Copy Link
Add to Bookmark
Report

COMSEC Letter 1987

eZine's profile picture
Published in 
Comsec
 · 25 Apr 2019

  

ComSec Letter

Editor: James A. Ross

YOGO 3

1987
























COMSEC LETTER


The ComSec Letter was started in 1984, The Year Of George
Orwell, by Jim Ross. Initially it was mailed at no charge to
everyone on his mailing list, and it was later offered by
subscription. After the founding of the Communication Security
Association, the letter became its official organ. In 1989 the
association decided to create a new organ, Comsec Journal; and,
in order to minimize confusion, the name of this letter was
changed to Surveillance.

What follows is an edited version of the contents of one
year of the letter. (The letter has been edited to remove
topical, superfluous, and outdated items.)



Ross Engineering, Inc.
7906 Hope Valley Court
Adamstown, MD 21710
Tel: 301-831-8400; Fax: 301-874-5100


January, 1987

ANNOUNCING!

The ComSec Association announces its second annual meeting:

SURVEILLANCE EXPO '87

to be held at the Sheraton Hotel and Exhibition Center, New
Carrollton, MD (on the Washington, DC beltway) October 20 - 23,
1987.

Conference and Exhibits: October 20 - 22.
Membership meeting: October 23.

The conference and exhibits will feature the latest in the fields
of communications and information security, surveillance and
investigations technology. The ComSec Association will again
offer seminars and panel discussions featuring people with real,
current experience in their fields. We're billing it as a "nuts
and bolts" affair.

Although the program is not yet fully defined, we're arranging
for conference participants to be able to interact with "hands-
on" experts in areas such as:

DES vs. Other Standards
Defense against Hackers
Defense against Electronic Eavesdropping
Modern Methods of Phone Tapping
NSDD 145
Electronic Communications Privacy Act
Biometric Access Control Systems
Night Vision Equipment
and more, much more.

In order to tailor the conference to the needs of security
professionals, we're sending out a questionnaire to 25,000
qualified people, asking them to rate the desirability of many,
many subjects. Once those results are tabulated, we'll be
contacting the people who have volunteered. If you are interested
in making a presentation, send us a short note outlining your
topic and your qualifications.

For more information:
Shirley Henschel, Conference Coordinator
Surveillance Expo '87
9306 Wire Avenue Suite 701
Silver Spring, MD 20901
301-588-3929

ECPA

Electronic Communications Privacy Act. That's the new law that
decrees that there are some frequencies that we should not tune
to. If they want to enforce it, they'll have to create "Frequency
Police". (All calibrated at NBS to prevent accidental arrest due
to incorrect frequency readout.) Looks like "Thought Police" will
be the next step.
But let's be serious about this silly law.
We're still working on trying to understand all of its
provisions, and we've had some interesting discussions with Bob
Horvitz, Bob Jesse, Barbara Rowan and others. It looks like we'll
have a great panel discussion at our fall meeting!
Anyway, for this month our comments about this law relate to the
"jaw-dropper" that we heard in Beverly Byron's (our Congresslady)
office. As we picked up the material which tells how to amend the
old law we commented to the staff, "If the new law says what
we've been told it says, it will be illegal to listen to stereo
music on the radio, or to MUSAK." The response from the staff
was, "It doesn't matter what it says now. They always change the
words after a law passes to make it mean what they meant to make
it mean in the first place."
Now isn't that a fine kettle of fish!
Our elected representatives vote to create a new law, and then
somebody rewrites it after they vote on it, to change its
meaning!


PUBLICATION OF INTEREST
For some time now we've been reading Police and Security News
with some interest. The reason for this comment at this time is
that in the January-February issue a new column was introduced.
Written by Steve Uhrig, it relates to modern electronics as
applied to police work. The first column is entitled "James Bond
Electronics -- PRACTICAL for the Small Department".
Our hats are off to Dave Yaw, Publisher, and Steve Uhrig,
author. Good, practical, down-to-earth information of this kind
has been sadly lacking in our opinion -- especially in law
enforcement publications. As a matter of fact, good technical
information is really hard to come by in many of the popular
security and communications magazines. (One of the communications
magazines recently said that ISDN stood for Integrated Standard
Data Network; that you should have a "lightning rod to attract
and safely ground lightning"; and referred to bandwidths of 64
kilobits and 1.544 megabytes.) (In case you're not a
communicator, ISDN stands for Integrated Services Digital Network
[or Innovations Subscribers Don't Need, depending on your point
of view]; lightning rods create a field to try to prevent
lightning hits; and bandwidths are measured in Hertz (related to
bits or bytes per second, but not related to a number of bits or
bytes.)
Anyway, back to Steve's first column. Overall it should be of
value to the people it was aimed at -- law enforcement officers
in a small department. They don't have experts in electronics,
night vision, etc in their organizations, so they need all the
help that they can get. We're looking forward to seeing many more
columns like this in that publication. For subscription
information, P&SN, POB 330, Kulpsville, PA 19443.


SURVEILLANCE EXPO '87
How did we come up with that name? Well, as you may recall, our
first conference was entitled "ComSec EXPO '85", a good name for
a meeting of an association of folks who work in the field of
communication and information security. However, much of the
technology related to investigations so we called one track
"Investigations Technology". This year, in preparing for our
second meeting we went over our notes relating to the earlier
conference and found that surveillance was the one common thread
in all of the interesting panel discussions and exhibits. We
tried every way from Sunday to bring the ComSec name into the
title, but surveillance always was there.
So that's how the name, Surveillance Expo 87 came about.
By the way, potential exhibitors, there is no conflict with the
IACP meeting which starts in Toronto on the 24th. C'mon in and
show your wares. We are planning a great show, and expect that
attendance will be several time what it was during our first
show.


OTHER COMSEC ASSOCIATION NEWS
Your directors have decided to take the advice of some
membership association pros, and to fly in the face of some other
advice from some other pros.
The advice that was taken says that it is nonsensical to end
membership years one year from the date of joining; all
memberships should expire on the same date. Therefore, we have
decided that the end of our membership year will be September 30.
All current members will be asked to make a pro-rata dues
correction by Paul Bowling in the near future.
The advice that we did not take told us that life memberships
normally cost 20 time annual dues. We decided that we'd like to
offer life memberships to current members for a limited time at
10 times annual dues, and set Dec 31 1987 as the cutoff date.
That's right. If you are now a member, or ever have been a
member, you may become a life member for $500 anytime between now
and the end of this year. If you have never been a member, your
cost will be $550 during this year only. After December 31, life
membership will cost $1,000. (these rates are for USA, Canada,
and Mexico; other countries: $700 and $770 before December 31;
$1400 after that date.)
Also, we've done away with student memberships because of all of
the problems that they created. We want very much to have young
folks who are going to school involved and learning about this
technology, and we tried; but the problems of administering
student memberships were too much. Maybe one of our members will
devise a way that we can keep students involved. Let's hope so.


STARTING OUR FOURTH YEAR!
It's amazing how time flies when you're having fun. It's hard
for us to believe that this is the fourth year that we've been
turning out this letter. We've enjoyed it; hope you have too.
The first issues were typed on an IBM PC by a two-fingered
typist, and stored on floppy disks before being printed on a dot
matrix printer. Now they're stored on an almost-full 10 meg hard
disk before being printed on a laser printer. Some things never
change, though. They are still typed with two fingers.


NEW CORPORATE MEMBERSHIP PROGRAM
At a recent board meeting your directors decided to offer
corporate memberships at rates which relate to the size of the
corporation. (Actually, the program relates to any business or
association, whether incorporated or not.)
Here's the way it goes:

Number of employees Annual Dues Number of Members

1 to 5 $150 1
6 to 10 300 2
over 10 450 3

The members will be designated by the corporation, and may be
changed if an employee leaves or is transferred. The memberships
carry full membership benefits and full voting rights.
The corporation will receive a 10% discount on everything
purchased from the association such as advertising, booth space,
etc. In addition, the corporate members will be listed in various
publications as a sponsor of the association.


NEW CONTEST!
The grand prize is a mention in this letter, and doing the
research and compiling the results will be arduous; but maybe
somebody will take the challenge just for the fun of it.
What we're looking for is a listing of organizations,
businesses, etc. that routinely tape telephone calls without
notifying the caller. What comes to mind immediately are
stockbrokers, emergency services (fire, police, ambulance), hotel
hot lines (all Marriott hotels have a "guest hot line" for
problems), some private investigators, etc.
The next step in this research is, of course, to list the number
of criminal indictments for illegally recording telephone
conversations.
The serious intent of all of this work is to make available to
all (even lawmakers) real information on the real world.
All contributions welcomed with open arms. They don't have to be
fancy, just readable. Y'all come. Heah?


BY-LAWS; ELECTIONS
The founders of CSA pledged to always keep in mind that the
first duty of a membership association is to provide service to
the membership. At our organization meeting on October 23, 1987,
members will be asked to approve the By-laws created by the
current directors. Those By-laws specify that directors will be
elected by the members, and the officers will be chosen by the
elected directors. During that meeting, we will be electing some
new directors and installing a new slate of officers. You are
urged to attend, and to assist in the planning beforehand.


TAP, BACK ISSUES
Ben Harroll advises that back issues of TAP are available from
Pete G, PEI, POB 463, Mt. Laurel, NJ 08054 @ $100 for the full
set, which includes issues 1-83 and some schematics. We'd be glad
to pass on any comments from satisfied (or dissatisfied)
customers.


February, 1987

COMSEC ASSOCIATION ANNUAL MEETING

The second annual meeting of the ComSec Association
(details: page 2) will be held on October 23, 1987 in conjunction
with


SURVEILLANCE EXPO '87.

to be held at the Sheraton Hotel and Exhibition Center, New
Carrollton, MD (on the Washington, DC beltway) October 20 - 22.

Surveillance Expo '87 will feature three full days of
meetings, workshops, and seminars with lots of time available to
visit the exhibits. The conference and the exhibits will cover
the latest in the fields of:

SURVEILLANCE & COUNTERSURVEILLANCE

INVESTIGATIONS TECHNOLOGY

COMMUNICATIONS AND INFORMATION SECURITY

TECHNICAL SURVEILLANCE COUNTERMEASURES

RELATED TECHNO-SECURITY FIELDS

At SURVEILLANCE EXPO '87 we are dealing with many technical
subjects which, all too often, have been

sensationalized to the point of absurdity,
misunderstood by the press and public,
misrepresented by unscrupulous hucksters.

We are planning an event which presents detailed and factual
information which can be understood and appreciated by attendees
who are not technical experts. SURVEILLANCE EXPO '87 is intended
to be a "nuts and bolts" conference with heavy emphasis on real,
practical, down-to-earth information.

In order to tailor the conference to the needs of security
professionals, we're sending a questionnaire to qualified people,
asking them to rate the desirability of many, many subjects. Once
those results are tabulated, we'll be contacting potential
speakers. If you are interested in making a presentation, send us
a short note outlining your topic and your qualifications.


COMMUNICATIONS SECURITY ASSOCIATION

Objective. The objective of the ComSec Association is to enhance
professionalism in the information and communications security
field. The principal activity in support of this objective is to
provide accurate and unbiased information on the technologies
relating to protection of privacy. This means a heavy emphasis on
communications and information, but it also includes the field of
surveillance. The association encourages open and complete
interchange of information among members.
History. The ComSec Association was founded in 1984 as a
non-profit membership association. The first annual meeting took
place in December of 1985 in Washington, DC. No meeting was held
in 1986, so the 1987 gathering becomes the second annual meeting
of the members. There are currently about 300 members.

The founders, Arnold Blumenthal, James A. Ross, and Craig
Silver elected Ross to serve as president until By-Laws are
adopted, and a new board of directors is elected. Craig Silver
later agreed to serve as the association's counsel and,
therefore, had to resign from the board because he could not
represent an organization of which he was a director. Kenneth R.
Taylor, President of Target International Corporation in Miami,
was elected to fill the vacancy. Later, the board size was
increased to 5, and Paul Bowling of National Investigative
Services, Inc. and Eugene T. Smith of Teltron, both in the DC
area, were elected to fill the vacancies. Smith later resigned.


Second Annual Meeting. The second annual meeting of the ComSec
Association will take place on October 23, 1987 at the Sheraton
Hotel, New Carrollton, MD following Surveillance Expo '87.

All members of the association are urged to attend. The
organization is involved in fields of technology which are
changing dramatically and rapidly. As professionals, we must
continue to study and learn, and the conference and exhibits will
provide a great learning opportunity. Several of our '85
exhibitors have reserved space, and we're hoping to have about
100 exhibitors as compared to 43 last time.


New Director. Recently the Board of Directors met to elect a new
director to fill the vacant slot, and voted to bring Chuck Doan
on board. He has agreed to handle the job entitled VP, Finance.

Finally, after years of confusion, the money matters of the
association are going to be organized.

If you want to contact him, his address is:
Charles W. Doan
Clancy, Doan Intl. Assoc. Inc.
117 Rowell Ct.
Falls Church, VA 22046
703-237-0611

Welcome, Chuck!


ECPA, WHAT DOES THE LAW SAY?

While visiting a colleague in another state recently, I
heard him tell a journalist that it was OK to record telephone
conversations of people talking on your own company's phone
without their knowledge or consent. Your big smart expert editor
advised him that it might be all right according to his state
laws, but that such eavesdropping was a federal felony. He
countered with, "I checked with the FBI and they told me that
it's OK."

Wow. Maybe I really don't know what the federal law says.
Better read it again after I get home.

You know how it goes. You get back from a trip, and here are
all these things awaiting your attention, so the law did not get
read.

Then comes an issue of Communications Week with a feature
article on SMDRs, and in this article there is a flat statement
that the law's "business extension exemption" lets employers
eavesdrop on business related calls.

Wow again. Grab old law. Must be in 18 USC 2511. Read. Read.
Read. No mention. Ah Ha! Get smart. Call Barbara Rowan.

Dear sweet lady takes time out from writing a memo with an
impending deadline. "Must be in 2511." she says. "Hmmm." she
says. "Can't find it. Have to call you back."

While Barbara is researching this, let's hear from you. What
do you think the law says? Or is there some case law in which the
judge took it upon himself to do the job of the legislative
branch?

Meanwhile, your ol' ed has been trying to unravel the
puzzle. He talked to the reporter who wrote the story in CW, and
the reporter referred him to the lawyer who was quoted. After six
calls to San Jose, Robert D. Baker called me back. Asked if he
had been correctly quoted in the CW story, he asked, "What's
Communications Week?" So I read him his various statements, and
his response was that he had never made those comments; in fact,
he said that, as a civil rights lawyer, he would have responded
exactly opposite to the statements attributed to him.

So, Jon Swartz and the editors of Communications Week, the
ball is in your court. Where did you get the idea that there is a
"business extension exclusion"?


BACK ISSUES OF COMSEC LETTER

Soon all of the back issues of ComSec Letter will be
available on our BBS. At present, we are editing those letters on
our word processor, and will upload them to the board when
finished. (No, we're not removing the mistakes; we're editing to
remove topical items such as meeting announcements, etc.)


AN IDEA TO WAKE UP SOME SELF-SATISFIED BUREAUCRATS

Recently, I talked to some government people about the mess
in Moscow. Among others, I called the staff director of the
committee which was planning hearings about the bugged embassy in
Moscow. The reason for the call was to advise that there is a
professional association that has TSCM experts available to
testify. He said that they planned to call only government
witnesses, implying that only people with government security
clearances could possibly understand advanced bugging systems.

Ha! It was government experts (with security clearances but
no knowledge of resonant cavities) who checked the Great Seal
that the Soviets gave us, and said that it was OK to hang it in
the Ambassador's office. As a result, of course, the Soviets were
able to hear everything that was said in that office for years.

In fact, they would still be listening except for the detail
that a defector told British intelligence about it, and the Brits
contacted our people saying, "I say, old chap, did you know..."

So the State Department is attempting to recruit 200 people
(in Houston because there's a lot of unemployment there) so they
can beef up security around the world. Wow! They're going to take
some people off the street, give them 80 hours of training, and
ship them out to protect our embassies from espionage. They
actually plan to use these instant experts to counter the efforts
of the Soviet professionals. Only in America!

So here's the idea to shake up some fat cats who think that
only government experts know anything about bugging. Let's have a
brainstorming session during Surveillance Expo '87 to discuss new
ways of bugging. We'll invite members to present ideas, and get a
consensus from the group as to the practicality of each. Of
course, no one with a government security clearance will be
allowed to submit proposals.

Its a free country, so the press will be invited. We'll
discuss sound conduction through pneumatic tubes, remote
transmitter location, delayed transmission of recorded audio,
irradiation of non-linear junctions with microwave energy,
various spread spectrum modulation schemes, modulation of light,
transmission of modulated ultrasound through pipes, etc.

What do you think? Do you think knowledge of electronics is
reserved unto government people? Let us hear from you.


March, 1987

SURVEILLANCE EXPO

Well, a few people did a lot of work, but many of the things
we thought would come true never did, so the board has decided to
postpone Surveillance Expo '87.

At this time, we cannot even provide a tentative date for
the rescheduled event. However, here's a personal promise from
Jim Ross: before he announces another date, he'll be absolutely
certain that all resources needed to ensure success are in hand
and not just promises.

The single overriding reason for our failure was our almost
total dependence on volunteers due to lack of funds to hire help.
Therefore, our plan is to use currently available resources to
enlarge the membership so that we'll have the wherewithal to be
able to hire professional help.

The first step in this process is to collect dues from
current members by sending dues-due notices with the ComSec
Letter. (Seems like a sensible thing to do, but it had never
been done before.) Next, we plan to increase the dues revenue by
increasing the number of members through mass mailings. Because
several firms have agreed to participate in a joint mailing for
the benefit of the association, and to pay all mailing costs,
we'll be able to do this for only the cost of creating and
printing the mail piece. The first mailing is scheduled for
July, and another will follow shortly thereafter.

We're charging participating businesses $2,000 to send a
mail piece to 25,000 prospects (Security Systems subscribers and
everyone on the Ross Engineering mailing list). If your company
could benefit by mailing to such a list, call Jim Ross right
away. We plan to mail to 50,000 people in the next three months.


MOSCOW EMBASSY FLAP

One of our correspondents reported that he had had a
conversation with an AT&T manager who had just returned from
Moscow. The AT&T fellow said that they had been unable to pull
wire through the in-place conduits because the conduits were
already full of Russian wire.

That's the way to do it. Don't be subtle. Run your bugging
wiring through the same conduits that are used for legitimate
communication. Oh well.


MEMBERSHIP DUES

With the previous issue of this newsletter we sent out small
notices to all members whose dues were paid to any date other
than September 30, 1987. (The membership year now runs through
September for everyone, so that all memberships will expire at
the same time.) A word of explanation is in order.

Because of changing responsibilities among the directors of
the association, a long period went by with no dues notices being
sent to anyone and we decided that it would not be fair to dun
people for back dues when they had never received any notices.
Therefore we devised a small notice and advised on the amount
necessary to extend membership through September 1987, or
September 1988.

Our thanks to all who have responded. If your payment was
received before this issue was mailed, your new membership card
is enclosed. (A new certificate is in the works; please be
patient.) We're really gratified that renewals are outnumbering
cancellations by about twenty to one. Also, we really appreciate
the confidence demonstrated by all, and we're proud to report
that more than half are renewing through 1988.

If we have not yet received your renewal, you'll find
another little note in the envelope with this letter. As we have
pointed out, all records are being maintained by volunteers, and
we know that we're not perfect. If you don't agree with our
records, don't stew about it; let us know and we'll correct our
files.


MOSCOW EMBASSY FLAP, II

Lessee now. The Senate wanted to get technical advice on
what to do about the bugged embassy, so they asked the experts
who let the Soviets bug it in the first place. Based on that
expert advice, Senator Boren says we'll have to tear it down, and
build it over again.

As we see it, senator, it looks like this. First your
experts let the Soviets get away with what you report as
extensive bugging, and then they throw their hands in the air,
saying, "The Soviets are too smart for us; we'll have to give up
and tear the building down."

A question for the senator: "What makes you think that those
same experts will be any smarter or more in control the next time
we try to build this building?"


ECPA

These comments on the Electronic Communications Privacy Act
are triggered by an editorial by Wayne Green in a recent 73
magazine. Under the heading "CONGRESS GOOFS", Wayne points out
that the prohibition against listening to what has been broadcast
on cellular frequencies has proved to be very helpful to
organized (and disorganized) crime.

To understand, you'll first have to appreciate that not
everyone lives by the rules, and that the cellular system is a
great technical achievement, but lacks one essential
administrative ingredient. The people who designed the system
must have assumed either that all users would be honest, or that
no one other than their trusted techies could enter the
electronic serial number (ESN) into a cellular transceiver.
Operating under such an assumption, they established a
verification system that looks only for negatives when deciding
to accept a call. That is, if you have reported your phone
stolen or have not paid your bill; you will not be able to make a
call because your ESN will be listed in the file as NG. That's
fine if everybody is honest, but that's just not the case and the
crooks soon found that they could have fictitious ESNs entered
into their machines, and the system will accept calls from them
because they are not on the bad guy list.

What this all means is that the cellular phone companies
check a NG list before accepting a call, but they don't have any
way to check that the ESN is a valid one. So the bad guys have
phoney IDs entered into their machines, make calls all over the
world, never have to pay for them; and, because of the ECPA,
never have to worry that what they say on the air will be used
against them.

Wayne ends his editorial with the following paragraph:

"If it weren't against the law to listen to cellular channels,
I'd suggest that we hams help the law by listening for suspicious
cellular calls and recording them. Say, how'd you like to get
the goods on some serious crooks and find (a) the evidence is
inadmissable because it was illegally obtained and (b) yourself
on trial for making the recordings. So join me in a big laugh,
okay?"

Well, if you've been reading the ComSec Letter, you know
your editor's opinion of this law, but I can't go along with
laughing at it. It's a perversion, and should be done away with.
Period.


NO MORE ASSOCIATION BULLETIN BOARD

Well, we did have a bulletin board for a while, but Paul
Bowling, who did all the work and bore all of the expense,
decided that he wasn't going to do it any more.

We're sorry. We think that this organization should have a
computer bulletin board, and we're determined to establish a
permanent board for the use of members. Stay tuned.


GREAT NEW PRODUCT!

Radio Shack has done it again! If you ever have need for a
DNR (dialed number recorder), get right down to your Radio Shack
store and check out their CPA-1000. It's a neat little package
with a neat little price. It will print out all of the numbers
dialed, length and time of day on all calls. In fact it does
essentially everything that the 10, 15, and 20 thousand dollar
units do, and it sells for one hundred dollars! Wow!

(Ed. note: I just read over that last paragraph, and I used
more exclamation points in that paragraph than I used all last
year. Well, the CPA-1000 is worth every one. Double Wow!!)


NEW PUBLICATION

Glenn Whidden of Technical Services Agency, Inc. has
announced a series of technical articles on electronics,
eavesdropping, and countermeasures. Everyone working in the
field of countermeasures should try to learn about electronic
communications, and these papers certainly will be helpful.

Good luck, Glenn. I know it's wishful thinking, but I hope
some of the "professionals" in this field will begin to get an
education. Unfortunately I'm afraid that their egos are such
that they know they don't even have to learn the meaning of words
they use like frequency, impedance, resonance, etc. Their eyes
glaze over if you mention Maxwell's Equations or Bessell
Functions, and if you use a common phrase like L di/dt, they
think you're speaking a foreign language. (To them, of course,
calculus is a foreign language.)

Well, maybe some of the companies that have started in-house
TSCM programs will subscribe for their technicians. I hope so.
Education protects us, and every step toward better education is
a good step. C'mon, all you corporate security managers. Order
this course for your TSCM people. Contact Glenn Whidden on 301-
292-6430, at TSA, 10903 Indian Head Hwy #304, Fort Washington, MD
20744. It's $130 for twelve issues, and well worth it.

The August issue of Radio-Electronics magazine lists six
different national non-profit associations which examine and
certify electronic technicians. We'll be pleased to list
everyone in the profession who achieves certification. Send a
copy of your FCC license or technician certificate to the editor.





April, 1987

GREAT IDEA!

This idea came from one of the participants in a recent
seminar, and relates to my comments that infinity bugs are not
much of a modern threat because they require a cooperating
telephone if the target is on an ESS exchange (and almost
everybody in this country is on an ESS exchange).

(The reason that they are not much threat is that they
answer the phone before it rings. So, if you installed one on
someone else's phone as a bug, it probably would not last long
because he'd wonder why his phone never rings and have it
checked.)

The great idea that was put forth in the seminar is that an
infinity bug sure would work fine if installed in a conference
room telephone.

Think about it. If there is direct dial to the conference
room (no operator on a PBX listening for the ring signal on the
conference room extension), this could be a major threat. Unless
there is accidental discovery, there is a good chance that no one
would be at all suspicious of the lack of a ring on the phone.
Another good reason to get rid of phones in conference rooms.


MEMBERSHIP DUES

With each of the last two letters we have included a note to
each member who had not sent in dues to renew his membership
according to our records. The response has been very
encouraging, but there are still many people receiving this
letter who have not renewed their memberships.

We cannot afford to continue to send the letter if we do not
have support in the form of dues payment. Therefore, be advised
that this may be your last letter if we have not received your
payment before the next issue is mailed. It will be your last
issue unless you advise us of an error in our record keeping, or
we find that we have made an error.

Speaking of errors, we certainly don't claim to be perfect.
First we had the list on the Ross computer; then we went to an
outside vendor which had three owners in rapid succession, then
we went to a volunteer who didn't have time enough, and now it's
back on the Ross computer. Yes, there have been some errors, but
we think we've just about got it all straight finally.


WHO MONITORS OR RECORDS ILLEGALLY?

THE PREMISE

In a recent COMSEC LETTER we asked our readers to send us
examples of how the federal law requiring at least one party
consent to monitor or record conversations is regularly violated
with no legal action taken against the violators. After all, it
is a federal felony, and we would logically expect enforcement by
constituted law enforcement agencies, no?



POLICE

Well, it may just be that law enforcement agencies are the
biggest violators. Here in Maryland (where state law requires
all party consent to record phone conversations) some Montgomery
County police officers have brought suit for $865,000 against
their department alleging that their calls were recorded without
their consent. It seems that the Montgomery County Police
department routinely records all calls to the department, not
just those calls to the 911 emergency number.

Come to think of it, is there an exception in the law which
allows recording of calls to emergency police numbers? I just
read through 18 USC 2511 again, and I can't find any exemption
allowing such recording. Are police departments regularly
committing felonies while they're trying to do their jobs right?

What do your state's laws say?

SCHOOLS

Most schools have intercom systems which allow selective
messaging to all rooms, to some selected groups of rooms, or to
single rooms. In addition to allowing messages to be sent to the
rooms, the systems also allow listening to activities within the
rooms. My consultants advise that the system used in the schools
where they worked had no light or other signal in the room to
alert occupants that they were being monitored.

It looks like this is another case where people who are
trying to do their jobs right are violating the law without even
being aware that such a law exists.

The California Supreme Court has ruled that such monitoring
is a violation of the students' right to privacy.

COMMERCE

In the July issue of Security magazine an item described the
use of monitors in McCormick Place, a Chicago convention and
exhibition center with "tubed walkways" and large parking areas
where providing personal protection is difficult. According to
the article the security department uses Aiphone intercoms to
listen for trouble.

Again, we have people trying to do their jobs right, and
apparently violating the law in the process.


THREAT ASSESSMENT, TELEPHONE TAPS

GENERAL

In estimating the threat to privacy posed by telephone taps,
several factors must be considered. First and foremost, we must
evaluate what it is that any tapper hopes to accomplish. What is
it that we have that is of value to someone else? Second we must
determine his strength. What resources can he commit to
accomplishing his aims? Those resources can be summed up as
technical competence, time, access, and money.

MAJOR THREATS

Strange as it may seem, one of the most dangerous threats
might be from a small competing business, run by an electronic
hobbyist, which occupies space in the same building.

The rationale for that statement goes as follows. A
technically competent small business owner can do the work
himself without involving any one else. He has no time pressure
and he has access. He doesn't need much money because he doesn't
need to hire anyone and the equipment involved in tapping is
ridiculously inexpensive (less than $100). He could easily
install automatic recording equipment and scan the recordings for
the information that he wants.

On the other hand, supposing the threat is from law
enforcement. Contrary to the impression created by TV shows, law
enforcement agencies are not all-wise and all-knowing. Some
departments have no one capable of tapping phone lines, and
getting the necessary court order can be difficult. However,
let's consider a qualified law enforcement organization.

If the activity is to collect evidence to be used in a
trial, they must be very careful to be certain that the evidence
will be admissable. We believe that a good defense attorney will
attack any incomplete tap-generated evidence, and that means that
all lines must be monitored. Further, officers must be assigned
to the listening post and other officers must be assigned to keep
the suspect under surveillance so that they can provide
corroborating testimony. In addition to monitoring all lines and
transcribing all tapes, a continuous chain of custody must be
maintained over the tapes and sometimes experts must be used to
verify that the tapes have not been altered, etc.

(Recently one of our seminar participants advised that his
state requires that there must be continuous human monitoring of
all lines so that only the conversations of the suspect are
recorded, creating even more manpower requirements.)

SUMMARY

Law enforcement has a major job on its hands when it sets
out to gather evidence via wiretaps. On the other hand, the
competitor operating without rules can do the job very simply.
He is not looking for evidence, only information.


SOME GLOSSARY TERMS

ACM. Audio countermeasures. Another name for TSCM.

BRIDGE. In telephone parlance this can be a noun or verb
and refers to making a parallel connection to a pair of telephone
wires. In contrast, in electronics a bridge is a four-terminal
device with several applications depending upon configuration.

DIALED NUMBER RECORDER (DNR). Device which records all
activity on the telephone line to which connected. Time off-
hook, time on-hook for all calls; numbers dialed for all outgoing
calls. In the days of pulse dialing a device called a pen
register did the job of recording numbers dialed.

ESS. Electronic Switching System. The newest of the
switching systems in use by the telephone companies in the USA.
You are served by an ESS exchange if you have access to the
special features of call waiting, call forwarding, and three-way
calling.

HARMONICS. Frequencies that are integral multiples of the
fundamental frequency.

HERTZ (Hz). Unit for measuring frequency equal to one
cycle per second. KiloHertz (KHz) = 1,000 Hz; MegaHertz (MHz) =
1,000,000 Hz; GigaHertz (GHz) = 1,000,000,000 Hz.

TEMPEST. Refers to classified government effort to protect
against compromising emanations from electronic equipment. (It
may be a coined word, and it may be a semi-acronym from transient
electro-magnetic pulse emanation standard.)

TITLE III. Refers to equipment for surreptitious
interception of communications. For most people, possession,
advertising, sale, and use of Title III equipment is a felony.

TSCM. Technical Surveillance Countermeasures. Commonly
called debugging, sweeps, or electronic sweeping. However, these
terms do not adequately describe the full range of TSCM
activities, and seem to be more descriptive of "magic wand"
operations and not of professional work. Let's stick with TSCM.


May, 1987

SOME COMMENTS FROM YOUR EDITOR

We're now in our fourth year of composing this letter, and
it seems to be a good time to plan some changes based on that
experience. So here we go.

1. Many of the people who have written to us have received
no thanks either directly or in print; so we're resolving to
rectify that by starting the process of acknowledging all of the
folks who have sent clippings, comments, suggestions and
questions. Therefore, beginning with this issue, we're going to
include either Feedback or Questions and Answers or both as
regular features in this letter.

2. We've been neglectful of late in steering you toward (or
away from) publications that we have read so we're resolving to
pass along opinions on such things on a regular basis; and in
this issue you'll find a review of two items recently read.

3. It has long been our desire to include a short technical
essay with each issue of the letter. At this time we're not
ready to commit to a new essay with each issue, but at least
we're ready to start. Beginning with the next issue you will
receive two pages each month from the glossary which has been
created by your editor for his seminar, Defense against
Electronic Eavesdropping.

4. Each summer has been a catastrophe as far as schedules
go, so we're going to face facts: getting the letter out each
month in the summer is not possible so we're going to go with ten
issues per year. (To answer Ben Harroll and others who have
asked: No, we did not publish in July and August last year [YOGO
2.07 and 2.08].)

5. Teleconnect and The Councillor (the organ of the Council
of International Investigators) have several times republished
some of the thoughts in this letter, and we're pleased. We
invite all editors to republish anything with appropriate credit.

6. Last, but not least, we're looking for practical ways to
improve this letter and get more information out each month. New
hardware and software will help us to dress it up, but we'll need
additional income to expand to 8, 12, or 16 pages. We've given
serious thought to selling advertising in the letter or mailing
advertisers messages in the same envelope. What do you think
about receiving advertising messages in/with the ComSec Letter?


FEEDBACK

(The following comments are based on the material that
happens to be on the top of the stack. There were no criteria
for determining what to include at this time; we merely grabbed
the items closest at hand. Next month we'll add some more.)

We get clippings and calls on a regular basis from the folks
at Sherwood Communications Associates. They have a lot of
contacts with a lot of people in this field, and really do a
great job of keeping us informed.

From California, Norman Perle sends us copies of his press
clippings, and Roger Tolces sends an occasional note to advise
that your editor doesn't know what he's talking about. (By the
way, Roger has submitted a report on a bugging system that he
found and we'll get around to running it as soon as we can find
time to edit it.)

Don Schimmel gets the credit for calling our attention to
the two-faced operation of our Congress with regard to the
airwaves. (See the segment entitled "Who does own the airwaves?")

Nice note from Jerold Hutchinson with his membership
renewal. He says he enjoys reading the newsletter and "keep up
the good work." Thanks Jerold. Encouraging words help.


QUESTION AND ANSWER

Q. Our old friend, Ted Genese, sent along a flier from
Winkleman in England, and asked what they meant by "line
interceptor [which] enables an adversary to monitor more than one
communications line from a single listening post."

A. Well, Ted, we featured some of the US Winkleman claims
in a letter about two years ago. As I recall they claimed
"Complete Protection against Wiretaps", but never demonstrated
that they could provide such protection. (The reason that they
couldn't, of course, is simply because nobody yet has any
equipment which will detect a simple tap properly installed.)

Our mail to their last US address comes back "Moved. No
forwarding order", so we presume that they have closed their
offices on this side of the pond.

To answer your specific question, Ted, I don't know what
they mean by a line interceptor. Sounds mighty mysterious, but
it doesn't sound like anything I have ever studied about in
communications electronics. However, the idea of monitoring
several lines from one location is nothing spectacular; answering
services do it all of the time. Nothing spooky about it at all.

I hope our public servants who tap lines save a few tax
dollars by consolidating a lot of taps in one listening post.
Paying a few extra dollars out to the phone company for lines to
one LP is a lot cheaper than setting up and manning many
different LPs.


WHO DOES OWN THE AIRWAVES?

If you've been reading this letter, you might have received
the impression that your editor is not a fan of the ECPA of 1986
(Electronic Communications Privacy Act). You'll recall that he
thinks it is stupid to pass an unenforceable law, especially one
that makes it a crime to listen to what has been broadcast.

Yes, that's right. Our legislators passed a law that makes
listening to the content of broadcasts on some frequencies OK; on
some others, a misdemeanor on others, a felony. (Soon we will
have to have a frequency meter, with calibration traceable to
NBS, with us at all times while we tune our radios.)

In any event, Congress passed this silly law in November of
1986, and it became effective in January, 1987.

In the summer of '87 the FCC abolished the "fairness
doctrine" which had forced commercial broadcasters to provide
equal time, and thereby really angered the Congress. In the
words of Ernest F. Hollings, Chairman of the Senate Committee on
Commerce, Science and Transportation, "The American people, not
the broadcasters, own the airwaves!"

Well, yeah, OK, Senator. If we own the airwaves, why did
you vote to make it a crime to listen to what has been
transmitted over those airwaves into our homes?


SMART, SMART, SMART

We've been noticing a trend in big businesses lately which
strikes us as really smart. More and more of our subscribers who
work for big companies are having our publication mailed to their
home adresses.

Why is that smart? Think about it. Big company. Big mail
room. Big payroll to pay the people who try to sort and deliver
the mail each day. Why not let Uncle Sam do the sorting and
delivery for you. Doesn't cost the company a thing. Smart.


PUBLICATIONS REVIEWS

Recently I ordered a booklet entitled "Study Notes on Secure
Communications" and one called "Crossroad" from Spear and Shield
Publications.

Wow. What a surprise. The introduction to the secure
communications booklet was written by Atiba Shanna -- New
Afrikan Communist of the New Afrikan People's Organization, and
it contains a lot of stuff but nothing about comsec. The other
booklet contains several essays, but the title of one should give
you an idea as to its thrust, "ON GORBACHEV, MICKEY LELAND AND
SELF-DETERMINATION FOR AFRIKANS IN AMERIKKKA."

Available for $2.00 from S&SP,1340 W. Irving Park #108,
Chicago, IL 60613.

Our recommendation: Don't bother.

The other publication, however, we really appreciated, and
we thank Howard Karten for calling and recommending "The Second
Oldest Profession" by Phillip Knightley.

From your editor's point of view this book had two strikes
against it at the outset: it was written by an Englishman using
English English, and the many, many references are distracting.
Despite those drawbacks, though, I found it to be a very
enlightening book, well worth the price.

Before proceeding with the good stuff, however, a caution to
those who think Ollie is a hero and the CIA should be in the drug
trade: you won't like this book.

That said, let us quote from the book to explain the essence
of the reason for immortality of secret organizations: "Once
invented, the intelligence agency turned out to be a bureaucrat's
dream." "...rebut critics with the simple and unanswerable
expedient of saying, 'You are wrong because you really don't know
what happened and we can never tell you because it's secret.'"

Throughout the book the author provides details of erroneous
intelligence that was acted upon, and good intelligence that was
ignored. For instance: "Ultra showed that Allied strategic
bombing of Germany had failed to crack German morale, and had not
made a dent in German aircraft production. ..... All this was
passed on to proper authorities, yet the raids went on: the truth
of Ultra did not suit the champions of heavy bombing."

Very detailed. References galore. Old spooks will hate it.
Hardcover. 436 pages. $19.95 from W.W. Norton & Company.


CALL FOR VOLUNTEERS

This association is just beginning to take shape and some
volunteers are badly needed. Some people who are capable of
working with almost no supervision can have a big impact on our
growth and success. No, there will be no immediate reward other
than recognition in our meetings and publications; but the long-
term rewards could be substantial.
What say? Want to take one of the committee chairmanships?
We need help with our next expo, our next membership meeting,
membership programs and benefits, local chapter genesis, budget
and audit, and more. Call me. Let's talk about it.


June/July, 1987

SURVEILLANCE EXPO '87

In case you missed the announcement in an earlier letter,
we'll repeat: Surveillance Expo '87 has been postponed. It was
well into the planning stages when it became apparent that we did
not have the manpower or financial strength to do it right.

However, there has been a lot of interest, and we'll be
announcing new dates soon. Stand by.

By the way, this is a program that needs volunteers to work.
Interested?


MORE ON ILLEGAL(?) EAVESDROPPING

It's not that we're opposed to any of these activities that
we have been reporting on. Certainly the apparently illegal
eavesdropping activities reported last month are all undertaken
by people who are trying to do their jobs right. The point of
presenting this information is to emphasize that the law is not
enforced and, in many cases, enforcement would be a travesty.

Consider the case of the need to properly control prisoners.
Audio surveillance is routinely used in jails and prisons as a
means to get more coverage out of the staff. We'll not get into
the argument as to whether prisoners have any right to privacy;
that's another issue. The point is that the law does not mention
an exception for lock ups, and it probably should.

The law does make advertising or using equipment "primarily
useful for surreptitious interception of oral or wire
communication" a federal felony. So along comes a company called
Louroe of Van Nuys, California with their "bare bones" Kit #ASK-4
which consists of a microphone, power supply and amplifier. The
heading on their sale flier says "When you have a lot to protect
Louroe Electronics protects a lot." At $270 retail their
surveillance kit is recommended for convenience stores, delivery
entrances, hospital therapy rooms, jail interrogation rooms,
cashier and counting rooms, and all other secured zones.

Is this company in violation of the law? Are they
advertising something which is primarily useful ... etc.? If you
use their equipment to eavesdrop on other persons without their
knowledge or consent, are you breaking the law?

What do you think?




QUESTIONS AND ANSWERS

Q. Ben Harroll asks if I have heard of an "FBI phone and
room unit that saves up a day of conversations ... on a chip in
digital form. Then dumps the whole memory in something like 30
seconds when they drive by and trigger a burst transmission which
they then record and take back for further analysis (perhaps key
words, phrases, etc.)".

Ben also asks about a "wall unit that served to link the
agents remotely with all the phones (perhaps room audio as well)
in an entire building. The agent could access any phone from his
base by contacting the unit built into the wall".

A. Let's consider his multi-faceted queries.

First let's consider the equipment available for digital
storage of speech. Digital storage offers many advantages, but
the equipment which is currently available is severely limited in
capacity. For instance, I'm looking at the specs for a unit
which is about 4 by 10 by 17 inches in size and consumes 20 watts
of power from the mains. This unit would not be easy to conceal,
and has the capacity of storing only 30 seconds of speech.

Now I'm not going to say that a day's worth of conversations
cannot be stored digitally; but, unless the FBI has come up with
capabilities far beyond what is available commercially, it does
not look practical.

"Phone and room unit" implies that you would be storing
tapped phone conversations as well as room audio, and I cannot
understand why you would want to do that. The phone
conversations can easily be stored at a remote listening post
without any concern for concealing the equipment. It just doesn't
make sense to try to do it in the target area.

The other consideration is "driving by" and "triggering a
burst transmission". (Sounds like Hollywood!) I know that it
can be done, but I ask why build a radio receiver and transmitter
into the recording mechanism? Such things are easy to detect,
and are frequently detected by accident. The power level of the
transmitter would be high enough to light up even a pen-set
transmitter detector and the receiver LO would be detected by a
good TSCM operation.

And burst transmission? I know how and why and where burst
transmission is used in at least one application, but I sure
don't know why you'd try to use it in this situation. Maybe
there is a reader to this letter who can shed some light on the
use of burst transmission in such a circumstance.

As for Ben's second question, the answer is exactly opposite
to the answer to the first. The equipment needed to switch from
monitoring one line or room to monitoring another is commonly
available and not the least complicated. Building it into a wall
is the most complicated part of the whole process, in my opinion.
(However, it might just be that your informant was referring to
remotely accessed DNRs and this technique is also very simple.)




DUMB, DUMB, DUMB

Recently, in the course of providing TSCM service to a
client here in the DC area, we discovered that the carbon
microphone in the conference room was wired to spare conductors
and we spent the better part of a day tracking the wiring back to
the listening post. Immediately after completing this job we
left for a job in Ohio and another in Chicago, so we were out of
touch pretty much while driving.

One message picked up when calling the office from Illinois
was from a private investigator in New York instructing me to
call a lawyer in Washington, DC. (Neither the PI nor the lawyer
were known to me.) When I got through to the lawyer, he began to
ask me questions about my activities for my client the previous
weekend, and the conversation went like this:

"I need information on your activities for the XYZ
Corporation last weekend."

"Sir. Please don't take offense, but you are just a voice on
the telephone to me. I will not even confirm or deny that I even
know XYZ Corporation to you."

His response was to advise me of his college, his degrees,
his status with his firm, and the statement that he represents my
client. Again, I advised him that he was still just a voice on
the phone; and, before I would talk to him I needed approval from
someone I know in the client company.

"Well. Supposing I have John Jones or Pete Smith call you.
Would that be all right?"

"Sir. I just finished telling you that I will not confirm
or deny that I even know that company. I'm certainly not going
to confirm that I know some people by name in that company. If
you want to discuss any client with me, first have someone that I
know in that company call me, and tell me it's OK."

The upshot of the whole affair is that the GM of my client
company did call, and I did discuss the facts with the lawyer.

However, I'm left with a very bad taste in my mouth for two
reasons. First, my client is represented in a case involving
industrial espionage by a lawyer who doesn't have the foggiest
idea about industrial espionage -- is not even aware that one of
the easiest ways to collect information is to pretend to be
someone else and call and ask for it. The client has been the
victim of a very well executed bugging system, but he has placed
his trust in a man who can't understand why I don't provide
chapter and verse to an unknown voice on the phone. Secondly,
the lawyer, who doesn't know anything about electronics, refused
to allow me to give him the information that I knew he needed.
Instead, he insisted in reading me a list of questions which
apparently had been prepared for him by someone else who doesn't
understand electronics either. Consequently, whatever report
that lawyer generated won't make sense and will be of negative
value.



DO THEY UNDERSTAND TELEPHONES, OR WHAT?

Teleconnect calls this AT&T's marketing coup of the month.
We're inclined to upgrade it to "of the year" or "of the decade".

In a catalog received recently from AT&T is an item called
"Power Failure Rotary Telephone". It seems that AT&T is offering
a black rotary (pulse) dial telephone for $54 so you'll be able
to dial out in the event of a power failure!

(In case you're not a telephone techie of any degree, be
advised that the touch tone phones don't need power from the
mains to operate; they get their power from the exchange. By the
way, AT&T Marketing Department, if there's no power from the
exchange, the pulse phone won't work either.)

To all of our friends in AT&T who really do know how phones
work: We're really embarrassed for you.

Maybe we should start a case to undivest!


CONTRIBUTIONS

The ComSec Association is organized as a non-profit
educational association, 501 (c)(3). Gifts (not dues) can be
deducted on your income tax return (read the rules). We are also
under the impression that donations in kind (material things) can
be deducted at full value (again, read the rules, or discuss with
your accountant).

Anyway, we need all the help we can get. If you feel like
sending in a big cash donation, we sure won't refuse it. On the
other hand, we badly need to upgrade our computer and printing
capability, so we'd certainly accept anything along that line.
Do you have anything that could be helpful?


SPECIAL NOTE

As promised, we're starting to include an extra page of
technical information with your copy of the ComSec Letter. We
can't promise to have it in with every issue, but we're starting
with our TSCM Glossary, and you'll get one sheet with each
letter.





Aug/Sept, 1987

OUR MOSCOW EMBASSY, AND DID THE SOVIETS BAMBOOZLE US?

Well, our elected representatives who visited our new
embassy under construction in Moscow say that it is so thoroughly
bugged that we'll never be able to use it. They said a lot of
things that don't make any sense technically (such as it is just
one big antenna), but they never did explain what the threat is.

So here's a guess from the outside.

I'll bet that the Soviets are aware that our government
countermeasures people use non-linear junction detectors (NLJDs)
in TSCM so they dumped thousands of old diodes and transistors
into the concrete to create lots of responses for the NLJDs. We
probably detected non-linear junctions every few inches on every
beam and column and any place that there's poured concrete, and
every one of those "hits" was reported as a bug.

In case you're not familiar with electronic communications
theory, modern equipment, and government TSCM techniques, let us
review briefly.

Modern electronic equipment contains active components that
are solid state; some are discrete components, such as bipolar
junction transistors and field effect transistors, and some are
monolithic integrated circuits. Such solid state devices, by
nature, contain non-linear junctions and one characteristic of
non-linear junctions is that they generate harmonics of whatever
radio frequency energy excites them. Our government experts knew
this so they contracted for the design of a non-linear junction
detector for use in TSCM. In use, its operators found that
naturally occurring non-linear junctions also emit harmonics of
the exciting frequency. (Naturally occurring NLJs occur any
place that there is metal-to-metal contact with something like
oil or rust in between.) Now, theory says that the naturally
occurring junctions favor the third harmonic and the solid state
electronic components favor the second (or maybe it's the other
way around; I don't remember). In any event, the operator is
supposed to be able to differentiate between an electronic
component and a naturally occurring NLJ. However, many people
with a lot of field experience have told me the false alarms
drive them batty -- and many have told me that they no longer use
this instrument.

Now, I'm sure that Ivan installed many bugs in the embassy;
but I'm also very confident that he installed a lot of junk to
create false alarms for our people. What do you think?


ECPA

FOREWORD In November, 1986 the Congress of the United States of
America, with almost no discussion or debate, passed the law
known as the Electronic Communication Privacy Act (ECPA) of 1986.
Shortly thereafter it was signed by President Reagan, and it
became effective in January of 1987.

WHO BENEFITS? This law is an example of what can be accomplished
for the benefit of some narrow special interests through the use
of lobbyists. Although our legislators made many pronouncements
for public consumption that they were acting to protect us, what
they actually did was to create a law that is of primary benefit
to cellular telephone sellers who wish to deceive the public.

Yes, that's right. The net effect of the new law is to
allow sellers of cellular telephones and service to say, "No one
can listen to your calls; it's against the law." This, of
course, ignores the practical fact that the radio transmissions
from cellular phone transmitters intrude into our homes and
businesses without being invited.

Will these transmissions be listened to? Of course they
will. They'll be listened to with impunity because the law
cann

  
ot be enforced; and, further, the Justice Department has
announced that it will make no effort to try to enforce it.
There are those of us in various businesses and professions whose
work requires that we listen to everything that's on the air, and
we're certainly glad that they are not going to try to enforce
the law.

HISTORY The old law, The Omnibus Crime Control and Safe Streets
Act of 1968, Title III, was commonly misunderstood --- partly
because it addressed a technical subject, but mostly because it
used extremely convoluted language to express a simple idea.
Consequently, almost everything written to explain that law has
been incorrect. The words used by the politicians describing the
old law, in order to justify the creation of the new law, were
incorrect. "Experts" writing about that law haven't bothered to
read it; they have simply repeated the same errors that they
heard from others. Several court opinions relating to the old
law grossly misquoted it, or inverted the meaning of the words
used in it. The old law, written to control eavesdropping on
human voice conversations, was a masterpiece of circumlocution.
Its drafters apparently were writing to impress, rather than to
communicate. They used as many fancy words as they could muster,
but never once used any of the key words: "voice", "human",
"conversations" or "eavesdropping".

In short, the old law was an abomination.

The new law is worse.

THE NEW LAW The new law makes it a crime to listen to what has
been broadcast on certain radio frequencies. It's OK to tune to
some frequencies, a misdemeanor to tune to others, and a federal
felony to tune to others. Wild.
The new law allows "providers" to listen to communications
on telephone circuits that they provide. Unfortunately, the
drafters neglected to provide a definition of "provider".
Already, within a few months of passage, those words are being
interpreted to mean that the boss can listen to his employees'
phone calls without their knowledge or consent. Carried one step
further, it could be interpreted to mean that the breadwinner in
a household can legally listen to his/her spouse's phone calls.

The new law puts restrictions on law enforcement's use of a
dialed number recorder (DNR) (which it calls by the 1930s term
"pen register").

As with the law that it replaced, the new law uses the words
"in whole or in part" (referring to the kind of communications
addressed by the law) without defining whether these words are
intended to refer to the medium or the message. It is your
author's considered opinion that these words refer to the
message; otherwise they don't make sense. (I must point out,
however, that some very smart lawyers disagree.)

The new law creates a strange concept: "aural transfer".
Strange because the word "aural" refers to the human (animal?)
hearing mechanism which converts the mechanical energy of sound
impinging on the eardrum into electrical impulses which are
transmitted to the brain. "Transfer" implies a system, which
would be composed of a transmitter and a receiver; but the aural
process is only a receiving process. Let's paraphrase "Where's
the beef?" and say "Where's the transmitter?" in this system.

Oh yes, sounds broadcast on subcarriers may not be listened
to. Imagine! While you're in an office or elevator that plays
MUSAK, you are committing a felony by intentionally listening!.

Last, but not least, criminals have found that they can use
cellular phones for communication without paying for the service
by having phoney electronic serial and telephone numbers
installed in their phones. Also, they talk freely because they
know that what they say can't be used against them because law
enforcement must get a court order in order to legally listen to
what they are broadcasting on the airwaves.


ONE IMPROVEMENT First, you must recognize that our legislators
chose to redefine "intercept" rather than to use "eavesdrop" when
they are referring to eavesdropping. (Intercept means to seize
something, preventing it from arriving at its intended
destination; so they had to redefine it.) In the old law they
redefined this word to mean "aural acquisition" of the content of
a communication. This was dumb and caused untold confusion.

The one improvement in the new law, then, is the re-
redefinition of interception to mean the acquisition of the
content of the communication.

Hallelujah! (But wouldn't it have been better to use the
right word in the first place?)


HOW TO USE WORDS TO CREATE A FALSE IMPRESSION
(a lesson from our elected representatives)

The following comment was carried in COMSEC
LETTER, YOGO 2.06, issued while this law was being
drafted.

"Throughout the proposed law and in all references to
these laws our Congressmen have used the word "protection"
when they are referring to the legislated prohibitions
against eavesdropping on conversations. It is as though
they really believe that they can legislate protection.

"If you believe that legislation can "protect" your
broadcast conversations from being overheard, we have an
experiment for you -- and any congressman who thinks he has
such power.

"First let Congress pass a law which prohibits piranha
fish from biting our citizens. Let's make it a felony.

"Then you, or your congressman friend, go jump in a
river full of piranhas.

"Let me know how you make out."


IN THE WORKS

Because of the many requests that we have had for
complete sets of the ComSec Letter, we've been working on
editing out topical information and consolidating each
year's letters into one publication. These should be ready
soon; we'll let you know.


GLOSSARY

Just a reminder: we're enclosing pages 2 & 3 of the
TSCM Glossary with this letter.

FEEDBACK

Our thanks to Jerold Hutchinson who wrote to advise
that our definition of ACM is incorrect. He's right, and
we'll correct it in future editions of the glossary.

Although many folks use the terms interchangeably, ACM
is not another term for TSCM. ACM means audio
countermeasures and does not include countermeasures
against other methods of technical surveillance.


October, 1987

TRAP AND TRACE -- PEN REGISTER

Recently it has come to our attention that some folks
(especially lawyers) are using these terms interchangeably.
The confusion was probably started by the juxtaposition of
the two terms in the new federal law relating to
communications privacy. So let's see if we can shed some
light on these two different items.
First: pen register. (Do we have to use that
antiquated term? Yes, I know that it is the term used by
our legislators when they wrote the law, but the pen
register is an item that was modern when I was a kid, and
all phones were black rotary dial units with pulse output).
Anyway, the dialed number recorder (DNR) -- term for the
modern device which prints out the number dialed whether
the dialing is done with DTMF or pulses or a combination of
both -- is a device which is placed across the line of the
calling telephone. It prints out a chronological record of
all telephone activity: date and time off-hook and on-hook
on all calls and digits dialed on all outgoing calls. The
key to differentiating this from the trap and trace
equipment is that this device is connected to the line of
the calling telephone.
Trap and trace, on the other hand describes telephone
company equipment which is used, starting at the called
telephone to "Trace that call!", as they say in the movies.
However, the process is not as simple as the movies would
make you believe, particularly if the two ends (calling and
called) are not in the same exchange. The different
companies use different equipment to accomplish the same
thing, namely identification of the number from which the
call was placed.
To summarize: the DNR (modern pen register) is used at
a calling number to determine the called number; and trap
and trace equipment is used, starting at a called number,
to determine the calling number.
As we have reported earlier, there are developments
which will drastically change this scene. Congress made it
more difficult for law enforcement to get authority to use
a DNR and Radio Shack came out with its CPA-1000 -- a DNR
for the masses at $99.95 ("professional" DNRs start at
about $5,000). Meanwhile, our phone companies are
introducing CLASS and CCIS piecemeal across the country.
(See definitions of these terms in the glossary pages
distributed with last month's ComSec Letter.) CLASS and
CCIS will make trap and trace equipment superfluous; the
called party will be able to identify the calling number
without the aid or intervention of anyone or anything at
the telephone company.


ANONYMOUS LETTER

We recently received a letter from a former member
which raises a lot of interesting questions, so we'll run
it almost in its entirety, and do our best to try to answer
the questions for the benefit of all.

THE LETTER
"I was a student member of the ComSec Association
until my membership expired and the CSA board decided for
whatever reason to delete student member status.
"For the past several months, I'm glad to say that for
whatever reason, I have continued to receive the ComSec
Letter.
"With all of its coverage of the ECPA, and since the
whole communications privacy issue has been pushed by the
cellular telephone industry, I've decided to write to you
from my perspective -- a hobbyist communications monitor
whose interest includes the cellular telephone. You are
welcome to publish this as you see fit, under the condition
that I will remain anonymous.
"Cellular telephone communications operate at 825-845
MHz for the mobiles and 870-890 MHz for the cells. There
are several hobbyist communications receivers capable of
covering this range, with prices ranging from $400 to $800.
Interestingly enough, Radio Shack sells one of the best
receivers covering this range -- the 300 channel PRO-2004.
For political reasons (including the fact that RS sells
CMTs), cellular coverage was deleted by adding one easily-
removable component to a circuit board. It is common
knowledge that this component can be removed so this
continues to be a hot seller. Also, the CMT frequency
range was once allocated to UHF TV channels, so it is
possible to monitor cellular on an old TV set!
The majority of the telephone calls are of a
(legitimate) business nature, seconded by the more
interesting (to us casual monitors) personal calls. After
a quick scan of conversations, you realize how many people
cheat on their spouses! Drug deals are also often
monitored, and there have been instances where I have
copied down times, locations and any other helpful data,
turned it over to law enforcement agencies, and in turn
monitored their communications as they staked out the area
to make the arrests.!
Many law enforcement agencies themselves use cellular
phones, and by their lack of COMSEC/OPSEC during those
calls, they must seem to think the calls are relatively
secure. It seems that the agencies (DEA, FBI, etc.)
currently have no capability to monitor CMT conversations,
and "If we can't do it, chances are no one else can
either!" seems to be their attitude.
CMT industry officials would have you think that a
call changes frequencies every few seconds. While this
occasionally happens, the majority of the calls remain on
the same frequency for at least a minute. Also, it usually
takes me about 30 seconds at the most to relocate a
conversation that has switched to another channel as long
as the site is within about 15 miles of my area.
If you're behind or near a person using CMT, it is
quite simple to immediately locate the frequency and tune
in the conversation on the receiver without the use of a
spectrum analyzer or any other sophisticated equipment.
I'm currently trying to think of a way to pass on the
method to law enforcement agencies.
Overall, the cellular telephone system is a
sophisticated, extremely useful communications medium, but
the industry is making a mistake by trying to show that it
is something that in actuality it is far from -- secure.
Jim, feel free to use any of the above that you wish,
but please keep identifying information, such as my name,
etc. confidential.
I would like very much to contact my area FBI & DEA
Field Offices, because, after monitoring them, I know that
they are currently unable to monitor cellular conversations
(regardless of the law), yet I can't really just call them
out of the blue and say "Hey, after monitoring you, I know
you can't listen in on CMTs. I'd be happy to tell you
how!"
"I'd appreciate any advice or comments you might
have."

OUR ANSWER
First, let's consider the administrative questions
concerning CSA and your lapsed membership.
The student membership category was suggested by me
because I think we should do all we can to get young folks
interested in this field, and we all recognize that
students normally don't have a lot of money to throw
around. We knew when we set the dues at $10 per year that
it was a money-losing proposition, but we wanted to make
this information available to young folks studying in the
field.
Yep, I'm the one who suggested it. However, I'm also
the one who suggested that it was unworkable in an
organization this size with nothing but unpaid volunteer
administrative help -- me, my wife, and our youngest
daughter. Our experience in handling membership
applications convinced us that it was not worth the effort.
Almost every application had to be sent back for some kind
of documentary evidence that the applicant was truly a
full-time student. Many applicants were people who
sometimes took a course in the evenings, and some said
flatly that they studied on their own without benefit of
any recognized school. Those people, and the awful mess of
address changes just ate up too much time.
As to the reason that you received copies after your
membership expired; well, that's an interesting story and,
again, it relates directly to our naivete (or
inexperience). First, we tried to notify members to renew
by referring them to the code in the address label on the
envelope. Whoops. That didn't work partially because the
envelope was already in the trash before the member read
the note, and partially because many folks could not
understand our coding.
So then we were saved by a volunteer who said he would
maintain the membership list and send letters to all
members to remind them to renew. Whoops, again. We
suffered from many errors in the labels he printed out, and
delays of several weeks to get labels for mailing a monthly
newsletter. Oh, and by the way, he never did send even one
letter to remind people to renew.
The reason for the extra letters, then, is that your
editor was feeling guilty. How can you justify cutting off
membership if the member had never even been notified that
it was expiring. (Now, when we get as big as ASIS with a
five or six million dollar annual operating budget, then,
by golly, those renewal notices will go out like clockwork.
We hope.)
Now, let's consider the very serious subjects
introduced, namely the ability of some of us to monitor,
and inability of some others.
I cannot reveal the location of the letter writer so
we can't get a geographical fix on where DEA and FBI have
commented on the air about their inability to monitor CMT.
So, let's just ask the question of all of our readers: Is
this the situation in your area?
Speaking for ourselves, we have occasionally heard
some cellular phone conversations. In fact, while
demonstrating to some Senate staffers (before ECPA was
passed), we listened to a conversation during which one
party advised the other to buy a coach ticket, and he would
upgrade it to first class at the airport. (If that doesn't
make sense to you, let us explain. It is a violation of
federal law for a government employee to accept
transportation from a lobbyist or a contractor -- so what
is done is that the government employee gets his coach
ticket, and the contractor upgrades the ticket for cash,
and writes off the expenditure under some legal heading on
his expense report.)
Also, we've heard dates being made, and excuses being
given for dates broken; a girl giving all of her vital
statistics to what sounded like a prospective client, drug
deliveries being made, collectors (not the kind who send
invoices) going out to make collections, and a whole lot of
trivia.


BBS

Recently we were advised of a BBS called Mainstreet
Data (619-438-6624) which has a section called TAP
Magazine. Per the notice in 2600 magazine, for a
complimentary account call, enter 12 for your ID, enter
DAKOTA for your password, and at the first command prompt
enter PRO.
Please let us know how you make out.





SEEN AT ASIS, LAS VEGAS

Our nomination for the company with the most
interesting name at the annual seminar and exhibits of ASIS
in Las Vegas last month: Network Security Associates which
identifies itself by using the initials NSA.


FEDERAL COURT RULING RE ECPA

In the January 13, 1988 edition, USA Today reported
That "St. Louis US District Court Judge Roy Harper ruled
federal laws banning wiretaps don't apply to married
couples. Karl Kempf recorded his wife's telephone talks at
home because he suspected an extramarital affair, Harper
said."
If any reader has more information on this astounding
ruling, we'd sure like to receive it. Thanks.


November, 1987

THE SKY IS FALLING! THE SKY IS FALLING!

Many in politics and the media are screaming as
Chicken Little did. The fairy-tale chicken jumped to an
alarming conclusion on very slight evidence, and some high-
profile folks appear to have been doing the same with
regard to the Moscow embassy mess.

First they said that the Marine guards had been
allowing KGB agents the run of our embassy including the
crypto room; now they say no such thing ever happened.
Also, our legislators who visited our new embassy under
construction in Moscow say that it is so thoroughly bugged
that we'll never be able to use it.

A lot of what has been said bears examination and
evaluation by reasonable people. Let's look at some of
what we have been fed by the press.

Washington Post, 1-17-88: "... the Moscow Embassy was
ordered to cease all classified communication with the
outside world and to shut down processing of all classified
information on computer terminals, electric typewriters and
even manual typewriters on the theory that they might have
been programmed by nocturnal KGB visitors to emit telltale
electronic pulses."

Representative Olympia J. Snowe, 4-4-87: "We now have
a secretary [of state] who will be going to Moscow the week
after next and he will be reduced to negotiating foreign
policy in a Winnebago [because the embassy building is not
secure]."

Representative Daniel Mica is reported to have taken a
"Magic Slate" with him to Moscow so that he could
communicate securely while in our embassy.

There have been reports in the press that our new
embassy is one huge antenna.

U.S. News and World Report, 6-1-87 in a story about
the new Soviet embassy in Washington: "... the embassy
looms high enough over all of official Washington to enable
the Soviets to spy with sophisticated photographic and
listening devices on ... White House ... Pentagon ... State
Department ... Congress ... CIA ... FBI ... DIA ... and the
Navy Intelligence Complex."


IS THE SKY REALLY FALLING?

Comments on all of this are invited from all of our
readers. For his part, your editor finds most of it silly
and some of it downright ludicrous.

Can you imagine that anyone would be concerned about
compromising emanations from a manual typewriter?!? Can
you imagine that our technical people would allow our
embassy to be rendered unfit for use by people who have not
even had access to the premises for several years? In what
way does having the embassy made into a giant antenna
compromise communications?

All right, so our State Department insisted that the
Soviets build their embassy on the high ground on Tunlaw
Road instead of in Chevy Chase where the Russians wanted to
go. So what? Because all of those federal buildings are
visible in part from Mt. Alto, does that mean that we have
to stop doing business in the Pentagon, White House, etc.?
Yes, being on high ground does mean that radio reception is
better, but it doesn't mean that the Soviets can spy on
everything done in that long list of buildings, for Pete's
sake!


CALL FOR PAPERS

Although the dates are not yet firm, the decision has
been made that there will be a membership meeting in the
Washington, DC area late this year in conjunction with
Surveillance Expo '88. Your association is sponsoring this
expo, and expects to profit from it. Your participation is
urgently needed.

There will be four tracks with panels and
presentations scheduled throughout the three day period.
The tracks are: Communications Security,
Computer/Information Security, Surveillance Technology, and
Investigations Technology. If you are knowledgeable in one
of these areas, you are invited to suggest a subject for a
talk.

If you do not want to present a paper, but can help
with the planning, we'd like to hear from you right away.
The only pay you'll get for help is some public exposure to
professionals in the field, but that can be very valuable.


DEFENDING SECRETS, SHARING DATA

The title of this segment is the title of a report by
the Office of Technology Assessment of the U.S. Congress.
It is a modern-day classic on the subject of vulnerability
of electronic information to theft. If you work in this
field, or have responsibility for protecting information,
you should have a copy. Order from the Superintendent of
Documents, Government Printing Office, Washington, DC
20402-9325. GPO stock number is 052-003-01083-6. Price:
$8.50 per copy post paid.

Your editor is proud to say that he contributed in a
small way as a contractor to OTA.


THIS IS A PROFESSIONAL?!?

The headline (Washington Post, 1-23-88) reads "Wiretap
Consultant Gets 120-Day Term". The tawdry business that
was being reported on had to do with a man named Eddie T.
Dockery who admitted to forging an invoice, but that's not
the story that is of interest to us.

The real story is that this is the same man who was
hired by DC Mayor Marion Barry to perform "electronic
sweeps". That's right. The mayor of the capital city of
our nation hired this man to perform a professional
service. And what was the "professional" report that was
made to the mayor?

According to the Post, Dockery reported that "he
believed that there was a 90 percent chance that the three
telephone lines into Barry's house were wiretapped and that
the rooms in the house were bugged".

Now we've heard some pretty wild conclusions being
reached by some operators of TDRs, and we're wondering if
that is what this man was using. Or was he just looking
into a crystal ball?


CUTESY COMMENT AWARD

This award goes to William Barden, Jr. who wrote a
book entitled "Shortwave Listening Guide" which is
published and sold by Radio Shack. The cutesy comment
worthy of note appeared in a section of the book relating
to the ECPA of 1986 in which he explains the act and
counsels on how to not become a criminal while listening to
your radio. With regard to the fact that the ECPA makes
intentionally listening to what is broadcast on cellular
phone frequencies he comments, "Evidently some of the
lobbying for the ECPA was done by the Mobile Communications
industry."

In case you have not been following the activity re
ECPA and its aftershocks, let us explain. Radio Shack, the
publisher of this book was one of the principal lobbyists
for the obnoxious provisions of the ECPA which specify
which listening is OK, which is a misdemeanor, and which is
a felony. Further, Radio Shack made a quick fix to their
wonderful PRO-2004 scanner so that it could not be used in
contravention of the law that they helped to write. Yep.
The 2004 cannot now be tuned to cellular frequencies.

Therefore the "Cutesy Comment Award".

(By the way, if you have a PRO-2004 and want to
unmodify it, send us a stamped, self-addressed envelope and
we'll send you instructions on how to unmodify it so you
can listen to cellular.)
QUOTE OF THE MONTH

Milton Berle: "Married fifty years, and we still make
love almost every day. Almost on Monday, almost on
Tuesday, ..."


TO/FROM; CALLED/CALLING

George Threshman contacted us after our last letter
which tried to clear up the confusion between "trap and
trace" devices and dialed number recorders (DNRs). He said
that our explanation led him to believe that a DNR would
identify the calling number. (By the way, the Brits, in
their laws differentiate by using the words "TO" and
"FROM". Smart, no?) This is too important a point for us
to leave any possibility of confusion, so let's try again.

The DNR is a device which is placed across the line of
the calling telephone. It prints out a chronological
record of all telephone activity: date and time off-hook
and on-hook on all calls and digits dialed on all outgoing
calls.

(News note: The DNR from Radio Shack, the CPA-1000,
which we praised in that same letter has been reduced in
price; it's now $79.95. Aren't capitalism and the free
market wonderful?)


YET ANOTHER PRODUCT

Recently we received a letter from Robert Brooks of
Warrensburg, MO in which he made some nice comments about
the ComSec Letter and passed along some interesting
information.

First, Robert, Thanks for the kind words. Hearing a
compliment from time to time really makes this effort
worthwhile. And thanks for your info and questions.
(There will be more on laser techniques and equipment in a
future issue -- and I'm not sure about the facsimile
scrambling product that you recommend.)

Now let's pass on his comments about yet another
product. Robert says, "In recent product literature I
received from Sutton Designs, they advertised an 8-digit
(1.2 GHz) frequency counter for $500.00. If you look in
the inside cover of the November 1987 Modern Electronics
you'll see the same frequency counter (same exact ad --
different company) selling for $99.95. Isn't Sutton being
a little greedy?"

Well, Robert, I think it was P.T. Barnum who said,
"There's another sucker born every minute." It's just sad
that there are firms trying to "con" us all the time. By
the way, I've had other calls on this subject and I seem to
recall that the counter is available for a lower price, and
that Sutton is asking an even higher price. We'd be glad
to hear from anyone, even Sutton Designs, on this matter. December, 1987

BY-LAWS, BOARD, OFFICERS

We've drifted long enough. The current Board of
Directors will meet soon to approve By-Laws, and to start
the process of selecting a new board and new officers.

Information will be coming in this newsletter.


DANGEROUS FOOLISHNESS

According to information in a recent Popular
Communications magazine, the Cellular Telephone Industry
Association, CTIA, not only opposes any effort to force
manufacturers to put warning labels on radio transmitters,
they want to ban the manufacture of equipment that can
receive on cellular frequencies!

It seems prudent to us that the public should be
warned that what they transmit can be heard by others. It
is unthinkable that receiving equipment could be banned in
a free country.

Well, it took from 1968 till 1986 to change the
federal law relating to eavesdropping. The new law has
some improvements, but many strange new provisions. How
long will it take to undo all the harm done by the ECPA?


MAJOR INDEPENDENT TV STATION BUGGED!

We won't identify the station because we don't want to
embarrass them. (However, you'll find their call sign very
familiar.) It seems that a scanner operator called one of
their popular investigative reporters and advised that
there was a radio bug in the station and that a lot of very
sensitive information was being broadcast.

Investigation of the "bug" revealed that floor
directors were leaving their headsets turned "on" after
use. Sound activated (VOX) circuits kept the transmitters
off the air until they picked up conversations with
clients, discussions of secret promotional campaigns, etc.
(Hint, hint. This station just ran an excellent series on
eavesdropping.)


TEMPEST AND COMPUTER SECURITY

From Ray Heslop of the Tempest Division of Atlantic
Research we received a copy of the above captioned article
that had been published in last September's edition of
Government Executive. Our thanks to Ray for thinking of
us. The article intended to wake up corporate America to
the TEMPEST threat and it may have done something along
that line, but it turned us off because of incorrect
technical information.

The first comment on this material relates to a
popular misconception which seems to have been originated
by some of those liberal arts majors who became
journalists. Maybe it's not the fault of the journalists,
but somebody has divided eavesdropping into "active" and
"passive" categories without providing definitions of these
terms. If I understand them correctly, when a man climbs a
pole and bridges from the target telephone line to the
leased line to the listening post, that's not active.
Methinks that the guy who climbed the pole will be
surprised to find out that he was engaged in a passive
activity!

Leaving aside the generic criticism, let's look at
some specific technical information offered in this
article. We'll label the Government Executive comments
"GE", and our responses "CL".

GE. "According to experts, fiber-optic cable is the
best bet because it doesn't emanate as well. However,
fiber optic cable can be tapped easily, and it is difficult
to detect the tapping. Existing coaxial cable can be
protected with metal shielding."

CL. So much for getting expert technical advice from
Government Executive!

All of us know, I hope, that there is no magnetic or
electric field associated with a fiber optic cable carrying
a signal because that signal is light, not electric current
or radio frequency energy. So, in a sense, the author is
correct; it does not emanate as well 'cuz it doesn't
emanate at all. However, when she says it can be tapped
more easily, and the tapping is difficult to detect, she
couldn't be further off the mark. There is no doubt in my
mind that fiber optic cable can be tapped. I just don't
think that it can be done in the field. Consider that a
single strand of cable is 10 microns in diameter and is
covered with cladding that is one micron in thickness. I
can see how this can be handled in the lab, but I really
can't see a man on a pole, handling the cable with gloves
on, with the wind and rain, and so forth, can be expected
to remove the requisite length of cladding without damaging
the glass fiber so that he can fuse another cable to it as
they do in the lab in a jig under a microscope.

And, as for tap detection, it looks like there are
many ways to automatically detect tampering on the fiber
cable, but we don't yet have a way to do the same on a
phone line.

Last, but not least. She says that coax can be
protected with metal shielding. Great idea, but of course,
coax means coaxial; the conductor in the center and the
shield around it share the same axis, therefore, the term
"coaxial". 'Course, if you put another metal shield around
it, we don't know what you would accomplish, but it
shouldn't hurt anything except the pocketbook of the person
paying for it.

GE. This article also says that computer data are
stolen by "highly sensitive bugs, line taps, parabolic
microphones, electromagnetic emanation collection
instruments, and other related devices."

CL. Our own experience is limited, but the methods
listed here don't seem to relate to the practical world
that we live in. However, let's pass this question on to
our readers. How often have you found computer data being
compromised by parabolic microphones or highly sensitive
bugs or anything else specified?


BBS # NG

Shortly after we passed along a new BBS number, we had
a call from Larry Newman who reported that the number from
2600 was no good. Sorry about that.


ComSec Association BBS

Larry has been flirting with the idea of sponsoring a
BBS for the ComSec Association, but he's not sure that he
can bring it off alone. Anybody out there want to give him
a hand? He's in NYC and his phone number is 212-921-2555.
Give him a call if you think that you could help get this
project off the ground.


AT&T INFORMATION SOURCES

The following information was published in
Teleconnect, and we pass it on for those who may be
interested.

Technical Reference Catalog (pub 1000) (lists pubs,
bulletins, etc.) Available from:

Publishers Data Center, Inc.
POB C-738
Pratt Street Station
Brooklyn, NY 11205

Bell Labs Record (magazine). $20 per year from:

Bell Labs Circulation Dept.
Room 1F-233
101 JFK Pkwy
Short Hills, NJ 07078.



EVALUATOR EVALUATION

At the request of one of the dealers and of the
inventor (?) of the Evaluator, we tested the device.

In case you're not familiar with this unit, let us
quote the headline in the ad currently running in Security
Management: "NEW! PATENTED TAP DETECTOR OPERATES 24 HOURS A
DAY".

Based on those words we think that a reasonable person
would conclude that the Evaluator is capable of detecting
telephone taps, and is sold as a tap detector, no?

Well, we tested the evaluator to see if they had
invented something that Bell Labs had been unable to
invent.

The first one that we tested did not detect the Radio
Shack audio amplifier, the butt set, the tape recorder
starter, the sound activated tape recorder, or the tap made
out of about $2.50 worth of parts. It did detect an
extension phone going off hook.

The inventor/manufacturer (?) advised that we might
have received a faulty unit, and also that we should leave
the tap on for three to five minutes because that's how
long the detection process sometimes took.

So we tested the new unit while timing our taps by
dialing the time message from the phone company. We
recorded for at least five minutes while tapping
sequentially with the same pieces of equipment. Again, it
failed to detect anything but an extension going off hook.

Since then, we've been promised that we would receive
a new unit for testing. That promise goes back several
months, so don't hold your breath for our updating story.


SURVEILLANCE EXPO

We're trying. Spent innumerable hours talking with
two Sheraton hotels in the DC area, only to have them
change the terms when it was time to sign the contract.
Wasted time.

Any member with experience in this arena will be
welcomed with open arms. Help!


← previous
next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT