forums
new posts
donate
UER Store
events
location db
db map
search
members
faq
terms of service
privacy policy
register
login




UER Forum > Private Boards Index > Section One Extreme UE and SPY talk > Warning Signs of Covert Eavesdropping or Bugging (Viewed 3177 times)
Oryx 


Location: Who knows
Gender: Neither
Total Likes: 40 likes


:|

 |  | 
Warning Signs of Covert Eavesdropping or Bugging
< on 9/12/2009 6:08 PM >
Reply with Quote
Posted on Forum: UER Forum
Warning Signs of Covert Eavesdropping or Bugging

http://www.tscm.com/warningsigns.html

1 - Others know your confidential business or professional trade secrets.
This is the most obvious indicator of covert eavesdropping activities. Theft of confidential information is a multi-billion dollar underground industry in the United States. Often the loss of your secrets will show up in very subtle ways so you should always trust your instincts in this matter. When your competitors know things that are obviously private, or the media finds out about things they should not know, then it is reasonable to suspect technical eavesdropping or bugging.

2 - Secret meetings and bids seem to be less than secret.
Confidential meetings and bids are very popular targets for corporate spies. How would you like the plans for the corporate takeovers you're planning to become public knowledge? Would copies of your product designs be of any use to your competitors? Would it be beneficial for your competitors to know how much you're quoting for the same project?

3 - People seem to know your activities when they shouldn't.

4 - You have noticed strange sounds or volume changes on your phone lines.
This is commonly caused by an amateur eavesdropper when they attach a wiretap, or activate a similar listening device. Surveillance devices often cause slight anomalies on the telephone line such a volume shift or drop-out. Professional eavesdroppers and their equipment usually do not make such noises; so if this is going on it could indicate that an amateur eavesdropper is listening in. On the other hand you could simply be experiencing a flaw in the line, but you should check it out.

5 - You have noticed static, popping, or scratching on your phone lines.
This is caused by the capacitive discharge which occurs when two conductors are connected together (such as a bug or wiretap on a phone line). This is also a sign that an amateur eavesdropper or poorly trained spy is playing with your phone lines. It could be nothing more then a problem with your phone line or instrument, but a TSCM person should evaluate the situation to make sure.

6 - Sounds are coming from your phones handset when it's hung up.
This is often caused by a hook switch bypass, which turns the telephone receiver into a eavesdropping microphone (and also a speaker). There is probably somebody listening to everything you say or do within twenty feet of the telephone (if this is happening).

7 - Your phone often rings and nobody is there, or a very faint tone, or high pitched squeal or beep is heard for a fraction of a second.
This is an indicator of a slave device, or line extender being used on your phone line. This is also a key indicator of a harmonica bug, or infinity transmitter being used. Of course it may also be nothing more then a fax machine or modem calling the wrong number (but a TSCM person should evaluate the situation to make sure).

8 - You can hear a tone on your line when your phone is on the hook (by using an external amplifier).
To check for something like this you would have to obtain a "recorder starter" interface (with a VOX option), or some kind of a high gain audio amplifier such as a uAmp or Kaiser 1059. Then with the phone hung-up listen to your telephone wiring. If you hear a faint solid dual tone it is a dead giveaway of someone using a "slave" eavesdropping device on your (or one of your neighbors) telephone lines. Such devices create a "command tone" when the subject hangs up the phone (so you must ensure that all of your phones are hung-up). On an added note: the most common command tones for illicit eavesdropping devices are 2100 Hz and DTMF-C, but any tone combination may be used.

9 - Your AM/FM radio has suddenly developed strange interference.
Many amateur and spy shop eavesdropping devices use frequencies within or just outside the FM radio band, these signals tend to drift and will "quiet" an FM radio in the vicinity of the bug. Look for the transmissions at far ends of the FM radio band, and at any quiet area within the FM band. If the radio begins to squeal then slowly move it around the room until the sound become very high pitched. This is referred to as feedback detection or loop detection and will often locate the bug. The "stereo" function should be turned off so the radio is operating in "mono" as this will provide a serious increase in sensitivity. If you find a "squealer" in this manner then immediately contact a TSCM and get them to your location FAST.

10 - Your car radio suddenly starts "getting weird"
Keep in mind that the antenna your car radio uses may be (and often is) exploited by an eavesdropper, and that such usage may interfere with radio reception (so be concerned if you automobile radio suddenly starts getting weird).

11 - Your television has suddenly developed strange interference.
Television broadcast frequencies are often used to cloak a eavesdropping signal, but such a devices also tends to interfere with television reception (usually a UHF channel). Televisions also "suck in" a lot of RF energy and because of this are very sensitive to any nearby transmitters (this is technically called "Bandwidth, and TV signals use a lot of it). A small handheld television with a collapsible antenna may be used to sweep a room. Carefully watch for interference around channel numbers 2, 7, 13, 14, 50-60, and 66-68 as these frequencies are very popular with eavesdroppers.

12 - You have been the victim of a burglary, but nothing was taken.
Professional eavesdroppers often break into a targets home or office, and very rarely leave direct evidence of the break-in; however, occupants of the premises will often "pickup on something not being right" such as the furniture being moved slightly.

13 - Electrical wall plates appear to have been moved slightly or "jarred".
One of the most popular locations to hide eavesdropping devices is inside, or behind electrical outlets, switches, smoke alarms, and lighting fixtures. This requires that the wall plates be removed. Look for small amounts of debris located on the floor directly below the electrical outlet. Also, watch for slight variations in the color or appearance of the power outlets or light switches as these are often swapped out by an eavesdropper. Also note if any of the screws which hold the wall plate against the wall have been moved from their previous position.

14 - A dime-sized discoloration has suddenly appeared on the wall or ceiling.
This is a tell tale sign that a pinhole microphone or small covert video camera has been recently installed.

15 - One of your vendors just gave you any type of electronic device such as a desk radio, alarm clock, lamp, small TV, boom box, CD player, and so on.
Many of these "gifts" are actually Trojan horses which contain eavesdropping devices. Be very suspicious of any kind of pen, marker, briefcase, calculator, "post-it" dispenser, power adapter, pager, cell phone, cordless phone, clock, radio, lamp, and so on that is given as a gift. That little gift the salesman left for you may be a serious hazard.

16 - A small bump or deformation has appeared on the vinyl baseboard near the floor.
Strong indicator that someone may have concealed covert wiring or a microphone imbedded into the adhesive which holds the molding to the wall. Such deformation will often appear as a color shift, or lightening of the color.

17 - The smoke detector, clock, lamp, or exit sign in your office or home looks slightly crooked, has a small hole in the surface, or has a quasi reflective surface.
These items are very popular concealment for covert eavesdropping devices. Often when these devices are installed at a target location they are rarely installed straight. Also watch out for things like this that "just appear", or when there is a slight change in their appearance.

18 - Certain types of items have "just appeared" in your office of home, but nobody seems to know how they got there.
Typical items to watch for and beware of are: clocks, exit signs, sprinkler heads, radios, picture frames, and lamps.

19 - White dry-wall dust or debris is noticed on the floor next to the wall.
A sign that a pinhole microphone or video camera may have been installed nearby. It will appear as if someone has dropped a small amount of powdered sugar either on the floor, or on the wall.

20 - You notice small pieces of ceiling tiles, or "grit" on the floor, or on the surface area of your desk. Also, you may observe a cracked, chipped, or gouged ceiling tiles, or ones that are sagging, or not properly set into the track.
Prime indicator that a ceiling tile has been moved around, and that someone may have installed a hidden video camera or other eavesdropping device in your office or near your desk. Also watch for cracks or chips in the ceiling tiles. Amateur and poorly trained spies tend to crack or damage acoustical tiles. The ceiling tiles in any executive areas should never contain any cracks, nicks, gouges, or stains. Any ceiling tile that becomes damaged (for what ever reason) should immediately replaced and the cause of the damage documented. In such cases it is also wise to have a TSCM specialist inspect the area around the chipped, broken, or damaged tile to determine if a hostile eavesdropping device may have been introduced.

21 - You notice that "Phone Company" trucks and utilities workers are spending a lot of time near your home or office doing repair work.
If you see the same or similar vehicles more then three times then you may have a serious problem (at least according to the U.S. State Department training course on counter surveillance).

22 - Telephone, cable, plumbing, or air conditioning repair people show up to do work when no one called them.
A very common ruse which eavesdroppers use to get into a facility is to fake a utility outage, and then show up to fix the problem. While they are fixing "the problem" they are also installing eavesdropping devices. Some of the more popular outage involve power, air conditioning, telephone, and even the occasional false fire alarm.

23 - Service or delivery trucks are often parked nearby with nobody (you can see) in them.
These vehicles are commonly used as listening posts, be very cautious of any vehicle which has a ladder or pipe rack on the roof. Also, be wary of any vehicle which has tinted windows, or an area which you cannot see though (like a service van). The listening post vehicle could be any vehicle from a small Geo Tracker, Suburban, Blazer, Trooper, or Cargo Van. Look for any vehicle which could conceal a person in the back or has tinted windows. Also, keep in mind that the eavesdropper may relocate the vehicle several times, so look around. Typically, eavesdroppers like to get within 500-750 feet from the place or person they are eavesdropping on.

24 - Your door locks suddenly don't "feel right", they suddenly start to get "sticky", or they completely fail.
Prime evidence that the lock has been picked, manipulated, or bypassed. Try to always use biaxial locks with sidebars (such as ASSA or Medeco). Also, only use double sided deadbolts in all doors, and good quality window bars on all windows, and a good quality door bar on all doors not used as a primary entry doors.

25 - Furniture has been moved slightly, and no one knows why.
A very popular location for the installation of eavesdropping device is either behind, or inside furniture (couch, chair, lamp, etc.) People who live or work in a targeted area tend to notice when furnishings have been moved even a fraction of an inch. Pay close attention to the imprint which furniture makes on rugs, and the position of lamps shades. Also watch the distance between furniture and the wall as eavesdroppers are usually in a hurry and rarely put the furniture back in the right place.

26 - Things "seem" to have been rummaged through, but nothing is missing (at least that you noticed).
A "less than professional spy" will often rummage through a targets home for hours, but very rarely will they do it in a neat and orderly fashion. The most common "rummaging" targets are the backs of desk drawers, the bottom of file cabinets, closets, and dresser drawers.

27 - An eavesdropper sends you a copy of your private conversations.
As simple as it seems this is the strongest indicator, and solid proof of eavesdropping. An eavesdropper will sometimes send a victim a copy of a private conversation they intercepted in an attempt at blackmail, or in an attempt to terrorize, or to just stalk the victim. This is commonly seen in civil lawsuits, criminal court cases, marital problems, shareholder disputes, custody battles, and other situations were one side has a position of weakness and is trying to physiologically undermine their opponent.

When contacting any TSCM firm please remember not to call
from any suspect area, do not use your cellular telephone,
do not use your cordless phone, and do not use any suspect
telephone (instead call from a sterile phone somewhere outside
the suspect area.


Who Gets Bugged?

High Threat Business Situations

Your company has stock which is publicly traded (or will be soon)
Your company is having labor problems, union activities, or negotiations
Your company is involved in any type of litigation or lawsuit
Your company has layoffs pending (or they have just happened)
Your company is involved in the fashion, automotive, advertising, or marketing industry

Anyone can be the target of covert eavesdropping, however; some people are under greater risk than others because of financial position, occupation, legal, or domestic situation.

Spouses bug each other on a regular basis
Parents bug children
Businessmen bug other businessmen
Scientists bug other scientists
Students bug professors
Attorneys bug other attorneys (and their clients)
Insurance companies bug accident victims, and other claimants
Construction companies bug other construction companies
Salesmen bug clients
Collection agencies bug debtors
Police officers bug suspects
Executive recruiters bug personnel directors
Rock fans bug rock musicians
Department stores bug customers and merchandise

The Neighbors, Coworkers, Friends, Enemies, Strangers, Your Spouse,
Industrial Spies, Government Agents, Your Insurance Company, Your Boss...


High Threat Personal Situations (when to be seriously concerned)

You (or someone close to you) have been:

Involved in any type of litigation or lawsuit
Been questioned, arrested or arraigned by the police
In the process of getting married, divorced, or separated
A minister or religious leader (i.e.: priest, rabbi, deacon, bishop, elder...)
Running for any type of elected public office
Elected to any public office (i.e.: mayor, selectman, school principal)
Executive or scientist at any large company
Recently filed a insurance claim
Engaging in political demonstrations or activism
Employed by a defense contractor, Department of Energy, etc...
Private Investigators have been "poking" around
You are in the upper income bracket

Keep in mind that anybody with Money, Power, Influence, or access to sensitive, classified, or personal information is at serious personal risk.
On a related note: If you work (or have worked) for any kind of military, governmental, law enforcement or judicial agency the possibility of you being targeted for eavesdropping is very high. Such eavesdropping can come from either side of the law, and is rarely legal or court sanctioned.

Additionally, people married to, associated with, divorced from, getting divorced from, dating, or getting intimate with a member of law enforcement, private security, PI, or any level of the judicial system should be concerned about illegal eavesdropping (yes, cops love to bug their wives and girlfriends).


High Threat Occupations

Attorney
Doctor
Chiropractor
Dentist
Architect
Police Officer
Court Clerk
Judge
Elected to any public office
Mayor
Selectman
School Principal
College Professor
Product Engineer
Software Developer
Executive at any large company
Scientist at any large company
Employed by any defense contractor
Employed by the Department of Energy
Any minister or religious leader (i.e.: deacon, bishop, elder...)
Corporate Buyer or Purchasing Agent
Employee of a Construction Contractor
Any type Sales or Marketing
Labor or Union Official
Fashion
Advertising
Personnel Directors

According the FBI the following types of businesses are under EXTREME risk and are popular targets of illegal bugging, wiretapping, and similar surveillance:

Materials:

Materials synthesis and processing
Electronic and photonic materials
Ceramics
Composites
High-performance metals and alloys

Manufacturing:

Flexible computer-integrated manufacturing
Intelligence processing equipment
Micro- and nanofabrication
Systems management technologies

Information and Communications:

Software
Micro and optoelectronics
High-performance computing and networking
High-definition imaging and displays
Sensors and signal processing
Data storage and peripherals
Computer simulation and modeling

Biotechnology and Life Sciences:

Applied molecular biology
Computational Chemistry
Medical technology

Transportation:

Aeronautics
Surface transportation technologies

Energy and Environment:

Energy technologies
Pollution minimization, remediation, and waste management




[last edit 9/12/2009 6:11 PM by Oryx - edited 1 times]

rz350 

This member has been banned. See the banlist for more information.


Location: toronto
Gender: Male
Total Likes: 0 likes


The looniest, zaniest, spontaneous, sporadic Impulsive thinker, compulsive drinker, addict

 |  | 
Re: Warning Signs of Covert Eavesdropping or Bugging
< Reply # 1 on 9/14/2009 2:37 AM >
Reply with Quote
Posted on Forum: UER Forum
All very good info.

Counter espionage. You should clean your of a tail if you suspect one. Do this by taking an erratic route to your destination, possibly by a few methods. e.g. walk to your bicycle, bicycle to your car, drop your car at public transit, take the transit, get off, and jump in cab.

It makes it very hard for the tail to keep on you. And look out for the same person always around, or people who look all similar. (i.e. a semi uniform worn by some agencies and the dress regulations relating to hair, beards, ect)




ducky 999
Oryx 


Location: Who knows
Gender: Neither
Total Likes: 40 likes


:|

 |  | 
Re: Warning Signs of Covert Eavesdropping or Bugging
< Reply # 2 on 9/14/2009 4:02 AM >
Reply with Quote
Posted on Forum: UER Forum
How likely is it that public phones can be tapped? Like payphones. Is it harder to do?




MindHacker 


Location: Suburbs of DC
Gender: Male
Total Likes: 1 like


If you spot a terrorist arrow, pin it to the wall with your shoulder.

 |  | 
Re: Warning Signs of Covert Eavesdropping or Bugging
< Reply # 3 on 9/15/2009 1:58 AM >
Reply with Quote
Posted on Forum: UER Forum
Posted by Oryx
How likely is it that public phones can be tapped? Like payphones. Is it harder to do?


They need a warrant, and then to use the info in court they need to have eye witnesses placing you on the phone at a certain time (usually done with camera's), and they are supposed to stop watching the call after a certain amount of time (5 minutes? I don't remember exactly) if nothing relevant is said.

Unless you don't mean the cops, in which case payphones are easy, since no locks need to be picked, no security systems disabled, no guards dodge in order to get to it.




"That's just my opinion. I would, however, advocate for explosive breaching, since speed and looking cool are both concerns in my job."-Wilkinshire
rz350 

This member has been banned. See the banlist for more information.


Location: toronto
Gender: Male
Total Likes: 0 likes


The looniest, zaniest, spontaneous, sporadic Impulsive thinker, compulsive drinker, addict

 |  | 
Re: Warning Signs of Covert Eavesdropping or Bugging
< Reply # 4 on 9/17/2009 12:42 AM >
Reply with Quote
Posted on Forum: UER Forum
Posted by Oryx
How likely is it that public phones can be tapped? Like payphones. Is it harder to do?


Depends who's tapping it, if the agency tapping doesn't give a fuck if its admissible in court or not(particularity if they plan to never disclose the fact they tapped it, because they have other plans), its very easy.

otherwise it requires a warrant and needs to be visually monitored to confirm the person placing the call.




ducky 999
UER Forum > Private Boards Index > Section One Extreme UE and SPY talk > Warning Signs of Covert Eavesdropping or Bugging (Viewed 3177 times)


Add a poll to this thread



This thread is in a public category, and can't be made private.



All content and images copyright © 2002-2024 UER.CA and respective creators. Graphical Design by Crossfire.
To contact webmaster, or click to email with problems or other questions about this site: UER CONTACT
View Terms of Service | View Privacy Policy | Server colocation provided by Beanfield
This page was generated for you in 62 milliseconds. Since June 23, 2002, a total of 737123294 pages have been generated.