home *** CD-ROM | disk | FTP | other *** search
- *******************************************
- * Samurai Cat *
- * Presents *
- * *
- * "SCANNING" *
- * *
- * The art of non-selective intervention. *
- *******************************************
-
- I would first like to make it clear that I am not talking about war-
- dialing when I use the term "scanning." Several years ago a fairly good
- science fiction film called "Scanners" was shown around the country. It dealt
- with people who could "scan," i.e., telepathically read the thoughts of other
- people in the area. The concept provided a unique look into some very private
- worlds.
- Unfortunately, I cannot show you how to read minds, but I can report on
- the next best thing. Please bear in mind this is for informational purposes
- only, many of the ideas detailed here are illegal, but people are carrying
- them out...
- This particular form of scanning is simply electronic surveillance of no
- particulalr target. Why would anyone scan? Well, some people are just
- naturally curious, while others have a more direct reason...
- For instance, a couple of years ago a man staying in a cheap hotel in San
- Francisco's "rough" district, the Tenderloin, was arrested after arguing with
- a counterman in the hotel's sleazy diner. The argument was only over a $3.00
- breakfast. Even so, the man became so infuriated he went back to his room,
- got a pistol and proceeded to threaten the waiter.
- Needless to say, the waiter suddenly changed his viewpoint about the
- relative principles involved in the argument. He also called the cops
- approximately two seconds after the pistol waving tennant retired from the
- diner.
- The cops kicked in the hotel door and arrested the man. Under his bed
- they found $175,000 in cash along with two ounces of heroin. The man had been
- staying there for a week pushing smack...
- Now just suppose you had been scanning the hotel and picked up on this
- activity. Exactly how long would it have bothered you conscience to have gone
- in during the ill-fated breakfast and borrowed the money?
-
- A day? Two days? 27 minutes?
-
- Scanning is done in concentric circles; one begins with the largest
- possible "data base" and proceeds to narrow it down to any points of interest.
- A typical scanner operates in a high density area; an apartment complex,
- a high rise building with windows that open or balconies, a large hotel/motel.
- Many scanners start with a long distance probe. This is usually
- accomplished with the artificial aid of a shotgun or parabolic mic, and a good
- amplifier/tape recorder.
- To put the probe into operation, the operator darkens his room as much as
- possible, opens the window, and if necessary, puts a view-killing, but
- transparent audio curtain over the opening. He then positions his long
- distance "ear" so it aims into an area of interest. Normally, the scanner
- will monitor the unit, recording everything for later analysis. This allows
- him to slowly check out a full 180 degree area for interesting pockets of
- information.
- If there is one area of particular interest, say a meeting room, or a
- certain apartment, automatic scanning can be emloyed by simply aligning the
- mic for best reception and then setting up a voice activated recorder so
- recording will commence only when audio is available. This procedure, while
- limiting the scope of the probe, automatically condenses days down into mere
- minutes...
- Remember, a good shotgun mic can sometimes, under optimum conditions,
- actually pick up conversations from behind a CLOSED window.
- Once an interesting conversation is recorded the scanner narrows his
- procedures down to more efficient methods of data collection. It should be
- noted that scanners usually make a written log, as well as an audio (or video)
- recording of all probes so any conversation can later be traced back to its
- source.
- Another very illegal method utilized by scanners is to take a small
- cassette recorder and equip it with an auto-phone start that turns the
- recorder on when a target phone is lifted off the hook. The entire unit is
- then loaded with fresh batteries and sealed inside a metal box. Often the
- scanner will paint the box an innocuous shade of black or grey and stencil
- something to the effect of "Southwestern Bell" (or whatever telco organization
- is within his sphere of operation) on the side. Then he locks the entire unit
- with a padlock, leaving only two small wires visible on the outside.
- The box is then mounted on a wall near a phone terminal box in the
- basement of an apartment complex. Or it can be attached to a telephone pole
- near a terminal board or "B" box (secondary terminal unit located some
- distance from the target's phone). Most telco employees, even if they happen
- to spot the unit, will not disturb it if it looks offical enough... A lack of
- communication in the phone company?
- The scanner then attaches his two wires to a pair of terminals, or
- telephone wires (the green and red pair) and goes about his business. At the
- end of a day or two, he returns to the scene of the crime, removes his
- cassette tape, and moves the wire leads to another set of contacts.
- Many scanners will even go to the trouble of obtaining a telco lineman's
- handset and/or climbing harness, leather tool belt, and so on, to avoid
- detection if they are spotted fooling around with telephone company equipment.
- When was the last time you questioned a lineman?
- In this fashion, the scanner can get an inside glimpse of a number of
- telephone conversations. If he stumbles across something of interest, he then
- consults his log for the wire number, checks with CNA, or the telco computer
- (an auto readback system operated by the phone company can be gotten from a
- friendly employee) to get numbers, names and addresses.
- Outgoing calls can be deciphered by simply slowing down the recorder and
- counting the numbers of pulses or comparing the tones to a recording of a
- touchtone phone.
- A more direct method is to employ one of the through-the-wall type
- devices to check out the neighbors. Many scanners carry such a device with
- them in case they check into a motel, or visit a friend's apartment.
-
-
- OPPORTUNITY IS POWER
-
- In room-to-room scanning a log is, again kept. If the scanner feels
- anything is/will be of interest he will often run down the identity of the
- targets by tracing their license numbers or whatever means available and
- enters the finding in the log for later perusal.
- Another favorite scanner trick is to place a bug, either one with long
- lasting batteries, or an AC current operated model, in a room where something
- of interest might conceivably happen in the future. Targets of this type of
- scanning would be conference rooms, a "hot" switchboard, or even in an
- expensive motel room.
- Scanners have been known to unscrew the front plate of an electric socket
- in any hotel room they have the opportunity to stay in, install a
- not-too-expesive current drive bug and then "check in" whenever the mood
- strikes them...
- Short time scanning is another approach; for instance, a scanner drapes
- his coat over a chair in a public place (restaurant, library, etc.) and leaves
- his briefcase (which is of course equipped with a recorder) on the table.
- Upon his return, he retires to the restroom or other private place to peruse
- the conversations of his neighbors.
- A live angle is to constuct a mini-shotgun mic, or purchase something
- like the Viking Shotgun. Place it in a briefcase, wrapped package or nylon
- bag, run the earphone up your sleeve, under your shirt and into the nearest
- ear. In this manner the conversations of people at nearby tables (restaurant
- or bar), passersby (airport, hotel lobby, swimming pool) or even people
- accomplishing a specific functon (say at a bank teller's window) can be
- actively monitored in real time, from a safe distance.
- It is also possible to secrete a small transmitter inside of a number of
- common objects (books, wrapped packages, articles of clothing, etc.) which can
- be "left behind" on counters, under desks and tables, or in plain sight. In
- this instance the scanner simply sits within range and monitors the
- transmission.
- It is also possible to hard-wire a mic in any area to be placed under
- surveillance and simply listen in, except the risk is visibly increased as
- wires can be traced. Several motel owners have been arrested for this very
- thing.
- Of course it also possible to visual scan with the aid of telescopes,
- binoculars, video recorders, and night vision devices, but the information
- gained in this manner is often very limited unless matched with its audio
- counterpart.
- Scanners are often creative, I know one person who built a large white
- parabolic mic. He then mounted it on the roof of his building, pointing
- upward. To all outside appearances it appeared to be a satellite dish. Then
- day by day he gradually aimed his "dish" a few degrees earthward, until it was
- pointing in the direction of the apartment complex next door. By this time
- the neighbors were used to seeing the device and accepted it totally. My
- friend equipped his "dish" with a voice activated recorder.
- What do scanners learn? Frankly I don't know, anything is possible. One
- way to look at the entire phenomenon is that they are simply extending the
- range of their five senses. After all, they aren't hearing anything that
- isn't said of someone's own free will. Another view of the same situation is
- that they are nosy vultures, who are leeching private data illegally.
- Regardless of your loyalties, realize the procedures do exist. If you
- want to keep from from being scanned; KEEP YOUR BIG MOUTH SHUT!
-
- ******************************************************************************
- * Brought to you by Samurai Cat. Call DSF Devestator (214) 581-7565 *
- ******************************************************************************
-
-