You need to know how to protect yourself, since your safety department or
any advisor may not be truly aware of these threats and therefore not
dependable. Since September 11th, a number of businesses entered the safety field with slight to no knowledge of the trade itself; only of its behalf potential. Even outfits that have been around for some time and well-established have not been able to stay current with the most recent innovations.
Realistically, viewing your threat level has to be thought about since everybody
should expect some sort of impending privacy issue no matter how small. Thanks
largely to the Internet you can arm yourself with much of the knowledge and
equipment that the so-called experts use. If a respected agent of computer crimes
for the Secret Service in Nyc had his T-Mobile Sidekick hacked, who knows what else
happens out there to others in any business.
We'll start acoustic ducting estimation is the inspection of air ducts, baseboard
heaters, coffee rooms, lounges, bathrooms or any way the architecture of a building
can change sound. A easy example is to put your ear to a wall and listen.
Basically anyone that requires the use of the naked ear is called an acoustic
bug. Softer surfaces can help muffle sounds but there are more productive means out
there. So be aware that the way an office site is designed can act as a conduit for
conversations. Also, be aware of any changes can have adverse affects. Simply
playing music can do wonders for masking conversations.
Inspection of telephone tool and wiring is called line analysis. This is
trickier than it seems since sometimes a possible infirmity has an actual purpose to
the telecommunication system. Especially if it requires constant maintenance and
software upgrades.
All instruments should be opened and inspected. Ideally they should be
compared with a known safe phone or device. If you're not sure, just take off that
piece of loose components and wiring and see if the phone still works. The wiring
can be modified in a switch within the handset that essentially turns it into a
microphone. If you bypass this hook switch, you can listen in from in any place on the
landline. Technical
equipment won't be able to detect this. Time Domain Reflectometry is the sending
of a pulse down a telephone line. If there is some sort of disruption; a wall outlet or
wiretap; a portion of the pulse will be
sent back to the expedient called a Time Domain Reflectometer (Tdr). Then the time
difference between the reflection and the continuous run is measured. This helps in
determining the distance to the anomaly.
These devices can achieve all sorts of diagnostics together with mapping a wire
network. That can be beneficial in locating a underground phone. underground phones have any
obvious uses such as production long distance phone calls to being placed in an office
across the road to receive betting requests by bookies; a institution called back
strapping. If you open up the modular jacks where you join together your phone, you'll
usually see four wires. In most cases only two wires are connected; generally
known as ring and tip. If you see all four connected, be aware that is not normally
consistent for most wiring situations, especially in homes. The other two wires
could be used for a bugging device.
For instance, the microphone you use in a voice recorder can be cut in half.
Connect the mike head to one set of unused wires in any place on the phone wire.
Then, so long as there are no breaks in the wire, join together the other end to the jack
that connects to your recorder. Now place your recorder to be Vox (voice) activated
and now you have an very dependable bug. By the way, this should be manually
inspected for since using a specialized bug detector may see nothing wrong or
inconsistent. A bug such as this that connects to a wire is called a direct tap.
The other general type is called an inductive tap. This is when an instrument is
outside a wire but can still distinguish what's transacting over a wire. They are
harder to detect since they don't draw power from the line such a acceptable
telephone would. These are referred to as snuffle bugs. A easy probe used in
hunting wire signals has a speaker, which can display sounds. By
accident one day I was working on an apartment intercom system while using a
probe. I could hear conversations throughout the building quite clearly just
through the intercom boxes mounted on walls from the master unit in the
basement.
If you're using wireless headsets or cordless phones, the radio signals can be
intercepted. A cordless phone acts like a radio, but depending on the frequency and
a few other factors, can make interception very difficult. With some
manufacturers, you can buy the same model as your neighbors or the office and
have it join their phone system. Double check Caller Id boxes to see if they also
record numbers dialed also obviously those being received. If you're using Voip
(Voice Over Ip), remember that calls can be recorded in a fashion selfsame to
intercepting data between two computers.
These packets of data can reassemble an audio file. Obviously electronic
devices possess semiconductor components such as diodes, resistors and such. The
method to hunt for these components is called Non-Linear Junction Detection
(Nljd). The Nljd unit emits a radio signal while listening for the return signal from
an electronic device. This becomes very beneficial when a bug is embedded in a photo
frame or wall. The eavesdropping expedient doesn't have to be active for it to be
discovered. If a expedient is active and transmitting wirelessly (or even on a wire), you
can detect it with a Radio Frequency Spectrum Analyzer. Depending on the detection
device used, you can determine either voice, data or video is being sent, and
possibly listen to the data. Try to use dissimilar size antennas or buy one that
collapses. dissimilar frequencies can be detected more efficiently by using various
sizes. The use of filters with antennas can also help pinpoint devices on definite
frequencies.
Electronics such as computers, Fax machines and especially Crt monitors can
radiate electromagnetic signals or pulses that can be received by other equipment.
This is known Tempest. One way to complicate the surveillance of this is to use
certain fonts and line walls or tool with dissimilar gauges of copper mesh wire.
You can further enhance this posture by using special paints, which block radio
transmissions.
Radio waves will look for a leak or break, so be true of defensive
applications. One-way window tints can help in blocking signals. Since an
electronic expedient could generate some heat they can be detected in an additional one way.
The use of a thermal imagery expedient can detect and easily see slight amounts of
heat radiated for your viewing. You can hide the heat signatures by using creams or
neoprene. Technology exists to acquire data from blinking Leds of modems,
routers, print servers and similar devices. You can only see some general blinking
but with the use of properly tuned optics, filters, oscilloscopes and good timing you
can discern much more. One of the Leds on your keyboard can be altered to blink
while you are typing in a fashion similar to Morse Code. You can also use a tap in
the keyboard that sends out radio waves again similar to Morse Code and no anti-
virus software will ever be able to find it. Even when a Crt computer monitor is
facing a wall the light can be in a sense read by its flickering emanations from some
distance. A good defensive portion is to buy new Lcd flat panel types.
Another advent to attacking Fax machines is to Simply report the noises it
makes and play it back to an additional one machine. I used to do this for a client so they
could keep a report of all the faxes they made and received. There are creative and
potentially illegal defenses against wiretappers and Peeping Toms. One is to
transmit an very high pitch down the wire, thereby rupturing the listener's
eardrums. I knew someone who once sent a remarkable electrical spike down his
phone wire thereby destroying his divorced wife's recorder.
By the way, this leads to an additional one topic-expect the expedient to be discovered
someday. Don't leave your fingerprints on it. He found it and had it dusted, thereby
producing some prints. My friend used this as leverage against the underground
Investigator that planted it. Advice to underground Investigators, a word to the wise: if you
do this part-time, hire someone who does this full-time. This P.I. Lost his license
and practically went to jail. The lawyer who recommended him got into a lot of trouble
as well. He received some unwanted attentiveness from the Feds because of his
telephone dealings went over state lines and also happened to involve the Post
Office.
There is an additional one budding field connected to this topic called Protective
Intelligence. Currently there are only a few experts who do this kind of work.
A laser or an infrared beam can be used at a principal distance from a
target building. Conversational sounds can vibrate unto solid objects such as
windows. The beam's reflection varies in relation to the movement to the window,
which is received and converted back into something audible. To mask the sounds,
you could attach a vibrating expedient (basically an altered electric razor) to the
window.
Of course if the window is open, then a laser can target an additional one object instead
of the window. A beam of light or laser can be directed to go through a window
onto a solid object thereby nullifying such defensive measures again. generally you
really can't detect such attacks unless the laser, infrared or light beam is being used
that moment. clear materials can be used to detect Ir emissions, as well as the
use of passive night foresight gear. clear fabrics or even a curtain may easily show
the spot where a beam of light or laser is being focused. Unless the room is dusty or
you have an synthetic can smoke, you can corollary the beam up to a point and
guesstimate it's location. One type of optical bug is an infrared transmitter. When
placed in the area of interest for transmission of the conversation to an infrared
receiver which will then translate the conversation into an audible format.
Many of these same procedures used can be applied to locating underground
cameras. A relatively new expedient uses a series of lasers to seek out optics. This was
originally intended to uncover snipers by bodyguards.
I have listed the techniques, counter-measures and then the counter to the
counter-measures to preclude any false sense of security. normally constant vigilance
is your best weapon also knowing what to look for. Even if you find a "bug
sweeper" with good credentials, certifications and experience, ask them detailed
questions. Not just to test them but also for your own peace-of-mind. This makes
our job easier and we appreciate greatly when dealing with knowledgeable
customers.
Eavesdropping and Counter-Measures: Technology and Techniques
Arsenal Clips Blog