Drug testing

Eavesdropping and Counter-Measures: Technology and Techniques

You need to know how to protect yourself, since your security department or any consultant may not be truly aware of these threats and therefore not dependable. Since September 11th, a number of businesses entered the security field with little to no knowledge of the trade itself; only of its profit potential. Even outfits that have been around for some time and well-established have not been able to stay current with the latest innovations.

Realistically, viewing your threat level has to be considered since everyone should expect some sort of impending privacy issue no matter how small. Thanks largely to the Internet you can arm yourself with much of the knowledge and equipment that the so-called experts use. If a respected agent of computer crimes for the Secret Service in NYC had his T-Mobile Sidekick hacked, who knows what else happens out there to others in any business.

Realistically, viewing your threat level has to be considered since everyone should expect some sort of impending privacy issue no matter how small. Thanks largely to the Internet you can arm yourself with much of the knowledge and equipment that the so-called experts use. If a respected agent of computer crimes for the Secret Service in NYC had his T-Mobile Sidekick hacked, who knows what else happens out there to others in any business.

We'll start acoustic ducting evaluation is the inspection of air ducts, baseboard heaters, coffee rooms, lounges, bathrooms or any way the architecture of a building can transfer sound. A simple example is to put your ear to a wall and listen.

Basically anything that requires the use of the naked ear is called an acoustic bug. Softer surfaces can help muffle sounds but there are more efficient means out there. So be aware that the way an office site is designed can act as a conduit for conversations. Also, be aware of any changes can have adverse affects. Simply playing music can do wonders for masking conversations.

Inspection of telephone equipment and wiring is called line analysis. This is trickier than it seems since sometimes a possible weakness has an actual purpose to the telecommunication system. Especially if it requires constant maintenance and software upgrades.

All instruments should be opened and inspected. Ideally they should be compared with a known safe phone or device. If you're not sure, just remove that piece of loose components and wiring and see if the phone still works. The wiring can be modified in a switch within the handset that essentially turns it into a microphone. If you bypass this hook switch, you can listen in from anywhere on the landline. Technical equipment won't be able to detect this. Time Domain Reflectometry is the sending of a pulse down a telephone line. If there is some sort of disruption; a wall outlet or wiretap; a portion of the pulse will be sent back to the device called a Time Domain Reflectometer (TDR). Then the time difference between the reflection and the continuous run is measured. This helps in determining the distance to the anomaly.

These devices can perform all sorts of diagnostics including mapping a wire network. That can be useful in locating a hidden phone. Hidden phones have several obvious uses such as making long distance phone calls to being placed in an office across the street to receive betting requests by bookies; a practice called back strapping. If you open up the modular jacks where you connect your phone, you'll usually see four wires. In most cases only two wires are connected; commonly known as ring and tip. If you see all four connected, be aware that is not usually consistent for most wiring situations, especially in homes. The other two wires could be used for a bugging device.

For instance, the microphone you use in a voice recorder can be cut in half. Connect the mike head to one set of unused wires anywhere on the phone wire. Then, so long as there are no breaks in the wire, connect the other end to the jack that connects to your recorder. Now place your recorder to be VOX (voice) activated and now you have an extremely reliable bug. By the way, this should be manually inspected for since using a specialized bug detector may see nothing wrong or inconsistent. A bug such as this that connects to a wire is called a direct tap.

The other general type is called an inductive tap. This is when an instrument is outside a wire but can still distinguish what's transacting over a wire. They are harder to detect since they don't draw power from the line such a standard telephone would. These are referred to as snuffle bugs. A simple probe used in hunting wire signals has a speaker, which can display sounds. By accident one day I was working on an apartment intercom system while using a probe. I could hear conversations throughout the building quite clearly just through the intercom boxes mounted on walls from the master unit in the basement.

If you're using wireless headsets or cordless phones, the radio signals can be intercepted. A cordless phone acts like a radio, but depending on the frequency and a few other factors, can make interception extremely difficult. With some manufacturers, you can buy the same model as your neighbors or the office and have it join their phone system. Double check Caller ID boxes to see if they also record numbers dialed besides obviously those being received. If you're using VOIP (Voice Over IP), remember that calls can be recorded in a fashion identical to intercepting data between two computers.

These packets of data can reassemble an audio file. Obviously electronic devices possess semiconductor components such as diodes, resistors and such. The method to hunt for these components is called Non-Linear Junction Detection (NLJD). The NLJD unit emits a radio signal while listening for the return signal from an electronic device. This becomes very useful when a bug is embedded in a picture frame or wall. The eavesdropping device doesn't have to be active for it to be discovered. If a device is active and transmitting wirelessly (or even on a wire), you can detect it with a Radio Frequency Spectrum Analyzer. Depending on the detection device used, you can determine whether voice, data or video is being sent, and possibly listen to the data. Try to use different size antennas or buy one that collapses. Different frequencies can be detected more efficiently by using various sizes. The use of filters with antennas can also help pinpoint devices on specific frequencies.

Electronics such as computers, FAX machines and especially CRT monitors can radiate electromagnetic signals or pulses that can be received by other equipment. This is known TEMPEST. One way to complicate the surveillance of this is to use certain fonts and line walls or equipment with different gauges of copper mesh wire. You can further enhance this posture by using special paints, which block radio transmissions.

Radio waves will look for a leak or break, so be careful of defensive applications. One-way window tints can help in blocking signals. Since an electronic device could generate some heat they can be detected in another way. The use of a thermal imagery device can detect and actually see minute amounts of heat radiated for your viewing. You can hide the heat signatures by using creams or neoprene. Technology exists to collect information from blinking LEDs of modems, routers, print servers and similar devices. You can only see some general blinking but with the use of properly tuned optics, filters, oscilloscopes and good timing you can discern much more. One of the LEDs on your keyboard can be altered to blink while you are typing in a fashion similar to Morse Code. You can also use a tap in the keyboard that sends out radio waves again similar to Morse Code and no anti- virus software will ever be able to find it. Even when a CRT computer monitor is facing a wall the light can be in a sense read by its flickering emanations from some distance. A good defensive measure is to buy new LCD flat panel types.

Another approach to attacking FAX machines is to simply record the noises it makes and play it back to another machine. I used to do this for a client so they could keep a record of all the faxes they made and received. There are creative and potentially illegal defenses against wiretappers and Peeping Toms. One is to transmit an extremely high pitch down the wire, thereby rupturing the listener's eardrums. I knew someone who once sent a powerful electrical spike down his phone wire thereby destroying his divorced wife's recorder.

By the way, this leads to another topic-expect the device to be discovered someday. Don't leave your fingerprints on it. He found it and had it dusted, thereby producing some prints. My friend used this as leverage against the Private Investigator that planted it. Advice to Private Investigators, a word to the wise: if you do this part-time, hire someone who does this full-time. This P.I. lost his license and almost went to jail. The lawyer who recommended him got into a lot of trouble as well. He received some unwanted attention from the Feds because of his telephone dealings went across state lines and also happened to involve the Post Office.

There is another budding field related to this topic called Protective Intelligence. Currently there are only a few experts who do this kind of work.

A laser or an infrared beam can be used at a considerable distance from a target building. Conversational sounds can vibrate unto solid objects such as windows. The beam's reflection varies in relation to the movement to the window, which is received and converted back into something audible. To mask the sounds, you could attach a vibrating device (basically an altered electric razor) to the window.

Of course if the window is open, then a laser can target another object instead of the window. A beam of light or laser can be directed to go through a window onto a solid object thereby nullifying such defensive measures again. Generally you really can't detect such attacks unless the laser, infrared or light beam is being used that moment. Certain materials can be used to detect IR emissions, as well as the use of passive night vision gear. Certain fabrics or even a curtain may actually show the spot where a beam of light or laser is being focused. Unless the room is dusty or you have an artificial can smoke, you can follow the beam up to a point and guesstimate it's location. One type of optical bug is an infrared transmitter. When placed in the area of interest for transmission of the conversation to an infrared receiver which will then translate the conversation into an audible format.

Many of these same procedures used can be applied to locating hidden cameras. A relatively new device uses a series of lasers to seek out optics. This was originally intended to locate snipers by bodyguards.

I have listed the techniques, counter-measures and then the counter to the counter-measures to prevent any false sense of security. Usually constant vigilance is your best weapon besides knowing what to look for. Even if you find a "bug sweeper" with good credentials, certifications and experience, ask them detailed questions. Not just to test them but also for your own peace-of-mind. This makes our job easier and we appreciate greatly when dealing with knowledgeable customers.

chicago transportation service
In The News:

Tracking the progress of the third party testing we at PES are coordinating along with U-Plug Products LLC, of their 2 kW U-Plug magnet motor that is a 24"x6" portable cylinder weighing 20 pounds, expected to cost 2,000 USD. We want to run it three times longer (21 hours) than what the best batteries available could provide. (PESWiki; February-April 2016)
Pre-launch video announces a new LENR website coming March 1, 2016 at http://LookingForHeat.com The video is very well done as an entertaining piece that hopefully will go viral. (Free Energy Blog; February 21, 2016)
It's not easy to find a qualified testing agency that is also willing to sign off on something that appears to defy our existing understanding of the laws of physics. U-Plug has agreed to allow for a group of us scientists, including at least 3 PhDs to go test their unit and publish our report. (PESN; February 20, 2016)
So that this is quite clear, this is a test on a Regular Torch. NOT the ELFE flashlight. This is to compare them. 2 x NiMH AA 1.2v Battery's in a Regular Torch with a Halogen Bulb. Load is 2.8v and 0.85amps. (PESN; February 17, 2016)
Video explains the scientific principles behind how the ELFE flashlight harnesses endless free energy from the environment (Earth's magnetic field), which works better in some regions than others. It also shows the insides the torch. Uses the word "antennae," as one of the components. (PESN; February 14, 2016)
"The OPhone contains a capacitor that directly powers our phone. During extensive use this capacitor may become discharged, however this capacitor is being constantly trickle charged by Orbo. So after a period of time the capacitor will be recharged and the phone will be functional again. In essence the phone is charging itself." (Free Energy Blog; February 13, 2016)
The company that has figured out how to harness the earth's magnetic field to produce usable power and has been selling the ELFE flashlight (two more customer reports), is now developing a 3 kW generator. In two weeks, they are holding a business meeting for international distributors. (PESN; February 12, 2016)
Illinois company is gearing up to manufacture a 2 kW (115 volts, 17.3 amps) magnet motor that is load-following, portable, 24"x6" tube, weighing 20 pounds, very quiet, with 3-year warranty but expected to last at least 20 years with zero maintenance. Third-party tested. MSRP 2000 USD, beginning March, 2016, through distributors. (PESWiki; February 11, 2016)
The government agent who worked on this technology five decades ago, that is similar to Professor Steven E. Jones' Joule Ringer, thinks it is conceivable that we could eventually scale this solid state technology up to have a device the size and price of an air conditioner providing 20 kw. (PESWiki; February 9, 2016)
Nagendra Singh in Mumbai, India, informs us that they have built five of these and have two running for customers presently, in the 40 kVA range. "Presently it is too [expensive], costing 3200 USD per kva below 30 kva." (PESWiki; February 8, 2016)
The SunCell is described as a solid state "Sun in a Box." A 200 kW module would weigh around 250 pounds, with energy production cost being around 1 cent/kwh, so return on investment could be ten days. They are expected to be available commercially by Q1, 2017. (PESN; January 6, 2015)
"Today I received my Elfe Flashlight and it works. Time will tell if it meets the claims of automatically recharging, when depleted. If it holds, the claims a real breakthrough in FE technologie would have been accomplished." -- German customer (PESWiki; February 6, 2016)
The phone battery indicator stays near full even with heavy usage throughout the day. (The battery is charged by the internal OCube that pulls energy from the wheelwork of nature, solid state). (PESWiki; February 5, 2016)
The capacity of the Proton-3ND (Proton -3 Nano Diffusion) battery is projected to be 44 times the capacity of lithium batteries. Electric vehicles with these batteries would have more power and much more mileage at no extra charge. (PESN; January 4, 2016)
HH2 water fuel cell creates pure hydrogen off a 9-volt battery. This was a big diesel HH2 cell that was tested on a 16-liter Cat engine for CARB testing; yet it ran on very low amps and a low 9 volts. (PESWiki; February 3, 2016)
A former U.S. Government worker describes his effort to bring to public awareness (by highlighting things presently in the public domain) energy and anti-gravity technologies that the government had operational 50 years ago but has kept from the public. (PESN; February 2, 2016)
Imagine an incandescent bulb that is actually more efficient than LEDs! Well, it actually exists (MIT) and it does so by recycling light. (Free Energy Blog; February 2, 2016)
SMBC-Comics.com has posted a fun spoof on our skeptics. (Free Energy Blog; February 1, 2016)
"OK, so a lot of people are asking what's the difference between an Orbo power cell and traditional batteries." Batteries store energy, Orbo generates energy, then trickle charges a lithium ion battery.] (Free Energy Blog; February 1, 2016)
Mr. Keshe is as misleading in the field of free energy as he is regarding me. That has been my experience the years I've been exposedto his work. He takes something and blows it so far out of proportion that it barely resembles the fact from which it was extrapolated into infinity. He demands: "Close PESWiki now." (PESWiki; January 31, 2016)
They have achieved solid state operation using an electromagnetic pump to spray the molten silver between the electrodes for the 1000/second continuous pulsing for continuous power production. (Free Energy Blog; January 29, 2016)

Where Does Safety & Security Begin? Security Expert Explains

Personal safety begins with you. It is widely accepted that... Read More

Protect Your Family From Solar Flares

Protect your family from solar flares. Solar flares emit dangerous... Read More

Eavesdropping and Counter-Measures: Technology and Techniques

You need to know how to protect yourself, since your... Read More

What is Your Security Awareness IQ?

Are you aware of the need for security?Your awareness of... Read More

Avoiding Pickpockets

Every year, thousands of senior citizens fall prey to the... Read More

Alarm System: Glass Break Detectors

Alarm System Glass-break detectors- Glass-break detectors are also known as... Read More

Life Insurance - Wise Investment to Protect Your Home or Excessive Caution?

Life insurance is typically taken out to offer valuable financial... Read More

Surveillance Camera Positioning

It is a known fact that advertising is made to... Read More

Hurricane Preparedness

If you are about to get hit by a Hurricane... Read More

Alarm System: Window Screens

Alarm System Window Screens- Window screens are the ultimate perimeter... Read More

Alarm System Keypads

The keypad is the device you and your loved ones... Read More

Alarm System: Wireless Remotes

WIRELESS ALARM SYSTEM REMOTESThese remotes are also known as "key... Read More

How to Keep Your Postal Mail Private and Secure

Surreptious opening of most envelopes sent through the mail takes... Read More

The Case for Personal, Estate, Corporate and Child Abduction Security in today?s World

When one considers the historical nature of security applications and... Read More

Emergency Disaster Planning: Building a Bug-Out Kit

Report after report comes in about how many people couldn't... Read More

Alarm System: Smoke and Heat Detectors

Smoke & Heat Detectors- Smoke detectors are available that will... Read More

Kevlar Sheets for Your Home Walls

Home security is more important today than ever. You may... Read More

Infrared Goggle Pop Down in Hallways for Structure Fires

Most people who are killed in structure fires die from... Read More

Essentials For Hurricane Season

According to the National Oceanic & Atmospheric Administration, the East... Read More

Arson Watch Program Agency Interaction

This years fire season has already started and so far... Read More

Alarm System: Sirens

Alarm Sirens- There is both inside and outside sirens. Many... Read More

Someone Spying?

Someone Spying? So are the Teddy Bear and the Potted... Read More

Securing Home Water Supplies; Conservation of Water Planning

Generally when it rains the water runs off the house... Read More

Stand Alone Keyless Access - How Does It Work?

Security and convenience are usually delicately balanced. If something is... Read More

Pepper Spray Considerations

Choosing the Right Pepper SprayThere are so many types of... Read More

induction fluorescent jk induction lighting Pete's produce ..