2295 lines
98 KiB
Plaintext
2295 lines
98 KiB
Plaintext
ComSec Letter
|
||
|
||
Editor: James A. Ross
|
||
|
||
YOGO 3
|
||
|
||
1987
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
COMSEC LETTER
|
||
|
||
|
||
The ComSec Letter was started in 1984, The Year Of George
|
||
Orwell, by Jim Ross. Initially it was mailed at no charge to
|
||
everyone on his mailing list, and it was later offered by
|
||
subscription. After the founding of the Communication Security
|
||
Association, the letter became its official organ. In 1989 the
|
||
association decided to create a new organ, Comsec Journal; and,
|
||
in order to minimize confusion, the name of this letter was
|
||
changed to Surveillance.
|
||
|
||
What follows is an edited version of the contents of one
|
||
year of the letter. (The letter has been edited to remove
|
||
topical, superfluous, and outdated items.)
|
||
|
||
|
||
|
||
Ross Engineering, Inc.
|
||
7906 Hope Valley Court
|
||
Adamstown, MD 21710
|
||
Tel: 301-831-8400; Fax: 301-874-5100
|
||
|
||
|
||
January, 1987
|
||
|
||
ANNOUNCING!
|
||
|
||
The ComSec Association announces its second annual meeting:
|
||
|
||
SURVEILLANCE EXPO '87
|
||
|
||
to be held at the Sheraton Hotel and Exhibition Center, New
|
||
Carrollton, MD (on the Washington, DC beltway) October 20 - 23,
|
||
1987.
|
||
|
||
Conference and Exhibits: October 20 - 22.
|
||
Membership meeting: October 23.
|
||
|
||
The conference and exhibits will feature the latest in the fields
|
||
of communications and information security, surveillance and
|
||
investigations technology. The ComSec Association will again
|
||
offer seminars and panel discussions featuring people with real,
|
||
current experience in their fields. We're billing it as a "nuts
|
||
and bolts" affair.
|
||
|
||
Although the program is not yet fully defined, we're arranging
|
||
for conference participants to be able to interact with "hands-
|
||
on" experts in areas such as:
|
||
|
||
DES vs. Other Standards
|
||
Defense against Hackers
|
||
Defense against Electronic Eavesdropping
|
||
Modern Methods of Phone Tapping
|
||
NSDD 145
|
||
Electronic Communications Privacy Act
|
||
Biometric Access Control Systems
|
||
Night Vision Equipment
|
||
and more, much more.
|
||
|
||
In order to tailor the conference to the needs of security
|
||
professionals, we're sending out a questionnaire to 25,000
|
||
qualified people, asking them to rate the desirability of many,
|
||
many subjects. Once those results are tabulated, we'll be
|
||
contacting the people who have volunteered. If you are interested
|
||
in making a presentation, send us a short note outlining your
|
||
topic and your qualifications.
|
||
|
||
For more information:
|
||
Shirley Henschel, Conference Coordinator
|
||
Surveillance Expo '87
|
||
9306 Wire Avenue Suite 701
|
||
Silver Spring, MD 20901
|
||
301-588-3929
|
||
|
||
ECPA
|
||
|
||
Electronic Communications Privacy Act. That's the new law that
|
||
decrees that there are some frequencies that we should not tune
|
||
to. If they want to enforce it, they'll have to create "Frequency
|
||
Police". (All calibrated at NBS to prevent accidental arrest due
|
||
to incorrect frequency readout.) Looks like "Thought Police" will
|
||
be the next step.
|
||
But let's be serious about this silly law.
|
||
We're still working on trying to understand all of its
|
||
provisions, and we've had some interesting discussions with Bob
|
||
Horvitz, Bob Jesse, Barbara Rowan and others. It looks like we'll
|
||
have a great panel discussion at our fall meeting!
|
||
Anyway, for this month our comments about this law relate to the
|
||
"jaw-dropper" that we heard in Beverly Byron's (our Congresslady)
|
||
office. As we picked up the material which tells how to amend the
|
||
old law we commented to the staff, "If the new law says what
|
||
we've been told it says, it will be illegal to listen to stereo
|
||
music on the radio, or to MUSAK." The response from the staff
|
||
was, "It doesn't matter what it says now. They always change the
|
||
words after a law passes to make it mean what they meant to make
|
||
it mean in the first place."
|
||
Now isn't that a fine kettle of fish!
|
||
Our elected representatives vote to create a new law, and then
|
||
somebody rewrites it after they vote on it, to change its
|
||
meaning!
|
||
|
||
|
||
PUBLICATION OF INTEREST
|
||
For some time now we've been reading Police and Security News
|
||
with some interest. The reason for this comment at this time is
|
||
that in the January-February issue a new column was introduced.
|
||
Written by Steve Uhrig, it relates to modern electronics as
|
||
applied to police work. The first column is entitled "James Bond
|
||
Electronics -- PRACTICAL for the Small Department".
|
||
Our hats are off to Dave Yaw, Publisher, and Steve Uhrig,
|
||
author. Good, practical, down-to-earth information of this kind
|
||
has been sadly lacking in our opinion -- especially in law
|
||
enforcement publications. As a matter of fact, good technical
|
||
information is really hard to come by in many of the popular
|
||
security and communications magazines. (One of the communications
|
||
magazines recently said that ISDN stood for Integrated Standard
|
||
Data Network; that you should have a "lightning rod to attract
|
||
and safely ground lightning"; and referred to bandwidths of 64
|
||
kilobits and 1.544 megabytes.) (In case you're not a
|
||
communicator, ISDN stands for Integrated Services Digital Network
|
||
[or Innovations Subscribers Don't Need, depending on your point
|
||
of view]; lightning rods create a field to try to prevent
|
||
lightning hits; and bandwidths are measured in Hertz (related to
|
||
bits or bytes per second, but not related to a number of bits or
|
||
bytes.)
|
||
Anyway, back to Steve's first column. Overall it should be of
|
||
value to the people it was aimed at -- law enforcement officers
|
||
in a small department. They don't have experts in electronics,
|
||
night vision, etc in their organizations, so they need all the
|
||
help that they can get. We're looking forward to seeing many more
|
||
columns like this in that publication. For subscription
|
||
information, P&SN, POB 330, Kulpsville, PA 19443.
|
||
|
||
|
||
SURVEILLANCE EXPO '87
|
||
How did we come up with that name? Well, as you may recall, our
|
||
first conference was entitled "ComSec EXPO '85", a good name for
|
||
a meeting of an association of folks who work in the field of
|
||
communication and information security. However, much of the
|
||
technology related to investigations so we called one track
|
||
"Investigations Technology". This year, in preparing for our
|
||
second meeting we went over our notes relating to the earlier
|
||
conference and found that surveillance was the one common thread
|
||
in all of the interesting panel discussions and exhibits. We
|
||
tried every way from Sunday to bring the ComSec name into the
|
||
title, but surveillance always was there.
|
||
So that's how the name, Surveillance Expo 87 came about.
|
||
By the way, potential exhibitors, there is no conflict with the
|
||
IACP meeting which starts in Toronto on the 24th. C'mon in and
|
||
show your wares. We are planning a great show, and expect that
|
||
attendance will be several time what it was during our first
|
||
show.
|
||
|
||
|
||
OTHER COMSEC ASSOCIATION NEWS
|
||
Your directors have decided to take the advice of some
|
||
membership association pros, and to fly in the face of some other
|
||
advice from some other pros.
|
||
The advice that was taken says that it is nonsensical to end
|
||
membership years one year from the date of joining; all
|
||
memberships should expire on the same date. Therefore, we have
|
||
decided that the end of our membership year will be September 30.
|
||
All current members will be asked to make a pro-rata dues
|
||
correction by Paul Bowling in the near future.
|
||
The advice that we did not take told us that life memberships
|
||
normally cost 20 time annual dues. We decided that we'd like to
|
||
offer life memberships to current members for a limited time at
|
||
10 times annual dues, and set Dec 31 1987 as the cutoff date.
|
||
That's right. If you are now a member, or ever have been a
|
||
member, you may become a life member for $500 anytime between now
|
||
and the end of this year. If you have never been a member, your
|
||
cost will be $550 during this year only. After December 31, life
|
||
membership will cost $1,000. (these rates are for USA, Canada,
|
||
and Mexico; other countries: $700 and $770 before December 31;
|
||
$1400 after that date.)
|
||
Also, we've done away with student memberships because of all of
|
||
the problems that they created. We want very much to have young
|
||
folks who are going to school involved and learning about this
|
||
technology, and we tried; but the problems of administering
|
||
student memberships were too much. Maybe one of our members will
|
||
devise a way that we can keep students involved. Let's hope so.
|
||
|
||
|
||
STARTING OUR FOURTH YEAR!
|
||
It's amazing how time flies when you're having fun. It's hard
|
||
for us to believe that this is the fourth year that we've been
|
||
turning out this letter. We've enjoyed it; hope you have too.
|
||
The first issues were typed on an IBM PC by a two-fingered
|
||
typist, and stored on floppy disks before being printed on a dot
|
||
matrix printer. Now they're stored on an almost-full 10 meg hard
|
||
disk before being printed on a laser printer. Some things never
|
||
change, though. They are still typed with two fingers.
|
||
|
||
|
||
NEW CORPORATE MEMBERSHIP PROGRAM
|
||
At a recent board meeting your directors decided to offer
|
||
corporate memberships at rates which relate to the size of the
|
||
corporation. (Actually, the program relates to any business or
|
||
association, whether incorporated or not.)
|
||
Here's the way it goes:
|
||
|
||
Number of employees Annual Dues Number of Members
|
||
|
||
1 to 5 $150 1
|
||
6 to 10 300 2
|
||
over 10 450 3
|
||
|
||
The members will be designated by the corporation, and may be
|
||
changed if an employee leaves or is transferred. The memberships
|
||
carry full membership benefits and full voting rights.
|
||
The corporation will receive a 10% discount on everything
|
||
purchased from the association such as advertising, booth space,
|
||
etc. In addition, the corporate members will be listed in various
|
||
publications as a sponsor of the association.
|
||
|
||
|
||
NEW CONTEST!
|
||
The grand prize is a mention in this letter, and doing the
|
||
research and compiling the results will be arduous; but maybe
|
||
somebody will take the challenge just for the fun of it.
|
||
What we're looking for is a listing of organizations,
|
||
businesses, etc. that routinely tape telephone calls without
|
||
notifying the caller. What comes to mind immediately are
|
||
stockbrokers, emergency services (fire, police, ambulance), hotel
|
||
hot lines (all Marriott hotels have a "guest hot line" for
|
||
problems), some private investigators, etc.
|
||
The next step in this research is, of course, to list the number
|
||
of criminal indictments for illegally recording telephone
|
||
conversations.
|
||
The serious intent of all of this work is to make available to
|
||
all (even lawmakers) real information on the real world.
|
||
All contributions welcomed with open arms. They don't have to be
|
||
fancy, just readable. Y'all come. Heah?
|
||
|
||
|
||
BY-LAWS; ELECTIONS
|
||
The founders of CSA pledged to always keep in mind that the
|
||
first duty of a membership association is to provide service to
|
||
the membership. At our organization meeting on October 23, 1987,
|
||
members will be asked to approve the By-laws created by the
|
||
current directors. Those By-laws specify that directors will be
|
||
elected by the members, and the officers will be chosen by the
|
||
elected directors. During that meeting, we will be electing some
|
||
new directors and installing a new slate of officers. You are
|
||
urged to attend, and to assist in the planning beforehand.
|
||
|
||
|
||
TAP, BACK ISSUES
|
||
Ben Harroll advises that back issues of TAP are available from
|
||
Pete G, PEI, POB 463, Mt. Laurel, NJ 08054 @ $100 for the full
|
||
set, which includes issues 1-83 and some schematics. We'd be glad
|
||
to pass on any comments from satisfied (or dissatisfied)
|
||
customers.
|
||
|
||
|
||
February, 1987
|
||
|
||
COMSEC ASSOCIATION ANNUAL MEETING
|
||
|
||
The second annual meeting of the ComSec Association
|
||
(details: page 2) will be held on October 23, 1987 in conjunction
|
||
with
|
||
|
||
|
||
SURVEILLANCE EXPO '87.
|
||
|
||
to be held at the Sheraton Hotel and Exhibition Center, New
|
||
Carrollton, MD (on the Washington, DC beltway) October 20 - 22.
|
||
|
||
Surveillance Expo '87 will feature three full days of
|
||
meetings, workshops, and seminars with lots of time available to
|
||
visit the exhibits. The conference and the exhibits will cover
|
||
the latest in the fields of:
|
||
|
||
SURVEILLANCE & COUNTERSURVEILLANCE
|
||
|
||
INVESTIGATIONS TECHNOLOGY
|
||
|
||
COMMUNICATIONS AND INFORMATION SECURITY
|
||
|
||
TECHNICAL SURVEILLANCE COUNTERMEASURES
|
||
|
||
RELATED TECHNO-SECURITY FIELDS
|
||
|
||
At SURVEILLANCE EXPO '87 we are dealing with many technical
|
||
subjects which, all too often, have been
|
||
|
||
sensationalized to the point of absurdity,
|
||
misunderstood by the press and public,
|
||
misrepresented by unscrupulous hucksters.
|
||
|
||
We are planning an event which presents detailed and factual
|
||
information which can be understood and appreciated by attendees
|
||
who are not technical experts. SURVEILLANCE EXPO '87 is intended
|
||
to be a "nuts and bolts" conference with heavy emphasis on real,
|
||
practical, down-to-earth information.
|
||
|
||
In order to tailor the conference to the needs of security
|
||
professionals, we're sending a questionnaire to qualified people,
|
||
asking them to rate the desirability of many, many subjects. Once
|
||
those results are tabulated, we'll be contacting potential
|
||
speakers. If you are interested in making a presentation, send us
|
||
a short note outlining your topic and your qualifications.
|
||
|
||
|
||
COMMUNICATIONS SECURITY ASSOCIATION
|
||
|
||
Objective. The objective of the ComSec Association is to enhance
|
||
professionalism in the information and communications security
|
||
field. The principal activity in support of this objective is to
|
||
provide accurate and unbiased information on the technologies
|
||
relating to protection of privacy. This means a heavy emphasis on
|
||
communications and information, but it also includes the field of
|
||
surveillance. The association encourages open and complete
|
||
interchange of information among members.
|
||
History. The ComSec Association was founded in 1984 as a
|
||
non-profit membership association. The first annual meeting took
|
||
place in December of 1985 in Washington, DC. No meeting was held
|
||
in 1986, so the 1987 gathering becomes the second annual meeting
|
||
of the members. There are currently about 300 members.
|
||
|
||
The founders, Arnold Blumenthal, James A. Ross, and Craig
|
||
Silver elected Ross to serve as president until By-Laws are
|
||
adopted, and a new board of directors is elected. Craig Silver
|
||
later agreed to serve as the association's counsel and,
|
||
therefore, had to resign from the board because he could not
|
||
represent an organization of which he was a director. Kenneth R.
|
||
Taylor, President of Target International Corporation in Miami,
|
||
was elected to fill the vacancy. Later, the board size was
|
||
increased to 5, and Paul Bowling of National Investigative
|
||
Services, Inc. and Eugene T. Smith of Teltron, both in the DC
|
||
area, were elected to fill the vacancies. Smith later resigned.
|
||
|
||
|
||
Second Annual Meeting. The second annual meeting of the ComSec
|
||
Association will take place on October 23, 1987 at the Sheraton
|
||
Hotel, New Carrollton, MD following Surveillance Expo '87.
|
||
|
||
All members of the association are urged to attend. The
|
||
organization is involved in fields of technology which are
|
||
changing dramatically and rapidly. As professionals, we must
|
||
continue to study and learn, and the conference and exhibits will
|
||
provide a great learning opportunity. Several of our '85
|
||
exhibitors have reserved space, and we're hoping to have about
|
||
100 exhibitors as compared to 43 last time.
|
||
|
||
|
||
New Director. Recently the Board of Directors met to elect a new
|
||
director to fill the vacant slot, and voted to bring Chuck Doan
|
||
on board. He has agreed to handle the job entitled VP, Finance.
|
||
|
||
Finally, after years of confusion, the money matters of the
|
||
association are going to be organized.
|
||
|
||
If you want to contact him, his address is:
|
||
Charles W. Doan
|
||
Clancy, Doan Intl. Assoc. Inc.
|
||
117 Rowell Ct.
|
||
Falls Church, VA 22046
|
||
703-237-0611
|
||
|
||
Welcome, Chuck!
|
||
|
||
|
||
ECPA, WHAT DOES THE LAW SAY?
|
||
|
||
While visiting a colleague in another state recently, I
|
||
heard him tell a journalist that it was OK to record telephone
|
||
conversations of people talking on your own company's phone
|
||
without their knowledge or consent. Your big smart expert editor
|
||
advised him that it might be all right according to his state
|
||
laws, but that such eavesdropping was a federal felony. He
|
||
countered with, "I checked with the FBI and they told me that
|
||
it's OK."
|
||
|
||
Wow. Maybe I really don't know what the federal law says.
|
||
Better read it again after I get home.
|
||
|
||
You know how it goes. You get back from a trip, and here are
|
||
all these things awaiting your attention, so the law did not get
|
||
read.
|
||
|
||
Then comes an issue of Communications Week with a feature
|
||
article on SMDRs, and in this article there is a flat statement
|
||
that the law's "business extension exemption" lets employers
|
||
eavesdrop on business related calls.
|
||
|
||
Wow again. Grab old law. Must be in 18 USC 2511. Read. Read.
|
||
Read. No mention. Ah Ha! Get smart. Call Barbara Rowan.
|
||
|
||
Dear sweet lady takes time out from writing a memo with an
|
||
impending deadline. "Must be in 2511." she says. "Hmmm." she
|
||
says. "Can't find it. Have to call you back."
|
||
|
||
While Barbara is researching this, let's hear from you. What
|
||
do you think the law says? Or is there some case law in which the
|
||
judge took it upon himself to do the job of the legislative
|
||
branch?
|
||
|
||
Meanwhile, your ol' ed has been trying to unravel the
|
||
puzzle. He talked to the reporter who wrote the story in CW, and
|
||
the reporter referred him to the lawyer who was quoted. After six
|
||
calls to San Jose, Robert D. Baker called me back. Asked if he
|
||
had been correctly quoted in the CW story, he asked, "What's
|
||
Communications Week?" So I read him his various statements, and
|
||
his response was that he had never made those comments; in fact,
|
||
he said that, as a civil rights lawyer, he would have responded
|
||
exactly opposite to the statements attributed to him.
|
||
|
||
So, Jon Swartz and the editors of Communications Week, the
|
||
ball is in your court. Where did you get the idea that there is a
|
||
"business extension exclusion"?
|
||
|
||
|
||
BACK ISSUES OF COMSEC LETTER
|
||
|
||
Soon all of the back issues of ComSec Letter will be
|
||
available on our BBS. At present, we are editing those letters on
|
||
our word processor, and will upload them to the board when
|
||
finished. (No, we're not removing the mistakes; we're editing to
|
||
remove topical items such as meeting announcements, etc.)
|
||
|
||
|
||
AN IDEA TO WAKE UP SOME SELF-SATISFIED BUREAUCRATS
|
||
|
||
Recently, I talked to some government people about the mess
|
||
in Moscow. Among others, I called the staff director of the
|
||
committee which was planning hearings about the bugged embassy in
|
||
Moscow. The reason for the call was to advise that there is a
|
||
professional association that has TSCM experts available to
|
||
testify. He said that they planned to call only government
|
||
witnesses, implying that only people with government security
|
||
clearances could possibly understand advanced bugging systems.
|
||
|
||
Ha! It was government experts (with security clearances but
|
||
no knowledge of resonant cavities) who checked the Great Seal
|
||
that the Soviets gave us, and said that it was OK to hang it in
|
||
the Ambassador's office. As a result, of course, the Soviets were
|
||
able to hear everything that was said in that office for years.
|
||
|
||
In fact, they would still be listening except for the detail
|
||
that a defector told British intelligence about it, and the Brits
|
||
contacted our people saying, "I say, old chap, did you know..."
|
||
|
||
So the State Department is attempting to recruit 200 people
|
||
(in Houston because there's a lot of unemployment there) so they
|
||
can beef up security around the world. Wow! They're going to take
|
||
some people off the street, give them 80 hours of training, and
|
||
ship them out to protect our embassies from espionage. They
|
||
actually plan to use these instant experts to counter the efforts
|
||
of the Soviet professionals. Only in America!
|
||
|
||
So here's the idea to shake up some fat cats who think that
|
||
only government experts know anything about bugging. Let's have a
|
||
brainstorming session during Surveillance Expo '87 to discuss new
|
||
ways of bugging. We'll invite members to present ideas, and get a
|
||
consensus from the group as to the practicality of each. Of
|
||
course, no one with a government security clearance will be
|
||
allowed to submit proposals.
|
||
|
||
Its a free country, so the press will be invited. We'll
|
||
discuss sound conduction through pneumatic tubes, remote
|
||
transmitter location, delayed transmission of recorded audio,
|
||
irradiation of non-linear junctions with microwave energy,
|
||
various spread spectrum modulation schemes, modulation of light,
|
||
transmission of modulated ultrasound through pipes, etc.
|
||
|
||
What do you think? Do you think knowledge of electronics is
|
||
reserved unto government people? Let us hear from you.
|
||
|
||
|
||
March, 1987
|
||
|
||
SURVEILLANCE EXPO
|
||
|
||
Well, a few people did a lot of work, but many of the things
|
||
we thought would come true never did, so the board has decided to
|
||
postpone Surveillance Expo '87.
|
||
|
||
At this time, we cannot even provide a tentative date for
|
||
the rescheduled event. However, here's a personal promise from
|
||
Jim Ross: before he announces another date, he'll be absolutely
|
||
certain that all resources needed to ensure success are in hand
|
||
and not just promises.
|
||
|
||
The single overriding reason for our failure was our almost
|
||
total dependence on volunteers due to lack of funds to hire help.
|
||
Therefore, our plan is to use currently available resources to
|
||
enlarge the membership so that we'll have the wherewithal to be
|
||
able to hire professional help.
|
||
|
||
The first step in this process is to collect dues from
|
||
current members by sending dues-due notices with the ComSec
|
||
Letter. (Seems like a sensible thing to do, but it had never
|
||
been done before.) Next, we plan to increase the dues revenue by
|
||
increasing the number of members through mass mailings. Because
|
||
several firms have agreed to participate in a joint mailing for
|
||
the benefit of the association, and to pay all mailing costs,
|
||
we'll be able to do this for only the cost of creating and
|
||
printing the mail piece. The first mailing is scheduled for
|
||
July, and another will follow shortly thereafter.
|
||
|
||
We're charging participating businesses $2,000 to send a
|
||
mail piece to 25,000 prospects (Security Systems subscribers and
|
||
everyone on the Ross Engineering mailing list). If your company
|
||
could benefit by mailing to such a list, call Jim Ross right
|
||
away. We plan to mail to 50,000 people in the next three months.
|
||
|
||
|
||
MOSCOW EMBASSY FLAP
|
||
|
||
One of our correspondents reported that he had had a
|
||
conversation with an AT&T manager who had just returned from
|
||
Moscow. The AT&T fellow said that they had been unable to pull
|
||
wire through the in-place conduits because the conduits were
|
||
already full of Russian wire.
|
||
|
||
That's the way to do it. Don't be subtle. Run your bugging
|
||
wiring through the same conduits that are used for legitimate
|
||
communication. Oh well.
|
||
|
||
|
||
MEMBERSHIP DUES
|
||
|
||
With the previous issue of this newsletter we sent out small
|
||
notices to all members whose dues were paid to any date other
|
||
than September 30, 1987. (The membership year now runs through
|
||
September for everyone, so that all memberships will expire at
|
||
the same time.) A word of explanation is in order.
|
||
|
||
Because of changing responsibilities among the directors of
|
||
the association, a long period went by with no dues notices being
|
||
sent to anyone and we decided that it would not be fair to dun
|
||
people for back dues when they had never received any notices.
|
||
Therefore we devised a small notice and advised on the amount
|
||
necessary to extend membership through September 1987, or
|
||
September 1988.
|
||
|
||
Our thanks to all who have responded. If your payment was
|
||
received before this issue was mailed, your new membership card
|
||
is enclosed. (A new certificate is in the works; please be
|
||
patient.) We're really gratified that renewals are outnumbering
|
||
cancellations by about twenty to one. Also, we really appreciate
|
||
the confidence demonstrated by all, and we're proud to report
|
||
that more than half are renewing through 1988.
|
||
|
||
If we have not yet received your renewal, you'll find
|
||
another little note in the envelope with this letter. As we have
|
||
pointed out, all records are being maintained by volunteers, and
|
||
we know that we're not perfect. If you don't agree with our
|
||
records, don't stew about it; let us know and we'll correct our
|
||
files.
|
||
|
||
|
||
MOSCOW EMBASSY FLAP, II
|
||
|
||
Lessee now. The Senate wanted to get technical advice on
|
||
what to do about the bugged embassy, so they asked the experts
|
||
who let the Soviets bug it in the first place. Based on that
|
||
expert advice, Senator Boren says we'll have to tear it down, and
|
||
build it over again.
|
||
|
||
As we see it, senator, it looks like this. First your
|
||
experts let the Soviets get away with what you report as
|
||
extensive bugging, and then they throw their hands in the air,
|
||
saying, "The Soviets are too smart for us; we'll have to give up
|
||
and tear the building down."
|
||
|
||
A question for the senator: "What makes you think that those
|
||
same experts will be any smarter or more in control the next time
|
||
we try to build this building?"
|
||
|
||
|
||
ECPA
|
||
|
||
These comments on the Electronic Communications Privacy Act
|
||
are triggered by an editorial by Wayne Green in a recent 73
|
||
magazine. Under the heading "CONGRESS GOOFS", Wayne points out
|
||
that the prohibition against listening to what has been broadcast
|
||
on cellular frequencies has proved to be very helpful to
|
||
organized (and disorganized) crime.
|
||
|
||
To understand, you'll first have to appreciate that not
|
||
everyone lives by the rules, and that the cellular system is a
|
||
great technical achievement, but lacks one essential
|
||
administrative ingredient. The people who designed the system
|
||
must have assumed either that all users would be honest, or that
|
||
no one other than their trusted techies could enter the
|
||
electronic serial number (ESN) into a cellular transceiver.
|
||
Operating under such an assumption, they established a
|
||
verification system that looks only for negatives when deciding
|
||
to accept a call. That is, if you have reported your phone
|
||
stolen or have not paid your bill; you will not be able to make a
|
||
call because your ESN will be listed in the file as NG. That's
|
||
fine if everybody is honest, but that's just not the case and the
|
||
crooks soon found that they could have fictitious ESNs entered
|
||
into their machines, and the system will accept calls from them
|
||
because they are not on the bad guy list.
|
||
|
||
What this all means is that the cellular phone companies
|
||
check a NG list before accepting a call, but they don't have any
|
||
way to check that the ESN is a valid one. So the bad guys have
|
||
phoney IDs entered into their machines, make calls all over the
|
||
world, never have to pay for them; and, because of the ECPA,
|
||
never have to worry that what they say on the air will be used
|
||
against them.
|
||
|
||
Wayne ends his editorial with the following paragraph:
|
||
|
||
"If it weren't against the law to listen to cellular channels,
|
||
I'd suggest that we hams help the law by listening for suspicious
|
||
cellular calls and recording them. Say, how'd you like to get
|
||
the goods on some serious crooks and find (a) the evidence is
|
||
inadmissable because it was illegally obtained and (b) yourself
|
||
on trial for making the recordings. So join me in a big laugh,
|
||
okay?"
|
||
|
||
Well, if you've been reading the ComSec Letter, you know
|
||
your editor's opinion of this law, but I can't go along with
|
||
laughing at it. It's a perversion, and should be done away with.
|
||
Period.
|
||
|
||
|
||
NO MORE ASSOCIATION BULLETIN BOARD
|
||
|
||
Well, we did have a bulletin board for a while, but Paul
|
||
Bowling, who did all the work and bore all of the expense,
|
||
decided that he wasn't going to do it any more.
|
||
|
||
We're sorry. We think that this organization should have a
|
||
computer bulletin board, and we're determined to establish a
|
||
permanent board for the use of members. Stay tuned.
|
||
|
||
|
||
GREAT NEW PRODUCT!
|
||
|
||
Radio Shack has done it again! If you ever have need for a
|
||
DNR (dialed number recorder), get right down to your Radio Shack
|
||
store and check out their CPA-1000. It's a neat little package
|
||
with a neat little price. It will print out all of the numbers
|
||
dialed, length and time of day on all calls. In fact it does
|
||
essentially everything that the 10, 15, and 20 thousand dollar
|
||
units do, and it sells for one hundred dollars! Wow!
|
||
|
||
(Ed. note: I just read over that last paragraph, and I used
|
||
more exclamation points in that paragraph than I used all last
|
||
year. Well, the CPA-1000 is worth every one. Double Wow!!)
|
||
|
||
|
||
NEW PUBLICATION
|
||
|
||
Glenn Whidden of Technical Services Agency, Inc. has
|
||
announced a series of technical articles on electronics,
|
||
eavesdropping, and countermeasures. Everyone working in the
|
||
field of countermeasures should try to learn about electronic
|
||
communications, and these papers certainly will be helpful.
|
||
|
||
Good luck, Glenn. I know it's wishful thinking, but I hope
|
||
some of the "professionals" in this field will begin to get an
|
||
education. Unfortunately I'm afraid that their egos are such
|
||
that they know they don't even have to learn the meaning of words
|
||
they use like frequency, impedance, resonance, etc. Their eyes
|
||
glaze over if you mention Maxwell's Equations or Bessell
|
||
Functions, and if you use a common phrase like L di/dt, they
|
||
think you're speaking a foreign language. (To them, of course,
|
||
calculus is a foreign language.)
|
||
|
||
Well, maybe some of the companies that have started in-house
|
||
TSCM programs will subscribe for their technicians. I hope so.
|
||
Education protects us, and every step toward better education is
|
||
a good step. C'mon, all you corporate security managers. Order
|
||
this course for your TSCM people. Contact Glenn Whidden on 301-
|
||
292-6430, at TSA, 10903 Indian Head Hwy #304, Fort Washington, MD
|
||
20744. It's $130 for twelve issues, and well worth it.
|
||
|
||
The August issue of Radio-Electronics magazine lists six
|
||
different national non-profit associations which examine and
|
||
certify electronic technicians. We'll be pleased to list
|
||
everyone in the profession who achieves certification. Send a
|
||
copy of your FCC license or technician certificate to the editor.
|
||
|
||
|
||
|
||
|
||
|
||
April, 1987
|
||
|
||
GREAT IDEA!
|
||
|
||
This idea came from one of the participants in a recent
|
||
seminar, and relates to my comments that infinity bugs are not
|
||
much of a modern threat because they require a cooperating
|
||
telephone if the target is on an ESS exchange (and almost
|
||
everybody in this country is on an ESS exchange).
|
||
|
||
(The reason that they are not much threat is that they
|
||
answer the phone before it rings. So, if you installed one on
|
||
someone else's phone as a bug, it probably would not last long
|
||
because he'd wonder why his phone never rings and have it
|
||
checked.)
|
||
|
||
The great idea that was put forth in the seminar is that an
|
||
infinity bug sure would work fine if installed in a conference
|
||
room telephone.
|
||
|
||
Think about it. If there is direct dial to the conference
|
||
room (no operator on a PBX listening for the ring signal on the
|
||
conference room extension), this could be a major threat. Unless
|
||
there is accidental discovery, there is a good chance that no one
|
||
would be at all suspicious of the lack of a ring on the phone.
|
||
Another good reason to get rid of phones in conference rooms.
|
||
|
||
|
||
MEMBERSHIP DUES
|
||
|
||
With each of the last two letters we have included a note to
|
||
each member who had not sent in dues to renew his membership
|
||
according to our records. The response has been very
|
||
encouraging, but there are still many people receiving this
|
||
letter who have not renewed their memberships.
|
||
|
||
We cannot afford to continue to send the letter if we do not
|
||
have support in the form of dues payment. Therefore, be advised
|
||
that this may be your last letter if we have not received your
|
||
payment before the next issue is mailed. It will be your last
|
||
issue unless you advise us of an error in our record keeping, or
|
||
we find that we have made an error.
|
||
|
||
Speaking of errors, we certainly don't claim to be perfect.
|
||
First we had the list on the Ross computer; then we went to an
|
||
outside vendor which had three owners in rapid succession, then
|
||
we went to a volunteer who didn't have time enough, and now it's
|
||
back on the Ross computer. Yes, there have been some errors, but
|
||
we think we've just about got it all straight finally.
|
||
|
||
|
||
WHO MONITORS OR RECORDS ILLEGALLY?
|
||
|
||
THE PREMISE
|
||
|
||
In a recent COMSEC LETTER we asked our readers to send us
|
||
examples of how the federal law requiring at least one party
|
||
consent to monitor or record conversations is regularly violated
|
||
with no legal action taken against the violators. After all, it
|
||
is a federal felony, and we would logically expect enforcement by
|
||
constituted law enforcement agencies, no?
|
||
|
||
|
||
|
||
POLICE
|
||
|
||
Well, it may just be that law enforcement agencies are the
|
||
biggest violators. Here in Maryland (where state law requires
|
||
all party consent to record phone conversations) some Montgomery
|
||
County police officers have brought suit for $865,000 against
|
||
their department alleging that their calls were recorded without
|
||
their consent. It seems that the Montgomery County Police
|
||
department routinely records all calls to the department, not
|
||
just those calls to the 911 emergency number.
|
||
|
||
Come to think of it, is there an exception in the law which
|
||
allows recording of calls to emergency police numbers? I just
|
||
read through 18 USC 2511 again, and I can't find any exemption
|
||
allowing such recording. Are police departments regularly
|
||
committing felonies while they're trying to do their jobs right?
|
||
|
||
What do your state's laws say?
|
||
|
||
SCHOOLS
|
||
|
||
Most schools have intercom systems which allow selective
|
||
messaging to all rooms, to some selected groups of rooms, or to
|
||
single rooms. In addition to allowing messages to be sent to the
|
||
rooms, the systems also allow listening to activities within the
|
||
rooms. My consultants advise that the system used in the schools
|
||
where they worked had no light or other signal in the room to
|
||
alert occupants that they were being monitored.
|
||
|
||
It looks like this is another case where people who are
|
||
trying to do their jobs right are violating the law without even
|
||
being aware that such a law exists.
|
||
|
||
The California Supreme Court has ruled that such monitoring
|
||
is a violation of the students' right to privacy.
|
||
|
||
COMMERCE
|
||
|
||
In the July issue of Security magazine an item described the
|
||
use of monitors in McCormick Place, a Chicago convention and
|
||
exhibition center with "tubed walkways" and large parking areas
|
||
where providing personal protection is difficult. According to
|
||
the article the security department uses Aiphone intercoms to
|
||
listen for trouble.
|
||
|
||
Again, we have people trying to do their jobs right, and
|
||
apparently violating the law in the process.
|
||
|
||
|
||
THREAT ASSESSMENT, TELEPHONE TAPS
|
||
|
||
GENERAL
|
||
|
||
In estimating the threat to privacy posed by telephone taps,
|
||
several factors must be considered. First and foremost, we must
|
||
evaluate what it is that any tapper hopes to accomplish. What is
|
||
it that we have that is of value to someone else? Second we must
|
||
determine his strength. What resources can he commit to
|
||
accomplishing his aims? Those resources can be summed up as
|
||
technical competence, time, access, and money.
|
||
|
||
MAJOR THREATS
|
||
|
||
Strange as it may seem, one of the most dangerous threats
|
||
might be from a small competing business, run by an electronic
|
||
hobbyist, which occupies space in the same building.
|
||
|
||
The rationale for that statement goes as follows. A
|
||
technically competent small business owner can do the work
|
||
himself without involving any one else. He has no time pressure
|
||
and he has access. He doesn't need much money because he doesn't
|
||
need to hire anyone and the equipment involved in tapping is
|
||
ridiculously inexpensive (less than $100). He could easily
|
||
install automatic recording equipment and scan the recordings for
|
||
the information that he wants.
|
||
|
||
On the other hand, supposing the threat is from law
|
||
enforcement. Contrary to the impression created by TV shows, law
|
||
enforcement agencies are not all-wise and all-knowing. Some
|
||
departments have no one capable of tapping phone lines, and
|
||
getting the necessary court order can be difficult. However,
|
||
let's consider a qualified law enforcement organization.
|
||
|
||
If the activity is to collect evidence to be used in a
|
||
trial, they must be very careful to be certain that the evidence
|
||
will be admissable. We believe that a good defense attorney will
|
||
attack any incomplete tap-generated evidence, and that means that
|
||
all lines must be monitored. Further, officers must be assigned
|
||
to the listening post and other officers must be assigned to keep
|
||
the suspect under surveillance so that they can provide
|
||
corroborating testimony. In addition to monitoring all lines and
|
||
transcribing all tapes, a continuous chain of custody must be
|
||
maintained over the tapes and sometimes experts must be used to
|
||
verify that the tapes have not been altered, etc.
|
||
|
||
(Recently one of our seminar participants advised that his
|
||
state requires that there must be continuous human monitoring of
|
||
all lines so that only the conversations of the suspect are
|
||
recorded, creating even more manpower requirements.)
|
||
|
||
SUMMARY
|
||
|
||
Law enforcement has a major job on its hands when it sets
|
||
out to gather evidence via wiretaps. On the other hand, the
|
||
competitor operating without rules can do the job very simply.
|
||
He is not looking for evidence, only information.
|
||
|
||
|
||
SOME GLOSSARY TERMS
|
||
|
||
ACM. Audio countermeasures. Another name for TSCM.
|
||
|
||
BRIDGE. In telephone parlance this can be a noun or verb
|
||
and refers to making a parallel connection to a pair of telephone
|
||
wires. In contrast, in electronics a bridge is a four-terminal
|
||
device with several applications depending upon configuration.
|
||
|
||
DIALED NUMBER RECORDER (DNR). Device which records all
|
||
activity on the telephone line to which connected. Time off-
|
||
hook, time on-hook for all calls; numbers dialed for all outgoing
|
||
calls. In the days of pulse dialing a device called a pen
|
||
register did the job of recording numbers dialed.
|
||
|
||
ESS. Electronic Switching System. The newest of the
|
||
switching systems in use by the telephone companies in the USA.
|
||
You are served by an ESS exchange if you have access to the
|
||
special features of call waiting, call forwarding, and three-way
|
||
calling.
|
||
|
||
HARMONICS. Frequencies that are integral multiples of the
|
||
fundamental frequency.
|
||
|
||
HERTZ (Hz). Unit for measuring frequency equal to one
|
||
cycle per second. KiloHertz (KHz) = 1,000 Hz; MegaHertz (MHz) =
|
||
1,000,000 Hz; GigaHertz (GHz) = 1,000,000,000 Hz.
|
||
|
||
TEMPEST. Refers to classified government effort to protect
|
||
against compromising emanations from electronic equipment. (It
|
||
may be a coined word, and it may be a semi-acronym from transient
|
||
electro-magnetic pulse emanation standard.)
|
||
|
||
TITLE III. Refers to equipment for surreptitious
|
||
interception of communications. For most people, possession,
|
||
advertising, sale, and use of Title III equipment is a felony.
|
||
|
||
TSCM. Technical Surveillance Countermeasures. Commonly
|
||
called debugging, sweeps, or electronic sweeping. However, these
|
||
terms do not adequately describe the full range of TSCM
|
||
activities, and seem to be more descriptive of "magic wand"
|
||
operations and not of professional work. Let's stick with TSCM.
|
||
|
||
|
||
May, 1987
|
||
|
||
SOME COMMENTS FROM YOUR EDITOR
|
||
|
||
We're now in our fourth year of composing this letter, and
|
||
it seems to be a good time to plan some changes based on that
|
||
experience. So here we go.
|
||
|
||
1. Many of the people who have written to us have received
|
||
no thanks either directly or in print; so we're resolving to
|
||
rectify that by starting the process of acknowledging all of the
|
||
folks who have sent clippings, comments, suggestions and
|
||
questions. Therefore, beginning with this issue, we're going to
|
||
include either Feedback or Questions and Answers or both as
|
||
regular features in this letter.
|
||
|
||
2. We've been neglectful of late in steering you toward (or
|
||
away from) publications that we have read so we're resolving to
|
||
pass along opinions on such things on a regular basis; and in
|
||
this issue you'll find a review of two items recently read.
|
||
|
||
3. It has long been our desire to include a short technical
|
||
essay with each issue of the letter. At this time we're not
|
||
ready to commit to a new essay with each issue, but at least
|
||
we're ready to start. Beginning with the next issue you will
|
||
receive two pages each month from the glossary which has been
|
||
created by your editor for his seminar, Defense against
|
||
Electronic Eavesdropping.
|
||
|
||
4. Each summer has been a catastrophe as far as schedules
|
||
go, so we're going to face facts: getting the letter out each
|
||
month in the summer is not possible so we're going to go with ten
|
||
issues per year. (To answer Ben Harroll and others who have
|
||
asked: No, we did not publish in July and August last year [YOGO
|
||
2.07 and 2.08].)
|
||
|
||
5. Teleconnect and The Councillor (the organ of the Council
|
||
of International Investigators) have several times republished
|
||
some of the thoughts in this letter, and we're pleased. We
|
||
invite all editors to republish anything with appropriate credit.
|
||
|
||
6. Last, but not least, we're looking for practical ways to
|
||
improve this letter and get more information out each month. New
|
||
hardware and software will help us to dress it up, but we'll need
|
||
additional income to expand to 8, 12, or 16 pages. We've given
|
||
serious thought to selling advertising in the letter or mailing
|
||
advertisers messages in the same envelope. What do you think
|
||
about receiving advertising messages in/with the ComSec Letter?
|
||
|
||
|
||
FEEDBACK
|
||
|
||
(The following comments are based on the material that
|
||
happens to be on the top of the stack. There were no criteria
|
||
for determining what to include at this time; we merely grabbed
|
||
the items closest at hand. Next month we'll add some more.)
|
||
|
||
We get clippings and calls on a regular basis from the folks
|
||
at Sherwood Communications Associates. They have a lot of
|
||
contacts with a lot of people in this field, and really do a
|
||
great job of keeping us informed.
|
||
|
||
From California, Norman Perle sends us copies of his press
|
||
clippings, and Roger Tolces sends an occasional note to advise
|
||
that your editor doesn't know what he's talking about. (By the
|
||
way, Roger has submitted a report on a bugging system that he
|
||
found and we'll get around to running it as soon as we can find
|
||
time to edit it.)
|
||
|
||
Don Schimmel gets the credit for calling our attention to
|
||
the two-faced operation of our Congress with regard to the
|
||
airwaves. (See the segment entitled "Who does own the airwaves?")
|
||
|
||
Nice note from Jerold Hutchinson with his membership
|
||
renewal. He says he enjoys reading the newsletter and "keep up
|
||
the good work." Thanks Jerold. Encouraging words help.
|
||
|
||
|
||
QUESTION AND ANSWER
|
||
|
||
Q. Our old friend, Ted Genese, sent along a flier from
|
||
Winkleman in England, and asked what they meant by "line
|
||
interceptor [which] enables an adversary to monitor more than one
|
||
communications line from a single listening post."
|
||
|
||
A. Well, Ted, we featured some of the US Winkleman claims
|
||
in a letter about two years ago. As I recall they claimed
|
||
"Complete Protection against Wiretaps", but never demonstrated
|
||
that they could provide such protection. (The reason that they
|
||
couldn't, of course, is simply because nobody yet has any
|
||
equipment which will detect a simple tap properly installed.)
|
||
|
||
Our mail to their last US address comes back "Moved. No
|
||
forwarding order", so we presume that they have closed their
|
||
offices on this side of the pond.
|
||
|
||
To answer your specific question, Ted, I don't know what
|
||
they mean by a line interceptor. Sounds mighty mysterious, but
|
||
it doesn't sound like anything I have ever studied about in
|
||
communications electronics. However, the idea of monitoring
|
||
several lines from one location is nothing spectacular; answering
|
||
services do it all of the time. Nothing spooky about it at all.
|
||
|
||
I hope our public servants who tap lines save a few tax
|
||
dollars by consolidating a lot of taps in one listening post.
|
||
Paying a few extra dollars out to the phone company for lines to
|
||
one LP is a lot cheaper than setting up and manning many
|
||
different LPs.
|
||
|
||
|
||
WHO DOES OWN THE AIRWAVES?
|
||
|
||
If you've been reading this letter, you might have received
|
||
the impression that your editor is not a fan of the ECPA of 1986
|
||
(Electronic Communications Privacy Act). You'll recall that he
|
||
thinks it is stupid to pass an unenforceable law, especially one
|
||
that makes it a crime to listen to what has been broadcast.
|
||
|
||
Yes, that's right. Our legislators passed a law that makes
|
||
listening to the content of broadcasts on some frequencies OK; on
|
||
some others, a misdemeanor on others, a felony. (Soon we will
|
||
have to have a frequency meter, with calibration traceable to
|
||
NBS, with us at all times while we tune our radios.)
|
||
|
||
In any event, Congress passed this silly law in November of
|
||
1986, and it became effective in January, 1987.
|
||
|
||
In the summer of '87 the FCC abolished the "fairness
|
||
doctrine" which had forced commercial broadcasters to provide
|
||
equal time, and thereby really angered the Congress. In the
|
||
words of Ernest F. Hollings, Chairman of the Senate Committee on
|
||
Commerce, Science and Transportation, "The American people, not
|
||
the broadcasters, own the airwaves!"
|
||
|
||
Well, yeah, OK, Senator. If we own the airwaves, why did
|
||
you vote to make it a crime to listen to what has been
|
||
transmitted over those airwaves into our homes?
|
||
|
||
|
||
SMART, SMART, SMART
|
||
|
||
We've been noticing a trend in big businesses lately which
|
||
strikes us as really smart. More and more of our subscribers who
|
||
work for big companies are having our publication mailed to their
|
||
home adresses.
|
||
|
||
Why is that smart? Think about it. Big company. Big mail
|
||
room. Big payroll to pay the people who try to sort and deliver
|
||
the mail each day. Why not let Uncle Sam do the sorting and
|
||
delivery for you. Doesn't cost the company a thing. Smart.
|
||
|
||
|
||
PUBLICATIONS REVIEWS
|
||
|
||
Recently I ordered a booklet entitled "Study Notes on Secure
|
||
Communications" and one called "Crossroad" from Spear and Shield
|
||
Publications.
|
||
|
||
Wow. What a surprise. The introduction to the secure
|
||
communications booklet was written by Atiba Shanna -- New
|
||
Afrikan Communist of the New Afrikan People's Organization, and
|
||
it contains a lot of stuff but nothing about comsec. The other
|
||
booklet contains several essays, but the title of one should give
|
||
you an idea as to its thrust, "ON GORBACHEV, MICKEY LELAND AND
|
||
SELF-DETERMINATION FOR AFRIKANS IN AMERIKKKA."
|
||
|
||
Available for $2.00 from S&SP,1340 W. Irving Park #108,
|
||
Chicago, IL 60613.
|
||
|
||
Our recommendation: Don't bother.
|
||
|
||
The other publication, however, we really appreciated, and
|
||
we thank Howard Karten for calling and recommending "The Second
|
||
Oldest Profession" by Phillip Knightley.
|
||
|
||
From your editor's point of view this book had two strikes
|
||
against it at the outset: it was written by an Englishman using
|
||
English English, and the many, many references are distracting.
|
||
Despite those drawbacks, though, I found it to be a very
|
||
enlightening book, well worth the price.
|
||
|
||
Before proceeding with the good stuff, however, a caution to
|
||
those who think Ollie is a hero and the CIA should be in the drug
|
||
trade: you won't like this book.
|
||
|
||
That said, let us quote from the book to explain the essence
|
||
of the reason for immortality of secret organizations: "Once
|
||
invented, the intelligence agency turned out to be a bureaucrat's
|
||
dream." "...rebut critics with the simple and unanswerable
|
||
expedient of saying, 'You are wrong because you really don't know
|
||
what happened and we can never tell you because it's secret.'"
|
||
|
||
Throughout the book the author provides details of erroneous
|
||
intelligence that was acted upon, and good intelligence that was
|
||
ignored. For instance: "Ultra showed that Allied strategic
|
||
bombing of Germany had failed to crack German morale, and had not
|
||
made a dent in German aircraft production. ..... All this was
|
||
passed on to proper authorities, yet the raids went on: the truth
|
||
of Ultra did not suit the champions of heavy bombing."
|
||
|
||
Very detailed. References galore. Old spooks will hate it.
|
||
Hardcover. 436 pages. $19.95 from W.W. Norton & Company.
|
||
|
||
|
||
CALL FOR VOLUNTEERS
|
||
|
||
This association is just beginning to take shape and some
|
||
volunteers are badly needed. Some people who are capable of
|
||
working with almost no supervision can have a big impact on our
|
||
growth and success. No, there will be no immediate reward other
|
||
than recognition in our meetings and publications; but the long-
|
||
term rewards could be substantial.
|
||
What say? Want to take one of the committee chairmanships?
|
||
We need help with our next expo, our next membership meeting,
|
||
membership programs and benefits, local chapter genesis, budget
|
||
and audit, and more. Call me. Let's talk about it.
|
||
|
||
|
||
June/July, 1987
|
||
|
||
SURVEILLANCE EXPO '87
|
||
|
||
In case you missed the announcement in an earlier letter,
|
||
we'll repeat: Surveillance Expo '87 has been postponed. It was
|
||
well into the planning stages when it became apparent that we did
|
||
not have the manpower or financial strength to do it right.
|
||
|
||
However, there has been a lot of interest, and we'll be
|
||
announcing new dates soon. Stand by.
|
||
|
||
By the way, this is a program that needs volunteers to work.
|
||
Interested?
|
||
|
||
|
||
MORE ON ILLEGAL(?) EAVESDROPPING
|
||
|
||
It's not that we're opposed to any of these activities that
|
||
we have been reporting on. Certainly the apparently illegal
|
||
eavesdropping activities reported last month are all undertaken
|
||
by people who are trying to do their jobs right. The point of
|
||
presenting this information is to emphasize that the law is not
|
||
enforced and, in many cases, enforcement would be a travesty.
|
||
|
||
Consider the case of the need to properly control prisoners.
|
||
Audio surveillance is routinely used in jails and prisons as a
|
||
means to get more coverage out of the staff. We'll not get into
|
||
the argument as to whether prisoners have any right to privacy;
|
||
that's another issue. The point is that the law does not mention
|
||
an exception for lock ups, and it probably should.
|
||
|
||
The law does make advertising or using equipment "primarily
|
||
useful for surreptitious interception of oral or wire
|
||
communication" a federal felony. So along comes a company called
|
||
Louroe of Van Nuys, California with their "bare bones" Kit #ASK-4
|
||
which consists of a microphone, power supply and amplifier. The
|
||
heading on their sale flier says "When you have a lot to protect
|
||
Louroe Electronics protects a lot." At $270 retail their
|
||
surveillance kit is recommended for convenience stores, delivery
|
||
entrances, hospital therapy rooms, jail interrogation rooms,
|
||
cashier and counting rooms, and all other secured zones.
|
||
|
||
Is this company in violation of the law? Are they
|
||
advertising something which is primarily useful ... etc.? If you
|
||
use their equipment to eavesdrop on other persons without their
|
||
knowledge or consent, are you breaking the law?
|
||
|
||
What do you think?
|
||
|
||
|
||
|
||
|
||
QUESTIONS AND ANSWERS
|
||
|
||
Q. Ben Harroll asks if I have heard of an "FBI phone and
|
||
room unit that saves up a day of conversations ... on a chip in
|
||
digital form. Then dumps the whole memory in something like 30
|
||
seconds when they drive by and trigger a burst transmission which
|
||
they then record and take back for further analysis (perhaps key
|
||
words, phrases, etc.)".
|
||
|
||
Ben also asks about a "wall unit that served to link the
|
||
agents remotely with all the phones (perhaps room audio as well)
|
||
in an entire building. The agent could access any phone from his
|
||
base by contacting the unit built into the wall".
|
||
|
||
A. Let's consider his multi-faceted queries.
|
||
|
||
First let's consider the equipment available for digital
|
||
storage of speech. Digital storage offers many advantages, but
|
||
the equipment which is currently available is severely limited in
|
||
capacity. For instance, I'm looking at the specs for a unit
|
||
which is about 4 by 10 by 17 inches in size and consumes 20 watts
|
||
of power from the mains. This unit would not be easy to conceal,
|
||
and has the capacity of storing only 30 seconds of speech.
|
||
|
||
Now I'm not going to say that a day's worth of conversations
|
||
cannot be stored digitally; but, unless the FBI has come up with
|
||
capabilities far beyond what is available commercially, it does
|
||
not look practical.
|
||
|
||
"Phone and room unit" implies that you would be storing
|
||
tapped phone conversations as well as room audio, and I cannot
|
||
understand why you would want to do that. The phone
|
||
conversations can easily be stored at a remote listening post
|
||
without any concern for concealing the equipment. It just doesn't
|
||
make sense to try to do it in the target area.
|
||
|
||
The other consideration is "driving by" and "triggering a
|
||
burst transmission". (Sounds like Hollywood!) I know that it
|
||
can be done, but I ask why build a radio receiver and transmitter
|
||
into the recording mechanism? Such things are easy to detect,
|
||
and are frequently detected by accident. The power level of the
|
||
transmitter would be high enough to light up even a pen-set
|
||
transmitter detector and the receiver LO would be detected by a
|
||
good TSCM operation.
|
||
|
||
And burst transmission? I know how and why and where burst
|
||
transmission is used in at least one application, but I sure
|
||
don't know why you'd try to use it in this situation. Maybe
|
||
there is a reader to this letter who can shed some light on the
|
||
use of burst transmission in such a circumstance.
|
||
|
||
As for Ben's second question, the answer is exactly opposite
|
||
to the answer to the first. The equipment needed to switch from
|
||
monitoring one line or room to monitoring another is commonly
|
||
available and not the least complicated. Building it into a wall
|
||
is the most complicated part of the whole process, in my opinion.
|
||
(However, it might just be that your informant was referring to
|
||
remotely accessed DNRs and this technique is also very simple.)
|
||
|
||
|
||
|
||
|
||
DUMB, DUMB, DUMB
|
||
|
||
Recently, in the course of providing TSCM service to a
|
||
client here in the DC area, we discovered that the carbon
|
||
microphone in the conference room was wired to spare conductors
|
||
and we spent the better part of a day tracking the wiring back to
|
||
the listening post. Immediately after completing this job we
|
||
left for a job in Ohio and another in Chicago, so we were out of
|
||
touch pretty much while driving.
|
||
|
||
One message picked up when calling the office from Illinois
|
||
was from a private investigator in New York instructing me to
|
||
call a lawyer in Washington, DC. (Neither the PI nor the lawyer
|
||
were known to me.) When I got through to the lawyer, he began to
|
||
ask me questions about my activities for my client the previous
|
||
weekend, and the conversation went like this:
|
||
|
||
"I need information on your activities for the XYZ
|
||
Corporation last weekend."
|
||
|
||
"Sir. Please don't take offense, but you are just a voice on
|
||
the telephone to me. I will not even confirm or deny that I even
|
||
know XYZ Corporation to you."
|
||
|
||
His response was to advise me of his college, his degrees,
|
||
his status with his firm, and the statement that he represents my
|
||
client. Again, I advised him that he was still just a voice on
|
||
the phone; and, before I would talk to him I needed approval from
|
||
someone I know in the client company.
|
||
|
||
"Well. Supposing I have John Jones or Pete Smith call you.
|
||
Would that be all right?"
|
||
|
||
"Sir. I just finished telling you that I will not confirm
|
||
or deny that I even know that company. I'm certainly not going
|
||
to confirm that I know some people by name in that company. If
|
||
you want to discuss any client with me, first have someone that I
|
||
know in that company call me, and tell me it's OK."
|
||
|
||
The upshot of the whole affair is that the GM of my client
|
||
company did call, and I did discuss the facts with the lawyer.
|
||
|
||
However, I'm left with a very bad taste in my mouth for two
|
||
reasons. First, my client is represented in a case involving
|
||
industrial espionage by a lawyer who doesn't have the foggiest
|
||
idea about industrial espionage -- is not even aware that one of
|
||
the easiest ways to collect information is to pretend to be
|
||
someone else and call and ask for it. The client has been the
|
||
victim of a very well executed bugging system, but he has placed
|
||
his trust in a man who can't understand why I don't provide
|
||
chapter and verse to an unknown voice on the phone. Secondly,
|
||
the lawyer, who doesn't know anything about electronics, refused
|
||
to allow me to give him the information that I knew he needed.
|
||
Instead, he insisted in reading me a list of questions which
|
||
apparently had been prepared for him by someone else who doesn't
|
||
understand electronics either. Consequently, whatever report
|
||
that lawyer generated won't make sense and will be of negative
|
||
value.
|
||
|
||
|
||
|
||
DO THEY UNDERSTAND TELEPHONES, OR WHAT?
|
||
|
||
Teleconnect calls this AT&T's marketing coup of the month.
|
||
We're inclined to upgrade it to "of the year" or "of the decade".
|
||
|
||
In a catalog received recently from AT&T is an item called
|
||
"Power Failure Rotary Telephone". It seems that AT&T is offering
|
||
a black rotary (pulse) dial telephone for $54 so you'll be able
|
||
to dial out in the event of a power failure!
|
||
|
||
(In case you're not a telephone techie of any degree, be
|
||
advised that the touch tone phones don't need power from the
|
||
mains to operate; they get their power from the exchange. By the
|
||
way, AT&T Marketing Department, if there's no power from the
|
||
exchange, the pulse phone won't work either.)
|
||
|
||
To all of our friends in AT&T who really do know how phones
|
||
work: We're really embarrassed for you.
|
||
|
||
Maybe we should start a case to undivest!
|
||
|
||
|
||
CONTRIBUTIONS
|
||
|
||
The ComSec Association is organized as a non-profit
|
||
educational association, 501 (c)(3). Gifts (not dues) can be
|
||
deducted on your income tax return (read the rules). We are also
|
||
under the impression that donations in kind (material things) can
|
||
be deducted at full value (again, read the rules, or discuss with
|
||
your accountant).
|
||
|
||
Anyway, we need all the help we can get. If you feel like
|
||
sending in a big cash donation, we sure won't refuse it. On the
|
||
other hand, we badly need to upgrade our computer and printing
|
||
capability, so we'd certainly accept anything along that line.
|
||
Do you have anything that could be helpful?
|
||
|
||
|
||
SPECIAL NOTE
|
||
|
||
As promised, we're starting to include an extra page of
|
||
technical information with your copy of the ComSec Letter. We
|
||
can't promise to have it in with every issue, but we're starting
|
||
with our TSCM Glossary, and you'll get one sheet with each
|
||
letter.
|
||
|
||
|
||
|
||
|
||
|
||
Aug/Sept, 1987
|
||
|
||
OUR MOSCOW EMBASSY, AND DID THE SOVIETS BAMBOOZLE US?
|
||
|
||
Well, our elected representatives who visited our new
|
||
embassy under construction in Moscow say that it is so thoroughly
|
||
bugged that we'll never be able to use it. They said a lot of
|
||
things that don't make any sense technically (such as it is just
|
||
one big antenna), but they never did explain what the threat is.
|
||
|
||
So here's a guess from the outside.
|
||
|
||
I'll bet that the Soviets are aware that our government
|
||
countermeasures people use non-linear junction detectors (NLJDs)
|
||
in TSCM so they dumped thousands of old diodes and transistors
|
||
into the concrete to create lots of responses for the NLJDs. We
|
||
probably detected non-linear junctions every few inches on every
|
||
beam and column and any place that there's poured concrete, and
|
||
every one of those "hits" was reported as a bug.
|
||
|
||
In case you're not familiar with electronic communications
|
||
theory, modern equipment, and government TSCM techniques, let us
|
||
review briefly.
|
||
|
||
Modern electronic equipment contains active components that
|
||
are solid state; some are discrete components, such as bipolar
|
||
junction transistors and field effect transistors, and some are
|
||
monolithic integrated circuits. Such solid state devices, by
|
||
nature, contain non-linear junctions and one characteristic of
|
||
non-linear junctions is that they generate harmonics of whatever
|
||
radio frequency energy excites them. Our government experts knew
|
||
this so they contracted for the design of a non-linear junction
|
||
detector for use in TSCM. In use, its operators found that
|
||
naturally occurring non-linear junctions also emit harmonics of
|
||
the exciting frequency. (Naturally occurring NLJs occur any
|
||
place that there is metal-to-metal contact with something like
|
||
oil or rust in between.) Now, theory says that the naturally
|
||
occurring junctions favor the third harmonic and the solid state
|
||
electronic components favor the second (or maybe it's the other
|
||
way around; I don't remember). In any event, the operator is
|
||
supposed to be able to differentiate between an electronic
|
||
component and a naturally occurring NLJ. However, many people
|
||
with a lot of field experience have told me the false alarms
|
||
drive them batty -- and many have told me that they no longer use
|
||
this instrument.
|
||
|
||
Now, I'm sure that Ivan installed many bugs in the embassy;
|
||
but I'm also very confident that he installed a lot of junk to
|
||
create false alarms for our people. What do you think?
|
||
|
||
|
||
ECPA
|
||
|
||
FOREWORD In November, 1986 the Congress of the United States of
|
||
America, with almost no discussion or debate, passed the law
|
||
known as the Electronic Communication Privacy Act (ECPA) of 1986.
|
||
Shortly thereafter it was signed by President Reagan, and it
|
||
became effective in January of 1987.
|
||
|
||
WHO BENEFITS? This law is an example of what can be accomplished
|
||
for the benefit of some narrow special interests through the use
|
||
of lobbyists. Although our legislators made many pronouncements
|
||
for public consumption that they were acting to protect us, what
|
||
they actually did was to create a law that is of primary benefit
|
||
to cellular telephone sellers who wish to deceive the public.
|
||
|
||
Yes, that's right. The net effect of the new law is to
|
||
allow sellers of cellular telephones and service to say, "No one
|
||
can listen to your calls; it's against the law." This, of
|
||
course, ignores the practical fact that the radio transmissions
|
||
from cellular phone transmitters intrude into our homes and
|
||
businesses without being invited.
|
||
|
||
Will these transmissions be listened to? Of course they
|
||
will. They'll be listened to with impunity because the law
|
||
cannot be enforced; and, further, the Justice Department has
|
||
announced that it will make no effort to try to enforce it.
|
||
There are those of us in various businesses and professions whose
|
||
work requires that we listen to everything that's on the air, and
|
||
we're certainly glad that they are not going to try to enforce
|
||
the law.
|
||
|
||
HISTORY The old law, The Omnibus Crime Control and Safe Streets
|
||
Act of 1968, Title III, was commonly misunderstood --- partly
|
||
because it addressed a technical subject, but mostly because it
|
||
used extremely convoluted language to express a simple idea.
|
||
Consequently, almost everything written to explain that law has
|
||
been incorrect. The words used by the politicians describing the
|
||
old law, in order to justify the creation of the new law, were
|
||
incorrect. "Experts" writing about that law haven't bothered to
|
||
read it; they have simply repeated the same errors that they
|
||
heard from others. Several court opinions relating to the old
|
||
law grossly misquoted it, or inverted the meaning of the words
|
||
used in it. The old law, written to control eavesdropping on
|
||
human voice conversations, was a masterpiece of circumlocution.
|
||
Its drafters apparently were writing to impress, rather than to
|
||
communicate. They used as many fancy words as they could muster,
|
||
but never once used any of the key words: "voice", "human",
|
||
"conversations" or "eavesdropping".
|
||
|
||
In short, the old law was an abomination.
|
||
|
||
The new law is worse.
|
||
|
||
THE NEW LAW The new law makes it a crime to listen to what has
|
||
been broadcast on certain radio frequencies. It's OK to tune to
|
||
some frequencies, a misdemeanor to tune to others, and a federal
|
||
felony to tune to others. Wild.
|
||
The new law allows "providers" to listen to communications
|
||
on telephone circuits that they provide. Unfortunately, the
|
||
drafters neglected to provide a definition of "provider".
|
||
Already, within a few months of passage, those words are being
|
||
interpreted to mean that the boss can listen to his employees'
|
||
phone calls without their knowledge or consent. Carried one step
|
||
further, it could be interpreted to mean that the breadwinner in
|
||
a household can legally listen to his/her spouse's phone calls.
|
||
|
||
The new law puts restrictions on law enforcement's use of a
|
||
dialed number recorder (DNR) (which it calls by the 1930s term
|
||
"pen register").
|
||
|
||
As with the law that it replaced, the new law uses the words
|
||
"in whole or in part" (referring to the kind of communications
|
||
addressed by the law) without defining whether these words are
|
||
intended to refer to the medium or the message. It is your
|
||
author's considered opinion that these words refer to the
|
||
message; otherwise they don't make sense. (I must point out,
|
||
however, that some very smart lawyers disagree.)
|
||
|
||
The new law creates a strange concept: "aural transfer".
|
||
Strange because the word "aural" refers to the human (animal?)
|
||
hearing mechanism which converts the mechanical energy of sound
|
||
impinging on the eardrum into electrical impulses which are
|
||
transmitted to the brain. "Transfer" implies a system, which
|
||
would be composed of a transmitter and a receiver; but the aural
|
||
process is only a receiving process. Let's paraphrase "Where's
|
||
the beef?" and say "Where's the transmitter?" in this system.
|
||
|
||
Oh yes, sounds broadcast on subcarriers may not be listened
|
||
to. Imagine! While you're in an office or elevator that plays
|
||
MUSAK, you are committing a felony by intentionally listening!.
|
||
|
||
Last, but not least, criminals have found that they can use
|
||
cellular phones for communication without paying for the service
|
||
by having phoney electronic serial and telephone numbers
|
||
installed in their phones. Also, they talk freely because they
|
||
know that what they say can't be used against them because law
|
||
enforcement must get a court order in order to legally listen to
|
||
what they are broadcasting on the airwaves.
|
||
|
||
|
||
ONE IMPROVEMENT First, you must recognize that our legislators
|
||
chose to redefine "intercept" rather than to use "eavesdrop" when
|
||
they are referring to eavesdropping. (Intercept means to seize
|
||
something, preventing it from arriving at its intended
|
||
destination; so they had to redefine it.) In the old law they
|
||
redefined this word to mean "aural acquisition" of the content of
|
||
a communication. This was dumb and caused untold confusion.
|
||
|
||
The one improvement in the new law, then, is the re-
|
||
redefinition of interception to mean the acquisition of the
|
||
content of the communication.
|
||
|
||
Hallelujah! (But wouldn't it have been better to use the
|
||
right word in the first place?)
|
||
|
||
|
||
HOW TO USE WORDS TO CREATE A FALSE IMPRESSION
|
||
(a lesson from our elected representatives)
|
||
|
||
The following comment was carried in COMSEC
|
||
LETTER, YOGO 2.06, issued while this law was being
|
||
drafted.
|
||
|
||
"Throughout the proposed law and in all references to
|
||
these laws our Congressmen have used the word "protection"
|
||
when they are referring to the legislated prohibitions
|
||
against eavesdropping on conversations. It is as though
|
||
they really believe that they can legislate protection.
|
||
|
||
"If you believe that legislation can "protect" your
|
||
broadcast conversations from being overheard, we have an
|
||
experiment for you -- and any congressman who thinks he has
|
||
such power.
|
||
|
||
"First let Congress pass a law which prohibits piranha
|
||
fish from biting our citizens. Let's make it a felony.
|
||
|
||
"Then you, or your congressman friend, go jump in a
|
||
river full of piranhas.
|
||
|
||
"Let me know how you make out."
|
||
|
||
|
||
IN THE WORKS
|
||
|
||
Because of the many requests that we have had for
|
||
complete sets of the ComSec Letter, we've been working on
|
||
editing out topical information and consolidating each
|
||
year's letters into one publication. These should be ready
|
||
soon; we'll let you know.
|
||
|
||
|
||
GLOSSARY
|
||
|
||
Just a reminder: we're enclosing pages 2 & 3 of the
|
||
TSCM Glossary with this letter.
|
||
|
||
FEEDBACK
|
||
|
||
Our thanks to Jerold Hutchinson who wrote to advise
|
||
that our definition of ACM is incorrect. He's right, and
|
||
we'll correct it in future editions of the glossary.
|
||
|
||
Although many folks use the terms interchangeably, ACM
|
||
is not another term for TSCM. ACM means audio
|
||
countermeasures and does not include countermeasures
|
||
against other methods of technical surveillance.
|
||
|
||
|
||
October, 1987
|
||
|
||
TRAP AND TRACE -- PEN REGISTER
|
||
|
||
Recently it has come to our attention that some folks
|
||
(especially lawyers) are using these terms interchangeably.
|
||
The confusion was probably started by the juxtaposition of
|
||
the two terms in the new federal law relating to
|
||
communications privacy. So let's see if we can shed some
|
||
light on these two different items.
|
||
First: pen register. (Do we have to use that
|
||
antiquated term? Yes, I know that it is the term used by
|
||
our legislators when they wrote the law, but the pen
|
||
register is an item that was modern when I was a kid, and
|
||
all phones were black rotary dial units with pulse output).
|
||
Anyway, the dialed number recorder (DNR) -- term for the
|
||
modern device which prints out the number dialed whether
|
||
the dialing is done with DTMF or pulses or a combination of
|
||
both -- is a device which is placed across the line of the
|
||
calling telephone. It prints out a chronological record of
|
||
all telephone activity: date and time off-hook and on-hook
|
||
on all calls and digits dialed on all outgoing calls. The
|
||
key to differentiating this from the trap and trace
|
||
equipment is that this device is connected to the line of
|
||
the calling telephone.
|
||
Trap and trace, on the other hand describes telephone
|
||
company equipment which is used, starting at the called
|
||
telephone to "Trace that call!", as they say in the movies.
|
||
However, the process is not as simple as the movies would
|
||
make you believe, particularly if the two ends (calling and
|
||
called) are not in the same exchange. The different
|
||
companies use different equipment to accomplish the same
|
||
thing, namely identification of the number from which the
|
||
call was placed.
|
||
To summarize: the DNR (modern pen register) is used at
|
||
a calling number to determine the called number; and trap
|
||
and trace equipment is used, starting at a called number,
|
||
to determine the calling number.
|
||
As we have reported earlier, there are developments
|
||
which will drastically change this scene. Congress made it
|
||
more difficult for law enforcement to get authority to use
|
||
a DNR and Radio Shack came out with its CPA-1000 -- a DNR
|
||
for the masses at $99.95 ("professional" DNRs start at
|
||
about $5,000). Meanwhile, our phone companies are
|
||
introducing CLASS and CCIS piecemeal across the country.
|
||
(See definitions of these terms in the glossary pages
|
||
distributed with last month's ComSec Letter.) CLASS and
|
||
CCIS will make trap and trace equipment superfluous; the
|
||
called party will be able to identify the calling number
|
||
without the aid or intervention of anyone or anything at
|
||
the telephone company.
|
||
|
||
|
||
ANONYMOUS LETTER
|
||
|
||
We recently received a letter from a former member
|
||
which raises a lot of interesting questions, so we'll run
|
||
it almost in its entirety, and do our best to try to answer
|
||
the questions for the benefit of all.
|
||
|
||
THE LETTER
|
||
"I was a student member of the ComSec Association
|
||
until my membership expired and the CSA board decided for
|
||
whatever reason to delete student member status.
|
||
"For the past several months, I'm glad to say that for
|
||
whatever reason, I have continued to receive the ComSec
|
||
Letter.
|
||
"With all of its coverage of the ECPA, and since the
|
||
whole communications privacy issue has been pushed by the
|
||
cellular telephone industry, I've decided to write to you
|
||
from my perspective -- a hobbyist communications monitor
|
||
whose interest includes the cellular telephone. You are
|
||
welcome to publish this as you see fit, under the condition
|
||
that I will remain anonymous.
|
||
"Cellular telephone communications operate at 825-845
|
||
MHz for the mobiles and 870-890 MHz for the cells. There
|
||
are several hobbyist communications receivers capable of
|
||
covering this range, with prices ranging from $400 to $800.
|
||
Interestingly enough, Radio Shack sells one of the best
|
||
receivers covering this range -- the 300 channel PRO-2004.
|
||
For political reasons (including the fact that RS sells
|
||
CMTs), cellular coverage was deleted by adding one easily-
|
||
removable component to a circuit board. It is common
|
||
knowledge that this component can be removed so this
|
||
continues to be a hot seller. Also, the CMT frequency
|
||
range was once allocated to UHF TV channels, so it is
|
||
possible to monitor cellular on an old TV set!
|
||
The majority of the telephone calls are of a
|
||
(legitimate) business nature, seconded by the more
|
||
interesting (to us casual monitors) personal calls. After
|
||
a quick scan of conversations, you realize how many people
|
||
cheat on their spouses! Drug deals are also often
|
||
monitored, and there have been instances where I have
|
||
copied down times, locations and any other helpful data,
|
||
turned it over to law enforcement agencies, and in turn
|
||
monitored their communications as they staked out the area
|
||
to make the arrests.!
|
||
Many law enforcement agencies themselves use cellular
|
||
phones, and by their lack of COMSEC/OPSEC during those
|
||
calls, they must seem to think the calls are relatively
|
||
secure. It seems that the agencies (DEA, FBI, etc.)
|
||
currently have no capability to monitor CMT conversations,
|
||
and "If we can't do it, chances are no one else can
|
||
either!" seems to be their attitude.
|
||
CMT industry officials would have you think that a
|
||
call changes frequencies every few seconds. While this
|
||
occasionally happens, the majority of the calls remain on
|
||
the same frequency for at least a minute. Also, it usually
|
||
takes me about 30 seconds at the most to relocate a
|
||
conversation that has switched to another channel as long
|
||
as the site is within about 15 miles of my area.
|
||
If you're behind or near a person using CMT, it is
|
||
quite simple to immediately locate the frequency and tune
|
||
in the conversation on the receiver without the use of a
|
||
spectrum analyzer or any other sophisticated equipment.
|
||
I'm currently trying to think of a way to pass on the
|
||
method to law enforcement agencies.
|
||
Overall, the cellular telephone system is a
|
||
sophisticated, extremely useful communications medium, but
|
||
the industry is making a mistake by trying to show that it
|
||
is something that in actuality it is far from -- secure.
|
||
Jim, feel free to use any of the above that you wish,
|
||
but please keep identifying information, such as my name,
|
||
etc. confidential.
|
||
I would like very much to contact my area FBI & DEA
|
||
Field Offices, because, after monitoring them, I know that
|
||
they are currently unable to monitor cellular conversations
|
||
(regardless of the law), yet I can't really just call them
|
||
out of the blue and say "Hey, after monitoring you, I know
|
||
you can't listen in on CMTs. I'd be happy to tell you
|
||
how!"
|
||
"I'd appreciate any advice or comments you might
|
||
have."
|
||
|
||
OUR ANSWER
|
||
First, let's consider the administrative questions
|
||
concerning CSA and your lapsed membership.
|
||
The student membership category was suggested by me
|
||
because I think we should do all we can to get young folks
|
||
interested in this field, and we all recognize that
|
||
students normally don't have a lot of money to throw
|
||
around. We knew when we set the dues at $10 per year that
|
||
it was a money-losing proposition, but we wanted to make
|
||
this information available to young folks studying in the
|
||
field.
|
||
Yep, I'm the one who suggested it. However, I'm also
|
||
the one who suggested that it was unworkable in an
|
||
organization this size with nothing but unpaid volunteer
|
||
administrative help -- me, my wife, and our youngest
|
||
daughter. Our experience in handling membership
|
||
applications convinced us that it was not worth the effort.
|
||
Almost every application had to be sent back for some kind
|
||
of documentary evidence that the applicant was truly a
|
||
full-time student. Many applicants were people who
|
||
sometimes took a course in the evenings, and some said
|
||
flatly that they studied on their own without benefit of
|
||
any recognized school. Those people, and the awful mess of
|
||
address changes just ate up too much time.
|
||
As to the reason that you received copies after your
|
||
membership expired; well, that's an interesting story and,
|
||
again, it relates directly to our naivete (or
|
||
inexperience). First, we tried to notify members to renew
|
||
by referring them to the code in the address label on the
|
||
envelope. Whoops. That didn't work partially because the
|
||
envelope was already in the trash before the member read
|
||
the note, and partially because many folks could not
|
||
understand our coding.
|
||
So then we were saved by a volunteer who said he would
|
||
maintain the membership list and send letters to all
|
||
members to remind them to renew. Whoops, again. We
|
||
suffered from many errors in the labels he printed out, and
|
||
delays of several weeks to get labels for mailing a monthly
|
||
newsletter. Oh, and by the way, he never did send even one
|
||
letter to remind people to renew.
|
||
The reason for the extra letters, then, is that your
|
||
editor was feeling guilty. How can you justify cutting off
|
||
membership if the member had never even been notified that
|
||
it was expiring. (Now, when we get as big as ASIS with a
|
||
five or six million dollar annual operating budget, then,
|
||
by golly, those renewal notices will go out like clockwork.
|
||
We hope.)
|
||
Now, let's consider the very serious subjects
|
||
introduced, namely the ability of some of us to monitor,
|
||
and inability of some others.
|
||
I cannot reveal the location of the letter writer so
|
||
we can't get a geographical fix on where DEA and FBI have
|
||
commented on the air about their inability to monitor CMT.
|
||
So, let's just ask the question of all of our readers: Is
|
||
this the situation in your area?
|
||
Speaking for ourselves, we have occasionally heard
|
||
some cellular phone conversations. In fact, while
|
||
demonstrating to some Senate staffers (before ECPA was
|
||
passed), we listened to a conversation during which one
|
||
party advised the other to buy a coach ticket, and he would
|
||
upgrade it to first class at the airport. (If that doesn't
|
||
make sense to you, let us explain. It is a violation of
|
||
federal law for a government employee to accept
|
||
transportation from a lobbyist or a contractor -- so what
|
||
is done is that the government employee gets his coach
|
||
ticket, and the contractor upgrades the ticket for cash,
|
||
and writes off the expenditure under some legal heading on
|
||
his expense report.)
|
||
Also, we've heard dates being made, and excuses being
|
||
given for dates broken; a girl giving all of her vital
|
||
statistics to what sounded like a prospective client, drug
|
||
deliveries being made, collectors (not the kind who send
|
||
invoices) going out to make collections, and a whole lot of
|
||
trivia.
|
||
|
||
|
||
BBS
|
||
|
||
Recently we were advised of a BBS called Mainstreet
|
||
Data (619-438-6624) which has a section called TAP
|
||
Magazine. Per the notice in 2600 magazine, for a
|
||
complimentary account call, enter 12 for your ID, enter
|
||
DAKOTA for your password, and at the first command prompt
|
||
enter PRO.
|
||
Please let us know how you make out.
|
||
|
||
|
||
|
||
|
||
|
||
SEEN AT ASIS, LAS VEGAS
|
||
|
||
Our nomination for the company with the most
|
||
interesting name at the annual seminar and exhibits of ASIS
|
||
in Las Vegas last month: Network Security Associates which
|
||
identifies itself by using the initials NSA.
|
||
|
||
|
||
FEDERAL COURT RULING RE ECPA
|
||
|
||
In the January 13, 1988 edition, USA Today reported
|
||
That "St. Louis US District Court Judge Roy Harper ruled
|
||
federal laws banning wiretaps don't apply to married
|
||
couples. Karl Kempf recorded his wife's telephone talks at
|
||
home because he suspected an extramarital affair, Harper
|
||
said."
|
||
If any reader has more information on this astounding
|
||
ruling, we'd sure like to receive it. Thanks.
|
||
|
||
|
||
November, 1987
|
||
|
||
THE SKY IS FALLING! THE SKY IS FALLING!
|
||
|
||
Many in politics and the media are screaming as
|
||
Chicken Little did. The fairy-tale chicken jumped to an
|
||
alarming conclusion on very slight evidence, and some high-
|
||
profile folks appear to have been doing the same with
|
||
regard to the Moscow embassy mess.
|
||
|
||
First they said that the Marine guards had been
|
||
allowing KGB agents the run of our embassy including the
|
||
crypto room; now they say no such thing ever happened.
|
||
Also, our legislators who visited our new embassy under
|
||
construction in Moscow say that it is so thoroughly bugged
|
||
that we'll never be able to use it.
|
||
|
||
A lot of what has been said bears examination and
|
||
evaluation by reasonable people. Let's look at some of
|
||
what we have been fed by the press.
|
||
|
||
Washington Post, 1-17-88: "... the Moscow Embassy was
|
||
ordered to cease all classified communication with the
|
||
outside world and to shut down processing of all classified
|
||
information on computer terminals, electric typewriters and
|
||
even manual typewriters on the theory that they might have
|
||
been programmed by nocturnal KGB visitors to emit telltale
|
||
electronic pulses."
|
||
|
||
Representative Olympia J. Snowe, 4-4-87: "We now have
|
||
a secretary [of state] who will be going to Moscow the week
|
||
after next and he will be reduced to negotiating foreign
|
||
policy in a Winnebago [because the embassy building is not
|
||
secure]."
|
||
|
||
Representative Daniel Mica is reported to have taken a
|
||
"Magic Slate" with him to Moscow so that he could
|
||
communicate securely while in our embassy.
|
||
|
||
There have been reports in the press that our new
|
||
embassy is one huge antenna.
|
||
|
||
U.S. News and World Report, 6-1-87 in a story about
|
||
the new Soviet embassy in Washington: "... the embassy
|
||
looms high enough over all of official Washington to enable
|
||
the Soviets to spy with sophisticated photographic and
|
||
listening devices on ... White House ... Pentagon ... State
|
||
Department ... Congress ... CIA ... FBI ... DIA ... and the
|
||
Navy Intelligence Complex."
|
||
|
||
|
||
IS THE SKY REALLY FALLING?
|
||
|
||
Comments on all of this are invited from all of our
|
||
readers. For his part, your editor finds most of it silly
|
||
and some of it downright ludicrous.
|
||
|
||
Can you imagine that anyone would be concerned about
|
||
compromising emanations from a manual typewriter?!? Can
|
||
you imagine that our technical people would allow our
|
||
embassy to be rendered unfit for use by people who have not
|
||
even had access to the premises for several years? In what
|
||
way does having the embassy made into a giant antenna
|
||
compromise communications?
|
||
|
||
All right, so our State Department insisted that the
|
||
Soviets build their embassy on the high ground on Tunlaw
|
||
Road instead of in Chevy Chase where the Russians wanted to
|
||
go. So what? Because all of those federal buildings are
|
||
visible in part from Mt. Alto, does that mean that we have
|
||
to stop doing business in the Pentagon, White House, etc.?
|
||
Yes, being on high ground does mean that radio reception is
|
||
better, but it doesn't mean that the Soviets can spy on
|
||
everything done in that long list of buildings, for Pete's
|
||
sake!
|
||
|
||
|
||
CALL FOR PAPERS
|
||
|
||
Although the dates are not yet firm, the decision has
|
||
been made that there will be a membership meeting in the
|
||
Washington, DC area late this year in conjunction with
|
||
Surveillance Expo '88. Your association is sponsoring this
|
||
expo, and expects to profit from it. Your participation is
|
||
urgently needed.
|
||
|
||
There will be four tracks with panels and
|
||
presentations scheduled throughout the three day period.
|
||
The tracks are: Communications Security,
|
||
Computer/Information Security, Surveillance Technology, and
|
||
Investigations Technology. If you are knowledgeable in one
|
||
of these areas, you are invited to suggest a subject for a
|
||
talk.
|
||
|
||
If you do not want to present a paper, but can help
|
||
with the planning, we'd like to hear from you right away.
|
||
The only pay you'll get for help is some public exposure to
|
||
professionals in the field, but that can be very valuable.
|
||
|
||
|
||
DEFENDING SECRETS, SHARING DATA
|
||
|
||
The title of this segment is the title of a report by
|
||
the Office of Technology Assessment of the U.S. Congress.
|
||
It is a modern-day classic on the subject of vulnerability
|
||
of electronic information to theft. If you work in this
|
||
field, or have responsibility for protecting information,
|
||
you should have a copy. Order from the Superintendent of
|
||
Documents, Government Printing Office, Washington, DC
|
||
20402-9325. GPO stock number is 052-003-01083-6. Price:
|
||
$8.50 per copy post paid.
|
||
|
||
Your editor is proud to say that he contributed in a
|
||
small way as a contractor to OTA.
|
||
|
||
|
||
THIS IS A PROFESSIONAL?!?
|
||
|
||
The headline (Washington Post, 1-23-88) reads "Wiretap
|
||
Consultant Gets 120-Day Term". The tawdry business that
|
||
was being reported on had to do with a man named Eddie T.
|
||
Dockery who admitted to forging an invoice, but that's not
|
||
the story that is of interest to us.
|
||
|
||
The real story is that this is the same man who was
|
||
hired by DC Mayor Marion Barry to perform "electronic
|
||
sweeps". That's right. The mayor of the capital city of
|
||
our nation hired this man to perform a professional
|
||
service. And what was the "professional" report that was
|
||
made to the mayor?
|
||
|
||
According to the Post, Dockery reported that "he
|
||
believed that there was a 90 percent chance that the three
|
||
telephone lines into Barry's house were wiretapped and that
|
||
the rooms in the house were bugged".
|
||
|
||
Now we've heard some pretty wild conclusions being
|
||
reached by some operators of TDRs, and we're wondering if
|
||
that is what this man was using. Or was he just looking
|
||
into a crystal ball?
|
||
|
||
|
||
CUTESY COMMENT AWARD
|
||
|
||
This award goes to William Barden, Jr. who wrote a
|
||
book entitled "Shortwave Listening Guide" which is
|
||
published and sold by Radio Shack. The cutesy comment
|
||
worthy of note appeared in a section of the book relating
|
||
to the ECPA of 1986 in which he explains the act and
|
||
counsels on how to not become a criminal while listening to
|
||
your radio. With regard to the fact that the ECPA makes
|
||
intentionally listening to what is broadcast on cellular
|
||
phone frequencies he comments, "Evidently some of the
|
||
lobbying for the ECPA was done by the Mobile Communications
|
||
industry."
|
||
|
||
In case you have not been following the activity re
|
||
ECPA and its aftershocks, let us explain. Radio Shack, the
|
||
publisher of this book was one of the principal lobbyists
|
||
for the obnoxious provisions of the ECPA which specify
|
||
which listening is OK, which is a misdemeanor, and which is
|
||
a felony. Further, Radio Shack made a quick fix to their
|
||
wonderful PRO-2004 scanner so that it could not be used in
|
||
contravention of the law that they helped to write. Yep.
|
||
The 2004 cannot now be tuned to cellular frequencies.
|
||
|
||
Therefore the "Cutesy Comment Award".
|
||
|
||
(By the way, if you have a PRO-2004 and want to
|
||
unmodify it, send us a stamped, self-addressed envelope and
|
||
we'll send you instructions on how to unmodify it so you
|
||
can listen to cellular.)
|
||
QUOTE OF THE MONTH
|
||
|
||
Milton Berle: "Married fifty years, and we still make
|
||
love almost every day. Almost on Monday, almost on
|
||
Tuesday, ..."
|
||
|
||
|
||
TO/FROM; CALLED/CALLING
|
||
|
||
George Threshman contacted us after our last letter
|
||
which tried to clear up the confusion between "trap and
|
||
trace" devices and dialed number recorders (DNRs). He said
|
||
that our explanation led him to believe that a DNR would
|
||
identify the calling number. (By the way, the Brits, in
|
||
their laws differentiate by using the words "TO" and
|
||
"FROM". Smart, no?) This is too important a point for us
|
||
to leave any possibility of confusion, so let's try again.
|
||
|
||
The DNR is a device which is placed across the line of
|
||
the calling telephone. It prints out a chronological
|
||
record of all telephone activity: date and time off-hook
|
||
and on-hook on all calls and digits dialed on all outgoing
|
||
calls.
|
||
|
||
(News note: The DNR from Radio Shack, the CPA-1000,
|
||
which we praised in that same letter has been reduced in
|
||
price; it's now $79.95. Aren't capitalism and the free
|
||
market wonderful?)
|
||
|
||
|
||
YET ANOTHER PRODUCT
|
||
|
||
Recently we received a letter from Robert Brooks of
|
||
Warrensburg, MO in which he made some nice comments about
|
||
the ComSec Letter and passed along some interesting
|
||
information.
|
||
|
||
First, Robert, Thanks for the kind words. Hearing a
|
||
compliment from time to time really makes this effort
|
||
worthwhile. And thanks for your info and questions.
|
||
(There will be more on laser techniques and equipment in a
|
||
future issue -- and I'm not sure about the facsimile
|
||
scrambling product that you recommend.)
|
||
|
||
Now let's pass on his comments about yet another
|
||
product. Robert says, "In recent product literature I
|
||
received from Sutton Designs, they advertised an 8-digit
|
||
(1.2 GHz) frequency counter for $500.00. If you look in
|
||
the inside cover of the November 1987 Modern Electronics
|
||
you'll see the same frequency counter (same exact ad --
|
||
different company) selling for $99.95. Isn't Sutton being
|
||
a little greedy?"
|
||
|
||
Well, Robert, I think it was P.T. Barnum who said,
|
||
"There's another sucker born every minute." It's just sad
|
||
that there are firms trying to "con" us all the time. By
|
||
the way, I've had other calls on this subject and I seem to
|
||
recall that the counter is available for a lower price, and
|
||
that Sutton is asking an even higher price. We'd be glad
|
||
to hear from anyone, even Sutton Designs, on this matter.December, 1987
|
||
|
||
BY-LAWS, BOARD, OFFICERS
|
||
|
||
We've drifted long enough. The current Board of
|
||
Directors will meet soon to approve By-Laws, and to start
|
||
the process of selecting a new board and new officers.
|
||
|
||
Information will be coming in this newsletter.
|
||
|
||
|
||
DANGEROUS FOOLISHNESS
|
||
|
||
According to information in a recent Popular
|
||
Communications magazine, the Cellular Telephone Industry
|
||
Association, CTIA, not only opposes any effort to force
|
||
manufacturers to put warning labels on radio transmitters,
|
||
they want to ban the manufacture of equipment that can
|
||
receive on cellular frequencies!
|
||
|
||
It seems prudent to us that the public should be
|
||
warned that what they transmit can be heard by others. It
|
||
is unthinkable that receiving equipment could be banned in
|
||
a free country.
|
||
|
||
Well, it took from 1968 till 1986 to change the
|
||
federal law relating to eavesdropping. The new law has
|
||
some improvements, but many strange new provisions. How
|
||
long will it take to undo all the harm done by the ECPA?
|
||
|
||
|
||
MAJOR INDEPENDENT TV STATION BUGGED!
|
||
|
||
We won't identify the station because we don't want to
|
||
embarrass them. (However, you'll find their call sign very
|
||
familiar.) It seems that a scanner operator called one of
|
||
their popular investigative reporters and advised that
|
||
there was a radio bug in the station and that a lot of very
|
||
sensitive information was being broadcast.
|
||
|
||
Investigation of the "bug" revealed that floor
|
||
directors were leaving their headsets turned "on" after
|
||
use. Sound activated (VOX) circuits kept the transmitters
|
||
off the air until they picked up conversations with
|
||
clients, discussions of secret promotional campaigns, etc.
|
||
(Hint, hint. This station just ran an excellent series on
|
||
eavesdropping.)
|
||
|
||
|
||
TEMPEST AND COMPUTER SECURITY
|
||
|
||
From Ray Heslop of the Tempest Division of Atlantic
|
||
Research we received a copy of the above captioned article
|
||
that had been published in last September's edition of
|
||
Government Executive. Our thanks to Ray for thinking of
|
||
us. The article intended to wake up corporate America to
|
||
the TEMPEST threat and it may have done something along
|
||
that line, but it turned us off because of incorrect
|
||
technical information.
|
||
|
||
The first comment on this material relates to a
|
||
popular misconception which seems to have been originated
|
||
by some of those liberal arts majors who became
|
||
journalists. Maybe it's not the fault of the journalists,
|
||
but somebody has divided eavesdropping into "active" and
|
||
"passive" categories without providing definitions of these
|
||
terms. If I understand them correctly, when a man climbs a
|
||
pole and bridges from the target telephone line to the
|
||
leased line to the listening post, that's not active.
|
||
Methinks that the guy who climbed the pole will be
|
||
surprised to find out that he was engaged in a passive
|
||
activity!
|
||
|
||
Leaving aside the generic criticism, let's look at
|
||
some specific technical information offered in this
|
||
article. We'll label the Government Executive comments
|
||
"GE", and our responses "CL".
|
||
|
||
GE. "According to experts, fiber-optic cable is the
|
||
best bet because it doesn't emanate as well. However,
|
||
fiber optic cable can be tapped easily, and it is difficult
|
||
to detect the tapping. Existing coaxial cable can be
|
||
protected with metal shielding."
|
||
|
||
CL. So much for getting expert technical advice from
|
||
Government Executive!
|
||
|
||
All of us know, I hope, that there is no magnetic or
|
||
electric field associated with a fiber optic cable carrying
|
||
a signal because that signal is light, not electric current
|
||
or radio frequency energy. So, in a sense, the author is
|
||
correct; it does not emanate as well 'cuz it doesn't
|
||
emanate at all. However, when she says it can be tapped
|
||
more easily, and the tapping is difficult to detect, she
|
||
couldn't be further off the mark. There is no doubt in my
|
||
mind that fiber optic cable can be tapped. I just don't
|
||
think that it can be done in the field. Consider that a
|
||
single strand of cable is 10 microns in diameter and is
|
||
covered with cladding that is one micron in thickness. I
|
||
can see how this can be handled in the lab, but I really
|
||
can't see a man on a pole, handling the cable with gloves
|
||
on, with the wind and rain, and so forth, can be expected
|
||
to remove the requisite length of cladding without damaging
|
||
the glass fiber so that he can fuse another cable to it as
|
||
they do in the lab in a jig under a microscope.
|
||
|
||
And, as for tap detection, it looks like there are
|
||
many ways to automatically detect tampering on the fiber
|
||
cable, but we don't yet have a way to do the same on a
|
||
phone line.
|
||
|
||
Last, but not least. She says that coax can be
|
||
protected with metal shielding. Great idea, but of course,
|
||
coax means coaxial; the conductor in the center and the
|
||
shield around it share the same axis, therefore, the term
|
||
"coaxial". 'Course, if you put another metal shield around
|
||
it, we don't know what you would accomplish, but it
|
||
shouldn't hurt anything except the pocketbook of the person
|
||
paying for it.
|
||
|
||
GE. This article also says that computer data are
|
||
stolen by "highly sensitive bugs, line taps, parabolic
|
||
microphones, electromagnetic emanation collection
|
||
instruments, and other related devices."
|
||
|
||
CL. Our own experience is limited, but the methods
|
||
listed here don't seem to relate to the practical world
|
||
that we live in. However, let's pass this question on to
|
||
our readers. How often have you found computer data being
|
||
compromised by parabolic microphones or highly sensitive
|
||
bugs or anything else specified?
|
||
|
||
|
||
BBS # NG
|
||
|
||
Shortly after we passed along a new BBS number, we had
|
||
a call from Larry Newman who reported that the number from
|
||
2600 was no good. Sorry about that.
|
||
|
||
|
||
ComSec Association BBS
|
||
|
||
Larry has been flirting with the idea of sponsoring a
|
||
BBS for the ComSec Association, but he's not sure that he
|
||
can bring it off alone. Anybody out there want to give him
|
||
a hand? He's in NYC and his phone number is 212-921-2555.
|
||
Give him a call if you think that you could help get this
|
||
project off the ground.
|
||
|
||
|
||
AT&T INFORMATION SOURCES
|
||
|
||
The following information was published in
|
||
Teleconnect, and we pass it on for those who may be
|
||
interested.
|
||
|
||
Technical Reference Catalog (pub 1000) (lists pubs,
|
||
bulletins, etc.) Available from:
|
||
|
||
Publishers Data Center, Inc.
|
||
POB C-738
|
||
Pratt Street Station
|
||
Brooklyn, NY 11205
|
||
|
||
Bell Labs Record (magazine). $20 per year from:
|
||
|
||
Bell Labs Circulation Dept.
|
||
Room 1F-233
|
||
101 JFK Pkwy
|
||
Short Hills, NJ 07078.
|
||
|
||
|
||
|
||
EVALUATOR EVALUATION
|
||
|
||
At the request of one of the dealers and of the
|
||
inventor (?) of the Evaluator, we tested the device.
|
||
|
||
In case you're not familiar with this unit, let us
|
||
quote the headline in the ad currently running in Security
|
||
Management: "NEW! PATENTED TAP DETECTOR OPERATES 24 HOURS A
|
||
DAY".
|
||
|
||
Based on those words we think that a reasonable person
|
||
would conclude that the Evaluator is capable of detecting
|
||
telephone taps, and is sold as a tap detector, no?
|
||
|
||
Well, we tested the evaluator to see if they had
|
||
invented something that Bell Labs had been unable to
|
||
invent.
|
||
|
||
The first one that we tested did not detect the Radio
|
||
Shack audio amplifier, the butt set, the tape recorder
|
||
starter, the sound activated tape recorder, or the tap made
|
||
out of about $2.50 worth of parts. It did detect an
|
||
extension phone going off hook.
|
||
|
||
The inventor/manufacturer (?) advised that we might
|
||
have received a faulty unit, and also that we should leave
|
||
the tap on for three to five minutes because that's how
|
||
long the detection process sometimes took.
|
||
|
||
So we tested the new unit while timing our taps by
|
||
dialing the time message from the phone company. We
|
||
recorded for at least five minutes while tapping
|
||
sequentially with the same pieces of equipment. Again, it
|
||
failed to detect anything but an extension going off hook.
|
||
|
||
Since then, we've been promised that we would receive
|
||
a new unit for testing. That promise goes back several
|
||
months, so don't hold your breath for our updating story.
|
||
|
||
|
||
SURVEILLANCE EXPO
|
||
|
||
We're trying. Spent innumerable hours talking with
|
||
two Sheraton hotels in the DC area, only to have them
|
||
change the terms when it was time to sign the contract.
|
||
Wasted time.
|
||
|
||
Any member with experience in this arena will be
|
||
welcomed with open arms. Help!
|
||
|