.com In the subject field type: unsubscribe-surveillance list e-mail address ************************************************************************** ...The Simple Rules of the Surveillance List... The Surveillance List Owners may Reject any posts that are/contain: 1) Info Unrelated to Eavesdropping, Surveillance or Privacy technology... 2) Flames or Negative posts... 3) E-Signatures that are considered excessive... 4) Advertisements not DIRECTLY related to the list topics... 5) Attached Files... 6) Oversized Posts... (May be edited to save room) **************************************************************************** This publication is copyrighted and is protected by U.S. and International copyright law. The information transmitted on this list may not be reproduced, reposted or forwarded to any non-list member without expressed written permission of the List Owner. Violation of U.S. copyright law is a criminal and civil offense... **************************************************************************** The Surveillance List is Moderated by SpyKing@thecodex.com The List Owner will make EVERY effort to protect subscribers from spam... Copyright 1996, 1997 Codex Publishing Inc., All Rights Reserved... **************************************************************************** ****************************************************************************** The Official Newsletter of W.A.S.P. The World Association of Surveillance Professionals http://www.thecodex.com/wasp.html ****************************************************************************** Vol.Two Issue #210 The Surveillance List Oct.2,1997 Over 3000+ Members Worldwide Representing 53 different countries List Chat at: http://www.thecodex.com/chat.html ****************************************************************************** While we STILL feel there is NO SUCH THING as a stupid question... We suggest the newer list members AND the technically challenged browse through the FAQ before posting a question... Surveillance List Pseudo FAQ at: http://www.thecodex.com/faq.html P.S. If you have something to add to the FAQ, let us know... ****************************************************************************** IN THIS ISSUE... ****************************************************************************** 01) Night vision Scope Repair? 02) Re: FBI wants to ban the Bible ... 03) Re: Poor Boy's Vehicle tracking Device and Cement Trucks 04) Re: FM pulsed transmitter/FM direction finder receiver 05) Re: Subject: Drive-by kidnappings 06) A Little Humor 07) Re: password stealer 08) How 'bout those tax dollars? 09) 1 long ring? 10) Remotely Counting Money? 11) Electronic Plans Wanted 12) Re: Silicon Toad - where'd ya go? 13) BADCOFFEE OleRPC ****************************************************************************** DON'T BE A LURKER.... GET INVOLVED... YOU ARE A MEMBER... MAKE THE MOST OF IT ****************************************************************************** 1)From: Tim Hall Subject: Night vision Scope Repair? I have a Baigish B7C night vision scope, (Russian, 2nd Gen, interchangeable lenses etc.) in need of repair. Nothing serious, the image intensifier is fine, but some wires worked themselves loose near the batter y enclosure, and I do not know exactly where they go. I have sent several email messages to companies all over the country that sell night vision equipment and I had not received one response, (great way to do business huh?). Anyone know of a company that repairs night vision equipment? Timothy Hall Surveillance Operations Manager Rick Johnson & Associates of Colorado, Inc. ************************************************************************** 2)From: "Daniel J. Theunissen" Subject: Re: FBI wants to ban the Bible ... Spread that net further, FBI. Any picture, even one posted on a public internet site, can be used to carry hidden messages. A fairly simple program could modify colors of individual pixels in a picture file so that the picture looks the same to the human eye, but conveys one or more messages. This creates a nice two part code without need for encryption. So, when the picture of the cat Mr. Big at Al's Kitty-Cat Page gets replaced on a specific date and changed back the next day, nobody notices ... except the three regular net-surfing operatives who receive three different messages. It's the ultimate drop-box, available world-wide. As an alternative scenario, Al e-mails Mr. Big's picture to three "friends" who have the original picture and the correct software to de-code it. I know of no such encoding product, but if it doesn't already exist, I would be surprised. Unfortunately, codes are insufficient for electronic trade. Encryption is not needed for covert, secure communications between individuals with simple technology available today. Codes work well enough to discount the anti-terrorism argument. So why the stonewalling on encryption? I suspect the heads of government agencies just fail to grasp the underlying technology completely. ************************************************************************** 3)From: Martin Pask <100142.3101@compuserve.com> Subject: Re: Poor Boy's Vehicle tracking Device and Cement Trucks All I will say to the above is that there is a lot of fraud in the construction industry.. Regards M.P.I. ************************************************************************** 4)From: "Walstrom, Bradley" Subject: Re: FM pulsed transmitter/FM direction finder receiver >4)From: tzechingyeoh@cctr.umkc.edu >Subject: FM pulsed transmitter/FM direction finder receiver Try BMG Engineering for the RDF http://members.aol.com/BmgEngInc/index.html check out SuperDF and Ramsey Electronics for Tracking Transmitter and RDF http://www.ramseyelectronics.com/ Check out FHT-1 SlyFox hunt Transmitter and DF-1 Foxhound Direction Finder You will need a radio receiver (like a scanner) to work with either of the above RDF units Brad Walstrom ************************************************************************** 5)From: BADCOFFEE@aol.com Subject: Re: Subject: Drive-by kidnappings >>>>Specially dealing with how to protect myself from being tailed. <<<< Carlos, Impossible. If someone want's you....there is very little you can do about it. Use common sence, use a bit more than the average person and you'll at least reduce your chances of being a target. Tips: It becomes second nature to "casually" (<-----word) be aware of your environment. Play each day......as if it's VIP training, without bringing attention to yourself. <---read again. Let's do some extreme here: Shades/sunglases- Never leave home without em. NOT to look cool.....but no one necessarily "sees" you looking at just about everything as they think you are looking at them. Anything reflective is used for your benifit. Car windows, store fronts windows, ect. Behind you....is where the action happens. Traveling: Operatives (or in this case stalkers) might be working in pairs or more. Close to impossible to detect. One will break away....and the other will follow. Single amatures: Check out the car TWO cars back. The one in your right side blind spot is another one to keep an eye one. (remember to keep your eyes on the road also) Biggest TIP: Please don't be foolish at ATM machines. LEAVE the card if something is not right. DONT wait for a peice of plastic to come back out.....before you run to saftey. THIS might be the single most important saftey tip you have ever heard as far as ATM security. LEAVE the card. Im sure someone else can take it from here....... Okay.........anyone that read this much is worthy of a good story: Last night, Fleetwood Mac concert. Tens of thousands in attendants. When I got into the arena my very FIRST thaughts were ..."Man....this place would be a terror to have to do surveillance on someone." <--No kidding This morning: Friend calls......"Whoa! Augie, who's the chick you were with at the show last night?!" Me: "Where the hell were you"? Him: "Row XXX, ACROSS the arena from you." Me: ?????????? Using his Billion power binoclears......he went section by section and found me in less than 2 minutes. He advised me that my zipper was open. Man......THAT is scarey. NO place is safe. :-) Augie ************************************************************************** 6)From: "Natalie Pratt" SUBJECT: A Little Humor Do not attempt to unscrew the suspicious-looking brass plate underneath the carpet in Room 1572 at the Metropole Hotel in search of microphones. It supports the main chandelier in the ballroom downstairs. (It did happen once. Honestly) Credit for this goes to: "Traveller's Tales" by Derek Davies, from the "Far Eastern Economic Review" dated September, 1989: Natalie Pratt, President Reliant Safety and Security reliant@execpc.com http://www.fightcrime.com PHONE: 414-231-7860 TOLLFREE: 800-414-1560 FAX: 414-232-0261 500 products online, if we don't have it we will find it! ************************************************************************** 7)From: BADCOFFEE@aol.com Subject: Re: password stealer >>Some questions I'd like to ask you: >>>- What *exactly* were you doing when you first noticed the item on the taskbar? When I was shutting down. Pressed alt+control+delete (just before shut down) >>>>- Had a program recently crashed or locked up? All the time locked up. Never full crash - Have you recently installed any new programs/updates? Whoa.....AOL updated me for some nonsence that I didnt pay attention to. Could that be it? Everything is fine right now. Nothing out of ordinary. Augie ************************************************************************** 8)From: gaugusti@hqgbcs.attmail.com (Grant Augustine x4058) Subject: How 'bout those tax dollars? Whales Return To Wellington And Explode In Oregon There have been welcome reports that whales are being seen regularly in Wellington Harbour after being hunted almost to extinction in the last century. The harbour, which was once a regular feeding spot for the great mammals, has only seen the occassional visits of killer whales as well as visits from larger cousins who are believed to be ill. It is hoped that when the almost inevitable beaching happens that we will have learnt from one lesson of history learnt in an obscure town in the state of Oregon in the USA. The event is documented in one of the most unusual items available on the Internet. As the author says. "I am absolutely not making this incident up; in fact, I have it all on videotape. The tape is from a local TV news show in Oregon which sent a reporter out to cover the removal of a 45-foot, eight-ton dead whale that washed up on the beach. The responsibility for getting rid of the carcass was placed on the Oregon State Highway Division, apparently on the theory that highways and whales are very similar in the sense of being large objects. "So, anyway, the highway engineers hit upon the plan--remember, I am not making this up--of blowing up the whale with dynamite. The thinking was that the whale would be blown into small pieces which would be eaten by seagulls, and that would be that. A textbook whale removal. "So they moved the spectators back up the beach, put a half-ton of dynamite next to the whale, and set it off. I probably am not guilty of understatement when I say that what follows, on the video tape, is the most wonderful event in the history of the universe. First you see the whale carcass disappear in a huge blast of smoke and flame. Then you hear the happy spectators shouting, "Yayy!" and "Whee!" Then, suddenly, the crowd's tone changes. You hear a new sound like "splud." You hear a woman's voice shouting, "Here come pieces of . . . MY GOD!" Something smears the camera lens. "Later, the reporter explains: "The humor of the entire situation suddenly gave way to a run for survival as huge chunks of whale blubber fell everywhere." One piece caved in the roof of a car parked more than a quarter of a mile away. Remaining on the beach were several whale segments the size of condominium units. There was no sign of the seagulls, which no doubt had permanently relocated to Brazil." The video can be downloaded from http://www.olivet.edu/~ajsmith/funny.stuff/whale.html Be warned this is a large file, but for those with an appreciation for humour touching on the dark side it is a must-see event. It is also a lesson for us all in not thinking through what appears to be a very good idea at first site. [News report from: New Zealand Newsroom Staff Reporter: Ian Llewellyn Date: Wednesday, 1 October 1997 ] ************************************************************************** 9)From: "Robert L. Young" Subject: 1 long ring? My friend said the other day he heard 1 Very long ring, then nothing.. What could this be? ************************************************************************** 10)From: FGM7516@aol.com Subject: Remotely Counting Money? Would appreciate any knowledgeable input from list members on the following. A lady swears that a male friend of hers was crossing the U.S.-Mexican border southbound, driving a truck to pick up some commercial material he had bought in Mexico. As he went through the U.S. checkpoint, Customs agents allegedly pulled him over, told him he was carrying $36,000 in illegal cash and arrested him. They took almost exactly that much cash from his person. He was carrying cash, she says, to handle the transaction quickly. As her story goes, the Border Patrol or Customs people or whomever, had a scanner of some unspecified type alongside the highway and about 20 or 30 feet from the truck. They could detect (and count!!) the cash in his pocket because their scanner picked up on the tiny thread in twenty-dollar bills -- yes, there is one running vertically in the left half of a twenty and with good eyesight you can read it. She says he finally convinced them he was legitimate and he was freed, but it took him months to get his cash returned because he had to prove it was legally his. My problem with the story is that -- if any government could do that, the government would have such a scan-able stripe inserted in everybody's driver's license and the state trooper would not even have to bother pulling you over, he/she would just read your ID etcetera, from their patrol car scanner. It sounds one hundred percent like an illegal search (not that it would ever bother the government), but I cannot figure out how they picked him up and knew exactly how much money he was carrying. Of course, there is *always* the chance that the whole story is bullshit, but I'm still intrigued because technology can really do a lot of things I never heard about. So just because *I* never heard of it, I don't want to dismiss it. There are some strange things out there. Anybody??? While I've got the platform, I want to say that since I've been on this list I have learned that my father was right: You can learn something new and useful every day, if you're not careful. ************************************************************************** 11)From: "John Doe" Subject: Electronic Plans Wanted I have a great interest in building electronic gizmo's/gadgets such as transmitters, tracking devices, RF devices etc. Every once in awhile you run onto one of these little gems on a web site or bbs. I know everyone on this list probubly has one or more of these schematics/plans somewhere. What I am interested in doing is compiling a list of these and providing them to members of this mailing list. Free of course, but if anyone has any of these please email them to me and when I get small collection compiled I will make it available to all members of the list. Also in the process of compilation everyone that sends me somthing will get a copy of every new thing I get AS I GET IT. Send all replies to : spookman@wirefire.com ************************************************************************** 12)From: Silicon Subject: Re: Silicon Toad - where'd ya go? >>>> This goes out to ST (or anyone who knows). What happened to your page? I haven't been able to access it in awhile. DNS can't resolve the address (www.silitoad.org). Is it just me, or did your site go down? <<<< Hey chief, Well, to make a short story boring, I had to remove the site due to extraneous reasons that only affected the server it was hosted on, and not my site directly. Meaning my site didn't go down because of content etc, but because I needed to find a new place to host it (I lost a T1 contract...gotta love AT&T). Either way, I took it down until I could find a new host, which I have, so it should be up in a few weeks...I need to finish redesigning it though, which could add +\- a month or three, who knows I'm aiming for a few weeks though...take it easy! Regards, Silicon /oO-----------------| beginshortsig |-----------------Oo\ [ T H E I N F I N I T Y V O I D ] http://www.silitoad.org | silicon@netwalk.com guest::9999:1:Joe Guest:/usr/guest:/usr/adm/guestlogin \oO-------------------| endshortsig |-------------------Oo/ ************************************************************************** 13)From: HARLE94230@aol.com Subject: BADCOFFEE OleRPC In list 207 BADCOFFEE Writes OleRPC It might be a (R)emote (P)rinter (C)onsole driver for a brother printer or some other type of printer Status Monitor Ver._ is installed in the memory. _ byte used. Copyright 1994 Brother Industries, Ltd. Bi-directional communications between the printer and computer is not valid. Only Hot-Key function is available. To start, Press _. Starting Remote Printer Console Please wait .... Insufficient memory and condition for Starting RPC. RPC is suspended Printer is Busy or communication error (may be Offline). Suspended installation of Status Monitor. Set printer ready and try again. ************************************************************************** Who are you? What's your specialty and/or interest? Let us know about your company... What would you like to see on the list? Post it. Let us know... Do you have something to contribute? We'd like to hear it... We want to know EVERYTHING and ANYTHING about eavesdropping, surveillance, countersurveillance & privacy related technology, etc... Remember: who, what, where, when, how & why... we want ALL the details... Do you have a question? Post it... A little free time? Help a member... With the INCREDIBLE brain power on this list, someone should have the answer ;-) P.S. Don't be a LURKER... Members take the time to post info for us all... give something back... Don't just take... Your input/knowledge is valued... ************************************************************************** Send Postings to: spyking@con2.com with "Post" in subject field with subject ************************************************************************** Subscribe to: spyking@con2.com In the subject field type: subscribe-surveillance list e-mail address ************************************************************************** Unsubscribe to: spyking@con2.com In the subject field type: unsubscribe-surveillance list e-mail address ************************************************************************** ...The Simple Rules of the Surveillance List... The Surveillance List Owners may Reject any posts that are/contain: 1) Info Unrelated to Eavesdropping, Surveillance or Privacy technology... 2) Flames or Negative posts... 3) E-Signatures that are considered excessive... 4) Advertisements not DIRECTLY related to the list topics... 5) Attached Files... 6) Oversized Posts... (May be edited to save room) **************************************************************************** This publication is copyrighted and is protected by U.S. and International copyright law. The information transmitted on this list may not be reproduced, reposted or forwarded to any non-list member without expressed written permission of the List Owner. Violation of U.S. copyright law is a criminal and civil offense... **************************************************************************** The Surveillance List is Moderated by SpyKing@thecodex.com The List Owner will make EVERY effort to protect subscribers from spam... Copyright 1996, 1997 Codex Publishing Inc., All Rights Reserved... **************************************************************************** ****************************************************************************** The Official Newsletter of W.A.S.P. The World Association of Surveillance Professionals http://www.thecodex.com/wasp.html ****************************************************************************** Vol.Two Issue #211 The Surveillance List Oct.3,1997 Over 3000+ Members Worldwide Representing 53 different countries List Chat at: http://www.thecodex.com/chat.html ****************************************************************************** While we STILL feel there is NO SUCH THING as a stupid question... We suggest the newer list members AND the technically challenged browse through the FAQ before posting a question... Surveillance List Pseudo FAQ at: http://www.thecodex.com/faq.html P.S. If you have something to add to the FAQ, let us know... ****************************************************************************** IN THIS ISSUE... ****************************************************************************** 01) Re: FBI wants to ban the Bible ... 02) Help - libel 03) Feedback requested - Millenium Now Conference 04) Re: Remotely Counting Money> 05) Re: Remotely Counting Money? 06) Computer Crime database 07) Re: Second battery 08) Besides batteries you'll need... 09) Stego 10) Re: truck driver at the border relieved of his cold hard cash 11) 3rd generation night vision 12) INFO NEEDED 13) Surveliance Cameras Info Needed 14) Video Surveillance To The Rescue! 15) Re: FBI wants to ban the Bible 16) Re: Remotely Counting Money? 17) Re: Electronic Plans Wanted 18) Re: Remotely Counting money 19) Code in Images ****************************************************************************** DON'T BE A LURKER.... GET INVOLVED... YOU ARE A MEMBER... MAKE THE MOST OF IT ****************************************************************************** 1)From: "George Martin" Subject: Re: FBI wants to ban the Bible ... >Spread that net further, FBI. Any picture, even one posted on a public >internet site, can be used to carry hidden messages. A fairly simple >program could modify colors of individual pixels in a picture file so that >the picture looks the same to the human eye, but conveys one or more >messages. This creates a nice two part code without need for encryption. This technology already exists. It's known as steganography...the art of hiding signals inside other signals. This basically comes down to using unnecessary bits in an innocent file to store your sensitive data. The techniques used make it impossible to detect that there is anything inside the innocent file, but the intended recipient can obtain the hidden data.This way, you not only hide the message itself, but also the fact that you are sending this message. Even though the file is hidden inside something else, it may still be possible to recover it from that file by someone else -- especially if you are using public domain, shareware or commercial programs. In such a case, you should encrypt the data first. This makes it a lot harder for this other party to determine whether they have really extracted the file you put in the image. Here are some sites where you can get both information and programs: Steganography Info and Archive http://members.iquest.net/~mrmil/stego.html Steganography homepage: http://www.iquest.net/~mrmil/stego.html Steganography paper (By Neil F.Johnson): http://adams.patriot.net/~johnson/html/neil/stegdoc/stegdoc.html A more extensive introduction to steganography, the principles behind it and how it can be used. >So, when the picture of the cat Mr. Big at Al's Kitty-Cat Page gets replaced >on a specific date and changed back the next day, nobody notices ... except >the three regular net-surfing operatives who receive three different >messages. It's the ultimate drop-box, available world-wide. I wouldn't be a bit suprised if that wasn't the case. >Encryption is not needed for covert, secure communications between >individuals with simple technology available today. Codes work well enough >to discount the anti-terrorism argument. There are basically two kinds of cryptography: cryptography that will stop your nosy spouse from reading your files, and cryptography that will stop major governments from reading your files. If I take a letter, lock it in a safe, and hide the safe somewhere in New York...and then tell you to read the letter, that's not security. That's obscurity. On the other hand, if I take a letter and lock it in a safe, and then give you the safe along with the design specifications of the safe and a hundred identical safes with combinations so that you and the world's best safecrackers can study the locking mechanism...and you still can't open the safe and read the letter...that's security. ************************************************************************** 2)From: Leah Wesolowski Subject: Help - libel Hello, Have any of you ever worked a case in which someone was attempting to prove libel, slander or defamation? If so, what was the type of investigatory work involved? Was it very time consuming? Did the case succeed? I need this information right away. Please reply to my e-mail leahwes@acmeinform.com. thanks, Leah ACME Information 164 Manningham Drive, Madison, AL. 35758 (205)464-0506 fax (205)464-0230 Adoption Search, Site Inspection Service, Surveillance, Workmans Comp., Collections, Background Checks, and Information Brokering our speciality! ************************************************************************** 3)From: Anonymous@tzogon.com Subject: Feedback requested - Millenium Now Conference To all list members: Our organization is currently planning a week-long conference for late 1998, to be located in a central-European city. Its name: "Millennium Now". This is the premise: A New World Order has arrived. To most, it is not yet apparent. It is irrelevant whether or not you believe, accept, or like it. It is here. It is going to change your life. For individuals, institutions, and nations, the choice is clear: adapt, or perish. The goal of such a conference will be to distribute information to our guests that will not only help them to adapt, but more importantly, thrive during this new era. Although it will be conducted discretely, the conference will be a "world-class" event. Presenting will be internationally-known writers, speakers, and business executives. Their specialties are in commerce, banking, personal and economic security, privacy, and computing. Attendees will number no more than two hundred. The conference fee will be substantial, but easily justified. (This is not a solicitation to prospective attendees. Based on early indications, we expect to have to refuse more interested parties than we will be able to accept.) Because this conference is in the early stages of development, we are seeking feedback from serious, seasoned professionals who may have an interest in becoming involved. Do you feel you, or your organization can offer relevant skills, services, products, and/or ideas? Are you are excited by the prospect of contributing to the success of such an event? If so, we request a written correspondence from you via email: KingSolomon@Mindless.com We will try to respond to all relevant inquiries as soon as possible. Please include pertinent background information, professional experience, and notable achievements. All responses will be kept confidential. Please use PGP, if possible. Our public key can be found at: http://pgp5.ai.mit.edu:11371/pks/lookup?op=get&search=0x98C28166 Thank you for the opportunity to utilize your discussion forum for this announcement. Sincerely, KingSolomon@Mindless.com -- This mail was generated by an anonymous World Wide Web e-mailer. Please do not reply to this message, as it CANNOT be routed back to the original sender. We do not keep track of any messages sent by this server so don't even bother asking. This message was brought to you by TZOGON Enterprises Incorporated . ************************************************************************** 4)From: JaneTheSpy@aol.com Subject: Re: Remotely Counting Money? "My problem with the story is that -- if any government could do that, the government would have such a scan-able stripe inserted in everybody's driver's license and the state trooper would not even have to bother pulling you over, he/she would just read your ID etcetera, from their patrol car scanner. " In North Carolina, they *do* have a scannable stripe in the Driver's license, much larger than the one inside our currency. They still pull people over, of course, because if you have more than one licensed driver in an automobile, then the cops have to find out which one was actually driving, but my understanding is that this scannable stripe gives the officer access to a person's criminal information, etc. once they have pulled you over. I'm sure this technology will be coming soon to a state near you. ~Jane ************************************************************************** 5)From: Jennifer Kollert Subject: Re: Remotely Counting Money? Would appreciate any knowledgeable input from list members on the following. A lady swears that a male friend of hers was crossing the U.S.-Mexican border southbound, driving a truck to pick up some commercial material he had bought in Mexico. As he went through the U.S. checkpoint, Customs agents allegedly pulled him over, told him he was carrying $36,000 in illegal cash and arrested him. They took almost exactly that much cash from his person. He was carrying cash, she says, to handle the transaction quickly. She is telling the truth. You were correct in the assumption about the strips that are inside all money. (Except $1, $5 and $10's) There is a detection method which is becoming increasingly popular amongst 'big brother' for being able to automatically calculate the amount of cash carried on someones person or their belongings. When passing through a metal detector, (courthouses, airports etc.) If you think about it, the person standing at the other side of the metal detector always looks up when you pass through it. Of course the metal detector makes a loud "BEEP" when you pass through it, so unless the person is deaf, there is no real need to look up, unless, you walk through it, then stand there, turn around, and just watch for a few minutes. You will notice an LED display towards the top of the frame. It reads out the amount of cash on a person when they pass through it. Also, I believe that the ? million dollar police helicopter in the city where I live, has a special device which allows them to detect large amounts of cash when used. I recall reading something about it in the paper a while back. (They may have been talking about it, but you know how these things are never well publicized) I once took all of the strips out of a large amount of cash, and my friend ate them. Just because we were curious, we went down to the airport, and he walked through the metal detector, and sure enough. He was detained for a number of hours, body cavity searched and all. It was kinda funny. Even though it's (i think) against the law, defacing federal property? If anyone out there can tell me, how on gods good earth, the strips got into the bills that are dated pre-1992 or pre-1994 I would like to know. Because they didn't start putting the strips in until 1992 (or 1994), I think it was 1994 anyway. ************************************************************************** 6)From: Cyn Subject: Computer Crime database Hello I've added a URL database to my computer crime resources site. This database carries approximately 3000 Computer crime and Internet Security related URLS. If you find lapses in data please let me know. I did not validated each and every link. Each month I hope to cover a specific area in Computer and Internet security, and develop a clean set of links following that topic. Suggestions are always welcome. :) **Computer Crime Resource** http://virtuallibrarian.com/CompCrimeRef.html Terms used to create the database. http://virtuallibrarian.com/legal/dbterms.html I hope this helps, please contact me directly if you have any questions or comments. Regards, Cyn ************************************************************************** 7)From: "M. J. Van Ham" Subject: Re: Second battery Donald J. Zaroda wrote: > vehicle) so I can run my camcorder and a ceramic heater. Local mechanics > give conflicting opinions, worry about oertaxing the alternator, etc. So, I talked to my friend. According to him, your local mechanics are absolutely right. A lot of stress goes on his alternator, and as a result, he's replaced it about every three years (each time with a new, high quality one). He also said something about putting in a switch for the second battery (which, btw, was a special utility battery, not just a normal car battery), so that it only charged when it had no juice in it (i.e., he would wear it out, and then flip the switch so it would charge up again). As well, he says that everything he has running off the second battery is wired "directly to" the second battery. No routing through the first battery, or going through already existing wires. Now, I'm not much of a mechanic, so I don't really understand any of that (and I don't care to), but I've tried to repeat what he told me.. hope it helps ya. +++Moderator's Note+++ I've built several surveillance vans over the years and the trick is to use a heavy duty altenator with a battery isolator (Ford vans were always my favorite). This seperates the the vehicles operating system battery from the batteries being used in the rear of the van. It also charges the batteries in the rear as the engine runs... same as the vehicle battery (but isolates the vehicle battery from running down as a result of the surveillance equipment). We used to use two 350 amp hour deep cycle RV batteries... We also cut a slot in the bottom of vehicle to mount batteries OUTSIDE and UNDER the truck in constructed box. The batteries MUST be vented... Batteries are then run into TrippLite power invertor for conversion to AC. We then used power stips to distribute power thruout van. System works quite well. You can get all the parts you need at any RV dealer. SpyKing ************************************************************************** 8)From: SpyKing@thecodex.com Subject: Besides batteries you'll need... Further to the battery question here is a reprint of surveillance van info from an early edition of the SLF... >>>> 4)From: SpyKing@thecodex.com Subject: Re: Surveillance Vans >From Filmgroup1@aol.com >Subject: RE: SURVEILLANCE VAN CONTENTS >To list moderator and/or members, > >A while back there was an offer to detail essential contents of surveillance >vans. could someone please email a list of said items to me? > >Thanks, > >Daniel (filmgroup1@aol.com) The classic surveillance would contain most of these basic components... you can buy one of these babies for about $35-40K or make one yourself for less than half that price... if you're going to attempt to do it yourself, layout everything first and make sure it fits. Make sure you have enough juice to power up everything for approx 24 hours... Polyurethane insulation filled floors, ceiling and walls. Commercial grade carpeting on floor, walls and ceiling. Custom captains chairs. White and red (darkroom lights) interior lighting controlled from source and console. Cellular telephone installation. Custom rack mounting of your communications and video equipment. Heavy duty power system. Ideally 2-3 RV deep cycle batteries 300 amp hour each Battery isolators and chargers to be attached to main vehicle battery. Rear compartment engine starting. Rear engine gauge for volts, oil and temperature. Bulkhead separating front and rear compartments. Front to rear reversible, variable speed ventilation system. Rear bulkhead, disguised as storage racks. 12VDC refrigerator. (keeps the soda pop cold) ;-) Manual periscope. Electronic Videoscope. Time and date generators. Power invertor with 110V AC pure sine wave outlets. Master power switching for front and rear batteries. Rear engine kill switch (disallows starting from front). Individual circuit breakers for each circuit. Outside air exchanger (variable speed). Storage compartments and counter top layout. 4 microphone audio security system (One in each wheelwell). LP gas detector. Propane heating system. ABC fire extinguisher. Roof top mounted pipe rack for the concealment of antennas. Front/rear intercom system. Vehicle alarm system with remote pager and panic switches (wireless). Ice air conditioner package (if dry ice is used make sure the compartment is WELL vented to outside). Gauges for the monitoring of power consumption, battery status and 110V AC systems. Variety of B&W & color cameras, night scope, video switchers, audio & video recorders, commo equipment,etc. And MOST IMPORTANT... a "surveillance relief device" - portable chemical toilet ;-) with a few rolls of TP... with a GOOD exhaust fan... The list is endless and really depends on the types of surveillance you'll do...you can install just about anything in a normal size van but the most important thing is to keep everything at arms length when you're sitting at the rear console... <<<< ************************************************************************** 9)From: "William H. Geiger III" Subject: Stego -----BEGIN PGP SIGNED MESSAGE----- >2)From: "Daniel J. Theunissen" >Subject: Re: FBI wants to ban the Bible ... >Spread that net further, FBI. Any picture, even one posted on a public >internet site, can be used to carry hidden messages. A fairly simple >program could modify colors of individual pixels in a picture file so >that the picture looks the same to the human eye, but conveys one or more >messages. This creates a nice two part code without need for encryption. >So, when the picture of the cat Mr. Big at Al's Kitty-Cat Page gets >replaced on a specific date and changed back the next day, nobody notices >... except the three regular net-surfing operatives who receive three >different messages. It's the ultimate drop-box, available world-wide. >As an alternative scenario, Al e-mails Mr. Big's picture to three >"friends" who have the original picture and the correct software to >de-code it. >I know of no such encoding product, but if it doesn't already exist, I >would be surprised. Unfortunately, codes are insufficient for electronic >trade. >Encryption is not needed for covert, secure communications between >individuals with simple technology available today. Codes work well >enough to discount the anti-terrorism argument. >So why the stonewalling on encryption? I suspect the heads of government > agencies just fail to grasp the underlying technology completely. The process of hiding data in images is called Stego . Doing a search on this keyword will reveal several websites with software for doing this. You can also create covert channels in audio files and I have seen some text stego programs. - --------------------------------------------------------------- William H. Geiger III http://www.amaranth.com/~whgiii Geiger Consulting Cooking With Warp 4.0 Author of E-Secure - PGP Front End for MR/2 Ice PGP & MR/2 the only way for secure e-mail. OS/2 PGP 2.6.3a at: http://www.amaranth.com/~whgiii/pgpmr2.html - --------------------------------------------------------------- -----BEGIN PGP SIGNATURE----- Version: 2.6.3a Charset: cp850 Comment: Registered_User_E-Secure_v1.1b1_ES000000 iQCVAwUBNDO7wI9Co1n+aLhhAQElUAP/bXjhe5zHlbRsqD+UuR7fjCYbCWsUPFeq +JEIS9nmxr94ZB7Ln366vn7wPK+yxrLg3VEgP+JRAj3W4/tRq6IM+FsUAm7DUeE6 yfHhymxO62h/rtFh9wuN/Cm12Fu99T+SnGgMyXkX2JaMakmDQsBQ2fz2QlkFTQcR ajFgygESXog= =INak -----END PGP SIGNATURE----- +++Moderator's Note+++ Here is a GIANT hint... Steganography is the method I used to hide the message in the Codex secret message contect at: http://www.thecodex.com/cypher.html The program I used was s-tools... The password is on the Codex site in plain sight... come on list...I'm trying really hard to give away this free prize ;-) SpyKing ************************************************************************** 10)From: beb2029@iperbole.bologna.it (steppenwolf) Subject: Re: truck driver at the border relieved of his cold hard cash those newfangled little metal strips, which are called *security strips* (very loose translation) have been around in Italy and in Europe for years, decades. Italy has its frontier smack next to that of Switzerland...until a few years ago it was *illegal* to move cash between these two countries. Nevertheless everybody from the cleaning ladies to the widow of the Prime Minister Moro had (has) Swiss bank accounts, and the only ones who ended up in trouble were the ones who were "supposed" to (someone had a score to settle), but I never have heard of anyone being busted with the precise amount of loose change they had rolling around in their pockets. I called the Banca d'Italia who prints the banknotes to ask them about this urban legend... The lady at the bank said kind of device did not exist, which is kind of like asking a wolf asking a farmer when the chickens will be put back in the henhouse. just reporting in. A defending attorney was cross examining a coroner. The attorney asked, "Before you signed the death certificate had you taken the man's pulse?" ; "No", the coroner replied. The attorney then asked, "Did you listen for a heart beat"? The coroner said, "No". "Did you check for breathing?" , asked the attorney. Again the coroner replied, "No." The attorney asked, "So when you signed the death certificate you had not taken any steps to make sure the man was dead, had you? " The coroner, now tired of the brow beating said, "Well, let me put it this way. The man's brain was sitting in a jar on my desk, but for all I know he could be out there practicing law somewhere." ************************************************************************** 11)From: arsh@biruni.erum.com.pk (DIGI_USER) Subject: 3rd generation night vision Dear friends, I want to know wether 3rd generation night vision equipment can be exported from USA and UK or not? Regards Arshad Hussain ************************************************************************** 12)From: Matt Walker Subject: INFO NEEDED Does anyone have any contacts in the airline industry or a way or an idea to obtain a passenger manifest from a particular airline? Matt email me at: mailto:mattw@mail.com ************************************************************************** 13)From: Matt Walker Subject: Surveliance Cameras Info Needed I am in the process of opening up a convience store and a small resturaunt. I am looking for color security camera systems. They need to be inconsipicus , perferably the new pinhole type, that can be hidden. The system needs to be able to support 6-12 cameras (at least). Also, information on the latest security systems avaible will be greatly appreciated. Matt email me at: mailto: mattw@mail.com ************************************************************************** 14)From: FGM7516@aol.com Subject: Video Surveillance To The Rescue! AP-NY-10-02-97 0551EDT OXFORD, Mich. (AP) - If she had any panties left, they'd have been tied in a knot. Each week, another pair of underwear would wind up gone. So her husband set up a video camera - and, police say, caught a neighbor sneaking into the house and snatching another pair of bloomers. Police said they found 105 pairs of panties and other ladies' undergarments at the home of Charles Frederick Dupon. ``This blows your mind,'' the woman said in The Oakland Press. ``Out of 100 pairs of women's underpants, 90 were mine. He's been doing this for 16 years.'' Dupon, 52, is free on bail after being charged with home invasion. He could get up to 20 years in prison or a $5,000 fine if convicted. ************************************************************************** 15)From: LORDBC@hotmail.com Subject: Re: FBI wants to ban the Bible Now maybe I missed something and I'm making a real idiot of myself, but it sounded like you didn't know about stegonography. Which is where you replace color bits in a picture with actual data bits like text files and such. IT DOES EXIST. If you would like more info follow Spykings Links on stegonography. Hope that helps. ************************************************************************** 16)From: ALBrubaker@aol.com Subject: Re: Remotely Counting Money? There is a vertical strip in the bills about one inch in from the left side. It reads USA TWENTY or whatever. The strip can reportedly be removed, but no guarantees, of course, as to whether it will be accepted/rejected. In addition, I understand one of the fine lines around the photo is actually small printing. Your friend was right about the money scanner... ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Re: Drive-by Kidnappings > Specially dealing with how to protect myself from being tailed. Driving Tip: Making three right turns usually tells me a lot, as does switching lanes at the last minute (cautiously checking the traffic, of course =). ************************************************************************** 17)From: Wanderer88@aol.com Subject: Re: Electronic Plans Wanted Well, "spookman@wirefire.com", you dont exist, according to the mailer: wirefire is invalid or something, so i just sent the post to TheSurve, since maybe i could reach you there. I saw your post to the Surveillance List Forum, and thought maybe i could lend you a hand. Perhaps you've heard of "phreaks"? If so, then you know about how they make "boxes" to tap into phone lines, etc. More than half are obselete, but still very fun and intriguing to build. I have plans to every "box" ever thought up; my list is up to date and extremely accurate. (It ought to be; ive been working on accumulating and compiling all the documents i could find on circuitry, etc for months now) If youre interested, just hit the REPLY button and let me know what you would like. Also, i know of a few sites you might hit to whet your electronic taste buds... http://www.execulink.com/%7Ecake/circuits/ Electronic Circuits http://www.cyber-action.com/cable.html Cable TV Descrambler http://www.ee.washington.edu/eeca/ Electrical Engineering Circuits Archive http://www.web-span.com/pjohnson/schematics.htm **HUGE SITE** Electronic Schematics http://www.electronix.com/elexcorp/index.html Electronix (commercial site worth checking out) .....hope that helps. Have fun :) Sincerely wanderer88@aol.com M.P. ************************************************************************** 18)From: Robson Steve Subject: Re: Remotely Counting money >10)From: FGM7516@aol.com >Subject: Remotely Counting Money? >Would appreciate any knowledgeable input from list members on the >following. >Customs agents allegedly >pulled him over, told him he was carrying $36,000 in illegal cash and >arrested him. They took almost exactly that much cash from his person. >As her story goes, the Border Patrol or Customs people or whomever, had a >scanner of some unspecified type alongside the highway and about 20 or 30 >feet from the truck. They could detect (and count!!) the cash in his pocket >because their scanner picked up on the tiny thread in twenty-dollar bills -- >yes, there is one running vertically in the left half of a twenty and with >good eyesight you can read it. She says he finally convinced them he was >legitimate and he was freed, but it took him months to get his cash returned >because he had to prove it was legally his. Yes, the scanner theory is plausible (how do banks count large amounts of money?) but to do this on a moving truck is questionable. Never discount the fact that they may have been tipped off by a third party. Stephen.. PS If someone has solid evidence against my statement I would be interested to hear it. ************************************************************************** 19)From: POMal123@aol.com Subject: Code in Images <> In fact, just this technology does exist for the purpose of "marking" images for copyright purposes. Photos etc. licensed for reproduction and transmitted electronically are increasingly marked with subtle changes made to certain pixels that can be decoded to locate the copyright holder -- or can be checked by the copyright holder to ensure that the image is properly licensed. I read the article in the past two or three days, might have been the WS Journal. Anyone else see it? PGO'M. Wash. D.C. ************************************************************************** Who are you? What's your specialty and/or interest? Let us know about your company... What would you like to see on the list? Post it. Let us know... Do you have something to contribute? We'd like to hear it... We want to know EVERYTHING and ANYTHING about eavesdropping, surveillance, countersurveillance & privacy related technology, etc... Remember: who, what, where, when, how & why... we want ALL the details... Do you have a question? Post it... A little free time? Help a member... With the INCREDIBLE brain power on this list, someone should have the answer ;-) P.S. Don't be a LURKER... Members take the time to post info for us all... give something back... Don't just take... Your input/knowledge is valued... ************************************************************************** Send Postings to: spyking@con2.com with "Post" in subject field with subject ************************************************************************** Subscribe to: spyking@con2.com In the subject field type: subscribe-surveillance list e-mail address ************************************************************************** Unsubscribe to: spyking@con2.com In the subject field type: unsubscribe-surveillance list e-mail address ************************************************************************** ...The Simple Rules of the Surveillance List... The Surveillance List Owners may Reject any posts that are/contain: 1) Info Unrelated to Eavesdropping, Surveillance or Privacy technology... 2) Flames or Negative posts... 3) E-Signatures that are considered excessive... 4) Advertisements not DIRECTLY related to the list topics... 5) Attached Files... 6) Oversized Posts... (May be edited to save room) **************************************************************************** This publication is copyrighted and is protected by U.S. and International copyright law. The information transmitted on this list may not be reproduced, reposted or forwarded to any non-list member without expressed written permission of the List Owner. Violation of U.S. copyright law is a criminal and civil offense... **************************************************************************** The Surveillance List is Moderated by SpyKing@thecodex.com The List Owner will make EVERY effort to protect subscribers from spam... Copyright 1996, 1997 Codex Publishing Inc., All Rights Reserved... **************************************************************************** ****************************************************************************** The Official Newsletter of W.A.S.P. The World Association of Surveillance Professionals http://www.thecodex.com/wasp.html ****************************************************************************** Vol.Two Issue #212 The Surveillance List Oct.6,1997 Over 3000+ Members Worldwide Representing 53 different countries List Chat at: http://www.thecodex.com/chat.html ****************************************************************************** While we STILL feel there is NO SUCH THING as a stupid question... We suggest the newer list members AND the technically challenged browse through the FAQ before posting a question... Surveillance List Pseudo FAQ at: http://www.thecodex.com/faq.html P.S. If you have something to add to the FAQ, let us know... ****************************************************************************** IN THIS ISSUE... ****************************************************************************** 01) Re: Second battery 02) Re: Remotely Counting money 03) Re: REMOTE MONEY COUNTING 04) Codex secret message contest 05) Re: Strips in pre-1992 bills 06) E-Mail Correction 07) REVERSE DIRECTORY 08) Re: Pinhole Camera supplier 09) Camera system 10) Pervs on the payroll? 11) New Privacy Law in Michigan 12) Seeking NJ area and other related... 13) How the magnetic cards work in hotel room doors? 14) SURVEILLANCE VEHICLES! 15) Cost of training in Investigative work 16) New PGP "Everything the FBI ever dreamed of" 17) Obtaining license information 18) Re: remotely counting money 19) Caller ID 20) Jamming 21) Electric Lock Pick 22) Re: the magic little strip 23) The Kamikaze gadgets 24) Getting AOL Name ****************************************************************************** DON'T BE A LURKER.... GET INVOLVED... YOU ARE A MEMBER... MAKE THE MOST OF IT ****************************************************************************** 1)From: L J Strand Subject: Re: Second battery There is even a better choice when it comes to secondary batteries in a vehicle. It's the new "Varta Composite Battery". (1000 amp/h) It's the same size as a 60 amp/h battery, somewhat heavier. The battery does not contain any acid like ordinary batteries. The main component is to tight "spirals" instead. For those interested in more information re the composite battery, please contact Varta sales dept. It works in extremely low temperatures when other batteries would freeze. The battery has proven to work even after receiving 5 rounds of 7.62 NATO straight through it! Amazing.... Yours Sincerely; L J Strand INTERNATIONAL SECURITY AGENCY http://www.algonet.se/~ljsaisa ljsaisa@algonet.se Tel: Int+46 (0)8-645 22 82 (09.00am-05.00pm C.E.T.) Fax/Data: Int+46 (0)8-645 22 82 (24h) PoBox 167, S-162 12 Stockholm, Sweden ************************************************************************** 2)From: Greg_Smith@matrixresources.com Subject: Re: Remotely Counting money I am very suspicious about these claims of money counters at airports, courthouses, and other locations. This story sounds like one of those infamous "urban legends." While the technology probably does exist to remotely count money, I seriously doubt the goverment would implement something like that on such a wide scale without widespread media attention, and even then the uproar from the public would be so huge that I would be surprised if the government did not withdraw its plans to implement the technology. If anybody can point to any RELIABLE sources that confirm this, please do so (I am not referring to these anti-Federal Reserve, anti-government, anti-bank, anti-this&that people - show us a credible, reputable, mainstream source that can be confirmed). ************************************************************************** 3)From: Sandy Sandfort Subject: Re: REMOTE MONEY COUNTING A previous poster wrote in part: >As her story goes, the Border Patrol or Customs people or whomever, had a >scanner of some unspecified type alongside the highway and about 20 or 30 >feet from the truck. They could detect (and count!!) the cash in his pocket >because their scanner picked up on the tiny thread in twenty-dollar bills -- >yes, there is one running vertically in the left half of a twenty and with >good eyesight you can read it. To which Stephen replied: >Yes, the scanner theory is plausible (how do banks count large amounts >of money?) Uh, how about a money counting machine? I've run one. You put a stack of 20s, 50s or whatever, in the hopper and it quickly pulls them out of the stack and counts them as it restacks them at the bottom of the machine. As a check, you run the same stack through again to see if the count's the same. No voodoo magic "scanner" required. For the life of me, I can't figure out why people believe this silly urban legend. >but to do this on a moving truck is questionable. Never discount >the fact that they may have been tipped off by a third party. ...and then the cop-types spread disinformation about transmitter strips in the money. If anyone has any SCIENTIFIC evidence supporting this wild claim, I'd sure love to see it. S a n d y ************************************************************************** 4)From: "M. J. Van Ham" Subject: Codex secret message contest > Here is a GIANT hint... Steganography is the method I used to hide the > message in the Codex secret message contect at: bah.. I knew you used steganography for that a long time ago.. I even told everyone on the list. A useless hint (IMHO.. ). > The program I used was s-tools... This, however, is what I've been waiting for. There's just too many password/program combo's to even think about trying to find the message w/o knowing one or the other. Now that you've gone and told me the program you used, you can rest assured it's only a matter of time before I find the message (unless someone get's it before me.. ) ************************************************************************** 5)From: BADCOFFEE@aol.com Subject: Re: Strips in pre-1992 bills Jennifer: >>>>how on gods good earth, the strips got into the bills that are dated pre-1992 or pre-1994 I would like to know. Because they didn't start putting the strips in until 1992 (or 1994), I think it was 1994 anyway.<<<<<< Not to take up unnecessary space here but Jenn just brought up something VERY interesting...... I sorted through some hundreds and notices quite a few dated before 1992 (1990) with strips in them. Wasnt this strip a recent thing?? Could it be possible........(why??? who know's) that the government pushed out an equel amount of new bills to replace the old ones that didnt have a strip......and dating them the same year as the ones removed from service to keep the ballace of dates? (what?) (Augie....read that last sentence you just wrote..10 times untill you get it.) Something does not smell right. Ps- No...it really doesnt matter..but the insertion of strips it is a hell of a trick. Keep the information flowing on this thing. VERY fascinated. Augie +++Moderator's Note+++ I seem to remember an article somewhere by someone who claims that the strips can be removed intact by using a tweezers very carefully... The author also claimed that by taping a $20.00 strip onto a one dollar bill with $1.00 strip removed, it would fool change machines and result in user getting $20.00 worth of change for $1.00... if this is true lesser denominations would probably also work in a variety of vending machines... ************************************************************************** 6)From: "Spookman" Subject: E-Mail Correction Sorry for the mistake, I just switched to a different LOCAL provider, my corrected email address is : spookman@mail.wirefire.com ************************************************************************** 7)From: BADCOFFEE@aol.com Subject: REVERSE DIRECTORY Does anyone have a URL for a decent reverse directory site? (phone # to address) Thank you:-) Augie ************************************************************************** 8)From: BADCOFFEE@aol.com Subject: Re: Pinhole Camera supplier >>>>>preferably the new pinhole type, that >>>>can be hidden. The system needs to be able to support 6-12 cameras (at least). Also, information on the latest security systems avaible will be greatly appreciated. Matt<<<<<< Hi matt, I know a place to get a decent pin hole cam. TINY. You can put this thing just about anyplace......the price is right. I've seen them, I've played with them ....I'm impressed. Here is my secret supplier: Shhhhh! Spyking@con2.com <---------E-mail adress Now for mounting: This is a LOT of fun. Theese things are so tiny that you can literally put them just about anyplace. I ran a post once on my weekend project: I gutted a beeper and installed a mic in it by the audio vent. Ran the wire out the bottom and hooked it to a VOX mini casette. Same post, Frank commented on "You can also install a Codex board Cam in a beeper if you want to get creative". <------NICE THAT small. Mr Modurator: What the heck are the size on those things. 3X3 inches?? Other places to install board Cameras: Ive seen them in- Walkmans Tape measures Cash registers <------------Psst......MATT (hint) Vents Smoke Detectors: (Psst....Board cam costs like $175ish. A smoke detector costs about $20. $195 total costs. I just hit a site where I seen the same things for $395 PLUS dollars. Man...... BUILD it. Soooooo simple. $200 additional dollars for someone to drill ONE hole. Drill....glue.....Connect......DONE. In public places: I feel it is best to not have cams conceiled. Need that bit of a "I SEE you" element. I personally like the "wedge" shaped camera ports on the ceilings with the smoked glass face. (never know where that thing is looking) ...and it is not an eye sore. Matt: If you local (NJ, NY).....and you need a hand. I have experience in both ends of the game here. Building (I am) and what you seek in electronics. While Im there.....I'll toss around a few ideas on locks and entry points to secure. Can you return the favor by letting me bypass the locks and security system.....and grab a quick bite to eat from time to time?? :-) (kidding) Hope this helped Augie +++Moderator's Note+++ Size is 1" by 1" 8-12vdc powered with audio. Normal price is $150.00 but $95.00 each to lists members. ************************************************************************** 9)From: Jean-Pierre Forest Subject: Camera system Greetings, A good CCVE(Close Circuit Video Equipment) system can be Covert or Overt. First I would need more info as to what the camera is looking at, the lighting is critical when it comes to color camera(lighting conditions at subject and at camera, distance to subjectetc...). I use a lot of small pinhole cameras, the colors are great in good lighting ,but very poor at night. I would strongly recommend B&W cameras. Also the small board cameras can not be put thru a sequential switcher as you'll get an image rollover. You'll have to use a Video multiplexers which is a better way to go anyhow to record several cameras on one tape. Also will someone be monitoring these cameras, if so then a duplex multiplexer will allow you to use several combination of display ie. Quad, 3x3 4x4, sequence, etc...without affecting the way it is recorded. Recently Panasonic has just introduced the Super Dynamic DSP camera which gives it a dynamic range of 32X the range of conventional CCD cameras. This allows for example a camera pointing towards a bright background to see both object in the foreground and background(not to be confused by Back lite compensation which is innefective)(and no I don't work for Panasonic I'm a Consultant and was very impress with our field trials of the cameras) Other brand names such as COHUE are very good as far as resolution(470HLR) and dependability however may be pricey. Other brands such as Sanyo and Sony are also available in the lower end. I'll be glad to answer in more details you can e-mail me privately. I am located in Vancouver Canada(NTSC country) Blue Skies ************************************************************************** 10)From: SpyKing@thecodex.com Subject: Pervs on the payroll? Detective Says One In 4 Office Computers Have Porn FALLS CHURCH, VIRGINIA -- By Bill Pietrucha. Twenty-five percent of the computers used in offices across the United States contain some form of pornographic materials, including child pornography, according to a detective agency's recent study. The study was developed from data accumulated by Digital Detective Services Inc. (DDS), a Falls Church, Virginia, a computer forensics and high-tech private investigations firm, over eleven months and 150 individual investigations. The agency, formed in November 1996, specializes in investigating computer-based crimes and activities, and analyzing network and storage media content for private sector clients. "The results are not startling," Sudeep Bose, J.D., director of investigations for DDS, told Newsbytes. "Many small and medium size firms have no formal policies or standards on Internet use or materials transmitted online," the corporate computer policy development expert said. "Employees are left to police themselves and that does not work." Bose said DDS commonly finds persons using corporate networks to view illicit materials. "At best this is a waste of corporate resources," Bose said. "At worst, depending on the materials, it is a crime." Dan Bender, manager of operations at DDS, added that when the agency presents its findings to corporate officials, "they are usually shocked. An employee being investigated for releasing trade secrets turns out to be a collector of online pornography." "It really stirs up office politics," he said. Bose said the misuse of corporate networks has legal ramifications for both the employee and employer. "Employees with tainted materials on their computers are usually terminated immediately," Bose said. "Employers despise the possibility of exposure, and other issues which readily arise from these situations." DDS agents were quick to point out, however, that only a minority of office employees view questionable materials. But, they warn, many savvy computer users try to hide their activities from management. "Many employees try to delete files and clear caches when they suspect they are being investigated for anything," Amadali Arabshahi, director of information technology at DDS, said. Arabshahi noted, however, that "We have the technology to restore deleted files and view hidden or password protected data. The steps we take are standardized and will stand up in court under the most demanding cross-examinations." When asked if managers have the ability to block illicit sites on corporate computers and keep tabs on individual computers, Arabshahi said "of course." "There are both hardware and software products to block pornographic materials on corporate systems, and keep tabs on everything on the network, but the problem is managers are unaware they exist," he said. "We test these products regularly and some of them work well." Arabshahi told Newsbytes that DDS engineers currently are working with other companies to develop systems to block the access of questionable materials from corporate networks, as well as working on other systems to block the transmission of sensitive corporate materials from individual corporate computers. ************************************************************************** 11)From: FGM7516@aol.com Subject: New Privacy Law in Michigan AP-NY-10-03-97 1804EDT TRAVERSE CITY, Mich. (AP) - A new Michigan law, prompted by video images taken after a shipwreck, makes it a crime to take pictures of human remains at the bottom of the Great Lakes without permission of the next of kin. While little opposition was raised as the bill made its way through the Legislature, critics said this week that its effect might be broader than originally intended. ``Taken literally, it now outlaws (taking pictures of) disaster victims who cannot be recovered,'' said Ric Mixter, a producer with Midland-based video company Imageworks Ltd. Mixter was part of a private expedition team in 1994 that located a body near the shipwrecked Edmund Fitzgerald, an ore freighter that sank in a Lake Superior gale Nov. 10, 1975. All 29 crewmen died. Fred Shannon, a Mount Morris explorer who led the expedition, included brief images of the mostly decomposed remains in a video about the disaster released last year. The face was not visible. A group of Fitzgerald crewmen's relatives requested the legislation, accusing Shannon of insensitivity and exploiting the tragedy for commercial gain. The law, which took effect Wednesday, makes it a felony to take pictures of human remains on the bottom lands without written consent. The crime is punishable by a maximum 2 years in prison and a $5,000 fine. Exceptions are allowed for court orders or for law enforcement, archaeological, medical or scientific purposes. Mixter said the law was overly broad and could be interpreted as prohibiting the photographing or display of pictures of shipwreck victims, or victims of plane or car crashes. But state Rep. Pat Gagliardi, who sponsored the bill, dismissed speculation about broader applications of the law. ``It's pretty clear that we're talking about disasters that happened in the Great Lakes, in Michigan waters, and the use of film without the family's consent for commercial value,'' he said. ``It's very narrowly tailored.'' Dawn Phillips, general counsel for the Michigan Press Association, said she could not predict how broadly courts might read the law. But it does appear to create a new privacy right for relatives of the dead, she said. ``Up to now, we'd pretty much said invasion of privacy is a personal right and once you die it's gone,'' Phillips said. She also doubted the law would stand up in court. ``The Legislature is always on shaky ground when it tries to legislate good manners and good taste,'' she said. ************************************************************************** 12)From: BADCOFFEE@aol.com Subject: Seeking NJ area and other related... If you live in the NJ area and share the same EXTREME interest in this field, please contact me. Amatures welcome. See if we can do a weekly coffee/drink thing. Pick some locks....take some pixx....drink some coffee. Also: If anyone is seeing a contact in NJ. E-mail me and I shall give you my phone number. Also: Pro's in NJ: LOVE to do a ride along with you. Let me see you equipment, tecniques ect. TEACH me...without ever saying a word. Let me know if your on a basic surve gig and need company...or just need an additional set of eyes. Coffee's on me. Also: Perriscopes??????????? Where to find one? Camera attachment? Also: Plumbers use some kind of a fiber optic tube with cam to video inside pipes. Can this also be used for surveillance? Or..is there a light/focus Problem attached to such a device? Have to throw in ONE TIP: Get the DOGS OUT of the house BEFORE you make pre-text calls. TRUST me. I blew one right out of the water ONE millisecond before I could call it sucessfull. The things you don't think of..... :-) Thank you Roxxi and Nikko for assisting the PERFECT pre-text.......that "was" in the bag. ONE MORE question: I NEED telephone static. Yes...."static"...but no disconnect. Looking to create a "static" button on my phone to save my ass on those times when something went drastically wrong....and I have to call back. If you hang up....might as well call that lead dead. STATIC......is NICE. Any ideas?? Augie "These prezels are making me thrusty" ************************************************************************** 13)From: Mix Subject: How the magnetic cards work in hotel room doors? Does anyone on the list know exactly how the magnetic cards work in hotel room doors. They can reprogram the doors on demand from the hotel desk, but the doors do not have any wires that run to the front desk, and must be on a network of some kind (ie. each door has a uniquie address. They must be using radio waves to reprogram the doors, if so, you should be able to grab the signals and program you own cards to enter the different rooms. any information would be helpfull. Respond to the list, as I am using a remailer! Dale ************************************************************************** 14)From: "Shadow Chasers" Subject: SURVEILLANCE VEHICLES! For those members interested in a surveillance vehicle, other than a VAN, take a look at http://www.magicnet.net/~qzar He's got a fully loaded RX-7, just can't figure where he stuck the toliet (just kidding SpyKing) ************************************************************************** 15)From: Alistair Harding Subject: Cost of training in Investigative work Greetings all! I read all posts with much interest, and I have learn't quite a bit to date! I am taking steps to get an education in Surveillance and Investigation....finally! :-) I recently got quite a nice brochure from National Investigation & Research Training Centre (NIRTC) which is an Australian company (NSW - Sydney) All up their course runs for about a year, will cost about $2000 (aus) I was just wondering if anyone knew if this companyis ok, and whether that seems like an alright price? Regards, Al ************************************************************************** 16)From: Martin Minow Subject: New PGP "Everything the FBI ever dreamed of" An article in today's (Fri, Oct 3) New York Times (CyberTimes) describes the new release of "PGP for Business Security 5.5," which contains mechanisms that incorporate key recovery mechanism that can either be volontary or be enforced by using PGP's software for controlling a company's SMTP server -- the server can verify that all encrypted messages include the corporate public key (or conform to other corporate policies): "The new version also includes some of the most sophisticated techniques for enforcing this policy through the corporation. The most novel may be a new version of software controlling a company's SMTP server, the machine that acts as the central mailroom for a corporation. PGP provides a software agent that will read all of the mail to make sure that it complies with the corporate policy. This may include requiring all messages to be signed with digital signatures or include a backdoor that the management can use to read the message. If the software agent discovers a message violates the policy, it can either return it to sender or simply log a copy. "PGP implements the backdoor with a central key. Each message is encrypted with both the public key of the recipient and the public key of the management. The message can only be read by someone holding the corresponding private keys, in this case the recipient and the management. The software allows the management to use different master keys for different departments by customizing the software. ... "Bruce Schneier, an encryption expert and author of the popular book Applied Cryptography, said that the new announcement "sounds like everything the FBI ever dreamed of." He also predicts that criminals will find ways to circumvent the restrictions while honest people may be more vulnerable to illicit use of the master key." --- Coincidently, the same issue of the New York Times has an editorial attacking FBI director Louis Freeh's request that Congress "outlaw the manufacture and distribution of encryption programs the Government cannot instantly crack. Martin Minow minow@apple.com ************************************************************************** 17)From: Alan & Teresa Greatorex Subject: Obtaining license information This is a minor question to some of you...How do you obtain information regarding addresses of persons that have, for example, a fishing license? A friend mentioned that he was going to get a license of some type..;-) Anyway I'd like to know how to receive the information that must be avaliable in some local county office. What are the politics of obtaining information from the county or state? If addresses are not avaliable on a list or computer, then how would a PI go about obtaining a list of all people who are licensed? terri ************************************************************************** 18)From: Terry Johnson Subject: Re: remotely counting money Greetings In reference to remotely counting money a thoought came to mind. The information on the strip must be magnetically encoded. Wouldn't passing a degaussing magnet over it erase the data? Tj ************************************************************************** 19)From: BADCOFFEE@aol.com Subject: Caller ID I need to bypass this switchboard in my office so that I can connect a caller ID to my office phone. I can not tamper with the switchboard for it is co-op office suites. The incoming calls get routed through a switchboard and to individual suites via common receptionist. I need to keep the receptionist answering my phones, so I can't go (bypass) around her. Any ideas???? Augie ************************************************************************** 20)From: Bolo Jee Lee Subject: Jamming Would like some info on jamming loud stero at about 100 meters any have any plans anything to help on this project????? All help is better than none!!! ************************************************************************** 21)From: Andrew Teoh Subject: Electric Lock Pick I remembered seeing a smaller "pocket" version of the electric lock pick available in the market some time back. Does anyone know where they can be ordered from now? Thank you. Regards, Andrew Teoh andrewte@pacific.net.sg ************************************************************************** 22)From: W0LF Subject: Re: the magic little strip Its anyones guess the varied things the little strip may in fact be capable of.... a thing that is not at all surprising though, is the fact that it was first tested and used in Sweden. My belief is that it is probably passive recording device of sorts that is used specifically monitoring money and its circulation worldwide. I have no ready documentation to point at for a person to validate such a thing other than hearing about it many years ago on the discovery channel. The tracking of money and its complete travels as well as other money earned from it on a worldwide scale is considerably easier than one might imagine, and the fact that the cold war is over makes it easier as time goes on... However, where it concerns the story of the southbound traveler, there is virtually NO doubt in my mind that the authorities were tipped off by someone that he confided in! A machine of the sort you are speaking of in use today (in a mobile situation) would be no major secret as its cover would have surely been blown by the press andor others by now. Although I have no actual life experience to relate on the subject myself, I will relate that which I have been told by others with it.... and those that have BTDT will almost invariably express that 99.9% of all smuggling action that is busted is done via "tipoffs" (usually from one of the parties involved at the source of the contaband). Another thing here.... $36,000 is not money one carries easily in his pocket, and thats even if it all happens to be 100's. With the multitude of press via COP tabloids and a look in the dail newspaper classified section, ANYONE at all should surely realize by now that if you are carrying virtually ANY amount of cash in which the Govt. or any local faction thereof becomes aware of and interested in... YOU WILL BE DETAINED AND THE MONEY WILL BE CONFISCATED! Would be a most interesting survey to determine on a national level just what percentage of confiscated money has been returned to its owners by the Govt. because it was proven in fact to be money gained in a lawful manner.... And coming soon to a theatre near you..... FEDERAL charges will be brought against those who fail to prove their valid entitlement to moneys confiscated... the only thing that has prevented thus far is the "feeding frenzy" if you will of all the local constabulary in following the Federal Govts tactics on these matters. In plain English this simply means it isnt a cost-effective or profitable thing to do at this time. Probably because they dont wish to put a damper on the traffic of it... Well I have rambled enuff yall. Later gatorz :-) ************************************************************************** 23)From: BADCOFFEE@aol.com Subject: The Kamikaze gadgets This post is meant in the counter-surveillance text. If you don't know HOW it is done......you'll never know "how to protect yourself" from it happening to you...... OK...were covered legally....let the games begin!..... I am quickly realizing that the name of this game is sheer MONEY. Money makes complicated tasks.....simplified. The Kamikaze’s were feared solely because they were effective. They were effective because they were willing to LOOSE their equipment, including their men. Their success rate was astonishing because of this fact. Todays mission (lesson)...... Throw away gadgets in forms of give-aways: For as long as the need-for-greed is out there.......even the most SECURE of people will NOTpass on a free bee. (as long as it is covered correctly and don't look suspicious) (Bad's mind is getting warped) Whoa! Look what SONY sent me in the mail! A FREE alarm clock! WOW! Let me plug in my FREE alarm clock and enjoy my FREE alarm clock! <---------idiot. That FREE alarm clock is concealing a mini-board camera and a mic transmitting to a van parked out front. Have the $$? Send the signal through some type of relay and you have ?????? miles of transmission from the FREE alarm clock. Plugged in......runs infinitely with no batteries to ever replace. FREE just cost that particular idiot EVERYTHING in terms of security/information/privacy. Then there are those objects that like to move around the house and are kept close to ones side. Oh no! Not the dreaded "FREE" phone! Yes....the "dreaded" FREE phone. Nice phone. Redial, memory, nice cord, emergency number buttons......and .....well......the standard bug installed in the mouthpiece that is wired to the line itself that needs NO external source of power transmitting to the same as described above. Guys.... NOTHING is FREE. Again.....NOTHING is free. Repeat after me...one more time....NOTHING IS FREE. :-) Correction: If you get a freebie in the mail, count yourself lucky. Take that thing apart. You just got yourself a FREE listening/video device. :-) Note: Over the past year I did send a few list members some lock pick sets for free. Nope....they were true free-bee's. Nothing wrong with them. Just keep them high and about face level at all times. :-) <-------KIDDING! This post was a lot of fun writing, hope you enjoyed it. (spell checker is UP and running as you see) PS- Just something I wanted to say on a personal level- Quick words to security/law enforcement and EVERYONE here. NOTHING is worth your life. Be carefull out there. "I" need everyone back here each day to read this stuff I push out "exclusively" to this list. B carefull, be safe. Augie "Seeking local woman that can pick locks, do surveillance, TSCM, undercover, safe cracking ect.... The usual things woman like to do...." http://members.aol.com/BADCOFFEE/personal.html +++Moderator's Note+++ Speaking of Kamikazes... does anyone know... think about this before you answer... Why Japanese Kamikaze pilots wore crash helments? ************************************************************************** 24)From: chuck delo Subject: Getting AOL Name Can anyone tell me how I can get a persons address with just an E-mail name to go on? It is an AOL E-mail name. There is no profile or reference to the name in AOL. (That I know how to get) I'm trying to find out who a person is from just an e-mail name. All the search engines I looked up can tell me the e-mail address if you know the name, but not the other way around. Chuck ************************************************************************** Who are you? What's your specialty and/or interest? Let us know about your company... What would you like to see on the list? Post it. Let us know... Do you have something to contribute? We'd like to hear it... We want to know EVERYTHING and ANYTHING about eavesdropping, surveillance, countersurveillance & privacy related technology, etc... Remember: who, what, where, when, how & why... we want ALL the details... Do you have a question? Post it... A little free time? Help a member... With the INCREDIBLE brain power on this list, someone should have the answer ;-) P.S. Don't be a LURKER... Members take the time to post info for us all... give something back... Don't just take... Your input/knowledge is valued... ************************************************************************** Send Postings to: spyking@con2.com with "Post" in subject field with subject ************************************************************************** Subscribe to: spyking@con2.com In the subject field type: subscribe-surveillance list e-mail address ************************************************************************** Unsubscribe to: spyking@con2.com In the subject field type: unsubscribe-surveillance list e-mail address ************************************************************************** ...The Simple Rules of the Surveillance List... The Surveillance List Owners may Reject any posts that are/contain: 1) Info Unrelated to Eavesdropping, Surveillance or Privacy technology... 2) Flames or Negative posts... 3) E-Signatures that are considered excessive... 4) Advertisements not DIRECTLY related to the list topics... 5) Attached Files... 6) Oversized Posts... (May be edited to save room) **************************************************************************** This publication is copyrighted and is protected by U.S. and International copyright law. The information transmitted on this list may not be reproduced, reposted or forwarded to any non-list member without expressed written permission of the List Owner. Violation of U.S. copyright law is a criminal and civil offense... **************************************************************************** The Surveillance List is Moderated by SpyKing@thecodex.com The List Owner will make EVERY effort to protect subscribers from spam... Copyright 1996, 1997 Codex Publishing Inc., All Rights Reserved... **************************************************************************** ****************************************************************************** The Official Newsletter of W.A.S.P. The World Association of Surveillance Professionals http://www.thecodex.com/wasp.html ****************************************************************************** Vol.Two Issue #213 The Surveillance List Oct.7,1997 Over 3000+ Members Worldwide Representing 53 different countries List Chat at: http://www.thecodex.com/chat.html ****************************************************************************** While we STILL feel there is NO SUCH THING as a stupid question... We suggest the newer list members AND the technically challenged browse through the FAQ before posting a question... Surveillance List Pseudo FAQ at: http://www.thecodex.com/faq.html P.S. If you have something to add to the FAQ, let us know... ****************************************************************************** IN THIS ISSUE... ****************************************************************************** 01) Re: Remotely Counting money 02) "Cover Your Identity On Internet" 03) Re: Pervs on the payroll 04) Streetlights 05) Re: Dollar strips 06) Kamikaze Pilots 07) MONEY MADNESS!!!!! 08) Re: Remotely counting money 09) Announcing Listening Post 1.0 10) Re: Remotely counting money 11) Re: Drive-by Kiddnappings 12) Re: Remotely Counting Money? 13) NEW E-MAIL ADDRESS 14) ARRL & HR2369 15) Strips, numbers, and cards 16) Circuit board software 17) Re: Kamazazis 18) Re: REVERSE DIRECTORY 19) Re: Pinhole Camera supplier ****************************************************************************** DON'T BE A LURKER.... GET INVOLVED... YOU ARE A MEMBER... MAKE THE MOST OF IT ****************************************************************************** 1)From: "Ralph Bergin Jr." Subject: Re: Remotely Counting money > 2)From: Greg_Smith@matrixresources.com > Subject: Re: Remotely Counting money > > I am very suspicious about these claims of money counters at airports, > courthouses, and other locations. This story sounds like one of those > infamous "urban legends." I agree with you. I spoke to three friends of mine, a US Marshall at the Federal Courthouse in Pittsburgh, an Allegheny County Police Officer at the Pittsburgh International Airport and a guard at the Pittsburgh International Airport. The US Marshall and guard both operate the scanners at their respective places, and the US Marshall has worked at other locations, including Miami's airport. The Allegheny County Police Department is responsible for ALL arrests at the airport, even though they may sometimes work in conjunction with other law enforcement agencies. All of them said it was B.S. that the scanners can count money. Last year I flew from Mexico to NYC with over $12,000 in cash and never got a second look. I heard this same rumor ten years ago. It wasn't true then and I strongly doubt it is true now. Regards, Ralph Bergin Jr., President Paragon Investigations, Inc. P.O. Box 24529 Pittsburgh PA 15234 E-Mail: pi@paragon-pi.com Phones: 800-767-1964 or 412-563-1801 Fax: 412-563-3533 WWW: http://www.paragon-pi.com ************************************************************************** 2)From: L J Strand Subject: "Cover Your Identity On Internet" Every time you request a page on the net, the webserver asks you who you are and what your surfing with. Now there is a little program called "MSIEX" which will totally cover up all the info requested by the server. You may even instruct the program to change the browser type to anything. That's privacy! Anyone interested in a copy of this program may pick it up from our website. It's only 175Kb, don't miss the opportunity, we will only have it available for download until the November 12:th. Description - Program to modify MSIE's User-Agent tag -- works with ALL versions of MSIE. this program will not affect MSIE's operation in anyway. the User-Agent tag is an optional string of information, containing client details, all browser send to servers while requesting web documents. removing this tag will effectively turn your MSIE into a "stealth browser" (from the server's point of view). change the tag, and pose as another browser or OS user. the possibilities are limitless! :-) Want it? Go to http://www.webring.org/cgi-bin/webring?ring=isaring&list and click "STEALTH capability on the net" and the program is yours. By the way, all of you who have products or services which you advertise on the net. Get a free advertising space in our ring. (Only sites related to security, surveillance and privacy please.) Who will become our 45000 visitor? Yours Sincerely; L J Strand Director INTERNATIONAL SECURITY AGENCY http://www.algonet.se/~ljsaisa ljsaisa@algonet.se Tel: Int+46 (0)8-645 22 82 (09.00am-05.00pm C.E.T.) Fax/Data: Int+46 (0)8-645 22 82 (24h) PoBox 167, S-162 12 Stockholm, Sweden ************************************************************************** 3)From: "self destruct" Subject: Re: Pervs on the payroll i fail to see what this pornography stuff has to do with this newletter. personally i dont see anything wrong with viewing porn.(except child porn, those are sick minds)who cares if some person is viewing porn on company time. thats between them and the company they work for. i must stop now before i say something i'll regret (i.e.something not flattering about person who wrote the message that im commenting about) +++Moderator's Note+++ The article in question was not posted with intent to make a morality judgement on pornography.... It was posted because of it's content relating to this list namely statistics... >>>> Twenty-five percent of the computers used in offices across the United States contain some form of pornographic materials, including child pornography, according to a detective agency's recent study. <<<< and because of it's reference to technology that is available that restores deleted files... >>>> DDS agents were quick to point out, however, that only a minority of office employees view questionable materials. But, they warn, many savvy computer users try to hide their activities from management. "Many employees try to delete files and clear caches when they suspect they are being investigated for anything," Amadali Arabshahi, director of information technology at DDS, said. Arabshahi noted, however, that "We have the technology to restore deleted files and view hidden or password protected data. The steps we take are standardized and will stand up in court under the most demanding cross-examinations." <<<< I think this qualifies this article to be of interest to those interested in surveillance & privacy... Comments list? I hope more list members will post articles they find on related surveillance & privacy technology... this list is only as good as we make it... Every edition of the SLF contains the following guidelines at the bottom... >>>> We want to know EVERYTHING and ANYTHING about eavesdropping, surveillance, countersurveillance & privacy related technology, etc... Remember: who, what, where, when, how & why... we want ALL the details... <<<< SpyKing ************************************************************************** 4)From: andrewa@indirect.com Subject: Streetlights OK - I have had the same thing happen to me - many in a row, and not always on the street. We have lamps at my apartment complex that do it as I walk by! I have given some thought to this (both paranormal and otherwise), and figure it is caused by vibration or something (maybe I "step" too hard). These lamps are controlled by a timer - not photocells. The same thing happens in my car, but the photocell idea may be correct - though I sometimes wonder... ************************************************************************** 5)From: "self destruct" Subject: Re: Dollar strips yes it is possible to pull out the tiny strips in paper money.but each denominations strip is located in a differant area of the bill,so pulling a strip out and at the same time pulling another in its place i dont think would fool any machine.though i dont know for sure ************************************************************************** 6)From: trace@onramp.net Subject: Kamikaze Pilots > +++Moderator's Note+++ > > Speaking of Kamikazes... does anyone know... think about this before you > answer... Why Japanese Kamikaze pilots wore crash helments? > Communications. That's where their headsets were. -- Trace Carpenter Investigations ****** 2926 Maple Ave., Ste. 200 Ignorace of the law is no excuse; Dallas, Texas 75201 Ignorance of the law-makers apparently 214.828.4520 is. 214.740-0112 Facsimile ****** ************************************************************************** 7)From: crudgmar@sprynet.com Subject: MONEY MADNESS!!!!! I have read, and got a good laugh, from some of the stuff people believe. (can we say.. GULLIBLE?..boys and girls?) Really now, c'mon,..... "money-scanners" that "read the thread"...like a Tom Swift adventure plot? The only purpose of integrating the thread, with the denomination micro-printed on it, ...was to make it harder to counterfeit currency. And the only thing that thread is capable of "doing"...is showing up a certain color,under common UV light. Now..put your paranoia back on the shelf, and leave it there for something REALLY BIG to worry about...like aliens walkin' around amongst us!*LOL*....some really funny stuff going on in minds out there. But what the hey...it IS America,..we are free to believe whatever delusion we want!!!! P.S. Money-changer machines do NOT rely on the thread for authentication..(sheesh!!) ************************************************************************** 8)From: Jim Youse Subject: Re: Remotely counting money. I saw a show on catching drug traffickers where they did a demo of a machine that worked like the one we've been discussing here. The machine could not determine how much money you are carrying. What it could do is detect the strips in the bills and signal the operator if the person is carrying a large sum of money. How much money would be required for the machine to detect it was not disclosed for obvious reasons. I suspect it is several thousand dollars. The machine I saw was a stand alone machine, it was not part of a metal detector like you see at the airport. Jim Youse - jyouse@omicron.com - http://www.omicron.com - jimyouse@prodigy.com - http://pages.prodigy.com/JimYouse ************************************************************************** 9)From: "LP Communications, Inc." Subject: Announcing Listening Post 1.0 The first major advance in scanning since the introduction of the computer controlled scanner. Check out http://www.lpcom.com for full information. Design Goals - Windows 95/32-bit system with full multitasking. No more do you have to stop scanning to edit banks, channels, etc. Generate reports, search the database, all without missing any of the action. - Tight integration with database. Listening Post utilizes ODBC to connect directly to Access or Sybase SQL Anywhere to store channel/search information. Cut and Paste greatly simplifies bank/channel maintenance. - Built in wave recording. Sound data is stored directly to the database to allow full random access playback. One can playback just the activity from a given agency, etc. There is even an 'Instant Replay' button. - Full duplex support. Playback can occur simultaneously with recording. - Scanning speed is limited by the radio, not the software. Scanning speeds of up to 80 channels/sec are possible, even on a heavily loaded PC. No software that runs in a dos window, or that does not have driver support can make this claim. - Familiar user interface. Listening Post resembles Windows Explorer in both the main interface and the playback system. - Full featured scanning support. CTCSS filtering, priority scans, per channel delays, etc. are supported. - Audio processing plug-in support. Listening Post supports plug-in components that will process the audio to achieve some desired result. Included in the full version is a speech inverter component. More will be available as they are developed. With release 1.1, the plug-in specifications will be published on the web page, allowing any interested parties to develop their own plug-ins. - Radio dependencies are external to the core system. This will allow us to add support for additional radios quickly. ************************************************************************** 10)From: beb2029@iperbole.bologna.it (steppenwolf) Subject: Re: Remotely counting money Okay, let's presume that a device that counts the security strips in a moving vehicle exists, and why shouldn't it? I have learned from this list, that in the surveillance world, just cuz I have never thought of it, doesn't prove its inexistence. Let's stay in the SOLUTION! We also now know that stomach lining does not conceal these strips from a detector. What would then? A lead carrying case? (obviously trotting through the metal detector at the county courthouse with a lead briefcase could call attention to oneself, but on a truck ....). I think we need a materials expert here. How about blocking the strips on the driver's licence? A lead lined wallet? Never hold discussions with the monkey when the organ grinder is in the room. -Winston Churchill ************************************************************************** 11)From: vegacon@correo.dnet.com.pe (Carlos Guillermo Vega Cumberland) Subject: Re: Drive-by Kiddnappings Augie, Thank´s for your advice on the "Drive-by Kiddnappings". I found it very usefull, although no one has never advise me to leave the ATM card behind before. Interesting. Just so you know, I have tinted windows on my car. Unfortunatelly, this can be a double edge weapon. In order to have tinted windows you need a special permit. Therefore, you get pulled over constantly by the cops (Who are usually corrupt) to see if you have your permit. Fortunatelly, I do, so there isn´t much they can do. The other downfall, which is more serious, is that this permit is only issued to the police force, government agents, military, and business men who are in high risk of danger. Here is were the problem is. Usually, police vehicles,government vehicles and military vehicles are easily distinguished so nothing ever happens to them, so that leaves the other category (which I´m in) who are the usual targets for kiddnappings. But like you said, the best thing is to always be on the look out. Once again I want to thank you for your advice. Carlos ************************************************************************** 12)From: nobody@REPLAY.COM (Anonymous) Subject: Re: Remotely Counting Money? After many years of working with and around the govt I do know a few things. 1. A scanner capable of scanning money or drivers license at a foot or more is nothing but a dream. 2. The strips are to small to provide a source for a scanner, located in an airport, be side the road or an where else. 3. The scannable strip on the back of drivers licenses are nothing more than magnetic strips like your credit cards have... yes you can scan the information off of it... if you run it through a scanner that makes contact with the card. Just like the one at you local banks ATM. 4. The magnetic coding from the strip on credit cards or a drivers license can not be detected at anything more than an inch or so. 5. All of the talk of the capability and technology of scanning cards and money is nothing more than modern myths and paranoia. Wooky ************************************************************************** 13)From: Gregory Caldwell Subject: NEW E-MAIL ADDRESS Friends: Please immediately change your records for my e-mail address. Effective immediately, the old one (caldwell@nvi.net) does not work. My ISP, which I have had "forever", (nvi.net = New Visions, Inc.) apparently went out of business suddenly as all their access numbers were disconnected today without warning and they would not return calls or messages today. (Maybe they were connected to that WestPac Airlines?) Since this is not the first occassion nvi has had disconnected problems, it seemed prudent at this time to switch. Please check your records to see if you sent me any e-mail either Sunday or Monday (10/5-6/97) and resend it to my new address (gjc@rmi.net). Sorry for any inconvenience. Greg Caldwell (303) 331.2459 ************************************************************************** 14)From: "John T. Ward" Subject: ARRL & HR2369 All, I received today a copy of the revisions to H.R. 2369 (Tauzin's bill) proposed by the ARRL. If accepted by Tauzin and his sponsors, and introduced as a replacement or amendment to the current wording, it appears to take care of 99.9 percent of our concerns as scanner users. Please do not respond on the various listservers. I'm posting this FYI only, and not to start an off-topic discussion. For those of you who subscribe to multiple lists forgive the multiple copies. As you may recall, Section 2 of H.R. 2369 requires the blocking of all CMRS frequencies from scanners, even though some public safety agencies also use those frequencies. In the ARRL's version, CMRS is replaced by "frequencies exclusively allocated to wireless mobile telephone services, including the domestic cellular radio telephone service." It also limits the ban on digital-to-audio conversion to wireless cellular telephone frequencies, leaving the door open for digital-capable scanners for public safety monitoring. Section 3 or H.R. 2369, which appears to make monitoring everything but CB, ham, FRS, GMRS and maybe aviation and marine, is amended in the ARRL version to include the exemptions found in chapter 119. I also made this suggestion, both in correspondence to Tauzin and in an upcoming PopComm article. Briefly, it would continue to be legal to monitor, but not to divulge, communications relating to any station for the use by the general public, or on frequencies allocated to services that relate to ships, aircraft, vehicles, or persons in distress; by any governmental, law enforcement, civil defense, private wireless or public safety system including police and fire, readily accessable to the general public; or ham, CB, GMRS, FRS or any marine or aeronautical communications system. This really looks to be a workable solution to achieve Tauzin's goals while protecting our hobby. Kudos to the ARRL on this one. John ************************************************************************** 15)From: Mutter Subject: Strips, numbers, and cards A quick note to one of the list memebers requesting 'legitimate' information on those mylar strips in large bills: Just because information comes from a 'mainstream' source doesn't mean it's necessarily correct. About those strips, there was a short article printed in the latest issue of 2600 which goes into some detail about them. It is suggested that the mylar stips are there to be detected at airports where there are devices in place to detect large concentrations of the plastic strips leaving the country (this could be a very handy technology seeing as how it is illegal to transfer more than 10,000 dollars out of the United States without notifying the government). Augie, a reverse number lookup form for four11.com (or whatever) is available at http://www.webexpert.net/nickh (another list memeber posted this earlier). And to the gentleman who was wondering about the magnetic cards hotels use as electronic keys, there is not a network in place to reprogram the door through radio. Each lock has a different code. All the front desk does in magnetically write the code onto a card for you (which anyone can do with the proper equipment). In fact, I'm holding one of those cards right now. This one appears to be made by a company called "Saflok" located in Madison Heights, Michigan. If you want more information try to contact them. - M u t t e r Ed. root zine ---> http://www.openix.com/~mutter mutter@openix.com ************************************************************************** 16)From: Manatau Subject: Circuit board software I keep hearing about a computer program that will analyze a circuit board and give you a print out of it and identify all the components on the board. If anyone else has heard of this type software or knows where to find it I would appreciate your imput. thanks K.C. ************************************************************************** 17)From: "The Reptile" Subject: Re: Kamazazis I cant believe it! Some fly-by-night company gave me a FREE camcorder =)! Well I have a small question. Do you think this might also aply to those people who take free AOL hours? Think about... WOW! Free AOL hours! This is GREAT! Now I can go ON-LINE with the privacy of AOL!! <------ (the same idiot) Ladies and gentleman, it is in my opinion that AOL is not only a horrid little ISP, but a major security risk. It's only AOL (that I know of) that lets you buy stuff without giveing a CC number ( If I am wrong please correct me). Now Im sure that there r ALOT of security messures taken wit AOL (HAHAHA) but once again there ALOT of methods to override these messures.Now you may call me some conspricy forming light-headed teenager, but go to http://www.hackersclub.com/ or http://www.webcrawler.com and do a search on hacking aol or aoHELL 1 of my favorite ER 1 of the best AOL hackers out there (this info MIGHT be outdated). OR there social engineering. I hope every one here on AOL is smart enough not to fall 4 this 1... (me) Hello this is Bob from AOL, we had a small computer incident, and we r recollecting infermation about our clients. (idiot) Ummm ok what do you need to know? (me) Well first ur full name, Address, CC number, login, password, You get the idea. Theyll sound professional and ask 4 alot useless junk. Maybe office papers in the background. I know AOL repeatedly says we will never need to know ur password, but the average joe ( or maybe coffee =) will not be alert enough or wakeing up from a good ( or bad, what ever u call it) party will not b fully alert. Thats all I have to say, sorry 4 rambleing, but I have a typeing addiction. Reptyle BTW Im sorry about all the bad spelling ( i dont have spell check for my e-mail ) and about all the people on aol I have affended even though I didnt mean any harm. ************************************************************************** 18)From: "John K." Subject: Re: REVERSE DIRECTORY > Does anyone have a URL for a decent reverse directory site? (phone # to > address) > > Thank you:-) > Augie The two I used to use were www.four11.com and www.databaseamerica.com. I preferred four11 because it had a link that you would click and it would display a map of the individuals home area. But I lost my url for four11 and the generic www.four11.com says they no longer carry reverse lookup (if anyone has the old url please post it, I posted it a long time back on one of the PI newsgroups). Anyway http://www.databaseamerica.com/html/gpfind.htm will allow you to reverse directory so give it a try! ************************************************************************** 19)From: "John K." Subject: Re: Pinhole Camera supplier > >>>>>preferably the new pinhole type, that > >>>>can be hidden. The system needs to be able to support 6-12 cameras (at > least). Also, information on the latest security systems avaible will > be greatly appreciated. > Size is 1" by 1" 8-12vdc powered with audio. Normal price is $150.00 > but $95.00 each to lists members. Hmmm, how hard would it be to take one of these mini-camera's and make it into a digital camera for the computer?? Potential for using tcpip to communicate with anyone in the world would be interesting! I remember awhile back seeing a 'Ethernet' camera but it ran a few thousand... P.S. If you have any ideas on this feel free to email me. ************************************************************************** Who are you? What's your specialty and/or interest? Let us know about your company... What would you like to see on the list? Post it. Let us know... Do you have something to contribute? We'd like to hear it... We want to know EVERYTHING and ANYTHING about eavesdropping, surveillance, countersurveillance & privacy related technology, etc... Remember: who, what, where, when, how & why... we want ALL the details... Do you have a question? Post it... A little free time? Help a member... With the INCREDIBLE brain power on this list, someone should have the answer ;-) P.S. Don't be a LURKER... Members take the time to post info for us all... give something back... Don't just take... Your input/knowledge is valued... ************************************************************************** Send Postings to: spyking@con2.com with "Post" in subject field with subject ************************************************************************** Subscribe to: spyking@con2.com In the subject field type: subscribe-surveillance list e-mail address ************************************************************************** Unsubscribe to: spyking@con2.com In the subject field type: unsubscribe-surveillance list e-mail address ************************************************************************** ...The Simple Rules of the Surveillance List... The Surveillance List Owners may Reject any posts that are/contain: 1) Info Unrelated to Eavesdropping, Surveillance or Privacy technology... 2) Flames or Negative posts... 3) E-Signatures that are considered excessive... 4) Advertisements not DIRECTLY related to the list topics... 5) Attached Files... 6) Oversized Posts... (May be edited to save room) **************************************************************************** This publication is copyrighted and is protected by U.S. and International copyright law. The information transmitted on this list may not be reproduced, reposted or forwarded to any non-list member without expressed written permission of the List Owner. Violation of U.S. copyright law is a criminal and civil offense... **************************************************************************** The Surveillance List is Moderated by SpyKing@thecodex.com The List Owner will make EVERY effort to protect subscribers from spam... Copyright 1996, 1997 Codex Publishing Inc., All Rights Reserved... **************************************************************************** ****************************************************************************** The Official Newsletter of W.A.S.P. The World Association of Surveillance Professionals http://www.thecodex.com/wasp.html ****************************************************************************** Vol.Two Issue #214 The Surveillance List Oct.8,1997 Over 3000+ Members Worldwide Representing 53 different countries List Chat at: http://www.thecodex.com/chat.html ****************************************************************************** While we STILL feel there is NO SUCH THING as a stupid question... We suggest the newer list members AND the technically challenged browse through the FAQ before posting a question... Surveillance List Pseudo FAQ at: http://www.thecodex.com/faq.html P.S. If you have something to add to the FAQ, let us know... ****************************************************************************** IN THIS ISSUE... ****************************************************************************** 01) Tough group! 02) Re: Smart Cards 03) Magic strip 04) Re: Kamikaze 05) Money, Hotels & Freebies 06) Money strips 07) Re: REMOTE MONEY COUNTING 08) Meetings and borescopes 09) Re: Reverse Directory 10) Re: Pinhole Camera supplier 11) Re: Magnetic cards and hotel room doors 12) Re: traditional vs non-traditional media 13) Re: "Cover Your Identity On Internet" 14) Re: Reverse directory 15) Re:"Cover Your Identity On Internet" 16) Interesting information for all 17) Speech on email security 18) Online Data Services 19) Re: Money detection 20) Re: Pervs on the payrol 21) Re: Counting money 22) Re: Reptile's comment about AOL and AOL 4.0 23) Re: Kamakazi Pilots 24) DISINFORMATION! ****************************************************************************** DON'T BE A LURKER.... GET INVOLVED... YOU ARE A MEMBER... MAKE THE MOST OF IT ****************************************************************************** 1)From: BADCOFFEE@aol.com Subject: Tough group! Man....love all you people but you all have to COOPERATE with my "Coffee once a week" gig. My past endevours: Get together (informal conference) in Vegas: ONE reply (my mom) Group health insurance possibility: Strike (no replies) Local (NJ, NY, CT,) coffee get together once a week or so.... TWO replies (my mom again was one of them, she don't count cause I allways have coffee's with her) Ok....here it is (bribery) I will supply a special door prize upon the first person to correctly guess the amount of money in Bad's pocket (from $1 to $7.56). (excludes family!) Again......LOCALS or anyone willing to make a trip to NJ area (NJ, NYC) Contact me at Badcoffee@aol.com and see if we can at least do a Christmas get together party. 20 people.....and it's a go. 18 people to go. (Mom...don't tell them who you are and you can come) Augie Badcoffee@aol.com ************************************************************************** 2)From: Darren Subject: Re: Smart Cards A NewZealander has just invented a smart card eftpos type card that can store all your info including pass words to every thing on it.The difference is if you have it in your pocket & you shake hands with someone who has one in their pocket yours can read all the info on the other one.It can read 1 millionth of an amp which is less than the human body uses naturally.It has its own power source but work is well on the way for one that uses the movement of walking to generate it's own.They say it will be good for people who can not always remember all their different pass words etc,All they have to do is touch the atf machine and it will read the card in your body. Has anyone seen it yet? Where do you think this could lead ? If I had not seen it I would not have believed it. D Richards.NZ ************************************************************************** 3)From: icathar@mail.club-internet.fr Subject: Magic strip Well, I have NO evidence of the use of 'money counting strip', but the physics itself of the thing may be understood. I don't know how bookshops protects their wares here in the US, but in France we often find this system : a small metal strip is embedded in books. This strip is magnetized, and should be de-magnetized when book is paid for (by passing it over a strong magnet, I believe). When you go out of the shop, you pass between a special gate which detects still magnetized strip. As you know, certain metal have inherent magnetic capabilities. If you pass a certain quantity of that kind of metal in a magnetic field, the properties of this field would be temporarily chnaged, thus detecting the movement. The amount of variation could then be correlated to the quantity of metal. So, on a pure theoretical basis, I think this 'money detecting trick' can be done, even if not easy nor cheap. And anyway you wouldn't have a good precision : no 'one buck precision', just a rough estimation (hundreds, thousands, ten of ... ). Then on a practical basis, I don't know. Was that understandable anglo-french technical babbles ? 8-) JeFF, Paris ************************************************************************** 4)From: rkidd@localnet.com Subject: Re: Kamikaze Augie, Had a client, attorney, that was receiving unsolicted junk mail, not very uncommon. The junk mail related to legal matters and addressed to him specifically was routinely put in his personal office in box were it sat, sometimes for days, before being discarded. We were contracted to do a sweep AFTER some vital information to a case had MYSTERIOUSLY been leaked. (Another REACTIVE instead of PROACTIVE situation). We found the transmitter located in the fold of an envelope of a piece of unopened junk mail he had just thrown in the trash. Inspection of the mails contents revealed blank paper (common watermarks) and the transmitter. There was no telling how many times the client had been targeted in the past, or what other attorneys had been hit. Sincerely, Rick Kidd Confidential Security Services (CSS) Association of Counter Intelligence Professionals (ACIP) 716-934-0531 ************************************************************************** 5)From: Two Dogs Subject: Money, Hotels & Freebies The US Mint began inserting the polyester strip in US currency in 1989. I check every bill and never accept 1988 currency. It is the most commonly counterfeited year in the history of US currency. I will check at the office tomorrow to see if it is ever used in automated authentification, but I doubt it would be in the US because the number of pre-1989 bills in circulation. I've lived in 5-star hotels for months at a time with the magnetic door locks. I assumed they were wired but never took the time to remove the door. I did once try to copy the card. I punched a duplicate card out of cardboard of my own key and it didn't work. Maybe I was not careful enough or maybe it contained a special material. Anyway, the max time the card is valid for is 30 days. It's a pain to go 17 floors up and find out your card no longer works! So going back down mad as hell, the receptionist quickly punches out another one. Interestingly never identifying the customer. The best way in a hotel room is just to ask for the key! Ok, last but not least, target your freebie to go where you want it to go. A nice name plaque or business card holder will surely end up on a desk. Use your imagination and your results will surpass your expectations! TDF ************************************************************************** 6)From: Eric Schneider Subject: Money strips >>+++Moderator's Note+++ >> >>I seem to remember an article somewhere by someone who claims that the >>strips can be removed intact by using a tweezers very carefully... The >>author also claimed that by taping a $20.00 strip onto a one dollar bill >>with $1.00 strip removed, it would fool change machines and result in user >>getting $20.00 worth of change for $1.00... if this is true lesser >>denominations would probably also work in a variety of vending machines... I don't know about this... I know that most machines use the metalic property of ink on the face. Most that I have seen have a small magnet in front of an "ordinary" magnetic head (like in a tape recorder). The magnet magnetizes the ink and the ink pattern is then read by electronics, and compared to the internal pattern. The stripe is along the length of the bill, generally through the printed text of donomination (one,five,twenty). Only the black ink is metalic, not the green of the seal,etc. I suppose that new machines might use the properties of the embedded strips, but I haven't heard of any. On the note of remote detection, I am sure that an estimate of cash can be achieved, but I highly doubt that exact amounts could. My basis for this is that every bill made whould net a different "signature" to enable counting of every bill. More likely, each denomination might have one to a couple different "signatures". Since the most common method for "remote" detection is simply a tuned resonant circuit, multiple resonances at a single freqency would be difficult to detect. Hey, if anyone wants to donate several bills of various denominations, I would be glad to set up the 'ol network analyzer to get the facts ;) Eric ************************************************************************** 7)From: Jennifer Kollert Subject: Re: REMOTE MONEY COUNTING If anyone has any SCIENTIFIC evidence supporting this wild claim, I'd sure love to see it. I don't know about scientific evidence, but this is a start! "The new notes will be the same size and color as the present notes, will contain portraits of the same historically prominent individuals, and will be easily recognized as U.S. currency. The new notes will contain more security features, however, in the paper, ink, and design and will therefore clearly represent an improvement on the present notes in terms of counterfeit deterrence. The United States will issue only one type of each denomination on a worldwide basis. A final design has not been approved yet, but the "concept" design has several new features that are being tested for feasibility and that we expect to be able to incorporate into the new notes. These include: * a security thread similar to that contained in our present series-1990 and series-1993 notes, but with encoding for easier machine handling and denomination-specific locations for easier authentication by the public; * a larger, more detailed portrait moved slightly to the left, in order to give prominence to the watermark and to make the portrait-and-watermark combination a highly effective authentication feature for the public; * variable-color ink, whose color would shift with the angle of viewing, also to enhance the public's ability to distinguish between genuine and counterfeit notes; * and infrared fibers and new magnetic patterns for improved mechanical verification." You can read this article in it's entirety at http://woodrow.mpls.frb.fed.us/site_collection/econed/curric/speech.html Hmm... Kinda makes you think! Jennifer jkollert@smarthome.com http://smarthome.com ************************************************************************** 8)From: Eric Schneider Subject: Meetings and borescopes BADCOFFEE writes: >>If you live in the NJ area and share the same EXTREME interest in this field, >>please contact me. Amatures welcome. See if we can do a weekly coffee/drink >>thing. Pick some locks....take some pixx....drink some coffee. >> This ia good idea, too bad I'm in Colorado. Anyone in CO want to do the same? A surveilance meeting (just no spying on each other :) Might be entertaining, as well as providing some good local contacts. >>Also: If anyone is seeing a contact in NJ. E-mail me and I shall give you my >>phone number. Same here. >>Also: Plumbers use some kind of a fiber optic tube with cam to video inside pipes. >>Can this also be used for surveillance? Or..is there a light/focus Problem >>attached to such a device? Boroscopes. Olympus Industrial sells some of these. PRICEY... Locksmith use them for safes as well. I don't know how one would use them for surv. I imagine foucus could be a problem, and definately turn off the light! >>Get the DOGS OUT of the house BEFORE you make pre-text calls. TRUST me. I Heh, gotta love that spontaneity! They might be usefull with another approach (can't think of one right now :( . That just brought back a memory of when I used to do a little skip tracing. One of my cohorts would routinely open the window in his office (which was on a busy street), hang halfway out of it, and do the telco lineman pretext. Ah, well guess you'd have to be there... Eric ************************************************************************** 9)From: Gregory Caldwell Subject: Re: Reverse Directory John: Four11: http://www.Four11.com/ Augie: Another reverse directory: http://www.555-1212.com/ Greg Caldwell ISC - The Caldwell Group ************************************************************************** 10)From: L J Strand Subject: Re: Pinhole Camera supplier > >>>>>preferably the new pinhole type, that > >>>>can be hidden. The system needs to be able to support 6-12 cameras (at > least). Also, information on the latest security systems avaible will > be greatly appreciated. If you dont mind a computer based surveillance cam system I do have a good supplier. It's Trodos in Russia. They have one state of the art system. You may find them at http://www.nsk.su/~trodos ... enjoy! Yours Sincerely; L J Strand Director INTERNATIONAL SECURITY AGENCY http://www.algonet.se/~ljsaisa ljsaisa@algonet.se Tel: Int+46 (0)8-645 22 82 (09.00am-05.00pm C.E.T.) Fax/Data: Int+46 (0)8-645 22 82 (24h) PoBox 167, S-162 12 Stockholm, Sweden ************************************************************************** 11)From: Eric Schneider Subject: Re: Magnetic cards and hotel room doors >>From: Mix >>Does anyone on the list know exactly how the magnetic >>cards work in hotel room doors. They can reprogram the >>doors on demand from the hotel desk, but the doors >>do not have any wires that run to the front desk, and must >>be on a network of some kind (ie. each door has a uniquie >>address. They must be using radio waves to reprogram the doors, >>if so, you should be able to grab the signals and program >>you own cards to enter the different rooms. any information What model? I havent seen any using RF for programming (but it has been a while). You might want to check the latch area for something that could be an electrical contact. Most have them somewhere. The alternitive neccesitates using batteries in the lock mech. Some low-end locks do this, but if a hotel did this, they would surely regret it as soon as batteries started going bad... Also consider the possibility that the locks are not "programmed", but rather have only 'addresses' and just spit out the code of the key inserted. A central DB determines if that code is valid for that door, and tells the door to unlock. That way the locks can be dumber (cheaper). Some hacks could obviously be done on such a system as well. Eric ************************************************************************** 12)From: China Subject: Re: traditional vs non-traditional media Spyking, if the following post is too lengthy or inappropriate, please feel free to exercise your discretion, and I apologize in advance if such is the case. Recently I read a statement in one of the posts wherein a member was disdainful of a possibility which suggested the government's ability to remotely discern the amount of money an individual was carrying, and his reason for such skepticism was that he had not witnessed any mention of the topic by the "mainstream" media. While there may or may not be merit to any skepticism for the validity of the topic itself, I question the reason for that skepticism. The operational essence of any "disinformation" agenda is bifurcated: on the one hand, the appropriate quantum of information must be assembled; on the other hand, a method of dissemination must be available. In the first case, the presentation is assembled by the passage of information through the filter of prejudice, and continuing with this analogy, if one assumes that the instant filter is of a selective nature, such as an ion- exchange filter, then that which results will be the passage of only a preselected partition of the original information. There must then be a means available by which to disseminate the aforementioned filtered quantum of information. This presupposes that the medium of dissemination is one which (1) has the ability to reach the largest segment of the target audience and (2) that said medium is one which is generally regarded as credible. The only medium which meets the above criteria is the multifaceted organ of the mainstream or traditional media. However, while the so-called estate of the mainstream media inarguably meets the first criterion, I question the validity of the implied assumption that "traditional" equates with "credible," because such an assumption suggests the suspension of intelligence and analytical methodology. While the mainstream media may be relied upon to accurately report the event of John Q. Public having battered his spouse, I see no reason to likewise assume that it would also, for instance, accurately report the existence of some insidious or invidious government plan to disenfranchise its citizenry of their right of review and redress. In the first instance, the media has nothing at risk; very few would give a tinker's damn about John Q. Public or his spouse unless there existed some intrinsic and vested interest in either one or the other. On the other hand, the 4th estate conceivably has very much at stake when an issue critical of governmental activity is at bar. Why? Collectively and in the guise of its individual organs, the government has exclusive right of review of such matters concerning that entity as its tax status, access to the inner sanctums of political activity, and the maintenance of its licensure to name just a few. The government's individual organs have the power to intrude surreptitiously into every aspect of management's private life in search of information which might be prospectively used to compromise any executive within said entity should a point in time come about wherein leverage is necessary (q.v. Hoover, McCarthy, Nixon, Reagan, etc). Conversely, it has the power to OVERLOOK any indiscretion on the part of the entity should it be inclined to do so. All of these issues could conceivably have a direct impact upon an entity's subscription base and thus a major impact upon its very existence since its subscription base represents its life's blood. It would be difficult if not impossible to be unbiased in the face of such a potential threat, but assuming it possessed such integrity, there is yet another more poignant reason to question any reporting by the traditional and established media: due to the nature of the beast, it may have its own political agenda to further--an agenda which may be opportunistically sympathetic to or with the instant strategic goals of the government. This is not to say, of course, that each and every governmental goal is infected with an ulterior motive or that every mainstream media organ is less than responsible or candid since that mindset likewise encourages the suspension of intellectual analysis. However, when ANY agenda has about it the flavor of the subversion of Constitutional guarantees, then it clearly warrants review and the mediating influence of a healthy dollop of skepticism. Insofar as the reality of a remote-strip-reader for money is concerned, I have no direct knowledge. I do know, however, that I would seriously question the legitimacy of the government's interest in being able to accomplish such a feat. The technology MAY be at hand, but if it is being applied, my money would go on some motive totally unrelated to the control of illicit drug money since that argument is ridiculous. Lord Acton once wrote, "Power tends to corrupt, and absolute power tends to corrupt absolutely." Within the instant context, the thrust of this is that by blindly according ANY entity an unquestioned measure of faith-- or by blindly refusing to examine a non-traditional source of information-- one has effectively opened the door to the potential of subsequent abuse. To be lulled into the near comatose state of blind, patriotic acquiescence is tantamount to an invitation to disaster. Patriotism is usually defined as the devoted love, support, and defense of one's country, and I am confident that we all support such a definition; however, this country's essence is predicated upon its embrace of a collection of fundamental truths and axioms which serve to establish a fair and dignified existence for its citizenry, and when we allow a departure from that goal, we invite a plummeting descent into totalitarian tyranny. For that reason, we must be ever vigilant, and one aspect of this vigilance is the careful review of governmental agenda and mandates, examining not only what IS said but what is either left UNSAID or defies logic-- regardless of our SOURCE of information. I would venture that nearly every adult member of this list is old enough to recall at least one attempted abuse of power on the part of the government or its individual departments as well as the effective duping of the traditional media to support that abuse. Lest I be accused of illogically favoring the less traditional organs of the 4th estate, I hasten to state that the same measure of skepticism should be applied to their presentations. However, it has been my observation that if one has the ability-- and ANYONE can develop it-- to sift through the chaff of their Jew-baiting and other moronic ideological and/or religious rhetoric, the unconventional media have usually been the first to target in on active or planned governmental abuse. Only after it has been popularized have the traditional media made the decision to get on the bandwagon. Consequently, it behooves each of us to look behind the veil of intrigue and subterfuge to ascertain the truth, and in pursuit thereof, I would suggest that ANY source of information is initially as meritorious as the other until proven otherwise through the mechanism of careful and thoughtful analysis. The trick is to look NOT at individual instances, but to look for PATTERNS; does there exist an implicit or explicit dichotomy between theory and practice? It is the PATTERNS of behavior which reveal the character and plans of an entity, not its isolated, individual acts taken out of chronological and ideological context. In the case of governmental action, one might ask is there a departure from either the real or assumed Constitutional norm? If there exists the flavor of such a departure, what could be the strategic goal(s)? What would be the reasonable tactical approach in the realization of such a strategic goal? How could such tactical goals be effected without engendering a maelstrom of protest? How could one effectively conceal the mechanics of these tactics as they became incrementally operational? If they became known, how would one effectively apply the principle of damage control; would one avail himself of absolute silence, outright denial, plausible denial, plead "national security" interests, etcetera, ad nauseum? While I may have leaned overly heavy on this issue, it is, at least, in my opinion, important; it seems that every day we are presented with yet another attempt to infringe upon our settled, Constitutional guarantees by those seeking opportunistic leverage, and if we are not very careful, a way of life is going to slip between our fingers like sand through the proverbial hour-glass. And the point to the foregoing is this: there is NO source of information which should be considered pristine OR taboo when one is searching for the truth; the truth is the truth, and it has no concept of partisanship. China +++Moderator's Note+++ The above was posted in it's entirety. ************************************************************************** 13)From: someone Subject: Re: "Cover Your Identity On Internet" Is there any program for Netscape that will keep my identity info private? The program you described was only for MSIE. Someone let me know. Thanks.. ************************************************************************** 14)From: David Futcher Subject: Re: Reverse directory A reverse directory has also recently been added on InfoSpace - http://www.infospace.com - you'll find it at the top of the middle column on the front page. I don't know much about the surveillance world (that's why I'm on the list!), but I can help with this URL! Lurking mode engaged... ************************************************************************** 15)From: "The Swordsman" Subject: Re:"Cover Your Identity On Internet" -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 I dont suppose there is a Netscape version for this software? Im wondering why you built a stealth package like this for the crappiest browser around, and built from Microsoft too! Yeesh! ;-) -----BEGIN PGP SIGNATURE----- Version: PGP for Personal Privacy 5.0 Charset: noconv iQA/AwUBNDrLA0mn2Zzz4JqKEQLRZgCdGXwZhzDY0zA8AQAKV0XbBxlbTcgAnjdK +rTz9RN2JlwJDu0p6BhZRmbO =Gckf -----END PGP SIGNATURE----- Frank Pagano (a.k.a. The Swordsman) Auxiliary Police Officer, New York http://www.geocities.com/CapitolHill/7245 ICQ# 2052068 -------- Member Coalition of Internet Advocates http://www.geocities.com/Heartland/Prairie/9338 -------- Disclaimer: My thoughts, my life ************************************************************************** 16)From: Duece6x6@aol.com Subject: Fwd: [Fwd:Interesting information for all.] interesting info to post? THE DUECE --------------------- Forwarded message: From: acer@ne.uswest.net (Ron & Sharon Kelley) >>>> I am forwarding the following message to everyone in our address book with an aol address. The message seems like something worth persuing for aol users, if, indeed, there is any truth in it. Other than receiving this message today, I have no other info. We've never been aol users so it doesn't apply directly to us, but thought all of you would like to be informed so you can take whatever action (or not) you deem necessary to protect your privacy. <<<< I was Sent this letter ..Could this be TRUE?????????? >> From a former AOL employee: >> >> I'll try and cut through the crap, and try to get to the point of this >> letter. I used to work for America Online, and would like to remain >> anonymous for that reason. I was laid off in early September, but I >> know exactly why I was laid off, which I will now explain: >> >> Since last December, I had been one of the many people assigned to >> design AOL 4.0 for Windows (AOL 4.0 beta, codenamed Casablanca). In >> the beginning, I was very proud of this task, until I found out the true >> cost of it. Things were going fine until about mid-February, when me >> and 2 of my colleagues started to suspect a problem, an unexplainable >> 'Privacy Invasion', with the new version. One of them, who is a master >> programmer, copied the finished portion of the new version (Then 'Build >> 52'), and took it home, and we spent nearly 2 weeks of sleepless nights >> examining and debugging the program, flipping it inside-out, and here is >> what we found. >> >> Unlike all previous versions of America Online, version 4.0 puts >> something in your hard drive called a 'cookie'. (AOL members click >HREF=" >>aol://4344:1047.g334.8411481.532897009">here for a >> definition). However, the cookie we found on Version 4.0 was far more >> treacherous than the simple internet cookie. How would you like >> somebody looking at your entire hard drive, snooping through any (yes, >> any) piece of information on your hard drive. It could also read your >> password and log in information and store it deep in the program code. >> Well, all previous versions, whether you like it or not, have done this >> to a certain extent, but only with files you downloaded. As me and my >> colleagues discovered, with the new version, anytime you are signed on >> to AOL, any top aol executive, any aol worker, who has been sworn to >> secrecy regarding this feature, can go into your hard drive and retrieve >> any piece of information that they so desire. Billing, download >> records, e-mail, directories, personal documents, programs, financial >> information, scanned images, etc ... Better start keeping all those >> pictures on a floppy disk! >> >> This is a totally disgusting violation of our rights, and your right to >> know as well. Since this is undoubtably 'Top Secret' information that I >> am revealing, my life at AOL is pretty much over. After discovering >> this information, we started to inform a few other workers at America >> Online, so that we could get a large enough crew to stop this from >> happening to the millions of unfortunate and unsuspecting America Online >> members. This was in early August. One month later, all three of us >> were unemployed. We got together, and figured there was something we >> had to do to let the public know. >> >> Unemployed, with one of us going through a divorce (me) and another who >> is about to undergo treatment for Cancer, our combined financial >> situation is not currently enough to release any sort or article. We >> attepted to create a web page on three different servers containing >> in-depth information on AOL 4.0, but all three were taken down within 2 >> days. We were running very low on time (4.0 is released early this >> winter), so we figured our last hope to reveal this madness before it >> effects the people was starting something similar to a chain letter, >> this letter you are reading. Please do the following, to help us expose >> AOL for who they really are, and to help us and yourself recieve >> personal gratification for taking a stand for our freedom: >> >> 1. Forward this letter to as many people as you can (not just friends >> and family, as many as you can!) >> >> 2. Tell people who aren't on America Online in person, especially >> important people (Private Investigators, Government workers, City >> Council) >> >> 3. If the information about the new version isn't exposed by the time >> aol is released early this winter, for your own protection, DON'T >> DOWNLOAD AOL 4.0 UNDER ANY CONDITION !!! >> >> Thank you for reading and examining this information. Me and my >> colleagues hope that you will help us do the right thing in this >> situation. Enjoy America Online (just kidding!). >> >> Regards, >> A former AOL employee ************************************************************************** 17)From: "Y Ddraig Goch" Subject: Speech on email security Hello, I'm doing a speech on Internet email security for my college speech class. I was wondering if anyone could point me in the right direction to sites, or give me info, on just how email has grown in the past few years, how safe (I.e. is there any way to intercept emails. etc..) is it and if it has meet the growth. And also ways to prevent the problems if any. (I know of programs like PGP) Thank you for any help you can give. Owen Morgan Y Ddraig Goch (The Red Dragon) ddraig@kuntrynet.com http://www.geocities.com/Area51/Zone/4587/ ************************************************************************** 18)From: "Theodore G. Phelps" Subject: Online Data Services Can any of you point me to the "best" online service for public records, asset searches, skip tracing, etc.? I've been using Knowx, but I find that it is somewhat limited. I'm trying to collect a 5+ million judgement from some real smart scumbags, and I need reliable information and I'm even willing to PAY for it. Please help. I've checked out IRSC, but I need some more sources. TIA Ted Phelps ________________________________ Please visit our website at http://phelpsnet.com ************************************************************************** 19)From: Mutter Subject: Re: Money detection > 7)From: crudgmar@sprynet.com > Subject: MONEY MADNESS!!!!! > > I have read, and got a good laugh, > from some of the stuff people believe. (can we say.. > GULLIBLE?..boys and girls?) Really now, c'mon,..... > "money-scanners" that "read the thread"...like a Tom > Swift adventure plot? The only purpose of integrating > the thread, with the denomination micro-printed on it, > ...was to make it harder to counterfeit currency. And > the only thing that thread is capable of "doing"...is > showing up a certain color,under common UV light. > Now..put your paranoia back on the shelf, and leave it > there for something REALLY BIG to worry about...like > aliens walkin' around amongst us!*LOL*....some really > funny stuff going on in minds out there. But what the > hey...it IS America,..we are free to believe whatever > delusion we want!!!! P.S. Money-changer machines do > NOT rely on the thread for authentication..(sheesh!!) > Yeah man..I'm with you!*LOL* Next thing these paranoid freaks will be telling me....every time i go to a web page my domain name is transmitted..or that the phone company keeps track of every number i dial (including 800 numbers)....or that social security numbers are used to track you. i mean geez. *LOL* (psst, that's sarcasm in case ya didn't catch it). The point, my friend, is if you believe that concerns about personal privacy issues are stupid then you seriously haven't been paying attention to this list. Technology is constantly being developed with one apparent function but alternative, more obscure functions as well. As you see from the next post ... > 8)From: Jim Youse > Subject: Re: Remotely counting money. > > I saw a show on catching drug traffickers where they did a demo of a > machine that worked like the one we've been discussing here. The > machine could not determine how much money you are carrying. What it > could do is detect the strips in the bills and signal the operator if > the person is carrying a large sum of money. > > How much money would be required for the machine to detect it was not > disclosed for obvious reasons. I suspect it is several thousand > dollars. The machine I saw was a stand alone machine, it was not part > of a metal detector like you see at the airport. > > Jim Youse - jyouse@omicron.com > - http://www.omicron.com> > - jimyouse@prodigy.com > - http://pages.prodigy.com/JimYouse ... the technology does in fact exist (thanks for the info, jim). Detection of large quantities of mylar strips is not hard. Don't dismiss it as an urban legend, because there is a great deal of truth in it. And BTW, I tend to think of people who question the answers as smart, not gullible -- but that's just me. > 12)From: nobody@REPLAY.COM (Anonymous) > Subject: Re: Remotely Counting Money? > > After many years of working with and around the govt I do know a few > things. Then you _must_ know the truth, eh? :) > 1. A scanner capable of scanning money or drivers license at a foot or > more is nothing but a dream. I can't see something reading the information encoded on the mag strip of your licence in your pocket but ('concentrations' being the key) money in a suitcase, why not? > 2. The strips are to small to provide a source for a scanner, located in > an airport, be side the road or an where else. What about a thousand 'small' strips (that's equal to a pretty big chunk of plastic). There are electronic devices to detect chemicals associated with explosives in many airports -- I don't see why one capable of detecting unusual amounts of mylar (money) is such a stretch. > 4. The magnetic coding from the strip on credit cards or a drivers license > can not be detected at anything more than an inch or so. > 5. All of the talk of the capability and technology of scanning cards and > money is nothing more than modern myths and paranoia. > So were electronic privacy issues 15 years ago. Now, they are very much a reality. - M u t t e r Ed. root zine ---> http://www.openix.com/~mutter mutter@openix.com ************************************************************************** 20)From: "J.D. Abolins" Subject: Re: Pervs on the payrol >+++Moderator's Note+++ > >The article in question was not posted with intent to make a morality >judgement on pornography.... It was posted because of it's content relating >to this list namely statistics... ... >I think this qualifies this article to be of interest to those interested >in surveillance & privacy... Comments list? I found the original article about porn in the workplace interesting for the reasons you've mentioned: a statistical reference (might be right, might be wrong but it is one of the few published stats around) and reference to file forensic technology. Whether I agree with the article or not, it is a useful item. The article raises some interesting topics of how one compiles stats about porn in offices or any other parameter. Direct visual examination of each file? Check of filenames for likely porn files? (This consideration lead me to modified an acronym in a file about "Leaking Underground Storage Tanks" for a government Web page I was working on so that it wouldn't come up as a "lust" file. ) There are programs that attempt color and texture analysis of graphics files for certain anatomical features and bodily fluids. The Georgetown Law journal issue which contained the famous/infamous Rimmer net porn text had a footnote referring to the development of such programs. More recently, I read a column in an computer magazine about a graphics analysis program to find possible porn pictures. The report (I'll need to look around to see if can dig up the references) mentioned mixed results. The writer tried a classic nude painting, the program did not flag it. But the program flagged a color scheme for Windows 95 that uses warm peachish colors. Has anyone else seen report about such analysis program? Or better yet, tested them? I am curious about the technology. (BTW, this technology is a relative of analysis programs for geological data.) J.D. Abolins ************************************************************************** 21)From: Robson Steve Subject: Re: Counting money In relation to the thread on this subject. Thought to consider:- Scanning one note at a time is plausible, assume each note has a separate serial number or identification sequence it follows that then each note could be individually identified and tracked in circulation. BUT what happens when all of these strips are pressed together in a bundle. Using magnetic information in the metal strip again causes conflict try storing two bank cards with magnetic strip together (strips pressed together) for any long periods of time to see what happens. This would cause MAJOR CONFLICT in a banking situation. I would be more concerned with using a visa card or bank card than I would be using cash. Stephen.. ************************************************************************** 22)From: semi-auto@juno.com (James C Sung) Subject: Re: Reptile's comment about AOL and AOL 4.0 Reptile was correct in that there were many security risks involved with AOL. However, AOL has seemed to taken many security precautions to elaborate their concern in this matter. And, it seems that less and less members are falling for the password phish trick. Yet, it is still relatively easy to scam members and the service itself in many aspects. With that many members, usually the worst they'd do if you'd try to scam them or a member would be to cancel your account. Anyways, in the pornography bit that SpyKing posted before, AOL is also invading the privacy of its members by collaborating with the Feds. Perhaps AOL indeed has two faces... so, newbies beware. Subj: Fwd: AOL 4.0 is an Intrusion of Privacy - IMPORTANT! Date: 97-10-05 23:53:30 EDT >From a former AOL employee: I'll try and cut through the crap, and try to get to the point of this letter. I used to work for America Online, and would like to remain anonymous for that reason. I was laid off in early September, but I know exactly why I was laid off, which I will now explain: Since last December, I had been one of the many people assigned to design AOL 4.0 for Windows (AOL 4.0 beta, codenamed Casablanca). In the beginning, I was very proud of this task, until I found out the true cost of it. Things were going fine until about mid-February, when me and 2 of my colleagues started to suspect a problem, an unexplainable 'Privacy Invasion', with the new version. One of them, who is a master programmer, copied the finished portion of the new version (Then 'Build 52'), and took it home, and we spent nearly 2 weeks of sleepless nights examining and debugging the program, flipping it inside-out, and here is what we found. Unlike all previous versions of America Online, version 4.0 puts something in your hard drive called a 'cookie'. (AOL members click here for a definition). However, the cookie we found on Version 4.0 was far more treacherous than the simple internet cookie. How would you like somebody looking at your entire hard drive, snooping through any (yes, any) piece of information on your hard drive. It could also read your password and log in information and store it deep in the program code. Well, all previous versions, whether you like it or not, have done this to a certain extent, but only with files you downloaded. As me and my colleagues discovered, with the new version, anytime you are signed on to AOL, any top aol executive, any aol worker, who has been sworn to secrecy regarding this feature, can go into your hard drive and retrieve any piece of information that they so desire. Billing, download records, e-mail, directories, personal documents, programs, financial information, scanned images, etc ... Better start keeping all those pictures on a floppy disk! This is a totally disgusting violation of our rights, and your right to know as well. Since this is undoubtably 'Top Secret' information that I am revealing, my life at AOL is pretty much over. After discovering this information, we started to inform a few other workers at America Online, so that we could get a large enough crew to stop this from happening to the millions of unfortunate and unsuspecting America Online members. This was in early August. One month later, all three of us were unemployed. We got together, and figured there was something we had to do to let the public know. Unemployed, with one of us going through a divorce (me) and another who is about to undergo treatment for Cancer, our combined financial situation is not currently enough to release any sort or article. We attepted to create a web page on three different servers containing in-depth information on AOL 4.0, but all three were taken down within 2 days. We were running very low on time (4.0 is released early this winter), so we figured our last hope to reveal this madness before it effects the people was starting something similar to a chain letter, this letter you are reading. Please do the following, to help us expose AOL for who they really are, and to help us and yourself recieve personal gratification for taking a stand for our freedom: 1. Forward this letter to as many people as you can (not just friends and family, as many as you can!) 2. Tell people who aren't on America Online in person, especially important people (Private Investigators, Government workers, City Council) 3. If the information about the new version isn't exposed by the time aol is released early this winter, for your own protection, DON'T DOWNLOAD AOL 4.0 UNDER ANY CONDITION!!! Thank you ---> However, this could just be the ramblings of some disgruntled former CompuServe employee. @;-) Semi-Auto@Hot-Shot.com ************************************************************************** 23)From: mike kessler <"mike2@injersey.com"@injersey.com> Subject: Re: Kamakazi Pilots Where did the idea come from that the Kamakazi pilots wore crash helmets???? The fact is most of them wore nothing more on their heads than a prayer bandana and goggles. (And most were wired by heavy amphetamine doses.) ************************************************************************** 24)From: "Shadow Chasers" Subject: DISINFORMATION! I'm sure between the 2400+ SL members, a Little Brother/Sister is working for BIG BROTHER and can dispel between FACT & FICTION about the 'Remote Money Counting" topic of discussion, without violating secrecy laws or at least a SL member that works for the company that designed such "Stealth Technology" that seems to have eluded "Us"; the subject matter experts in collecting and disseminating information! But since we are on the topic of of spreading DISINFORMATION in regards to monitoring technology, what about the device being used at JFK INTL that can see right through a person's clothes (NOT XRAY) but a variant of it? Supposed to be used for DRUG Interdiction, but can also detect LARGE SUMS of MONEY? ************************************************************************** Who are you? What's your specialty and/or interest? Let us know about your company... What would you like to see on the list? Post it. Let us know... Do you have something to contribute? We'd like to hear it... We want to know EVERYTHING and ANYTHING about eavesdropping, surveillance, countersurveillance & privacy related technology, etc... Remember: who, what, where, when, how & why... we want ALL the details... Do you have a question? Post it... A little free time? Help a member... With the INCREDIBLE brain power on this list, someone should have the answer ;-) P.S. Don't be a LURKER... Members take the time to post info for us all... give something back... Don't just take... Your input/knowledge is valued... ************************************************************************** Send Postings to: spyking@con2.com with "Post" in subject field with subject ************************************************************************** Subscribe to: spyking@con2.com In the subject field type: subscribe-surveillance list e-mail address ************************************************************************** Unsubscribe to: spyking@con2.com In the subject field type: unsubscribe-surveillance list e-mail address ************************************************************************** ...The Simple Rules of the Surveillance List... The Surveillance List Owners may Reject any posts that are/contain: 1) Info Unrelated to Eavesdropping, Surveillance or Privacy technology... 2) Flames or Negative posts... 3) E-Signatures that are considered excessive... 4) Advertisements not DIRECTLY related to the list topics... 5) Attached Files... 6) Oversized Posts... (May be edited to save room) **************************************************************************** This publication is copyrighted and is protected by U.S. and International copyright law. The information transmitted on this list may not be reproduced, reposted or forwarded to any non-list member without expressed written permission of the List Owner. Violation of U.S. copyright law is a criminal and civil offense... **************************************************************************** The Surveillance List is Moderated by SpyKing@thecodex.com The List Owner will make EVERY effort to protect subscribers from spam... Copyright 1996, 1997 Codex Publishing Inc., All Rights Reserved... **************************************************************************** ****************************************************************************** The Official Newsletter of W.A.S.P. The World Association of Surveillance Professionals http://www.thecodex.com/wasp.html ****************************************************************************** Vol.Two Issue #215 The Surveillance List Oct.9,1997 Over 3000+ Members Worldwide Representing 53 different countries List Chat at: http://www.thecodex.com/chat.html ****************************************************************************** While we STILL feel there is NO SUCH THING as a stupid question... We suggest the newer list members AND the technically challenged browse through the FAQ before posting a question... Surveillance List Pseudo FAQ at: http://www.thecodex.com/faq.html P.S. If you have something to add to the FAQ, let us know... ****************************************************************************** IN THIS ISSUE... ****************************************************************************** 01) ON-GUARD 02) GPS TRACKING 03) Remotely Counting Money 04) Simple TSCM techniques? 05) SPY SHOP FOR SALE 06) Re: To remove strips in money 07) Product to foil speed cameras/List thoughts 08) Re: More money madness... 09) Reverse Lookup - infospace.com 10) Soundcode Announces 56-bit Export License 11) R U A Technology Skeptic? 12) MODIFIED CELLULAR PHONES $400 13) Big Government Database 14) A Networking Party NYC 15) Forensic Sound 16) Re: Remotely counting money 17) China vs. Badcoffee prose 18) Re: Kamakazi gadgets 19) Re: prior government service 20) Re: Magnetic cards and hotel room doors 21) Compilation of information on disk 22) World's smallest! "FirstFone" GSM cardphone ****************************************************************************** DON'T BE A LURKER.... GET INVOLVED... YOU ARE A MEMBER... MAKE THE MOST OF IT ****************************************************************************** 1)From: "Shadow Chasers" Subject: ON-GUARD "ON-GUARD" an electronic ignition immobilizer and GPS tracking unit about the size of a carton of cigerettes and selling for about $1000 is capable of of the obvious! My question "What does it take to acquire the monitoring technology required to track/located a vehicle equipped with similiar "ON-GUARD" devices?" Before SL members ask, the only thing I know additional about "ON-GUARD" is that the company is supposed to be located in San Antnio, TX! ************************************************************************** 2)From: "Shadow Chasers" Subject: GPS TRACKING CarCop almost the same as ON-GUARD in regards to GPS tracking! Again, my question is how to aquire the monitoring technology and the cost's associated with it? FROM CNN's WEB SIGHT: http://cnn.com/TECH/9605/07/t_t/car.cop/ "CarCop security system. CarCop employs the satellite network known as the Global Positioning System (GPS) to help authorities track stolen or carjacked vehicles. In addition to a small GPS device, the CarCop system has a computerized car alarm and a cellular phone. The phone links the unit to an emergency response center staffed by professional operators. Computers using the GPS data display the car's location on an electronic map. The operators often can identify the location of a CarCop unit down to the road and direction it is traveling, almost anywhere in the United States. CarCop offers security, however, only if it knows to alert the response center when trouble makes an unwelcome visit. To foil carjackers and less threatening thieves, CarCop requires the driver to enter a deactivation code on a keypad every time a door is opened. The security system silently phones home if the code is not properly entered. Operators can then listen to the vehicle's interior via the cellular link to determine what's going on. If need be, the operator can talk to the driver, asking for a pre-assigned password to confirm the driver's identity. The operator then can call for emergency help if warranted. If a savvy carjacker orders a hostage to deactivate the system, the driver can use an alternate, emergency code that tells the response center to send help immediately. But it is the CarCop's ability to contact help without human input, when trouble is in the passenger seat CarCop joins the ranks of other systems on the market at a price coming in at just under $1,000" ************************************************************************** 3)From: FGM7516@aol.com Subject: Remotely Counting Money I would like to sincerely express my appreciation to all those who responded seriously to my friend's story about the ability to detect and count money from a distance. It is NOT a felony to honestly say to one's associates: I don't know *everything* that's going on ... what can you tell me about that? Ridicule is not an appropriate or helpful response. It is obvious from the replies that there is (as the moderator says) an incredible amount of brainpower on this list, as well as a bit of smug arrogance from those who tell us silly and paranoid boys and girls not to be afraid of the dark. But different kinds of people are what makes the world wobble on its orbit. Obviously, there is *some* kind of existing technology that was built up into such an urban legend, but I am now convinced that my friend's story is beyond what anybody can currently do. Ask me again a few years from now .... Years ago I attended a small briefing in Washington, DC, by the U.S. Treasury Department about the establishment of a new organization that would be part of the drug war. It was to be called the "Financial Crimes Information Center" (FINCEN) whose mission was (and is) to track money laundering by keeping *detailed* records of the flow of money via bank accounts and the movement of currency. Banks had no choice but to provide the information to the government under the legislation that created FINCEN. It is the financial equivalent of the FBI's computerized National Crime Information Center (NCIC). Anyway, the briefer began his remarks with this blunt statement -- which I have never forgotten: "If you like NCIC, you're gonna love FINCEN." In that light, my friend's story of the truck driver had more than the usual interest for me. It seemed really far-fetched, but I'm no expert, and I remembered that briefer's opening line. I thought I knew where to find some experts, however, and they're very likely on this list. So I thank those who responded with serious information, and for those who patted us on the head and said to stop worrying about nonexistent technology ... Did I ever tell you the really stupid story that's going around ... about how somebody can hear your private conversations from across the street by bouncing a laser beam off your window? Ha ha ha ... what a ridiculous piece of paranoia! ! ! Sheesh! ************************************************************************** 4)From: countfloyd@webtv.net (Pat Pierce) Subject: Simple TSCM techniques? It seems to me that I read somewhere that a simple technique to finding out if you are being bugged is to take a tranistor radio and tune it to AM or FM (I don`t remember which) and turn the dial either all the way to the right or to the left (again I don`t remember which). You would then pass it over the suspected area like your phone and if there is a bug you would get either feedback or some type of noise as the radio is passed over the bug. Has anyone else heard of this or any other simple techniques? ************************************************************************** 5)From: "John C. Borden" Subject: SPY SHOP FOR SALE Have complete SPY SHOP contents for sale in Canada. Many high end items in stock, name is registered and trademarked, complete POS and standalone computer, counters and impressive display cases. Will sell separate items only if stock is sold completely. E-Mail Replies To: johnny@thezone.net confidence is assured ************************************************************************** 6)From: Mix Subject: Re: To remove strips in money In many countries it is illegal to deface money so do not do it! For academical purposes however.... 1)make a very sharp fold just to the left of the strip so that the back of the note forms the centre of a folded page. 2)Now while the note is folded flat, introduce a slight "creep" into the paper and again fold tightly. This has the effect of making the next fold slightly to the right of the first fold. 3) continue step 2 until the fold is on the right hand side of the strip. 4) do step 1-3 again but this time so that the front of the note forms the centre of a folded page. 5) do steps 1-4 a few times and make sure that the folds are tight 6) straighten out the note and look at the top (or bottom) edge - thickness wise, it appears swollen as exagerated below ----------------o-------------------------- | | | | | | | | | ----------------o-------------------------- 7) Inset a needle into these holes. If you have folded the paper enough times, you should be able to start to separate or loosen the strip 8)after a about a 1/4 inch the hole is too small , so set a pair if sharp nose tweesers to open it up a bit. 9) remember to work both edges. a) youg might want to reace more than just the width if the strip. b) Yes, it is time consuming!!! How do they get the strip in there like microsoft licenses and british money. (ones where the paper has holes and the silver strip can be viewed??? ************************************************************************** 7)From: Mix Subject: Product to foil speed cameras/List thoughts Its claim to fame is that when you spray your number plate with it, it forms a clear undetectable clear finish. This clear finish is composed of millions of small transparent balls. The net effect of this is that they act as small prisims that refract the light to the extent that a photo taken of a treated plate will simply result in a white patch appearing instead of the number plate in the neg. or developed photo. Beyond these parameters the developers have made no comment to the best of my knowledge, but, it does not take a gigantic leap of imagination to begin wondering what other applications it could be used for. Weather it would work in these contexts remains to be seen. I suspect that the paint when dry would be more or less brittle thus limiting its application outside it's design boundaries. Pick a good search engine and limit the search to New Zealand sites using the term Flashback. I used Alta Vista a few months ago with the following;- Host:.nz Flashback This stuff is not a gimmick , people in the know throughout Australia are ordering it through mail order from the NZ developers. It retails for about a US$90. On a different note I would like to make mention of a few thoughts that I have had regarding the Signal to Noise Ratio in recent months. 1 I appreciate Spykings tolerance in posting some of the stuff i read on this list. It must take a fair amount of restraint not to bin some of it strait up. But maybe there is a middle ground here.(g) Pehaps some of this material that some would refer to as "Undocumented or Classified" and others as "Urban Myth" be included as an addendum and politely titled Addendum or something such similar and listed in the main index and if we were interested we could go to the addendum section. Which could either be a seperate envelope or just put at the bottom of the main section. If this cuts down on content then perhaps Mr. King (g) could issue the letter every 48 hours. This would give the editor more time to arrange his list. As you would have only to issue your list 4 times a week instead of 5 maybe Mrs. King could get some of your time (g. again). Another approach could be to one of "benign intervention" where you could publish and at the end of the article give an alternative newsgroup or area for discussion of such matters. That would give everyone on the opportunity to reply in person and/or assess what is being presented. The fact is that if the list is to evolve it must choose a direction and head for it. Thanks for the bandwidth SK. I enjoy your list a great deal. 01 +++Moderator's Note+++ Regarding the list format, I am open to any and all suggestions. The present format seems to be standard and used by most lists I subscribe to... that's why I used it here... In my opinion a newsgroup would be a mistake. Most newsgroups now are inundated with spam which resulted in the formation of many current lists on a variety of topics... What I would like to see is a weekly chat forum of list members at a designated time and day... any ideas list? The list is sent daily Monday thru Friday - SpyKing likes his weekends off ;-) ************************************************************************** 8)From: crudgmar@sprynet.com Subject: RE: More money madness... To: Mutter I have never stated at anytime, or anywhere that matters of personal privacy were stupid. The gist of what I said, was, that there are stories abound, that purport all sorts of scenarios, and "truth"...that just do not hold water, that people believe in...that is their right to do so. Technology CAN do many things, but it has yet to count money on a person, anymore than it can act as a meat-detector, and show what kind of meat a person has in their belly. Government DOES, have too much power to try to control information, and gather it, and prevent others from doing the same, no doubt about it. But let's be real here, I did not see the program mentioned with regard to a "demonstration"...did the possibility ever occur to you, that it may have been propaganda, to try and thwart the sort of criminal activity shown? I mean.....after all, our government would NEVER lie to us,....WOULD THEY? (sarcasm, too!) ************************************************************************** 9)From: "dshArk AKA mofo@from.net" Subject: Reverse Lookup - infospace.com http://www.infospace.com Very fast ************************************************************************** 10)From: Pete Adlerberg Subject: Soundcode Announces 56-bit Export License FOR IMMEDIATE RELEASE For More Information 425.828.9155 info@soundcode.com Soundcode's Point 'n Crypt? Receives Approval for 56-Bit International Export Smartcard-enabled Point 'n Crypt Approved for 56-bit Export from the US October 7, 1996 -- Kirkland, Washington Soundcode, Inc. announced today that its Point 'n Crypt? desktop encryption software has been accepted as a global 56-bit encryption product under the U.S. government's new export regulations. Point 'n Crypt is one of the first general-purpose 56-bit level encryption products approved for export by the U.S. government. The license includes the export of both 56-bit DES (the Data Encryption Standard) and 56-bit Blowfish algorithms implemented in Point 'n Crypt. "Solid, easy-to-use encryption should be an integral part of any company's international and domestic security policy. Now with U.S. government approval, Point 'n Crypt is the best solution available to protect local or network files," said Pete Adlerberg, Corporate Development of Soundcode. "Now we are able to export strong encryption technology overseas without compromising the integrity of the product or the strength of the encryption." The license allows export of strong encryption technology to all but embargoed countries, namely Cuba, Iran, Iraq, Libya, North Korea, Sudan or Syria. The authorization allows Soundcode to export strong, 56-bit encryption without a requirement that the exported products contain key recovery features or other back doors that allow government access to keys. The U.S. government restricts the export of encryption using key lengths in excess of 40 bits. However, 40-bit cryptography is weak and has been broken in a few hours with a focused attack. 56-bit cryptography is about 65,000 times stronger than 40-bit adding significantly greater security. "Soundcode opposes export controls on cryptographic software, but this license is a major step toward meeting the global security needs of our domestic and overseas customers," said Jim Adler President of Soundcode. "User demand for strong cryptography is growing worldwide." said Adler. "And Soundcode is now freer to export one of the best products the US has to offer." About Soundcode, Inc. Soundcode is a world-wide supplier of encryption and digital signature software. Discover how we are making your Internet a safer and more private place. Soundcode, data security for the rest of us. Soundcode, Inc. 11613 124th Avenue NE, Suite G-317 Kirkland, WA 98034-8100 1.888.45.SOUND 425.828.9155 425.889.0187 info@soundcode.com ************************************************************************** 11)From: FGM7516@aol.com Subject: R U A Technology Skeptic? Y'say you're nobody's fool? Y'say you don't believe those claims about bizarre new technology? Run *this* through your credibility filter -- --------------------- Aviation Week & Space Technology Magazine; October 6, 1997 BULLET CATCHER A unique projectile interceptor system has been patented by scientists at the Lawrence Livermore National Labs in California. Tentatively called Defender, when a specialized infrared sensor detects and tracks an incoming projectile, a "flinger" mechanism launches a protective disk. The disks, made of composite material similar to body armor, are aimed and timed to intercept the incoming projectile and absorb impact energy, according to project engineer Lee Pittenger. Defender technology could be useful for unobtrusive point defense against gunfire. END Your ball.... ************************************************************************** 12)From: CS CUSTOM Subject: MODIFIED CELLULAR PHONES $400 MODIFIED CELLULAR PHONES $400.00 MOTOROLA, GE ERICSON, OKI 900 ALL PHONES ARE COMPLETELY MODIFIED AND ESN COULD BE PROGRAMABED THRU HANDSET. PHONES INCLUDE NEW BATTERY, CHARGER AND CIG. ADAPTOR. C&S CORPORATION http://www.cscustom.simplenet.com/cellprogram.htm http://www.cscustom.simplenet.com/cellext.htm "THE CELLULAR EXPERTS." For all your Cellular needs. We Specialized in all types of Cellular Programming Software and Equipment, ESN and PIN Readers and Programming Clips for OKI’s, GE, Ericsson, Motorola’s and more. Cellular Extensions, also 100’s of Refurbished Phones currently available. Motorola, Panasonic, OKI, Ericsson, GE, AUDIOVOX, NEC, NOKIA, Mitsubishi, Sony and much more. 24hr Fax and info. line in the US (301)593-9021 Voice (301)593-7782 / (301)593-7886 10am-4pm EST For your convenience we accept all major Credit Cards and we do ship COD via FEDEX PS Proof of Cellular Dealership required to purchase ESN Readers. We also sell data card readers and writers. Call for info. ************************************************************************** 13)From: Ethan Munson Subject: Big Government Database I ran across a story in the NY Times today that said that the government will soon have a database of "every person newly hired by every employer in the country". A longer snippet: President Clinton will soon announce the National Directory of New Hires, which is required by the 1996 welfare law. But the directory is not just for welfare recipients. It will record basic information, including names, addresses, Social Security numbers and wages, for everyone hired after Oct. 1 for a full- or part-time job by an employer of any size. This does have some positive uses, like tracking down deadbeat parents (which the article emphasized), but I find it more than a little scary. For more info, see http://www.nytimes.com/library/cyber/week/092297child-support.html ************************************************************************** 14)From: BADCOFFEE@aol.com Subject: A Networking Party NYC Guys, Just sent to me. This IS the place to be. NO excuses on not knowing anyone. IT's OUT there. Nevermind the age restrictions. I don't see them turning anyone away. Augie A Networking Party For Young Professionals and Artists "I Am Inviting The Most Interesting People to Bring Interesting People" Hi. I'm sending you this message to invite you (and an interesting friend, if you'd like) to one of the after-work parties I help put together. We call each event a Netparty because the events are "networking parties" -- a chance for young professionals, as well as those involved in artistic pursuits, to network with each other, mingle, and otherwise interact. Over 800 young professionals attended our last Netparty. A Netparty is a place where doctors and advertising executives, lawyers and actresses, writers, investment bankers and other professionals and artists can interact on both a business (we encourage those who attend to exchange business cards) and social level. A Netparty also provides an opportunity to meet in person those who you might otherwise have only communicated with on "the Net" (that's another reason we call each event a Netparty). Crain's New York Business has called networking parties a "genuinely original idea." Each Netparty is held at a mansion or nightclub in New York City and is very inexpensive -- only $8. This includes quite a bit -- for this week's party it includes complimentary hors d'oeuvres, a live band on one floor, a DJ on another floor, and a lounge on a third floor. We don't sell tickets in advance -- only at the door -- so if you feel like stopping by after-work, you can just drop in. In some ways attending a Netparty is like going to a nightclub -- except that at a Netparty the music is never so loud that you cannot talk and the crowd is comprised of young (20s, 30s) professionals and artists. Our next Netparty will take place on Wednesday, October 15, at Le Bar Bat (located at 311 W. 57th St., btwn. 8th and 9th Aves, in Manhattan). The party runs from 6:00 p.m to 10:00 p.m. If you haven't been there before, you'll love Le Bar Bat. It has 3 floors and we'll be doing something different on each floor. On the main floor, we'll be serving complimentary hors d'oeuvres from 6:00 - 7:30 p.m. At 7:30 p.m., an amazing live band -- New York City Swing -- will take the stage on the main level. Don't be fooled by the name -- these guys play incredible r&b and dance music. Downstairs is the "dungeon," -- a subterranean disco. Upstairs you can grab a drink at the "Belfry Bar" and retire to the Borneo Room lounge for quiet conversation (remember to try a "Bat Bite" -- a devilish frozen concoction made of 3 kinds of rum and grenadine). There are a few things you should know before deciding whether to attend: * Dress Code: Netparty events are after-work networking events for young professionals and you must dress accordingly. For women, jeans are not allowed. For men, a jacket, or similarly professional attire, is required. Sorry, but in order to protect the integrity of the event, you will be turned away if not dressed in a way deemed suitable for the event. *Age: At this time, our events are only for those in their 20s and 30s . (21+, of course). * Parking: We have arranged for discounted parking for those of you who will be driving into Manhattan to attend the event. Simply park across the street from Le Bar Bat at Quik Park (320 W. 57th St.). Let us validate your parking stub and parking is only $8 for the duration of the party. * Questions: We are always available to answer any questions you might have. Simply hit "Reply" and e-mail us or call us at (212) 969-0293. * To Be Immediately Removed From the Netparty E-Mail List: If you are not interested in our events, we are sorry to have taken up your time. To be immediately removed from our e-mail list, simply hit "Reply," and send us a message with the word "Remove" in the subject line of your message. Thanks for taking the time to read this long e-mail. We hope to see you at the party! +++Moderator's Note+++ I don't know the people running this affair but I do know the "Le BarBat"... it's great place... I'll be there ;-) If anyone else is gonna go let me know and we'll hookup... ************************************************************************** 15)From: Manatau Subject: Forensic Sound A while back i posted that I had found a new program for cleaning up surveillance tapes and several people ask me to up date any findings. The best program i have come across is "Dart Pro." It is so good i reviewed it in my news letter www.sierranv.net/sds This program is priced right and allows you to identify a noise on the tape then erase every occurance on the tape. The best part is they now have released a 32 bit version with even more tools. You can check it out a http://www.tracertek.com . Hope you like it. K.C. sds@sierranv.net +++Moderator's Note+++ I've been using DART Pro for some time now and it's a great program. ************************************************************************** 16)From: "John " Subject: Re: Remotely counting money If anybody wants any money counted 'remotely' ...... I'm off to Siberia soon! XSAS ************************************************************************** 17)From: Jim Motes Subject: China vs. Badcoffee prose > Short Version Below > 12)From: China > Subject: Re: traditional vs non-traditional media > > Spyking, if the following post is too lengthy or inappropriate, please > feel free to exercise your discretion, and I apologize in advance if such > is the case. > > Recently I read a statement in one of the posts wherein a member was > disdainful of a possibility which suggested the government's ability to > remotely discern the amount of money an individual was carrying, and his > reason for such skepticism was that he had not witnessed any mention of the > topic by the "mainstream" media. While there may or may not be merit to any > skepticism for the validity of the topic itself, I question the reason for > that skepticism. > Did anyone else immediately see the resemblance between Augies and China's literary ability. hahahah sorry Augie, I had to take this shot Respectfully, Jim ************************************************************************** 18)From: BADCOFFEE@aol.com Subject: Re: Kamakazi gadgets Rikk Kidd writes: >>>We found the transmitter located in the fold of an envelope of a piece of unopened junk mail he had just thrown in the trash. <<< Augie writes: Man....simply amazing. EFFECTIVE. Im about now wondering.....HOW small, how tiny, how creative can we possibly get? NO end to it. :-) Here is a wonderfull example of a kamakazi gadget. Radio Shack sells something in kit form called "FM wireless Mike". Learing the basics of electronics I decided to pick one up. I opened the box and was completely amazed on the size of this thing. The WHOLE transmitter is no bigger than 3/4 wide, 1" long and 1/2" thick. The range is about 50 feet. Tunable on FM radio. It runs off a type "N" batter that has a life of 80 hours. Plesssssse, someone tell me what other use this thing has besides being a BUG....and I'll be your best friend. I have not put this BUG together yet and tested it. I am a human electrinics basket case and I predict this gadget of no more than 20 peices shall take me aproximately 2.6 years to assemble. I'll let you know how it tests in 1999. This item costs $11. A pro could assemble it within 15 minutes. This is PRIME Kamakazi gadget. Note: Radio Shack purchases. Pay CASH and ignore all the stupid personal queastions they ask you. This devise MAY be tracable if your dumb enough to give proper information. Catalog number: 28-4030 If anyone out there would like to pick one up and suggest any modification to this to increase power......Im sure we would ALL apreciate it. Augie ************************************************************************** 19)From: Jim Motes Subject: Re: prior government service > After many years of working with and around the govt I do know a few > things. > So does Congress, Bill Clinton, Wong, The FBI, CIA, Janet Reno, etc... but it doesn't mean any of you ever bother to share what you know, or that what you know is the truth. Not to bust your chops, but I personally don't use my prior government service to lend credibility to what I say. Now if you said your mom told you it couldn't happen...that's a different thing all together Jim Seller of computers and other breakable stuff. ************************************************************************** 20)From: BADCOFFEE@aol.com Subject: Re: Magnetic cards and hotel room doors Re: Magnetic cards and hotel room doors Mix, I beleive that when you check in, it is for a certain period of time. At the check in desk you are issued a card key. The key is programmed to the amount of time (days) that you hava paid for. The FIRST time you use your card (swiping it) it programs the computer in the lock. When you swipe it for the first time...the computer is getting the following message: A: Im not opening up for any other card but this one. B: This dude paid till Friday, so Ill keep accepting this card till Friday. But then again......I could be wrong. :-) Augie (nice to see the lock questions coming back. I MISS them) ************************************************************************** 21)From: Jim Motes Subject: Compilation of information on disk Just a note to any of you who might want to put information together for sharing among members but think a CD is overkill. I am using LS120 Floppy drives in my computers and these are excellent for storing valuable information, take no talent to use and are very inexpensive (by my standards). The LS120 is a floppy drive that can accomodate a standard floppy disk (720KB to 1.44MB) and also uses a 120MB floppy disk. On newer motherboards it can be booted to, it uses an IDE Cable and is an IDE Drive. It's also called Floptical. The 120MB disk is the same size as your standard 3.5" floppy. This is a nice size for information storage, fits in a shirt pocket and unlike a CD-ROM, if someone picks it up and tries it in a standard 3.5" drive, they won't be able to read it. You can write and rewrite to this as often as you like. Basically it's a small hard drive in a floppy disk. I'll be glad to answer any questions and would not be opposed to doing the work to produce these diskettes. Jim ************************************************************************** 22)From: "African Cellular Resource" Subject: World's smallest! "FirstFone" GSM cardphone The first pics and specs of the world's first GSM cellular cardphone are available at http://www.cellular.co.za This is the world's smallest GSM phone ************************************************************************** Who are you? What's your specialty and/or interest? Let us know about your company... What would you like to see on the list? Post it. Let us know... Do you have something to contribute? We'd like to hear it... We want to know EVERYTHING and ANYTHING about eavesdropping, surveillance, countersurveillance & privacy related technology, etc... Remember: who, what, where, when, how & why... we want ALL the details... Do you have a question? Post it... A little free time? Help a member... With the INCREDIBLE brain power on this list, someone should have the answer ;-) P.S. Don't be a LURKER... Members take the time to post info for us all... give something back... Don't just take... Your input/knowledge is valued... ************************************************************************** Send Postings to: spyking@con2.com with "Post" in subject field with subject ************************************************************************** Subscribe to: spyking@con2.com In the subject field type: subscribe-surveillance list e-mail address ************************************************************************** Unsubscribe to: spyking@con2.com In the subject field type: unsubscribe-surveillance list e-mail address ************************************************************************** ...The Simple Rules of the Surveillance List... The Surveillance List Owners may Reject any posts that are/contain: 1) Info Unrelated to Eavesdropping, Surveillance or Privacy technology... 2) Flames or Negative posts... 3) E-Signatures that are considered excessive... 4) Advertisements not DIRECTLY related to the list topics... 5) Attached Files... 6) Oversized Posts... (May be edited to save room) **************************************************************************** This publication is copyrighted and is protected by U.S. and International copyright law. The information transmitted on this list may not be reproduced, reposted or forwarded to any non-list member without expressed written permission of the List Owner. Violation of U.S. copyright law is a criminal and civil offense... **************************************************************************** The Surveillance List is Moderated by SpyKing@thecodex.com The List Owner will make EVERY effort to protect subscribers from spam... Copyright 1996, 1997 Codex Publishing Inc., All Rights Reserved... **************************************************************************** ****************************************************************************** The Official Newsletter of W.A.S.P. The World Association of Surveillance Professionals http://www.thecodex.com/wasp.html ****************************************************************************** Vol.Two Issue #216 The Surveillance List Oct.10,1997 Over 3000+ Members Worldwide Representing 53 different countries List Chat at: http://www.thecodex.com/chat.html ****************************************************************************** While we STILL feel there is NO SUCH THING as a stupid question... We suggest the newer list members AND the technically challenged browse through the FAQ before posting a question... Surveillance List Pseudo FAQ at: http://www.thecodex.com/faq.html P.S. If you have something to add to the FAQ, let us know... ****************************************************************************** IN THIS ISSUE... ****************************************************************************** 01) FileDeletion & Retrieval 02) Sorry about the pseudo English 03) Serious job request 04) Re: Tough group 05) ISpy Video Software 06) PI arrested for Spying 07) Help find lost brother 08) Re: GPS TRACKING 09) Re: Mylar 10) SoundCode Secure?? 11) List Chat 12) Re: AOL 4.0 13) Does anyone know if the following is true? 14) Re: More Money matters 15) Re: Simple TSCM techniques? 16) TSCM Specialist 17) Question about hidden cameras 18) Re: kamakazi 19) OnLine Background Check 20) HERF 21) Re: AOL cookie 22) Federal Grounds 23) Re: The Chat forum 24) Kamakazi gadgets 25) How to thwart hackers on the Net 26) Re: AOL bug ****************************************************************************** DON'T BE A LURKER.... GET INVOLVED... YOU ARE A MEMBER... MAKE THE MOST OF IT ****************************************************************************** 1)From: "Tom Tudor" Subject: FileDeletion & Retrieval I have been experimenting with deleting computer files, and then retrieving them. It is a pretty simple task to bring the files back with Dos's undelete command or a utility such as Norton Utilities unerase command. Most of you are probably already aware of the fact that when you delete a file, it is really still there! Only the first letter of the file name has changed. And if you don't copy over this file, it can be retrieved by the previously mentioned methods. Most of us have been told that if we are running Windows95, and we delete a file/files, they can be undeleted, but if we empty the "recycle bin", they are gone forever. This is simply not true. Again, the files can be recovered, if not written-over by other files. Recently I ran across a program that claims to be able to delete files, and try as you may, you can't recover them. The program is Mutilate v1.0b and works in conjunction with another file called Zapfile.com. I have tried the program and so far it does what it claims. You can still find the file name with the first letter changed, but when you use your undelete or un-erase to bring it back, it is there, but with 0 bytes. I tried it on text files and binary picture files. In each case, they were un-viewable! I have also been un-successful in recovering files that have been erased thru using the "Format C:/U", which is the switch for a "unconditional" format. If anyone has had any experience in recovering files that have gone thru the unconditional format, or programs like Mutilate, I would like to hear from you. Sincerely, Tom Tudor Timberwolf Private Investigations ************************************************************************** 2)From: Eric Schneider Subject: Sorry about the pseudo English After reading my recent posts, I must apologize for my atrocious use of the English language. I figured that I would apologize before the grammar and spelling police come get me! Spell checker on! Eric P.S. The call for a Colorado surveillance meeting is on... Drop me a note! ************************************************************************** 3)From: Eric Schneider Subject: Serious job request Is there anyone out there that would like to hire an electrical engineer? I am really interested in working in this field. I have a lot to offer and don't ask for much :) I will do contract work for custom designs as well. ************************************************************************** 4)From: Robson Steve Subject: Re: Tough group Augie, >>>> Man....love all you people but you all have to COOPERATE with my "Coffee once a week" gig. My past endevours: Get together (informal conference) in Vegas: ONE reply (my mom) Group health insurance possibility: Strike (no replies) Local (NJ, NY, CT,) coffee get together once a week or so.... <<<< I won't speak for anyone else on the list, but me. If I were in the States, you wouldn't be able to keep me away from having coffee with you. Apart from the fact that I'm a caffeine junkie, the information I could leech from you would no doubt prove invaluable. If I am ever in the states on business or pleasure you will no doubt be one of the first people I contact. Your constant contribution to this list is greatly appreciated. Stephen.. PS. Spyking - the same goes for you ************************************************************************** 5)From: SpyKing@thecodex.com Subject: ISpy Video Software What is ISpy? The ISpy webcam software grabs video images, saves them as JPEG, and sends the image(s) automatically to your homepage on the Internet! ISpy runs under Windows95 and WindowsNT 4.0, and works with any Video for Windows compatible framegrabber (digitizer). No user input required, no fixed connection nessecary, no browser plugins required. ISpy now even supports motion video with continuous uploads or image-loops! Download a trail version at: http://www.ispy.nl/ ************************************************************************** 6)From: SpyKing@thecodex.com Subject: PI arrested for Spying Three arrested on spy charges; one was Pentagon analyst By John Diamond, Associated Press WASHINGTON (AP) - Claiming to have cracked a spy ring that went undetected for two decades, the FBI leveled espionage charges Monday against a Pentagon analyst, her husband and another man. Investigators said the analyst bragged to an undercover agent how easy it was to steal secrets. Recruited by East Germany during their student days at the University of Wisconsin-Milwaukee in the early and mid-1970s, the three trained for years in the ways of Soviet spycraft, sought positions in and around government and used the access they gained to steal classified documents, the government alleged. When the Cold War ended, the husband-wife team and the third person, an expert in Slavic languages, sought new opportunities spying for South Africa, according to the allegations. Theresa Marie Squillacote is quoted in the allegations as exclaiming in joy after making a new contact last year with a man she thought was a South African official. "All those years and I did it!'' she is quoted as saying in an intercepted telephone call. In fact, the man was an FBI agent under cover. In a brief appearance in federal court in Alexandria, Va., Monday, Squillacote, 39, the former Defense Department analyst; her husband, Kurt Alan Stand, 42, a labor union representative, and James Clark, a private detective, were charged with attempted espionage and conspiracy to commit espionage. The latter crime carries a maximum life in prison and $250,000 fine. Stand and Squillacote were arrested after they were lured to a hotel in Arlington, Va., Saturday for what they thought was a meeting with one of their South African contacts. Clark was arrested Saturday at his Falls Church, Va., home, the FBI said. The investigation was aided by a wealth of intelligence collected by electronic interceptions, interviews with former East German agents and highly sensitive East German intelligence records - including "true name cards'' that identify agents working in the United States. "When the Berlin Wall came down in October 1990, Kurt Stand, Terry Squillacote and Jim Clark did not surrender or lay down their tools of their espionage trade,'' said Thomas J. Pickard, assistant director of the FBI's Washington field office. Stopping short of charging the trio with actual espionage is standard FBI practice, because of the difficulty of proving in court actual spying. Nevertheless, a 200-page affidavit filed by Special Agent Katharine G. Alleman makes clear that the government believes the three gave secrets to East Germany. From there, the stolen information almost certainly would have gone to the Soviet KGB. The damage to U.S. national security appears less serious than the Aldrich Ames spy case, in which Soviets helping the CIA were exposed, or in the Walker spy case, in which Moscow was given secrets about U.S. nuclear submarines. The FBI says the trio obtained State Department, Pentagon and CIA documents on Soviet military plans and personnel. In addition, they are accused of providing information on chemical weapons that appears to have been of little interest to East Germany. A former senior intelligence official familiar with counterintelligence investigations said the U.S. analysis of Soviet plans and capabilities might contain clues that would have shown Moscow how the information was obtained, enabling the Soviet Union to clamp down on those leaks. Gradually, members of the group had become increasingly aware that they were at risk of discovery. According to the government's affidavit, electronic listening devices planted in Clark's apartment capture him apparently talking to himself: "The situation in your apartment ... security-wise, is awful.'' Later he says, "I was an agent for a long time for the communists ... ah, `FBI, you're under arrest.''' Stand, code-named "Junior,'' a native of New York, is described by the FBI as a spy recruiter for East Germany, having volunteered, according to documents from East Germany's Foreign Intelligence Service, on an "ideological'' basis. Squillacote, code-named "Tina,'' was born in Chicago and married Stand in 1980. She was also devoted to Marxism, the government says, but she told undercover agents that her husband came by his loyalty to communism at an early age from his parents. She and Clark, born in Lowell, Mass., were the primary intelligence-gatherers in the group founded by Stand, according to the allegations. Clark, a private investigator from Falls Church, worked for a defense contractor at the Rocky Mountain Arsenal in Boulder, Colo., in the mid-1980s. Under the code name "Jack,'' Clark allegedly passed on secrets about chemical warfare, including the formula for the deadly nerve gas Sarin. From 1988 until May, 1996, Clark was a paralegal working for the Army. The affidavit makes clear that the alleged espionage ring extended beyond the three defendants. Clark told an undercover agent "that he got from certain friends classified material - some of which `were classified pretty high,''' the affidavit said. Squillacote worked in 1990 and 1991 for the House Armed Services Committee, then chaired by Wisconsin Rep. Les Aspin, later President Clinton's first defense secretary. From 1991 to 1997 she worked in various positions at the Pentagon, including some that provided her access to classified information. Speaking to an undercover agent in a meeting Jan. 5, Squillacote is quoted as describing relative ease in spiriting classified documents out of the Pentagon. Squillacote told the agent, handing him a sheaf of papers, that she decided to "try to score what I could score,'' on a slow day at the office, the affidavit says. Although photocopying such classified documents would normally be forbidden, Squillacote is quoted as saying she could because "everyone was gone and because our office is very sloppy about it.'' Long-ago clues ultimately led to espionage arrests By John Diamond, Associated Press WASHINGTON (AP) - The clues that a bookish trio of academics and analysts might be spies emerged gradually. In June 1989, a State Department employee seeking the highest security clearance acknowledged he had given six to 10 State Department cables stamped "secret'' in 1981 to a man he identified as "Jim Clarke.'' The two men had socialized together occasionally and smoked marijuana, and the employee said he thought he was merely helping a struggling Russian language expert with his research. It would take eight years for the FBI to expand that snippet of information into the massive espionage case leveled this week against James Clark, a former civilian analyst with the Army; Theresa Squillacote, a Pentagon attorney; and her husband, Kurt Stand. The three, all former campus leftists who met in the 1970s at the University of Wisconsin, are in an Alexandria, Va., federal lockup awaiting a preliminary hearing Thursday on charges that could put them behind bars for life. One by one, other clues followed the first hint of trouble from the State Department employee. In March 1992, Western authorities obtained a Casio Digital Diary from Karl Heinz Michalek, a former East German intelligence officer arrested in Germany's post-Cold War cleanup. The diary contained indications that three Americans - a man who served as a recruiter, his wife and another man working for the Army - were continuing to work with their former East German intelligence handler even after East Germany ceased to exist. Three other East German intelligence officers arrested at the end of the Cold War described the Americans to investigators by their code names, "Jack'' (Clark), "Ken'' and "Tina,'' (Stand and Squillacote). "When the wall came down I said there had to be a lot of people in the West who were very uncomfortable,'' former CIA Director Robert Gates said. Indeed, as the FBI's 200-page affidavit states, at some point investigators gained access to documents from the files of the defunct East German HVA, the branch of the communist nation's security apparatus responsible for foreign intelligence. The documents identified three Americans by their code names, but also supplied detailed biographical information such as places and dates of birth. "They always remembered with German precision to radio birthday greetings to their mole and congratulatory messages when a son was born. So the intelligence agency in Bonn (West Germany) monitored this,'' said David Wise, author of a book on the Aldrich Ames spy case, of the East German intelligence service. With the help of the post-unification German government, federal investigators eventually came upon the "true name'' cards that linked the code names with actual identities. Beginning on April 19, 1995, the FBI searched Clark's condominium in Falls Church, Va., outside Washington, three times. The searches netted copies of the U.S. Code for espionage - under which Clark is now being prosecuted - cards pulled from a Rolodex with the telephone numbers of Squillacote, a short-wave radio, 3,500 German marks and diary notes that refer to meetings with an East German intelligence officer, the affidavit said. The key break quickly followed. In June 1995, Squillacote, allegedly casting about for new espionage opportunities, sent a letter to a South African government official hinting she would be a spy. The South African official, a leader of his country's Communist Party, turned the letter over to authorities who passed it to the U.S. government. Armed with this information, the FBI began to set a trap. Bureau lawyers went to a secret federal court and obtained permission under the Foreign Intelligence Surveillance Act to launch a massive "false flag'' investigation that would include phone taps and bugs, searches, electronic intercepts and the establishment of undercover agents posing as foreign spy handlers. The undercover operation began in September 1996, with agents posing as spies for South Africa contacting Squillacote and others posing as Russian agents contacting Clark. The agents wore recording devices to these meetings. In one meeting last April, Clark allegedly tells how his East German handlers told him to stop sending stolen documents inside the cover of books. "They said don't do that anymore. Start putting them in, for example, dolls,'' Clark said, according to the affidavit. Another extraordinary conversation shows Clark apparently oblivious to the trap as the undercover agent takes him through a list of documents he allegedly gave to East Germany during the 1980s. The conversation as recounted in the affidavit makes clear that the FBI knew what the alleged spies had given away, or sold, to the East Germans. This is highly unusual in espionage cases, where investigators often remain in the dark about what secrets have been lost. The White House apparently was in on the sting operation, going forward with a job interview of Squillacote for a national security budget post only weeks before her arrest. "It will necessitate a very high clearance level,'' Squillacote wrote in a Sept. 2 letter sent to FBI agents under cover. "We will really need to talk more about training and equipment.'' Stand and Squillacote were arrested last Saturday after they were lured to a hotel in Arlington, Va., Saturday for what they thought was a meeting with one of their South African contacts. Clark was arrested Saturday at his Falls Church, Va., home, the FBI said. ************************************************************************** 7)From: "D'Etta Zellman" <2jfklivs@3rivers.net> Subject: Help find lost brother Howdy, I'm looking for my lost half-brother who was born in California sometime in the 63 or 64's. Can someone help me get a hold of the right people? This is really had to co with limited acess and no funds. Thanks again for any information that someone can give me, it would mean the world to me. Please feel free to E-mail me at the following address 2jfklivs@nemontel.net Thanks again. D"etta ************************************************************************** 8)From: "Lorenzo Castillo Sanchez" Subject: Re: GPS TRACKING >FROM CNN's WEB SIGHT: >http://cnn.com/TECH/9605/07/t_t/car.cop/ I highly recommend you check out this website. I couldn't get the full address of the company but here's the website of CarCop and the tel# --->> http://www.carcop.com TEL# 1 - 888 - 777 - MSC1 I was wondering if there are any similar services in Europe and yes, we DEFINITELY need one in South America(esp, Mexico). For those of you living in the States, $1,000 is a pretty good investment for your safety. :-) ************************************************************************** 9)From: icathar@mail.club-internet.fr Subject: Re: Mylar >Technology CAN do many things, but it has yet to >count money on a person, > just to add a fact, taken from http://www.pleo.com/ which itself took it from Dupont de Nemour : Mylar® Electronic/Industrial High Performance Film Punched and formed parts of Mylar® Product Description: A complete line of strong, durable polyester films with many applications in packaging and in the wire and cable industry. Uses: [...] Magnetic media base for audio, video, and computer tapes [...] so technology can do something with Mylar. JeFF ************************************************************************** 10)From: "William H. Geiger III" Subject: SoundCode Secure?? -----BEGIN PGP SIGNED MESSAGE----- >10)From: Pete Adlerberg >Subject: Soundcode Announces 56-bit Export License >FOR IMMEDIATE RELEASE >For More Information >425.828.9155 >info@soundcode.com >Soundcode's Point 'n Crypt? Receives Approval for 56-Bit International >Export >Smartcard-enabled Point 'n Crypt Approved for 56-bit Export from the US >October 7, 1996 -- Kirkland, Washington >Soundcode, Inc. announced today that its Point 'n Crypt? desktop >encryption software has been accepted as a global 56-bit encryption >product under the U.S. government's new export regulations. Point 'n >Crypt is one of the first general-purpose 56-bit level encryption >products approved for export by the U.S. government. The license includes >the export of both 56-bit DES (the Data Encryption Standard) and 56-bit >Blowfish algorithms implemented in Point 'n Crypt. >"Solid, easy-to-use encryption should be an integral part of any >company's international and domestic security policy. Now with U.S. >government approval, Point 'n Crypt is the best solution available to >protect local or network files," said Pete Adlerberg, Corporate >Development of Soundcode. "Now we are able to export strong encryption >technology overseas without compromising the integrity of the product or >the strength of the encryption." Are you saying that your domestic code only supports 56-bit encryption?? I can't see how you can say that 56-bit DES and/or Blowfish provide a reasonalble level of security?!? I know of no one in the cryptology community that would agree with you on this. 56-bit DES/Blowfish may be many things but "strong" is not one of them. >The license allows export of strong encryption technology to all but >embargoed countries, namely Cuba, Iran, Iraq, Libya, North Korea, Sudan >or Syria. The authorization allows Soundcode to export strong, 56-bit >encryption without a requirement that the exported products contain key >recovery features or other back doors that allow government access to >keys. >The U.S. government restricts the export of encryption using key lengths >in excess of 40 bits. However, 40-bit cryptography is weak and has been >broken in a few hours with a focused attack. 56-bit cryptography is about >65,000 times stronger than 40-bit adding significantly greater security. True 56-bit DES/Blowfish is more secure than 40-bit DES/Blowfish but that does not make your software secure. 40-bit DES is better than plain text but I am not rushing out to use it when their are much better available. >"Soundcode opposes export controls on cryptographic software, but this >license is a major step toward meeting the global security needs of our >domestic and overseas customers," said Jim Adler President of Soundcode. >"User demand for strong cryptography is growing worldwide." said Adler. >"And Soundcode is now freer to export one of the best products the US has >to offer." This is not a major step forward for global security, though Soundcode may think it is a step forward for thier marketing efforts. I have one question to ask? Why would anyone use your *weak* cryptology when they can use *strong*, non-regulated, non-US crypto?? I would *never* recomend your product as long as it was so obviously lacking. Please do not consider this a personal attack. AFAIK you may have a very good product domestically, but lets drop the marketing hype and call a spade a spade. 56-bit DES is *weak*, 56-bit Blowfish is *weak*. There are no if, and, or, buts, about it. Weak crypto is weak crypto and this is what your export product is. - -- - --------------------------------------------------------------- William H. Geiger III http://www.amaranth.com/~whgiii Geiger Consulting Cooking With Warp 4.0 Author of E-Secure - PGP Front End for MR/2 Ice PGP & MR/2 the only way for secure e-mail. OS/2 PGP 2.6.3a at: http://www.amaranth.com/~whgiii/pgpmr2.html - --------------------------------------------------------------- -----BEGIN PGP SIGNATURE----- Version: 2.6.3a Charset: cp850 Comment: Registered_User_E-Secure_v1.1b1_ES000000 iQCVAwUBNDy8j49Co1n+aLhhAQHNkgP/U1X4bjAqspogzsSd7Iia67Swk9j4vJ3B BQnkhDpix7DGINKIUNFlwz2OfJv5xPWWd2JbZFRl2QijwwHdhS/A0g9qzNGnEOhi r1cXGyYLhth9joWjVidvwbmROicSxc4J7whvP+B5tDoX5X1k7qlNESrTRsh9UAiu 8oESlj/7MeE= =PtBy -----END PGP SIGNATURE----- +++Moderator's Note+++ May we assume that ANY exportable U.S. encryption programs have Big Brother built inside? What would be the suggested three top choices for FAIRLY SECURE encryption programs? ************************************************************************** 11)From: David Kale Subject: List Chat The moderator said he would like to see a chat area for members to talk. I sit here every morning from 8:00am to 9:00am PST and talk with Investigators all over the world. I would invite you all to join in the discussions. The URL is http://www.kaleinvestigation.com/chat.html I have been in business for 30 years and welcome your comments. -- Kale Investigation Agency 8221 E. 3rd Street, Suite 201 Downey, CA 90241 (562)869-2535 dkalepi@earthlink.net http://www.kaleinvestigation.com ************************************************************************** 12)From: ikkles@xchange.apana.org.au () Subject: Re: AOL 4.0 >> 1. Forward this letter to as many people as you can (not just friends >> and family, as many as you can!) >> >> 2. Tell people who aren't on America Online in person, especially >> important people (Private Investigators, Government workers, City >> Council) >> >> 3. If the information about the new version isn't exposed by the time >> aol is released early this winter, for your own protection, DON'T >> DOWNLOAD AOL 4.0 UNDER ANY CONDITION !!! Maybe I'm skeptical, but if you were privy to this information, would you distribute it in the form of a chain letter? More logical would be to set up the webpage on a server like paranoia.com, or somewhere in a country other than America, where the AOL Secret Service would be unable to touch it.. If this was anything other than a chain letter (or 'email virus'.. as soon as you read it, you begin infecting other peoples' mailboxes :) I would consider it seriously, but someone intelligent enough to uncover AOL's fiendish plot would surely be smart enough not to tell people via a chain letter.. Even so, I'll be following suggestion 3 :) Ikkles ************************************************************************** 13)From: "Shelle" Subject: Does anyone know if the following is true? I have found a disturbing page on the web..if someone named SandMan asks you to check out his page DO NOT! It is at www.geocities.com/vienna/6318 This page hacks into your C:/ drive. DO NOT GO THERE...FORWARD THIS TO EVERYONE...HE WILL REQUEST A CHAT WITH YOU....dont do it... With all the technology available now, I am wondering if this could be true. If so, it seems as though going on the internet isn't very safe anymore. astroldy@gte.net ************************************************************************** 14)From: Mutter Subject: Re: More Money matters > I have never stated at anytime, or anywhere that > matters of personal privacy were stupid. The > gist of what I said, was, that there are stories > abound, that purport all sorts of scenarios, > and "truth"...that just do not hold water, that > people believe in...that is their right to do so. Okay, and the gist of what I'm saying is that you shouldn't laugh at very real posssibilities. > Technology CAN do many things, but it has yet to > count money on a person, anymore than it can act I'm not saying it could 'count' money but I'm saying technology exists that can detect large concentrations of the mylar strips. Do you disagree with this? > as a meat-detector, and show what kind of meat a > person has in their belly. Government DOES, have > too much power to try to control information, and > gather it, and prevent others from doing the same, > no doubt about it. But let's be real here, I did > not see the program mentioned with regard to a > "demonstration"...did the possibility ever occur > to you, that it may have been propaganda, to try > and thwart the sort of criminal activity shown? I have no idea what demonstration or program you're referring to but my argument is not based on government information if that's what you mean. > I mean.....after all, our government would NEVER > lie to us,....WOULD THEY? (sarcasm, too!) Ummm, well I have never heard information from the government that says that money detection technology is being used so I don't know how that could be seen as a deterrent for drug dealing/money laundering. Honestly, the thing that really urked me about your post is that you laugh at some very real and legitimate concerns. You shouldn't just dismiss them because obviously you may not have all the information on the topic. An open mind is a lot more useful than a closed one. > 11)From: FGM7516@aol.com > Subject: R U A Technology Skeptic? > > Y'say you're nobody's fool? > Y'say you don't believe those claims about bizarre new technology? > Run *this* through your credibility filter -- > --------------------- > Aviation Week & Space Technology Magazine; October 6, 1997 > > BULLET CATCHER > > A unique projectile interceptor system has been patented by scientists at > the Lawrence Livermore National Labs in California. Tentatively called > Defender, when a specialized infrared sensor detects and tracks an incoming > projectile, a "flinger" mechanism launches a protective disk. > > The disks, made of composite material similar to body armor, are aimed and > timed to intercept the incoming projectile and absorb impact energy, > according to project engineer Lee Pittenger. Defender technology could be > useful for unobtrusive point defense against gunfire. > > END > > Your ball.... Good example. - M u t t e r Ed. root zine (http://www.openix.com/~mutter) mutter@openix.com ************************************************************************** 15)From: rkidd@localnet.com Subject: Re: Simple TSCM techniques? Pat wrote: > It seems to me that I read somewhere that a simple technique to finding > out if you are being bugged is to take a tranistor radio and tune it to > AM or FM (I don`t remember which) and turn the dial either all the way > to the right or to the left (again I don`t remember which). You would > then pass it over the suspected area like your phone and if there is a > bug you would get either feedback or some type of noise as the radio is > passed over the bug. Has anyone else heard of this or any other simple > techniques? Pat, This technigue, in the FM band will work only if the xmitter is tuned to a frequency in that spectrum. Most FM bugs of this type are tuned to frequencies close to major broadcast stations. This is done to hide the transmitter in a sideband of the more powerful signal and make it more difficult to detect. The unfortunate aspect of utilizing this type of TSCM "Technique" is that most bugs of this type can be tuned well out of the bandwidth of the receivers available in the U.S. European and Asian manufacturers have the FM band to cover from 86 to 108 MHz which is above and below your typical U.S. FM commercial receiver. To make a long story short, enlisting the services of a qualified TSCM professional is the simplest technique there is. There are are variety of devices, both hardwired and xmitters, that are utilized in electronic surveillance and without knowing what, or how to look for them, you are creating a false sense of security for yourself. Most TSCM professionals have years of training in electronics and will gladly decribe for you a wide variety of methods for eavesdropping on a target. Do some background checking on the TSCM techs you are interested in retaining and ask them for help. Avoid getting yourself into the trap of buying expensive TSCM equipment and countermeasures that are totally ineffectual without the proper background training and utilization of equipment and search techniques. Sincerely, Rick Kidd Confidential Security Services (CSS) Association of Counter Intelligence Professionals (ACIP) Phone: 716-934-0531 Fax: 716-934-7158 ************************************************************************** 16)From: Tim Johnson Subject: TSCM Specialist #1 Major organization I was contacted by one of my clients today. They wish to hire someone full time in the Phoenix area (with the possibility of travel to other locations). The figure quoted was approximately $30 to $35K per year. They want someone with a good solid TSCM background, preferrably ex-government trained. Send all responses and resumes to me at dbugman@amug.org or mail them to PO Box 1534 Chandler, AZ 85244 Please include a telephone number in the general portion of the e-mail as I've had trouble opening some attachments and may require that you fax a copy of your resume to me. #2 More on my previous request I'm looking for someone who has recently retired or separated from the military or other government agency who received TSCM training. If possible, I'd like for them to locate in the Phoenix area and be available for short notice jobs (both locally and nationally) (all my jobs seem to be short notice). The work would be part time in the beginning, but I believe a full time position would not be very far down the road. I'm wanting someone who would be able to continue the operation in and around Phoenix if I move to another location or able to operate independently in another state in a couple of years. Expansion of TSCI is part of the plan for the near future. Again, post a phone number in the event i can't open your attachment (that has already happened with one resume sent yesterday or this morning). I can only e-mail back asking for the resume be faxed or retransmitted. Tim Tim Johnson dbugman@amug.org President Technical Security Consultants Inc PO Box 1534 Chandler, AZ 85244-1534 (602)786-0909 http://www.amug.org/~dbugman/ What you say in private is your business. Keeping it private is ours. Copyright 1987 - TSCI ************************************************************************** 17)From: Jennifer Kollert Subject: Question about hidden cameras I work for a company called Home Automation Products, Inc. ( http://smarthome.com ) and we put out a bi-monthly catalog which sells surveillance cameras and stuff. Anyway, we are supposed to be realeasing a hidden camera that clips onto your tie in our next catalog. I was wondering if anyone knew about the picture quality in such a device. It just seems that you would have to stand REAL still to actually be able to see what was going on? How would you record from such a device? Anyone know any specific's on this? Jennifer +++Moderator's Note+++ Most tie clip cameras I've seen are board cameras with the lens attached to the board by cable. The cable can be run up under the tie and into the tie clip. The user must stand fairly still. Resolution is usually around 280 lines. Using a body transmitter to transmit the video is practically useless since the body will absorb most of the radiated signal. The only option is to use the Sony 8MM recorder in a belly band and secreted in the small of the back. The same camera is available in eyeglass cases, sunglasses, pagers, etc. for use as a video bodywire... ************************************************************************** 18)From: Tim Johnson Subject: Re: kamakazi >>>> +++Moderator's Note+++ Speaking of Kamikazes... does anyone know... think about this before you answer... Why Japanese Kamikaze pilots wore crash helments? <<<< Actually, it was part of the brainwashing process. We do much the same with our military by awarcing medals, stripes, etc. I believe that if you check, there was no communications equipment on the kamikaze planes. In fact, if memory serves me right, many were designed to have the wheels fall off after takeoff to reduce the likely hood of the pilot trying to return. I believe they were "guided" by an experienced pilot to the general location, or given the heading to fly. Minimum training on takeoffs as there was little need for proficiency in landing. No radios, no parachutes, possibly a compass; just a one way piloted bomb for the greater glory of the Emperor and the Empire. tj Tim Johnson dbugman@amug.org President Technical Security Consultants Inc PO Box 1534 Chandler, AZ 85244-1534 (602)786-0909 http://www.amug.org/~dbugman/ What you say in private is your business. Keeping it private is ours. Copyright 1987 - TSCI ************************************************************************** 19)From: "Timothy F. Poole, Jr." Subject: OnLine Background Check This is in the November 1997 Internet World magazine: Internet Background Check from Privacy Inc. is a utility that scans online databases from government and law enforcement agencies, ostensibly so users can determine errors or mistaken identity. Categories scanned include deadbeat parents, wanted and missing persons, registered sex offenders, and arrest/prison. In addition, a Cyber-Bodyguard sends an e-mail alert if your name appears in a new or updated database. Cost is $29.95 per year. (http://www.privacyinc.com) Now.... anybody ever heard of this company and are they legit? ************************************************************************** 20)From: "Betty G.O'Hearn" Subject: HERF Please look under "What's New", blue icon on the home page at www:infowar.com, scroll down to October 7, and read: The Direct Threat of Electronic High-Technology Weapons: by Dr. Nicholas Chantler. A look at DEW (Directed Energy Weapons); HERF (High Energy Radio Frequency); and the, EMP (Electro-Magnetic Pulse) dewfin.doc 46k Word Document Format Betty O'Hearn Assistant to Mr. Winn Schwartau 813-360-6256 Voice 813-363-7277 FAX http://www.infowar.com http://www.info-sec.com ************************************************************************** 21)From: "Ralph Bergin Jr." Subject: Re: AOL cookie >>As me and my >> colleagues discovered, with the new version, anytime you are signed on >> to AOL, any top aol executive, any aol worker, who has been sworn to >> secrecy regarding this feature, can go into your hard drive and retrieve >> any piece of information that they so desire. Billing, download >> records, e-mail, directories, personal documents, programs, financial >> information, scanned images, etc ... Sounds like another myth in the making. Although it is technically feasible (except when running Windows NT), it would be incredibly obvious to anyone with some computer savvy, and any anti-virus product would pick it up immediately, causing royal hell for AOL. Even they would not be this stupid. Regards, Ralph Bergin Jr., President Paragon Investigations, Inc. P.O. Box 24529 Pittsburgh PA 15234 E-Mail: pi@paragon-pi.com Phones: 800-767-1964 or 412-563-1801 Fax: 412-563-3533 WWW: http://www.paragon-pi.com +++Moderator's Note+++ I agree. IF it did exist it would surely be in violation of the Title 18 Federal eavesdropping law... ************************************************************************** 22)From: BADCOFFEE@aol.com Subject: Federal Grounds Be advise of the laws as we discuss ways that "other people" spy on you..... Kamakazi gadgets: The moment you "MAIL" anything to your mark....your playing on "federal" grounds. ANYTHING that has to do with the mail....becomes Federal. Be advised of as many laws as possible.....and try to oblige by them. :-) Question: Phone company and UPS.....who's ballfield does that fall under? Augie ************************************************************************** 23)From: Maggie Iaquinto Subject: Re: The Chat forum Yeah, that would be good. Because of all the time zones, would you post the times in UTC (aka GMT) as well. Here in Oz we are 8-10 hours ahead of you lot in the states. Maggie ************************************************************************** 24)From: mike kessler <"mike2@injersey.com"@injersey.com> Subject: Kamakazi gadgets Augie-- What is with the Kamikazi this week?? Crash helmets, now xmtrs. Re: your Radio Shack FM "wireless mic" kit: Don't expect too much from it. If each of the semiconductor components contained in the kit are of the finest quality (which they are not), and you manage to assemble it with no cold solder joints (which is possible), and you adjust the choke perfectly (which is marginally possible), you might squeeze 20 or 30 FEET out of it via a superheterodyne FM receiver. Of course, the transmitting range of any such "wireless mic" device may be extended by increasing the power supply voltage (e.g. from, typically, 1.5v to 9v, but unless premium quality components are used the power transistor will pop) and experimentally lengthening the antenna a few inches at a time. So the only type of "bugging" that such an anemic device is capable of would be through a cardboard wall -- when atmospheric "conditions" are right. Until very recently there were several relatively high quality, FM entertainment band (88 - 108 MHz) "wireless mic" kits available by mail order, all of which were adaptable for 9v operation and antenna extension (illegal mods), but the recent federal crackdown has scared most of the vendors out of the market. Most of these kits would yield a device which (modified) would send a clear FM signal for a city block with a fresh 9v battery. However, because all of these cheap (typically around $30) kits are aligned via tuning capacitor ("trimmer"), they tend to drift off frequency rather quickly, or, because they put out such a weak signal, the slightest electrical interference will knock them off. The best kits I've ever seen for constructing useful bugs from were sold by DECO Industries of Long Island. These "kits" were superb examples of surface mount technology and were about 98% completed. All one needed to do is attach the antenna and a battery clip (about four solder connections). Best of all, they were crystal controlled (fixed frequency) and were used with an ordinary scanner. The range was typically 1/4 to 1/2 mile, depending on terrain, and signal clarity was excellent. Sadly, DECO has apparently been purged. Don't be disheartened, because building your Radio Shack kit could be an inspiration -- much in the way of picking your first cylinder. Regards, Mike K-- ************************************************************************** 25)From: SpyKing@thecodex.com Subject: How to thwart hackers on the Net How to thwart hackers on the Net By Tim Ziegler SAN FRANCISCO (Wired) - How do you thwart evil hackers on the Internet? It's true that there are legions of nerds traveling around the Net trying to break into computers and steal private information. It's also true that most of them are pimply 15-year-olds who wouldn't know what to do with dangerous information if they ever got their hands on some. If you use a dial-up account to get on the Internet, there is no way for anyone to effectively travel across lines and access anything on your computer. So the only vulnerable information is files that you store in your Internet account (or information about you that your Internet service provider keeps on its computers). If you are on an office network that connects to the Internet, it is conceivable that someone could break into the network. Most offices, however, employ something called a firewall, which is a piece of hardware or software that sits between your office network and the Internet and ensures that nobody from outside can break in. Firewalls are not 100 percent foolproof, but they work pretty darned well. Hackers have been known to break into Internet service providers' computers and look at people's files and steal credit card numbers, but this is pretty rare. You can be sure that the big brains out there are spending their time trying to break into the Pentagon or Bank of America rather than your Internet service provider. Some other parts of the Net that deserve scrutiny are chat rooms and newsgroups. Just like real life, the biggest danger of fraud on the Internet comes from confidence men (well, confidence people). The Net makes it easy for people to pose as someone else in order to con you, stalk you, whatever. So be aware that in newsgroups and chat rooms, people may not be who they claim to be. If you have children, make sure they understand this (and tell them never to give out personal information, like your address or phone number). Also, be aware that words you type in public places can be saved and made searchable later on. For example, all Usenet newsgroups are archived (and can be searched at Deja News). So don't reveal any information on a newsgroup that you wouldn't want a future employer, the federal government, or your grandma to be able to find. In general, be cautious but not afraid. If you're just not sure about whether a person or a certain Web site is legit, err on the side of caution and keep your secrets to yourself. And don't ever share information like your mother's maiden name or your social security number with people online -- we can't imagine why anybody except your bank or credit agencies might need to know them. Many sites ask you to fill out forms that include your name, address, email address, and phone number. These usually aren't used for any dangerous purposes, but they're often sold to mailing lists. So don't be surprised if you submit your address and begin getting strange junk mail. (The Web101 column, which gives computer users the basics about using the Internet, also appears on Hotwired.) ************************************************************************** 26)From: BADCOFFEE@aol.com Subject: Amer On Line "bug"..... I took the liberty to make a call to a friend of a friend that works at AOL in reguard to the "Cassablanca" 4.0 bug as described in previous posts. This is what I found out, this is from the inside: Multiple persons have "myteriously" had their accounts terminated for sending E-mail to other members advising them of this "little" problem. The "bug" is not a hoax AOL going into YOUR computer is NO different then ME "HACKING" into AOL's system. Now....would I go to jail for such an "VIOLATION" of computer security? YES. I have NO problem with our government snooping in every hole I have. But AOL is a "PRIVATE" company that should have NO different powers than MY company. AOL and the Federal Government are pretty much working hand in hand these days on lots of different things. How does that expression go...."One had washes the other"...? Both hands seem a little dirty.... Anyone know where I could by a piece of the Constitution? Heard they just ripped it up and are selling it as an collectable like the Berlin Wall. My beef: DON'T tell me that I can not do something.....under penalties of THE LAWS OF THE UNITED STATES OF AMERICA......and then do it to ME. Cummon....what's fair is fair. Do we have LAWS or don't we??? There is no DOOR NUMBER 3. Augie Your going to be sending mail to badcoffe@bellatlantic.net VERY soon. ************************************************************************** Who are you? What's your specialty and/or interest? Let us know about your company... What would you like to see on the list? Post it. Let us know... Do you have something to contribute? We'd like to hear it... We want to know EVERYTHING and ANYTHING about eavesdropping, surveillance, countersurveillance & privacy related technology, etc... Remember: who, what, where, when, how & why... we want ALL the details... Do you have a question? Post it... A little free time? Help a member... With the INCREDIBLE brain power on this list, someone should have the answer ;-) P.S. Don't be a LURKER... Members take the time to post info for us all... give something back... Don't just take... Your input/knowledge is valued... ************************************************************************** Send Postings to: spyking@con2.com with "Post" in subject field with subject ************************************************************************** Subscribe to: spyking@con2.com In the subject field type: subscribe-surveillance list e-mail address ************************************************************************** Unsubscribe to: spyking@con2.com In the subject field type: unsubscribe-surveillance list e-mail address ************************************************************************** ...The Simple Rules of the Surveillance List... The Surveillance List Owners may Reject any posts that are/contain: 1) Info Unrelated to Eavesdropping, Surveillance or Privacy technology... 2) Flames or Negative posts... 3) E-Signatures that are considered excessive... 4) Advertisements not DIRECTLY related to the list topics... 5) Attached Files... 6) Oversized Posts... (May be edited to save room) **************************************************************************** This publication is copyrighted and is protected by U.S. and International copyright law. The information transmitted on this list may not be reproduced, reposted or forwarded to any non-list member without expressed written permission of the List Owner. Violation of U.S. copyright law is a criminal and civil offense... **************************************************************************** The Surveillance List is Moderated by SpyKing@thecodex.com The List Owner will make EVERY effort to protect subscribers from spam... Copyright 1996, 1997 Codex Publishing Inc., All Rights Reserved... #217 ****************************************************************************** The Official Newsletter of W.A.S.P. The World Association of Surveillance Professionals http://www.thecodex.com/wasp.html ****************************************************************************** Vol.Two Issue #217 The Surveillance List Oct.13,1997 Over 3000+ Members Worldwide Representing 53 different countries List Chat at: http://www.thecodex.com/chat.html ****************************************************************************** While we STILL feel there is NO SUCH THING as a stupid question... We suggest the newer list members AND the technically challenged browse through the FAQ before posting a question... Surveillance List Pseudo FAQ at: http://www.thecodex.com/faq.html P.S. If you have something to add to the FAQ, let us know... ****************************************************************************** IN THIS ISSUE... ****************************************************************************** 01) Sometimes they realize they're wrong... 02) Re: File Deletion & Retrieval 03) Need: Bonco Fraud Expert/L.A., CA., area 04) FoolProof 95 & 3COM Windows 95 Peer-Peer Networking 05) Re: Mylar 06) Automatic identification of the browser 07) Great little beginners electrinics kit... 08) Need volunteers 09) PGP question 10) Mobile, Alabama 11) Re: Kamakazi gadgets 12) Source For Mag Stripe Readers and Writers 13) Are You Worried Yet? 14) Snippits -- Re: Whatever I have had an Opinion on 15) CircuitMaker 5.0 16) Wanted: Bunko Fruad Expert/L.A., CA. Area 17) The AOL 4.0 cookie 18) Several issues and questions PI related 19) The Electronic Privacy Papers: A new book by Schneier/Banisar 20) pcAnywhere control 21) Top Encryption Products 22) Internet Patent search 23) Re: Does anyone know if the following is true? 24) Re: FileDeletion & Retrieval ****************************************************************************** DON'T BE A LURKER.... GET INVOLVED... YOU ARE A MEMBER... MAKE THE MOST OF IT ****************************************************************************** 1)From: SpyKing@thecodex.com Subject: Sometimes they realize they're wrong... Found this on the web... ( see article below) evidently SOMEONE screamed loud enough and got the lawmakers attention ;-) it appears they are going to fix the "flawed" Title 18 eavesdropping law to allow "advertising"... now if the lawmakers will only fix the rest of the "flawed" law... While it may be legal to sell eavesdropping devices to "government or law enforcement agencies while under contract", how does one get a contract without demonstrating their wares to the agency in question? The existing law still makes it illegal to design, manufacture or possess eavesdropping devices UNLESS under contract... how does one develop new products? How does one POSSESS devices to show to law enforcement to GET a contract? Keep going lawmakers, you are almost there... Source: http://www.access.gpo.gov/su_docs/aces/aaces002.html [DOCID: f:h1840rh.txt] Union Calendar No. 96 105th CONGRESS 1st Session H. R. 1840 [Report No. 105-162] To provide a law enforcement exception to the prohibition on the advertising of certain electronic devices. IN THE HOUSE OF REPRESENTATIVES June 10, 1997 Mr. McCollum introduced the following bill; which was referred to the Committee on the Judiciary June 26, 1997 Committed to the Committee of the Whole House on the State of the Union and ordered to be printed _______________________________________________________________________ A BILL To provide a law enforcement exception to the prohibition on the advertising of certain electronic devices. Be it enacted by the Senate and House of Representatives of the United States of America in Congress assembled, SECTION 1. SHORT TITLE. This Act may be cited as the ``Law Enforcement Technology Advertisement Clarification Act of 1997''. SEC. 2. EXCEPTION TO PROHIBITION ON ADVERTISING CERTAIN DEVICES. Section 2512 of title 18, United States Code, is amended by adding at the end the following: ``(3) It shall not be unlawful under this section to advertise for sale a device described in subsection (1) of this section if the advertisement is mailed, sent, or carried in interstate or foreign commerce solely to a domestic provider of wire or electronic communication service or to an agency of the United States, a State, or a political subdivision thereof which is duly authorized to use such device.''. Union Calendar No. 96 105th CONGRESS 1st Session H. R. 1840 [Report No. 105-162] _______________________________________________________________________ A BILL To provide a law enforcement exception to the prohibition on the advertising of certain electronic devices. _______________________________________________________________________ June 26, 1997 Committed to the Committee of the Whole House on the State of the Union and ordered to be printed ----------------------------------------------------------------------- [DOCID: f:hr162.105] From the House Reports Online via GPO Access [wais.access.gpo.gov] 105th Congress Report HOUSE OF REPRESENTATIVES 1st Session 105-162 _______________________________________________________________________ LAW ENFORCEMENT TECHNOLOGY ADVERTISEMENT CLARIFICATION ACT OF 1997 _______ June 26, 1997.--Committed to the Committee of the Whole House on the State of the Union and ordered to be printed _______________________________________________________________________ Mr. McCollum, from the Committee on the Judiciary, submitted the following R E P O R T [To accompany H.R. 1840] [Including cost estimate of the Congressional Budget Office] The Committee on the Judiciary, to whom was referred the bill (H.R. 1840) to provide a law enforcement exception to the prohibition on the advertising of certain electronic devices, having considered the same, report favorably thereon without amendment and recommend that the bill do pass. Purpose and Summary H.R. 1840, the ``Law Enforcement Technology Advertisement Clarification Act of 1997,'' provides a narrow exception to the prohibition on advertisement of electronic devices primarily designed for interception. Under Sec. 2512 of title 18, United States Code, it is unlawful to advertise in interstate or foreign commerce ``any electronic, mechanical or other device knowing or having reason to know that the design of such device renders it primarily useful for the purpose of surreptitious interception.'' Unfortunately, the broad restriction against advertisements also applies to advertisements sent to legitimate law enforcement users. H.R. 1840 creates an exception to Sec. 2512, to permit the advertisement of devices designed for surreptitious interception to an agency of the United States, a State, or a political subdivision thereof which is duly authorized to use such devices. This bill will allow companies which manufacture electronic devices to mail information about their equipment to law enforcement agencies. Background and Need for the Legislation Section 2512 of title 18, United States Code, prohibits the advertisement of any electronic, mechanical or other device, ``primarily useful for the purpose of surreptitious interception of wire, oral or electronic communications.'' This section was drafted with the intention of ``significantly curtailing the supply of devices * * * whose principal use is likely to be for wiretapping or eavesdropping.'' \1\ The Committee report listed several examples of devices which would fall under this prohibition, including microphones designed as wristwatches, cuff links, tie clips, fountain pens or cigarette packs.\2\ --------------------------------------------------------------------------- \1\ S. Rep. No. 1097, 90th Cong., 2d Sess. 94-95 (1968). \2\ Id. --------------------------------------------------------------------------- Unfortunately, legitimate law enforcement users were swept along with this prohibition on advertisements. Because of the restriction under Sec. 2512, companies which manufacture devices designed for wiretapping are not permitted to advertise the sale of their products to police departments. These companies are aware of cases in which a defendant was charged and convicted for violation of Sec. 2512, and although they would like to make the law enforcement community aware of their products, they do not wish to risk criminal sanctions.\3\ --------------------------------------------------------------------------- \3\ See, e.g., United States v. Ron Wynn, 633 F. Supp. 595 (1986). --------------------------------------------------------------------------- Law enforcement officers, particularly undercover officers, often use devices which would fall under the definition of a device ``primarily designed for surreptitious interception.'' It is a strange anomaly in the law that police departments have the authority to use electronic intercepts, but they may not receive mailings about improvements to such equipment. This exception is particularly significant since electronic interception equipment is frequently updated and improved. As an example, police officers and informants often use body microphones to record criminal activity. Covert devices are critical for the collection of evidence, yet many experienced criminals are aware of traditional attempts to disguise body transmitters. These transmitters have been miniaturized, and can now be disguised in some common facade unfamiliar to criminals. By not allowing companies which manufacture intercept equipment to advertise to police departments, police officers' lives are unnecessarily put at risk. H.R. 1840 will provide relief to companies which manufacture electronic interception equipment, by allowing them to advertise the availability of their products to agencies of the United States, States, or political subdivisions, so long as the recipient of the mailing is duly authorized to use such devices. The Committee appreciates the extensive input of the Federal Bureau of Investigation in drafting this legislation, to ensure that the bill was crafted as narrowly as possible while still achieving the intended effect. Hearings No hearings were held on H.R. 1840. Committee Consideration On June 12, 1997, the Subcommittee on Crime met in open session and ordered reported the bill H.R. 1840, without amendment by voice vote, a quorum being present. On June 18, 1997, the Committee met in open session and ordered reported favorably the bill H.R. 1840 without amendment by voice vote, a quorum being present. Vote of the Committee There were no recorded votes. Committee Oversight Findings In compliance with clause 2(l)(3)(A) of rule XI of the Rules of the House of Representatives, the Committee reports that the findings and recommendations of the Committee, based on oversight activities under clause 2(b)(1) of rule X of the Rules of the House of Representatives, are incorporated in the descriptive portions of this report. Committee on Government Reform and Oversight Findings No findings or recommendations of the Committee on Government Reform and Oversight were received as referred to in clause 2(l)(3)(D) of rule XI of the Rules of the House of Representatives. New Budget Authority and Tax Expenditures Clause 2(l)(3)(B) of House rule XI is inapplicable because this legislation does not provide new budgetary authority or increased tax expenditures. Congressional Budget Office Cost Estimate In compliance with clause 2(l)(3)(C) of rule XI of the Rules of the House of Representatives, the Committee sets forth, with respect to the bill, H.R. 1840, the following estimate and comparison prepared by the Director of the Congressional Budget Office under section 403 of the Congressional Budget Act of 1974: U.S. Congress, Congressional Budget Office, Washington, DC, June 23, 1997. Hon. Henry J. Hyde, Chairman, Committee on the Judiciary, House of Representatives, Washington, DC. Dear Mr. Chairman: The Congressional Budget Office has prepared the enclosed cost estimate for H.R. 1840, the Law Enforcement Technology Advertisement Clarification Act of 1997. If you wish further details on this estimate, we will be pleased to provide them. The CBO staff contact is Mark Grabowicz. Sincerely, James L. Blum (For June E. O'Neill, Director). Enclosure. H.R. 1840--Law Enforcement Technology Advertisement Clarification Act of 1997 Current law prohibits the advertisement of certain electronic intercepting devices. H.R. 1840 would permit such advertisements if they are sent to a domestic provider of electronic or wire communication service or to a government agency authorized to use the intercepting device. CBO estimates that enacting this legislation would have no significant impact on the federal budget. H.R. 1840 would not affect direct spending or receipts; therefore, pay-as-you-go procedures do not apply. This bill contains no intergovernmental or private-sector mandates as defined in the Unfunded Mandates Reform Act of 1995 and would impose no costs on state, local, or tribal governments. The CBO staff contact for this estimate is Mark Grabowicz. This estimate was approved by Peter H. Fontaine for Paul N. Van de Water, Assistant Director for Budget Analysis. Constitutional Authority Statement Pursuant to rule XI, clause 2(l)(4) of the Rules of the House of Representatives, the Committee finds the authority for this legislation in Article I, section 8 of the Constitution. Section-by-Section Analysis Section 1. Short Title This section states that the short title of this bill is the ``Law Enforcement Technology Advertisement Clarification Act of 1997.'' Sec. 2. Exception To Prohibition On Advertising Certain Devices This section amends Sec. 2512 of title 18, United States Code, to clarify that it shall not be unlawful to advertise for sale any device primarily designed for surreptitious interception, provided the device is mailed, carried or sent in interstate or foreign commerce to a domestic provider of wire or electronic communication service, or to an agency of the United States, a State, or a political subdivision thereof. Any person or organization receiving such advertisements must be duly authorized to use such electronic devices. Agency Views No agency views were received on H.R. 1840. Changes in Existing Law Made by the Bill, as Reported In compliance with clause 3 of rule XIII of the Rules of the House of Representatives, changes in existing law made by the bill as reported, are shown as follows (new matter is printed in italics and existing law in which no change is proposed is shown in roman): SECTION 2512 OF TITLE 18, UNITED STATES CODE Sec. 2512. Manufacture, distribution, possession, and advertising of wire, oral, or electronic communication intercepting devices prohibited (1) * * * * * * * * * * (3) It shall not be unlawful under this section to advertise for sale a device described in subsection (1) of this section if the advertisement is mailed, sent, or carried in interstate or foreign commerce solely to a domestic provider of wire or electronic communication service or to an agency of the United States, a State, or a political subdivision thereof which is duly authorized to use such device. ************************************************************************** 2)From: daydog@dial.pipex.com (Daydog) Subject: Re: File Deletion & Retrieval There is a file wipe program available from http:\\www.jetico.sci.fi it's called "Bestwipe" I think? and it's freeware. There is also another shareware "drive encryption" type program called Bestcrypt that incorporates the wiping program. You can right click a file and select the "delete with wiping" option which uses U.S. &DoD - seven pass extended character rotation wiping (DoD 5220.22-M). [ I admit to not really knowing what this means :)] Bestwipe also allows wiping of the windows swap file. Now I don't know how secure this proggy actually is so any findings etc. would be greatly appreciated. D. "The crows are calling my name" thought Caw. ************************************************************************** 3)From: PI12900@aol.com Subject: Need: Bonco Fraud Expert/L.A., CA., area Need bonco fraud expert, to testify at trial 11/18/97, Los Angeles, CA., area. Perferably former LAPD or LASO, with bonco fraud exp. Contact: Richard Fax Resume to 510-535-0331 or call 1-510-535-0683, ASAP. ************************************************************************** 4)From: "WhiteStar" Subject: FoolProof 95 & 3COM Windows 95 Peer-Peer Networking I was wondering if someone new any way to get around a locked down system that has been disabled with FoolProof 95.....I hear there a couple simple ways to disable FoolProof 95.....I was also wondering.....there are ALOT of password protected directories on my school's peer-peer netwerk. I know this is pretty eralavent to this listserv's topic, but I'm sure there are a lot of people who wish to know how to get around security software on networked computers, to steal files over networks, and spy on other people's files, too. If anyone knows anything about this, I'd appreciate it if you would send some info to the listserv. Thx all! -The WhiteStar President WhiteStar TeKnologieS ----------------------------------------------------------------------- evan@glasscity.net whitestar7@hempseed.com whitestar7@technologist.com whitestar97@hotmail.com ----------------------------------------------------------------------- http://www.glasscity.net/users/evan/ http://whitestar.simplenet.com http://www.yahoo.com http://subspace.vie.com http://www.hempseed.com ----------------------------------------------------------------------- Wanna leave me a message, go to: http://wwp.mirabilis.com/590993 ************************************************************************** 5)From: crudgmar@sprynet.com Subject: Re: Mylar Having worked for Columbia Magnetics as a Quality Control Technician, I am quite familiar with the uses for mylar. We produced a variety of recording tapes, primarily for CBS Records Inc. We also made the tape that is used in the aircraft flight recorder boxes and made magnetic coatings for movie film. Now, if you will re-read my post, you will understand that I did NOT make any statement that technology could not do something with mylar. My statement simply said that the technology to count money on a person remotely just does not (yet) exist. I have noticed a few replies to statements I have made in here that clearly indicate the reader saw the text, but did not hear what I was saying, or just failed to understand the gist. I have been involved in various technologies in my working life, and while I readily and freely admit I do not, and will not know EVERYTHING, I do know what I am speaking about, if I address a specific subject. For example, I own a business that deals with information systems, and a BIG variety of technologies associated with it, as my clients are involved in a vast variety of industries. You may get a clearer picture by visiting my website. http://www.angelfire.com/biz/ConsultantBiz ************************************************************************** 6)From: Mike G Subject: Automatic identification of the browser Hello all, I thought I'd add that the program that changes the automatic identification of the browser can be achieved through the registry. The key is: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings Under User Agent. Please be careful when doing this, you can mess things up pretty good in the registry. I would have to assume that Netscape Navigator woudl have the same kind of idea, although, it's probably a good idea to use MSIE |-) >13)From: someone >Subject: Re: "Cover Your Identity On Internet" >Is there any program for Netscape that will keep my identity info >private? The program you described was only for MSIE. Someone let me >know. Thanks.. ************************************************************************** 7)From: BADCOFFEE@aol.com Subject: Great little beginners electrinics kit... Ok, so I buy this bug from Radio Shack. I never even touched a soldering iron before. The whole ball of wax (including iron kit) comes to about $20 bucks. 20 burns later (nice ones)....I have this thing in ONE peice...with NO extra parts. (unusual) I must admit: Okay....so it didn't work (I screwed something up) It was a ton of fun. Learned quite a bit. (and thats what it is all about) :-) BUT.......anyone out there looking to get aquainted with basic electronics.....this is the way to go. Ps- (I have to do this) My comments on the remote money counting issue: "What do you mean....my computer lets off radiation and there is something called a what??? Tempest? That captures what?? and reconstructs is where?? Get out of town. :-) (you know what I am getting at) I like to think things are real until proven differently. Augie (This surely explains why I am laughed at.... when I go through airport security) ************************************************************************** 8)From: BADCOFFEE@aol.com Subject: Need volunteers Im building something called "The Anal Mic 2000" and need subjects to test it. Augie ************************************************************************** 9)From: principal@connect.ab.ca Subject: PGP question I try not to do things I may regret later or regret things I have done. I have contacted acquaintances in local law enforcement and private individuals who might know the answer to my question but it seems I can't get consences. Pardon me if I speak cripticly, but, criptic my querry is. With all the brain power and computer accumen on this list... If I am using PGP to encript files, and have saved them prior to encription can my hard drive be read and the saved unencripted original version be retrieved? Alternately, if I create a new doc and it is untitled, unsaved and my computer is auto saving(in plain text) and I later, without titling or saving, encript the document. Do those plain text versions still exist somewhere and are they retrievable. If so how can this be prevented. I am comparatively amateur in computers so please remember to use little acronyms and type slowly. Sincere regards Barry Holland Principal Protection ************************************************************************** 10)From: Gary Cohen Subject: Mobile, Alabama I am proud to announce that I am now a partner in PFC Investigations, Mobile, Alabama. PFC has a staff of seasoned ex-LEO's, experienced in all aspects of investigation; including, but certainly not limited to: criminal investigation, litigation investigation, fugitive recovery, surveillance, accident investigation, and now expanding with computer investigations and computer security. We would be pleased to be your South Alabama connection. Let us augment your agency. Call us at 334-476-9309, or e-mail me at heatgain@mindspring.com. More numbers and url's and services to come in the near future. We now return you to your regularly scheduled thread. Gary Cohen Investigator PFC Investigations Mobile, Alabama - 334-476-9309 heatgain@mindspring.com Member-FALI & SFIA Chairman, Internet Committee, SFIA (South Florida Investigators Assoc.) SFIA - http://www.webcircle.com/users/sfia/ ************************************************************************** 11)From: "Carlos Guillermo Vega Cumberland" Subject: Re: Kamakazi gadgets Augie, Since you probably will not put together your FM wireless mike kit for a while, you might want to invest in a already assembled FM wireless mic (also from Radio Shack catalog # 33-1076) which can be used for remote tape recordings, in PA systems, monitoring a child´s room etc. It transmits to any FM radio or receiver turntable to 88-108 MHz (more than the do it your self kit). Up to 200-foot range when used outdoors, 100 feet indoors. By the way I have never used one, or seen one but, from the picture in the catalog (where this information was taken from)it looks like it´s pretty small. If anyone has used one of these before, I would appreciate you letting me know how well they work (I´m sure Augie will too, except I can´t speak on his behalf). Thanks! Carlos. ************************************************************************** 12)From: CS CUSTOM Subject: Source For Mag Stripe Readers and Writers Source for all types of magnetic stripe readers and writers including stand alone units. http://www.cscustom.simplenet.com/magstri.htm. ************************************************************************** 13)From: FGM7516@aol.com Subject: Are You Worried Yet? October 2, 1997 INTERNET PORN CURBS `WOULD REDUCE RIGHTS' By Giles Turnbull, New Media Correspondent, Press Association News (UK) Technology already exists to beat pornography on the Internet but using it would mean drastic restrictions of freedom of speech and civil rights, a report said today. Ultimately decisions about who should regulate the net and how it should be done would have to be taken at senior political levels, it added. The six-month study carried out by a team of independent consultants for the European Parliament looked at the technical feasibility of jamming illegal or unsuitable material from the Internet. The aim of the report was to provide European policy makers with an objective basis for drafting future policies and regulations for the Internet. It concluded that although technology exists for various kinds of jamming and intercepting of material such as pornography, or racist or violent content, the only way to ensure that all the material was accounted for would be to monitor all traffic on the Internet. This would require such immense investment of technology, time and resources that it is unlikely to happen. However Internet service companies have already begun to take steps to monitor at least some Internet traffic, and provide users with software that will help them jam content they would rather not see -- or would rather their children did not see. This, said the report's authors, Smith System Engineering, was an encouraging sign. But ultimately, decisions about regulation were for the politicians. Emerging technology such as network computers - which could use the Internet as a source of programs and content to be downloaded as and when needed - could help people combat unsuitable material by putting control in the hands of Internet service providers, the authors said. But they admitted that anyone putting pornography on the Net would avoid using this technology anyway. "If we were going to give a message to the government, it would be 'Please take these issues into account when at the best ways to regulate the Internet'," said Mark Cartwright of Smith Systems Engineering. The crux of the report was that any systems for effective controlling of Internet content would be in danger of restricting personal freedom of choice, which was a serious problem in a modern democracy, he added. Another important question was who would do the monitoring, and what standards would they use to impose restrictions. ************************************************************************** 14)From: KDots@aol.com Subject: Snippits -- Re: Whatever I have had an Opinion on I do more Lurking than Typing so I’m commenting now that I’m in the mood and I’ll go back to Lurking for another month or so. Each paragraph that follows contains my opinions on different subjects we’ve all been reading about over the last few weeks. I thank the Hosts and Moderators for TheSurve. I had fun with this. Frustrate PW thieves ... giving them PassWords when they ask, make something up...... ...they have to sign off and try them. Also the most common Pwstealer program is 28,160 bits and you can search the files (commonly named SETUP.EXE for the place your PassWord would be sent if you ran the program. Use a word processor and search for Juno or Mail (as in Hotmail or Rocketmail. Most Pw thieves use those mailing addresses. You can download Viruses all day long without fear, just don’t run the program unless your using your test computer. If you get a Virus, your PANIC is the most dangerous thing your computer faces. If you prepared ahead, and created a clean boot disk, almost any computer can be cleaned with very little file loss.. All together Now......YOU CAN’T GET A VIRUS FROM READING E-MAIL....BUT you can open a Document with a destructive Macro set to “self start” unless the feature is disabled in you Word Processor. Trojans in my opinion can be more dangerous. Anti-virus programs don’t detect them and a Trojan Horse may simply be for example, a FORMAT C: command re-named PINGPONG.EXE......just with a little twist,..you don’t get the chance to answer ... Yes or No. AOL 4.0...Hmmm....I’ve visited enough Hacker Web sites to realize that there are many former AOL members on the Net who lost their accounts for TOS (terms of service) violations and haven’t let it go.. ....probably won’t. Many have dedicated their sites to AOL hate literature and promote OnLine revolution. I’m not saying AOL is not producing an 4.0 snooper cookie, but it’s doubtful that AOL would run such disastrous public relations risk with such a controversial ploy that in no way could remain a secret for long. As far as downloading 4.0...hell, they update my software now without me asking or approving. Augie wants STATIC on his phone line. No problem....It’s called a loose connection. Wanna get fancier, make that loose connection with a dirty Potentiometer...just like the one on your old radio that is fine until you adjust the volume....Static! Or, how about a noise generator inductively coupled to the line. A portable model you want?.....tape record your static. Oh, by the way...hanging out of a building while talking on the phone makes your friend sound like he’s at a phone booth.....tell him to stop calling me. And what about the FBI banning the Bible for speaking in code.....what about CHINA’s dissertation on Traditional VS Non-Traditional Media....Now That’s Code! Hmmm, sure sounded like Jerry Springer to me......didn’t NBC bounce you for that stuff? Yes they do make goose neck scopes for viewing rooms, borescopes are for cleaning/inspecting rifles. Those Motel doors also record each time the door is opened, they insert a device into the mag stripe lock and read the log......no connection to sales desk computer, the program is delivered by you the renter when you insert your card. If you have a room-mate and you replace a lost card...your room-mate is out of luck until he replaces his. If you carry your room key in the same pocket with your magnetic money clip...... take the word of experience, you will be locked out and bitchin’ at the system. Hmmm....56 bit or PGP with 2048bit encryption.....that’s a tough one. My government has approved the 56 bit.....but not the PGP......Hmmmm....decisions, decisions.! Gimme the PGP! Anybody other than me getting tired of: “Re: Money Counting” , the word Mylar and “That’s not what I said, this is what I meant” I’m lurking to learn, but this is beginning to sound like a pissing contest. ;=) PS. I’m throwing a dead horse party, everyone’s invited..........BYOS (S=stick). Sandman cannot hack into your computer , he just scared you with a hyperlink that displays your files or calls maybe c:\windows\win.ini which might pop a window on your screen that says “Win.ini not found”......yeah, that does sound scary, but win.ini is just busy...not missing. Re:Thwarting Hackers. OK..here, if you have ever forgotton your password and kept trying to guess what it was... just can’t remember....then YOU are a Hacker. You are also as good a hacker as 98% of the KIDS who run around saying “Supp PeEpZ...ShOuTs To My BrOs” and type funny. Programs are passed around constantly which are mostly written by college students, who by the way still can’t spell, and the programs can kick you off line. This is called PUNTING if done with an Instant message. If they use a Invitation Message to kick you off line, it’s called a PINTER. It’s also done with E-mail that you open and suddenly get an WAOL error message “CLOSE” or “IGNORE”. Anyway, these kids have some things in common, they all have basically the same types of manipulating programs and they would like to know a “Real Hacker”. I’ll not leave without donating something first: Do not spend your money on a monitor for viewing your time lapse recordings. Just go to Radio Shack and buy a RF modulator ($24.00) and use your TV. One cable in, one cable out and one less item to carry around. I also don’t like BNC connectors and coax. I convert all connectors to RCA phono jacks and use the bags of multi colored phono jumpers....same cable you use on your stereo...less bulk... easier to pack away....been doin’ it for years. Speaking of Motels.....their first suspicion is that your in the porn business........A!A!A!A!....WRONG! Anybody wanting to know which direction surveillance is headed need only read Revelations chapter 13 verse 16 and if you are truly security conscience, check your eternal security ..... John 3-16. Did you hear THAT?....What?....Nevermind it’s gone now! ----- And so am I! Kerry LP Manager/Alligator ************************************************************************** 15)From: SpyKing@thecodex.com Subject: CircuitMaker 5.0 Someone was looking for software to design circuits. You can download a fully functional demo of CircuitMaker 5.0 at: http://www.microcode.com/DEMO.HTM ************************************************************************** 16)From: PI12900@aol.com Subject: Wanted: Bunko Fruad Expert/L.A., CA. Area. Need Bunko fraud ring expert, to testify at trial 11/18/97. Perferably a former are retired LAPD,LASO or other southern California Peace Officer, that worked on this sort of detail. You do not have be a licensed P.I. This involves a Gypsy type fraud ring, working the Chiropractic community. A retainer fee will be provided. Contact: R. Harris, P.I. Fax resume to 510-535-0331 or call 510-535-0683, ASAP. ************************************************************************** 17)From: "Peter J. Lasky" Subject: The AOL 4.0 cookie My girlfriends mom is a AOL Host and I was talking to her and some of her Host buddies about that little cookie in AOL 4.0 that you all are talking about, They say that they recieved some kind of letters about that and it was a hoax. But there is an AOL 4.0 beta and any AOL employee can D/L it or any Hacker can get it. Now it's there word over AOL's word and then over what you believe. Common it's AOL who are you gonna believe? *******Elite memeber of the UHS********* UHS: http://www.enteract.com/~akopete LOD: http://www.Lords-Of-Destruction.com Pagoo: http://www.pagoo.com/cgi-bin/me.cgi?6387149 *******Elite memeber of the LOD********* ************************************************************************** 18)From: BADCOFFEE@aol.com Subject: Several issues and questions PI related Hi all :-) Several issues and questions PI related.......... First: I would like to "eventually" fill the qualifications within the next several years of obtaining a PI license. Acquiring 10,000 hours is my first hurdle. Seeking assistance from local (NJ, NY) PI's on TIME CONSUMING gig's. Stake outs ect. Please contact me with what you have....and I hope I can make accommodations time wise to fill yours and my needs. I believe I can carry my own weight. Secondly: I am aware (I believe) that there are only TWO exclusions to the licensing laws. Exclusions: If your doing your own PI work for yourself or if you are retained by an attorney. Questions: 1: Are there any other exclusions? 2: There are I believe "confidential informant laws" that pertain to the media. Media does not (by law) HAVE to disclose where they received their information from in any form of litigation (loose anyone??) Does this "blanket" also cover civilians (clients) in protection of informants. <---that would be the unlicensed PI. It's nice to fly a little straight sometimes. Trying my best. Quickie story; As known, I am a carpenter by trade. Certain townships require very strict licensing of contractors before they issue a permit. It was not worth going through severe testing and paying outrageous fees for ONE or TWO towns that have such requirements. (this is a town by town thing, NJ does not have a state license) Sooooooo......The homeowner would get the permits and tell the building department that He/she did the work themselves. Worked out nice. Even when the client was a 89 year old lady. Of Coarse, I would never do such a thing. :-) Augie "Have no fear..... BADCOFFEE is near" :-) ************************************************************************** 19)From: Bruce Schneier Subject: The Electronic Privacy Papers: A new book by Schneier/Banisar The Electronic Privacy Papers: Documents on the Battle for Privacy in the Age of Surveillance by Bruce Schneier and David Banisar John Wiley & Sons, 1997 ISBN: 0-471-12297-1; 747 pages Retail: $60 hardcover Trying to keep up with the advancements in cryptography and digital telephony, the government has advocated controversial new tools that will allow them to monitor electronic communications. On the other side of the spectrum, privacy advocates are vehemently opposed to any government monitoring whatsoever. The Electronic Privacy Papers is a collection of previously unreleased documents dealing with privacy in the Information Age. Combining public government pronouncement, public reactions, and previously classified documents released under FOIA, this book paints a clear picture of government policies towards encryption and privacy and how they will impact individuals and companies involved with the Internet. Issues covered include: The economic and political rationale for demanding digital wiretapping and surveillance. The legal foundations, and limitations to, government surveillance. Government strategies for soliciting cooperation from telephone companies and equipment manufacturers. Which policies industries and individuals can expect the government to pursue in the future. The Electronic Privacy Papers retails for $60 in hardcover. I am offering it at the usual 15% discount. ****************************************************************** ORDER FORM The Electronic Privacy Papers (Hardcover): $60 * .85 = $51.00 Shipping: Air (U.S.): $5 per book Surface (U.S.): $3 per book Canada/Mexico: $7 per book Everywhere else: $9 per book Send to: Counterpane Systems, 101 E Minnehaha Parkway, Minneapolis, MN 55419 I need payment by check, in U.S. funds drawn on a U.S. bank. Or a postal money order. Sorry, no credit cards. Table of Contents PART 1: PRIVACY AND THE INFORMATION SNOOPERHIGHWAY Introduction: Roadblocks on the Information Superhighway PART 2: WIRETAPPING Overview of Wiretapping PART 3: LOBBYING FOR SURVEILLANCE: THE DIGITAL TELEPHONY PROPOSAL Government Pronouncements: The Digital Telephony Proposal Behind the Iron Curtain: Operation Root Canal Digital Telephony: The Public Response PART 4: CRYPTOGRAPHY Cryptography - The Cure for the Common Bug PART 5: THE BATTLE FOR CONTROL OF CRYPTOGRAPHY The Field of Battle: An Overview Early Skirmishes The Clipper Chip Proposal Unclassified: The Story Behind Clipper Clipping the Clipper: Public Response to Desktop Surveillance PART 6: PUTTING THE GENIE BACK IN THE BOTTLE: EXPORT CONTROLS ON CRYPTOGRAPHY Atom Bombs, Fighter Planes, Machines Guns and Cryptography: Export Control Untying the Gordian Knot: Efforts to Relax Export Controls PART 7: BIG BROTHER AS THE KEEPER OF THE KEYS: WILL THE GOVERNMENT TAKE OVER CRYPTO? Banning Cryptography Software Key Escrow EPILOGUE: THE FUTURE OF CRYPTOGRAPHY Bibliography of Books on Wiretapping, Cryptography and Privacy Index. ************************************************************************** 20)From: Jennifer Soller Subject: pcAnywhere control I am testing pcAnywhere for my Department. It seems to work really well. However, I do have one issue that arose during an internal test: while one person was using pcAnywhere from a remote machine to manipulate a host machine, we found that it was possible for a second person to sit at the host machine and manipulate it also. This is a security issue for us. During a pcAnywhere session, we need to make sure that the host machine is "locked-out" -- no access via the host machine keyboard or mouse. Anyone know if this is possible? Thanks. Jennifer Soller Senior Research Associate Federal Reserve Bank of San Francisco Jennifer.Soller@sf.frb.org ************************************************************************** 21)From: "William H. Geiger III" Subject: Top Encryption Products >+++Moderator's Note+++ >May we assume that ANY exportable U.S. encryption programs have Big >Brother built inside? What would be the suggested three top choices for >FAIRLY SECURE encryption programs? Well for E-Mail their is only one choice: PGP. Without a doubt this is the most secure encryption product on the market in this area. Some of its major features: -- Source Code is available!! Why is this important? It allows peer review of the product. Here is what peer review provides: 1) Verification that the program does what is says it does. 2) Ability to check for "back doors". 3) Ability to check crypto algorithm's are properly implemented. 4) Ability to check strength of PRN being used. 5) Trust. Somthing has to be said for a company that is willing to hang it all out in public for everyone to see, the good, the bad, and the ugly. This is somthing very rare in the software industry and should be rewarded whenever it is encountered. -- Full Strength Domestically and Internationally!! This is very important in any crypto product. There is no reason to accept weak encryption. Here in the US our government leaders have long been under the false impression that only the US was capable of producing strong crypto products. 15-20 years ago this may have been true but it is not today. As a matter of fact with the current export policies and the big push for GAK here in the US you may see the best crypto comming from overseas in the next few years. -- Cross Platform PGP Inc. has taken a unique marketing strategy thanks to Phil Zimmerman. For your personal use PGP is FREE. This has made PGP one of the widest used and most well known crypto product available. PGP Inc. receives it's revenue from selling to Corporations while providing strong crypto to the masses (world wide) for free. Because of this PGP has gained a wide following of programmers and cryptologist who have worked hard on porting the program to virtually every platform available. All one has to do is take a look at the makefile for 2.6.x to see the wealth of platforms supported. There are also over 20 different language files available for PGP. There also numerous GUI shells and e-mail integration programs available for PGP on a variety of platforms ( I am an author of one such GUI/E-Mail integration program myself ). -- Trust Back to the issue of TRUST. There are many "Snake-Oil" salesman out there. Cryptology is becomeing a buzz-word on the internet and many would like to cash in on it. Often you will hear claims of "Unbreakable" or that they use a "OTP". Be vary wary of these products. Very few companies will offer source code, at best they will tell you what algorithms they are using (without source though there is no way to tell). If there is no code there is no trust. Companies like IBM, HP, ... are big government contractors and are actively supporting the government attempts at GAK & key escrow. Microsoft?? Well while AFAIK they are not supporting GAK I would have to check twice if they told me the sky was blue. :) PGP has show the rest of the industry how to build trustworthy crypto systems, it's another thing of wether anyone will follow their lead. -- --------------------------------------------------------------- William H. Geiger III http://www.amaranth.com/~whgiii Geiger Consulting Cooking With Warp 4.0 Author of E-Secure - PGP Front End for MR/2 Ice PGP & MR/2 the only way for secure e-mail. OS/2 PGP 2.6.3a at: http://www.amaranth.com/~whgiii/pgpmr2.html ************************************************************************** 22)From: BADCOFFEE@aol.com Subject: Internet Patent search Who invented it? Searching for an inventor from a patent number? Here it is folks....online and free. http://patents.uspto.gov/ Set up a file and save theese links. When it's time to do some serious research.....it's all layed out for you. Augie Bored to death this weekend ************************************************************************** 23)From: "J.D. Abolins" Subject: Re: Does anyone know if the following is true? >13)From: "Shelle" >Subject: Does anyone know if the following is true? > >I have found a disturbing page on the web..if someone named SandMan >asks you to check out his page DO NOT! > >It is at www.geocities.com/vienna/6318 > >This page hacks into your C:/ drive. >DO NOT GO THERE...FORWARD THIS TO EVERYONE...HE WILL REQUEST A CHAT >WITH YOU....dont do it... I checked out the Web page. It doesn't seem to have anything to do with SandMan but there is a mailto link to a Eyal_A_Boss. Nothing threatening on this page. Music MIDI files and links to Israeli and music sites. I checked the HTML code and there is no script or applet that would bring up your C: drive. Maybe there was a typo in the URL. There is an easy HTML trick to show a page's visitor the contents of the person's local disks. The Web page contains this link tag: Here's what I can see on your C: drive! The Web site can't pull back the info from the C: drive with this tag. (There are possible ways to do it with other means.) All that happens with this method is just having the visitor's Web browser browse the C: drive. >With all the technology available now, I am wondering if this could >be true. If so, it seems as though going on the internet isn't very >safe anymore. A lot is possible. But it shouldn't chase people off of the Internet. Learn about the risks (reading this list is a good start) and how to manage the risks. YOu can adjust the browser to not run Java, JavaScript or ActiveX if you are going to sites you aren't sure of. You can set up a PC for Web browsing and keep the really sensitive stuff on a non-net use PC. Etc. I am addressing these type of topics on my Web page at http://njcc.com/~jda-ir; it's still in early "introductory" stages. You are welcome to stop by, leave email for me, whatever. J.D. Abolins ************************************************************************** 24)From: "J.D. Abolins" Subject: Re: FileDeletion & Retrieval >1)From: "Tom Tudor" >Subject: FileDeletion & Retrieval Many people do assume that "delete" means the file's gone forever. Between backups and the way various operating systems "delete" or "erase" files, they are not wiped out. In DOS and it various offshoots (including Win 95), the deletion really means to flag the disk clusters used by the file as being available for reuse. If there is little free space or lots of file writing on the disk, that area might get overwritten quickly. Otherwise, the data in the "deleted" file's clusters remain. Other operating systems and file systems may act in the same way. In Novell Netware, for example, "deleted" files can be salvaged. (Also, on a net disk, it is more likely that a backup may have been made of the file that you did not know about.) >Recently I ran across a program that claims to be able to delete files, and >try as you may, you can't recover them. The program is Mutilate v1.0b and >works in conjunction with another file called Zapfile.com. I have tried the >program and so far it does what it claims. You can still find the file name There have been various "wipefile" utilities over the years. The older versions of Norton's and, if I remember correctly, PC Tools had such utils. In the Win95 environs, there are few such utils bundled with commercial products. They still can be found as shareware and such. The wipefile type of utils would overwrite the data in the deleted file's areas. Some of these utils gave options for various types of overwities: the pattern to use, the number of times it was overwritten, etc. >I have also been un-successful in recovering files that have been erased >thru using the "Format C:/U", which is the switch for a "unconditional" >format. If anyone has had any experience in recovering files that have gone >thru the unconditional format, or programs like Mutilate, I would like to >hear from you. The difference, in recent DOSes, between regular format and unconditional format is the creation of unformat info on the disk. In recent versions of DOS, an unformat as well as undelete commands were included in the stock version. (Tip: if there is data recovery function given, it is a useful forensics tool.) The format can differ between floppy disks and hard disks. I am not a PC hardware expert per se but as I recollect the situation in the older MFM/RLL hard drives was the format was a high level format, not a low level format. A low level format did wipe off the data, the high level just dealt with the FAT but left the data on the disk. Back in those days, if you wanted to get rid of the data beyond the reach of commonly available disk utils, it required a low level format or running a "wipedisk" util that worked in a similar way to the wipefile utils. IDE drives don't usually provide low level format options but wipedisk utils could be used. There are data recovery services that can attempt to pull out data from the magnetic patterns that remain. So the wipedisks and wipefile are not 100% sure to wipe out the data. They do, however, raise the threshold of cost and effort to get the data back. Some organizations will dispose of old disk drives by physical destruction. PS. If wiping out a file, keep in mind that the data could exist elsewhere on the system: swap areas, temp files, backups, "junk space" of other files, etc. J.D. Abolins ************************************************************************** Who are you? What's your specialty and/or interest? Let us know about your company... What would you like to see on the list? Post it. Let us know... Do you have something to contribute? We'd like to hear it... We want to know EVERYTHING and ANYTHING about eavesdropping, surveillance, countersurveillance & privacy related technology, etc... Remember: who, what, where, when, how & why... we want ALL the details... Do you have a question? Post it... A little free time? Help a member... With the INCREDIBLE brain power on this list, someone should have the answer ;-) P.S. Don't be a LURKER... Members take the time to post info for us all... give something back... Don't just take... Your input/knowledge is valued... ************************************************************************** Send Postings to: spyking@con2.com with "Post" in subject field with subject ************************************************************************** Subscribe to: spyking@con2.com In the subject field type: subscribe-surveillance list e-mail address ************************************************************************** Unsubscribe to: spyking@con2.com In the subject field type: unsubscribe-surveillance list e-mail address ************************************************************************** ...The Simple Rules of the Surveillance List... The Surveillance List Owners may Reject any posts that are/contain: 1) Info Unrelated to Eavesdropping, Surveillance or Privacy technology... 2) Flames or Negative posts... 3) E-Signatures that are considered excessive... 4) Advertisements not DIRECTLY related to the list topics... 5) Attached Files... 6) Oversized Posts... (May be edited to save room) **************************************************************************** This publication is copyrighted and is protected by U.S. and International copyright law. The information transmitted on this list may not be reproduced, reposted or forwarded to any non-list member without expressed written permission of the List Owner. Violation of U.S. copyright law is a criminal and civil offense... **************************************************************************** The Surveillance List is Moderated by SpyKing@thecodex.com The List Owner will make EVERY effort to protect subscribers from spam... Copyright 1996, 1997 Codex Publishing Inc., All Rights Reserved... **************************************************************************** ****************************************************************************** The Official Newsletter of W.A.S.P. The World Association of Surveillance Professionals http://www.thecodex.com/wasp.html ****************************************************************************** Vol.Two Issue #218 The Surveillance List Oct.14,1997 Over 3000+ Members Worldwide Representing 53 different countries List Chat at: http://www.thecodex.com/chat.html ****************************************************************************** While we STILL feel there is NO SUCH THING as a stupid question... We suggest the newer list members AND the technically challenged browse through the FAQ before posting a question... Surveillance List Pseudo FAQ at: http://www.thecodex.com/faq.html P.S. If you have something to add to the FAQ, let us know... ****************************************************************************** IN THIS ISSUE... ****************************************************************************** 01) High-Tech Eavesdropping 02) USPS employment locator 03) Re: PGP files 04) TSCM and R.S. Bugs 05) Weapons of Mass Destruction Terrorism Coming In November 06) Re: Maricopa County Criminal Records 07) FYI 08) Several PI related issues 09) Secret FBI Files Web Site 10) Assistance needed in Rochester NY 11) Pro-43? 12) ANI in Dallas 13) Surveillance Exp '97 14) Re: Mobile, Alabama 15) Re: Kamikazes 16) Browsing someone's hard drive via the Internet 17) Bestwipe 18) Re: Magnetic cards and hotel room doors 19) Protect the property 20) Re: File Detention and Retrieval 21) Re: Need volunteers ****************************************************************************** DON'T BE A LURKER.... GET INVOLVED... YOU ARE A MEMBER... MAKE THE MOST OF IT ****************************************************************************** 1)From: SpyKing@thecodex.com Subject: High-Tech Eavesdropping Raises New Questions on Personal Privacy From the New York Times High-Tech Eavesdropping Raises New Questions on Personal Privacy By JOHN MARKOFF SAN FRANCISCO -- "It's sort a dodgy business," Gilbert Walz told a purported buyer who had expressed an interest in purchasing gear allowing the monitoring of cellular telephone conversations, according to a report later filed by the buyer, who was actually a federal investigator. But dodgy or not, eavesdropping equipment has long been a hidden but stable part of the high-technology world of Silicon Valley, a lucrative commercial netherworld whose merchants legally sell their wares to law enforcement agencies, government officials and telecommunications companies. Often, however, the same equipment ends up in the hands of others, ranging from simple voyeurs to drug dealers. A federal trial set to begin Tuesday in San Jose, Calif., will shed light on the continuing traffic in sophisticated eavesdropping technologies, raising troubling questions about personal privacy in the era of wireless communications. The Justice Department has filed federal charges for conspiracy and the manufacture and sale of surveillance equipment against two Burlingame, Calif., men. Gilbert Walz, 41, the owner of Tech Support Systems, a small company based in Burlingame, was charged in an indictment filed in March that alleged that he had illegally conspired to ship electronic surveillance gear from Canada to a Cooksville, Tenn., man operating as a federal informant. Walz's partner, Jude Daggett, 43, was indicted in June on charges of manufacturing and selling such equipment illegally after he purportedly sold a second informant a software program used to control a cellular eavesdropping device. Both men have pleaded not guilty. The case offers a window into a hall-of-mirrors world of surveillance technology, a world in which the distinction between what is legal and what is not depends entirely on circumstances -- the ability of a seller to verify the identity of a buyer, for instance. Ironically, some of the evidence against Walz was obtained through federal telephone surveillance, according to documents. Last year separate federal charges against both men for the illegal sale of such equipment to Mexican officials proved so sensitive that the trial was monitored by federal intelligence officials, closed at the request of the federal government and later postponed. Those charges, to which the men have pleaded not guilty, are still pending. The laws involved in these cases are complex. Eavesdropping equipment itself may be built and sold legally under federal law, government prosecutors argue, as long as the buyers are government agencies or telecommunications companies. High-technology wireless listening gear is readily available for eavesdropping and location tracking purposes, according to communications industry specialists. Assembled by companies like Tech Support Systems, the equipment is then resold through a network of small security consulting firms and spy shops in the United States. In addition, in an interview last week, Walz said that he often had sold and shipped such equipment directly to foreign embassies in Washington, which would have been able to reship it overseas in diplomatic pouches, avoiding the scrutiny usually given to the export of such devices. Illicit uses of the gear, according to experts, range from just-for-kicks voyeurism to industrial espionage. In some cases the equipment has been purchased by organized crime and drug cartels in the United States and in Mexico and South America to track the activities of law enforcement agents in the field, according to communications technology specialists. The Tech Support Systems equipment, which is portable, gives the user the ability to listen to and record dozens of cellular telephone channels simultaneously and to target locations and focus on calls to specific numbers. It is now used by cellular phone company employees tracing fraud and by local and federal law enforcement officials as well Drug Enforcement Agency officials and domestic and foreign intelligence agencies, according to court documents. The company also sold surveillance gear to government and intelligence agencies in Mexico, Brazil, Italy, South Korea, Malaysia, Canada and the Philippines, among others, according to the documents. In recent years, a variety of eavesdropping devices have played a part in dramas as diverse as House Speaker Newt Gingrich's political wars and the travails of the British royal family. Last year in Florida, John and Alice Martin used a modified radio scanner to intercept the cellular phone conversation of Rep. John Boehner, R-Ohio, during a conference call with Gingrich. In 1992 a more sophisticated piece of equipment was probably used to monitor the cellular phone conversations of Diana, the Princess of Wales. Similar equipment that could track such calls is currently being advertised "for law enforcement use only" on the Internet by G-COM Technologies Ltd. of New York. "The nation's communication system is disturbingly open," said James Dempsey, a Washington consultant who is an expert on communications privacy law. "Cellular phones are particular vulnerable and obviously there is a market for devices that do this." However, the federal law that restricts equipment that is "primarily useful" for eavesdropping has been controversial among industry experts. Even though it bans the manufacture, use and sale of such devices, they are still widely advertised on the Internet and in hobbyist and electronics magazines. Walz and Daggett assert that the equipment they sell has a variety of nonsurveillance applications. Walz also said that in 1996 when he tried to ask federal prosecutors for a clear definition of the limits set by the law, he was told the authorities could not advise him. The company was, however, able to obtain export licenses from the Commerce Department for some of its sales to private companies, Walz said. One export license granted on June 15, 1993, describes a $103,000 order from a private Italian firm for 20 copies of a device described as "a cellular phone monitoring system allowing calls to and from target phone to be monitored within a single cell." Communications engineers said court rulings have created loopholes that permit eavesdropping on portable phones and baby monitors, while outlawing surveillance of cell phones. "The question is, does the design of the equipment render it primarily useful for electronic interception?" said James Ross, an electronics engineer in Sterling, Va. "This is the only law I know of that a person doesn't know until he is indicted what the law actually covers." The federal prosecutor in the case, Carlos Singh, an assistant U.S. attorney in San Jose, said he would not comment until after the trial. The San Jose case is also clouded by a pretrial ruling by U.S. District Court Judge James Ware that classifies a portion of the evidence for national security reasons. That ruling stems from a previously pending 1996 indictment against Walz and Daggett for the sale of surveillance gear to Mexican federal officials that has also been classified. Pretrial hearings in that case were held in a closed courtroom in San Jose last year in the presence of an official from a government agency with power to limit the disclosure of evidence, according to several people familiar with the case. Until the 1996 arrests, the company had made monthly reports on its foreign sales to CIA representatives, according to a former employee. In recent years the FBI and the Clinton administration have lobbied Congress to pass legislation to modify the nation's communications networks to make eavesdropping easier in the face of rapidly changing technology. Louis Freeh, the FBI director, has also lobbied Congress in recent months for new laws that would restrict the domestic use of data-scrambling hardware and software. The agency is concerned that recent advances in technology will make it simple for suspected criminals to protect their telephone and computer conversations from law enforcement agents. Walz also said that despite the power of the gear they sell, rudimentary eavesdropping capabilities exist in most cellular telephones and that instructions for employing these features are readily accessible in documentation posted on the World Wide Web. Jury selection in the case will begin Tuesday and the trial itself is scheduled for the following week. Several suppliers and business associates of Tech Support Systems said that the arrests earlier this year had sent a chill through the industry that supplies the eavesdropping gear and related components. "After I heard about Gil's arrest I went to my attorney and he said he believed I was OK," said Mark Siegesmund, an engineer who has a small company in Brookfield, Wis., that supplied components to Tech Support Systems. "But I now require my customers to sign a letter certifying their application." ************************************************************************** 2)From: piricklaws@aol.com (PIRickLaws) Subject: USPS employment locator Need info on a US Postal Service employee? Try this: 800-276-9850 You will need to enter the employee's SSN, but the info is great. Rick Laws Black Knight Investigations WA lic. #759 ************************************************************************** 3)From: Eric Schneider Subject: Re: PGP files > If I am using PGP to encript files, and have saved them prior to encription > can my hard drive be read and the saved unencripted original version be > retrieved? Most Likely... > Alternately, if I create a new doc and it is untitled, unsaved and my > computer is auto saving(in plain text) and I later, without titling or > saving, encript the document. Do those plain text versions still exist > somewhere and are they retrievable. Yup, temp files are a nightmare for security. > If so how can this be prevented. There are several programs to help with this. What you want is to rewrite any sectors on your drive that are not allocated by the filesystem. Note that these programs do not get along well with disk stegenography prgrams (they intentionally store data in unused portions of the disk). Do a net search for something like "disk wipe clean security undelete",etc,etc. There have been a few posts reguarding this issue in the past. Several products were mentioned. Eric ************************************************************************** 4)From: BADCOFFEE@aol.com Subject: TSCM and R.S. Bugs Augie, Since you probably will not put together your FM wireless mike kit for a while, you might want to invest in a already assembled FM wireless mic (also from Radio Shack catalog # 33-1076) which can be used for remote tape recordings, in PA systems, monitoring a child´s room etc. It transmits to any FM radio or receiver turntable to 88-108 MHz (more than the do it your self kit). Up to 200-foot range when used outdoors, 100 feet indoors.<<<<<<< Carlos, Ah! One step ahaid of you. :-) I picked one up this weekend and YES....its tiny. about 1 1/4" x 3/4 (eyeballed) Im having a devil of a time tuning it to higher frequencies (108). (It has a tunning knob) The whole ball of wax with this thing is the quality of the RECEIVER. It retails for about $20 even. For $20 bucks.....it's NOT at all that bad. I would never use it on a "chance in a lifetime" catch. It is still a toy. (or is it?...never seen a profossional bug) Now....question for you all: If the antenna is wired to the dead wires on a phone line......does this increase the range. I once seen a TV antenna that gets plugged into a AC outlet that uses the house wiring as a super antenna. Wondering if same concept is applied here. Also: I know enough right now to do BASIC TSCM visual sweeps. (again, visual) Can the antenna on a device like this be wired direct to the phone line....feed off the phone's current....and transmit? There is a voltage difference I am sure.....any transformers I should look for? I this "would" drain power I am sure. Enought to be detected through a basic digital multimeter? Augie ************************************************************************** 5)From: "Betty G.O'Hearn" Subject: Weapons of Mass Destruction Terrorism Coming In November The Cold War threatened mutual nuclear annihilation. In the Gulf War, the Iraqi threat of chemical or biological payloads loomed with every Scud launch. Today, the threat is the use of such weapon systems by terrorist organizations. On November 14, 1994 President Clinton signed Executive Order number 12938 which declared a national emergency. It said that proliferation of weapons of mass destruction (those weapons categorized as nuclear, chemical or biological) posed an unusual and extraordinary threat to the national security, foreign policy, and economy of the United States. Commander James (Ken) Campbell's new book, "Weapons of Mass Destruction Terrorism" responds to these national concerns and argues that the terrorist use of Weapons of Mass Destruction will emanate from non-state groups operating under a veneer of religion, or ethnic-racist hate. These groups, plus the occasional cult, are the most likely candidates to threaten use of WMD in a mass casualty "super-terrorist act". Emanating from these movements will be the "Post Modern Terrorists" who possess a "ripeness" to threaten use of weapons of mass destruction Campbell's very readable, non-technical book is an occasionally terrifying look at Why such terrible weapons might be used and Who would resort to their use. Commander Campbell is one of the world's pre-eminent experts on terrorism, how such groups think, what drives them and the likelihood of them attacking large numbers of people using Weapons of Mass Destruction. The reviews speak for themselves: "Campbell's work is brilliant. Absolutely essential reading." (Mike Boettcher, News Correspondent, NBC) "The possible use of mass-destruction weapons by terrorists is a matter of grave importance for decision makers and for the public at large. Campbell's study is by far the most thorough and comprehensive work. It is an imperative reading on this subject." (Professor. Ariel Merari, Director of the Political Violence Research Unit, Tel Aviv University) "Campbell is among the precious few who ask the right questions about the use of weapons of mass destruction by 'post-modern terrorists.'" (Prof. Ehud Sprinzak, Hebrew University of Jerusalem) "Campbell has vividly brought to life the terrible threat posed by the migration of ever greater destructive power into the hands of quite small, often deranged, groups." (John Arquilla, Naval Post Graduate School, Monterey, California) "In 'WMD Terrorism,' Commander Campbell … demonstrates that religiously motivated groups -- including Christian Patriots, apocalyptic groups, and violent Islamic Fundamentalists - are most likely to escalate to weapons of mass destruction. Campbell's analysis is thorough and convincing. He brings a wealth of experience to bear in this study." (Jessica Stern, Ph.D, former staff member of the National Security Council) "Weapons of Mass Destruction Terrorism," by James K. Campbell $29.95, 192pp 8 1/2 X 11, ISBN: 0-9628700-3-X Available November 9, 1997 Publisher, Interpact Press. Order from your favorite bookstore or from the on-line Bookstore at http://www.infowar.com or http:// www.info-sec.com. Betty O'Hearn Assistant to Mr. Winn Schwartau 813-360-6256 Voice 813-363-7277 FAX http://www.infowar.com http://www.info-sec.com ************************************************************************** 6)From: Bob Mather Subject: Re: Maricopa County Criminal Records We can search for $15(any county in the US) for a seven year search. Each additional year is $2. Let me know if We can Help Good Luck! Bob Mather At 12:21 AM 10/13/97 -0700, you wrote: >I need an on-site criminal records search for Maricopa County covering >1982 to present as soon as possible for a federal case I am working. If >anyone can handle this please email me privately with prices/turnaround. Bob Mather Employers Investigative Services Serving the investigative Needs of Employers Nationwide 916-222-8538 PI # 17141 ************************************************************************** 7)From: "zack" Subject: FYI eluhow@erols.com Page me http://wwp.mirabilis.com/2457748 FYI http://www.optoelectronics.com ************************************************************************** 8)From: Gregory Caldwell Subject: Several PI related issues Augie: Sorry I can't help with NJ rules and issues of exclusion for performing PI work. You are on the right track, though. Continue to contact every PI you can find in your area (if you haven't already done so) and let them know that you are available for part time work (surveillance or otherwise). If you are contacting PIs and asking for full time, their work is always first going to go to current staff and they probably won't call you back. However, EVERY PI needs part time help on occasion; also let them know you will perform public records searches (prop records, dmv, bankruptcies, court docs, etc.) This is boring, time-consuming work that every agency has to do. (You will need to know how to get this type of information anyway when you're big and famous and leave airport screeners gasping instead of laughing at you anyway). Granted, a bunch of information is available on the 'net now through various agencies and brokers but use caution -- GIGO applies. Data entry personnel who can't spell or who transpose numbers have infected more than just credit bureaus with their sloppy work. Information retrieved by an information broker should generally be a lead generator that you can then follow up and verify yourself or, if out of town, with an associate investigator like those on this list. I know you are interested in the tech aspects of the biz, but knowing where and how to retrieve information from the various government agencies will make you of immediate value to firms you are offering your services to. Records searches, BTW, can be very time consuming as far as gaining time/experience. (For instance, you can find that someone filed bankruptcy easily on the 'net, but to VIEW the files to see if there was fraud, you need to go to the federal courthouse.) Lastly, regarding your second question of so-called "confidential informant laws" I THINK I understand what you are asking. The press, most doctors, the clergy, attorneys, (sometimes) law enforcement and even spouses have confidentiality privileges, but only under certain conditions, which I won't go into in detail here. If I understood your question, you want to know if a PI has the ability to protect an informant (legally or otherwise). The simple answer is yes. . .and no. If you are working for an attorney on a case, the constitutionally protected attorney/client privilege extends to you with regard to the client only. Conversations you have with the attorney and your common client are protected and you cannot be asked to testify as to the details. However, if you develop an informant (which you will) who provides information (which they might) who wishes to remain anonymous (which they can), you have no legal standing to protect their identity. If on the witness stand in a trial you are asked, you can either lie, give him/her up, or refuse to answer, in which case, if the information is critical to the outcome of the trial, you can/will be held in contempt. (That means bringing a toothbrush whenever you are subpoenaed.) To avoid having to make this decision, you simply use the information as a lead generator and try to confirm it some other way. That is how you protect the informant and make yourself rich and famous. And speaking of informants, has any other PI been questioned by the IRS on payments to informants which are always in cash and which never come with a receipt? That's fun, but it turns out it can be an accepted practice (obviously, if not used excessively). USUAL LEGAL WAIVER APPLIES (Not a tax attorney, etc. etc.) Take care all. To those appropriate, I will be in NY next week and will try to call. Coffee Augie? -- _____________________________________ Gregory J. Caldwell, V.S.M. ISC - The Caldwell Group Colorado Investigations & Security Management ************************************************************************** 9)From: "Betty G.O'Hearn" Subject: Secret FBI Files Web Site Cu Digest, #9.73, Sun 12 Oct 97 Date: Mon, 6 Oct 1997 16:42:27 -0500 (CDT) From: Michael Ravnitzky Subject: File 3--Secret FBI Files Web Site Please pardon any interruption, but I believe that you may be interested in the Secret FBI Files Website at http://www.crunch.com/01secret/01secret.htm This free site has been carefully compiled from FBI records and lists thousands of important and interesting FBI Files that you can get very easily from the government simply by asking. This material has never, repeat never been published before anywhere. If you are interested in FBI files, this is a wonderful resource. Sorry again for any interruption, and I won't send you any other correspondence, but I hope you can provide me with some feedback on my website, which is real a labor of love. And if you like it, tell a friend. Michael Ravnitzky Second Year Law Student MikeRav@ix.netcom.com http://www.crunch.com/01secret/01secret.htm Betty O'Hearn Assistant to Mr. Winn Schwartau 813-360-6256 Voice 813-363-7277 FAX http://www.infowar.com http://www.info-sec.com ************************************************************************** 10)From: "cookpi" Subject: Assistance needed in Rochester NY Greg M Cook cookpi@citynet.net need area info on case in Rochester area. call 304-697-7633 or email price and turn around. ************************************************************************** 11)From: DanielDLC@aol.com Subject: Pro-43? Hello everyone, I'm searching for the discontinued Radio Shack scanner model Pro-43. Anyone know where I can locate one? ************************************************************************** 12)From: Ralph Lord Subject: ANI in Dallas Does anyone have the ANI for (214) in Dallas, TX? ************************************************************************** 13)From: "Shadow Chasers" Subject: Surveillance Exp '97 For those SL members interested (AUGIE) goto the Surveillance Expo '97, 9th Annual, International Surveillance and Countersurveillance Conference and Exposition. October 27th, 28th and 29th, 1997 (Exhibits open October 28th - 29th) HOTEL: Sheraton Premiere, Tysons Corner, VA. ************************************************************************** 14)From: Leroy E Cook Subject: Re: Mobile, Alabama Ditto from all of us at ION, Gary Ettisch-Enchelmaier GmbH wrote: > Dear Gary! 10/12/97 > > Good luck and keep in touch > Miriam > One of your GLOBAL sources, 25 years of experience > M. Ettisch-Enchelmaier, B.A., president, CEO > Ettisch-Enchelmaier GmbH Tel.(0049-6238)989098 > Bodelschwinghstr. 9/Dirmstein/Germany Fax.(0049-6238)989099 +(+6238)1313 > http://www.hsv.tis.net/~pvteye/ettisch.html > > I am proud to announce that I am now a partner in PFC Investigations, > Mobile, Alabama. PFC has a staff of seasoned ex-LEO's, experienced in all > aspects of investigation; including, but certainly not limited to: criminal > investigation, litigation investigation, fugitive recovery, surveillance, > accident investigation, and now expanding with computer investigations and > computer security. > We would be pleased to be your South Alabama connection. Let us augment your > agency. > Call us at 334-476-9309, or e-mail me at heatgain@mindspring.com. More > numbers and url's and services to come in the near future. > > We now return you to your regularly scheduled thread. > > Gary Cohen Investigator > PFC Investigations > Mobile, Alabama - 334-476-9309 > heatgain@mindspring.com Member-FALI & SFIA > Chairman, Internet Committee, SFIA (South Florida Investigators Assoc.) > SFIA - http://www.webcircle.com/users/sfia/ ************************************************************************** 15)From: "Steven R. Price" Subject: Re: Kamikazes -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 +++Moderator's Note+++ Speaking of Kamikazes... does anyone know... think about this before you answer... Why Japanese Kamikaze pilots wore crash helments? Answere? OSHA-hama rules. It shows there are are beaurocrates throughout history. SRP -----BEGIN PGP SIGNATURE----- Version: PGP for Personal Privacy 5.0 Charset: noconv iQA/AwUBNEJwuQJlCFv4BgIXEQL41QCgoTurq0OWvSZvR1LJEfkfjU+79kUAoKL/ G1C3opB+WMzVhcnVZPNAdbaz =BrRH -----END PGP SIGNATURE----- ************************************************************************** 16)From: "The Swordsman" Subject: Browsing someone's hard drive via the Internet -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 I heard an ugly rumor through the local grapevine here that it is possible for a user to browse through your IP provider straight to your computer, and from there have access to all of your files on your drive. Is there any truth to this? If so, how can it be countered, and how does it work? I had previously thought it was only possible to hack into someone's account, but since that is on the ISP's server, and not your computer, that's as far as they can go. Any advice is appreciated, -----BEGIN PGP SIGNATURE----- Version: PGP for Personal Privacy 5.0 Charset: noconv iQA/AwUBNEKD30mn2Zzz4JqKEQK8uQCgogOal0pmknR61BwGUooiZgNRnsIAoLhi YHwM28n4sSt0oxg2yGgd7Nms =PWkk -----END PGP SIGNATURE----- Frank Pagano (a.k.a. The Swordsman) Auxiliary Police Officer, New York http://www.geocities.com/CapitolHill/7245 ICQ# 2052068 -------- Member Coalition of Internet Advocates http://www.geocities.com/Heartland/Prairie/9338 -------- Disclaimer: My thoughts, my life ************************************************************************** 17)From: daydog@dial.pipex.com (daydog) Subject: Bestwipe Sorry the url below should read http://www.jetico.sci Thanks to Paul for pointing this out :( ¦¦¦>There is a file wipe program available from ¦¦¦>http:\\www.jetico.sci.fi it's called "Bestwipe" I think? ¦¦¦>and it's freeware. ************************************************************************** 18)From: nobody@REPLAY.COM (Anonymous) Subject: Re: Magnetic cards and hotel room doors I have finaly figured out how the magnetic card doors work in hotel rooms. This last weekend I was in a hotel that had them, and I left for about two days to work in another location. When I got back, the front desk had said that I was allready checked out. I had the room for 4 days, but was only there 1 day. My door key still worked even though the hotel had checked me out. This leads me to believe that the magnetic cards hold an address which corresponds to each door in the hotel. In addition, the card holds a date that you should check out on. Each time you use the card, the date on the magnetic key is compared with the current date in the lock, as well as the address of the card and door. The door locks hold a small lithium battery (last about 5 years or so) that powers the real time clock in each door. And there you have it! Dale ************************************************************************** 19)From: Ted Johsnon Subject: Protect the property -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 A friend of mine has a remote cabin, which is not occupied most of the time. The cabin was robbed recently (this isn't the first time, it is vandalized quite frequently). This last time they took almost everything (including the dish washing detergent!!!). The local county sheriff rarely travels this road and isn't of much help. I suggested he install a video camera that would be activated by a motion detector. Does anybody have any good ideas on what he should do to protect the property? What would be a good low cost camera and recorder w/ some sort of motion detector switch? Thanks for the help. -----BEGIN PGP SIGNATURE----- Version: PGP for Personal Privacy 5.0 Charset: noconv iQA/AwUBNELDuk4VbRk0jcqNEQK1gQCgqJ6Y7U+q8O/E1rS6qAz2bctuvegAnjjo jFyNPrr1DEGiruBH0PI3es5S =Fhl9 -----END PGP SIGNATURE----- Sincerely, Ted Johnson http://www.htrac.com ************************************************************************** 20)From: KDots@aol.com Subject: Re: File Detention and Retrieval <,and it's freeware. There is also another shareware "drive>