****************************************************************************** The Official Newsletter of W.A.S.P. The World Association of Surveillance Professionals http://www.thecodex.com/wasp.html ****************************************************************************** Vol.Two Issue #188 The Surveillance List Sept.2,1997 Over 2700+ Members Worldwide Representing 53 different countries List Chat at: http://www.thecodex.com/chat.html Surveillance List Pseudo FAQ at: http://www.thecodex.com/faq.html ****************************************************************************** IN THIS ISSUE... ****************************************************************************** 01) HOTMAIL & COOKIES 02) Boston Security Show/Conference 03) Re: Trying to locate a girl 04) LOCKPICK TIP 05) Re: pager decoding 06) Legal Definition of a PI in Texas 07) Here's a PI definition for your reference file 08) Equipment Supplier 09) Good basic-level books? 10) Re: HALL of SHAME 11) Re: What is a PI? 12) Re: Interesting reading 13) Here's one for the TSCM boffins! 14) Re: Eudora Lite File Recovery 15) Re: High Capacity Mags and Federal Firearms Laws 16) Re: Infinity Transmitter + EMP 17) Just go here....ask no questions..... 18) In response to the 64 requests for ANACS (ANI) 19) I'm looking for... 20) Scanner modifications 21) WinZip question 22) Have e-mail, need name ****************************************************************************** DON'T BE A LURKER.... GET INVOLVED... YOU ARE A MEMBER... MAKE THE MOST OF IT ****************************************************************************** 1)From: "Shadow Chasers" Subject: HOTMAIL & COOKIES Not plugging HoTmAiL, but one reader/author posted his concerns about Hotmail security, within two day's HotMail responded to users after a successful login the following: "Hotmail gives you better security and more usability. With the use of "Cookies" you can now use Hotmail even from behind proxy's that use floating IP's for load balancing. These special cookies don't store sensitive user information about you and can't be read or used by other services to track or obtain information about you or your company. For those of you that aren't accessing Hotmail through a proxy or a server with a floating IP you can still use Hotmail without the use of cookies." What do you think about the above, HoTmail exec's subscribing to Surveillance List (tee hee)! ************************************************************************** 2)From: "Compaq User" Subject: Boston Security Show/Conference jUST A QUICK NOTE TO MY FRIENDS ON THE LIST. iF YOU ARE IN THE BOSTON AREA ON 9/30 & 10/1 YOU MIGHT WANT TO STOP BY THE HYNES EXPO CENTER THEY ARE HAVING A SHOW TITLED "CRIMINAL JUSTICE EXPO AND CONFERENCE WITH 30K SQ FT. OF EXHIBITS. THE SEMINARS LOOK KIND OF DROLL BUT THE EXHIBITORS SHOULD HAVE ALL KINDS OF NEAT TOYS TO DISPLAY. I HAVE NOTHING TO DO WITH THE SHOW BUT THOUGHT SOME ONE MIGHT BE INTERESTED IF SO E-MAIL ME AND ILL SEND MORE INFO IF NEEDED. JERRY ************************************************************************** 3)From: "Russel C. Eckert" Subject: Re: Trying to locate a girl >I was hoping someone could point me in the right direction(s). I am trying >to locate a girl I went to college with. She lives in NY or NJ area, but >has since gotten married. If you know where she originally lived, try her parents or relatives. They should be willing to give her new name and address if you apply the proper "social engineering" skills, or try the alumni directory from your/her old school. Did she belong to any groups clubs organizations? Try them. -- BlacBearde Blacbear@ix.netcom.com Telecom, Pagers, Cellular & More! http://www.flashfill.com/cellular/prepaid.html For WebServer info see:http://www.adgrafix.com/info/ceckert * See http://bs.mit.edu:8001/pks-toplev.html for PGP public key. ID:0xCB29FF6D* Make Money, Spread Love, visit http://www.lovenotes.com/df112.htm Office:513-244-9492 Fax:513-272-3104 ************************************************************************** 4)From: BADCOFFEE@aol.com Subject: LOCKPICK TIP Dual DISK tumblers: Layman’s terms: This is where you have DISKS (plates) instead of pins. MINIMAL security. Used on things like mail boxes, file cabinets and anything where security is NOT of concern........Like "The CLUB". Most of the time there are only ONE set of disks. Usually 4 and on top. DUAL disks have bottom and top disks. Twice as hard as single?? NO...2 times zero is still zero. (zero being difficulty factor) Technique: DUAL disk's require a different type of torque wrench (makes it a lot easier). It looks like a spring action wishbone "Y" and sits on the top and bottom of the key entry. However...the idea is to get torque on the wrench in any way possible. I have not concentrated on a home made version of this yet....but I am intrigued with the possibility of being able to make one out of a paperclip (haven’t tried yet, have a feeling it is not strong enough) Technique: NO different that regular raking or picking. Maintain pressure on the wrench and work on one side (upper or lower) and just SWITCH sides when there is no progress being made. Torque pressure : "slightly" more than usual. (still very light) When you see disk tumblers.....smile. It's already open just about. How to ID- Look inside keyway. Disks (plates) Clearly visible in the keyway. Going to start repeating lock pick posts. This list has just about tripled since I got here. Augie ************************************************************************** 5)From: "KcW" Subject: Re: pager decoding > > Are there any self contain boxes that take a discriminator output on > one end and output everything else out a serial line or built in display? > Working on it, stay tuned. KcW (gotta luv them PICs!) ************************************************************************** 6)From: Trace Carpenter Subject: Legal Definition of a PI in Texas Augie, The legal definition in Texas is: Any person who engages in the business or accepts employment to obtain or furnish information with referrence to: crimes or wrongs done or threatened against the United States of America or any state or territory of the United States of America; the identity, habits, conduct, business, occupation, honesty, integrity, credibility, knowledge, trustworthiness, efficiency, loyalty, activity, movement, whereabouts, affiliations, associations, transactions, acts, reputation, or character of any person; the location, dispostition, or recovery of lost or stolen property; the cause or responsibility for fires, libels, losses, accidents, damages, or injuries to persons or to property; the securing of evidence to be sued before any court, board, officer, or investigating committee; or the electronic tracking of the location of any individual or motor vehicle other than for criminal justice purposes by or on behalf of a governmental entity; or any person who engates in the business of or accepts employment to protect one or more individuals from bodily harm through the use of a personal protection officer. ************************************************************************** 7)From: FGM Subject: Here's a PI definition for your reference file Augie, here's a PI definition for your reference file. Code of Virginia, Sections 9-182 and 9-183 The legal definition of a PI in the Commonwealth of Virginia, where I'm registered (the business is 'licensed' and the individual PI is 'registered'), is as follows: "'Private investigator' means any person who engages in the business of, or accepts employment to make, investigations to obtain information on (i) crimes or civil wrongs, (ii) the location, disposition, or recovery of stolen property, (iii) the cause of accidents, fires, damages, or injuries to persons or to property, or (iv) evidence to be used before any court, board, officer, or investigative committee." It follows from the absence of any reference to special powers (such as power of arrest) that there IS no such power. What's left, however, is open to the interpretation you mentioned, especially the word "investigation." Hope that's helpful. All you need now is 50 more. (D.C., y'know....) ************************************************************************** 8)From: Duece6x6@aol.com Subject: Equipment Supplier I haven't been on in awhile. Here is one of those special electronic equip. suppliers. http://www.dtccom.com/index.htm If anyone has similar info let me know THE DUECE ************************************************************************** 9)From: "Scott Rennie" Subject: Good basic-level books? Could anyone suggest some good basic-level books on surveillance techniques and equipment - nothing too technical? Cheers, Scott Rennie ************************************************************************** 10)From: Robson Steve Subject: Re: HALL of SHAME >17)From: BADCOFFEE@aol.com >Subject: HALL of SHAME >HALL of SHAME most Disappointing security Product on the market: >I borrowed "The Club" from a friend and have the following comments: >"Is this a joke?" Manipulation in 3 1/2 seconds? 17 consecutive times? By "The Club" I assume you are talking about the car club that stretches and locks across the steering wheel of an automobile. IF SO - Here in Australia it is common practice for car thieves to hold the club where it joins at the lock, brace your foot against the steering wheel and pull back while pushing the foot forward. You don't need to bend them much to be able to take them off. Maybe not as quick as Augie but just as effective. Stephen.. ************************************************************************** 11)From: Kevin Quilliam Subject: Re: What is a PI? I am not a lawyer, but from the law enforcement perspective classes I have taken in criminal justice, I understand the exclusionary laws to only apply to actions taken by law enforcement officers or some person working for the government (state or federal), not a private citizen. The exclusionary rules were established in Mapp v. Ohio (1961). This case specifically mentions Fourth Amendment violations by police officers and leaves open evidence obtained by those not connected to the government. It is my understanding that information obtained by a private citizen, regardless of method, can be used by the police and would stand up in court. You are correct, however, in saying that the police could arrest you as well for the specific crime of wiretapping or breaking and entering. Kevin ************************************************************************** 12)From: R2_D2 Subject: Re: Interesting reading > .....To this day, No Fedearal law protects the confidentiality of > medical > records. > TIME Magazine August 25, 1997 page 32 > > Incredible bit of information in that article. Hats off to TIME and > it's Authors. (If any of them are here..drop me a line) Augie: Sorry, but don't shoot the messenger! There is a federal law, just recently passed. I do not know when it will be enforced, but the first offense is severe! No hand slap. It is called the "Kennedy / Kasselbaum health information portability act of 1996 (I think)", which makes it totally illegal to obtain medinfo if not authorized to do so, as well as disseminate medinfo to a third party, even if you have the proper permission to obtain. Hope this is usefull. Randy ************************************************************************** 13)From: spycom Subject: Here's one for the TSCM boffins! I was called in to check on a telephone set ,at a coperate client,as it had been relaced by the telephone company the day before. After doing the necessary checks I flashed up the CPM 700 to check for RF and discovered the following: a. no RF when on or off hook b. RF and telephone audio when using speakerphone The telephone is a GPT ISDT 300+ (digital) made in the UK. All other like telephones had the same characteristics . The signal was picked up for a five meter radius with the CPM. The RF is only present when using the speakerphone so the obvious is to avoid that function. I intend to visit the site again next week to determine the exact frequency and distance the signal is transmited. Any clues ? ************************************************************************** 14)From: Eric Subject: Re: Eudora Lite File Recovery I'm not too familiar with Eudora for the Mac but if it's any thing like t he PC version all of the mail messages are stored within a database created by the mail program. Each mailbox you have under Eudora has it's own separate database denoted by the MBX extension on the PC, so if you have a mailbox named Inbox it's corresponding database file name would be inbox.mbx. I don't know if this is true for the Mac but if it is you may be SOL. Have you tried looking in your trash mailbox in Eudora. The message may still be sitting in there if you haven't emptied your trash mailbox. Eudora sends deleted mail items to the trash mailbox by default and they stay there until you delete them from that mailbox. Note that the trash mailbox is a separate entity from the trash can that sits on you Mac desktop. Another place to look might be your sent items mailbox if you reply to the particular email and left the body of the original message in your reply you may have a copy of the message still sitting in your Sent Items Mailbox. If it is not in either of those places your probably out of luck because I don't know of any way to recover a deleted record from a database. Hope this helps. Be Well Eric "The Computer Is Your Friend" -----BEGIN PGP PUBLIC KEY BLOCK----- Version: 2.6.2 mQCNAzHOVTsAAAEEALiUM2m/GNybNjXEW9KiHKDFjG0WGudUIODlKlT9sFnkwzma ioH66Z8a6ZXuoG071GzTZ2Pu+oQ8OybA7kfVllv38FdKz2qIs29oJXBpppOVRZvr G68htPMow3yx+grZZQVKG/jK8j2ZUgSal1mh//OA+YE2HnCyyM2K3SBgQR0VAAUR tAhlbGRyaWRnZQ===5hLF -----END PGP PUBLIC KEY BLOCK----- ************************************************************************** 15)From: JOHNSGUN@aol.com Subject: Re: High Capacity Mags and Federal Firearms Law The practical aspect on high capacity magazines holding MORE than 10 rounds were grandfathered in back in Sept 1994 . After that , no more manufacture in the U.S. or importation of newly manufactured mags . If you had it before 9/94 it's legal to possess and use under Federal law ; local law is another story . Also you can purchase these for use in a firearm made after 9/94 , e.g. a Beretta 92 that currently comes equipped with a 10 round mag can legally use a pre-ban 15 round mag . An excellent source for locating & acquiring any magazine ,firearm ,or parts (including LEGAL machineguns) is the publication Shotgun News available at most any large newstand or by subscription @ 1-800-345-6923 . There are occasionally listings in it for U.S. & foreign military electronics current and obsolete . ************************************************************************** 16)From: CCWK70B@prodigy.com (MR BRADLEY S JONAS) Subject: Re: Infinity Transmitter + EMP I've seen the Infinity and several EMP projects at Information Unlimited. They also have bugging equipment, surveillance stuff, etc. http://www.amazing1.com I think, Yahoo lists it though. Enjoy! B ************************************************************************** 17)From: BADCOFFEE@aol.com Subject: Just go here....ask no questions..... http://www.landfield.com/faqs/alt-2600/faq/ Excellent Augie ************************************************************************** 18)From: BADCOFFEE@aol.com Subject: In response to the 64 requests for ANACS (ANI) Complements of: Alt.2600 (Thank you) NPA ANAC number Approximate Geographic area --- --------------- --------------------------------------------- 201 958 Hackensack/Jersey City/Newark/Paterson, NJ 202 811 District of Columbia 203 970 CT 205 300-222-2222 Birmingham, AL 205 300-555-5555 Many small towns in AL 205 300-648-1111 Dora, AL 205 300-765-4321 Bessemer, AL 205 300-798-1111 Forestdale, AL 205 300-833-3333 Birmingham 205 557-2311 Birmingham, AL 205 811 Pell City/Cropwell/Lincoln, AL 205 841-1111 Tarrant, AL 205 908-222-2222 Birmingham, AL 206 411 WA (Not US West) 207 958 ME 209 830-2121 Stockton, CA 209 211-9779 Stockton, CA 210 830 Brownsville/Laredo/San Antonio, TX N 210 951 Brownsville/Laredo/San Antonio, TX (GTE) 212 958 Manhattan, NY 213 114 Los Angeles, CA (GTE) 213 1223 Los Angeles, CA (Some 1AESS switches) 213 211-2345 Los Angeles, CA (English response) 213 211-2346 Los Angeles, CA (DTMF response) 213 760-2??? Los Angeles, CA (DMS switches) 213 61056 Los Angeles, CA 214 570 Dallas, TX 214 790 Dallas, TX (GTE) 214 970-222-2222 Dallas, TX 214 970-611-1111 Dallas, TX (Southwestern Bell) 215 410-xxxx Philadelphia, PA 215 511 Philadelphia, PA 215 958 Philadelphia, PA 216 200-XXXX Akron/Canton/Cleveland/Lorain/Youngstown, OH 216 331 Akron/Canton/Cleveland/Lorain/Youngstown, OH 216 959-9892 Akron/Canton/Cleveland/Lorain/Youngstown, OH 217 200-xxx-xxxx Champaign-Urbana/Springfield, IL 219 550 Gary/Hammond/Michigan City/Southbend, IN 219 559 Gary/Hammond/Michigan City/Southbend, IN N 301 2002006969 Hagerstown/Rockville, MD 301 958-9968 Hagerstown/Rockville, MD 303 958 Aspen/Boulder/Denver/Durango/Grand Junction /Steamboat Springs, CO N 305 200-555-1212 Ft. Lauderdale/Key West/Miami, FL N 305 200200200200200 Ft. Lauderdale/Key West/Miami, FL N 305 780-2411 Ft. Lauderdale/Key West/Miami, FL 310 114 Long Beach, CA (On many GTE switches) 310 1223 Long Beach, CA (Some 1AESS switches) 310 211-2345 Long Beach, CA (English response) 310 211-2346 Long Beach, CA (DTMF response) 312 200 Chicago, IL 312 290 Chicago, IL 312 1-200-8825 Chicago, IL (Last four change rapidly) 312 1-200-555-1212 Chicago, IL 313 200-200-2002 Ann Arbor/Dearborn/Detroit, MI 313 200-222-2222 Ann Arbor/Dearborn/Detroit, MI 313 200-xxx-xxxx Ann Arbor/Dearborn/Detroit, MI 313 200200200200200 Ann Arbor/Dearborn/Detroit, MI 314 410-xxxx# Columbia/Jefferson City/St.Louis, MO 315 953 Syracuse/Utica, NY 315 958 Syracuse/Utica, NY 315 998 Syracuse/Utica, NY 317 310-222-2222 Indianapolis/Kokomo, IN 317 559-222-2222 Indianapolis/Kokomo, IN 317 743-1218 Indianapolis/Kokomo, IN 334 5572411 Montgomery, AL 334 5572311 Montgomery, AL 401 200-200-4444 RI 401 222-2222 RI 402 311 Lincoln, NE 404 311 Atlanta, GA N 770 780-2311 Atlanta, GA 404 940-xxx-xxxx Atlanta, GA 404 990 Atlanta, GA 405 890-7777777 Enid/Oklahoma City, OK 405 897 Enid/Oklahoma City, OK U 407 200-222-2222 Orlando/West Palm Beach, FL (Bell South) N 407 520-3111 Orlando/West Palm Beach, FL (United) 408 300-xxx-xxxx San Jose, CA 408 760 San Jose, CA 408 940 San Jose, CA 409 951 Beaumont/Galveston, TX 409 970-xxxx Beaumont/Galveston, TX 410 200-6969 Annapolis/Baltimore, MD N 410 200-200-6969 Annapolis/Baltimore, MD 410 200-555-1212 Annapolis/Baltimore, MD 410 811 Annapolis/Baltimore, MD 412 711-6633 Pittsburgh, PA 412 711-4411 Pittsburgh, PA 412 999-xxxx Pittsburgh, PA 413 958 Pittsfield/Springfield, MA 413 200-555-5555 Pittsfield/Springfield, MA 414 330-2234 Fond du Lac/Green Bay/Milwaukee/Racine, WI 415 200-555-1212 San Francisco, CA 415 211-2111 San Francisco, CA 415 2222 San Francisco, CA 415 640 San Francisco, CA 415 760-2878 San Francisco, CA 415 7600-2222 San Francisco, CA 419 311 Toledo, OH N 423 200-200-200 Chatanooga, Johnson City, Knoxville , TN N 501 511 AR 502 2002222222 Frankfort/Louisville/Paducah/Shelbyville, KY 502 997-555-1212 Frankfort/Louisville/Paducah/Shelbyville, KY 503 611 Portland, OR 503 999 Portland, OR (GTE) 504 99882233 Baton Rouge/New Orleans, LA 504 201-269-1111 Baton Rouge/New Orleans, LA 504 998 Baton Rouge/New Orleans, LA 504 99851-0000000000 Baton Rouge/New Orleans, LA 508 958 Fall River/New Bedford/Worchester, MA 508 200-222-1234 Fall River/New Bedford/Worchester, MA 508 200-222-2222 Fall River/New Bedford/Worchester, MA 508 26011 Fall River/New Bedford/Worchester, MA 509 560 Spokane/Walla Walla/Yakima, WA 510 760-1111 Oakland, CA 512 830 Austin/Corpus Christi, TX 512 970-xxxx Austin/Corpus Christi, TX N 513 380-55555555 Cincinnati/Dayton, OH 515 5463 Des Moines, IA 515 811 Des Moines, IA 516 958 Hempstead/Long Island, NY 516 968 Hempstead/Long Island, NY 517 200-222-2222 Bay City/Jackson/Lansing, MI 517 200200200200200 Bay City/Jackson/Lansing, MI 518 511 Albany/Schenectady/Troy, NY 518 997 Albany/Schenectady/Troy, NY 518 998 Albany/Schenectady/Troy, NY N 540 211 Roanoke, VA (GTE) N 540 311 Roanoke, VA (GTE) N 541 200 Bend, OR 603 200-222-2222 NH 606 997-555-1212 Ashland/Winchester, KY 606 711 Ashland/Winchester, KY 607 993 Binghamton/Elmira, NY 609 958 Atlantic City/Camden/Trenton/Vineland, NJ 610 958 Allentown/Reading, PA 610 958-4100 Allentown/Reading, PA 612 511 Minneapolis/St.Paul, MN 614 200 Columbus/Steubenville, OH 614 571 Columbus/Steubenville, OH 615 200200200200200 Chatanooga/Knoxville/Nashville, TN 615 2002222222 Chatanooga/Knoxville/Nashville, TN 615 830 Nashville, TN 616 200-222-2222 Battle Creek/Grand Rapids/Kalamazoo, MI 617 200-222-1234 Boston, MA 617 200-222-2222 Boston, MA 617 200-444-4444 Boston, MA (Woburn, MA) 617 220-2622 Boston, MA 617 958 Boston, MA 618 200-xxx-xxxx Alton/Cairo/Mt.Vernon, IL 618 930 Alton/Cairo/Mt.Vernon, IL 619 211-2001 San Diego, CA 619 211-2121 San Diego, CA N 659 220-2622 Newmarket, NH N 703 211 VA N 703 511-3636 Culpeper/Orange/Fredericksburg, VA 703 811 Alexandria/Arlington/Roanoke, VA 704 311 Asheville/Charlotte, NC N 706 940-xxxx Augusta, GA 707 211-2222 Eureka, CA 708 1-200-555-1212 Chicago/Elgin, IL 708 1-200-8825 Chicago/Elgin, IL (Last four change rapidly) 708 200-6153 Chicago/Elgin, IL 708 724-9951 Chicago/Elgin, IL 713 380 Houston, TX 713 970-xxxx Houston, TX 713 811 Humble, TX N 713 380-5555-5555 Houston, TX 714 114 Anaheim, CA (GTE) 714 211-2121 Anaheim, CA (PacBell) 714 211-2222 Anaheim, CA (Pacbell) N 714 211-7777 Anaheim, CA (Pacbell) 716 511 Buffalo/Niagara Falls/Rochester, NY (Rochester Tel) 716 990 Buffalo/Niagara Falls/Rochester, NY (Rochester Tel) 717 958 Harrisburg/Scranton/Wilkes-Barre, PA 718 958 Bronx/Brooklyn/Queens/Staten Island, NY N 770 940-xxx-xxxx Marietta/Norcross, GA N 770 780-2311 Marietta/Norcross, GA 802 2-222-222-2222 Vermont 802 200-222-2222 Vermont 802 1-700-222-2222 Vermont 802 111-2222 Vermont N 804 990 Virginia Beach, VA 805 114 Bakersfield/Santa Barbara, CA 805 211-2345 Bakersfield/Santa Barbara, CA 805 211-2346 Bakersfield/Santa Barbara, CA (Returns DTMF) 805 830 Bakersfield/Santa Barbara, CA 806 970-xxxx Amarillo/Lubbock, TX 810 200200200200200 Flint/Pontiac/Southfield/Troy, MI N 810 311 Pontiac/Southfield/Troy, MI 812 410-555-1212 Evansville, IN 813 311 Ft. Meyers/St. Petersburg/Tampa, FL N 815 200-3374 Crystal Lake, IL N 815 270-3374 Crystal Lake, IL N 815 770-3374 Crystal Lake, IL 815 200-xxx-xxxx La Salle/Rockford, IL 815 290 La Salle/Rockford, IL 817 211 Ft. Worth/Waco, TX 817 970-611-1111 Ft. Worth/Waco, TX (Southwestern Bell) 818 1223 Pasadena, CA (Some 1AESS switches) 818 211-2345 Pasadena, CA (English response) 818 211-2346 Pasadena, CA (DTMF response) N 860 970 CT 903 970-611-1111 Tyler, TX 904 200-222-222 Jackonsville/Pensacola/Tallahasee, FL 906 1-200-222-2222 Marquette/Sault Ste. Marie, MI 907 811 AK 908 958 New Brunswick, NJ N 909 111 Riverside/San Bernardino, CA (GTE) 910 200 Fayetteville/Greensboro/Raleigh/Winston-Salem, NC 910 311 Fayetteville/Greensboro/Raleigh/Winston-Salem, NC 910 988 Fayetteville/Greensboro/Raleigh/Winston-Salem, NC 914 990-1111 Peekskill/Poughkeepsie/White Plains/Yonkers, NY 915 970-xxxx Abilene/El Paso, TX N 916 211-0007 Sacramento, CA (Pac Bell) 916 461 Sacramento, CA (Roseville Telephone) 919 200 Durham, NC 919 711 Durham, NC N 954 200-555-1212 Ft. Lauderdale, FL N 954 200200200200200 Ft. Lauderdale, FL N 954 780-2411 Ft. Lauderdale, FL Canada: 204 644-4444 Manitoba 306 115 Saskatchewan 403 311 Alberta, Yukon and N.W. Territory 403 908-222-2222 Alberta, Yukon and N.W. Territory 403 999 Alberta, Yukon and N.W. Territory 416 997-xxxx Toronto, Ontario 506 1-555-1313 New Brunswick 514 320-xxxx Montreal, Quebec U 514 320-1232 Montreal, Quebec U 514 320-1223 Montreal, Quebec U 514 320-1233 Montreal, Quebec 519 320-xxxx London, Ontario 604 1116 British Columbia 604 1211 British Columbia 604 211 British Columbia 613 320-2232 Ottawa, Ontario 705 320-4567 North Bay/Saulte Ste. Marie, Ontario N 819 320-1112 Quebec Australia: +61 03-552-4111 Victoria 03 area +612 19123 All major capital cities +612 11544 United Kingdom: 175 Israel: 110 Badcoffee :-) ************************************************************************** 19)From: jdssys@magicnet.net (Jim Davis) Subject: I'm looking for... I am looking for a microphone for a Kenwood TS 440 S. Would prefer something used, either mobile or desk type is acceptable if anyone has such an animal. I ALSO NEED A LIVE BODY LOCATED IN CHILE that can do some simple records checks for me... FEE PAID. Contact Jim Davis at Tiger Security and Investigations (800)942-7388 jdssys@magicnet.net J.M.Davis ************************************************************************** 20)From: BADCOFFEE@aol.com Subject: Scanner modifications Seeking info on unlockng Uniden Bearcat 855XLT to receive ??? Any Mod's apreciated Augie ************************************************************************** 21)From: China Subject: WinZip question I have a large zip file located on my hard disk which is too large to transfer to a 3.5" floppy (1.4 Mb). It is a zip file which I need to archive, and I need to know whether there exists a piece of software which will break such a zip file into smaller pieces so that I can archive it. Such software also needs to have the ability to reconsolidate the individual pieces at a later time. The documentation I have read on WinZip states that a large zip file may be created by WinZip IF the individual pieces are located on removable media, i.e., floppies, but it says nothing about the task I need to accomplish. Does anyone have any information on this subject? Thank you, very kindly. China ************************************************************************** 22)From: Azrael White Subject: Have e-mail, need name my friend got an e-mail from someone at hotmail, but there was no name accompanying the address. he has no idea who this person is or why they are e-mailing him. how can i go about trying to find out who this person is? if you would like to help, the person's e-mail is flicker_and_fade@hotmail.com help as soon as possible would be greatly appreciated! Thanks, Azrael :) ************************************************************************** Who are you? What's your specialty and/or interest? Let us know about your company... What would you like to see on the list? Post it. Let us know... Do you have something to contribute? We'd like to hear it... We want to know EVERYTHING and ANYTHING about eavesdropping, surveillance, countersurveillance & privacy related technology, etc... Remember: who, what, where, when, how & why... we want ALL the details... Do you have a question? Post it... A little free time? Help a member... With the INCREDIBLE brain power on this list, someone should have the answer ;-) P.S. Don't be a LURKER... Members take the time to post info for us all... give something back... Don't just take... Your input/knowledge is valued... ************************************************************************** Send Postings to: spyking@con2.com with "Post" in subject field with subject ************************************************************************** Subscribe to: spyking@con2.com In the subject field type: subscribe-surveillance list e-mail address ************************************************************************** Unsubscribe to: spyking@con2.com In the subject field type: unsubscribe-surveillance list e-mail address ************************************************************************** ...The Simple Rules of the Surveillance List... The Surveillance List Owners may Reject any posts that are/contain: 1) Info Unrelated to Eavesdropping, Surveillance or Privacy technology... 2) Flames or Negative posts... 3) E-Signatures that are considered excessive... 4) Advertisements not DIRECTLY related to the list topics... 5) Attached Files... 6) Oversized Posts... (May be edited to save room) **************************************************************************** This publication is copyrighted and is protected by U.S. and International copyright law. The information transmitted on this list may not be reproduced, reposted or forwarded to any non-list member without expressed written permission of the List Owner. Violation of U.S. copyright law is a criminal and civil offense... **************************************************************************** The Surveillance List is Moderated by SpyKing@thecodex.com The List Owner will make EVERY effort to protect subscribers from spam... Copyright 1996, 1997 Codex Publishing Inc., All Rights Reserved... **************************************************************************** ****************************************************************************** The Official Newsletter of W.A.S.P. The World Association of Surveillance Professionals http://www.thecodex.com/wasp.html ****************************************************************************** Vol.Two Issue #189 The Surveillance List Sept.3,1997 Over 2700+ Members Worldwide Representing 53 different countries List Chat at: http://www.thecodex.com/chat.html Surveillance List Pseudo FAQ at: http://www.thecodex.com/faq.html ****************************************************************************** IN THIS ISSUE... ****************************************************************************** 01) Re: Winzip 02) Re: ZipFiles 03) Caution! 04) How do I? 05) Re: Winzip Question 06) Anti-Scanner Law 07) Re: TSCM boffins / Eudora Lite File Recovery 08) Re: Winzip 09) What is a Private Investigator? 10) Re: Subliminal Mind Bending 11) Does this still work? 12) Cellular Programming Software and Equipment 13) Re: response to "the Club" 14) Re: Have e-mail, need name 15) Business intelligence? 16) Scanner Mods? 17) RedBox Help! 18) Re: Infinity TX 19) Good basic-level books? 20) Re: Winzip question 21) Addresses that don't work ****************************************************************************** DON'T BE A LURKER.... GET INVOLVED... YOU ARE A MEMBER... MAKE THE MOST OF IT ****************************************************************************** 1)From: Alejandro Mendoza Subject: Re: Winzip You must have the external module of pkzip in order to do that, or if you have the Xtgold you can do it easily. If you don´t have anything of this .... Use the ARJ is the best way to compress your archives onto modules of 1.4Mb Is shareware and you can find it everywhere. The usage will be: arj a -va -y [source file.zip] [a:\destination file.arj] Good luck Alejandro ************************************************************************** 2)From: Max Subject: Re: ZipFiles (for China ) While I haven't tried it myself, my understanding is that the Registered version of PKZip will allow you to "split" large files so as to place them on more than one disk. Hope this helps Max (will post new public key in 14 days. New system very stormy, tweaking as fast as I can. God, I love technology.) ************************************************************************** 3)From: BADCOFFEE@aol.com Subject: Caution! Caught me with my pants down..... NJ- Called operator to connect me (dial up for me) to A T and T (1-800). Operator advised me that they are UNABLE to dial up 800 #'s (??right) No deal on the operator assisted dial up. Didn't want to use calling card to conceal call. <---bad move # 2 Ok.....lets do the *67 ani block thing. NO DEAL- AT and T's system over rides *67 (ANI block) and reads your number. In other words: You can't use *67 (block) on the phone company. (dumb move on my part). (she "told" me what number I was at") Do it again, I would: Use calling card or get AT and T's NON 800 number. I'de love to hear some of your telephone "social engineering". Trade you....casettes? I'll make on if you will. :-) I did manage to get my info....but completely exposed myself. ************************************************************************** 4)From: kevina@eurekanet.com Subject: How do I? how do i tap a grounded phone line where i cannot do it from the inside of the house and there is no external box, on the outside of the house, the line goes from the pole to directly into the house, thanks.. kevina@eurekanet.com ************************************************************************** 5)From: Eric Subject: Re: Winzip Question Yes you can use Winzip to span multiple floppy disks. Although I think you have to have the registered version to do it, I don't think the feature is available in the shareware version. Just look up spanning under the program's online help and you'll get all the details. If you have any questions e-mail me directly and I'll be happy to walk you through the process. Be Well Eric "The Computer Is Your Friend" -----BEGIN PGP PUBLIC KEY BLOCK----- Version: 2.6.2 mQCNAzHOVTsAAAEEALiUM2m/GNybNjXEW9KiHKDFjG0WGudUIODlKlT9sFnkwzma ioH66Z8a6ZXuoG071GzTZ2Pu+oQ8OybA7kfVllv38FdKz2qIs29oJXBpppOVRZvr G68htPMow3yx+grZZQVKG/jK8j2ZUgSal1mh//OA+YE2HnCyyM2K3SBgQR0VAAUR tAhlbGRyaWRnZQ===5hLF -----END PGP PUBLIC KEY BLOCK----- ************************************************************************** 6)From: "Jason H. Reeves" Subject: Anti-Scanner Law FYI - from WX-TALK Press Release LEGISLATION WOULD BAN RECEIVERS; OUTLAW MONITORING WASHINGTON - Representative W. J. "Billy" Tauzin (R-LA), chairman of the House Commerce Subcommittee on Telecommunications has introduced a bill to outlaw listening to a variety of non-broadcast radio transmissions. Dubbed the Wireless Privacy Enhancement Act of 1997 (H.R. 2369 I.H.), the bill could prevent the manufacture of non-broadcast band, general coverage radios, and possibly make possession of existing radios prima facié evidence of a crime. If enacted, U.S. restrictions on radio reception would become some of the most repressive in the world. The bill makes the mere act of intercepting a radio communication illegal. Unlike present regulations, no attempt to divulge or publish the content of the communication is necessary. The proposed law and another bill (H.R. 1964) sponsored by Representative Edward Markey (D-MA), also directs the Federal Communications Commission, which reviews all electronic devices sold in the U.S., to refuse certification of radios capable of receiving Commercial Mobile Radio Service frequencies. Such frequencies are interspersed throughout the radio spectrum, making it all but impossible for manufacturers to make certifiable equipment for unaffected frequencies. Scanners are affected, along with amateur and shortwave radios equipped with general coverage receivers, business and police band radios, even some car radios. As written the law makes no provision for existing radio equipment. It remains unclear whether the millions of existing receivers would become illegal to possess or be "grandfathered" in. Virtually everyone who owns a receiver is affected. Members of the press, businesses, hobbyists, and the public at large will be completely banned from listening. Amateur radio operators, the Military Affiliate Radio Service, the Civil Air Patrol, shortwave listeners and weather spotters may find themselves unable to modify or legally use their equipment. Police officers and fire fighters, who make up the vast majority of scanner owners, would no longer be able to monitor other agencies as they have in the past, and over time will be unable to purchase inexpensive receivers, even if they are authorized to possess them. Critics charge that the Committee has been unduly influenced by contributions from the telecommunications industry, citing Federal Election Commission reports for 1995-96 which show that Tauzin and other committee members accepted a total of $467,000 from individuals and organizations who stand to benefit from this legislation. The law has also sparked civil liberty concerns. In other countries, similar laws have set precedents that eventually led to bans or restrictions of broadcast receivers. Already, this bill would violate congressional assurances made in the precedent-setting Electronic Communications Privacy Act of 1986, that reception of public safety and private land mobile frequencies would never be prohibited. House Bills 2369 and 1964 are currently in committee. Hearings on the bills will be scheduled after the committee returns from break September 2, 1997. Industry watchers believe that, barring public intervention, both bills have an excellent chance of passing. Concerned citizens are encouraged to contact their representative immediately and let them know how you feel about this legislation. While you are at it, let the committee members know, too. It may still be possible to stop the bill in committee. @&@&@&@&@&@&@&@&@&@&@&@&@&@&@&@&@&@&@&@&@&@&@&@&@&@&@&@&@& { Jason H. Reeves |"""""""\ } { Technical Assistant - Computing Services | |, } { Home: 571-2996 Work: 575-5736 | |' } { jhr@cavern.uark.edu !--v---v-" } { http://cavern.uark.edu/~jhr ._--""||| | } { Desktop Unix Support Team (DUST) |-----------------| } &@&@&@&@&@&@&@&@&@&@&@&@&@&@&@&@&@&@&@&@&@&@&@&@&@&@&@&@&@ ************************************************************************** 7)From: Martin Kratz Subject: Re: TSCM boffins / Eudora Lite File Recovery >13)From: spycom >Subject: Here's one for the TSCM boffins! > a. no RF when on or off hook > b. RF and telephone audio when using speakerphone >Any clues ? This looks like the speakerphone circuitry being supplied via a DCDC converter because of lack of supply voltage available from the phone line directly. I bet the RF frequency is in the 10KC to 100KC range, with huge harmonics, and modulation both AM and FM, but quite feeble. There has been some fuss in West Germany during the early 80´s when it was discovered that phone fee impulse counters attached to subscriber lines did the same thing and allowed to listen in, using long wave receivers. MK >14)From: Eric >Subject: Re: Eudora Lite File Recovery Consider this: A message you TRANSFER from a box to another will be copied, not moved. It stays hidden in the old box file until you compact it. Only compacting effectively deletes all messages that are not referenced to in the respective box directory. You compact either all your boxes with the COMPACT MAILBOXES item in the SPECIAL pulldown menu, or you can compact individual boxes by clicking on the Compact button in the lower left corner of the respective box directory window (which reflects the content of the .TOC token file of that box). The Compact button is labelled with the number of messages in the box, the filesize of the respective .MBX file, and (!) the size of unreferenced messages in the .MBX file, the latter being set to zero after compacting. If there are no unreferenced messages in a box, the button´s labeling is grayed, indicating that compacting is unnecessary. This means that if you TRANSFER a message to trash and then EMPTY your TRASH, you still can retrieve the message from the original box by opening its .MBX file with a plain ASCII text editor, if you have not compacted the box in the meantime. Note that if you TRANSFER a message from trash to trash, it will be deleted from the TRASH.MBX file. You might refer to that as "selective compacting". Compacting means that the original box file will be read, and only those messages that are referenced to in the token file are copied to a temporary file, which subsequently will be renamed to be your actual .MBX file. The old .MBX file is thus deleted. So, you might try to UNDELETE (DOS command) the old .MBX file to another name and access its contents even after compacting a mailbox. I have never been forced to try this yet, but suppose you transferred a message from IN to TRASH, emptied TRASH and then compacted all boxes. If you want to rescue a message, get to DOS or open a DOS window, and invoke UNDELETE. Hurry, because Windows and its applications LOVE to overwrite the former disk sectors of deleted files with nothingworthy temporary stuff, rendering your message un-undeleteable. But with some luck, UNDELETE might find deleted directory entries named ?NBOX.MBX and ?RASH.MBX (The first character of a filename in a DOS directory will be overwritten when it is being deleted, so you have to manually provide it - UNDELETE asks you for it). Undelete them to different names, for example give them both an "A". After successful undeleting, you have two valid ASCII text files named ANBOX.MBX and ARASH.MBX that you can scan with any ASCII editor for your lost message. MK ************************************************************************** 8)From: Robson Steve Subject: Re: Winzip China, This explanation is for Winzip 32bit version but should work with other versions as well. First of all winzip will only span multiple disks if it knows where to find the DOS versions of pkzip.exe and pkunzip.exe. To do this in winzip go to Options - Program Locations and type in the path for the DOS applications. Then create a new zip file on your disk drive. This will then ask you which files you wish to be in the new zip file. Under the option "Multiple disk spanning" choose how you want to span the file. (Without the program locations or if you make the new .zip on your hard drive the "MDS" option will be greyed out.) The rest is child's play. If you have a problem give me a yell. Stephen. ************************************************************************** 9)From: ATurnerPI@aol.com Subject: What is a Private Investigator? After reading this morning's post, I felt to the need to reply. I agree and support many of the responses to this matter, but wish to add my .02% if you don't mind. As a PI, I like many of my peers am an ex LEO ( Law Enforcement Officer), retired, over 40 and you know the rest of the stats. Like some of us, I took the opportune time to pull the pin, but am not able to let the service go into that good night. I have taken the lessons, the errors, the scars, and the pride, and now offer those same services, mainly my mind, to the public at a price. LEO do the same thing, they provide services for a price ( taxes). The difference being that I offer my services on demand, and provide professional attention to the individual matter, not to a case load that also includes the "NSR" status of a report. Private Investigation is just that, Private. We serve at our Client's behest, and provide a personal service. We do not have to answer barking dog complaints, or worry about end of watch, or that a supervisor is screaming to us to clear. The Supreme Court made an intelligent decision and I think the view is appropriate here. The Court, decided that a defendant is entitled to the right of an investigator, since the people have the Police to investigate the matter that lead to the defendants' arrest and pending trial. We all know that the LEO in general are overworked, understaffed, and most often under-trained. Private Investigators, due to many state requirements are better trained, experienced, and capable to handle a wider variety of investigations than the average LEO. In addition to meeting the strict licensure requirements, and large fees associated with obtaining the license. PI's offer the services of Private Investigation, for a fee, and yes it can be expensive. A quote I once heard I find true, " I'm gettin' paid to think, not get callouses under my ass". That is what the public seeks, they see a lawyer for advice, a doctor to cure their ills, a stock broker to protect their future, an insurance professional to assure their families security, and a Private Investigator to find out what happened when the above blows up and they are victimized. No, we do not arrest, nor have to power to do so. But by our efforts, and the documentation that we provide by our diligence to duty, and committment to excellence, if prosecution is warranted, the authorities should recognize our stature, and not consider us as the bufoons we often consider them to be, and do the right thing by our Client. By my post, I am sure to rile some feathers. I have no axe to grind, and am greatfull to my teachers, my mentor, and most of all, to my "saved my ass" partner Bobby, for my being here today. I will always be blue, but now I can offer my best, my mind and ability, to my Clients, and in hopes that I will also make a better living. Stay Safe ATurnerPI Gainesville, FL ************************************************************************** 10)From: Garry Wade Gore Subject: Re: Subliminal Mind Bending This is the first time I have had the nerve to post, so bear with me. I just got back into the country and am slowly getting back to the swing of things. That is why this is a question concerning posts from a few weeks ago. I have worked in the psychiatric field for a while now, including subliminal messaging and hypnosis. What are the symptoms expressed by different clients and what makes it different from a possible psychiatric illness. Any response is greatly appriciated. GWG ************************************************************************** 11)From: davis@marshallnet.com (Terry Davis) Subject: Does this still work? While reading some file I come to this one. Does all of this still work in blocking Caller-ID Dial *67 before you dial the number. (141 in the United Kingdom) Dial your local TelCo and have them add Caller-ID block to your line. Dial the 0 Operator and have him or her place the call for you. Dial the call using a pre-paid phone card. Dial through Security Consultants at (900)PREVENT for U.S. calls ($1.99/minute) or (900)STONEWALL for international calls ($3.99/minute). Dial from a pay phone. ************************************************************************** 12)From: CS CUSTOM Subject: Cellular Programming Software and Equipment C&S CORPORATION Now on the web http://www.cscustom.simplenet.com "THE CELLULAR EXPERTS." For all your Cellular needs. We Specialized in all types of Cellular Programming Software and Equipment, ESN and PIN Readers and Programming Clips for OKI’s, GE, Ericsson, Motorola’s and more. Cellular Extensions, also 100’s of Refurbished Phones currently available. Motorola, Panasonic, OKI, Ericsson, GE, AUDIOVOX, NEC, NOKIA, Mitsubishi, Sony and much more. 24hr Fax and info. line (301)593-9021 Voice (301)593-7782 / (301)593-7886 10am-4pm EST For your convenience we accept all major Credit Cards and we do ship COD via FEDEX PS Proof of Cellular Dealership required to purchase ESN Readers. We also sell data card readers and writers. Call for info. http://www.cscustom.simplenet.com ************************************************************************** 13)From: BADCOFFEE@aol.com Subject: Re: response to "the Club" >>Robson Steve >>>IF SO - Here in Australia it is common practice for car thieves to hold >>>the club where it joins at the lock, brace your foot against the >>>steering wheel and pull back while pushing the foot forward. You don't >>>need to bend them much to be able to take them off. Steve, absolutely right. The 'hooks" that attach to the steering wheel are only a few inches with completely open ends. This things was designed by "suits" that take the bus to work. Engineering department: Thumbs DOWN. Marketing Department: Fabulous job. :-) I'de like to see car theives design a product.....THAT I will buy. :-) Augie ************************************************************************** 14)From: "William H. Geiger III" Subject: Re: Have e-mail, need name -----BEGIN PGP SIGNED MESSAGE----- >22)From: Azrael White >Subject: Have e-mail, need name >my friend got an e-mail from someone at hotmail, but there was no name >accompanying the address. he has no idea who this person is or why they >are e-mailing him. how can i go about trying to find out who this person >is? if you would like to help, the person's e-mail is >flicker_and_fade@hotmail.com help as soon as possible would be greatly >appreciated! Thanks, Azrael :) Hotmail is a web base free e-mail service. There is no user authentication when a new user signs up therfor unless the person sending you the mail want's you to know who they are you are SOL. - -- - --------------------------------------------------------------- William H. Geiger III http://www.amaranth.com/~whgiii Geiger Consulting Cooking With Warp 4.0 Author of E-Secure - PGP Front End for MR/2 Ice PGP & MR/2 the only way for secure e-mail. OS/2 PGP 2.6.3a at: http://www.amaranth.com/~whgiii/pgpmr2.html - --------------------------------------------------------------- -----BEGIN PGP SIGNATURE----- Version: 2.6.3a Charset: cp850 Comment: Registered_User_E-Secure_v1.1b1_ES000000 iQCVAwUBNAxTpI9Co1n+aLhhAQEKEwP+JPF0DRo32hUqtVl8Jpu4dE5LZro3oaq7 vvmPWSY1CtSilZOClevJuqWgZVtLZ1X6j/IeDwM42pFGgb1lk0YpuqG1svHzj5it hERiSlZlpbOlZjg0GUC9M5bC89IzV+bW43Ta6mTUgGXOGjJqoFXlKoNPvm04pJgS v4pcAIQZz2c= =gw8W -----END PGP SIGNATURE----- ************************************************************************** 15)From: allamosa@roanoke.infi.net (happydog) Subject: Business intelligence? does anyone know how to find out the amount a business was sold for, how much business that company does and who their customers are? ************************************************************************** 16)From: "eluhow" Subject: Scanner Mods? eluhow@erols.com page me: http://wwp.mirabilis.com/2457748 ICQ 2457748 Have Radio Shack Pro 60 scanner. How to get the freq. 513-759, 825-848, 870-893. Resources???? ************************************************************************** 17)From: Jason Subject: RedBox Help! Hi there! Awhile ago there was postings on how to build the redbox. I bought the tone dialer but where do I acquire the crystal that I need to change? Could you also tell me where the crystal is in the dialer?? Thanks! ************************************************************************** 18)From: "KcW" Subject: Re: Infinity TX Their products are, to be kind, a little simple and, in general, unstable. This is not to say that they do not perform as described, just that they are not of professional calibre. They are, however, great fun. Robert Iannini has published his infinity transmitter design in Electronics Now, Spetember 1994. KcW > I've seen the Infinity and several EMP projects at Information > Unlimited. They also have bugging equipment, surveillance stuff, etc. > > http://www.amazing1.com ************************************************************************** 19)From: BADCOFFEE@aol.com Subject: Re: Good basic-level books? >>>"Scott Rennie" Subject: Good basic-level books? >>>Could anyone suggest some good basic-level books on surveillance techniques and equipment - nothing too technical? >>>Cheers, >>>Scott Rennie Scott: CrookBook by the SpyKing Himself cost is about 70 bucks and worth 6 times that. This thing has been my reference guide. Most of the info is right on the money. It lacks an index....so somethings are hard to find. Over 500 pages...and I swear by it. Augie ************************************************************************** 20)From: Marcus Blankenship Subject: Re: Winzip question Winzip will do this. Follow me here... >From WinZip, Click the NEW button to create a new archive. At the dialog box. put in something like a:\lots.zip and click OK. The ADD dialog box will appear, and there is a selection box at the bottom that says "Multiple Disk Spanning". Choose the Span option you need,(either with or without formatting). In the files box, enter the name of the zip file. Click Add and your off and running. What you are doing is creating a zip archive, the contents being another zip file. No big deal. When you go to extract it, put disk 1 in first, then it will ask for the last disk in the set, then ask for disk 1 again. You will end up with the original large zip file. Let me know via email if it doesn't work. Marcus / Marcus Blankenship Jeld-Wen, Inc Application Developer 541-882-3451 marcusb@jeld-wen.com www.doors-windows.com {std/disclaimer.i} ************************************************************************** 21)From: Tasmanites@aol.com Subject: Addresses that don't work Re the following sites: I have tried several times to access them, but keep getting the message that they either don't exist, or the server "has been istructed not to let me have them". Just what does this mean? <> Ticked Tas ************************************************************************** Who are you? What's your specialty and/or interest? Let us know about your company... What would you like to see on the list? Post it. Let us know... Do you have something to contribute? We'd like to hear it... We want to know EVERYTHING and ANYTHING about eavesdropping, surveillance, countersurveillance & privacy related technology, etc... Remember: who, what, where, when, how & why... we want ALL the details... Do you have a question? Post it... A little free time? Help a member... With the INCREDIBLE brain power on this list, someone should have the answer ;-) P.S. Don't be a LURKER... Members take the time to post info for us all... give something back... Don't just take... Your input/knowledge is valued... ************************************************************************** Send Postings to: spyking@con2.com with "Post" in subject field with subject ************************************************************************** Subscribe to: spyking@con2.com In the subject field type: subscribe-surveillance list e-mail address ************************************************************************** Unsubscribe to: spyking@con2.com In the subject field type: unsubscribe-surveillance list e-mail address ************************************************************************** ...The Simple Rules of the Surveillance List... The Surveillance List Owners may Reject any posts that are/contain: 1) Info Unrelated to Eavesdropping, Surveillance or Privacy technology... 2) Flames or Negative posts... 3) E-Signatures that are considered excessive... 4) Advertisements not DIRECTLY related to the list topics... 5) Attached Files... 6) Oversized Posts... (May be edited to save room) **************************************************************************** This publication is copyrighted and is protected by U.S. and International copyright law. The information transmitted on this list may not be reproduced, reposted or forwarded to any non-list member without expressed written permission of the List Owner. Violation of U.S. copyright law is a criminal and civil offense... **************************************************************************** The Surveillance List is Moderated by SpyKing@thecodex.com The List Owner will make EVERY effort to protect subscribers from spam... Copyright 1996, 1997 Codex Publishing Inc., All Rights Reserved... **************************************************************************** ****************************************************************************** The Official Newsletter of W.A.S.P. The World Association of Surveillance Professionals http://www.thecodex.com/wasp.html ****************************************************************************** Vol.Two Issue #190 The Surveillance List Sept.4,1997 Over 2700+ Members Worldwide Representing 53 different countries List Chat at: http://www.thecodex.com/chat.html Surveillance List Pseudo FAQ at: http://www.thecodex.com/faq.html ****************************************************************************** IN THIS ISSUE... ****************************************************************************** 01) Re: Winzip Question 02) Technologies Of Tomorrow Spotlighted Today 03) Re: Have e-mail, need name 04) CALLER ID BLOCKING 05) Re: Radio Shack Pro 60 scanner modifications 06) Re: winzip 07) Re: Caution! 08) Re: Splitting large files 09) Anything that I might do to protect myself? 10) EMP 11) Re: PRO 60 Mods 12) Re: Caution *67 call ID block 13) Schematics for sale 14) Cellular Programming Software and Equipment 15) Newsletter of interest 16) Re: Caught me with my pants down... ****************************************************************************** DON'T BE A LURKER.... GET INVOLVED... YOU ARE A MEMBER... MAKE THE MOST OF IT ****************************************************************************** 1)From: "FrankM" Subject: Re: Winzip Question Over the weekend I downloaded the most recent version of WinZip32. It is a Beta version, version 6.3 beta 14. So far it's working fine, and has a few new features. One of them is, it incorporates itself into the file management dropdown menus in Windows Explorer. What follows is from the WinZip 6.3 Help file concerning Multiple Disk Spanning. Although I haven't tried this feature, yet. It doesn't mention a thing regarding the necessity for this version to be registered in order for the Multiple Disk Spanning feature to function properly. I imagine this version of WinZip is available at their Web site. I located my copy at http://www.windows95.com/ . The windows95.com site is loaded with share and freeware programs and utilities available for download. Frank Multiple Disk Spanning WinZip makes it easy to create Zip files that "span" multiple disks. This is useful if the files you are working with will not fit on one disk. To make a Zip file that spans multiple disks, simply create a Zip file on a removable disk, then add files to the Zip as you normally would. If the disk fills during Add operation, you will be prompted for another disk. Simply insert the next disk and click the OK button. Important: disk spanning is not available when adding files to an existing archive; it is only available while creating a new archive. Also note that you cannot add or remove files from a Zip file that spans disks. WinZip requires pre-formatted disks (you can format disks using the Windows Explorer or File Manager) Example: To zip the files in your c:\data folder to a Zip file called A:\DATA.ZIP: 1) Start WinZip 2) Drag and drop the c:\data folder from the Explorer or File Manager to the WinZip window 3) In the Drop dialog box, type the filename of the Zip file (A:\DATA.ZIP) 4) Click the Add button If more than one disk is needed, you will be prompted for additional disks. ************************************************************************** 2)From: "Betty G.O'Hearn" Subject: Technologies Of Tomorrow Spotlighted Today By David Braun, TechWire WASHINGTON -- Radar on a chip will soon be available to detect cars in blind spots and for dozens of other inexpensive personal products, according to the government's latest report on U.S. science and technology. "The micropower impulse radar harnesses the speed of light for measurements in daily life - all for about $10 - doing what used to require equipment costing $40,000," said the White House's Office of Science and Technology in its biennial report to the U.S. Congress. Computer chip-sized radar units will serve as automobile backup warning systems, to detect burglars, locate studs in walls, monitor a baby's breathing, perform search and rescue, and activate lights, tools, and appliances, the report said. And that is only the beginning. "This exciting technology is expected to perform scores of other tasks," the report said. To date, 20 licenses have been granted to 18 companies, generating $2.5 million in licensing fees and royalties, the report said. In its sweeping overview of the state of the nation's science and technology, the agency said the National Information Infrastructure and global positioning satellites will be as important to America's growth as railroads, highways, and electricity were in an earlier generation. Apart from personal radar, the agency sees the Next-Generation Internet connecting universities and national laboratories with high-speed networks that are 100 to 1,000 times faster than today's Internet, bringing social benefits to many Americans. Yet another new technology, the White House agency said, is the development of giant magnetoresistance materials. "In the near future, many of the products and devices we take for granted will be dramatically improved by this new class of magnetic materials," the administration's report said. The first commercial application of these materials is said to be the antilocking braking system on many 1998 U.S. cars. Sensors measure the rate of wheel rotation and feed the data to an on-board computer, which regulates the braking pressure to prevent a skid. These same materials will dramatically improve the ability to store magnetic bits of information on computer hard disks, the report said. "Five gigabits of binary information, about 90,000 pages of text, can be stored on one square inch," the agency said. The report added that the U.S. Department of Energy was working with hardware vendors to make computers even more powerful than the 1-trillion-calculation-per-second machine announced in December 1996. That computer, developed with Intel, was part of the department's initiative to ensure the safety and reliability of the U.S. nuclear deterrent without nuclear testing. The White House report said new technologies were also changing the face of war. Full spectrum dominance -- the capability to dominate an adversary across the full range of military operations -- will be a key characteristic of U.S. Armed Forces for the 21st century, the report said. Copyright (c) CMP Media, 1996. Betty O'Hearn Assistant to Mr. Winn Schwartau 2000 West Bay Drive #3 Largo, FL 33770 813-518-0600 Voice 813-518-0602 FAX http://www.infowar.com http://www.info-sec.com Register for InfoWarCon 7: http://www.infowar.com/papers/iwcon.html-ssi ************************************************************************** 3)From: Michael Banks <75300.2721@compuserve.com> Subject: RE: Have e-mail, need name > my friend got an e-mail from someone at hotmail, but there was > no name accompanying the address. To do a reverse lookup on an E-mail name, begin with Internet Address Finder, at http://www.iaf.net. There are a number of other E-mail address finders, including the All-in-One search page at http://www.albany.net/allinone/all1user.html. Still others are listed in "Web Psychos, Stalkers, and Pranksters: How to Protect Yourself in Cyberspace," and there are some links to them at http://www.coriolis.com/webpsychos/. Too, on many ISPs you can use "finger" to get user info (sometimes including a phone number, and whether the user is currently logged on, in addition to a name). One useful "finger" interface can be found at http://www.magibox.net/~unabest/finger/index.html. All that said, the address you mention may well be bogus, inserted in E-mail software by the user. It appears to be too long to be a legitimate address. (Try running the address without the _ characters, like this: flickerandfade@hotmail.com, though I doubt that will turn out to be legit, either.) A note on the address databases: Not every address is in them. The perpetrators of some are doing their darndest to invade our privacy still more by grabbing addresses like spammers do, but they by no means have them all. This being the case, you must sometimes resort to more subtle techniques to search out the identity of a message-sender. For example, idiosyncratic spellings and usages can be used to find postings by the same user under a different E-mail name in USENET Newsgroups. This and many other techniques are detailed in the aforementioned "Web Psychos, Stalkers, and Pranksters" book. --Michael Banks "The Internet Unplugged" http://www.onlineinc.com/pempress/unplugged/index.html "Web Psychos, Stalkers, and Pranksters" http://www.coriolis.com/webpsychos/. ************************************************************************** 4)From: "Shadow Chasers" Subject: CALLER ID BLOCKING How many members are using ITT SYSTEMS Caller ID Blocking module? It's a self-contained box, about the size of a pack of cigarettes, and hooks between the TJ and the phone, eliminates your information from being recieved by subscribers to CALLER-ID services. Outlawed in some states, check with the manufacturer, currently going in DANNMARK catalog for $29 USD! ************************************************************************** 5)From: Bart Gardner Subject: Re: Radio Shack Pro 60 scanner modifications I've found a guy in Cali that seems to be the scanner mod God. Even pubs a newletter called the World Sanner Report. If it can be modified, he'll be able to tell you. His web site is http://ourworld.compuserve.com/homepages/bcheek or email him at bcheek@san.rr.com Me, I'm looking for a source for quality series phone xmitters, maybe crystal controlled, powered by phone line that will be dead nuts on a certain freq no matter where I put it. Good range is a must. I'm tempted to just rob some parts off of some cadavers we have in the radio shop I work in and design one up myself. But if there is a decent one on the market that I don't have to pay outrageos $$ for, I'd like to know. ************************************************************************** 6)From: W0LF Subject: Re: winzip Lot of posts about this one guys, but what the hell..... its a MOST useful thing for any computer user to know.... concerning winzips diskspanning option..... neat! I didnt know of it at all.... so I had to check it out for myself.... maybe Im confused now, but from what I read "spanning" multiple disks is meant to take multiple disk files and recreate them and at the same time preserve their original disk allocations. Right? At any rate... consider this... say u have a single 25 Meg file.... you wish to save it to floppy disk-sized chunks so u can send it to a buddy or u simply wish to back it up, should this be your desire, GO WITH ARJ andor WINARJ!.. This archiving utility is a most wonderful little program for archiving of any sort, and while it may not be as easy to use as winzip, it is by no means an enigma... By the way, anyone interested in it may reply to me and I will be glad to shoot it on over to ya.. WINarj that is :-) Also to BadCoffee... U DA MAN dude!! Thanx a trillion blue million for the ANI number list :-) Lata folks ************************************************************************** 7)From: shunter Subject: Re: Caution! BADCOFFEE@aol.com said: >I'de love to hear some of your telephone "social engineering". Trade >you....casettes? I'll make on if you will. :-) this actually an excellent idea, why don't you social engineers, make wavs (better yet something that wont take up so much space, ie mp3 or that real audio stuff), and post them some where! show off you're skills and let the rest of us see how it's done. ************************************************************************** 8)From: Alan & Teresa Greatorex Subject: Re: Splitting large files There is a program available on AOL.com called ez-split it will accomplish what you are looking for. It is rather easy to use and has a readme file. ************************************************************************** 9)From: DISCHOFF@aol.com Subject: Anything that I might do to protect myself? Help! I have reason to expect that I am going to fall under attack via my email address. I have a business that has heavy internet coverage. Can anyone suggest anything that I might do to protect myself before the afront starts? ************************************************************************** 10)From: Duece6x6@aol.com Subject: EMP There has been quite an interest in EMP. Very simply EMP is a broadband electrical pulse. A friend of mine worked for the GOV on EMP test projects. I have some of the wooden nuts and bolts from the antenna towers and the wooden runways used to taxi aircraft for testing. He related EMP pulses to a near miss lightning strike. As far as vehicle disabling, There are claims that auto manufactures have built in a shut down frequency into the computers in certain vehicles. We wound a large coil on a carpet paper tube and put an oscillator on it and it would flood a vehicles electrical system to shut it down, but it was huge. The easiest way to learn about EMP is to find the International TESLA society web site and interpret the information there. He was the pioneer of EMP. THE DUECE ************************************************************************** 11)From: "KcW" Subject: Re: PRO 60 Mods I believe that the PRO- 60 is not modifiable to cellular, don't know or care about the rest :) KcW ************************************************************************** 12)From: Eric Subject: Re: Caution *67 call ID block The *67 call block only blocks the telco Caller ID service it does not block the ani. I found this out after I used call block to call a business and they read me back my phone number much to my surprise. So I called the operator to see if my *67 was malfunctioning and she explained to me that businesses can still pull your number off the ani, *67 only blocks the caller ID service provided by your local telco. The fact that the telco calls the *67 service anonymous calling seems like false advertisement to me. "The Computer Is Your Friend" -----BEGIN PGP PUBLIC KEY BLOCK----- Version: 2.6.2 mQCNAzHOVTsAAAEEALiUM2m/GNybNjXEW9KiHKDFjG0WGudUIODlKlT9sFnkwzma ioH66Z8a6ZXuoG071GzTZ2Pu+oQ8OybA7kfVllv38FdKz2qIs29oJXBpppOVRZvr G68htPMow3yx+grZZQVKG/jK8j2ZUgSal1mh//OA+YE2HnCyyM2K3SBgQR0VAAUR tAhlbGRyaWRnZQ===5hLF -----END PGP PUBLIC KEY BLOCK----- ************************************************************************** 13)From: Roll-o Subject: Schematics for sale We have 3000+ schematics in our filebox. Lots of stuff you should NOT have. my source of schematic diagrams: http://w3.trib.com/~rollo/bomcat.htm ************************************************************************** 14)From: CS CUSTOM Subject: Cellular Programming Software and Equipment C&S CORPORATION Now on the web http://www.cscustom.simplenet.com "THE CELLULAR EXPERTS." For all your Cellular needs. We Specialized in all types of Cellular Programming Software and Equipment, ESN and PIN Readers and Programming Clips for OKI’s, GE, Ericsson, Motorola’s and more. Cellular Extensions, also 100’s of Refurbished Phones currently available. Motorola, Panasonic, OKI, Ericsson, GE, AUDIOVOX, NEC, NOKIA, Mitsubishi, Sony and much more. 24hr Fax and info. line (301)593-9021 Voice (301)593-7782 / (301)593-7886 10am-4pm EST For your convenience we accept all major Credit Cards and we do ship COD via FEDEX PS Proof of Cellular Dealership required to purchase ESN Readers. We also sell data card readers and writers. Call for info. http://www.cscustom.simplenet.com ************************************************************************** 15)From: sysop Subject: Newsletter of interest RESENDING THE FOLLOWING PER YOUR INSTRUCTIONS. PLEASE POST. Intelligence Incorporated publishes a newsletter entitled How To Get Anything On Anybody - The Newsletter. HTGAOA-TN is edited by Lee Lapin author of The Whole Spy Catalog, How To Get Anything On Anybody books I and II, Hands On Surveillance, Hands On Countermeasures, etc. The Newsletter deals with the following topics: Surveillance TSCM People Tracking Asset Searching Investigatiive techniques Business Intelligence ID Privacy HTGAOA-TN is aimed at PI's, surveillance personnel, investigators, information brokers, corporate security, intelligence agencies and, ah, interested parties… Topics already, or about to be covered, include the best people tracking databases, techniques for locatig bank accounts, complete reviews of the new GPS covert tracking systems, why the new US currency can be extremely dangerous to your health and well being, discount sources for surveillance equipment, how to get around the new "anti-information" laws and postal forwarding regulations, computer cracking, voice mail hacking, social security "hawk" accounts, how to hide your assets, best internet addresses, on and on… Lee's works have been used by virtually every major intelligence agency, read into the Congressional record, banned in three countries, featured on network televison shows from the O.J. Trial to Good Morning America. The Newsletter is not cheap -$89.00 per year BUT Lee provides hands-on, cutting edge techniques to track, surveil and investigate anyone. Guest writers include a former Apple engineering executive, Al Schweitzer, a MOSSAD station chief and various other experts. No fluff. No advertising. Intelligence Incororated will send a free copy to any of your audience that requests one by emailing us at intelligence@earthlink.com, faxing at 650-851-5403 or writing (snail mail) II 3555 S. El Camino Real, No.309, San Mateo, CA 94403. ************************************************************************** 16)From: Mutter Subject: Re: Caught me with my pants down... > > NJ- Called operator to connect me (dial up for me) to A T and T (1-800). > Operator advised me that they are UNABLE to dial up 800 #'s (??right) > Yep, they do this because (gasp!) they don't pass ani. That means joe schmoe citizen doesn't get to use this feature. (only the privileged :) > No deal on the operator assisted dial up. > Didn't want to use calling card to conceal call. <---bad move # 2 > I don't know who suggested this but I'd be very surprised to hear you can 'bill' 800 numbers through a calling card. Why the hell would calling card companies let you use their limited resources to call a number where they make no money? The idea is ridiculous. If you've done this let me know what company you used because they are either morons or charging you for 800 calls (which is illegal) > Ok.....lets do the *67 ani block thing. Big distinction here: *67 is not a 'trick.' It is not involved with ANI. The similarities end in the fact that CID is sent through SS7 (signalling system 7) and ANI is usually also sent by this method. Maybe I'm not making myself clear so here's a basic look at how CID works: You call your friend, Bob. You dial *67 + bob-number Your number is passed to your local telco switch local switch passes your number to the target switch Target switch sees the *67 flag, strips your number, replaces with a 'P' Target switch rings Bob's phone and Bob's Caller-id interprets 'P' as a 'blocked number.' As you can see, *67 was specifically designed by the telcos for use with America's nationwide callerid system. ANI is a completely different number transmission system, primarily used for billing purposes. Try not to confuse the two. > NO DEAL- AT and T's system over rides *67 (ANI block) and reads your number. > > In other words: You can't use *67 (block) on the phone company. (dumb move on > my part). > (she "told" me what number I was at") > Remeber *67 is NOT ANI block, it's callerid block, a 'service' to protect you against evil caller-id. The reason why *67 didn't work on 'the phone company' is because they weren't using caller-id to receive your number, they used ANI (no over-riding occured) > Do it again, I would: Use calling card or get AT and T's NON 800 number. > > I'de love to hear some of your telephone "social engineering". Trade > you....casettes? I'll make on if you will. :-) > > I did manage to get my info....but completely exposed myself. I'm not sure what you meant by 'getting my info.' What was the point of the experiment? Oh, and BTW, Augie, to respond to a previous post the terms ANI and ANAC are pretty much used interchangeably. Also, thanks for sparking an interest in the security of "The Club." Most people just accept the 'SECURE' stamp on the box without putting much thought into it. I'm currently trying to borrow one for my own experiments. - M u t t e r Ed. root zine (http://www.openix.com/~mutter) mutter@openix.com ************************************************************************** Who are you? What's your specialty and/or interest? Let us know about your company... What would you like to see on the list? Post it. Let us know... Do you have something to contribute? We'd like to hear it... We want to know EVERYTHING and ANYTHING about eavesdropping, surveillance, countersurveillance & privacy related technology, etc... Remember: who, what, where, when, how & why... we want ALL the details... Do you have a question? Post it... A little free time? Help a member... With the INCREDIBLE brain power on this list, someone should have the answer ;-) P.S. Don't be a LURKER... Members take the time to post info for us all... give something back... Don't just take... Your input/knowledge is valued... ************************************************************************** Send Postings to: spyking@con2.com with "Post" in subject field with subject ************************************************************************** Subscribe to: spyking@con2.com In the subject field type: subscribe-surveillance list e-mail address ************************************************************************** Unsubscribe to: spyking@con2.com In the subject field type: unsubscribe-surveillance list e-mail address ************************************************************************** ...The Simple Rules of the Surveillance List... The Surveillance List Owners may Reject any posts that are/contain: 1) Info Unrelated to Eavesdropping, Surveillance or Privacy technology... 2) Flames or Negative posts... 3) E-Signatures that are considered excessive... 4) Advertisements not DIRECTLY related to the list topics... 5) Attached Files... 6) Oversized Posts... (May be edited to save room) **************************************************************************** This publication is copyrighted and is protected by U.S. and International copyright law. The information transmitted on this list may not be reproduced, reposted or forwarded to any non-list member without expressed written permission of the List Owner. Violation of U.S. copyright law is a criminal and civil offense... **************************************************************************** The Surveillance List is Moderated by SpyKing@thecodex.com The List Owner will make EVERY effort to protect subscribers from spam... Copyright 1996, 1997 Codex Publishing Inc., All Rights Reserved... **************************************************************************** ****************************************************************************** The Official Newsletter of W.A.S.P. The World Association of Surveillance Professionals http://www.thecodex.com/wasp.html ****************************************************************************** Vol.Two Issue #191 The Surveillance List Sept.5,1997 Over 2700+ Members Worldwide Representing 53 different countries List Chat at: http://www.thecodex.com/chat.html Surveillance List Pseudo FAQ at: http://www.thecodex.com/faq.html ****************************************************************************** IN THIS ISSUE... ****************************************************************************** 01) TDMA 02) Excellent docs on Attacks & Browser Vulnerabilities 03) Re: Addresses that don't work 04) Speaking of social engineering ... 05) Any schools in Australia & New Zealand ?? 06) Re: responses to my file archival problems 07) Another useless number for the collection :-) 08) Re: Social Engineering 09) Re: 800's on a calling card 10) RE: What is a Private Investigator? 11) Plasma Display Panel 12) A Quote for the Ages 13) Re: WinZip 14) Re: TEMPEST (How?) 15) Software location? ****************************************************************************** DON'T BE A LURKER.... GET INVOLVED... YOU ARE A MEMBER... MAKE THE MOST OF IT ****************************************************************************** 1)From: "Cesar Orlando Reyes" Subject: TDMA I am looking for a good TDMA/ETACS/EAMPS Any Sugestions ? JJ. ************************************************************************** 2)From: gaugusti@hqgbcs.attmail.com (Grant Augustine x4058) Subject: Excellent docs on Attacks & Browser Vulnerabilities Not sure what grouping of my Alert! list should get this info, but I'm sure you'll be interested -- * Article one was to be a presentation at Hacking in Progress 97, and is titled "Practical Attacks on PGP", but really covers panoply of ways to uncover any secret computer data. Check it out at www.eskimo.com/~joelm/pgpatk.htm * Article two is to be published in the October 1997 Proceedings of the National Information Systems Security Conference, and is titled "VULNERABILITY OF "SECURE" WEB BROWSERS." This not only covers known attacks on Microsoft & Netscape browsers, but also security considerations, two new attacks, and future "work"! This is located at: www.cs.ucsb.edu/~andre/nissc97.html ************************************************************************** 3)From: gaugusti@hqgbcs.attmail.com (Grant Augustine x4058) Subject: Re: Addresses that don't work The reason you can't read the "Read 'em while they're hot" messages is that they've been discontinued. The first article (www.herald.com) had a March date when I posted the info. My post, dated MAY 6, meant that the articles wouldn't be up forever, and now, in SEPTEMBER, they're not. Question 2 was "...what does this mean?" >THIS: Not Found The requested object does not exist on this server. The link you followed is either outdated, inaccurate, or the server has been instructed not to let you have it. >MEANS: That while the URL you entered was the correct format for a document on that server, e.g., cnn.com, currently that specific web page doesn't exist. The probable reason it doesn't exist is that the URL you entered is: a. outdated -- The web page no longer exists; b. inaccurate -- The URL used doesn't match any existing web page; or c. server has been instructed not to let you have it -- You don't have permission to see that web page. Hope that helps, Grant ************************************************************************** 4)From: icathar@mail.club-internet.fr Subject: Speaking of social engineering ... ... are there folks over there who ever used a 'voice changer' to better ... engineer his prey ? If yes, did it prove useful ? and what kind of 'changer' would you use ? Merci ! JeFF, France ************************************************************************** 5)From: "Lorenzo Castillo Sanchez" Subject: Any schools in Australia & New Zealand ?? I have a few friends in Australia and in New Zealand who are interested in getting started in the private investigation and executive protection business. If you do know some schools renowned for their quality training and services, please let me know. Thanks a lot. To the rest of the List, thanks for updating things as recent as possible. :-) ************************************************************************** 6)From: China Subject: Re: responses to my file archival problems I apologize for the tardiness of my response. Augie, you will be amused to know the following: I tried to send this early this morning, but with sleepy-eyed, thick-fingered haste, I mailed it to "Skyking" instead of "Spyking"! :> My apologies, Spyking. :> Now, to the point.... I wish to extend to all my most sincere feelings of appreciation for your prompt and courteous response to my request for assistance. As each of you may appreciate, I am currently in the position of meeting myself coming and, therefore, unable to submit individual notes of appreciation to those who privately offered "technical" assistance. Nonetheless, such individual notes of appreciation will be forthcoming as soon as possible. I have not yet had the opportunity to explore the many suggestions or avenues offered, but I am confident that they will function admirably. I am truly grateful. One of the nicest elements of this list's membership, is its willingness to quickly respond to each other's request for assistance, and I am proud to be counted among this membership. Kindest regards, China Ps-- Mutter. If you are still trying to find a "Club" to borrow, I have one that you may use for your evaluations/experiments. If you will E-mail me your address, or drop-box if you prefer, I will mail it to you. ************************************************************************** 7)From: BADCOFFEE@aol.com Subject: Another useless number for the collection :-) 1-700-555-4141 Tells you long distance carrier Augie ************************************************************************** 8)From: BADCOFFEE@aol.com Subject: Re: Social Engineering Mutter: > I did manage to get my info....but completely exposed myself. >>I'm not sure what you meant by 'getting my info.' What was the point of >>the experiment?<<<< Noooo.....no experiment. This was real life. Being very new to social engineering...I'm getting my practice time in. Taking my lumps....posting them here and hoping to be educated more than what I originally received from "my lumps". Also...others here can learn by my mistakes and corrections. YOUR last post on this was absolutely EXCELLENT. THAT....is what this place is all about. Thank you! (If anyone missed it, it was good) I'de like to get all the terminology straight....I'm confused myself. Definition time: ANI- ANACS- Others? Augie ************************************************************************** 9)From: BADCOFFEE@aol.com Subject: Re: 800's on a calling card >>I don't know who suggested this but I'd be very surprised to hear you can 'bill' 800 numbers through a calling card. Why the hell would calling card companies let you use their limited resources to call a number where they make no money? The idea is ridiculous. << Mutt, I could be wrong but I think that they charge you by the minute....for "usage". They don't really care who you call. More like a "If your call goes through our company....you get charged to use our equipment in doing so". I made an extremely local call last month (called my"self" 3 feet away) to test one on my caller ID. Sure enough...it went through (anonomous). I certainly hope I am wrong though. I didn't want to use calling card simply because I was calling the phone company. That means....1/2 hour on hold before you hear a live body. Augie ************************************************************************** 10)From: BADCOFFEE@aol.com Subject: RE: What is a Private Investigator? ATurnerPI@aol.com Subject: What is a Private Investigator? I read your last post 3 times and loved it each time. NICE. Augie ************************************************************************** 11)From: "Lorenzo Castillo Sanchez" Subject: Plasma Display Panel There's a new generation of display system...PDP(Plasma Display Panel) I was wondering if someone on the List has A LOT OF info about this particular subject. I'm aware that LCDs are TEMPEST proof since they don't emit any electro-magnetic waves. Same goes for PDP. However, unlike LCDs it is more colorful and bigger in size(there's a 40-inch PDP monitor).But, perhaps some time in the near future, someone just might come up with a device that intercepts the energy emitted by plasma then reconstruct it to a video image. It's just a thought concerning new technology. Well, maybe we should call it "PLAMON", PLAsma MONitoring. :) ************************************************************************** 12)From: Information Security Subject: A Quote for the Ages "Give me a few good hackers and 90 days, and I can bring this country to its knees. Telecommunications systems, power grid systems, financial systems all going down at the exact same time. Whether its from next door or halfway across the world, the capability to do this exists today." Jim Settle, the form chief of the FBI's computer crimes squad. ************************************************************************** 13)From: Marcus Blankenship Subject: RE: WinZip I can't believe I'm even responding (again), but here goes... 1) PKZip has had disk spanning capabilities for at least 8-10 years now. If you remember from DOS.. pkzip -ex -& a:\chunk.zip c:\biggame\*.exe the -& allows disk spanning. 2) WinZip handles ARJ, LHA, ARC, ZIP (a given), TAR, GZ and zipped exe's. That should be good enough for 99% of net users. 3) You have to tell it where these programs are, so hit the net and get : PKZ204g.exe => DO NOT GET ANY HIGHER VERSION!!! IT IS A VIRUS/HOAX! arj241.exe lha213.exe copy these into your c:\winzip directory and run them they will self extract. Go into winzip |options |program locations and enter the names into the boxes. lha.exe, arj.exe are the main ones. It is not true that WinZip requires pre-formatted disks. In the drop down box you can select the density to format at. This thread has generated more mail than most. While its a simple topic, I'm glad that so many are willing to help! marcus ************************************************************************** 14)From: Leo1pard@aol.com Subject: Re: TEMPEST (How?) >>I'm just replying to something that Spyking said about TEMPEST. I know that Power sources eminate some kind of radiation. I was wondering how this radiation is useful to TEMPEST monitors, and why would they want those emissions? What would they look like if reconstructed? Like I >>said, I'm no electronics genius! :-) How tempest (Transient Electromagnecit Pulse Standard) monitaring works is someone will aim a device or antenna at your apartment or home from across the street or down the block. That person can monitor evreything you do on your computer by collecting electromagnetic radiation emmited from your computers CRT, CPU, and/or peripheral equipment. Then reconstruct the emissions into coherent receivable signals and store them for later review. When reconstructed it will look the same as everyting you saw on your computer. There is also a excellant web site on tempest monitoring by codex at http://www.thecodex.com/c_tempest.html Hope this answers your question! :-) -Katherine ************************************************************************** 15)From: SpyKing@thecodex.com Subject: Software Location? I am going to update the FAQ page at: http://www.thecodex.com/faq.html I need the location of unique shareware or other security/surveillance related software so we can create a link for the membership... We're looking for links to things like encryption, pager/cellular monitoring software, scanner related software, PI software, internet CCTV control software, etc. ************************************************************************** Who are you? What's your specialty and/or interest? Let us know about your company... What would you like to see on the list? Post it. Let us know... Do you have something to contribute? We'd like to hear it... We want to know EVERYTHING and ANYTHING about eavesdropping, surveillance, countersurveillance & privacy related technology, etc... Remember: who, what, where, when, how & why... we want ALL the details... Do you have a question? Post it... A little free time? Help a member... With the INCREDIBLE brain power on this list, someone should have the answer ;-) P.S. Don't be a LURKER... Members take the time to post info for us all... give something back... Don't just take... Your input/knowledge is valued... ************************************************************************** Send Postings to: spyking@con2.com with "Post" in subject field with subject ************************************************************************** Subscribe to: spyking@con2.com In the subject field type: subscribe-surveillance list e-mail address ************************************************************************** Unsubscribe to: spyking@con2.com In the subject field type: unsubscribe-surveillance list e-mail address ************************************************************************** ...The Simple Rules of the Surveillance List... The Surveillance List Owners may Reject any posts that are/contain: 1) Info Unrelated to Eavesdropping, Surveillance or Privacy technology... 2) Flames or Negative posts... 3) E-Signatures that are considered excessive... 4) Advertisements not DIRECTLY related to the list topics... 5) Attached Files... 6) Oversized Posts... (May be edited to save room) **************************************************************************** This publication is copyrighted and is protected by U.S. and International copyright law. The information transmitted on this list may not be reproduced, reposted or forwarded to any non-list member without expressed written permission of the List Owner. Violation of U.S. copyright law is a criminal and civil offense... **************************************************************************** The Surveillance List is Moderated by SpyKing@thecodex.com The List Owner will make EVERY effort to protect subscribers from spam... Copyright 1996, 1997 Codex Publishing Inc., All Rights Reserved... **************************************************************************** ****************************************************************************** The Official Newsletter of W.A.S.P. The World Association of Surveillance Professionals http://www.thecodex.com/wasp.html ****************************************************************************** Vol.Two Issue #192 The Surveillance List Sept.8,1997 Over 2800+ Members Worldwide Representing 53 different countries List Chat at: http://www.thecodex.com/chat.html Surveillance List Pseudo FAQ at: http://www.thecodex.com/faq.html ****************************************************************************** IN THIS ISSUE... ****************************************************************************** 01) Cookie Monster 02) Link changed 03) Junk Mail 04) Interesting website 05) A 140+MB security site 06) Seeing Transcript 07) Can anyone id this? 08) Web Site Passwords 09) Also Seeking 10) URGENT READING FOR ANONYMAIL USERS 11) Man at his Best, The Underbelly 12) Several responses 13) Seeking used equipment 14) Question on voice changer?? 15) INTERESTED IN PI SCHOOLING? 16) Re: WinZip 17) Re: Addresses that don't work 18) What are "ani" and "anac" #'s? ****************************************************************************** DON'T BE A LURKER.... GET INVOLVED... YOU ARE A MEMBER... MAKE THE MOST OF IT ****************************************************************************** 1)From: FGM7516@aol.com Subject: Cookie Monster For members concerned about websites placing a cookie while you're surfing the web, I suggest going to and downloading an anonymous cookie. It's free and works with Netscape, Explorer and AOL. There are read-me files and FAQs to explain the process, but it's very easy & effective as a privacy-enhancing step. The cookies work with Windows and Mac platforms. I've had one installed for about a week and it shows signs of totalling stopping cookie placement in my computer. ************************************************************************** 2)From: ACE95@webtv.net (Steven Yohn) Subject: Link changed The Free Texas DMV Driver's License Lookup Link has changed from publiclink to PublicData I thought I would pass this on so you could update it in the future. I love and use your link often. Thanks for taking the time to make a usefull page like this. Steve ************************************************************************** 3)From: HtPursuit@aol.com Subject: Junk Mail Whats the deal with junk mail. Is there anything that can be done to sow it down at all. SpyKing, I know there was some mention of this before. Since being on this list I have been receiving anywhere from 5 - 20 pieces of junk mail a week in addition to the norm, (whatever that is). I had past the list info to a friend who subcribed, now their getting the same junk mail sent to them....... Dont know how it works, just want to know if there's a way to stop it or slow it. Thanks. +++Moderator's Note+++ The list currently has 2800 members. I am the only one with the membership list. It is NOT sold, rented, lent out, etc... nor will it EVER be... It is possible that spammers have subscribed to the list and steal names of posters. There is not too much I can do about that althought I have made every effort in the past to protect the list membership from unwanted spam and will continue to do so... if any lists member has ideas on how to protect the list please contact me directly... fj ************************************************************************** 4)From: "Mr. Mad" Subject: Interesting website Hello you all I surfed up on a very interesting website last night www.master-mall.com they have a wide range of telephone gadgets,kits and just about anything else you may want . check it out. ************************************************************************** 5)From: fsh Subject: A 140+MB security site This is for a link: http://sdn.home.ml.org has 140+ MB of text on Computer Security -- not including programs Secure Data Networks fsh ************************************************************************** 6)From: Luna Chiu Subject: Seeing Transcript In the interest of the list, and with the recent discussion of social engineering, I post the following transcript of an IRC discussion/scheme. Note: I am NOT responsible for the following, nor am I the perpat- rator of what you see. I received this from a friend recently, who received it from someone else. Like much of the other material po- sted on this list, it's for information purposes only. An interesting point: I was told the social engineer in this situ- tion simply used information off IRC to gain the man's real name, then used a search engine on the web to find out his phone number. The sensitive information has been censored using "X"'s. Enjoy, Luna ------- /whois VICTIM *** VICTIM is XXXXXXX@dal-tx13-02.ix.netcom.com (Dave) *** on channels: #!!!!flirt *** on irc via server irc2-1.netcom.com ([199.183.9.7] (1) NETCOM Online Communications Ser) [-LOG STARTS-] -> Hi, is this David XXXXXXX, in Dallas, Texas? -> This is Eugene at Netcom's Services Department. *VICTIM* yes.. *VICTIM* how can I heelp yu -> Is your phone number (214)XXX-XXXX? *VICTIM* that is the old number *VICTIM* 972-XXX-XXXX *VICTIM* is there a problem? => == That's completely understandable. And we tell our customers to never give out their passwords or any other personal information to anyone--but in this case, this is an extreme emergency. => == Ok. In the future, that will be used to authenticate that you are the real David XXXXXXX in our configuration files. => == Ok. And your social security number? =VICTIM= XXX-XX-XXXX => == Ok. And finally, what is the password with which you log-on to our dialup service in Dallas? =VICTIM= eek, => == Again, this is a secure transaction. =VICTIM= XXXXXX => == Ok, and your login ID is DXXXXX? =VICTIM= yes => == Great. This information will now be stored and backed up on our systems. => == We appreciate you taking out the time to answer these questions. => == If you have any questions or need any help, don't hesitate to call us. =VICTIM= k => == Thanks again, Mr XXXXXXX. Have a good evening. =VICTIM= k *** DCC chat: to VICTIM closed [-LOG ENDS-] ************************************************************************** 7)From: Jenn Saint-John Subject: Can anyone id this? As some of you on this list know, I'm a professional fiction writer who writes primarily in the espionage/military fiction genre. I've been researching a new novel project, and have been searching for information on some people and individuals who may have good reasons for keeping a low profile, although I just am seeking to interview them for background information -- I'm no threat to them in any way. I write under a pseudonym, and in fact, if anyone tries to research on this name, they'll only come up with some of my works of fiction, little else. However, the day after I gave one of my contacts (who I strongly suspect has ties to the people I'm trying to contact) our data line number here, (which I haven't given to anyone knew for about six months) I began getting interesting tones on my voicemail service, about one hit every half hour for an 8 hour period. The tones are in couplets, each tone lasting about 2 seconds, with a one second pause between tones and a 3-4 second pause between couplets. Bears no resemblence to any fax or modem handshake I've ever heard. My writing partner is a paranoid, and while I tend to dismiss such things, given the nature of what I'm researching now, I'm a bit edgy. Does anyone have any clue what was on our voicemail? Thanks, Jenn Incoming fire has the right of way. ************************************************************************** 8)From: "Venom x" Subject: Web Site Passwords Has anyone ever come across a web site or a web document that has been 'protected' with a java password program? If so could you send me the adddress of the site or document please? Thanks in advance Venom ************************************************************************** 9)From: BADCOFFEE@aol.com Subject: Also Seeking ....also seeking used 2 way hand held units. Rechargable a plus. Smaller units preferred. Range and power mandatory. Professional quality only. Need- 5 Minimum: Obviuosly 2 Quick on this one please. Still a window shopper...but if you have something that suits my needs...I need to know a/s/a/p. Badcoffee@aol.com ************************************************************************** 10)From: Judge@innocent.com SUBJECT: URGENT READING FOR ANONYMAIL USERS Addendum --==>:Next BIG Privacy Con, crypt.com uses '!' exclamation mark as skeleton key on its 128-bit encrytion.....<==-- --==>Users need to start a Campaign for Compiling Own Source.<==-- Mailto:Judge@innocent.com please give your thoughts on this, and you wonder where all those 'Cash for free Spam type mails came from?#!* ************************************************************************** 11)From: "Stanley Raven" Subject: Man at his Best, The Underbelly Gents: Ran across in Esquire Mag for September '97 the article on page 42 entitled "Psst, You Wanna Sell a Kidney" re Loompanics publishing company's various books re Uncle Fester's "Home Workshop Explosives" and eddie the wire's "The Complete Guide to Lock Picking" and "Hit Man: A Technical Manual for Independent Contractors," "A Bouncer's Guide to Barroom Brawling," etc., etc. This is not an ad, but since so many of the topics discussed are right up our various alleys, I thought you gents might like to take a look at the article. This is my first post on this excellent website. Best wishes to all. Stanley Charles Raven, Davis, California ************************************************************************** 12)From: Mutter Subject: Several responses > ... are there folks over there who ever used a 'voice changer' to better > ... engineer his prey ? If yes, did it prove useful ? and what kind of > 'changer' would you use ? I've played with (usually overpriced) voice-changers and it's definately a cool concept where you can call someone you've talked to everyday and they have no clue who you are. They work and (I guess) could be useful if your voice doesn't fit who you're supposed to be. A word of caution, though: test it on some friends before you attempt anything and don't set the thing to it's extreme where you'll end up sounding like the guy from Ransom. Also, don't go crazy with the cash. I'm sure the cheaper ones will fit your needs. > Mutter. If you are still trying to find a "Club" to borrow, I have one > that you may use for your evaluations/experiments. If you will E-mail > me your address, or drop-box if you prefer, I will mail it to you. Thanks, China, I appreciate the offer but a friend bought one a while ago and it's only a matter of time before I get to play with it to see if it's as easy to open as Augie says. > Noooo.....no experiment. This was real life. Being very new to social > engineering...I'm getting my practice time in. Taking my lumps....posting > them here and hoping to be educated more than what I originally received from > "my lumps". Also...others here can learn by my mistakes and corrections. Augie, I tend to think of all phone explorations as experiments. No need to make WAVs. Easier to just type up transcripts for the list (that way we can all see what you're up to and give our opinions). If you're that interested in learning the art of bs'ing (and if you haven't already) may I suggest you buy a cheap phone recorder. > YOUR last post on this was absolutely EXCELLENT. THAT....is what this place > is all about. Thank you! (If anyone missed it, it was good) Thanks. Your Club post brought a smile to my face. > I'de like to get all the terminology straight....I'm confused myself. I think you're making it harder than it really is. > Definition time: > > ANI- > ANACS- > Others? Use whatever the convention is for the people you're talking to. The thing is, most phone-types I've heard hardly ever refer to anything as ANAC but it really doesn't matter. For instance, I've listened to people say things like: "958 is the ANAC for a great portion of NJ/NY." but I've also heard: "958 is the ANI for a great portion of NJ/NY." Really doesn't matter. Just a matter of preference (the latter being most peoples'). > "Give me a few good hackers and 90 days, and I can bring this country to > its knees. Telecommunications systems, power grid systems, financial > systems all going down at the exact same time. Whether its from next > door or halfway across the world, the capability to do this exists > today." > > Jim Settle, the form chief of the FBI's computer crimes squad. Great quote. Makes me think of a bunch of shadowy figures wearing 2600 shirts working away at computer terminals trying to cause power outages. Come on! Look at who's saying what. The word 'demonizing' comes to mind. The best way to get funding for branches of the government who's job it is to protect us is to create unseen enemies (infinite amount of enemies == infinite amount of funding to battle them) who are capable of highly technical (something most people have an inherent fear and ignorance of) and thus mysterious power. Read the above quote again. This time see if you can find how Jim is spreading fear of the unknown. Let's bring this to a level that most list members will be able to easily understand. In the above post, Augie is currently experimenting with the phone system to learn about it. This is what hacking is about. Now ask yourself if you believe Augie is a threat to national security. - M u t t e r Ed. root zine Pssst, Go here --> http://www.openix.com/~mutter mutter@openix.com ************************************************************************** 13)From: BADCOFFEE@aol.com Subject: Seeking used equipment Seeking completly portable (AC/DC) vidio system. Camera (micro mandatory) (color prefered) with audio (prefered) Transmittor MICRO everything Receiver/recorder Professional quality only please. Also: If you are upgrading and have need to sell eqipment....drop me a line. Badcoffee@aol.com ************************************************************************** 14)From: "eluhow" Subject: Question on voice changer?? Get a P-3 Voice Changer II. Model P8955. Plugs into telephone line, portable, and about $49-69. Is it the best, no, but I can fool my mother with alittle fooling around, and price is right. eluhow@erols.com page me: http://wwp.mirabilis.com/2457748 ICQ 2457748 ************************************************************************** 15)From: JoeSleuth@aol.com Subject: INTERESTED IN PI SCHOOLING? THOSE IN AUSTRALIA INTERESTED IN P I SCHOOLING LION INVESTIGATION ACADEMY 434 CLEARFIELD ST BETHLEHEM PENNA. 18017 the first academy to offer an accredited program via homestudy LION INVESTIGATION ACADEMY IS LICENSED BY THE DEPARTMENT OF EDUCATION STATE OF PENNSYLVANIA THE A.S.T. DEGREE ASSOCIATE IN SPECIALIZED TECHNOLOGY DEGREE IN PRIVATE INVESTIGATIONS GIVES 60 CREDITS FORENSIC COURSES AVAILABLE LION INVESTIGATION ACADEMY HOST GRADUATES FROM THE FEDERAL LEVEL TO THE NOVICE WANTING TO ENTER THE PRIVATE SECTOR REMEMBER WHEN LOOKING FOR SCHOOLING MAKE SURE THAT SCHOOL IS LICENSED AND ACCREDITED L.I.A. ESTABLISHED 1974 STUDENTS AND GRADUATES THROUGHOUT THE WORLD ************************************************************************** 16)From: Captain Attitude Subject: Re: WinZip In The Surveillance List vol.two, issue #191, Marcus Blankenship reported >PKZ204g.exe => DO NOT GET ANY HIGHER VERSION!!! IT IS A >VIRUS/HOAX! For MS DOS, PKZ204g.exe is the current version. A version of PKZIP for MS Windows, PKZ250w16.exe (16-bit) or PKZ250w32.exe (32-bit), is available from the horse's mouth at: http://www.pkware.com/download.html Details about the PKZ300.ZIP and PKZ300B.ZIP trojans can be found at: http://ciac.llnl.gov/ciac/CIACHoaxes.html All the best.... Mike Scioli Humble Ecologist, Mad Biometrician Austin, TX ************************************************************************** 17)From: Tasmanites@aol.com Subject: Re: Addresses that don't work In a message dated 97-09-05 09:26:54 EDT, Grant Augustine writes: << c. server has been instructed not to let you have it -- You don't have permission to see that web page. >> This level of meaning is perfectly obvious. What I meant was, why would a server be instructed not to let me have something? Is it my breath? Is Big Brother deciding what I can look at? Is it because I am accessing via AOL and therefore must not be deserving of real information? Tas ************************************************************************** 18)From: "P.I." Subject: What are "ani" and "anac" #'s? no longer lurking in pa. great list guys, i've learned a lot!!! question, i saw the list of "ani" #'s, but wasn't sure what it was. what are "ani" and "anac" #'s. how can they benefit me as an investigator?? sorry if this has already been reviewed......... btw, i hope i saved the list ;( -- "the judicial power of the United States, shall be vested in one Supreme Court, and in such inferior Courts as the Congress, may from time to time ordain and establish" ************************************************************************** Who are you? What's your specialty and/or interest? Let us know about your company... What would you like to see on the list? Post it. Let us know... Do you have something to contribute? We'd like to hear it... We want to know EVERYTHING and ANYTHING about eavesdropping, surveillance, countersurveillance & privacy related technology, etc... Remember: who, what, where, when, how & why... we want ALL the details... Do you have a question? Post it... A little free time? Help a member... With the INCREDIBLE brain power on this list, someone should have the answer ;-) P.S. Don't be a LURKER... Members take the time to post info for us all... give something back... Don't just take... Your input/knowledge is valued... ************************************************************************** Send Postings to: spyking@con2.com with "Post" in subject field with subject ************************************************************************** Subscribe to: spyking@con2.com In the subject field type: subscribe-surveillance list e-mail address ************************************************************************** Unsubscribe to: spyking@con2.com In the subject field type: unsubscribe-surveillance list e-mail address ************************************************************************** ...The Simple Rules of the Surveillance List... The Surveillance List Owners may Reject any posts that are/contain: 1) Info Unrelated to Eavesdropping, Surveillance or Privacy technology... 2) Flames or Negative posts... 3) E-Signatures that are considered excessive... 4) Advertisements not DIRECTLY related to the list topics... 5) Attached Files... 6) Oversized Posts... (May be edited to save room) **************************************************************************** This publication is copyrighted and is protected by U.S. and International copyright law. The information transmitted on this list may not be reproduced, reposted or forwarded to any non-list member without expressed written permission of the List Owner. Violation of U.S. copyright law is a criminal and civil offense... **************************************************************************** The Surveillance List is Moderated by SpyKing@thecodex.com The List Owner will make EVERY effort to protect subscribers from spam... Copyright 1996, 1997 Codex Publishing Inc., All Rights Reserved... **************************************************************************** ****************************************************************************** The Official Newsletter of W.A.S.P. The World Association of Surveillance Professionals http://www.thecodex.com/wasp.html ****************************************************************************** Vol.Two Issue #193 The Surveillance List Sept.9,1997 Over 2800+ Members Worldwide Representing 53 different countries List Chat at: http://www.thecodex.com/chat.html Surveillance List Pseudo FAQ at: http://www.thecodex.com/faq.html ****************************************************************************** IN THIS ISSUE... ****************************************************************************** 01) Fingerprinting 02) How do they do that? 03) Winzip Issues 04) Fight the Fingerprint website 05) False Memories 06) Re: Anonymous Cookie, it works!! 07) Re: Can anyone id this? 08) I am suspicious 09) Interesting paper on EMP 10) CORRECTION 11) Re: Can anyone id this? 12) Luring businesses with lax privacy laws 13) Some very interesting software... 14) Great Southern Security 15) I Wanted to See The World! 16) Re: Social engineering 17) Tiny video surveillance equipment 18) "Dye" for letters 19) Transcript Repost 20) Operative needed in Cameron County Texas 21) Voice quirks 22) Advise needed a/s/a/p 23) FBI calls for mandatory key escrow; Denning on export ctrls 24) Augie is a threat to national security? 25) Re: Free Texas DMV Driver's License Lookup Link? 26) Re: 10 round clips and other things 27) Air Taser Guns 28) Programming a stripe reader for a client ****************************************************************************** DON'T BE A LURKER.... GET INVOLVED... YOU ARE A MEMBER... MAKE THE MOST OF IT ****************************************************************************** 1)From: goddesshera@juno.com (Anonymous Remailer) Subject: Fingerprinting What is the SOP for a suspect that has mangled fingerprints? For example, prints that that were burned severely, physically destroyed somehow, or whatever? What if it was obviously intentional? On what part of the fingerprint is the index formed? Is it where the lines intersect? Would it be suffecient to destroy/distort only these points? Permanently, with commonly available chemicals or techniques? Captain Curious BTW, please don't reply directly - I'm using a remailer. I'll see it on the list. ************************************************************************** 2)From: goddesshera@juno.com (Anonymous Remailer) Subject: How do they do that? I've noticed in the news on several occasions that the police will locate a fugitive that has somehow acquired a REAL driver's license and social-security card under a new name. These aren't wealthy people (one was working as a 7-11 clerk), so without "resources", how do they do this? What do they need - a fake birth cirtificate? Assuming this to be the case, more questions: Isn't there a way to verify birth records, or do the agencies bother to do this? Is there a plausable situation where birth records would not be expected to be verifiable? Does everyone have a birth certificate? What if you don't? So you're 40 years old, and walk in to the SS office, and ask for a card. What the heck do you tell them you've done all these years without one? I can think of all kinds of good reasons to have an alternate ID, and would like to know more about how it can be pulled off (for strictly educational purposes). Captain Curious ************************************************************************** 3)From: R2_D2 Subject: Winzip Issues Hey Guy's; Splitting big files is not rocket science! 1) anybody can use winzip, or you can winzip and split. 2) you can split with winzip, or you can use a file splitter The file splitter is a much better way to go. Much easier. No college degree needed to understand. If anyone is interested, they can e-mail me their info, and I will e-mail the splitter program. (cause I forgot where I got it!) Any other technical computer related questions you can send this way. I specialize in computer forensics. I can retrieve any or all files from any hard drive or "computer" even after delete, format and reinstallation of windows. IT IS NEVER REALLY GONE, if you know how to go after it and get it! I could become the special consultant / advisor to Spy King, in exchange for that book maybe? Let me know. I also have a fairly deep understanding of may other technologies, such as telephony. I understand most all issues relating to tip and ring (red & green) off hook voltages and resistance, on hook, mux's, multiplexers, isdn, asdl, hdsl, atm, async comm, modems, wireless mic's, some hackin' & crackin. Thanks, R2D2 ************************************************************************** 4)From: "Marko" Subject: Fight the Fingerprint website You may want to check out this web page: www.networkusa.org Linda Muller runs it; it focuses on fingerprinting laws and how to fight them; and the biometric tracking of citizens in general. If you like it, contact Linda at linda@networkusa.org and see if she wants you to crosslink your sites. Thanks ************************************************************************** 5)From: goddesshera@juno.com (Anonymous Remailer) Subject: False Memories For those of you that follow the psyco-whatever field, there's an interesting article in Scientific American (Sep 1997) about false memories and how to implant them in people. The details of several experiments were given. They showed about a 25% rate of success, when "guided" under hypnosis or similar therapy. This is REALLY interesting: They could cause many of the subjects to admit to doing something they didn't do when the subjects were confronted by others that claimed they did it. Good reading. Captain Curious ************************************************************************** 6)From: mzenze19@idt.net Subject: Re: Anonymous Cookie, it works!! > For members concerned about websites placing a cookie while you're > surfing > the web, I suggest going to and downloading an > anonymous > cookie. It's free and works with Netscape, Explorer and AOL. There > are > read-me files and FAQs to explain the process, but it's very easy & > effective > as a privacy-enhancing step. The cookies work with Windows and Mac > platforms. > > I've had one installed for about a week and it shows signs of > totalling > stopping cookie placement in my computer. I have had this program running for about two months. It is very effective, and you can still surf sites that require cookies. Another way for added assurance that no cookies will be placed on your hard drive is to open your windows explorer or file manager, open up the netscape folders until you find the cookie file. In win95 explorer (sorry, don't know much about win 3.11), right click on the cookie file, then chose properties. At the bottom are several options, and ARCHIVE will probably be checked. Leave it checked but also check READ-ONLY. This will allow cookies to be stored in memory while you are on the site, but as soon as you leave the cookie does too. NOTE: With Internet Explorer, the cookie file is saved as a text document on your hard drive, and is not in the browser folder. It will be saved as cookie.txt, and in win95 you can follow the procedure above for the same effect. Hope this helps! Mike ************************************************************************** 7)From: BADCOFFEE@aol.com Subject: Re: Can anyone id this? << our data line number here, (which I haven't given to anyone knew for about six months) I began getting interesting tones on my voicemail service, about one hit every half hour for an 8 hour period. >> Hey.... Not a clue and I have the same tones after I receive a message. It lasts about 30 minutes. When I pick up the phone.....it hear a "quick" screetch, dule tone....Then normal tone. I am making assuption that this is a normal activity because it only happens after a voice mail message. (Voice mail is connected to Tel-co) Clueless, Augie ************************************************************************** 8)From: Annibelle@aol.com Subject: I am suspicious I think my question is quite simple actually,... I would like to know if it is possible to recover an America Online Password to gain entry into someone's system. I am suspicious that this has happened to me over the internet, that someone has hacked my password and am curious as to how this could have happened. I have not/did not in any way or manner give this information out over the internet. Thank You. ************************************************************************** 9)From: "Betty G.O'Hearn" Subject: Interesting paper on EMP http://www.infowar.com/civil_de/civil_090597a.html-ssi Betty O'Hearn Assistant to Mr. Winn Schwartau 2000 West Bay Drive #3 Largo, FL 33770 813-518-0600 Voice 813-518-0602 FAX http://www.infowar.com http://www.info-sec.com Register for InfoWarCon 7: http://www.infowar.com/papers/iwcon.html-ssi ************************************************************************** 10)From: "Betty G.O'Hearn" Subject: CORRECTION Interesting paper on HPM. "Security Implications of High-Power Microwave Technology" http://www.infowar.com/civil_de/civil_090597a.html-ssi Enjoy! Betty O'Hearn Assistant to Mr. Winn Schwartau 2000 West Bay Drive #3 Largo, FL 33770 813-518-0600 Voice 813-518-0602 FAX http://www.infowar.com http://www.info-sec.com Register for InfoWarCon 7: http://www.infowar.com/papers/iwcon.html-ssi ************************************************************************** 11)From: witzend@peganet.com Subject: Re: Can anyone id this? There are 2 or 3 possibilities to consider: 1. A local hacker (usually)with his pals may be sliding through your voice mailbox and using it for a stopover on their way to other curiosities. This is really common in some venues. Particularly with dated information floating around. Remember - school is back in session. 2. A software glitch in your equipment is sorting itself out. Get a conflict catcher of some type to sort the problem out. (This is increasingly common as you add multiple stand alone programs. You see they all have the same sorts of commands and some times refer to the wrong sort) 3. A virus is having it's way with your equipment. Merely an aggravation. What happens is that something (like a picture copied from the web) has an appetite associated. Last time I checked Peter Norton's products the Virus library for the software was over 3 megabytes of info. It still doesn't cover every type. 4. It is also possible that it is the nature of the beast. some hard ware problems resemble exactly what you have described. 5. Also likely are the folks trying to contact have the wrong parity or contact information. BeepBeep! Jenn the likely hood of Uncle Bugger cracking into your equipment is not what you may think. Most of what is hit are key words. ************************************************************************** 12)From: Subject: Luring businesses with lax privacy laws I saw an ad in a trade publication today for the State of Arkansas, recruiting businesses to locate there. Among all the standard things like low taxes etc., they expounded: "No restrictions on monitoring of employee phone calls." Advertising that in their state you can rape your employee's privacy rights as a come-on to business. Sick. ************************************************************************** 13)From: SpyKing@thecodex.com Subject: Some very interesting software... Checkout: http://www.ghgcorp.com/cybercop/SCAB.HTM ************************************************************************** 14)From: Andrew Allocco Subject: Great Southern Security Has anyone had any experiences with Great Southern Security or the equipment they sell. Thanks, Andy Allocco A.Allocco@worldnet.att.net ************************************************************************** 15)From: Tasmanites@aol.com Subject: I Wanted to See The World! OK, folks - NOW whom have I offended? I tried to access the list of cameras , and got this reply: <> How do I get permission? Bring a note from Mom? That'll be difficult, since she's been in an urn in my closet since 1979. ************************************************************************** 16)From: ikkles@xchange.apana.org.au Subject: Re: Social engineering Re: social engineering, there is a nice example on page 66 of Underground, which I reproduce here for educational purposes only ('tis under copyright). Mendax has an account name and contact information, and is after the password.. "This is John Keller, an operator from OTC Minerva in Sydney. One of our D090 hard drives has crashed. We've pulled accross the data on the backup tape and we believe we have all your correct information. But some of it might have been corrupted in the accident and we would just like to confirm your details. Also the backup tape is two days old, so we want to check your information is up to date so your service is not interrupted. Let me just dig out your details ..." Mendax shuffled some papers around on the table top. "Oh, dear. Yes. Let's check it" the worried manager responded. Mendax started reading all the information on the Minerva list obtained from Pacific Island [ ie the contact information, company name etc ], except for one thing. He changed the fax number slightly. It worked. The manager jumped right in. "Oh, no. That's wrong. Our fax number is definitely wrong." he said, and proceeded to give the correct number. Mendax tried to sounds concerned. "Hmm," he told the manager. "We may have bigger problems than we anticipated. Hmm." He gave another pregnant pause. Working up the courage to ask the Big Question. It was hard to know who was sweating more, the fretting Perth manager, tormented by the idea of loud staff complaints from all over the company because the Minerva account was faulty, or the gangly kid trying his hand at social engineering for the first time. "Well," Mendax began, trying to keep the sound of authority in his voice. "Let's see. We have your account number, but we had better check your password ... what was it?" An arrow shot from the bow. It hit the target. "Yes, it's L-U-R-C-H - full-stop." Lurch? Uh-huh. An Addams Family fan. "Can you make sure everything is working? We don't want our service interrupted." The Perth manager sounded quite anxious. Mendax tapped away at the keyboard randomly and then paused. "Well, it looks like everything is working just fine now," he quickly reassured him. Just fine. "Oh, that's a relief!" the Perth manager exclaimed. "Thank you for that. Thank you. I just can't thank you enough for calling us!" More gratitude. Mendax had to extract himself. This was getting embarrassing. "Yes, well I'd better go now. More customers to call." That should work. The Perth manager wanted a contact number, as expected, if something went wrong - so Mendax gave him the one which is permanently busy [ these numbers are useful for fare evasion in Melbourne too - Ikkles ] "Thank you again for your courteous service!" Uh-huh. Anytime. The book this is from is 'Underground: Tales of Hacking, Madness and Obsession on the electronic frontier', by Suelette Dreyfus, published by Random House. Definitely worth adding to your library :) ************************************************************************** 17)From: Aristides Gonzalez Subject: Tiny video surveillance equipment Hi, I am interested in buying a good tiny video surveillance equipment and I am lost. I have seen pinholes but I need a receiver of the signal. Does anyone knows what are the steps to make a video surveillance with this gears and what is the distance from I can receive the video signal? Can I use my videocamera to see the images received? Thank You. ************************************************************************** 18)From: Tasmanites@aol.com Subject: "Dye" for letters Sent this on 7/24, didn't see it posted - or did I miss that issue? <> ************************************************************************** 19)From: Luna Chiu Subject: Transcript Repost Apparently, somehow, part of the transcript got cutoff, as shown in my previous post. Not sure how, as I double-checked the file for completeness before posting. Nevertheless, below *should be* the full post. Luna -- /whois VICTIM *** VICTIM is XXXXXXX@dal-tx13-02.ix.netcom.com (Dave) *** on channels: #!!!!flirt *** on irc via server irc2-1.netcom.com ([199.183.9.7] (1) NETCOM Online Communications Ser) [-LOG STARTS-] -> Hi, is this David XXXXXXX, in Dallas, Texas? -> This is Eugene at Netcom's Services Department. *VICTIM* yes.. *VICTIM* how can I heelp yu -> Is your phone number (214)XXX-XXXX? *VICTIM* that is the old number *VICTIM* 972-XXX-XXXX *VICTIM* is there a problem? -> Ok. Do you have some time to answer a few questions? -> This is rather imperative, as our LAN system is having some problems and we need to restore a backup. *VICTIM* I see -> We'll need some personal information from you, so we can get this fixed as soon as possible. -> First, what is your mother's maiden name? *VICTIM* Sir.. is it possible that I can call the service instead.. I feel somewhat uneasy giving out info in irc -> We would rather do it via IRC, as it cuts the cost in calling charges, as I'm sure you understand. How about I DCC CHAT with you? -> DCC CHAT is completely secure. *VICTIM* well.. that is ok.. just cautious... *** Sent DCC CHAT request to VICTIM *** DCC chat connection to VICTIM[XXX.XX.XXX.XX,XXXX] established => == This is a secure transmission of our packet data. => == Now about the first question, what is your mother's maiden name? =VICTIM= I see... well.. I feel odd that people would ask about personal information.. for with this information people can access my account..thus I feel uneasy =VICTIM= XXXXXX => == That's completely understandable. And we tell our customers to never give out their passwords or any other personal information to anyone--but in this case, this is an extreme emergency. => == Ok. In the future, that will be used to authenticate that you are the real David XXXXXXX in our configuration files. => == Ok. And your social security number? =VICTIM= XXX-XX-XXXX => == Ok. And finally, what is the password with which you log-on to our dialup service in Dallas? =VICTIM= eek, => == Again, this is a secure transaction. =VICTIM= XXXXXX => == Ok, and your login ID is DXXXXX? =VICTIM= yes => == Great. This information will now be stored and backed up on our systems. => == We appreciate you taking out the time to answer these questions. => == If you have any questions or need any help, don't hesitate to call us. =VICTIM= k => == Thanks again, Mr XXXXXXX. Have a good evening. =VICTIM= k *** DCC chat: to VICTIM closed [-LOG ENDS-] ************************************************************************** 20)From: Trace Carpenter Subject: Operative needed in Cameron County Texas Need some help with a small task in Cameron County, Texas down around Padre. If anyone is in that area, please contact me. -- Trace Carpenter Investigations ****** 2926 Maple Ave., Ste. 200 Ignorace of the law is no excuse; Dallas, Texas 75201 Ignorance of the law-makers apparently 214.828.4520 is. 214.740-0112 Facsimile ****** ************************************************************************** 21)From: allamosa@roanoke.infi.net (happydog) Subject: Voice quirks Voice changers work very well but you have to remember not to give away who you are by the quirks that everyone has. Mine is "anyway". I say that a lot when I change the subject and that's how I was "caught" in testing it on my son-in-law. ************************************************************************** 22)From: BADCOFFEE@aol.com Subject: Advise needed a/s/a/p I am about to advise someone on the following: In a residential location where there is a 911 system in place. Even if you "accidentally" call.....and hang up. The police WILL trace the call and WILL be showing up at your door to make sure everything is ok. My situation: Advise about to be given (same as above) BUT......this person in in an office building. The ANI on 911's will read ?????? Probably the switchboard right? (Thats no help) I've often told people that there is no need (in extreme emergency where time on the phone can NOT be spent) to just call 911 and leave the phone off the hook. Assistance WILL be there. Not sure about office buildings. What do you think???? Augie ************************************************************************** 23)From: Nev Dull Subject: FBI calls for mandatory key escrow; Denning on export ctrls Forwarded-by: Jim Thompson Forwarded-by: Declan McCullagh WASHINGTON, DC -- All encryption products sold or distributed in the U.S. must have a key escrow backdoor "like an airbag in a car," law enforcement agents advised a Senate panel this afternoon. FBI Director Louis Freeh also told a Senate Judiciary subcommittee that "network service providers should be required to have some immediate decryption ability available" permitting agents to readily descramble encrypted messages that pass through their system. This marks the most aggressive push to date for mandatory domestic key escrow (or "key recovery"), which means someone else other than the recipient can decipher messages you send out. Now, the easiest way to win such a political tussle in Washington is to control the terms of the debate. And nobody understands that rule better than Sen. Jon Kyl (R-Arizona), chair of the Judiciary subcommittee on technology, terrorism, and government information. Kyl opened today's hearing not by saying its purpose was to discuss crypto in a balanced manner, but that he wanted "to explore how encryption is affecting the way we deal with criminals, terrorists, and the security needs of business." Then he talked at length about "criminals and terrorists" using crypto, and child pornographers "using encryption to hide pornographic images of children that they transmit across the Internet." Kyl also stacked the three panels. Out of seven witnesses, five were current or former law enforcement agents. No privacy or civil liberties advocates testified. Some companies including FedEx apparently dropped out when told they'd have to pay lip service to key escrow if they wanted to speak. Dorothy Denning, a Georgetown University professor of computer science, did testify. Kyl made a point of asking her if she still supported key escrow systems (two recent articles by Will Rodger and Simson Garfinkel said she was changing her mind). "I think key recovery offers a very attractive approach," Denning said. What about export controls? "In the absence of any controls, the problem for law enforcement would get worse," she replied. But when Sen. Dianne Feinstein (D-Calif) asked if Denning would support a *mandatory* key escrow system, the computer scientist said she wouldn't. "No, because we don't have a lot of experience we key recovery systems... a lot of people are legitimately nervous." (Keep in mind that although Feinstein supposedly represents Silicon Valley, she's no friend of high tech firms. She opposes lifting export controls; in fact, she says that "nothing other than some form of mandatory key recovery really does the job" of preventing crime. Of course, Feinstein doesn't have a clue. She talks about whether businesses would want "a hard key or digital key or a key infrastructure." Yes, folks, this is in fact meaningless blather.) Marc Rotenberg, director of the Electronic Privacy Information Center in Washington, DC, says, "Simply stated, the Senate train is headed in the wrong direction. But of course this doesn't answer the question of what will ultimately be resolved by Congress? There's a very popular measure in the House right now that's heading in a different direction." Rotenberg is talking about Rep. Bob Goodlatte's SAFE bill, which is much more pro-business than S.909, the McCain-Kerrey Senate bill that Kyl supports. Now, S.909 doesn't mandate key recovery; it only strongly encourages it by wielding the federal government's purchasing power to jumpstart a key recovery infrastructure. But Kyl would go further. At a recent Heritage Foundation roundtable on encryption, I asked him, "Why not make key recovery technology mandatory -- after all, terrorists, drug kingpins and other criminals won't use it otherwise." Kyl's response? Not that it would be a violation of the Constitution's due process and search and seizure protections. Instead, he told me he simply didn't have enough votes... =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= Forwarded-by: chuck yerkes Forwarded-by: David HM Spector The Washington Post has a good piece on the whole encryption thing too: http://www.washingtonpost.com/wp-srv/tech/analysis/encryption/encrypt.htm =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= FBI chief calls for encryption control at home Published: Sept. 4, 1997 BY RORY J. O'CONNOR Mercury News Washington Bureau WASHINGTON -- In an abrupt departure from stated Clinton administration policy, the director of the FBI said Wednesday the government should control how U.S. computer users can scramble their data to keep it secret. The White House has pledged for years to never ask for domestic controls on encryption. Encryption technology, once confined to the military and spy agencies, is now commonly used to keep the contents of electronic mail, computer files or digital phone calls from prying eyes and ears. But FBI head Louis Freeh insisted to a Senate subcommittee that controlling unbreakable encryption inside the United States is "a public safety issue" and that the government should require any scrambling technology used in the United States to incorporate a "back door" authorities can access to decode otherwise secret data and transmissions. The unchecked spread of unbreakable encryption, he said, threatens the use of wiretaps to combat serious crime. "We cannot leave to private industry the task of solving this problem for law enforcement," Freeh said. "We are looking to the Congress for some type of assistance, for some kind of protection against unbreakable domestic encryption." In an indication of how divisive the issue is within the administration, however, the White House reaffirmed its 1996 pledge that "any American will remain free to use any encryption system domestically." "The administration has not changed its position and does not support domestic controls on encryption," Heidi Kukis, a spokeswoman for Vice President Al Gore, said after Freeh's testimony. But she reiterated the administration's support for a Senate bill, opposed by industry and civil libertarians, that would encourage development of an encryption technique known as "key recovery." Under that system, electronic "keys" to unlock a user's scrambled messages would be available to outsiders, like law-enforcement officials. Most privacy and encryption advocates favor so-called public key encryption, which can be made strong enough that not even the most sophisticated computers can crack the code without a key held only by the computer's owner. Civil libertarians responded angrily to Freeh's proposal, saying it would be an attack on privacy and prevent both individual and corporate computer users from protecting confidential information from thieves or rogue government officials. "The idea of requiring every manufacturer in the United States to implement data recovery features is new and outrageous from a privacy point of view," said Alan Davidson, staff counsel of the Center for Democracy and Technology. "This is a dramatic shift from where the administration has been." Some senior administration officials privately acknowledge the encryption issue is a seemingly intractable problem within the White House. Even the administration's current policy of restricting the export of strong U.S.-made encryption and pressing for key recovery is "untenable," one official said. But the FBI and the Justice Department have proven "unshakable" in their insistence that the policy be tightened and expanded to cover domestic encryption use as well. Freeh's testimony before the Senate Judiciary Committee's technology subcommittee found a receptive audience in Chairman Jon Kyl, R-Ariz., and ranking member Sen. Dianne Feinstein, D-Calif. Freeh said he believes computer manufacturers, software makers and Internet service providers should be required to provide easy access points for police to wiretap scrambled digital communications. "What we need as a minimum is a feature implemented by design that allows law enforcement to have an immediate, lawful decryption" of suspect material, Freeh said. Like new rules for air bags in cars, users could choose to turn the encryption feature off. Feinstein went even further, saying the only solution she could envision is one that makes "key recovery" technology mandatory. Opponents say that, while key recovery could be useful to some people and companies, it means that the electronic "keys" to unlock scrambled messages would be available to outsiders. The apparent public disagreement between the White House and the FBI on the issue angered Mountain View-based Netscape Communications Corp., whose Internet browsing software is employed by 70 percent of those online. "The fact of the matter is the vice president said twice last year the administration policy is not about domestic control," said Peter Harter, vice president of public policy for Netscape. "It is very hard for industry to work out a balanced policy when the administration can't keep all its senior (officials) in line. It's getting increasingly frustrating," Harter said. Comparing Freeh's proposal to the digital wiretap law for telephones, which has pitted the FBI against industry for three years in an unresolved technical standards battle, Harter said a similar encryption law could wreak havoc on the Internet. "The Internet industry in this country can't afford to be put into a three-year tailspin and get into a technical standards wrestling match with the FBI," he said. =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= Forwarded-by: chuck yerkes Forwarded-by: David HM Spector Senators Embrace Mandatory Data Keys by Wired News Staff 12:03pm 4.Sep.97.PDT In a major advance for hard-line proponents of giving the government wide access to electronic data, several influential senators have declared their support of mandatory key recovery features for all encryption-enabled software sold in the United States. At a Judiciary subcommittee meeting Wednesday, Senator Dianne Feinstein was among those who came out strongly in support of the position taken by FBI Director Louis Freeh that mandatory key recovery is essential to deterring crime. "Nothing other than some kind of mandatory key recovery really does the job," the California Democrat said at a hearing of the Senate Judiciary Committee's technology, terrorism, and government information subcommittee. "The public-safety issue is a paramount one." The subcommittee's chairman, Senator Jon Kyl (R-Arizona), added that he was "in complete agreement." The Clinton White House, like past administrations, have, along with major police and spy agencies, been strong supporters of such measures. But in Congress, sweeping measures to give government agents an easy-open back door to scrambled data have been met with strong opposition and legislation that cuts in the opposite direction. Bills in both the House and Senate have sought to exclude mandatory key recovery systems as a requirement not only for US software-makers and users but also for export products. The Senate version of this liberalized policy is, practically speaking, dead, supplanted by the Secure Public Networks Act by Senators Bob Kerrey (D-Nebraska) and John McCain (R-Arizona). The bill offers incentives to software manufacturers for building key recovery features into their products. In the House, a liberalization bill by Representative Bob Goodlatte (R-Virginia) is not only alive but has gained a majority of members as cosponsors. The software industry, civil liberties advocates, and privacy groups on both the right and the left have opposed mandatory key recovery. Some opponents were stunned by Wednesday's hearing. "It was really shocking to hear how casually senators and the FBI director talked about imposing domestic controls," said Alan Davidson, staff counsel at the Center for Democracy and Technology. "They've crossed a new line in this debate." "It appears that Senator Feinstein wants a Constitution-free zone for the Internet," said David Banisar, staff counsel at the Electronic Privacy Information Center. =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= Forwarded-by: chuck yerkes Forwarded-by: David HM Spector [From today's CyberTimes in the online NYT -- check out Sen. Feinstein's last word on the subject (incidentally, the last line of the piece). You'd think the Sedition Act could be used against Her, and Freeh... but no, it only applies to the hoypaloy like you and me... not government officials. _DHMS] September 4, 1997 Encryption Tops Wide-Ranging Net Agenda in Congress By JERI CLAUSING WASHINGTON -- As Congress returns from its summer break this week, it faces a host of legislative initiatives that could shape the future of online privacy, commerce and jurisdiction. Topping the agenda is encryption, an issue that has pitted President Clinton and his top crime fighters against virtually everybody else. The word encryption traditionally conjures images of spies and sophisticated international organized crime rings. But with the dawn of the Internet, it is also the key to private communication and secure business transactions. And while Clinton on July 1 took a very public stand for a tax-free, self-governed Internet, his administration is pushing to create a key-recovery system that would keep encrypted codes on file for law enforcement officials to access. But the administration is not alone in backing bills that would appear to be contradictory to the principles of a free, self-governed Internet. Some groups are fighting to ban or regulate unsolicited commercial e-mail, or spam. Others want to ban gambling on the Internet and criminalize copyright infringements. Of the dozen or so Internet or computer-related bills pending in Congress, encryption is among the first orders of business. Subcommittees of both the House and Senate Judiciary committees have scheduled hearings this week. The House bill, known as the Security and Freedom Through Encryption Act, or SAFE, legislation backed by virtually everyone but the administration, would lift all current export controls on encryption software and prohibit a government key-recovery system. Despite intense lobbying by the administration, which included classified briefings for members of key House committees, the bill has been endorsed by the House Commerce and International Relations committees. And with more than 250 of the House's 435 members cosponsoring the act, sponsoring Representatives Bob Goodlatte, Republican of Virginia, and Zoe Lofgren, a California Democrat, are optimistic about getting the bill through the full House as early as this month. The Senate, however, has been less inclined to buck the administration. The Senate Commerce Committee passed a bill by Senator Bob Kerrey, Democrat of Nebraska, and the committee's chariman, John McCain, Republican of Arizona, that includes the administration-backed key-recovery plan. But there are two other Senate encryption bills that are closer to the SAFE act in the House and a Judiciary subcommittee hearing is scheduled on the issue Thursday. Still, at a Judiciary subcommittee hearing on Wednesday, Congress's first day back, Senator Dianne Feinstein, a Democrat who represents California and its technology-rich Silicon Valley, called for mandatory key recovery of encrypted software. And Louis J. Freeh, the director of the FBI, raised the prospect of also requiring Internet service providers to have keys to the data flowing over their networks. "Law enforcement needs to have a system for immediate decryption" when a judge determines it is likely that crime is being or is about to be committed, Freeh told the Subcommittee on Technology, Terrorism and Government Information. "We should also look at whether network service providers should have a system for immediate decryption." Encouraged by the Supreme Court's decision striking down the Communications Decency Act this summer, an unusually broad cross section of advocacy groups, including the American Civil Liberties Union, the Electronic Freedom Foundation, the Business Software Alliance and the National Rifle Association are bent on killing bills that would regulate encryption technology. And as was the case with the Communications Decency Act, lawmakers backing the administration's call for a key-recovery system are warning of dire consequences if Congress fails to enact such a system in an effort to thwart terrorists, online pedophiles and drug dealers. "The looming specter of the widespread use of robust, virtually uncrackable encryption is one of the most difficult problems confronting law enforcement as the next century approaches," Freeh told the Senate Judiciary Committee earlier this summer. "At stake are some of our most valuable and reliable investigative techniques and the public safety of our citizens. We believe that unless a balanced approach to encryption is adopted that includes a viable key infrastructure, the ability of law enforcement to investigate and sometimes prevent the most serious crimes and terrorism will be severely impaired. Our national security will also be jeopardized." Opponents of a key recovery system, on the other hand, insist that terrorists and drug cartels are smart enough not to use encrypted codes to which law enforcement agencies have access. And they argue that the current export restrictions on strong encryption developed in the United States could put the nation at a competitive disadvantage in the fast-growing and fast-changing digital communications industry. Others say it's a serious threat to civil liberties. "This is equally as serious as the Communications Decency Act," said Shari Steele of the Electronic Frontier Foundation. While the Communications Dececny Act "was about freedom of speech, making sure that speech was protected online," she said, "encryption is about privacy -- making sure we are able to speak privately, and making sure our transactions are private." In contrast to Clinton's support of proposals like the Internet Tax Freedom Act, which would prohibit states from taxing online commerce, Steele says the administration's encryption policies will stymie Internet development. "The administration, if anything, is moving in the wrong direction," Steele said. "We are very dissatisfied. When we first voted for Clinton, there was an expectation that Vice President Al Gore was this technologically savvy guy. Instead, he has turned out to be a real enemy of the people when it comes to Internet issues." Software companies insist that the freedom to develop strong encryption would prove to be the best weapon against online crime because encryption would thwart more thieves and eavesdroppers than it would facilitate organized crime and terrorism. The issue is also changing the perception of Washington among high-tech companies. In the wake of the Communications Decency Act, and facing a threat on the encryption issue, the computer industry, increasingly wary of what it sees as the technical naivete of Congress, is moving quickly to improve its clout through campaign donations and lobbying. According to a recent report by the Center for Responsive Politics, the industry donated $7.3 million through political action committees, "soft money" and individual contributions to federal candidates and parties. That's 52 percent more than was spent in the 1991-1992 election cycle. During calendar year 1996, the industry spent another $19.9 million on lobbying expenses. Among the Top 10 of Congressional beneficiaries of this new high-tech largesse is Feinstein, who, given her support of the FBI's position, is sure to be feeling some pressure as the Judiciary Committee prepares to take up the issue. During discussion of the Kerrey-McCain bill in July, Feinstein left before her constituents from the software industry in the Silicon Valley testified -- and after telling representatives of the FBI and the National Security Agency that she would defer to their expertise on what was a confusing issue. At Wednesday's subcommittee hearing, Feinstein said "The bottom line is, I think nothing short of mandatory key recovery does the job." =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= Forwarded-by: chuck yerkes Forwarded-by: David HM Spector Freeh Seeks Encryption Decoding Key By Rajiv Chandrasekaran Washington Post Staff Writer Thursday, September 4, 1997; Page E01 The Washington Post FBI Director Louis Freeh told a Senate subcommittee yesterday that data-scrambling software sold in the United States should be required to have a feature that would allow law enforcement agencies to decode many scrambled messages. Under Freeh's plan, the decoding technology would have to be built into the software, but savvy computer users could legally deactivate the technology, allowing them to transmit data that would be inaccessible to authorities. Authorities, however, assume that most messages would be sent in the crackable form. Freeh's comments reflect a new, more forceful stance on the use of encryption technology within the United States. His position is contrary to statements by President Clinton and Vice President Gore earlier this year that the Clinton administration would stay with a long-standing policy of imposing no rules on sales of any such products in the United States. Exports of the products are regulated, however. A White House official said last night that "the administration has not formally endorsed" Freeh's position. His comments, however, drew strong criticism from the software industry, which called the proposal costly and unworkable. At a hearing of the Senate Judiciary subcommittee on technology, terrorism and government information, Freeh also called for regulations that would require online service providers to set their networks so that law enforcement authorities could easily intercept communications. Privacy advocates contend that the United States should have no rules restricting encryption software. The technology is the only way people will be able to assure confidentiality of personal information in the electronic age, they contend. Freeh said that legislation being considered by the Senate should "require the manufacturers of encryption products and services -- those which will be used in the United States or imported into the United States for use -- include a feature which would allow for the immediate, lawful decryption of the communications or the electronic information once that information is found by a judge to be in furtherance of a criminal activity or a national security matter." Freeh made his comments in response to a question posed by Sen. Dianne Feinstein (D-Calif.). Feinstein questioned whether Freeh's approach, which would allow the code-breaking technology to be turned off, would amount to a "a massive loophole that everyone would take advantage of." But Freeh called his proposal "a step forward" that would improve the odds of authorities accessing coded messages. Freeh told the committee he would favor requiring people who send encrypted messages to use technology that would allow the communications to be unscrambled, saying it "would be the best law enforcement solution." He conceded, however, that such a rule would be impossible to enact because of opposition from industry groups and many in Congress. Freeh's stance prompted complaints from the software industry. "The impact is going to be clear," said Lauren Hall, an official with the Software Publishers Association, a Washington-based trade group. "It's going to be very expensive, and it's going to raise the price of software. Adding these features are not as simple as flipping a switch." Becca Gould, the vice president for public policy at the Business Software Alliance, another industry group in Washington, called the director's statement "horrible." "It's basically saying the government should have a back-door key to all private citizens' records," Gould said. Gould added that adding such a feature to all software that uses encryption technology would not be feasible. "It would be awfully complex," she said. The software industry has long complained about the government's export restrictions, which require firms exporting high-powered encryption products to put aside electronic "keys" that intelligence agencies could use to descramble data. The industry says this puts U.S. firms at a disadvantage in competition with foreign companies that have no such controls. Administration officials say the ability to unscramble files is a necessary tool in the fight against terrorism and other crimes. The subcommittee is considering a bill introduced by Sens. John F. Kerry (D-Mass.) and John McCain (R-Ariz.) that would loosen export restrictions on encryption software but provide incentives to have companies make the decoding keys available to law enforcement. The administration supports the legislation but it is opposed by much of the software industry. ************************************************************************** 24)From: BADCOFFEE@aol.com Subject: Augie is a threat to national security? << Augie is currently experimenting with the phone system to learn about it. This is what hacking is about. Now ask yourself if you believe Augie is a threat to national security. >> God, please no one answer that! :-) Learning....Learning.....Learning....and more learning. My definitions of hacking are not what other might consider hacking. (computers) Hacking to me(all in one sentence): "What makes that thing tick?" Key word: "What" Hack my brain. I hack yours. It is a genuine interest and never ending pursuit of "information" Right up until our heads explode..then we have "one" drink...and come back for a "little" more. Hacking: "Getting in to" >From there..... it turns to anything in the world you would like for it to be. Be it evil, good, or absolutely no feeling...just education. All the things they just do not teach you in any formal schools. Different and the same: Until the Internet.....most of the information out there was "hand selected by the "Criteria" of the "selector's" personal interests. Libraries, book stores, News Papers etc. WHAT you learned was completely in the hands of a select few people. YOUR education was completely controlled. Call the mayor/library staff of your town and ask him/her "Why is there not any Lockpicking/surveillance/hacking/"how to pick a lock with your tongue" books? That would be because "Mayor/library staff" makes the decision as per what we read and what we do not. CENSORSHIP. Back to hacking: HACK IT! Break it, whack it, shoot it, romance it, make love to it! GET IN THERE! LEARN! Come back and drop it someplace on the Internet......cause I wanna know "What makes that sucker tick". Augie ************************************************************************** 25)From: W0LF Subject: Re: Free Texas DMV Driver's License Lookup Link? >>>> 2)From: ACE95@webtv.net (Steven Yohn) Subject: Link changed The Free Texas DMV Driver's License Lookup Link has changed from publiclink to PublicData I thought I would pass this on so you could update it in the future. I love and use your link often. Thanks for taking the time to make a usefull page like this. Steve <<<< Ummmm .... please excuse my nap or wherever I was when the post mentioned above was made but would someone please fill me in? :-) Thanx and Seeya! ************************************************************************** 26)From: edklod Subject: Re: 10 round clips and other things ... I'm not sure, but I thought that you can have the 15,16 what have you capacity of the clip in your gun, it's just that you may no longer be able purchace it on the market with out the special permit (i.e. federal or state law enforsmet gun permit or someting of a kind). If memory serves me right -- one of the standart issues for the police department in Sacramento county (CA) is a Glock 22 with a 16 round clip ( and it isn't a toy gun -- 40 caliber, 86% drop probability with a hit to torso.... also its weird how it changes the ballance once the clip is almost empty.... some may say it's too light in handle.... oh and by the way... somewhere earlier, (i think also here) someone expressed a complaint abount 'no-safty' on glocks. But there are two very well designed safety features built into it (major ones... not sure if other ones really fall under category of safty): the little nub inside the trigger prevents it from going off in case of sudden movements or, say, if you drop it or even (don't try though :) ) throw it, and to prevent from firening -- just half-cock it and it won't ( even with trigger safty depressed...), yet fast and easy to move to cocked position and (assuming it is chambered) is ready to be used. Oh, and another feature: it's design prevents anyone from forcefully (or acidentally) remove the top part of the gun (unlike some colt guns :) ) and, especially with the built in laser under the barrel -- looks very respectfull...meaning that it looks, feels and handles more like a weapon than a toy ( even in comarison to sig or colt 45 (I believe those were the guns compared to glock earlier) ---- one's to small another's to bulky and unballanced). But I am not anywhere close to knowledge, ability, nor experience to be considered with even a slitest athority on the weapons...... just an opinion of another computer-twisted induvidual with an appriciation to well designed machinery.... him@deepwell.com b.t.w. is there a good re-mailer thats honestly resend e-mail annonomosly and doesn't seet on a back bone of those "see-all hear-all" servers and rerouters? thank you..... :) oh, and anyone knows where I may aquire information or something that may shine some light on the design (schematics or something) of a transmiter-detector with as-wide-a-freequeency as possible, or the magnetic (or any :)) tape recorder detector, or video or macrowave transmiter detectors......... :) or combination of eather or all........ :) ..... and, please, don't send me to those 'spy-shop' sites, for it only upsets me since I can not afford to purchace one from them....(I am merely a cs student with out the monitory laxsury .... :) )\ thank you...... send him@deepwell.com something and he shall reply... :) ************************************************************************** 27)From: arsh@biruni.erum.com.pk (DIGI_USER) Subject: Air Taser Guns Dear Friends, Can anybody tell me how taser guns and stun guns work? How effective they are? Are there any side or after effects on the victim?Please tell me if anybody had chance of using them in selfdefence. I am willing to market them to the companies who provide armed security guards.Is it wise to do so b/c usually guards in pakistan are armed with AK47. Where can I buy them cheaply in bulk? Any help on above matters will be greatly appreciated. Regards arsh ************************************************************************** 28)From: John P Trotter Subject: Programming a stripe reader for a client I am programming a stripe reader for a client - where is a FORMAL definition of the stripe layout on credit card and drivers licences ************************************************************************** Who are you? What's your specialty and/or interest? Let us know about your company... What would you like to see on the list? Post it. Let us know... Do you have something to contribute? We'd like to hear it... We want to know EVERYTHING and ANYTHING about eavesdropping, surveillance, countersurveillance & privacy related technology, etc... Remember: who, what, where, when, how & why... we want ALL the details... Do you have a question? Post it... A little free time? Help a member... With the INCREDIBLE brain power on this list, someone should have the answer ;-) P.S. Don't be a LURKER... Members take the time to post info for us all... give something back... Don't just take... Your input/knowledge is valued... ************************************************************************** Send Postings to: spyking@con2.com with "Post" in subject field with subject ************************************************************************** Subscribe to: spyking@con2.com In the subject field type: subscribe-surveillance list e-mail address ************************************************************************** Unsubscribe to: spyking@con2.com In the subject field type: unsubscribe-surveillance list e-mail address ************************************************************************** ...The Simple Rules of the Surveillance List... The Surveillance List Owners may Reject any posts that are/contain: 1) Info Unrelated to Eavesdropping, Surveillance or Privacy technology... 2) Flames or Negative posts... 3) E-Signatures that are considered excessive... 4) Advertisements not DIRECTLY related to the list topics... 5) Attached Files... 6) Oversized Posts... (May be edited to save room) **************************************************************************** This publication is copyrighted and is protected by U.S. and International copyright law. The information transmitted on this list may not be reproduced, reposted or forwarded to any non-list member without expressed written permission of the List Owner. Violation of U.S. copyright law is a criminal and civil offense... **************************************************************************** The Surveillance List is Moderated by SpyKing@thecodex.com The List Owner will make EVERY effort to protect subscribers from spam... Copyright 1996, 1997 Codex Publishing Inc., All Rights Reserved... **************************************************************************** ****************************************************************************** The Official Newsletter of W.A.S.P. The World Association of Surveillance Professionals http://www.thecodex.com/wasp.html ****************************************************************************** Vol.Two Issue #194 The Surveillance List Sept.10,1997 Over 2800+ Members Worldwide Representing 53 different countries List Chat at: http://www.thecodex.com/chat.html Surveillance List Pseudo FAQ at: http://www.thecodex.com/faq.html ****************************************************************************** IN THIS ISSUE... ****************************************************************************** 01) The contradictory nature of your web site 02) Re: HOW DO THEY DO THAT? 03) Re: Tiny video surveillance equipment 04) Intro/Second Passports 05) Re: Anonymous Cookie, it works!! 06) Re: Air Taser Guns 07) Re: PUBLIC DATALINK.COM 08) Re: Air Taser Guns 09) Why Spy? The uses and misuses of intelligence... 10) Covert earpieces 11) Is there anyone on the list? 12) Tamperproofing of Chip Cards 13) Re: False Memories 14) Re: fingerprints and fake id stuff 15) Followup on Can Anyone ID This? ****************************************************************************** DON'T BE A LURKER.... GET INVOLVED... YOU ARE A MEMBER... MAKE THE MOST OF IT ****************************************************************************** 1)From: Schnn1@aol.com Subject: The contradictory nature of your web site Spyking - Your web site is very thorough and useful in exposing all the myriad of ways surveillance is being done on an unsuspecting public. However, why on earth then do you go ahead and accurately describe how to do all the various methods of snooping? Your whole web site is dedicated in exposing the insideousness of surveillance and then you turn around and show everyone how to do it too!!!!! That is ridiculous!!! I've noticed the same thing in other publications as yours; ones that reveal how pervasive and terrible surveillance is, and then they do the same thing as you. If surveillance is so awful, then why do you people go so far as to reveal things like the exact circuits and the precise technological methods in order to snoop? All it does is enable everyone to go out and spy on others too. You people are a trip. schnn1@aol.com +++Moderator's Note+++ Why do we describe how it's done? The answer is simple. If an informed public knows HOW "the spies among us" infringe on their privacy, hopefully they will employ countermeasures and take appropriate action to safeguard themselves... The wealth of confidential information that is available on each and every one of us is staggering... and available to anyone who knows how to access it or PAY for it... The proliferation of private investigators, information brokers and "spy shops" only underscores the problem... A simple search of the web will uncover hundreds of companies that will sell you everything from non-published telephone numbers, personal banking information or medical records to electronic bugging and wiretapping equipment... Don't let the name "SpyKing" fool you... (I did not pick the name, it was given to me by a reporter from the New York Daily News who wrote an article on a major case I solved regarding electronic espionage)... I am NOT in the spy business... I am in the COUNTER-SPY business...Like our motto sez, "We don't spy on you but we do keep an eye on those that do"... Yes, I DO know a lot about electronic and other forms of surveillance (and have been accepted in court as an expert) but I am a PRIVACY advocate and specilize in electronic countermeasures... I believe the best way to guard ones privacy is to be aware of ALL methods that "the spies among us" use... AND to make that information public... only then can an INFORMED person devise a comprehensive plan to safeguard their proprietary data and/or communications... The Codex will continue to add "indepth" information and provide pro-privacy services on a regular basis... SpyKing ************************************************************************** 2)From: FAKENAME@AOL.COM Subject: Re: HOW DO THEY DO THAT? Goddesshera asked, how do fugitives get real i.d. under fake names. I used to work at a hotel in L.A.. One day the corp. office gave all names & S.S. #'s of all employess to S.S. admin. S.S. admin. told the co. which ones were fake. Corp. office gave all of them 30 days to explain or be fired. Most of them went out & got real s.s. #'s. for $350.00 ea.. You can also get a Calif. D.L. for the same price under any name you want..and it's real! In Hispanic neighborhoods the D.M.V. & S.S. Admin. have bilingual agents who help non-english speakers get the documents. These agents "verify" who you are. You then go to M.V.D. & just have your photo & Thumb print taken. The agent does the paperwork. These agents are sympathetic to illegal aliens and for $350.00 will verify that you're whoever you want to be. You then get your new S.S. card or Driv. Lic.. ************************************************************************** 3)From: Greg_Smith@matrixresources.com Subject: Re: Tiny video surveillance equipment I have shopped around a lot for cameras, and there is a company in Austin, Texas (Supercircuits) that seems to have by far the best prices and a huge variety of products, including a number of wireless video surveillance options. Check out their online catalog at http://www.supercircuits.com or at http://www.scx.com. They probably have everything you need at good prices and have always been very pleasant to deal with. ************************************************************************** 4)From: New ID Subject: Intro/Second Passports I would like to introduce my services to the list for reference should they be desired at some time by you or your clients. I specialize in obtaining foreign (second) passports for U.S. residents. This is usually under a name other than your own. I have two years experience, obtained while working for an established organization offering similar services, and have left this group to work independently. These are fully "backed" documents issued by the appropriate authority of the subject country. Depending on the country, the cost will range from $25,000 to $150,000. You will not need to leave the states to obtain your documents. This is a legal, but precarious process, which does not always succeed. You do risk losing all or part of your investment if it doesn't work out. My previous employer was able to average better than 90 percent, and knowing the process as I do, I should have comparable results (in fact, since leaving six months ago, I have processed eighteen individuals with no problems). Needless to say, all services are confidential, and in fact I will never know you (under your present name), and you will never know me. Please contact me directly at . If you do not get a response within 72 hours, please re-send your message. I encourage PGP encrypted inquiries, and require PGP for the exchange of information. I will send my key upon request. Thank you. ************************************************************************** 5)From: nickh@webexpert.net (Nicholas Hreno) Subject: Re: Anonymous Cookie, it works!! im sure many of you have realplayer plus (real audio) goto there page and it will say this: Missing Player Plus Identification You have attempted to reach the PlusZone web pages for RealAudio Player Plus and RealPlayer Plus customers. Your browser did not identify you as a Player Plus customer. :) :) :) :) :) :) :) :) :) :) :) :) the only thing i didnt like was the first time i ran it...my hard drive was busy for a while like 2 minutes ...this is after the fact i installed it hope this thing isnt sending out all my info to him :( ************************************************************************** 6)From: JOHNSGUN@aol.com Subject: Re: Air Taser Guns "AIR TASER " works great if the subject isn't too emotionally pumped up . I personally witnessed two diferent "volunteers" take one hit each from one of my demo units ( just a regular unit we show in the shop ) and neither one dropped like you see in the infomercials . In both cases only one of the two leads hit the test subject which drops the juice WAY low . Both men were instructors experienced in taking serious hits from many types of stunguns and pepper/mace and still be able to rush you with a plastic ballbat AND strike you with it before being incapacitated or unable to press the attack ; these guys are pros. Have a video of a police officer taking a guy down trying to lop his head off with an ax and one we made of the test .Sold several but no reports from the field yet . They 'shoot ' two fine wire barbed probes - each 15 feet long - from a disposable cartridge ( $55 each !) and deliver high voltage for 30 seconds . The cartridge uses nitrogen to propel the wires and barbs and you get ONE shot . No known side effects or reported serious injuries yet after 25 or so years on the market . As of yet there is no federal law regulating them except the one against export . The cost is high - $250 retail - if you need one e-mail me and you can have at cost +15% . Stun guns cause mild to severe pain only as long as the device is in contact with the body - if the guy is hyped up . A couple of my customers have used them on predators who didn't see it coming and got put on their cans . The mental shock of an unexpected hit of sparktricity does wonders on a person . Also have had a few people scare off would be attackers by just turning the stun gun on for a few seconds - most folks are scared of anything that crackles with electrical sparks . ************************************************************************** 7)From: zeek@stic.net Subject: Re: PUBLIC DATALINK.COM This is a little more info on the public datalink. The service is no longer free there is a price sheet avaliable from the site that you can choose to pay. The website started chargeing sept 1, 1997. So watch yourself when you use this link the more you use the more you pay. ************************************************************************** 8)From: "mage2" Subject: Re: Air Taser Guns >Dear Friends, >Can anybody tell me how taser guns and stun guns work? they attack the nervous system and also cause the muscles to start spasming. it makes them go unconsus and them to use up all the readly avabile energy. >How effective are they? they will drop a person pretty quick from what the stuff i have read it is 1-2 seconds real life closer to 5 seconds untill they are totaly gone. but from what i know they cant do much in the 5 seconds sence all there muscles are in spasms. and they are usely out for 10-15 min. >Are there any side or after effects on >the victim? when they wake up they have a headache and are sore (like they did a real hard workout) and some dosorentaion. >Any help on above matters will be greatly appreciated. any time >Regards >arsh mage2 =X 281.Texas.USA ICQ # 1627040 "Just Because Your Paranoid Doesn't Mean They're Not After You" K.S. ************************************************************************** 9)From: SpyKing@thecodex.com Subject: Why Spy? The uses and misuses of intelligence... Checkout: http://www.cato.org/pubs/pas/pa-265.html ************************************************************************** 10)SpyKing@thecodex.com Subject: Covert earpieces Someone was looking for them a while ago... Checkout: http://www.countycomm.com/covert.htm ************************************************************************** 11)From: Manatau Subject: Is there anyone on the list? I need long distance phone records for a number in grand Junction CO. Is there anyone on the list who can obtain those records? Money is good -- speed is necessary. Thanks Ken Paul (K.C.) Surveillance/Surveillance Detection Service P.O. box 33653 Las Vegas, NV 89133-3653 1-800-368-5655 (code# 23) 702-656-7804 http://www.sierranv.net/sds ************************************************************************** 12)From: Travis Hassloch Subject: Tamperproofing of Chip Cards I found this in our database. I've never seen it before. I found it pretty interesting, despite being somewhat old. Truncation in original. * * * * * TAMPERPROOFING OF CHIP CARDS Ross J. Anderson Cambridge University Computer Laboratory Pembroke Street, Cambridge CB2 3QG Email: ross.anderson@cl.cam.ac.uk Abstract There are two ways of attacking smartcards - destructive reverse engineering of the silicon circuit (including the contents of ROM), and discovering the memory contents by other means; a well equipped laboratory can do both. Persistent amateurs have often managed the latter, and may shortly be able to do the former as well. 1 Reverse engineering the chip A recent article[1] gives a good introduction to how reverse engineering can be carried out in a moderately well equipped academic microelectronics laboratory (there are three such in the UK, and perhaps two hundred academic or industrial facilities worldwide which can carry out such work). We will start off by summarising it and giving some background. 1.1 How attacks are done The authors of the article cited above worked at the Cambridge University microelectronics lab, which is part of the department of physics. They got interested in reverse engineering chips five years ago to help an industrial client locate manufacturing defects. They built an apparatus which consists of a slightly modified electron beam lithography machine (this functions in effect as an electron microscope) and a PC with an image processing system (a DCT chip and locally written software). They then developed techniques for etching away a layer at a time without doing too much damage. Conventional wet etching causes too much havoc with half micron chips, so dry etching is used in which gases such as CF4 or HF strip off layers of silica and aluminium in turn. One of their innovations is a technique to show up N and P doped layers in electron micrographs. This uses the Schottky effect: a thin film of a metal such as gold or palladium is deposited on the chip creating a diode effect which can be seen with the electron beam. Finally, image processing software has been developed to spot the common chip features and reduce the initially fuzzy image of the metal tracks into a clean polygon representation. There are also routines to get images of successive layers, and of adjacent parts of the chip, in register. The system has been tested by reverse engineering the Intel 80386 and a number of other devices. The 80386 took two weeks; it takes about six instances of a given chip to get it right. The output can take the form of a mask diagram, a circuit diagram or even a list of the library cells from which the chip was constructed. This is typical of the kind of attack which an academic lab can mount. Even more sophisticated attacks, invented at Sandia National laboratories and recently published[2], involve looking through the chip. Light-Induced Voltage Alteration is a non- destructive technique that involves probing operating ICs from the back side with an infrared laser to which the silicon substrate is transparent. The photocurrents thus created allow probing of the device's operation and identification of logic states of individual transistors. Low-Energy Charge Induced Voltage Alteration relies on a surface interaction phenomenon that produces a negative charge-polarization wave using a low- energy electron beam generated by a scanning electron microscope. This allows imaging the chip to identify open conductors and voltage levels without damage, although it does not operate through metalization layers. Of course, even more sophisticated techniques may be available in classified government facilities. 1.2 The threat to smartcard systems Smartcards typically have a few kilobytes of ROM, which being metal can be read with the above techniques; a few hundred bytes of RAM, which being cleared between transactions stores no long term secrets; and a few kilobytes of EEPROM, which typically holds the user data and key material. The techniques described above are not directly relevant to reading out EEPROM. However any laboratory at the level under consideration would be able to determine EEPROM contents using microprobe techniques. More simply, a reverse engineering operation would pinpoint the physical location of the write protect bit, which could then be reset using ultraviolet light. As mentioned, the number of organisations worldwide which can do electron beam lithography is of the order of 100-200. These potential attackers include a number of universities, all the big chip makers and the governments of the USA, Canada, the UK and China. Of these, the US and Chinese governments appear to have the greatest experience at chip breaking. For a respectable firm to join this club costs about $2m - $1.5m for the electron beam lithographer and ancilliary equipment, plus a year's salary for about five professionals to get it all going (typically a physicist to deal with the ion beams, a chemist to deal with packaging, two computer people to write software, and a chip person to run the whole operation). The number of club members may rise as more and more firms, especially in the Far East, start producing ASICs. However it is not likely that electron beam lithography will ever become a really widespread technology. The total number of sites with the capability to do regular hi-tech attacks might rise to about 1000 at most. An outsider without $2m still has a number of options. For ex- ample, there are three universities in the UK alone which possess the necessary equipment (Cambridge, Edinburgh and Southampton) and an attacker might enrol for a PhD or other degree in order to acquire access and training. It is also possible to use more primitive equipment at the cost of spending months rather than weeks on each reconstruction; this is apparently the approach of the Chinese government, and could be viable where workers are paid little (or are expecting a share of large criminal profits). Finally, there are apparently places in the Far East, and at least one in Silicon Valley, which reverse engineer chips for cash. How much cash, and how many questions would be asked, are not known to this writer. 1.3 Possible defences A number of copy trap features are incorporated into commercial chip designs. For example, we have heard of design elements that look like a transistor, but are in reality only a connection between gate and source; and 3-input NORs which function only as 2-input NORs. Many of these copier traps are based on holes in isolating layers or on tricks done in the diffusion layer with ion implantation (based on the assumption that it is hard to distinguish N from P). However the layer etching and Schottky techniques developed by Haroun Ahmed's team can detect such traps. Another possibility is to introduce complexity into the chip layout and to use nonstandard cell libraries. However the chip still has to work, which limits the complexity; and nonstandard cells can be reconstructed at the gate level and incorporated in the recognition software. Finally, in the Clipper chip there are a number of silicon features, of which the most important is a fusible link system. These links are only fused after fabrication and hold the long term key and other secret aspects of the chip. Details can of course be found in a paper in the relevant data book[3], and from the scanning electron micrographs there, it is clear that the secret information can be recovered by sectioning the chip. This technique has been used by Professor Ahmed's team on occasion on obscure features in other chips. Thus the effect of current silicon level copy traps is just to slow down the attacker. In fact, we have heard from a usually reliable source that Intel has reverse engineered the Clipper chip, but that the results have been classified. The same appears to be the case for chemical measures. Chips intended for classified military use are often protected by passivation layers of a tenacity never encountered in civilian packaging[4]. But here again, informed sources agree that with enough effort, techniques can be developed to remove them. 1.4 Relevance to smartcard products We understand that neither silicon copy traps not advanced passivation techniques are used by smartcard manufacturers in the bulk of their products. The marketing director of a smartcard manufacturer said that they simply had no demand from their users for anything really sophisticated[5]. The most that appears to be done is an optical sensor under an opaque coating[6]. Hi-tech techniques may indeed have been used by commercial pirates to duplicate satellite TV smartcards[7]. Recent postings to a TV hackers' mailing list recount how an undergraduate used nitric acid and acetone to remove ICs intact from Sky-TV smartcards; he then put them in the University's electron beam tester (an ICT 8020, also sold as the Advantest E 1340 - a 1991 machine). The chips were run in a test loop, but he had been unable to remove the silicon nitride passivation layer; the many secondary electrons removed from this caused it to get charged positive very quickly, which obscured the underlying circuit. He did not have access to a dry etching facility to remove this layer, and could get no further. However it is significant that a person with no funding or specialist knowledge could get even this far. However, amateur hackers have managed to break smartcard security without having to penetrate the device physically. Instead, they have used flaws in the design of the card's hardware or software to determine its contents. 2 Determining the EEPROM contents Many methods have been employed to determine the EEPROM contents of smartcards. In addition to the very general reverse engineering techniques described above, there are a lot of shortcut attacks on particular designs. 2.1 How attacks are done The following list is not exhaustive: o raising the supply voltage above its design limit; o cutting the supply voltage below its design limit; o resetting random memory locations using ultraviolet light until the read protect bit is found; o exploiting misfeatures in the hardware, including the manufacturer supplied ROM code; o exploiting misfeatures in the customer written EEPROM code (current attacks on UK satellite TV systems take this route); o some combination of the above. The appendix contains accounts from a hacker mailing list of two actual attacks carried out on chips. 2.2 Threat assessment All systems have bugs, and so the level of threat to smartcard systems presented by exploitable loopholes is a function of how many bugs remain (i.e. how mature the design is) and how much effort is spent in looking for them (i.e. how many motivated attackers there are). This in turn depends on the application area. Satellite TV systems attracted a great many attackers for historical reasons; in the USA, many rural households had got into the habit of watching satellite TV feeds as there were no terrestrial stations in range, even although these feeds were intended for rebroadcast rather than direct consumption. When the feeds were encrypted, the families who depended on them for their news and entertainment - and often could not buy decoders through any legal channel - were outraged. In Europe, a similar problem arose when the final season of 'Star Trek: The Next Generation' was encrypted. This program's fans included many with appropriate skills, and soon (March 94) there appeared a program called Season which decoded Sky TV. Since then, there has been a battle of wits between Sky and the Trekkies, which has probably cost Sky somewhere between $10 million and $100 million. On May 18th 1994, Sky changed from issue 07 cards to their new issue 09 card. Hackers refer to May 18th as Dark Wednesday. The 09 card proved harder to hack but a temporary solution appeared in June. It only lasted a few weeks before Sky changed codes again. Though some attempts at an issue 09 Season were made, a code change by Sky stopped it until just before Christmas. Then no less than three new versions of Season appeared - two for the PC and one for the MAC. Successive code changes on January 4th and January 25th led to further updates of Season, and by about 8th March all the secrets in the Sky 09 card were known - and published! Hackers are awaiting the release of series 10 Sky cards with relish. In addition to the attacks on satellite TV, there have been a number of attacks on banking systems and prepayment electricity meter systems which are documented in three of my recent papers [8, 9, 10] Most of the attacks documented there resulted from similarly opportunistic exploitation of design and operational errors, and some of the target systems were based on smartcards. Finally, some concern has been expressed that attack skills may be transferable. For example, a banking industry security expert is worried that the satellite TV hacking community might next turn its attention to eftpos systems. 2.3 Possible defences The main conclusion to be drawn from the above is probably that just as we do not know how to make a device which resists tampering by a funded organisation, we do not know how to build a device of any complexity to resist logical as opposed to physical tampering. There are a number of other lessons. For example, companies which rely on smartcard systems should if possible avoid making a lot of enemies. Diversity of attack has been significant in pay-TV, metering and banking systems and just as a funded organisation can break the silicon directly, so one must expect that many tinkering amateurs will eventually find a flaw in any piece of software. It is well known in the software testing community that a significant number of bugs come to light when a piece of software is passed on to another tester or to a customer; this is because different testers and/or users exercise different parts of the input space[11]. It is also imprudent to start off with weak security and then improve it gradually in response to attacks. The satellite TV people did this, and trained up a community of hackers. At some point, you must invest enough to put clear water between your systems and your opponents, and the sooner you make this investment the smaller it is likely to be. The main investment should be in getting the overall design right, or at least as right as one can, from the beginning. It is unwise to spend a lot of money on tamperproofing while ignoring the much simpler and dirtier attacks which exploit errors in design and operation. Quality control, and examination by multiple independent experts, should take priority over attempts to mimic the passivation techniques used by the military. After all, the three published attacks on Clipper all involve the logical design (key management protocols and modes of operation) rather than penetration of the device itself. 3 Conclusion At present, there are no portable tamperproof devices. If secrets are held on smartcards which are allowed outside protected spaces, then both physical and logical attacks should be expected. The scale of such attacks will depend on many things. If there is a capable motivated opponent, such as a chip maker or the government of a NATO country or China, then it must be assumed that a complete penetration will take at most weeks. If there are many less capable but still motivated opponents, then penetrations based on the opportunistic exploitation of design flaws are to be expected in due course. We conclude that systems based on portable tamper-resistant devices should be designed with caution. They should avoid motivating a determined attack on the cards, and the penetration of a small number of cards should not be fatal to the system owner. These considerations interact; for example, if the scope of secrets kept within the card is limited so that breaking a card allows access to only one bank account, then it is unlikely that an attack would be economic to an attacker or prove more than a minor nuisance to the card issuer. APPENDIX First account This short essay will show you how to read the EPROM of an AMD87C51, with all security programmed. ... the SM-card I had was programmed with both Lock bits and it was impossible to read out the IROM. But the data sheet also tells: To ensure proper functionality of the chip, the internally latched value of the EA pin must agree with its external state. Perhaps it was possible to confuse the processor. I build a small device with external EPROM (64KBytes) and RAM. The EPROM was coded with a monitor program in the upper address range which gives me the possibility to load and execute code by control of a PC. Starting the processor with external ROM access disables the access of the internal ROM and due to the latching of the EA pin during RESET, changes at the EA pin had no effect. Also the MOVC returns only external ROM values. Know my idea was to start the processor with internal ROM and then to confuse him so that he accesses the external EPROM and run into the monitor program. I tried ... But reduction of the power supply voltage works. At about 1,5 Volt the processor starts to access the external ROM. Rising the voltage back to 5 Volt the processor (most of the times) still run external, but with the possibility of access to the internal ROM... I programmed a small routine, which calls an address within the internal ROM and execute this. I started at the higher end of the internal ROM and decreased the calling address with each try by 10h. Most of the time the processor hangs up. But at some addresses I got a return to the monitor program. So I analysed this addresses and prepared the registers in a way to verify that the routine could read ROM data. And I found the routine which did this. So the internal ROM code reads itself and returns himself to the monitor program for storage. It took about 3 days to go through the ROM and find the routine and one long week to understand the code. Second account This short story shows how to get access to a secured 87C51 microcontroller. It's a different way, than the one described by .... Referring to his article, I assume, that this 87C51 microcontrollers and their features (including security bits) are known. The idea was, that the security bits are not located near the EPROM array on the silicon. After some tests in erasing standard EPROMS, I had the right tools to try it on a real device: With a mask designed from black, thick paper with a small hole in it, I started to lighten the silicon on the outer edges and sides. Moving the mask carefully and checking the security bits (by reading the device in a microcontroller programmer) after each try is a long job. I did additional tests to open the chip (by removing the windows or dividing the ceramic carrier material). But this always led to permanent damage to the chip (broken silicon, destroyed wires between pads and pins), so I gave this up. So after 4 destroyed chips the fifth was the right one. You have to be sure, that your mask is good prepared and the erasing light doesn't diffuse across the chip. No I'am able to erase such a device in less than 10 minutes. But ... it's only easy if the device is one of AMD or Philips. The Intel devices have a window, which is formed like a lens (the silicon looks very big). On this devices it's nearly impossible to lighten a specific part of the silicon. The job is easier on devices with standard window and a _big_ EPROM Array (seems to be devices aged two or more years). . . . if somebody is interested in the 4K codes of the MasterCard (bad and dirty code) or MovieCard (very elegant algorithm and i/o implementation), just gimme' a direct mail. Disassembled and commented listings in WinWord format are also available (comments in mixed English and German language). REFERENCES [1] 'Layout Reconstruction of Complex Silicon Chips', S Blythe, B Fraboni, S Lall, H Ahmed, U de Riu, IEEE J. of Solid-State Circuits v 28 no 2 (Feb 93) pp 138-145 [2] 'Two New Imaging Techniques Promise To Improve IC Defect Identification', C Ajluni, Electronic Design Vol 43 No 14 (10 July 1995) pp 37-38 [3] 'Conducting Filament of the Programmed Metal Electrode Amorphous Silicon Antifuse', KE Gordon, RJ Wong, International Electron Devices Meeting, Dec 93; reprinted as pp 6-3 to 6-10, QuickLogic Data Book, 1994 [4] see FIPS PUB 140-1 section 4 level 4: "Removal of the coating shall have a high probability of resulting in serious damage to the module" [5] Philippe Maes, GemPlus, during a panel discussion at Cardis 94 [6] message <CovCG9.581@apollo.hp.com> posted by Anne Anderson of Hewlett-Packard aha@apollo.HP.COM to sci.crypt 26 Apr 1994 [7] apparently tiny jets of hot acid have been used to remove the passivation layers over parts of the chip at a time [8] 'Why Cryptosystems Fail' [9] 'Liability and Computer Security - Nine Principles' [10] 'Cryptographic Credit Control in Pre-payment Metering Systems' All these can be got from http://www.cl.cam.ac.uk:/users/rja14/ [11] 'Thermodynamic description of the defects in large information processing systems', RM Brady, RC Ball, RJ Anderson, to appear -- Travis Hassloch / travish@dejanews.com / http://www.dejanews.com Deja News System Administration Group / "When news breaks... we fix it." PGP key C7FDD3D5 fgpt 7A 48 DD 46 E6 7F 11 E7 8F 7E 53 9A DF 33 9E FA ************************************************************************** 13)From: "J.D. Abolins" Subject: Re: False Memories >For those of you that follow the psyco-whatever field, there's an >interesting article in Scientific American (Sep 1997) about false >memories and how to implant them in people. The details of several >experiments were given. They showed about a 25% rate of success, when >"guided" under hypnosis or similar therapy. This is REALLY interesting: >They could cause many of the subjects to admit to doing something they >didn't do when the subjects were confronted by others that claimed they >did it. Good reading. > >Captain Curious I saw that article also. (Alas, it is not one of the Sept 1997 articles on the SA Web site at http://www.sciam.com) It is very interesting from several angles. First, it serves as a reminder of the faliability of witness memories. People can come to believe events or details that never happened. Second, it shows a route for "social engineering" beyond the cliche "I'm from tech support, what's your password?" Third, somethings in the article may point to things not to do when seeking true info from people lest the interviewer encourages false memories. The researchers start off with mention of several cases where patients sued their therapists after they learned that the "memories" of childhood abuse were false memories encouraged by the theraphists. In one case, a clergyman's daughter came to "remember" in therapy that her father had raped her many times and that he had forced to perform several abortions upon herself. One of the clinchers for showing the memories'falsity (as well as the therapist's lack of verification by medical referal) was the later check by a physician that noted that the young woman was a virgin. Oops! That is a good anecdotal reminder of using other means to verify claims. The researchers go on to describe how they set up tests that would allow for creation of false memories that would not social problematic or personally traumatic as childhood abuse memories. The tests used minor incidents that were verified by subjects' relatives as never happening. One such incidents was the subject spilling a drink upon the bride and groom at a wedding. Another was the encouragement of "rememberances" of nusery room details like a hanging mobile although it is held that people don't remember things that far back. Hypnosis was not required. One approach was to introduce the possibility of a the false event. The subject might deny it. But a few more sessions doing it and a number of subjects started to agree. (Echos of the "big lie" theory.) Another approach which was effective was to encourage free, roaming searches of the mind for memories. The approach was sort of, "Think deeply and pull up whatever, not caring if it really happened or not." J.D. Abolins ************************************************************************** 14)From: Guido Sarducci Subject: Re: fingerprints and fake id stuff What is the SOP for a suspect that has mangled fingerprints? For example, prints that that were burned severely, physically destroyed somehow, or whatever? They will fingerprint the mangled fingers, which will have unique marks and features all their own. I have (as a former police officer)_ fingerprinted stumps before, and heard of someone getting convicted as a result of "mangled" or otherwise altered finger surfaces being matched up to a particular person. What if it was obviously intentional? Not illegal, but might get you institutionalized as a danger to yourself, if you go sticking your fingers in a torch or something. On what part of the fingerprint is the index formed? Is it where the lines intersect? Would it be suffecient to destroy/distort only these points? Permanently, with commonly available chemicals or techniques? The fingerprint "index" typically comes from features at the center of the print, via a process which is too complicated for me to explain here. You should be aware that your entire palm and fingers have unique prints, as do your feet, toes, and (no kidding) your elbows. In the least, nearly every law enforcement agency will take palm prints from an arrestee, so just altering the finger pads (still the best place to look for identifying features) wouldn't accomplish a whole lot. I am glad that this is a "rhetorical" series of questions you have asked, because a person trying to do this for real would have to practically cripple himself to be certain of eliminating all the possible means of identification via printing. Other interesting fingerprint trivia: You can (and probably will) leave fingerprints through surgical latex gloves. They are NO protection against leaving prints. Prints on paper, cardboard, wallboard, and other porous materials can be detected as much as ten years (!) after deposition by use of a special aerosol spray, which brings out the print in bright red. So, the next time you decide to print up a batch of funny money to buy a boat or something, you'd best put on those heavy welding gloves before you handle any of it. I've noticed in the news on several occasions that the police will locate a fugitive that has somehow acquired a REAL driver's license and social-security card under a new name. These aren't wealthy people (one was working as a 7-11 clerk), so without "resources", how do they do this? What do they need - a fake birth cirtificate? Assuming this to be the case, more questions: Many of the "fake id" or "new id" books printed up by Paladin or Delta press give surprisingly good advice on how NOT to get caught in your new life. Essentially, those persons who were caught went to an area they were expected to land in, kept doing a lot of the same things as in their previous lives (hobbies, employment etc.), or worst of all blabbed to someone who then ratted them out. As to how fake ID's are acquired, that varies from state to state, but can include the fake or "dead infant" birth certificate, a corrupt employee at the local DMV, or in extreme cases persons who have access to sophisticated digitizing and printing equipment which allows them to manufacture an ID from scratch. Isn't there a way to verify birth records, or do the agencies bother to do this? Probably not at the time of acquisition of the license, unless they are suspicious. Could be different from state to state. Those records could be online in your state and thus instantly accessible. Is there a plausable situation where birth records would not be expected to be verifiable? Old age (poor birth records kept in the past), birth in a foreign country, birth in one of the more backwards parts of the country which are out of the mainstream of civilization (Appalachians, Louisiana or Florida swamplands, etc), amnesia. Does everyone have a birth certificate? What if you don't? I have never even seen my birth certificate. My state will take a baptismal certificate in lieu of a birth certificate and this is what I have used all my life. So you're 40 years old, and walk in to the SS office, and ask for a card. What the heck do you tell them you've done all these years without one? Living abroad, or you're from one of the aforementioned backward areas. I encountered persons who lived in poor areas of the inner city who had never had a drivers license, a SS card, and possible no BC as well, as they could just as likely have been born on a bench in the park as in a hospital. Some of these no-id persons were as old as 50 or 60. I've even met one or two who had no concrete idea what their actual age was, as they had no records in their possession. What is apparently an upcoming trend is taking over and using the SS# of a recently deceased or even a still living person. This is a variation on the "true name" type of fraud. I can think of all kinds of good reasons to have an alternate ID, and would like to know more about how it can be pulled off (for strictly educational purposes). Law enforcement as a whole has gotten much wiser to the whole fake ID thing, particularly where fraud or theft is involved (certain Nigerians have made an art of it). As such, I would think that fooling with this stuff except under the gravest of circumstances (running from the Mafia, etc.) would be pretty stupid. Just the mere possession of the false ID (assuming it is an official document, and not one of those mail-order pieces of crap) is a felony in some places. Captain Curious Pat ************************************************************************** 15)From: Jenn Saint-John Subject: Followup on Can Anyone ID This? Augie wrote: > Not a clue and I have the same tones after I receive a message. It lasts > about 30 minutes. When I pick up the phone.....it hear a "quick" screetch, > dule tone....Then normal tone. This doesn't sound like the same thing, Augie. There was no screetch at all, just the double tones with the constant interval inbetween. I seriously doubt that it's the voice messaging system per se, since I've had the same system for nearly ten years now, and I've never experienced this, though I suppose it could be. There was also no message attached to it, before or after. If I do ever find out what it is, I'll pass it along. witzend@peganet.com wrote: > There are 2 or 3 possibilities to consider: > 1. A local hacker (usually)with his pals may be sliding through >your voice mailbox and using it for a stopover on their way to other >curiosities. This is really common in some venues. Particularly with >dated information floating around. I hadn't thought of that one -- thanks for pointing it out. They're welcome to anything they find, as long as they don't call my agent and turn down deals for me. :) 2. A software glitch in your equipment is sorting itself out. Get a conflict catcher of some type to sort the problem out. If it is, it's the telco's equipment, not mine; this isn't hooked up to my computer. And, as I said above, I've had the same system for ten years, and this is the first time I've encountered this. > 3. A virus is having it's way with your equipment. See above. But I use F-prot. :) > 5. Also likely are the folks trying to contact have the wrong parity or contact information. BeepBeep! Possible, I suppose, but this was =not= fax or modem tones. I know those pretty well. :) > Jenn the likely hood of Uncle Bugger cracking into your equipment is not > what you may think. Most of what is hit are key words. I'm not worried about the government; I have an intelligence background, and the government is welcome to look at any of my stuff they want to see, at any time. (Though, naturally, of course, I'd prefer that they didn't, but they can if they want to.) The tiger in question has an extensive intelligence and military background, is connected to a well-known military advisory company, may not particularly want to be found right at this moment, and has my utmost respect. It's just in looking for him, I may have rattled some other cages... It's happened once more, yesterday evening about this time (3 am-ish), and this time I was on the phone when it happened (the voicemail takes messages when the line's in use). Very odd. Telco says they have no clue, either. Oh well. Jenn There are very few personal problems that cannot be solved by a suitable application of high explosives. ************************************************************************** Who are you? What's your specialty and/or interest? Let us know about your company... What would you like to see on the list? Post it. Let us know... Do you have something to contribute? We'd like to hear it... We want to know EVERYTHING and ANYTHING about eavesdropping, surveillance, countersurveillance & privacy related technology, etc... Remember: who, what, where, when, how & why... we want ALL the details... Do you have a question? Post it... A little free time? Help a member... With the INCREDIBLE brain power on this list, someone should have the answer ;-) P.S. Don't be a LURKER... Members take the time to post info for us all... give something back... Don't just take... Your input/knowledge is valued... ************************************************************************** Send Postings to: spyking@con2.com with "Post" in subject field with subject ************************************************************************** Subscribe to: spyking@con2.com In the subject field type: subscribe-surveillance list e-mail address ************************************************************************** Unsubscribe to: spyking@con2.com In the subject field type: unsubscribe-surveillance list e-mail address ************************************************************************** ...The Simple Rules of the Surveillance List... The Surveillance List Owners may Reject any posts that are/contain: 1) Info Unrelated to Eavesdropping, Surveillance or Privacy technology... 2) Flames or Negative posts... 3) E-Signatures that are considered excessive... 4) Advertisements not DIRECTLY related to the list topics... 5) Attached Files... 6) Oversized Posts... (May be edited to save room) **************************************************************************** This publication is copyrighted and is protected by U.S. and International copyright law. The information transmitted on this list may not be reproduced, reposted or forwarded to any non-list member without expressed written permission of the List Owner. Violation of U.S. copyright law is a criminal and civil offense... **************************************************************************** The Surveillance List is Moderated by SpyKing@thecodex.com The List Owner will make EVERY effort to protect subscribers from spam... Copyright 1996, 1997 Codex Publishing Inc., All Rights Reserved... **************************************************************************** ****************************************************************************** The Official Newsletter of W.A.S.P. The World Association of Surveillance Professionals http://www.thecodex.com/wasp.html ****************************************************************************** Vol.Two Issue #195 The Surveillance List Sept.11,1997 Over 2800+ Members Worldwide Representing 53 different countries List Chat at: http://www.thecodex.com/chat.html ****************************************************************************** While we STILL feel there is NO SUCH THING as a stupid question... We suggest the newer list members AND the technically challenged browse through the FAQ before posting a question... Surveillance List Pseudo FAQ at: http://www.thecodex.com/faq.html P.S. If you have something to add to the FAQ, let us know... ****************************************************************************** IN THIS ISSUE... ****************************************************************************** 01) Re: Tiny Video Surveillance Equipment 02) Lets talk Key stroke loggers 03) Re: Addresses that don't work 04) New FBI Crypto Bill To Force Key Recovery 05) Re: Spy Shop Raids (Al Brubaker) 06) Master Locks 07) Logging on to IRC anonymously 08) PublicData.com 09) Re: The contradictory nature of your web site 10) Re: The contradictory nature of your web site 11) Data providers 12) Re: small video surveillance cameras 13) Obtaining PI license 14) Re: Intro/Second Passports 15) Re: The contradictory nature of your web site 16) Re: AMERICA ONLINE 17) Opinions needed 18) White House pages intercepted? ****************************************************************************** DON'T BE A LURKER.... GET INVOLVED... YOU ARE A MEMBER... MAKE THE MOST OF IT ****************************************************************************** 1)From: Kirk Mergeler Subject: Re: Tiny Video Surveillance Equipment I know of a company that manufactures hidden video surveillance products their claim is to beat any price. They are also pleasant to deal with. Efficient Technologies 714-288-0026. They have some unbelievable products listed on their website.... http://www.hiddenvideo.com/index.htm ************************************************************************** 2)From: BADCOFFEE@aol.com Subject: Lets talk Key stroke loggers This is a post that I made a while back that a friend sent to me.....One of my favorites.... One upon a time....a man came to me (friend) and said "Cover your face....cover your face...cover your face......." I covered my face....and he hit me in the stomach. :-) old trick and I fell for it...(2 times in one night actully). Lets talk Key stroke loggers. If the situation in hand makes it possible to take this aproach to get the information you are looking for......consider it. It is called "Stratagy" Install a "dummy" file in target's computer (9 of 10...it's YOUR own computer right?) Call it something that will raise an eye. Not too "foward" with the name. It has to be FOUND...but not glowing in the dark obviuos. Just a suspicious looking file. I'de enter something like this in the file.. ....*&^%R*&^%^%^$^%$^%$#@(_I_)$#%@#$@$%*(_)(_+(_)(*)(&^$$^#$%^#@$%@ Make it look like something is "there"....but encripted. Your target is thinking...."Am I being logged??" It'll always be in HIS mind when he is typing those love letters. I'll put $10 on your target.....no longer says anything damaging via computer. HE hits the phone at least ONE time. The computer is not bugged......the phone is. Another note: Caller ID users. Ever think about running a second unit somplace on the line and comparing phone numbers of the 2 units? hmmmmmm :-) PS- What you get...and what you GOT are 3 seperate things. Augie The most sophistacted of plans.... are the ones that work every time. ************************************************************************** 3)From: gaugusti@hqgbcs.attmail.com (Grant Augustine x4058) Subject: Re: Addresses that don't work This series reminds me of the old Chinese saying: No good deed goes unpunished. > "..., why would a server be instructed not to let me have something?" The answers are many & varied. I'll try to cover most, below: A) The remote server may have restrictions on who/when/what you request. For example: 1. Many educational sites restrict access to student pages from non- educational sites; 2. Many sites restrict access at certain times, usually peak times in that part of the world; or 3. Some hacker sites don't like people with three letter from-addresses (such as mine) to access their "eLeet" files. B) The restriction may come from your HOME server, especially if you're using your employer's resources. HOME servers often restrict access to certain "types" of sites: * pornographic, * sports, * gambling, * chat, or * any non-business related sites. Also firewalls often do more than protect you from outside attacks; they may well restrict outgoing traffic as well. Check your Web Administrator, but remember to be REAL nice, just in case you get the BOFH. C) The restriction may come from an intermediate site, especially the one just prior to the site you're trying to access. This is a variation of restriction A). Most servers do not connect directly from their server to the final (destination) server. Most servers have a pre-defined path to that final-destination server. Different servers often have different paths to the final-destination server. If the "site" just previous to the final- destination site is an unliked (see A) site, you won't get in. If you know you aren't being blocked from HOME, try using the Anonymizer (you search for it) to juggle your FROM address. Or if your HOME site uses Proxy servers, try using a different Proxy server. D) You're trying to access a .mil site. Keep trying -- someone will educate you soon. Hope that helps. I've certainly learned to never try to help an AOL'er ;-) Grant ************************************************************************** 4)From: Jonah Seiger Subject: New FBI Crypto Bill To Force Key Recovery ------------------------------------------------------------------------------ _____ _____ _______ / ____| __ \__ __| ____ ___ ____ __ | | | | | | | | / __ \____ / (_)______ __ / __ \____ _____/ /_ | | | | | | | | / /_/ / __ \/ / / ___/ / / / / /_/ / __ \/ ___/ __/ | |____| |__| | | | / ____/ /_/ / / / /__/ /_/ / / ____/ /_/ (__ ) /_ \_____|_____/ |_| /_/ \____/_/_/\___/\__, / /_/ \____/____/\__/ The Center for Democracy and Technology /____/ Volume 3, Number 13 ---------------------------------------------------------------------------- A briefing on public policy issues affecting civil liberties online ---------------------------------------------------------------------------- CDT POLICY POST Volume 3, Number 13 September 8, 1997 CONTENTS: (1) New FBI Draft Crypto Bill Would Force Mandatory Key Recovery (2) Text of FBI Proposal (3) What You Can Do (4) How to Subscribe/Unsubscribe (5) About CDT, contacting us ** This document may be redistributed freely with this banner intact ** Excerpts may be re-posted with permission of ** This document looks best when viewed in COURIER font ** _____________________________________________________________________________ (1) NEW FBI DRAFT ENCRYPTION LEGISLATION WOULD IMPOSE MANDATORY KEY RECOVERY In its most audacious crypto proposal yet, the FBI is circulating on Capitol Hill legislation to impose full domestic controls on the manufacture and use of encryption. The FBI is seeking support for its proposal among two crucial House Committees preparing to consider encryption legislation this week. The text of the key section of the FBI draft is attached below. The FBI draft would take two extraordinary steps. It would prohibit the manufacture, sale, import or distribution within the United States of any encryption product unless it contains a feature that would create a spare key or some other trap door allowing "immediate" decryption of any user's messages or files without the user's knowledge. In addition, it would require all network service providers that offer encryption products or services to their customers to ensure that all messages using such encryption can be immediately decrypted without the knowledge of the customer. This would apply to telephone companies and to online service providers such as America Online and Prodigy. In the FBI draft, the "key recovery capability" could be activated by the purchaser or end user. But requiring that such a capability be installed in all domestic communications networks and encryption products would be the critical step in enabling a national surveillance infrastructure. The proposal requires the Attorney General to set standards for what are and are not acceptable encryption products. The proposal's requirement of "immediate" decryption would seem to seriously limit the options available to encryption manufacturers seeking approval of their products. While export of encryption products from the United States has long been restricted, there have never been controls on the manufacture, distribution, or use of encryption within the United States. Pending before the House Intelligence and National Security Committees is the Security and Freedom through Encryption Act (SAFE, HR 695), sponsored by Rep. Goodlatte (R-VA), which would lift current export controls on encryption technology. The Goodlatte bill has already been reported favorably by the House Judiciary and International Relations Committees. The House National Security Committee is scheduled to consider HR 695 on Tuesday, September 9. The House Intelligence Committee has scheduled its vote for September 11. Members of both committees are expected to consider the FBI draft as a substitute to the SAFE bill. This FBI proposal represents a major turn-around for the Clinton Administration, which has denied since its first year that it was seeking domestic controls on encryption. The FBI proposal is an attempted end run around the Constitution. By creating an avenue for immediate access to sensitive decryption keys without the knowledge of the user, the proposal denies users the notice that is a central element of the Fourth Amendment protection against unreasonable searches and seizures. Just this past April, the Supreme Court reaffirmed that the Fourth Amendment normally requires the government to advise the target of a search and seizure that the search is being conducted. Forcing U.S. citizens and companies to adopt so-called key recovery systems poses serious security risks, especially when the systems can be accessed without the knowledge of the users. A recent study by 11 cryptography and computer security experts concluded that such key recovery systems would be costly and ultimately insecure (see http://www.crypto.com/key_study) CDT executive director Jerry Berman said of the latest proposal, "This is not the first step towards the surveillance society. It *is* the surveillance society." ______________________________________________________________________________ (2) TEXT OF MANDATORY KEY RECOVERY SECTION OF FBI DRAFT LEGISLATION (From FBI "Technical Assistance Draft" Dated August 28, 1997) SEC. 105. PUBLIC ENCRYPTION PRODUCTS AND SERVICES (a) As of January 1, 1999, public network service providers offering encryption products or encryption services shall ensure that such products or services enable the immediate decryption of communications or electronic information encrypted by such products or services on the public network, upon receipt of a court order, warrant, or certification, pursuant to section 106, without the knowledge or cooperation of the person using such encryption products or services. (b) As of January 1, 1999, it shall be unlawful for any person to manufacture for sale or distribution within the U.S., distribute within the U.S., sell within the U.S., or import into the U.S. any product that can be used to encrypt communications or electronic information, unless that product - (1) includes features, such as key recovery, trusted third party compatibility or other means, that (A) permit immediate decryption upon receipt of decryption information by an authorized party without the knowledge or cooperation of the person using such encryption product; and (B) is either enabled at the time of manufacture, distribution, sale, or import, or may be enabled by the purchaser or end user; or (2) can be used only on systems or networks that include features, such as key recovery, trusted third party compatibility or other means, that permit immediate decryption by an authorized party without the knowledge or cooperation of the person using such encryption product. (c) (1) Within 180 days of the enactment of this Act, the Attorney General shall publish in the Federal Register functional criteria for complying with the decryption requirements set forth in this section. (2) Within 180 days of the enactment of this Act, the Attorney General shall promulgate procedures by which data network service providers and encryption product manufacturers, sellers, re-sellers, distributors, and importers may obtain advisory opinions as to whether a decryption method will meet the requirements of this section. (3) Nothing in this Act or any other law shall be construed as requiring the implementation of any particular decryption method in order to satisfy the requirements of paragraphs (a) or (b) of this section. ______________________________________________________________________________ (3) WHAT YOU CAN I DO TO HELP? Are you concerned about protecting privacy and security in the information age? Curious what your Member of Congress thinks about the issue? Adopt Your Legislator! Visit http://www.crypto.com/adopt for details You will recieve customized alerts with news you can use, inlcuding the latest information on internet-related issues, the views of your Representative and Senators, and contact information to help you ensure your voice is heard in the ongoing debate over the future of the Information Age. Visit http://www.cdt.org/crypto or http://www.crypto.com/ for detailed background information on the encryption policy reform debate, including the text of various legislative proposals, analysis, and other information. _____________________________________________________________________________ (4) SUBSCRIPTION INFORMATION Be sure you are up to date on the latest public policy issues affecting civil liberties online and how they will affect you! Subscribe to the CDT Policy Post news distribution list. CDT Policy Posts, the regular news publication of the Center For Democracy and Technology, are received by more than 13,000 Internet users, industry leaders, policy makers and activists, and have become the leading source for information about critical free speech and privacy issues affecting the Internet and other interactive communications media. To subscribe to CDT's Policy Post list, send mail to policy-posts-request@cdt.org with a subject: subscribe policy-posts If you ever wish to remove yourself from the list, send mail to the above address with a subject of: unsubscribe policy-posts _____________________________________________________________________________ (5) ABOUT THE CENTER FOR DEMOCRACY AND TECHNOLOGY/CONTACTING US The Center for Democracy and Technology is a non-profit public interest organization based in Washington, DC. The Center's mission is to develop and advocate public policies that advance democratic values and constitutional civil liberties in new computer and communications technologies. Contacting us: General information: info@cdt.org World Wide Web: URL:http://www.cdt.org/ FTP URL:ftp://ftp.cdt.org/pub/cdt/ Snail Mail: The Center for Democracy and Technology 1634 Eye Street NW * Suite 1100 * Washington, DC 20006 (v) +1.202.637.9800 * (f) +1.202.637.0968 ---------------------------------------------------------------------------- End Policy Post 3.13 09/08/97 ---------------------------------------------------------------------------- ************************************************************************** 5)From: Starsheet@aol.com Subject: Re: Spy Shop Raids (Al Brubaker) <> Not if you pay in cash and refuse to give them information. They'll whine that it's the only way they'll get their commission - tough. Or if you feel sympathetic, plug in the name of that jerk that keeps stealing your newspaper..... then buy something highly illegal. (I didn't say that.) ************************************************************************** 6)From: "The Reptile" Subject: Master Locks Augie take up phreaking.......Let God have mercy on us all.....=) Anyway,I was wondering bout the mechanics of a master spin lock (not knowing the correct term, ya know right 5 , left 31,...). Some have a key hole in the back in case uve forgot ur combination. Which is easier and/or faster to pick? If picking the combination is easier/faster, how? Da' Reptyle ************************************************************************** 7)From: "The Swordsman" Subject: Logging on to IRC anonymously -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Hi all, I'd like to know if there is a way to log on to IRC anonymously without using different Internet Providers to "throw people" off? I want to be able to log on to IRC in a way so a perpetrator will not be able to trace my ip to the service I use, or at least make it more difficult for him to do so. Are there any spoofing applications that I could use? Basically what i want to do is keep as much a distance between what I do on IRC, and my actual user account and normal Internet activities. Please help if you can. Thanks! -----BEGIN PGP SIGNATURE----- Version: PGP for Personal Privacy 5.0 Charset: noconv iQA/AwUBNBclgJ55l+gu3JqXEQK80ACg1Ib1TiAZMcNFlanhyJBUtQsa/0IAnjw2 kA2ZgL1RbMbbQA4ZPqzNmOv2 =aDf7 -----END PGP SIGNATURE----- Frank Pagano (a.k.a. The Swordsman) Auxiliary Police Officer, New York http://www.geocities.com/CapitolHill/7245 ICQ# 2052068 -------- Member Coalition of Internet Advocates http://www.geocities.com/Heartland/Prairie/9338 -------- Disclaimer: I deny everything ************************************************************************** 8)From: Dale Furneaux Subject: PublicData.com PublicData.com now charges for access to texas drivers licenses, thanks to a new Texas law passed on September 1. Apparently, the Texas government thought that this information should not be readily available on the Web in Texas, so they banned it! You can still get the information from the DMV with a small fee, and you can still get the information from PublicData.com, but you have to subscribe. This is another example of a good resource screwed up by BIG BROTHER! Where I can be Reached! Web Page: http:\\www.flex.net\users\eric75\dale\Dale.htm Email#1: st3pg@bayou.uh.edu Email#2: dfurneaux@hou.varco.com ************************************************************************** 9)From: "Lorenzo Castillo Sanchez" Subject: Re: The contradictory nature of your web site >If surveillance is so awful, then why do you people go so far as to >reveal things like the exact circuits and the precise technological >methods in order to snoop? All it does is enable everyone to go out >and spy on others too. >You people are a trip. > > schnn1@aol.com Well, Mr/Ms.Schnn1, put it this way. How can you know the threat level and the vulnerabilities if you don't know how EXACTLY surveillance is being done. I am not a professional but I've caught some private snoopers who conduct surveillance for business profit(usually cheating on their competitors) and personal entertainment(maybe the Triple X-rated videos aren't enough so they "spy" on their neighborhood ladies - in very private situations). For every measure, there is a countermeasure. Then someone finds a weak point in that countermeasure, so a new snooping "trick" is discovered. In the world of computer hacking and viruses, this is an everlasting, on-going trend. There is no such thing as the "ultimate protection". Therefore, it is important to be well aware of the details of surveillance in order to protect your own privacy - which I'd like to call "electronic self-defense". If you went to the Seminar in August, they really show you the sophisticated hi-tech techniques and how we can utilize the telephone and a bag of "sweet-talking" tricks to extract vital info from phone companies. CONTRADICTORY ?!! To be honest Spyking's website isn't as insideous as you think. For example, does the site tell us how to clone cellphones by obtaining the ESNs(Electronic Serial Numbers) and the PRECISE process of programming certain hardware to duplicate them ?? I understand your feelings about people having easy accesss to info on how to invade other people's privacy. I had a hard time convincing close friends of mine about the vulnerabilities of cellphones, ATMs, etc. But, once they were victims of theft and privacy invasion, they realized that I wasn't such a paranoid jerk after all. So, learn the techniques to protect yourself BEFORE you become a victim statistic. I personally think surveillace techniques and countersurveillance techniques are like switch blades. Of course, one of the average street thug's preferred tool of trade is the switch. But it's also quite a handy tool for farmers. It's pretty common in Germany. Anyway, the point is, it's not really the info and the knowledge itself that poses a threat. It's the FACT that someone is abusing that certain info and knowledge for UNETHICAL reasons. I hope this helps you better understand why Spyking is making surveillance info available on his website. :-) ************************************************************************** 10)From: BADCOFFEE@aol.com Subject: Re: The contradictory nature of your web site Frank, That sounded like a pretty HEAVY compliment from where I sat. "you people"...can I be included? :-) No..all kiiding aside. This place is one of the ONLY sites on the web where "accurate and professional" information is exchanged. This place is NOT for children..nor evil do-ers. The key word is: Professional. People do come here for help also. The "How to" section of this forum is designed to "not" snoop for harmfull purposes....but for "good"...and some time for entertainment purposes..sure. What might be a few "good" reasons to wreak havok in someone's privacy..... Kidnapping......if it was your kid..would you care what tecnique was used to get the job done? Marital: Spy on your hubby/wife.....to protect your assets. Stalkers? Suspected child molesters? Business dealings? Drug dealers? Insurance fraud? LOTS of good reasons to intercept/spy...what ever you would like to call it. Key word here is: Professional For amatures: (myself) It is a sence of power. Used properly....it is a shield that assure me that in this "bad" world...I can effectively protect myself and my family in rhelms that most people just could not imagine to go to. Power is in the hands of the people whom are not afraid to explore and pioneer new terratory. The is no information that is not power. Power? Not a bad word. Schnn1, mail me at Badcoffee@aol.com (no instants). I'll give you my phone #. I'de like to Fill you in a bit on something that I am working on Pro-bono to help a friend. This will send a chill up your spine, I assure you. When we are done conversing....you will have a better insight of what kind of people are out there...and "why" average people should know how to do the things that are discussed on this list of professionals. :-) Quick entry tip: Try the pre-set factory code on anything that might have a "changable" code or combination. IE- Alarm systems (key pad), some combo locks that offer combo/change, some safes ect. Call the company to get pre-set. (most of time 1-2-3-4 or 1-2-3) Not only count on people's lazyness to your advantage....count on our memories getting poorer....we LOVE those pre sets. :-) 1-2-3-4 Augie- Champino spelling & typing master, New Jersey 1978 and 89 spelling gold medal winner ************************************************************************** 11)From: JEM Subject: Data providers Spyking: I have been reading the postings since the membership was in the three digit figures and find it very interesting. In have been in investigative work since 1970 and data searching since the mid 80's and would be willing to assist any new P.I's., re: marketing, info gathering techniques, etc. Typically I provide a free consult and the thrust is ethics, how to be successful at this game and still not cut your throat when shaving in the morning (or evening) as well as the other areas mentioned above. To my point, I have used a number a data providers all across the country (I am in CT) and I have found one of the most responsive to date to be: Russel C. Eckert "The DataDetective!" Electronic Investigations and Background Checks chip@technologist.com http://datadetective.home.ml.org I have found Russ to be extremeley accomodating, he is tenacious but knows most cases we work on do have a budget and he always see to respet that. ************************************************************************** 12)From: "Dale R. Appel" Subject: Re: small video surveillance cameras I am able to be of assistance with small video surveillance cameras. I have covert devices available in both B/W and color formats and have a wide variety of manufactures' equipment from which to choose. I can be reached at the following: advsur@primary.net or at 800-278-6004. ************************************************************************** 13)From: zerohero@juno.com (john j smith) Subject: Obtaining PI license Hey everyone, its been a long time since I posted. In reading the articles recently I've noticed quite a bit on the subject of private investigators. Well, I can tell you that I have been trying to become one for awhile now and I had an interview with a firm a few weeks ago and they never called back. In my state (Florida), one I understand to be very difficult, getting a license is next to impossible unless you are already in law enforcement. As in most things its a "who you know" situation. You must first get a class "cc" intern license and then work for two years to be eligible for a class "c" - the whole ball of wax full blown p.i. license. This is of course all subject to the approval of your sponser who must himself have a class "c". Then you have various other license designations, the only other one of value to this discussion being the class "a". this is the certification to run/manage a p.i. firm. You DO NOT need a class "c" to get this license. You could have it alone if you do not engage in investigations yourself and you have the proper insurance ($600 a year here) and a class "c" working for you. ( Maybe this would help some of you aspiring information brokers out there...). One other interesting note is that one may work for a firm while his application is being processed (sounds like the movie 'Casino" doesn't it?). But if the application is denied s/he must immediatly cease working. The situation (gettin' in the biz) is pretty frustrating. Throw in all the scumbags, sunshine surviellence (because you gotta pay yer dues!), privacy laws, and everything else - its a wonder anyone gets in at all! If I can help anyone with anything, let me know! zerohero ************************************************************************** 14)From: Phreaker Subject: Re: Intro/Second Passports What law enforcement agency does this idiot work for? I am going to rush my payment to him as soon as he sends me $10,000 just to show me he is serious. My public key is listed at MIT. I can promise him a 90% chance that I will pay the 25K+ he wants. My current records show that I have done this some 20 times with no complaints. Of course, he cannot know my name and I don't want to know his but I can give him an overseas bank account number to which he can send the money. This is not a scam, trust me. P Pursuant to US Code, Title 47, Chapter 5, Subchapter II, '227, any and all nonsolicited commercial E-mail sent to this address is subject to a download and archival fee in the amount of $500 US. E-mailing denotes acceptance of these terms. ************************************************************************** 15)From: kevin@innet.com (Kevin) Subject: Re: The contradictory nature of your web site >Your whole web site is dedicated in exposing the insideousness of surveillance and then you turn around and show everyone how to do it too!!!!! That is ridiculous!!!< What's your point? Seeing how things are done is one of the best ways to help people protect themselves from "snoops". I mean, if some cheap website says, "People can listen to your phone conversations fairly easily," it doesn't really help the person who wants to protect themselves from that type of thing. Now, on the other hand, if they explain how the tapping is done, it would let them know what to look for as well as other things... Don't be so critical. >If surveillance is so awful, then why do you people go so far as to reveal things like the exact circuits and the precise technological methods in order to snoop?< Who said surveillance is awful??? Just like anything else out there, it all depends on who's doing it mainly. I mean, if a private investigator finds out that someone is doing something illegal, for instance, isn't that a good thing? ************************************************************************** 16)From: DWL51183@aol.com Subject: Re: AMERICA ONLINE WHAT HAPPENED IN YOUR COMPUTER IS THAT YOU DOWNLOADED SOMETHING CALLED A PASSS WORD TRACKER AND EVERY TIME YOU GO ON AOL IT SEND YOUR PASSWORD TO THE PERSON YOU DOWNLOADED THE MAIL FROM IT SOMETIMES STOPS YOU FROM CHANGING YOUR PASSWORD. TRY NOT TO DOWNLOAD FROM ANYONE YOU DONT KOW SOME PEOPLE ARE VERY SMART LIKE ME A WILL TRY TO PERSUADE YOU TO DOWNLOAD THINGS BUT DONT. IF YOU HAVE WINDOWS 95 TO CHECK TO SEE IF YOU HAVE ONE IN YOUR CPU PRESS CONTROL-ALT- DETE ONCE NOT TWICE AND SEE IF YOU HAVE MORE THEN ONE EXPLORER IF YOU DO END TASK ON ONE OF THEM. OR IF THERE IS ANYTHING IN THERE YOU DONT RECONIZE END TASK ON IT OK. ANOTHER WAY TO FIND OUT IS TO GO START RUN AND TYPE IN win.ini AND WHEN YOU GET THERE LOOK AT LOAD= IF THERE IS ANYTHING THAT SHOULDNT BE IN THERE DELETE IT AND PRESS SAVE. THOSE ARE SOME WAYS OF TAKING IT OUT. AND AMERICA ONLINE IS A TRICKY PLACE BECAREFULL. ************************************************************************** 17)From: "P.I." Subject: Opinions needed i am interested in hearing from persons who have used internet based "info dealers" for location, background, asset etc..searches. were you pleased with the results? pricing? turnaround?? our firm is experiencing a growing demand for these services. who do you recommend?? please respond via email..i thank you in advance. best regards.... ************************************************************************** 18)From: SpyKing@thecodex.com Subject: White House pages intercepted? Checkout: http://www.2600.com/pam_suggestion/index.html Someone's been intercepting White House Communication Office pagers and posting them. ************************************************************************** Who are you? What's your specialty and/or interest? Let us know about your company... What would you like to see on the list? Post it. Let us know... Do you have something to contribute? We'd like to hear it... We want to know EVERYTHING and ANYTHING about eavesdropping, surveillance, countersurveillance & privacy related technology, etc... Remember: who, what, where, when, how & why... we want ALL the details... Do you have a question? Post it... A little free time? Help a member... With the INCREDIBLE brain power on this list, someone should have the answer ;-) P.S. Don't be a LURKER... Members take the time to post info for us all... give something back... Don't just take... Your input/knowledge is valued... ************************************************************************** Send Postings to: spyking@con2.com with "Post" in subject field with subject ************************************************************************** Subscribe to: spyking@con2.com In the subject field type: subscribe-surveillance list e-mail address ************************************************************************** Unsubscribe to: spyking@con2.com In the subject field type: unsubscribe-surveillance list e-mail address ************************************************************************** ...The Simple Rules of the Surveillance List... The Surveillance List Owners may Reject any posts that are/contain: 1) Info Unrelated to Eavesdropping, Surveillance or Privacy technology... 2) Flames or Negative posts... 3) E-Signatures that are considered excessive... 4) Advertisements not DIRECTLY related to the list topics... 5) Attached Files... 6) Oversized Posts... (May be edited to save room) **************************************************************************** This publication is copyrighted and is protected by U.S. and International copyright law. The information transmitted on this list may not be reproduced, reposted or forwarded to any non-list member without expressed written permission of the List Owner. Violation of U.S. copyright law is a criminal and civil offense... **************************************************************************** The Surveillance List is Moderated by SpyKing@thecodex.com The List Owner will make EVERY effort to protect subscribers from spam... Copyright 1996, 1997 Codex Publishing Inc., All Rights Reserved... **************************************************************************** ****************************************************************************** The Official Newsletter of W.A.S.P. The World Association of Surveillance Professionals http://www.thecodex.com/wasp.html ****************************************************************************** Vol.Two Issue #197 The Surveillance List Sept.15,1997 Over 2800+ Members Worldwide Representing 53 different countries List Chat at: http://www.thecodex.com/chat.html ****************************************************************************** While we STILL feel there is NO SUCH THING as a stupid question... We suggest the newer list members AND the technically challenged browse through the FAQ before posting a question... Surveillance List Pseudo FAQ at: http://www.thecodex.com/faq.html P.S. If you have something to add to the FAQ, let us know... ****************************************************************************** IN THIS ISSUE... ****************************************************************************** 01) Info want's to be free... 02) Re: The contradictory nature of your web site 03) Re: the contradictory nature of your web site......... 04) Re: fake passports 05) You GOTTA read this one 06) Trying to find a used surveillance camcorder 07) PGP and the FBI's ignorance 08) Scanner Law and new 3-D projectors 09) Several questions 10) Re: Pay your dues... 11) Listening device that can monitor through glass 12) Re: FBI Encription laws !! 13) Re: Let's talk key stroke loggers 14) I have a friend 15) Re: Hiding your IP Address 16) Passwords 17) Nothing for nothing 18) Re: hiding your IP Address 19) Pick up a copy of "the Net" magazine 20) Re: Nature of your web site ****************************************************************************** DON'T BE A LURKER.... GET INVOLVED... YOU ARE A MEMBER... MAKE THE MOST OF IT ****************************************************************************** 1)From: Marcus Blankenship Subject: Info want's to be free... I think that can be attributed to Bruce Sterling. Now, I'm curious. Anyone know for sure? / Marcus Blankenship Jeld-Wen, Inc Just Another Progress Hacker... 541-882-3451 marcusb@jeld-wen.com www.doors-windows.com {std/disclaimer.i} / ************************************************************************** 2)From: gaugusti@hqgbcs.attmail.com (Grant Augustine x4058) Subject: Re: The contradictory nature of your web site Dear Mr./Ms. Schnnl, The answer to your diatribe was best stated over 100 years ago... Rudimentary Treatise on the Construction of Locks, 1853 Charles Tomlinson A commercial and in some respects a social, doubt has been started within the last year or two, whether or not it is right to discuss so openly the security or insecurity of locks. Many well-meaning persons suppose that the discussion respecting the means for baffling the supposed safety of locks offers a premium for dishonesty, by showing others how to be dishonest. This is a fallacy. Rogues are very keen in their profession, and already know much more than we can teach them respecting their several kinds of roguery. Rogues knew a good deal about lockpicking long before locksmiths discussed it among themselves, as they have lately done. If a lock - let it have been made in whatever country, or by whatever maker - is not so inviolable as it has hitherto been deemed to be, surely it is in the interest of honest persons to know this fact, because the dishonest are tolerably certain to be the first to apply the knowledge practically; and the spread of knowledge is necessary to give fair play to those who might suffer by ignorance. It cannot be too earnestly urged, that an acquaintance with real facts will, in the end, be better for all parties. Some time ago, when the reading public was alarmed at being told how London milk is adulterated, timid persons deprecated the exposure, on the plea that it would give instructions in the art of adulterating milk; a vain fear - milkmen knew all about it before, whether they practiced it or not; and the exposure only taught purchasers the necessity of a little scrutiny and caution, leaving them to obey this necessity or not, as they pleased. ... The unscrupulous have the command of much of this kind of knowledge without our aid; and there is moral and commercial justice in placing on their guard those who might possibly suffer therefrom. We employ these stray expressions concerning adulteration, debasement, roguery, and so forth, simply as a mode of illustrating a principle - the advantage of publicity. In respect to lock-making, there can scarcely be such a thing as dishonesty of intention: the inventor produces a lock which he honestly thinks will possess such and such qualities; and he declares his belief to the world. If others differ from him in opinion concerning those qualities, it is open to them to say so: and the discussion, truthfully conducted, must lead to public advantage; the discussion stimulates curiosity, and curiosity stimulates invention. Nothing but a partial and limited view of the question could lead to the opinion that harm can result; if there be harm, it will be much more than counterbalanced by good. "Rudimentary Treatise on the Construction of Locks" was taken from the section "Should We Talk About Security Holes? An Old View" contained in the book "Firewalls and Internet Security"; by William R Cheswick and Steven M. Bellovin. ISBN:0-201-63357-4. Reprinted by permission of Addison-Wesley, publisher. ************************************************************************** 3)From: "self destruct" Subject: Re: the contradictory nature of your web site......... i have to put in my 2 cents on this statment. i think the best way to protect myself against being tapped or otherwise be watched, is to know how to watch.knowing the methods with which a person can watch is the easiest way to look out for such things.how would i know what to look for if i didnt learn how to do it myself. to put it another way. if you dont want to be a victom,learn how a preditor stalks,then you can avoid the situations that put you at risk ************************************************************************** 4)From: "eluhow" Subject: Re: fake passports Interesting response on fake passports, want one, and other things like it?? go to www.nic-inc.com All questions answered eluhow@erols.com page me: http://wwp.mirabilis.com/2457748 ICQ 2457748 ************************************************************************** 5)From: Trace Carpenter Subject: You GOTTA read this one Once again, fact is stranger than fiction. Actual dialog of a former Wordperfect Customer Support employee: "Rich Hall computer assistant; may I help you?" "Yes, well, I'm having trouble with WordPerfect." "What sort of trouble?" "Well, I was just typing along, and all of a sudden the words went away." "Went away?" "They disappeared." "Hmm. So what does your screen look like now?" "Nothing." "Nothing?" "It's blank; it won't accept anything when I type." "Are you still in WordPerfect, or did you get out?" "How do I tell?" "Can you see the C:\ prompt on the screen?" "What's a sea-prompt?" "Never mind. Can you move the cursor around on the screen?" "There isn't any cursor: I told you, it won't accept anything I type." "Does your monitor have a power indicator?" "What's a monitor?" "It's the thing with the screen on it that looks like a TV. Does it have a little light that tells you when it's on?" "I don't know." "Well, then look on the back of the monitor and find where the power cord goes into it. Can you see that?" "Yes, I think so." "Great! Follow the cord to the plug, and tell me if it's plugged into the wall." "Yes, it is." "When you were behind the monitor, did you notice that there were two cables plugged into the back of it, not just one?" "No." "Well, there are. I need you to look back there again and find the other cable." "Okay, here it is." "Follow it for me, and tell me if it's plugged securely into the back of your computer." "I can't reach." "Uh huh. Well, can you see if it is?" "No." "Even if you maybe put your knee on something and lean way over?" "Oh, it's not because I don't have the right angle-it's because it's dark." "Dark?" "Yes-the office light is off, and the only light I have is coming in from the window." "Well, turn on the office light then." "I can't." "No? Why not?" "Because there's a power outage." "A power... A power outage? Aha! Okay, we've got it licked now. Do you still have the boxes and manuals and packing stuff your computer came in?" "Well, yes, I keep them in the closet." "Good! Go get them, and unplug your system and pack it up just like it was when you got it. Then take it back to the store you bought it from." "Really? Is it that bad?" "Yes, I'm afraid it is." "Well, all right then, I suppose. What do I tell them?" "Tell them you're too stupid to own a computer." -- Trace Carpenter Investigations ****** 2926 Maple Ave., Ste. 200 Ignorace of the law is no excuse; Dallas, Texas 75201 Ignorance of the law-makers apparently 214.828.4520 is. 214.740-0112 Facsimile ****** ************************************************************************** 6)From: "ADRIAN BEACH" Subject: Trying to find a used surveillance camcorder I trying to find a used surveillance camcorder. At least 24X lens, any format, manual focus etc.. etc.. If anyone has one they might like to get rid of please e-mail with specifications, price, and contact information. Thanks AJ Beach ************************************************************************** 7)From: "The Swordsman" Subject: PGP and the FBI's ignorance I think the FBI director, as well as many other "pro NSA, stamp all over the Bill of Rights and take away our privacy" crowd are simply ignorant of the encryption issues on the Internet. He probably doesnt even know what an Internet is ;-) I know a few law enforcement investigators who wouldnt dream of using government keys to unlock encryption in the name of "investigation" The simple fact is, through good ole fashioned hard work and investigator's common sense, you can find plenty of evidence to warrant an arrest and conviction of a criminal who uses PGP. Criminals cant encrypt EVERYTHING, especially their big mouths. They can also leave their passphrases just waiting to be found by detectives, or even confess it themselves. An undercover agent can also win over his trust and receive encrypted information from the criminal that can be used as well. The fact is, the government is looking for the easy way out. God forbid they be willing to work just a little harder to go around PGP, without basically taking away whatever electronic privacy we have left. No security is absolute. There can ber GOOD security, but not PERFECT securtiy, and PGP isnt perfect. I remember when using RSA keys generated at 2049 bits was practically uncrackable. Mmmhmm, and now whoopsy daisy, it aint so secure anymore, and hence the new keys that can encrypt at 4096 bits. What a soooprise ;-) Stay safe, Frank Pagano (a.k.a. The Swordsman) Auxiliary Police Officer, New York http://www.geocities.com/CapitolHill/7245 ICQ# 2052068 -------- Member Coalition of Internet Advocates http://www.geocities.com/Heartland/Prairie/9338 -------- Disclaimer: I deny everything ************************************************************************** 8)From: fthome@amug.org (Alex Thome) Subject: Scanner Law and new 3-D projectors Could somebody please send me a copy of the scanner law, I'm doing a project on it in my ap gov class. Anyway, now. For something interesting. Look at this. How easy it will be to declare martial law......... . Not sure how true it is, but it could happen >From Nexus magazine Aug 97 U.S. Congress has approved funding for the Army to perfect a laser that projects life-sized hologram decoys of troops and tanks, designed to fool enemies on the battlefield. Dubbed the "Ghost Gun", the hologram projector could also be used to display virtual images of religious or political leaders in order to create calm or panic amongst the public. U.S. Army scientist Dr. Gary Wood, who is leading the project at the Army Research Laboratory in Adelphi, Maryland, said: "One of the scenarios was Saddam Hussein standing on a balcony spouting pro-American messages or telling troops to lay down their arms. We are well on the way to perfecting it". It is predicted that within 10 years many of the troops seen by enemy units on the battlefield may be no more than 3D, laser-generated images. U.S. defense consultant Dr. Brenda Mark said, "Anyone looking at the target area will think the U.S. Army has a major presence there when in fact there will be nothing but empty space." >> Shadow Runner -Believe nothing, until you question everything- -----BEGIN GEEK CODE BLOCK----- Version: 3.1 GCS/M/P d- s++:++ a? C++++ BLSX U+++ P+ L+ E-- W- N++ o? K w--- @O M++ V PS++ PE Y++ PGP++ t+ 5+ X+++ R+ tv- b+++ DI+++ D G++ e- h!++ r y !z ------END GEEK CODE BLOCK------ ************************************************************************** 9)From: zerohero@juno.com (john j smith) Subject: Several questions A thought: Has anyone ever noticed how much empty space is inside a standard pc case? I don't suppose any computer illiterate person would notice that the screws were not on the back if one wanted to, say hide something in there? You know, like a bug or something? With all the wires coming out of the back, I'd say no suspicions need ever arise, eh? I went to http://www.webexpert.net/nickh, a reverse phone # search...seemed to take a long time to work. Another thought: Anyone ever consider putting all those great lock picking tips into some kind of compilation? What about all the web page addresses that come through the forum? Would anybody be interested in setting up some kind of live chat for the forum members? http://www.openix.com/-mutter........wasn't there. Can anybody tell me why (in Florida anyway) it is illegal to have very darkly tinted windows when it seems as though limo windows are painted black? I start my crime scene technology certificate program in january...anyone else knowledgable in this field that can tell me what i'm really in for? well, all that should have generated some posts...i'm starting to sound like Andy Rooney some I'm quittin' now.... zh ************************************************************************** 10)From: zerohero@juno.com (john j smith) Subject: Re: Pay your dues... BADCOFFEE - I didn't mean to offend anyone with the "pay yer dues" comment 2 posts ago...I think though I get the gist of what you're feelin' , namely that people don't get credit for "selfstudy" often times. I know, I know - very frustrating. To be talented and willing, intelligent and resourceful, etc. and unrecognized. Your school degree analogy was well placed (why do I need to take higher math when it is unrelated to my field? Just to get a piece of paper? Bingo!) This was simply a quote I've heard at a number of interviews with p.i. firms as to rising in the company by first sitting in my parked car for 10 hours at a time, 96 degrees outside (110 inside), car off and hiding behind a sunscreen to get 5 minutes of video on a subject cheating and insurance company. Again, it was sarcastic only. Sorry if I offended! zerohero ************************************************************************** 11)From: Frank D Cantrell Subject: Listening device that can monitor through glass HI List, Anyone have info on listening device that can monitor through glass for inside conversations that would not require tresspassing! Also, if anyone has any good schematics of bugging and other devices, please email to me.... Am an old electronics technician and would like to know more of what I am dealing with. Thanx, -- Frank D. Cantrell Bottom Line Investigations http://www.garts.com/bottomline Email: mailto:privatei@dekalb.net Phone:615-597-1166 Fax: 615-597-3179 Frank D. Cantrell & Associates Computer Consultants http://www.garts.com/bottomline/consult.htm Email: mailto:fturntell@dekalb.net Phone: 615-597-1634 ************************************************************************** 12)From: Tim Hill Subject: Re: FBI Encription laws !! I was talking to a friend about the proposed laws for encription software. The interesting thought that we reached was: If the FBI have a "back door" how long would it take people to find this "back door" Our Estimate was about 30 days after the "back door" was known to exist! and then it would be all over the net within hours of this discovery !!! Result: Every 30 days the software companys that produce these encription packages will release a new version, changing the "back door" Now doesn't that suggest that these companys are going to be the best value shares around should this become Law ???? Just get out before the crash when enough people finally decide that they have had enough of the silliness and opt out . Tim Hill ************************************************************************** 13)From: the mechanic Subject: Re: Let's talk key stroke loggers %Another note: Caller ID users. Ever think about running a second unit %somplace on the line and comparing phone numbers of the 2 units? hmmmmmm :-) hey augie, i have done that, one was a 35number mem, but with all the nifty gadgets, like name, number, time, blah blah blah, then the other was just name with 300 mem, so i kept them both on, one for info, and the other for storage. I got weird numbers =) fun fun fun -mechanic -mechanic.is@mindless.com -http://roo.unixnet.org/~dms ************************************************************************** 14)From: Carol Mackey Subject: I have a friend I have a friend that had her phone number changed to an unlisted number 3 different times and all three times this number has been found by people she did not want to have it, they even got her new address! How can these private investigators, info brokers get these numbers? BARRETT, DRUMGOOLE, GORMAN, LAVEY/LEAVY/LEAVEY, MACKEY, MACLEOD, MCNAMARA, MCNAUGHTON, VAUGHN, WOLFE e-mail: cmackey@buffnet.net HomePage: http://www.buffnet.net/~cmackey ************************************************************************** 15)From: "J.D. Abolins" Subject: Re: Hiding your IP Address >6)From: draftex >Subject: >Is it possible to be on the internet, and hiding your IP Address plus >any other information that could reveal your identity? Yes. One way is to use somebody else's IP address. This can be done by telnetting to one site then to another and chaining connection. Having access to a set of sites is another matter. A readily accessible method for hiding IP address while using the WWW is a service like Anonymizer (htpp://www.anonymizer.com) which will act as a go-between you and the rest of the Internet. If one is just trying to avoid being linked to a single IP address day-in-day-out, using a connection which has an IP address pool (DHCP for example) or using an Unix shell account will vary the IP address from session to session. But this approach will still give a trace back to service or a site. Then fingering of the site could be used to find one's user ID. J.D. Abolins ************************************************************************** 16)From: "Compaq User" Subject: Passwords To: Bad coffee, Augie I know this will probably bore you but may be of interest to us novices. I am not all that into locks and stuff but I always read your posts for its insights and comments so I give you the credit for solving the following problem, kind of an osmosis thing I guess. I was on a executive protection detail and a new kid I was releiving asked to borrow my cell phone to call the current love of his life. Well to make a boring story short; an hour after he leaves I'm on the sight I go to use the phone (it's a new slim line nokia) and the phone asks me for a pass word. Now at 3:30 am this is very amusing since I never programmed a pass word into it and an external and internal alarm is showing at the Principals location. I figure it's in my best interest to call for some sort of assistance but how. Solution: when I powered up the phone it asked for a password and showed how many digits (maximum) it would accept as a decode. I started at 000 and by the keypad added one digit each attempt. In less than 8 minutes I had it working again. Thanks for all your insights. ILQQK4DOE ************************************************************************** 17)From: "Compaq User" Subject: Nothing for nothing Nothing for nothing but I liked the moderators reply to "Mutter"! But hey though, every once in a while it is probably a good thing to be reminded where we came from. Empathy, ya that's the word. SpyKing keep up the great work. and if no one has told you lately; thanks for this website. jerry @ ILQQK4DOE ************************************************************************** 18)From: "gnu" Subject: Re: hiding your IP Address One way is to setup a Proxy server and go through it to connect to the internet. Micro$oft retails them for about $999. If that seems to steep there are various beta versions available for download off the Internet. If you would like a simpler way of doing this. Try http://www.anonymizer.com , they will mask your IP address. But, be careful, nothing is full proof. gnu ************************************************************************** 19)From: "mage2" Subject: Pick up a copy of "the Net" magazine umm i would like every one to pick up a copy of "the Net" mag and look at page 41 It has the codex site metioned on it. "The Codex (www.thecodex.com) contains a less organized, but very thorough, set of links and comes with a online email bomber for spamming your favorite goverment agency." it is listed under "The Nefarious Files" mage2 =X 281.Texas.USA ICQ # 1627040 "Just Because Your Paranoid Doesn't Mean They're Not After You" K.S. +++Moderator's Note+++ "Nefarious" isn't so bad... I've been called a lot worse ;-) just as long as you don't call me late for dinner... ************************************************************************** 20)From: "quovadis" Subject: Re: Nature of your web site I know this has been spoken about over the last few issues but as a semi-lurker/submitter I just wanted to have a little say to Mr/Mrs/Ms/Miss Schnn1 I have been and will be probably forever, subscribed to The Official Newsletter of W.A.S.P for the initial reason of interest. As I work in a security/surveillance field I wanted to see what information is put around the world from different people who know probably a lot more than I. I then discovered that some of the practices I was performing were unethical and not in the best interest for the client but for my pocket. I then proceeded to learn various ways from the list the proper way to help my clients and perform the duties in which I was employed to the best of my ability for the client. In short : The Newsletter is a medium in which helps people understand the principles behind what they do, It also helps the general public (which I would probably be included) understand what can happen to them. I really don't know how you see the newsletter as contradictory as it is seen by 2800 people - professionals, public,intrested parties as a source of information which shares both sides of the coin. Virtually like going to school and having life experience at the same time ...what an excellent combination. WELL DONE SPYKING KEEP UP THE ***OPEN INFORMATION**** People make information: Information makes kings: Kings can destroy information: People need information: Spyking gives us information: quovadis@ois.net.au ************************************************************************** Who are you? What's your specialty and/or interest? Let us know about your company... What would you like to see on the list? Post it. Let us know... Do you have something to contribute? We'd like to hear it... We want to know EVERYTHING and ANYTHING about eavesdropping, surveillance, countersurveillance & privacy related technology, etc... Remember: who, what, where, when, how & why... we want ALL the details... Do you have a question? Post it... A little free time? Help a member... With the INCREDIBLE brain power on this list, someone should have the answer ;-) P.S. Don't be a LURKER... Members take the time to post info for us all... give something back... Don't just take... Your input/knowledge is valued... ************************************************************************** Send Postings to: spyking@con2.com with "Post" in subject field with subject ************************************************************************** Subscribe to: spyking@con2.com In the subject field type: subscribe-surveillance list e-mail address ************************************************************************** Unsubscribe to: spyking@con2.com In the subject field type: unsubscribe-surveillance list e-mail address ************************************************************************** ...The Simple Rules of the Surveillance List... The Surveillance List Owners may Reject any posts that are/contain: 1) Info Unrelated to Eavesdropping, Surveillance or Privacy technology... 2) Flames or Negative posts... 3) E-Signatures that are considered excessive... 4) Advertisements not DIRECTLY related to the list topics... 5) Attached Files... 6) Oversized Posts... (May be edited to save room) **************************************************************************** This publication is copyrighted and is protected by U.S. and International copyright law. The information transmitted on this list may not be reproduced, reposted or forwarded to any non-list member without expressed written permission of the List Owner. Violation of U.S. copyright law is a criminal and civil offense... **************************************************************************** The Surveillance List is Moderated by SpyKing@thecodex.com The List Owner will make EVERY effort to protect subscribers from spam... Copyright 1996, 1997 Codex Publishing Inc., All Rights Reserved... **************************************************************************** ****************************************************************************** The Official Newsletter of W.A.S.P. The World Association of Surveillance Professionals http://www.thecodex.com/wasp.html ****************************************************************************** Vol.Two Issue #198 The Surveillance List Sept.16,1997 Over 2800+ Members Worldwide Representing 53 different countries List Chat at: http://www.thecodex.com/chat.html ****************************************************************************** While we STILL feel there is NO SUCH THING as a stupid question... We suggest the newer list members AND the technically challenged browse through the FAQ before posting a question... Surveillance List Pseudo FAQ at: http://www.thecodex.com/faq.html P.S. If you have something to add to the FAQ, let us know... ****************************************************************************** IN THIS ISSUE... ****************************************************************************** 01) Need Video Surveillance 02) Re: You GOTTA read this one 03) A few privacy-related questions, if you don't mind 04) Coming soon... 05) Re: trans-glass monitoring 06) Re: Hiding your IP Address 07) Re: Several questions 08) Need a "something" 09) Re: Passwords 10) Intro 11) Re: Pay your dues... 12) Snoops, Sex and Videotape 13) DID CLINTON BUG CONCLAVE FOR CASH? 14) Boy prostitutes used in eavesdropping case 15) Reverse engineering of software? 16) Invite the readers of this list 17) What gives? 18) Re: Callerid/getting unlisted #s 19) Key Escrow 20) CIA using Information Warfare 21) Re: The contradictory nature of your web site ****************************************************************************** DON'T BE A LURKER.... GET INVOLVED... YOU ARE A MEMBER... MAKE THE MOST OF IT ****************************************************************************** 1)From: SpyKing@thecodex.com Subject: Need Video Surveillance Have easy assignment for someone with camcorder this Saturday, Sept. 20th,1997 in Dover (Dutchess County one hour from NYC), New York. Job will take approximately 3 hours. Need videotape of local HS football game... Contact me directly for details. ************************************************************************** 2)From: mzenze19@idt.net Subject: Re: You GOTTA read this one This was hilarious!!!! I laughed for ten minutes:-) Thanks!!!!! Mike Zenzer ************************************************************************** 3)From: 2johndoe@mailexcite.com Subject: A few privacy-related questions, if you don't mind Anyone out there a "privacy consultant"? Does such a thing exist, or do such professionals tend to be more specific, i.e. banking, computer, surveillance, etc. Can anyone recommend other privacy-related mailing lists? Is anyone familiar with the site "Ultimate Anonymity" http://207.240.104.21/a/Anonymity/ - If so, any feedback? I recently downloaded PGP 5.0. I am having difficulty learning how to utilize it. The PGP faqs haven't helped much. Can anyone point me in the right direction for info on how to set it up? Thanks in advance... Joe ************************************************************************** 4)From: "Marko" Subject: Coming soon... SpyKing: I am looking forward to your promised book "How Private Investigators & Information Brokers Invade your privacy by pretext, stealth and downright illegal means..." I have way too many friends who, when I show them all this stuff on biometrics, surveillance, etc., have the attitude "If you don't do anything wrong or haven't broken the law, then why worry about it? It's all being done to catch criminals." This attitude, in my opinion, is the biggest hurdle to educating the public before Big Brother becomes a Big Problem. By the time enough people realize that their lives have been bought and sold and they no longer are free, it is too late to fight for privacy and free speech. Any articles that shed light on the rats and rapscallions who use this technology, and for what ends, and that show how the system being put in place is ripe for abuse, need to published far and wide. Hope to see it soon! For Freedom, Mark Pettifor freedom@mvillage.com ps - RE: Privacy Invaders page: Of course, you still have the problem: If you make it difficult for people in general to get a hold of surveillance equipment, then only the government and crooks (any difference?) will have it. Same as the "If guns are outlawed, only outlaws will have guns" argument. It seems we are in a situation where technology is enabling people to be more efficient in their unscrupulous behavior. I see no easy answer. We can't "put the genie back in the bottle" by getting rid of the technology. Allow me to be a little melodramatic by saying that it appears to be a sort of Good-vs-Evil battle in which Evil is equipping itself with technology, and Good hasn't even recognized the fact that there's a battle coming, because they can't see how anyone would be Evil, or they assume that Good people are using the technology for Good ends... Surveillance technology means control. At issue is who does the controlling? "And he caused all people....to receive a mark in their hand or forehead...and anyone not having the mark could not buy or sell..." (Paraphrased of course) ************************************************************************** 5)From: Jim Markitell Subject: Re: trans-glass monitoring The first item that comes to mind would be a laser listening device. By bouncing a laser beam(invisible) off of a mirror, or anything reflective in the room, you can effectivly listen in on conversations in the room. Often, simply reflecting it off of the outside window can also be used, depending on ambient vibrations and noise. A good place to find these devices(pre made or in kit form) would be Amazing devices, MWK lasers, Meredith Lasers, and Midwest Laser. There are other devices which use rf-resonance, such as a metal garbage can, that can generate an induced signal which could be decoded, but I have not found any plans for this method. Jim Markitell IRIS Technologies ************************************************************************** 6)From: ikkles@xchange.apana.org.au () Subject: Re: Hiding your IP Address Hi, gnu wrote: >One way is to setup a Proxy server and go through it to connect to the >internet. Micro$oft retails them for about $999. If that seems to steep >there are various beta versions available for download off the Internet. If >you would like a simpler way of doing this. Try http://www.anonymizer.com , >they will mask your IP address. But, be careful, nothing is full proof. I'm not quite sure I understand you.. where would this proxy server be setup? If you set it up on another machine owned by yourself, then that does not really help.. One way to alter your source IP address for telnet and ftp connections (perhaps others, I should investigate this more) is to scan until you find a prompt 'WinGate>' on port 23 of a host (the port 21 (ftp) prompt is different i think) WinGate is a proxy server of sorts for win NT, and people often leave them open for use by anyone, probably due to lack of configuration. Connecting through one of these machines will make your IP appear to be that of the Wingate machine, which can be very useful on occasion :) Ikkles PS we're getting Caller ID for the masses in Australia on 1st of December. Mark that day on your calendars :) ************************************************************************** 7)From: "J.D. Abolins" Subject: Re: Several questions >A thought: Has anyone ever noticed how much empty space is >inside a standard pc case? I don't suppose any computer illiterate >person would notice that the screws were not on the back if one wanted >to, say hide something in there? You know, like a bug or something? >With all the wires coming out of the back, I'd say no suspicions need >ever arise, eh? There are all kinds of possibilities with hiding things in electronic equipment. PCs, unlike consumer electronics such as radios and TVs, are so "heterogenous", cosnisting of components from different sources. It is easy to place an electronic device in a PC and make it look like it belongs. Hypothetically, one could even fashion a PC card that has only electrical pickup from the bus but contains a listening or other device. >Can anybody tell me why (in Florida anyway) it is illegal to >have very darkly tinted windows when it seems as though limo windows are >painted black? I don't have answer for the in practice exception for the limos but the reasoning for the FL law (and it works the same way in NJ) is that police officers doing traffic stops are at risk if they can't see into a vehicle. The officer could be approaching the vehicle while the occupants getting ready with weapons. Secondarily, the occupants could be stashing contraband. Limos might be allowed to have tinted passenger areas because the commercial services, in a way, screen the use of the limo. J.D. Abolins ************************************************************************** 8)From: BADCOFFEE@aol.com Subject: Need a "something" I have aproximately 26 pay phone numbers that I NEED to get locations on. This has been a SERIOUS pain in the *ss for me. 555-5454 is not giving up the locations Operator social engineering is very time consuming I have "locations" (towns).......pinpointing "exact" locations is where I am stumbling. Easier way??? Please....let me know. This is reasonably important. Social engineering tip: (very hard with CC's unless you have SS#) (Phone co, cable...easier) HI...I lost my bill Can I send a payment in a regular envelope? By the way...what is my account number so I can put it on my check. Have as much info on "yourself" as you can and it is not hard to get. From there...phone calls become easier...because you have your account number. :-) Steping stones....one stone at a time. NOT 2 stones..ONE. TIP number 2- (no disrespect) When man answers....Just hang up. Men are by nature suspicious of just about everything under the sun. SE's (social engineering) just seem to work out more favorably when a woman answers the phone. Augie "Im gonna hear it fro that last tip...Im sure" ************************************************************************** 9)From: BADCOFFEE@aol.com Subject: Re: Passwords >>To: Bad coffee, >>Augie I know this will probably bore you but may be of interest to us >>novices. Whoa! :-) This needs to be addressed at the bottom of this post. :-) >>>I am not all that into locks and stuff but I always read your >>posts for its insights and comments so I give you the credit for solving >>the following problem, kind of an osmosis thing I guess. If this was about the "Presets"......."Trace" passed this to me when we were playing with a Simplex lock that was given to him...because the original owner lost the code. The presets was his puppy, that made me say "Hmmmmm....pre sets" I've tried it many times with much sucess. I'll take the "minor" bow for posting it, allowing him to take the "major" bow. Now! For this "interest to us novices" thing that I heard at the top of this post... :-) (note: any time I pop a :-) <---this means that the tone is exactly that...with a smile) Novices eh? I am a 27 year old carpenter....that while making posts "here" on lockpicking,(which all started with me breaking a lock while installation andbeing forced to have to put it back together during a job) could not help but read other posts with WIDE eyes. This contractor's interest was peaked to such levels....that "this" list has dramatically impacted his life in interests. Soon to dramatically effect the lives of select helpless people within our society. Live it, sleep it, eat it, phone scams, photography, listening devices, CCTV, live feeds, surveillance, counter surve, and just downright Invading the privacy of any leach, scum, trash, pickle headed llama that plans or intends to cause harm to inocent people within our society with agressive and silent actions. This is my education: LIFE My life is construction...with a twist of "something else" Things that I thaught were useless like the MCI 1-800-444-3333 ANI readback 5 months ago......make my life a TON easier RIGHT NOW.. Pass it on. We stumble across things every day. Pass it to the list. Get feedback. See what is better. Useless to usefull. We ALL have a little bit of something that is a decent contribution to this list. Possibly....could save someones life one day. Little things that make the difference. Ill wrap this up. One day.....I called MCI to bitch about my bill. 30 second later I had this recorded voice give me my ANI (phone # that I was calling from). Whoa. PASS that number on, TEST it across the country via THIS list. ALL USA and Canada responded. It worked. So what? I am working on something very heavy right now. YESTERDAY, I had to physically get ANI's from a stetch of Boulevard that had close to 60 pay phones. The Tel Co ANI number (958 for NJ) DID NOT work with close to 45 of these payphones. If i didn't call MCI # that one day.....I would not be in good shape yesterday. Back to the education: REAL life experience. GET something good. PASS it on. :-) I am far from a genious. Like most people on this list....just an average guy....with an extreme interest in this field. BUT!!! Everything i come across that is of interest to this list is passed on :-) PS- For those that read the SAP story......A statue of SAP needs to be built in a nearby park. FLAWLESS operation. FLAWLESS. NO laws broken. NO toes steped on. Just some HARD assed detective work that would impress the best of Investigators out there (here). Common people....forming a bond..sharing "common sence"....seeing things that the other didn't see. Team work fabuloso. Fettucinni Alfreddo~ Investigative is the begining.......detective work is what you have when everything is on the table, and you have to decypher it to real evidence that can be "tested over and over again..with the same results". ADVISE: When it's detective work time...grab a few friends to help out. YOU people.....are the ones that make the difference. Augie :-) ************************************************************************** 10)From: "Duncan -" Subject: Intro Hi, I'm WaRP!. I live in Melbourne, Australia. I'm new to the list, so I'm sending a bit about myself. I'm a High School student and my interests are programming, digital art and image manipulation, encryption and now I'm starting to get into electronics a bit. OK, I hope now I can be of any assistance to anyone on the list. Cya WaRP!^Synthetic Organization ************************************************************************** 11)From: BADCOFFEE@aol.com Subject: Re: Pay your dues... John, Owe no no no no no! :-) It did not offend me in any way. YOU are right. Frustrating? YES. But then again...that is part of the dues process. If things came easy...life would not be any fun at all. Your complements were taken to heart and I do thank you. :-) Note: The internet...as much as I enjoy not having to directly speak to anyone sometimes and use the convenience of "e-mail"....will never replace human comunication. Reason: "Feeling". Could never get the "tone and feeling", "emotion" of something ....by reading and not hearing. John....One thing that I forgot to mention was that the original post. Your post...was so well presented that it did hit a soft spot. "The frustrations that we all face when trying to advance ourselves". We all have it. :-) Nothing is impossible Augie Begin public key block: ^&^$^B (^ )(%*%$^$ :-(I) *&^%$ (_I_) (*&^%(*%^$ ( . Y . ) &^%$^ :-)> &&^%%_^$#@ J*u*s*t &%$& M*a*k*i*n* KJJY&5% T*h*i*s *^%K*e*y 87658&^%& B*l*o*c*k*=90976*&6588 U*p* 98758&&^ C*a*u*s*e 865^#@%%$# *I* 7865D*oNt* H*a*vE8oihlliu787*a* &&^%R*E*a*l***&^&%7O*n*e* &^%^;:-) :-(I) End public Key block ************************************************************************** 12)From: SpyKing@thecodex.com Subject: Snoops, Sex and Videotape Found this and thought it of immense interest to the list. If these allegations are true it might have some bearing on the Spy Shop raids... http://www.insightmag.com INSIGHT MAGAZINE Vol. 13, No. 36 SNOOPS, SEX AND VIDEOTAPE By Tim W. Maier Intelligence sources say Clinton ordered bugging of his summit guests and that information obtained on international deals was provided through cutouts to enrich corporate friends of the DNC. It comes as no surprise to national-security specialists-except in the magnitude of the operation-that the FBI and other U.S. intelligence agencies conducted a sweeping electronic-espionage mission in the fall of 1993 during a summit meeting of the Asia-Pacific Economic Cooperation, or APEC, meeting in Seattle hosted by President Clinton. . . . . It also may come as no surprise to anyone who has been following the fund-raising scandals that information from this covert national-security operation-first reported by Insight last week-subsequently may have been leaked to politicos at the White House. They, in turn, are suspected of passing such classified data to Democratic National Committee, or DNC, officials and outside attorneys working for the Democratic Party-information of great importance to high-stakes private business deals with Asian countries. . . . . But what does come as a surprise is an apparent failure by federal law-enforcement and intelligence authorities to pursue allegations of kickbacks to FBI agents involved in the sweeping intelligence operation and separate allegations involving underage boys provided as prostitutes to visiting dignitaries attending the weeklong November conference of 15 Asia-Pacific nations. . . . . One reason for the alleged coverup- and that may be the only term appropriate, according to high officials in and out of government who claim direct and indirect knowledge of the APEC bugging-is that those said to have engaged in kickbacks involving thousands of dollars include FBI agents through suppliers with whom they worked to procure electronic audio- and video-surveillance equipment. . . . . As for the allegations of juvenile prostitution, sources who spoke to Insight on the condition they not be further identified say the reason these "crimes" were not pursued is that a probe would have exposed the Top Secret national-security operation. . . . . Put on the record, it is a different story. Official spokesmen for federal authorities variously decline comment or say they have no knowledge of any such enterprise. Seattle FBI spokes-man Ray Lauer says, "I am not aware of the operation." Secret Service spokesman James Mackin says, "We cannot provide you with any information." National Security Council, or NSC, spokesman P.J. Crowley says, "The White House declines comment." And other White House and DNC spokesmen say they know nothing. . . . . Julie Miller, a spokesman at FBI headquarters, says: "Unfortunately, we can't comment on this. I know that's not what you are looking for, but we can't comment. I'm sorry." When asked whether she denies such a surveillance operation occurred, Miller says: "No, I can't deny it. We can't comment." . . . . Robert Bucknam, the chief of staff for FBI Director Louis Freeh, refused to come to the phone when Insight called repeatedly. Ultimately, Bill Carter, a senior FBI spokesman, said that while he could not confirm or deny the existence of any national-security operation, he is very concerned about the allegations of crimes not being pursued involving prostitution and kickbacks. . . . . "To be honest, I don't know what you're talking about," said Carter. However, after several minutes of conversation, he said without hesitation that if any allegations of wrongdoing were forwarded to him he personally would see that it is "forwarded to the appropriate office.... We certainly would look into it." He added that "we take it very seriously" and said that while it is the policy of the FBI neither to confirm nor deny the existence of any national-security operation, he would respond with any available information. At press time, he had not. . . . . Told of the reactions of these spokesmen, Insight sources were appalled and amused. Those claiming direct knowledge say this is why they came to Insight, and that only action by the appropriate congressional committees and a federal grand jury can get to the bottom of allegations involving official crimes and a national-security operation gone awry. . . . . It was allegations of White House leaks of classified information to the DNC and/or its political operatives that led Insight to the allegations of kickbacks to FBI agents in the field and, in turn, to the information concerning alleged juvenile prostitution. . . . . Beyond the fact that such crimes may have been committed, some of those in government posts contacted by this magazine repeatedly raised the same hue and cry about how such a large-scale operation as the Seattle APEC espionage caper could have remained secret for so long with so many agencies involved. . . . . The reason for the long silence, according to sources who claim direct knowledge (and provided Insight with hard documentation on aspects of the operation) is that the assignment was presented as being for the good of the country. National security was at stake. Some claiming direct involvement say they are outraged and are willing to come forward and tell what they know under oath before a grand jury or congressional committee. Others, fearful of reprisal and career damage, will not step into the limelight but are deeply troubled by what they did-or what they did not do. . . . . Here then, told for the first time, is the story likely to provide an outline for any federal investigation. Undoubtedly there will be recriminations and finger-pointing, and where it leads has yet to be determined. But to start, federal investigators will have to secure copies of reported audio- and video-surveillance tapes secured by the FBI while monitoring downtown Seattle hotels in which visiting dignitaries stayed during the conclave. These tapes were collected in "real time" by surreptitious devices placed in private rooms of APEC officials. In one series of tapes, they show underage boys engaging in sexcapades with men in several rooms over a period of days. . . . . Despite the protestations by FBI agents who uncovered this exploitation, supervisors in the Seattle field office of the FBI-as well as supervisors and managers at FBI headquarters in Washington-refused to mount a criminal investigation or support local prosecution. Instead, according to one source, the FBI agents "were told to forget about it" because arresting the men involved with the children "would jeopardize the national-security mission." . . . . Frustrations were then compounded when intelligence officials learned about alleged political dissemination of classified information obtained covertly from the economic conference. According to sources with direct knowledge, and others who were told by senior U.S. officials, the espionage data were turned over to attorneys working closely with the DNC. Outraged intelligence professionals had nowhere to go because this had been a covert spy operation that in the eyes of Washington never existed. . . . . Intelligence sources describe the espionage operation as collecting raw economic data on Asian businesses through the FBI; the Customs Service; Naval Intelligence; the Air Force Office of Special Investigations; the National Security Agency, or NSA; and the NSC. . . . . . Some federal agents routinely accepted thousands of dollars in kickbacks from technical-equipment contractors during this operation that began about four months prior to the five-day summit in November. The FBI agents justified the kickbacks as a means to offset hundreds of hours of overtime that never were compensated. In one case, an agent received a check for $16,000, according to sources familiar with the scheme. Seattle FBI agents had been under attack from prior cases in which a grand jury investigated similar allegations but did not indict. According to a source close to that probe, it had the effect of forcing everyone "to keep cleaner books." As another intelligence source says, "I got rid of all my books." . . . . The FBI agents themselves were part of a clique called the "Footprinter's Club," which began as a social gathering among members of other federal agencies but grew into a means by which to share information. "They would learn how to do things off the books," a high official tells Insight, "but that's not the real crime here. These are good guys. They are doing what they are told needs to be done. They're not the bad guys. They were taking a few thousand dollars compared to the billions in contracts that were awarded. This Seattle operation is about keeping the people at the top in power politically." . . . . Such "honest graft" and other shenanigans angered some of the players involved in the espionage mission. They say they were astonished that the Clinton administration used the result of their spying for political purposes. In fact, these sources claim the classified information was not leaked but deliberately provided through a complex chain of agencies and operatives for the sole purpose of retaining political power. Much of the information was real-time data that went directly to the NSA via satellites, while other confidential information was taken by FBI couriers to the NSA. In total, 10,000 to 15,000 conversations were recorded. . . . . Some of that information was sifted by 20 to 30 NSA officials to and with coordination by a senior-level NSA manager who turned over this data to a senior NSC official and two mid-level NSC staffers. It was this screened information that then was provided to two West Coast law firms that had worked off the books for the DNC. The DNC was able to use that information to create business and financial opportunities and as part of fund-raising operations. . . . . The Clinton administration, in particular the late commerce secretary Ron Brown, allegedly used the information to arrange more-favorable credits and banking deals for Asian countries, according to intelligence sources. For example, the FBI-led APEC intelligence mission gleaned from the bugging operation that Vietnam desired at least two 737 freighter aircraft and passenger jets to promote tourism. An American entrepreneur had located used jets, but that deal was queered by the Clinton administration when it dangled a better one by offering lower interest payments for new planes. This, in turn, ingratiated the Clinton administration to the beneficiary countries and both they and the contractors allegedly were given reason to support the DNC. Says a source close to the Vietnam deal, "The Chinese got the benefits, the contracts, and this information was not coming from Chinese intelligence. It was American intelligence." . . . . Could such claims be true? Where is the line between conjecture and fact? In this odd and spooky world of intelligence gathering, sometimes it is difficult to tell. Based on a survey of players and documents, Insight has been able to confirm some-but not all-aspects of the suspected DNC "leaks" and business ventures previously reported. One reason is that most of the intelligence agents involved in the spy operation had no idea where the end product went. They all were told it was a national-security mission and that the surveillance was to protect the 15 or more leaders of nations attending the conference. Never mind that the targets were rarely the leaders of the nations, but their assistants and staffers, referred to as "secondary people," because that's who cut the deals. If the bugs were found, there was plausible denial: Any country could be responsible for the bugs; and the Secret Service was known to have cameras and videotape surrounding the conference for the protection of the president and other participants. . . . . The operation was huge-more than 300 locations were bugged, including a chartered boat Clinton and other national leaders used to visit Blake Island for a salmon feast and Indian dance at Tillicum Village. According to intelligence sources, the federal government privately contracted at least three security companies to provide additional equipment. Nearly $250,000 was spent on technical equipment alone, according to classified records reviewed by Insight. Such equipment is a rarity in Washington state because of severe criminal penalties imposed on those taping conversations without a two-party consent or court order. Most of the audio equipment was purchased from a New York City specialist. "Normally, no one touches that stuff, but it was for the FBI, so everyone figured it was okay," says an intelligence source with direct knowledge. . . . . The government paid for the sophisticated snooping devices through a series of agencies, including Customs, the FBI Finance Division in Fort Worth, the Justice Department, the Navy, the Treasury Department and through sham invoices and purchase orders supplied by hotels to purchase "special" cameras under a ruse that hotel security needed to be brought up to federal standards. Other payments came from personal accounts set up by FBI agents. "There was a lot of creative billing done," says an intelligence source familiar with the schemes. . . . . Payments often were made in cash, leaving few paper trails to follow. However, based on ledgers and other classified records reviewed by this magazine, individual cash payments ranged from $800 to $17,000. Treasury wrote some checks, but that was rare. Sources tell Insight that most of the cash transactions were made during the lunch hours. "They'd go out for lunch and come back with thousands of dollars. It was quite a lunch." . . . . In each case the FBI received "top-of-the-line" equipment. Prices for microphones could be as little as $100 to thousands of dollars for specialty directional mikes that fit in a salt shaker or zoom in on target locations. The sensitive listening devices sometimes were so tiny they could be placed inside someone's ear with a plastic tube resembling a hearing aid. Other devices were put into flowerpots, lamps, rental cars and hotel suites-including one on the top floor of the Hilton where there was a problem with a camera. Much of the equipment was wireless and handheld. The monitoring stations usually were inside the Secret Service perimeter where cameras and equipment already were in place. "The Secret Service was not part of the operation but was probably aware of it," says an intelligence source. In some cases, monitoring stations were at naval facilities-and much of the information was real-time data bouncing from satellite to satellite to the NSA. After the convention the FBI retrieved many of the bugs, and recently some of the same equipment was spotted at a Seattle Drug Enforcement Agency office. . . . . Now, nearly four years after the operation, there is a growing resentment among those who participated, as well as a common thread of distrust. As one intelligence source puts it, "These were good guys, doing what they thought was right in the name of national security." ************************************************************************** 13)From: SpyKing@thecodex.com Subject: DID CLINTON BUG CONCLAVE FOR CASH? http://www.insightmag.com INSIGHT MAGAZINE DID CLINTON BUG CONCLAVE FOR CASH? By Timothy W. Maier Imagine sitting in your room, shoes kicked off and your necktie loosened. It's been a long, hard day and now, sipping coffee, you're talking to a colleague who is fixing a drink at the mini-bar. At the same time, you're on the phone sharing information about the conference you've just attended. Sounds pretty typical, doesn't it? Okay, now continue to imagine that just a few floors below your hotel room there's a secret command center filled with federal law-enforcement officers, intelligence agents and military personnel watching and listening to your every move and conversation. Such a scenario might make sense if you were a mobster or a spy or a terrorist on whom the government needs to conduct such surveillance to protect the country from crime, espionage, or acts of terror. But what if this scene--extended to hundreds of hotel suites and meeting rooms in a major coastal city--occurred during an international conference of world leaders hosted by the president of the United States of America? Insight has been told that this is exactly what happened in 1993 in Seattle during a five-day Asia-Pacific Economic Cooperation, or APEC, conference, in which leaders of about 15 nations gathered to discuss the future of trade and security issues involving the United States and our Pacific partners. "There were bugs placed in over 300 locations," says a high-level source with detailed knowledge about the extraordinary top-secret operation run by the FBI in conjunction with intelligence personnel from the National Security Agency, or NSA, and the Office of Naval Intelligence, among many others. "Just about every single room was bugged," according to the high-level source who spoke to Insight on condition of anonymity. "Vehicles were bugged," as were telephones and conference centers. Even a charter-boat trip arranged by the president to Blake Island, a 475-acre state park in the Puget Sound, was monitored by agents with electronic-listening devices. The top-secret bugging operation was massive and well-coordinated. And the only reason it has come to light is because of concerns raised by high-level sources within federal law-enforcement and intelligence circles that the operation was compromised by politicians--including mid- and senior-level White House aides--either on behalf of or in support of President Clinton and major donor-friends who helped him and the Democratic National Committee, or DNC, raise money. A quid pro quo? If the allegations of a massive, secret eavesdropping operation and leaks of information from that project by presidential aides prove true, then the White House will have a lot of explaining to do. So will the DNC and people involved in the reported clandestine plot who subsequently gained knowledge of suspected White House leaks but chose not to launch a national-security inquiry. The FBI was not happy with many aspects of the operation, according to the sources--especially so when agents discovered the leaks. Complaints were brought within the bureau but, apparently, got nowhere. That is, until now. The White House and the DNC deny the charges, let alone admit that such a secret intelligence operation was conducted against the heads of government gathered for the trade conference. The NSA and the National Security Council, or NSC, won't respond to questions about such an operation or any similar operation, Insight sources in and out of government have confirmed. Neither will the FBI nor the Defense Department comment. The CIA and other intelligence agencies are mum, too. Besides the revelation of the Seattle operation, Insight's sources say that information collected by the project's "monitors" was shared with people outside of national-security circles and involved proprietary data on oil and hydroelectric deals in Asia, including Vietnam. "I was told that information was passed to attorneys working for the DNC" who were involved directly and indirectly with large business ventures overseas, says one of the sources, who adds that one of the couriers was alleged to be a mid-level White House aide. Such startling revelations about domestic intelligence-gathering and allegations of leaks for political purposes certainly will become a cause célèbre for investigators now probing campaign fund-raising abuses by the DNC and the White House. "You get me the name of a person who will talk about this to us," says one senior congressional investigator contacted by Insight, and Congress will get to the bottom of it. Insight's sources say that besides worry about the damage caused by one of the largest eavesdropping operations mounted on American soil in U.S. history--it allegedly included video, audio and telecommunications equipment--U.S. intelligence experts also worry about the effects potential leaks of private conversations by heads of state and top ministers may have had on business and political deals around the globe. Beyond the tawdry politicizing of this alleged operation, the very nature of such an intelligence undertaking on American soil comes as no great surprise. The surprise is in the detailed information about the clandestine operation that reached Insight. "No reputable government official would discuss it" with you, an astonished senior intelligence official said privately when asked to comment. But clandestine snooping on a grand scale is familiar stuff in the Washington area. It is a widely known secret that the NSA has a system known as ECHELON by which the government can--and routinely does-- intercept E-mail, fax, telex and telephone communications. Designed primarily fornonmilitary targets--including governments, businesses and individuals--the system steals communications internationally, says John Pike, the director of cyberstrategy projects at the Washington-based Federation of American Scientists. "I assume that it is all being monitored with Keyword scanning," Pike says. "They throw away almost all of the stuff they collect. But they have that watch list for names and they are working on voice-recognition software and that's going to be the big thing in the future." Such technology is used jointly by NSA and its allies as a "creative" means to avoid court orders, Pike claims. In 1992, a year before the alleged bugging of the Seattle conference, a group of agents for GCHQ, the British counterpart of the NSA, blasted ECHELON. "We feel we can no longer remain silent regarding that which we regard to be gross malpractice and negligence within the establishment in which we operate," the intelligence agents told the London Observer. The British agents claimed the NSA even helped intercept communications from Amnesty International and Christian Aid. Asked about ECHELON, the NSA says, "We have no information to provide." Given all this snooping, there is little wonder that a worldwide market has developed for impenetrable encryption, which also could curb identity theft--stealing Social Security numbers and credit cards. "It's the reason I can't make any money on my World Wide Web site," Pike says. "People, for better or worse, don't trust the Internet. What we need is strong encryption available to everybody. Yes, it's going to cramp the style of the folks at the Puzzle Palace [NSA], but a life more difficult at NSA means life is easier for the rest of the planet. The benefits of promoting global Internet commerce outweigh the harm to the NSA." But, of course, exporting sophisticated encryption technology is prohibited, and everything bureaucratically possible is being done to restrict its widespread dissemination in the United States and overseas. Mike Godwin, an attorney with the California-based Electronic Frontier Foundation, says the government is afraid. "Encryption is frightening to the government because it makes transactions hard to trace. We have the technology to shift the balance back to the 19th century, where you could be certain someone was not listening outside of your house. But you can't be certain today." Indeed you can't. Apparently not even at an international conference of world leaders hosted on American soil by the president of the United States. Worse still, under this administration it may even be that the electronic pockets of America's top security agencies are not safe from gumshoe counter-spies who, for reasons of politics or money, deliver vital information gained from snooping and otherwise to political operatives eager to trade it for contributions from international corporate operators or whomever is paying the most today. It is because of such concerns that bipartisan members of Congress-- including nervous Democrats--publicly and privately are stepping up their demands for an independent council appointment to probe campaign abuses. It seems likely that more calls for probes soon will be heard. And questions about what the FBI knows, as well as the Secret Service, may lead to yet more astonishing answers. ************************************************************************** 14)From: Rodger Schultz (pecksnif@erols.com) Subject: Boy prostitutes used in eavesdropping case Timothy Maier, appearing on Jim Quinn's radio program (September 9) added the following to his breaking story Did Clinton Bug Conclave for Cash? (although, so far, the media have ignored it.) Video cameras confirm that young, under age, boys were supplied for the 'enjoyment' of aides and staffers attending the APEC conference. "Several rooms were set aside in one hotel," said Maier. Quinn asked if any foreign heads of state used "these amenities." Maier said no. The boys were American; the supplier, or "pimp," has thus far not been identified. Nor has the federal judge who okayed the eavesdroppings. It was the use of these boy prostitutes and evidence that intercepted conversations were being fed to the DNC that caused some agents to blow the whistle about this operation. Initially, the FBI, Naval Intel, and other agencies involved, thought the surveillance was part of a Secret Service operation to protect visiting dignitaries. When the Seattle FBI office received complaints about the boy prostitutes, they responded, "ignore it - it's a national security matter." Not only were hotel rooms bugged, but so were restaurants, rental cars, and a boat used by President Clinton to go to Blake (ph) Island. Maier also revealed that so many listening devices were needed that intel agents used three commercial companies to supply them - and were 'kicked back' part of the purchase price. Maier said all kinds of creative billing was used to cover-up the kick-backs, including the use of personal checks, cash and some agents billing each other. Why was this operation mounted? According to Maier, this was real time information about some of the most delicate " real wants and wishes" of countries attending. The info was relayed back to the NSA via satellite or courier. From there it was sent to the National Security Council, where there was a leak. The information was sent to a group of west coast lawyers who were working for the DNC "off the books." This information was invaluable to an administration and the DNC which was in desperate need for cash. In one instance, "we used American intelligence agencies to screw up an American deal in favor of the Chinese," said Maier. Clinton's use of our security apparatus to eavesdrop on private citizens raises, again, the question: Did the Martins really intercept that phone call to Newt? I don't think so. At any rate, as this story develops it may - finally - alert sleeping Americans to the kind of President they have. ************************************************************************** 15)From: travlinman@hotmail.com Subject: Reverse engineering of software? I have a few ideas for software not currently available. My idea entails merging two or more current software packages (windows based)to perform a third and fourth function. Is there a program I could use to copy these current software packages, open them up, make several changes to their structure and save the final product? Any help would be appreciated. P.S. I'm not looking to counterfeit or pirate the software but to see how it was written in order to create my own idea. ************************************************************************** 16)From: "Natalie Pratt" Subject: Invite the readers of this list I have only been reading this list a short time, and I have already found it to be fascinating! One thing that is apparent is that the writers to this list come from web sites that I find to be very informative. I would therefore like to take this opportunity to invite the readers of this list to register your web site at our safety and security resource center. We offer numerous categories that include surveillance, private investigators, investigative, products, intelligence, etc. If your site fits under these (or other safety or security) categories, please feel free to register. You may do so at: http://www.fightcrime.com/links.htm Natalie Pratt, President Reliant Safety and Security reliant@execpc.com http://www.fightcrime.com PHONE: 414-231-7860 TOLLFREE: 800-414-1560 FAX: 414-232-0261 Over 250 products online, if we don't have it we will find it! ************************************************************************** 17)From: zerohero@juno.com (john j smith) Subject: What gives? I just got a long distance call from a friend in DC....I live in Florida...his phone # came through on my caller id box! I didn't think long distance could come through, what gives? zh ************************************************************************** 18)From: Mutter Subject: Re: callerid/getting unlisted #s zerohero, > http://www.openix.com/-mutter........wasn't there. ^that should be a tilda (~), that little squiggly thing typically below the escape key (see signature). > Can anybody tell me why (in Florida anyway) it is illegal to > have very darkly tinted windows when it seems as though limo windows are > painted black? because in today's society, anonymity is for the rich :) > 13)From: the mechanic > Subject: Re: Let's talk key stroke loggers > > %Another note: Caller ID users. Ever think about running a second unit > %somplace on the line and comparing phone numbers of the 2 units? hmmmmmm :-) > > hey augie, i have done that, one was a 35number mem, but with all the > nifty gadgets, like name, number, time, blah blah blah, then the other was > just name with 300 mem, so i kept them both on, one for info, and the > other for storage. I got weird numbers =) fun fun fun > > -mechanic > -mechanic.is@mindless.com > -http://roo.unixnet.org/~dms mechanic, explain to me how you were able to get two sets of DIFFERENT numbers from the same line? The same info is being sent down the line, correct? I meant to post when augie originally posted the idea that doing so would be useless for trying to catch people cloaking their number in some way (which I assume was the purpose) because no matter how far apart on the line you seperate the two caller id's you're still going to get the same callerid info your switch passes to you. pointless. > I have a friend that had her phone number changed to an unlisted number 3 > different times and all three times this number has been found by people she > did not want to have it, they even got her new address! > > How can these private investigators, info brokers get these numbers? A lot of people will tell you "Yeah man, 'social engineer' the buisness office. Those people are stupid!@#" but it's usually easier to get it from other places that are required to have your number. i.e. work : "Hello, is Mr.X there? ... No? Well, it's really important that I reach him... Is there a number I can reach him at?" Anyone who witnessed the social engineering panel at HOPE knows what I mean ... they got all kinds of info out of a blockbuster employee (right down to the last video a person rented). The only foolproof way to keep someone from getting your number is not to own a phone. - M u t t e r Ed. root zine (http://www.openix.com/~mutter) mutter@openix.com ************************************************************************** 19)From: Phreaker Subject: Key Escrow None of the advocates of key escrow ever seem to note that law enforcement using key escrow has not only access to your current messages but ANY messages you have ever sent using that particular key. Does anyone really believe we can trust them not to read any messages not covered by a warrant? If you do, I have a second passport to sell you. I am totally against key escrow in any form and this is just another reason not to have it. P Pursuant to US Code, Title 47, Chapter 5, Subchapter II, '227, any and all nonsolicited commercial E-mail sent to this address is subject to a download and archival fee in the amount of $500 US. E-mailing denotes acceptance of these terms. ************************************************************************** 20)From: Perillo@DOCKMASTER.NCSC.MIL Subject: CIA using Information Warfare The Washington Post, Sunday 14-Sep-1997, "CIA turns to Boutique Operations, Covert Action against Terrorism, Drugs, Arms", by Walter Pincus, page A6, reported that the CIA informed the U.S. congress in May that IW has been used as a cost effective and risk reducing replacement for some covert action and paramilitary operations. "Computer hacker technology has been used to disrupt international money transfers and other financial activities of Arab businessmen who support suspected terrorists." This seems to contradict some statements made in the book "CyberWar: Security, Strategy and Conflict in the Information Age", edited by Col. Alan D. Campen, USAF (Ret.), Douglas H. Dearth and R. Thomas Goodden, 1996, in which some authors state that the U.S. is not using IW effectively. Obviously the "nuts and bolts" Information Warfare (IW) should be emphasized with an appreciation for increased funding in both defensive (InfoSec) and offensive IW, in terms of Computers, Networks, Telecommunications, and Information Systems Technologies (IST) _______________________________________________________________________ Robert J. Perillo Jr. Principal Software Engineer Certified Computing Professional (CCP) Perillo @ dockmaster.ncsc.mil Richmond, VA USA Disclaimer: All comments or statements are solely my own, and do not reflect or represent any organization's that I may be associated with. ************************************************************************** 21)From: "Betty G.O'Hearn" Subject: Re: The contradictory nature of your web site I agree with the Moderator. Education is the best vehicle we can utilize. This type of information and education is OPEN SOURCE INTELLIGENCE. The best weapons we have are ones that we arm ourselves-- via education and sharing that knowledge. Betty O'Hearn Assistant to Mr. Winn Schwartau 2000 West Bay Drive #3 Largo, FL 33770 813-518-0600 Voice 813-518-0602 FAX http://www.infowar.com http://www.info-sec.com ************************************************************************** Who are you? What's your specialty and/or interest? Let us know about your company... What would you like to see on the list? Post it. Let us know... Do you have something to contribute? We'd like to hear it... We want to know EVERYTHING and ANYTHING about eavesdropping, surveillance, countersurveillance & privacy related technology, etc... Remember: who, what, where, when, how & why... we want ALL the details... Do you have a question? Post it... A little free time? Help a member... With the INCREDIBLE brain power on this list, someone should have the answer ;-) P.S. Don't be a LURKER... Members take the time to post info for us all... give something back... Don't just take... Your input/knowledge is valued... ************************************************************************** Send Postings to: spyking@con2.com with "Post" in subject field with subject ************************************************************************** Subscribe to: spyking@con2.com In the subject field type: subscribe-surveillance list e-mail address ************************************************************************** Unsubscribe to: spyking@con2.com In the subject field type: unsubscribe-surveillance list e-mail address ************************************************************************** ...The Simple Rules of the Surveillance List... The Surveillance List Owners may Reject any posts that are/contain: 1) Info Unrelated to Eavesdropping, Surveillance or Privacy technology... 2) Flames or Negative posts... 3) E-Signatures that are considered excessive... 4) Advertisements not DIRECTLY related to the list topics... 5) Attached Files... 6) Oversized Posts... (May be edited to save room) **************************************************************************** This publication is copyrighted and is protected by U.S. and International copyright law. The information transmitted on this list may not be reproduced, reposted or forwarded to any non-list member without expressed written permission of the List Owner. Violation of U.S. copyright law is a criminal and civil offense... **************************************************************************** The Surveillance List is Moderated by SpyKing@thecodex.com The List Owner will make EVERY effort to protect subscribers from spam... Copyright 1996, 1997 Codex Publishing Inc., All Rights Reserved... **************************************************************************** ****************************************************************************** The Official Newsletter of W.A.S.P. The World Association of Surveillance Professionals http://www.thecodex.com/wasp.html ****************************************************************************** Vol.Two Issue #199 The Surveillance List Sept.17,1997 Over 2800+ Members Worldwide Representing 53 different countries List Chat at: http://www.thecodex.com/chat.html ****************************************************************************** While we STILL feel there is NO SUCH THING as a stupid question... We suggest the newer list members AND the technically challenged browse through the FAQ before posting a question... Surveillance List Pseudo FAQ at: http://www.thecodex.com/faq.html P.S. If you have something to add to the FAQ, let us know... ****************************************************************************** IN THIS ISSUE... ****************************************************************************** 01) High-Tech Sleuths Find Private Facts Online 02) Passenger Manifest Needed 03) DEA Agents Accuse CIA of Tapping Phones 04) Re: where would this proxy server be setup? 05) Digital Mobile Phone FAQ 06) Ditto Box - device for eavesdropping and recording 07) Re: Reverse Engineering Software 08) Building In Big Brother 09) Norton Safe on the Web 10) Any private data via Satellite dish? Intercepting Faxes via scanner? 11) Re: Social Engineering Tip 12) Re: A few privacy-related questions, if you don't mind 13) Re: Social engineering 14) Re: Coming soon... 15) Is there any way 16) Welcome 17) Hacker's Handbook 18) Contact/resource 19) Directory of Chief Executive Officers ****************************************************************************** DON'T BE A LURKER.... GET INVOLVED... YOU ARE A MEMBER... MAKE THE MOST OF IT ****************************************************************************** 1)From: SpyKing@thecodex.com Subject: High-Tech Sleuths Find Private Facts Online This article is from the New York Times. It is a must read for anyone interested in privacy... High-Tech Sleuths Find Private Facts Online By NINA BERNSTEIN On the night of Oct. 8, 1992, the towering pipes of the Texaco refinery in Wilmington, Calif., vented a sudden rise in pressure. Then the familiar hiss became a deafening screech, and a fiery explosion sent hundreds fleeing in panic from the poor Hispanic community that lies in the refinery's shadow. The fire burned for three days, filling the air withchemical fumes as far as five miles away. Eventually more than 4,700 property-damage claims and 14,000 claims of personal injury were filed against Texaco. Soon after the blast, Texaco hired a private detective to investigate. But his mission was not to investigate the causes of the explosion; it was to investigate the claimants and lawyers whose class-action lawsuits threatened to cost Texaco millions of dollars in damages. The nearly five-year investigation the detective unleashed offers a powerful illustration of the world of computer technology and information marketing that has turned private detectives into a vanguard of privacy invasion. Through commercial data bases unknown to most citizens, law-enforcement computer files that are supposed to be off limits to civilians, electronic surveillance equipment readily sold in spy shops, and simple telephone scams common in the information underground, Texaco's private eye quickly amassed sensitive knowledge about dozens of people involved in the explosion claims, according to court documents, interviews and sworn statements. One claimant, a 23-year-old mother named Rossana Rivera, was frightened to learn that the investigator had generated a five-page computer print-out from her name alone. The private eye had found her Social Security number, date of birth, every address where she had ever lived, the names and telephone numbers of past and present neighbors, even the number of bedrooms in a house she had inherited, her welfare history, and the work histories of her children's fathers. And his probe unearthed two delinquent traffic tickets, which the investigator then used to threaten her with arrest if she did not provide -- or fabricate -- damaging information about lawyers in the case, according to sworn statements she gave last year. At a time of growing public alarm over the erosion of privacy by technology and data commerce, electronic dossiers have become the common currency of computer-age sleuths, and a semiunderground information market offers them much more: private telephone records, credit-card bills, airline travel records, even medical histories. Web sites with names like Dig Dirt and WeSpy4U sell unlisted telephone numbers for $69 and bank-account numbers for $55, and they offer to trace a beeper number to the owner's address for $59, though these searches do not always work. Finding out a person's salary costs $75, and a list of someone's stocks, bonds and mutual funds is $200 from one New Jersey information broker who offers volume discounts. Private investigators have always followed the footsteps of people's personal lives. But in the past five years the growing power of computers and the expansion of commercial data bases have made it quicker, cheaper and easier than ever for private eyes to collect individualized information that their gumshoe predecessors could not piece together even through weeks of dogged surveillance and research. The result is more time, money and pressure to produce nonpublic information from a thriving gray-to-black market in purloined privacy. "The amount of information available at the push of a button has just revolutionized the whole private-investigation industry," said Jason Rowe, an investigator who frequently works on behalf of plaintiffs against large corporations. Even to the sleuths who benefit, he added, "it's a little bit frightening." "Everything you want to know is for sale," Rowe said flatly. "It's a question of how much risk you want to take and what your personal morals are." Cases that highlight privacy intrusion by private investigators include some that have been well publicized, like the undercover operation that Wackenhut Corp., a worldwide security company, mounted in the early 1990s against Charles Hamel. Hamel, an oil-industry critic, had given Congress and the media internal evidence of corrosion in the Trans-Alaska Pipeline, run by Alyeska Pipeline Service Co. To identify his sources and try to engineer his arrest, investigators working for Alyeska ran a computer search of his telephone records and those of Alyeska employees and obtained a copy of a computer program he was using to compile evidence. Other cases, culled from legal records and more than 100 interviews around the United States, have received little or no public attention. Food Lion Corp., for example, this year won damages for trespass after ABC News reporters secured jobs at its stores to film a report about sales of spoiled meat. But unpublicized is the fact that the food company itself, through private investigators working for its law firm -- Akin, Gump, Strauss, Hauer & Feld -- secretly acquired the private telephone records and credit information of former employees and potential witnesses, court records show. In the Texaco case, one of the claimants' lawyers, Duffy Buchanan, and residents of Wilmington have filed separate lawsuits accusing the private investigator, Christopher Coombs, and his corporate backers of violating their privacy and other civil rights as part of a strategy to sabotage the explosion claims. Buchanan's complaint charges that Coombs, who reported directly to Texaco's law firm, Dewey Ballantine, illegally bugged his law office, enlisted or extorted false accusations against him, stole a computer list of claimants and maliciously engineered his indictment for an obscure insurance-code violation, forcing him out of the explosion litigation. By the time Buchanan was acquitted in March, his career and the remaining class-action lawsuits were in shambles. Some claims have been dropped or settled; about 9,000 are still outstanding, including cases as diverse as a woman who needed a lung transplant and blamed the explosion, and children who complained of burst eardrums, worsened asthma or emotional distress. Coombs and Dewey Ballantine declined to discuss the case. A spokeswoman for Texaco, Barbara Kornylo, said she could not comment on Coombs, adding, "Texaco believes that the lawsuit that was brought against the company by Buchanan is frivolous and without merit." Because the claimants' civil-rights action was filed only last Friday, the company has not yet reviewed it. In earlier court papers, Texaco maintained that it had hired the private eye in self-defense, to check out suspicions of insurance fraud after widespread improprieties in the way claimants were signed up before Buchanan joined the case, such as door-to-door canvassing by paralegals. Company lawyers also say that the private investigator is protected from Buchanan's suit because Coombs had probable cause to believe that Buchanan had violated the law, and he told the authorities. The Information Industry Buying Public Records and Private Facts The Texaco case points to far-reaching changes driving the private investigations industry, and to the rise of a new kind of information combat, waged with vast computer arsenals of personal data. Cash-strapped governments are selling digitized public records to a new generation of commercial database companies. Illinois, for example, now makes $10 million a year from the sale of public records, and Rhode Island prices its motor-vehicle records alone at $9.7 million. Other records that are for sale range from real-estate filings that list the number of bedrooms in a house and its last sale price, to divorces and bankruptcies. Thus, personal details that used to lie in musty courthouse files -- from financial holdings to a messy divorce or a youthful bout with the law -- can now be uncovered from almost any place in the country by means of a computer. Companies like DBT-Online, started in 1992, constantly collect such data from across the country and use powerful new software to mix and match the scattered bits of information. With a product called "Faces of the Nation," for example, DBT-Online allows its 20,000 users -- private eyes, insurance agents, bill collectors and journalists -- to type in a name and get back the matching Social Security number, date of birth and telephone number in less than three minutes, for about $1.50, billed to a subscriber account. For a few minutes and a few dollars more, the computer screen fills with other personal details: past and current addresses, names and telephone numbers of neighbors, names and Social Security numbers of relatives, in-laws and business associates, civil judgments and property-tax filings. Governments are also sharing more confidential data with companies that now manage child-support enforcement, prisons and welfare benefits. Thousands of former police officers, retired agents of the FBI and former Cold War spies fill the ranks of an estimated 65,000 private investigators, helping to create an old-buddy network that makes access to other restricted government computer data, such as arrest records, increasingly commonplace. And a growing cadre of information brokers are using deception, bribery or computer hacking to raid more private stockpiles of data from employee computer terminals in telephone companies, banks and insurance offices. The biggest customers in this marketplace include companies locked in hardball litigation or high-stakes business conflicts that are looking for ammunition against their adversaries -- or just screening job applicants. "The buying and selling of information is just a huge business," said Charles McKenna, a deputy U.S. attorney in New Jersey who in the early 1990s prosecuted information brokers and government employees who sold data from Social Security Administration computers and the National Crime Information Computer database. Once mainly the province of retired police officers in tiny offices, the investigations industry is now a booming global business swept by mergers and acquisitions, with revenue projected to reach $4.6 billion by the year 2000, or nearly quintuple 1980 levels. Practitioners range from large, blue-chip business-investigation firms like Kroll Associates to upstart Web sites that offer anybody's secrets at bargain rates. They all benefit from huge loopholes in the nation's patchwork privacy laws that make the lines between legal and illicit data hard to discern -- or easy to ignore -- by the time a piece of information has passed through several hands. "That's why lawyers hire private investigators -- it's willful blindness on their part," McKenna said. "They don't want to be directly involved in the chain; that's why they're willing to pay so much." Information, like money, can be laundered. In the Food Lion case, for example, lawyers from its Washington law firm admitted that private telephone records had been secured through an information broker hired by Stadler Co., its private investigation agency in Houston. But everyone denied knowing how it had been done. One of the victims, Larry Cordts, a former manager for Food Lion with an age-discrimination complaint, had a pretty good idea. A stranger impersonating him had called AT&T from Texas, saying he was out of town for several weeks and needed a copy of his telephone bills. Checking customer-service records, AT&T discovered similar ruses had been used twice before to fraudulently obtain Cordts' phone records. Even if the targets of such scrutiny find out, redress is an uphill fight under laws that sometimes seem better designed to protect the privacy of corporations than of individuals. In the Food Lion case, Cordts' lawyer had been shocked to discover Stadler's name on her own credit report. When she called the credit bureau, she wrote in an affidavit, "I was told that Stadler accessed my credit file for the stated reason that I had applied for a mortgage with Stadler Company." She had not. But when she and ABC's lawyers tried to learn more, the food company said the matter was confidential under lawyer-client privilege. Though the presiding magistrate said he was "gravely concerned" about the telephone records, he said he had no jurisdiction. As for the credit inquiries, he accepted Food Lion's contention that Stadler had not obtained actual credit-history information on witnesses, but "only 'header' information consisting of name, address, Social Security number, employment and the like." The revolution in information technology can also arm David against Goliath, helping ordinary people collect judgments, track deadbeat parents, or uncover political corruption. The press itself has used commercial data bases with names like People Finder and Auto Track to inform the public, whether by tracing campaign contributors involved in finance scandals, or by locating relatives of people killed in the Oklahoma City bombing. But critics see public perils in a private investigations industry that can simultaneously leverage ties to law enforcement and tap an underground market in illicit information on behalf of clients as diverse as spurned lovers and the lawyers of powerful corporations. In the Texaco case, the private investigator, Coombs, hired moonlighting police officers who surreptitiously tapped into police data bases full of unverified arrest records, and used the information to intimidate claimants who came to collect modest settlement checks, according to sworn statements by Roy Alvarado and Rosanna Perez, residents who once worked for the private eye but are now suing him. Relying largely on information generated by Coombs, investigators from the Los Angeles district attorney's office seized more than 2,000 claimant medical records and legal files from the offices and homes of six plaintiffs' lawyers in a search for insurance fraud, court records show. They found no evidence to prosecute, but the seizures delayed many of the explosion claims to the point of derailment. A halting legal process still has not forced Texaco to answer plaintiffs' questions about the explosion, which occurred three months after the company ignored official warnings to inspect its pipes for corrosion that had caused three refinery fires elsewhere, state inspectors found. "They were so far in trying to dig up dirt on people, it got to the point where I could not go to sleep at night," Alvarado said. "Wow, if they can do this to an attorney, can you imagine what they can do to a simple person?" The Privacy Thief Posing as Another to Get Information Allen Schweitzer was earning $1,000 a day as an information broker when he was arrested in December 1991 in a national investigation that was billed as a major blow for privacy. But from Boulder, Colo., the so-called godfather of information brokerage sees a business that is bigger and bolder than ever. As enormous amounts of personal detail have become legally available at the push of a button, there is even greater competition for the more private kind of data. "Now it isn't just retired FBI agents or ex-cops," said Schweitzer, who pleaded guilty to buying earnings information from a Social Security Administration data bank. "Now every Tom, Dick and Harry has a Web page offering this stuff." The Web page of Advanced Research Inc. advertises long-distance toll records, cellular-call records, bank-account balances, credit-card activity, and up to 10 years of medical-treatment history. In a mailing to private investigators, the same company quotes prices that range from $80 for someone's long-distance records to $400 for 10 years of medical-treatment history. Where does such information come from? "I'm not at liberty to say," said Mike Martin, the private investigator who operates Advanced Research out of a post office box in Parsippany, N.J. But Schweitzer said he has little doubt about its origins. Armed with little more than a stranger's Social Security number, an unscrupulous information broker can assume that stranger's identity in a call to one of the clerks who sit at computers all over the United States. Fed a plausible story and the key information to verify identity, Schweitzer said, helpful clerks will read information aloud. In the trade, this is known as "pretexting," and it is a major source of illicitly gained information bought and resold by private eyes, some far removed from the source. "I can get anything I want to know about you by being you," said Schweitzer, who served six months in prison and says he now has a legitimate job as a telecommunications salesman. Before, one of Schweitzer's favorite ploys was to call the customer-service line at a credit-card company with a sheepish tale about a domestic tiff. His wife had left home with his credit card 10 days ago, he would say, after identifying himself by his target's name. He did not want to report the card stolen, but would like to know if she was sending him to the poorhouse. Almost invariably, he said, his target's latest transactions would then be read aloud. Schweitzer estimates that 1,000 private eyes, most of them former law-enforcement officers, requested and resold what he acquired, with the price increasing as much as fivefold. Schweitzer also supplied supermarket tabloids with the unlisted numbers, telephone records and private retreats of celebrities like Oprah Winfrey and Julia Roberts. The government, Schweitzer contends, is not serious about stopping the underground information market. "They've never gone after a single corporate client," he complained. "As long as corporate America continues to ask for it and pay for it, there will be people willing to get it." The Corporate Link Companies Rely on Data Moles At the upper end of a business that still abounds in solo practitioners with dubious credentials are large agencies that have helped make private investigation an accepted feature of corporate life. As a kind of pre-emptive paranoia escalates, pin-striped sleuths in thickly carpeted suites package their keyboard skills for foreign governments, global corporations and national politicians. In a 1997 New Year's letter to "friends and clients" of Investigative Group International Inc., one of the best-connected Washington investigative agencies, the chairman, Terry Lenzner, noted "increasing interest by clients seeking to protect themselves from negative campaigns," including those by "so-called 'whistle-blowers,"' unions and regulatory agencies. An IGI division called "Campaign Facts Inc.," created two years ago, offers not only to dig for dirt on an adversary, but to find out what damaging information political enemies -- or nosy reporters -- might discover about clients and their associates. The promotion brochure features veteran investigative reporters who now work for IGI. Their role adds a new dimension to the long-revolving door between law enforcement and private investigations. IGI's staff, for example, includes former top officials of the Drug Enforcement Administration, the FBI and Germany's national police force. Meanwhile, Ray Kelly, who had been chief of police in New York City before joining IGI to run its New York operations, now heads the Secret Service, the Bureau of Customs and the Bureau of Alcohol, Tobacco and Firearms. Such ties, along with IGI's assignment from the Democratic National Committee to probe its campaign-finance mess, inspire some critics to liken it to President Clinton's private CIA -- a characterization that Lenzner, who was a lawyer for the Senate Watergate committee, vigorously rejects. But the impact of the private investigations revolution is being felt at the other end of the spectrum, too. In divorce cases, for example, local telephone records are so useful for ferreting out secret lovers and hidden assets that it is now "de rigeur" to hire a private investigator to get them, a veteran divorce lawyer in New York City said, speaking on the condition of anonymity. Insurance claimants are increasingly likely to be scrutinized electronically, first through a pooled industry data base of billions of claim records that can be searched for patterns suggesting fraud, and then through video surveillance, which is more affordable now that computerized witness location and background checks are quick and cheap. Such information, including medical-treatment details, is increasingly traded between insurance-fraud investigators and law-enforcement agents, who have granted the National Insurance Crime Bureau, an insurance industry consortium, online access to the raw arrest data contained in the National Crime Information Computer. And investigators willing to skirt the law can buy telephone-tapping devices at swap meets or under the counter, including a bug that can be attached to the telephone line outside the target's house that will transmit telephone conversations to a receiver in a car radio nearby. Twenty-one Spy Factory stores in 12 states were shut down in 1995 for illegally importing and selling such electronic eavesdropping equipment, but similar listening devices are widely available. "The days of protecting your privacy are over," said Al Zaretz, an investigator in New York, who once obtained a man's photograph for a woman who wanted to use it in a Santeria ceremony. "There's nothing you can't find out. If you can't buy the information, you find out enough about the other person where you extort the rest of the information out of them." The Investigator Training the Lens on the Private Eye In a high-rise Santa Monica, Calif., law office with a sweeping view of the Pacific Ocean, lawyers for Texaco and for Christopher Coombs gathered last month to videotape the deposition of Duffy Buchanan in his civil-rights lawsuit against the company and its private eye. The ammunition inside their legal folders included computer-culled details about Buchanan's life. Coombs, the private investigator who helped supply these details, watched behind dark sunglasses. He looked like a character in a Raymond Chandler mystery: heavyset, his head shaved, with a prosthetic right arm ending in a mechanical claw. On another floor of the same building, Buchanan's subleased office looked forlorn: He had to move out by week's end, unable to pay the rent or his secretary's salary. During the two and a half years between his arrest and his acquittal on an insurance-code violation that he says Texaco engineered, his practice fell apart. But Buchanan has tried to turn the tables. After Coombs interviewed Buchanan's ex-wife, Buchanan discovered that Coombs was himself going through a divorce. In an affidavit in the divorce file, the detective's estranged wife said that that he had admitted an addiction to prescription pain killers. She attached a computer printout of the drug purchases from their insurer. Coombs lost his arm 10 years ago, she attested, when a bomb he was making for use in marlin fishing exploded in his hand. In the end, it was an electronic data-base search in New York that helped this reporter track the private eye himself to an industrial park inWestlake Village, an upscale suburb about 40 miles northwest of Los Angeles. Coombs came to the door of his office unshaven, in shorts, T-shirt and sandals. He congratulated the reporter on finding him. Texaco's lawyers had advised him not to talk, he said. Then he added, "I'm very proud of the work I do." Behind him could be glimpsed the tools of his trade: an open file cabinet, a telephone and a computer. ************************************************************************** 2)From: Matt Walker Subject: Passenger Manifest Needed Does anyone know how to get a listing of passengers on a particular flight on British Airways? I met this girl, who gave me her phone number, but my friend lost it. I don't know the name off the top of my head, but if I would know the name if I saw it. I know approx. the area where she sat. With the name, I think I could get the number. Any help will be greatly appreciated. ************************************************************************** 3)From: lar-jen@interaccess.com (Larry-Jennie) Subject: DEA Agents Accuse CIA of Tapping Phones SAN FRANCISCO (AP) - The CIA and other spy agencies have systematically tapped the phones of overseas Drug Enforcement Administration offices, according to a class action lawsuit agents filed Thursday in Washington. The lawsuit, which also names the National Security Agency and the State Department, seeks a court order barring those agencies from any further wiretapping. "These agencies have a pattern and practice of eavesdropping on DEA agents' and employees' conversations while they are serving the government overseas," said attorney Brian Leighton of Clovis, Calif. But legal experts say it could be a difficult lawsuit to win, especially since an employer - in this case the government - generally has a right to listen to employee conversation on office phones. It also doesn't help that national security was involved and that courts have held that U.S. citizens don't have constitutional rights overseas. ``It's an uphill battle. It's going to be a tough suit,'' said constitutional law expert Paul Rothstein of Georgetown University. The lawsuit was filed on behalf of all DEA agents, but the agency itself was not part of the action. The only DEA agent named as a plaintiff in the suit is Richard A. Horn, currently with the agency's New Orleans bureau. Five other incidents involving other unidentified agents are alleged. Two years ago Horn filed a lawsuit accusing U.S. officials of undermining his anti-drug efforts in Burma. That suit is still pending. Leighton said subsequent contacts with other DEA personnel revealed a pattern of similar abuses around the world. CIA spokesman Mark Mansfield said he could not comment directly on the class action lawsuit, but defended his agency. "It is not the CIA's mission, nor is it part of the operations of the agency, to surveil in any manner U.S. officials, or other U.S. citizens at home or abroad,'' Mansfield said. The only exception would be in counterintelligence cases, he added, and then only in consultation with senior Justice Department officials. DEA spokesman James McGivney said he could not comment on pending litigation, but noted that as a U.S. citizen, Horn had the right file his own lawsuit. John Russell, spokesman for the Justice Department, which defends the other agencies in lawsuits, said only, ``we will respond in court.'' In Horn's previous case, Leighton said, the Justice Department angered DEA agents by claiming they have no Fourth Amendment constitutional right against wiretapping when working outside the country. Leighton, a former federal prosecutor, said the lawsuit doesn't address the reasons for the alleged electronic eavesdropping. "My assumption is because they want to know what DEA is doing, they want to rip off DEA informants, they want to know DEA contacts within foreign governments,'' Leighton said. ``And with the Cold War over, these agencies are looking for a new mission.'' An April 1996 letter to agents by Horn and Leighton, details the allegation of wiretapping against the agent in Burma. Horn's residence ``was the target of a U.S. Government Agency-sponsored electronic audio intercept,'' it said. "Horn had occasion to see a cable containing his words in quotation marks, that he had spoken to another DEA agent, set forth exactly as stated...'' The suit also reports alleged wiretaps against DEA agents in the Dominican Republic from 1987 to 1990, in May 1993 and September 1994 at the Bangkok, Thailand office; at the Guatemala City office in 1984, 1985 and from 1987 to 1989; and in an unidentified location in April 1987. The suit, assigned to U.S. District Judge Harold H. Greene, names as defendants Secretary of State Warren Christopher, CIA Director John Deutch and NSA Director Adm. J.M. McConnell. ************************************************************************** 4)From: "Chris" Subject: Re: where would this proxy server be setup? >I'm not quite sure I understand you.. where would this proxy server be setup? >If you set it up on another machine owned by yourself, then that does not >really help.. Our proxy is setup on our web server. Yes it is quite a big help. It masks the IP addresses of our internal network from the Internet. All outbound connections to the Internet point back to the Proxy and keeps the internal Lan addresses anonymous. gnu ************************************************************************** 5)From: SpyKing@thecodex.com Subject: Digital Mobile Phone FAQ Check it out at: http://www.kfs.org/~simon/phones/GSM.html ************************************************************************** 6)From: tommy@tommys.spydernet.com Subject: Ditto Box - device for eavesdropping and recording Most people at one time or another want to listen in on phone conversations... but, they often get caught if they pick up an extension phone, or if they tap into a line with a beige box and a phone without a mute button (God forbid!) Anyway, there are a few tricks you can pull so as not to be detected while eavesdropping. The big thing is, you need a phone which will NOT send ANY noise out through the line. Most modern phones have mute buttons, but they are a pain, cause you have to hold them in the whole time you're listening, and, they often cause "line noise" to be passed over the phone. Also, the way a lot of "1 piece" phones are designed, it's impossible to hold in the mute button as you pick up or hang up the phone, which ALWAYS makes some kind of noise. So, here's a quick and dirty way to "adjust" a phone, so it has a mute SWITCH, not button. A switch is much nicer, because you can flip it off, and not have to hold it the whole time you're listening. Also, a switch doesn't put out the line noise like a push-and-hold mute button does, because there is no friction which causes the contacts to rub. Any phone can be modified in a matter of minutes, to have a mute switch. All it takes is an SPST (single pole single throw) switch, and a bit of wire. A soldering iron also comes in handy. Here's what to do: 1) Open the phone, and find the microphone (mouthpiece). On newer phones this might be tough, since they are often 1 piece of molded plastic. On older phones, the mouthpiece cover can usually be unscrewed, allowing easy modification. It all depends on the phone, however. Anyway, open it up, and find the wires leading to the mic. 2) Cut ONE of the microphone wires, and strip back the insulation a bit. If there isn't a lot of extra wire running to the mic, you might want to solder an additional 3" on to the wire you cut, to give yourself some working room. 3) Find a convenient place on the phone to mount the SPST switch, and then solder the wire you cut to the switch. This way, you'll be able to switch the mic on and off whenever you want. Put the phone back together (TEST your work first, though!) and you have a muteable phone. So, what do you do with it? Well, eavesdrop from an extension in your home, a beige box, or wherever. The phone is silent, so you're pretty safe. Of course, you MAY want to take it just a bit farther... Since you have a special phone for eavesdropping, it would really be nice to spice it up a bit. After all, it's hardly worth modifying a phone just to add a mute switch. And it would seem pretty lame if that was all I was gonna tell you in this file. Any moron with 3 brain cells could figure out how to make a muteable phone. So, on to the INTERESTING stuff... This is something I rigged up at home, and don't know if it's got an official "box" color, or name, or whatever. I'm sure somebody somewhere has done it, but since I never saw a file on it, I thought I'd write one. Egotistical person I am, I'll call it a "DiTTo Box" - but for good reason. See, it allows you to tape record any phone conversation, and also to listen in at the same time, over a stereo or boom box. And, it uses the muteable phone, above. Here's how it works: All phones have a speaker in them, through which you hear the person talking to you. What the DiTTo Box does is allow you to run the signals through a stereo, and out the stereo speakers, instead of through the phone speaker. To do this, you are going to need a phone dedicated to DiTTo Boxing. Any phone will do, and you can modify it in 2 different ways - you can make it a true DiTTo box, and it won't serve it's purpose as a phone that you can converse on any longer, or you can make a "lower quality" DiTTo Box, which you will still be able to use as a phone, but the boxing quality will be slightly weakened. The difference lies in whether or not you keep the speaker in the phone. You can keep the speaker in the phone, and run wires from the speaker terminals to the input lines of your stereo, and it WILL work, but the sound quality over the stereo won't be as good. OR, you can remove the phone speaker entirely, and in it's place connect 2 alligator clips, one to each speaker output wire. This is a dedicated DiTTo Box. I chose to go with the lower quality box, simply because I don't do a whole lot of eavesdropping, and I only had 1 phone I could modify, which I also use for beige boxing. Still, it serves my purpose both ways. To get the box working, solder leads from the 2 speaker terminals to alligator clips. Give yourself about 6-8 inches of wire at least! The best length would be about 18 inches, if you plan on connecting to a home stereo. Once the leads are soldered, you can connect them to the INPUT jacks on your home stereo, or boom box. You can even hook them up in your car, if your car has LINE IN or CD INPUT capability. Anyway, most stereos use the RCA plug for connections. So, get an RCA plug off an old speaker or something, and clip the alligator clips to it. Plug it into the stereo, and set the selector on the reciever to accept input from the phone. Take the phone off the hook, and you will hear a dialtone over your stereo speakers. (yes, you MUST plug the phone into the phoneline for this to work) Now, try dialing... you will hear the tones over the stereo. If you have a tape deck on the stereo, you can record your phone conversations. If you have a phone rigged up like this, and call someone, you can tape the entire conversation, and they'll never know! Incoming calls are a bit trickier, but they can be recorded too. The toughest part is trying to get the stereo turned on and everything quiet before answering the phone, to waylay any suspicion. Also, keep the stereo on LOW volume, to avoid squealing from feedback. There are lots of uses for a DiTTo box, and I've told only one or two. You can use the box to record dialing tones on cassette, then carry them with you, to be used in a cassette player at a payphone, whatever. Plenty of possibilities exist, that's for sure. Just remember, phone tapping and eavesdropping are classified as a FEDERAL OFFENSE, so it's best not to get caught. Have phun, and party on! ---DoctoR DiTTo ************************************************************************** 7)From: Marcus Blankenship Subject: Re: Reverse Engineering Software Travlinman, I'm no expert, but... I believe there are 2 ways of RE'ing software... neither are particularly easy. 1) Take the execuatable file (the .exe or whatever), and DISASSEMBLE it. Then you have a copy of the assembly source for that program. _IF_ you read assembly language, this is no problem. There are quite a few disassemblers on the net for your convience. Once you have disassembled both windows programs, they you can begin to figure out what they do. At this point you will either give up, or go mad. :-) 2) Deduce what the programs are doing from what you see, and write a program to do something just like it. Do this with both programs. Then write a third program to do the other thing you wanted to do. You MIGHT find a product that will take that assembly code from option 1, and translate it into C code... anybody know? IMHO: What you propose is VERY difficult. Idea!!: If you post the name of the programs, plus/or what you are trying to accomplish, I'll bet that someone on the list can help you out. As the header states, there's a lot a brain power here! :-) Best of Luck, Marcus / Marcus Blankenship Jeld-Wen, Inc Just Another Progress Hacker... 541-882-3451 marcusb@jeld-wen.com www.doors-windows.com {std/disclaimer.i} ************************************************************************** 8)From: SpyKing@thecodex.com Subject: Building In Big Brother Here's another eye opening article from the Netly News... Building In Big Brother by Declan McCullagh The U.S. Congress, bowing to law enforcement demands for more wiretap powers, is preparing to approve a scheme that endangers the personal freedom of every American. Nobody doubts that wiretaps are useful tools for law enforcement agents. FBI Director Louis Freeh, who as a young agent built his career on them, knows this well. But Freeh's plan would expand the FBI's eavesdropping ability by building Big Brother into every word processor, every e-mail program and every web browser. All computer software distributed after 1998 would have a special, secret backdoor for government access to your most private files. Even your Internet provider would be deputized as a cyber-snoop. It's the technological equivalent of requiring that every homeowner turn over a spare copy of his front door key to the FBI. This is the same FBI that has a long and disturbing history of abusing Americans' privacy. As director, J. Edgar Hoover built a successful career out of illegal wiretaps, secret files and political blackmail. Hoover despised Martin Luther King, Jr. -- branding him an "obsessive degenerate" -- and once sent him an anonymous letter, using information gathered through illegal surveillance, to encourage the depressed civil rights leader to commit suicide. Hoover's legacy? Having the FBI headquarters bear his name today. This debate plays out against a backdrop of export controls on data-scrambling software. For years, the National Security Agency has contended that encryption is dangerous in the wrong hands, which is why the Clinton administration considers encryption products to be munitions. For export purposes, government bureaucrats consider Lotus Notes to be like a B-2 Stealth bomber or an M-1 Abrams tank. This view stems from when encryption was largely the province of soldiers and spies -- and amply demonstrates the techno-illiteracy of President Clinton and Vice President Gore. Bills have been introduced in both the House and the Senate to loosen these export restrictions, which businesses say cost U.S. industry millions of dollars a year. A study to be released next month by the Electronic Privacy Information Center shows that many overseas firms aren't hindered by such Cold War rules and are free to sell strong encryption software around the globe. Three lawsuits are challenging the constitutionality of the government's regulations on First Amendment grounds and have met with some success. Of course the Eavesdrop Establishment opposes such changes. After all, limiting freedom through hardwiring Big Brother into communications systems has been long-standing White House policy for at least six years. Only now, however, are the bureaucrats admitting it. A new book by Bruce Schneier and Dave Banisar called "The Electronic Privacy Papers" (John Wiley & Sons, 1997) reveals that the push for demanding computer and telephone snoopability is both long-standing and bipartisan: in 1991, George Bush ordered advisor Brent Scowcroft to press for such controls. The plan stalled during the 1992 election, but two years later Clinton endorsed and Congress passed a "Digital Telephony" law requiring that telephone companies build only networks that are easily snoopable by the Feds. Now Freeh is waving that precedent around Congress to justify banning software that's not readily snoopable. "We're asking for a Fourth Amendment that works in the information age. When it was designed by the framers, they didn't contemplate, obviously, Digital Telephony and encryption," he told a Senate panel last week. Both the House and the Senate are poised to approve his plan. Rep. Sonny Bono (R-Calif.), who once staunchly opposed such a measure, told me yesterday that "we weren't aware of" all the issues and there are others "we have to be concerned about." Bono and his colleagues on the National Security committee yesterday voted 45-1 to gut "SAFE," a House bill that would have relaxed export controls. Their amendment gives the White House the same veto over exports it has today Now SAFE moves to the House Commerce and Intelligence committees, which are expected to vote on Freeh's proposal later this week. "They're going to address some of Louis Freeh's concerns," Rep. Curt Weldon (R-Penn.), an opponent of SAFE, told me yesterday. The Senate already is moving in a similar direction. The sad irony, of course, is that legislation originally designed to promote freedom may be perverted to limit it. In a way, though, this outcome was inevitable: the intelligence community wields enormous power on Capitol Hill. Privacy gurus and business lobbyists are simply outnumbered and outgunned. If Congress doesn't have the courage to do the right thing, we should demand they do nothing. As technologies evolve, we need to preserve our civil liberties, and courts -- not the Congress -- are their most reliable champion. Since any encryption bill is bound to be corrupted in the dank legislative byways of Capitol Hill, it's now time to turn obstructionist. We should reject all legislative changes to encryption rules and let the courts decide. ************************************************************************** 9)From: SpyKing@thecodex.com Subject: Norton Safe on the Web Checkout: http://www.symantec.com/sabu/nsw/index.html ************************************************************************** 10)From: Johnny Subject: Any private data via Satellite dish? Intercepting Faxes via scanner? This will be the second time I have posted this question. Was hoping someone would know something about this.... It is possible to hear fax transmissions via a police scanner. (868-900 Mhz) I was wondering if it is possible to DECODE these faxes while being sent? Possibly audio input TO a sound card? And the appropriate program? I would think this is SO obvious that something like this is probably already in existence... but I have yet to find anything capable of it. Next question... does anyone know of ANY data being sent via satellite that can be picked up via a normal homeowners dish? (not those little pizza pan dishes, something like a 7 1/2 footer) I was told there are faxes being sent across satellites via international. Ir for that matter, any "private/interesting" data at all? Again, as with the scanner, the scheme would be the same, send the source to a PC sound card, and computer program to make sense of it? ANY ideas at all how this could be pulled off? Thanks, Johnny ************************************************************************** 11)From: Fetish_Barbie@dial.pipex.com Subject: Re: Social Engineering Tip Augie said, :) > >Social engineering tip: > > >Steping stones....one stone at a time. NOT 2 stones..ONE. > >TIP number 2- (no disrespect) When man answers....Just hang up. Men are by >nature suspicious of just about everything under the sun. SE's (social >engineering) just seem to work out more favorably when a woman answers the >phone. > >Augie Unless of course you're a woman. Said "Man" will then roll over on his back waiting for his tummy to be tickled. :)) ************************************************************************** 12)From: "J.D. Abolins" Subject: Re: A few privacy-related questions, if you don't mind >Anyone out there a "privacy consultant"? Does such a thing exist, or >do such professionals tend to be more specific, i.e. banking, computer, >surveillance, etc. > >Can anyone recommend other privacy-related mailing lists? I'll give the names of the lists but have to get the address later (or you do an altavista.digital.com search for their archives). Computer Privacy Digest is a good moderated list. RISKS Digest, while not a privacy list per se, has some interesting info. Not so much about privacy resources as about loopholes and incidents. There are several Usenet newsgroups like alt.privacy and its variants. >Is anyone familiar with the site "Ultimate Anonymity" >http://207.240.104.21/a/Anonymity/ - If so, any feedback? I took a quick look at it. Interesting service which offer some education about privacy utilities such as PGP and Private Idaho plus a means of hiding one's IP address. Asks for a $10 US one-time fee by mail or by credit card. (Privacy starter tip: avoid the credit card payment route. If you use this service, do a money order via mail.) Beyond that, I haven't enough experience with this site to say anything further about it. >I recently downloaded PGP 5.0. I am having difficulty learning how to >utilize it. The PGP faqs haven't helped much. Can anyone point me in >the right direction for info on how to set it up? There should be a PGP manual in Adobe Acrobat PDF format. (I see one with the registered version.) Look for a file with a PDF extension. You will need a PDF reader available from http://www.adobe.com . The manual explains the program well. One thing to watch out regarding FAQs. If they for the older versions of PGP, it will be confusing because PGP 5.0 has a very different interface (as well as some other differences). Also the manual has some very important tips about using keys and avoiding some of the pitfalls. Some of the email and PGP-MIME features are designed to work with certain types of email programs. For example, Eudora 3.02 works nicely with PGP 5.0. (If you have earlier versions of Eudora, you have to get the upgrade.) J.D. Abolins ************************************************************************** 13)From: "M. J. Van Ham" Subject: Re: Social engineering Augie wrote: > TIP number 2- (no disrespect) When man answers....Just hang up. Men are by > nature suspicious of just about everything under the sun. SE's (social > engineering) just seem to work out more favorably when a woman answers the > phone. Couldn't resist responding to this one. For those male social engineers out there, I have to agree with this. I've never had much luck with males. However, if "you're" a female (or have a friend that's female :) You'll likely have better results with a male. I haven't run into many male's who wouldn't give up to at least a little information to a sweet-talking lady ************************************************************************** 14)From: mzenze19@idt.net Subject: Re: Coming soon... > 4)From: "Marko" > Subject: Coming soon... > > SpyKing: > > I am looking forward to your promised book "How Private Investigators > & Information Brokers Invade your privacy by pretext, stealth and > downright illegal means..." I have way too many friends who, when I show them > all this stuff on biometrics, surveillance, etc., have the attitude "If > you don't do anything wrong or haven't broken the law, then why worry > about it? It's all being done to catch criminals." SpyKing: You are the official newsletter of The World Association of Surveillance Professionals, yet you authored a book that ridicules the business. I don't understand this! I have been a Private Investigator for several years now, and yes I use Information Brokers, I use pretexts,, but "downright illegal means"? This is stupid. In Louisiana you can lose your license if caught doing these things, and I am not about to throw away a very successful career for one bust. I specialize in surveillance and I have done it all. I followed people on a bicycle, in a boat, of course by car, and specialize in rural surveillance from the woods. But I DON'T TRESPASS! If getting the tape involves anything illegal then I just don't get the tape. Sure I'll run a light every now and then, but that hardly classifies as an invasion of privacy. Private Investigators have worked hard to improve their image. Gone are the days when P.I's were thought of as sleazy, trench coat wearing drunks who will get the dirt on anyone for a few bucks. I, like a lot of P.I's I know, don't even handle divorce cases anymore, but instead have saved the insurance companies enormous amounts of money. I recently testified in a case for the video evidence that I obtained. The subject stood to get about 400,000 dollars before the video evidence was obtained, but didn't get squat when it was over. Guess what? I didn't brake any laws to obtain the evidence either. You don't have to with these idiots!!! These court cases take years sometimes and the claimants get stir crazy and eventually go back to their old habits. Do you really think this is wrong? The pretexts I use are totally benign, except to a claimant who is a fraud. I may knock on someone's door and ask some questions like where do you work? If this person is on Workmen's comp, and there working, then guess what? They are committing a crime. If there not, or if I have the wrong person, then where is the harm? Below is a pretext I use that works wonders, and I don't mind sharing it. Bring a two liter of coke with you, and you won't believe what people will tell you for a $1.50 coke!!! Now tell me Spyking, what is wrong with this pretext? PROFESSIONAL MARKETING SYSTEMS (PMS) My name is ______, and we are currently taking a survey of the area residents regarding their soft drink preference. We would appreciate it, if you would give us a few moments of your time to answer the following questions? 1. What is your favorite soft drink? 2. Approximately how many cans, bottles, or liters of soft drinks do you drink per week? 3. Do you find yourself attracted by advertisements on radio or television to try certain new drinks? [The following questions are presented as market information] 4. What is your occupation? 5. What is your spouses occupation? 6. What is your average household income? 7. Where are you employed? 8. Where is your spouse employed? 9. How many persons in your household? 10. How many children under 18 in your household? 11. What are your favorite sports of hobbies? 12. What type of car or truck do you drive? 13. What is your name and telephone number? For this last question, tell them that your supervisor may call for a "quality" check, and to verify that they received the drink and you were courteous blah blah blah!! I have NEVER had someone tell me they didn't want to do the survey, and made several busts as a result of this "survey". I don't know about you Spyking, but my conscience is still clear. Mike +++Moderator's Note+++ Conscience? I sleep like a baby at night... and I'm not claiming to have a halo over my head... The private investigation industry is necessary and is generally staffed by ex-law enforcement types who are honest and hard working... however, like ALL professions there are some who will do ANYTHING for a buck... these are the ones we single out... "Physician heal thyself..." I seriously doubt you are naive enough to believe that abuses don't happen on a daily basis... A simple search of the net will disclose numerous PI's and Info brokers who advertise services that there is just NO WAY to get the information legally without a court order (and you know a PI is RARELY if ever going to get one)... Please tell me how an infobroker or PI can get a target's toll or cellular calls legally? By subterfuge through the phone company? That's fraud... Do a search and tell me how many you find offering the service... I doubt they are ALL lucky enough to steal the "one" bag of trash from in front of the target's house that holds the disgarded telephone bill... I have been in this business for over 25 years... I know better... so do you... Regarding your "pre-text", it seems OK to me... If you can get a target to go for it more power to you... I see no reason why it wouldn't work a majority of the time... Regarding my new book, how could you know it "ridicules" the industry? It hasn't been released yet so I know you haven't read it... The fact is... that it is an indepth "how-to" study of the "ingenuity" of the average PI in handling "tough" cases... it does however cover the "dark side"... W.A.S.P. is an organization of professionals involved in the surveillance industry who are technically oriented. We do have a number of PI's as members but the vast majority of members are "tech" guys... We're the ones who make your technical requirments happen... We also do a lot of research in emerging technologies... We like to know what makes thing "tick" and how to make them better... or suitable for surveillance/countersurveillance applications... fj ************************************************************************** 15)From: Bill Frazier Subject: Is there any way? Lets see if I get this right. Is there any way this post can be traced to my real name and E-Mail address. It will be sent from a D T S Mail program through my ISP. Thank you John ************************************************************************** 16)From: "Larry Braden" Subject: Welcome Duncan, Welcome to the Spyking mailing list ! To enlighten us old farts on the list, why don't you tell us how it is to be a high school student in the Australia area ? I am not trying to be personal, just a normal private investigator that wants to know everything. Remember, do what ever you have to do to stay in school and get about five or six years of collage. See you on the list. Respectfully, Larry Braden, Senior Investigator Montrose Investigations Montrose, CO e-mail at Braden@rmi.net http://www.angelfire.com/co/WestCoPI or http://www.ppiac.org ************************************************************************** 17)From: pfry@kellnet.com (Peter Fry) Subject: Hacker's Handbook I found this website that sells the "Hacker's Handbook." It's the book that isn't in print any more (because its illegal or something). I ordered the book from them and its VERY COOL! I just thought I'd let you guys know in case anyone else still wants it. This is the only book about hacking that I ever bought but I still think thats its cool. The address is www.geocities.com/SiliconValley/Peaks/1722/. Peter Fry E-mail: A0Server04@aol.com ************************************************************************** 18)From: ERIC C HART Subject: Contact/resource Does anyone have a contact/resource in Bangkok, Thailand that is able to handle a legal investigation requiring some interviews and some investigative work to locate people ? Best regards, Eric C. Hart Intell Service Group intell@coqui.net PO Box 1419 Caguas, PR 00726 Tel. (787) 745-1930 Fax.(787) 745-8913 ************************************************************************** 19)From: "The Internet Reporter" Subject: Directory of Chief Executive Officers For senior professionals, Demand Research publishes a continuously updated, monthly directory of over 6,500 Chief Executive Officers in US public companies. Each record provides a complete company name and address, together with telephone number, fax number where available, ticker symbol, exchange affiliation, business description, and the full name of the CEO. This directory is available on PC diskettes in either standard ASCII, comma-delimited ASCII, dBASE III+, or Lotus 1-2-3. When ordering, please be certain to specify which file format you prefer. To order the 9/97 edition on diskette, send a check payable to "Demand Research" for $39.95 to: Directory of Chief Executive Officers c/o Publications Desk Demand Research 4587 Morse Centre, Suite 325 Columbus, OH 43229 ************************************************************************** Who are you? What's your specialty and/or interest? Let us know about your company... What would you like to see on the list? Post it. Let us know... Do you have something to contribute? We'd like to hear it... We want to know EVERYTHING and ANYTHING about eavesdropping, surveillance, countersurveillance & privacy related technology, etc... Remember: who, what, where, when, how & why... we want ALL the details... Do you have a question? Post it... A little free time? Help a member... With the INCREDIBLE brain power on this list, someone should have the answer ;-) P.S. Don't be a LURKER... Members take the time to post info for us all... give something back... Don't just take... Your input/knowledge is valued... ************************************************************************** Send Postings to: spyking@con2.com with "Post" in subject field with subject ************************************************************************** Subscribe to: spyking@con2.com In the subject field type: subscribe-surveillance list e-mail address ************************************************************************** Unsubscribe to: spyking@con2.com In the subject field type: unsubscribe-surveillance list e-mail address ************************************************************************** ...The Simple Rules of the Surveillance List... The Surveillance List Owners may Reject any posts that are/contain: 1) Info Unrelated to Eavesdropping, Surveillance or Privacy technology... 2) Flames or Negative posts... 3) E-Signatures that are considered excessive... 4) Advertisements not DIRECTLY related to the list topics... 5) Attached Files... 6) Oversized Posts... (May be edited to save room) **************************************************************************** This publication is copyrighted and is protected by U.S. and International copyright law. The information transmitted on this list may not be reproduced, reposted or forwarded to any non-list member without expressed written permission of the List Owner. Violation of U.S. copyright law is a criminal and civil offense... **************************************************************************** The Surveillance List is Moderated by SpyKing@thecodex.com The List Owner will make EVERY effort to protect subscribers from spam... Copyright 1996, 1997 Codex Publishing Inc., All Rights Reserved... **************************************************************************** ****************************************************************************** The Official Newsletter of W.A.S.P. The World Association of Surveillance Professionals http://www.thecodex.com/wasp.html ****************************************************************************** Vol.Two Issue #200 The Surveillance List Sept.20,1997 Over 2800+ Members Worldwide Representing 53 different countries List Chat at: http://www.thecodex.com/chat.html ****************************************************************************** While we STILL feel there is NO SUCH THING as a stupid question... We suggest the newer list members AND the technically challenged browse through the FAQ before posting a question... Surveillance List Pseudo FAQ at: http://www.thecodex.com/faq.html P.S. If you have something to add to the FAQ, let us know... ****************************************************************************** IN THIS ISSUE... ****************************************************************************** 01) Re: Social Engineering Tip 02) Anonymous Remailer Politics 03) Re: Air Taser 04) Re: Cloaking their number 05) Ink that can not be copied 06) Thanks 07) Badcoffee's pgp 08) Psychology 09) CPSR Warns About Encryption Legislation ****************************************************************************** DON'T BE A LURKER.... GET INVOLVED... YOU ARE A MEMBER... MAKE THE MOST OF IT ****************************************************************************** 1)From: BADCOFFEE@aol.com Subject: Re: Social Engineering Tip >>>> Unless of course you're a woman. Said "Man" will then roll over on his back waiting for his tummy to be tickled. :)) <<<< Augie says... You are 110% correct. No disrespect to men now.....I'll speak for myself here. I hereby am "men" in this example. Men will more or less do flip flops by just hearing the soft voice of a woman. Woman for that matter......use their heads. Men...use their heads.....but just a little different version of it...........ALL the time. Opposites attract.......in an "inform"ative way. :-) USE it. Augman ************************************************************************** 2)From: "Robert A. Costner" Subject: Anonymous Remailer Politics -----BEGIN PGP SIGNED MESSAGE----- Electronic Frontiers Georgia has gone international in some of our activities. For some months we have been running an anonymous remailer at http://anon.efga.org/anon and recently the Weasel remailer in Germany closed due to pressure from the gov't. EFGA's "redneck" server took over the traffic from the weasel remailer. As a result of this and other happenings, EFGA has started a new mail list called "remailer-politics". This mail list consists of remailer operators and users from around the world, as well as people who have never used remailers but are just interested. Remailers are a way to preserve user privacy in email and newsgroup posting. Remailers come in different types, but allow users to send and receive messages anonymously. This ties in with the lawsuit we recently won against the state of Georgia over anonymity. While Georgia certainly has taken a lead against free speech with it's attempt at criminalizing anonymous speech on the internet, many other forces work against free speech from remailers. This new mail list is an attempt to explore the political, legal, ethical, and social implications of anonymous and pseudonymous remailers. Several countries are represented in this global issue. Feel free to join us. To subscribe, send a body message of "SUBSCRIBE" to address "REMAILER-POLITICS-REQUEST@SERVER1.EFGA.ORG" -----BEGIN PGP SIGNATURE----- Version: PGP for Personal Privacy 5.0 Charset: noconv iQBVAwUBNB+oIEGpGhRXg5NZAQGVxAH8CkYocMm7wHxVm2eZsM+x+HWJe/1U8jVr lO2S0/dqUZNWbSnE8IWAjICbQSe4UdEkvqTCGHZTVNk35otpXzZG1g== =psJ7 -----END PGP SIGNATURE----- -- Robert Costner Phone: (770) 512-8746 Electronic Frontiers Georgia mailto:pooh@efga.org http://www.efga.org/ run PGP 5.0 for my public key ************************************************************************** 3)From: "Compaq User" Subject: Re: Air Taser Be advised that the air taser system is illegal in MA as is justabout everything but being a drunken Kenne**, driving through cape cod. ************************************************************************** 4)From: BADCOFFEE@aol.com Subject: Re: Cloaking their number Mutter writes: >>>I meant to post when augie originally posted the idea that doing so would >>>be useless for trying to catch people cloaking their number in some way >>>(which I assume was the purpose) because no matter how far apart on the >>>line you seperate the two caller id's you're still going to get the same >>>caller id info your switch passes to you. pointless. Augie writes: Mutt, Nope.....missed the concept. Surveillance, not tech. The cheating spouse is going to delete the number of Mr/Mrs. lover. The concealed caller ID will catch that number and hold it. Making a comparison of the 2 ID boxes and cross checking #'s will give you information that would normally take you quite a long time to obtain by other means. If you get real lucky.there will be no blocks revealing name and phone number. When ALL of the numbers are deleted.....one could just be washing the screen. Spurratic deletions are more of a problem. IE- When call 1-2-3-4-5-6-7-8 (so on)......numbers are still there on box ONE (main) but 12, 32, 45...ect (spurratic deletions) are not.......Raise an eye. You get the point :-) Augie ************************************************************************** 5)From: Harry L Langley Subject: Ink that can not be copied I am looking for an ink that cannot be copied via Xerox copier, would not show up clearly or at all. Do you know of any such product. Or a method to block out certain lazer printed data from being copied via Xerox copier to stop un-authorized reproductions. ************************************************************************** 6)From: zerohero@juno.com (john j smith) Subject: Thanks hey gang, i have to say that i feel good about all the responses to my posts...all the "disclaimers" about lurkers are true - so speak up! augie - thanks for the reply re: pay yer dues....my name's not john but it will do. as a side note, i start my pi internship tomorrow at 5, i'll tell all afterwards (advancing!). i still haven't figured out how i'm going to deal with the schedule differences with my girlfriend but i guess time will tell... sorry mutter - my fault about the " ~ "! anybody into forensics? i'd like to learn more... interesting response to the "space in the pc case" post i have to say....constructing a board as a bug - i never thought of that! by the way, (and i don't recall who posted these) the glitter to detect a mail snoop and the "free trash bags" to mark a bag for trash can archaeology works like a charm! someone should write a book on these "low-budget tid bits". if anybody knows pi links please post them. thanks y'all. zh ************************************************************************** 7)From: Wes Hobgood Subject: Badcoffee's pgp I like your PGP key... Wonder how many people caught it..... Wes ************************************************************************** 8)rom: BADCOFFEE@aol.com Subject: Psychology Hi guys, Lets talk BORRRRRRING stuff for a moment. Psychology Munschausens syndrome: This is a "self harm for attention" disorder. Where one would create mental illusions of something hurting them (or hurt themselves purposely "by accident") in the pursuit of extreme attention. How common is this mental illness and how many time do you professional PI's see this? Ps- Remember "Sommy" Any info on this disorder is VERY welcomed. Aug ************************************************************************** 9)From: Susan Evoy Subject: CPSR Warns About Encryption Legislation September 16, 1997 For Immediate Release For More Information: Andy Oram 617 499 7479 Aki Namioka 206-587-6825 COMPUTER EXPERTS WARN ABOUT RESTRICTIVE ENCRYPTION LEGISLATION Computer Professionals for Social Responsibility (CPSR) today strongly protested Congressional initiatives to add onerous restrictions to the Security And Freedom through Encryption (SAFE) bill (H.R. 695). CPSR President, Aki Namioka, stated "The Weldon-Dellums amendment to H.R. 695 reflects a major disregard for civil liberties and a profound misunderstanding of computer and Internet technology. This is a complete reversal of the intent of SAFE legislation." "These proposed bans on encryption are clearly attempts at restriction of free speech," Namioka said. "Bernstein v. US Department of State stated that encryption is a constitutionally protected method of communication". "The public is not being represented in this assault on privacy and freedom of speech", according to CPSR member Andy Oram. CPSR points out that encryption legislation regulates a type of computer technology that is becoming more and more central to modern communications. Encryption is critical to online commerce, because it protects trade secrets and assures users that money is being transferred properly. In the form of digital signatures, encryption allows someone to pass a contract across the Internet or stand behind a public statement. Encryption may soon be built into networking protocols for authentication purposes. And it is used heavily by human rights activists and other political figures in many countries to protect themselves and their sources from arrest and assassination; even in North America it is seen as critical by many to protect private thoughts exchanged among colleagues. CPSR outlined several problems with the proposed legislation: 1. Bans on encryption are violations of free speech, as ruled by U.S. District Judge Patel in the case of Bernstein v. U.S. Dept. of State. Beyond this case, which covers the teaching and publication of information about encryption, it would be a gross and unprecedented violation of free speech to ban types of software or formats for transmitting data, as the amendments to SAFE would do. 2. In order to continue communicating with sites using the encryption technologies required in the bill, all current Internet sites and users would have to purchase, install, and test new systems. This is a burden that many businesses, particularly Internet services with their low profit margins, cannot afford. 3. Law enforcement will not benefit from restricting the export of encryption. Strong encryption software already exists outside the United States, and the technical understanding for creating such software is widely published. 4. Restrictions on export damage the international competitiveness of the companies that offer encryption products, add unnecessarily to the costs of developing such products, and ultimately leave the users of those products vulnerable to malicious attack. The heavy controls imposed by the bill contrast strongly with the Clinton Administration's claim in its recent white paper, A Framework for Global Electronic Commerce, released onJuly 1, 1997, to maintain a "hands-off" stance toward the Internet. 5. While the amendment is claimed to be "technologically neutral," a better description of it would be "technically untried." The only technology proposed up to now to meet the bill's goal of providing unencrypted content to law enforcement are key recovery systems, but no such system on the scale required by the bill has ever been tested. Experts examining the requirements for such systems have predicted them to be costly, insecure, and burdensome. But even key recovery systems could probably not be implemented in such a way as to provide the "immediate" access to unencrypted data that the law demands. Compliance of the bill would require new, currently unknown technologies, and possibly the highly intrusive installation of special decryption software on each user's computer. 6. The amendment unduly expands the powers of government. Current court-ordered wiretap standards could be bypassed. Current requirements that law enforcement must demonstrate probable cause for a wiretap would be eliminated. There are so many aspects of dubious constitutionality in the current version of the encryption bill that Congress faces another humiliation in the courts like that dealt to the Communications Decency Act. CPSR calls on Congress to protect our freedoms and reject the encryption measures. To allow the benefits of modern electronic networks to be reaped, cryptography products that provide for real privacy should be available, without government intrusion. # # # # Computer Professionals for Social Responsibility (www.cpsr.org) CPSR is a public-interest alliance of computer scientists and others interested in the impact of computer technology on society. CPSR's goal is to direct public attention to difficult choices concerning the applications of computing and how those choices affect society. # # # # -- Duff Axsom, Executive Director http://www.cpsr.org/home.html Computer Professionals for Social Responsibility P.O. Box 717, Palo Alto, CA 94302 Phone: (650) 322-3778 Fax: (650) 322-4748 Email: duff@cpsr.org ************************************************************************** Who are you? What's your specialty and/or interest? Let us know about your company... What would you like to see on the list? Post it. Let us know... Do you have something to contribute? We'd like to hear it... We want to know EVERYTHING and ANYTHING about eavesdropping, surveillance, countersurveillance & privacy related technology, etc... Remember: who, what, where, when, how & why... we want ALL the details... Do you have a question? Post it... A little free time? Help a member... With the INCREDIBLE brain power on this list, someone should have the answer ;-) P.S. Don't be a LURKER... Members take the time to post info for us all... give something back... Don't just take... Your input/knowledge is valued... ************************************************************************** Send Postings to: spyking@con2.com with "Post" in subject field with subject ************************************************************************** Subscribe to: spyking@con2.com In the subject field type: subscribe-surveillance list e-mail address ************************************************************************** Unsubscribe to: spyking@con2.com In the subject field type: unsubscribe-surveillance list e-mail address ************************************************************************** ...The Simple Rules of the Surveillance List... The Surveillance List Owners may Reject any posts that are/contain: 1) Info Unrelated to Eavesdropping, Surveillance or Privacy technology... 2) Flames or Negative posts... 3) E-Signatures that are considered excessive... 4) Advertisements not DIRECTLY related to the list topics... 5) Attached Files... 6) Oversized Posts... (May be edited to save room) **************************************************************************** This publication is copyrighted and is protected by U.S. and International copyright law. The information transmitted on this list may not be reproduced, reposted or forwarded to any non-list member without expressed written permission of the List Owner. Violation of U.S. copyright law is a criminal and civil offense... **************************************************************************** The Surveillance List is Moderated by SpyKing@thecodex.com The List Owner will make EVERY effort to protect subscribers from spam... Copyright 1996, 1997 Codex Publishing Inc., All Rights Reserved... **************************************************************************** ****************************************************************************** The Official Newsletter of W.A.S.P. The World Association of Surveillance Professionals http://www.thecodex.com/wasp.html ****************************************************************************** Vol.Two Issue #201 The Surveillance List Sept.19,1997 Over 2800+ Members Worldwide Representing 53 different countries List Chat at: http://www.thecodex.com/chat.html ****************************************************************************** While we STILL feel there is NO SUCH THING as a stupid question... We suggest the newer list members AND the technically challenged browse through the FAQ before posting a question... Surveillance List Pseudo FAQ at: http://www.thecodex.com/faq.html P.S. If you have something to add to the FAQ, let us know... ****************************************************************************** IN THIS ISSUE... ****************************************************************************** 01) Re: Ink & copiers... 02) Re: Badcoffee's pgp 03) Re: Munchausens syndrome 04) WEB ID! 05) Re: Welcome 06) Re: Hackers HandBook 07) Guys this is a GOOD one... 08) In need of photos 09) Re: Ink that can not be copied 10) Computer Crime 11) The "camcorder" 12) I got a job! 13) A letter from the Smithsonian Institute ****************************************************************************** DON'T BE A LURKER.... GET INVOLVED... YOU ARE A MEMBER... MAKE THE MOST OF IT ****************************************************************************** 1)From: (Bret Johnson) Subject: Re: Ink & copiers... >I am looking for an ink that cannot be copied via Xerox copier, would >not show up clearly or at all. I remember being in a library (in England -- perhaps London?) where certain books could not be copied. Was it RED ink print that wouldn't copy? Any one from across the pond care to kick in their two cents worth? -Bret ************************************************************************** 2)From: BADCOFFEE@aol.com Subject: Re: Badcoffee's pgp >> I like your PGP key... >> Wonder how many people caught it..... Wes << Attention all: Give this man a cigar. :-) ANYone that read's this list......right down to the PGP keys......deserves "something". Nice Job Wes. :-) Augie :-) "Needle in a haystack. Just keep poking till something pokes ya back." ************************************************************************** 3)From: "KcW" Subject: Re: Munchausens syndrome Note the spelling. Baron Von Munchausen b.1720 German adventurer and confabulator. Condition charatcerized by habitual pleas for treatment and hospitalization for a symptomatic, but imaginary, acute illness. Person may logically and convincingly present the symptoms and history of the real illness. Symptoms resolve with treatment, resulting in a new imaginary disease. ************************************************************************** 4)From: "Shadow Chasers" Subject: WEB ID! Is it possible to ID a person/persons logged onto a WEB FORUM, where no LOGIN ID is required to access the forum? If so, looking for an individual that can accomplish this, contact me for the details. ************************************************************************** 5)From: "Duncan -" Subject: Re: Welcome >Welcome to the Spyking mailing list ! To enlighten us old farts on the >list, why don't you tell us how it is to be a high school student in the >Australia area ? I am not trying to be personal, just a normal private >investigator that wants to know everything. Remember, do what ever you >have to do to stay in school and get about five or six years of collage. >See you on the list. > >Respectfully, >Larry Braden, Senior Investigator >Montrose Investigations >Montrose, CO >e-mail at Braden@rmi.net >http://www.angelfire.com/co/WestCoPI > or >http://www.ppiac.org > Well...i suppose an Australian high school is just like any other high school around the world. We have detentions, drug problems, weirdos, geeks, recess, lunch and normal classes like any other school. School runs from 8:45am till 3:15pm. Dunno what sort of times you guys have. We have 6 blocks of class per day. 2 in the morning, recess, 2 more before lunch, lunch, and then 2 more for the end of the day. That's about all you'd need to know. OK, thanx for the quick resposnse to my intro to the list. Cya! WaRP!^Synthetic Organization ************************************************************************** 6) From: "The Reptile" Subject: Re: Hackers HandBook Correct me if im wrong...but isnt that book outdated. I think that it was printed in 1987. Dont get me wrong, its still a good book, kinda, but I want 2 verify that the book ur talking bout might be outdated ************************************************************************** 7)From: BADCOFFEE@aol.com Subject: Guys this is a GOOD one... Bad's mind works in strange ways...... Reviewing some video of a time when I forgot to turn the camera OFF and put the lense cap back on and said...... (We've all done it) "WOW! The audio is CRYSTAL clear." Ok......Bad's mind switches gears..... This is a INCREDIBLE audio recorder. People "see" camcorders as "Video" devices. When they see the CAP on.....Mentally..."That sucker if OFF" to them. BUT, your getting crystal clear audio. :-) Heck....you could even drop (forget) this puppy in your bosses office...set it to slow speed.......and you got yourself a good hour of recording before you get back to pick up your camcorder that you "forgot". (see what she really thinks about you) :-) You get the idea. Ps- KILL the lights on the thing with electrical tape. Don't forget the viewfinder. BadddddddddCoffee Freelance'r for sale: Available for any gig's from coast to coast.... e-mail me at Badcoffee@aol.com and I'll give you phone # to reach me. Located in Northern New Jersey From Lame....to insane....Im the man. Legit only please ************************************************************************** 8)From: BADCOFFEE@aol.com Subject: In need of photos This is VERY nice and it IS available to you all..... Quick story..... Background: Friend was in need of photos of a lot behind a huge chain link fence with those plastic privacy slot things inbetween the links. He (friend) attempted to climb the fence...took pictures that were not suitable. The angle was poor and the lot 2 big. I could not get a Cessna in to take areals shots because of air space restrictions in that zone of air (common). Air traffic control in sub-urbs "twinge" at areal photo shoots. In landing zones....it is more like a crap shoot. This was a pain in the ass....but I got the job done. Solution: As the owner of a construction company..I bombarded the house next door with advertisements for a FREE roof inspection and 20% off a new roof if they accept the estimate within 24 hours. Well....2 weeks went by....but they DID call. On the roof..... Click Click Click Click....24 of them. GOT my photo's. NICE ones. Perfect. Hmmmm.......while Im here..... This roof is going to cost about $5,500 to replace. (what the heck right??? I'm up there already) BTW- The estimate of $6,600 didn't pan out for me. Owe well. Got my photo's though. Need to get IN? Cant figure out a way? Call Badcoffee@AOL.com. All sorts of things happen with that E-mail address. BTW- If I had to do that service again..for $$.....it would have cost him aproximately $625 dollars for those photos. If he was PI......and his client desperately needed super quality pixx....he could have re-sold them to his client for a grand easilly. Badcoffee@aol.com ************************************************************************** 9)From: Kevin Quilliam Subject: Re: Ink that can not be copied >I am looking for an ink that cannot be copied via Xerox copier, would >not show up clearly or at all. Harry, I don't know about ink, but a pattern can be placed on the paper to make copying almost impossible. It is commonly used on the key wheels that come as copy protection with some games to prevent people from copying the wheels. I know Falcon used to come with a wheel like this. Also, I know about 3 years ago the govenment demanded a large number of documents from the tobacco companies for a lawsuit. The companies used some method of making it impossible to copy the documents before turning them over to the government. You might look in old news archives and see what you get. Hope this helps. Kevin ************************************************************************** 10From: SpyKing@thecodex.com Subject: Computer Crime Here's a paper presented by NYPD at the InfoWar.con BACKGROUND The Computer Investigation and Technology Unit of the Detective Bureau was conceived to respond to the growth of high technology crime. Its formation was officially announced to the Department on July 31, 1995. MISSION Investigate crimes committed through the use of computer technology such as computer espionage, theft of intellectual property, computer fraud and child pornography. Enhance arrests where computers are a factor in the commission of the crime. Perform Forensic Examinations. MISSION Preserve the integrity of seized evidence. Provide expert testimony in court. Maintain the Detective Bureau's computerized Case Management system. Provides technical assistance to units throughout the Department. AT OUR LAB Determine True Ownership of Stolen Property. Obtain information for case. Retrieval of hidden / "destroyed" data. Prepare evidence for trial and mirror data. Provide fruits of the crime. Setup and determine operability of equipment. Establish the ability to commit the crime. COMPUTER CRIMES PURPOSE To provide a basic overview on how computers are used in the commission of crimes and their potential source of information to investigators. NEW PROBLEMS Shift from tangible to intangible. Encryption of evidence. Legislation is not keeping pace with technology. New legal precedents. Enforcement extends beyond jurisdiction Technology advancing at exponential rate. Low public awareness of potential dangers. Steganography HOW ARE COMPUTERS BEING USED? Used in crimes by employing new methods. Creation of a new area of crimes. Computers provide criminals with excellent record-keeping capabilities. More and more traditional criminal activities are being automated. NEW OPPORTUNITIES Theft of information. Aggravated Harassment. Schemes to defraud. Stalking, Child Exploitation. Theft of computer property. Embezzlement. Forgery. MODERNIZATION Drug rings. Gambling/Policy Operations. Prostitution. Pornography. HIGH TECH CRIMES Intrusions - Curious through Destructive. Software piracy. Espionage. Telecommunications Fraud. Chip Counterfeiting and Remarking. Cellular Phone Frauds. Credit card frauds. E-MAIL Aggravated Harassment. Interruption of services. Used to aid criminal activities. Solicit fraudulent schemes. PEDOPHILES/STALKING Exposure to large groups juveniles. Easy to develop relationships. Victims usually crave attention. Little fear of detection. Anonymity. SCHEMES TO DEFRAUD Little regulation. World exposure to potential victims. Easy to "pack up and change identity" Users for the most part trust each other. The general attitude of Internet users is laissez-faire, minimum of control Criminals have been taking advantage of this attitude and the general lack of knowledge of the typical user to perpetrate crimes FORGERY/FRAUD Tools available to allows duplication of items by anyone. Create "New" Credit Cards. Re-encode old credit cards with computer generated account #'s. Collects receipts from businesses, gas pumps, social engineering. Computer equipment favorite item purchased with stolen credit card. PORNOGRAPHY "Free and Easy" access to material Reduced inhibition to obtain material. Ability to amass varied material. Provides the venue to commit illegal acts. Difficult to enforce. Trading amongst individuals goes undetected. Complaints are from those who are offended. INSIDER CRIMES Involve subjects who have legitimate access but exceed their authority. Motivated to commit crimes by: Greed Opportunity Perceived grievance Corporate espionage (trade secrets) HACKER ACTIVITIES Often target computers, networks, and telephone systems. Stolen telephone access "Codez" Pirated software "Warez" Credit "Cardz" Toll fraud devices "Boxes" ATTACK METHODS Default entry codes Maintenance ports Dumpster diving (Trashing) Social engineering Technical attacks (Back doors/Address Spoofing/Sniffers) TELECOM FRAUD The telephone system computers comprise the largest computer network in the world and are the target for a variety of criminal activities. Some of the most common frauds involve: Access Code Fraud PBX Fraud Call-Sell Operations Social engineering scams ESPIONAGE FBI estimates that there are 120 foreign governments actively working intelligence operations against the US. Focus is currently on high-technology and business systems. Sub-categories of espionage: State-run intelligence services Corporate espionage Export of restricted technologies LAPTOP & COMPONENT THEFT Companies should review use polices, is employee responsible for replacement There are marking products, alert devices and central registgries Crime prevention = awareness Inventory A LITTLE KNOWLEDGE CAN BE DANGEROUS Sophisticated computer users can easily bobby trap the computer with destructive programs. These programs are intended to destroy evidence. Safeguard the computer, prevent anyone from taking a quick "peek" that could engage these destructive devices. Additionally, evidence can be retrieved after destructive means have been used to attempt to destroy evidence, but the retrieval hinges on the safe recovery methods that are performed in our lab. LAWS & LEGAL ISSUES FEDERAL LAWS TITLE 18 USC 371, CONSPIRACY TO COMMIT OFFENSE OR TO DEFRAUD UNITED STATES FOR ANY OF THE LISTED VIOLATIONS: TITLE 18 USC 545, SMUGGLING GOODS INTO THE UNITED STATES TITLE 18 USC 641, PUBLIC MONEY, PROPERTY OR RECORDS (THEFT) TITLE 18 USC 1029, FRAUD AND RELATED ACTIVITY IN CONNECTION WITH ACCESS DEVICES TITLE 18 USC 1030, FRAUD AND RELATED ACTIVITY IN CONNECTION WITH COMPUTERS. USE OF COMPUTERS FOR ECONOMIC ESPIONAGE. COMPUTER INTRUSIONS TITLE 18 USC 1362, COMMUNICATIONS LINES, STATIONS OR SYSTEMS (U.S. GOVERNMENT) TITLE 18 USC 1956, LAUNDERING OF MONETARY INSTRUMENTS TITLE 18 USC 2252, CERTAIN ACTIVITIES RELATING TO MATERIAL INVOLVING THE SEXUAL EXPLOTATION OF MINORS (KIDDY PORN) FEDERAL LAWS TITLE 18 USC 2511, INTERCEPTION AND DISCLOSURE OF WIRE, ORAL, OR ELECTRONIC COMMUNICATIONS PROHIBITED (MONITORING CELLULAR VOICE CHANNELS AND EAVEDROPPING) TITLE 18 USC 2512, MANUFACTURING, DISTRIBUTION, POSSESSION AND ADVERTISING OF WIRE, ORAL OR ELECTRONIC COMMUNICATION INTERCEPTING DEVICES PROHIBITED (POSSESSION) TITLE 18 USC 2513, CONFISCATION OF WIRE, ORAL OR ELECTRONIC COMMUNICSTION INTERCEPTING DEVICES NY STATE STATUES: 156.05 Unauthorized Use A Mis. Must have a function that prevents access 156.10 Computer Trespass E Felony Knowingly gains access to further felony 156.20 Computer Tampering Alters Data 156.30 Unlawful Duplication E Felony 156.35 Crim Poss Computer Material E Felony 235.12 Disseminating indecent materials to minors in the second degree E Felony 235.22 Disseminating indecent materials to minors in the first degree D Felony WHAT TO BE AWARE OF ECPA- Stored electronic communications-E MAIL PPA- BBS and works in progress Doctors, lawyers, clergy A company acting to protect its property or interests can analyze their systems for misuse or abuse. WHAT TO BE AWARE OF A private party becomes a police agent and 4th Amendment kicks in when: The private party performs a search for which the government would need a warrant and that party performs that search to assist the government, as opposed to protecting its interests and the police are aware of the conduct and do not object. Searches by private parties who are not working for the police are not covered by the fourth amendment. INVESTIGATIVE TIPS INVESTIGATE TIPS In appropriate cases, 'muds and luds' on targets phone to show where he called Dump on the victims phone to see where calls came from- COST involved TARU In business community, there will be audit trails; if system administrator has them turned on CASE ENHANCEMENT E-MAIL/ONLINE Obtain E-mail address. Chat Logs of conversation. Where encountered (room/service) Copies of all correspondence. BUSINESS COMMUNITY CONCERNS RISK ANALYSIS Check with service reps, are maintenance passwords installed. Check all dial in access, logs should be reviewed, telephone records kept Delete Default Passwords Are passwords and accounts deleted when an employee leaves employment Register all hardware, keep accurate inventory COMPANY POLICIES Does your employer have written policy regarding use of computers, who owns applications developed for company Company should have banners outlining policy regarding use and level of authorization All employees should be given this policy statement at orientation Internet policy: employee use while on company time Employees should be informed that E-mail is not private and can be reviewed COMPANY POLICIES Are all transaction logs and audit trails on Monitor use of shipping carrier accounts, phone usage, company Internet accounts for employee fraud Be aware that some employees have set up their own on-line companies Does the company allow employees to encrypt files without providing keys Is employees computer access level commensurate with responsibilities RESPONSE TEAM In regards to federal statutes, computers that have links across state lines are "federal interest computers" Human Resource, Legal, MIS, Security all must work together In addition to disaster recovery, what happens when a criminal act is committed against the companies computers Contingency Planning INITIAL STEPS Background information, specific logs, office gossip can be reviewed to determine if a crime has occurred, and if the company is willing to fully prosecute, THEN BRING IN THE POLICE. Strictest Confidentiality will be maintained When an intrusion, or what may be a criminal act is discovered, businesses operating to protect their interests can conduct initial fact finding in a more productive manner than immediately notifying the police. BUDGET-DATA SECURITY Staffing Password-generators Smartcards Anti-virus Firewalls Encryption Storage BACKUPS Discuss backup strategy Integrity of Backups and information Are they tested for reliability SUMMARY Majority of theft of proprietary information theft committed by insiders Employment screening is a must E-Mail Policies: Remember discovery motions… Audit trails- integrity of information, backups, logs, records, etc….. Proactive vs. Reactive Encryption-"Make nobody able to read what they stole." QUESTIONS HOW TO REACH US... C.I.T.U. One Police Plaza, Room 1110D (212) 374-4247/4248 ACKNOWLEDGEMENTS We would like to acknowledge the following individuals and organizations for the assistance and technical expertise: HTCIA SEARCH FLETC FBI SECRET SERVICE Kenneth Rosenblatt, author of "High Technology Crime" ************************************************************************** 11)From: BADCOFFEE@aol.com Subject: The camcorder The "camcorder".....the Mini-series. Facinating device. Whats the best place to drop a full size camcorder??? Hint: You put dirty cloths in it. It has huge holes and it is made of plastic. You guessed it. A Hamper. Ok, not practical for every application. But it still is one hell of a place to conceal "your" Camcorder, that you ALLREADY own. If anyone out there enjoy's these "Layman" posts that I drop in....drop me a line to let me know. Also: What are "your" interests? (Need to know what makes this list tick) Augie <:-(i) Badcoffee@aol.com ************************************************************************** 12)From: zerohero@juno.com (john j smith) Subject: I got a job! Hey gang, I wanted to share the good news: as of Monday I am hired as a PI. I've finally(!) secured sponsership and a job. From what I understand, most of my work will involve surviellence of insurance claiments (i.e.: fraud, the guy with the bad back jumping on the trampoline - Dateline kind of stuff). It would seem as though I will be able to share the unique experience of "starting at the bottom" for the benefit of all on the forum. It should be interesting...... zh ************************************************************************** 13)From: SpyKing@thecodex.com Subject: A letter from the Smithsonian Institute The story behind this...Apparently, there is a nutball who digs things out of his back yard and sends his "discoveries" to the Smithsonian Institute, labeling them with scientific names and insisting they are actual archeological finds. Anyway, what follows is a letter from the Smithsonian Institute in response to his submission of a recently discovered specimen. ==================================================== Paleoanthropology Division Smithsonian Institute 207 Pennsylvania Avenue Washington, DC 20078 July 1996 Dear Sir: Thank you for your latest submission to the Institute, labeled "211-D, layer seven, next to the clothesline post. Hominid skull." We have given this specimen a careful and detailed examination, and regret to inform you that we disagree with your theory that it represents "conclusive proof of the presence of Early Man in Charleston County two million years ago." Rather, it appears that what you have found is the head of a Barbie doll, of the variety one of our staff, who has small children, believes to be the "Malibu Barbie". It is evident that you have given a great deal of thought to the analysis of this specimen, and you may be quite certain that those of us who are familiar with your prior work in the field were loathe to come to contradiction with your findings. However, we do feel that there are a number of physical attributes of the specimen which might have tipped you off to its modern origin: 1. The material is molded plastic. Ancient hominid remains are typically fossilized bone. 2. The cranial capacity of the specimen is approximately 9 cubic centimeters, well below the threshold of even the earliest identified proto-hominids. 3. The dentition pattern evident on the "skull" is more consistent with the common domesticated canine (dog) than it is with the "ravenous man-eating Pliocene clams" you speculate roamed the wetlands during that time. This latter finding is certainly one of the most intriguing hypotheses you have submitted in your history with this institution, but the evidence seems to weigh rather heavily against it. Without going into too much detail, let us say that: A. The specimen looks like the head of a Barbie doll that a dog has chewed on. B. Clams don't have teeth. It is with feelings tinged with melancholy that we must deny your request to have the specimen carbon dated. This is partially due to the heavy load our lab must bear in its normal operation, and partly due to carbon dating's notorious inaccuracy in fossils of recent geologic record. To the best of our knowledge, no Barbie dolls were produced prior to 1956 AD, and carbon dating is likely to produce wildly inaccurate results Sadly, we must also deny your request that we approach the National Science Foundation's Phylogeny Department with the concept of assigning your specimen the scientific name "Australopithecus spiff-arino." Speaking personally, I, for one, fought tenaciously for the acceptance of your proposed taxonomy, but was ultimately voted down because the species name you selected was hyphenated, and didn't really sound like it might be Latin. However, we gladly accept your generous donation of this fascinating specimen to the museum. While it is undoubtedly not a hominid fossil, it is, nonetheless, yet another riveting example of the great body of work you seem to accumulate here so effortlessly. You should know that our Director has reserved a special shelf in his own office for the display of the specimens you have previously submitted to the Institution, and the entire staff speculates daily on what you will happen upon next in your digs at the site you have discovered in your back yard. We eagerly anticipate your trip to our nation's capital that you proposed in your last letter, and several of us are pressing the Director to pay for it. We are particularly interested in hearing you expand on your theories surrounding the "trans-positating fillifitation of ferrous ions in a structural matrix" that makes the excellent juvenile Tyrannosaurus rex femur you recently discovered take on the deceptive appearance of a rusty 9-mm Sears Craftsman automotive crescent wrench. Yours in Science, Harvey Rowe Curator, Antiquities ************************************************************************** Who are you? What's your specialty and/or interest? Let us know about your company... What would you like to see on the list? Post it. Let us know... Do you have something to contribute? We'd like to hear it... We want to know EVERYTHING and ANYTHING about eavesdropping, surveillance, countersurveillance & privacy related technology, etc... Remember: who, what, where, when, how & why... we want ALL the details... Do you have a question? Post it... A little free time? Help a member... With the INCREDIBLE brain power on this list, someone should have the answer ;-) P.S. Don't be a LURKER... Members take the time to post info for us all... give something back... Don't just take... Your input/knowledge is valued... ************************************************************************** Send Postings to: spyking@con2.com with "Post" in subject field with subject ************************************************************************** Subscribe to: spyking@con2.com In the subject field type: subscribe-surveillance list e-mail address ************************************************************************** Unsubscribe to: spyking@con2.com In the subject field type: unsubscribe-surveillance list e-mail address ************************************************************************** ...The Simple Rules of the Surveillance List... The Surveillance List Owners may Reject any posts that are/contain: 1) Info Unrelated to Eavesdropping, Surveillance or Privacy technology... 2) Flames or Negative posts... 3) E-Signatures that are considered excessive... 4) Advertisements not DIRECTLY related to the list topics... 5) Attached Files... 6) Oversized Posts... (May be edited to save room) **************************************************************************** This publication is copyrighted and is protected by U.S. and International copyright law. The information transmitted on this list may not be reproduced, reposted or forwarded to any non-list member without expressed written permission of the List Owner. Violation of U.S. copyright law is a criminal and civil offense... **************************************************************************** The Surveillance List is Moderated by SpyKing@thecodex.com The List Owner will make EVERY effort to protect subscribers from spam... Copyright 1996, 1997 Codex Publishing Inc., All Rights Reserved... **************************************************************************** ****************************************************************************** The Official Newsletter of W.A.S.P. The World Association of Surveillance Professionals http://www.thecodex.com/wasp.html ****************************************************************************** Vol.Two Issue #202 The Surveillance List Sept.22,1997 Over 3000+ Members Worldwide Representing 53 different countries List Chat at: http://www.thecodex.com/chat.html ****************************************************************************** While we STILL feel there is NO SUCH THING as a stupid question... We suggest the newer list members AND the technically challenged browse through the FAQ before posting a question... Surveillance List Pseudo FAQ at: http://www.thecodex.com/faq.html P.S. If you have something to add to the FAQ, let us know... ****************************************************************************** IN THIS ISSUE... ****************************************************************************** 01) Re: Ink & Copiers 02) SECRET SERVICE PAGERS 03) Fooling Caller ID 04) Re: Ink that can not be copied 05) Video recording tip... 06) Re: Ink & copiers... 07) Encryption 08) K9 SCHOOLS 09) ClassicSys, a new way to move on cryptography... 10) Re: Guys this is a GOOD one... 11) Re: Ink that can not be copied 12) Year 2000 13) Re: Non-Copy Ink 14) Weird clicks on telephone line 15) Re: Ink & Copiers & Paper 16) Reaching 800 17) Re: Psychology 18) Starting out 19) Ink that doesn't copy 20) Ink and Copiers 21) Re: Munchausens syndrome 22) Supplier 23) Re: Ink that can not be copied 24) Is there a way I can obtain more info? ****************************************************************************** DON'T BE A LURKER.... GET INVOLVED... YOU ARE A MEMBER... MAKE THE MOST OF IT ****************************************************************************** 1)From: Robson Steve Subject: Re: Ink & Copiers >>I am looking for an ink that cannot be copied via Xerox copier, would >>not show up clearly or at all. >I remember being in a library (in England -- perhaps London?) where certain >books could not be copied. Was it RED ink print that wouldn't copy? Any >one from across the pond care to kick in their two cents worth? >-Bret Bret, I deal with a lot of aerial photos and satellite imagery and when I need to write onto an image which needs to be reproduced at a later date, without the writing, I use a pencil called a "Non-repro blue". It is generally used by printers and graphic designers. In my experience red shows up like black due to the process laser copiers use. The best bet here would be to talk to a local printer and get the rundown on inks from them after all they use it ALL the time. Having said that I must also point out that if someone wants to copy the printed material (and cannot Xerox it) what's to stop them using a scanner? Everything can be copied with a little know-how. Stephen. ************************************************************************** 2)From: "David R. Alpert" Subject: SECRET SERVICE PAGERS This aired on ABC World News Tonight: There is news tonight of importance for millions of American consumers. Your pager many not be secure. By some estimates, as many as 50 million Americans wear electronic pagers. Tonight, ABC's Deborah Amos repoots that hackers have found a way to intercept some of the messages those pagers send and receive. And White House communications are not immune. Script: "Didn't you get my page?" PAGERS PROMISE A BETTER WAY TO KEEP IN TOUCH... "Get the message guaranteed!" BUT JUST WHO ELSE CAN GET THE MESSAGE? IT TURNS OUT, IT'S SURPRISINGLY EASY TO EAVESDROP ON PAGERS SOT Mary Jo White, US Attorney: "If you have a particularly sensitive message, do it some other way - some more secure way." THIS WARNING, AFTER CHARGES THAT THE NEW YORK POLICE DEPARTMENT'S PAGERS WERE BUGGED. NOW, ABC HAS LEARNED THAT HACKERS HAVE AIMED MUCH HIGHER. "White House staff and Secret Service use these alpha-numeric pagers. It's a fairly new technology that displays words, not just phone numbers. Good for communication, but apparently easy to bug -- which is exactly what happened to the White House pagers." SOT Emmanuel Goldstein, "2600" Hacker Quarterly: "This is pager traffic concerning the President of the United States when he was in Philadelphia last April...The pagers were transmitting all kinds of data as to where he was, where he was going, who was on the phone...All wide open, in the clear.' THE WHITE HOUSE SAYS NO SENSITIVE INFORMATION IS TRANSMITTED OVER ITS PAGERS, BUT A SECURITY ANALYST DISAGREES SOT Joe Masonis, Former Secret Service Agent: JS:"From the transcripts, the information is arrivials,departures, locations, support activity related to the events, the people involved in that support activity." DA:"Should that information be out there?" JS:"That information should be protected.' BUT PAGER MESSAGES ARE NOT PROTECTED, AND YOU ONLY NEED A FEW BASIC TOOLS TO LISTEN IN. SOT Brian Gimlett, Secret Service: BG: "The scanner, the computer, the software, the cabling, and this piece of equipment that loads your pager number into mine." DA: "That's it?" BG: "That's it." HERE'S HOW IT WORKS. PAGER COMPANIES BROADCAST MESSAGES OVER PUBLIC FREQUENCIES. A SCANNER PICKS UP THOUSANDS OF THOSE MESSAGES - THEN A COMPUTER PROGRAM SORTS THRU ALL OF THEM USING KEY WORDS - HELPS IDENTIFY THE OWNER AND MAKES A DUPLICATE PAGER. FROM THEN ON, BOTH PAGERS GET THE SAME MESSAGE AT THE SAME TIME. S/U THE PAGER INDUSTRY HASN'T YET FIGURED OUT A WAY TO MAKE THESE GETS MORE SECURE. AND THAT'S WHY LAW ENFORCEMENT OFFICIALS URGE CAUTION.BECAUSE YOU NEVER KNOW WHO ELSE MAY BE GETTING THE MESSAGE. DEBORAH AMOS ABC NEWS, WASHINGTON. And this ran on the REUTERS wire Thursday: PALO ALTO, Calif. (Reuter) - A purported transcript of dozens of intercepted pager messages sent to President Clinton's Secret Service detail was posted on the Internet Friday by a computer hacker. The messages included minute-by-minute updates about the president's whereabouts as well instructions to agents to call the White House switchboard, love notes, basketball scores and notification that Chelsea Clinton was on hold for her father. According to time stamps, the messages were intercepted on April 27, a day on which the president was visiting Philadelphia for an awards ceremony. The White House said it knew its pager messages had been monitored but declined to say whether the transcript was genuine. Pamela Finkel, a New York-based computer consultant, published the messages on her Web site (http://www.inch.com/esoteric/pam-suggestion/formal.html) on Friday to show how easy it was to intercept private communications, she said. She also said she wanted lawmakers to reconsider proposed legislation that would make it illegal for private citizens to protect themselves from electronic eavesdropping by using so-called strong encryption technology. "I don't know if I'm going to win converts in Congress, but if I make them top to think, this would be worth it," Finkel said in an interview. "The information is more embarrassing than dangerous." Finkel is also a member of the staff of 2600, a quarterly hacker newsletter. She said the transcript was handed to her on a floppy disk a few months ago by an unidentified young male hacker who wanted it printed anonymously. "The White House is aware that sombody has monitored paging traffic," White House spokesman Joe Lockhart said on Friday. "Our paging system is not secure, so we'd know not to send unsecured messages." Secret Service officials in Washington could not immediately be reached for comment. The alleged interception highlights a debate between technology companies and law-enforcement agencies over whether citizens should be able to use unbreakable codes in everything from electronic mail to conversations over cellular phones. While companies like Microsoft Corp. say strong encryption is necessary for electronic commerce on the Internet, law agencies argue that encryption would allow drug smugglers and political extremists to communicate among themselves without fear of police eavesdropping. Two weeks ago, a House of Representatives committee on national security revamped a bill that would have let software companies export technology that contains strong encryption techniques. The House is also considering curbing the use of encryption technology domestically. Encryption experts said the alleged interception illustrated why encryption was necessary. "What an example! The Secret Service are victims themselves," said Jim Bidzos, chief executive of RSA Data Security Inc., a software company that sells encryption products. "This is the most sensitive communication of the Secret Service. What better argument could there be?" Finkel said it was relatively easy to intercept almost any pager message. All it takes is a high-end radio scanner, a personal computer and hacking software readily found on the Internet, she said. The transcript includes messages like: "If you don't come back with food ... don't come back -- Airborn"; "Call your mother"; "Minor hostage situation in Texas, not much known now"; and "Sir, Bulls 109, Bullets 104, Jordan 55 points." REUTER David R. Alpert, KB2LUM ABC News dra@pipeline.com - home alpertd@abc.com - work ************************************************************************** 3)From: "ADRIAN BEACH" Subject: Fooling Caller ID I thought I would forward this, it seemed appropriate for this list. AJ Beach I received a call the other day for my brother, the number that showed up on the caller ID was 801-999-9842 He called it back and a recording said it was unable to complete the call. he called AT&T and the operator told him it was a fake number set up so it couldn't be traced. I have 3 questions. 1. How do you get a number so that it shows up on caller ID like that 2. Does this work on trap lines and/or the toll free lines 3. How can you trace this back Thanks ************************************************************************** 4)From: Ben Meredith Subject: Re: Ink that can not be copied There is a type of blue ink (either photo-blue or non-repro-blue) that used to be used quite frequently. Reads well with the eye but xerox type copiers can't reproduce it. BTW, I got some documents from a party several years ago that came on red paper with black print -- guess what color that copies as: all black! >I am looking for an ink that cannot be copied via Xerox copier, would >not show up clearly or at all. ebm@mindspring.com ************************************************************************** 5)From: BADCOFFEE@aol.com Subject: Video recording tip... Check the batteries......Check the batteries......Check the batteries......Check the batteries......Check the batteries......Check the batteries......Check the batteries......Check the batteries......Check the batteries......Check the batteries......Check the batteries......Check the batteries......Check the batteries......Check the batteries...... and ONE more time........ CHECK********THE**********BATTERIES! For the hell of it....one more time...... Check the batteries...... 2 is not enough. If ONE goes dead.......now you have ONE....but NO backup to that one if that one dies also. Check the batteries...... Augie ************************************************************************** 6)From: "karl kiefert" Subject: Re: Ink & copiers... In the first company I worked for, they had a computer game which had a copy-proof code sheet. What we did was to place a sheet of yellow film on top of it. I'm dubious if still such a thing still exists. The grey scale of copiers has been remarably improved over the last 20 years and with the new colour copiers not even currency is safe. ************************************************************************** 7)From: Manatau Subject: Encryption I was just wondering why the Fed's are making such big deal about encrypted e-mail?? How many e-mail msg's. are sent over the net a day? How many of this messages contain key words that alert a software program? A simple "word substitution" code will defeat this program. Even if all these msg's are subjected to a more powerful software program to narrow the search, how many are left. At some point each mesage has to be read by a person. How long does that take? I think you get my drift. It seems to me that it would be eaiser for the Fed's to flag all encrypted msg's and submitt them to decoding. What is al the fuss about? Is it my imagination or did the government suddenly become really concerned about encrypted messages after the 1992 elections. K.C. www.sierranv.net/sds ************************************************************************** 8)From: "Shadow Chasers" Subject: K9 SCHOOLS Anyone know of a K9 vocational school that offers the K9 as part of the enrollment; upon completion of the course? Once read an article in the past, that such a school exists in AZ/CO? Any information members can provide, would be helpful! ************************************************************************** 9)From: Emile Musyck Subject: ClassicSys, a new way to move on cryptography... Please forward this message to all the people of your organisation interested in cryptography (R&D, General management, ...). Thanks in advance. We conceived a new way to move on cryptography. Our systen, called ClassicSys, enables all present and future needs of cryptographic applications (Email, authentification, ...). The main advantages are : - ClassicSys can be used on a national and international level - ClassicSys is based on a new transparent algorithm (SED) - ClassicSys is completely different from what exists today (RSA, DES, ...) - ClassicSys is faster and highly secure - ClassicSys cannot be refused by any countries due to present and future legal aspects. - ClassicSys uses secret keys that are never known by any users If you are just curious or interested to discover this new cryptographic technology, interested to integrate it in your applications, or interested to develop new applications using ClassicSys, you will find a complete information at the following address http://www.ulb.ac.be/di/scsi/classicsys/ Do not hesitate to forward this message to anybody interested by this topic and feel free to contact us for more information : we really would appriciate your feedback ! Emile Musyck Scientific Collaborator emusyck@ulb.ac.be ************************************************************************** 10)From: Martin Pask <100142.3101@compuserve.com> Subject: Re: Guys this is a GOOD one... 7)From: BADCOFFEE@aol.com Subject: Guys this is a GOOD one... Done that one. Use the SONY GV5 if you can get hold of one. With the right tape and on slow play you have 3 hours of very good audio. If you then plug a mike though a pre amp into the audio socket the pick up is brilliant. M.P.I ************************************************************************** 11)From: Martin Pask <100142.3101@compuserve.com> Subject: Re: Ink that can not be copied If you use a high lite pen over the area you dont want to be copied that should work but it is a bit obvious. M.P.I. ************************************************************************** 12)From: "r.allenn" Subject: Year 2000 Does anyone know if this year 2000 computer glitch has been solved yet. What company leads the way for solving or researching this problem? Rick P. r.allenn@centuryinter.net ************************************************************************** 13)From: nespy@tiac.net Subject: Re: Non-Copy Ink >I am looking for an ink that cannot be copied via Xerox copier, would >not show up clearly or at all. There is a ink color called non-repro blue. It is used by graphic designers for layout lines and paste up notes. It is used because copy machines can not see it and therefore it will not show on the copy. -John nespy@tiac.net ************************************************************************** 14)From: ford.prefect@gumby.com Subject: Weird clicks on telephone line During this past summer I had on a few occasions left my telephone line recorder on accidentally. This meant that when it was/is on I can listen to all of the things going on on the line, whether it be someone making a call or what have you. Well, on some of the nights when I stayed up late, I heard some clicking on the line which lasted for about 10 seconds. This clicking usually occured at about 4 or 5 am. Now I have heard this same clicking noise before. I heard it about a year ago when I had the telephone company (GTE) remotely test out the line. At that time, I had left the recorder on on purpose to see what kind of things they did to test it out (becuase they told me to hang up when they tested it). What I am wondering is why am I hearing this at certain times? From what I have heard, I have concluded that the phone company does this sort of thing on all of the phone lines in the area, or at least most of them, and uses it as a nightly diagnostic routine. Anyione know if this is correct or not? *-[ Cross Hare ]-* Sysop of High Entropy BBS {ford.prefect@gumby.com} -----BEGIN GEEK CODE BLOCK----- Version: 3.12 GCS d-(+) s++:++ a--- C+++ UBLAIS+++ P+ L++ E---- W- N+ o? K- w--- O M+ V PS+ PE Y+ PGP t+ 5- X+ R(+) tv b++ DI+ D---- G e- h!>++ r !y ------END GEEK CODE BLOCK------ (http://krypton.mankato.msus.edu/~hayden/geek.html) ************************************************************************** 15)From: Jean-Pierre Forest Subject: Re: Ink & Copiers & Paper We have been using a sheets of CopyControl paper at our office to prevent people from photocopying price list, client list, documents rated higher than Confidential and the paper works great. The only problem I see with it, is it is harder to read the text than on normal paper. The CopyControl paper is a reddish color with tons of greyish characters printed into the backgroud of the paper. You can clearly see what you type or print on the original, however trying to photocopy it will result in a completely black sheet. I haven't done extensive test with a color copier, but the initial test could reveal certain character in the document, I believe that adjusting color balance & contrast on newer digital copier, one will be able to isolate the actual text from other non-legitimate characters on the pages. I don't have the actual manufacturer of the paper which is at my office, if someone really needs it they can e-mail me privately and I'll get it when I return to my office on Monday. Blue Skies, J.P. ************************************************************************** 16)From: nadie Subject: Reaching 800 So..there's no such thing as a stupid question... right? So I'm taking tha literally....you see I'm not in Canada or the U.S so obviosly I cannot dial any 1-800 , 1-900 or 1-700 number cause of the area number... so.. I was wondering ...is there a way I could reach these number (I've tried all possible prefix..not sure though) or is everything a lost cause...(if so please answer why).. Any answer is welcome...Thanks ************************************************************************** 17)From: rkidd@localnet.com Subject: Re: Psychology In the military we used to refer to this as Psy Ops, Psychological Operations (or warfare). A very useful tactic in forcing the target to reveal their true intentions, or their positions (among a variety of other things). As an investigator, I used this tactic quite a few times. It was very effective and produced results when standard methods of surveillance did not. When working on narcotics related cases, or cases that placed priority on immediate results, this tactic is most effective. The intention in the investigative aspect was not to cause the subject physical harm, but undue psychological stress. The resulting stress usually caused the once careful subject to make those critical mistakes required to bust them. Divide and conquer philosophy always worked well with skillfully timed and placed appearances of known Narcotics investigators in the same establishment with the subject's most "trusted" associates. Then follow this with "overt" surveillance of the subject at random intervals. Eventually the subject's normal paranoia will overtake him/her and they are open to some friendly counseling from their newly "concerned" friend (the narcotics officer) who dropped by for a social visit and casually mentions that somebody might be "setting the subject up." With no where else to turn, the subject does one of two things (in most cases) 1) makes a stupid mistake thta results in a bust, 2)Begins to turn to law enforcement for perceived self-preservation. I know I'll be flamed from somebody on this, but I'm ready for the heat. Sincerely, Rick Kidd Confidential Security Services(CSS) Association of Counter-Intelligence Professionals (ACIP) ************************************************************************** 18)From: zerohero@juno.com (john j smith) Subject: Starting out I turned in my license application today and received my investigator's ID card from the company today. Also was issued my equipment : video camera, tape recorder, binoculars - all that jazz. Get my cell phone Monday and start working my case load. You know, I have to say to everyone that I do not title my posts and so far Spymaster has been doing it for me. I appreciate it Spymaster, I realize its probably a pain in the a*#! to do it. Augie - I'm officially letting you know that I for one appreciate your posts "for the layman". I would like to say to anyone interested this thought: Going from a "regular" full time job, and all the amenities of it, to a more or less un-structured schedule is a more difficult change than I initially thought. I mean, to now I have pursued surviellence as a general interest - on my own time....now I will be doing it for a living on subjects that are handed to me. I know to some - myself included - this sort of "work freedom" and "self reliability" is a dream come true, I'm just saying its an adjustment that at the moment I'm not really sure how to deal with. If you have any thoughts on the subject, please post them! Thanks ZH +++Moderator's Note+++ >>>> You know, I have to say to everyone that I do not title my posts and so far Spymaster has been doing it for me. I appreciate it Spymaster, I realize its probably a pain in the a*#! to do it. <<<< Yes it is a pain in the a*#! Please title your posts... ;-) ************************************************************************** 19)From: "M. J. Van Ham" Subject: Ink that doesn't copy Highlighter doesn't photocopy (at least, not any photocopier I've tried). If you're doing just a quick note or two, this will work great. If you're doing something larger or more elaborate though, writing everything in highlighter doesn't seem very practical.. :) ..later ************************************************************************** 20)From: Trace Carpenter Organization: Trace Carpenter Investigations To: SpyKing Newsletter Postings Subject: Ink and Copiers Red ink shows up as black. It's blue that you're looking for. Commerical artists and paste up techs use a blue pencil which will not show up at all on the copier. I always bought mine at Azel art supply here in Dallas, but you can get them many places. -- Trace Carpenter Investigations ****** 2926 Maple Ave., Ste. 200 Ignorace of the law is no excuse; Dallas, Texas 75201 Ignorance of the law-makers apparently 214.828.4520 is. 214.740-0112 Facsimile ****** ************************************************************************** 21)From: BADCOFFEE@aol.com Subject: Re: Munchausens syndrome RE: "KcW" Subject: Re: Munchausens syndrome >>>Note the spelling. Baron Von Munchausen b.1720 German adventurer and confabulator. Condition charatcerized by habitual pleas for treatment and hospitalization for a symptomatic, but imaginary, acute illness. Person may logically and convincingly present the symptoms and history of the real illness. Symptoms resolve with treatment, resulting in a new imaginary disease.<<<< Bad writes: MUCH better description than mine. I heard a lot about this disorder and just received first hand experience in it in this field. Anyone here remember "Sommy". Would this be something in the lines of this disorder? Psychiatrist's.....get busy here and start giving us a bit about your field. This is a 'People" field. Characteristics and behavior especially. Anything. Augie ************************************************************************** 22)From: allamosa@roanoke.infi.net (happydog) Subject: Supplier Here is a supplier that has good prices and ships as promised (the same day). http://www.007eleven.com/index.html I recommend them highly. Douglas Chandler Graham 3114 Carvins Cove Road Salem, VA 24153-3356 (540)384-7360 Fax(540)384-7040 http://www.qpage.com/host/search.shtml ************************************************************************** 23)From: gaugusti@hqgbcs.attmail.com (Grant Augustine x4058) Subject: Re: Ink that can not be copied Harry, Answer to Q1 -- Use _light_ blue ink to significantly reduce copiers effectiveness. Many government documents use this quite effectively. Answer to Q2 -- IBM's Cryptolope software can stop "un-authorized" reproductions, and can tell you where copies were `hacked` from (whose authorized copy got hacked or let itself ....) IBM's Cryptolope software can be programmed to govern how the enclosed information is used, accessed, delivered, protected, tracked, sold and fulfilled, offering a wide assortment of potential business applications. For example users can: * Create intelligent forms that will automatically update information to central databases, or to themselves, after employees fill them out. * Sell applet-based services over the Web (e.g., a one-time virus scan or a spell check). * Add value to any content sold over the Web by making it perform (e.g., reports that present themselves or interact with the user). * Allow software to upgrade itself on employees' desktops with less risk of costly error. Features Cryptolope Live! provides a complete solution for the information management needs of businesses today with the following features: * Authentication -- Provides identification of the creator/sender with digital certificates. * Encryption -- Uses industry standard encryption technology to protect the content as well as the encryption keys themselves. * Key Management -- Uses passwords to protect transmitted content within a Cryptolope container, even after reaching its destination, extending security beyond firewalls and SSL connections. * Rights Management -- Specifies the access restrictions for the content, as well as permitted usage (view, print, export) and different purchase prices for different uses. * Extensibility -- Permits users to customize Cryptolope containers to their specific business needs, using the powerful Java scripting language. * Audit Trail -- Provides event logging of all purchase/open requests and uses. * Payment -- Enables users to connect to real-time credit card transaction processing services. See http://www.cryptolope.ibm.com for more details. ************************************************************************** 24)From: "GYPSY" Subject: gypsy@theriver.com #1.I have a relative who I believe died. Oddly enough, I have his original birth certificate (it is a long story) but because our family does not communicating I have no more info about him and would like to know more about him. I think I know where he might have died but I can not be sure. Is there a way I can obtain more info? #2. I would like to be a PI but do not know where to start. I have always been good at finding info needed (except for the above) since child hood and can persevere like no other. Any tips? I prefer to be contacted directly but any way of obtaining the info is ok. thanks. ************************************************************************** Who are you? What's your specialty and/or interest? Let us know about your company... What would you like to see on the list? Post it. Let us know... Do you have something to contribute? We'd like to hear it... We want to know EVERYTHING and ANYTHING about eavesdropping, surveillance, countersurveillance & privacy related technology, etc... Remember: who, what, where, when, how & why... we want ALL the details... Do you have a question? Post it... A little free time? Help a member... With the INCREDIBLE brain power on this list, someone should have the answer ;-) P.S. Don't be a LURKER... Members take the time to post info for us all... give something back... Don't just take... Your input/knowledge is valued... ************************************************************************** Send Postings to: spyking@con2.com with "Post" in subject field with subject ************************************************************************** Subscribe to: spyking@con2.com In the subject field type: subscribe-surveillance list e-mail address ************************************************************************** Unsubscribe to: spyking@con2.com In the subject field type: unsubscribe-surveillance list e-mail address ************************************************************************** ...The Simple Rules of the Surveillance List... The Surveillance List Owners may Reject any posts that are/contain: 1) Info Unrelated to Eavesdropping, Surveillance or Privacy technology... 2) Flames or Negative posts... 3) E-Signatures that are considered excessive... 4) Advertisements not DIRECTLY related to the list topics... 5) Attached Files... 6) Oversized Posts... (May be edited to save room) **************************************************************************** This publication is copyrighted and is protected by U.S. and International copyright law. The information transmitted on this list may not be reproduced, reposted or forwarded to any non-list member without expressed written permission of the List Owner. Violation of U.S. copyright law is a criminal and civil offense... **************************************************************************** The Surveillance List is Moderated by SpyKing@thecodex.com The List Owner will make EVERY effort to protect subscribers from spam... Copyright 1996, 1997 Codex Publishing Inc., All Rights Reserved... **************************************************************************** From: "Shabbir J. Safdar" Subject: BoS: ALERT: On Monday, call Congress to stop Big Brother amendment! =========================================================================== ____ _ ____ _ _ | __ )(_) __ _ | __ ) _ __ ___ | |_| |__ ___ _ __ Stop the Big Brother | _ \| |/ _` | | _ \| '__/ _ \| __| '_ \ / _ \ '__| Amendment, coming next | |_) | | (_| | | |_) | | | (_) | |_| | | | __/ | week in the House |____/|_|\__, | |____/|_| \___/ \__|_| |_|\___|_| Commerce committee! |___/ Posted September 18, 1997 Please forward where appropriate until September 28, 1997 This alert brought to you by The Voters Telecommunications Watch, The Center for Democracy & Technology, the Electronic Frontier Foundation, Wired Magazine, and Americans for Tax Reform _________________________________________________________________ Table of Contents Stop the Government From Building Big Brother Into The Internet What You Can Do -Please contact four leading members of Congress Background About This Alert _________________________________________________________________ STOP THE GOVERNMENT FROM BUILDING BIG BROTHER INTO THE INTERNET In 1948, George Orwell described a future world in which Big Brother peaked over the shoulder of every citizen -- watching every move and listening to every word. Now, in 1997, the FBI is pushing the United States Congress to pass legislation which would make George Orwell's frightening vision a reality. Next week the House Commerce Committee will meet to consider a proposal that would require all Americans to provide the government guaranteed access to their private online communications and business transactions. Taking a page out of Orwell's 1984, the FBI-spawned proposal would require that every part of the Internet -- from the software on your computer to the network provider that carries your messages around the net -- be jury-rigged to divulge your private conversations immediately on request by the FBI (see below). Unfortunately, this is not a work of fiction. The amendment, to be offered by Representatives Mike Oxley (R-OH) and Thomas Manton (D-NY), is a serious threat to your privacy and represents the first and final step in the construction of a National Surveillance Infrastructure. A vote is expected on September 25. The future of privacy and security in the information age is in the hands of the Commerce Committee, and they need to know that folks are watching and care about the outcome. On Monday September 22, please join thousands of Internet users all across the country as we call on Congress to stop big brother. With your help and support, we can ensure that George Orwell's 1984 does not become a reality. All the information you need is attached below. _________________________________________________________________ WHAT YOU CAN DO 1. ON MONDAY SEPTEMBER 22, pick up the phone and call as many of the four leading members of the Commerce committee as you can: Chairman Thomas Bliley (R-VA) (202) 225-2815 Ranking member John Dingell (D-MI) (202) 225-4071 Rep. Tauzin (R-LA) (202) 225-4031 Rep. Markey (D-MA) (202) 225-2836 2. Ask for the staffer that handles the encryption issue. 3. Say that you're calling to urge the Congressman to pass SAFE (HR695) without amendments. Specifically, say that you "OPPOSE THE OXLEY/MANTON BIG BROTHER AMENDMENT. Americans should not be required to give the government keys to the front door of their house, and they shouldn't be required to give the government the keys to unlock their private online communications." Other amendments may be proposed. Please urge the Congressman to pass SAFE "as is" and oppose any amendments. Feel free to use your own words though here are some points you might want to stress: - Oxley/Manton is a dramatic expansion of law enforcement power. It would give law enforcement "immediate" access to private online communications and business transactions without any notice or knowledge to the user. - Oxley/Manton is NOT A BALANCE BETWEEN PRIVACY INTERESTS AND LAW ENFORCEMENT CONCERNS, as some supporters have argued. It gives the FBI broad new power while stripping Americans of their Fourth Amendment right to be secure from unreasonable searches and seizures. - Oxley/Manton would give the Attorney General authority to dictate the design of Internet services and software to suit the needs of law enforcement. - Oxley/Manton would not stop crime. Strong encryption without "immediate access" features is available today at home and abroad. - Oxley/Manton would increase opportunities for cybercrime as criminal hackers attack vulnerabilities in the key recovery access system. 4. Let us know how it went! Go to one of the following web pages, depending on who you called, and tell us about the conversation. Rep. Bliley http://www.crypto.com/member/meet.cgi?membid=va07 Rep. Dingell http://www.crypto.com/member/meet.cgi?membid=mi16 Rep. Tauzin http://www.crypto.com/member/meet.cgi?membid=la03 Rep. Markey http://www.crypto.com/member/meet.cgi?membid=ma07 5. Forward this ALERT to your friends and colleagues. 6. Feel good about yourself! Know that you've stood up for privacy, and contacting Congress is more than most people take the time to do! _________________________________________________________________ BACKGROUND The House Commerce Committee is considering a bill known as the "Security and Freedom through Encryption Act" (HR 695, a.k.a. SAFE). SAFE would encourage the widespread availability of strong, easy-to-use encryption technologies in order to protect privacy and promote electronic commerce on the Internet. SAFE enjoys broad support from Internet users, civil liberties advocates, and over 250 members of Congress. Last week, the Commerce Committee delayed its vote on the SAFE bill in order to give the Committee more time to study the implications of the Oxley/Manton amendment, which would change SAFE to ban encryption which does not contain features that provide law enforcement with "immediate access" to the plain text of encrypted information, including private communications and business transactions (visit http://www.crypto.com/safe_bill/) The Oxley/Manton amendment would for the first time impose sweeping restrictions on the ability of American citizens to protect their privacy on US soil. Specifically, the amendment would: * PROHIBIT THE DOMESTIC MANUFACTURE AND SALE OF ENCRYPTION PRODUCTS OR SERVICES WHICH DO NOT PROVIDE INSTANT ACCESS FOR LAW ENFORCEMENT: The proposal would prohibit the manufacture, sale, import, or distribution within the United States of any encryption product unless it allows "immediate access" to the plain text of any user's messages or files without the user's knowledge. * GRANT BROAD NEW AUTHORITY FOR THE ATTORNEY GENERAL TO SET TECHNICAL STANDARDS FOR ENCRYPTION PRODUCTS: The proposal allows the Attorney General to set standards for what are and are not acceptable encryption products. The proposal's requirement of immediate access to plain text would seem to seriously limit the options available to encryption manufacturers seeking approval of their products. The amendment does not specify whether the immediate access "features" could be activated (or not) at the option of the purchaser or end user. Nonetheless, requiring that such a capability be installed in all domestic communications networks and encryption products is the equivalent of enabling a national surveillance infrastructure and asserts unprecedented control over the design of Internet software, hardware, and services. The amendment is analogous to the government requiring surveillance cameras in every new house built in the United States, which could be turned on remotely by the police if you were ever suspected of committing a crime. Worse yet, such "key escrow" or "key recovery" technologies pose significant risk to the security of the Internet -- providing new points of vulnerability for hackers, terrorists, and industrial spies to exploit. A recent study by 11 of the worlds leading cryptographers concluded that the large scale deployment of such technologies would be too complex and too insecure to meet the needs of an Information Age society (see http://www.crypto.com/key_study/) Despite widespread opposition from Internet users, civil liberties groups, privacy advocates, and the computer and communications industries, Oxley and Manton plan to push for this FBI spawned amendment at the Commerce Committee vote. If it is adopted, it would represent the first and final step in the development of a national surveillance infrastructure. _________________________________________________________________ ABOUT THIS ALERT This message was brought to you by the Center for Democracy and Technology (http://www.cdt.org), the Voters Telecommunications Watch (http://www.vtw.org/), the Electronic Frontier Foundation (http://www.eff.org/), Wired Magazine (http://www.wired.com/), and Americans for Tax Reform (http://www.atr.org/) who have joined together on this alert. _________________________________________________________________ end alert 09.18.1997 net =========================================================================== ****************************************************************************** The Official Newsletter of W.A.S.P. The World Association of Surveillance Professionals http://www.thecodex.com/wasp.html ****************************************************************************** Vol.Two Issue #203 The Surveillance List Sept.23,1997 Over 3000+ Members Worldwide Representing 53 different countries List Chat at: http://www.thecodex.com/chat.html ****************************************************************************** While we STILL feel there is NO SUCH THING as a stupid question... We suggest the newer list members AND the technically challenged browse through the FAQ before posting a question... Surveillance List Pseudo FAQ at: http://www.thecodex.com/faq.html P.S. If you have something to add to the FAQ, let us know... ****************************************************************************** IN THIS ISSUE... ****************************************************************************** 01) Communication Methods in Law Enforcement 02) Re: Encryption 03) The shadows of life 04) More Sanke-Oil. Will it ever stop??? 05) Yet more Snake-Oil 06) Multi-mic recording 07) Quick adjustment 08) WHERE TO START 09) First look at Opto Micro Counter 10) GM car acceleration due to EMI 11) MD-R's 12) Munchausen Syndrome 13) Electronic lockpick - Cobra Pro 14) GPS vehicle tracking system 15) Re: Year 2000 16) Day 1 as a P.I. 17) Terrorists made me do it 18) So you want to be a media hacker! 19) For Illegible copies of documents 20) Year 2000 Problem 21) Re: Year 2000 22) K-9 Schools 23) Re: How to dial 800 numbers from outside the US & Canada 24) The big deal about encrypted email ****************************************************************************** DON'T BE A LURKER.... GET INVOLVED... YOU ARE A MEMBER... MAKE THE MOST OF IT ****************************************************************************** 1)From: Sonice Subject: Communication Methods in Law Enforcement Hi there! I'd like to know how detectives in the Homicide division keep in constant touch with the station when they are out in the field. Are they equipped with pagers, cellular phones, walkie-talkies or are they still doing it in the good old fashion way...car radio, phone booth and the despatch clerk. Although I'm looking for info specific to Miami, Florida, methods used in other states would also be appreciated. Thank you. Sonice ************************************************************************** 2)From: "David S. 'Greeny' Greenberg" Subject: Re: Encryption > 7)From: Manatau > Subject: Encryption > > I was just wondering why the Fed's are making such big deal about > encrypted e-mail?? Because it makes the 'Big Brother' aspects of monitoring EVERY SINGLE piece of communication leaving the country just oh so much harder... PLUS, it makes the illegal monitoring of communications of Domestic citizens much more difficult as well... > How many e-mail msg's. are sent over the net a day? Lots -- but not so many that 'black agencies' boxes located at the NAPs can't sift thru what it's looking for and feed off the interesting keyword containing messages for later analysis. With encryption, this becomes MUCH more difficult to do (haven't you ever seen the message signatures that contain "NSA FOOD: Bomb, terrorist, drug, weed, LSD, heroin, cocaine, coke, nails, Federal Building, Ruby Ridge, Waco, Assault Rifle..." and so on? > How many of this messages contain key words that alert a software > program? A simple "word substitution" code will defeat this program. Yes, but with the proposed amendments to the SAFE bill, even simple word subsitution would be considered encryption which would be subject to 'instant access' by law enforcement. > Even if all these msg's are subjected to a more powerful software > program to narrow the search, how many are left. At some point each > mesage has to be read by a person. How long does that take? I think > you get my drift. lots -- and yes, they do have to be read by a person -- but only after being filtered and flagged by a zillion more computers... Remember -- these agencies have LOTS of our money to play with -- even their budgets are classified... Don't ya wish you could classify your checkbook from the bank? > It seems to me that it would be eaiser for the Fed's to flag all > encrypted msg's and submitt them to decoding. Sure. But what if EVERY MESSAGE were encrypted? > What is al the fuss about? Is it my imagination or did the government > suddenly become really concerned about encrypted messages after the 1992 > elections. Not your imagination -- they became concerned about it because about that time computers became quick enuf to handle the calculations for on-the=fly crypto...(and some other reasons.. but those are the obvious) > 9)From: Emile Musyck > Subject: ClassicSys, a new way to move on cryptography... > > Please forward this message to all the people of your organisation > interested in cryptography (R&D, General management, ...). Thanks in advance. > > We conceived a new way to move on cryptography. > > Our systen, called ClassicSys, enables all present and future needs of > cryptographic applications (Email, authentification, ...). The main > advantages are : I looked at this -- the Algorithm seems sound enuf (I have to study it some more -- but it's 1am and I need sleep so not right now) but the key distribution is BULLSHIT. It's the same ole Escrowed Key concept all over again. Let's get this straight so people aren't confused by the propoganda: * Drug dealers and terrorists ALREADY have strong, "unbreakable" encryption and are using it... * Other countries ALREADY have strong, "unbreakable" encryption and are using it, and developing more! * PGP has been translated from the paper copies, keyed in, and reassembled and compiled OUTSIDE of the US... so it's available WORLDWIDE * Encryption is simply another method of speaking which someone else can't understand unless they know the language -- ooops, sorry, I mean the 'key'. You wouldn't pass a law to prohibit someone from speaking their own language would you? Oh wait, I forgot -- you can't -- we've got that pesky First Amendment thing in the way... * US Citizens have the RIGHT against unreasonable search and seizure. This means we DON'T have to give the keys to our homes to the government. If they have *probable cause*, then they get a warrant (ok, there's some exceptions I know) and come a 'knockin... They DON'T get to walk into my house and start pokin' around w/o one! * Having to store my keys with a 3rd party (I don't give a shit if it's my mother) absolutely compromises my security. Giving it to some half-assed Governmental agency compromises it even more. Then the TERRORISTS know where they have to go to get the key to my communications -- no wait, all of the communications. But sure, the government will protect them right? Yeah sure... so only they can screw with it... * But we have Privacy Laws right -- WRONG... Just look at the cases of the geniuses at the IRS who troll thru tax records of citizens which is contrary to US Law... * If I want to have a conversation with someone that is private -- that's my business. IF the government can't wiretap -- too bad. What the hell did they do BEFORE telephones? So it becomes inconvenient for them to tap me -- let them get the ole cold war bugs out and WORK for the tap... let them set up a LASER and beam it at my windows... * If you want to go shopping on the net (as will become more the norm than the exception) then you NEED to encrypt your transactions -- yes, there's lots of traffic, but it's still prone to attack if transmitted in the clear (think of it this way -- you wouldn't SHOUT your credit card # across a room of people in a store -- why do it on the net?). I want to encrypt that thing in the most secure way possible. Moreover, I want some god damn privacy -- I'm sick of every company and jerk thinking that because I visited their site, or bought some trinket at their store that they get to deluge me with junk email, jumk physical mail, and that they get to resell my name for other useless shit I never wanted... I only get to do this with encryption... * If the government wants to tap my conversations -- let them get a warrant and do it. If it's encrypted -- tough shit. Let them figure out the code. * Think that sending info unencrypted is safe? Look at what the government has been doing for YEARS -- they encrypt everything -- hell, they even encrypt JUNK and send it out on the wires so it appears as if the traffic levels are always the same (inference controls)... What the hell makes them so special? * Remember folks -- the CONSTITUTION (you know, the thing that 'constitutes' OUR government) starts with "WE THE PEOPLE...", not "We the Government"... * I believe it was Thomas Jefferson who said (and I'm paraphrasing here): "He who is willing to give up even a little bit of liberty in order to be safe, deserves neither". * Just say NO to ESCROW! * They'll get my crypto keys when they pry them out of my cold, dead neurons * Don't forget to support the 2nd Amendment as well -- it's about the only thing protecting the other ones... * Don't forget your fifth amendment rights against self-incrimination -- that's the one that scares them -- they could haul your ass into court, say we have these encrypted conversations -- give us the keys, and you can say "I respectfully refuse to answer that question on the grounds that it MAY tend to incriminate me." and that's the end of the story... * I for one want to encrypt everything -- my mail, my web conversations, my telephone conversations, my pager traffic, my cell phone conversations, etc... I will absolutely NOT submit to some moronic law which says that I have to give the keys, and I doubt others will as well... * Still don't believe in encryption? Try sending your US Mail via postcards instead of in an envelope... Crazy you say? Hmmm... then again, the government can open envelopes or spray 'em with a disappearing fluid to make them transparent so I guess they don't have much of a problem with that... Do you? * How do you define encryption? How about if I create a new natural language and use that? Say Klingonese? No one's going to know what it is -- is it encryption? Or speech? What about stenography (hiding info inside of pictures...) -- sure I've sent my business partner a picture of a beach 500 times -- SO WHAT? * Encryption is not new -- it's been around since the days of Rome and before, and it's not going away. * I'm not buying "The Briefing" that was given by NSA to the key members of Congress, et. al morons... What is it? Let's show it on National TV so we can all DECIDE if it's such a risk or not? What's the secret? *flame on simmer... * ************************************************************************** 3)From: BADCOFFEE@aol.com Subject: The shadows of life "The man in the shadows of life.....is the one that is truly in the spotlight". Im taking credit for the creation of that quote....unless advised differently. :-) Augie ************************************************************************** 4)From: "William H. Geiger III" Subject: More Sanke-Oil. Will it ever stop??? -----BEGIN PGP SIGNED MESSAGE----- >Answer to Q2 -- IBM's Cryptolope software can stop "un-authorized" >reproductions, and can tell you where copies were `hacked` from (whose >authorized copy got hacked or let itself ....) IBM, one of the industries strongest supports of GAK has provided this wonderful product: Two new related product offerings include the IBM Key Recovery Service Provider and the IBM Key Recovery Server. The Key Recovery Service Provider is a plug-in module for KeyWorks that creates key recovery fields. Encrypted information can be recovered without escrowing an encryption key or parts of the key with any third party. The Key Recovery Server is an application that was built with KeyWorks and can be used to recover encrypted information when encryption keys are unavailable, lost, or damaged. I'll make it as simple as possiable for those of you not familiar with cryptology: IF YOU CAN RECOVER THE PLAINTEXT OF A MESSAGE WITHOUT THE ENCRYPTION KEYS THEN YOUR DATA IS NOT SECURE!!!! Sorry for the shouting but this should be quite obvious by now. IBM supports GAK, IBM enables GAK in it's programs, IBM's encryption products are not to be trusted. GAK=Government Access to Keys (AKA Key Recovery). Do you really want Norm to have access to your private data?? - --------------------------------------------------------------- William H. Geiger III http://www.amaranth.com/~whgiii Geiger Consulting Cooking With Warp 4.0 Author of E-Secure - PGP Front End for MR/2 Ice PGP & MR/2 the only way for secure e-mail. OS/2 PGP 2.6.3a at: http://www.amaranth.com/~whgiii/pgpmr2.html - --------------------------------------------------------------- -----BEGIN PGP SIGNATURE----- Version: 2.6.3a Charset: cp850 Comment: Registered_User_E-Secure_v1.1b1_ES000000 iQCVAwUBNCZn9o9Co1n+aLhhAQHF3AP+IKt4ud3MjQNjF75Rkv7CFSy3lsoImMXx ND/xyY6hW/mdKxYi086LSqtu/8tvKr/4su7+Nq+M+j9Ctm6zM6PEDf4ysDgEFQSo PiR1XTzPa80Ro5A3Piz74mR2NE8vKTS+b3C6FGVGbAh2pObwK2WF+8yROb6BsvBS Ak3dF9SRj30= =6mKM -----END PGP SIGNATURE----- ************************************************************************** 5)From: "William H. Geiger III" Subject: Yet more Snake-Oil -----BEGIN PGP SIGNED MESSAGE----- >9)From: Emile Musyck >Subject: ClassicSys, a new way to move on cryptography... >Please forward this message to all the people of your organisation >interested in cryptography (R&D, General management, ...). Thanks in >advance. >We conceived a new way to move on cryptography. Well I looked over this web-site and I would not waste the time to download the product. At least with the old time snake-oil you would get a bottle of snake-oil, with this product you don't even get that. some people should just stick to writting pong games. - --------------------------------------------------------------- William H. Geiger III http://www.amaranth.com/~whgiii Geiger Consulting Cooking With Warp 4.0 Author of E-Secure - PGP Front End for MR/2 Ice PGP & MR/2 the only way for secure e-mail. OS/2 PGP 2.6.3a at: http://www.amaranth.com/~whgiii/pgpmr2.html - --------------------------------------------------------------- -----BEGIN PGP SIGNATURE----- Version: 2.6.3a Charset: cp850 Comment: Registered_User_E-Secure_v1.1b1_ES000000 iQCVAwUBNCZkZI9Co1n+aLhhAQGrwAP+MYAghIwNnPKSmT9EQyrDlqsvupEfZTzd WRs5Wo5+ZBl8d20Cyl7KEb6BPRoVZDjV0xbWz3Xp7bym9IbnQaEmAwWPWeK/uhYV 3FErbPrLaaueKtv55g74K005mQ0/pXL31u4aRS0irXy3VcpHfXb5hxWnTOjv5udZ p9fOA3q0bpc= =vv5w -----END PGP SIGNATURE----- ************************************************************************** 6)From: BADCOFFEE@aol.com Subject: Multi-mic recording Hey! BAD knows a "little bit" of "tech". (little) Problem with using several mics is having to use "several" recorders. Sam Ash Music 1-908-572-0263 pushes out a fantastic little 4 track recorder for $149 bucks. (Sku: FOSX14) Fostex X14 four track recorder. For those that dont know about recording.....I'll share my little bit of knoledge here from my studio days.... 4 track's record from 4 individual sources (inputs) on to one casette tape. It splits the tape into 4 individual tracks and records on both sides of a standard casette. Example: Picture a standard casette tape. Picture the tape itself being split horrizontally. The picture the 1/2's of the tape being split again in 1/2.. One side will be "right channel" The other "Left channel. This is how you get "stereo". This 4 track can split the tape 4 times. 2 on side A, 2 times on side B. Now....It uses both sides of the tape WITHOUT turning the tape around. (uses the whole tape) Now....... With a recording of say 4 seperate mic's or instruments you have 4 SEPERATE tracks. Each on is INDIVIDUAL. For as long as they are individual....this casette is called a MASTER tape. (or uncut or mix depending on what street your on) By lowering the volumes on ANY track, you are now about to segregate ANY of the 4 tracks. IE- 4 people are mic'd into ONE 4 track recording. BOB is on track ONE. You can segregate BOB from PETER and record/listen just him....or BOB and PETER at same time. Or BOB and PETER and PETERS WIFE. Adjust volumes in each voice...pan it left or right...whatever you feel like doing to it. Anything you want....listen in any combination.....or all 4 at same time. ALL on a standard casette. >From the MASTER it needs to be recorded to a standard recording. From 4 to 2 chanels on one side of the casette. All done through 4 track recorder. Now...it is on the sending end of the game....to a normal recorder. Recap: 4 track splits the tape to 4 horrizontal sections. Each one individual. Each one can be pulled and listened to seperately. Final 4 track recording is called a MASTER. Master needs to be sent to the final mix. (standard recorder) Real simple. The tracks cut....depends on the machine used. Some can cut a tape to 24 track and higher. 24 track rcording. Splitting the tape to 24 tracks. 6 Left, 6 right on said A and same for side B....all done without flipping the tape over. All standard casettes and NOT very difficult to operate. Miss those studio days.... Final note: Radio Shack wireless mics: better off trying a profeccional music outlet. Some wireless systems are exceptionally good. Professional quality. 300 foot range and again.....professional quality. Radio Shack does not have professional quality equipment....cheap yes. $20 more bucks and you got something you can bring home to mama. Augie ************************************************************************** 7)From: BADCOFFEE@aol.com Subject: Quick adjustment Quick adjustment to the 4-track post you just read..... Terminology: The MASTER is your final product. "Has been Mastered" . Master: Combining all tracks to one standard casette. The final product. Im used to calling the uncut, raw recording a "Master". That is incorrect. UN-MASTERD, raw....uncut......whatever you would like to call it. If someone hands you a MASTER tape....it is probably the ORIGINAL and final product to be reproduced. (where it looses all the neat names and turns into a casette). Ooops. :-) Augie ************************************************************************** 8)From: BADCOFFEE@aol.com Subject: WHERE TO START Last post....Gypsy writes...... >>#2. I would like to be a PI but do not know where to start.<<< Bad writes: Let me toss in my 2 cents on this one if I may.....in my own special way. I won't get into the "business" end of the business. Just my opinion here.... (tone-smiles as usual) Start? You already have. :-) This place IS the authority for Private investigations and related matters. Next step (very hard) is just to take your sweet time.....and obsorb everything you read here, see on the street, and hear from friends. Legal matters: Contact your state police for requirements in lisencing. More legal: The laws pertaining to what you can 'legally" can and cant do. This is SOOOOO important. You want to LAST in this business. NO amount of money is worth going to prison for. Keep this going: The is NO....and I mean absolutely NO replacement for CONTACTS and RELATIONSHIPS with other PI's. The many Pee Eyes on this list are of the best in the world. HERE is where it all happens. More--> making contacts/PI's: Best----> If there is a convention, a seminar, an ANYTHING related to investigations/security ect........YOU BE THERE. Cost?? Your future. Many PI's HERE, have more work than they can handle. Those "odd" shit jobs are the ones that YOU will be trusted with. Do your networking.....go do some gig's.....make some friends......and that is "how do you get started" in this business. THEY will guide you. Ladies and gentlemen.....when it comes down the line......Its NOT ONLY "WHAT you know.....but.... "(finish this cliche) that is soooooo very true." :-) Remember.......A candle without the fire is just a lot of wax. You do have to LIVE it.....EAT it....SLEEP it......SMELL like it.....and who you meet....WILL see that fire in your eyes. This is not your normal 9-5 job. 24 hours is more like it. Love every moment of it..as it has a habit of moving rapidly with surprises around every bend. Final note: If anyone here missed the WASP Methods conference........because they thought the "Video" was the way to go, please hear the following..... The conference cost was about $200 bucks. WOW!!!!! Thats expensive as hell! Was it? Again.......was it?? I personally got to meet.....shake hands with, laugh with, share coffee with, EXCHANGE BUSINESS CARDS with, got personal phone numbers of.....some WORLD class experts in this field. Then......to have the OPPORTUNITY to share drinks with some of the same professionals and get a little closer. Now.....were all on first name basis's. How expensive was it to NOT be there? That conference should have been 2 grand a head. The information received was what you paid for. The contacts......priceless. NETWORK ......or....NOWORK <-----I just made that up myself right now. It's good right?? :-):-) :-) Hope this helped. :-) Augie Badcoffee@AOL.com Available (more ways than one) ************************************************************************** 9)From: Edward Griffin Subject: First look at Opto Micro Counter A first look at the new Optoelectronics Techtoyz Micro Counter Earlier this year I heard the Opto was developing a new frequency counter that would be discreetly housed in a pager case, and modestly priced. I should tell you that I've got a permanent case of new toy envy, and soon there after called Opto and asked them to place me on a waiting list. Today my Micro Counter arrived, and like a kid at Christmas I quickly tore into the package and began to see what this device was capable of adding to my monitoring enjoyment. At $99 for the Micro Counter, and $9 for the antenna, my expectations were that it wouldn't be able to count signals from as far away as Opto's Scout of Xplorer, but would be stealthy enough to allow for close in work where conventional devices might attract unwanted attention. At first and second glance, this appears to be a typical numeric pager. The only tip offs are the small Opto decal which could easily be obscured for a total sneaky configuration., and the optional antenna which attaches to the side of the pager. This approximately three inch long black wire has a right angle jack that plugs into one side of the pager's case. It uses a 2.5 mm mini jack, and I'm certain there's room for an inventive soul to fashion a less obvious antenna out of flexible wire. There's a 12 digit LCD on top of the case, and it's powered by a single AA battery which Opto says should power it for up to 8 hours.. The counter is powered on by using the slide switch on the side of the case, which has three positions which are Off, Memory Recall, and Normal modes. This switch is also used to cycle the Normal mode function between that of Free Running, Filter, and Capture. There are two switches on the front of the pager, just below the LCD display that are used to set the gate time of the counter to 1 kHz, 100 Hz or 10 Hz when in Free Running and Filter modes, or scroll through the three capture memories when in Memory Recall mode. Cutting the counter on while holding one of the buttons is how the three memories can be cleared. Capture mode uses the 1 kHz gate time, and the captured frequencies are displayed with a 001, 002, or 003 in the display. A Lock symbol is displayed when all of the memories have been filled. There is no provision for a beep or vibrate when a frequency is counted, and I can see why this adds to the stealthy design. The LCD is not backlit. The counter's frequency range is 10-1200 MHz and I performed some quick testing using a 1 watt VHF handheld, a 2 watt UHF handheld, and a portable cellular telephone as RF sources. I took the micro counter with it's antenna attached out into a parking lot, and placed the counter on the room of my car, with the antenna pointed up. VHF counting was possible using a 1 watt handheld from about 15 to 20 feet away. UHF counting of a 2 watt handheld was possible at distances over 100 feet away. The Micro counter was able to display the frequency used by my portable cellular radio telephone in analog mode whenever I used it within about 25 feet. These tests were conducted in a suburban metropolitan area, under decidedly non-exacting conditions. I'm planning on taking the Micro Counter to an airshow over the weekend and will be able to form a better impression of the distances at which transmitters, especially more powerful handhelds, mobiles and bases can be counted. Opto is on the web at http://www.optoelectronics.com and can be reached via email at sales@optoelectronics.com ************************************************************************** 10)From: Don Rosenberg Subject: GM car acceleration due to EMI You might want to take a look at the *Wall Street Journal*, 8 Sep 1997, page B10, in which one incident (among many) of sudden acceleration by a GM car was demonstrated (proven in court, after seven years) to come from electromagnetic interference. GM had 1,761 sudden acceleration incidents between 1973 and 1986, with 1,121 injuries, and 31 deaths. There is a possibility that the Audi 5000 incidents (300 accidents, with 175 injuries and 4 deaths between 1978 and 1986) had a similar origin. In the GM court case, the "expert witness showed that the Buick's cruise control was sensitive enough to be set off by simply running a power drill near the car." Don Rosenberg, Stromian Technologies [According to Peter Ladkin, this appears to be a demonstrated case, but it's also in an environment in which the RFI shielding requirements are not as rigorous. Cars do not have to be certificated the way aircraft do. Check out Peter Ladkin's item in RISKS-19.24 and his Web page, and also Helfrick's article and the bluecoat WWW page http://bluecoat.eurocontrol.fr Also, out of band, Ira Rimson provided a useful reference: Roy W. Krieger, "The Danger of Electromagnetic Interference with Aircraft Systems: laptop laibility?", 1994 Annual Seminar of the International Society of Air Safety Investigators (ISASI, 5 Export Drive, Sterling, VA, 20164, e-mail:isasi@erols.com). The paper deals with results of the RTCA Special Committee (SC)-156 and its limitations, as well as both scientific and anecdotal data subsequently developed. Although the paper was delivered prior to publication of a subsequent RTCA SC-177 report (in 1995), the paper contains excellent background material which could form the foundation for defining research needs. ************************************************************************** 11)From: "Shadow Chasers" Subject: MD-R's With the discussion about audio recording techniques, wonder how may members are using Sony's Mini Disc Recorder (MD-R)? Though not VAS, it allows for 74 min's of continous recording. With 120 MD's on the way. VAS equip models are also coming soon. I prefer MD, becuase of the digital edit functions not available with standard tape recorders and a lot cheaper then DAS tapes and players/recorders! Speaking of recording, SPYKING, when do you anticipate the release of the 'seminar' video? +++Moderator's Note+++ It is OVERDUE from the editor... I hope very soon... ************************************************************************** 12)From: BADCOFFEE@aol.com Subject: Munchausen Syndrome Sent to me with permission to post from anonomous sender about Munchausen Syndrome: As reported by others it is an attention getting process. However, it is rare that the individual harms themselves, yet not unheard of though. The more common effect is Munchausen Syndrome by proxy. The syndrome also appears to effect prodominately females. The "by proxy" part is from the infliction of harm onto another. Mothers commonly do this to appear to be the hero and to gain attention. Thank you, Mr. Anonomous Augie ************************************************************************** 13)From: "Lorenzo Castillo Sanchez" Subject: Electronic lockpick - Cobra Pro Here might be something useful for locksmiths. It was known as the "Cobra III+" but I guess the manufacturers named the new version "Cobra Pro". It is said to open many different type of locks(about 20 types of locks, including Schlage), some of them within 2-5 secs. I'm sure Augie can do this without this device :-) It costs about $599 (Gee, it was $100 cheaper a few years ago) but I'm not sure if this gadget is really worth it's price tag. ************************************************************************** 14)From: "Lorenzo Castillo Sanchez" Subject: GPS vehicle tracking system One of my friends is looking for a good vehicle tracking device with good range. The budget limit is about 6000. I got a chance to check out this ad from Intelligence Incorporated. I found this in the October issue of the SOF magazine. GPS TRACKING IS HERE!!! Okay, suppose you want to follow any vehicle, anywhere in the world, in real time from the comfort of your office/living room/ favorite bar... No kidding, utilizing a covert cellular transmit- ter and the government's GPS satellite system you can track any vehicle within 25 feet, on any road in the world. Readout includes, direction, speed, stops, all the good stuff. Right out of James Bond, huh? INTELLIGENCE INCORPORATED PRO TRAK GPS Transmitter - 1.1" x 5.2" x 7.0", weight 20 oz, 9-13 VDC power, output 600 mw, DTMF signaling, 6 second update rate. Transmitter powered by 8 alkaline "C" batteries which give an average of several days (depending on your inquiry rate) TigerTrax CD-ROM software with built-in maps for virtually every US location (IBM compatible, 8 megs of RAM 100+ hard drive computer not furnished.) Needs Windows 3.1 or DOS 5+ 100 unit capability, street level maps with 10 scales, 500 overlay icons. Options include motion sensor($100, panic button alarm, Mapix software (worldwide maps included ability to scan in any map you please, add $400, probably overkill). Basic system, one transmitter, software (TigerTrax), warranty, etc., $4500, (second X-mitter $1800)system. Knock $500 off with this ad... I live outside the US, so if I were to get this stuff, I would have to get the Mapix S/W and scan in the local map of my area. However, I have little experience using GPS systems. Also, I'm not sure how this GPS system would work in a very densely-populated urban area. If anyone on the List, has some good advice and suggestions, please let me know. :-) ************************************************************************** 15)From: Liz Subject: Re: Year 2000 > Does anyone know if this year 2000 computer glitch has been solved > yet. > What company leads the way for solving or researching this problem? The Year 2000 "glitch" is not one problem. Let me explain it: Every bit of information takes up computer space. Back when space was a real problem, programmers conserved on it by allowing only two digits for years. It takes less space for "84" than for "1984." They did somehow instruct computers to go from one decade to another, like from the 1980s to the 1990s. But they didn't put in the logic on how counting up from one century to another, so computers don't know to go from 1999 to 2000. The thing is, each piece of software is written by different people using different date logic. So the coding must be changed (sometimes line by line) for each program. The problem is "solved" in that programmers do know how to correct the coding, but it's unsolved in that you won't likely be able to buy a quick fix program for all your existing machinery and software. If you want to develop a lucrative sideline,learn programming. For the next few years, Y2K fixes are going to be very much in demand. You can read all about the incredible gold rush for Y2K pros at http://www.computerworld.com To read more about the Y2K problem itself, here's a good link: http://www.gatech.edu/year2000/ ************************************************************************** 16)From: zerohero@juno.com (john j smith) Subject: Day 1 as a P.I. Today was the first day on the job and I have to say that starting in this business is expensive, nerve -racking, hot, and tough on personal relationships. Keep these things in mind all who wish to tread here..... BadCoffee - Say it one more time and it still won't be enough: CHECK THE BATTERIES! Too tired for more now...thank you everyone who has written me personally! ZH ************************************************************************** 17)From: Nev Dull Subject: Terrorists made me do it [Published last year in the Federal Bar Journal.] THE LAW ENFORCEMENT ARGUMENT FOR MANDATORY KEY ESCROW ENCRYPTION: THE "DANK" CASE REVISITED by Andrew Grosso (This article is a revised version of a talk given by the author at the 1996 RSA Data Security Conference, held in San Francisco, California. Mr. Grosso is a former federal prosecutor who now has his own law practice in Washington, D.C. His e-mail address is agrosso@acm.org.) I would like to start by telling a war story. Some years ago, while I was an Assistant U.S. Attorney, I was asked to try a case which had been indicted by one of my colleagues. For reasons which will become clear, I refer to this case as "the Dank case." The defendant was charged with carrying a shotgun. This might not seem so serious, but the defendant had a prior record. In fact, he had six prior convictions, three of which were considered violent felonies. Because of that, this defendant was facing a mandatory fifteen years imprisonment, without parole. Clearly, he needed an explanation for why he was found in a park at night carrying a shotgun. He came up with one. The defendant claimed that another person, called "Dank," forced him to carry the gun. "Dank," it seems, came up to him in the park, put the shotgun in his hands, and then pulled out a handgun and put the handgun to the defendant's head. "Dank" then forced the defendant to walk from one end of the park to other, carrying this shotgun. When the police showed up, "Dank" ran away, leaving the defendant holding the bag, or, in this case, the shotgun. The jurors chose not to believe the defendant's story, although they spent more time considering it than I would like to admit. After the trial, the defendant's story became known in my office as "the Dank defense." As for myself, I referred to it as "the devil made me do it." I tell you this story because it reminds me of the federal government's efforts to justify domestic control of encryption. Instead, of "Dank," it has become, "drug dealers made me do it;" or "terrorists made me do it;" or "crypto anarchists made me do it." There is as much of a rationale basis behind these claims as there was behind my defendant's story of "Dank." Let us examine some of the arguments the government has advanced. It is said that wiretapping is indispensable to law enforcement. This is not the case. Many complex and difficult criminal investigations have been successfully concluded, and successfully argued to a jury, where no audio tapes existed of the defendants incriminating themselves. Of those significant cases, cited by the government, where audio tapes have proved invaluable, such as in the John Gotti trial, the tapes have been made through means of electronic surveillance other than wire tapping, for example, through the use of consensual monitoring or room bugs. The unfetted use of domestic encryption could have no effect on such surveillance. It is also said that wiretapping is necessary to prevent crimes. This, also, is not the case. In order to obtain a court order for a wire tap, the government must first possess probable cause that a crime is being planned or is in progress. If the government has such probable cause concerning a crime yet in the planning stages, and has sufficient detail about the plan to tap an individual's telephone, then the government almost always has enough probable cause to prevent the crime from being committed. The advantage which the government gains by use of a wiretap is the chance to obtain additional evidence which can later be used to convict the conspirators or perpetrators. Although such convictions are desirable, they must not be confused with the ability to prevent the crime. The value of mandating key escrow encryption is further eroded by the availability of super encryption, that is, using an additional encryption where the key is not available to the government. True, the government's mandate would make such additional encryption illegal; however the deterrence effect of such legislation is dubious at best. An individual planning a terrorist act, or engaging in significant drug importation, will be little deterred by prohibitions on the means for encoding his telephone conversations. The result is that significant crimes will not be affected or discouraged. In a similar vein, the most recent estimates of the national cost for implementing the Digital Telephony law, which requires that commercial telecommunications companies wiretap our nation's communications network for the government's benefit, is approximately three billion dollars. Three billion dollars will buy an enormous number of police man hours, officer training, and crime fighting equipment. It is difficult to see that this amount of money, by being spent on wire tapping the nation, is being spent most advantageously with regard to law enforcement's needs. Finally, the extent of the federal government's ability to legislate in this area is limited. Legislation for the domestic control of encryption must be based upon the commerce clause of the U.S. Constitution. That clause would not prohibit an individual in, say, the state of California from purchasing an encryption package manufactured in California, and using that package to encode data on the hard drive of his computer, also located in California. It is highly questionable whether the commerce clause would prohibit the in-state use of an encryption package which had been obtained from out of state, where all the encryption in done in-state and the encrypted data is maintained in- state. Such being the case, the value of domestic control of encryption to law enforcement is doubtful. Now let us turn to the disadvantages of domestic control of encryption. Intentionally or not, such control would shift the balance which exists between the individual and the state. The individual would no longer be free to conduct his personal life, or his business, free from the risk that the government may be watching every move. More to the point, the individual would be told that he would no longer be allowed to even try to conduct his life in such a manner. Under our constitution, it has never been the case that the state had the right to obtain evidence in a criminal investigation. Rather, under our constitution, the state was given the right to attempt to obtain such evidence. The distinction is crucial: it is the difference between the operation of a free society, and the operation of a totalitarian state. Our constitution is based upon the concept of ordered liberty. That is, there is a balance between law and order, on the one hand, and the liberty of the individual on the other. This is clearly seen in our country's bill of rights, and the constitutional protections afforded our accused: evidence improperly obtained is suppressed; there is a ban on the use of involuntary custodial interrogation, including torture, and any questioning of the accused without a lawyer; we require unanimous verdicts for convictions; and double jeopardy and bills of attainder are prohibited. In other words, our system of government expressly tolerates a certain level of crime and disorder in order to preserve liberty and individuality. It is difficult to conceive that the same constitution which is prepared to let a guilty man go free, rather than admit an illegally seized murder weapon into evidence at trial, can be interpreted to permit whole scale, nationwide, mandatory surveillance of our nation's telecommunications system for law enforcement purposes. It is impossible that the philosophy upon which our system of government was founded could ever be construed to accept such a regime. I began this talk with a war story, and I would like to end it with another war story. While a law student, I had the opportunity to study in London for a year. While there, I took one week, and spent it touring the old Soviet Union. The official Soviet tour guide I was assigned was an intelligent woman. As a former Olympic athlete, she had been permitted in the 1960's to travel to England to compete in international tennis matches. At one point in my tour, she asked me why I was studying in London. I told her that I wanted to learn what it was like to live outside of my own country, so I chose to study in a country where I would have little trouble with the language. I noticed a strange expression on her face as I said this. It was not until my tour was over and I looked back on that conversation that I realized why my answer had resulted in her having that strange look. What I had said to her was that I had chosen to go to overseas to study; further, I had said that I had chosen where to go. That I could make such decisions was a right which she and the fellow citizens did not have. Yes, she had visited England, but it was because her government chose her to go, and it was her government which decided where she should go. In her country, at that time, her people had order, but they had no liberty. In our country, the domestic control of encryption represents a shift in the balance of our liberties. It is a shift not envisioned by our constitution. If ever to be taken, it must be based upon a better defense than what "Dank," or law enforcement, can provide. ************************************************************************** 18)From: Sean Roach Subject: So you want to be a media hacker! So you want to be a news informant. You've looked into tapping telephones but have decided that it is too much trouble and its too easy to get caught. You've thought about monitoring the police bands, but the cops rarely put anything of value there anymore. You've considered scanning the cell phone frequencies, but there are clear laws against it, besides that annoying sound when no one's on. You've read about a couple guys in New Jersey who did it by scanning for beeper messages and YOU WANT TO KNOW HOW! POPULAR ELECTRONICS TELLS YOU HOW! Just pick up Popular Electronics, March 1997, (Volume 14, Number 3, for the technically minded), and RIGHT THERE ON THE COVER, it proclaims Build a PAGER DECODER. And they're from NEW YORK!! The neighboring state where this nefarious device got two media hackers ARRESTED! Granted, the March '97 issue is no longer on the magazine rack or at the local newsstand, at the end of this article I'll give you some pointers as to how to get around that. I would love to just type in the text, but it would do you no good, the magazine includes images that are intended to be transferred exactly to a PC (printed circuit for those of you who didn't know) board and I don't have a scanner. Paper, not radio. Besides, it's illegal to do so without the publishers permission. But you want to know about the decoder. This wonderous article includes details on the theory behind the operation, the method that pager messages are encoded, the place where the software can be had that handles the data on your computer, (yes, a computer is necessary, but since you are here, I assume you can manage something.), the foil patterns that I spoke of and a complete parts list, including where you can get the kit if you don't want to scrounge certain parts yourself, (the PC board and the specially programmed chip, probably beyond the capacities of most here to just make). The cost of everything is $60.00 from Cylex Inc. To find out more, You're going to have to get the magazine. I don't work for them, (although a small portion of my finances go to support my Popular Electronics habit, maybe they'll give me a discount now for finding new addicts.), but I don't have the time to go into the minute detail when all you really want is for me to push the completed device through your monitor so that you can start playing with it immediately, (I can't, the prime directive also prevents me from using teleporter technology to assist you, so don't ask.) As promised, the sources to get the article. You can always ask around for one of your friends who subscribes to the mag, (and did in March '97, Popular Electronics is the type you archive, so don't worry about if they still have it, unless of course they have a less than electronics entgused wife, then worry.) You can go to your local library, if they don't have it, (or some version of it, like microfiche), they may be able to get it for you through interlibrary loans. You can go to your school library, (more likely, perhaps, to have it, although it was my high school which subscribed and not my college, so nothing is for certain), if they don't have it, they can get it, or at least a photocopy of the article in question, for academic purposes. Not the same as for academic purposes only, but the system that they maintain for sharing resources is intended for the student who is doing research and has the misfortune of attending a college that doesn't subscribe to the ONE EXACT journal that he or she needs. In either case, be prepared to pay for photocopying costs and shipping and signing your name to some forms. The pages in question for the article are 39-44 and 60-61. Perhaps you'd like the whole magazine. That way you can keep it for reference. That can be accomplished by contacting CLAGGK Inc. in New York. Again, since you are sending for it, expect it to go on your permanent record. CLAGGK keeps back issues of Popular Electronics and is willing to part with one for a price, The one issue that I got from them, (when I missed an issue due to a gap in my subscription), cost me about 7 bucks, (5 bucks for the mag, 2 for shipping), They can be reached by calling 1(516)293-3751. And then there is the kit company. Cylex Inc. in League City Texas would just love to hear from you. They'll give you the basic kit minus the printed board and pretty box for a mere $35.00. They'll give you the printed board and the nice case for an extra $25.00. If all you want is the chip, (meaning you think you can figure out this PC etching thing yourself but don't even want to think about programming microcontrollers, I don't blame you), the chip alone will cost you $11.00. Oh, one last thing, they will actually SEND it to you for a mere cost of $5.00 S/H. If you call in your order they take the basic 4 types of plastic, (Visa, MasterCard, Discover, and American Express). If you order from them, they'll include the WINDOWS 3.1, WINDOWS 95 program for your computer free. Remember, ordering any of this could mean that your name goes into some Dark Agencies computer database. Even if it doesn't, it will almost certainly mean a few complementary catalogs from electronics parts sources. If you are a electronics superwiz that could build a RISC processor from scratch and have the necessary supplies. (The programmer for the microcontroller, the means to print a circuit board from a foil pattern published in a magazine, etc.) You have the time, and patience. And you managed to get the magazine without a fuss, you can get both the computer program and the microcontroller from sources published in the magazine. One more thing that you will need is a police scanner that can scan the necessary frequencies. It does not need to be computer controlled but it does need to have a headphone jack. Good luck, and happy hunting. ************************************************************************** 19)From: semi-auto@juno.com Subject: For Illegible copies of documents In my experience, the LIGHT green and blue inks are optimal if you didn't want the contents of your writing disclosed and spread by copy machines. Traces of the ink will always be apparent, but might be either (1) blurred or (2) very lightly printed to the point of illegiblity. Of course, results vary from machine to machine. Although, I am not sure on this, I have heard that all checks written passing through banks are copied by or for the government. Therefore, it is good practice to utilize this simple deterant regardless of what activities one might be engaging in. Naturally, test out these colors beforehand as newer machines might have the ability to pick them up. Semi-Auto@Hot-Shot.com ************************************************************************** 20)From: Marcus Blankenship Subject: Year 2000 Problem Some Guy wrote: >Does anyone know if this year 2000 computer glitch has been solved yet. >What company leads the way for solving or researching this problem? There is no _one_ y2k computer glitch, and no 1 company will lead the way. There are MANY y2k computer bugs, and depending on the software or industry, different companies offer different services. For more info, check out www.datamation.com, or just search for "year 2000" on the net. Marcus / Marcus Blankenship Jeld-Wen, Inc Just Another Progress Hacker... 541-882-3451 marcusb@jeld-wen.com www.doors-windows.com {std/disclaimer.i} ************************************************************************** 21)From: Tim Hill Subject: Re: Year 2000 Rick, I can tell you that the "year 2000" problem is mostly solved.1 Any modern PC will be able to cope with the changeover, as will moast of the burgular alarms I deal with. The mainframe systems large companys run will be dependant upon the company recognising that there is a problem and actually allocating the funds to do something about it (Most won't be advertising this) My Father is currently invloved in the work to fix this for various companys. He does this under contract to Hatachi, here in New Zealand. I don't know of any other companys who do this, but I would think that any software company would be trying to get contracts to fix their products. Tim Hill tlhill@ihug.co.nz ************************************************************************** 22)From: Trace Carpenter Subject: K-9 Schools > >Anyone know of a K9 vocational school that offers the K9 as part of the > >enrollment; upon completion of the course? Got it a little backwards. As a former K-9 officer for the police department, I still have my dog and attend many schools. Whenever you purchase one of these elite animals, the training comes with the dog. BE CAREFUL WHO YOU DEAL WITH! If you're really serious I'll recommend some trainers and suppliers. -- Trace Carpenter Investigations ****** 2926 Maple Ave., Ste. 200 Ignorace of the law is no excuse; Dallas, Texas 75201 Ignorance of the law-makers apparently 214.828.4520 is. 214.740-0112 Facsimile ****** ************************************************************************** 23)From: beb2029@iperbole.bologna.it (K. Donovan) Subject: Re: How to dial 800 numbers from outside the US & Canada >So..there's no such thing as a stupid question... right? >So I'm taking tha literally....you see I'm not in Canada or the U.S so >obviosly I cannot dial any 1-800 , 1-900 or 1-700 number cause of the >area number... >so.. I was wondering ...is there a way I could reach these number (I've >tried all possible prefix..not sure though) or is everything a lost >cause...(if so please answer why).. >Any answer is welcome...Thanks > I just called my local AT&T number (in Italy, 172-1011) to check and see if they will let me use my AT&T calling card to make an 800 call. The answer is yes, for a charge. Credit cards are also accepted. I know that Sprint and MCI are international carriers who could provide the same service. If you want to know what number to dial in your country for AT&T let me know. *To recap, all you do is 1) Find out the number for AT&T, MCI or Sprint for your country 2) Call them and try to follow the instructions, but if your English is not so good, and you don't understand the little electronic box, just say "Operator" until you get someone speaking to you. 3) Say something like "Hello Operator, I would like to dial this number and charge it to my card ....." P.S. the letter from the Smithsonian Institute has gone out to a few hundred of my closest friends. A real tearjerker. I have subscribed to a number of lists, high, middle and low brow and this one is the best. *This next paragraph is for our non-native English speakers, who may not know the ins and outs of speaking to computers. If it looks like idiotese, it is not. ************************************************************************** 24)From: "M. J. Van Ham" Subject: The big deal about encrypted email Manatau wrote: > I was just wondering why the Fed's are making such big deal about > encrypted e-mail?? I don't think that the big deal is about encrypted email specifically. But, before getting into details, a little background. Strong encryption software is considered munitions by the US Government. Munitions are not allowed to be exported from the US (or something like that). As far as I know, encryption schemes have been considered muntions by the US Government for quite some time, but we've only recently begun hearing about it now. The reason for that being two fold. Before now, encryption software for the home pc was almost non-existant; and any software that did exist was pathetic (older computers were so slow, having 4096bit encryption schemes simply wasn't practical), and easily cracked. The second reason is that before now encryption wasn't very important to the average computer user. Before if someone wanted to look at your files, they would have to be sitting in front of your computer to do so. With the rise in popularity of modems, and subsequently the internet (here's where email comes in), privacy and encryption has become more important to the average home computer user. Because suddenly everyone became interested in privacy and encryption software, more and more tools were developed; getting stronger with each new version. That fact, coupled with the popularity of the internet (and thus the ease of exportation of said encryption software), the government felt the need to step in and say something. That's my understanding of it anyway. If anyone else knows better about this, please feel free to point out any errors. ************************************************************************** Who are you? What's your specialty and/or interest? Let us know about your company... What would you like to see on the list? Post it. Let us know... Do you have something to contribute? We'd like to hear it... We want to know EVERYTHING and ANYTHING about eavesdropping, surveillance, countersurveillance & privacy related technology, etc... Remember: who, what, where, when, how & why... we want ALL the details... Do you have a question? Post it... A little free time? Help a member... With the INCREDIBLE brain power on this list, someone should have the answer ;-) P.S. Don't be a LURKER... Members take the time to post info for us all... give something back... Don't just take... Your input/knowledge is valued... ************************************************************************** Send Postings to: spyking@con2.com with "Post" in subject field with subject ************************************************************************** Subscribe to: spyking@con2.com In the subject field type: subscribe-surveillance list e-mail address ************************************************************************** Unsubscribe to: spyking@con2.com In the subject field type: unsubscribe-surveillance list e-mail address ************************************************************************** ...The Simple Rules of the Surveillance List... The Surveillance List Owners may Reject any posts that are/contain: 1) Info Unrelated to Eavesdropping, Surveillance or Privacy technology... 2) Flames or Negative posts... 3) E-Signatures that are considered excessive... 4) Advertisements not DIRECTLY related to the list topics... 5) Attached Files... 6) Oversized Posts... (May be edited to save room) **************************************************************************** This publication is copyrighted and is protected by U.S. and International copyright law. The information transmitted on this list may not be reproduced, reposted or forwarded to any non-list member without expressed written permission of the List Owner. Violation of U.S. copyright law is a criminal and civil offense... **************************************************************************** The Surveillance List is Moderated by SpyKing@thecodex.com The List Owner will make EVERY effort to protect subscribers from spam... Copyright 1996, 1997 Codex Publishing Inc., All Rights Reserved... **************************************************************************** ****************************************************************************** The Official Newsletter of W.A.S.P. The World Association of Surveillance Professionals http://www.thecodex.com/wasp.html ****************************************************************************** Vol.Two Issue #204 The Surveillance List Sept.24,1997 Over 3000+ Members Worldwide Representing 53 different countries List Chat at: http://www.thecodex.com/chat.html ****************************************************************************** While we STILL feel there is NO SUCH THING as a stupid question... We suggest the newer list members AND the technically challenged browse through the FAQ before posting a question... Surveillance List Pseudo FAQ at: http://www.thecodex.com/faq.html P.S. If you have something to add to the FAQ, let us know... ****************************************************************************** IN THIS ISSUE... ****************************************************************************** 01) Rebuilding of embassy shrouded in secrecy 02) More wiretapping... 03) Re: ***Special*** Stop Big Brother amendment! 04) Re: ***Special*** Stop Big Brother amendment! 05) How secure are Chat Programs? 06) Find the married name 07) Big Changes In National PI Newsletter 08) I Spy: Wall Street Gets Sneaky Software to Keep Eye on Brokers 09) Super microphone attachment 10) Command line utility? 11) Re: So you want to be a media hacker ! 12) Wacky Thoughts~~~ 13) Bad's Bored- 14) Re: The big deal about encrypted email 15) PI School? 16) GPS vehicle tracking system ****************************************************************************** DON'T BE A LURKER.... GET INVOLVED... YOU ARE A MEMBER... MAKE THE MOST OF IT ****************************************************************************** 1)From: SpyKing@thecodex.com Subject: Rebuilding of embassy shrouded in secrecy Here's an interesting article on the bugging of the American embassy in Moscow several years ago... Rebuilding of embassy shrouded in secrecy By Mitchell Landsberg / Associated Press MOSCOW -- Furls of white sheeting billow gently in the breeze. They are draped around a building rising in the center of the U.S. Embassy compound in central Moscow, making it look like some witty piece of art by Christo. Behind the sheets and behind fences and walls and security guards, construction workers with top-security clearances appear to be busy finishing a building that amounts to the biggest joke in the annals of spydom. Begun in 1979, using Soviet labor and Soviet materials, the American chancery building in Moscow was abandoned in mid-construction six years later when it was found to be honeycombed with Soviet eavesdropping devices. The building, so compromised that U.S. officials said it amounted to a giant microphone, was primed to broadcast every last grunt and whisper uttered by American diplomats into the Kremlin's eager ears. Even now, it brings impish smiles to the faces of former KGB operatives, who came so close to turning the entire U.S. Embassy into the Soviet Union's No. 1 intelligence agent. Americans got the joke, but weren't amused. After much debate and hand-wringing, Congress agreed to knock down the top two floors and rebuild the rest of the building, adding four new floors on top. The work began last year, using American and other foreign workers -- each cleared by U.S. security agencies -- and imported American materials. Or at least, work seems to have begun. The noises certainly suggest activity, but no one can authoritatively confirm that the workers behind the sheets are working. No one who has been inside the construction zone is allowed to talk about it. "It's very strictly controlled. I've never been in," said Richard Hoagland, the embassy's press attache and the sole person authorized to speak about the project. Strolling past American children playing softball inside the compound, Hoagland mused: "I could ask to have a special tour for myself, but I'm not sure it would be granted." When it is finished in 1998, the chancery will be 10 stories tall, coolly sheathed in Minnesota stone, with windows overlooking the White House, as Russia's government building is called. The new four floors will serve as offices for the U.S. ambassador and other top diplomats. The bottom six floors -- the "dirty" floors -- will be used for clerical offices and other functions far removed from the touchy world of diplomacy and intelligence. The project is called "Operation Top Hat." It is being built by a consortium of American contractors -- Zachary, Parsons & Sundt -- brought together for this one project. Its telephone number is unlisted. The building will cost U.S. taxpayers $240 million -- actually, $376 million with the money spent before the original construction was halted. Down the road a bit, the British are building an embassy on the banks of the Moscow River. It will be larger than the American building -- 215,000 square feet vs. 175,000 square feet -- and dramatically cheaper. It is expected to cost about $98 million. Why? The British are using at least some Russian labor and aren't importing materials from 5,000 miles away. British officials decline to talk about what they are doing to avoid the bugging problems that bedeviled their American colleagues. Hoagland dismisses any comparison, while offering at least a partial explanation of the gap in costs. Not only do the British not have the high cost of importing American labor, he said, but "they don't have the cost of destroying an old building -- it's a very different type of project." The bugging of the U.S. Embassy was perhaps the high water mark of KGB ingenuity. "In 1969, when the new embassy building had only just been designed, the idea of stuffing it with the corresponding equipment was made in Moscow," former KGB chairman Vadim Bakatin recalled recently in an interview with the newspaper Moskovskaya Pravda. "With the Americans' consent, the support structures were manufactured at our plants, and our workers went to work at the construction site, so the technical problem was not that complicated. ... In 1985, after the Americans had discovered the 'gifts,' the scandal broke." The bugs were said to be so sophisticated they couldn't be picked up by X-rays. They reportedly were powered by batteries that were recharged by building vibrations and the flow of steam pipes. The KGB had a listening post in a nearby church ready to receive the transmissions. Agents nicknamed the church "Our Lady of Telemetry" and "Our Lady of Perpetual Observation." The Americans were furious. The Soviet response was predictable. "The Politburo made the decision: Carefully dismantle all you can and deny everything," Bakatin recalled. "Everything was denied." Eventually, the Russians came around. Under Bakatin' leadership and in the warm glow of glasnost, the Soviets decided to bare all and hand over the blueprints to the eavesdropping system. In December 1991, Bakatin presented the plans to U.S. Ambassador Robert Strauss. "This is the most amazing thing that's happened to me in my life," Strauss said later in a speech at the National Press Club in Washington. To this day, former KGB agents consider Bakatin's decision an act of high treason. Still, the Americans weren't satisfied with the blueprints. What if it was another trick? In Congress, many argued the only solution was to tear the building down and start over. The cost of that option was put at $310 million. Rebuilding of embassy shrouded in secrecy Finally, the Clinton administration proposed the "Operation Top Hat" plan, and Congress agreed. ************************************************************************** 2)From: SpyKing@thecodex.com Subject: More wiretapping... Magic assistant coach arrested on wiretap, forgery charges Associated Press ORLANDO, Fla. - Orlando Magic assistant coach Wayne "Tree" Rollins was charged Wednesday with wiretapping his estranged wife's house and forging her name on an application for a home equity loan. Rollins, a former Atlanta Hawk who is in the process of divorcing his wife, Kathy, was charged with felony wiretapping by Orlando police and forgery and attempted grand theft by Orange County sheriff's deputies. "He tapped his wife's phone in his own home. He put a tap on the wire and it was illegal," said Sgt. Bill Mulloy, a spokesman for the Orlando police department. Rollins' attorney said his client had the line tapped because he was concerned about the safety of his children. "It became known to him that his estranged wife was involved in some relationship with an individual who had a lengthy criminal record who was dealing in drugs," said attorney Robert Leventhal. ************************************************************************** 3)From: Jim Youse Subject: Re: ***Special*** Stop Big Brother amendment! The ACLU has a prepared letter on their web site that they will send for you. There is space to add your own comments. I know this may not be the best method to use, but it is easy. This may get more people to participate since they don't have to do much. http://www.aclu.org/cgi-bin/take_action.pl?GetDoc=120&dir=aclu&redirect= http://www.aclu.org/action/actthank.htm Jim Youse - jyouse@omicron.com - (215) 854-3467 - http://www.omicron.com ************************************************************************** 4)From: "Robert C. Casas Ph.D." Subject: Re: ***Special*** Stop Big Brother amendment! At 11:52 AM 9/23/97 -0400, you wrote: >From: "Shabbir J. Safdar" [SNIP] > > Chairman Thomas Bliley (R-VA) (202) 225-2815 > Ranking member John Dingell (D-MI) (202) 225-4071 > Rep. Tauzin (R-LA) (202) 225-4031 > Rep. Markey (D-MA) (202) 225-2836 > I called each of these four offices. It is worth noting that *only* Rep. Markey's office staff volunteered the information that Rep. Markey is *opposed* to ammendments to HR695. Perhaps calls to Rep. Markey should be of the type "Thank you for your prudent position and sound judgment, and be aware that we are very supportive of your opposition to any ammendment to HR695." And, renewed calls to the other 3 members of congress should be the focus of clear and strong expressions of opposition to any effort to modify HR695, *in a very polite and respectful manner*. -rcc ______________________________________________________________________ Robert C. Casas, Ph.D., COMSEC Ltd., Computer Security & Data Recovery Telephone: 847-729-3565 FAX: 847-729-3575 On CompuServe: GO COMSEC Email Address: rcc@comsecltd.com Web site: http://www.comsecltd.com COMSEC Ltd., 1545 Waukegan Rd., Ste. 2, Glenview, IL, 60025-2166, USA ______________________________________________________________________ ************************************************************************** 5)From: Sonice Subject: How secure are Chat Programs? Hello! I've been told that chat progs like ICQ, Freetel, Powwow are easily intercepted. Is that true? If yes, how does one intercept the chat and are there any software or methods to counter it? TIA Sonice ************************************************************************** 6)From: fthome@amug.org (Alex Thome) Subject: Find the married name Hey all, I have a bit of a problem. Anybody have any idea how to find the married name of a woman who you only have the maiden name of? Shadow Runner of t.d.l -Believe nothing, until you question everything- -----BEGIN GEEK CODE BLOCK----- Version: 3.1 GCS/M/P d- s++:++ a? C++++ BLSX U+++ P+ L+ E-- W- N++ o? K w--- @O M++ V PS++ PE Y++ PGP++ t+ 5+ X+++ R+ tv- b+++ DI+++ D G++ e- h!++ r y !z ------END GEEK CODE BLOCK------ ************************************************************************** 7)From: Professional Investigator Newsletter & Statewide Investigations and Protection Subject: Big Changes In National PI Newsletter List Members, The Professional Investigator Newsletter has now Expanded its Staff. We have six well known working investigators as columnist, three Editors, and one subscription secretary. For the latest in PI news, Technology, and Continuing Education the Professional Investigator is your source. Focusing heavily on the Internet & Computers. I have included some information below on the Newsletter and how to subscribe. Please do not reply with questions until you have read the information below. As this will help us keep a better response time to those who have questions that were not covered here. NEWSLETTER INFORMATION: THE PROFESSIONAL INVESTIGATOR Your National Private Investigation Resource Newsletter Working Investigators as Columnists: John Grogan - Continuing Education Julius "Buddy" Bombet - Bombet's Gadgets Gimmicks and Tricks of the Trade M. D. Goslar - Internet Alert Scott Farrell - IB News Bill Handley - Firearm Review Debra Burdette - Women in the Industry A resource newsletter containing articles on: A broad spectrum of investigative services and techniques. Internet Online Searches Case Profiles PI Profiles Latest Technology Equipment Reviews Related Laws & Updates $25 for 1 year subscription (six issues) $42 for 2 year subscription (twelve issues) Issue 1 Jan.-Feb., Issue 2 Mar.-Apr., Issue 3 May-June, Issue 4 July-Aug., Issue 5 Sep.-Oct., Issue 6 Nov.-Dec. Send Check or Money Order to: PROFESSIONAL INVESTIGATOR NEWSLETTER, LLC 2836 STAFFORD PLACE SALT LAKE CITY, UTAH 84119 For more information call: (801) 967-7136 We no longer offer Complimentary or Free sample Issues! A single copy, non subscription price is $4.50 (store price or mailed via USPS). Our Guarantee to you: If at any time, you do not think you have benefited worth the price of subscription, just let us know and we will refund the balance of your paid subscription, NO QUESTIONS ASKED. ADVERTISING RATES FOR THE PROFESSIONAL INVESTIGATOR NEWSLETTER RATE PER ISSUE (ONE ISSUE) YEARLY RATE (SIX ISSUES) BUSINESS CARD $25 BUSINESS CARD $125 QUARTER PAGE $35 QUARTER PAGE $175 HALF PAGE $50 HALF PAGE $250 FULL PAGE $100 FULL PAGE $500 A Free Business Card Ad Will Be Given to All Those Who Submit an Article That Is Published For An Extra $35 the Free Business Card Ad With Article Can Be Upgraded to A Half Page Ad Thanks, Marc Marc Buckley OWNER / EDITOR "PROFESSIONAL INVESTIGATOR " BI-MONTHLY NEWSLETTER STATEWIDE INVESTIGATIONS AND PROTECTION 2836 STAFFORD PLACE W.V.C. UTAH 84119 OFFICE: 801-967-7136 CELLULAR: 801-860-7610 FAX: 801-967-7136 PAGER: 801-552-8155 E-MAIL: swide@xmission.com The Professional Investigator & Statewide Investigations & Protection sites: http://www.angelfire.com/biz/statewideinvestigate/index.html Professional Investigator site: http://tool-box.com/rc/owa/freeweb.page?id=1041239 GIN, PIAU, NNA, FPS, NAIS, Gumshoe: Shadow-UT LICENSED 100122 & 100162 & BONDED ************************************************************************** 8)From: SpyKing@thecodex.com Subject: I Spy I Spy: Wall Street Gets Sneaky Software to Keep Eye on Brokers By Alex Markels Staff Reporter of The Wall Street Journal When I tell you to sell a stock and buy another, you must do it. Stockbrokers aren't allowed to make such coercive statements to clients. To ensure compliance with the rules, the New York Stock Exchange requires all written communications between brokers and their clients to be previewed by a supervisor. So far, so good. But with the proliferation of electronic mail as a speedy way for brokers to communicate with clients, the task of previewing written e-mail messages has become a "calamity," says H. Pim Goodbody Jr., vice president of management services at the Securities Industry Association. As a result, several Wall Street securities firms are testing futuristic computer systems inspired by spy-agency technology to screen broker-to-client e-mail messages. Among them are units of Morgan Stanley, Dean Witter, Discover & Co., Oppenheimer Group Inc., Salomon Inc. and PaineWebber Group Inc. William McCrea Jr., a compliance executive at one Wall Street firm, said in an interview, "It's become completely impractical to look at every single message. We're stuck reading 400 to 500 e-mails a day." Mr. McCrea asked that his employer not be identified. While industry lobbyists such as Mr. Goodbody have pressed for the rules to be loosened, Mr. McCrea recently organized a group of computer-sleuthing technologies to find potentially troublesome keywords, evaluate them in context and block out-of-bounds messages. The systems can do everything from blocking confidential documents and outgoing resumes to identifying high-pressure sales tactics and vulgar expressions. When brokers are found to have violated securities regulations or internal policy, they can face sanctions or even dismissal, depending on how serious the infraction. The system at the Dean Witter securities unit has an automated review process that begins by scanning messages for forbidden addresses, viruses and suspect keywords like "risk-free" and "confidential." A second automated scan then evaluates the words in context. Derived from technology first employed by the federal intelligence community, the system learns syntax and vocabulary from e-mail messages provided by brokerage houses. For instance, the computer seizes on phrases like "you must do it," which violate rules against high-pressure sales tactics. It also flags messages that may contain rumors, inside knowledge or other potential violations. When the system was checked using three million actual e-mail messages from several securities firms, it stopped a message from a broker who recommended that a client purchase commodities: "Trust me. . . . It's a good deal, you'll love it . . . commodities, right down your alley." Michael Reingruber, director of financial services at closely held SRA International Inc. in Arlington, Va., which developed the software, says it indicated that this message violated the rules because it "found downplaying of risk but no discussion of what the risks really are." In the same test, the computer also found messages intended to escape supervisors' eyes. "We found account executives who were referring the customers to their home e-mail accounts, which they're not supposed to do," says Mr. Reingruber. "The computer even detected a group of brokers who were communicating with customers in Spanish in hopes the compliance officers didn't understand that language." The system also checks incoming messages, which Securities and Exchange Commission officials say especially concern them. "There's a long history of brokers intercepting complaints or checks mailed to the corporate mail room," says one SEC investigator who oversees regulatory compliance. "So [surveillance has] got to go both ways." Of course, such monitoring can't catch every infraction. Brokers can easily get around it by contacting their retail and institutional clients by telephone, as phones aren't monitored by most brokerages. Even so, the new system can help cut down on rules violations. Although the system still is being tested, the Fortis Financial Group unit of New York's Fortis Inc., which offers mutual funds and retail securities-brokerage services, already is using one of the components provided by Integralis Inc. The Kirkland, Wash., software firm makes MIMEsweeper, a computer-virus protection package that has been customized for Fortis to flag "dirty words," including not only vulgarities but also terms that are racially or sexually offensive. The Fortis system both identifies suspect keywords and weights them by the level of their unacceptability. The system also is used to target e-mail from individual employees. "We had one manager who wanted to monitor all e-mails going to and from a specific employee," recalls Greg Blair, a senior security analyst at Fortis. After getting clearance from company attorneys, Mr. Blair configured the system so that copies of all the worker's e-mails automatically were forwarded to the manager. "I don't think the person even knew they were being monitored," adds Mr. Blair. Some have expressed concern over a threat to the privacy of e-mail communication at work, but the courts generally have sided with employers on this issue. Mr. Blair notes that the system wasn't purchased to scrutinize employee behavior. "We wanted something to stop viruses," he says. "Everything else was an afterthought." Supervisors at the securities firm of Friedman, Billings, Ramsey & Co., which currently is testing the hybrid system, disagree. While the impetus for using the new technology is to comply with regulations, "the magic of this is that it can also stop improper language, jokes and discriminatory references," says Eric T. Generous, the Arlington, Va., firm's chief financial officer. He says he's not afraid that such surveillance will undermine employee trust: "We make it clear to people that we have the right to look at e-mail." ************************************************************************** 9)From: Peter Henss Subject: Super microphone attachment Hi all a while ago I bought a Tram mic from Communications Control Systems international in Madison Ave, NY I paid something like $900 for it and it has a LR44 battery and attaches to a micro cassette or a walkman I need it for basic recording. Seeing as it was this expencive I thought it would be very sensitive and good. Alas I fear Ive been duped. Cant get it to work- the inbuilt mic in the micro is far better- in fact this doesnt work at all 1. Has anyone heard of this company. 2. Is this a legit company and a legit product? any Idea where I can return it for a refund or repair?? peter ************************************************************************** 10)From: Phua Kok Yang Subject: Command line utility? Hello, Is there a command line utility that allows NT administrator to kill the NT workstation process/application remotely ? Thank you. Regards, KY ************************************************************************** 11)From: "Lorenzo Castillo Sanchez" Subject: Re: So you want to be a media hacker ! For those of you who want to find out where to get that article about constructing the pager decoder, here's where it is ==>> http://www.cylexinc.com/rmpe01h.htm You can order the kit from Cylex, Inc.(http://www.cylexinc.com) but I'd rather choose to build my own. I'm sure some government agencies might keep track of those who buy it. I just hope Cylex doesn't get busted like one of those "Spy Shops". BTW - Does anyone know what happened to Xandi Kits ?? Also.....anything on Seymor-Radix ?? ************************************************************************** 12)From: BADCOFFEE@aol.com Subject: Wacky Thoughts~~~ Ok Guys- 2 wacky ones here..... 1: What is it going to take to get ALL of us together in VEGAS around...say....March?? (realistically) (I can put this thing together with help from other members here) 2: 2,600 of us. I LIKE that number. That specific number strikes a NOTE in my heart......what are the words I am looking for here...... Owe....I got it.... GROUP health insurance. :-) Any insurance people here want to give this one a stab. Bet you more than 1/2 of us are uninsured. LOTS of neat things we can do as a group....that we can not do individually. Fingers make a fist... Augie ************************************************************************** 13)From: BADCOFFEE@aol.com Subject: Bad's Bored- Don't ask me why I put this here.....in a post. It DID make me pee quite hard. Anonomous friend sends me an E-mail that reads.... >>>>>BTW, congrats on damn near writing the whole last list-message single-handedly. heh.<<<<< I was bored that day! LOL Weekends are HEAVY posts for me. This is a double shot of coffee for your Monday's. Someone send me a decent lock.....every Friday...or take me out every weekend. :-) Augie :-) ************************************************************************** 14)From: "J.D. Abolins" Subject: Re: The big deal about encrypted email >24)From: "M. J. Van Ham" >Strong encryption software is considered munitions by the US Government. >Munitions are not allowed to be exported from the US (or something like >that). Info about some of the munitions export restrictions can be found un the US Dept of Commerce's Bureau of Export Administration (BXA) Export Administration Regulations (EAR). Check out http://www.bxa.doc.gov/ page for more info and see how crypto regs appear not far from biological agents and other munitions export restrictions. Munitions-type restrictions for crypto made and makes sense for items designed and market for a very narrow niche such as the military or intelligence agencies. Restricting the export of a crypto device made specifically, say, for the US Navy is one thing; it is another to seek extensive restrictions upon products designed for the general computer/consumer markets. The consumer/general items with cryptography and other technologies can easily travel out of the USA in various ways. For example, any country that cared about it could just as send the item out on a CD or diskette in a diplomatic pouch if it wanted to. And that is a very formal method. The point is that the restrictions don't prevent other countries and entities from getting crypto products that are openly available int he USA. Side note: a frined who has returned from a trip to Hong Kong described seeing consumer/business software products there that had the "not for export" (outside of USA) labels. [explanation of growing computer power and the rise of net communications for bringing the crypto issue to a head.] >That's my understanding of it anyway. If anyone else knows better about >this, please feel free to point out any errors. Your explanation sounds good. I'll seom social factors that soem people are getting antsy about. There is the view that the ability for a very small group of people or even one person to do serious devastation has greatly increased over the past few decades. This view argues that in earlier times, it required a large movement or conspiracy of people to cause much death and destruction. Thus, governments could pick up hints of impending trouble and could infiltrate the conspiracy. If one or two people can cause much devastation, then, more surveillence and monitoring is needed. (The view's claim, not mine.) The weakness of this view is the fact that physically devasting schemes still have a physical aspect. For example, preparing a bombing entails getting supplies, scouting out the target, etc. Therefore, the claim that the prospect of one- or two-man terrorism requires the surveillence of all citizens is overblown. Then there is the political/governance matter of setting the balance of risks with freedom. There is a great danger of turning all citizens into virtual prisoners in the claims of protecting them from certain dangers. ************************************************************************** 15)From: "Mike R." Subject: PI School? I wonder if anyone knows a P.I. school around San Francisco, Bay Area? ************************************************************************** 16)From: Martin Pask <100142.3101@compuserve.com> Subject: GPS vehicle tracking system I have been to a seminar today on the subject of GPS tracking systems. I must say that your prices are way over the top and there is a system available for under 1000 pounds sterling. I seen a demo of it today and with an overlay of auto route on your computer the system is accurate to 30 meters. with more expensive software and hardware you can obtain accuracy to 1 cm. Very impressive and we are looking at getting at least two systems. If anyone wants more details drop me a line. Regards M.P.I. ************************************************************************** Who are you? What's your specialty and/or interest? Let us know about your company... What would you like to see on the list? Post it. Let us know... Do you have something to contribute? We'd like to hear it... We want to know EVERYTHING and ANYTHING about eavesdropping, surveillance, countersurveillance & privacy related technology, etc... Remember: who, what, where, when, how & why... we want ALL the details... Do you have a question? Post it... A little free time? Help a member... With the INCREDIBLE brain power on this list, someone should have the answer ;-) P.S. Don't be a LURKER... Members take the time to post info for us all... give something back... Don't just take... Your input/knowledge is valued... ************************************************************************** Send Postings to: spyking@con2.com with "Post" in subject field with subject ************************************************************************** Subscribe to: spyking@con2.com In the subject field type: subscribe-surveillance list e-mail address ************************************************************************** Unsubscribe to: spyking@con2.com In the subject field type: unsubscribe-surveillance list e-mail address ************************************************************************** ...The Simple Rules of the Surveillance List... The Surveillance List Owners may Reject any posts that are/contain: 1) Info Unrelated to Eavesdropping, Surveillance or Privacy technology... 2) Flames or Negative posts... 3) E-Signatures that are considered excessive... 4) Advertisements not DIRECTLY related to the list topics... 5) Attached Files... 6) Oversized Posts... (May be edited to save room) **************************************************************************** This publication is copyrighted and is protected by U.S. and International copyright law. The information transmitted on this list may not be reproduced, reposted or forwarded to any non-list member without expressed written permission of the List Owner. Violation of U.S. copyright law is a criminal and civil offense... **************************************************************************** The Surveillance List is Moderated by SpyKing@thecodex.com The List Owner will make EVERY effort to protect subscribers from spam... Copyright 1996, 1997 Codex Publishing Inc., All Rights Reserved... **************************************************************************** ****************************************************************************** The Official Newsletter of W.A.S.P. The World Association of Surveillance Professionals http://www.thecodex.com/wasp.html ****************************************************************************** Vol.Two Issue #205 The Surveillance List Sept.25,1997 Over 3000+ Members Worldwide Representing 53 different countries List Chat at: http://www.thecodex.com/chat.html ****************************************************************************** While we STILL feel there is NO SUCH THING as a stupid question... We suggest the newer list members AND the technically challenged browse through the FAQ before posting a question... Surveillance List Pseudo FAQ at: http://www.thecodex.com/faq.html P.S. If you have something to add to the FAQ, let us know... ****************************************************************************** IN THIS ISSUE... ****************************************************************************** 01) More bugging... 02) Might be of interest 03) Long distance listening devices 04) GPS 05) Re: How secure are Chat Programs? 06) Toll Fraud 07) PC Telerecorder 08) Telephone number in UK need assistance ****************************************************************************** DON'T BE A LURKER.... GET INVOLVED... YOU ARE A MEMBER... MAKE THE MOST OF IT ****************************************************************************** 1)From: SpyKing@thecodex.com Subject: More bugging... Lt. Gov.: Phones May Be Tapped / McCaughey Ross heeds a warning THE ASSOCIATED PRESS Albany - A private consultant hired by Lt. Gov. Betsy McCaughey Ross has told her that equipment maintained by the state police "is capable of monitoring" phone calls to and from her New York City office. "You should be aware that, in my experience, that equipment is installed because someone intends to use it," an employee of Kern Telemanagement Inc., wrote to Ross' chief of staff, Kevin Lembo-Frey, in a Monday letter, a copy of which was obtained by The Associated Press. State Police Superintendent James McMahon denied that any such special equipment was in place. "It's a standard phone system. There is no monitoring down there of anyone's calls," McMahon said. "The abuse of power is alarming . . .," Ross said. "This kind of practice is troubling." Ross conceded she did not know if her calls had been monitored. "It's absolutely ludicrous . . . It's paranoia that I'm dumbfounded by," McMahon said. Lembo-Frey said the private company was hired to sweep the phone lines after he and other employees noticed sounds on the lines and crossed lines. Ross' chief of staff, noting "increasingly hostile" relations between Ross' office and some allies of Gov. George Pataki, who has told Ross he did not want her on his re-election ticket next year, said he felt "it might be important to see if somebody from the outside world was listening to what goes on in the chamber." From the New York Post: BUGGED BETSY THINKS GOV'S GUARDS TAPPED HER PHONE By FREDRIC U. DICKER ALBANY - Lieutenant Gov. Betsy McCaughey Ross suggested yesterday that Gov. Pataki's State Police security guards might have bugged the phones in her office. But state cops say the whole idea is buggy. McCaughey Ross, who has repeatedly clashed with the Pataki administration, distributed a memo written by a security consultant, Arthur Swift, which said: "On Sept. 20, I performed a security check at your request on the telephone system at the lieutenant governor's Manhattan office. "The results of my examination reveal that the equipment maintained by the State Police is capable of monitoring telephone activity within your office. "You should be aware that, in my experience, that equipment is installed because someone intends to use it." McCaughey Ross shares an office suite and phone system with Pataki. The phones were installed just after Pataki took office in 1995 under the direction of the State Police. State Police Superintendent James McMahon, who is responsible for Pataki's and McCaughey Ross' security, angrily insisted last night that Swift's suggestion "is beyond my imagination. "There's absolutely no monitoring equipment on the phone system, there hasn't been and there isn't," he said. The suggestion is either paranoid or ludicrous or both." Pataki spokeswoman Zenia Mucha also strongly denied that any attempt had been made to monitor McCaughey Ross' office telephones, saying the suggestion "is so ridiculous that it doesn't merit a sane person's response." A senior administration official said McCaughey Ross went to her Manhattan office last Saturday with Swift and two people she falsely identified to the State Police guard as "subcontractors for NYNEX." McMahon said Swift and the two others eventually identified themselves to the State Police as private security experts, but only after they were asked to produce NYNEX IDs. McMahon said one of those accompanying Swift was "a convicted felon." McCaughey Ross was dumped as Pataki's running mate earlier this year after a string of policy disputes with the governor and charges that she had abused her State Police bodyguards by using them as chauffeurs and go-fers. ************************************************************************** 2)From: "hormone derange" Subject: Might be of interest I haven't any personal experience with this shareware but thought it might be of interest to the list. Gotcha! Need a close-circuit video camera? Any PC camera user can create video files of events that occur over extended periods--and you won't have to give up half your hard drive space to do it. The motion-activated program captures images only when it's triggered, and provides a time-stamped video of events as they occur without recording the inactivity between events. http://www.pcworld.com/cgi-bin/shareware?ID=2696 Let me know if it's any good. I'll keep lurking until I have something to say. Josef PS: BadCoffee keep on posting. Same to Mutter and where's China. Easy for me to ask I know 'cause I mostly lurk. Anybody got any questions for a journeyman electrician with some background in electronics email me and I'll get back to you. 12 hour days 7 days a week since labor day. gotta take a break. SpyKing, keep doing it. ************************************************************************** 3)From: "mage2" Subject: Long distance listening devices Ok i have looked around and i want to know if the "Super Ear" is any good and what is the best for the money the "Super Ear"" is around $40 and the cheapest shot gun mic i have found is around $150 and the cheapest parbolic is around $200 I want to know any sources and what is the best for the money. Well have fun and just so you know they( 2 people ) are tring to break he sound barrier in an car. should be interesting mage2 =X 281.Texas.USA ICQ # 1627040 "Just Because Your Paranoid Doesn't Mean They're Not After You" K.S. ************************************************************************** 4)From: "Shadow Chasers" Subject: GPS A company by the name of GSE, located overseas (SWEEDEN/NORWAY) is supposed to have GPS tracking for as little as .40 cents a hit. As long as the phone is 'ON' the system can locate you anywhere in the world! Don't know the exact details, but seen on CNN's Future Watch show this past weekend. The company, GSE is targeting thier software/systems to companies that want to track the location of there salesman! Of course, we know how to put it to 'better use'; if any member. I tried tracking down CNN's websight for more accurate information about GSE, but was unavailable! ************************************************************************** 5)From: Nathan Cummings Subject: Re: How secure are Chat Programs? Sonice Wrote: > I've been told that chat progs like ICQ, Freetel, Powwow are > easily intercepted. Is that true? > > If yes, how does one intercept the chat and are there any software or > methods to counter it? > > TIA > Sonice Well, with no intent at all to get into a debate over encryption systems, the answer is a resounding yes. In fact, nearly all services that you use over the internet are easily intercepted. The reason is that most everything you do or send is transmitted in plain text over the internet with little or no thought given to security measures... IRC, ICQ, mail, ftp, web browsing, news reading, telnet connections (the list goes on and on) all normally transmit raw packets that can __easily__ be sniffed, filtered, cataloged, sorted and read. It can happen anywhere along the route and sometimes that route might be a very circuitous one, hopping between many systems before it reaches its final destination. I am not trying to scare anyone here, I only want you know that for the most part and for most people, conversing over the internet is about as private as, well... Someone once said (maybe it was me, anymore I can't remember) "never write anything down that you don't want someone else reading." Big brother isn't the only who watches you. Nathan Cummings "Crazed with the power and hell bent for the worst kind of infamy" --HST Key fingerprint = 77 1D 84 8C 52 DE 86 B0 B3 A4 C3 8A 40 33 10 3B For PGP Key send mail with "send pgp key" in subject header ************************************************************************** 6)SpyKing@thecodex.com Subject: Toll Fraud Checkout: http://www.superstore.com/%7Eccs/fraud.html ************************************************************************** 7)From: travlinman@hotmail.com Subject: PC Telerecorder PC TeleRecorder - RECORD TELEPHONE CONVERSATIONS AND CALLER ID, DIRECT TO YOUR PC HARD DRIVE - This computer program comes with all the telephone connection equipment needed. Record All extensions of your telephone. Keep an accurate log of all incoming and outgoing phone messages. This software will compress 25 minutes of phone conversation to a standard 1.44 megabyte floppy disk. Best of All, it additionally records all Caller ID Information. Anyone know the manufacturer or source on this? ************************************************************************** 8)From: Jean-Pierre Forest Subject: Telephone number in UK need assistance I have a Number which is a fax No. in the UK. I would like to know who it's registered to without alerting the owner of our inquiries. Can anyone direct me in the right direction. ************************************************************************** Who are you? What's your specialty and/or interest? Let us know about your company... What would you like to see on the list? Post it. Let us know... Do you have something to contribute? We'd like to hear it... We want to know EVERYTHING and ANYTHING about eavesdropping, surveillance, countersurveillance & privacy related technology, etc... Remember: who, what, where, when, how & why... we want ALL the details... Do you have a question? Post it... A little free time? Help a member... With the INCREDIBLE brain power on this list, someone should have the answer ;-) P.S. Don't be a LURKER... Members take the time to post info for us all... give something back... Don't just take... Your input/knowledge is valued... ************************************************************************** Send Postings to: spyking@con2.com with "Post" in subject field with subject ************************************************************************** Subscribe to: spyking@con2.com In the subject field type: subscribe-surveillance list e-mail address ************************************************************************** Unsubscribe to: spyking@con2.com In the subject field type: unsubscribe-surveillance list e-mail address ************************************************************************** ...The Simple Rules of the Surveillance List... The Surveillance List Owners may Reject any posts that are/contain: 1) Info Unrelated to Eavesdropping, Surveillance or Privacy technology... 2) Flames or Negative posts... 3) E-Signatures that are considered excessive... 4) Advertisements not DIRECTLY related to the list topics... 5) Attached Files... 6) Oversized Posts... (May be edited to save room) **************************************************************************** This publication is copyrighted and is protected by U.S. and International copyright law. The information transmitted on this list may not be reproduced, reposted or forwarded to any non-list member without expressed written permission of the List Owner. Violation of U.S. copyright law is a criminal and civil offense... **************************************************************************** The Surveillance List is Moderated by SpyKing@thecodex.com The List Owner will make EVERY effort to protect subscribers from spam... Copyright 1996, 1997 Codex Publishing Inc., All Rights Reserved... **************************************************************************** ****************************************************************************** The Official Newsletter of W.A.S.P. The World Association of Surveillance Professionals http://www.thecodex.com/wasp.html ****************************************************************************** Vol.Two Issue #206 The Surveillance List Sept.26,1997 Over 3000+ Members Worldwide Representing 53 different countries List Chat at: http://www.thecodex.com/chat.html ****************************************************************************** While we STILL feel there is NO SUCH THING as a stupid question... We suggest the newer list members AND the technically challenged browse through the FAQ before posting a question... Surveillance List Pseudo FAQ at: http://www.thecodex.com/faq.html P.S. If you have something to add to the FAQ, let us know... ****************************************************************************** IN THIS ISSUE... ****************************************************************************** 01) Day Care Web-cams 02) Bad needs his work back. :-) 03) GPS TRACKING! 04) Good radio/comm shopping in HongKong? 05) Re: Poor Boy's Vehicle tracking Device 06) HOW TO GET PAY PHONE LOCATIONS FROM PHONE NUMBER 07) Re: Long Distance listening 08) Re: How secure are Chat Programs? 09) Telephone register 10) Here's a good one 11) I think BIG BROTHER is getting a little pissed 12) Sojourn's end 13) Re: Telephone number in UK need assistance 14) Need info on passports ****************************************************************************** DON'T BE A LURKER.... GET INVOLVED... YOU ARE A MEMBER... MAKE THE MOST OF IT ****************************************************************************** 1)From: "J.D. Abolins" Subject: Day Care Web-cams "They don't think about it at all; they're completely indifferent to it," said one person interviewed about children in a day care center that has several Web-connected video cameras "viewing" the children's area. The Web-cam technology from Simplex Technologies takes a video "snapshot" periodically and posts it to a Web page for the day care center. Access to the page requires a password. Parents of the children enrolled at the day care center get the password. (The report mentioned that relatives of the children often get access to the page as well.) The Web carries only the video sanpshot, no sound. The cameras are in the "public" areas of the day care center. No cameras are pointed at bathrooms or changing areas. Web-cams are a fascinating resource that, depending upon how they are used, can raise some privacy issues. The NBC Today show story dismissed the issues by emphasizing the positive aspects of the Web-cams. The obvious one is that parents can get a glimpse of their children through the day from their home or work computers. For families that often spend little time together, these glimpses can be valuable. Even if the time isn't so tight, parents like the glimpses. The day care staff was initially concerned about their privacy and the possibility of getting micro-managed by parents. They found that the parents became more supportive as they saw the glimpses of the day care during the day. As mentioned at the start of this article, the children don't seem to mind that cameras. The NBC Today report briefly considered employer concerns that parents might spend work time and work computing resources to look in on their children. It simply said that everybody will adjust to it. The parents will take fewer glimpses as the novelty wears off. The Web-cam checks on kids can bring up several workplace privacy issues. I can see in an office with network based Internet connection and new Web browsers where a parent sets up an "active desktop" with a "subscription" to the day care center. Employers might object to such use of the corporate resources. Parent might argue that this is an extension of the kid's photos on their desk. Another issue is the greater possibility of the disclosure of the day care center's password. There is one significant aspect of the day care Web cams that the NBC report ignored. They might not have even realized the issue exists. This issue is the acclimatization of children to increased surveillence. In a way, this IS preparing children for a very likely future (and the present day) of more extensive surveillence. It seems that being on camera is more jarring to older people (who grew up before regular video surveillance of schools and public places) than for younger people. For the day-care children growing up under Web-cams, it is likely that they will be less fazed by other surveillance later in life and be less likely to raise privacy objections. It is possible, however, that the children rebel against pervasive surveillance later in life. The day-center and the company setting up the Web-cams are not seeking to acclimatize the children to surveillence. It is a side-effect of providing what they see as a beneficial service. Like many of the privacy collisions, this one comes out the provision of beneficial services. A big challenges is to provide the benefits with minimized privacy risks. For a starting point in seeing public access Web cams, try this Web cam list page: http://cello.qnet.com/~ksd/intcam.htm ************************************************************************** 2)From: BADCOFFEE@aol.com Subject: Bad needs his work back. :-) I've been doing this for a while now. (posts) Siping coffee right now and saying to myself...... "Gee...I wonder if there is anyone nutty enough to be compiling Bad's work". I'de LOVE to have it if there is anyone out there doing such a thing. If there is such a person.....I'll whip up a quick web page and split the credits. Just a thaught. Ps- ON the books and not forgotten. EASY way to open Master Locks (newer) based on feel and sound only. Lockpicking video (raw and crude....but a neat project) Coffee is on me. But only in....the MGM in Los Vegas <-----hint. (someone promote this thing) Sometimes list member send me mail.....that when I send back gets returned with unknown adress. If ever I have not answered anyone here....(never happened) count on that being the reason. If there is a mail problem and you have a question, drop me your phone number and best time to call. My dime. Augie ************************************************************************** 3)From: "Shadow Chasers" Subject: GPS TRACKING! GSE (GSS)? The company I mentioned in the last post, provides GPS Tracking for GSM equiped phones for about .40 USD cents a hit. From what I can remember of the broadcast on CNN's Future Watch, GSE (GSS) acts as it's own ISP for subscribers to login to there network and allows those subsribers to track any GSM equiped they have the telco #'s for! The cost for the service is susposed to be for GSE (GSS) interface software and per hit of the GSM phone. The company is either in Norway or Sweeden? ************************************************************************** 4)From: Frank Rieger Subject: Good radio/comm shopping in HongKong? Hi Listmembers, Has anyone good & priceworthy adresses for radio/comm-equipment shopping in HongKong? Especially looking for Optoelektronics & AOR-Stuff, but also some wireless video. Are there any export rules to observe? Thanks for your help Frank ************************************************************************** 5)From: KDots@aol.com Subject: Re: Poor Boy's Vehicle tracking Device Well, since I've stepped out of the shadows, I might as well contribute. I've read in SLF about vehicle tracking, GPS (which I Love my portable), and Phone tracking. OK, they are all practical, but sometimes you just have to make due with less. Enter "Poor Boy's Vehicle Tracking Device"........A can of paint tied under the Bumper with a small leaky hole in it. If you position the can horizontally and put a leak hole on either end...turns to the side push more paint out to mark the turns more noticably. Then there's the next model with flourescent liquids and ultraviolet headlights....haha. PS. I wonder if Augie is the PI-Augie I met at Four Winds. Kerry, LP Mgr/Investigator, Nine Lives Assoc, ASIS ************************************************************************** 6)From: BADCOFFEE@aol.com Subject: HOW TO GET PAY PHONE LOCATIONS FROM PHONE NUMBER HOW TO GET PAY PHONE LOCATIONS FROM PHONE NUMBER: (original) Social engineering in all it's glory. Life boils down to coffee...and pre-text calls. (and a couple of groovy looking chicks here and there) "Hi, can you help me......my son just called from a payphone. I was supposed to pick him up. I hung up..then realized I didn't ask him where he was. My caller ID reads XXX-XXXX. Do you know where he is?" Worked like BUTTER. Service with a smile from the other end. NO laws broken (or even bent)...PERFECT pretext. Word of caution please. Use pretext's only when you have a true need for information. Hate to have 3,000+ making practice runs with the ones that work....thus making them a "little fishy" when the same operator takes the same call....5 times. Lets keep the good things.....alive. :-) Ps- I think MCI 1-800-444-3333 caught on. The message has changed and it is now only sometimes (???why) reading back ANI's. Ps- Anything that leaves my computer is always FRESH material that is most of the time conceived within the airspace between Bad's ears. I have NEVER once pulled anything off a web page and sent it here. Credit's given whenever it is not my puppy. :-) Augie ************************************************************************** 7)From: KDots@aol.com Subject: Re: Long Distance listening << 3)From: "mage2" Subject: Long distance listening devices Ok i have looked around and i want to know if the "Super Ear" is any good and what is the best for the money the "Super Ear"" is around $40 and the cheapest shot gun mic i have found is around $150 and the cheapest parbolic is around $200 >> Another "Lurker" steps out of the shadows. Regarding Long Distance listening devices you need only look at those with the money and the need to hear..................Football Teams, News Media, answer.... Parabolic microphone, especially with noise as a factor. Super ear is OK for hunters where it is generally quiet, or for listening to conversation from your neighbors on a quiet night since it amplfies, but, it amplifies everything. If in a noisy area (ie.stadium), you have to consider not only amplifying the target conversation, but rejecting the ambient noise. You also have to consider your use of the equipment. Those on the football sidelines are not trying to hide. I've done enough surveillance to know that it's difficult enough to be inconspicuous with a pair of small binoculars, let alone trying to fit into the surroundings with a big parabolic dish. A shotgun mike also serves it's purpose, such as a crowded news breifing where the speaker is amplified over room size distances and has some directional quality for rejecting minimal ambient sound as most of the people present are quiet while the subject speaks. As with most devices, the best choice is determined by the setting in which it will be used not simply which device hears the best. Keep in mind that your needs may even best be served by transmitting the conversation or planting a recorder, rather than than amplifying sound waves. So there you have it.....another "Lurker" with 2 cents. Kerry, Loss Prev. Mgr/Investigator, Nine Lives Assoc., ASIS ************************************************************************** 8)From: Michael Banks <75300.2721@compuserve.com> Subject: Re: How secure are Chat Programs? Nathan Cummings pretty much said it all in his response to the above question. I'll add that the easiest place for your chat or other outgoing communication to be intercepted is probably at your ISP's computer. As many of you know, someone with the right level of access to a mainframe or mini-computer can literally see (and record) every character you type. Remember that "(and record)," because a second thing of which you need to be aware is that ANYTHING you type in chat, E-mail, on a BBS, or otherwise can be RECORDED. So, even though you may trust a correspondent, don't "say" anything online you wouldn't want coming back to haunt you. On the Internet the walls not only have ears--they also have memories! On the other hand ... do you feel that you will be discussing something of such a sensitive nature that others would want to "listen in?" I'm minded of when I worked for the telephone company (in pre-breakup days), installing switching equipment in central offices. One thing I saw going on in virtually every office was workers listening in to telephone calls. Some even put calls on the PA, but it was rare that anyone listened to a call for very long--or even several calls in a row. This was because telephone calls were, by and large, BORING, after the first minute or so. The reason why they were boring was because they were conversations between people that none of the listeners knew. The only times communciations between/among others is interesting is when you know the people, or if the subjects are celebrities or people engaged in "known" subjects. --Michael A. Banks Author, "Web Psychos, Stalkers, and Pranksters: How to Protect Yourself in Cyberspace http://www.coriolis.com/webpsychos/ ************************************************************************** 9)From: "cookpi" Subject: Telephone register Greg M Cook cookpi@citynet.net Recently saw telephone register, allows you to log all outgoing calls and can even limit long distance calls. Advertised price of $300.00. Seems alittle high. Anyone know of a direct supplier of this type equipment please email reply. Thanks in advance. ************************************************************************** 10)From: BADCOFFEE@aol.com Subject: Here's a good one..... I had lunch with an amatuer PI that told me what was the last case he worked on and how things ended up. I'de like to know how common is this and what can be done to prevent such ocurrances..... Day 1: Hired by a woman to do some surveillance on cheating husband. Day 2: he produces results. Day 3: "Husband" is on a rampage looking for the PI that "did this". (looser) LOL <----cummon, that is funny. BUT! I would not want for it to happen to me....so what do you think could be done to prevent this from happening to BAD. :-) As of now.... The vulnerability lies with a con...conning the con. Setting up a "client" meeting...and then WHAMMO! :-) Recap: How common and prevention. Augie ************************************************************************** 11)From: BADCOFFEE@aol.com Subject: I think BIG BROTHER is getting a little pissed I think BIG BROTHER is getting a little pissed.....that "little brother" has....and is "effectively" using hi tech gadgets to keep the checks and ballances intact. In a time where there seems to be complete incompetance in the checks and ballance system, they are more or less "stripping" the powers of the people away each day. Damage control <-------BIG word I wonder if the videographer of the infamous "Rodney King" beating would be charged with unlawfull recording if that was to happen these days. THAT video....is bad for business. <------one side THAT video....might show what is happening to the people of LA <-----the other side Then there is the truth.....whatever that might be. hmmmmmm..... Ps- I've been reviewing the laws pertaining to this field. There's is nothing left that is not crossing the line. Lawmakers: Were not bad people. Were not out to get anyone....but the bad guy. Don't make us the bad guy. Thats not right. The tools of any trade...can be used for harmfull purposes. My hammer hits a lot of nails to build many homes. Spycameras and audio tapes catch many child molesters, bad nannies, kidnappers, criminals. ..Or.....I could whack you in the head with my hammer and watch the video afterwards. "choices" not "tools" Augie ************************************************************************** 12)From: Gary Cohen Subject: Sojourn's end I'd like to thank the PI's and info-brokers who have been kind enough to meet us, feed us, talk to us, work with us, sleep over, educate us: Linda Houston-Roland Campos-Rex Holder-Hershell Johnston-Steve Uhrig-Warren Levicoff-Bill Losefsky-Julie Kuehl-Mike Rasmussen-Scott Bressette-Leroy Cook-Larry Braden-Venetia Flowers-Selene Windancer-Ed Michael-Steve & Francis Sprague-Mike Earl-Bob Roffman-Kathy Dunne Also the others who invited us but we couldn't get together and "almost met": RJ Bacon-Richard Harrington-Phil McLean-Bill Fason-Brian Poirier-RJ Slepski-Sue Ball-Doug Stevens-Stu Steinberg-Merl Heinlein-Ann Cunningham-Bernie Dudas-Jeff Rataiczak-Pat Suiter-Cyn the Librarian-Sherry (mscluso) Howard-Patrick Higgins-Robert Stack-Carl Brenton-Mike Moore-Mike White - (WHEW). Now I'm home in the bosom of South Florida and searching for full-time work. (reality sets in.) SHAMELESS SELF PROMOTION-----> 46 yrs. old, great with computers, knows databases, networked across the country personally, 1.5 years pi experience, 20 years business management experience, gun permitted and experienced, always willing to learn more, willing to relocate. Any interest? <----END OF SHAMELESS SELF PROMOTION Anyway, thanks all for bearing with my missives and making my sojourn enjoyable. Gary Cohen Investigator On the road to find out. heatgain@mindspring.com Member-FALI & SFIA Chairman, Internet Committee, SFIA (South Florida Investigators Assoc.) SFIA - http://www.webcircle.com/users/sfia/ ************************************************************************** 13)From: Martin Pask <100142.3101@compuserve.com> Subject: Re: Telephone number in UK need assistance (8)From: Jean-Pierre Forest ) (Subject: Telephone number in UK need assistance) (I have a Number which is a fax No. in the UK. I would like to know who) (it's registered to without alerting the owner of our inquiries. Can anyone) (direct me in the right direction. ) Email me your details and I will have a look for you. M.P.I. ************************************************************************** 14)From: Manatau Subject: Need info on passports Need info on passports. have the number need to know departure dates from U.S. Also, thanks for the insight on the Fed's. reason for wanting encryption keys. K.C. (manatau) ************************************************************************** Who are you? What's your specialty and/or interest? Let us know about your company... What would you like to see on the list? Post it. Let us know... Do you have something to contribute? We'd like to hear it... We want to know EVERYTHING and ANYTHING about eavesdropping, surveillance, countersurveillance & privacy related technology, etc... Remember: who, what, where, when, how & why... we want ALL the details... Do you have a question? Post it... A little free time? Help a member... With the INCREDIBLE brain power on this list, someone should have the answer ;-) P.S. Don't be a LURKER... Members take the time to post info for us all... give something back... Don't just take... Your input/knowledge is valued... ************************************************************************** Send Postings to: spyking@con2.com with "Post" in subject field with subject ************************************************************************** Subscribe to: spyking@con2.com In the subject field type: subscribe-surveillance list e-mail address ************************************************************************** Unsubscribe to: spyking@con2.com In the subject field type: unsubscribe-surveillance list e-mail address ************************************************************************** ...The Simple Rules of the Surveillance List... The Surveillance List Owners may Reject any posts that are/contain: 1) Info Unrelated to Eavesdropping, Surveillance or Privacy technology... 2) Flames or Negative posts... 3) E-Signatures that are considered excessive... 4) Advertisements not DIRECTLY related to the list topics... 5) Attached Files... 6) Oversized Posts... (May be edited to save room) **************************************************************************** This publication is copyrighted and is protected by U.S. and International copyright law. The information transmitted on this list may not be reproduced, reposted or forwarded to any non-list member without expressed written permission of the List Owner. Violation of U.S. copyright law is a criminal and civil offense... **************************************************************************** The Surveillance List is Moderated by SpyKing@thecodex.com The List Owner will make EVERY effort to protect subscribers from spam... Copyright 1996, 1997 Codex Publishing Inc., All Rights Reserved... **************************************************************************** ****************************************************************************** The Official Newsletter of W.A.S.P. The World Association of Surveillance Professionals http://www.thecodex.com/wasp.html ****************************************************************************** Vol.Two Issue #207 The Surveillance List Sept.29,1997 Over 3000+ Members Worldwide Representing 53 different countries List Chat at: http://www.thecodex.com/chat.html ****************************************************************************** While we STILL feel there is NO SUCH THING as a stupid question... We suggest the newer list members AND the technically challenged browse through the FAQ before posting a question... Surveillance List Pseudo FAQ at: http://www.thecodex.com/faq.html P.S. If you have something to add to the FAQ, let us know... ****************************************************************************** IN THIS ISSUE... ****************************************************************************** 01) How was Wiretap found? 02) Cleveland? 03) Re: Long distance listening devices 04) Four Winds? 05) Video recording tip... 06) Mandatory Key Escrow 07) Camcorder Battery problems... 08) In need of a audio/video receiver 09) Street lites keep going off on me! 10) Re: GPS TRACKING!/Re: Poor Boy's Vehicle tracking Device 11) Cop Phone Clone 12) Re: Super Ear 13) Re: making such big deal about encrypted e-mail? 14) Re: Long Distance Listening/Re: Badcoffee 15) I have a problem 16) Several questions for everyone 17) Re: Good radio/comm shopping in HongKong? 18) Re: GPS TRACKING! ****************************************************************************** DON'T BE A LURKER.... GET INVOLVED... YOU ARE A MEMBER... MAKE THE MOST OF IT ****************************************************************************** 1)From: ken trummell Subject: How was Wiretap found? To Whom It May Concern: I would like to know, how did Tree Rollins expose himself in getting recognized tapping his phone. How did someone know this was being performed? Did someone set this for him? Or, was it just a recorder on the line? Sometimes when one is too eager to obtain information, they kiss and tell other parties, which in turn, get back to the source. Can someone set the story straight as to how this happened? Any Experts Out There? ************************************************************************** 2)From: BADCOFFEE@aol.com Subject: Cleveland? Hi all, Need a contact in CLEAVELAND, OHIO to ask a few questions about a few things in the area. Pro-bono skip trace in progress. Augie ************************************************************************** 3)From: "Matthew J. Cherry" Subject: Re: Long distance listening devices Check out the Gibson Parabolic Mic. I have one and it works pretty well. Even with the powered model you still need a surveillance preamp and some filtering equipment but over all it gets the job done. ************************************************************************** 4)From: BADCOFFEE@aol.com Subject: Four Winds? << PS. I wonder if Augie is the PI-Augie I met at Four Winds. >> Was he young, attractive, glistening eyes with lots of $$? Yes? Nope....not me :-) The only 4 Winds I've experienced at was just after Taco Bell last Saterday. Augie :"-) ************************************************************************** 5)From: "Matthew J. Cherry" Subject: Video recording tip... >>>> BADCOFFEE@aol.com wrote Subject: Video recording tip... <<<< Check the batteries......Check the batteries...... Just a tip. Some batter companies sell power packs that hook up to your camcorder but run off regular alkaline batteries. You can always find a seven eleven open a three in the morning if you get desperate. Also invest in a power inverter for your car. ************************************************************************** 6)From: Nev Dull Subject: Mandatory Key Escrow Forwarded-by: Phil Agre Forwarded-by: "Michael Froomkin" [This open letter was sent to all members of the House Commerce Committee.] September 23, 1997 The Honorable Thomas J. Bliley 2409 Rayburn HOB Washington, DC 20515 Dear Chairman Bliley, We write to express alarm about an unprecedented proposal that has been advanced to impose criminal penalties on the manufacturing or distribution of domestic encryption products that do not contain a government-mandated "back-door." The proposal, drafted in large part by the FBI, has already been adopted by the House Intelligence Committee, and may be offered soon in the Commerce Committee by Reps. Michael Oxley and Thomas Manton as an amendment to H.R. 695, the "Security and Freedom through Encryption (SAFE) Act." The SAFE Act was originally intended to loosen the export controls that have blocked U.S. companies from offering products with strong encryption on the global market. The Oxley-Manton amendment, however, changes fundamentally the nature of SAFE. Rather than liberalizing limitations on encryption, the amendment drastically increases the government's control over the use of both domestic and international encryption technologies. We believe that this is a profound mistake. Never in peacetime has our government attempted so completely to monopolize a single form of communication; never has it required, in effect, a license to exercise the right to speak. But that is what this amendment would do. In our view, not only could this amendment make our citizens less secure, but it would also contravene fundamental principles of our constitutional tradition. We would no longer be a leader protecting individual rights internationally; we would instead become the architect of the most comprehensive surveillance plan the world has seen since the end of the Cold War. We are law professors who believe this plan is as unconstitutional as it is unwise. We may individually differ in our reasons, but we have collected below at least some of the reasons that we take the position we do. We urge Congress not to take this step now. No showing has been made to justify so massive a change in our constitutional protections. I. An Attack on Basic Constitutional Rights Freedom of Speech The amendment raises profound questions about rights of free speech. The right to speak freely includes not only the right to say what you want, to whom you want. It also includes the right to choose how to speak, and whether to speak at all. The right has no preconditions. In America, at least, you do not need a license to speak; you do not need the government's permission to speak in the language of your choice; and you do not have to organize your speaking in a way that happens to suit the needs of the government. The Constitution no more permits Congress the power to regulate the software within which speech may occur than it give Congress the power to say what kind of paper a diary may be written upon. These are choices rightly left to the individual. These freedoms are a basic part of the fabric of American constitutional law. The Supreme Court has upheld them in innumerable rulings, including McIntyre v. Ohio Elections Commission (affirming the right to anonymous political speech); Riley v. National Fed'n of the Blind ("Mandating speech that a speaker would not otherwise make necessarily alters the content of the speech."); Wooley v. Maynard (holding unconstitutional New Hampshire's requirement that cars display license plates bearing the state motto); West Virginia State Board of Education v. Barnette (holding that compelled recitation of pledge of allegiance violates the First Amendment) . The amendment would undermine these constitutional rights to free speech. By imposing requirements on cryptographic programs - used by individuals and corporations to protect the privacy and security of their papers and telephone or e-mail conversations - it would in effect be mandating the code software writers may write. Only governmentally approved code could be used to transmit speech the speaker wants to protect; authors and speakers would be required to use this code to say what they wanted to say. This forced speech, we believe, takes the government's power too far. We accept that law enforcement agencies, if they obtain a warrant based on a showing of probable cause, can intercept a person's communications and seize a person's data. But that power exists after a finding of probable cause has been made. This amendment regulates citizens before any finding of probable cause. It regulates the programs that citizens may use before they speak at all. It requires every citizen to fit his speech to a program essentially designed by the government, so that the government is better able to monitor the citizen's speech. This preemptive strike on free speech is without precedent in our constitutional tradition. We believe it is profoundly misguided. Under the theory of the amendment, the only permissible encrypted speech is governmentally licensed encrypted speech. But this, we believe, the government cannot require. Fourth Amendment Rights The amendment also raises troubling questions about the right to privacy. Our Constitution presumes that there will be no secret searches. Not only must the government ordinarily obtain a warrant for a search, but its agents executing the warrant must also announce their presence. This is the knock and notice requirement, and the Supreme Court has made it clear that this is a fundamental element of Fourth Amendment protections. The amendment would abrogate this fundamental protection. By requiring users of encryption to place their key with third parties who can be compelled under the statute to hand that key over to the government, the amendment makes possible secret searches by the government on an unprecedented scale. These are not just telephone calls that the government needs contemporaneously to search. It includes documents on a computer disk, whether bank records or a diary. It is as if the state required the deposit of house keys with a local bank, so that the government could use that key secretly to gain access to an individual's house. More fundamentally, the amendment does violence to our Fourth Amendment values by forcing all citizens to communicate in a way that limits their ability to protect their own privacy. In an effort to downplay the significance of its proposal, the FBI has argued that it is only seeking to ensure the ability to obtain plaintext of data that it has already obtained in encrypted form. On this basis, the FBI tries to argue that it is seeking no new authority. On the contrary, under current law and practice, if the government obtains access to encrypted data or communications using any of the surreptitious means now at its disposal, it has no power to assure access to the plaintext of that data. This country's Fourth Amendment has never guaranteed law enforcement's ability to search, seize, and understand every conversation, communication, or stored record of every citizen. We have never required that every person -- whether or not there is probable cause to believe they have committed a crime -- live in the legal equivalent of a glass house, just so the government can facilitate surveillance without the notice or consent of the searched. II. The Risks of a Global Key Recovery Regime We are most concerned, however, with the danger that this proposal presents internationally. The new communications media are global in nature. No nation regulates for itself alone. The proposed "solution" to the encryption issue offered by the amendment will be most effective for law enforcement only if it is widely adopted internationally. Section 501 of the House Intelligence bill in fact instructs the President to negotiate agreements with foreign governments for "mutual recognition of any key management infrastructures." Most countries, however, do not give their citizens the same privacy protection that our Constitution guarantees our citizens. Therefore this international recognition could present three problems for the privacy interests of our own citizens. The first is the lack of privacy protection against foreign government access to keys, whether stored in the U.S. or elsewhere. Few countries assure privacy protections comparable to ours. Yet the "mutual recognition" agreements essential to a global key recovery system will require the exchange of key information with foreign governments. When other countries request keys, many of these requests will be made on the basis of procedures far less strict than those required under U.S. law. In these cases, it will be difficult or impossible to determine whether the requesting country has complied with anything comparable to our warrant requirements. The risk is even worse when decryption information is held outside of the U.S., for it will be impossible to assure that adequate security precautions are followed by the other government's key recovery system. As a result, American citizens using encryption, both within the U.S. and outside of the U.S., will do so without the privacy protections provided under U.S. law, and without the technical security protections provided by encryption without a backdoor. The second, and more fundamental problem, is the threat the proposal poses to the historic role of the United States as a defender of freedom. In countries throughout the world, the targets of surveillance include dissidents, religious groups, the press, and economic enterprises. We have long stood to protect the individual against such invasions by governmental surveillance. Ours is not the society of big brother. Yet in advancing this proposal, we would become the leader in establishing a new global surveillance society. Especially where political oppression exists, this will just increase the threats to liberty for these citizens, or for our citizens as they may interact with these countries. The risks of key escrow threaten the press, churches and other non-governmental organizations, as well as individual citizens. Third, a global key escrow regime would be a threat to American economic security. Other countries will use key escrow as a tool for economic advantage. Following the American lead, other countries will be emboldened to criminalize strong encryption and establish a key escrow system along the lines of the proposed bill. As a condition of doing business, American companies will be required to hand over their keys, and in this way, foreign governments could gain the power to decrypt all business communications that cross their territory. This again would allow foreign governments to read confidential communications without any notice to the company that it is under surveillance. Conclusion Congress faces a historic choice about the shape of free speech and privacy in the next century. In making this choice, there will no doubt be many questions of profound importance to our constitutional values. But there is little doubt that the Intelligence Committee substitute and the Oxley-Manton amendment would inspire the creation of an unprecedented system of global surveillance, expanding law enforcement authority and circumventing the protections of the First and Fourth amendments. It is too radical a change to make with so little thought. We urge you to resist it. Sincerely, Keith Aoki University of Oregon School of Law Kevin D. Ashley University of Pittsburgh School of Law Jack M. Balkin Yale Law School William E. Boyd University of Arizona College of Law Darryl K. Brown University of Dayton School of Law Dan L. Burk Seton Hall University School of Law Julie E. Cohen University of Pittsburgh School of Law Peter L. Fitzgerald Stetson University College of Law Eric M. Freedman Hofstra University School of Law A. Michael Froomkin University of Miami School of Law Llewellyn J. Gibbons Franklin Pierce Law Center Timothy Hoff University of Alabama School of Law Jerry Kang UCLA School of Law Ethan Katsh University of Massachusetts Andrew Koppelman Northwestern University School of Law Mark Lemley University of Texas at Austin School of Law Lawrence Lessig Harvard Law School Jessica Litman Wayne State University Henry H. Perritt IIT Chicago-Kent College of Law David G. Post Temple University Law School Margaret Radin Stanford Law School William D. Rich University of Akron School of Law Jon Romberg Seton Hall University School of Law Jim Rossi Florida State University College of Law Pamela Samuelson University of California at Berkeley School of Law Mark S. Scarberry Pepperdine University School of Law David E. Sorkin John Marshall Law School Peter Swire Ohio State University College of Law Note: Institutional references are for identification only. The views expressed herein do not necessarily reflect the views of the organizations referenced. ************************************************************************** 7)From: BADCOFFEE@aol.com Subject: Camcorder Battery problems... Hmmmmm....... Hook up a power inverter ($50) in your vehicle to the recharger to keep at least ONE on charge at all times. Power inverters facinate me. Can you sucessfully hook up VCR's, TV's..ect without real complications if the rating is correct? If there is some type of a "skip" in power....would this shut the VCR down? Very neat product...and cheap. Augie ************************************************************************** 8)From: DanielDLC@aol.com Subject: In need of a audio/video receiver Hello everyone, I am in need of a audio/video receiver to complement my channel 14 transmitter and Sony Z-Box1. I've been searching high and low for one to no avail. Or does anyone recommend some other option for value priced wireless audio/video? Thanks in advance =) ************************************************************************** 9)From: Safemode@aol.com Subject: Street lites keep going off on me! I travel 2800 miles a week, in the New England area. My problem is the street lites keep going off on me! I'm not talking about one or two lites here. This happens on directional changes, from the inter-state hiways to city main sts., right down to the smallest sts. you can find! I average 40 to 50 occurences in a 250 mile trip! Driving down the road as I pass underneath the light it "pops off"! When ever I park my vechicle, the nearest light will go off & on for as long as I stay there! It seems coordinated to me and is very nerve-racking! This happens on a nightly basis and has been going on for about a year now! If anyone could give me a logical explaination for this I would very much like to here it. Thanks! ************************************************************************** 10)From: "Lorenzo Castillo Sanchez" Subject: Re: GPS TRACKING! >GSE (GSS)? The company I mentioned in the last post, provides GPS >Tracking for GSM equiped phones for about .40 USD cents a hit. >From what I can remember of the broadcast on CNN's Future Watch, GSE >(GSS) acts as it's own ISP for subscribers to login to there network >and allows those subsribers to track any GSM equiped they have the >telco #'s for! >The cost for the service is susposed to be for GSE (GSS) interface >software and per hit of the GSM phone. The company is either in >Norway or Sweeden? I don't think that company has a website on the net. I asked some of my European pals to check out the company for me but I am not sure if they'll be able to find it. Well, thanks for letting the SL people know and I'll let everybody know when I hear from my European pals. ---------------------------------------------------------------------- >Subject: Re: Poor Boy's Vehicle tracking Device >Enter "Poor Boy's Vehicle Tracking Device"........A can of paint >tied under the Bumper with a small leaky hole in it. If you position >the can >horizontally and put a leak hole on either end...turns to >the side push more paint out to mark the turns more noticably. Then >there's the next model with flourescent liquids and ultraviolet >headlights....haha. Yes, this is a more affordable choice, but you'd have to keep an eye the vehicle with no time to spare. When your target gets home and finds out he's going be more paranoid and more alert so it'll harder to keep an eye on him and you'd have to be a lot more CAREFUL. Come to think of it, I remember reading about this kind of "trade skills" in 'Book II : How To Get Anything On Anybody'(by Lee Lapin). Flourescent liquids come in handy at night when you're equipped with Night Observation Devices(NODs) but you can also build your own home-made firefly flasher. For more info, check out this book --> 'Benched-tested Circuits for the Surveillance & Counter- surveillance Technicians', by Tom Larsen and it's available from Paladin Press (http://www.paladin-press.com) If you want to check out another book with schematics, I recommend this one --> 'Home Workshop Spy : Spookware for the Serious Hobbist' by Nick Chiarusco and it's available from Paladin Press. ************************************************************************** 11)From: FGM7516@aol.com Subject: Cop Phone Clone The problem of cloned phones can bring creative anecdotes. A friend recently sent me this..... Cell phones can have their ID numbers trapped on a frequency processor and this number is used to clone the illegal phone and use someone else's account. The Pima County Sheriffs Dept in Arizona was recently taken aback when its own Public Information Officer had his signal intercepted and the police account was later used by persons unknown to make international calls believed to have set up narcotics shipments. Frequent calls to NY City, Colombia, and FL were noted on the account. This alerted the operators after the numbers were traced (thought to have been done by NSA) to the local sheriff and to alleged narcotics traffickers. A cartel high tech communications intercept location in Sonora was being run by former and retired US Tech Support Special Agents making 5 times the money per month they made from the U.S. military. ************************************************************************** 12)From: CChrist373@aol.com Subject: Re: Super Ear Travlin man made a post about the Super Ear. I know a fellow who has one and says it works great. Another man on the list said it would pick up backround noise and he is right. I have used the Bionic Ear and it works well but does catch everything between you an the target. Best bet would be a post process, like unnig it through a frequency equalizer latter from a recording. Also write a company called Walker Game Ear and check out their goodies. In particular their nature ear and Tactical Ear Two. Hearing aid sound amps. Think about it. A hearing amp that fits in your ear. The possabilities are just fun to think about. I have a request which I don't think anyone will mind. I need to put a pesonal message on the list to someone who is a member, Thank You. "Vicki, I know you read this list and I haven't heard from you in awhile. I've been worried and you know why. If you don't want to talk to me anymore just e mail me and say so. I'ma big boy" Micahel ************************************************************************** 13)From: "George Martin" Subject: Re: making such big deal about encrypted e-mail? Manatau wrote: > I was just wondering why the Fed's are making such big deal about > encrypted e-mail?? I suspect the recent push for government access to private encryption is an indication that the government is losing its technical edge. With the amount of processing power available to the average person and the ability to employ encryption with keys thousands of bits long it is no longer possible for interception and screening to take place in (near) real-time. Additionally, if Joe Public has the ability to speak into a microphone, encrypt the stream of data, send it to its destination through the internet and decrypt it as easily as speaking on a telephone...well, you get the picture! Last I heard all cryptographic algorithms are considered breakable (given enough time and computational power) with the exception of the one-time pad. So if I had something which I wanted kept secret guess what I would use? And since my Right to not incriminate myself is protected under the Fifth Amendment... George D. Martin ************************************************************************** 14)From: Rick Ashley Subject: Re: Long Distance Listening/Re: Badcoffee YES! I finally caught-up with my E-Mail and can now start replying to CURRENT issues, instead of kicking all the old, dead horses. In response to "Long Distance Listening" I would like to start by saying that I am not an expert, but I do play one on TV :-). An associate of mine purchased one of those Bionic Ear devices, a cheap parabolic mike that will run you about $150. After several months of application, our results were lower than our expectations. When used outdoors, our target sound tended to get overwhelmed with background noise. We both came to the sad conclusion that if you want a parabolic mic that will make you happy, you are gonna have to spend a little more than $150. I would recommend stepping up into the Dan Gibson range. (Correct me please?) The bionic ear is a waste of money, little more than molded plasic and radio shack components. -Lazlo P.S. Augie: I will be attending COMDEX in Las Vegas in November, as are many of the list members, I'm sure. Ever consider killing two birds with one stone? ************************************************************************** 15)From: BADCOFFEE@aol.com Subject: I have a problem Ladies and gentleman....I have a problem. Immediate attention requested After having this computer for aproximately one year.....on this glorious day I noticed the following: Taskbar icon:----> OleRPC Hold the curser over it at it says: OleRPCNotifyFFF0581 A friend just advised me that this is a password stealer. I shut down immediately and it is no longer there. I did a complete file search for this item and nothing shows up. ANY information, including prooving that this was not what I was told it is, is apreciated. If this was anything harmfull: I would like to know everything about it, including capturing it (when it happens again) tracing it back to sender if possible. Again, a/s/a/p if possible. Augie P.S. Something I forgot to mention..... I had myself TWO windows explorers last night also. ************************************************************************** 16)From: "Sean Gala" Subject: Several questions for everyone 1) is there an inexpensive way to detect police telephone bugs on a home phone? If so, how? Any resources, books, people, anything would be of assistance. 2) Are there careers available in the computer security field? I don't mean a career like in "Sneakers" but are people hired to build/maintain firewalls and things of that sort? Are computer snoops in demand? Computer Surveillence? (government or private, doesn't matter) 3) If there are careers in computer security, what would be the best way for a college student such as myself to "mold" myself for one of these jobs, what kinds of classes, major, minor, experience should I persue to get myself into one of these kinds of jobs? Private responses welcome, this list has been QUITE educational for me, and i want to thank Spyking and the list members for many hours of enlightening reading! Thank you- ISL ************************************************************************** 17)From: L J Strand Subject: Re: Good radio/comm shopping in HongKong? > Has anyone good & priceworthy adresses for radio/comm-equipment > shopping in HongKong? Especially looking for Optoelektronics & > AOR-Stuff, but also some wireless video. Check the following address for low priced video cams, wireless mic's and other surveillance stuff: http://www.webring.org/cgi-bin/webring?ring=isaring&list Yours Sincerely; L J Strand INTERNATIONAL SECURITY AGENCY http://www.algonet.se/~ljsaisa ljsaisa@algonet.se Tel: Int+46 (0)8-645 22 82 (09.00am-05.00pm C.E.T.) Fax/Data: Int+46 (0)8-645 22 82 (24h) PoBox 167, S-162 12 Stockholm, Sweden ************************************************************************** 18)From: Martin Pask <100142.3101@compuserve.com> Subject: Re: GPS TRACKING! Shadow chaser I have had a look on the web for the company you mentioned but unable to locate anything of the nature of your post. Regards M.P.I. By the way I have now ordered one of the GPS trackers we discussed and hope to receive it in around 14 days, after which I will keep everyone informed of our trials. ************************************************************************** Who are you? What's your specialty and/or interest? Let us know about your company... What would you like to see on the list? Post it. Let us know... Do you have something to contribute? We'd like to hear it... We want to know EVERYTHING and ANYTHING about eavesdropping, surveillance, countersurveillance & privacy related technology, etc... Remember: who, what, where, when, how & why... we want ALL the details... Do you have a question? Post it... A little free time? Help a member... With the INCREDIBLE brain power on this list, someone should have the answer ;-) P.S. Don't be a LURKER... Members take the time to post info for us all... give something back... Don't just take... Your input/knowledge is valued... ************************************************************************** Send Postings to: spyking@con2.com with "Post" in subject field with subject ************************************************************************** Subscribe to: spyking@con2.com In the subject field type: subscribe-surveillance list e-mail address ************************************************************************** Unsubscribe to: spyking@con2.com In the subject field type: unsubscribe-surveillance list e-mail address ************************************************************************** ...The Simple Rules of the Surveillance List... The Surveillance List Owners may Reject any posts that are/contain: 1) Info Unrelated to Eavesdropping, Surveillance or Privacy technology... 2) Flames or Negative posts... 3) E-Signatures that are considered excessive... 4) Advertisements not DIRECTLY related to the list topics... 5) Attached Files... 6) Oversized Posts... (May be edited to save room) **************************************************************************** This publication is copyrighted and is protected by U.S. and International copyright law. The information transmitted on this list may not be reproduced, reposted or forwarded to any non-list member without expressed written permission of the List Owner. Violation of U.S. copyright law is a criminal and civil offense... **************************************************************************** The Surveillance List is Moderated by SpyKing@thecodex.com The List Owner will make EVERY effort to protect subscribers from spam... Copyright 1996, 1997 Codex Publishing Inc., All Rights Reserved... **************************************************************************** ****************************************************************************** The Official Newsletter of W.A.S.P. The World Association of Surveillance Professionals http://www.thecodex.com/wasp.html ****************************************************************************** Vol.Two Issue #208 The Surveillance List Sept.30,1997 Over 3000+ Members Worldwide Representing 53 different countries List Chat at: http://www.thecodex.com/chat.html ****************************************************************************** While we STILL feel there is NO SUCH THING as a stupid question... We suggest the newer list members AND the technically challenged browse through the FAQ before posting a question... Surveillance List Pseudo FAQ at: http://www.thecodex.com/faq.html P.S. If you have something to add to the FAQ, let us know... ****************************************************************************** IN THIS ISSUE... ****************************************************************************** 01) FBI wants to ban the Bible and smiley faces! 02) Key Escrow Arguments 03) Re: Street lights 04) Street lites keep going off on me! 05) COMDEX? 06) Re: GPS TRACKING! 07) GPS PART 2 08) Camcorder Battery problems... 09) Re: Super Ear 10) Re: Poor Boy's Vehicle tracking Device 11) Case scenario 12) Re: Big Brother 13) Drive-by kidnappings 14) Re: Power inverters 15) Re: password stealer 16) Silicon Toad - where'd ya go? 17) DMV databases on cd-rom 18) Stereo jamming & HERF Guns for noise control 19) How does one become a PI? ****************************************************************************** DON'T BE A LURKER.... GET INVOLVED... YOU ARE A MEMBER... MAKE THE MOST OF IT ****************************************************************************** 1)From: rivest@THEORY.LCS.MIT.EDU (Ron Rivest) Subject: FBI wants to ban the Bible and smiley faces! Congress is apparently considering legislation that would make it illegal to post portions of the Bible on the Internet. FBI Director Louis Freeh wants to make it illegal to use secret codes on the Internet that the FBI can't break, and some members of Congress have been drafting legislation in support of Freeh's position. However, such a law might have startling consequences. A recent best-selling book, "The Bible Code," claims that the Bible is full of secret messages and codes. These messages are only partially decoded so far. If true, the proposed legislation would make it illegal to post the Bible on the Internet, unless someone provides the FBI with a way to decode all of these secret messages contained within the Bible. Another consequence would require you to register your "smiley faces" with the FBI. It is common to use smiley faces to convey meanings. For example, the face ;-) is usually interpreted as a "wink". (If you haven't seen such smiley faces before, just rotate them ninety degrees.) Such smiley faces are an example of a "substitution code", where one symbol (such as ;-) ) is substituted for another (such as "wink"). Substitution codes are a classic cryptographic technique. The proposed law would require you to register your list of smiley faces with the FBI. Otherwise, the FBI might have no way of figuring out what *you* think symbols such as 8-) or :-( might mean. ;-) Ron Rivest P.S., The proposed language would appear to ban the sale of all computers, since they are products "that can be used to encrypt communications or electronic information...". Ron +++Moderator's Note+++ The list is endless... and if taken literally could encompass MANY forms of communication... all the FBI would have to do is claim anything other than plain English is an "elaborate substitution code"... What about foreign languages? What about computer code? Anyone here write HTML or C++ ? Sometimes I can't make sense of some peoples E-signatures. I also can't make sense of some authors... Could they be using an "elaborate substitution code"? Could their writings be a nefarious method of transmitting data? How about Braille? Why should blind people have the right to read books in code if we can't... The computer generated graphics on MSNBC TV display a series of 1's and 0's whizzing by... Is Bill Gates trying to put one over on us? What about Pig Latin? "Eherway oday ouyay antway otay ogay odaytay"? There is a large billboard depicting a guy with a cigarette in his mouth in Times Square that puffs out smoke in dots and dashes... Could this be code? What about some of our list members (I won't mention names) who constantly misspell? Are they sending secret messages in code? Perhaps this is just a ruse to allow the FBI to receive free cable and satellite TV without encrytion or scrambling techniques employed... I guess it will become against the law to teach foreign languages or communicate with foreigners in their native tongue... This will run havoc with the tourist industry... If they speak other than English "lock them up". What about the millions of "non-English" speaking residents we have here in this country today?... I'll bet they learn English real fast... Will the information signs in the NYC subway all be changed backed to English? I will personally miss "No se fumo"... What about reruns of "I love Lucy"? Would it become illegal to broadcast Ricky Ricardo yelling at Lucy in his native tongue? What about mathematical or chemical formulas? A thing of the past? How about Morse code and other communication protocols? What about the "Ricky Ranger" Junior G-Man Spy Decoder rings children obtain from gumball machines? I have a friend from England who is a permanent resident in America. He has a "very thick" cockney accent... Sometimes when sipping beers at the local pub he starts speaking very quickly and becomes hard to understand... We tease him by saying "Slow down Chris, this is America, speak English" ;-) which drives him crazy... Does this mean that all Americans will have to learn English English or will the proposed law only cover American English? SpyKing P.S. You better try and win the Codex Secret Message contest at: http://www.thecodex.com/cypher.html before it becomes illegal ;-) ************************************************************************** 2)From: Monty Solomon Subject: Key Escrow Arguments [Published last year in the Federal Bar Journal.] THE LAW ENFORCEMENT ARGUMENT FOR MANDATORY KEY ESCROW ENCRYPTION: THE "DANK" CASE REVISITED by Andrew Grosso (This article is a revised version of a talk given by the author at the 1996 RSA Data Security Conference, held in San Francisco, California. Mr. Grosso is a former federal prosecutor who now has his own law practice in Washington, D.C. His e-mail address is agrosso@acm.org.) I would like to start by telling a war story. Some years ago, while I was an Assistant U.S. Attorney, I was asked to try a case which had been indicted by one of my colleagues. For reasons which will become clear, I refer to this case as "the Dank case." The defendant was charged with carrying a shotgun. This might not seem so serious, but the defendant had a prior record. In fact, he had six prior convictions, three of which were considered violent felonies. Because of that, this defendant was facing a mandatory fifteen years imprisonment, without parole. Clearly, he needed an explanation for why he was found in a park at night carrying a shotgun. He came up with one. The defendant claimed that another person, called "Dank," forced him to carry the gun. "Dank," it seems, came up to him in the park, put the shotgun in his hands, and then pulled out a handgun and put the handgun to the defendant's head. "Dank" then forced the defendant to walk from one end of the park to other, carrying this shotgun. When the police showed up, "Dank" ran away, leaving the defendant holding the bag, or, in this case, the shotgun. The jurors chose not to believe the defendant's story, although they spent more time considering it than I would like to admit. After the trial, the defendant's story became known in my office as "the Dank defense." As for myself, I referred to it as "the devil made me do it." I tell you this story because it reminds me of the federal government's efforts to justify domestic control of encryption. Instead, of "Dank," it has become, "drug dealers made me do it;" or "terrorists made me do it;" or "crypto anarchists made me do it." There is as much of a rationale basis behind these claims as there was behind my defendant's story of "Dank." Let us examine some of the arguments the government has advanced. It is said that wiretapping is indispensable to law enforcement. This is not the case. Many complex and difficult criminal investigations have been successfully concluded, and successfully argued to a jury, where no audio tapes existed of the defendants incriminating themselves. Of those significant cases, cited by the government, where audio tapes have proved invaluable, such as in the John Gotti trial, the tapes have been made through means of electronic surveillance other than wire tapping, for example, through the use of consensual monitoring or room bugs. The unfetted use of domestic encryption could have no effect on such surveillance. It is also said that wiretapping is necessary to prevent crimes. This, also, is not the case. In order to obtain a court order for a wire tap, the government must first possess probable cause that a crime is being planned or is in progress. If the government has such probable cause concerning a crime yet in the planning stages, and has sufficient detail about the plan to tap an individual's telephone, then the government almost always has enough probable cause to prevent the crime from being committed. The advantage which the government gains by use of a wiretap is the chance to obtain additional evidence which can later be used to convict the conspirators or perpetrators. Although such convictions are desirable, they must not be confused with the ability to prevent the crime. The value of mandating key escrow encryption is further eroded by the availability of super encryption, that is, using an additional encryption where the key is not available to the government. True, the government's mandate would make such additional encryption illegal; however the deterrence effect of such legislation is dubious at best. An individual planning a terrorist act, or engaging in significant drug importation, will be little deterred by prohibitions on the means for encoding his telephone conversations. The result is that significant crimes will not be affected or discouraged. In a similar vein, the most recent estimates of the national cost for implementing the Digital Telephony law, which requires that commercial telecommunications companies wiretap our nation's communications network for the government's benefit, is approximately three billion dollars. Three billion dollars will buy an enormous number of police man hours, officer training, and crime fighting equipment. It is difficult to see that this amount of money, by being spent on wire tapping the nation, is being spent most advantageously with regard to law enforcement's needs. Finally, the extent of the federal government's ability to legislate in this area is limited. Legislation for the domestic control of encryption must be based upon the commerce clause of the U.S. Constitution. That clause would not prohibit an individual in, say, the state of California from purchasing an encryption package manufactured in California, and using that package to encode data on the hard drive of his computer, also located in California. It is highly questionable whether the commerce clause would prohibit the in-state use of an encryption package which had been obtained from out of state, where all the encryption in done in-state and the encrypted data is maintained in- state. Such being the case, the value of domestic control of encryption to law enforcement is doubtful. Now let us turn to the disadvantages of domestic control of encryption. Intentionally or not, such control would shift the balance which exists between the individual and the state. The individual would no longer be free to conduct his personal life, or his business, free from the risk that the government may be watching every move. More to the point, the individual would be told that he would no longer be allowed to even try to conduct his life in such a manner. Under our constitution, it has never been the case that the state had the right to obtain evidence in a criminal investigation. Rather, under our constitution, the state was given the right to attempt to obtain such evidence. The distinction is crucial: it is the difference between the operation of a free society, and the operation of a totalitarian state. Our constitution is based upon the concept of ordered liberty. That is, there is a balance between law and order, on the one hand, and the liberty of the individual on the other. This is clearly seen in our country's bill of rights, and the constitutional protections afforded our accused: evidence improperly obtained is suppressed; there is a ban on the use of involuntary custodial interrogation, including torture, and any questioning of the accused without a lawyer; we require unanimous verdicts for convictions; and double jeopardy and bills of attainder are prohibited. In other words, our system of government expressly tolerates a certain level of crime and disorder in order to preserve liberty and individuality. It is difficult to conceive that the same constitution which is prepared to let a guilty man go free, rather than admit an illegally seized murder weapon into evidence at trial, can be interpreted to permit whole scale, nationwide, mandatory surveillance of our nation's telecommunications system for law enforcement purposes. It is impossible that the philosophy upon which our system of government was founded could ever be construed to accept such a regime. I began this talk with a war story, and I would like to end it with another war story. While a law student, I had the opportunity to study in London for a year. While there, I took one week, and spent it touring the old Soviet Union. The official Soviet tour guide I was assigned was an intelligent woman. As a former Olympic athlete, she had been permitted in the 1960's to travel to England to compete in international tennis matches. At one point in my tour, she asked me why I was studying in London. I told her that I wanted to learn what it was like to live outside of my own country, so I chose to study in a country where I would have little trouble with the language. I noticed a strange expression on her face as I said this. It was not until my tour was over and I looked back on that conversation that I realized why my answer had resulted in her having that strange look. What I had said to her was that I had chosen to go to overseas to study; further, I had said that I had chosen where to go. That I could make such decisions was a right which she and the fellow citizens did not have. Yes, she had visited England, but it was because her government chose her to go, and it was her government which decided where she should go. In her country, at that time, her people had order, but they had no liberty. In our country, the domestic control of encryption represents a shift in the balance of our liberties. It is a shift not envisioned by our constitution. If ever to be taken, it must be based upon a better defense than what "Dank," or law enforcement, can provide. ************************************************************************** 3)From: "Arny Buckman" Subject: Re: Street lights Most of the street lights on main arteries (and some smaller streets) are automatic. They have photoelectric sensors to determine when it is dark enough to turn on the lights. Some of these sensors are improperly shielded so that they are susceptible to automobile headlights. As you pass by, the sensor says that it's so light out that the street lights aren't needed any more and the lights turn off. When you get to the other side of the light, it will come back on. Even paranoid people have enemies but I don't think the street light problem is personal. Arny Buckman ************************************************************************** 4)From: Martin Pask <100142.3101@compuserve.com> Subject: Street lites keep going off on me! Turn the spot lamps off on your car are you may be confusing the photocell on the street lights. M.P.I. ************************************************************************** 5)From: BADCOFFEE@aol.com Subject: COMDEX? >>>TO: Rick Ashley >>>Augie: I will be attending COMDEX in Las Vegas in November, as are many >>>of the list members, I'm sure. Ever consider killing two birds with one >>>stone? Ummm Laz......something your not telling us about? :-) COMDEX an offspring of CODEX? I miss an issue? Can someone fill me in please. :-) Augie Comdex, Codex, Kotex..... as long as it's in Vegas, count me IN. (someone fill me in here) ************************************************************************** 6)From: Martin Pask <100142.3101@compuserve.com> Subject: Re: GPS TRACKING! I have also searched for the company to no avail. If anyone finds it let me know. M.P.I. ************************************************************************** 7)From: "Shadow Chasers" Subject: GPS PART 2 SL MEMBER WROTE: "I don't think that company has a websight on the net. I asked some of my European pals to check out the company for me but I am not sure if they'll be able to find it. Well, thanks for letting the SL people know and I'll let everybody know when I hear from my European pals." The company exist's in Europe. I watched CNN practically the whole weekend to see if a 're-run' would appear about the GSE/GSS company; but no luck. I then just sent email to CNN from their websight and ask for the transcripts of the story that aired on 20-21 September 97. Main topics used in the coverage of the story were focus on use of GSM equipped cell phones, emphasis was placed on the NOKIA brand, and the GSE/GSS company was targeting there services to companies that want to track the whereabouts of there salesman. That companies subscribe to there ISP and cost's about .40 USD cents a hit to locate an individual. The news story also mentioned that, GSE/GSS just landed a major contract with ROLEX for it's GPS tracking services. If 2800 + SL members all request from CNN for the article it will happen! I will keep SL posted, if I get the information first! ************************************************************************** 8)From: Martin Pask <100142.3101@compuserve.com> Subject: Camcorder Battery problems... In our Obs platform we run almost everything of a power inverter. The video , monitor, switching box. All you have to be carful of is overloading. You cant for instance have everything connected and the expect to connect the inverter to the 12v as it wont start up. So you have to start things up slowly. We run the system off 2 * 90 Amp hour batteries which gives us around two days operating time. The system gives us to capability to operate the video no stop from the time we get into location to the time we leave. That way we overcome the start up delay of most camcorders and as anyone out there who does surveillance will know a subject can do quite a lot in the 3 seconds or so it takes for your cam corder to start working!! Regards M.P.I. ************************************************************************** 9)From: "Lorenzo Castillo Sanchez" Subject: Re: Super Ear >12)From: CChrist373@aol.com >Also write a company called Walker Game Ear and check out their >goodies. In particular their nature ear and Tactical Ear Two. Hearing >aid sound amps. Think about it. A hearing amp that fits in your ear. >The possibilities are just fun to think about. Well, here's the website of Walker Game Ear, Inc. for those of you who are INTERESTED --> http://www.walkersgameear.com ************************************************************************** 10)From: Martin Pask <100142.3101@compuserve.com> Subject: Re: Poor Boy's Vehicle tracking Device On the same subject we use a similar aid when tailing cements trucks. We dont put tins of paint on them. However, a tip in following them when they are full, just out of the depot is on junctions where your vehicle goes unsighted, check the road as there is a good chance when the truck turns the junction it will lean over enough that water tips out hence giving you the direction at the junction. It is not so effective when its raining!! That was a few years ago, we now look at the map overlay on the lap top. Regards M.P.I. ************************************************************************** 11)From: "Ralph Bergin Jr." Subject: Case scenario On 8/14/97 at 4:30 a.m., truck travelling eastbound on I80 near Clarion, Pennsylvania dropped a steel block on the road and continued on, apparently unknowing. The block weighs about 2000 pounds and is 18"x12"x45" and has six 4" holes along one side. A metallurgist surmises that the block was made to hold a blade which planes steel. In fact, it looks like a large razor, without the blade. It has no serial numbers on it. The block appears to be used. However, it also appears to be in usuable shape and the metalurgist estimates that it may be worth approximately $8,000. We have posted photos of it on our website at: http://www.paragon-pi.com/case_scenario.html We are currently holding the block and I am trying to detemine ownership of it. Any help would be greatly appreciated, and a reward is being offered for information that leads to the positive identification of the owner. Please contact: Ralph Bergin Paragon Investigations, Inc. Phone: 800-767-1964 Email: pi@paragon-pi.com http://www.paragon-pi.com ************************************************************************** 12)From: William Xu Subject: Re: Big Brother I think Augi is right. Ultimatly, it is how we use the knowlege and the technologies that we have. Things should not be illegal just because they can be used for "evil" purposes. Look at the KKK they use the Bible, what about Christopher Columbus? He enslaved and raped indians and use the Bible for his justifications+moral support. Should we abolish the Bible because it can be used that way? OF course not. One modern example is Dr. Who's RadioPhone Homepage located at http://www.l0pht.com A few month ago it was taken down because a Law in Pennsilvania prohibits information on illegal use of cellular equipments i.e modyfying ESN/MIN Cellular Interception. This law _violates_the_first_admendment_here, so where the hell is ACLU? What is next? "The Communist Manifesto" or "The Wealth of Nations?" .-'~~~-. "To be shaken out of ruts of ordinary perception, to be .'o oOOOo`. shown for a few timless hours the outer and inner worlds, :~~~-.oOo o`. not as they appear to an animal obsessed with survival `. \ ~-. oOOo. or to a human being obsessed with words and notions, `.; / ~. OO: but as they are apprehended, directly and uncondition- .' ;-- `.o.' nally, by Mind at Large -- this is an experience of ,' ; ~~--'~ inestimable value to everyone and especially to the ; ; intellectual." _\\;_\\//_ -- Aldous Huxley, "The Doors of Perception" Email:william@freenet.tlh.fl.us HTTP://freenet.tlh.fl.us/~william ************************************************************************** 13)From: vegacon@correo.dnet.com.pe (Carlos Guillermo Vega Cumberland) Subject: Drive-by kidnappings I have reacently found out about Spyking´s web page. I am glad someone is doing something to help us out. Congratulations. My concern is regarding "Drive-by kidnappings". I live in South America and there has been an increase in kidnappings in which they will take you to your bank or ATM, make you withdraw your money, take you to your house and steal everything. All of this is done at gun point. I dont think these people have the technology to place bugs or any other devices of the trade, I could be wrong. I believe that their "M.O" is following the person for a few hours. My question is: Is there any device I could use in order to counteract or prevent such an event from happening to me? I realize that the purpose of Spyking is to inform people on new technology on spying, but what happens when you are on the other side of the coin? I would very much appreciate any advice or sugestions regarding this matter. Specially dealing with how to protect myself from being tailed. Thanks. ************************************************************************** 14)From: "M. J. Van Ham" Subject: Re: Power inverters badcoffe wrote: > Power inverters facinate me. Can you sucessfully hook up VCR's, TV's..ect > without real complications if the rating is correct? You sure can. A friend of mine has an old GMC van that he has converted to be a travel home (kinda like a motor home only smaller.. ). Anyways, he has run T.V. and VCR of an inverter. The only thing you have to watch for is that you don't kill your battery. Having a T.V. and VCR on will eat juice a lot faster than normal vehicle use. This friend actually installed a second battery solely for this purpose.. that way he never kills the important battery.. > If there is some type of a "skip" in power....would this shut the VCR down? Depends on the quality of the VCR. I just bought a new VCR last christmas, and it seems to handle power flickers okay (you know, when the lights just turn on and off real quick), but if the power dies for more than a second or two the VCR will probably die too. I wonder if they having "recovering" VCRs? I doubt home-use VCRs have such a feature, but VCRs used for recording from surveillance cameras probably come back after an outage (but of course, they cost more). ************************************************************************** 15)From: "M. J. Van Ham" Subject: Re: password stealer Augie wrote: > Taskbar icon:----> OleRPC > Hold the curser over it at it says: OleRPCNotifyFFF0581 > A friend just advised me that this is a password stealer. First of all, to alleviate your fears, I can say with about 90% certainty this is not any sort of password stealer (this isn't a guarantee, but I'm pretty damn sure it's not). I'm fairly familiar with various password leachers, key loggers, etc. and have yet to see one that allows itself to be seen on the taskbar. Now that we now what it isn't, let's see if we can figure out what it *is* (as I'm sure you'd like to know). Firstly, OLE is an acronym for "Object Linking and Embedding". This is a nifty thing from Microsoft that allows you to place "objects" inside of other applications. i.e. you can put an excel spreadsheet inside of a word document. (check out: http://www.cnet.com/Resources/Info/Glossary/Terms/ole.html for more info on this). I don't know what the RPC part of it is. Probably some sort of protocol. The "Notify" part leads me to believe it's some sort of monitoring program (again, not a password leacher, but a low level system thing) And the last part - "FFF0581" is in hexadecimal.. probably a memory address or some damn thing. To sum it all up, it's probably some low level system monitoring program. Likely a .DLL or part of another program that was never supposed to be on the taskbar. Without seeing it or having more information, it's hard to say more than that (as I've never see this particular item before). Some questions I'd like to ask you: - What *exactly* were you doing when you first noticed the item on the taskbar? - Had a program recently crashed or locked up? - Have you recently installed any new programs/updates? ************************************************************************** 16)From: "M. J. Van Ham" Subject: Silicon Toad - where'd ya go? This goes out to ST (or anyone who knows). What happened to your page? I haven't been able to access it in awhile. DNS can't resolve the address (www.silitoad.org). Is it just me, or did your site go down? ************************************************************************** 17)From: "mike beketic" Subject: DMV databases on cd-rom I publish DMV databases on cd-rom for Oregon,Texas and Florida. Oregons contain License plate/vehicle registration info and Drivers license/State ID card info. These are databases for the whole state as of 9-12-97. Price $500 for all! Texas contains Vehicle Registration/license plate info or drivers lic. info that is 2 yrs old for $500 each. Florida contains Vehicle Registration/License plate info that is also 2 yrs old. $500 These databases cover the whole state. Texas costs about $15,000 if you buy it from the state. Florida costs $140,000 if bought from the state. I am always looking to buy-sell or trade databases for cash or ???? Discretion assured! Bootleg Software 392 Alameda Ave. Astoria,OR 97103 503-325-0861 bootleg@pacifier.com ************************************************************************** 18)From: "Lorenzo Castillo Sanchez" Subject: Stereo jamming & HERF Guns for noise control A few days ago, I had to tolerate the sound of this super-loud stereo for a few hours. Nobody ever bothered to file a complaint to the police so I did it myself. Those pricks weren't even the guys in the neighborhood. I live quite close to a small public park but I often have to endure the occasional sound of loud stereos and some teenage bikers with LOUD engines. I remember reading a few posts about frying up stereo circuits and shutting down a vehicle with EMP/HERF guns. I tried the FM-radio jammer from InfoUnlimited but it works only in close range. I can't get close since those pricks are drunk and my neighbor was harassed when he got close. I was wondering if those electro-magnetic devices from InfoUnlimited can be modified or be used without any modification, to fulfill my needs. I might need to shut down a few engines, too. If anyone has good info and resources about EMP/HERF, please post it up on the List. ************************************************************************** 19)From: obiwan-kenobi@juno.com (brian j austin) Subject: How does one become a PI? Hey out there in spy land. I'm tired of lurking, so I'll ask this one question. How does one become a PI. I'm a college freshman and want to "mix" law enforcement w/photography (which I am GOOD at) and yes surveillence. Was going to try for an internship at the CIA for "Imagery Specialist" or whatnot but I'm not in a 4 year school.... So that's a no go. Do I need a license? If so where can I find the requriements for NY and FL? Any help is greatly apperciated. The Spy Who Came In From The Cold For A Cup Of Hot Chocolate, Obiwan Kenobi Obi-wanKenobi@juno.com ************************************************************************** Who are you? What's your specialty and/or interest? Let us know about your company... What would you like to see on the list? Post it. Let us know... Do you have something to contribute? We'd like to hear it... We want to know EVERYTHING and ANYTHING about eavesdropping, surveillance, countersurveillance & privacy related technology, etc... Remember: who, what, where, when, how & why... we want ALL the details... Do you have a question? Post it... A little free time? Help a member... With the INCREDIBLE brain power on this list, someone should have the answer ;-) P.S. Don't be a LURKER... Members take the time to post info for us all... give something back... Don't just take... Your input/knowledge is valued... ************************************************************************** Send Postings to: spyking@con2.com with "Post" in subject field with subject ************************************************************************** Subscribe to: spyking@con2.com In the subject field type: subscribe-surveillance list e-mail address ************************************************************************** Unsubscribe to: spyking@con2.com In the subject field type: unsubscribe-surveillance list e-mail address ************************************************************************** ...The Simple Rules of the Surveillance List... The Surveillance List Owners may Reject any posts that are/contain: 1) Info Unrelated to Eavesdropping, Surveillance or Privacy technology... 2) Flames or Negative posts... 3) E-Signatures that are considered excessive... 4) Advertisements not DIRECTLY related to the list topics... 5) Attached Files... 6) Oversized Posts... (May be edited to save room) **************************************************************************** This publication is copyrighted and is protected by U.S. and International copyright law. The information transmitted on this list may not be reproduced, reposted or forwarded to any non-list member without expressed written permission of the List Owner. Violation of U.S. copyright law is a criminal and civil offense... **************************************************************************** The Surveillance List is Moderated by SpyKing@thecodex.com The List Owner will make EVERY effort to protect subscribers from spam... Copyright 1996, 1997 Codex Publishing Inc., All Rights Reserved... ****************************************************************************