Chemtrail Central
Member List
Image Database
Chemtrail Forum
Active Topics
Who's Online
Flight Explorer
Silver Orbs
News Archive

Chemtrail Central
Search   FAQs   Messages   Members   Profile

Post new topic Reply to topic
Chemtrail Central > Fighting Back

Author Thread

Joined: 02 Jan 2001
Posts: 526
Location: Earth
FIGHTING BACK #13 PostWed Jan 03, 2001 11:25 pm  Reply with quote  


The top TEN spybusting tips
1 - Trash Trawling
Dumpster diving, waste archeology, or trashing, all refers to rifling garbage in an effort to cull valuable information. This is believed to be the number one method of business and personal espionage.
Surprise. In and of itself, stealing garbage is legal. On May 17, 1988 the U. S. Supreme Court confirmed that there is no expectation of privacy, or ownership, once an item is left for garbage pickup. Scraps of seemingly useless information are synergistically related. The counterespionage process is one of reducing the availability of these puzzle parts. Shredding all waste paper is a major step in the protection process.
Recommendations & Tips
h Encourage the destruction of all waste paper.
h Purchase shredders appropriate for your needs.
h Use crosscut destruction for high levels of security.
h Computer paperwork and large volume waste require a central bulk shredder.
Snoops love it when you save confidential papers in a cardboard box under the desk. Shred it now. Do not entrust wastepaper destruction to paper recycling vendors. Destroy it before recycling. Don't forget: you also need shredders next to copiers and in the executives' home offices.
The big shredder purchasing mistake...
Buying just one large shredder for everyone to use. Reason: Not everyone will use it. Why? Some people are too busy to be bothered. The better choice is several convenient desk-side shredders. This is one perk / status symbol which has a very positive payback. Bonus... Some companies promote their use of shredders for protecting their clients' privacy. A service not offered by competitors.

2 - Bugs & Wiretaps
Although most snooping involves other methods listed in this briefing, electronic surveillance is the most devastating spy trick there is. Very private - and irrefutable - secrets are the target of this attack.
Common mistake... Saying, "Oh, I'm just being paranoid," when you suspect electronic surveillance. Think... You wouldn't be suspicious if everything were fine. Something is wrong.
Course of Action...
h Do not discuss your suspicions with others unless they have a real need to know.
h Do not discuss suspicions in suspected areas.
h Do not attempt a do-it-yourself solution.
h Do not waste money buying spybuster toys.
Seek professional guidance without delay. Contrary to what you see on television, in the movies, or in catalogs, detection of bugs and wiretaps is equipment and knowledge intensive work. Expect a professional sweep team to have about $100,000 dollars invested in their instrumentation. Their personnel will have deep experience in security, investigations, electronics and telecommunications.
Hint: Don't bother to check the yellow pages. Contact a corporate security director or professional security organization for a knowledgeable recommendation. It's worth the effort.
3 -The Drop-by Spies
Check - and photocopy - the credentials and work orders of anyone performing technical work in or around your offices. Double check. Verify the work was actually requested and necessary. This includes:
h telecommunications technicians
h computer technicians
h office equipment repair persons
h paper recyclers
h cleaning crews
h electricians
h et cetera
Have someone representing your interests accompany these visitors while on your property. If possible, have them complete their work during normal business hours. Outside contractors and unauthorized company employees should never be allowed to roam unescorted within areas containing sensitive information.
One professional snoop brags openly that any building can be entered at any time, simply by posing as the air conditioning / heating guy. His props include a clipboard with forms and an industrial thermometer. Optional: a 2-way radio and a hard hat. If challenged, he threatens not to come back for three weeks. Busy schedule, you know. No one wants responsibility for denying this guy entry.
Other tips...
Check your locks and alarm system regularly. Make sure each component really works. It is surprising how many effective-looking broken locks and alarm sensors are relied upon for protection. If key control has long since gone out of control, tackle the problem now. Change locks and set up a system which will work. Consider card key access.
When seeking assistance with security matters, be sure to hire consultants who don't also sell products, and who will not accept remuneration from companies they recommend.

4 - Hacking & Cracking
Espionage aimed specifically at personal computers, laptop computers, networks and remote access ports is rampant. Explain to everyone who keeps sensitive data in their computers why security precautions are necessary.
Example: The protect your laptop at all times rule. Replacement cost is not your only loss, consider...
h the valuable competitive and confidential data
h the time it took for someone to compile the data
h the time it will take to reconstruct the data
h company's modem telephone numbers, and mainframe passwords are probably stored on the drive.
When this information is lost, the company is vulnerable to...
h wholesale theft / corruption of mainframe data
h and sabotage via viruses, Trojan horses, etc.
Bottom line:
h Lower profitability.
h Reduced job security for everyone.
More computer security tips...
h Develop a communal sense of security responsibility.
h Limit physical access to computers by outsiders.
h Limit software access. Use quality passwords.
h Secure PC related materials: disks, backups, etc.
h Never leave an active terminal. Always log-off.
h Report suspected intrusions and altered data.
h Remove sensitive data from the PC when not in use.
h Protect memory media: floppies and optical disks.
h Copy commands can move sensitive data inadvertently.
h Do not rely on deletion commands. Format instead.
h Erase disks before disposal, or transfer to other use.
h Disconnect PCs from networks when not in use.
h Computers using phone lines need access protection.
h Do not use unsolicited or borrowed software.
h Backup all data on a regular basis.
h Reformat hard drives before retiring old computers.
h Do not discuss system security with anyone you don't know - no matter what they tell you.
Q. What is the first rule of espionage?
A. There are no rules. If you have what they want, they will use any means to get it. - M. Russell

5 - Mobile Phone Leeches
Cellular and cordless telephones are among the easiest of eavesdropping targets. Contrary to common perception, reception of these conversations is generally crystal clear, without static or interference. Each and every word can be understood. Use them with discretion.
Cellular radio-telephone communications can be received by the general public over hundreds of square miles. In addition to being an espionage windfall, monitoring of these transmissions has also become a national pastime with opportunistic hobbyists selling their "finds" as well.
Monitoring of cellular and cordless telephone transmissions is illegal. Do not rely on the laws to protect your privacy, though. They are generally considered unenforceable.
New techniques in cellular eavesdropping include computer assisted, totally automated monitoring. This allows monitoring of specific phones, 24-hours a day, from cell to cell, without human assistance. To protect car telephone conversations...
h Call in on a number which is not answered with a company name or other identifying information.
h Use first names and code words to identify special projects.
h Speak in general and uninteresting terms.
Home cordless telephones can be received up to one mile away. Use them only as an answering convenience. Switch to your regular telephone for increased - not absolute - security.
If you must have a cordless phone, buy one which operates in the 900 MHz frequency range using digital spread spectrum technology.
Other telephones which can be monitored include:
h Commercial airline and rail telephones.
h Ocean liner phone calls.
h Long distance calls sent via satellite.
h Long distance calls sent via microwave radio links.
6 - Technology Traitors
Technological advancements give us many communications conveniences. Portable telephones, for example. Unfortunately, they also bring new opportunities for the snoops.
Here are a few vulnerabilities you need to know about...
h Answering Machines. Messages left on many home units can be remotely accessed using a simple two or three digit code. Easy to hack. Most people never change the code which comes preset in new machines. Some units also have a remote listen-in feature. Read your manual carefully.
h Voice Mail. The business version of an answering machine can also be monitored. Use the longest password possible. Change it often.
h Baby Monitors. In reality, very sensitive room bugs which transmit 24-hours a day. Monitored by passing burglars to see if the house is empty, and by nosy neighbors. Use monitors sparingly. Plug the transmitter into a light timer. Keep baby's door closed.
h Fax Machines I. Some fax machines use disposable rolls of black film in their printing process. Used rolls contain an exact copy of all faxes received.
h Fax Machines II. Receiving an after hours fax transmission is similar to receiving mail without an envelope. Sensitive messages are routinely read by bored guards and workers who roam around the building burning up their overtime. Solution... Use a fax vault.
h Cordless Microphones. Presenters at meetings love using them. Unfortunately, they transmit crystal clear audio about a quarter mile. Ban them from any meeting to which the general public would not be invited.
h Dictation Machines. You may shred the rough drafts, lock up the file copies, and send the originals in security sealed envelopes... but the dictation tape sits on the secretary's desk waiting to be swapped.

7 - Meeting Chameleons
Off-site meetings, conventions, trade shows, seminars, etc. present the snoop with excellent opportunities for infiltration and information collection. Alert your people to the problems.
A simple briefing should include the following advisories...
h Off-site meetings are prime targets for snoops.
h Spy methods used may be unethical or illegal.
h Security will control meeting room access (24 hours).
h Electronic eavesdropping detection will be employed.
h Attendees must wear ID badges at all times.
h Never leave your laptop or briefcase unattended.
h Leave written proprietary information with security.
h Proprietary data should remain in the secured area.
h Do not discuss business in public areas.
h Be suspicious of strangers who befriend you.
h Report suspicious activity to security immediately.
Define Proprietary Information for your employees. It is information which is not general knowledge and is related to the company's products, methods, customers, plans, etc. It is any information which would cause the loss of profit, or a competitive advantage, if it fell into the wrong hands.

8 - The Silver Platter
Sometimes we just give information away. How many of the following items apply to someone you know?
h Unlocked offices, desks and file cabinets.
h Confidential paperwork left out overnight.
h Posted, shared or simpleton passwords.
h Phone directories which list everything but salary.
h Credit card, Social Security, and unlisted phone numbers posted in Rolodex files left on desktops.
h Answering probing questions over the phone from people they don't really know.
h Sensitive topics discussed with known gossips.
h etc., etc., etc.
The list gets longer the more you think about it. Solution: Think about it, the list will shorten.

9 - Business Phone Attacks
Feature-rich business phones provide snoops with a variety of powerful eavesdropping options. The phones themselves provide: electrical power; built-in microphones and speakers which can serve dual purposes; and ample hiding space for bugs and taps.
Telephone security checklist...
h Provide high-level security for telephone rooms.
h Restrict direct dialing into the main telephone switch.
o Some dangers of unauthorized phone system access include:
Complete deprogramming of the switch.
Secret reprogramming to allow access to...
free calls,
voice mail,
executive override features (which allow forced access to busy extensions),
bridge tap creation (allows silent monitoring from other extensions),
hands-free intercom (allows room monitoring from other phones),
and monitoring of the station message detail recording which maintains a record of all phone calls.
Recommendation: Replace the regular dial-up modem - which connects the switch to the outside line - with a call back type modem. With this configuration, PBX connections are limited to authorized phone numbers.
h Secure the on-site programming terminals.
h Be sure the System Administrator is trustworthy.
h Conduct periodic inspections for wiretaps.
h Conduct surprise audits of the software settings.
h Remove all unused wiring from sensitive areas.
h Make sure that voice mail and switch access passwords are high quality.
Ask phone system users to report all suspicious calls and voice mail aberrations to the security department immediately. In addition to snooping, these may also be indications of hackers trying to enter to steal services.

10 - Treason
Another type of spy - the trusted employee - is one of the most dangerous and hardest to spot. The most likely candidates are employees who may...
h Be disgruntled, possibly related to insufficient raises, promotions, etc.
h Have incurred large debts due to gambling habits, unavoidable personal circumstances, or drug use.
h Be involved with labor / management issues.
h Have entrepreneurial personalities.
Protection tips...
h Inspect for eavesdropping devices. These people have the time and opportunity to place and monitor.
h Selectively drop false bits of information and watch to see where they surface.
h Conduct background checks on all new employees and periodic checks on anyone with access to sensitive information.
h Check previous employment carefully.
h Uncover periods of employment not mentioned.
h Verify periods of unemployment.
h Living beyond their means may indicate extra income paid by the recipient of your business secrets.

The good news...
Espionage is preventable, and knowing a snoop's tactics is the first step toward obtaining protection. You now have enough knowledge to begin that process confidently.
 View user's profile Send private message

Post new topic Reply to topic
Forum Jump:
Jump to:  

All times are GMT.
The time now is Fri Mar 23, 2018 5:29 pm

  Display posts from previous:      

© 21st Century Thermonuclear Productions
All Rights Reserved, All Wrongs Revenged, Novus Ordo Seclorum, All Your Base