bug_1

1
58 59 EYE SPY ISSUE 48 , 2007 EYE SPY ISSUE 48 , 2007 TRADE SECRETS WHITE NOISE - OR WATER? A favourite way of ‘cloaking’ a conversation is by playing white noise. If this is not an option - the sound generated by a running water tap can make recording difficult - a trait often used by undercover operatives. However, it also alerts the buggist that you may be on to him. advanced computer software can be uploaded into certain phone units literally turning them into room bugs. Uploading covert software via the Internet can also turn a webcam into a listening and camera device. But before terrorists make a beeline to their nearest reference library to study countermeasures, beware, there is a solution to ever y problem. Telephone tap equipment can also be attached to the actual line (so not all the old traits of the spy have disappeared). If it’s done by a government agency holding an intercept warrant, it is legal. If not, and you are caught placing a device on a telephone line, you could go to jail (regard- less of intent). Physical line-tapping is performed in seconds but can be defeated using relatively low-cost equipment. (In a later edition of Eye Spy DIY, we will show you how to detect a ‘line presence’ using a simple voltage meter). Indeed, a visual check of your line is sometimes sufficient to spot an unusual object. However, Eye Spy has seen telephone taps as small as a pea. These devices are often powered by the line itself and have two wires spliced to the main cable or are attached by a tiny crocodile clip. Hidden in a dark area, for example, they are difficult to see. Similarly, if someone has placed a line device high up on the nearest telegraph pole, it will probably be out of sight and reach. A popular place to conceal phone intercept devices is in the loft. Telephone line cables are often routed through the roof area to other rooms - to check thoroughly, you must follow the line throughout its journey to the phone or adapter. However, there are clues to a physical/central exchange line tap such as a minute pause or faint click; sometimes the line appears open - even if you have replaced the receiver. Occasionally there is an echo or you can hear your comments repeated very quietly. Numerous line-clamped telephone tap defeat devices exist and work very well - but in truth, they won’t stop an official intercept. Changing your number will not stop an official or illegal line intercept. But it’s worth remembering, most telephone companies have their own investiga- tors who are regulated. If you suspect a tap, call them for advice - the advice bit is free. More and more businesses are opting to install countermeasures equipment, but some seem oblivious to certain facts. For example, most corporations use digital phone exchanges to route calls from one office to another. Placing a standard telephone tap defeat on such a system simply will not work. Nevertheless, intercepting phone calls is big business in the corporate world, thus more and more companies turn to TRADE SECRETS CUTTING THE POWER Some security outfits will actually create electrical faults to gain access into companies and homes. Cutting a phone landline is a popular ruse. An ‘engineer’ will often make a surprise appearance and say the fault is street-wide - thus gaining immediate access to the building. received safely elsewhere and recorded at a listening or observation post. Because detectors can expose most transmitting devices, many intelligence services resort to simple recording methods. Even some of the most advanced detectors can’t accurately determine if a tape recording is taking place. A few years ago general audio recording detectors were readily available on the marketplace, but they have become somewhat of a rarity because technol- ogy has moved in to the digital era. However, Eye Spy is aware that a few models are about to make a comeback. For the record, most tape recorders generate an ultrasonic sound called bias. If used on the body or in a briefcase, for example, the detector will be alerted to the sound. The loft is a favourite location to place advanced and ‘long-situ’ bugs. The area is usually powered and various cables can be run between rooms. Loft insulation and domestic clutter are good ‘concealers’. Devices are sometimes dropped down wall cavities - but powered from the loft area. Telephones can also be physically tapped from here by unscrupulous buggists Telephone line tap detector and bug hunter. This unit will tell you if the line is being bugged. Having such a device won’t necessarily reveal who placed the bug in the first place - but it does provide some assurance specialists to make sure a competitor, for example, is not “listening in” and gathering trade secrets. A one-to-one scrambler phone will secure at least one line and make if difficult to a corporate spy to listen. DIGITAL ERA But what if audio intelligence is beyond the reach of an ordinary telephone tap? If a meeting needs to be recorded by the authorities, every attempt will be made to ‘prime’ the room. And there are dozens of covert listening devices that can be used to record conversations. However, they are all vulnerable to some extent, and bizarrely, even more so if they are wireless. A UHF transmitter is more secure, but an abundance of countermeas- ures’ equipment is available to ‘out’ the bug. Using a transmitter tucked safely out of sight is a popular way to gather audio intelligence, whether it’s on a person, in a vehicle, in an object, inside a wall cavity or under the carpet. The data is Sometimes simple is best. Few countermeas- ures’ operatives still possess equipment to detect a standard tape cassette recorder Listening in. Government operators will use various means to gather intelligence - including carefully concealed transmitters. The information is recorded and immedi- ately analysed. Selling for about £90.00 - this digital watch makes great recordings and conceals a multitude of devices. It might, however, catch the eye of experts involved in countermeasures In one-to-one contact it is possible to obtain a high-quality recording. In an official operation - and depending on the seriousness of the event - it’s highly unlikely an operative will use just one recorder. Micro-recorders can be installed in a variety of everyday objects such as a button, wristwatch, glasses, hat, belt buckle or tie. Experienced operatives will assess the situation before contact is made and carefully select what he or she should wear. An ordinary recorder and tiny body-worn microphone will prevail in most cases, but even a glancing touch from a shirt collar may distort the sound. Using a long-play slimline recorder with the external mic removed is essential: this stops any internal noise being emitted and negates the possibility that the unit will ‘click’ when the tape is exhausted. Checking equipment and battery life prior to a field operation can’t be ignored and is mandatory. Eye Spy has recently received the new covert recorder from Russia that replaces the incredibly powerful MICRODOT. The new unit has been streamlined, encased in a tough rubber sur- round, and is easily hidden. It’s so small six units will fit into a standard match box. Because of its size, long play capability, stunning digital sound and other security features, it is the new choice of professional operators. The unit can be incorporated into clothing or virtually any object, such as a lighter, cell phone, or even inside the heel of a shoe. It is non-mechanical, does not transmit, and issues no sound whatsoever. Also, without the correct software and codes - no-one can access its content. The high-end model can operate for nearly 300 hours. Wearing any sort of device is problematic. The dangers of using a body-worn microphone/ transmitter are obvious. If the contact requests a “bodycheck”, its likely any bulky apparatus will BUGS when you need to know BUGS TRADECRAFT EYE SPY

description

Listening in. Government operators will use various means to gather intelligence - including carefully concealed transmitters. The information is recorded and immedi- ately analysed. Devices are sometimes dropped down wall cavities - but powered from the loft area. Telephones can also be physically tapped from here by unscrupulous buggists 58 59 Sometimes simple is best. Few countermeas- ures’ operatives still possess equipment to detect a standard tape cassette recorder DIGITAL ERA

Transcript of bug_1

58 59E Y E S P Y I S S U E 4 8 , 2 0 0 7 E Y E S P Y I S S U E 4 8 , 2 0 0 7

TRADESECRETS

WHITE NOISE - OR WATER?A favourite way of ‘cloaking’ a

conversation is by playing

white noise. If this is not an

option - the sound generated

by a running water tap can

make recording difficult - a

trait often used by undercover

operatives. However, it also

alerts the buggist that you may

be on to him.

advanced computer software can be uploadedinto certain phone units literally turning them intoroom bugs. Uploading covert software via theInternet can also turn a webcam into a listeningand camera device. But before terrorists make abeeline to their nearest reference library to studycountermeasures, beware, there is a solution toevery problem.

Telephone tap equipment can also be attached tothe actual line (so not all the old traits of the spyhave disappeared). If it’s done by a governmentagency holding an intercept warrant, it is legal. Ifnot, and you are caught placing a device on atelephone line, you could go to jail (regard-less of intent).

Physical line-tapping is performed inseconds but can be defeated usingrelatively low-cost equipment. (In alater edition of Eye Spy DIY, we willshow you how to detect a ‘linepresence’ using a simple voltagemeter). Indeed, a visual check ofyour line is sometimes sufficientto spot an unusual object.However, Eye Spy has seentelephone taps as small as apea. These devices areoften powered by the lineitself and have two wiresspliced to the main cable

or are attached by a tiny crocodile clip. Hidden ina dark area, for example, they are difficult to see.Similarly, if someone has placed a line devicehigh up on the nearest telegraph pole, it willprobably be out of sight and reach. A popularplace to conceal phone intercept devices is in theloft. Telephone line cables are often routedthrough the roof area to other rooms - to checkthoroughly, you must follow the line throughoutits journey to the phone or adapter. However,there are clues to a physical/central exchangeline tap such as a minute pause or faint click;sometimes the line appears open - even if you

have replaced the receiver. Occasionally there isan echo or you can hear your commentsrepeated very quietly.

Numerous line-clamped telephone tap defeat

devices exist and work very well - but in truth,they won’t stop an official intercept. Changingyour number will not stop an official or illegal lineintercept. But it’s worth remembering, mosttelephone companies have their own investiga-tors who are regulated. If you suspect a tap, callthem for advice - the advice bit is free.

More and more businesses are opting to installcountermeasures equipment, but some seemoblivious to certain facts. For example, mostcorporations use digital phone exchanges toroute calls from one office to another. Placing astandard telephone tap defeat on such a systemsimply will not work. Nevertheless, interceptingphone calls is big business in the corporateworld, thus more and more companies turn to

TRADESECRETS

CUTTING THE POWERSome security outfits will

actually create electrical faults

to gain access into companies

and homes. Cutting a phone

landline is a popular ruse. An

‘engineer’ will often make a

surprise appearance and say

the fault is street-wide - thus

gaining immediate access to

the building.

received safely elsewhere and recorded at alistening or observation post. Because detectorscan expose most transmitting devices, manyintelligence services resort to simple recordingmethods. Even some of the most advanceddetectors can’t accurately determine if a taperecording is taking place. A few years agogeneral audio recording detectors were readilyavailable on the marketplace, but they havebecome somewhat of a rarity because technol-ogy has moved in to the digital era. However, EyeSpy is aware that a few models are about tomake a comeback. For the record, most taperecorders generate an ultrasonic sound calledbias. If used on the body or in a briefcase, forexample, the detector will be alerted to thesound.

The loft is a favourite location to placeadvanced and ‘long-situ’ bugs. The area isusually powered and various cables can be runbetween rooms. Loft insulation and domesticclutter are good ‘concealers’.

Devices are sometimes dropped down wallcavities - but powered from the loft area.Telephones can also be physically tapped fromhere by unscrupulous buggists

Telephone line tap detector and bug hunter. This unit will tell you if the lineis being bugged. Having such a device won’t necessarily reveal whoplaced the bug in the first place - but it does provide some assurance

specialists to make sure a competitor, forexample, is not “listening in” and gathering tradesecrets. A one-to-one scrambler phone willsecure at least one line and make if difficult to acorporate spy to listen.

DIGITAL ERA

But what if audio intelligence is beyond the reachof an ordinary telephone tap? If a meeting needsto be recorded by the authorities, every attemptwill be made to ‘prime’ the room. And there aredozens of covert listening devices that can beused to record conversations. However, they areall vulnerable to some extent, and bizarrely, evenmore so if they are wireless. A UHF transmitter ismore secure, but an abundance of countermeas-ures’ equipment is available to ‘out’ the bug.

Using a transmitter tucked safely out of sight is apopular way to gather audio intelligence, whetherit’s on a person, in a vehicle, in an object, insidea wall cavity or under the carpet. The data is

Sometimes simple is best. Few countermeas-ures’ operatives still possess equipment to detect

a standard tape cassette recorder

Listening in. Government operators willuse various means to gather intelligence -including carefully concealed transmitters.The information is recorded and immedi-ately analysed.

Selling for about £90.00 - this digitalwatch makes great recordings andconceals a multitude of devices. Itmight, however, catch the eye ofexperts involved in countermeasures

In one-to-one contact it is possible to obtain ahigh-quality recording. In an official operation -and depending on the seriousness of the event -it’s highly unlikely an operative will use just onerecorder. Micro-recorders can be installed in avariety of everyday objects such as a button,wristwatch, glasses, hat, belt buckle or tie.Experienced operatives will assess the situationbefore contact is made and carefully select whathe or she should wear. An ordinary recorder andtiny body-worn microphone will prevail in mostcases, but even a glancing touch from a shirtcollar may distort the sound. Using a long-playslimline recorder with the external mic removedis essential: this stops any internal noise beingemitted and negates the possibility that the unitwill ‘click’ when the tape is exhausted. Checkingequipment and battery life prior to a fieldoperation can’t be ignored and is mandatory.

Eye Spy has recently received the new covertrecorder from Russia that replaces the incrediblypowerful MICRODOT. The new unit has beenstreamlined, encased in a tough rubber sur-round, and is easily hidden. It’s so small six unitswill fit into a standard match box. Because of itssize, long play capability, stunning digital soundand other security features, it is the new choiceof professional operators. The unit can beincorporated into clothing or virtually any object,such as a lighter, cell phone, or even inside theheel of a shoe. It is non-mechanical, does nottransmit, and issues no sound whatsoever. Also,without the correct software and codes - no-onecan access its content. The high-end model canoperate for nearly 300 hours.

Wearing any sort of device is problematic. Thedangers of using a body-worn microphone/transmitter are obvious. If the contact requests a“bodycheck”, its likely any bulky apparatus will

BUGS whenyou

need toknow

BUGSTRADECRAFTEYE SPY