873 lines
20 KiB
Plaintext
873 lines
20 KiB
Plaintext
|
||
|
||
ELECTRONIC SURVEILLANCE
|
||
|
||
Are you bugged?
|
||
|
||
|
||
|
||
(C) Copyright 1993 Michael E. Enlow
|
||
|
||
|
||
|
||
----------------------------------------------------------
|
||
|
||
DISCLAIMER
|
||
|
||
|
||
|
||
This document was written by an expert, quite knowledgeable in
|
||
|
||
the methods and techniques of good, successful investigation.
|
||
|
||
The author has based this material solely upon his discoveries
|
||
|
||
and experiences in the trade but is not an attorney. Thus no legal
|
||
|
||
advice is offered herein.
|
||
|
||
|
||
|
||
Be cautioned therefore, that this document neither asserts the
|
||
|
||
legality of any of the methods described herein, nor does it
|
||
|
||
advocate any usage of techniques without first seeking competent
|
||
|
||
legal advice and adherence to the law.
|
||
|
||
|
||
|
||
The author, editor, and service providers, unequivocally disclaim
|
||
|
||
any responsibility for damages resulting from the use of any of the
|
||
|
||
techniques or the consequences of implementing anything contained
|
||
|
||
herein. This writing is provided strictly for informational purposes
|
||
|
||
only.
|
||
|
||
|
||
|
||
---------------------------------------------------------------
|
||
|
||
|
||
|
||
(This is an abstract from The Inside Secrets, a newsletter
|
||
|
||
catering to detectives, attorneys, law enforcement officers
|
||
|
||
and professionals around the world. Want to know how the
|
||
|
||
pro's bug, tap phones, and use other things to hear what
|
||
|
||
you're saying.)
|
||
|
||
|
||
|
||
I'm now going to show you just how widespread illegal
|
||
|
||
electronic surveillance, or bugging really is. But, let me
|
||
|
||
begin by saying. . .
|
||
|
||
|
||
|
||
MY INTENTION IS NOT TO SHOW YOU WAYS YOU MAY DO ILLEGAL
|
||
|
||
ELECTRONIC SURVEILLANCE, BUT ONLY TO INFORM YOU OF HOW IT IS
|
||
|
||
DONE, ON WHAT SCALE, AND WHAT YOU CAN DO TO PROTECT YOUR
|
||
|
||
RIGHTS. I, THEREFORE, DISCLAIM ANY AND ALL LIABILITY FOR
|
||
|
||
YOUR MISUSE OF ANY OF THE TECHNIQUES AND/OR CONCEPTS OUTLINED
|
||
|
||
WITHIN THIS ISSUE AND FURTHER ISSUES OF THE INSIDE SECRETS
|
||
|
||
NEWSLETTER.
|
||
|
||
|
||
|
||
Do you get it? If you take it upon yourself to use the
|
||
|
||
information I share with you and do something illegal, then
|
||
|
||
you pay the price. I am warning you in advance. I am not an
|
||
|
||
attorney and do not claim to be rendering legal advice. If
|
||
|
||
you consider using any of the concepts I disclose, you should
|
||
|
||
consult your attorney to insure they are legal in your
|
||
|
||
jurisdiction. With that behind us, let's move on.
|
||
|
||
|
||
|
||
Do you know there are only about three to four hundred court
|
||
|
||
orders issued each year for electronic surveillance
|
||
|
||
applications in the U.S.? Yet, there are hundreds (if not
|
||
|
||
thousands) of electronic surveillance equipment suppliers. I
|
||
|
||
wonder how they manage to stay in business?
|
||
|
||
|
||
|
||
Well, my friend, I'll tell you. They make a lot of money
|
||
|
||
selling electronic surveillance equipment. Their customers
|
||
|
||
are Federal, State, and Local Law Enforcement Agencies,
|
||
|
||
corporations, and a few private investigators, who often
|
||
|
||
illegally use these devices in their investigations--but
|
||
|
||
you'll never know it...
|
||
|
||
|
||
|
||
A very popular book on electronic surveillance came out in
|
||
|
||
1967, and it listed some of the buyers of electronic
|
||
|
||
surveillance gear. Everyone was quite surprised to find Avis
|
||
|
||
Rent-A-Car, various hotel chains, Coca-Cola, several life
|
||
|
||
insurance companies, and the like, were allegedly spending
|
||
|
||
millions for specialized bugging devices. But to find out
|
||
|
||
that Walt Disney was a major customer . . .? Hmmm....
|
||
|
||
|
||
|
||
In my career, I have discovered numerous illegal electronic
|
||
|
||
surveillance applications. Bugs are everywhere; they're in
|
||
|
||
small businesses, large corporations, people's homes,
|
||
|
||
conventions, everywhere! In fact, if you don't believe me,
|
||
|
||
you can hear for yourself. Use a programmable police scanner
|
||
|
||
to scan the 35 to 50 megahertz bands. You'll almost always
|
||
|
||
find some very strange transmissions. (Things mother wouldn't
|
||
|
||
have wanted you to hear.)
|
||
|
||
|
||
|
||
Let me tell you more about electronic surveillance. There
|
||
|
||
are many ways of using electronics for surveillance, but
|
||
|
||
first lets take a look at what's called hardwiring.
|
||
|
||
|
||
|
||
Hardwiring is basically the same as having an everyday
|
||
|
||
microphone plugged into a tape recorder. When you speak into
|
||
|
||
the microphone, everything you say is sent through the
|
||
|
||
microphone's wire and recorded onto a tape.
|
||
|
||
|
||
|
||
Then, there are electronic transmitters which intercept the
|
||
|
||
signal via microphone and transmit it as a radio signal to a
|
||
|
||
receiver of some kind. (Sort of like a miniature radio
|
||
|
||
station.)
|
||
|
||
|
||
|
||
There are also more advanced long range listening devices
|
||
|
||
like the laser mic, the shotgun microphone, the parabolic
|
||
|
||
microphone, and others which can pick up a whisper for long
|
||
|
||
ranges (sometimes even miles away).
|
||
|
||
|
||
|
||
To elaborate on a few types of electronic surveillance
|
||
|
||
applications and the ways to protect yourself from them, I'll
|
||
|
||
expound and tell of a couple of case scenarios.
|
||
|
||
|
||
|
||
First let's discuss. . .
|
||
|
||
|
||
|
||
HARDWIRING
|
||
|
||
|
||
|
||
As I said earlier, this type of electronic interception
|
||
|
||
requires the use of wire to carry the sound to you or some
|
||
|
||
other listening device. There are many ways hardwiring is
|
||
|
||
done. Wires the size of a human hair can be used to transmit
|
||
|
||
a signal from a microphone. They can be painted over,
|
||
|
||
implanted under carpet, in an air condition duct, or behind
|
||
|
||
baseboards, etc., to conceal them from view.
|
||
|
||
|
||
|
||
At one end of the wire is the microphone, and on the other a
|
||
|
||
tape recorder or even someone who is listening with a set of
|
||
|
||
headphones. This method of electronic interception is the
|
||
|
||
oldest in the industry, yet still practiced today.
|
||
|
||
|
||
|
||
To make everything a little more complicated, there is also a
|
||
|
||
conductive paint that closely resembles fingernail polish,
|
||
|
||
which will transmit the minute electrical impulses from the
|
||
|
||
microphone to a recorder or headphones.
|
||
|
||
|
||
|
||
There are so many different hardwire applications that I will
|
||
|
||
not attempt to cover them all. I will just emphasize a bit
|
||
|
||
by sharing with you a couple we've discovered in our
|
||
|
||
countermeasures work.
|
||
|
||
|
||
|
||
Once, in checking a certain client's business for bugs, we
|
||
|
||
located a very cleverly installed hard-wire system.
|
||
|
||
Obviously someone had access to the office for a considerable
|
||
|
||
length of time, or maybe did a little breaking and entering
|
||
|
||
to get into the office.
|
||
|
||
|
||
|
||
Anyway, this particular application was a small microphone
|
||
|
||
element about a quarter inch in diameter (found at all Radio
|
||
|
||
Shack stores) placed in a small hole in a picture frame. A
|
||
|
||
hole drilled into the rear of the picture frame held the
|
||
|
||
microphone in place. A small eighth inch hole continued
|
||
|
||
through the frame to allow the sound waves to reach the
|
||
|
||
microphone. A couple of fine wires running from the
|
||
|
||
microphone to the wall were thumb tacked there. At this
|
||
|
||
point, conductive paint, as described above, continued down
|
||
|
||
the seams of the paneling walls to the baseboard. Behind the
|
||
|
||
baseboard the conductive paint joined with an old set of
|
||
|
||
unused telephone wires.
|
||
|
||
|
||
|
||
A recorder was concealed in the basement near the phone box.
|
||
|
||
Every sound made in our client's office was being taped
|
||
|
||
using a long play tape recorder. Many times agents will
|
||
|
||
change the play and record speed of tape recorders by
|
||
|
||
alternating the internal components. This enables a standard
|
||
|
||
tape recorder to record from 4 to 15 hours on one side of a
|
||
|
||
tape.
|
||
|
||
|
||
|
||
Let me tell you of another clever hardwire I discovered. We
|
||
|
||
received a call from a lady who, believing that she was
|
||
|
||
bugged, requested a "bug-sweep" of her home to detect any
|
||
|
||
illegal electronic surveillance devices. After a very
|
||
|
||
thorough sweep b y several of my agents, they found nothing.
|
||
|
||
My agents told her there were no electronic surveillance
|
||
|
||
devices on the premises. My men really did a thorough sweep
|
||
|
||
and search.
|
||
|
||
|
||
|
||
A few days later the lady called again and said she knew
|
||
|
||
without a doubt that she was bugged. She insisted we must
|
||
|
||
have missed something. This time I went to the location and
|
||
|
||
ran every test we had equipment to run. Still--no bug.
|
||
|
||
Then, I began the next countermeasures procedure, a physical
|
||
|
||
inspection of the entire house from attic to basement.
|
||
|
||
|
||
|
||
As I was searching, I noticed something very unusual. The
|
||
|
||
stereo, situated in the center of the home, was on and the
|
||
|
||
cassette deck was playing. Closer inspection showed that it
|
||
|
||
was recording! However, there wasn't a microphone plugged
|
||
|
||
into the microphone jack and it didn't have an internal
|
||
|
||
microphone. I stopped the tape and played it back. There was
|
||
|
||
a perfect recording of our client and myself as I was
|
||
|
||
questioning her during my search.
|
||
|
||
|
||
|
||
I checked the back of the stereo and there it was! I noticed
|
||
|
||
one of the speaker wires was routed into the cabinet of the
|
||
|
||
stereo. I disassembled the stereo and the wire was connected
|
||
|
||
to the microphone jack on the inside and connected to a
|
||
|
||
speaker. A SPEAKER WAS BEING USED TO CONDUCT MICROPHONE
|
||
|
||
SIGNALS TO THE TAPE RECORDER! It worked like a charm!
|
||
|
||
|
||
|
||
On top of this, the husband had changed the record/play speed
|
||
|
||
of the recorder to accommodate eight hours of recording.
|
||
|
||
This was one of the most sophisticated "home-made" jobs I had
|
||
|
||
ever seen! Every night while the wife was working, as a
|
||
|
||
nurse, h e was reviewing everything that happened at home the
|
||
|
||
day before -- overhearing her telephone calls, and her
|
||
|
||
visitors. I have to credit this guy, it was quite a design.
|
||
|
||
|
||
|
||
ARE YOU BUGGED?
|
||
|
||
|
||
|
||
My best advice on detecting any type of hard wire
|
||
|
||
installation is to look for any alteration in the carpet
|
||
|
||
where wiring may have been routed under the carpet. Watch
|
||
|
||
for any unusual sets of wires near and around your telephone
|
||
|
||
wiring. (You should always be familiar with the type and
|
||
|
||
number of wires near your outside telephone connection box,
|
||
|
||
and watch out for any new wires that may appear.)
|
||
|
||
|
||
|
||
Keep notice of the baseboards around the floor and note any
|
||
|
||
unusual scratches in the paint, or other indications that the
|
||
|
||
base board has been removed. Be cautious of any metal
|
||
|
||
objects that may be part of a conductor for electricity.
|
||
|
||
This could b e part of a hot-wire for a bug. Let me
|
||
|
||
illustrate this for you:
|
||
|
||
|
||
|
||
As you can see, many types of metals carry current and can be
|
||
|
||
used as a decoy for wiring. This type installation will out-
|
||
|
||
wit most private detective countermeasure sweeps and
|
||
|
||
searches, particularly in hard-wire systems.
|
||
|
||
|
||
|
||
Another type of hard-wire system is a direct telephone tap.
|
||
|
||
This only requires a standard tape recorder with both a
|
||
|
||
microphone and remote control jack with an "auto recording
|
||
|
||
control." These are about $25.00 and are available at any
|
||
|
||
Radio Shack or other electronic supply store.
|
||
|
||
|
||
|
||
The "auto recording control" is a small box about three
|
||
|
||
inches square and has two wires coming out of it. It also
|
||
|
||
has two switches on top of it to set it for record or
|
||
|
||
playback mode. There is a gray wire which plugs directly
|
||
|
||
into any extra telephone jack or it can be cut and spliced
|
||
|
||
into the telephone line. The other wire, with two plugs,
|
||
|
||
connects to the tape recorder. The small plug goes to the
|
||
|
||
remote jack of the tape recorder and the other, larger plug,
|
||
|
||
to the microphone jack on the recorder. One simply presses
|
||
|
||
the record button on the recorder and you're all set.
|
||
|
||
|
||
|
||
The auto recording control will keep the recorder inactive
|
||
|
||
until the phone is in use. Once the phone is lifted from the
|
||
|
||
cradle, the auto recorder control activates the recorder to
|
||
|
||
clearly record both sides of the conversation. As soon as
|
||
|
||
the phone is placed back on the hook, the recorder stops
|
||
|
||
recording and waits for the next incoming or outgoing call.
|
||
|
||
This feature prevents the tape recorder from playing
|
||
|
||
constantly and allows for the recorder to only be active
|
||
|
||
during calls.
|
||
|
||
|
||
|
||
Most people who use this method of bugging will plug the auto
|
||
|
||
recording control into an extra telephone jack in the home or
|
||
|
||
business, and conceal the recorder underneath a bed or behind
|
||
|
||
some other object to conceal it.
|
||
|
||
|
||
|
||
However, in those cases where there are no extra jacks, they
|
||
|
||
will cut the telephone jack wire coming out of the auto
|
||
|
||
recording control and strip away the insulation from the red
|
||
|
||
and green wires. Then, they will splice these colored wires
|
||
|
||
into the phone wire.
|
||
|
||
|
||
|
||
Nearly all phone systems operate on a single grey or white
|
||
|
||
cable. Once the insulation is removed the cable contains a
|
||
|
||
red, green, yellow, and black wire. This cable carries
|
||
|
||
approximately 40 to 50 volts and will seldom shock if handled
|
||
|
||
improperly, (unless of course, the phone rings which sends
|
||
|
||
about 110 volts or so down the line) allowing for amateur
|
||
|
||
surveillance applications.
|
||
|
||
|
||
|
||
Once the insulation is stripped away, these two wires, the
|
||
|
||
red and green, should be matched with the red and green in
|
||
|
||
the telephone wire and then properly taped to insure no
|
||
|
||
static will occur. In 99% of the applications we've found,
|
||
|
||
we seldom find them with static, clicks, hums, or any other
|
||
|
||
noise that would alert the subject of a bug. We have seen
|
||
|
||
instances where people have used bubble gum to seal the wires
|
||
|
||
once spliced. (The FEDS love finding fingerprints in bubble
|
||
|
||
gum. It makes their job so easy...)
|
||
|
||
|
||
|
||
Here's another tactic that has been used in phone tapping.
|
||
|
||
We've seen cases where extensions of people's phones are
|
||
|
||
installed at other locations where the tap can be easily
|
||
|
||
accessible. Generally, the person doing the bugging will
|
||
|
||
design a plan to get the phone company to have a new line
|
||
|
||
with the same number installed (an extension) in a
|
||
|
||
predetermined location, often under the guise of an "office
|
||
|
||
extension." Then, they connect the recording device, and
|
||
|
||
monitor calls for several weeks. Before the person being
|
||
|
||
bugged receives their phone bill reflecting the added charge
|
||
|
||
for the new phone line, the culprit is long gone. . .
|
||
|
||
|
||
|
||
THE CORDLESS PHONE
|
||
|
||
|
||
|
||
Cordless phones are in near every American home. Sure they
|
||
|
||
are convenient to carry around with us, but they can easily
|
||
|
||
transmit both side of your phone calls to anyone with a
|
||
|
||
police scanner for up to a mile away!
|
||
|
||
|
||
|
||
BEWARE OF DISCUSSING CONFIDENTIAL BUSINESS
|
||
|
||
ON CORDLESS PHONES!
|
||
|
||
|
||
|
||
The box in which your cordless phone was purchased usually
|
||
|
||
warns you that these phones are transmitters. Yet, every day
|
||
|
||
millions of people, both at work and home, continue to use
|
||
|
||
them, spreading their business through the airwaves. There
|
||
|
||
is little you can do to stop people from hearing your calls,
|
||
|
||
short of purchasing a scrambling device. Even then the party
|
||
|
||
to whom you are talking would also have to have a matching
|
||
|
||
descrambling device to understand you. This would so
|
||
|
||
restrict the use of your cordless phone to the point that you
|
||
|
||
may as well use a regular telephone.
|
||
|
||
|
||
|
||
Cordless phones are easily intercepted. For your own
|
||
|
||
security, I'll share how it is done. Again, I am not an
|
||
|
||
attorney and highly recommend you consult with a competent
|
||
|
||
attorney should you decide to use this technique for
|
||
|
||
information gathering...
|
||
|
||
|
||
|
||
It works like this. Nearly all cordless phones (with the
|
||
|
||
exception of the new 900 megahertz phones) transmit in the
|
||
|
||
46.00 to 47.00 megahertz band. To intercept the cordless
|
||
|
||
phone, the investigator will use the search feature on the
|
||
|
||
scanner and program 46.00 as the low and 47.00 as the high
|
||
|
||
and touch the search/scan key. If a cordless phone is in use
|
||
|
||
in the area it will lock in on that frequency. He or she
|
||
|
||
can, then, hear both sides of the conversation crystal clear
|
||
|
||
for up to a mile. The use of a good low-band antenna with
|
||
|
||
the scanner will increase the reception range of a cordless
|
||
|
||
phone even further.
|
||
|
||
|
||
|
||
Many private investigators will drive by a subject's home
|
||
|
||
searching these frequencies, and obtain "inside information"
|
||
|
||
that will provide leads that later help them to document
|
||
|
||
evidence.
|
||
|
||
|
||
|
||
It is arguable whether this is an invasion of privacy or a
|
||
|
||
violation of federal law because of the notice on the carton
|
||
|
||
in which this type telephone is purchased. It clearly states
|
||
|
||
they are not private. Many investigators and attorneys argue
|
||
|
||
that people waive their rights to the expectation of privacy
|
||
|
||
when they use such a telephone.
|
||
|
||
|
||
|
||
TO GO A STEP FURTHER. . .
|
||
|
||
|
||
|
||
There is also a device called an "auto scanner recording
|
||
|
||
control" which will allow a police scanner to be connected to
|
||
|
||
a tape recorder. It activates the recorder to begin
|
||
|
||
recording--only when the cordless phone is in use.
|
||
|
||
Investigators will determine the exact frequency of the
|
||
|
||
subject's phone, and then place a battery powered scanner
|
||
|
||
with the scanner recorder control in a water-tight baggie or
|
||
|
||
other container, conceal the equipment in hedges, culverts,
|
||
|
||
etc., near the subject's home or office. Later he or she
|
||
|
||
will retrieve the equipment along with the "juicy info" of
|
||
|
||
the targets telephone conversations! And to go a step
|
||
|
||
further, the investigator will often use a long-play recorder
|
||
|
||
that will record hours of conversation.
|
||
|
||
|
||
|
||
Surveillance companies and spy shops sell recorders that will
|
||
|
||
record up to 10 hours of conversation on a single cassette
|
||
|
||
tape. If you are a business man who often uses a tape
|
||
|
||
recorder for business, this may be a real help to you.
|
||
|
||
|
||
|
||
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>><
|
||
|
||
> INTEC Investigative Technology recently bought <
|
||
|
||
> the entire plans line of famous surveillance <
|
||
|
||
> genius John Wilson. For a free copy of the plan<
|
||
|
||
> to modify a tape recorder for long play, call <
|
||
|
||
> our Fax-Vault from your fax and get document <
|
||
|
||
> number 120 at 601-876-9740 or 6757 <
|
||
|
||
> Another free service of INTEC! <
|
||
|
||
><<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<
|
||
|
||
The concepts mentioned above are only the "tip of the
|
||
|
||
iceberg" of what is happening in illegal electronic
|
||
|
||
surveillance. I could write an entire book on just this
|
||
|
||
topic. Since we have only so much space to write each month,
|
||
|
||
I will have to continue this topic in future issues.
|
||
|
||
However, if you have specific questions or comments, you may
|
||
|
||
call my office or send a fax, and we will try to answer your
|
||
|
||
questions.
|
||
|
||
|
||
|
||
Please don't be so foolish as to believe, "It couldn't happen
|
||
|
||
to you," or you may find a lot of your deals going sour.
|
||
|
||
Perhaps, someone may even decide your secrets are worth more
|
||
|
||
than your bank account....
|
||
|
||
|
||
|
||
BEWARE: IT IS HAPPENING MORE THAN YOU WOULD BELIEVE!
|
||
|
||
|
||
|
||
I have turned down many multi-thousand dollar jobs to do
|
||
|
||
industrial spying, and if I am getting these offers, so are
|
||
|
||
many others. You can never be too careful.
|
||
|
||
|
||
|
||
There are devices which will help you to detect illegal
|
||
|
||
telephone taps, transmitters, and conventional hard-wire
|
||
|
||
bugs, but the best protection is to follow a few rules:
|
||
|
||
|
||
|
||
a. Never say anything on the phone you wouldn't want to
|
||
|
||
say in a courtroom.
|
||
|
||
|
||
|
||
b. Never trust anyone. If what you say could hurt you
|
||
|
||
and your business, shut-up.
|
||
|
||
|
||
|
||
c. If you must discuss very confidential business,
|
||
|
||
create a loud background noise that will hinder the
|
||
|
||
less expensive electronic devices, i.e., a radio or
|
||
|
||
television with loud volume, a fan running in the
|
||
|
||
same room, etc., and talk quietly. You would be
|
||
|
||
amazed at how effective this background noise is
|
||
|
||
against electronic invasion of your privacy.
|
||
|
||
|
||
|
||
d. When discussing very delicate issues, never meet in
|
||
|
||
anyone's office. Meet in public places and be sure
|
||
|
||
to be observant of any bulges which could be
|
||
|
||
concealed tape recorders, etc.
|
||
|
||
|
||
|
||
Until next time. . . .
|
||
|
||
|
||
|
||
Michael E. Enlow, Legal Investigator
|
||
|
||
|
||
|
||
P.S. Please don't hesitate to call if you have questions
|
||
|
||
or send e-mail to michael@enlow.com.
|
||
|
||
|
||
|
||
*****************************************************************
|
||
|
||
NOTE:
|
||
|
||
|
||
|
||
To retrieve a copy of our complete "insider" catalog of books,
|
||
|
||
newsletters, special reports, and the famous John Wilson catalog
|
||
|
||
of high-tech, electronic surveillance and countermeasure gadgetry,
|
||
|
||
along with schematics and very simple construction plans, send
|
||
|
||
e-mail to catalog@enlow.com. The catalog will be automatically
|
||
|
||
e-mailed back to you.
|
||
|
||
|
||
|
||
INTEC Investigative Technology
|
||
|
||
voice: (601) 783-6037
|
||
|
||
fax: (601) 783-2111
|
||
|
||
Internet: info@enlow.com
|
||
|
||
Anonymous FTP: enlow.com (198.92.134.50) |