Copy Link
Add to Bookmark
Report

COMSEC Letter 1988

eZine's profile picture
Published in 
Comsec
 · 25 Apr 2019

  

ComSec Letter

Editor: James A. Ross

YOGO 4

1988





















COMSEC LETTER


The ComSec Letter was started in 1984, The Year Of George
Orwell, by Jim Ross. Initially it was mailed at no charge to
everyone on his mailing list, and it was later offered by
subscription. After the founding of the Communication Security
Association, the letter became its official organ. In 1989 the
association decided to create a new organ, Comsec Journal; and,
in order to minimize confusion, the name of this letter was
changed to Surveillance.

What follows is an edited version of the contents of one
year of the letter. (The letter has been edited to remove
topical, superfluous, and outdated items.)




Ross Engineering, Inc.
7906 Hope Valley Court
Adamstown, MD 21710
Tel: 301-831-8400; Fax: 301-874-5100 January, 1988

TAP DETECTORS, AGAIN

Recently we received a catalog from Sharper Image which
offered a telephone tap detector. The blurb said that 98% of
"phone snooping" is done with low or medium impedance taps, and
that this device has a green light which means your line is
secure. We responded with the following letter to Richard
Thalheimer.

Dear Richard,

Just a short note with some information that might
save you from an expensive lawsuit some day.

In describing a "phone that knows how to keep a
secret" on page 14 of your current catalog, you say
that 98% of phone snooping is by low or medium
impedance taps.

First, in my experience most "phone snooping" is not
via taps; it is accomplished by phone modifications
known as phone bugging. Second, whoever told you that
taps are 98% low or medium impedance doesn't know what
he's talking about. In fact, he probably doesn't even
know what the word "impedance" means! Even a simple
tap, made from a few dollars worth of common electronic
components, presents a very high impedance to the
tapped line.

"Green light means your line is secure." Wow!
That's a powerful claim. Don't you wonder why Bell
Labs, with the best brains in the field, could never
make that claim?

I'm confident that the phone that you're touting can
be easily tapped, and it will not detect the tap. If
you'd like a live demonstration, I'm sure it can be
arranged.

I hope you'll check into this, and respond to this
letter. I'd like to pass your response on to our
members via the ComSec Letter (sample enclosed).

The initial response to this letter was a phone call from a
buyer at Sharper Image. He left a message that he had not yet
heard back from their vendor, but the device was not selling well
so they might drop it anyway.


OBSCENE CALLS COUNTERMEASURES

This subject continues to come up, so let's pass along our
ideas and ask for yours.

First, the new telco service which will allow you to
identify the calling number is in very limited operation at only
a few locations around the country. If you want to find out if
you can subscribe to it, we suggest that you call your telephone
company business office and ask when you'll be getting the
capability.

Now, not having that service, what can you do? Well, I know
one man who solved the problem by recording some of the calls,
and then advising the caller that the tape goes to the police if
the calls don't stop. That worked for him, but the last person
who inquired of me was a state trooper, so his caller certainly
would not be intimidated by a threat to go to the police.

My advice to the state trooper was to get an automatic
dialer, and to activate it during an obscene call. If the caller
is not too bright, he may think that the rapid, machine-made
signals are automatic trace signals especially if you say some
words to imply such.

Anybody got any good ideas? I don't think a loud noise will
help because I don't think it will pass through the telco
equipment end-to-end at its original ear-splitting level.


SPOUSAL EAVESDROPPING

Boy, talk about response! No sooner had the last ComSec
Letter hit the mail, than we had a call from member Nick
Beltrante informing us that he had mailed a copy of the decision
on the spousal eavesdropping case. Our thanks to Nick, and
here's the story.

It seems that the husband suspected his wife of extramarital
affairs, so he installed a system to automatically record all
calls. He got the proof, and confronted her. He caught her
(electronically) a second time. He divorced her, and she sued
him citing the federal eavesdropping law.

The judge in this case found conflicting precedents. He
chose the precedent in which husband and wife were living
together in the same household and no third party was involved in
the taping of the calls -- as was the situation in the case
before him. In the earlier case the ruling was that marital
cases traditionally are not tried in federal courts. Further,
exhaustive search of the legislative history could find no
indication that the drafters of the federal law meant for it to
be used in domestic conflicts.

Again, our thanks to member Beltrante for sending along the
information. The newspaper story that we had quoted was correct.
A federal judge did rule that federal eavesdropping laws do not
relate to domestic cases in certain circumstances.


CORRECTION

Just last month we passed along the new address for the Bell
Labs RECORD, but now we find that it is no longer published. The
new publication is AT&T Technology, and four issues cost $40.00

Sorry for any confusion we created.


HOW MUCH DECEPTION IS ENOUGH?

We just received a promotional piece from Dictaphone. It
looks very much like a Federal Express overnight letter. It's
smaller, but laid out the same way with the delivery instructions
typed on a form that looks like the Fedex form, and contained in
a transparent pocket on the carrier just like Fedex. One side of
the carrier says, "Jet Express" "URGENT LETTER ENCLOSED".
Overall, it is a strong effort to make the recipient think he is
receiving something that was important enough to warrant spending
about fifteen dollars for overnight delivery.

Unfortunately however, the information on the delivery form
gives the hoax away; it says, "Bulk Rate US Postage Paid,
Richmond, VA, Permit #936". He didn't spend fifteen dollars to
get it to me overnight; he spent twelve and a half cents or less
to get it to me within a few weeks or months!.

Now, we know that people who mail to rented lists want to
encourage you to open and read their offers, but this seller is
contradicting himself when he labels his piece "Urgent Letter"
and sends it bulk rate.

My personal reaction to this is that I don't trust Gordon F.
Moore who sent it to me. He tried to fool me once; and I think,
if I start talking to him about buying his product, he'll try to
fool me again. Therefore, he has no chance of ever selling me
anything.

Your comment?


CELLULAR PHONES, AGAIN

Well, the California Public Utilities Commission is on the
ball. They've asked the phone companies to notify customers that
cellular calls may not be private. Great!
Unfortunately, there is a superfluous word in at least one
of the announcements. It says, "Cellular telephones send calls
over public radio frequencies." The superfluous word, of course,
is "public". Its use implies that there are some frequencies
which are not public, and that is just not so. Everything
transmitted by radio can be heard by anyone who has the right
equipment and technique.

What's needed is education. Let's spread the word. Phone
conversations are not private. They can be overheard very
easily.


DRUG DEALERS AND CMTs

Newsweek wrote about it, and ComSec Letter has written about
it. Drug dealers use cellular phones to do their business. DEA
complains about it. DEA should do something about it. If I can
monitor drug deals in progress, why can't the DEA? If I can
monitor a collector on Long Island going about his rounds, why
can't the FBI?

You know, the irony of the whole thing is that those people
don't pay for their phone calls. They use stratagems that defeat
the phone companies' billing systems, so all of us who pay our
phone bills are subsidizing the drug dealers.

Let's move into the twentieth century, and use modern
communications and computational capabilities to put a stop to
this stuff.



LETTER

F. Douglas Porter of Tucson, Arizona wrote to ask some very
good questions. First, he wants to know when we are going to
sponsor meetings relating to computer communications and computer
security. Although the association is still in its infancy, we
are planning a big meeting for the east coast which will include
just what you want. At this time we can't be specific on place
and date, but we're working on it. You will be advised.

Also, he asks how he can access our BBS. Well Doug, the
volunteer who set up the ComSec BBS changed it into a personal
project, and then abandoned it altogether. There will be a board
some day, I'm sure; but there is none right now.

The last question is the tough one. He wants to know when
we'll be conducting some activities in the West, and that takes a
little background to answer. The people who organized this
association are all in the East and they remain the volunteer
work force. Our main effort at the moment is to get our next
expo under way, and we're working hard at it. However, we're
also putting together written procedures for establishing local
chapters, and we'll be sending information in this letter. Why
not start a chapter and begin to sponsor some local events, even
before the rules are in place? Let me hear from you.


February, 1988

EXCELLENT SUGGESTION

Bill Ranson of Richmond, Virginia called to suggest that we
summarize the eavesdropping laws in the ComSec Letter, and we
think that that is an excellent suggestion. Bill, you're on.
We'll start on that project right away, and you'll see something
in this letter in the near future.

Along that line, there are some excellent publications
available relating to communications, security, and privacy.
We're including an extra page with this letter which lists some
information sources that we recommend without reservation. (The
April issue of Computer Security Digest has some especially
chilling information from people in the computer trenches.)

If you contact any of them, please mention ComSec Letter.


OPPORTUNITIES

This association has openings for people ready to work. No
pay, just a lot of time-consuming work.

What's your reward? Maybe nothing. Maybe something.

The only thing that you'll get for sure is some publicity.
You'll get your name and company affiliation on our letterhead.
You'll sit at head tables from time to time; you might even get
to give a speech, if that's your desire.

All of these things may turn out to be of no value to you
other than some items you can add to your scrapbook to look at
when you're old and gray. On the other hand, if you are
ambitious, getting involved in an international organization's
activities might just bring you to the attention of the person
who can provide the big break you are looking for. Who knows?

There are committees and projects in need of leaders with
initiative. All involve paperwork, phone calls, and planning; but
no manual labor. Keep in mind that it is logical and normal that
members will select known workers for the next national board of
directors. If you can help in any way, contact the editor -- NOW.


IN THE MAIL & OUR THANKS

Thanks to Dave Mann who has sent much valuable information,
and to Bob Haydon who advised that he built a "listen-at-a-
distance" mike (discussed in a seminar) and it works.
Thanks also to Richard D'Aleo who sent us a written critique
with good suggestions for improving the seminar from his point of
view, and who also provided the information on "The Other NSA".

Also, Marion Lewis of Sovran Financial Corporation sent us
some material on Sherwood Communications Associates. Thanks
Marion. Sherwood is a relatively young firm, but they have an
amazing array of products -- from standard telephone items to
very sophisticated (and expensive) instruments. Also, they offer
used TSCM equipment at good prices. You'll find them listed in
the supplement to this letter because they have a great
collection of books and reports for sale.


LETTER

A member who is in military service wrote us recently asking
for our help in finding a job after his discharge. We have no
staff for any such job bank activity, and the work he's looking
for is very seldom advertised, so we're passing his request along
in this letter.

"I am about to leave military service. In the military one
of my functions was the monitoring of official telephone calls to
identify if there was any breach of security occurring.

"I have enjoyed this job and would like to be able to
continue with this type of work. Could the association provide me
any type of list of civilian jobs that might fall into this job
area or a list of those jobs that I could apply for that would
incorporate this type of work?

"Any assistance that you can give me in this job search
would be greatly appreciated."

If you can help, please contact Daryl L. Cole at RT3, Box
316, Kempner, TX 76539. Please send us a copy so we can report on
it in this letter 'cuz it seems to us that the only place in the
civilian world that he could find a job monitoring telephone
conversations would be with a big law enforcement organization.

We look forward to hearing from members and Daryl on this.


MEMBERS ONLY

Offers for free reprint service are for members of the
ComSec Association only. If you are not a member and are reading
a photocopy of this letter, please don't ask us to spend our time
and effort to serve you. We are offering a free service to
members -- people who support our efforts by paying dues. You can
join and become eligible for these free services. All you have to
do is apply and send money.

(This comment is prompted by our recent receipt of a request
[with self-addressed envelope] for a free reprint of an article
from a person who did not give his name, but the letter was from
a zip code where we have no members.)


BUGGED OR TAPPED?

Member Perry Myers of Myers Investigative Service in Chicago
sent us a clipping from the Chicago Tribune headlined "GOP
Chairman says he found tap on phone". Perry says that he thinks
there is something wrong in the story, and asks our opinion.

Well Perry, I agree that it's a hard story to understand. In
the first sentence Donald Totten says his phone was tapped, and
in the second sentence he says that his phone was bugged. Was it
one, or the other, or both?

We'll probably never know because Joseph Miles of Shadow
Investigative Service is quoted as reporting, "In the course of a
sweep I found a variation of voltage on the line. The possibility
existed. I found no hard evidence that one was in place".

Now, if the phone was bugged, there are some simple,
definitive tests which should have been performed, and (in your
editor's opinion) measuring line voltage is not one of them. If
these tests had been performed, the odds are that a bug would
have been detected.

On the other hand, if we're considering a tap, Mr. Miles
didn't have much chance of detecting one by measuring line
voltage. In our experience we only know of two instances in which
line voltage measurements gave a reasonably positive indication
that something was amiss. In both cases on-hook voltage was very
low and we suspect that an off-site parallel parasite transmitter
was the cause.

So let's hear from members. How often has line voltage
measurement indicated a problem in your experience? In my
experience a simple tap on an active line causes no measurable
change in voltage. In fact, the ordinary changes caused by normal
system activity are on the order of volts so it would be
impossible to measure the change of picovolts (or less) caused by
a decent tap.

Another question for members: Do you agree that a bugged
telephone should be detected by standard countermeasures
activities?


REEVALUATION OF THE EVALUATOR

This is another story of rapid response. In our last issue
we carried the story of our two evaluations of the Evaluator
telephone tap detector and reported that it did not detect any of
the taps that we put on our line.

Michael K. Stern, VP of Secom Information Products Company,
responded immediately, sending us another Evaluator for testing.
Further, he volunteered to come here to assist us with our tests.
He assures us that the unit really does detect taps (but he
hasn't told us how), and that other people have tested it with
positive results. Well, we'll try again when our schedule permits
and we'll advise you of our results in an upcoming newsletter.


THE OTHER NSA

Richard D'Aleo, an author who is writing a book on
intelligence gathering, sent us some material describing the
other NSA. It seems that there is an information source here in
Washington, DC called "The National Security Archive". This is a
non-profit (by design) institute founded by former Washington
Post reporter, Scott Armstrong. According to Time, this NSA now
operates on a million dollar budget with 30 people on the staff.

This NSA uses the Freedom of Information Act to collect
information which can be used by researchers into government
activities. If you have need of information which might have been
retrieved from government records, by all means, contact NSA at
1755 Massachusetts Ave. #500, Washington, DC 20036. 202-797-0882.
Please mention ComSec Letter when you contact them.


TELECOMMUNICATIONS COURSES

There are some courses on the administration, management,
and technology of telecommunications now being offered by AT&T.
If interested, contact Bruce E. Hemstock, AT&T Knowledge Plus, 55
Corporate Drive, Room 13J08, Bridgewater, NJ 08807. 800-554-
6400. Please mention ComSec Letter when you call or write.

P.S. One member commented that he'd like to see more technical
content in the ComSec Letter. What's your opinion?

COMMUNICATIONS/SECURITY/PRIVACY PUBLICATIONS


Newsletters, Magazines

Computer Security Digest computer security
150 N. Main St
Plymouth, MI 48170
313-459-8787

Monitoring Times radio monitoring
140 Dog Branch Rd.
Brasstown, NC28902
704-837-9200

Privacy Journal security/privacy
Box 15300 Compilation of State
Washington, DC 20003 and Federal Privacy
202-547-2865 Laws. $26.00

Security Letter corporate security
166 East 96th St.
New York, NY 10128
212-348-1553

Security Systems Digest security news/programs
Washington Crime News Service
7620 Little River Turnpike
Annandale, VA 22003
703-941-6600

Sherwood Communicatiuons Associates various publications
POB 535
Southampton, PA 18966
215-357-9065

Teleconnect modern telecommunications
12 West 21 St.
New York, NY 10011
212-691-8215

2600 hacking
POB 752
Middle Island, NY 11953

Books

Barbara Rowan has compiled an excellent reference, entitled
"Handbook on State Laws Regarding Secretly Recording Your Own
Conversations". $20 from Independent Hill Press, 105 South Alfred
St., Alexandria, VA 22314. There are periodic updates. March, 1988

COMPUTER CRIME

Yes, it does exist; it does cause problems -- of varying
magnitude. Let's consider some of the various activities that we
have knowledge of.

First, we should consider those petty crimes by people who
think that stealing from big organizations is not stealing. The
crimes I'm thinking of are primarily those of theft of services
through the use of someone else's telephone credit card number.
Many, many long distance telephone calls are made this way. Many
of the people who do this think it's not really theft because the
phone company is so rich it doesn't know what to do with all of
its money. What they don't appreciate is that the phone companies
never lose money; they just add onto their rates to cover the
costs of these thefts. (But who can criticize the kids for such
shallow thinking -- we have men who would be president who say
that they are going to reduce our national debt without bothering
the people by raising taxes on corporations. They don't realize
that all of us will end up paying those high taxes because we'll
have to pay more for goods and services from those firms.)

Then there are the activities which are childish pranks,
taking advantage of the fact that most people/organizations are
trusting. Children with computer ability, by accessing someone
else's computer and leaving smart messages, perform the computer
equivalent of the kid trick of putting salt in the sugar bowl or
loosening the top on the pepper shaker in a restaurant.

Of course, there are also computer problems caused
inadvertently. Maybe these should also be called crimes. I'm
referring, for instance, to the virus experiment originated by
some folks at MacMag. It seems they wanted to try out a virus so
they planted one in several Macs in their office. This one was
set to appear on March 2, and to display a personal message from
their publisher. Well, they installed it in their Macs in
December and by March 2 it had spread to thousands of Macs (and
maybe into some commercial programs being offered for sale). In
any event, on March 2 thousands of Mac computers displayed the
message, "Richard Brandow, Publisher of MacMag, and its entire
staff would like to take this opportunity to convey their
Universal Peace Message to all Macintosh users around the world".


Last, but certainly not least, there are the serious
crimes --- more than just vexations. Large amounts of money and
property are being stolen. Data are being destroyed. We've all
read horror stories about these.

Just one observation before we consider some specifics: the
ones we've heard about are the failures; the successful computer
thefts are still unknown to us.
Some items in the news about some of those failures:
Computer Security Digest, April issue:

"The security of computers and data communications systems
is today largely non-existent, inadequate or outdated by new
offensive techniques.

"Governmental agencies (federal, state and local) seem to
have the loosest controls and the highest incident rate....
"Bell System Regionals are loaded with incidents.... The
culprits aren't all teenagers or long haired hippies either. The
new profile includes "mature" businessmen as well as the yuppie
community."

Washington Post April 18, 1988:

Headline: "New "virus" Infects NASA Macintoshes"

".... numerous reports of a virus called Scores ...."

"....200 to 400 Macintoshes in the agency's Washington area
offices .... were infected by the virus."

Yes, it does exist. What can we do about it? Well, to start
with, I suggest that we share information. I make this suggestion
knowing that it contradicts what the Washington Post says is the
philosophy of major corporations who want to keep a lid on
countermeasures so that the other side won't find out what we're
doing and react to combat our countermeasures. I don't think
those people have enough respect for the capabilities of the
other side. They are smart. They share information. We need to
get smart. We need to share information.

As a start, if you're using a DOS computer and have
downloaded programs from a BBS, check the date on your
COMMAND.COM file. If it's recent, you have a problem.

Data Processing and Computer Security, in its Winter '88
edition, says that there is a checking program called VI-RAID.
This program will create a "Program Authentication Code" on all
of your programs, and can then be used periodically tho check to
see if they have been altered. Available from Prime Factors,
Inc., 1470 E. 20th Ave., Eugene, OR 97403. 503-345-4334.

Anyone care to offer additional advice, or offer to provide
service?


DONATIONS TO THE CAUSE

If you have any items of TSCM equipment that you no longer
need, please consider donating them to the association. What we
are most interested in are those things that you found really
don't do what the seller said they would do. We'll test them and
report on what they actually can accomplish.

We're interested in the expensive items, of course, but
we're also interested in the inexpensive ones. For example, the
"Phone Tap Detector" advertized for $69.00 (plus $2.95 P&H) in
the February, 88 issue of Popular Communications would seem to be
an interesting item. If you bought one and found that it does not
detect taps, why not send it along to us?

Also, we're always looking for computers, modems, office
equipment and furniture, and anything that might be useful.
Certainly nobody around here is an expert on the tax laws, but
the association is organized as a 501 (c) (3) corporation (non-
profit, educational) which should mean that you should be able to
take some kind of a write off for any donation. Ask your tax
lawyer or accountant, but keep us in mind. Thanks.

FEEDBACK

Ben Otano, Bill Parker, and Perry Myers requested the
overseas travel tips mentioned in the last ComSec Letter, and Tom
Campbell of Northrop and Perry Myers responded positively to our
question about more technical content. Herb Greenberg sent us a
copy of an article in Business / North Carolina which features
reader Bob Grove, Editor of Monitoring Times. (In case you hadn't
noticed before, we've often suggested that folks in the TSCM
business could benefit from a lot of the material in this
publication. Call 'em in Brasstown, NC.)

We appreciate these letters, and especially appreciate the
nice compliments that came with them. Thanks. And, we got the
message. The response is for more technical content in these
letters, so we'll start putting in more technical detail.


TSCM, WHAT IS IT?

Recently, we've read in two different publications that 90%
of all TSCM "hits" are attributable to the physical search.

That is so far off from our experience that we're inclined
to believe that the statement is self-serving in the extreme.
Probably the folks who tell you that don't have any modern
technical equipment or any technical capability.

Of course it could be that one of the authors is parroting
the other. Come to think of it, his comments indicate a real lack
of experience in real-world situations so maybe he's an armchair
quarterback.

In any event, we feel obligated to comment based on our
experience on real jobs. No amount of physical search would have
found the speaker of the old speakerphone connected to spare
conductors in the 50-conductor cable. How about the carbon
microphone connected to spare pair in the conference room phone;
do you think physical search would have found that?

Of course, if you have RF-calibrated eyeballs, you can see
the radio transmitter emanations at 100 plus MHz, and the 200 KHz
carrier current transmissions. C'mon! Be serious. Although there
is no question that physical search has its place, it is only
occasionally the most important part of the TSCM job. In an old
multi-tenant office building, it really is important and time
consuming. There have been jobs when it was the most meaningful
segment of our procedure. For instance, we wouldn't have detected
the evidence of the tap on Bob Hay's home telephone without it,
but most of the communications compromises that we've found were
found through the use of modern instrumentation. No matter how
thorough your physical search, you'll never see any RF, and
you'll probably never see any of the modifications to telephones
that can be detected easily with simple technical tests with
modern equipment.

Another idea: the people who say that physical search is the
most important part of TSCM might just be the people to whom show
is more important than substance. Certainly the client will be
impressed by a lot of activity, even if the hustle and bustle is
useless, as the standard physical search is in many TSCM jobs. April, 1988

MODERN PHONE SYSTEM VULNERABILITIES

Background

The basic message is: The bad guys are smart. They are goal
oriented. They communicate. If there are vulnerabilities, they'll
take advantage of them while the good guys have their heads in
the sand (or stuck up in the air).

The good guys must communicate. Don't be afraid that you'll
teach them new tricks -- they already know all the tricks.

We've frequently talked about and written about potential
weaknesses in modern telephone systems, but our feelings were
just that, feelings. We felt that some of the systems could be
taken advantage of based on sketchy technical details, but now
we've begun to receive good information from several different
sources. So let's look at some specific experiences.


Experiences, DISA

In order not to embarrass any of the people or companies who
have provided the details, we're not going to identify them; but
what follows is real. Take heed.

A company (composite, for the sake of this article) which
has one of the (early) modern telephone systems had DISA (or some
variant thereof) for the convenience of their salesmen. To use
DISA (Direct Inward System Access) a salesman would call the PBX
and use a four-digit code number for identification. The system
would then connect him to a trunk, and he would be able to make
his calls.

Some time after the system had been put into operation, the
company noticed that their telephone bills were suddenly full of
off-hours, long, and expensive calls to a lot of numbers in Latin
America. They concluded that someone had learned how to use their
system, and was abusing it.

Their first reaction to try to protect themselves was to
change to a six-digit code. Not even as effective as a finger in
the dike; each monthly bill still contained thousands of dollars
in charges for calls to Latin America.

Their next step was to contact AT&T, and ask for protection.
AT&T investigated and determined that the calls were originating
in upper Manhattan. However, the exact source was not determined
because the calls stopped coming.
That may sound like a happy ending, but it isn't really.
It's actually one of those inconclusive terminations that leaves
everyone hanging. In that company's case, they finally realized
that the people making calls through their system were not
individual hackers; they were big business. That's right. Their
conclusion was that drug dealers had set up a communications
business so that their calls could not be traced back to them.
The reason that the company was no longer used is that they cut
back on the number of trunks available to only two or three, and
the druggies could not make the volume of calls that they
required through only a few trunks. It's our guess that they have
moved on to another company that has enough trunks, so that they
don't have the operational problem of keeping track of several
systems with different passwords, etc. It's so much simpler to
deal with only one system at a time and we're sure that they are
now concentrating on another company and that that company is
being taken advantage of in a big way.


Experiences, Remote Diagnostics

In addition to using DISA to steal service, some of the
service stealers, are using the built-in maintenance facility.
They dial in to the PBX's computer, and access the remote
diagnostic capability, where, by use of the proper signals, they
can access trunks.

One security director said that they had put a recorder on,
and heard a tone burst on the incoming call, followed by dial
tone on the outgoing trunk.

Checking with some folks who install such systems, we find
that this is certainly possible on some of the most modern
systems.


The Real Threat

Both DISA and remote diagnostic capabilities are currently
being used to steal service from a lot of businesses.

But it's only money that's being stolen.

Egad! Did Ross, the Scotsman, say it's only money being stolen?

Yup. He said it. He said it because he thinks something much
more valuable can be stolen, and probably is being stolen even as
you read this.

That more valuable property is information. If the bad guys
have figured out how to enter and manipulate these systems, they
must have learned how to use their knowledge for eavesdropping.
What Can You do about Long Distance Theft?

Well, first read your phone bills. Do you have any excess
charges? If so, are they for calls to Latin America? If so, you
have probably been the target of the druggies. However, don't be
embarrassed and don't despair.

If your company has been victimized, don't feel too bad.
We've heard that the MCI sales offices in Phoenix and Denver were
hit -- bad. And MCI is a company that knows communications inside
and out -- but they got burned.

Also, keep in mind that the druggies are smart. They're not
going to continue to use the same company's lines until the
authorities find them. Their objective is to hide from authority
so they'll move on within a month or so.

However, they may cycle back, so it's a good idea to monitor
activity on your trunks after hours. Don't wait for the bill to
come in. Get some automated equipment that prints out line
activity. (Radio Shack has a dandy DNR (dialed number recorder)
that they call the CPA-1000 and sell it for $99.95.)


What Do We Plan to Do about Eavesdropping Vulnerabilities?

Unless one of our wonderful readers has already done it and
sends us a copy, we plan to do a survey of modern telephone
systems from Merlin to Dimension and Horizon, and on up from
there. We've heard that the CIA has already done it, but we don't
have access to their report (nor to such vast resources!), so
we'll just have to grind away at it. This is not the kind of a
project that gets accomplished overnight, so don't stand by your
mailbox looking for an announcement. While we're at it, though,
we'd like to hear from anyone who has specifics relating to any
system.

And, of course, if you want to call to compare notes, we'd
be glad to hear from you at any time.


MODERN TELEPHONE SYSTEMS INVULNERABILITIES

Well, the news is not all bad. Some of the telephone systems
that we've been exposed to recently, are really quite secure.
Some are unbelievably insecure, yes; but some are quite good.

First, some of the modern PBXs select an outgoing trunk for
the caller. That means that if you want to tap phone calls by a
specific person, you have to tap all lines and monitor all calls,
and turn on the recorder when you hear the voice of the target.
The only way around this is to secure access to the premises and
put the tap in behind the switchboard. That is possible, of
course, but it adds a level of complexity to the tapper's
problem.

Then, there are the systems that are almost immune to
bugging. Coupled with a good physical security program, they are
nearly 100% immune. For instance, we were recently doing the
standard test for a series parasite by flashing the hookswitch
while tuning through the spectrum. After about ten flashes, the
computer showed the phone "busy". Apparently, it took so many
interruptions as a sign of a malfunction, so it busied the phone
out. Ross figured he could reactivate by disconnecting and
reconnecting the feed, but that made the phone go completely
dead. So what we had was a phone that is nearly immune to
bugging. If a bugger had worked on one of these phones, the
system or the phone would have provided evidence that it had been
worked on.

We've heard that some systems will recover from faults by
turning the computer's power off and back on again. This is where
your physical security program will provide protection, first by
locking the area, and second by monitoring access.


TAP DETECTORS AND THE SHARPER IMAGE

In our January issue we ran a copy of a letter to Richard
Thalheimer of The Sharper Image. The letter advised him that the
tap detector that he was touting would not detect even a simple
tap, and that he might get himself sued by someone who depended
on his tap detector to protect his privacy.

Well, the first response was from a TSI buyer who said that
sales weren't going so well anyway, so maybe they'd drop the
item. Now comes the latest issue of their catalog, and, you
guessed it, they're still saying "you can guard the privacy of
your line..."

So it seems that they simply don't care what they say.
Anything to make a sale. Oh well.


THAT LIFE FORCE CATALOG

Wow! Super slick. Full of pictures of handsome men and
beautiful women. Some catalog, until you begin to read what it
says. How about "most unique" for an interesting variation on
English? On one page we read that the Research Electronics voice
scrambler is "THE MOST SECURE VOICE PRIVACY DEVICE IN THE WORLD".
Now, it might be good. Can't say; never tested it. But we know
for sure that it is not the most secure device in the world. On
page 4 they also show a fellow listening through a wall with a
device they sell, and they even advise you to check 18 USC 2511
before you use it. I wonder why they didn't read that law
themselves; it makes printing that ad a federal felony. Oh well.


May, 1988

MEMBERSHIP MEETING

You are reminded of the membership meeting scheduled for
July 23 at the Twin Bridges Marriott in Arlington, VA. We've
planned a little time for an informal get together with coffee
and sweet rolls and toast at 9 AM. Meeting will start at 10. If
you can make it, call as soon as possible -- we're buying lunch,
and the hotel needs a count.

So far the response has been encouraging, so let's consider
some of what we need to accomplish in the near future.

Annual Meeting. We've been looking for a place to hold our second
"annual" meeting (our first was in 1985). This time we have a
contract with a meeting organizer who won't try to remake our
plans for our conferences. All of the logistical details will be
handled by him, and all exhibitor affairs will be his
responsibility. We'll put together the details of the conference,
and he'll take care of the promotion, advertising, registration,
etc.

Local Chapter Organization. This should be one of our top
priorities. Maybe the DC-area members can set the rules,
organize, and become the lead chapter in setting up our national
meeting later this year.

Bylaws. We have some very simple bylaws. At this meeting I hope
that we can appoint someone to flesh them out for presentation at
our annual meeting. Also, someone has to do the paperwork to get
us recognized as a bona fide non-profit organization.

Nomination of New Board Members. At present we have authorized a
board of five members. One of the members has departed so we have
a current opening for one person. If the Bylaws are approved,
this will be a bona fide meeting of the association, and we'll be
able to elect a new board member immediately. It has been planned
to expand the board membership to seven or nine, and this can be
decided at this meeting. Nominations will then be sought from all
members by mail, with the election to be conducted by mail before
the annual meeting.

Appointment of Committee Chairmen. There are many functions that
need leadership. At the top of the list is membership affairs. As
I see it, this relates to both membership benefits and to
recruiting. In my mind, they seem to go hand in hand. The future
of this organization depends on having an effective membership
program. We have to have suitable benefits to attract and hold
members.

Corporate Membership Changes. I plan to ask the board to change
our corporate membership structure to make it similar to that of
the American Defense Preparedness Association. Specifically, I
propose that we leave the annual dues at $150, but that the
corporation can name five individuals who will have full voting
rights.

ComSec Letter Subscriptions. I plan to ask the board to authorize
subscriptions to the ComSec letter @ $25 per year (ten issues).
This should make it easier for some to afford, and will allow
libraries, etc. to subscribe without having to pay individual
dues.


B & E: A to Z

With a title like that this video has to be good. (In case
you're not familiar with the jargon, the subject is breaking and
entering -- in fact, the subtitle is "How to get in anywhere,
anytime".)

Just how good it really is depends on your point of view. I
watched it mostly on fast forward because I'm not really
interested in developing a new skill, especially a skill that
would normally be used in the commission of a crime. If you want
to learn how to break in through a locked door, this probably
will be very good for you. On the other hand, if you are already
accomplished in this field, you don't need this video.

Is it worth the price? Yes, emphatically. Even though I
skipped most of it, I was immensely impressed by demonstrations
which show how very vulnerable we all are. Further, it is
especially chilling when you realize that the person who had no
trouble defeating all kinds of locks seemed to be not too
experienced at the business. In any event, you should look at it
if only to increase your awareness of how flimsy most physical
barriers really are. Available @ $99.95 from CEP, POB 865,
Boulder, CO 80306. 303-443-2294.


WINKLEMANN, AGAIN

Wow! It seems that there are quite a few people who are glad
to hear that this company is alive again in the USA. We've heard
that someone in Florida bought the US rights or franchise, and
there are some people who would like to get more specific
details. Please call if you have any information.


BBS COMING

Member Ned Holderby has volunteered to start a computer
bulletin board system for members and others. Non-member callers
will be restricted to information about the association and its
benefits, and maybe some message service. Members will have
access to all of the stored information including back issues of
the ComSec Letter, members names and addresses (except those who
have instructed us not to list their names), a message service to
leave questions or messages for all or any specified member, etc.
Also, membership records can be maintained in one place, getting
rid of some of the confusion that resulted from our changes in
the past.


IN THE MAIL

Bill Ranson, of Richmond, VA sent us some interesting
comments. He starts by saying that our segment last month, Modern
Telephone System In-Vulnerabilities, whet his appetite, but
didn't give him anything to chew on.

He's right, of course. We noted elsewhere in that same
letter, that we're busy collecting information on
vulnerabilities, and we should have said that we are also
collecting information on invulnerabilities. This effort will be
reported on as it progresses (see segment, Northern Telecom SL-1
Meridian in this issue).

Bill also volunteers to provide information on equipment
that he has tested, and to test equipment that is provided to the
association for that purpose.

Bill, I hope that you can make it to the meeting on the
23rd. Lee Binette is planning to be there to suggest that the
ComSec Association start just such a program. Maybe you two can
get it going, and we'll see that test results get passed on to
members, either through this letter or through our BBS.


WORDPERFECT 5.0

Well, the new version of Wordperfect has finally arrived,
and we have it installed in our new (IBM XT clone) computer.
Strange, though. The old version of WP recognized our QMS KISS
laser printer and the new version never heard of it. However, the
factory has sent us a series of updated diskettes, and our
printer is back among the living (except that WP can no longer
draw lines).

If all goes well and the old man learns how to manage the
new program, you'll soon see changes in the format, layout, etc.
of this letter. (You might have noticed that the title of the
letter is bigger this issue, and we've put a box around the date
line, and we've even included a drawing of your editor with a
smile on his face. We tried to place the clip art in the center
of the page, but for some reason Wordperfect won't do that for
us. Yet. Our plans also include upgrading to full desk-top
publishing capability. It'll all come in due course. Although
we'd like to do everything at once, the budget
limits our speed, as does this old guy's ability
to learn all this new stuff.

So, there really is some hope for a fancier
letter. Don't despair. We may move slowly, but
we know where we want to go and we are
determined to get there. Next, we plan to
acquire a scanner so we can show pictures of
some of the finds in our TSCM work. After that,
comes a better laser printer so we can do the
whole desk-top publishing thing.

If you have any ideas about upgrading this
letter, your editor would really like to hear
from you. I'm proposing several ideas at our membership meeting
to enlarge the association and the readership of this letter. If
we can get a bigger readership, we'll be able to sell some
advertising in the letter. What do you think about that?


NORTHERN TELECOM SL-1 MERIDIAN

This is a system that we'll wholeheartedly recommend from a
security point of view. We also hear very good reports about its
reliability, but let's consider bugs and taps.

First, bugs. The SL-1 Meridian, coupled with a good physical
access control system is my number one choice as an anti-bug
telephone. Why? Well, if you are going to modify a phone to make
it into a room bug, you're going to disconnect the phone from the
feed. In the SL-1 Meridian system, as soon as a phone is
disconnected, it is locked out of the system until the system is
reset at the computer -- that's where the good physical security
program is important. Simply put, if you have this system, and
the boss finds his phone inoperative on Monday morning, you know
that you have a problem.

Now let's consider taps. If your mission is to tap the phone
calls of Mr. X, you simply have to connect to the wires that
carry his calls. However, this system pumps calls out on a T-1
span. That means that you need the equipment to break out the 24
channels, and you have to listen to all channels for Mr. X's
voice. Next to impossible for any but the most sophisticated
tapper with lots of clout, money, and technical capability.

Because of these characteristics, I rate this system #1 for
security. There may be others just as good or better, but we
haven't checked them all out yet. You'll hear more as we
progress.


June/July, 1988

SURVEILLANCE EXPO 88 (89?)

Surveillance Expo will be sponsored by the ComSec
Association and will take place in the Washington, DC area in
conjunction with our next membership meeting. As you read this
volunteers are looking for space for a meeting late this year,
but finding a site is proving to be a real problem and we may
have to reschedule to some time next year when appropriate space
will be available.

The meetings are being planned for the DC area because
that's where the volunteer workers are. To those members who have
been asking for a meeting in other areas we say, "Have at it.
We'll cooperate in any way." However, those of us working here
can barely handle the details of one meeting, let alone two.


NEW BOARD OF DIRECTORS

At the membership meeting held on July 23, 1988, it was
decided to expand the board to seven members, and an election was
held to fill the four vacancies. Joining Chuck Doan, Jim Ross,
and Ken Taylor on the board are: Mike Brumbaugh, Jack Mogus, John
Nolan, and Charles S. (Slick) Poteat.


BOARD MEMBER FUNCTIONS

Although not all members have been formally elected to
specific offices, the board members in the DC area have begun to
work on projects as follows: Mike Brumbaugh has been keeping
minutes of each meeting; Chuck Doan is VP, Finance; Jack Mogus is
working on membership programs and will be responsible for all
aspects of membership (keeping the list, recruiting, benefits,
local chapter affairs, etc.); John Nolan is in charge of all
aspects of organizing the upcoming Surveillance Expos and annual
membership meetings; Slick Poteat is developing a system for
collecting information on the equipment used and qualifications
of our members who work in TSCM; Jim Ross is still president, but
has announced that he will run for chairman at the next
membership meeting so that someone else can move into the
president's slot and lead the association through its critical
growth stage.


HITS

From time to time we pass along information regarding hits
(communications compromises) found by our members. In this issue
we'll detail some of those and also two interesting
vulnerabilities (Vantage phone and common wall). In future issues
we'll provide details on other vulnerabilities and some
communication compromises that are simple to implement.

As usual, you are invited to send along information that you
think would be of value to members.

Jack Mogus has had two occasions to look closely at a 66
connecting block for one of his clients. On the first occasion he
found a home-built radio transmitter, and on the second he found
a tap connected to a pair that led out of the building. (As soon
as we learn how to use our new scanner with our computer and
laser printer, we'll provide pictures of this find and any others
that we receive.)

Doug Ralph, in Canada, has been having a very busy year, and
reports two interesting finds. First, he was astounded to connect
to the talk pair of an on-hook Northern Telecom Vantage series
telephone and hear all of the room audio. That's right, the
microphone or speaker (of the speakerphone) of this instrument is
connected to the talk pair when on hook, and all you need is an
audio amplifier, connected through a blocking capacitor, and you
have a first class bugging system in place.

Ralph's other report points up the importance of a thorough
physical search. Under the conference table in a board room he
found remnants of duct tape, which probably had fastened a tape
recorder in place at one time. Way to go, Doug!

One contributor, who wishes to remain anonymous so that his
company will not be embarrassed, reported an interesting find by
his in-house telephone man. It seems that this young fellow
normally used white wire ties in his work, and one day he noticed
that someone else had been working in his territory. He tracked
the strange wiring to a Radio Shack tape recorder controller (PN
43-236), and from there to a tape recorder. The CEO who heard his
conversations on the tape was understandably in shock. Pictures
of this installation will also be carried in a future letter.

Let's now look at the common wall problem. We're referring
to multi-tenant office buildings with more than one tenant on one
floor so that there is a wall which is common to two different
businesses. Most of the modern office construction that we've
seen lately has office walls extending upward to the base of the
floor above, which is as it should be for physical security.
However, these walls, out of sight above the dropped ceiling,
have large holes in them to allow for HVAC air flow, which is not
how it should be for communications security. The next door
neighbor need only stick his head above the dropped ceiling to
hear what is going on in the adjoining office. Or, if he wants to
get it all, he can use this access hole to plant a microphone and
connect it to a tape recorder. This is a real vulnerability; look
for it!


MEMBERSHIP RENEWALS

During the past year, we arranged for all memberships to
expire at the same time, namely at the end of September. This
will make it much easier to keep track, produce rosters, etc.

At present we have many memberships expiring in September of
this year, and more expiring in '89. Also, we have a handful of
life memberships and a few corporate memberships. Anyway, this
seems to be a good time to remind everyone of the options.

Individual professional life memberships are still available
at $500. We've been told that this is too low a figure, so the
board will be considering raising it soon.

The corporate membership picture has just changed to make it
much more attractive for businesses to join. Each small business
corporate member can name up to five individual members, each
with full voting rights. The fee for this level of corporate
membership is still $150 per year, so give this option some
thought. If you plan on exhibiting at the upcoming Surveillance
Expo, you'll more than recoup your dues in the reduced charges
for exhibit space.

The date of membership expiration is printed at the end of
the first line on your mailing label. If your membership expires
September 30, 1988, a renewal form is enclosed with this letter.
Please don't procrastinate. We're entering into our big growth
year, and we need support from all of our old members.
LASER BEAM ON THE WINDOW. THREAT?

Kevin Murray has done a practical and thorough evaluation of
the laser beam on the window threat. We don't have room for it in
this issue, but we'll provide a full recounting of his evaluation
in the next issue. It's a good piece of work and we're very
pleased that he saw fit to share it with the membership.

Thanks, Kevin. It's input like this that we're looking for
to elevate the level of professionalism in TSCM practitioners.


COMSEC ASSOCIATION BBS

Ned Holderby advises that the board should be in operation
by the third week in August. More information in the next issue.


MEMBERSHIP LIST

If you've struggled through with us, you'll recall that,
after the first membership list, there has been a long break with
no list. It's a long sad story, a story of the kind of problems
that a new organization has when starting up. First, we had an
outside firm maintaining the list, and that worked great but cost
money. Then a member volunteered to maintain the list, notifying
members when it was time to renew, etc. Unfortunately, he never
notified a single member of lapsing membership, sometimes took
months to deliver the mailing labels for this monthly newsletter,
and lost many records. Finally, some volunteers had to put the
list back into our old simple-minded labels program which had no
facility for printing out the list in a format that would be
useable by the members.

Well, that should all be over soon. We have started using a
much more sophisticated and powerful mailing list program in our
business, and ordered a copy for Jack Mogus (who is responsible
for all aspects of membership affairs). This program, Promark,
will allow him to organize the membership list any way we want
and to print it out in any format. Hang in.


August/September, 1988

SURVEILLANCE EXPO '89

As of the time this is written, we do not have a contract
for space nor a contractor to manage the expo. John Nolan is
working on it very hard, and we should have definite information
by the time the next issue goes to press.


COMSEC ASSOCIATION BBS

Ned Holderby has set up a computer bulletin board for the
association. The board has a two-fold mission:

1. a facility for members to exchange information, and

2. a source of information about the association for
potential new members.

Only members will have access to the various conference,
message, and data file areas of the board. For example, we'll be
putting all of the back issues of the ComSec Letter on the board
(with topical information removed) so that all active members can
browse, read, download, or whatever. Members will have full
access and non-members will be limited to reading information
about the association.

Caution! The board will be run and maintained in a
professional and ethical manner. No games. No violations of
copyrights. No foul language. I'm sure you understand and
appreciate.

At the time that this is composed, your editor has not yet
been able to contact the board (Sorry Ned.), but a list of
members is on its way to him so he'll known who to allow onto the
board.

Our BBS number is 716-741-4245. I'll be leaving messages on
the board for members from time to time, and I hope you'll take
advantage of this facility.


LASER BEAM EAVESDROPPING

Kevin Murray has provided us with the results of their
testing of laser beam eavesdropping systems. It is of intense
interest to many, so we'll provide a reasonably complete summary
in this letter. (If you want an original of his report, I'm sure
he'll be pleased to oblige. Write him at Kevin D. Murray
Associates, POB 5004, Clinton, NJ 08809 or call 800-635-0811.)

Here's his report.

Laser Beam Eavesdropping

Summary.

Does it exist? Yes. We designed, built, and tested a complete
working system.

Does it work? Yes. The technique works very well under laboratory
conditions.

Is it a threat? No. Due to operational limitations under field
conditions, we are not reporting this as a threat to the majority
of clients at this time.

Sci-Fi Bugs?

Eavesdrop from afar, merely by pointing at a window. The
idea is alluring to some, horrific to others.

News media reports of just such a bugging device, based on
laser beam technology, have been circulating for some time now. A
litany of claims "...can hear from miles away..." and compound
claims "...through closed windows...", culminates with the coda
"No one is safe." Like the X-Ray vision glasses of comic book
fame, the claims tend to become exaggerated. But, unlike the
concept of X-Ray vision, laser listening can be accomplished with
the right equipment and conditions.

A Century Old Invention.

April 26th, 1880 - Alexander Graham Bell & Sumner Tainter
announce their invention - the Photophone. Sound transmitted on
reflected light rays a distance of 213 meters. They also claim,
"It can transmit songs with great clarity of tone." This is the
forerunner of CD record players, fiber optic telephone
transmission, and remote eavesdropping.

It's Greek to them, Diogenes.

We researched this threat for our clients and heard much
speculation from the pundits, conjecture from dilettantes, and
hyperbole from the media. In most cases, the "experts" had never
even seen a laser bug. They were running on grapevine knowledge.

We Built Our Own.

Using assembly plans available to the general public, we
built a laser receiving system (Radio/Electronics 10/87). For
aiming and safety reasons, a visible laser beam was used in our
tests (Spectra Physics Inc. - 10 mW linear Helium-Neon type).
Additional experiments with: optical processing, and professional
audio processing, were conducted. These results, and allowances
for more sophisticated receiver circuitry, were factored into our
test results.

Physics 101 (Simplified.)

Sound is transmitted by vibration. When you speak, you
vibrate the air. The air, in turn, vibrates everything it
contacts. Certain objects, e.g., windows and mirrors, pick up
vibrations very easily. When a laser light beam hits such an
object, it `vibrates' also as it reflects and continues its trip.
The reflected `vibrating' beam can be received, electronically
processed, and the audio listened to. Under controlled
conditions, high quality audio can be recovered.

Physics 202 (The Real World.)

Bouncing an invisible laser beam off a window, and
attempting to catch the reflection, is a little like playing 3-D
billiards, blindfolded. The fun increases exponentially with
distance from the target.

All sound will vibrate a window. This includes interior
conversations as well as exterior noises (cars, trucks, birds,
etc.) Our audio laboratory processing equipment could attenuate
this effect, to a degree. The rule of thumb seems to be, if the
outside noise is as loud as the conversation, audio processing
techniques are of marginal assistance.

Reflecting a beam off interior objects helps reduce external
sound. The beam, however, loses power with each pane of glass it
passes through. This reduces effective working distances and
increases the number of reflected beams with which one must cope.

Thick glass and thermo-pane glass, as used in office
buildings, do not conduct sound vibrations well.

Air thermals and wind, disrupt laser beams. The greater the
beam length, the greater the disruption. Wind blowing through a
laser beam generates noise similar to the cacophony of 747
engines.

A laser beam (one powerful enough for professional
eavesdropping) is the Neutron Bomb equivalent of a sharp stick in
the eye. Both can blind you, but the laser leaves the eye
standing. Blinding the subject of a surveillance is not the best
way of assuring a continued stream of information while remaining
unnoticed. We used safety goggles during our tests.
"There must be better ways to eavesdrop and spy", I hear you
say. There are.

"Beat the Beam" Countermeasures Course

If you suspect a laser beam eavesdropping attempt is being
made against you, use one of the following techniques:

Hold confidential conversations in a room
without windows. Place a radio against
the window and close the drapes. Install
a white noise generator on the window
pane.

In addition, do not discuss your suspicions in the
sensitive area. Contact an independent information security
consultant for additional assistance. Your problem is more
extensive than you think.
-30-


MORE ON VIRUS PROTECTION

If you think you need protection from infection by a
computer virus, RG Software Systems in Willow Grove, PA
offers

  
a program entitled, "Disk Watcher V2.0". According
to RG's president, Raymond Glath, the program has been
tested against the Leheigh University virus and "The Brain"
at the University of Delaware.

Please advise if you have any experience with this, or
any other anti-virus programs.


TELEPHONE SYSTEM INHERENT SECURITY

Recently in this letter we stated that a Northern
Telecom SL-1 Meridian phone would be locked out until reset
at the computer after being disconnected from the feed.
Within a week after seeing that bit of advice go out to our
members, we had an opportunity to work on such a system --
in fact, we worked on the system of the telephone person
who had given us that information.

What we discovered in handling the real thing is:
'tain't so. Some of the phones could be reconnected and
were automatically reset. Some would not reset. One member
advises that Northern Telecom Practice states that the M-
2000 series phones must be off line for at least six
seconds before being replugged. Another member advised that
it is necessary to wait at least thirty seconds before
attempting to reconnect. We don't have the total answer,
but we know that what we said last month is not totally
true. We were working on the M-3000 series -- the client
users call the "Darth Vader" phones -- and we could not
determine the pattern for which could be reset and which
could not.


October, 1988

SURVEILLANCE EXPO '89

Well, there will be no annual membership meeting and
expo until late '89. After the disappointment of being
close but not being able to make it during '87 or '88, we
were really counting on getting a show together early in
'89. At the board meeting in July John Nolan of Advance
Security took the ball, and it looked really promising.
Unfortunately, John encountered insurmountable problems and
resigned, so we're starting over -- again. (John, we thank
you for the short time that you were able to serve on the
board, and we wish you well in your other endeavors.)

So where do we stand? At the present time, Jim Ross is
talking to meeting organizers. If we can find one who can
do the job, the organizer and the association will make
some money while putting on an expo that is badly needed by
our members and by many people who have never heard of our
organization. Bringing off a successful expo is extremely
important, and we're determined to do it.

Be advised. Jim Ross may become financially involved
in backing this effort. He's stayed at arm's length to
avoid charges of conflict of interest, but the organization
needs this meeting and whatever it takes will be done.


SENSITIVE INFORMATION, HOLD BACK?

Recently Bob Grove, Editor of Monitoring Times,
editorially raised the question of how sensitive
information should be handled. That's a question that I am
often asked, so let's consider it.

The following material is a direct quote from the
Foreword to Section I of the notebook that I have prepared
for seminar participants, and it should give you a good
idea as to your editor's point of view. As usual, your
comments are encouraged.

"Before getting into the details of electronic
eavesdropping, let's address a very important philosophical
question.

"Much of the material to be covered during this
seminar is considered very sensitive. In fact, there are
some people who maintain that these topics should not be
discussed at all. They complain that, by covering methods
of electronic surveillance, we are 'teaching the bad guys
how to do it'.

"Let us answer that comment with two facts.

1. The bad guys already know what they need to
know to take advantage of the unsuspecting and naive people
of this world.

2. Anyone who studies the basic theory of
electronic communications will have no trouble
understanding everything necessary to tap phones, bug
rooms, etc. It is not complex.

"I believe that strength comes through knowledge, and
the route to knowledge is communication.

"Communication, to be effective, must be open,
straightforward, and complete.

"One principal objective of this course, then, is to
cover the principal points regarding electronic
surveillance because you need to understand those things in
order to protect your privacy."


TWO MORE PHILOSOPHICAL QUESTIONS

As long as we have started down the philosophical
route, let's go an additional step or two. Let's consider
the questions of whether TSCM practitioners should screen
their clients, and whether they should report their
findings to law enforcement.

We can't provide absolute answers, but we can provide
some information on our own operation, and what has been
told to us in the dozen years that we've been leading
seminars.

Let's start with an easy one. We've been told (it has
never happened on any of our jobs) that occasionally the
security director who has contracted for TSCM service will
ask that the contractor "find" something. (The idea is that
if a dead radio transmitter is "found", he'll become a hero
for ordering the service. And, of course, the TSCM service
firm will become richer because it will be necessary to
frequently return for additional work and maybe even do
some of the other divisions of the company, etc.) The
answer to that request is easy; it's "No!".

However, suppose that you are asked to work for a
company that has been in the press because of being forced
to sign consent decrees, etc? Suppose that you have certain
evidence that your client is under investigation by law
enforcement? What do you do then?

I can't tell you what to do, but I can tell you what
we do in my company, and I can tell you the consensus of
many discussions with many people in law enforcement and in
TSCM.

In my company we will not hide evidence of a crime or
participate in any activity which could be remotely
considered obstruction of justice.

However, we have worked for at least one company with
a reputation for questionable business practices, and we
have worked for clients who are under investigation.

The preceding two paragraphs may sound contradictory,
but let's think about it. Does the fact that a company is
under investigation mean that it is not entitled to seek
professional help? After a lot of discussion with many
seminar participants, we don't think that a person loses
any rights by virtue of being under investigation.

What do you think?

On the question of reporting our findings to law
enforcement, let me make two points.

First, this world that we live in is not like
Hollywood. All loose ends are not tied up at the end of the
job as they are at the end of the TV episode. Communication
is not instantaneous and complete. Our conclusions are
based on a lot of factors, and it is rare that we could
present an absolute, no-question-about-it conclusion to any
law enforcement agency.

Second, to whom do we report what? During the recent
ASIS show in Boston, a visitor to the booth seemed shocked
when we said that reporting findings to law enforcement was
not required, expected, or done. He seemed to be of the
opinion that we should use our time to report crimes to
"the authorities". As he left the booth I realized that the
picture essay displayed behind me would have been a very
good case in point. We discovered a tap on the mayor's
telephone which may or may not have been indicative that a
crime had been committed. However, we would have been hard
pressed if we had had to report it to law enforcement
because there was good reason to believe that the tap was
not court-authorized and had been placed by one or more
members of the police department!


VULNERABILITIES (continued from an earlier issue)

In a recent issue of this letter we outlined some of
the current vulnerabilities that we see in our professional
practice of commercial technical surveillance
countermeasures. Let's cover one which we think is very
dangerous -- one that we've been warning clients about for
years: the private line telephone, installed for
"security".

How many times have you seen the CEO order a separate
telephone line that does not go through the PBX? He thinks
he's protecting himself from eavesdropping, but what he's
really doing is making it very easy to identify the
appropriate pair to tap. It's like hanging a sign on the
pair, "TAP HERE!". We saw this in a now famous company
(Wedtech) a couple of years ago, and we continue to see it.
The latest example was on a "Hello" telephone in a
government contractor's office. The phone was installed
because there was so much sensitive information to be
discussed, and it's called the "Hello" phone because that's
the way it is answered -- in case somebody is listening.

One further thought on private line telephones. I've
been telling people in the seminar for years that the best
way to tap a phone is to call the phone company and order
an extension. Of course, a private line phone is an ideal
target for this kind of tap. (Recently, a man who had
attended the seminar, approached me and asked, "Do you
remember what you said is the best way to tap a phone?" I
said I remembered, and he smiled and said, "Well, it
works!") It will not be successful every time, but, of all
of the businesses in this world that must take orders by
phone, the phone companies are at the top of the list.

If you think that you're safe because the number is
not listed, or not published, or in any other way
protected, you just don't appreciate the nature of free
enterprise. ALL of those numbers are available. There are
people in this country who can get the information for you.
For example, I noticed on a recent trip to New York City
that there was a light on early in the morning at the old
address of a man who had stolen a lot of money from our
company. So I called one of the information providers, gave
him the address, and I had a full listing of everyone with
telephone service at that address back in less than 24
hours. So, if you or the CEO have had a private line
installed, think again. The single line phone is very
vulnerable. If you have a good size operation, think
seriously about a more secure installation such as the
Northern Telecom SL-1 that we wrote about recently.


COMING SOON

Richard Paradis sent us a copy of a product
announcement that was carried in, of all things, IEEE
SPECTRUM. (That's the magazine that goes to all members of
the Institute of Electrical and Electronics Engineers.) The
headline was "A double whammy for eavesdroppers", and the
notice touted a product that will advise you when your
phone is tapped. Rich asked if we'd care to comment on this
item for the benefit of the membership, and in a future
issue we'll reprint the letter that we sent to the SPECTRUM
editor.
Another member, Bill Ranson, sent us information on
some of his activities and some interesting data sheets.
Again, we'll have to wait till a future issue to cover
these fascinating submissions due to lack of space.

Last, but certainly not least, Leo Hurley of Exxon
provided us with excerpts from an article in Security
Management (the one published by the National Foreman's
Institute, not the one published by ASIS). In an article
entitled "Sizing up Sweepers" Sam Daskam is quoted
extensively, and Leo asked how I react to the quoted
material. Well, Sam has many, many years of experience in
this business and certainly should know whereof he speaks.
(Of course, Sam worked for Mason for 15 or 16 years before
starting his present business, so he is probably heavily
oriented toward government-to-government threats.) However,
if he is quoted accurately, I'm shocked, and I'll explain
why in a future issue.
November, 1988

SURVEILLANCE EXPO '89

As we reported in the last letter, the expo that we
were planning for February is off. The earliest that we can
hope for is the fall of '89. If you are interested in
participating in any way, please contact Jim Ross.


TELE-PRIVACY GUARD

Richard Paradis sent along a copy of a notice in, of
all things, IEEE SPECTRUM, one of the publications that
goes to all members of The Institute of Electrical and
Electronics Engineers. The notice that caught his eye was
headlined "A Double Whammy for Eavesdroppers", and Rich
wrote to ask if I would comment on this for the members of
the ComSec Association.

Thanks Rich, and the text of the letter which I had
already mailed to the editor of SPECTRUM follows. (By the
way, they have never responded in any way. I wonder if that
is because they are looking for an engineer to check my
comments for accuracy, or because they were embarrassed
and consigned the letter to file 13 without any
consideration of its merit.) (I really think IEEE should
ensure that technical information mailed to members is
correct, and I wonder how I can influence them to hire some
engineers. Maybe I'll send a marked copy of this issue to
the president of the IEEE; that should get some response.)

(Note. The following letter was sent by
Jim Ross on Ross Engineering, Inc.
letterhead to the editor of IEEE SPECTRUM
on June 6, 1988.


Dear Mr. Christianson:

This relates to your editorial "About Professionalism", and
the segment in the same issue (June) entitled "A Double Whammy
for Eavesdroppers".

First, let me express a thought regarding the definition of
professionalism. In the simplest sense, I think a professional is
someone who is paid to do something that others might do for
nothing. For example, a cab driver is a professional, and one
would expect that he would be a more proficient driver than you
or I. That's certainly not always true, but it remains a
reasonable expectation.

So let's move along to writing. Those of us who write
professionally, in general, should be better at the craft than
others. I think that professional writers should be especially
careful about how they use words, their basic, elemental tools
for communicating with their audience.

Ah yes, the audience. If the professional writer's audience
is, let's say, a group of engineers, isn't it reasonable to
expect that the words used to communicate with them will be the
technical terms that have precise meanings in their specialty,
and that the information will be technically correct?

Now that I have gone through all of that preamble, let me
get to the reason for this letter.

The technical content of SPECTRUM is usually so good that I
was astounded to read the segment regarding eavesdroppers. It is
so wrong, so confusing, so muddled, and so badly worded that its
author and all of the editors at SPECTRUM should be blushing
until you have atoned for this muddled miasma.

(This current piece of misinformation follows close on the
heels of an article in the April issue in which you assert "for a
mere $49" you can buy a device that will "detect small changes in
line impedance" and notify the user of a telephone line tap.)

Let me be agonizingly specific -- and your audience is
electrical engineers so we'll use engineering terms. In analyzing
"Eavesdroppers' Whammy" I'm going to quote specific sentences out
of what you presented, and comment on each one.

Quote #1

"About $50 buys you any of several commercial devices said
to prevent a tap or unauthorized person from listening in on your
telephone calls."

Comment #1

This sentence is correct, but you must pay careful
attention to the words "said to prevent a tap". Many people offer
equipment that they say will detect taps on phone lines.

The kind of people who sell such devices are the same kind
of people who sell nostrums to grow hair on bald heads, and diet
pills that melt away the fat. None of them will detect even a
simple tap made out of $2.00 worth of parts (at retail).

By the way, there are also tap detectors sold for as much as
$62,500.00 which also cannot detect the $2.00 tap.

Quote #2

"This kind of device usually drops the phone's 50 volt on-
hook voltage to about 18 volts instead of the normal 12-15 V
whenever you lift the receiver."

Comment #2

All wrong, except that the usual on-hook voltage in this
country is 50 V. (Although there are many PBXs (private
exchanges) that operate on different on-hook voltages.)

First, you say that off-hook voltage is normally 12-15 V.
Well, on hundreds of real telephone systems I have measured off-
hook voltage as low as 2 V and as high as 30 V. The most common
is about 8 V, but there is no norm that can be counted on.

Second, you assert that when I tap the phone line, it will
cause the off-hook voltage to increase by about 50%. Wow!

When I tap the phone line, you'll see no change in either
on-hook or off-hook voltage. My tapping equipment (all $2.00
worth) does not affect the line in any way that can be detected
electronically. There is no measurable change in line voltage
because I am not loading the line at all.

As a matter of fact, we have even run tap-detection tests
with a time domain reflectometer (TDR). The engineers and
technicians who participated in the tests were very experienced
with the TDR, and they were never able to tell when my tap was
on-line or off-line.

Quote #3

"As a result, the impedances of your phone and the tap
should not match and your phone should go dead."

Comment #3

Huh?

Look. The standard telephone presents almost pure resistance
to the line. It is, after all, operating in a DC circuit ---
just direct current running through it while it's in operation.
That resistance is on the order of 600 to 900 ohms in most old
sets. My tap, on the other hand, uses a blocking capacitor so
that the impedance seen by the DC circuit has essentially
infinite magnitude.

While in operation, the old-fashioned (carbon microphone)
telephone voltage varies by one or two volts -- sometimes more.
My tap will be taking picowatts of power off of the phone line
and will not cause the DC voltage to vary by even one one
thousandth of a volt.

Your assertion that my tap will cause the off-hook voltage
to be unusually high makes no sense whatsoever.

Nor does your declaration that if the tap impedance and
phone impedance don't match, the phone will go dead. When I tap a
phone line, I am deliberately creating the biggest impedance
mismatch possible -- and, believe me, the phone doesn't go dead.


Final Comment

The SCR device described will prevent someone from listening
on an extension phone, but there have been similar devices sold
for many years for a few dollars. The sellers of the earlier
devices never made any money for a simple reason. When an
extension telephone goes off hook, there is a discernable
difference in sound level (about 3 dB or half power), so why
would anyone pay for a circuit to do what your own senses do for
you?

Sincerely,

James A. Ross
President

P.S. By the way, technical surveillance countermeasures (TSCM) is
our business. If you ever need consultation (a limited amount
free) in this field, please call. We'll try to help you sort the
wheat from the chaff in the press releases that you receive in
this very specialized field.

(Quoted above is the entire text of the
letter that your editor sent to the
editor of IEEE SPECTRUM. If there is EVER
any response, you'll be advised.)


AT&T TRAINING PROGRAMS

Just received: AT&T catalogs of training programs. For
copies, or to inquire about training schedules, call 800-554-
6400.


COMMUNICATIONS HANDBOOKS AND PUBLICATIONS

Here's another good source of good information. For a
listing of available handbooks and other publications, contact
either Chuck Firnsin (312-681-7483) or R.L. Grabo (312-681-7479)
at: GTE Communications Systems Corp., 400 North Wolf Rd.,
Northlake, IL 60164 When you write or call, please mention the
ComSec Letter.


December, 1988

DISA

In case you didn't appreciate the message in our April
issue, I'll try again:

If your switch offers DISA (Direct
Inward System Access), you are in
jeopardy! You may soon join the ranks of
companies that have been ripped off.

Do not jump to the conclusion that
I'm warning that some hackers might make
some long distance calls on your lines.

Yes, hackers are a nettlesome
problem. When they discover a DISA route
(They call them "extenders" so it doesn't
sound like stealing.), they pass the word
around and your phone bill will suffer.
Yes, they can run up your phone bill, and
you'll have to pay it.

However, the people I am referring
to are organized, and they are probably
drug dealers, and they make a lot of
calls.

As I write this I am looking at a printout of calls made
through one company's DISA capability: 27 pages with 51 entries
per page. In eight days $51,624.36 worth of calls were made on
four trunks to numbers in Pakistan.

I repeat: in eight days $51,624.36 worth of overseas calls
were made through this company's DISA facility. The people at
this company were smart; they detected the theft rapidly, and put
a stop to it rapidly. If they had learned of the abuse only after
receiving the bill, it could have been a quarter of a million
dollars!

If your switch offers DISA, you are in jeopardy! In our next
issue we'll include more detail on this situation. Stay tuned!


NYQUIST vs. NYQUIL

Most folks have heard of Nyquil, but, sniffling and sneezing
bears little relationship to TSCM. Nyquist, on the other hand, is
important in modern communications; and, if you haven't heard of
it, here's your introduction to the Nyquist Criterion. It relates
to the conversion of analog signals to digital, with an eye
toward later reconstructing (D to A) a replica of the original
signal.
As usual with history questions, I don't remember the man's
full name, or country, or when he lived. However, I do remember
his premise: the Nyquist Criterion (widely used but unproved
mathematically, I believe) states that, in sampling an analog
signal in the time domain, one should use a sampling rate of at
least two times the highest frequency in the signal in order to
prevent aliasing. For example, if the highest frequency is 1,000
Hz, it should be sampled more that 2,000 times per second.

Before explaining what that means in practical terms, let me
point out that the terminology definitely proves that engineers
and/or mathematicians can invent crazy words as do the
bureaucrats. (The other day I heard a bureaucrat say that
airlines reduce fares on some routes to "incentify" customers to
use those routes. Wow!)

"Aliasing" is a word that was coined to describe what
happens when an analog signal has been sampled at too low a rate,
and the A-to-D and D-to-A process has rebuilt a signal that is
unlike the original signal, an "alias" of the original.

The Nyquist Criterion, then, is important when designing a
modern telephone which has digital output to the switch. If the
sampling rate is too low, the reconstructed analog signal out of
the switch will be a very distorted version of the original
signal.


TSCM EQUIPMENT

Recently, a retired government TSCM expert stated that it
costs about two hundred and fifty thousand dollars to equip one
TSCM team. Now that Watkins-Johnson has introduced their WJ-38000
ELINT receiver, that number will probably climb to about one
million because this receiver alone can cost more than
$500,000.00.

All kidding aside, this is a serious matter and one that we
intend to cover in detail in future issues of this letter. For
the sake of brevity at this time, let's just note that your
editor does not agree that such expenditures are necessary.
Certainly there are some government-to-government threats that
are very high level and deserve high level responses, but there
is no way to justify spending that much money for equipment to
equip every team. After all, most work by most teams most of the
time will address the standard, real-world threat. More later.


NEW WORD NEEDED

Because of the work we've been doing lately to identify the
vulnerabilities in modern electronic PBXs, we've been talking
with a lot of folks who also don't speak "telephonese". Out of
necessity we've been using the word "switch" when referring to
such PBXs. Unfortunately, when most folks hear that word, in
their mind's eye they see the switch on the wall that we throw to
turn the lights on. Confusing.

So let's start a movement to invent a better word. After
all, aren't people who work in engineering supposed to be
precise? Let us hear from you!


PULSE THROUGH A LOADING COIL?

This was a question asked by Joe Wilson Elliott during one
of our telephone conversations. I don't think I ever answered
him, but it deserves to be answered because it illustrates the
fact that different educational and training courses teach
different "facts".

Anyway, can you get a pulse through a loading coil? What do
you think? If anyone expresses interest, we'll answer the
question in a future letter.


JUMPING TO (DANGEROUS) CONCLUSIONS

Regarding spousal tape recording of telephone conversations
without consent, we reported in January: "A federal judge did
rule that federal eavesdropping laws (Title III, 18 USC 2510,
etc.) do not relate to domestic cases in certain circumstances."

2600, in its fall issue jumps from this fact to the
erroneous conclusion, ".... it is now legal for married couples
to place wiretaps on their home telephones in order to catch
their spouses doing nasty things like having affairs." We hope
the readers of this letter understand the difference between the
two statements. The ruling only said that certain specific
federal laws do not apply in certain circumstances. It did not
say that such eavesdropping is legal. There's a big difference.


RF FLOODING

One of the comments that we got on our questionnaire after
our London seminar indicated that the person wanted information
on "modern techniques such as RF flooding". How nice it would
have been if that person had read our material which pleads for
any question at any time, or listened to any of our exhortations:
"If you have a question, ask it at any time." If he had asked the
question in front of the group, we would have had an interesting
topic to discuss. We had people with exceptionally diverse
backgrounds. A discussion would have provided more than one point
of view, and that's the value of the seminar format. It's not the
authoritarian headmaster lecturing to a group of cowed students;
it's open give and take among experienced, senior people.
Well, I'm very sorry that he did not speak up. If he had, I
could have pointed out to him that RF flooding is probably fifty
years old. Also, I could have mentioned that we had been covering
some techniques which have come into use in 1988. That's right,
we were discussing truly modern methods such as electronic switch
manipulation, REMOBS, bugging of modern electronic phones, etc.
Thrown in for good measure were some comments on how companies
are being robbed (through toll fraud on a major scale) by people
taking advantage of DISA, voice mailboxes, diverters, etc.

And he wanted to discuss modern methods such as RF flooding!

In any event, I'll explain what I think is meant by "RF
flooding", with the hope that a reader will either endorse my
theory, or explain how I went wrong. Before I go on, let me
explain that I am guessing at what is meant by RF flooding. In
all of the courses that I have taken in math and electronics,
"flooding" is a term that was never used in any class or
practical exercise. I have the feeling that it was invented by a
technician whose field strength meter told him that the telephone
was full of RF, so much so that it was flooding out of it and all
over the floor. (Doesn't that make you wonder if you should wear
boots while doing TSCM?)

As you read this, keep in mind that I have never been
exposed to any government training in countermeasures, and this
explanation is based only on my response to the name given to the
technique.

So here goes. The older electromechanical telephones contain
a hookswitch which is really several switches in one assembly.
Each conductor is connected to a flexible metal strip, and all of
the strips are physically parallel and very close together. On
hook, some connections are made, and some are open. Off hook,
other combinations occur. In the on-hook condition the talk
circuitry (carbon microphone, speaker, and side-tone transformer)
are disconnected from the line in the DC sense. That is, no
direct current is possible in the circuit because the circuit is
open. However, what causes the circuit to be open is the fact
that two flat metal strips, side by side, are not touching.

Does that sound familiar? Two conductors separated by a
dielectric? Of course. That's the definition of a capacitor. And
although a capacitor may be an open circuit for DC, it sure isn't
open for RF. In fact, it is nearly a perfect conductor.

So my guess is that somebody fifty (or so) years ago figured
out that he could connect to the talk circuit by applying RF to
the talk pair. I've never tried it, and don't know anyone who
has, but the theory is sound. Although the audio recovered is
probably not good, and it certainly is easy to detect.

Well, there's my answer. If I'm way off base (or even a
little off) I'd like to hear from anyone who can set me straight.
I'll run the best answer that comes in. How 'bout it???

← previous
next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT