[ News ] [ Paper Feed ] [ Issues ] [ Authors ] [ Archives ] [ Contact ]


..[ Phrack Magazine ]..
.:: Phone Bugging: Telecom's Underground Industry ::.

Issues: [ 1 ] [ 2 ] [ 3 ] [ 4 ] [ 5 ] [ 6 ] [ 7 ] [ 8 ] [ 9 ] [ 10 ] [ 11 ] [ 12 ] [ 13 ] [ 14 ] [ 15 ] [ 16 ] [ 17 ] [ 18 ] [ 19 ] [ 20 ] [ 21 ] [ 22 ] [ 23 ] [ 24 ] [ 25 ] [ 26 ] [ 27 ] [ 28 ] [ 29 ] [ 30 ] [ 31 ] [ 32 ] [ 33 ] [ 34 ] [ 35 ] [ 36 ] [ 37 ] [ 38 ] [ 39 ] [ 40 ] [ 41 ] [ 42 ] [ 43 ] [ 44 ] [ 45 ] [ 46 ] [ 47 ] [ 48 ] [ 49 ] [ 50 ] [ 51 ] [ 52 ] [ 53 ] [ 54 ] [ 55 ] [ 56 ] [ 57 ] [ 58 ] [ 59 ] [ 60 ] [ 61 ] [ 62 ] [ 63 ] [ 64 ] [ 65 ] [ 66 ] [ 67 ] [ 68 ]
Current issue : #26 | Release date : 1989-04-25 | Editor : Taran King
Phrack Inc. XXVI IndexKnight Lightning & Taran King
Computer-Based Systems for Bell System OperationTaran King
Getting Caught: Legal ProceduresThe Disk Jockey
NSFnet: National Science Foundation NetworkKnight Lightning
COSMOS: COmputer System for Mainframe OperationS (Part One)King Arthur
Basic Concepts of TranslationChief Executive Officers & Dead Lord
Phone Bugging: Telecom's Underground IndustrySplit Decision
Internet Domains: FTSaga Appendix 3 (Limbo To Infinity)Phrack Staff
Phrack World News XXVI Part 1Knight Lightning
Phrack World News XXVI Part 2Knight Lightning
Phrack World News XXVI Part 3Knight Lightning
Title : Phone Bugging: Telecom's Underground Industry
Author : Split Decision
                                ==Phrack Inc.==

                     Volume Three, Issue 26, File 7 of 11

                 <><><><><><><><><><><><><><><><><><><><><><>
                 <>                                        <>
                 <>              PHONE BUGGING             <>
                 <>                                        <>
                 <>     Telecom's Underground Industry     <>
                 <>                                        <>
                 <>            By Split Decision           <>
                 <>                                        <>
                 <><><><><><><><><><><><><><><><><><><><><><>


In today's landscape of insider trading, leveraged buyouts and merger mania,
it is no great shock that a new underground industry has developed within
telecom -- eavesdropping.

Bugs are cheap (starting at $30) and can be installed in as little as 10
seconds.  And you can bet your bottom $1 million that this expense pales in
comparison to the rewards of finding out your takeover plans, marketing
strategies, and product developments.

According to Fritz Lang of Tactical Research Devices (Brewster, NY), there is a
virtual epidemic of bugging going on in the American marketplace.  Counter-
surveillance agencies like TRD have sprung up all over.  They search for
eavesdropping equipment, then notify the client if they're being tapped.  It's
up to the client to respond to the intrusion.

Each of TRD's employees is a retired CIA or FBI operative.  Formerly, they
planted bugs for Uncle Sam.  Since it's illegal to plant bugs for anyone else,
these men now engage in counter surveillance work, pinpointing eavesdropping
devices, and sometimes the culprits who put them there, for TRD's client
companies.


Where Do They Put The Bugs?
%%%%%%%%%%%%%%%%%%%%%%%%%%%
Your TELEPHONE, of course, is a convenient place to install an eavesdropping
device.  But this doesn't mean that the illegal tapping will be limited to your
phone conversations.

Electronic phones have microphones which are always "live," even when the
telephone is on-hook.  Stick an amplifier and transmitting unit to the
microphone, and you have constant surveillance of all conversations taking
place in that room, whether or not the phone is off-hook at the time.

A device rapidly gaining popularity among today's wire-tappers is a mouthpiece
containing a tiny bug, which looks exactly like the one of your 2500 set.  All
it takes is one trip to the water cooler or the men's room for the insider to
surreptitiously make the old switcheroo.

LOUDSPEAKERS are another favorite location for wire-tappers, because they can
pick up conversations when not in use.  Paging systems, piped in music, and
telephone systems all employ some variety of amplifier which the culprit can
use to his advantage.

LINE INTERCEPTORS allow eavesdroppers more extensive coverage of your
activities, since they can monitor more than on-line communications from a
single listening post.

But really, the number of places you can find a bug is limited only by the
tapper's imagination.  Light switches, plugs, clocks, calculators, legs of
wooden chairs, staplers, ashtrays, the underside of a toilet bowl -- all of
these items have proved fertile territory for the little critters.


Tools For Finding The Bugs
%%%%%%%%%%%%%%%%%%%%%%%%%%
TRD's people use a patented Surveillance Search Receiver to locate the bugs.
The Receiver uses a broad-band radio spectrum, from 25 kHz to 7 gHz.

If there is an unaccounted-for radio frequency emission on the premises, the
Receiver will tune it in on a small spectrum monitor.  It then traces the
emission to its inevitable source, the bug.

For room bugs, they also use a Non-Linear Junction Detector, which can pinpoint
all electronic circuit diodes or resistors in the architecture of the building.

The Detector emits a high microwave signal into walls, furniture, et al.,
causing any circuit hidden within to oscillate.  As soon as they oscillate,
they become detectable.

Mr. Lang clears up a misconception about the Russians bugging our embassy in
Moscow.  "They didn't riddle the building with actual bugs, instead, they
buried millions of little resistors in the concrete."

The embassy, therefore, became a hot bed for false alarms.  Whenever the
American counter-measure people came in with their detectors to look for a bug,
they'd pick up oscillation readings from the countless resistors and
capacitors buried in the walls.  Finding any real bugs would be infinitely more
difficult than finding the old needle in a haystack.

For finding wire-taps along the phone lines, TRD uses a computerized electronic
Telephone Analyzer.  The unit runs 18 different tests on phone lines between
the CPE block and the Central Office (CO).  Resistance, voltage, and line
balance are just a few of them.  Once they locate a tapped line, they send a
pulse down it with a time-domain reflectometer, which can pinpoint exactly
where in the line the bug has been affixed.

Bear in mind that wire-tapping is extremely difficult and time consuming.  As
much as 20 hours of conversations has to be monitored every single business
day.  Because of this, key executives' telephones are usually the only ones
slated for a wire-tap.


Catching The Culprit
%%%%%%%%%%%%%%%%%%%%
Finding a wire-tap is easier than finding the spy who bugged your office.
Direct hardwire taps can be traced to the remote location where the snoop
stores his voltage-activated electronic tape recorder.  After you've found the
monitoring post, it's a matter of hanging around the premises until someone
comes to collect the old tapes and put in fresh ones.

As for room bugs, your best bet is to make the device inoperable, without
removing it, and wait for the eavesdropping to come back to fix or replace it.


Once Is Never Enough
%%%%%%%%%%%%%%%%%%%%
Some of TRD's clients have their offices checked monthly, some quarterly.
After the initial sweep, you can have equipment installed on your phone lines
which constantly monitors any funny stuff.

As for TRD, they offer a money-back guarantee if they fail to detect an
existing bug on your premises.  Mr. Lang assures us that Fortune 500 company
has been bugged to a greater or lesser extent.  That's how out-of-hand the
problem is getting.

Toward the end of our conversation, Mr. Lang pauses.  "So you're really going
to print this, huh?  You're really on the up and up?"  Then he spills the
beans.

It turns out Mr. Fritz Lang is really Mr. Frank Jones (he says), a licensed
private investigator with a broad reputation in the industry.  He used the
alias because he suspected I was from a rival counter-measure agency, or worse,
a wire-tapper, trying to infiltrate his operations.

Which quite possibly I am.  You can't trust anybody in this spy business.
_______________________________________________________________________________
[ News ] [ Paper Feed ] [ Issues ] [ Authors ] [ Archives ] [ Contact ]
© Copyleft 1985-2014, Phrack Magazine.