News of the World faces rush of phone hack claims

From: Edward J. Michaels <edmic..._at_comcast.net>
Date: Sun, 10 Apr 2011 06:11:38 +0000

>From - Sat Mar 02 00:57:17 2024
Received: by 10.220.44.202 with SMTP id b10mr771742vcf.29.1247279822748;
        Fri, 10 Jul 2009 19:37:02 -0700 (PDT)
Return-Path: <Socal..._at_aol.com>
Received: from imr-d04.mx.aol.com (imr-d04.mx.aol.com [205.188.157.42])
        by gmr-mx.google.com with ESMTP id 20si132358vwj.15.2009.07.10.19.37.02;
        Fri, 10 Jul 2009 19:37:02 -0700 (PDT)
Received-SPF: pass (google.com: domain of Socal..._at_aol.com designates 205.188.157.42 as permitted sender) client-ip=205.188.157.42;
Authentication-Results: gmr-mx.google.com; spf=pass (google.com: domain of Socal..._at_aol.com designates 205.188.157.42 as permitted sender) smtp.mail=Socal..._at_aol.com
Received: from imo-da02.mx.aol.com (imo-da02.mx.aol.com [205.188.169.200]) by imr-d04.mx.aol.com (v107.10) with ESMTP id RELAYIN2-34a57fac73bf; Fri, 10 Jul 2009 22:36:55 -0400
Received: from Socal..._at_aol.com
        by imo-da02.mx.aol.com (mail_out_v40_r1.5.) id r.d67.4845e95b (29290)
         for <TSCM-..._at_googlegroups.com>; Fri, 10 Jul 2009 22:36:53 -0400 (EDT)
Received: from [192.168.0.5] (ip70-187-179-83.oc.oc.cox.net [70.187.179.83]) by ciabeta-ma02.mx.aol.com (v124.15) with ESMTP id MAILCIABETAMA024-726a4a57fac316d; Fri, 10 Jul 2009 22:36:52 -0400
Date: Fri, 10 Jul 2009 19:36:52 -0700
Subject: Re: [TSCM-L] {3879} Wiretap foes turn Obama's words against feds
Message-ID: <A6B73006.2D5E.4FA7.B93C.58F3080DDE4E_at_aol.com>
MIME-Version: 1.0 (Generated by Pantomime 1.2.0)
From: socalsweeps <socal..._at_aol.com>
To: TSCM-L2006_at_googlegroups.com
In-Reply-To: <7.0.1.0.2.20090709220438.27b2b8f8_at_tscm.com>
X-Mailer: Pantomime (ADM 351)
Content-Type: multipart/alternative;
        boundary="=_0FD8AB48.FEAA.424A.BF01.7BC01114C109_at_aol.com"
X-AOL-IP: 205.188.169.200
X-Spam-Flag:NO

--=_0FD8AB48.FEAA.424A.BF01.7BC01114C109_at_aol.com
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain; charset="windows-1250"

Very interesting commentary. =A0I'm glad I took the time to open and read t=
he email. =A0
Some excellent Jim Gems.=A0

--
Michael Tomamichel
Security Specialist
FHG Properties - Socal Sweeps




On Jul 9, 2009, at 8:38:17 PM, "James M. Atkinson" <jm..._at_tscm.com> wrote:
All attorneys need to have their offices and homes checked for bugging devi=
ces monthly, but not by the same company each time.=A0
=A0
Instead, put together a list of TSCM people within 200-250 miles of their l=
ocation... NOT *** PI's *** who also "do sweeps" (with two suitcases), but =
actual, experienced electronics folks who spend most of their time performi=
ng sweeps. The use of a PI is fine for general investigative work, overall =
security work, and EP type of work, but not for bug sweeps. In fact, a real=
ly smart attorney will have a number of PI's who all work as outside contra=
ctors, as well as a large number of subject matter experts they can call on=
 for services, advice, or opinions (including sweepers).=A0
=A0
The attorney should contract directly to the TSCM company for service, and =
avoid involving anybody outside of an extremely close circle of people who =
can be depended on to maintain absolute silence about the upcoming inspecti=
on. It is often wise to engage the PI firm that provides general investigat=
ive or security services during the sweep, but who does not provide the act=
ual sweep itself.
=A0
PI's should make note here, that you can do your customers a lot better ser=
vice if you provide security only for the sweep, and let an outside firm co=
me it with all the technical gizmo, gadgets, ladders, lights, test equipmen=
t, and appropriate vehicles, and experience. You will also do your customer=
 a better deal if you let them pay the sweep company separate from your bil=
lings for time (in this case the law firm pays you for your security and co=
ordination services).
=A0
The PI who does this will also end up making way more money in the long run=
 as they are not laying out money (most PI's will not lay down more then a =
few grand) for gear that they only use a few days a month (if they are luck=
y), and then are lucky to make only a few hundred bucks a day.
=A0
For attorneys the way that you handle this is to call upon the security com=
pany or PI firm that you use on a regular basis, and with whom you have an =
ongoing relationship for a wide variety of services. Then you engage a swee=
p firm to come in to check a small area, and once the engagement is schedul=
ed you call your local PI or security company up and have them come stand w=
atch over the area to be inspected until the sweep person can get their a f=
ew days later. Of course if you are going to have multiple offices checked =
you are going to of course need multiple security people or PI=92s (one per=
 room), and if you have a really large series of offices you may need to ev=
en station security people at the doors of all phone rooms and wiring close=
ts.=A0
=A0
If you are a PI or a security person you can see where I am going with this=
=85 Take a law firm that would like to have 3 attorneys offices checked for=
 bugs. This project is estimated to take at least 5-6 days once the sweep f=
olks get into the 3 rooms, but they will also need access to the phone room=
 as well, in addition to two wiring closets. This means that at any given t=
ime you will need at least 6 people (one to cover each room, plus one relie=
f person), plus someone to provide coverage outside the building, or in the=
 hallways. This adds of to time=85 a lot of time in fact. Given that there =
are only a few dozen sweep people in the entire country (yeah, yeah, I know=
 every PI thinks they can do sweeps), this means that it is going to take a=
 few days to line up a sweep unless it is done well in advance, on a quasi-=
random basis, and even then you still coverage by security people before an=
y sweep to lock down the place against any live devices being removed.
=A0
Even if the attorney (CEO, etc) doesn=92t actually have a bug sweep perform=
ed, this sporadic flurry of security lockdown will freak out any eavesdropp=
er. Hence, if the PI understands the logistics of a sweep, and understands =
how to freak out an eavesdropper they can run through this drill, and only =
occasionally bring in an actual TSCM person.
=A0
The eavesdropper will even become complacent because they will see these vi=
sible security flurries, but no sweep equipment as seen and will assume tha=
t it was just a ruse. The eavesdropper may at some time discover that the l=
ockdown was in fact a ruse in and of itself, and that the TSCM folks were a=
ctually performing a sweep in between these lock-down flurries. In some cas=
es there may even be a high profile lockdown, or an invisible lockdown. The=
 sweep may be done in a way that is visible, or invisible. The staff of the=
 law firm may know that a sweep is going to be performed the upcoming weeke=
nd, or the sweep may happen right under the noses of the employees and they=
 have no clue what is really going down.
=A0
Better to let a real sweep company come in for a couple of days to do a pro=
per job (with hundreds, if not thousands of pounds of equipment) and slowly=
 clear each room, each phone, and each wire one at a time.
=A0
The goal is to totally confound the spy, to trick them, and to draw them ou=
t, to cause them confusion, and to exploit this confusion to flush both the=
m and their bugs out.
=A0
I would note that just because a federal, state, or local agency does somet=
hing under presumed authority, or just because a executive order was writte=
n, or some political order was handed down does not mean that an eavesdropp=
ing project was legal and within the limits of the law.=A0
=A0
The law is the law, is the law... it does not bend... either somebody is ai=
ding by the law or they are breaking it. Government employees for centuries=
 have justified breaking the law at the behest of their lords and masters, =
and often they feel that their illegal conduct is justified by the illusion=
 of the greater good, or for some political traction or power maneuver.
=A0
The FBI, DEA, USSS, USPS, etc has historically flaunted the eavesdropping l=
aws, and each has a long history of using illegal bugs, break-in, burglarie=
s, and wiretaps for political advantage, and in cases where their was absol=
utely no criminal case to be made, but only political agendas to be pursued=
. COINTELPRO is one of the classic examples (major humiliation when hundred=
s of FBI and other folks lost their jobs when this program got exposed), bu=
t there have been many other similar programs over the years.
=A0
Bottom line is all attorneys need to have their offices, their computers, t=
heir phones, their wires, their ceilings, basements, walls, furniture, thei=
r homes, and anything and everything that even remotely involves client con=
tact, records, or other data checked out on a regular basis. Just because i=
nformation can not be used against your target directly, does not mean that=
 it, you, they, or it will not be targeted.
=A0
Eavesdroppers need to realize that someone is hunting them, and that the pe=
rson who is hunting them may be better at catching spies, than the eavesdro=
pper is at doing the spying. Of course if the bugging is legally on the up =
and up, and the eavesdropper knows their business then they will have zero =
problem convincing a judge to issue a protective order, and the TSCM firm w=
ill have zero problem giving the customer back all of their money.
=A0
[Hint: If a TSCM firm gives you back your money, declines to give you a rep=
ort, and for some reason the project suddenly takes way less time then orig=
inally estimated then you can safely assume that you are screwed, or are ab=
out to be screwed. Generally, a legitimate TSCM practitioner will not accep=
t money for a sweep that they have a sitting judge to wave them off of (law=
 enforcement officers can not legally wave a TSCM=92er off, only a sitting =
judge can do that). If a legitimate wave-off does in fact happen the TSCM s=
pecialist will find some reason to wrap the project up early (oops, equipme=
nt broke), will evade providing a report either verbally or in writing (oop=
s, computer crashed), and will not request any further funds (nah, don=92t =
worry about the rest of the bill), and will most likely return any funds th=
ey have already been given (maybe now, maybe later). Also, some TSCM folks =
carry a special insurance policy that covers them in advance for any situat=
ion where a legal court ordered wave-off happens so that the insurance comp=
any pay them so long as they did not accept any further monies from the cli=
ent once they were put under a protective order (in writing), AND all monie=
s paid were refunded to the client in a timely manner, AND no report of any=
 kind was made to the client in regards to bugs being present, or not being=
 present.
=A0
Once a lawyer or law firm has an established relationship with a TSCM firm =
it is wise to have another attorney retain the TSCM specialists services on=
 a project-by-project basis, and then for the second attorney to act as cou=
nsel to the first attorney. This second attorney actually engages the outsi=
de TSCM firm (and security and/or PI firm), and the sweep is performed for =
the first attorney at the direction of the second attorney. Then once first=
 attorney=92s office is confirmed to be free of bugs the roles get reversed=
 (after the books are totally closed on the first assignment), the TSCM pra=
ctitioner gets engaged by the first attorneys who is acting on behalf of th=
e second attorney and the second attorneys office then gets checked for bug=
s, and so on. When a law firm has a sweep performed it may be wise to have =
an odd-man-out who represents the other lawyer(s) in the firm. There are so=
me law firms who actually handle their sweeps via an outside associate so t=
hat nobody in the main office has even the slightest idea that sweeps are b=
eing performed.
=A0
I know this all sounds terribly confusing, but imagine the poor eavesdroppe=
r who is half blind and sitting out in some un-air-conditioned listening po=
st in boxers and a t-shirt, trying to figure out if the cleaning crew reall=
y is a cleaning crew, if that low slung soccer mom van is really for people=
 or sweep gear, and if the latest security lockdown is for a real sweep, of=
 merely a ruse for a sweep that has already taken place.
=A0
Eavesdroppers are terrified of not knowing, and illegal eavesdroppers are m=
ore terrified still=85 so keep the eavesdroppers off balance, keep them gue=
ssing, and do sweeps that are virtually invisible to the eavesdroppers.
=A0
=85and PI=92s, please, please, please partner up with or work with several =
TSCM firms or TSCM practitioners and let them teach you how to choreograph =
sweeps. I promise you that you will make way more money then trying to do s=
weeps yourself, and your clients will be much happier with the end results=
=85 especially if your clients are attorneys.
=A0
-jma





--=_0FD8AB48.FEAA.424A.BF01.7BC01114C109_at_aol.com
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html; charset="windows-1250"

<html><head></head><body name=3D"Mail Message Editor"><div><font class=3D"A=
pple-style-span" size=3D"5"><span class=3D"Apple-style-span" style=3D"backg=
round-color: transparent; font-size: 18px;">Very interesting commentary. &n=
bsp;I'm glad I took the time to open and read the email. &nbsp;</span></fon=
t></div><div><font class=3D"Apple-style-span" size=3D"5"><span class=3D"App=
le-style-span" style=3D"background-color: transparent; font-size: 18px;">So=
me excellent Jim Gems.&nbsp;</span></font></div><div><font class=3D"Apple-s=
tyle-span" size=3D"5"><span class=3D"Apple-style-span" style=3D"background-=
color: transparent; font-size: 18px;"><br></span></font></div><div><div id=
=3D"sig_start"><font class=3D"Apple-style-span" size=3D"5"><span class=3D"A=
pple-style-span" style=3D"background-color: transparent; font-size: 18px;">=
--<br></span></font></div><div><font class=3D"Apple-style-span" face=3D"Ari=
al" size=3D"4"><span class=3D"Apple-style-span" style=3D"font-size: 14px; "=
><font class=3D"Apple-style-span" face=3D"Helvetica"><span class=3D"Apple-s=
tyle-span" style=3D"font-size: medium; "><span class=3D"Apple-style-span" s=
tyle=3D"font-family: Arial; font-size: 14px; "><font class=3D"Apple-style-s=
pan" size=3D"5"><span class=3D"Apple-style-span" style=3D"background-color:=
 transparent; font-size: 18px;">Michael Tomamichel<br>Security Specialist<b=
r>FHG Properties - Socal Sweeps</span></font><br><br></span></span></font><=
/span></font></div><div><font class=3D"Apple-style-span" face=3D"Arial" siz=
e=3D"4"><span class=3D"Apple-style-span" style=3D"font-size: 14px;"><br></s=
pan></font></div><div><font class=3D"Apple-style-span" face=3D"Arial" size=
=3D"4"><span class=3D"Apple-style-span" style=3D"font-size: 14px;"><br></sp=
an></font></div></div><br>On Jul 9, 2009, at 8:38:17 PM, "James M. Atkinson=
" &lt;j..._at_tscm.com&gt; wrote:<br><blockquote style=3D"padding-left: 5px; m=
argin-left: 5px; border-left-width: 2px; border-left-style: solid; border-l=
eft-color: blue; color: blue; "><span class=3D"Apple-style-span" style=3D"b=
order-collapse: separate; color: rgb(0, 0, 0); font-family: Helvetica; font=
-size: medium; font-style: normal; font-variant: normal; font-weight: norma=
l; letter-spacing: normal; line-height: normal; orphans: 2; text-align: aut=
o; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; =
word-spacing: 0px; -webkit-border-horizontal-spacing: 0px; -webkit-border-v=
ertical-spacing: 0px; -webkit-text-decorations-in-effect: none; -webkit-tex=
t-size-adjust: auto; -webkit-text-stroke-width: 0px; "><div style=3D"width:=
 749px; "><div id=3D"felix-mail-header-block" style=3D"color: black; backgr=
ound-color: white; border-bottom-width: 1px; border-bottom-style: solid; bo=
rder-bottom-color: silver; padding-bottom: 1em; margin-bottom: 1em; width: =
749px; "></div><div id=3D"felix-mail-content-block" style=3D"color: black; =
background-color: white; width: 749px; "><div>All attorneys need to have th=
eir offices and homes checked for bugging devices monthly, but not by the s=
ame company each time.<span class=3D"Apple-converted-space">&nbsp;</span><b=
r>&nbsp;<br>Instead, put together a list of TSCM people within 200-250 mile=
s of their location... NOT *** PI's *** who also "do sweeps" (with two suit=
cases), but actual, experienced electronics folks who spend most of their t=
ime performing sweeps. The use of a PI is fine for general investigative wo=
rk, overall security work, and EP type of work, but not for bug sweeps. In =
fact, a really smart attorney will have a number of PI's who all work as ou=
tside contractors, as well as a large number of subject matter experts they=
 can call on for services, advice, or opinions (including sweepers).<span c=
lass=3D"Apple-converted-space">&nbsp;</span><br>&nbsp;<br>The attorney shou=
ld contract directly to the TSCM company for service, and avoid involving a=
nybody outside of an extremely close circle of people who can be depended o=
n to maintain absolute silence about the upcoming inspection. It is often w=
ise to engage the PI firm that provides general investigative or security s=
ervices during the sweep, but who does not provide the actual sweep itself.=
<br>&nbsp;<br>PI's should make note here, that you can do your customers a =
lot better service if you provide security only for the sweep, and let an o=
utside firm come it with all the technical gizmo, gadgets, ladders, lights,=
 test equipment, and appropriate vehicles, and experience. You will also do=
 your customer a better deal if you let them pay the sweep company separate=
 from your billings for time (in this case the law firm pays you for your s=
ecurity and coordination services).<br>&nbsp;<br>The PI who does this will =
also end up making way more money in the long run as they are not laying ou=
t money (most PI's will not lay down more then a few grand) for gear that t=
hey only use a few days a month (if they are lucky), and then are lucky to =
make only a few hundred bucks a day.<br>&nbsp;<br>For attorneys the way tha=
t you handle this is to call upon the security company or PI firm that you =
use on a regular basis, and with whom you have an ongoing relationship for =
a wide variety of services. Then you engage a sweep firm to come in to chec=
k a small area, and once the engagement is scheduled you call your local PI=
 or security company up and have them come stand watch over the area to be =
inspected until the sweep person can get their a few days later. Of course =
if you are going to have multiple offices checked you are going to of cours=
e need multiple security people or PI=92s (one per room), and if you have a=
 really large series of offices you may need to even station security peopl=
e at the doors of all phone rooms and wiring closets.<span class=3D"Apple-c=
onverted-space">&nbsp;</span><br>&nbsp;<br>If you are a PI or a security pe=
rson you can see where I am going with this=85 Take a law firm that would l=
ike to have 3 attorneys offices checked for bugs. This project is estimated=
 to take at least 5-6 days once the sweep folks get into the 3 rooms, but t=
hey will also need access to the phone room as well, in addition to two wir=
ing closets. This means that at any given time you will need at least 6 peo=
ple (one to cover each room, plus one relief person), plus someone to provi=
de coverage outside the building, or in the hallways. This adds of to time=
=85 a lot of time in fact. Given that there are only a few dozen sweep peop=
le in the entire country (yeah, yeah, I know every PI thinks they can do sw=
eeps), this means that it is going to take a few days to line up a sweep un=
less it is done well in advance, on a quasi-random basis, and even then you=
 still coverage by security people before any sweep to lock down the place =
against any live devices being removed.<br>&nbsp;<br>Even if the attorney (=
CEO, etc) doesn=92t actually have a bug sweep performed, this sporadic flur=
ry of security lockdown will freak out any eavesdropper. Hence, if the PI u=
nderstands the logistics of a sweep, and understands how to freak out an ea=
vesdropper they can run through this drill, and only occasionally bring in =
an actual TSCM person.<br>&nbsp;<br>The eavesdropper will even become compl=
acent because they will see these visible security flurries, but no sweep e=
quipment as seen and will assume that it was just a ruse. The eavesdropper =
may at some time discover that the lockdown was in fact a ruse in and of it=
self, and that the TSCM folks were actually performing a sweep in between t=
hese lock-down flurries. In some cases there may even be a high profile loc=
kdown, or an invisible lockdown. The sweep may be done in a way that is vis=
ible, or invisible. The staff of the law firm may know that a sweep is goin=
g to be performed the upcoming weekend, or the sweep may happen right under=
 the noses of the employees and they have no clue what is really going down=
.<br>&nbsp;<br>Better to let a real sweep company come in for a couple of d=
ays to do a proper job (with hundreds, if not thousands of pounds of equipm=
ent) and slowly clear each room, each phone, and each wire one at a time.<b=
r>&nbsp;<br>The goal is to totally confound the spy, to trick them, and to =
draw them out, to cause them confusion, and to exploit this confusion to fl=
ush both them and their bugs out.<br>&nbsp;<br>I would note that just becau=
se a federal, state, or local agency does something under presumed authorit=
y, or just because a executive order was written, or some political order w=
as handed down does not mean that an eavesdropping project was legal and wi=
thin the limits of the law.<span class=3D"Apple-converted-space">&nbsp;</sp=
an><br>&nbsp;<br>The law is the law, is the law... it does not bend... eith=
er somebody is aiding by the law or they are breaking it. Government employ=
ees for centuries have justified breaking the law at the behest of their lo=
rds and masters, and often they feel that their illegal conduct is justifie=
d by the illusion of the greater good, or for some political traction or po=
wer maneuver.<br>&nbsp;<br>The FBI, DEA, USSS, USPS, etc has historically f=
launted the eavesdropping laws, and each has a long history of using illega=
l bugs, break-in, burglaries, and wiretaps for political advantage, and in =
cases where their was absolutely no criminal case to be made, but only poli=
tical agendas to be pursued. COINTELPRO is one of the classic examples (maj=
or humiliation when hundreds of FBI and other folks lost their jobs when th=
is program got exposed), but there have been many other similar programs ov=
er the years.<br>&nbsp;<br>Bottom line is all attorneys need to have their =
offices, their computers, their phones, their wires, their ceilings, baseme=
nts, walls, furniture, their homes, and anything and everything that even r=
emotely involves client contact, records, or other data checked out on a re=
gular basis. Just because information can not be used against your target d=
irectly, does not mean that it, you, they, or it will not be targeted.<br>&=
nbsp;<br>Eavesdroppers need to realize that someone is hunting them, and th=
at the person who is hunting them may be better at catching spies, than the=
 eavesdropper is at doing the spying. Of course if the bugging is legally o=
n the up and up, and the eavesdropper knows their business then they will h=
ave zero problem convincing a judge to issue a protective order, and the TS=
CM firm will have zero problem giving the customer back all of their money.=
<br>&nbsp;<br>[Hint: If a TSCM firm gives you back your money, declines to =
give you a report, and for some reason the project suddenly takes way less =
time then originally estimated then you can safely assume that you are scre=
wed, or are about to be screwed. Generally, a legitimate TSCM practitioner =
will not accept money for a sweep that they have a sitting judge to wave th=
em off of (law enforcement officers can not legally wave a TSCM=92er off, o=
nly a sitting judge can do that). If a legitimate wave-off does in fact hap=
pen the TSCM specialist will find some reason to wrap the project up early =
(oops, equipment broke), will evade providing a report either verbally or i=
n writing (oops, computer crashed), and will not request any further funds =
(nah, don=92t worry about the rest of the bill), and will most likely retur=
n any funds they have already been given (maybe now, maybe later). Also, so=
me TSCM folks carry a special insurance policy that covers them in advance =
for any situation where a legal court ordered wave-off happens so that the =
insurance company pay them so long as they did not accept any further monie=
s from the client once they were put under a protective order (in writing),=
 AND all monies paid were refunded to the client in a timely manner, AND no=
 report of any kind was made to the client in regards to bugs being present=
, or not being present.<br>&nbsp;<br>Once a lawyer or law firm has an estab=
lished relationship with a TSCM firm it is wise to have another attorney re=
tain the TSCM specialists services on a project-by-project basis, and then =
for the second attorney to act as counsel to the first attorney. This secon=
d attorney actually engages the outside TSCM firm (and security and/or PI f=
irm), and the sweep is performed for the first attorney at the direction of=
 the second attorney. Then once first attorney=92s office is confirmed to b=
e free of bugs the roles get reversed (after the books are totally closed o=
n the first assignment), the TSCM practitioner gets engaged by the first at=
torneys who is acting on behalf of the second attorney and the second attor=
neys office then gets checked for bugs, and so on. When a law firm has a sw=
eep performed it may be wise to have an odd-man-out who represents the othe=
r lawyer(s) in the firm. There are some law firms who actually handle their=
 sweeps via an outside associate so that nobody in the main office has even=
 the slightest idea that sweeps are being performed.<br>&nbsp;<br>I know th=
is all sounds terribly confusing, but imagine the poor eavesdropper who is =
half blind and sitting out in some un-air-conditioned listening post in box=
ers and a t-shirt, trying to figure out if the cleaning crew really is a cl=
eaning crew, if that low slung soccer mom van is really for people or sweep=
 gear, and if the latest security lockdown is for a real sweep, of merely a=
 ruse for a sweep that has already taken place.<br>&nbsp;<br>Eavesdroppers =
are terrified of not knowing, and illegal eavesdroppers are more terrified =
still=85 so keep the eavesdroppers off balance, keep them guessing, and do =
sweeps that are virtually invisible to the eavesdroppers.<br>&nbsp;<br>=85a=
nd PI=92s, please, please, please partner up with or work with several TSCM=
 firms or TSCM practitioners and let them teach you how to choreograph swee=
ps. I promise you that you will make way more money then trying to do sweep=
s yourself, and your clients will be much happier with the end results=85 e=
specially if your clients are attorneys.<br>&nbsp;<br>-jma<br><br></div></d=
iv></div></span></blockquote><br><div><br></div><div id=3D"signature_C51535=
50-C9A0-45E1-BACC-CBD2317C4341" style=3D"word-wrap: break-word; -webkit-nbs=
p-mode: space; -webkit-line-break: after-white-space; "><div id=3D"sig_star=
t"><br></div><div><font class=3D"Apple-style-span" face=3D"Arial" size=3D"4=
"><span class=3D"Apple-style-span" style=3D"font-size: 14px;"><br></span></=
font></div><div><div id=3D"signature_BBAF7E77-8189-454F-AFC5-68BFAC725105" =
style=3D"word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-line-brea=
k: after-white-space; "><span class=3D"Apple-style-span" style=3D"font-fami=
ly: Geneva; font-size: 13px; "></span></div></div><div id=3D"sig_end"></div=
></div><div class=3D"aol_ad_footer" id=3D"uA6B730062D5E4FA7B93C58F3080DDE4E=
"></div></body></html>

--=_0FD8AB48.FEAA.424A.BF01.7BC01114C109_at_aol.com--
Received on Sat Mar 02 2024 - 00:57:17 CST

This archive was generated by hypermail 2.3.0 : Sat Mar 02 2024 - 01:11:44 CST