382 lines
24 KiB
Plaintext
382 lines
24 KiB
Plaintext
/### /### /########### /### /###
|
|
/### /### /########### /### /###
|
|
/############ /////###/// /############
|
|
/############ /### /############
|
|
/###//////### /### /###//////###
|
|
/### /### /### /### /###
|
|
/// //// //// //// ////
|
|
|
|
HIGH TECH HOODS PRESENTS...
|
|
|
|
|
|
BURGLAR ALARM BYPASSING PART 3!!
|
|
|
|
WRITTEN BY THE RAVEN
|
|
|
|
------------------------------------------------------------------------------
|
|
NOTE: LOOK SINCE I'M NOT IN THE MOOD TO TRY AND FUCKIN COVER MY ASS WITH A
|
|
LONG SHIT DISCLAIMER, DO WHAT YA LIKE!
|
|
|
|
------------------------------------------------------------------------------
|
|
Anyway this so-far is the last file of the 'original' burglar bypassing text.
|
|
If there is anything that I forgot I'll update it, And if anyone has any
|
|
questions about a system around there way just give me a hollar at the listed
|
|
bbs's at the end of this text!
|
|
THE RAVEN
|
|
+=======+
|
|
|
|
INDEX:
|
|
I. THE CENTRAL STATION
|
|
II. PREAMPLIFIED MICROPHONES
|
|
III. POLICE AND GUARD RESPONSES
|
|
IV. TELEVISION MONITORS AND AUTO-DIALERS
|
|
V. GUERRILLA TACTICS
|
|
VI. MISCELLANEOUS
|
|
|
|
===============================================================================
|
|
|
|
CAN I KICK IT!?!
|
|
|
|
In Part Three, we will dicuss the variety of systems that are monitored by a
|
|
central station. Rather than announcing an intrusion (via bell,siren,etc.),
|
|
this type of system silently sends a signal to the alarm company where people
|
|
are monitoring for intrusions. This type of system, therefore, is often known
|
|
as the "silent alarm." Although one can obtain his objective by bypassing the
|
|
individual components of a local alarm system, when bypassing this type, one
|
|
must shut off the entire system to be successful. The employees of the central
|
|
station are led to believe that the alarm is being shut off by authorized
|
|
personnel.
|
|
|
|
I. THE CENTRAL STATION
|
|
|
|
A few years ago, rich homeowners, business owners, and other potential
|
|
targets for burglary, had alarms systems that were tied in directly to the
|
|
local police ststion. As the use of burglar alarms increased, the police
|
|
department began turning down more and more requests to be "hooked-up." As a
|
|
result, there became a demand for central stsions, or companies whose
|
|
specialty it was to simply monitor burglar alarms. Most police departments
|
|
will still allow banks and large jewelry stores a direct link to the police
|
|
station, but as a rule, homeowners are excluded. So as the demand for security
|
|
has risen, many guard agencies and burglar alarm insttallers have begun to
|
|
offer centralized monitoring as an option for their clients.
|
|
When a silent alarm is installed, it is connected by a dedicated telephone
|
|
line to the central station. In event of an intrusion, the control panel on
|
|
the premises being monitored calls up to the central station. In the event of
|
|
an intrusion, the cotrol panel on the premises being monitored calls up the
|
|
central station and gives an electronic message to the answering computer.
|
|
(All you hacks & phreaks should have a nice big bulb lit!!)
|
|
It tells the computer exactly which switch or sensor has been violated, and
|
|
the computer then tells the operator what has happened. For example if a
|
|
burglar enetered throuhg a broken window, the panel would call the computer up
|
|
and tell it that zone 4, a first floor window, has been broken. The operator
|
|
would then see on his computer screen that Acct. #1234, the Johnson residence
|
|
has had zone 4, the window foiling on the living room window, violated. As the
|
|
theif progressed through the house, the panel would call the computer for
|
|
every sensor that was violated. The operator may then receive 1234-17,
|
|
meaning that zone 17, a passive Infra-Red dector in the master bedroom, has
|
|
detected someone. The operator would then be fairly sure someone was in the
|
|
house, so he would have three options. He may just send his companies guards
|
|
to the scene, call 911 and dispatch the police, or he may send both the police
|
|
and the guards. (I'll tell you how to deal with the both of them later.)
|
|
When an authorized person enters through the designated entry/exit door,he
|
|
goes directly to the control panel. Using a key, or his push-button code, he
|
|
shuts the system off. If he enters at a strange hour, he must call the central
|
|
station and give them his password or code phrase. And so, since the system was
|
|
properly disarmed, the central station operator then pays no more attention to
|
|
that particular account for the rest of the night. Because of the time delay,
|
|
the owner is able to shut it off before the panel has time to call up the
|
|
central station's computer. This, coupled with the fact that the owner calls
|
|
the central station to give them his code, supposedly guarantees against foul
|
|
play. The premise here is that even if a burglar can get to the panel, and
|
|
shut it off, he will not know the code word. I suppose the people who think
|
|
that must have never herd of bugs or telephone taps, not to mention laser
|
|
surveillance devices, parabolic and directional microphones, or the "Oops, I
|
|
forgot my coat last night" (which contained a voice-operated tape recorder)
|
|
trick. The entry/exit door is another safeguard against illegal entry. It is
|
|
designated by the owner at the time of the installation, to be the ONLY
|
|
method of entrance when the alarm is armed. That doesn't mean that the owner
|
|
always obeys this, but it causes the central station operator to be a bit
|
|
more suspicious if someone shuts off an alarm, but does not enter through it.
|
|
Since the best way to bypass a monitored alarm is to appear to be authorized
|
|
to do so, a burglar usually doeas some surveillance to determine the entry/
|
|
exit door.
|
|
A central station has an immense amount of control over the security of its
|
|
city. The central station keeps blueprints (containing alarm design) of
|
|
clients' buildings, the master codes and codewords for all alarms, and it
|
|
sometimes even keeps a copy of their keys. It also knows when their clients
|
|
are out of town, and how long they will be gone for. I'll show you how to
|
|
gain access to the central stations weakness and how to exploite it later on
|
|
in the GUERRILLA TACTICS section.
|
|
It would greatly benefit a thief if he knew whether or not a system was
|
|
monitored, and if so, by whom. Ordinarily, a security puts its sticker on the
|
|
doors and windows of a monitored house or business. The thief could look
|
|
through the local Yellow Pages, to find out if the company is legit, and also
|
|
how long it may take the guards to respond to a call. A common way to test
|
|
this is to throw a rock through a window. If a bell sounds its most likely a
|
|
local alarm, if there is no sound but cops arrive moments later, it is
|
|
monitored. After a house or business has been determined to have a monitored
|
|
system, there are several ways to determine the company that monitors it.
|
|
Let's say that the proposed target is Movie Rental at 716 Broadway Street.
|
|
One could call every alarm company in the Yellow Pages, and say,"This is the
|
|
police department, do you monitor Movie Rental on Broadway?" Usually, an
|
|
answer will be given, but a reason for wanting to know should be prepared.
|
|
Presumably, one company will eventually say that they do indeed monitor
|
|
Movie Rental on Broadway. Another way to find out who monitord Movie Rental
|
|
is to strike up a conversation with the proposed victim, and ask him to
|
|
recommend a security company. A less risky way is to throw a rock through the
|
|
containing foil, and see how comes out to fix it. The name of the company is
|
|
usually written on the side of the car or truck for advertisement, but if not
|
|
the license plate is run through the DMV computer (see the A-CORP newletters
|
|
for more info on this.) In rural or suburban areas, one could also check the
|
|
homeowner's mail for the alarm company's bill.
|
|
An alarm company not only monitors for intrustions, but also for
|
|
tampering and sabotage. Cutting the telephone lines, the power lines, or
|
|
tampering with the control panel, will bring the cops just as fast as breaking
|
|
down the door. Although leaving the telephone off the hook will prevent the
|
|
alarm company from contacting the house, it will not keep the control panel
|
|
from contacting the company's computer, because it features a "line seizure"
|
|
mechanism. That means that no matter what happens, the alarm signal will get
|
|
through to the central station's computer.
|
|
|
|
II. PREAMPLIFIED MICROPHONES
|
|
|
|
The preamplified microphone, or preamp, as it is called, is usually a
|
|
small black box that sits in a centralized location, and listens for anything
|
|
out of the ordinary. Many companies, notably Sonitrol Security, utilize
|
|
preamps in addition to regular components. When the system is armed, the
|
|
preamplifier sends sounds (via telephone wires) to the central station. The
|
|
preamp can pick up the slightest noise, so that tell-tale sounds of a
|
|
burglary betray the burglar even if the other components do not. The preamp
|
|
does not know the difference between the sounds of burglary and everyday
|
|
noises, so it also sends barking dogs, sirens,telephone rings,and virious
|
|
other "harmless" noises into the ears of the central station operator.
|
|
Although they are sometimes dectected with high-quality bug dectectors,
|
|
it is often quite diffcult to know whether or not they are being used.
|
|
However, if a thief knows (or thinks) a preamplifier is being used, they are
|
|
quite easily overcome. If , prior to execution, one calls the residence or
|
|
business, the ringing will continue until the burglar arrives. If the burglar
|
|
is very quiet, the ringing will mask the noise that he is making, and the
|
|
listener will be none the wiser. Also a tape recording of a siren or barking
|
|
dog is often used to create the same effect.
|
|
Some security supply companies sell sound generator or jamming device
|
|
that nullifies bugs and other microphones, but the interference that this
|
|
creates may arouse undue suspicion, so it may not be practical for all
|
|
circumstances. One method that is practical, however, is the use of a CB
|
|
linear. If a CB radio that is connected to a powerful linear (over 250 watts)
|
|
is used near a preamplifier, the only thing that the operator at the central
|
|
station will hear is the CB conversation. You may think that this shit would
|
|
arouse suspicion but when we used it, it didn't! because this shit happens
|
|
all the time. Everytime a trucker with a powerful CB radio passes by a home
|
|
or business with a preamp this phenomenon happens (cool huh?).
|
|
Since preamplified microphones also capture the sound of an authorized
|
|
entry, the code is usually just given aloud upon entering, so the operator
|
|
can shut off his system. This code, then, is extremely easy to obtain.
|
|
|
|
III. POLICE AND GUARD RESPONSES
|
|
|
|
Although a burglar may proceed with caution, defeat every alarm component
|
|
in sight, and shut off the whole alarm panel, there is still a chance that he
|
|
may make a mistake. If the mistake is insignificant, no one ever knows about it,
|
|
and his mission comes off smoothly, but if the mistake raises the suspicion of
|
|
the central operator, it may result in the dispatch of guards or police to the
|
|
premises. The professional burglar recognizes this possiblity, and often
|
|
takes steps to minimize the risks and dangers of getting caught. With enough
|
|
planning, not only will his mission be accomplished, but the burglar will also
|
|
probaly escape.
|
|
If a burglar creates a silent alarm, or otherwise arouses the suspicion
|
|
of the operator, the police, guards or both, may be sent. If the alarm
|
|
company has its own mobile guards, it will dispatch them to the scene via
|
|
radio. This radio frequency is easily discovered by networking with scanner
|
|
enthusiasts, or by writting FCC. Once the freq is procured, the burglar can
|
|
listen to and follow every move of the guards. If the guards are headquartered
|
|
at the central station, a friend can keep the place under surveillance, and
|
|
watch the guards activities. If they suddenly go to their vehicles, and
|
|
proceed toward the place being burglarized, the 'friend' will notify the
|
|
burglar by walkie-talkie. (I know of someone that did this and invested $300
|
|
for walkie talkies and it turned out that they were the same ones used by the
|
|
guards so he just monitered his walkie-talkie during the whole mission!)
|
|
If the potential take is large enough, burglars may even have several cars
|
|
strategically placed along all possible routes that guards and police must use
|
|
to arrive at the scene. If they observe anything relevent, they will notify
|
|
the burglar. They may also bug the central station (see GUERRILLA TACTICS) to
|
|
determine whether or not the guards will be sent.
|
|
If a company does not have guards, or if they feel the police would be
|
|
better equipped to handle the situation, they may just call 911. The operator
|
|
will talk to the police department's dispatcher and tell him/her that he has
|
|
an "alarm drop" at such-and-such address. The police dispatcher will then
|
|
notify a nearby unit, by radio, that he received a call from XYZ Security,
|
|
and that he should go and check it out. The burglar, who also has a scanner
|
|
preset to the police frequency, has also been notified, and is mysteriously
|
|
gone when the police arrive. The freq of local police departments are easily
|
|
obtained from fellow scanner listeners, or from Radio Shack frequency guides.
|
|
While the above will work in most cases, there may be times when a guard
|
|
or policeman arrives, without the burglar knowing about it. If this occurs,
|
|
it is usually during a routine check. This, however, is so incredibly rare
|
|
that the chances of being caught in this manner are almost nil.
|
|
If a burglar thinks that he has a chance of getting caught, he may get
|
|
authentic or counterfeit credentials and documents that provide a plausible
|
|
excuse for his being there. Willie Sutton, the famous bank robber, even went
|
|
so far as to make a complete, but phony, police uniform to throw everyone
|
|
off his trail. This technique would obviously have its uses in housebreaking
|
|
as well.
|
|
Professional burglars also know better than to hide on the premises to
|
|
avoid capture. After the guards and police arrive, and verify an actual point
|
|
of entry (POE), the police department will bring out its K9 unit to "sniff
|
|
out" the place. Anyone hiding in the home or businesss will be found in a
|
|
matter of minutes. It seems that thieves would rather take their chances as
|
|
a moving target than to be a sitting duck by hidding under a bed. If one
|
|
enters in a conventional manner, such as through the front door, he usually
|
|
takes care to lock it behind him to give the appearance that nothing has been
|
|
disturbed. If a guard or policeman arrives on the scene and doesn't notice
|
|
anything suspicious, and doesn't see anyone inside, he will usually proceed
|
|
no further, and write it off as a mechanical failure. But if the theif uses
|
|
a crowbar to open a door or window then no one will think its a false alarm.
|
|
Closing and locking a door behind him also minimizes the risk of being
|
|
caught during a routine door check, which is quite common in some cities.
|
|
Finally, it should be known that professional burglars are acutely
|
|
aware that most guards are either 18 and just out of high school, or over
|
|
50 and extremely out of shape. Either way, they are poorly paid and very
|
|
indifferent to their company and clients. Thwy have no inherent loyalty
|
|
toward their employers, and this generally provides an incredible opportunity
|
|
for the resourceful burglar. It is obvious that five thousand dollars in the
|
|
hand of a $4.75 per hour security guard will sometimes make him look the
|
|
other way for an hour or so.
|
|
|
|
IV. TELEVISION MONITORS AND AUTO-DIALERS
|
|
|
|
Closed Circuit Television (CCTV) cameras are used around the world to
|
|
keep vigil over areas that are potential scenes of criminal activity. In
|
|
many cases, a guard keeps watch over several monitors, or the cameras are
|
|
connected to motion detectors, so that if anything is detected within the
|
|
camera's field of view, it would scan for the intruder. The motion detector
|
|
system is used when a guard has to monitor such a large number of cameras, it
|
|
would be difficult to watch them all simultaneously. CCTVs are frequently seen
|
|
in hotel lobbies, at bank teller windows, and other areas where the very
|
|
presence of the camera deters crime. In reality, cameras do very little to
|
|
guard against a proffessional burglary.
|
|
In the movies and on television, there is a varity of methods used to
|
|
defeat the lowly CCTV camera. Some thieves spray shaving cream into or tape
|
|
cardboard over the lens. MacGyver simply places a mirror in front of the
|
|
camera, and the Mission: Impossible team taps into the coaxial cable, and
|
|
delivers a phony picture to the Third World guard. Fortunately, or
|
|
Unfortunately, depending on your viewpoint, it is never quite that simple.
|
|
CCTV cameras have the uncanny ability to penetrate seemingly opaque objects,
|
|
therefore the shaving cream/cardboard method would probably not work. A mirror
|
|
placed in front of a lens would be a definite giveaway for an observant
|
|
guard that something was askew. Finally, the "tapping into the coax" trick
|
|
would involve so many trial and error adjustments that no one could get it
|
|
right the first time, let alone convince a guard that nothing out of the
|
|
ordinary had happened.
|
|
The primary characteristic of a CCTV that allows for easy bypass is its
|
|
outstanding visibility. This fact alone allows an observant thief to watch
|
|
the scanning rate of the camera, and do his "work" during the periods when the
|
|
camera is looking the other way. There are often attempts made to disguise a
|
|
CCTV, but any suspicious box aimed at a sensitive area is automatically
|
|
assumed to be a surveillance camera. Sometimes video cameras or slow-speed
|
|
Super-8mm cameras are hidden in liquor stores and gas stations, and are turned
|
|
on by a hidden switch or foot pedal. These certainly won't deter crime, since
|
|
the amateur criminal doesn't know they're there, nor will they apprehend many
|
|
professional criminals, since a pro would obviously wear a mask or disguise
|
|
during such an operation.
|
|
There are two more techniques for defeating the surveillance camera, and
|
|
their use depends om the manner in which it is monitored. If the camera is
|
|
connected to a video-tape recorder, the lens may simply be covered with a glob
|
|
of modeling clay, or any other moldable opaque substance. If this is done, no
|
|
activity in the monitored area will be captured on film. If the camera is
|
|
being monitored in real time by a guard or policeman, an FM oscillator can be
|
|
used. If this device is brought anywhere near a TV monitor, the picture will
|
|
be reduced to snow and stactic. This device is easy to find and goes for about
|
|
$10 my H.T.H. staff got there's from JohnsonSmith catalog it goes under a
|
|
device to fool your friends and mess-up the TV. Look for it in other electronic
|
|
catalogs or magazines.
|
|
The auto-dialer is equally worthless in preventing professional burglary.
|
|
The auto-dialer is a device that calls a centrsl station or police station on
|
|
the telephone and deliveres a short pre-recordeed message that there is a
|
|
burglary in progress. There may be other numbers listed, such as those of
|
|
friends and neighbors, in case some of the other calls did not get through.
|
|
Modern auto-dialers have a line-seizing mechanism that disallows jamming the
|
|
line, by calling the residence prior to the housebreaking, for example. They
|
|
are usually hidden and housed in a locked box for added protection, but even
|
|
with these safeguards, th evalue of the auto-dialer as a security device,
|
|
is practically nil.
|
|
If the alarm that is connected to the dialer cannot be bypassed, the
|
|
telephone lines cannot be cut, and the lock on the housing cannot be picked,
|
|
I will give you another way to defeat this system. Since auto-dialers are
|
|
silent to the homeowner as well as the burglar, they are party to many false
|
|
alarms. This fact has promoted many cities to ban the use of auto-dialers,
|
|
since so many police man-hours have been wasted responding to them. In cities
|
|
that do allow them the homeowners have been advised to install abort switches
|
|
in the home. At least one abort switch, which shuts the dialer off immediatly
|
|
will be placed near the dialer, in the bedroom, or near the control panel. Of
|
|
course some dialers have a simple on/off switch on them, and they must rely
|
|
on concealement alone to beat the burglar. However in the average home, there
|
|
are not too many places that one can hide something as large as an auto-dialer.
|
|
Perhaps the quickest way to defeat an auto-dialer is to simply erase the
|
|
tape. Since the message is recorded on magnetic tape, an electromagnetic bulk
|
|
eraser will leave the tape completely blank.
|
|
|
|
V. GUERRILLA TACTICS
|
|
|
|
There may be cases when you..oppss I mean when the burglar cannot bypass or
|
|
avoid an alarm system, therefore he may have to resort to guerrilla tactics to
|
|
accomplish his goal. When I say guerrilla, I mean a method of attack that is
|
|
SO unorthodox, no one could possibly expect it. Guerrilla tactics are usually
|
|
aimed at central station employees, or the central station itself, but they
|
|
may be also used against the police department, if the need arises.
|
|
Ideally, the central station would be a veritable fortress. The only
|
|
security system that protects the central station is usually a TV camera at
|
|
the front door, and a simple local alarm.
|
|
The burglar could bug a police station and learn a great deal, such as
|
|
information on potential targets or police schedules. (This also works for
|
|
about anything else.. How do you think the High Tech Hoods gets me the down
|
|
and dirty info for most files!?!?!)
|
|
On the 4th of July one of my staff members lit 6 half sticks
|
|
with extra long fuses (10 min long) in front of store front glasses and
|
|
took off for the real target on the other side of town. When the sticks went
|
|
off he was already at his target. The police used about 3 or 4 cars to make
|
|
sure that those stores would not be looted while the robbery was taken place
|
|
accross town.
|
|
|
|
Vi. MISC.
|
|
|
|
Now that brings us to the end of Burglar Alarm Bypassing hopefully I
|
|
have been able to help you in your quest for knowledge, but if you have any
|
|
questions or if your intrested in joining H.T.H.'s then also leave me mail
|
|
as stated below and if you have written a file that you think is very good
|
|
then let me know!!
|
|
I would like to take this time to welcome PEBBLES to the HIGH TECH HOODS
|
|
(H.T.H.) she is our first and only female thats serious about hacking and
|
|
she can hold her own!! So give her the respect that she deserves! This girl
|
|
can HACK!
|
|
|
|
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
|
|
|
|
|
|
I'm sorry it took me a long time to get this file out but I've been busy
|
|
helping Mr. Hackx with his bbs (THE SOURCE) some place where I can call a
|
|
Totally dedicated H/P/A & UGIW <-Thats whats going to make this bbs so
|
|
fuckin hot! If you don't know what UGIW is then wait until I upload the
|
|
file about it!! Also I've gotten a lot of e-mail for those who want to join
|
|
The High Tech Hoods so thats also taking up time, and for everyone that
|
|
applied I will let you know whats going on and answer back ALL applications!
|
|
The following bbs's is where my files and High Tech Hood files can be
|
|
obtained the same day there finished being written:
|
|
|
|
BLITZKREIG (502) 499-8933
|
|
RIPCO (312) 528-5020
|
|
THE SOURCE (212) ???-????
|
|
|
|
|
|
THE RAVEN
|
|
+=======+
|
|
|
|
ALSO COMMING:
|
|
|
|
THE ULTIMATE PHONE PHREAKING TEXT FILE (CPP1.TXT)
|
|
it should be avaible 2-28-92 and I think I will
|
|
also release part 2 (cpp2.txt) that same day so
|
|
so you don't have to wait to get in to it!!!!!!
|
|
|
|
|
|
|
|
|