bug_1
-
Upload
eye-spy-magazine -
Category
Documents
-
view
213 -
download
0
description
Transcript of bug_1
58 59E Y E S P Y I S S U E 4 8 , 2 0 0 7 E Y E S P Y I S S U E 4 8 , 2 0 0 7
TRADESECRETS
WHITE NOISE - OR WATER?A favourite way of ‘cloaking’ a
conversation is by playing
white noise. If this is not an
option - the sound generated
by a running water tap can
make recording difficult - a
trait often used by undercover
operatives. However, it also
alerts the buggist that you may
be on to him.
advanced computer software can be uploadedinto certain phone units literally turning them intoroom bugs. Uploading covert software via theInternet can also turn a webcam into a listeningand camera device. But before terrorists make abeeline to their nearest reference library to studycountermeasures, beware, there is a solution toevery problem.
Telephone tap equipment can also be attached tothe actual line (so not all the old traits of the spyhave disappeared). If it’s done by a governmentagency holding an intercept warrant, it is legal. Ifnot, and you are caught placing a device on atelephone line, you could go to jail (regard-less of intent).
Physical line-tapping is performed inseconds but can be defeated usingrelatively low-cost equipment. (In alater edition of Eye Spy DIY, we willshow you how to detect a ‘linepresence’ using a simple voltagemeter). Indeed, a visual check ofyour line is sometimes sufficientto spot an unusual object.However, Eye Spy has seentelephone taps as small as apea. These devices areoften powered by the lineitself and have two wiresspliced to the main cable
or are attached by a tiny crocodile clip. Hidden ina dark area, for example, they are difficult to see.Similarly, if someone has placed a line devicehigh up on the nearest telegraph pole, it willprobably be out of sight and reach. A popularplace to conceal phone intercept devices is in theloft. Telephone line cables are often routedthrough the roof area to other rooms - to checkthoroughly, you must follow the line throughoutits journey to the phone or adapter. However,there are clues to a physical/central exchangeline tap such as a minute pause or faint click;sometimes the line appears open - even if you
have replaced the receiver. Occasionally there isan echo or you can hear your commentsrepeated very quietly.
Numerous line-clamped telephone tap defeat
devices exist and work very well - but in truth,they won’t stop an official intercept. Changingyour number will not stop an official or illegal lineintercept. But it’s worth remembering, mosttelephone companies have their own investiga-tors who are regulated. If you suspect a tap, callthem for advice - the advice bit is free.
More and more businesses are opting to installcountermeasures equipment, but some seemoblivious to certain facts. For example, mostcorporations use digital phone exchanges toroute calls from one office to another. Placing astandard telephone tap defeat on such a systemsimply will not work. Nevertheless, interceptingphone calls is big business in the corporateworld, thus more and more companies turn to
TRADESECRETS
CUTTING THE POWERSome security outfits will
actually create electrical faults
to gain access into companies
and homes. Cutting a phone
landline is a popular ruse. An
‘engineer’ will often make a
surprise appearance and say
the fault is street-wide - thus
gaining immediate access to
the building.
received safely elsewhere and recorded at alistening or observation post. Because detectorscan expose most transmitting devices, manyintelligence services resort to simple recordingmethods. Even some of the most advanceddetectors can’t accurately determine if a taperecording is taking place. A few years agogeneral audio recording detectors were readilyavailable on the marketplace, but they havebecome somewhat of a rarity because technol-ogy has moved in to the digital era. However, EyeSpy is aware that a few models are about tomake a comeback. For the record, most taperecorders generate an ultrasonic sound calledbias. If used on the body or in a briefcase, forexample, the detector will be alerted to thesound.
The loft is a favourite location to placeadvanced and ‘long-situ’ bugs. The area isusually powered and various cables can be runbetween rooms. Loft insulation and domesticclutter are good ‘concealers’.
Devices are sometimes dropped down wallcavities - but powered from the loft area.Telephones can also be physically tapped fromhere by unscrupulous buggists
Telephone line tap detector and bug hunter. This unit will tell you if the lineis being bugged. Having such a device won’t necessarily reveal whoplaced the bug in the first place - but it does provide some assurance
specialists to make sure a competitor, forexample, is not “listening in” and gathering tradesecrets. A one-to-one scrambler phone willsecure at least one line and make if difficult to acorporate spy to listen.
DIGITAL ERA
But what if audio intelligence is beyond the reachof an ordinary telephone tap? If a meeting needsto be recorded by the authorities, every attemptwill be made to ‘prime’ the room. And there aredozens of covert listening devices that can beused to record conversations. However, they areall vulnerable to some extent, and bizarrely, evenmore so if they are wireless. A UHF transmitter ismore secure, but an abundance of countermeas-ures’ equipment is available to ‘out’ the bug.
Using a transmitter tucked safely out of sight is apopular way to gather audio intelligence, whetherit’s on a person, in a vehicle, in an object, insidea wall cavity or under the carpet. The data is
Sometimes simple is best. Few countermeas-ures’ operatives still possess equipment to detect
a standard tape cassette recorder
Listening in. Government operators willuse various means to gather intelligence -including carefully concealed transmitters.The information is recorded and immedi-ately analysed.
Selling for about £90.00 - this digitalwatch makes great recordings andconceals a multitude of devices. Itmight, however, catch the eye ofexperts involved in countermeasures
In one-to-one contact it is possible to obtain ahigh-quality recording. In an official operation -and depending on the seriousness of the event -it’s highly unlikely an operative will use just onerecorder. Micro-recorders can be installed in avariety of everyday objects such as a button,wristwatch, glasses, hat, belt buckle or tie.Experienced operatives will assess the situationbefore contact is made and carefully select whathe or she should wear. An ordinary recorder andtiny body-worn microphone will prevail in mostcases, but even a glancing touch from a shirtcollar may distort the sound. Using a long-playslimline recorder with the external mic removedis essential: this stops any internal noise beingemitted and negates the possibility that the unitwill ‘click’ when the tape is exhausted. Checkingequipment and battery life prior to a fieldoperation can’t be ignored and is mandatory.
Eye Spy has recently received the new covertrecorder from Russia that replaces the incrediblypowerful MICRODOT. The new unit has beenstreamlined, encased in a tough rubber sur-round, and is easily hidden. It’s so small six unitswill fit into a standard match box. Because of itssize, long play capability, stunning digital soundand other security features, it is the new choiceof professional operators. The unit can beincorporated into clothing or virtually any object,such as a lighter, cell phone, or even inside theheel of a shoe. It is non-mechanical, does nottransmit, and issues no sound whatsoever. Also,without the correct software and codes - no-onecan access its content. The high-end model canoperate for nearly 300 hours.
Wearing any sort of device is problematic. Thedangers of using a body-worn microphone/transmitter are obvious. If the contact requests a“bodycheck”, its likely any bulky apparatus will
BUGS whenyou
need toknow
BUGSTRADECRAFTEYE SPY