Copy Link
Add to Bookmark
Report

COMSEC Letter 1985

eZine's profile picture
Published in 
Comsec
 · 25 Apr 2019

  

ComSec Letter

Editor: James A. Ross

YOGO 1

1985





















COMSEC LETTER


The ComSec Letter was started in 1984, The Year Of George
Orwell, by Jim Ross. Initially it was mailed at no charge to
everyone on his mailing list, and it was later offered by
subscription. After the founding of the Communication Security
Association, the letter became its official organ. In 1989 the
association decided to create a new organ, Comsec Journal; and,
in order to minimize confusion, the name of this letter was
changed to Surveillance.

What follows is an edited version of the contents of one
year of the letter. (The letter has been edited to remove
topical, superfluous, and outdated items.)




Ross Engineering, Inc.
7906 Hope Valley Court
Adamstown, MD 21710
Tel: 301-831-8400; Fax: 301-874-5100



January, 1985

THE RIGHT TO PRIVACY
In a recent issue of Security Management there was a report of a
judicial decision which gives rise to some most serious
questions. From the magazine's Legal Reporter section:
"Inciarrano v. Florida (35 Cr.L. 3273). The question in this
Florida case was whether a tape recording made by the victim of
his own murder at the hands of the defendant was admissible as
evidence. The victim, unbeknownst to the defendant, had taped
their last conversation, including the five gunshots [sic] that
killed him. The defendant's attorney objected on the grounds his
client had never consented to the recording -- consent is
required under Florida law. The Florida Fourth District Court of
Appeals agreed and suppressed the evidence."
Alice stepped through the looking glass, and what she
experienced was sane and orderly compared to this, in our
opinion.
A man commits murder, and evidence against him cannot be used
because his right to privacy was abridged!
Doesn't it seem reasonable that a person loses some of his
protections under the law while he is violating the law?

CREDIT WHERE CREDIT IS DUE. MORE ON CN/A
News of a phone company which is doing something which is
eminently sensible, logical, reasonable, and also makes them some
money for a resource which they own and have never exploited.
According to Telephony South Central Bell is now selling CN/A
information. If you want to learn the name and address for the
subscriber, you provide the operator with the number, and for the
fee of 40 cents, SCB will relate the customers name and address
(CN/A) including zip code. Although the service was first offered
last August, it is not yet available throughout the SCB
territory. They expect to have it available throughout their
territory early in 1985, with 7.5 million CN/A listings updated
continuously.
Our congratulations to SCB. Let's hope the other telcos get the
idea, and begin to offer this service.
(This development makes us feel good because we have never liked
the idea of advising people on how to use subterfuge to access
phone companies' data bases.)

STRESS DETECTION
At least one person misunderstood one of our points in our
earlier segment on lie detection, so we'll try again. We've been
told, and we believe, that the language used by the examiner must
be appropriate to the examinee. In our earlier article, we said
thet there is a whole class of people who do not understand the
concept of steal. We did not say that these people do not know
what the word "steal" means; they just do not
understand the concept of steal. If they take something from a
store without paying, they do not think of that as stealing.

YOGO
During 1984 your editor started numbering these letters with
this strange combination of letters in front of some numbers.
This unexplained element in our masthead created absolutely zero
response -- contrary to what we expected. The lack of response
inspired us to announce a contest to guess what the letters
meant.
Thus was born the YOGO contest -- a somewhat whimsical test of
your imagination. Responses were really interesting. Ed Leary got
the first two words, but he missed the last two words with: "Year
of Growing Opportunities", and "Year of Gratuitous Operation".
(He also submitted "You're Only Growing Older"!) Dennis
Steinauer of the National Bureau of Standards said, "Considering
the content and flavor of your letter, the answer is obviously
Year of George Orwell, and he won a one year extension to his
subscription to COMSEC LETTER for that correct solution.
Now let's be more serious. We're still numbering this letter
based on 1984 being the zero year of George Orwell, and we intend
to continue to point out examples of modern phenomena which were
forecast in Orwell's fantasies. Some of these things that we see
are merely humerous; others are frightening.

For a "today" look at BIG BROTHER:
The Private Sector by George O'Toole. W.W. Norton & Co. 1978.
Reveals the existence of the Law Enforcement Intelligence Unit
(LEIU), a "non-government" organization which compiles dossiers
on private citizens, and seems to be immune to penetration under
the provisions of the Freedom of Information Act.

If any aspect of the fantasies in Animal Farm seem too far out,
you should look into:
Secret Agenda by Jim Hougan. Random House. 1984. The author
maintains that the true story of the Watergate affair is a far
cry from what we got from the news media. For example, he states
that the telephone calls monitored in Howard Johnsons Hotel were
not Democrat National Committee business; they were negotiations
with rostitutes! However titillating that information may be, the
book contains some chilling obsevations, e.g.,
1. page 90. CIA agents putting their director under
surveillance with written orders stating "At no time should the
Director be made aware of SUGAR coverage......"
2. page 274. Secretary of Defense Schlesinger
".......countermanding in advance any 'unwarranted military
directives' that President Nixon might issue."
3. page 312. "...Alexander Haig had ordered the
Army's Criminal Investigation Command (CIC) [sic] to make a study
of the President's alleged ties to organized crime ....."

Here's some Newspeak from the Washington Post:
In reporting that the government is allowing the phone companies
to add two dollars per month to all our phone bills so that we
can have access to what we already have acces to, the Post
reports, with no editorial comment, "The FCC made the decision
while releasing two reports justifying the charges as a way to
hold down local phone costs ......."
I guess everyone who sells to the FCC should start charging them
more for things in order to help keep their expenditures down.

QUESTIONS AND ANSWERS
The following questions are from George Austin of Camelback
Investigations, Phoenix, AZ.

Q. What are the legal ramifications of accessing proprietary
Bell or AT&T information (i.e. CNA)?
A. ANI and CNA are two telco sources of information which can be
of help to the investigator. In accessing ANI, you are using an
infinitessimal amount of their computer time and probably not
interfering with their operation in any way -- but you are still
using something of theirs which is not intended for your use; in
other words you are stealing. Do they care? I doubt it.
CNA is a different story. To use this data base, you must
pretend to be a telco employee, and you do use a real employee's
time. So here you are involved in fraud and theft. Do they care?
I'm sure they do. They're not dumb, and they know that
investigators have been using this service; and in many places
they will now only provide the customer's name -- we think partly
to thwart outside use of their facilities.
Is either of these things a big deal? In our opinion, no. We
think that in taking protective steps, the telcos may be
overreacting. On the other hand, we heartily endorse the move by
South Central Bell to sell this information. It's valuable. It's
not protected by any privacy act provisions because the records
are available to many people in the ordinary course of doing
business and therefore public. All telcos, in our opinion, should
follow SCB's lead.

Q. What is the current status regarding limited access to
government and quasi-government data banks (i.e. NCIC) per recent
legislation to locate missing juveniles and Interpol?
A. Hoo Boy! You have asked a question for which we don't even
have a hint of an answer -- but we'd sure like to! Can anyone
help? Call or write if you have any information.

Q. Under what area in federal and state purview do number
recorders (surreptitiously planted to record outgoing calls)
fall?
A. First, the number recorders do not record calls; they record
only the activity on the line -- time off hook, time on hook,
dialed number on outgoing calls, number of rings on incoming
calls.
Second, they are not always surreptitiously planted. Sometimes
they are used for business purposes such as checking up on which
employee is in the habit of making personal long distance calls
on the business phone.
Now, finally, we'll get around to answering your question -- at
least in general. There are many court precedents which hold that
the information which these devices collect is public information
and not protected by privacy statutes. (If you want specifics, we
know a very sharp lawyer to whom we can refer you.)
Another consideration, though, is how you connect the device to
someone else's line if that person has not consented. In that
case, there is no doubt that some trespass is involved. You are
trespassing against either the telco or its subscriber; but,
again, it's no big deal in most cases. (Of course, if breaking
and entering is involved, then it becomes a big deal.)

OPPORTUNISM, WORLD CLASS
In a recent issue PC World details the saga of Southwestern Bell
and its effort to garner even more revenue by declaring that
those who send only two pure tones (via data modems) over their
lines must pay more to use those lines than those who send the
very complex waveform of human speech over them. In 1983 SWB
started charging modem users (the article said modem owners, but
that is too 1984ish for even us to believe) an additional $44.90
per month for phone service. Organized protests have resulted in
a recission of the rate addition, but we'll bet that this phone
company, and others, will all eventually figure out ways to
convince the public utilities commissions that they deserve
higher rates from modem users.
In other words, we think that the victory by the little guys is
a tactical setback for the big guys, but that the big guys will
win big sooner or later.


COMMUNICATIONS SECURITY ASSOCIATION
If you have already subscribed to the COMSEC LETTER and now wish
to join the Communications Security Association, everything that
you paid for your COMSEC LETTER subscription can be credited to
your first year's CSAdues. Just note on the CSA membership
application that you want to do this.
This offer is valid only through March, 1985, and your CSA
membership will end at the same time that the original
subscription would have ended.

THAT INTERESTING AD IN SECURITY WORLD
Bonnie Van Gilder ran an ad in the January issue of Security
World which raised a lot of eyebrows. "Researcher looking for
information on bugs in marital situations, ..." Several of our
subscribers have called to bring it to our attention or to
inquire as to its authenticity.
Some time ago Bonnie contacted us and requested details
regarding real bugging situations, but we never reveal
information about our clients so all she got were some background
facts regarding the laws, availability of equipment, etc.
Considering the popularity of sting operations, and the famous
(infamous?) one that the FBI has reportedly been engaged in
recently with some sellers of countersurveillance equipment, we
wonder if Bonnie will be able to collect any useable facts.

SECURITY LETTER SOURCE BOOK
Our hat is off to Bob McCrie and his staff for the breakdown of
categories of security related equipment and services. In this
field it is the best taxonomy we have ever seen -- in fact, we
recommended it to the government office which is working on
revamping SIC codes.
We recommend this source book. Contact Bob McCrie, Security
Letter, 166 E 96th St, New York, NY 10028.

INTERESTING PUBLICATIONS FOR THE INVESTIGATOR
Telephone Records and other titles are available from Thomas
Publications, 937 Reinli, #1, Austin, TX 78751.


February, 1985

EDITORIAL
In rereading the YOGO 1.01 issue, I wondered if I had made
myself clear, especially in the comments that I made about the
laws. Just in case I had not, I'm adding these editorial remarks
to be sure that I am not misunderstood.
When I offer an opinion, it is just that -- an opinion. It might
be more valid than someone else's; it might not. Yes, I have
thought about the ideas that I express; and yes, I hope that I'm
right and that you'll be better informed after reading my letter
-- but I know that I'm not always right.
If you disagree with any point, I'd be delighted to get a letter
from you expressing your views (and I'd probably run it in this
newsletter).
In writing about the laws I'm not trying to provide legal
advice. I'm not qualified to do that. All I'm trying to do is air
some ideas which may be helpful. If thoughtful contrary opinions
are sent in, I'll pass them along.

MORE ON THE LAWS
No matter what your politics or profession, one thing that you
should be certain of is that there are no absolutes in questions
of interpretation of the law. From time to time we see positive
pronouncements as to what Title III (or some other law) means,
and we wonder at the marvelous ego of the person who thinks he
can predict with certainty how a law will ultimately be
interpreted. Keep in mind that there are many stages in testing a
law (trials, appeals, etc.); and that, even before any law is
tested, it must be interpreted by many people with many differing
points of view.
We see many overlaps, gaps and ambiguities in the laws relating
to communications. Further, as electronics engineers in the field
of communications, we see a laxity in the use of our language
which is downright frightening.
Some examples of the lack of precision in language:
"Oral", "verbal", and "aural" have all been used when the word
"voice" (used as an adjective) would have conveyed the precise
meaning intended. One Department of Justice instruction assumes
(contrary to logic and many court decisions) that dialing
instructions (call routing) are a part of the communication
between the parties, and are therefore protected. In the same
document, however, the DOJ takes the position that computerized
data carried by wire are not protected because "aural
acquisition" is not possible. (They apparently think that a
person can hear only voice, not tones!)
(The DOJ document which we refer to is dated 12-31-84, and it
purports to "explain" the technical provisions of 50 USC 1801 and
18 USC 2510.)

COMMUNICATION SECURITY ASSOCIATION
Some correspondence that came in recently indicates that some
folks just do not understand what becoming a charter member
means.
Let's back up and consider just what this new association is,
and what it is not.
It is not an AFCEA, or an IEEE, or an ASIS, or an IACP. It is
not an established organization with a headquarters, and a staff,
and history, and traditions, a million dollars in the bank, etc.
It has no elected officers. In fact, its directors are only
temporary directors until the membership can elect the first
slate.
All it is is an idea of a few people, and the only real benefit
of membership is a subscription to this letter. So far the CSA
staff cosists of one volunteer, Jim Ross. Its membership packet
is the two sheets of paper composed by him on his computer,
printed by his printer, and copied on his paper, using his Xerox,
and mailed to everyone on his mailing list using his bulk rate
mail permit.
Two sheets of paper were mailed. Everyone got a double sided
sheet describing what Jim Ross thinks CSA is. Everyone who had
sent in $50 got a sheet entitled "MEMBERSHIP CONFIRMATION".
Everyone else got a sheet entitled "MEMBERSHIP APPLICATION".
To all who received that mailing, and asked when they would
receive a membership packet: "That's it. You got all there is."
Of course, there will be improvements. (We have nowhere to go
but up!) Recently we arranged for some computer program
enhancements, and we were able to hire some help to do a part of
a mailing. Dave Olsen in Westchester volunteered to work with
Arnold Blumenthal (PTN Publishing, Woodbury, NY) to put together
a membership packet. (We have mailed him material from other
associations to provide some ideas in his creative effort.) When
finished it will be more detailed and will certainly look better
than the Xerox material which was mailed last month. Soon we'll
put out a list of members, and what they have offered to do, but
it all takes time.
There is a membership card and certificate coming along.
However, all work on these things is being done by unpaid
volunteers, and it will be finished when it is finished.
Back to what it means to be a charter member. It means you are
taking a chance. It means you wonder if the organization will
survive. On the one hand, you may have your name listed in the
organization's records as one of the pioneers who helped to get
it started. On the other hand, the organization may not survive,
and all you'll have to show for your $50 will be 12 issues of
this letter -- which you could have purchased for $25.
As these word are written, 89 brave souls have send in
membership dues -- before any sort of membership packet (even two
printed sheets!) was available. To your editor, that is very
encouraging. Many who have joined have said that it is an
organization which has been needed for some time. We think so,
and we feel that the organization will succeed. Time alone will
tell.
Meantime, if you can help, you are certainly welcome.

BOOK REVIEWS
Read any good (or bad) books lately?
Want to see your review in print?
Contact the editor, or just send along your book review.

ANI
The name "Automatic Number Identification (ANI)" may be used to
identify two entirely different telco functions. We have it on
very good authority (Dolly Garrison of AT&T Communications) that
it is digital information which is used by the BOCs in their
billing process. This same name, however, is also used to
identify a Bell function which is used by installers. They also,
I think, call it ANI; but when they use those initials, they are
referring to a service which allows them to quickly identify the
number assigned to the pair that they are connected to.
In operation it works like this: the installer hooks up his butt
set to an unknown pair, switches to dial mode, and dials a code
number. Telco equipment answers his call, and a voice (analog,
not digital!) tells him the number assigned to the pair he is on.
Anyone working on telephone installations would find this to be
an extremely useful aid.
So far we have only three numbers: Rochester: 511; Jacksonville:
311; NYC, Staten Island, and Long Island: 958.

REPORTS FROM THE REAL WORLD

Report #1
Recently one of our readers passed along an interesting story --
and we'll try to accurately pass it along to you. It seems that
Party A called Party B and got his answering machine. Party A
left a message on the machine, and then stayed on the line. He
heard what he assumed to be Party B's machine disconnecting, and
then he heard a synthesized voice state the date and time, and a
second disconnect. Checking with Party B later he learned that
Party B's answering machine does not have the capability to add
the date and time after each call.
Our analysis: some "super-smart" snoop with more money than
brains, has connected a fancy recorder to the line, and doesn't
know that it does not disconnect from the line before it adds the
date and time to each recording. Dumb, dumb, dumb.
For reasons that we think are valid, we're not identifying the
source, or even the locale of the source.


Report #2
A reader in NYC called to ask how it could be worked that Party
C's phone rings, and Party D's phone rings at the same time --
but neither had called the other. As luck would have it, we had
just installed a two-line phone from Teleconcepts which has hold
and conferencing capability, so we tried an experiment to see if
our analysis of the method was correct. It worked first try.
It seems to us that the clients had been tapped by an ingenious
new method. Here's how it goes.
First, the two target people must know each other and be in the
habit of calling each other frequently.
Second, the targets must be the types who answer on the first or
second ring.
(In this case, there was an attorney-client relationship, and
the two men met these criteria.)
Then all that is necessary is for the bugger to dial one,
quickly put that call on hold, dial the other on another line,
hit the conference button, and wait for the two to start talking
to each other. Voila! The bugger can listen.
This strategem might work for a few times, but at some time,
either Party C or Party D is going to say, "Why did you call me?"
and after that the game is shortly over.
(By the way, a modern telephone is not an absolute requirement;
old-fashioned 6-button phones can be easily modified so that
calls can be conferenced. Also, some specialty houses sell
conferencing adapters for anyone who doesn't want to modify a
Bell phone.)

Report #3
We were recently consulted in connection with one of the wildest
cases of telephone chicanery that we have ever heard of. We
cannot provide details at this time, but we are in the process of
trying to write it up with enough detail to make it worthwhile
but without revealing anything that would allow anyone to guess
the identity of our client. Stay tuned; you'll get all of the
details.

Report #4
Your editor, partly for business and partly on principle, has
been making an effort to drag himself forward from the vacuum
tube, analog world that existed when he went to school, into the
solid-state, binary digital world of today. In the process, he
has been trying to learn something of the hackers' world. So far,
he's had only a small glimpse -- but it's awesome. Those in the
establishment who think it can't happen are in for a big
surprise. More detail in this letter as our education progresses.


CN/A
Recently the following CN/A numbers were reported to us, and we
pass them along to you.
For area codes 713 & 409 the new number is: 861-7194

SPEAKING OF CN/A, HERE'S A GOOD ONE ON THE PHONE COMPANY
A caller asks us for the CN/A number for his area.
We give him the latest in our file.
He calls back laughing. The phone company had changed the
number, but they were dumb enough (or greedy enough) to reuse the
old number, assigning it to an unsuspecting subscriber. This
subscriber got so fed up with being disturbed by CN/A calls, that
he determined the new number, and gives it to everyone who calls.

March, 1985

TPA, TELEPHONE PIONEERS OF AMERICA
At the outset I must admit that my jaw has been hanging open
since I was first informed of the membership restriction, source
of revenue, and activities of this social/fraternal, do-good
membership organization. I'm incredulous. First, that its name is
so deceptive, in no way describing its makeup or function. Also,
that I've been supporting it for years without being aware of it.

Enough preamble. Time to relate what I experienced.
Your editor discovered this story in his quest for information
for this letter. I had seen something somewhere which mentioned a
national organization called "Telephone Pioneers of America".
Sounded interesting. (I'm a member of an organization called
Missile, Space and Range Pioneers which is a group of people who
worked in said areas in the early days -- pioneers of the space
age.) Anyway, the Telephone Pioneers of America seemed to be
something that an editor of a telecommunications related
newsletter should know about. Who knows, having worked in the
field for over thirty years, I might even want to join.
So I looked in the DC yellow pages, called national
headquarters, and asked for a membership packet. The young lady
who answered didn't understand what I was talking about, but
promised that her supervisor, Dao, would call me. Dao called, but
she did not understand either, so she told me her supervisor
would call me when she came back to work next week.
On Monday, Barbara Kapen called. ......What a revelation!
"Telephone Pioneers" are not telephone pioneers. Membership is
not open to people who work in telecommunications, and there is
no "pioneering" experience required.
Membership is restricted to folks who work for (or worked for
and retired from) Bell companies! Only Bell companies. Not
Continental. Not General. No others need apply; only Bell.
What does the organization do? Well, I was told that they do all
kinds of nice things -- many charitable and do-good activities.
And I think it's nice that a lot of people voluntarily spend
their time helping others who are less fortunate. However, I
object vehemently to the use of public utilities revenues and
employees on these projects. When I choose to contribute to
charity, I want to be the one who decides where my money goes.
As it stands, money that I thought paid for telephone service is
used on charitable projects chosen by others. It also pays the
salaries of the people who handle administration for TPA because
those people are current Bell Telephone Company employees! That's
right. Part of what I pay for telephone service goes to pay the
salaries of people who are in no way involved in telco
activities. In other words, they decide what good works to do
with the money that we all pay in. They decide how many Bell
employees devote full time to charity while on the telephone
company's payroll.
C&P Telephone (The Bell company that I buy service from) is
apparently quite defensive about its involvement with TPA. I make
that statement because within an hour or two of my conversation
with Barbara Kapen, I was called by Mary Jane Willier who
identified herself as a C&P employee. She told me that TPA does
all kinds of good works for the community, and when she found
that I didn't work for a telephone company, accused me of
misleading her into thinking that telecommunications was my field
when it really wasn't. She admonished me to write the facts when
I prepared this segment, but refused my offer of a free copy.
So there it is. The Maryland Public Service Commission allows
C&P to charge us extra so that C&P can support a social/fraternal
do-good effort which masquerades under a YOGO name which in no
way describes its function or membership.
If you want to confirm for yourself that I was not having a pipe
dream while I was talking to these people, the number for TPA in
Washington, DC is 202-392-2461.
Personally, I think it's time to suggest to the PSC members that
they should look at what they authorize those companies to do
with the money we pay them. (Part of what I was told is that not
all PSCs allow TPA costs to be charged.) If you live in Maryland
and wish to contact them, the address for the Maryland PSC is:
American Bldg, 231 East Baltimore St, Baltimore, MD 21202. (P.S.
One reason that this organization interested me is the intitials,
TPA, and how much they resemble the initials, TAP!)

COMSEC '85
Some time before the end of 1985 there will be a meeting in the
Washington, DC area. This will be the first of the Communications
Security Association's annual meetings. For all members
interested in participating there will be a membership business
meeting to elect directors and committee chairmen.
Of more general interest will be exhibits, panel discussions,
and featured speakers.
Potential exhibitors: keep it in mind. You will be exposed to a
very select audience. Some companies have already committed.

NEW BULLETIN BOARD
The National Bureau of Standards Institute for Computer Sciences
and Technology has established a computer security bulletin
board. 300 or 1200 baud, 8 data bits with no parity or 7 with
even parity, 1 stop bit. Dial 301-948-5718. After connect message
is displayed, 2 carriage returns puts you into the system -- 30
minute time limit. Voice line: 301-921-3485.

TAPS FOR TAP?
One year ago the new editor of TAP told me that he had the
Jan/Feb issue ready for printing, but we haven't seen it yet.
Is TAP really dead? Speak to us Ozzie. Any way to fan life into
it? Can I help you find some volunteers?

OOPS! (AGAIN)
We've told some folks that if you tune to a cellular frequency,
you'll hear only one side of a conversation. We were wrong. If
you tune to the cell transmitting frequency, you'll hear both
sides.

2600
We mentioned this one before, but it's worth mentioning again.
This is a newsletter for folks interested in telecommunications.
It might be characterized as an anti-telephone company letter,
but it is worthy of your consideration if you are interested in
modern telecommunications. It is well laid out, typesetting is
great, has good information content, and is delivered on time. In
fact, I have only two problems with it. First, with my
astigmatism, I find it hard to read a telephone number which is
printed as a string of ten tiny digits without even a dash
anywhere. Second, I sometimes get the feeling that their authors
assume that every person who works for any phone company has all
of the awful characteristics of the phone companies. This, I
believe, is the product of some shallow thinking -- but then a
lot of the material I read in the Washington Post every day is
the result of some generations of very shallow thinking.
Try it. You'll like it! It's worth many times the $10 that it
costs. Order from 2600, POB 752, Middle Island, NY 11953-0752.
By the way, if you haven't figured it out, the title comes from
the Blue Box frequency, 2600 Hz.

FREQUENCY HOPPING
Among the many spread spectrum modulation schemes, probably the
easiest one for the layman to understand is frequency hopping
because no math is needed to explain it. Frequency hopping refers
to the carrier frequency, and means exactly what it says. The
carrier hops from one frequency to another while transmitting.
(The method used to modulate the carrier is immaterial.)
Why move the carrier around? Simple. To make it difficult or
impossible for anyone to listen to your communication.
The way it works is that you need two tranceivers with the same
set of frequencies and the same codes. When the first party
transmits, a synchronizing signal is sent to the second party. If
both tranceivers are set up on the same code, the synchronizing
signal tells the second party's receiver when to start hopping.
That receiver hops from one frequency to the next as specified by
the chosen code. (In simple systems the code is only a list of
the frequencies used, set in a specific sequence. For instance,
code 1 might start with the "home" frequency, hop to frequency #
31, then to # 12, then to #4, etc.; and code 2 might move from
the home frequency to # 17, to # 22, to # 9, etc.)
More sophisticated systems can contain dynamic codes which
change continuously, and can vary dwell time on each frequency as
well as varying the sequence of frequencies used.
(By the way, when we sell hopping equipment, we do so for export
only. Our bill of sale says that the equipment is not approved
for use in the United States, and the buyer is responsible for
obtaining required export licenses, etc.)

HOPPER EXPERIMENT
While we were visiting in California recently, we tried an
experiment involving a frequency hopping transmitter and a Fargo
scanlock. The objective of the test was to determine whether the
scanlock would "follow" the hopper's moves through the spectrum
and provide understandable audio output. The answer is that that
scanlock can follow ten hops per second and provide good audio
output.
Don't jump to conclusions. The fact that we got good audio out
does not mean that the hopper is not a secure means of radio
communication. Keep in mind that the scanlock demodulates the
strongest signal at its antenna, and that during this experiment,
the receiver was in the near field of the transmitter. If it had
sufficiently removed from the transmitting antenna, it would have
demodulated something else.

TAINTED MONEY
Recently we heard that a New York judge had told some lawyers
that they could not accept cash payments from their clients
because the clients were suspected drug dealers, and, therefore,
their money was tainted.
No kidding.
Well, gosh. Yesterday's paper said that General Electric had
been indicted on criminal charges for overcharging Uncle Sam.
Guess we can't take GE money any more. It's tainted.
American Express, Xerox, Gulf Oil, and many other well-respected
names have been offering to sell a telephone tap detection device
which can't detect even the simplest tap. Looks like some of
their income is obtained through fraudulent advertising claims.
Better not do any business with them. Their money is tainted.
Hertz advertised no mileage charges from "here to eternity", but
I had to pay mileage charges to Hertz. Tainted again.
Really!

ON WORDS -- AGAIN
Last month we lambasted legislators for sloppy use of words, and
this month we have to say "Oops!". Yup. We are guilty of gross
misuse of a word relating to privacy of communications.
First, let us give credit to the person who brought this
flagrant abuse of the language to our attention. His name is Luis
Suarez. He lives in Venezuela, and he wrote a letter to the
editor of Monitoring Times. In his letter he pointed out that,
since English is not his first language, he is especially careful
to understand the words he reads in our language. (Bob Grove. If
you send me his address, I'll send him a copy of this letter.)
Luis pointed out that the word "intercept" means just what it
means in football. (Those are not his words, but that's the
meaning of what he wrote.) Sure 'nuff. Checking with several
dictionaries convinces us that the word means to capture
something, preventing it from arriving at its intended
destination.
So wiretapping does not result in interception of
communications!
Therefore, if we're serious about this technology, we should
look again at 18 USC 2510, 2511, 2512, and every other place in
the laws where the words "interception of wire or oral
communication" are used. It looks like an accurate reading
renders these laws essentially meaningless, because wiretapping
does not prevent the message from arriving at its intended
destination.
Wow!
Interlocution is a good word. It might have been used; or the
legislators could have said something simple but accurate such
as, "eavesdropping on voice communications without consent."
What are your thoughts?


April, 1985

FIRST THINGS FIRST
Your editor apologizes for the tardiness of this letter. No
excuses. Just too many things happening. (When I worked at Cape
Canaveral, I invented the term "HPI" for High Priority Intrusion,
and my life of late has been full of HPIs.)
No gripes, though. Most of these intrusions have been good news,
but being behind in my duties really is uncharacteristic and
uncomfortable. Some of the information in the following segments
may give you an idea of the activities I've been involved in, and
may even give you some faith in my promise that things will get
better as far as the schedule for this letter goes.

NEW FORMAT
Next month should be the last for the format that this letter
has had since its birth. If all goes well, starting in June the
letter will be typeset in a three column format. With that layout
we'll be able to pump out fifty to one hundred percent more
information each month. (Maybe we'll start to catch up on our
backlog.)


EEs FOR TSCM
It seems that there are people out there who say that Jim Ross
says that only electrical engineers should do countermeasures
work. Yup. That's what people have told me that I believe.
Well, gee, thanks a lot to those who have decided to be my
spokesmen, but no thanks. Those who know me know that I'm capable
of speaking for myself.
Frankly, the idea that only an EE is qualified is silly and I
resent the fact that some have attributed this idea to me.
So let's air the subject out. Just who is qualified to do TSCM
work? Can we determine if Jim Ross is qualified?
Let's see now. I've taken IQ tests. Do they measure my
qualifications? No?
Well then, how about the Graduate Record Exam by Educational
Testing Service in Princeton? I did real well on parts of that
and not so hot on some others. Doesn't apply, you say.
OK. Would you think that passing the FCC test for an advanced
class ham ticket or first class commercial operator's license
means I'm qualified? No again, huh.
Gosh, I have two degrees in engineering and I have worked in the
field designing and putting in various radio, wire, carrier,
telephone and teletype systems -- does that mean I'm qualified,
in your view? Still no, eh?
I worked in R&D in missile and space systems, and in tracking
systems and I have field experience in such operations. Doesn't
relate, you say.
Well, what does relate? One retired government technician told
me that only a man who has installed bugs is qualified to look
for them. That's certainly an interesting concept: if you haven't
planted a bug, you're not qualified to find one.
Let's explore that idea.
Hey there, Mr. District Attorney. You can't prosecute that case
for labor racketeering because you've never been a labor
racketeer. You there, homicide detective. You can't investigate
that murder until you've murdered a few people, or that rape
until you've raped a few people. And you there, emergency room
doctor. You can't treat those bullet wounds until after you have
shot a few people. And, of course, only mass murderers will be
allowed to work on mass murder cases.
Silly, you say. Of course it's silly.
Equally as silly, in my opinion, is the idea (espoused in a
recent Security Management article) that the only people
qualified are those former government technicians who have had
"two months of formal classroom work performing simulated surveys
.... followed by a minimum of six months on-the-job training."
The plain and simple fact is that there are no criteria, no
standards, no tests, and, therefore, no way to determine if a
person is qualified to do this kind of work. In fact, even if we
could somehow measure a candidate's technical knowledge, how can
we prejudge how he will perform under field conditions -- will
the pressure get to him? Or will he take every shortcut in order
to do as little work as possible?
Does Jim Ross think that only EEs are qualified to do TSCM work?
No, he does not. For many reasons.
For instance, as with any class, there are good performers and
poor performers. Let's consider only the very best performing
EEs.
Are they qualified in my opinion? -- No, and here's why:
Many EEs are not involved with communications in any way. Some,
for instance, know network analysis inside out, but never stopped
to consider how a telephone works. Some don't know the difference
between Nyquist and Nyquil. Some deal only with power. Some deal
only with digital theory, and don't know anything about analog
theory or circuits. Even those who have studied electronic
communications may have insufficient capabilities to do
countermeasures work for one reason or another.
No, I don't think an EE degree is required. In my opinion, the
most important consideration should be character and not training
or education. There are many people who don't think, and that's
no good. There are "know nots" who think they know (usually
recognizable because they have absolute answers to every
question); beware of them -- they are dangerous! There are people
who will not dig into something that is questionable because they
are lazy or because they are afraid that if they don't come up
with a positive answer, they'll end up looking stupid. Look out
for them -- whatever their training and experience.
On the other hand, there are some extremely conscientious people
-- the kind who question every little thing that appears to be
out of line. I like to work with them.
Engineer vs. technician. Education vs. training. Let's sort it
out. Training teaches one what to do in a given set of
circumstances, but only education provides the basis for
evaluating new situations. If you want to evaluate something new,
knowledge of theory becomes invaluable. (By the way, the
classroom is not the only place to get an education -- experience
is a great teacher -- if you're awake.)
Does a field technician need to be able to draw the Thevenin
equivalent circuit of a lead network or lag network and compute
the critical frequencies? No, never. Does he need to be able to
write the equations, and evaluate the definite integrals in order
to be able to calculate the coeficients of a Fourier series? No,
never. Does he need to know Bessel functions? Again, no.
What the field technician needs is the ability to perform the
necessary tests, and to recognize when something is out of line.
He needs a back up with theoretical understanding of electronic
communications theory. He needs the maturity and strenghth of
character to admit it when he's stuck, and he needs to know how
to get help when he needs it.

TAP
The printer had just started his run on last month's issue of
this letter (which contained a segment entitled "Taps for TAP?")
when we saw the latest issue of TAP, Spring '84. We'll keep you
advised.

INITIALS
Had a call from a new subscriber who asked me to explain the
initials that I use in this letter. Looks like we'll have to put
together a short glossary, but for now:
YOGO Year Of George Orwell
ANI Automatic Number Identification
CNA Customer Name and Address
ANI and CNA are telco services, intended for use by telco people
only, but lots of people know about them and use them. More
later.

Q & A
Roger Tolces sent us an undated note (written in the margin of
the YOGO 1.02 issue yet!) in which he refers to our comment that
89 people had joined CSA.
Q. If you have 89 paid subscribers at $50 = $4,450. Why don't
you put some money out for a call for papers and articles so this
newsletter would have some content. How about a bugs found report
column? I have at least 3 good stories.
A. Well, Roger, you sure gave us a lot to chew on, and for that
we thank you.
First, we have to say that we're sorry that you think that this
letter has no content. (It's a good thing that everyone doesn't
think like Roger, or our confidence would be shattered!)
Second, if you know how to maintain a business address, phone,
etc. without spending any of your income, we really need to hear
from you. Yes, CSA has taken in several thousand dollars in dues
in the past year, but that doesn't mean that several thousand are
available to pay for articles.
Next, what the letter said was that 89 folks had already joined
the Communications Security Association even though there had
been almost no promotion or publicity, and that's a fact that
we're very proud of. (In addition to the members of CSA who get
this letter as a benefit of membership, a few other people have
sent us subscription orders for the letter only.)
You seem to imply that if money is paid for an article, it will
be superior to a contributed article, and, we see evidence all
the time of people who think like that -- namely that the value
or worth of something is enhanced if more is paid for it. That
concept, however, does not relate to our experience in this
world. For instance, we have seen studies of average faculty
salaries for colleges in the DC area, and in our opinion, the
quality of the faculty (or the product) is not proportional to
the salary paid. (In fact, it may be inversely proportional!)
Another example: the Post Office in Frederick, Maryland (where
you can park at a meter in the center of town for a nickle) just
advertised for a janitor -- "must be able to read simple
directions" -- for a starting salary of $19,991 per year.
Meantime, the teachers in the county, who have four-year degrees
and teaching certificates, start in the $16,000 range.
In other words, we don't think that paying for an article will
ensure that it will be of more value than one which is
contributed.
As for contributions, we're always glad to see them. In fact,
the very issue that you mailed back to us contained two reports
from the field, and it also solicited book revues from readers.
Further to the point, if you look back through our history,
you'll see that many times when we voice an opinion, we ask for
reader comment. We're always glad to get feedback. At the moment
we have many letters and press clippings in our source file which
have been sent in by readers.
Roger, if you wish to contribute information in any form, we'd
be pleased to see it. If you don't want to go to the trouble of
writing it out, just call.

ANI
For the Los Angeles area the number is 1223. For Puerto Rico, we
think it's 158.


May, 1985

CSA
The Communications Security Association is moving, finally. We
have a professional designing a membership certificate and card,
and amembership solicitation kit. The COMSEC EXPO '85 meeting is
rapidly taking shape. All members who did not specifically
request that they not be included will be listed in our first
membership roster. It will be mailed to all members in June.
Things are happening. Feels good.
Watch your mailbox if you are a member. If you're not, give us a
call and we'll see that you get an invitation to join.

ARE THE ZULUS SMARTER THAN OUR COLLEGE STUDENTS AND LEGISLATORS?
Nothing against the Zulus. They've been around a long time, but
they have not had the advantage (?) of being brought up watching
television and having their idea of what's happening shaped by
the distortions and shallow thinking of our "educated"
journalists.
Back to the heading. College kids in the US are spouting off and
demanding sanctions against South Africa because they want to
help the blacks there. Also, our legislators are currently
considering sanctions for the same reason. Meantime, in South
Africa it seems the Zulus think a little more clearly. They just
asked these people to back off because, if sanctions are imposed,
it will be the blacks who lose their jobs, not the whites.
(Have you ever noticed how often the well-meaning liberal
thinkers hurt the very people they say they're trying to help?)

TALK ABOUT FEEDBACK!
The story about TPA generated more feedback than any other piece
that ever appeared in this newsletter. The feedback will provide
the grist for a future feature in this letter, but for now, let's
just say that a lot of folks don't appreciate being ripped off;
and, on the positive side, there is at least one similar
organization which is not customer supported.
(Telephone Pioneers of America, TPA, is a fraternal, social,
charitable, do-good organization with membership restricted to
Bell Telephone people; and, in many places, paid for by Bell
customers as a part of their regular telephone bill.)

EDITOR'S RESPONSIBILITY, WHAT IS IT?
When this letter first saw the light of day, Tom Serb sent us
some neat notes each time we took a stand critical of journalists
-- something like, "but now you are one!" Well, we're still not
convinced that creating and editing this letter means that we are
in the same profession as, say, the editor of the Washington
Post. But the point here is not how Jim Ross is labeled. The
point is in the heading -- just what is an editor's
responsibility??
In your editor's case, he's writing about a field with a degree
of technology involved, and he feels a great need to be sure that
all technical material presented is accurate and complete. Also,
he has a personal bent to try to be fair -- always.
In a general sense, honesty and fairness seem to be good traits
for an editor. If the editors of the newspapers that I read had
those traits, I'm sure I could work up a slight degree of trust
in what I read. However, when they seem to be going out of their
way to influence, rather than to report, I wonder just how many
people are taken in by their slanted offerings.
The prime example from the recent past in the Washington Post is
the furor over our president's visit to a German military
cemetery. The first sentence of one of the stories in the Post
used the words "Nazi SS Cemetery". Now, certainly, somebody on
the editorial staff should know the difference between the Nazi
party, a political party with very limited membership, and the
special military organization, SS. Were they deliberately using
emotion-generating words in an attempt to create a specific
impression among their readers? I think so. They are not dumb.
Was there a great national objection to the visit, or was the
press trying to create public opinion? Personally, I think that
the press people were trying to create national opinion. I have
discussed it with many people, and found nothing like the
response 'reported' in the press.
To understand my own thoughts on the matter, it might help to
relate some background. I enlisted in the Infantry during WW-II
because my country was threatened. No, I never saw combat, but I
was prepared to; and I take the position that I will salute the
fallen soldiers of our former enemy. They gave their lives for
their country -- and that is something which should be respected.

The fact that there may be some bad people buried in a cemetery
should have no bearing on whether it is appropriate to visit said
cemetery. I'm sure that there are some bad people whose remains
were interred in Arlington National Cemetary, but that doesn't
stop thousands of people from visiting, nor our federal
government from conducting ceremonies there - nor should it.
What is an editor's responsibility? Should he assume that his
readers are incapable of reaching reasonable conclusions from
facts? Should he help his readers by drawing conlusions for them?
Should he save their tiny brains the strain of accepting his
conclusions by trying to make his conclusions look like facts?
What do you think?

NEWSPEAK (OR IS IT THE MAD HATTER?)
Heard a Congressman being interviewed on the radio the other
day. When asked why we meddle in the affairs in Nicaragua, he
said: "We can't allow them to become dominant in the area because
that would allow them to meddle in the affairs of their
neighbors." Honest. That's what he said.

2600
The current issue of 2600 contains an editorial regarding the
new interactive phone reservation system just introduced by
People's Express Airline. The editor, Paul Estev, predicts that
the new system will be self-defeating because it was not tested
by the real users. In other words, it was designed without
benefit of any input or testing by the ultimate users of the
system.

THE REAL MESSAGE
The real message that we see in the 2600 editorial is a much
larger one than the prediction of the failure of this expensive
business communications system. The message that we see is one
that all of us, especially our elected representatives now
working on a budget for our country, should think of every time
we must make a decision about how to use the resources available
to us. That message is: Before we set out to do a job, let us
first clearly define what it is that we intend to accomplish and
what it is that we have to work with. Then, let us evaluate how
each of the proposed activities will help us to reach our goals.
Sounds simple and reasonable, doesn't it. Yet, our Congressmen
are today trying to determine the size of the military budget
based on last year's expenditures, or the size of the total
budget, or the amount spent on social programs or or the rate of
inflation; but nothing related to the mission of the military.
(We have an essay in the works on this subject. Coming soon.)

BACK TO 2600
2600 has its faults, but it is sure worth $12 per year if you
work in this field. 2600, POB 752, Middle Island, NY 11953-0752

NEWSPEAK (AGAIN)
Whoever it was that invented the term "telemarketing". Give
him/her/them credit for a brilliant piece of Newspeak.
It does not have a precise meaning that we've been able to
determine. (We looked in a current Random House dictionary, the
Telephony Dictionary of Telecommunications, Communications
Standard Dictionary by Weik, and Roget's Thesaurus. No listing in
any of them.) It seems to be one of those words that means what
the hearer or sayer wants it to mean. What do you think of when
you hear the word "telemarketing"?
Do you see a telephone boiler room filled with commission
sellers dialing number after number, and being regularly
rejected? Do you see large print and TV media ads with "800"
numbers to call to order the products. (Bloom County, anyone?)
Are those order takers really engaged in marketing? In our
opinion, they are not. As we understand the marketing process,
they are a very small part of the overall function. They are
attempting to sell, but, for the most part, they are taking
orders. Telemarketing, indeed!
Whoever invented the term should be given credit -- and then
consigned to the same hell as the persons who invented the terms
"point-to-point radio", "pin-point bombing", etc. Here is one
wee small voice crying out that such misuse of the language is
bringing us closer to the day when the language has deteriorated
so much that humans will be back to communicating with grunts.
Newspeak may be the precursor of "Nospeak".

REMOBS
Recently in 2600 there was a question in a letter to the editor
inquiring about remote observation, REMOBS. This is a subject
that should be of intense interest to the readers of this letter,
so let's review what we have learned about remote observation.
First, your editor must point out that he thinks that what he
has been told is accurate, but he is always ready to be
corrected.
Remote observation is one capability of some modern systems
whereby telephone company employees can check out individual
lines in appropriately equipped exchanges from a remote location.
In other words, it's not necessary to dispatch a crew to check
out a problem. Using this technology, they can check various
things such as loop resistance, capacitance, etc. Of prime
interest to us, though, is REMOBS, the ability to monitor service
-- that's what they call it when they listen to your telephone
conversations.
Now, as designed, the equipment will allow the observer to dial
in to the REMOBS equipment from a remote location and specify
(using standard DTMF [touchtone] signalling) the line that he
wants to start with. In normal operation the equipment will
"bridge" the specified line for a short period -- on the order of
thirty seconds. Then it moves to the next pair in numerical
sequence, and then the next, and so on. The telco person listens
to each coversation to determine quality of transmission.
If, then, it is truly a service observation capability, why are
we writing about it?
We're writing about it because it can be abused, and used by
anyone at any time for remote listening to any line in any
exchange which is properly equipped. In our files we have a
letter from a young lady who discovered a number that she could
dial so that after entering the last four digits of the target
telephone, she could listen to conversations taking place on the
target telephone line. We have also had a call from a man who
makes his living at countermeasures who told us that he had been
approached by a telco person who offered, for $1,500, to fix it
so our correspondent could have the ability to listen to any
number he wanted at any time he wanted by simply dialing a
telephone number, then a code, then the target number.
Yes, we're convinced that the capability exists. It would be a
simple job to modify the REMOBS equipment so that it does not
switch off of the number selected. The modification could be done
in seconds with almost no chance that anyone would become aware
of what was going on.

TELCO THREE-WAY CALLING FOR SPECIAL TAP
In our YOGO 1.02 issue we provided information on how a two-line
telephone with the right features could be used to make a special
type of remote tap. Now we wonder if a single line phone with
three-way calling could not be used the same way.

FUNNY NUMBER. WHAT DOES IT MEAN?
If you dial 202-352-9911, you get a strange message. For a while
that message included 516-751-2600 which is the phone number for
the publication 2600, and that really did get their attention.
Was it some kind of an establishment hit list, or what? Now
however, the first number refers to another number which is
answered, "Hello". Strange. If you can shed any light on it,
please call.


June, 1985


EDITORIAL
This editorial is in response to a comment that the last issue
was about politics and not about communications security.
To those who think that YOGO 1.05 was about politics: I urge you
to look a little deeper.
That issue was about how generals and admirals miscommunicate
with congressmen, and, of course, how the congressmen let them
get away with it (military budget comments). It was about how
people who call themselves journalists try to influence opinion
by reporting their opinions as facts (Bitburg story). It was
about the failure of those journalists to think about what they
report (Zulus story).
Let's back up for a bit and re-examine what it is we're trying
to do with this letter. This letter is about communications
security. Your editor, however, thinks it's a silly waste of time
to try to secure communications if the communications are not
sensible to start with. In an effort to try to bring this to the
attention of people interested in secure communications we will
from time to time present some examples of really bad
communications. In the YOGO 1.05 issue we presented several
examples of bad communications -- from generals and admirals
playing games with congressmen, to newsmen trying to create news,
to words that don't mean anything, to a congressman engaging in
"Newspeak".
Further, your editor thinks that people who make a living with
words have an especial duty to use words properly so as to set an
example for others. We think it is a gross sin for a professional
user of words to use words incorrectly. We think this way because
we know that some folks don't learn how to use our language in
school; there are many people who are self-taught, and they tend
to belive that what they see and hear is correct.
Recently on a NYC talk show we heard an example of a
professional who did not do his duty, in our opinion. The
announcer introduced a guest in glowing terms -- foremost
polygraph expert in New York City, etc., etc., and asked the
guest to explain the operation of the polygraph. In his
explanation, the guest said that the pneumatic cuff was used to
measure the "inspiration-expiration ratio". No comment from the
announcer. Now I know that those two words are sometimes used
instead of "inhalation" and "exhalation", but the first
impression of most thinking people, I think, would be that the
expert was referring to some things other than breathing; and
that, if his subject had expired, there would not be much chance
of getting any response that the machine could measure. However,
let's just suppose that everyone understood that the expert was
referring to breathing -- it's our opinion that the interviewer
sure dropped the ball 'cuz no equipment is necessary to measure
that ratio. In every living person that ratio is precisely 1. The
whole point is that the expert was not trying to communicate; he
was trying to impress by using the fanciest sounding words he
could muster (ratio instead of rate, etc.) even if the statements
made no sense.
A classic example of bad communication was the wire, sent from
England to Hollywood by a writer doing a story on Cary Grant. He
wanted to know Grant's age, so he sent a wire that said "How old
Cary Grant?" The response was, "Old Cary Grant fine. How you?"
Circumlocutions and euphemisms may yet kill our language. If you
were a visitor from another country with scant knowledge of the
English language (American version), what do you suppose your
abbreviated dictionary would tell you about the meaning of a sign
along an interstate highway that advises that the rest stop ahead
has "no comfort facilities". Do you think you would be able to
figure out that there are no toilets at that stop?

DOING BUSINESS WITH BIG BUREAUCRACIES
Some fun. They (big bureaucracies) have developed so many layers
of systems to keep employees from making errors (or stealing)
that it's a miracle that they (the people who work for BBs) can
ever get anything done.
Case in point. We just processed three subscription orders for
three different US government organizations: one consisted of 4
pages, one of seven pages, and one of nine pages -- to order a
twenty-five dollar subscription!
The State of New Jersey, though, wins the prize. They didn't
send a bunch of papers. They sent a check. (And for that, by the
way, we are very grateful!) We just wish they had sent along a
name and an address for the recipient of the subscription. Right
now our subscriber list contains "Invoice #" for the first name
entry, and "272022" for the last name entry. We hope that by
identifying their invoice number we'll help the mail room people
to find the person who is supposed to get the COMSEC LETTER.

TELCO COURTESY (OR THE LACK THEREOF)
Recently Teleconnect (our favorite telecommunications magazine,
by the way) ran a story about a lady who had had her credit card
(ab)used for $109,504.86 worth of unauthorized calls. Her
comment, after it was all stra

  
ightened out: "No one at the phone
company has ever said: 'Hey, we're sorry for the inconvenience.'
Not even a form letter."
Our experience during the time when we had a number similar to a
C&P (our local phone company) number left us in awe of telco
employees' lack of courtesy when using the telephone. Our number
was 468-2268, and the C&P Marketing Locator's number was
468-2688. Frequently telco people dialed wrong. We answered call
after call, "Ross Engineering"; and were asked, "Marketing
Locator?" With one exception in several years, the response to
our negative reply was to be hung up on without a word.
Even with all of the "green-eyeshade" pressure on them, it seems
that some of those people should have had parents who taught them
a little courtesy before kicking them out of the nest. -- Or does
C&P retrain its people to teach them to be discourteous? Oh well.


PHONE COMPANY, AGAIN
It's to their advantage to get everyone onto DTMF (touchtone)
dialing as soon as possible. So how do they encourage us to use
touchtone? Why, of course, with perfect logic they charge a fee
for conversion, and charge customers who use the new system more
than customers who use the old system. First they try to
discourage you from changing over, and then they charge you more
for using the system which is a much more efficient user of their
plant. Isn't this something that the public utilities commissions
should control?
Personal note. Our home phone already had the capability before
we told them we wanted it, but they charged us for the
"conversion" anyway. Oh well.

REDEFINITION
In a recent letter we said that telephone tapping does not
result in interception of communication because "interception"
means to capture something, preventing it from arriving at the
intended destination.
All that is true. But as one person wrote: "I'm not going to
rely on that as my defense at my trial." And, of course he's
right. The laws relating to eavesdropping define inteception as
"aural acquisition" of the contents of an oral or wire
communication. Our correspondent is wiseto know that what is
written in the laws requires very careful interpretation.
We think that it is interesting to note that, in writing the
laws hich attempt to control eavesdropping on voice conversations
between humans, the legislators did not use any of those words
(eavesdropping, voice, conversations, humans). We wonder why. Do
you suppose they were trying to impress rather than to
communicate?
In any event, we're going to try to be even more careful in the
future in how we use words.

TSCM, AND THEN WHAT?
A former associate bugged (bad choice of word?) us for years to
join him in developing and teaching capture techniques. His idea
was simple: after TSCM has demonstrated that there is a bug or
tap in place, let's not remove it; let's leave it in place and
proceed to catch the bugger.
This certainly would provide a new dimension in this profession,
but we are not convinced that it is going to become standard
practice.
Our experience with our clientele (mostly commercial accounts)
leads us to believe that this idea is not going to catch on. Time
and again we have been amazed that no action was taken to
identify and do something to the bugger. Perhaps the executive
who had been spied on thought that the bugger had incriminating
information on him personally. Or it might just be that
bureaucrats in big companies will do anything to keep from
rocking the boat -- and keep from affecting the price of the
stock. Do you think that such techniques would be used if they
were developed? What has your experience been?

ANI
This subject continues to come up during the seminar, and we get
calls asking about it all the time.
So let's update everybody on Automatic Number Identification,
ANI.
Yes, these initials are used within AT&T as the name of the
system which keeps track of billing information, and transfers
information back and forth digitally. That's not the ANI that
we're referring to here. We are interested in the ANI (isn't it
confusing to have two different things in the same company called
by the same name!) which provides number identification with an
analog voice announcement.
This is the way it works. In an exchange which offers the
service all you have to do is dial a three or four digit code,
and a voice will tell you the number of the telephone line that
you are on -- not pair assignments or any other internal record,
the actual telephone number as listed in the phone book.
What good is it? Well, if you dial the code from your home
number, it's not going to tell you anything that you don't
already know. But suppose you were in a telephone closet, and
want to know if the pair you're on is the correct pair.
Beautiful. Just dial the code, and you'll hear a voice speaking
the number assigned to that pair.

We don't have codes for every place in the country by a long
shot, but we have a few.

ANI CODES

New York & Long Island: 958 Jacksonville: 311
Rochester: 511 Los Angeles: 1223
Other upstate NY: 960 Puerto Rico: 158

FUNNY NUMBER
In our YOGO 1.05 issue we published a phone number in DC and
asked if anyone could identify it. 'Sho nuff.' We got an answer.
The number is that of a telephone company (C&P, we think)
facility which goes by the name of "Switching Center Control
Unit". That's why the disembodied voice says "SCCU" after the
music from the other side fades. Wild. It is a computer facility
which controls hunks of the telco operating capability, and it is
accessible by phone and apparently commandable via touch tone
pad. Entry is said to be by a sequence of only two of the
standard DTMF tone combinations. How vulnerable can the phone
company get?

ANOTHER COURT DECISION
A county court in Georgia approved a series of wiretaps in a
criminal investigation. Some of the telephones which were tapped
were out of the court's jurisdiction, but the court said it had
the authority to issue the orders because the "devices" used
(tape recorders) were located within the court's jurisdiction.
Carried to the ultimate it looks like this would mean that a
local court could authorize taps anywhere, regardless of the
location of the phone being listened to, if the law enforcement
investigators accessed the telephone company system for remote
observation (REMOBS) from a location somewhere within the bounds
of the local court's jurisdiction, and located their recorders in
the same place.
This modern service observation system allows telephone company
employees to "monitor service" remotely by dialing in to the
REMOBS equipment and instructing it which line(s) to monitor. The
persons talking on those lines cannot tell that their words are
being monitored, and REMOBS can be dialed up from anywhere. (See
our segment on REMOBS in the YOGO 1.05 issue.)
If we follow the Georgia judge's reasoning, the "device" (tape
recorder) is located in his jurisdiction, so he can authorize
taps anywhere that REMOBS capability exists. Hmmm.

TRAINING
Hands-on training on TSCM equipment is available in one of our
facilities or in yours. Our equipment or yours. Call for further
information.

COMSEC EXPO '85
This two-day meeting is really shaping up. Scheduled for
December 17 & 18, 1985 in the Washington Sheraton, it will
feature exhibits and eighteen panel discussions on subjects of
interest to professionals in the fields of communications and
information security.
At this time, early in the registration process, over three
hundred people have registered to visit the exhibits. We plan to
run some national ads, and to expand our mailing effort, and
we're confident that we'll have a big turnout. (For an
application which will allow you to pre-register for free entry
to the exhibits, write to COMSEC EXPO '85, Post Office Box 868,
Frederick, MD 21701.)
Although the exhibits will be open to the public, the conference
itself is an official meeting of the Communications Security
Association, open only to members of the association, and your
full CSA dues will be deducted from the entry fee to the
conference.
If you wish to attend the conference, there will be three
educational tracks for you to choose from:
I. Industrial Espionage/Countermeasures
II. COMSEC/Encryption
III. Investigations Technology, Private & Law
Enforcement
Each day there will be three meetings of one and one-half hours
each, one in the morning and two in the afternoon, for each of
the three tracks. That means a total of eighteen meetings, of
which one person could attend a total of six. (Some subjects are
included in more than one track because they would be of interest
to people in different tracks.)
Panel members are now being selected from the many who have
expressed an interest, so if you want to be heard on your
specialty, drop a line to COMSEC EXPO '85 at the address above,
and you will be contacted.
In addition to the exhibits and the conference, there will be a
business meeting of the association, and several committee
meetings. Let the organizers know what you would like to be
involved in.
If your company would benefit by exposure to thousands of
exhibit attendees, contact COMSEC EXPO '85 at the address above.

July, 1985

EDITORIAL
Sometimes a catchy turn of phrase will be echoed by many
persons, and be accepted by all who hear it. That's OK if the
statement is true, but it's bad news if the statement is
incorrect. It's amazing how fast misinformation spreads and
becomes a "known". Erroneous conventional wisdom tends to spread
like wildfire, infecting all who hear but don't think.
An example of a catchy turn of phrase which caught on and caused
great confusion occurred at Cape Canaveral in the early days when
your editor was the first project officer on the Mercury program
-- the first man-in-space program. Someone was quoted as saying
that the impact area for the Redstone (sub-orbital) manned
flights would be in the shallow water area off Grand Bahama
Island "in order to facilitate recovery". Members of the press
liked these words, and echoed them religiously. And the public
believed them. As the man responsible for planning the recovery,
your editor did not like the idea because it made no sense.
Shallow water may be fun to wade in, but our recovery ships would
not find any fun in trying to recover an astronaut from a capsule
in three or four feet of water. Grand confusion, and many
arguments, were caused by the slavish repetition of this catchy
phrase.
That is an example of how a false idea became a part of
conventional wisdom.
Today we have another example of incorrect information being
repeated by many people, to the point that the idea is becoming
accepted as truth. That idea is that data being transmitted by
wire is not protected by the federal privacy laws. Now, your
editor is ready to stand up and be counted when the critics of
the privacy laws convene, but he has to point out that data, and
anything else being transmitted by wire, clearly is covered by
Title III, PL 90-351. (Lawyers refer to the particular paragraph
as 18 USC 2511.)
Having read and studied the legislative history and the laws,
your editor is certain that the legislators really intended to
provide laws to try to control eavesdropping on voice
conversations between humans, and there is no doubt that they
were thinking about voice communications being transmitted over
telephone wires when they wrote the laws.
However, they did not use any of the key words -- eavesdropping,
voice conversations, humans -- in the law. Instead they
prohibited interception of "wire or oral" communications, and
defined interception as "aural acquisition". Clearly then,
anything being transmitted over wires is covered if aural
acquisition is possible.
So let's see. What does "aural acquisition" mean?
Nothing fancy. It means "hear". (And at least one judge has
ruled that it means heard by a human.)
OK. So data is being transmitted. Or facsimile. Or teletype. The
question is, "Is aural acquisition possible?" Well, all of these
information transmission systems transmit their information in
the form of tones that are in the range of frequencies which can
be heard by humans, so "aural acquisition" is indeed possible.
Some folks will say that the human hearing the tones used to
transmit data will not be able to understand the message, and
that certainly is true. But, so what? The law does not refer to
"understanding"; it refers to aural acquisition. The analagous
situation would be a tap on a telephone line being used by
persons speaking a language which is not known to the tapper --
aural acquisition has taken place but comprehension has not. And
aural acquisition is what the law says -- not understanding or
comprehension.
So those who are repeating the incorrect idea that federal laws
do not protect data being transmitted over wires are not doing
anyone any favors. They are slavishly repeating a bit of
misinformation, and doing it so frequently that a lot of folks
who should know better are repeating it and lending it credence.

CNA
One new CNA number to report: 617-787-2750. (As with all of the
others, we have not tested and do not guarantee that it is
accurate.)

PLEASE HANG IN
Yes, the COMSEC LETTER has been arriving late. No, it's not the
fault of the Postal Service. It's pure and simple. The fault lies
with your editor. He did not realize how much additional handling
is involved in having it typeset and formatted outside. It's not
the fault of the people doing the typesetting and printing; it's
just a lot of extra handling, proofing, etc. Better days are
coming, we're sure. After we've turned out two or three in the
new format, we'll have worked out the bugs, and will be back on
schedule. Please bear with us. Thanks.

FEEDBACK
The interests of the readers of this letter are certainly
varied. One letter said, "I don't have that much interest in the
subject matter, but I like to read your letter because it is
written in something which closely resembles English." Then there
are some folks who like the technical comments -- like the
explanation, using Maxwell's equations, to rebut a published
"expert" comment that a spectrum analyzer is not sensitive enough
to use in TSCM. And then there are those who like the comments on
the laws. Also, we've heard that we should stick to
communications security and not concern ourselves with whether
the communications are worth securing.
So, to all who have provided feedback we say, "Thanks". The
COMSEC LETTER will continue to try to provide something for all
of these varied interests. We'll continue to lament the lack of
objectivity of journalists, and we'll continue to point out
examples of outstandingly poor communication. And, yup, we'll try
to provide good technical information on COMSEC, TSCM, and
something that the government has started to call COMPUSEC,
computer security. Naturally, the phone company will get special
attention.

COMSEC EXPO '85 PLANNING COMMITTEE
The time is running short, but several people have volunteered
to help with planning for COMSEC EXPO '85, the first annual
meeting of the Communications Security Association.
At the time of this writing the committee's primary efforts are
aimed at defining the best topics for the 6 different panels in
each of the three technical tracks. We want to be sure to cover
all of the important issues relating to communications and
information security and investigations technology. Some
subjects appear to be of interest to all three technical tracks,
and will, therefore, be offered on all three tracks. In every
case, we're trying to see that all points of view are represented
by knowledgeable and articulate panelists.

At this time the committee members are;

Face-to-face group (DC area):
Ric Blackmon, PTAH Technical Services
Major Raymond L. Gaudreau, USAF OSI
Bill Norman, Security Advisor to the New Zealand Embassy
Jim Ross, Ross Engineering
Russ Weller, Computer Sciences Corporation

Commenting by mail and phone:
Arnold Blumenthal, PTN Publishing, Woodbury, NY
Salvatore Gallo, Martin-Marietta, Orlando
Ben Jacobson, Phillip Morris, New York City
David C. McFadden, Phillips Petroleum Co.
Ken Taylor, CBC, Miami

Representing Galaxy Conferences:
Tammy Brock
John Laughlin

In addition to upgrading the outline of the program, the
committee will be developing guidelines for panelists and
moderators. (How much time to each panelist. Encourage panelists
to bring slides or other visual aids and handouts. Etc.) Also,
the committee will be looking at some other aspects of this first
annual meeting, such as scheduling and arranging for:
General Membership meeting to elect a board of
directors, etc.
Board of Directors meeting to elect officers.
Establishment of standing committees and electing
their chairmen
A meeting of members interested in forming local
chapters to share ideas, etc.
Door prizes?
Cocktail party/reception sponsored by the
exhibitors?
Two luncheons?
One dinner?
Speakers for luncheons/dinner
Head table guests for luncheons/dinner

Anyone who is interested in participating in any phase of
getting COMSEC EXPO '85 off the ground is invited to join in.
Many of the people who are working on this committee are located
in the Washington, DC area because that facilitates getting
together in person, but anyone anywhere is welcome to participate
-- call, write, wire, or communicate your ideas in any fashion.

DPMA SURVEY
The Data Processing Management Association (505 Busse Highway,
Park Ridge, IL 60068) recently reported the results of a survey
of data processing managers.
Just over twenty percent of the responses indicated at least one
case of computer "abuse" during the previous three years. About
half of the companies responding have no full-time or part-time
staff assigned to data security, and offenses by outsiders are
thought to be only about two percent of the total.
Our question is: if no one is watching the store, how do you
know that a lot of hackers have not been tromping around in your
data?
Captain Zap (Ian Murphy) points out that hacking and cracking
targets are becoming easier to find because of the ever
increasing number of firms going to distributed data bases.


THE GREAT NEW JERSEY BULLETIN BOARD BUST
July 15, 1985. We had had some calls relating to the raids on
computer bulletin boards in New Jersey. The details related were
fascinating. The raiders, we were told, included Plainfield
police, Middlesex County police, representatives from the Secret
Service, Postal Service, FBI, and, of all things, AT&T! All this
to be sure that a teenager does not get away with anything. The
raiders had a warrant which authorized them to seize all records,
equipment, etc. And they did. They even took the telephone!
Tried to take a desk calculator, but relented on that item.
That evening on TV network news we watched as a grim faced
investigator (or prosecuter, we forget which) says, "We have the
names of 630 people who logged onto these boards." Gosh. Sure
sounds serious. Looks like your editor is about to become famous.
Look for his picture on the post office wall, because he logged
onto one of those boards three days before the raid and the
seizure of all of the equipment and records.
Please do not misunderstand our position. We do not intend to
make light of any criminal activity. We do not condone theft of
any kind, in any amount, from any entity. Some people think that
stealing from the phone company is not stealing, but they don't
realize that they are stealing from everybody who uses a
telephone. Phone companies never lose money; we all end up paying
for whatever is stolen from them. We do not condone any theft.
We do not say, or even imply, that there are not some bulletin
boards which condone or promote illegal activity. They do exist,
and we have seen a lot of material from some of these boards.
However, just because some boards foster crime does not mean that
all board activity is criminal. In fact, the board that we logged
onto greeted us with a message containing specific instructions
as to what message content was acceptable. In our opinion, that
board was squeaky clean.
In any event, we have the spectacle of the establishment, and
the media, trying to make things sound as sinister as possible.
For instance, one of the comments heard was to the effect that
some of the boards even listed some phone numbers of people in
the pentagon. Aren't they aware of the fact that the government
printing office sells the pentagon phone book? How do they
suppose anyone ever comunicates in the pentagon if the very phone
numbers are some deep dark government secret?

DAY LATE AND A DOLLAR SHORT
Not really. More like two years late and $25 short! We're
referring to the recent issue of the Journal of Security
Administration which states that subscriptions to the COMSEC
LETTER are free. To all who read that and wonder what is going
on, here's the real story.
In 1983, when we announced the beginning of the COMSEC letter,
we offered a free subscription to anyone who requested it on
company letterhead. During 1984, no one paid for the letter. Late
in 1984 we announced that, effective in January 1985, the letter
would be available for $25 for a one-year subscription. Since
that time, subscriptions have been offered for a fee, but not for
free.
We have arrangements with some other newsletters to trade
subscriptions and we offer samples, but the letter is no longer
offered free. Our apologies to anyone who was mislead.
Rates for a one year subscription are: USA: $25; Canada and
Mexico: $35; Other international addresses: $45.

NEW PRODUCT
Ross Engineering Associates, Inc. recently announced the
availability of a bug locator called Superhound. It is a small,
battery powered broadband detector with light and sound output to
indicate proximity to a transmitter. Contrary to prevailing
industry standards, the product was built, field tested, and put
into production before the product data sheets were prepared. We
wanted to be sure that the product would perform as advertised,
so we built it first. Therefore, if you have requested
information on this product, and don't have it yet, please stand
by. The product data sheets are being prepared and will be
available soon.

TAP DETECTION
One of the points made during our seminar on communications and
information security is that there is no electronic instrument
that will detect even a simple tap.
Yes, we know that American Express, XEROX, Golf Oil, and a few
other companies sell an item for tap detection for $49.95. We
also know that there are tap detectors being sold for one
thousand times that price.
And still we state: "There is no electronic instrument that will
detect even a simple tap."
Sure, we detect taps. We do it through a combination of
techniques which take advantage of some instuments, some tools,
some characteristics of some taps, a lot of hard work and
physical inspection.
Some taps are easy to detect. We go over this in detail during
the seminar.
But there is no electronic instrument which can detect even a
simple tap.
There are some procedures for detecting specific types of taps.
For instance, if a commonly available tape recorder starter is
used, it is only necessary to isolate the segment of telephone
line (that is, disconnect all instruments and the telco feed),
and use an instrument capable of measuring very high resistances
to measure the resistance between the two conductors. An FCC
approved tape recorder starter will indicate something over 10
megohms. Without this device across the line, the reading will be
overload or infinity.
But there is no electronic instrument which can detect even a
simple tap.
We have tested many devices and instruments, and none of them
has been able to detect even a simple tap -- a very simple tap.
However, some things can be done, and a properly equipped and
trained countermeasures team can usually provide good assurance
that no tap is connected on premises.
Off premises is another story. We are not privvy to all of the
techniques used by all of the people who tap telephones, but we
are well aquainted with the various devices and techniques used
for tap detection, and we'll put our position this way: We can
tap a telephone and record every conversation, and our tap will
be detectable only by physical inspection. We'll beat electronic
tap detection one thousand times out of one thousand attempts.
By the way, no one has taken us up on our challenge to write a
definition of a telephone tap. As a matter of fact, no one has
even asked us to publish our definition. Anybody interested?

MORE REPORTS FROM THE REAL WORLD
George Austin of Phoenix sent us a page out of The Arizona
Republic of March 28, 1985. Fascinating story. A scanner
enthusiast in Phoenix occasionally heard a neighbor lady putting
her baby to bed, singing lullabies, etc. (Scanners are modern
radios which can be set to scan through a set of frequencies and
stop when they hear something. A lot of people use them to listen
to fire, police, hams, airplanes, etc.) Late one night, however,
when baby was sleeping, he plainly heard the lady and her husband
and their activities in the master bedroom which apparently was
next to the baby's room. He did not specify what he heard, but he
said he heard things "that should not be broadcast all over north
Phoenix". Embarassed, he enlisted a third party to advise the
lady that she was broadcasting, and what she was broadcasting.
It seems that she had purchased a Fisher-Price Nursery Monitor.
This monitor is not a carrier current device like some of the
one-way intercoms on the market. This one, instead of
transmitting over the power lines, transmits through the air on
cordless telephone frequencies. The monitor in question
transmitted on 49.890 MHz.
The lady, althogh embarassed, was certainly thankful to be told,
and the manufacturer said that a warning would be printed in the
instructions in the future.
If you have a cordless telephone, or a cellular telephone, or a
wireless intercom of any type, be advised: YOU CAN BE OVERHEARD.

NETWORK SECURITY CONFERENCE
RCA Network Services has announced a conference on network
security to be held at the Sands Hotel in Atlantic City, NJ on
October 2 & 3, 1985. Fee: $695.
For information contact:
RCA Network Services, Inc.
Network Security Conference (Mail Stop 1-13)
4 Research Way
Princeton, NJ 08540-6684
609-987-7555
This conference, unfortunately, conflicts with the ASIS annual
meeting and exhibits being held in Dallas at the same time.
Otherwise, we would definitely be participating. Many of the
topics being covered are similar to parts of the COMSEC EXPO '85
program which the Communications Security Association is offering
at the Sheraton Washington December 17 & 18, 1985. Specifically,
they are addressing vulnerability of systems to outside hackers
and inside abusers, National Security Directive #145, and the
Commercial COMSEC Endorsement Program (CCEP). RCA has arranged
for some very qualified people to discuss these issues, among
others, and it should be a very worthwhile conference.
We'd be pleased if you would mention the fact that Jim Ross sent
you when you contact them for details. Thanks.


August, 1985

NEWS(?)PAPERS
In Intelligence Report in a recent PARADE magazine, LLoyd
Shearer lauds Jimmy Carter for his wonderful achievement in
getting our hostages released after 444 days in captivity in
Iran.
Is it any wonder that thinking people believe little of what
they read in the press?

FEDERAL LAWS RE EAVESDROPPING
Yes, everything being transmitted by wire is protected by
federal law, in our opinion. However, at least one judge has
ruled that, if "aural acquisition" by a human has not taken
place, no "interception" has taken place.
So, if you're tapping a phone line, or recording from a phone
line, don't listen. --- Then, of course, be sure to get that
same judge to sit at your trial!

FRAUD & THEFT NEWSLETTER
This newsletter is a publication which would be of interest to
any business which bills credit card companies for goods and
services sold to customers. Its purpose is to help merchants by
educating them with regard to fraudulent practices and credit
card scams. (F&T Information Bureau, POB 400, Boynton Beach, FL
33425. 305-737-7500.)
Recently this publisher announced the availability of a book
listing all of the banks which issue Master Card and Visa credit
cards. The book is an aid to businessmen because they can use it
to look up the telephone number of the issuing bank so they can
call the bank to verify the cardholders name and address. (No,
the "approval" or "authorization" number given to the merchant by
phone does not mean that the transaction is approved and will be
paid: all it means is that there is a card by that number in
existence.) This technique, by the way, is the one step that a
banker suggested to a recent seminar group as a method of
protecting against losses due to fraudulent credit card use.
So what happens? Why, of course, Visa and Master Card sue the
publisher claiming that it has "blatently disclosed" trade
secrets. Now, we haven't seen the book nor the charges, but it is
hard to imagine how a list of banks with their phone numbers can
be a trade secret -- certainly such lists must be maintained by
the banks themselves with access possible for almost anyone.
This is of intense interest to us because we do provide goods
and services based on credit cards, and more importantly, because
we are involved in publishing and the suit smacks of an attempt
to limit the freedom of the press.
Anyone with good information on this (or a different point of
view) is invited to call or write.

THERE IT GOES AGAIN!
The current issue of Computer Security Digest asserts that only
conversations are protected by federal wiretap laws. As we
pointed out recently, in our opinion, this is not true. We
believe that a strict interpretation of the law indicates that
the law protects all wire communications (with some strange
limitations). See our July issue.

LAWS. CANADA AND USA
It seems that these two great friends and neighbors have wildly
different laws relating to public records and to evidence. At
the recent annual meeting of the Council of International
Investigators a Canadian member related some details of a case in
Canada in which a private investigator was tried and convicted
for possession of criminal records. (There is probably a lot more
to the story which would be of interest, and we'll publish more
information as we get it.) This surprised us because we think
that court records are public records and, therefore, should be
available to all.
The rules relating to the admissability of evidence also seem to
be different. It is our impression that all evidence which can be
tracked back to illegally obtained evidence cannot be used in the
US. In other words, if an illegal wiretap led to other evidence,
which by itself would be admissable, that new information would
be considered tainted and inadmissable.
According to an article in a recent Security News Bulletin, in
Canada only the authenticity of a tape recording is considered.
If the court is satisfied that a tape has not been altered, and
contains information which could help a jury reach a decision,
the tape recording may be introduced into evidence.
Any reader who wishes to add anything or correct any wrong
impressions is invited to call or write.

WAR STORIES
At the seminar we get mixed reaction to the use of war stories.
Some people think they are a waste of time; others think that
they add practical value.
We intend to continue as in the past, discussing real events
without revealing the identity of the players, because we want to
make the seminar as valuable as possible and we believe that
actual details of actual experiences in the field are important
to a good understanding of the subject matter.
Also, sometimes the stories can convey a message while providing

some humor.
Such as:
Two investigators have had a suspected drug dealer under
surveillance, but haven't really gotten anywhere. One of them
buys a cordless telephone, calls the suspect pretending to be a
disk jockey and tells him that he has won a prize. They deliver
the cordless telephone, and begin a radio surveillance using a
scanner in their vehicle. The suspect uses the phone to make some
deals, the investigators listen, get what they need, and make the
arrest.
That's what you call initiative and enterprise.

ANOTHER ANI NUMBER
For the San Francisco area we're told the ANI number is 760.
Also, Roger Tolces advises that the number we published for Los
Angeles, 1223, is good only for GTE. He says the Pacific Bell
number is different, but he doesn't know what it is.

CNA
During the recent annual meeting of the Council of International
Investigators, members offered comments on the spreading access
to CNA without subterfuge.
In case you are not familiar with it, CNA is a telephone company
service which used to be intended for use by telephone company
employees in the business office. When a customer complained that
he found a long distance call on his bill that was not his, the
telco business office person would check the name and address of
the called party as the first step in proving the customer wrong
and collecting the bill. CNA stands for customer name and
address, and there are CNA numbers for each area code. To learn
the name and address of a customer at a specific number the
proceedure is to call the appropriate CNA number and ask for the
name and address associated with the number in question. It used
to be that a certain amount of acting was required; that is, the
caller had to pretend to be a telco employee at another location.
However, we have been told by hackers that we trust that many CNA
offices no longer care who they are talking to. On the other
hand, some telcos have responded to the heavy non-telco use by
trying to make it more difficult for non-telco people. For
instance, in New York, the CNA office will only give out the name
and city of the customer; and in some places, the CNA office asks
for a call back number.
However, there are some places, even in phone companies, where
reason prevails. Months ago in this letter we advised that South
Central Bell had initiated a program to sell CNA information at
forty cents per inquiry. To our minds, that makes eminent good
sense. The telcos have an extensive data base of public
information which they update on a continuous basis. We think
that they should all sell this information -- it's almost found
money, and maybe will delay that next rate increase.
Anyway, back to the CII members' comments. A man from the
northwest said that CNA information is available in Oregon and
Washington at 75 cents per call. Another member said that he had
heard that several southwest companies had agreed to form a
consortium and to offer the service soon. (He may have been
referring to ScanTel. See our report on that in this issue.)
Any reader who has direct information on any activity relating
to CNA is invited to call, and we'll pass along the latest.

"HACKERS ARE MORONS"
We put this heading in quotes because we are directly quoting
Byron G. Wels, editor of Computer Digest. After Mr. Wels made
this statement in an editorial, he received a so much comment
that he decided to run another editorial to expand on the theme.
In the later editorial, inaddition to calling hackers morons, he
goes on to call hackers thieves and criminals.
"I have no gripe with the guy who experiments with computers
within the confines of his own realm. That's our reader!"
That is certainly an interesting concept. Readers of Computer
Digest are all simon pure, and hackers are all morons, thieves,
and criminals. Talk about generalizing from a specific!
Of course there are hackers who are thieves and criminals. We
have no doubt that many hackers are ripping off many unsuspecting
entities regularly. On the other hand, tacking the label "moron"
onto all hackers sounds kind of dumb to us. We doubt that many
morons have the ability to perform as hackers -- seems to be a
contradiction in terms. (Maybe Mr. Wels was not trying to be
accurate, he was just trying to insult those who hack.) But back
to the basic idea: Mr. Wels states that hackers are thieves and
criminals because some of them have committed crimes and stolen
things.
Let's carry that kind of thinking over to another group, say
editors. Recently, we read two perfectly stupid editorials. Using
Mr. Wels' thinking, we should now condemn all editors as being
stupid.
However the editors that we know personally are anything but
stupid, just as the hackers we know personally are anything but
morons, thieves and criminals.
So much for generalizing from a specific.
(Radio-Electronics, which contains Computer Digest is one of the
publications that we read regularly in our effort to stay abreast
of developments in communications and electronics so we really
can't cancel our subscription in protest.)
(Gosh. Everybody who reads COMSEC LETTER better appreciate what
we go through to try to bring you the best and latest
information!)

SPEAKING OF STUPID
We have to give this month's award to the National Bank of
Detroit. They just returned a letter to us because the employee
addressed is no longer employed there. We appreciate it when we
get information to correct our mailing list, but in this case,
they did not help us much. The instruction to remove the name
from the mailing list was printed on an opaque label which was
glued to our envelope completely covering the label containing
the addressee's name and address!

LETTER BOMB DETECTOR
Recently we were asked to recommend a letter bomb detector by
two of our clients. After checking the operation of the least
expensive one on the market, we advised against its use. The one
we tested was sensing the presence of metal in the package which
means that a paper clip could cause an alarm, but a bomb without
metal would be passed. We could not in good conscience sell this
item, and the next step up in price was a giant step to an X-ray
machine.
However, there may be a low cost alternative to buying a large
and expensive X-ray machine. We have been told that if you spray
suspect parcels with freon, the freon wets the wrapping and makes
it transparent. On the plus side, we are told that the freon
dries and leaves the parcel unmarked. On the negative side, we
don't know the effect of breathing even small amounts of freon,
so please be careful if you try this.
We'd appreciate hearing from anyone with experience -- either
with freon or with any accurate letter bomb detector.

NEWSLETTERS
Business Computer Digest by BC Newsletter Associates, POB 3007,
Boca Raton, FL 33431-0907 is an interesting monthly publication
that you'll find of value if your company uses minis or micos or
lap computers. Much detail on trends, software, product reports,
etc. $88 per year.
Private Intelligence Exchange also publishes a newsletter.
Contact them at POB 1931, Whittier, CA 90609.
If you are interested in either of these, tell them that you
heard about them in COMSEC LETTER and we're sure that they'll
send you a sample copy.
SCANTEL
Mountain Bell (Arizona, Colorado, Idaho, Montana, New Mexico,
Utah, and Wyoming) has made available, but not yet publicized, a
service called ScanTel. This service allows searches of their
customer listings by computer for a fee. At present the system
will search for a name or an address, but will sometime allow
searches by phone number. The pricing for the service is 50 cents
per minute of connect time, plus 25 cents for each request plus 5
cents for each response.
Looks like CNA may be on the way out -- except for unlisted
numbers.

BOOK REVIEW
Spy Tech by Graham Yost. 1985. Published by Facts on File
Publications, New York City and Oxford, England. Hard Cover.
List price: $17.95.

This book tries to cover two distinctly different kinds of
spying. In Part I the author describes spying from planes and
satellites, and in Part II he presents some information relating
to earthly spying.

Part I
To evaluate Part I we referred to his recounting of our early
days in space because we have firsthand knowledge of that period.
We found that he grossly insulted a dedicated US team of space
pioneers, and we wonder about the accuracy of all of the material
presented by the author in this book because his account of
events that we participated in differs from our own knowledge of
those events. It seems that he may have been influenced more by
press releases and press accounts than by facts.
History according to Graham Yost: "With the embarrassing first
launch failure, the United States government returned quickly to
Von Braun's Orbiter plan and, somewhat miraculously, managed to
send up a satellite, Explorer I."
History as it actually occurred: The US Army team that launched
that satellite did not depend upon miracles. It was the same team
that fired the first ballistic missile from Cape Canaveral, the
same team that fired the first long range ballistic missile (3300
miles), the same team that [with the navy's help] recovered the
first nose cone, and, truth be known, it was prepared to orbit
the first satellite over one year before it was given the
go-ahead. (Your editor admits to a bit of predjudice; he was, for
a time, a member of that team which accomplished so much in those
early days.)
So Part I of the book presents at least one distorted view of
history. Let's look at earthly spying.

Part II
To evaluate Part II we started at the beginning, but we never
made it out of the first chapter of Part II because the author
convinced us very quickly that there was no reason to go on.
He starts off by asserting that the telephone system in the
United States was entirely owned by AT&T until the breakup of
AT&T in January 1984. Then he sagely advises that telephone off
hook current is 48 volts. Something he calls "48 line volts" is
used to ring a telephone, and he says the phone company can
easily detect a series tap because it causes a drop in line
voltage of over 20 milliamperes, and when that happens the phone
company sends out a repairman to investigate!
(In case you have not taken the first course in electronics, let
us explain: All of the statements above are pure hogwash. Voltage
is measured in volts; current in amperes. Ringing voltage in the
US is 90 volts, 20 Hertz. No comment on his series tap
information because it makes no sense whatsoever. -- And we all
know how often the phone company sends out repairmen before we
call to report trouble.)
After demonstrating that he knows nothing about basic
electronics and does not have even a proofreader to help him out,
he advises that the little tap detector (with the tiny red light)
that you screw onto your telephone handset in place of the carbon
microphone will detect most taps. The device that he refers to is
the very same one that we demonstrate during the seminar (when
there is a phone available to tap). First we connect it to the
telephone and adjust it according to directions. Then we make a
call. Then we tap the phone line with an $11.95 amplifier so that
everyone in the room can hear the call, and see that the little
red light does not come on. -- It does not detect even a simple
tap; and yet, this author who holds himself forth as an expert,
advises the world that it will detect most taps.
So what can we say good about this book? It has a nice dust
jacket and it is nicely bound. Some of the illustrations are
good. (We have to say that because we use some of the same ones
in our seminar notebook -- copied from government reports.) Some
of the pictures are excellent.
Do not depend upon the contents of this book.
We've often said that the level of expertise necessary to tap a
phone or bug a room is 9th grade hobbiest, and this author should
have looked one up to be his technical advisor. It could only
have improved the content. September, 1985

DEFINITION OF A TAP
In one of the early COMSEC LETTERS we asked all of our readers
to submit proposed definitions of the word "tap" as in telephone
tap. The response was truly underwhelming -- not one entry.
Your editor knows how to go with the flow, so he tried again two
months ago. Still no response.
So we'll stick our necks out and offer our definition of tap,
and we hope that there are some folks in our readership who will
criticize our effort so that the second generation definition is
better than this one.

Tap, n., v., ---n. The act or process or equipment used to
monitor and/or record the content of messages being transmitted
over wireswithout degrading the quality of transmission or
interfering with transmission in any way, and especially without
being detected. The product of a tap is the content of messages
being transmitted over wires. ---v.t. To perform the necessary
steps to accomplish a tap.

N.B. Because most taps seem to have conversations between humans
as their objective, it has become common to think of taps as
having a product which is human voice conversations. (In fact, to
simplify terminology during the seminar we refer to listening to
microwave or satellite-borne telephone conversations as taps.)
Note that the definition above does not refer to voice
conversations between humans. Anything being transmitted over
wires can be tapped. That means that data, teletype, facsimile,
etc. can be the product of a tap.
Also, keep in mind that the definition refers to anything being
transmitted over wires, and is not limited to baseband
transmissions. That means that modulated RF, CW, ICW, or any
transmission at any carrier frequency, unmodulated or modulated
using any type of modulation, is included in the definition.
So let's go critics. Have a shot at the first definition of
"tap".

LETTERS
From Charles J. Augustine, Security Services Center, Cleveland,

Ohio.
How do you obtain schematics and circuit diagrams for ITT and GTE
equipment as well as AT&T and Western Electric products? I have
tried their customer information offices and been met with
replies such as: "It's confidentila proprietary information" and
"Why do you need to know how to install and service it?". Calls
to suppliers have met with even less response.
Hope you can be of assistance. By the way, what happened to my
June and July issues?

Our Response.

Dear Charles,
Thanks for your interest and your contributions.
Your letter raises some interesting questions. At first, we were
certain that the answers would be simple to find in our
well-organized (What a Lie!) library, but we find that we do not
have a definite answer to your questions.
So this is a plea to our readers -- if you know the answers or
can provide the references needed, please send them to us, and
we'll pass them along.
Further, we're listing some names and addresses of possible
sources of the information that you need:

AT&T Commercial Sales
POB 19901
Indianapolis, IN 46219

Bell System Catalog of Publications
Publishers Data Center
Bell Communications Research
Box CF38, Pratt Street Station
Brooklyn, NY 11025

GTE Automatic Electric Inc.
400 North Wolf Rd.
Northlake, IL 60164

ITT Telecommunications Corp.
Box 831
Corinth, MS 38834

National Technical Information Services
5285 Port Royal Rd.
Springfield, VA 22161

National Telecommunications & Information Administration
Department of Commerce
Washington, DC 20230

Rural Electrification Administration
4051 South Bldg, USDA/REA
14th & Independence
Washington, DC 20250

Western Electric Commercial Sales
Box 20046 Greensboro, NC 27420

Western Electric Company
IDC Commerial Sales
Box 26205
Indianapolis, IN 46226

Stangely enough, the Rural Electrification Administration has
many publications on telephone communications, but their catalog
is out of print, and they don't know when they'll have the new
one out. (We've been waiting for about three months.)
With regard to your question about the missing issues of COMSEC
LETTER, all we can say is that we got behind, but we're catching
up. This is the September letter, and is being mailed in October.
We hope to get the October letter out before the end of the
month, and to be back on schedule in November. Please hang in.
Ed.

SEMINARS
The National Crime Prevention Institute of the University of
Louisville has an extensive seminar program. They are heavily
oriented toward law enforcement and crime prevention, but they
occasionally offer something in our field. (In fact, the report
"Security Applications of a Spectrum Analyzer" is one of the best
sources of information on TSCM that we have ever seen; and it was
presented at one of their conferences.) NCPI, UOL, Louisville, KY
40292.

CORDLESS TELEPHONES, ANOTHER PROBLEM
Several new products have appeared on the market under "Part 15"
FCC specifications. They are small, low-powered tranceivers and
they use the cordless frequencies 49.830, 49.845, 49.860, 49.875,
and 49.890 MHz. The potential problem to cordless phone users is
that they may interfere with phone calls. So, if you use a
cordless phone, don't be surprised to hear more than the other
party to your call.
We are reminded by a clipping provided by Roger Breslow that
cordless phones have a much more serious problem than
interference, and that is that some of them can cause permanent
hearing loss if held to your ear while a ring signal is being
received.
So the tally on cordless phones is:
1. Eavesdropping on your conversations is easily
accomplished,
2. You may be interfered with by a $9.95 tranceiver, and
3. You may be permanently deafened.
We wonder why anyone uses 'em.

HERE IT IS AGAIN
In PC Magazine Steve Metalitz, staff director of the US Senate
Judiciary Subcommittee on Patents, Copyrights, and Trademarks
(which has jurisdiction over privacy legislation) is quoted as
expressing his concern about the privacy of data transmissions,
saying, "If they've never been in voice form, they're not
protected by the wiretap law."
We have commented on this misconception before, but this person
certainly should be an authoritative source. So we went back and
read the law again, and still cannot find the word "voice"
anywhere in the law.
So again we say: EVERYTHING transmitted over wires is protected.
The law defines interception as "aural acquisition" and aural
acquisition of the tones used to transmit data is possible.
No, the person hearing those tones will not understand the
message -- but the law says "aural acquisition"; it does not say
anything about comprehension. The analagous situation would be
the tapper hears a voice conversation in a language that he does
not understand. Aural acquisition has taken place; comprehension
has not. A wire communication has been intercepted according to
the law, and wire communications are covered by the law.
Yes, the law could be improved. Yes, it should be improved.
What is your opinion?

SPREAD SPECTRUM
The FCC recently authorized various uses of spread spectrum
modulation techniques. In one action they authorized hams to use
spread spectrum; and in another, they authorized spread spectrum
modulation in the Public Safety, and Industrial, Scientific and
Medical Services bands.
If the equipment becomes popular, the buggers are going to learn
how to use it, and the debuggers are going to have to develop new
equipment and techniques.

C'MON, LET'S COMMUNICATE!
We don't know about the rest of the country, but in DC there
have developed some vexing, and sometimes potentially dangerous,
lapses in communications due to uneducated uses of our language
to convey numbers during voice communications.
The vexing bad habit is to state a zip code by saying, for
example, "two thousand nine". What the sayer means is "20009",
but what he actually says is "2009", and that is really not
important -- just confusing.
However, on our scanner we heard a very serious communications
failure when a DC ambulance went to "115" because the dispatcher
had said "one hundred fifteen" for the street address, "10015".
Now that is a serious breach of communications, in our opinion.

COMSEC EXPO '85
Y'all come! Comsec Expo '85 is shaping up. TSCM, voice
scrambling, message enciphering, big brother, hackers, and many
other subjects will be covered during the eighteen panel
discussions.
Every panel will have knowledgeable panelists representing
differing points of view, so you'll have an opportunity to hear
the different sides to the issues that you are interested in.
Some real TSCM (Technical Surveillance Countermeasures --
debugging) professionals will display and demonstrate real
equipment, and you'll hear horror stories about the unqualified
charlatans -- the "magic wand" operators. Simple and complex,
analog and digital scramblers will be covered -- technical
explanations as well as considerations relating to tradeoffs in
hardware selection. You'll also be made aware of why so much
excellent scrambler equipment is not used by the executives for
whom it was procured. Details of the first ever "Secrecy Order"
from NSA and the aftermath of this government suppression of a
privately-developed scrambler will be covered. You'll be able to
hear discussions of encryption methods from the Caesar Cipher to
the RSA algorithm. We expect a lively discussion on why the
government approved DES uses a key which is 56 bits in length
while hackers (private individuals) use 800 bit keys. The impact
of various new government directives will be discussed in detail
by affected industry representatives and sponsors in government.
Exhibitors have begun to find out about the Expo despite our late
start, and you'll find many products and services of interest.
For information write to: COMSEC EXPO '85, POB 868, Frederick,
MD 21701, or call Tammy Brock at 301-662-9400.

COMPUTER SECURITY PUBLICATIONS
Available from NBS: Publication List 91, Computer Security
Publications. Contact: Institute for Computer Sciences and
Technology, NBS, Gaithersburg, MD 20899.

GOOD BOOKS ON COMMUNICATIONS TECHNOLOGY
Texas Instruments has published a series of books called the
"Understanding Series". We haven't seen them all, but, based on
the excellence of the first one we bought, we'll recommend them
all. TI, POB 225474, MS 8218, Dallas, TX 75265.

20-20
In our YOGO 1.01 issue, we mentioned an interesting ad in
Security World which asked for details of actual illegal
surveillance cases. If you watched the segment on eavesdropping
on the 20-20 television show, you saw a part of the product of
the young lady who ran the ad.

HARRASSING PHONE CALLS
One of our readers called to ask if we could design a device
which could be used to blast the eardrums of a harrassing caller.
We haven't begun that design because we think that the phone
system would limit the sound level at the receive end, but we
haven't done any tests to see if that is true. Because of our
overload, it didn't look like we'd get to that project for some
time, so we told him what we do when a caller doesn't identify
himself, or talk, or get off the line -- we hit the redial button
on the phone which caused a fast, evenly-spaced series of tone to
go out over the line. Seems to work. Our theory is that it's a
kid on the other end, and hearing tones like that, he thinks it's
some special system for tracing the call.
Menwhile, we think we have a good approach to a piece of
hardware which could help. We'll work on it, and keep you
advised.

INTERESTING NAMES ON OUR MAILING LIST
All American Associates is, of course, headed by Jack Armstrong.
(Young folks are excused if they don't understand.)
How 'bout a company name, "Windforce"? The man who used that
name in correspondence with us, does not have a telephone
business listing under that name, nor does he have a personal
listing under the name that he signed. Oh Well. It takes all
kinds.

HACKERS AND CRACKERS
Cap'n ZAP (Ian Murphy) defines these terms this way: A Hacker is
a person who hacks away at a program, removing errors and bugs,
until he finally either gives up or makes the program work.
A Cracker is a person who cracks into a computer (gains access to
its stored information) without benefit of any prior information
as to the computer type, operating system, privacy protection
measures, etc.

MORE ON ELECTRONIC TECHNICIAN CERTIFICATION
In addition to the certification programs mentioned in earlier
letters, there is an association, International Society of
Certified Electronics Technicians, which awards certification in
various specialties. ISCET, 2708 W. Berry St. #3, Ft. Worth, TX
76109.

JUST WHAT IS A FRAUD?
Last year an ad offered gold coins for sale, and the telephone
number to call to place an order was 1-800-USA-MINT. The person
who answered the phone did not want to give us a direct answer,
but, after prolonged weaseling, admitted that it was a private
company not associated with the US Mint or any other part of the
government.
At the same time Seequa Computer Corporation was running an ad
with a headline which said "Seequa shows you how to get an IBM PC
for just $1595".
We do not see any attempt to defraud in the second ad because it
was run in a magazine read by a computer-using audience, it
showed a picture of a Seequa computer, and the text plainly said
that they were offering the Seequa computer for sale and that it
does everything that an IBM does.
That first ad, though, makes us wonder. Was there a deliberate
attempt to make the reader think that he was dealing with the US
government? Did people place orders thinking they were buying
coin of the realm?

MORE ON THE LAWS
If you are engaged in what you think is a private conversation
on a public street, you have no Fourth Amendment right to
privacy. That was the ruling in United States vs. Lopez, US
District Court for Connecticut, H-84-31, 6-7-84.
So we're back to the question of whether an individual has an
expectation of privacy, and this court thinks that you have no
expectation of privacy on a public street. Seems reasonable.

PUBLICATIONS
The publications which are offered by this firm are copies of
articles in the public domain, contributed articles, and some
original work by your editor. The objective in offering these
publications is to be a source of good information on this
technology. We are not trying to get rich by offering these
items, in fact, handling them takes a lot of time. So please
don't be offended when we ask for payment in advance. Our
experiences a few years ago led us to the conclusion that that is
the only way to go. Billing a company or government agenciy for a
few dollars was simply not worth the time. Also, we accepted
occasional COD orders and handled them for a while. However, that
went sour because orders were refused, meaning that we had wasted
our time and money to package and ship.

NEWSPEAK
Sign above the door of an office on the first floor of the
Philadelphia city hall:
"Room 143
Mayor's Office for Sexual Minorities"
Anyone who can define "sexual minority" is invited to mail it
in, and if it's printable, we'll print it.

CNA
Don Peterson of Minneapolis mailed us a copy of a flier which
describes the CNA service now available in Minnesota, North
Dakota, and South Dakota. To access the service call
402-580-2255. the charge is 50 cents and you can get two listings
per call. No non-published number information will be available.
Don's information also says the booklet, "The Changing World of
Telecommunications", can be obtained free by calling
800-342-4242.

MODERN INTERPRETATION NEEDED?
We think that our legislators (and jurists) should be
considering the First Ammendment implications with regard to
material on computer bulletin boards. The writers of that
ammendment intended to ensure freedom of the press, and they did
a good job. At the time that they wrote it, they were thinking of
the press as only Newspapers, but interpretations have also
extended protection to radio and television. Should not
electronic bulletin boards also be covered?
What do you think?

TOUCHSTAR
Southern Bell in Orlando and Bell Atlantic in Harrisburg are
offering a new package of services under the name Touchstar. If
you subscribe, you can select numbers from which you will not
accept calls, give selected callers a distinctive ring, call back
the last person who dialed your number, or determine the calling
number of an incoming call. Sounds great!



October, 1985

CCS
Well, CCS, Ben Jamil, and Carl Lande made the Washington Post
recently. Big article in the business section. (Send SASE if you
want a copy.)
For those in our readership who are not familiar with this
company, let us list some of the claims made by them over the
years:
"....eliminates illegal bugs and taps permanently." "Through an
electronic breakthrough, this advanced miniature device enables
you to detect hidden "BUGS" wherever you go." "Automatically
screens out illegal wiretaps now on your phone or lines...or
which may be added later." "New, automatic telephone bug detector
quickly and thoroughly detects wiretaps on your telephone line or
in the instrument itself." "This compact, ultra sensitive
instrument gives you an immediate warning when someone wearing a
bugging device enters the room." "It checks both telephone sets
and lines for irregularities up to 10 miles and then not only
reveals an eavesdropping device but helps pinpoint its location."
"Crammed with electronic circuitry, this compact,
battery-operated unit sweeps a room and warns you by a visual or
audio signal of the presence of a hidden microphone or other
recording device." "....remarkable miniaturized device...that,
with a mere turn of a knob, automatically renders any illegal
wiretap, present or future, totally inoperable."

TAP DE

  
TECTION
In the YOGO 1.07 issue (July, 1985) of this letter we used a
significant amount of space to expound on the theme that there is
no electronic device that can detect even a simple tap on a
telephone line. Reflecting on some of the claims made by CCS
(elsewhere in this issue), we feel obliged to make it clear that
all of the electronic instrumentation that we are aware of is
incapable of differentiating between a court-approved tap and an
illegal tap. In its claims, CCS seems to be trying to emphasize
that their equipment can tell the difference between a legal tap
(or a law enforcement tap) and an illegal tap. Maybe they're
trying to keep law enforcement people from getting upset with
them -- by assuring law enforcement that their equipment will not
detect their taps. Interesting.

ASIS SEMINAR AND EXHIBITS
We think it is ironic that, at the ASIS Annual Seminar and
Exhibits in Dallas, we were passing out complimentary copies of
our July COMSEC LETTER which contains a feature explaining that
there is no electronic device that will detect even a simple tap
on the phone line; and, a few booths away, Winklemann
International was handing out literature claiming "Complete
protection against wiretaps". No, they were not touting
scrambling equipment or other methods of securing communications;
they were talking about an analyzer which, in their words,
"...performs scientific tests which enable it to factor out
innocent variations of electrical characteristics, so you can
determine with confidence whether your telecommunications lines
are clean."
Obviously, either our article is wrong, or their claims are
wrong.
What do you think?

Q & A
In addition to questions which have come to us by mail, some of
the questions related here were asked during our briefing of the
Tidewater Chapter of ASIS. [The first one was asked anonymously
(passed on by the meeting organizer), and it gave us the
opportunity to start that meeting with an answer to a question.]
Q. Why did you prostitute yourself to develop the Superhound and

offer it for sale?
A. Good question. First let's explain the reason that the
Superhound was developed, and then let's talk about prostitution.

A couple of years ago we were hired by a Fortune 100 company to
brief some of their engineers and technicians on our specialty.
As we usually do, we pointed out several times on the first day
that broadband detectors (field strength meters, etc.) are not
sensitive enough to detect a very low power transmitter like the
Radio Shack Wireless Microphone. During the demonstration of the
spectrum analyzer on the second day, we could see room audio on
one of the signals on the spectrum analyzer, so we checked very
carefully to be sure that all of our test transmitters were
turned off. Room audio was still obvious on the signal on the SA.
Finally, one of the technicians said, "I guess you know what
you're talking about", and he reached under the table and pulled
out a Radio Shack Wireless Microphone.
After checking to be sure that his transmitter was turned off,
we could still see room audio on the signal on the SA. More
discussion ensued, followed by the same technician reaching under
the table to pull out a second transmitter, tuned to the same
frequency as the first.
So the technicians had put the engineer to the test. He passed,
so he became OK in their eyes.
Last year, the same company again contracted for a briefing of
some other engineers and technicians. This time they were more
direct. They had heard that the first group had hidden two
transmitters, so they hid four and challenged their instructor to
find all four. One of them 'volunteered' to carry the 30 pound
analyzer, and aided by the signals on the screen and the snickers
from the group, we eventually found all four transmitters.
The upshot of that experience was a realization that the
analyzer is an extremely valuable tool to determine that an
illegitimate transmitter is on the air, but is not a good tool to
locate the transmitter.
Therefore, we set out to develop a broadband transmitter
locator, and the Superhound is the result.
Have we prostituted ourselves? Not really. Not any more than the
person who goes to work each day even though he can't stand his
job, or his boss, or whatever. He's engaged in something that he
does not like in order to earn money, and that could be called
prostitution. On the other hand, we thoroughly enjoy our work and
had a good time with the design and development of the
Superhound.
We designed and built a needed product. We advertise it as a bug
locator, not as a primary tool for bug detection. In this role
the Superhound is the best of the broadband units on the market
-- by actual test it has outperformed units selling for many
times its price.
As a matter of fact, its operating instructions say that we
recommend that it be used with an instrument with adequate
sensitivity and tuning range such as a spectrum analyzer.
Why does it have a bunch of lights instead of a meter? It has
lights because that's what people want. The winkin' and the
blinkin' is what sells; and, after all, our objective is to make
money.
We plead not guilty to the charge of prostitution.

Q. Will you refund the fee you charged for countermeasures if
someone else finds a bug after you leave?
A. No.
First, we're very confident of our ability to find whatever is
in place while we are working. That's not just idle braggadocio;
we have a track record. We're very confident.
Second, how do we know what has transpired since we left? How do
we know that the "finding" team was not the "placing" team?

Q. What do you charge for expert testimony? Not just testimony.
You have evidence of a breach of communications, you preserve the
evidence, bring it to court, etc. How much do you charge?
A. Our fee for a TSCM manager or senior engineer is $200 per
hour. That applies to all preparation time, travel time, waiting
time, etc. (The only exception is when extended travel is
involved; then we charge only four hours during each day of
extended travel.)

Q. That's not enough. You should charge much more.
A. That's all we charge.
Maybe, if we were involved in a criminal case that involved
keeping detailed written and photographic records, a chain of
custody records, etc, we'd have to charge much more.
Our experience, though, is that our commercial clients are not
interested in pursuing civil remedies after they discover that
their privacy has been breached. Among the reasons that they are
reluctant to sue their enemy are: the immense difficulty in
proving who did it, the adverse effect that public dislosure
would have on public confidence in the company and on the value
of its stock, and the perfectly human reaction of wanting to keep
such embarassing information quiet. Further, some of our clients
are very prominent, and they are wary of that kind of publicity.
The major "finds" that we've been involved with all resulted in
no publicity whatsoever, and we're not going to "leak" anything
because we intend to preserve our reputation.

Q. What are the cordless telephone frequencies, and what type of
monitoring device would be adequate to scan those frequencies?
A. The new cordless frequencies are:
Channel # Base Frequency Handset Frequency
1 46.61 49.67
2 46.63 49.845
3 46.67 49.86
4 46.71 49.77
5 46.73 49.875
6 46.77 49.83
7 46.83 49.89
8 46.87 49.93
9 46.93 49.99
10 46.97 49.97

As to the type of device you would want to use to listen in on
these frequencies, you used the right word in your question; you
would probably choose a modern scanner. There are many good ones
on the market, and they are much lower in price and easier to use
than a surveillance receiver. Be sure to get a modern scanner
with a synthesizer, and not one which requires crystals. Also,
check the frequency coverage; some of the manufacturers leave out
coverage of some of the interesting bands.
If you don't know where to turn to find this equipment, drop a
note to Monitoring Times, 140 Dog Branch Rd, Brasstown, NC 28902;
and we're sure that editor Bob Grove will send you a sample copy.


PRIVACY GUARANTEED!
Remember when Cose Technology first ran the ad with that
headline? Sure got a lot of people's attention. Now we have
companies like American Express, XEROX, and Gulf Oil all selling
the Phone Guard from Cose Technology and saying that it will
protect you from telephone taps.
Interesting legal question. If you buy it and rely on the
seller's claims, and somebody taps your phone, steals your
secrets and puts you out of business; can you sue the seller for
damages? Simple fact. Phone Guard will not detect even a simple
tap.
'Nother question. Why do companies with international
reputations to protect make claims without making even a small
effort to find out if those claims are valid?

OUR INTERESTING LANGUAGE
When someone engages our professional services, we call him a
client. He pays us. We perform some service for him.
Social workers call welfare recipients "clients". In that case
the client doesn't pay; he gets paid. And nobody performs any
service for anybody. Oh well.

YOGO
During the first year of publishing this newsletter, we began
numbering its issues with a coined word (actually an acronym),
YOGO. When no one inquired as to the meaning of that strange word
we challenged readers to guess its meaning, and Dennis Steiauer
of NBS was the winner, saying, "Considering the content and
flavor of your letter it has to be Year Of George Orwell".
YOGO continues in the masthead as your editor's way of trying to
remind you of the messages in George Orwell's books. If you have
not read them, we urge you to drop in to your public library, and
get started. As you read, think about the events that you see
happening in this world and this country today.
George Orwell saw the future, and wrote about it with amazing
clarity. He saw Newspeak and Big Brother coming, and all of us
should take heed and be watchful. (See our segment on Big Brother
elsewhere in this issue.)

BIG BROTHER
A seer, commenting on hackers and crackers in a recent
publication, said:
"What I can forsee is a Government examination on the use of
computers before you're allowed to use one. An examination that
goes into the do's and don'ts so that if you elect to violate the
law and get caught, you won't be able to say "Hey! I didn't
know." And I can see much tighter controls on modems too, with
Government agencies freely tapping in to monitor and dropping in
on violators to confiscate their equipment."
The seer is Byron G. Wels, editor of Computer Digest. Yes, the
very same one who called hackers morons, thieves and criminals in
earlier editorials (COMSEC LETTER, YOGO 1.08).
This man certainly has some interesting ideas. We're especially
impressed by the fact that, every time he used the common noun
"government", he capitalized it -- not all nouns, just that one.
We think someone who thinks like this deserves a forum, and he's
been invited to participate in a panel on hackers during COMSEC
EXPO '85, December 17 & 18 in Washington, DC.
Considering the fact that representatives of government and
industry will be participating, along with some hackers, Mr. Wels
will have an excellent chance to expand on his ideas. He could,
for instance, outline what kind of training each of us will need
before we take that examination before we qualify for a
government permit to use a computer. He could be more specific as
to who must pass the exam. Will it be all operators including the
kindergartners who play games on their families' Commodores? Will
all operators of all main frame terminals be required to pass his
exam in order to retain their jobs?
Of course, the one thing we're most anxious to learn about is
"Government agencies freely tapping in to monitor". Mr. Wels can
explain to us what he intends to do about our Constitution so
that his Thought Control agents will not be hampered in their
activities. And, last but not least, Mr. Wels can explain the
definition of "violator" so that we'll all be able to understand
what it is that is being transmitted over telephone lines that
characterizes the sender as a violator.
P.S. He has received an invitation, and has agreed to appear on
the Hackers and Phone Phreaks panel. We're looking forward to it!


ANI
Stewart Glickstein has passed along some more ANI information
which we pass along to you. First, he calls the service
"Annabelle", or maybe it's spelled "ANIBELL'. Anyway, he says to
use the service in most parts of Florida you dial "200" or "300"
(sometimes a "1" is needed first) and seven digits.
Thanks Stewart.
Anybody else have anything to pass along?

CONVENTIONAL WISDOM
Recently we looked through some of the literature which is sold
to provide information on this technology, and, as usual, we were
appalled. One Rube Goldberg circuit had twelve or fifteen
components in it and performed the function of a single-pole,
single-throw switch (which, of course, was included in the bunch
of components anyway).
This particular book made a great thing about emphasizing the
need for "impedance matching" when connecting to the telephone
lines. Hoo Boy! It even showed a "matching transformer" matching
900 ohms to 900 ohms!
For any reader who is not versed in electronic theory, let us
just say that the idea that it is necessary to match impedance
when tapping a telephone is a lot of hokum. Yes, we're aware that
comment flies in the face of a lot of what has been taught to
government technicians; but it is, nevertheless, true.
Someday we'll prepare an essay on impedance, and impedance
matching; but, for now, let's just say that when you tap a
telephone line you want an impedance mismatch of the highest
order.

LETTERS
W. Bonham of Central Wisconsin Detective Agency in Wausau
responded to our comments on the use of freon as a letter bomb
detector in our YOGO 1.08 issue.
"I would like to offer, from my experience, the benefits and
caveats of utilizing freon. On the positive side, the process of
using freon in a spray method on letters is beneficial, but the
saturation is extremely difficult and is somewhat hazardous as
exposing your skin to a 'freeze burn'. The amount of saturation
is also important, as not enough freon in an area over a letter
will not allow a very good view, and it evaporates so quickly
that it diminishes the exposure of the contents of the letter.
"Some of the negative aspects of using freon on letters are that
some envelopes contain a double inside which, even with the use
of freon, will not allow the person to see what is inside the
letter.
"Concerning the use of freon on a package, I doubt whether this
is feasible at all, unless the package was submerged totally in
freon, and I don't know how an individual would do that.
"Again, speaking from my experience, in case of a suspected
package, probably the safest avenue to pursue would be to have it
X-rayed.
"Again, even handling the suspect letter or package could prove
to be hazardous in itself."

COMSEC EXPO '85
Mark your calendar. Sheraton Washington Hotel, December 17 & 18,
1985. Two days of panels, demonstrations, and exhibits relating
to Industrial Espionage Countermeasures, COMSEC/encryption, and
Investigations Technology. All aspects will be covered including
physical and electronic access control and security, tradeoffs in
equipment capabilities, government-industry interface, sources of
information and equipment, and many others. Demonstrations will
include hackers, computer bulletin boards, and data base
utilization.
Panelists are qualified, and each panel has been balanced so
that you'll hear differing points of view.
This is the first annual meeting of the Communications Security
Association, and it looks like it will be a dandy!

TO PONDER
"The Moving Finger writes; and, having writ, moves on; nor all
your piety nor wit shall lure it back to cancel half a line, nor
all your tears wash out a word of it."

TECHNOLOGY THAT WILL NEVER BE ACCEPTED
In IEEE SPECTRUM, under the heading "No more fish stories" is a
report of a computerized fishing pole. Microprocessor controlled,
the system measures things like the pull on the line and the
bending of the pole. Properly calibrated, it will report the
weight of the fish caught and the length of the fight to bring
him in.
Some fish story.

MORE WORDS
IEEE SPECTRUM offers some new words to add to our vocabularies.
With reference to telecommunications they tell us that if POTS
stands for Plain Old Telephone Service, PANS should stand for
Pretty Amazing New Services.
They also enhance our knowledge of language used in banking
circles by explaining that POYs are Parents of YUPPIES, GUMs are
the Great Unwashed Masses, and HICKs are Hobbyists and Inner City
Kids who make up about one third of the active modem users.
(Banks are concerned about what the HICKs might do to them -- and
they should be concerned.)

LET'S VOTE
In a recent letter in IEEE SPECTRUM the writer points out some
of his pet peaves in spoken technical language. One of those is
his assertion that giga (as in gigaHertz) should be pronounced
with a soft "g", as in gigantic. He may be precisely right, but
we'll stick with the hard "g". We just can't imagine someone
saying, "That signal is on 2.2 jigs."
We also like the way our techs refer to picofarads as "puffs",
and we intend to continue to use "gigs" and "puffs" because their
use, in our opinion aids communication.
What do you think?


November, 1985

EDITORIAL: SHOULD WE CHANGE THE NAME OF THIS LETTER?
This is the next to last issue of the second year of COMSEC LET
TER. During these two years, we have tried to present balanced
material on good communication and on the protection of communica
tions. However, one thing has become apparent during these two
years: we cannot separate communication from information from com
puters from communication. They are wound in a tight bundle, and
we believe that we must address all of these areas if we are to
properly provide privacy protection guidance/advice/leadership.
In this regard, the first annual meeting of the Communications
Security Association, dubbed COMSEC EXPO '85, generated
additional comments relating to the name of the association and
to the name of the show. These comments were triggered primarily
by the fact that "COMSEC" is a word that has been used by the
military for a long time, and it has come to mean a very specific
segment of the whole area of protection of privacy. This letter
and this associa tion, on the other hand, address the overall
field of protection of privacy. That is, in addition to
communications, we're also interested in protecting data in
storage and data in transit.
Accordingly, we're thinking of a name change.
CIC SECURITY comes to mind. CIC, of course, to many of us means
Counter Intelligence Corps and that would lend a certain air of
mystique to the publication. Seriously though, the letters stand
for Communications, Information, and Computer. Maybe C.I.C. or
C2I could be used. Maybe some other combinations are better.
How about "Privacy Protection Letter? Protection of Privacy Let
ter (POPL)?
We're reasonably sure that we don't want to call it the Computer
and Communications Security letter (CCS LETTER, for short).
Maybe we should just stay the way we are.
Maybe we'll announce another contest.
Please call or write with your ideas.

WELCOME
Welcome to all who joined the Communications Security
Association at the COMSEC EXPO '85 conference. (A part of your
attendance fee paid your first year's dues in CSA, and a
subscription to this newsletter is one of the benefits of
membership.) We hope that you'll find the letter informative and
useful, and we hope you'll send us your comments. Your editor
likes feedback. (Read the FEEDBACK segment in this issue for an
example.)
As a new reader, you'll probably immediately react to the fact
that the November letter is coming to you in January. Well,
that's right. Your editor got involved in too many things and
this letter fell behind schedule. We hope to be back on schedule
in January, and we have confidence that we'll be able to do it.
Stay tuned.


COMSEC EXPO '85
General
Looking back, we don't really understand how a few volunteers
and Galaxy Conferences managed to put on such an event with so
little time for planning and promoting.
Yes, of course there were many glitches and communications
lapses, but let us quote one of the exhibitors: "It was a good
show. Sure some exhibitors will gripe, but don't pay any
attention to the naysayers. We were prepared, and we did well.
We'll be back next year for sure." Overall, the consensus seems
to be that it was an outstanding meeting for a first meeting.
The one common gripe (which is really a nice compliment in a
way) was that the people attending the panel sessions did not
have enough time to spend in the exhibit area. They wanted to
visit the exhibits thoroughly, but found they could not decide on
a panel to skip to make time for the exhibits. In fact, the most
frequently heard comment was praise for the quality of the
panelists, and the quality of the audiences. Panelists were true
experts with the ability to organize their thoughts and to
articulate them well. Questions from attendees were thoughtful
and indicated a high level of understanding.
Volunteers
The volunteers, whose great efforts in planning and managing
assured the success of this show, are:
Program Chairman: Tom Simpson
Track Chairmen:
Track I: Bob Bryant
Track II: Ric Blackmon
Track III: Jack Reed
Special: Paul Bowling
Panels
One of the panels that your editor participated in was the Title
III panel, and during that session we were treated to an analysis
of the laws relating to eavesdropping and recording by Barbara
Ann Rowan. She did an excellent job, and many favorable comments
were heard from the attendees. (By the way, the updated version
of Bar bara's book, "Handbook on State Laws Regarding Secretly
Recording Your Own Conversations" will be available Jan 31 from
Independent Hill Press, POB B37, Alexandria, VA, 22314. $15.00.)
The other panel that your editor participated in was the
two-part affair on technical surveillance countermeasures. Again,
comments by the attendees were very complimentary. From the point
of view of the panelists, we all were impressed with the level of
knowl edge of the people asking questions.
Many folks have commented on the Hackers and Computer Crime pan
els. We've heard that the different points of view expressed were
well and forcibly expressed and that the panelists really got
everyone's attention. -- What different points of view, you say?
Well, we heard that Byron Wels took the position that hackers
should be locked up in prison, and that the hackers disagreed.
Your editor heard only the end of the computer crime panel, and
thoroughly enjoyed the contrast between George Caldwell (Bell
Atlantic Security) and Ian Murphy (Captain Zap); and especially
appreciated the depth of knowledge and professionalism of both
men.
Feedback on the panel on modern telephone systems again was very
positive as to the competence of the panelists. We understand
that modern systems were well described and that they also
discussed the Horizon, Dimension, and Merlin possible weaknesses.

The panels in the Investigations Technology Track were well
attended, and generated a lot of comment. Jack Reed, who was in
charge of that track as Track Chairman, suggests that each panel
ist should have at least 30 minutes next year for his presenta
tion.
Jack also suggests two panels on optical surveillance next year.
He especially suggests more hands-on demonstrations. (We're all
in favor of that. In fact, that was one of our guiding principles
when we defined this conference, namely a minimum of theory and
conjecture and a maximum of practical, down-to-earth nuts and
bolts information. Unfortunately, a lot of the material which was
prepared to guide the panelists was never provided to the panel
ists so each panel chairman was pretty much left without guidance
as to ideas, thrust, and desired content.)
Those people who attended our bonus sessions were laudatory
about what they had seen. Unfortunately, our communication system
left a lot to be desired, and many people were not aware of
everything that was available to them. Paul Bowling was in charge
of the "Special Track" (bonus and early bird sessions), and he
has sug gested some techniques and some equipment which can be
used to make the computer screen information more accessible to
more people next year.
The early bird sessions also suffered due to our lack of good
communication to the attendees. Actually, they were open to every
one, including those who registered for exhibits only, but that
word just didn't get out to everyone.
Exhibits
We noted that traffic in the exhibit area dropped off in mid-
afternoon, and we attribute that to the preponderance of local
people attending the exhibits only -- and, of course, they want
to miss the awful evening traffic rush if they can. Next time
we'll offer something special for them to try to hold them a
little longer so that they'll be tempted to wait until the
evening rush hour has tapered off.
Also, we will be allowing more time for conference attendees to
visit the exhibits.
One of the most popular exhibits was a simulated "shoot out"
with loud sound effects. (It was popular with everyone but the
adjoin ing exhibitors, that is.)
CSA Organization
The Communications Security Association hosted a luncheon for
members at which a start was made on assignments to various
organizing committees. Arnold Blumenthal is in charge of getting
things underway and is looking for help on the membership,
activities, by-laws, and local chapters committees. If you'd
like to get involved, call or write. Much help is needed. You
can reach Arnold at PTN Publishing Company, 101 Crossways Parkway
West, Woodbury, NY 11797. 516-496-8000.
Next Year
Plans are underway for next year's meeting, and your comments
are solicited.

TYPOS THAT GOT INTO PRINT
It's really embarrassing -- especially when you consider that
this is a letter dedicated to communications security, with heavy
emphasis on the need for creating good communications before
expending effort to try to protect those communications.
Boy, have we let some typos slip through!
We wrote: "now being defined" (relating to a new seminar
offering); we printed: "not being defined".
Last month's error is even worse.
Somehow an errant "not" found its way into a sentence relating
to impedance matching; and, of course, made the whole sentence
wrong. Let's try again. It should have read:
"For any reader who is not versed in electronic theory, let us
just say that the idea that it is necessary to match impedance
when tapping a telephone line is a lot of hokum. ... when you
tap a telephone line, you want an impedance mismatch of the
highest order."
More on this in a technical essay later; but, for now, apologies
to all who wondered.
There is no mystery in how these things get through. It's
simple; your editor is the world's worst proofreader. However,
all is not lost. Somehow we're going to lick the incompatibility
problem between our computer and the computer in the firm that
does our typesetting. After that problem is taken care of, there
will no longer be a need for all of our material to be
rekeyboarded -- whatever exists in our file will be transmitted
electronically to their equipment.

FEEDBACK
From Jim Samuels:
"Dear Security Ass,
I would love to go to your COMSEC '85, but you sent me the info
5 days before the date to be there. I have no time to set up air,
time off, mail payment, etc. Please, if you are going to have
something, give me more than 5 days notice.
Our answer: Of course, Jim is right. He should have had many
MONTHS of notice before the date of the event. To anyone who was
disappointed by our late notice: our apologies. It was not by
design. We tried to do too much too fast, but we had a good show
despite our late start. We promise to do better next year.

COMMUNICATIONS SECURITY ASSOCIATION, MEMBERS-ONLY NEWSLETTER
The Board of Directors has decided that, starting in January,
the COMSEC LETTER will be available only to members.
Subscriptions currently in force will be honored, but no further
independent subscriptions will be accepted. Thus, this letter
becomes the organ of the association.
Membership dues are $50 per year (special rate for students:
$10). CSA, 655 15th St. #320, Washington, DC 20005.

NEW (OLD) FORMAT
To try to catch up we're skipping the typesetting process for
the next few issues, and having the output of our printer
printed. Won't look as nice, but we'll sure get it out faster.
Stand back!


December, 1985

EDITORIAL

In the first two years of publishing this letter we have tried
to provide practical, usable information to assist our readers on
the
road to good communications and the protection of their privacy.
This issue is only 2 pages instead of the usual 4, 6, or 8 pages:
but it may well be the most valuable of all of the letters
because it contains two segments which can be of immeasurable
importance.

First, if you are using, or contemplate using, a Horizon, Dimen
sion, or Merlin telephone system, you should read the segment

entitled, "POSSIBLE WEAKNESSES. DIMENSION, HORIZON, MERLIN".
If the information which has been given to us is true, every
one using one of these systems is in jeopardy. If the informa

tion is not true, it's all a tempest in a teapot. In either
case, as free citizens of a free country, we are entitled to
know the facts.

Second, as free citizens of a free country, we should be aware
of
what our federal legislators are proposing in the bills
entitled "Electronic Communications Privacy Act of 1985".
These bills, if enacted, would remove all protection of oral
communications. These bills, if enacted, would make it a
crime
to receive what is being broadcast on certain frequencies.
These bills, if enacted, would make a shambles out of the law

relating to telephone taps.


POSSIBLE WEAKNESSES. DIMENSION, HORIZON, MERLIN
It is possible that these telephone systems represent the great
est threat to privacy that this country has ever faced.
We have been told that these systems, in some configurations,
can
be reprogrammed remotely. We have been told that a CIA study
details these weaknesses. At present, we are trying to collect
enough information so that we can conduct some tests.
It has been said that one can remotely monitor activity on a spe

cific line by accessing the computer's maintenance line and
giving
it the proper commands. (REMOBS without having the exchange
equipped for REMOBS.) It has been said that it is possible to
turn
on a telephone's hands-free feature by accessing the computer's
maintenance line and giving it the proper commands. It has been
said that by accessing the computer's maintenance line and
issuing
the proper commands, we can cause it to dial a second number
every
time the user makes an outgoing call. If these allegations are
true, these systems represent a horrendous threat.
If any agency of our government has evaluated these systems and
discovered that these weaknesses do indeed exist, that agency has

an obligation to make their findings public immediately.
If these weaknesses do exist, you can bet your bottom dollar
that
some very smart people who don't worry about laws, have already
discovered it, and are using it daily for their own purposes.

ANOTHER THREAT, THIS ONE FROM OUR LEGISLATORS
The Electronic Communications Privacy Act of 1985 would outlaw
almost all radio listening other than commercial broadcasts, CBs,
hams, and a few other categories. This, despite the fact that
when something is transmitted by radio, there is no way to
control who receives it. Congress can pass a million laws to the
contrary, but it cannot change that fact. Propagation of radio
waves is not amenable to control by man-made laws. (And Congress
looks mighty silly even discussing such laws.)
Readers of this letter who are concerned about Big Brother are
urged to check into this situation. Can you imagine that
listening to what has been broadcast on certain frequencies would
be a crime? Supposing you had a not-so-good receiver, with lots
of images, and one of those images happened to be a forbidden
frequency.... There you go, off to jail just 'cuz you had a
receiver which had poor image rejection. (And we wonder how they
think such a law could be enforced!)
Further, in their effort to improve the old law (PL 90-351), our
legislators have removed all protection which had existed regard
ing oral (that is, face-to-face) communications. It used to be
that you were protected from someone leaving a hidden recorder in
your office, or home, or bedroom or whatever; but, if this bill
is enacted, you will no longer have any such protection. Then
there's the old bugaboo, the definition of "intercept". According
to the dictionary, it means to capture something between sender
and intended receiver, thus preventing that something from
reaching the intended receiver. Well, telephone taps do not pre
vent the information being transmitted over telephone lines from
reaching the intended receiver. All they do is to allow someone
to record or listen to the material being transmitted. The tap
does not intercept, it merely eavesdrops.
So our legislators wrote their own special definition of
"interception" into the old law, defining it as the "aural
acquisition" of the material being transmitted. This simply means
that a human hears (with his ears and auditory nerves and brain)
that which is being transmitted. (As a matter of fact, it does
not even specify that a human must "aurally acquire"; could be a
dog or cat or cow or ???) However, this definition was too much
for even the people who wrote it to understand. Now they say
their law does not pro tect data because data is not speech.
Shoot! Data is transmitted out of the modem as a series of tones,
which are in the range of frequencies that can be heard.
Therefore, "aural acquisition" is possible, and so data
transmissions are protected regardless of the mindless repetition
of statements to the contrary.
You should ask your Congressman or Senator to send copies of
this bill(HR 3378) and also the senate version (S 1667). (Also,
get a copy of PL 90-351, because the new bill simply substitutes
words and phrases in place of words and phrases in the old law.
-- Takes a lot of effort to determine just what they intend to
become the new law. D'you suppose they did that on purpose?)

COMMUNICATIONS SECURITY ASSOCIATION, MEMBERS-ONLY NEWSLETTER
The Board of Directors has decided that, starting in January,
the COMSEC LETTER will become the official organ of the
association. Subscriptions currently in force will be honored,
but no further independent subscriptions will be accepted.
Membership dues are
$50 per year (special rate for students: $10). CSA, 655 15th St.
#320, Washington, DC 20005.


← previous
next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT