home *** CD-ROM | disk | FTP | other *** search
Text File | 1994-06-10 | 92.2 KB | 2,181 lines |
- ComSec Letter
-
- Editor: James A. Ross
-
- YOGO 4
-
- 1988
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- COMSEC LETTER
-
-
- The ComSec Letter was started in 1984, The Year Of George
- Orwell, by Jim Ross. Initially it was mailed at no charge to
- everyone on his mailing list, and it was later offered by
- subscription. After the founding of the Communication Security
- Association, the letter became its official organ. In 1989 the
- association decided to create a new organ, Comsec Journal; and,
- in order to minimize confusion, the name of this letter was
- changed to Surveillance.
-
- What follows is an edited version of the contents of one
- year of the letter. (The letter has been edited to remove
- topical, superfluous, and outdated items.)
-
-
-
-
- Ross Engineering, Inc.
- 7906 Hope Valley Court
- Adamstown, MD 21710
- Tel: 301-831-8400; Fax: 301-874-5100January, 1988
-
- TAP DETECTORS, AGAIN
-
- Recently we received a catalog from Sharper Image which
- offered a telephone tap detector. The blurb said that 98% of
- "phone snooping" is done with low or medium impedance taps, and
- that this device has a green light which means your line is
- secure. We responded with the following letter to Richard
- Thalheimer.
-
- Dear Richard,
-
- Just a short note with some information that might
- save you from an expensive lawsuit some day.
-
- In describing a "phone that knows how to keep a
- secret" on page 14 of your current catalog, you say
- that 98% of phone snooping is by low or medium
- impedance taps.
-
- First, in my experience most "phone snooping" is not
- via taps; it is accomplished by phone modifications
- known as phone bugging. Second, whoever told you that
- taps are 98% low or medium impedance doesn't know what
- he's talking about. In fact, he probably doesn't even
- know what the word "impedance" means! Even a simple
- tap, made from a few dollars worth of common electronic
- components, presents a very high impedance to the
- tapped line.
-
- "Green light means your line is secure." Wow!
- That's a powerful claim. Don't you wonder why Bell
- Labs, with the best brains in the field, could never
- make that claim?
-
- I'm confident that the phone that you're touting can
- be easily tapped, and it will not detect the tap. If
- you'd like a live demonstration, I'm sure it can be
- arranged.
-
- I hope you'll check into this, and respond to this
- letter. I'd like to pass your response on to our
- members via the ComSec Letter (sample enclosed).
-
- The initial response to this letter was a phone call from a
- buyer at Sharper Image. He left a message that he had not yet
- heard back from their vendor, but the device was not selling well
- so they might drop it anyway.
-
-
- OBSCENE CALLS COUNTERMEASURES
-
- This subject continues to come up, so let's pass along our
- ideas and ask for yours.
-
- First, the new telco service which will allow you to
- identify the calling number is in very limited operation at only
- a few locations around the country. If you want to find out if
- you can subscribe to it, we suggest that you call your telephone
- company business office and ask when you'll be getting the
- capability.
-
- Now, not having that service, what can you do? Well, I know
- one man who solved the problem by recording some of the calls,
- and then advising the caller that the tape goes to the police if
- the calls don't stop. That worked for him, but the last person
- who inquired of me was a state trooper, so his caller certainly
- would not be intimidated by a threat to go to the police.
-
- My advice to the state trooper was to get an automatic
- dialer, and to activate it during an obscene call. If the caller
- is not too bright, he may think that the rapid, machine-made
- signals are automatic trace signals especially if you say some
- words to imply such.
-
- Anybody got any good ideas? I don't think a loud noise will
- help because I don't think it will pass through the telco
- equipment end-to-end at its original ear-splitting level.
-
-
- SPOUSAL EAVESDROPPING
-
- Boy, talk about response! No sooner had the last ComSec
- Letter hit the mail, than we had a call from member Nick
- Beltrante informing us that he had mailed a copy of the decision
- on the spousal eavesdropping case. Our thanks to Nick, and
- here's the story.
-
- It seems that the husband suspected his wife of extramarital
- affairs, so he installed a system to automatically record all
- calls. He got the proof, and confronted her. He caught her
- (electronically) a second time. He divorced her, and she sued
- him citing the federal eavesdropping law.
-
- The judge in this case found conflicting precedents. He
- chose the precedent in which husband and wife were living
- together in the same household and no third party was involved in
- the taping of the calls -- as was the situation in the case
- before him. In the earlier case the ruling was that marital
- cases traditionally are not tried in federal courts. Further,
- exhaustive search of the legislative history could find no
- indication that the drafters of the federal law meant for it to
- be used in domestic conflicts.
-
- Again, our thanks to member Beltrante for sending along the
- information. The newspaper story that we had quoted was correct.
- A federal judge did rule that federal eavesdropping laws do not
- relate to domestic cases in certain circumstances.
-
-
- CORRECTION
-
- Just last month we passed along the new address for the Bell
- Labs RECORD, but now we find that it is no longer published. The
- new publication is AT&T Technology, and four issues cost $40.00
-
- Sorry for any confusion we created.
-
-
- HOW MUCH DECEPTION IS ENOUGH?
-
- We just received a promotional piece from Dictaphone. It
- looks very much like a Federal Express overnight letter. It's
- smaller, but laid out the same way with the delivery instructions
- typed on a form that looks like the Fedex form, and contained in
- a transparent pocket on the carrier just like Fedex. One side of
- the carrier says, "Jet Express" "URGENT LETTER ENCLOSED".
- Overall, it is a strong effort to make the recipient think he is
- receiving something that was important enough to warrant spending
- about fifteen dollars for overnight delivery.
-
- Unfortunately however, the information on the delivery form
- gives the hoax away; it says, "Bulk Rate US Postage Paid,
- Richmond, VA, Permit #936". He didn't spend fifteen dollars to
- get it to me overnight; he spent twelve and a half cents or less
- to get it to me within a few weeks or months!.
-
- Now, we know that people who mail to rented lists want to
- encourage you to open and read their offers, but this seller is
- contradicting himself when he labels his piece "Urgent Letter"
- and sends it bulk rate.
-
- My personal reaction to this is that I don't trust Gordon F.
- Moore who sent it to me. He tried to fool me once; and I think,
- if I start talking to him about buying his product, he'll try to
- fool me again. Therefore, he has no chance of ever selling me
- anything.
-
- Your comment?
-
-
- CELLULAR PHONES, AGAIN
-
- Well, the California Public Utilities Commission is on the
- ball. They've asked the phone companies to notify customers that
- cellular calls may not be private. Great!
- Unfortunately, there is a superfluous word in at least one
- of the announcements. It says, "Cellular telephones send calls
- over public radio frequencies." The superfluous word, of course,
- is "public". Its use implies that there are some frequencies
- which are not public, and that is just not so. Everything
- transmitted by radio can be heard by anyone who has the right
- equipment and technique.
-
- What's needed is education. Let's spread the word. Phone
- conversations are not private. They can be overheard very
- easily.
-
-
- DRUG DEALERS AND CMTs
-
- Newsweek wrote about it, and ComSec Letter has written about
- it. Drug dealers use cellular phones to do their business. DEA
- complains about it. DEA should do something about it. If I can
- monitor drug deals in progress, why can't the DEA? If I can
- monitor a collector on Long Island going about his rounds, why
- can't the FBI?
-
- You know, the irony of the whole thing is that those people
- don't pay for their phone calls. They use stratagems that defeat
- the phone companies' billing systems, so all of us who pay our
- phone bills are subsidizing the drug dealers.
-
- Let's move into the twentieth century, and use modern
- communications and computational capabilities to put a stop to
- this stuff.
-
-
-
- LETTER
-
- F. Douglas Porter of Tucson, Arizona wrote to ask some very
- good questions. First, he wants to know when we are going to
- sponsor meetings relating to computer communications and computer
- security. Although the association is still in its infancy, we
- are planning a big meeting for the east coast which will include
- just what you want. At this time we can't be specific on place
- and date, but we're working on it. You will be advised.
-
- Also, he asks how he can access our BBS. Well Doug, the
- volunteer who set up the ComSec BBS changed it into a personal
- project, and then abandoned it altogether. There will be a board
- some day, I'm sure; but there is none right now.
-
- The last question is the tough one. He wants to know when
- we'll be conducting some activities in the West, and that takes a
- little background to answer. The people who organized this
- association are all in the East and they remain the volunteer
- work force. Our main effort at the moment is to get our next
- expo under way, and we're working hard at it. However, we're
- also putting together written procedures for establishing local
- chapters, and we'll be sending information in this letter. Why
- not start a chapter and begin to sponsor some local events, even
- before the rules are in place? Let me hear from you.
-
-
- February, 1988
-
- EXCELLENT SUGGESTION
-
- Bill Ranson of Richmond, Virginia called to suggest that we
- summarize the eavesdropping laws in the ComSec Letter, and we
- think that that is an excellent suggestion. Bill, you're on.
- We'll start on that project right away, and you'll see something
- in this letter in the near future.
-
- Along that line, there are some excellent publications
- available relating to communications, security, and privacy.
- We're including an extra page with this letter which lists some
- information sources that we recommend without reservation. (The
- April issue of Computer Security Digest has some especially
- chilling information from people in the computer trenches.)
-
- If you contact any of them, please mention ComSec Letter.
-
-
- OPPORTUNITIES
-
- This association has openings for people ready to work. No
- pay, just a lot of time-consuming work.
-
- What's your reward? Maybe nothing. Maybe something.
-
- The only thing that you'll get for sure is some publicity.
- You'll get your name and company affiliation on our letterhead.
- You'll sit at head tables from time to time; you might even get
- to give a speech, if that's your desire.
-
- All of these things may turn out to be of no value to you
- other than some items you can add to your scrapbook to look at
- when you're old and gray. On the other hand, if you are
- ambitious, getting involved in an international organization's
- activities might just bring you to the attention of the person
- who can provide the big break you are looking for. Who knows?
-
- There are committees and projects in need of leaders with
- initiative. All involve paperwork, phone calls, and planning; but
- no manual labor. Keep in mind that it is logical and normal that
- members will select known workers for the next national board of
- directors. If you can help in any way, contact the editor -- NOW.
-
-
- IN THE MAIL & OUR THANKS
-
- Thanks to Dave Mann who has sent much valuable information,
- and to Bob Haydon who advised that he built a "listen-at-a-
- distance" mike (discussed in a seminar) and it works.
- Thanks also to Richard D'Aleo who sent us a written critique
- with good suggestions for improving the seminar from his point of
- view, and who also provided the information on "The Other NSA".
-
- Also, Marion Lewis of Sovran Financial Corporation sent us
- some material on Sherwood Communications Associates. Thanks
- Marion. Sherwood is a relatively young firm, but they have an
- amazing array of products -- from standard telephone items to
- very sophisticated (and expensive) instruments. Also, they offer
- used TSCM equipment at good prices. You'll find them listed in
- the supplement to this letter because they have a great
- collection of books and reports for sale.
-
-
- LETTER
-
- A member who is in military service wrote us recently asking
- for our help in finding a job after his discharge. We have no
- staff for any such job bank activity, and the work he's looking
- for is very seldom advertised, so we're passing his request along
- in this letter.
-
- "I am about to leave military service. In the military one
- of my functions was the monitoring of official telephone calls to
- identify if there was any breach of security occurring.
-
- "I have enjoyed this job and would like to be able to
- continue with this type of work. Could the association provide me
- any type of list of civilian jobs that might fall into this job
- area or a list of those jobs that I could apply for that would
- incorporate this type of work?
-
- "Any assistance that you can give me in this job search
- would be greatly appreciated."
-
- If you can help, please contact Daryl L. Cole at RT3, Box
- 316, Kempner, TX 76539. Please send us a copy so we can report on
- it in this letter 'cuz it seems to us that the only place in the
- civilian world that he could find a job monitoring telephone
- conversations would be with a big law enforcement organization.
-
- We look forward to hearing from members and Daryl on this.
-
-
- MEMBERS ONLY
-
- Offers for free reprint service are for members of the
- ComSec Association only. If you are not a member and are reading
- a photocopy of this letter, please don't ask us to spend our time
- and effort to serve you. We are offering a free service to
- members -- people who support our efforts by paying dues. You can
- join and become eligible for these free services. All you have to
- do is apply and send money.
-
- (This comment is prompted by our recent receipt of a request
- [with self-addressed envelope] for a free reprint of an article
- from a person who did not give his name, but the letter was from
- a zip code where we have no members.)
-
-
- BUGGED OR TAPPED?
-
- Member Perry Myers of Myers Investigative Service in Chicago
- sent us a clipping from the Chicago Tribune headlined "GOP
- Chairman says he found tap on phone". Perry says that he thinks
- there is something wrong in the story, and asks our opinion.
-
- Well Perry, I agree that it's a hard story to understand. In
- the first sentence Donald Totten says his phone was tapped, and
- in the second sentence he says that his phone was bugged. Was it
- one, or the other, or both?
-
- We'll probably never know because Joseph Miles of Shadow
- Investigative Service is quoted as reporting, "In the course of a
- sweep I found a variation of voltage on the line. The possibility
- existed. I found no hard evidence that one was in place".
-
- Now, if the phone was bugged, there are some simple,
- definitive tests which should have been performed, and (in your
- editor's opinion) measuring line voltage is not one of them. If
- these tests had been performed, the odds are that a bug would
- have been detected.
-
- On the other hand, if we're considering a tap, Mr. Miles
- didn't have much chance of detecting one by measuring line
- voltage. In our experience we only know of two instances in which
- line voltage measurements gave a reasonably positive indication
- that something was amiss. In both cases on-hook voltage was very
- low and we suspect that an off-site parallel parasite transmitter
- was the cause.
-
- So let's hear from members. How often has line voltage
- measurement indicated a problem in your experience? In my
- experience a simple tap on an active line causes no measurable
- change in voltage. In fact, the ordinary changes caused by normal
- system activity are on the order of volts so it would be
- impossible to measure the change of picovolts (or less) caused by
- a decent tap.
-
- Another question for members: Do you agree that a bugged
- telephone should be detected by standard countermeasures
- activities?
-
-
- REEVALUATION OF THE EVALUATOR
-
- This is another story of rapid response. In our last issue
- we carried the story of our two evaluations of the Evaluator
- telephone tap detector and reported that it did not detect any of
- the taps that we put on our line.
-
- Michael K. Stern, VP of Secom Information Products Company,
- responded immediately, sending us another Evaluator for testing.
- Further, he volunteered to come here to assist us with our tests.
- He assures us that the unit really does detect taps (but he
- hasn't told us how), and that other people have tested it with
- positive results. Well, we'll try again when our schedule permits
- and we'll advise you of our results in an upcoming newsletter.
-
-
- THE OTHER NSA
-
- Richard D'Aleo, an author who is writing a book on
- intelligence gathering, sent us some material describing the
- other NSA. It seems that there is an information source here in
- Washington, DC called "The National Security Archive". This is a
- non-profit (by design) institute founded by former Washington
- Post reporter, Scott Armstrong. According to Time, this NSA now
- operates on a million dollar budget with 30 people on the staff.
-
- This NSA uses the Freedom of Information Act to collect
- information which can be used by researchers into government
- activities. If you have need of information which might have been
- retrieved from government records, by all means, contact NSA at
- 1755 Massachusetts Ave. #500, Washington, DC 20036. 202-797-0882.
- Please mention ComSec Letter when you contact them.
-
-
- TELECOMMUNICATIONS COURSES
-
- There are some courses on the administration, management,
- and technology of telecommunications now being offered by AT&T.
- If interested, contact Bruce E. Hemstock, AT&T Knowledge Plus, 55
- Corporate Drive, Room 13J08, Bridgewater, NJ 08807. 800-554-
- 6400. Please mention ComSec Letter when you call or write.
-
- P.S. One member commented that he'd like to see more technical
- content in the ComSec Letter. What's your opinion?
-
- COMMUNICATIONS/SECURITY/PRIVACY PUBLICATIONS
-
-
- Newsletters, Magazines
-
- Computer Security Digest computer security
- 150 N. Main St
- Plymouth, MI 48170
- 313-459-8787
-
- Monitoring Times radio monitoring
- 140 Dog Branch Rd.
- Brasstown, NC28902
- 704-837-9200
-
- Privacy Journal security/privacy
- Box 15300 Compilation of State
- Washington, DC 20003 and Federal Privacy
- 202-547-2865 Laws. $26.00
-
- Security Letter corporate security
- 166 East 96th St.
- New York, NY 10128
- 212-348-1553
-
- Security Systems Digest security news/programs
- Washington Crime News Service
- 7620 Little River Turnpike
- Annandale, VA 22003
- 703-941-6600
-
- Sherwood Communicatiuons Associates various publications
- POB 535
- Southampton, PA 18966
- 215-357-9065
-
- Teleconnect modern telecommunications
- 12 West 21 St.
- New York, NY 10011
- 212-691-8215
-
- 2600 hacking
- POB 752
- Middle Island, NY 11953
-
- Books
-
- Barbara Rowan has compiled an excellent reference, entitled
- "Handbook on State Laws Regarding Secretly Recording Your Own
- Conversations". $20 from Independent Hill Press, 105 South Alfred
- St., Alexandria, VA 22314. There are periodic updates. March, 1988
-
- COMPUTER CRIME
-
- Yes, it does exist; it does cause problems -- of varying
- magnitude. Let's consider some of the various activities that we
- have knowledge of.
-
- First, we should consider those petty crimes by people who
- think that stealing from big organizations is not stealing. The
- crimes I'm thinking of are primarily those of theft of services
- through the use of someone else's telephone credit card number.
- Many, many long distance telephone calls are made this way. Many
- of the people who do this think it's not really theft because the
- phone company is so rich it doesn't know what to do with all of
- its money. What they don't appreciate is that the phone companies
- never lose money; they just add onto their rates to cover the
- costs of these thefts. (But who can criticize the kids for such
- shallow thinking -- we have men who would be president who say
- that they are going to reduce our national debt without bothering
- the people by raising taxes on corporations. They don't realize
- that all of us will end up paying those high taxes because we'll
- have to pay more for goods and services from those firms.)
-
- Then there are the activities which are childish pranks,
- taking advantage of the fact that most people/organizations are
- trusting. Children with computer ability, by accessing someone
- else's computer and leaving smart messages, perform the computer
- equivalent of the kid trick of putting salt in the sugar bowl or
- loosening the top on the pepper shaker in a restaurant.
-
- Of course, there are also computer problems caused
- inadvertently. Maybe these should also be called crimes. I'm
- referring, for instance, to the virus experiment originated by
- some folks at MacMag. It seems they wanted to try out a virus so
- they planted one in several Macs in their office. This one was
- set to appear on March 2, and to display a personal message from
- their publisher. Well, they installed it in their Macs in
- December and by March 2 it had spread to thousands of Macs (and
- maybe into some commercial programs being offered for sale). In
- any event, on March 2 thousands of Mac computers displayed the
- message, "Richard Brandow, Publisher of MacMag, and its entire
- staff would like to take this opportunity to convey their
- Universal Peace Message to all Macintosh users around the world".
-
-
- Last, but certainly not least, there are the serious
- crimes --- more than just vexations. Large amounts of money and
- property are being stolen. Data are being destroyed. We've all
- read horror stories about these.
-
- Just one observation before we consider some specifics: the
- ones we've heard about are the failures; the successful computer
- thefts are still unknown to us.
- Some items in the news about some of those failures:
- Computer Security Digest, April issue:
-
- "The security of computers and data communications systems
- is today largely non-existent, inadequate or outdated by new
- offensive techniques.
-
- "Governmental agencies (federal, state and local) seem to
- have the loosest controls and the highest incident rate....
- "Bell System Regionals are loaded with incidents.... The
- culprits aren't all teenagers or long haired hippies either. The
- new profile includes "mature" businessmen as well as the yuppie
- community."
-
- Washington Post April 18, 1988:
-
- Headline: "New "virus" Infects NASA Macintoshes"
-
- ".... numerous reports of a virus called Scores ...."
-
- "....200 to 400 Macintoshes in the agency's Washington area
- offices .... were infected by the virus."
-
- Yes, it does exist. What can we do about it? Well, to start
- with, I suggest that we share information. I make this suggestion
- knowing that it contradicts what the Washington Post says is the
- philosophy of major corporations who want to keep a lid on
- countermeasures so that the other side won't find out what we're
- doing and react to combat our countermeasures. I don't think
- those people have enough respect for the capabilities of the
- other side. They are smart. They share information. We need to
- get smart. We need to share information.
-
- As a start, if you're using a DOS computer and have
- downloaded programs from a BBS, check the date on your
- COMMAND.COM file. If it's recent, you have a problem.
-
- Data Processing and Computer Security, in its Winter '88
- edition, says that there is a checking program called VI-RAID.
- This program will create a "Program Authentication Code" on all
- of your programs, and can then be used periodically tho check to
- see if they have been altered. Available from Prime Factors,
- Inc., 1470 E. 20th Ave., Eugene, OR 97403. 503-345-4334.
-
- Anyone care to offer additional advice, or offer to provide
- service?
-
-
- DONATIONS TO THE CAUSE
-
- If you have any items of TSCM equipment that you no longer
- need, please consider donating them to the association. What we
- are most interested in are those things that you found really
- don't do what the seller said they would do. We'll test them and
- report on what they actually can accomplish.
-
- We're interested in the expensive items, of course, but
- we're also interested in the inexpensive ones. For example, the
- "Phone Tap Detector" advertized for $69.00 (plus $2.95 P&H) in
- the February, 88 issue of Popular Communications would seem to be
- an interesting item. If you bought one and found that it does not
- detect taps, why not send it along to us?
-
- Also, we're always looking for computers, modems, office
- equipment and furniture, and anything that might be useful.
- Certainly nobody around here is an expert on the tax laws, but
- the association is organized as a 501 (c) (3) corporation (non-
- profit, educational) which should mean that you should be able to
- take some kind of a write off for any donation. Ask your tax
- lawyer or accountant, but keep us in mind. Thanks.
-
- FEEDBACK
-
- Ben Otano, Bill Parker, and Perry Myers requested the
- overseas travel tips mentioned in the last ComSec Letter, and Tom
- Campbell of Northrop and Perry Myers responded positively to our
- question about more technical content. Herb Greenberg sent us a
- copy of an article in Business / North Carolina which features
- reader Bob Grove, Editor of Monitoring Times. (In case you hadn't
- noticed before, we've often suggested that folks in the TSCM
- business could benefit from a lot of the material in this
- publication. Call 'em in Brasstown, NC.)
-
- We appreciate these letters, and especially appreciate the
- nice compliments that came with them. Thanks. And, we got the
- message. The response is for more technical content in these
- letters, so we'll start putting in more technical detail.
-
-
- TSCM, WHAT IS IT?
-
- Recently, we've read in two different publications that 90%
- of all TSCM "hits" are attributable to the physical search.
-
- That is so far off from our experience that we're inclined
- to believe that the statement is self-serving in the extreme.
- Probably the folks who tell you that don't have any modern
- technical equipment or any technical capability.
-
- Of course it could be that one of the authors is parroting
- the other. Come to think of it, his comments indicate a real lack
- of experience in real-world situations so maybe he's an armchair
- quarterback.
-
- In any event, we feel obligated to comment based on our
- experience on real jobs. No amount of physical search would have
- found the speaker of the old speakerphone connected to spare
- conductors in the 50-conductor cable. How about the carbon
- microphone connected to spare pair in the conference room phone;
- do you think physical search would have found that?
-
- Of course, if you have RF-calibrated eyeballs, you can see
- the radio transmitter emanations at 100 plus MHz, and the 200 KHz
- carrier current transmissions. C'mon! Be serious. Although there
- is no question that physical search has its place, it is only
- occasionally the most important part of the TSCM job. In an old
- multi-tenant office building, it really is important and time
- consuming. There have been jobs when it was the most meaningful
- segment of our procedure. For instance, we wouldn't have detected
- the evidence of the tap on Bob Hay's home telephone without it,
- but most of the communications compromises that we've found were
- found through the use of modern instrumentation. No matter how
- thorough your physical search, you'll never see any RF, and
- you'll probably never see any of the modifications to telephones
- that can be detected easily with simple technical tests with
- modern equipment.
-
- Another idea: the people who say that physical search is the
- most important part of TSCM might just be the people to whom show
- is more important than substance. Certainly the client will be
- impressed by a lot of activity, even if the hustle and bustle is
- useless, as the standard physical search is in many TSCM jobs.April, 1988
-
- MODERN PHONE SYSTEM VULNERABILITIES
-
- Background
-
- The basic message is: The bad guys are smart. They are goal
- oriented. They communicate. If there are vulnerabilities, they'll
- take advantage of them while the good guys have their heads in
- the sand (or stuck up in the air).
-
- The good guys must communicate. Don't be afraid that you'll
- teach them new tricks -- they already know all the tricks.
-
- We've frequently talked about and written about potential
- weaknesses in modern telephone systems, but our feelings were
- just that, feelings. We felt that some of the systems could be
- taken advantage of based on sketchy technical details, but now
- we've begun to receive good information from several different
- sources. So let's look at some specific experiences.
-
-
- Experiences, DISA
-
- In order not to embarrass any of the people or companies who
- have provided the details, we're not going to identify them; but
- what follows is real. Take heed.
-
- A company (composite, for the sake of this article) which
- has one of the (early) modern telephone systems had DISA (or some
- variant thereof) for the convenience of their salesmen. To use
- DISA (Direct Inward System Access) a salesman would call the PBX
- and use a four-digit code number for identification. The system
- would then connect him to a trunk, and he would be able to make
- his calls.
-
- Some time after the system had been put into operation, the
- company noticed that their telephone bills were suddenly full of
- off-hours, long, and expensive calls to a lot of numbers in Latin
- America. They concluded that someone had learned how to use their
- system, and was abusing it.
-
- Their first reaction to try to protect themselves was to
- change to a six-digit code. Not even as effective as a finger in
- the dike; each monthly bill still contained thousands of dollars
- in charges for calls to Latin America.
-
- Their next step was to contact AT&T, and ask for protection.
- AT&T investigated and determined that the calls were originating
- in upper Manhattan. However, the exact source was not determined
- because the calls stopped coming.
- That may sound like a happy ending, but it isn't really.
- It's actually one of those inconclusive terminations that leaves
- everyone hanging. In that company's case, they finally realized
- that the people making calls through their system were not
- individual hackers; they were big business. That's right. Their
- conclusion was that drug dealers had set up a communications
- business so that their calls could not be traced back to them.
- The reason that the company was no longer used is that they cut
- back on the number of trunks available to only two or three, and
- the druggies could not make the volume of calls that they
- required through only a few trunks. It's our guess that they have
- moved on to another company that has enough trunks, so that they
- don't have the operational problem of keeping track of several
- systems with different passwords, etc. It's so much simpler to
- deal with only one system at a time and we're sure that they are
- now concentrating on another company and that that company is
- being taken advantage of in a big way.
-
-
- Experiences, Remote Diagnostics
-
- In addition to using DISA to steal service, some of the
- service stealers, are using the built-in maintenance facility.
- They dial in to the PBX's computer, and access the remote
- diagnostic capability, where, by use of the proper signals, they
- can access trunks.
-
- One security director said that they had put a recorder on,
- and heard a tone burst on the incoming call, followed by dial
- tone on the outgoing trunk.
-
- Checking with some folks who install such systems, we find
- that this is certainly possible on some of the most modern
- systems.
-
-
- The Real Threat
-
- Both DISA and remote diagnostic capabilities are currently
- being used to steal service from a lot of businesses.
-
- But it's only money that's being stolen.
-
- Egad! Did Ross, the Scotsman, say it's only money being stolen?
-
- Yup. He said it. He said it because he thinks something much
- more valuable can be stolen, and probably is being stolen even as
- you read this.
-
- That more valuable property is information. If the bad guys
- have figured out how to enter and manipulate these systems, they
- must have learned how to use their knowledge for eavesdropping.
- What Can You do about Long Distance Theft?
-
- Well, first read your phone bills. Do you have any excess
- charges? If so, are they for calls to Latin America? If so, you
- have probably been the target of the druggies. However, don't be
- embarrassed and don't despair.
-
- If your company has been victimized, don't feel too bad.
- We've heard that the MCI sales offices in Phoenix and Denver were
- hit -- bad. And MCI is a company that knows communications inside
- and out -- but they got burned.
-
- Also, keep in mind that the druggies are smart. They're not
- going to continue to use the same company's lines until the
- authorities find them. Their objective is to hide from authority
- so they'll move on within a month or so.
-
- However, they may cycle back, so it's a good idea to monitor
- activity on your trunks after hours. Don't wait for the bill to
- come in. Get some automated equipment that prints out line
- activity. (Radio Shack has a dandy DNR (dialed number recorder)
- that they call the CPA-1000 and sell it for $99.95.)
-
-
- What Do We Plan to Do about Eavesdropping Vulnerabilities?
-
- Unless one of our wonderful readers has already done it and
- sends us a copy, we plan to do a survey of modern telephone
- systems from Merlin to Dimension and Horizon, and on up from
- there. We've heard that the CIA has already done it, but we don't
- have access to their report (nor to such vast resources!), so
- we'll just have to grind away at it. This is not the kind of a
- project that gets accomplished overnight, so don't stand by your
- mailbox looking for an announcement. While we're at it, though,
- we'd like to hear from anyone who has specifics relating to any
- system.
-
- And, of course, if you want to call to compare notes, we'd
- be glad to hear from you at any time.
-
-
- MODERN TELEPHONE SYSTEMS INVULNERABILITIES
-
- Well, the news is not all bad. Some of the telephone systems
- that we've been exposed to recently, are really quite secure.
- Some are unbelievably insecure, yes; but some are quite good.
-
- First, some of the modern PBXs select an outgoing trunk for
- the caller. That means that if you want to tap phone calls by a
- specific person, you have to tap all lines and monitor all calls,
- and turn on the recorder when you hear the voice of the target.
- The only way around this is to secure access to the premises and
- put the tap in behind the switchboard. That is possible, of
- course, but it adds a level of complexity to the tapper's
- problem.
-
- Then, there are the systems that are almost immune to
- bugging. Coupled with a good physical security program, they are
- nearly 100% immune. For instance, we were recently doing the
- standard test for a series parasite by flashing the hookswitch
- while tuning through the spectrum. After about ten flashes, the
- computer showed the phone "busy". Apparently, it took so many
- interruptions as a sign of a malfunction, so it busied the phone
- out. Ross figured he could reactivate by disconnecting and
- reconnecting the feed, but that made the phone go completely
- dead. So what we had was a phone that is nearly immune to
- bugging. If a bugger had worked on one of these phones, the
- system or the phone would have provided evidence that it had been
- worked on.
-
- We've heard that some systems will recover from faults by
- turning the computer's power off and back on again. This is where
- your physical security program will provide protection, first by
- locking the area, and second by monitoring access.
-
-
- TAP DETECTORS AND THE SHARPER IMAGE
-
- In our January issue we ran a copy of a letter to Richard
- Thalheimer of The Sharper Image. The letter advised him that the
- tap detector that he was touting would not detect even a simple
- tap, and that he might get himself sued by someone who depended
- on his tap detector to protect his privacy.
-
- Well, the first response was from a TSI buyer who said that
- sales weren't going so well anyway, so maybe they'd drop the
- item. Now comes the latest issue of their catalog, and, you
- guessed it, they're still saying "you can guard the privacy of
- your line..."
-
- So it seems that they simply don't care what they say.
- Anything to make a sale. Oh well.
-
-
- THAT LIFE FORCE CATALOG
-
- Wow! Super slick. Full of pictures of handsome men and
- beautiful women. Some catalog, until you begin to read what it
- says. How about "most unique" for an interesting variation on
- English? On one page we read that the Research Electronics voice
- scrambler is "THE MOST SECURE VOICE PRIVACY DEVICE IN THE WORLD".
- Now, it might be good. Can't say; never tested it. But we know
- for sure that it is not the most secure device in the world. On
- page 4 they also show a fellow listening through a wall with a
- device they sell, and they even advise you to check 18 USC 2511
- before you use it. I wonder why they didn't read that law
- themselves; it makes printing that ad a federal felony. Oh well.
-
-
- May, 1988
-
- MEMBERSHIP MEETING
-
- You are reminded of the membership meeting scheduled for
- July 23 at the Twin Bridges Marriott in Arlington, VA. We've
- planned a little time for an informal get together with coffee
- and sweet rolls and toast at 9 AM. Meeting will start at 10. If
- you can make it, call as soon as possible -- we're buying lunch,
- and the hotel needs a count.
-
- So far the response has been encouraging, so let's consider
- some of what we need to accomplish in the near future.
-
- Annual Meeting. We've been looking for a place to hold our second
- "annual" meeting (our first was in 1985). This time we have a
- contract with a meeting organizer who won't try to remake our
- plans for our conferences. All of the logistical details will be
- handled by him, and all exhibitor affairs will be his
- responsibility. We'll put together the details of the conference,
- and he'll take care of the promotion, advertising, registration,
- etc.
-
- Local Chapter Organization. This should be one of our top
- priorities. Maybe the DC-area members can set the rules,
- organize, and become the lead chapter in setting up our national
- meeting later this year.
-
- Bylaws. We have some very simple bylaws. At this meeting I hope
- that we can appoint someone to flesh them out for presentation at
- our annual meeting. Also, someone has to do the paperwork to get
- us recognized as a bona fide non-profit organization.
-
- Nomination of New Board Members. At present we have authorized a
- board of five members. One of the members has departed so we have
- a current opening for one person. If the Bylaws are approved,
- this will be a bona fide meeting of the association, and we'll be
- able to elect a new board member immediately. It has been planned
- to expand the board membership to seven or nine, and this can be
- decided at this meeting. Nominations will then be sought from all
- members by mail, with the election to be conducted by mail before
- the annual meeting.
-
- Appointment of Committee Chairmen. There are many functions that
- need leadership. At the top of the list is membership affairs. As
- I see it, this relates to both membership benefits and to
- recruiting. In my mind, they seem to go hand in hand. The future
- of this organization depends on having an effective membership
- program. We have to have suitable benefits to attract and hold
- members.
-
- Corporate Membership Changes. I plan to ask the board to change
- our corporate membership structure to make it similar to that of
- the American Defense Preparedness Association. Specifically, I
- propose that we leave the annual dues at $150, but that the
- corporation can name five individuals who will have full voting
- rights.
-
- ComSec Letter Subscriptions. I plan to ask the board to authorize
- subscriptions to the ComSec letter @ $25 per year (ten issues).
- This should make it easier for some to afford, and will allow
- libraries, etc. to subscribe without having to pay individual
- dues.
-
-
- B & E: A to Z
-
- With a title like that this video has to be good. (In case
- you're not familiar with the jargon, the subject is breaking and
- entering -- in fact, the subtitle is "How to get in anywhere,
- anytime".)
-
- Just how good it really is depends on your point of view. I
- watched it mostly on fast forward because I'm not really
- interested in developing a new skill, especially a skill that
- would normally be used in the commission of a crime. If you want
- to learn how to break in through a locked door, this probably
- will be very good for you. On the other hand, if you are already
- accomplished in this field, you don't need this video.
-
- Is it worth the price? Yes, emphatically. Even though I
- skipped most of it, I was immensely impressed by demonstrations
- which show how very vulnerable we all are. Further, it is
- especially chilling when you realize that the person who had no
- trouble defeating all kinds of locks seemed to be not too
- experienced at the business. In any event, you should look at it
- if only to increase your awareness of how flimsy most physical
- barriers really are. Available @ $99.95 from CEP, POB 865,
- Boulder, CO 80306. 303-443-2294.
-
-
- WINKLEMANN, AGAIN
-
- Wow! It seems that there are quite a few people who are glad
- to hear that this company is alive again in the USA. We've heard
- that someone in Florida bought the US rights or franchise, and
- there are some people who would like to get more specific
- details. Please call if you have any information.
-
-
- BBS COMING
-
- Member Ned Holderby has volunteered to start a computer
- bulletin board system for members and others. Non-member callers
- will be restricted to information about the association and its
- benefits, and maybe some message service. Members will have
- access to all of the stored information including back issues of
- the ComSec Letter, members names and addresses (except those who
- have instructed us not to list their names), a message service to
- leave questions or messages for all or any specified member, etc.
- Also, membership records can be maintained in one place, getting
- rid of some of the confusion that resulted from our changes in
- the past.
-
-
- IN THE MAIL
-
- Bill Ranson, of Richmond, VA sent us some interesting
- comments. He starts by saying that our segment last month, Modern
- Telephone System In-Vulnerabilities, whet his appetite, but
- didn't give him anything to chew on.
-
- He's right, of course. We noted elsewhere in that same
- letter, that we're busy collecting information on
- vulnerabilities, and we should have said that we are also
- collecting information on invulnerabilities. This effort will be
- reported on as it progresses (see segment, Northern Telecom SL-1
- Meridian in this issue).
-
- Bill also volunteers to provide information on equipment
- that he has tested, and to test equipment that is provided to the
- association for that purpose.
-
- Bill, I hope that you can make it to the meeting on the
- 23rd. Lee Binette is planning to be there to suggest that the
- ComSec Association start just such a program. Maybe you two can
- get it going, and we'll see that test results get passed on to
- members, either through this letter or through our BBS.
-
-
- WORDPERFECT 5.0
-
- Well, the new version of Wordperfect has finally arrived,
- and we have it installed in our new (IBM XT clone) computer.
- Strange, though. The old version of WP recognized our QMS KISS
- laser printer and the new version never heard of it. However, the
- factory has sent us a series of updated diskettes, and our
- printer is back among the living (except that WP can no longer
- draw lines).
-
- If all goes well and the old man learns how to manage the
- new program, you'll soon see changes in the format, layout, etc.
- of this letter. (You might have noticed that the title of the
- letter is bigger this issue, and we've put a box around the date
- line, and we've even included a drawing of your editor with a
- smile on his face. We tried to place the clip art in the center
- of the page, but for some reason Wordperfect won't do that for
- us. Yet. Our plans also include upgrading to full desk-top
- publishing capability. It'll all come in due course. Although
- we'd like to do everything at once, the budget
- limits our speed, as does this old guy's ability
- to learn all this new stuff.
-
- So, there really is some hope for a fancier
- letter. Don't despair. We may move slowly, but
- we know where we want to go and we are
- determined to get there. Next, we plan to
- acquire a scanner so we can show pictures of
- some of the finds in our TSCM work. After that,
- comes a better laser printer so we can do the
- whole desk-top publishing thing.
-
- If you have any ideas about upgrading this
- letter, your editor would really like to hear
- from you. I'm proposing several ideas at our membership meeting
- to enlarge the association and the readership of this letter. If
- we can get a bigger readership, we'll be able to sell some
- advertising in the letter. What do you think about that?
-
-
- NORTHERN TELECOM SL-1 MERIDIAN
-
- This is a system that we'll wholeheartedly recommend from a
- security point of view. We also hear very good reports about its
- reliability, but let's consider bugs and taps.
-
- First, bugs. The SL-1 Meridian, coupled with a good physical
- access control system is my number one choice as an anti-bug
- telephone. Why? Well, if you are going to modify a phone to make
- it into a room bug, you're going to disconnect the phone from the
- feed. In the SL-1 Meridian system, as soon as a phone is
- disconnected, it is locked out of the system until the system is
- reset at the computer -- that's where the good physical security
- program is important. Simply put, if you have this system, and
- the boss finds his phone inoperative on Monday morning, you know
- that you have a problem.
-
- Now let's consider taps. If your mission is to tap the phone
- calls of Mr. X, you simply have to connect to the wires that
- carry his calls. However, this system pumps calls out on a T-1
- span. That means that you need the equipment to break out the 24
- channels, and you have to listen to all channels for Mr. X's
- voice. Next to impossible for any but the most sophisticated
- tapper with lots of clout, money, and technical capability.
-
- Because of these characteristics, I rate this system #1 for
- security. There may be others just as good or better, but we
- haven't checked them all out yet. You'll hear more as we
- progress.
-
-
- June/July, 1988
-
- SURVEILLANCE EXPO 88 (89?)
-
- Surveillance Expo will be sponsored by the ComSec
- Association and will take place in the Washington, DC area in
- conjunction with our next membership meeting. As you read this
- volunteers are looking for space for a meeting late this year,
- but finding a site is proving to be a real problem and we may
- have to reschedule to some time next year when appropriate space
- will be available.
-
- The meetings are being planned for the DC area because
- that's where the volunteer workers are. To those members who have
- been asking for a meeting in other areas we say, "Have at it.
- We'll cooperate in any way." However, those of us working here
- can barely handle the details of one meeting, let alone two.
-
-
- NEW BOARD OF DIRECTORS
-
- At the membership meeting held on July 23, 1988, it was
- decided to expand the board to seven members, and an election was
- held to fill the four vacancies. Joining Chuck Doan, Jim Ross,
- and Ken Taylor on the board are: Mike Brumbaugh, Jack Mogus, John
- Nolan, and Charles S. (Slick) Poteat.
-
-
- BOARD MEMBER FUNCTIONS
-
- Although not all members have been formally elected to
- specific offices, the board members in the DC area have begun to
- work on projects as follows: Mike Brumbaugh has been keeping
- minutes of each meeting; Chuck Doan is VP, Finance; Jack Mogus is
- working on membership programs and will be responsible for all
- aspects of membership (keeping the list, recruiting, benefits,
- local chapter affairs, etc.); John Nolan is in charge of all
- aspects of organizing the upcoming Surveillance Expos and annual
- membership meetings; Slick Poteat is developing a system for
- collecting information on the equipment used and qualifications
- of our members who work in TSCM; Jim Ross is still president, but
- has announced that he will run for chairman at the next
- membership meeting so that someone else can move into the
- president's slot and lead the association through its critical
- growth stage.
-
-
- HITS
-
- From time to time we pass along information regarding hits
- (communications compromises) found by our members. In this issue
- we'll detail some of those and also two interesting
- vulnerabilities (Vantage phone and common wall). In future issues
- we'll provide details on other vulnerabilities and some
- communication compromises that are simple to implement.
-
- As usual, you are invited to send along information that you
- think would be of value to members.
-
- Jack Mogus has had two occasions to look closely at a 66
- connecting block for one of his clients. On the first occasion he
- found a home-built radio transmitter, and on the second he found
- a tap connected to a pair that led out of the building. (As soon
- as we learn how to use our new scanner with our computer and
- laser printer, we'll provide pictures of this find and any others
- that we receive.)
-
- Doug Ralph, in Canada, has been having a very busy year, and
- reports two interesting finds. First, he was astounded to connect
- to the talk pair of an on-hook Northern Telecom Vantage series
- telephone and hear all of the room audio. That's right, the
- microphone or speaker (of the speakerphone) of this instrument is
- connected to the talk pair when on hook, and all you need is an
- audio amplifier, connected through a blocking capacitor, and you
- have a first class bugging system in place.
-
- Ralph's other report points up the importance of a thorough
- physical search. Under the conference table in a board room he
- found remnants of duct tape, which probably had fastened a tape
- recorder in place at one time. Way to go, Doug!
-
- One contributor, who wishes to remain anonymous so that his
- company will not be embarrassed, reported an interesting find by
- his in-house telephone man. It seems that this young fellow
- normally used white wire ties in his work, and one day he noticed
- that someone else had been working in his territory. He tracked
- the strange wiring to a Radio Shack tape recorder controller (PN
- 43-236), and from there to a tape recorder. The CEO who heard his
- conversations on the tape was understandably in shock. Pictures
- of this installation will also be carried in a future letter.
-
- Let's now look at the common wall problem. We're referring
- to multi-tenant office buildings with more than one tenant on one
- floor so that there is a wall which is common to two different
- businesses. Most of the modern office construction that we've
- seen lately has office walls extending upward to the base of the
- floor above, which is as it should be for physical security.
- However, these walls, out of sight above the dropped ceiling,
- have large holes in them to allow for HVAC air flow, which is not
- how it should be for communications security. The next door
- neighbor need only stick his head above the dropped ceiling to
- hear what is going on in the adjoining office. Or, if he wants to
- get it all, he can use this access hole to plant a microphone and
- connect it to a tape recorder. This is a real vulnerability; look
- for it!
-
-
- MEMBERSHIP RENEWALS
-
- During the past year, we arranged for all memberships to
- expire at the same time, namely at the end of September. This
- will make it much easier to keep track, produce rosters, etc.
-
- At present we have many memberships expiring in September of
- this year, and more expiring in '89. Also, we have a handful of
- life memberships and a few corporate memberships. Anyway, this
- seems to be a good time to remind everyone of the options.
-
- Individual professional life memberships are still available
- at $500. We've been told that this is too low a figure, so the
- board will be considering raising it soon.
-
- The corporate membership picture has just changed to make it
- much more attractive for businesses to join. Each small business
- corporate member can name up to five individual members, each
- with full voting rights. The fee for this level of corporate
- membership is still $150 per year, so give this option some
- thought. If you plan on exhibiting at the upcoming Surveillance
- Expo, you'll more than recoup your dues in the reduced charges
- for exhibit space.
-
- The date of membership expiration is printed at the end of
- the first line on your mailing label. If your membership expires
- September 30, 1988, a renewal form is enclosed with this letter.
- Please don't procrastinate. We're entering into our big growth
- year, and we need support from all of our old members.
- LASER BEAM ON THE WINDOW. THREAT?
-
- Kevin Murray has done a practical and thorough evaluation of
- the laser beam on the window threat. We don't have room for it in
- this issue, but we'll provide a full recounting of his evaluation
- in the next issue. It's a good piece of work and we're very
- pleased that he saw fit to share it with the membership.
-
- Thanks, Kevin. It's input like this that we're looking for
- to elevate the level of professionalism in TSCM practitioners.
-
-
- COMSEC ASSOCIATION BBS
-
- Ned Holderby advises that the board should be in operation
- by the third week in August. More information in the next issue.
-
-
- MEMBERSHIP LIST
-
- If you've struggled through with us, you'll recall that,
- after the first membership list, there has been a long break with
- no list. It's a long sad story, a story of the kind of problems
- that a new organization has when starting up. First, we had an
- outside firm maintaining the list, and that worked great but cost
- money. Then a member volunteered to maintain the list, notifying
- members when it was time to renew, etc. Unfortunately, he never
- notified a single member of lapsing membership, sometimes took
- months to deliver the mailing labels for this monthly newsletter,
- and lost many records. Finally, some volunteers had to put the
- list back into our old simple-minded labels program which had no
- facility for printing out the list in a format that would be
- useable by the members.
-
- Well, that should all be over soon. We have started using a
- much more sophisticated and powerful mailing list program in our
- business, and ordered a copy for Jack Mogus (who is responsible
- for all aspects of membership affairs). This program, Promark,
- will allow him to organize the membership list any way we want
- and to print it out in any format. Hang in.
-
-
- August/September, 1988
-
- SURVEILLANCE EXPO '89
-
- As of the time this is written, we do not have a contract
- for space nor a contractor to manage the expo. John Nolan is
- working on it very hard, and we should have definite information
- by the time the next issue goes to press.
-
-
- COMSEC ASSOCIATION BBS
-
- Ned Holderby has set up a computer bulletin board for the
- association. The board has a two-fold mission:
-
- 1. a facility for members to exchange information, and
-
- 2. a source of information about the association for
- potential new members.
-
- Only members will have access to the various conference,
- message, and data file areas of the board. For example, we'll be
- putting all of the back issues of the ComSec Letter on the board
- (with topical information removed) so that all active members can
- browse, read, download, or whatever. Members will have full
- access and non-members will be limited to reading information
- about the association.
-
- Caution! The board will be run and maintained in a
- professional and ethical manner. No games. No violations of
- copyrights. No foul language. I'm sure you understand and
- appreciate.
-
- At the time that this is composed, your editor has not yet
- been able to contact the board (Sorry Ned.), but a list of
- members is on its way to him so he'll known who to allow onto the
- board.
-
- Our BBS number is 716-741-4245. I'll be leaving messages on
- the board for members from time to time, and I hope you'll take
- advantage of this facility.
-
-
- LASER BEAM EAVESDROPPING
-
- Kevin Murray has provided us with the results of their
- testing of laser beam eavesdropping systems. It is of intense
- interest to many, so we'll provide a reasonably complete summary
- in this letter. (If you want an original of his report, I'm sure
- he'll be pleased to oblige. Write him at Kevin D. Murray
- Associates, POB 5004, Clinton, NJ 08809 or call 800-635-0811.)
-
- Here's his report.
-
- Laser Beam Eavesdropping
-
- Summary.
-
- Does it exist? Yes. We designed, built, and tested a complete
- working system.
-
- Does it work? Yes. The technique works very well under laboratory
- conditions.
-
- Is it a threat? No. Due to operational limitations under field
- conditions, we are not reporting this as a threat to the majority
- of clients at this time.
-
- Sci-Fi Bugs?
-
- Eavesdrop from afar, merely by pointing at a window. The
- idea is alluring to some, horrific to others.
-
- News media reports of just such a bugging device, based on
- laser beam technology, have been circulating for some time now. A
- litany of claims "...can hear from miles away..." and compound
- claims "...through closed windows...", culminates with the coda
- "No one is safe." Like the X-Ray vision glasses of comic book
- fame, the claims tend to become exaggerated. But, unlike the
- concept of X-Ray vision, laser listening can be accomplished with
- the right equipment and conditions.
-
- A Century Old Invention.
-
- April 26th, 1880 - Alexander Graham Bell & Sumner Tainter
- announce their invention - the Photophone. Sound transmitted on
- reflected light rays a distance of 213 meters. They also claim,
- "It can transmit songs with great clarity of tone." This is the
- forerunner of CD record players, fiber optic telephone
- transmission, and remote eavesdropping.
-
- It's Greek to them, Diogenes.
-
- We researched this threat for our clients and heard much
- speculation from the pundits, conjecture from dilettantes, and
- hyperbole from the media. In most cases, the "experts" had never
- even seen a laser bug. They were running on grapevine knowledge.
-
- We Built Our Own.
-
- Using assembly plans available to the general public, we
- built a laser receiving system (Radio/Electronics 10/87). For
- aiming and safety reasons, a visible laser beam was used in our
- tests (Spectra Physics Inc. - 10 mW linear Helium-Neon type).
- Additional experiments with: optical processing, and professional
- audio processing, were conducted. These results, and allowances
- for more sophisticated receiver circuitry, were factored into our
- test results.
-
- Physics 101 (Simplified.)
-
- Sound is transmitted by vibration. When you speak, you
- vibrate the air. The air, in turn, vibrates everything it
- contacts. Certain objects, e.g., windows and mirrors, pick up
- vibrations very easily. When a laser light beam hits such an
- object, it `vibrates' also as it reflects and continues its trip.
- The reflected `vibrating' beam can be received, electronically
- processed, and the audio listened to. Under controlled
- conditions, high quality audio can be recovered.
-
- Physics 202 (The Real World.)
-
- Bouncing an invisible laser beam off a window, and
- attempting to catch the reflection, is a little like playing 3-D
- billiards, blindfolded. The fun increases exponentially with
- distance from the target.
-
- All sound will vibrate a window. This includes interior
- conversations as well as exterior noises (cars, trucks, birds,
- etc.) Our audio laboratory processing equipment could attenuate
- this effect, to a degree. The rule of thumb seems to be, if the
- outside noise is as loud as the conversation, audio processing
- techniques are of marginal assistance.
-
- Reflecting a beam off interior objects helps reduce external
- sound. The beam, however, loses power with each pane of glass it
- passes through. This reduces effective working distances and
- increases the number of reflected beams with which one must cope.
-
- Thick glass and thermo-pane glass, as used in office
- buildings, do not conduct sound vibrations well.
-
- Air thermals and wind, disrupt laser beams. The greater the
- beam length, the greater the disruption. Wind blowing through a
- laser beam generates noise similar to the cacophony of 747
- engines.
-
- A laser beam (one powerful enough for professional
- eavesdropping) is the Neutron Bomb equivalent of a sharp stick in
- the eye. Both can blind you, but the laser leaves the eye
- standing. Blinding the subject of a surveillance is not the best
- way of assuring a continued stream of information while remaining
- unnoticed. We used safety goggles during our tests.
- "There must be better ways to eavesdrop and spy", I hear you
- say. There are.
-
- "Beat the Beam" Countermeasures Course
-
- If you suspect a laser beam eavesdropping attempt is being
- made against you, use one of the following techniques:
-
- Hold confidential conversations in a room
- without windows. Place a radio against
- the window and close the drapes. Install
- a white noise generator on the window
- pane.
-
- In addition, do not discuss your suspicions in the
- sensitive area. Contact an independent information security
- consultant for additional assistance. Your problem is more
- extensive than you think.
- -30-
-
-
- MORE ON VIRUS PROTECTION
-
- If you think you need protection from infection by a
- computer virus, RG Software Systems in Willow Grove, PA
- offers a program entitled, "Disk Watcher V2.0". According
- to RG's president, Raymond Glath, the program has been
- tested against the Leheigh University virus and "The Brain"
- at the University of Delaware.
-
- Please advise if you have any experience with this, or
- any other anti-virus programs.
-
-
- TELEPHONE SYSTEM INHERENT SECURITY
-
- Recently in this letter we stated that a Northern
- Telecom SL-1 Meridian phone would be locked out until reset
- at the computer after being disconnected from the feed.
- Within a week after seeing that bit of advice go out to our
- members, we had an opportunity to work on such a system --
- in fact, we worked on the system of the telephone person
- who had given us that information.
-
- What we discovered in handling the real thing is:
- 'tain't so. Some of the phones could be reconnected and
- were automatically reset. Some would not reset. One member
- advises that Northern Telecom Practice states that the M-
- 2000 series phones must be off line for at least six
- seconds before being replugged. Another member advised that
- it is necessary to wait at least thirty seconds before
- attempting to reconnect. We don't have the total answer,
- but we know that what we said last month is not totally
- true. We were working on the M-3000 series -- the client
- users call the "Darth Vader" phones -- and we could not
- determine the pattern for which could be reset and which
- could not.
-
-
- October, 1988
-
- SURVEILLANCE EXPO '89
-
- Well, there will be no annual membership meeting and
- expo until late '89. After the disappointment of being
- close but not being able to make it during '87 or '88, we
- were really counting on getting a show together early in
- '89. At the board meeting in July John Nolan of Advance
- Security took the ball, and it looked really promising.
- Unfortunately, John encountered insurmountable problems and
- resigned, so we're starting over -- again. (John, we thank
- you for the short time that you were able to serve on the
- board, and we wish you well in your other endeavors.)
-
- So where do we stand? At the present time, Jim Ross is
- talking to meeting organizers. If we can find one who can
- do the job, the organizer and the association will make
- some money while putting on an expo that is badly needed by
- our members and by many people who have never heard of our
- organization. Bringing off a successful expo is extremely
- important, and we're determined to do it.
-
- Be advised. Jim Ross may become financially involved
- in backing this effort. He's stayed at arm's length to
- avoid charges of conflict of interest, but the organization
- needs this meeting and whatever it takes will be done.
-
-
- SENSITIVE INFORMATION, HOLD BACK?
-
- Recently Bob Grove, Editor of Monitoring Times,
- editorially raised the question of how sensitive
- information should be handled. That's a question that I am
- often asked, so let's consider it.
-
- The following material is a direct quote from the
- Foreword to Section I of the notebook that I have prepared
- for seminar participants, and it should give you a good
- idea as to your editor's point of view. As usual, your
- comments are encouraged.
-
- "Before getting into the details of electronic
- eavesdropping, let's address a very important philosophical
- question.
-
- "Much of the material to be covered during this
- seminar is considered very sensitive. In fact, there are
- some people who maintain that these topics should not be
- discussed at all. They complain that, by covering methods
- of electronic surveillance, we are 'teaching the bad guys
- how to do it'.
-
- "Let us answer that comment with two facts.
-
- 1. The bad guys already know what they need to
- know to take advantage of the unsuspecting and naive people
- of this world.
-
- 2. Anyone who studies the basic theory of
- electronic communications will have no trouble
- understanding everything necessary to tap phones, bug
- rooms, etc. It is not complex.
-
- "I believe that strength comes through knowledge, and
- the route to knowledge is communication.
-
- "Communication, to be effective, must be open,
- straightforward, and complete.
-
- "One principal objective of this course, then, is to
- cover the principal points regarding electronic
- surveillance because you need to understand those things in
- order to protect your privacy."
-
-
- TWO MORE PHILOSOPHICAL QUESTIONS
-
- As long as we have started down the philosophical
- route, let's go an additional step or two. Let's consider
- the questions of whether TSCM practitioners should screen
- their clients, and whether they should report their
- findings to law enforcement.
-
- We can't provide absolute answers, but we can provide
- some information on our own operation, and what has been
- told to us in the dozen years that we've been leading
- seminars.
-
- Let's start with an easy one. We've been told (it has
- never happened on any of our jobs) that occasionally the
- security director who has contracted for TSCM service will
- ask that the contractor "find" something. (The idea is that
- if a dead radio transmitter is "found", he'll become a hero
- for ordering the service. And, of course, the TSCM service
- firm will become richer because it will be necessary to
- frequently return for additional work and maybe even do
- some of the other divisions of the company, etc.) The
- answer to that request is easy; it's "No!".
-
- However, suppose that you are asked to work for a
- company that has been in the press because of being forced
- to sign consent decrees, etc? Suppose that you have certain
- evidence that your client is under investigation by law
- enforcement? What do you do then?
-
- I can't tell you what to do, but I can tell you what
- we do in my company, and I can tell you the consensus of
- many discussions with many people in law enforcement and in
- TSCM.
-
- In my company we will not hide evidence of a crime or
- participate in any activity which could be remotely
- considered obstruction of justice.
-
- However, we have worked for at least one company with
- a reputation for questionable business practices, and we
- have worked for clients who are under investigation.
-
- The preceding two paragraphs may sound contradictory,
- but let's think about it. Does the fact that a company is
- under investigation mean that it is not entitled to seek
- professional help? After a lot of discussion with many
- seminar participants, we don't think that a person loses
- any rights by virtue of being under investigation.
-
- What do you think?
-
- On the question of reporting our findings to law
- enforcement, let me make two points.
-
- First, this world that we live in is not like
- Hollywood. All loose ends are not tied up at the end of the
- job as they are at the end of the TV episode. Communication
- is not instantaneous and complete. Our conclusions are
- based on a lot of factors, and it is rare that we could
- present an absolute, no-question-about-it conclusion to any
- law enforcement agency.
-
- Second, to whom do we report what? During the recent
- ASIS show in Boston, a visitor to the booth seemed shocked
- when we said that reporting findings to law enforcement was
- not required, expected, or done. He seemed to be of the
- opinion that we should use our time to report crimes to
- "the authorities". As he left the booth I realized that the
- picture essay displayed behind me would have been a very
- good case in point. We discovered a tap on the mayor's
- telephone which may or may not have been indicative that a
- crime had been committed. However, we would have been hard
- pressed if we had had to report it to law enforcement
- because there was good reason to believe that the tap was
- not court-authorized and had been placed by one or more
- members of the police department!
-
-
- VULNERABILITIES (continued from an earlier issue)
-
- In a recent issue of this letter we outlined some of
- the current vulnerabilities that we see in our professional
- practice of commercial technical surveillance
- countermeasures. Let's cover one which we think is very
- dangerous -- one that we've been warning clients about for
- years: the private line telephone, installed for
- "security".
-
- How many times have you seen the CEO order a separate
- telephone line that does not go through the PBX? He thinks
- he's protecting himself from eavesdropping, but what he's
- really doing is making it very easy to identify the
- appropriate pair to tap. It's like hanging a sign on the
- pair, "TAP HERE!". We saw this in a now famous company
- (Wedtech) a couple of years ago, and we continue to see it.
- The latest example was on a "Hello" telephone in a
- government contractor's office. The phone was installed
- because there was so much sensitive information to be
- discussed, and it's called the "Hello" phone because that's
- the way it is answered -- in case somebody is listening.
-
- One further thought on private line telephones. I've
- been telling people in the seminar for years that the best
- way to tap a phone is to call the phone company and order
- an extension. Of course, a private line phone is an ideal
- target for this kind of tap. (Recently, a man who had
- attended the seminar, approached me and asked, "Do you
- remember what you said is the best way to tap a phone?" I
- said I remembered, and he smiled and said, "Well, it
- works!") It will not be successful every time, but, of all
- of the businesses in this world that must take orders by
- phone, the phone companies are at the top of the list.
-
- If you think that you're safe because the number is
- not listed, or not published, or in any other way
- protected, you just don't appreciate the nature of free
- enterprise. ALL of those numbers are available. There are
- people in this country who can get the information for you.
- For example, I noticed on a recent trip to New York City
- that there was a light on early in the morning at the old
- address of a man who had stolen a lot of money from our
- company. So I called one of the information providers, gave
- him the address, and I had a full listing of everyone with
- telephone service at that address back in less than 24
- hours. So, if you or the CEO have had a private line
- installed, think again. The single line phone is very
- vulnerable. If you have a good size operation, think
- seriously about a more secure installation such as the
- Northern Telecom SL-1 that we wrote about recently.
-
-
- COMING SOON
-
- Richard Paradis sent us a copy of a product
- announcement that was carried in, of all things, IEEE
- SPECTRUM. (That's the magazine that goes to all members of
- the Institute of Electrical and Electronics Engineers.) The
- headline was "A double whammy for eavesdroppers", and the
- notice touted a product that will advise you when your
- phone is tapped. Rich asked if we'd care to comment on this
- item for the benefit of the membership, and in a future
- issue we'll reprint the letter that we sent to the SPECTRUM
- editor.
- Another member, Bill Ranson, sent us information on
- some of his activities and some interesting data sheets.
- Again, we'll have to wait till a future issue to cover
- these fascinating submissions due to lack of space.
-
- Last, but certainly not least, Leo Hurley of Exxon
- provided us with excerpts from an article in Security
- Management (the one published by the National Foreman's
- Institute, not the one published by ASIS). In an article
- entitled "Sizing up Sweepers" Sam Daskam is quoted
- extensively, and Leo asked how I react to the quoted
- material. Well, Sam has many, many years of experience in
- this business and certainly should know whereof he speaks.
- (Of course, Sam worked for Mason for 15 or 16 years before
- starting his present business, so he is probably heavily
- oriented toward government-to-government threats.) However,
- if he is quoted accurately, I'm shocked, and I'll explain
- why in a future issue.
- November, 1988
-
- SURVEILLANCE EXPO '89
-
- As we reported in the last letter, the expo that we
- were planning for February is off. The earliest that we can
- hope for is the fall of '89. If you are interested in
- participating in any way, please contact Jim Ross.
-
-
- TELE-PRIVACY GUARD
-
- Richard Paradis sent along a copy of a notice in, of
- all things, IEEE SPECTRUM, one of the publications that
- goes to all members of The Institute of Electrical and
- Electronics Engineers. The notice that caught his eye was
- headlined "A Double Whammy for Eavesdroppers", and Rich
- wrote to ask if I would comment on this for the members of
- the ComSec Association.
-
- Thanks Rich, and the text of the letter which I had
- already mailed to the editor of SPECTRUM follows. (By the
- way, they have never responded in any way. I wonder if that
- is because they are looking for an engineer to check my
- comments for accuracy, or because they were embarrassed
- and consigned the letter to file 13 without any
- consideration of its merit.) (I really think IEEE should
- ensure that technical information mailed to members is
- correct, and I wonder how I can influence them to hire some
- engineers. Maybe I'll send a marked copy of this issue to
- the president of the IEEE; that should get some response.)
-
- (Note. The following letter was sent by
- Jim Ross on Ross Engineering, Inc.
- letterhead to the editor of IEEE SPECTRUM
- on June 6, 1988.
-
-
- Dear Mr. Christianson:
-
- This relates to your editorial "About Professionalism", and
- the segment in the same issue (June) entitled "A Double Whammy
- for Eavesdroppers".
-
- First, let me express a thought regarding the definition of
- professionalism. In the simplest sense, I think a professional is
- someone who is paid to do something that others might do for
- nothing. For example, a cab driver is a professional, and one
- would expect that he would be a more proficient driver than you
- or I. That's certainly not always true, but it remains a
- reasonable expectation.
-
- So let's move along to writing. Those of us who write
- professionally, in general, should be better at the craft than
- others. I think that professional writers should be especially
- careful about how they use words, their basic, elemental tools
- for communicating with their audience.
-
- Ah yes, the audience. If the professional writer's audience
- is, let's say, a group of engineers, isn't it reasonable to
- expect that the words used to communicate with them will be the
- technical terms that have precise meanings in their specialty,
- and that the information will be technically correct?
-
- Now that I have gone through all of that preamble, let me
- get to the reason for this letter.
-
- The technical content of SPECTRUM is usually so good that I
- was astounded to read the segment regarding eavesdroppers. It is
- so wrong, so confusing, so muddled, and so badly worded that its
- author and all of the editors at SPECTRUM should be blushing
- until you have atoned for this muddled miasma.
-
- (This current piece of misinformation follows close on the
- heels of an article in the April issue in which you assert "for a
- mere $49" you can buy a device that will "detect small changes in
- line impedance" and notify the user of a telephone line tap.)
-
- Let me be agonizingly specific -- and your audience is
- electrical engineers so we'll use engineering terms. In analyzing
- "Eavesdroppers' Whammy" I'm going to quote specific sentences out
- of what you presented, and comment on each one.
-
- Quote #1
-
- "About $50 buys you any of several commercial devices said
- to prevent a tap or unauthorized person from listening in on your
- telephone calls."
-
- Comment #1
-
- This sentence is correct, but you must pay careful
- attention to the words "said to prevent a tap". Many people offer
- equipment that they say will detect taps on phone lines.
-
- The kind of people who sell such devices are the same kind
- of people who sell nostrums to grow hair on bald heads, and diet
- pills that melt away the fat. None of them will detect even a
- simple tap made out of $2.00 worth of parts (at retail).
-
- By the way, there are also tap detectors sold for as much as
- $62,500.00 which also cannot detect the $2.00 tap.
-
- Quote #2
-
- "This kind of device usually drops the phone's 50 volt on-
- hook voltage to about 18 volts instead of the normal 12-15 V
- whenever you lift the receiver."
-
- Comment #2
-
- All wrong, except that the usual on-hook voltage in this
- country is 50 V. (Although there are many PBXs (private
- exchanges) that operate on different on-hook voltages.)
-
- First, you say that off-hook voltage is normally 12-15 V.
- Well, on hundreds of real telephone systems I have measured off-
- hook voltage as low as 2 V and as high as 30 V. The most common
- is about 8 V, but there is no norm that can be counted on.
-
- Second, you assert that when I tap the phone line, it will
- cause the off-hook voltage to increase by about 50%. Wow!
-
- When I tap the phone line, you'll see no change in either
- on-hook or off-hook voltage. My tapping equipment (all $2.00
- worth) does not affect the line in any way that can be detected
- electronically. There is no measurable change in line voltage
- because I am not loading the line at all.
-
- As a matter of fact, we have even run tap-detection tests
- with a time domain reflectometer (TDR). The engineers and
- technicians who participated in the tests were very experienced
- with the TDR, and they were never able to tell when my tap was
- on-line or off-line.
-
- Quote #3
-
- "As a result, the impedances of your phone and the tap
- should not match and your phone should go dead."
-
- Comment #3
-
- Huh?
-
- Look. The standard telephone presents almost pure resistance
- to the line. It is, after all, operating in a DC circuit ---
- just direct current running through it while it's in operation.
- That resistance is on the order of 600 to 900 ohms in most old
- sets. My tap, on the other hand, uses a blocking capacitor so
- that the impedance seen by the DC circuit has essentially
- infinite magnitude.
-
- While in operation, the old-fashioned (carbon microphone)
- telephone voltage varies by one or two volts -- sometimes more.
- My tap will be taking picowatts of power off of the phone line
- and will not cause the DC voltage to vary by even one one
- thousandth of a volt.
-
- Your assertion that my tap will cause the off-hook voltage
- to be unusually high makes no sense whatsoever.
-
- Nor does your declaration that if the tap impedance and
- phone impedance don't match, the phone will go dead. When I tap a
- phone line, I am deliberately creating the biggest impedance
- mismatch possible -- and, believe me, the phone doesn't go dead.
-
-
- Final Comment
-
- The SCR device described will prevent someone from listening
- on an extension phone, but there have been similar devices sold
- for many years for a few dollars. The sellers of the earlier
- devices never made any money for a simple reason. When an
- extension telephone goes off hook, there is a discernable
- difference in sound level (about 3 dB or half power), so why
- would anyone pay for a circuit to do what your own senses do for
- you?
-
- Sincerely,
-
- James A. Ross
- President
-
- P.S. By the way, technical surveillance countermeasures (TSCM) is
- our business. If you ever need consultation (a limited amount
- free) in this field, please call. We'll try to help you sort the
- wheat from the chaff in the press releases that you receive in
- this very specialized field.
-
- (Quoted above is the entire text of the
- letter that your editor sent to the
- editor of IEEE SPECTRUM. If there is EVER
- any response, you'll be advised.)
-
-
- AT&T TRAINING PROGRAMS
-
- Just received: AT&T catalogs of training programs. For
- copies, or to inquire about training schedules, call 800-554-
- 6400.
-
-
- COMMUNICATIONS HANDBOOKS AND PUBLICATIONS
-
- Here's another good source of good information. For a
- listing of available handbooks and other publications, contact
- either Chuck Firnsin (312-681-7483) or R.L. Grabo (312-681-7479)
- at: GTE Communications Systems Corp., 400 North Wolf Rd.,
- Northlake, IL 60164 When you write or call, please mention the
- ComSec Letter.
-
-
- December, 1988
-
- DISA
-
- In case you didn't appreciate the message in our April
- issue, I'll try again:
-
- If your switch offers DISA (Direct
- Inward System Access), you are in
- jeopardy! You may soon join the ranks of
- companies that have been ripped off.
-
- Do not jump to the conclusion that
- I'm warning that some hackers might make
- some long distance calls on your lines.
-
- Yes, hackers are a nettlesome
- problem. When they discover a DISA route
- (They call them "extenders" so it doesn't
- sound like stealing.), they pass the word
- around and your phone bill will suffer.
- Yes, they can run up your phone bill, and
- you'll have to pay it.
-
- However, the people I am referring
- to are organized, and they are probably
- drug dealers, and they make a lot of
- calls.
-
- As I write this I am looking at a printout of calls made
- through one company's DISA capability: 27 pages with 51 entries
- per page. In eight days $51,624.36 worth of calls were made on
- four trunks to numbers in Pakistan.
-
- I repeat: in eight days $51,624.36 worth of overseas calls
- were made through this company's DISA facility. The people at
- this company were smart; they detected the theft rapidly, and put
- a stop to it rapidly. If they had learned of the abuse only after
- receiving the bill, it could have been a quarter of a million
- dollars!
-
- If your switch offers DISA, you are in jeopardy! In our next
- issue we'll include more detail on this situation. Stay tuned!
-
-
- NYQUIST vs. NYQUIL
-
- Most folks have heard of Nyquil, but, sniffling and sneezing
- bears little relationship to TSCM. Nyquist, on the other hand, is
- important in modern communications; and, if you haven't heard of
- it, here's your introduction to the Nyquist Criterion. It relates
- to the conversion of analog signals to digital, with an eye
- toward later reconstructing (D to A) a replica of the original
- signal.
- As usual with history questions, I don't remember the man's
- full name, or country, or when he lived. However, I do remember
- his premise: the Nyquist Criterion (widely used but unproved
- mathematically, I believe) states that, in sampling an analog
- signal in the time domain, one should use a sampling rate of at
- least two times the highest frequency in the signal in order to
- prevent aliasing. For example, if the highest frequency is 1,000
- Hz, it should be sampled more that 2,000 times per second.
-
- Before explaining what that means in practical terms, let me
- point out that the terminology definitely proves that engineers
- and/or mathematicians can invent crazy words as do the
- bureaucrats. (The other day I heard a bureaucrat say that
- airlines reduce fares on some routes to "incentify" customers to
- use those routes. Wow!)
-
- "Aliasing" is a word that was coined to describe what
- happens when an analog signal has been sampled at too low a rate,
- and the A-to-D and D-to-A process has rebuilt a signal that is
- unlike the original signal, an "alias" of the original.
-
- The Nyquist Criterion, then, is important when designing a
- modern telephone which has digital output to the switch. If the
- sampling rate is too low, the reconstructed analog signal out of
- the switch will be a very distorted version of the original
- signal.
-
-
- TSCM EQUIPMENT
-
- Recently, a retired government TSCM expert stated that it
- costs about two hundred and fifty thousand dollars to equip one
- TSCM team. Now that Watkins-Johnson has introduced their WJ-38000
- ELINT receiver, that number will probably climb to about one
- million because this receiver alone can cost more than
- $500,000.00.
-
- All kidding aside, this is a serious matter and one that we
- intend to cover in detail in future issues of this letter. For
- the sake of brevity at this time, let's just note that your
- editor does not agree that such expenditures are necessary.
- Certainly there are some government-to-government threats that
- are very high level and deserve high level responses, but there
- is no way to justify spending that much money for equipment to
- equip every team. After all, most work by most teams most of the
- time will address the standard, real-world threat. More later.
-
-
- NEW WORD NEEDED
-
- Because of the work we've been doing lately to identify the
- vulnerabilities in modern electronic PBXs, we've been talking
- with a lot of folks who also don't speak "telephonese". Out of
- necessity we've been using the word "switch" when referring to
- such PBXs. Unfortunately, when most folks hear that word, in
- their mind's eye they see the switch on the wall that we throw to
- turn the lights on. Confusing.
-
- So let's start a movement to invent a better word. After
- all, aren't people who work in engineering supposed to be
- precise? Let us hear from you!
-
-
- PULSE THROUGH A LOADING COIL?
-
- This was a question asked by Joe Wilson Elliott during one
- of our telephone conversations. I don't think I ever answered
- him, but it deserves to be answered because it illustrates the
- fact that different educational and training courses teach
- different "facts".
-
- Anyway, can you get a pulse through a loading coil? What do
- you think? If anyone expresses interest, we'll answer the
- question in a future letter.
-
-
- JUMPING TO (DANGEROUS) CONCLUSIONS
-
- Regarding spousal tape recording of telephone conversations
- without consent, we reported in January: "A federal judge did
- rule that federal eavesdropping laws (Title III, 18 USC 2510,
- etc.) do not relate to domestic cases in certain circumstances."
-
- 2600, in its fall issue jumps from this fact to the
- erroneous conclusion, ".... it is now legal for married couples
- to place wiretaps on their home telephones in order to catch
- their spouses doing nasty things like having affairs." We hope
- the readers of this letter understand the difference between the
- two statements. The ruling only said that certain specific
- federal laws do not apply in certain circumstances. It did not
- say that such eavesdropping is legal. There's a big difference.
-
-
- RF FLOODING
-
- One of the comments that we got on our questionnaire after
- our London seminar indicated that the person wanted information
- on "modern techniques such as RF flooding". How nice it would
- have been if that person had read our material which pleads for
- any question at any time, or listened to any of our exhortations:
- "If you have a question, ask it at any time." If he had asked the
- question in front of the group, we would have had an interesting
- topic to discuss. We had people with exceptionally diverse
- backgrounds. A discussion would have provided more than one point
- of view, and that's the value of the seminar format. It's not the
- authoritarian headmaster lecturing to a group of cowed students;
- it's open give and take among experienced, senior people.
- Well, I'm very sorry that he did not speak up. If he had, I
- could have pointed out to him that RF flooding is probably fifty
- years old. Also, I could have mentioned that we had been covering
- some techniques which have come into use in 1988. That's right,
- we were discussing truly modern methods such as electronic switch
- manipulation, REMOBS, bugging of modern electronic phones, etc.
- Thrown in for good measure were some comments on how companies
- are being robbed (through toll fraud on a major scale) by people
- taking advantage of DISA, voice mailboxes, diverters, etc.
-
- And he wanted to discuss modern methods such as RF flooding!
-
- In any event, I'll explain what I think is meant by "RF
- flooding", with the hope that a reader will either endorse my
- theory, or explain how I went wrong. Before I go on, let me
- explain that I am guessing at what is meant by RF flooding. In
- all of the courses that I have taken in math and electronics,
- "flooding" is a term that was never used in any class or
- practical exercise. I have the feeling that it was invented by a
- technician whose field strength meter told him that the telephone
- was full of RF, so much so that it was flooding out of it and all
- over the floor. (Doesn't that make you wonder if you should wear
- boots while doing TSCM?)
-
- As you read this, keep in mind that I have never been
- exposed to any government training in countermeasures, and this
- explanation is based only on my response to the name given to the
- technique.
-
- So here goes. The older electromechanical telephones contain
- a hookswitch which is really several switches in one assembly.
- Each conductor is connected to a flexible metal strip, and all of
- the strips are physically parallel and very close together. On
- hook, some connections are made, and some are open. Off hook,
- other combinations occur. In the on-hook condition the talk
- circuitry (carbon microphone, speaker, and side-tone transformer)
- are disconnected from the line in the DC sense. That is, no
- direct current is possible in the circuit because the circuit is
- open. However, what causes the circuit to be open is the fact
- that two flat metal strips, side by side, are not touching.
-
- Does that sound familiar? Two conductors separated by a
- dielectric? Of course. That's the definition of a capacitor. And
- although a capacitor may be an open circuit for DC, it sure isn't
- open for RF. In fact, it is nearly a perfect conductor.
-
- So my guess is that somebody fifty (or so) years ago figured
- out that he could connect to the talk circuit by applying RF to
- the talk pair. I've never tried it, and don't know anyone who
- has, but the theory is sound. Although the audio recovered is
- probably not good, and it certainly is easy to detect.
-
- Well, there's my answer. If I'm way off base (or even a
- little off) I'd like to hear from anyone who can set me straight.
- I'll run the best answer that comes in. How 'bout it???