307 lines
19 KiB
Plaintext
307 lines
19 KiB
Plaintext
|
|
||
|
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
|
||
|
HIGH-TECH HOODS PRESENTS.............
|
||
|
|
||
|
TECHINIQUES OF BURGLAR ALARM BYPASSING PART II
|
||
|
|
||
|
File Compiled by: THE RAVEN!!
|
||
|
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-==-=-=-=-=--=-=-=
|
||
|
|
||
|
THIS IS PART 2 OF BURGULAR ALARM BYPASSING.
|
||
|
|
||
|
DISCLAIMER: This file is written for EDUCATIONAL PURPOSES ONLY. Altho illegal
|
||
|
methods may be described in precise detail, no illegal method is recommended
|
||
|
or implied! (that part always makes me laugh!)
|
||
|
|
||
|
|
||
|
THE RAVEN
|
||
|
+=======+
|
||
|
|
||
|
And now the long awaited seq......
|
||
|
|
||
|
INDEX
|
||
|
----- I. Ultrasonic Alarm System
|
||
|
II. Photoelectric Alarms
|
||
|
III. Passive Infra-Red Alarms
|
||
|
IV. Microwave Systems
|
||
|
V. Word From THE RAVEN
|
||
|
|
||
|
=--=--=-=-=--=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
||
|
|
||
|
I. Ultrasonic Alarm Detectors
|
||
|
|
||
|
We now move into the study of the next generation of alarms, the area
|
||
|
sensors. The first area sensor component we will examine is the ultrasonic
|
||
|
alarm. The ultrasonic system consists of a transmitter, which emits a
|
||
|
frequency that lies above the human threshold of hearing, and a receiver,
|
||
|
that monitors the incomming frequency. The entire system is generally self-
|
||
|
contained in one unit, although occasionally on transmitter is used with
|
||
|
several receivers.
|
||
|
The sound waves that emanate from the transmitter follow an elliptical
|
||
|
(resembling an elongated oval) pattern, and ultimately return to the
|
||
|
reciever. If those waves are somehow altered during their elliptical journey
|
||
|
the receiver will know it, and the alarm will sound. Therefore the theory
|
||
|
is that if a burglar enters a guarded area, the ultrasonic frequency will be
|
||
|
altered by his presence, thus alerting the receiver to an intrusion. The
|
||
|
ultrasonic system is very effective, and the range is generally about
|
||
|
40-50 feet.
|
||
|
Although ultrasonic, the frequency that these systems trasmit is low, about
|
||
|
20-45 kHz (kiloHertz, or thousand cycles per second). Standard AM radio is
|
||
|
between 535 and 1605 kHz. This makes detection somewhat difficult, but not
|
||
|
impossible. The elimination of possible ultrasound users is even easier.
|
||
|
People who own pets are excluded from ultrasonic usage. Pets cause too many
|
||
|
false alarms, and the ultrasound may be very irritating to them, since they
|
||
|
have a higher sonic perception range. Loud noises create false alarms. Also
|
||
|
ultrasound cannot be employed where there is a great deal of movement.
|
||
|
Blowing drapes, forced-air heating,falling boxes,Cuckoo clocks,etc. are all
|
||
|
causes for false alarms, and generally exclude their owners from ultasonic
|
||
|
club.
|
||
|
There are several methods of ultrasonic detection. Multi-range bug detectors
|
||
|
will reveal the presence of these alarms. Or, with the assistance of an
|
||
|
electronics engineer, one could make a device that responds to frequencies
|
||
|
between 25 and 45kHz. Another way is to purchase a multiband radio or scanner
|
||
|
that contains these low frequencies. If the frequencies are scanned slowly,
|
||
|
between the aforementioned parameters, an inordinate amount of static and
|
||
|
interference should occur when the correct frequency is discovered. Another
|
||
|
way, albeit unorthodox, is to take a mouse or a hamster near the suspected
|
||
|
ultrasonic sourse, and observe their reactions. Small rodents detest
|
||
|
ultrasound, and they usually make every effort to avoid it. This is the same
|
||
|
shit they use with those electronic pest-ridders. There are converters
|
||
|
available that bring the inaudible frequencies down to the human's audio
|
||
|
perception level. In the presence of ultrasound, these converters will produce
|
||
|
a high-pitched hum. Even if prior detection is impossible, professional
|
||
|
burglars have observed that transmitters are almost always placed in the
|
||
|
coner of a protected room.
|
||
|
Once the sensor is dectected and located, what next? How does one penetrate
|
||
|
an invisible and inaudible sound barrier, in order to disarm it, without
|
||
|
subjecting oneself to immediate detection? If a homeowner caused his ultrasonic
|
||
|
dector to blare throughout the neighborhood,after comming home from work
|
||
|
every day, he would soon get many complaints from his neighbors. That is why
|
||
|
most ultrasonic alarms, and most other alarms as well, have delay switches.
|
||
|
They allow the person to enter the house and disarm the system befor the
|
||
|
alarm goes off. It allows him to arm it, and then leave befor it begins
|
||
|
monitoring. This type usually has a simple on/off switch on the back, and if
|
||
|
a burlar reaches it befor the thirty seconds expire, the system doesn't know
|
||
|
he isn't the homeowner. This type is usually a desktop model, and usually has
|
||
|
an electrical out let attached to it so that a lamp may be made to come on to
|
||
|
scare a burglar.
|
||
|
Because of their simple on/off switch, these are obviously the easiest to
|
||
|
bypass, but there are some that are a bit more difficult. They are often
|
||
|
disguised as a wall outlet, Hi-Fi speaker, book, or are more conspicuously
|
||
|
located on the wall. The wall and outlet varieties are usually part of a
|
||
|
larger, centralized system,and can only be reconized because Hi-Fi's have
|
||
|
an even number of speakers, and third ir fifth speaker should stand out. Also
|
||
|
if a speaker is just standing there with no stero or shit to accompany it,
|
||
|
then thats a dead giveaway for theives. The book type is more difficult to
|
||
|
locate when many books are in the room but it will be rather thich volume
|
||
|
with either two twin circles or squares (transmitter and receiver) on the
|
||
|
binding. The name will alos be of a generic nature.
|
||
|
So the burglars primary difficulty lies in defeating the outlet and wall-
|
||
|
mounted types. There are several techniques that , when used together,
|
||
|
enhance your success tremendously! If one has prior access to the protected
|
||
|
area while the system is disarmed, sucess in defeating the system is almost
|
||
|
guaranteed. A burglar may lower the sensitivity to zero, fill the entire
|
||
|
apparatus with aerosol styrofoam, or, if no one is around, cut through the
|
||
|
drywall,locate,bare,and jumper any wires that may be found. If one does not
|
||
|
have prior access, he still has a few options at his disposal.
|
||
|
While the owner is away one may rap the windows violently to create an alarm
|
||
|
and if this is done daily, the neighbors will eventually tell him that they
|
||
|
are tired of blasting through the neighborhood every day. Believing his
|
||
|
sensitivity is too high, he will usually lower it to compensate for the
|
||
|
"mysterious" outside noises. After this all done, the burglar then wearing
|
||
|
a heavy oversiezed coat, or even a rug, if possible. The more sound-absorbing
|
||
|
material a burglar can don, the safer he'll be. The larger coat or rug absorbs
|
||
|
rather that altar the sound frequencies, and the system's efficiency is
|
||
|
compromised considerably. If the wall are covered with rugs, draperies, or
|
||
|
tapestries, the effect is multiplied. But absorbing some sound is not enough,
|
||
|
so in addition to that the burglar must move super-slow. If the burglar must
|
||
|
traverse a monitored area of twenty feet, he may spend at least ten minutes
|
||
|
crossing it. The object here is to move so slowly that the frequency remains
|
||
|
undisturbed by the burglar's motion. Some ultrasonic units are hidden behind
|
||
|
wallpaper or plaster, but this cuts there effectiveness by at least 25%. If
|
||
|
the ultrasound units are installed in that manner, they become so unresponsive
|
||
|
the above methods becomes all the more efficacious!
|
||
|
There is one last remote, yet viable, technique for circumventing this type
|
||
|
of component. If one discovers the exact operating frequency of the unit, he
|
||
|
theoretically at least, get an ultrasonic transducer of the same frequency,
|
||
|
and stick it in front of the receiving unit. The whole monitored area could be
|
||
|
violated because the reciever would be receiving what the transmitter was
|
||
|
transmitting. I've never tried this befor, but it is a possibility.
|
||
|
|
||
|
II. PHOTOELECTRIC ALARMS
|
||
|
|
||
|
The photoelectric alarm,or "electric eye" is a fairly common alarm today, and
|
||
|
like the ultrasonic unit it consists of a transmitter and receiver. The
|
||
|
transmitter sends lightto the receiver, and if the beam is interrupted for a
|
||
|
second, the reciever recognizes it and sounds the alarm. The electric eye
|
||
|
princple came about during World War II so in other words the system is old!
|
||
|
The photoelectric unit may be a transmitter and a receiver that oppose each
|
||
|
other, or the transmitter and the reciever may be housed together in one unit,
|
||
|
while utilizing a reflector at the other end of the room. If you have no idea
|
||
|
what kind of alarm this is it's the ones that lets off a buzz when you walk
|
||
|
into a store. The old type of unit, which is still seen in some places, uses
|
||
|
ordinary white light. These are simply defeated by shining a flashlight into
|
||
|
the receiver, so that a 'buddy' may pass right through the beam. This is easily
|
||
|
detected, especially at night, because the light is plainly visible.
|
||
|
Even though the newer models use invisible light, they are still terribly
|
||
|
easy to bypass. They are placed in front of doors, windows,or in long hallways,
|
||
|
in an attempt to catch passerbys. The inherent disadvantage of photoelectric
|
||
|
sensors is that they are easily seen. Although sometimes disguised as wall
|
||
|
receptacles, they are almost always in plain view, and this fact alone aids
|
||
|
in circumvention.
|
||
|
The modern electric eyes use a beam of Ultra-Violet or Infra-Red light.
|
||
|
Anyone can buy from a science supply company,filters that allow them to view
|
||
|
UV or IR light. The invisible light is no visible, and may be easily avoided.
|
||
|
Trying to shine a beam of UV or IR light into the reciver may work but the
|
||
|
higher-tech models use a pulsed beam. The receiver will be programed to the
|
||
|
transmitter's frequency, and any deviation will result in an alarm. If one has
|
||
|
access to the premises befiorehand, he can kick and break the reciever, causing
|
||
|
it to malfunction, and causing the owner to shunt that zone before arming the
|
||
|
system.
|
||
|
There may be cases where the componet uses laser light, instead of Ultra-
|
||
|
Violet or Infra-Red. This is easily stepped over,ducked under,or otherwise
|
||
|
avoided,provided there is not an entire network of lasers that form an
|
||
|
impassable grid. This would be only used in a very high-security situation,
|
||
|
but since it does occur, burglars have discovered at least two ways which it
|
||
|
may be surmounted. First, a mirror system could be designed that provides a
|
||
|
doorway for the burglar. The mirrors must be precisely 45* degrees, and
|
||
|
since the apparatus is constructed on the spot, careful planning must go into
|
||
|
it design. The viability of the next technique depends greatly on the
|
||
|
circumstances involved. If there is a hiding place near the laser grid, one
|
||
|
can walk right through the grid and the hides and then the burglar releases
|
||
|
a bird that he brought with him. After the alarm sounds the guard will see
|
||
|
the bird near the alarm and wounder how it got there but will assume that it
|
||
|
was the bird that triggered the alarm. It should be obvious to you that this
|
||
|
technique may be used used in other areas of alarm bypassing. The laser grid
|
||
|
system will not be encountered very often, one of my high tech hoods say he
|
||
|
only came accross one at a jewlry store. So a burglar with UV or IR filters
|
||
|
may be fairly certain that he is safe from detection by photoelectric alarms.
|
||
|
|
||
|
III. PASSIVE INFRA-RED ALARMS
|
||
|
|
||
|
Passive Infra-Red alarms, or PIRs are so called because they do not emit
|
||
|
Infra-Red energy, but merely detect a change in it. A PIR probes its
|
||
|
monitoring area, and if any changes are detected in Infra-Red (heat), it sounds
|
||
|
an alarm. A PIR records the ambient room temperature so it will notice any
|
||
|
changes such as that produces by the human body. Slow temperature changes,
|
||
|
such as thermostatically controlled heating systems, will not interfere with
|
||
|
the PIR's duties. The PIR is often called a thermal detector, however such
|
||
|
heat detectors are used primarily for fire prevention. The PIR is immediatly
|
||
|
recognizable (see Fig. 1) due to its common design and dark-red lens. They
|
||
|
are very common in museums,banks,and other places where high-security is
|
||
|
desired.
|
||
|
The very fact that a PIR is passive, disallows easy detection. The burglar
|
||
|
must rely solely on his observations for the recognition of a PIR system.
|
||
|
Due to the nature of a PIR, they are usually placed in a very conspicuous
|
||
|
location, such as in the corner of a room. The bad news for the burglar is
|
||
|
that PIR's have vandal-proof germanium lenses, are tamper-proof, and cannot
|
||
|
be jumpered reliably. Also the range of the PIR can be 70 feet or more,
|
||
|
although a PIR's probing pattern usually only monitors an area of about 20
|
||
|
feet square.
|
||
|
IIIIIIIIIIIIIIIIII
|
||
|
I----------------I
|
||
|
II II
|
||
|
I ************ I
|
||
|
FIGURE 1. I ************ I
|
||
|
I ************ I
|
||
|
I ************ I
|
||
|
I ************ I
|
||
|
I I
|
||
|
I * I
|
||
|
I I
|
||
|
I I
|
||
|
II--------------II
|
||
|
IIIIIIIIIIIIIIIIII
|
||
|
THIS IS A NOT SO GOOD DIAGRAM OF A PASSIVE INFRA-RED ALARM BUT
|
||
|
YOU SHOULD BE ABLE TO GET THE MESSAGE. THE DESIGN IS EASILY RECOGNIZABLE.
|
||
|
|
||
|
As reliable as they are, PIR's as you've probably guessed, are defeatable
|
||
|
or I wont not have wasted my damn time telling you about them. Althogh they
|
||
|
are generrally undetectable, large-pet owners are immediatly eliminated from
|
||
|
the list of possible PIR users. With there recent proliferation into the
|
||
|
resdential market, burglars have learned to anticipate a PIR system. Some are
|
||
|
sold over-the-counter,although a great many are professionally installed.
|
||
|
Therefore, one means of detection would be to see whether or not the alarm
|
||
|
company's window decal was present.
|
||
|
Earlier, I said that PIR's detect rapid changes in temperature. I have walked
|
||
|
albeit slowly directly up to a PIR, and have not set it off. My movement was
|
||
|
so slow that the PIR adjusted to the slight difference in ambient temperature
|
||
|
that my body was creating. Even if a PIR system is on a silent alarm (as
|
||
|
disscussed in part 3), one immediatly knows whether or not he is detected.
|
||
|
All modern PIR's have a tiny red LED (light-emitting diode) that lights when
|
||
|
the burglar causes the internal switch to close. Although I have walked up to
|
||
|
a PIR, it took me four or five times to get it right, therefore just walking
|
||
|
slowly is not enough.
|
||
|
The greater the distance between room temperature and the temperature of the
|
||
|
source of violation, the move efficiently the PIR will work. As the gap
|
||
|
between room temperature and the temperature of the violator narrows, the
|
||
|
efficiency of the PIR decreases respectively. So since our bodies maintain a
|
||
|
constant temperature of 98.6*,a PIR in a room with a temperature around 100*
|
||
|
will never notice you walking through the room. Now the only problem is how
|
||
|
the hell is the burglar is going to heat and maintain a room above body temp.
|
||
|
One way is to get to the thermostat and turn it on full blast. Another way
|
||
|
is to, if possible,make a hole in the room or building, and introduce a large
|
||
|
space-heater. It should be at least 350,000 BTU's so that it can produce the
|
||
|
needed heat. If it blows directly into the path of the PIR unit, the alarm
|
||
|
will sound. The heat must be raised gradually, or the thief defeats his own
|
||
|
purpose.
|
||
|
Mylar is a thin, metallic, plastic-like material that has a very intersting
|
||
|
characteristic. When worn, it allows very little body heat to escape. If a
|
||
|
suit, with hood, was made of this stuff will lower the chance of detection.
|
||
|
|
||
|
IV. MICROWAVE SYSTEMS
|
||
|
|
||
|
The microwave alarm system is another transmitter/reciever motion detector,
|
||
|
and is unquestionably the most difficult to successfully bypass. The system
|
||
|
emits a beam of ultra-high RF (Radio Frequency) energy, generally 10.525 GHz,
|
||
|
and detects intruderes by observing any change in that RF energy. Microwave
|
||
|
systems are extremely versatile in that one unit may be used to monitor an
|
||
|
80 by 80 room or a 10 by 300 hallway.
|
||
|
The primary disadvantage of a microwave system is that it has a propensity
|
||
|
to penetrate the boundaries of the building it is protecting. In other words,
|
||
|
microwave energy that is used to guard a business sometimes reaches out into
|
||
|
the parking lot, which understandably causes many false alarms.
|
||
|
The detection of microwaves is actually very easy. The frequency they use,
|
||
|
10.526GHz, is approximately that of a poloice radar. So when you are near a
|
||
|
microwave alarm system, a superheterodyne radar detector will sound. The
|
||
|
close resemblance between microwaves and radar has prompted people to call
|
||
|
these "radar systems'" but that is technically inaccuratte.
|
||
|
Once detected quite frankly there is not much one can do to bypass a micro-
|
||
|
wave alarm in its capacity as a simgle component. However, there are always
|
||
|
part of a larger, centralized system that may be defeated. There are some
|
||
|
possibilities, however, for the determined burglar, but these depend greatly
|
||
|
on the circumstances. For example, microwaves will NOT penetrate metal. If
|
||
|
one had prior access to the building being guarded, he could arrange metal
|
||
|
objects (filing cabinets,desks,etc.) so that he could reach his destination
|
||
|
undetected. Another method is for the burglar to move VERY,VERY slow.
|
||
|
Microwaves systems cannot detect movement if it proceeds at less than two
|
||
|
inches per second. That is indeed slow! When a burglar encounters a miicro-
|
||
|
wave alarm he is expected to silence the annunciator (see part 3).
|
||
|
|
||
|
V. A WORD FROM THE AUTHOR
|
||
|
|
||
|
This concludes part 2 of 'BURGLAR ALARM BYPASSING' but there is more! So
|
||
|
be on the look out for part 3 comming very soon to a bbs near you!
|
||
|
|
||
|
The HIGH-TECH HOODS would like to welcome "MACK NASTY" to the crew!!
|
||
|
Mack Nasty has submitted ideas for the Ultimate Revenge Text......Yepp
|
||
|
The Ultimate!!In other words..George Hayduke looks like the POPE
|
||
|
next to Mack Nasty!!!
|
||
|
|
||
|
Also look for the following text files: ATM-92
|
||
|
SafeCracking
|
||
|
Mack Nasty File#1
|
||
|
Silent Death
|
||
|
and much more!
|
||
|
The Following BBS's get these files
|
||
|
befor anyone else:
|
||
|
Blitzkreig (502) 499-8933
|
||
|
OR
|
||
|
RIPCO (312) 528-5020
|
||
|
|
||
|
THE RAVEN!
|
||
|
+========+
|
||
|
|
||
|
|
||
|
|