|  | 
 Eavesdropping and Counter-Measures: Technology and Techniques
 You need to know how to protect yourself, since your security department or 
any consultant may not be truly aware of these threats and therefore not 
dependable. Since September 11th, a number of businesses entered the security field with little to no knowledge of the trade itself; only of its profit potential. Even outfits that have been around for some time and well-established have not been able to stay current with the latest innovations.
 Realistically, viewing your threat level has to be considered since everyone 
should expect some sort of impending privacy issue no matter how small. Thanks 
largely to the Internet you can arm yourself with much of the knowledge and 
equipment that the so-called experts use. If a respected agent of computer crimes 
for the Secret Service in NYC had his T-Mobile Sidekick hacked, who knows what else 
happens out there to others in any business.
 
 Realistically, viewing your threat level has to be considered since everyone 
should expect some sort of impending privacy issue no matter how small. Thanks 
largely to the Internet you can arm yourself with much of the knowledge and 
equipment that the so-called experts use. If a respected agent of computer crimes 
for the Secret Service in NYC had his T-Mobile Sidekick hacked, who knows what 
else happens out there to others in any business.
 
 We'll start acoustic ducting evaluation is the inspection of air ducts, baseboard 
heaters, coffee rooms, lounges, bathrooms or any way the architecture of a building 
can transfer sound. A simple example is to put your ear to a wall and listen.
 
 Basically anything that requires the use of the naked ear is called an acoustic 
bug.  Softer surfaces can help muffle sounds but there are more efficient means out 
there. So be aware that the way an office site is designed can act as a conduit for 
conversations. Also, be aware of any changes can have adverse affects. Simply 
playing music can do wonders for masking conversations.
 
 Inspection of telephone equipment and wiring is called line analysis. This is 
trickier than it seems since sometimes a possible weakness has an actual purpose to 
the telecommunication system. Especially if it requires constant maintenance and 
software upgrades.
 
 All instruments should be opened and inspected. Ideally they should be 
compared with a known safe phone or device. If you're not sure, just remove that 
piece of loose components and wiring and see if the phone still works. The wiring 
can be modified in a switch within the handset that essentially turns it into a 
microphone. If you bypass this hook switch, you can listen in from anywhere on the 
landline. Technical
equipment won't be able to detect this. Time Domain Reflectometry is the sending 
of a pulse down a telephone line. If there is some sort of disruption; a wall outlet or 
wiretap; a portion of the pulse will be
sent back to the device called a Time Domain Reflectometer (TDR). Then the time 
difference between the reflection and the continuous run is measured.  This helps in 
determining the distance to the anomaly.
 
 These devices can perform all sorts of diagnostics including mapping a wire 
network. That can be useful in locating a hidden phone. Hidden phones have several 
obvious uses such as making long distance phone calls to being placed in an office 
across the street to receive betting requests by bookies; a practice called back 
strapping. If you open up the modular jacks where you connect your phone, you'll 
usually see four wires. In most cases only two wires are connected; commonly 
known as ring and tip. If you see all four connected, be aware that is not usually 
consistent for most wiring situations, especially in homes. The other two wires 
could be used for a bugging device.
 
 For instance, the microphone you use in a voice recorder can be cut in half. 
Connect the mike head to one set of unused wires anywhere on the phone wire. 
Then, so long as there are no breaks in the wire, connect the other end to the jack 
that connects to your recorder. Now place your recorder to be VOX (voice) activated 
and now you have an extremely reliable bug. By the way, this should be manually 
inspected for since using a specialized bug detector may see nothing wrong or 
inconsistent. A bug such as this that connects to a wire is called a direct tap.
 
 The other general type is called an inductive tap. This is when an instrument is 
outside a wire but can still distinguish what's transacting over a wire. They are 
harder to detect since they don't draw power from the line such a standard 
telephone would. These are referred to as snuffle bugs. A simple probe used in 
hunting wire signals has a speaker, which can display sounds. By
accident one day I was working on an apartment intercom system while using a 
probe. I could hear conversations throughout the building quite clearly just 
through the intercom boxes mounted on walls from the master unit in the 
basement.
 
 If you're using wireless headsets or cordless phones, the radio signals can be 
intercepted. A cordless phone acts like a radio, but depending on the frequency and 
a few other factors, can make interception extremely difficult. With some 
manufacturers, you can buy the same model as your neighbors or the office and 
have it join their phone system. Double check Caller ID boxes to see if they also 
record numbers dialed besides obviously those being received. If you're using VOIP 
(Voice Over IP), remember that calls can be recorded in a fashion identical to 
intercepting data between two computers.
 
 These packets of data can reassemble an audio file. Obviously electronic 
devices possess semiconductor components such as diodes, resistors and such. The 
method to hunt for these components is called Non-Linear Junction Detection 
(NLJD).  The NLJD unit emits a radio signal while listening for the return signal from 
an electronic device. This becomes very useful when a bug is embedded in a picture 
frame or wall.  The eavesdropping device doesn't have to be active for it to be 
discovered. If a device is active and transmitting wirelessly (or even on a wire), you 
can detect it with a Radio Frequency Spectrum Analyzer. Depending on the detection 
device used, you can determine whether voice, data or video is being sent, and 
possibly listen to the data. Try to use different size antennas or buy one that 
collapses. Different frequencies can be detected more efficiently by using various 
sizes. The use of filters with antennas can also help pinpoint devices on specific 
frequencies.
 
 Electronics such as computers, FAX machines and especially CRT monitors can 
radiate electromagnetic signals or pulses that can be received by other equipment. 
This is known TEMPEST.  One way to complicate the surveillance of this is to use 
certain fonts and line walls or equipment with different gauges of copper mesh wire. 
You can further enhance this posture by using special paints, which block radio 
transmissions.
 
 Radio waves will look for a leak or break, so be careful of defensive 
applications.  One-way window tints can help in blocking signals. Since an 
electronic device could generate some heat they can be detected in another way. 
The use of a thermal imagery device can detect and actually see minute amounts of 
heat radiated for your viewing. You can hide the heat signatures by using creams or 
neoprene. Technology exists   to collect information from blinking LEDs of modems, 
routers, print servers and similar devices. You can only see some general blinking 
but with the use of properly tuned optics, filters, oscilloscopes and good timing you 
can discern much more. One of the LEDs on your keyboard can be altered to blink  
while you are typing in a fashion similar to Morse Code. You can also use a tap in 
the keyboard that sends out radio waves again similar to Morse Code and no anti-
virus software will ever be able to find it. Even when a CRT computer monitor is 
facing a wall the light can be in a sense read by its flickering emanations from some 
distance.  A good defensive measure is to buy new LCD flat panel types.
 
 Another approach to attacking FAX machines is to simply record the noises it 
makes and play it back to another machine. I used to do this for a client so they 
could keep a record of all the faxes they made and received. There are creative and 
potentially illegal defenses against wiretappers and Peeping Toms. One is to 
transmit an extremely high pitch down the wire, thereby rupturing the listener's 
eardrums. I knew someone who once sent a powerful electrical spike down his 
phone wire thereby destroying his divorced wife's recorder.
 
 By the way, this leads to another topic-expect the device to be discovered 
someday. Don't leave your fingerprints on it. He found it and had it dusted, thereby 
producing some prints. My friend used this as leverage against the Private 
Investigator that planted it. Advice to Private Investigators, a word to the wise: if you 
do this part-time, hire someone who does this full-time. This P.I. lost his license 
and almost went to jail. The lawyer who recommended him got into a lot of trouble 
as well. He received some unwanted attention from the Feds because of his 
telephone dealings went across state lines and also happened to involve the Post 
Office.
 
 There is another budding field related to this topic called Protective 
Intelligence. Currently there are only a few experts who do this kind of work.
 
 A laser or an infrared beam can be used at a considerable distance from a 
target building. Conversational sounds can vibrate unto solid objects such as 
windows. The beam's reflection varies in relation to the movement to the window, 
which is received and converted back into something audible. To mask the sounds, 
you could attach a vibrating device (basically an altered electric razor) to the 
window.
 
 Of course if the window is open, then a laser can target another object instead 
of the window.  A beam of light or laser can be directed to go through a window 
onto a solid object thereby nullifying such defensive measures again. Generally you 
really can't detect such attacks unless the laser, infrared or light beam is being used 
that moment. Certain materials can be used to detect IR emissions, as well as the 
use of passive night vision gear. Certain fabrics or even a curtain may actually show 
the spot where a beam of light or laser is being focused. Unless the room is dusty or 
you have an artificial can smoke, you can follow the beam up to a point and 
guesstimate it's location. One type of optical bug is an infrared transmitter. When 
placed in the area of interest for transmission of the conversation to an infrared 
receiver which will then translate the conversation into an audible format.
 
 Many of these same procedures used can be applied to locating hidden 
cameras. A relatively new device uses a series of lasers to seek out optics. This was
originally intended to locate snipers by bodyguards.
 
 I have listed the techniques, counter-measures and then the counter to the 
counter-measures to prevent any false sense of security. Usually constant vigilance 
is your best weapon besides knowing what to look for. Even if you find a "bug 
sweeper" with good credentials, certifications and experience, ask them detailed 
questions. Not just to test them but also for your own peace-of-mind.  This makes 
our job easier and we appreciate greatly when dealing with knowledgeable 
customers.
 
 |  |  |  | RELATED ARTICLES Estate and Mega-Yacht Security Systems and Safe Rooms
 Why do I need a "safe room? I really don't need one; I'm not that high profile". This is typical V.I.P. client frame of reference or attitude concerning security systems and safe rooms.
 The Case for Personal, Estate, Corporate and Child Abduction Security in today?s World
 When one considers the historical nature of security applications and programs of any type, i.e., CCTV, intrusion detection and alarm systems, corporate policies and programs and countermeasures of any type, the phenomenon of the Denial Syndrome, Complacency and Failure to properly allocate a Security Budget can not be over emphasized. If we, as individuals, as a country and as a government, have not learned anything from the lessons of 911, it is the benefit of being pro-active and utilizing the concept of foreseeability.
 Six Common Criminal Types And How To Avoid Them
 "An ounce of prevention is worth a pound of cure" that saying is as true for crime, as it is for health.  After taking literally thousands of reports over the years I spent as a police officer; I found that a lot of crimes that had happened could have been prevented.  The easiest and most effective way of dealing with crime is not be a victim of it in the first place.  This is easier said then done, and no matter how cautious you are you can still be a victim.  Nothing will give you a 100% guarantee; however, there are things you can do to at least limit your odds of being a victim.  But first; you have to know what you are preventing yourself from, in order to know how to prevent against it. This article will in general show you some of the common criminal types, and give some suggestions on how to avoid them.  I have made up my own classifications for these people based upon my experience as a police officer.
 Is Big Brother Watching You? Or Are You Watching Big Brother?
 Isn't technology a wonderful thing? I thought this as I received the text to my mobile phone telling me that my home security camera had detected movement. Someone or something was where they shouldn't be at the rear of my house and I was 2000 miles away on vacation ? yet I still knew they were there. Fortunately the text wasn't followed up by another from one of the sensors on my windows telling me that someone was breaking in and it was urgent I did something about it.
 How To Turn Thirty Dollar Web Camera Into Home Surveillance System
 Web cameras are really inexpensive these days. With no technical knowledge, you can hook up one or several camerass to your PC and create own surveillance system, much like CCTV (closed curcuit television). But you'll need the right tools first.
 How to Keep Your Postal Mail Private and Secure
 Surreptious opening of most envelopes sent through the mail takes
little effort and only minimal skill. Instructions are readily available on the Internet and in books suc as "CIA Flaps and Seals Manual"
(Paladin Press).
 Security Cameras For Your Peace of Mind
 The reasons for installing cctv cameras are the same whether you own a home or business. Protecting your property, family and employees is probably at the top of your list of priorities. You're not the only one that feels that way. Sales of home and business security systems have exploded in recent years. Even before 9/11, security system sales were on the rise. After the terrorist attacks, sales of home and business security cameras rose by as much as 20% over the course of three months.
 Home Security After An Earthquake
 After an Earthquake you need to do an immediate damage assessment. First go turn off the gas if you smell anything, a leaky gas line could explode and take out your entire home and your cats nine lives. Look for cracks in the slab or any areas where the house carpet is lifted up. Then walk around the exterior of the house, what do you see? Do you see downed fences, retaining walls, support structures holding up the garage at weird angles or any areas where your house was knocked off its foundation?  Look also for water pipes which have been broken, if so shut off the main water line coming into the house.  If there is extensive damage then that means the other neighbors have also and the entire area.
 Surveillance Camera Positioning
 It is a known fact that advertising is made to attract our eyes. Marketers work very hard to plant visual memories in your mind. They use anomaly phrases, rhetorical questions, sexy images and ironic text. There are many reasons why this is done but the biggest reason is that it works. Our eyes are often caught and our brains captured for a moment while we digest the advertisement. Since the advertising world has done such a good job in making us look and think there is a slight hesitation in our gaze and direction of sight. This of course is the world's best time to snap a shot or grab an image of a human on a surveillance camera.
 Is America Safe?
 As the devastation and death toll from deadly Hurricane Katrina becomes more apparent, it is a grim reminder that we live in dangerous times.
 Organizing an Arson Watch Program
 A wide variety of participants are needed to launch a successful Neighborhood Arson Mobile Watch program.  In this section, necessary participants are listed, along with a description of the kind of support needed from each.  As many of you know, implementing a community-based project requires the interest, cooperation, and support from many people.  But it all is definitely worthwhile!
 Fire Safety Tips
 Did you know that fire is the third leading cause of accidental deaths in the United States, yet most people ignore it. More than 150 workplace fires occur every day. So many of theses untimely deaths could have been prevented if they only had a plan.
 Where Does Safety & Security Begin?  Security Expert Explains
 Personal safety begins with you. It is widely accepted that a wide-ranging personal safety strategy must incorporate prevention, deterrence and defiance.
 Alarm System: Wireless Remotes
 WIRELESS ALARM SYSTEM REMOTES
 Handling Weather Emergencies: Part 2; Home Security, Evacuation, and Emergency Kits
 Introduction
 Someone Spying?
 Someone Spying? So are the Teddy Bear and the Potted Plant
 Emergency Disaster Planning: Building a Bug-Out Kit
 Report after report comes in about how many people couldn't or didn't escape the wrath of Hurricane Katrina. More reports come in about the disorganized relief effort, the communications problems they're having and the difficulty in getting survivors to safety even when they are reachable by rescue personnel.
 Hurricane Preparedness
 If you are about to get hit by a Hurricane are you prepared? Do you have enough plywood to board up your windows? Often the local lumber companies will be sold out. In fact if you wait till the last minute Home Depot will be out too. Do you own a portable generator? No? Get one. Do you have enough fuel to keep it powered up? Most generators can use up to 1.5 gallons per hour and thus you need spare fuel tanks as well? If you wait too long the gas stations will be closed and after the Hurricane the power may not be turned back on for up to two-weeks depending on the damage. If you are talking about a direct hit Category III or IV it is entirely possible that it will be at least that long.
 Emergency - Gas Fire!
 Woooooooo??Woooo???The siren sounded. All of us looked at each 
other with excitement. The time has come for us to go into action.
 Emergency Telephone Numbers
 Emergency is a situation that poses an instant threat to human life or possessions though this description may be different in some areas. Deliberate bogus reports of an emergency are usually prosecuted as an offense. One should call for help any time there is a danger for life or public order. The emergency telephone number is a special case in the country's telephone number sketch.
 
 
   |