tag:blogger.com,1999:blog-63720942410496304272024-03-14T10:19:12.782-05:00CloakNetWelcome to CloakNet, providing intelligence news for all of us.
Disclaimers:
We are not a government entity nor do we attempt to represent one. We do not perform actual intelligence work, and have not acquired this information via spying. Info presented in this blog is for information and education, not crime or action. If you choose to engage in spywork, be prepared for the consequences (detainment, incarceration, etc.). You are responsible for your own actions.CloakSpyhttp://www.blogger.com/profile/12608616835137458262noreply@blogger.comBlogger21125tag:blogger.com,1999:blog-6372094241049630427.post-47512121181127984872007-10-17T20:21:00.000-05:002007-10-17T20:53:33.768-05:00Equipment: Spying on the CheapWhen engaged in the espionage hobby, the main obstacle is equipment. Since we are individuals, and not huge agency with undisclosed budgets, it can be difficult to find well-priced and useful equipment. Take the <a href="http://www.brickhousesecurity.com/sf-103.html">spy camera finder</a>, for instance. Clearly a useful gadget, but one that shouldn't be as expensive as it is.<br /><br />There are few sources that we can tap into. DealExtreme is definitely worth a look. RF detectors (bug detectors) that typically sell for $40 - 100 range go for under $15 here, including shipping. Both a <a href="http://www.dealextreme.com/details.dx/sku.3625">compact</a> and <a href="http://www.dealextreme.com/details.dx/sku.4278">regular </a>model are available. While ordering, why not buy a whole <a href="http://www.dealextreme.com/details.dx/sku.3414">set of UV lights</a>? The equipment you find here will be very competitively priced, and you might find some surprisingly <a href="http://www.dealextreme.com/details.dx/sku.11">useful</a> <a href="http://www.dealextreme.com/details.dx/sku.3258">things</a>.<br /><br />Another gadget that you might have right now is the now ubiquitous mini SD card. If you haven't purchased one, they can easily be found for $10 if you're willing to do some looking. The beauty of this card is that it something agencies would have literally killed for only a decade ago. With 1GB storage, you can easily store maps, one-time pads, or photos on the card using strong, <a href="http://www.truecrypt.org/">government level encryption.</a> Once you have placed your covert materials on the card, just open the back of your watch, place in the mini SD, and screw back on the cover. Works even better with screw-down case backs (you'll want to get a <a href="http://www.amazon.com/Waterproof-Watch-Case-Opener-Wooden/dp/B000EREX34/ref=pd_bxgy_jw_text_b/102-6790117-0104129">watch opener</a> though).CloakSpyhttp://www.blogger.com/profile/12608616835137458262noreply@blogger.com0tag:blogger.com,1999:blog-6372094241049630427.post-41039663315422273352007-05-29T22:42:00.000-05:002007-05-29T23:02:47.799-05:00Equipment: Parabolic MicrophonesI've mentioned before that I've found less than optimal use from parabolic microphone. Unless experimentation produces new results, that opinion is unlikely to change. The downside with a parbolic is that it is fairly clear you are up to no good, and what you gain from your conspicuousness is rarely something to write HQ about. There are some applications that a parabolic will come in handy, but the bottom line is to limit your expense on what will be a less-than-often-used tool in your kit.<br /><br />The first parabolic most people consider is the <a href="http://www.brickhousesecurity.com/bionic-ear.html">Bionic Ear</a>. It is astonishing that more people don't write complqints about this piece of equipment, if it can even be called that. It appears to be cheaply made - even to the point that the plastic feels cheap - and the technology appears to be cutting edge of the early 70s. The actual microphone has two outputs: one for the headphones one for line-out recording. My line-out never worked, but the headphone jack worked adequately.<br /><br />The "Ear" comes with special headphones that will shut-off with loud noises to protect your hearing, or perhaps to prevent you from hearing anything interesting. The headphones are emblazoned with an embarrasing "Bionic Ear" graphic. With it on high-gain mode, I could never pick-up a conversation at anything past normal hearing range. Thumps on the floor, noises of people walking, and loud clicks are brought in very well. Alas, these are often not very useful intel. You'll notice that any site selling it will emphasize the fact you can hear things coming through the woods, and that indeed appears to be its strength.<br /><br />Well, at least we can improve performance with the parabolic itself right? I mean, that's the whole point with a parabolic - take a so-so microphone and make it highly directional and more powerful. The "Bionic" parabolic is unnecessarily large and is completely and utterly insignificant to the use of the product. It adds absolutely nothing. So that extra surcharge to get the parabolic was a contribution to a 70s era merchant, and he thanks you.<br /><br />Typically the Bionic ear retails for $150 for the total package, and around $100 for the microphone. In case it wasn't clear, I'd recommend you skip it. If you already have one, you can stuff the components into a black project box, cut a small opening for the microphone, and use it as an amplified stethoscope. It will actually help with safecracking, and you can sometimes use it to listen through walls if you don't expect miracles. Actually, the funny thing about this modification is it works almost exactly like the amplifier used by Owen Wilson in <a href="http://www.imdb.com/title/tt0297181/">"I Spy"</a> (and a surpisingly worthwhile rental).<br /><br />Recently there are <a href="http://gizmodo.com/gadgets/gadgets/spion-orbitor-lets-you-spy-on-your-unsuspecting-neighbors-223144.php">new parabolics on the market</a> that are a good deal cheaper. They retail anywhere between $20 and $70, have a trigger grip and a transparent parabolic. I have a $20 model that I picked up at the very clearly non-espionage oriented <em>Tuesday Morning</em> that was branded for National Geographic. I have also seen a "Espion" model at Sharper Image, and there are many versions that you can find on EBay.<br /><br />The performance of this parabolic is much better than the vastly more expensive Bionic Ear. It will pick up conversations, but be aware that it often will not improve clarity above normal hearing. What it seems best for is to pick up conversations out a somewhat busy environment. I remember reading somewhere (maybe Amazon?) that it could pick up conversations through windows, but I have yet to see that manifest. However, since it is smaller and the parabolic is mercifully transparent, it is more covert, and is in fact built better than the laughable "Ear". It does have its disadvantages: it does not break down into components, there is no hearing protection, and it has the potential to be viewed as more of a toy than a usefully espionage device (but even some of the spy toys, especially the Spy Ear, have application in certain environments, so I wouldn't let that disuade you). If you have passing interest and a spare $20, you might want to pick one up, but I wouldn't go out of your way and certainly wouldn't spend more than that.CloakSpyhttp://www.blogger.com/profile/12608616835137458262noreply@blogger.com0tag:blogger.com,1999:blog-6372094241049630427.post-61959489727108822152007-05-15T22:25:00.000-05:002007-05-15T22:42:53.288-05:00News: Update on our CloakNet agency<u>Site News</u><br />Your faithful CloakNet team has been attempting to move HQ - both virtually and in the real world - so dispatches from the field have been lacking. We will soon be hosted on a new domain, and (hopefully) will feature a download section including recordings, software, and other materials that you will find useful to add to your toolkit. Our real-life HQ is moving to a better location, and we plan on giving you a full tour. Stay tuned.<br /><br /><u>Other Random News</u><br />It's fairly well known that we are obsessed -truly obsessed - with <a href="http://en.wikipedia.org/wiki/Numbers_station">number stations</a>. Using a one-time pad, various agencies from Mossad to our own CIA transmit information to agents, other groups, or possibly to no one. The transmissions are in sent "in the clear", so anybody with a shortwave can tune in. It's fairly easy too: just move your dial around at the beginning of an hour, and chances are you'll find one. What a great way to play "spy" with the real agencies!<br /><br />The beauty of these stations (other than their general spookiness) is the fact that they are so very secure. We pretty much know who is sending what, but it really doesn't matter because (a) we don't know the recipients - it could be anyone in the world with a radio, (b) the one-time pad is virtually unbreakable, and (c) the fact that they broadcast on the hour works towards anonymity - we can't tell what's a real message and what is completely fake.<br /><br />To become obsessed yourself, the best resource is the <a href="http://www.spynumbers.com/">Spy Numbers</a> page, which includes recordings and even a schedule database to help you find your first one. Let me know what you hear!CloakSpyhttp://www.blogger.com/profile/12608616835137458262noreply@blogger.com0tag:blogger.com,1999:blog-6372094241049630427.post-9313547527568275982007-03-29T21:54:00.000-05:002007-03-29T22:18:46.614-05:00Method: Grappling HooksWhenever we see spies in cinema, miniature grappling hooks are ubiquitous. In the real world, they are not used as often as you might think. More often used for "safely" setting off IEDs, climbing with a grapple is avoided due to its risk. At best, a grappling hook only is as strong as whatever it is holding onto. It is likely to slip, so only use a grapple for short heights that may hurt but won't injure if you fall.<br /><br />The hook you're most likely to run into is the four-prong collapsible version on EBay. Not a bad design, but it will bend quicker than you think. Another version you may not be as familiar with is the <a href="http://www.countycomm.com/hooksurv.htm">Pocket Grapple Hook</a>, something you don't need at all but will want immediately. Be aware that any reviews have said the pocket version still is not good enough to support your weight.<br /><br />To make your own, some say that the best bet is to get a deep-sea fishing hook, attach it to a chain, and then attach that to a rope. Probably not a good idea. I've never seen a fishing hook that I would trust my life to. If you really want to make one, our friends at Urban Exploration have <a href="http://www.uer.ca/forum_showthread_archive.asp?fid=1&threadid=815&currpage=1">several good ideas</a>.<br /><br />Carrying a grappling hook around with you is going to get you into trouble quicker than carrying lockpicks. Unless you've wearing an <a href="http://www.mi6.co.uk/sections/q-branch/omegawatch.php3">Omega watch with a grapple built in</a>, it would be best to leave it in your HQ until it is needed.<span style="font-style: italic;"></span>CloakSpyhttp://www.blogger.com/profile/12608616835137458262noreply@blogger.com0tag:blogger.com,1999:blog-6372094241049630427.post-557917720209190712007-03-24T23:12:00.000-05:002007-03-29T21:54:01.821-05:00General: Global AlertsI have something very fun today. But first a brief message: I'm a bit behind on my posting schedule, but for good reason. We're trying to move to new domain and change the format a bit. Keep checking back - either we'll have our new site going or I'll finally get some of the reviews and techniques from my Palm and on here.<br /><br />For everyone's situation room, I have the link for you. A Global Alert center in Hungary has a public aggregator for emergencies throughout the <a href="http://hisz.rsoe.hu/alertmap/woalert.php?lang=eng">World</a>, or you can zoom in on the <a href="http://hisz.rsoe.hu/alertmap/usa_alert.php?lang=eng">States</a>, <a href="http://hisz.rsoe.hu/alertmap/usa_alert.php?lang=eng">Europe</a>, and also <a href="http://hisz.rsoe.hu/alertmap/hualert.php?lang=eng">Hungary</a> itself. A great resource. Start projecting it on your main screen in your hidden fortress as soon as you can.CloakSpyhttp://www.blogger.com/profile/12608616835137458262noreply@blogger.com0tag:blogger.com,1999:blog-6372094241049630427.post-31977031938437434432007-02-26T23:35:00.000-05:002008-12-10T16:53:05.370-05:00Equipment: P3 Camera DetectorThere are several bug detectors out on the market, and one of the easiest to attain is the <a href="http://www.p3international.com/products/consumer/P7030/P7030.html">P3 Camera Detector</a>, which has even been sold at Radio Shack. The device is very small (about the size of a Pez dispenser) and extremely unattractive. For some reason, it has a "sparkly" sticker decorating it - how that pains me to even type that - and it has emblazoned upon it "Camera Detector" with some silly markings and a P3 icon. Not very professional.<br /><br />Performance-wise, it does OK. It will detect 1.2 and 2.4 GHz transmitters very handily. As you approach the camera, it chirps faster, making detection extremely easy. Using it against the concealed cameras (<span style="font-style: italic;">e.g.</span> any of the cell-phone cameras on EBay), it will find it every time. It does a passable job against higher-powered microphones, but has a hard time with FM bugs and even things in the 49MHz area.<br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg9lvvSQwG4laRT0gfIQM34KBDXrn5hPUl2wGXg0ZB_RqAKygtJjQwX9bvnDKxn1E_i_PNnj_VVFBmFqUvdhHz0AvHQcLhX81zsFQ_hbXRTmADYDHqFXMDZiZgkdaoAB_gj8MnIuMrOnkAy/s1600-h/CameraDetector.JPG"><img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg9lvvSQwG4laRT0gfIQM34KBDXrn5hPUl2wGXg0ZB_RqAKygtJjQwX9bvnDKxn1E_i_PNnj_VVFBmFqUvdhHz0AvHQcLhX81zsFQ_hbXRTmADYDHqFXMDZiZgkdaoAB_gj8MnIuMrOnkAy/s200/CameraDetector.JPG" alt="" id="BLOGGER_PHOTO_ID_5036071939860923330" border="0" /></a><br /><br /><br />Regardless of what you find with the detector, it will probably make you feel less like James Bond and more like a character from <a href="http://en.wikipedia.org/wiki/List_of_characters_in_Totally_Spies%21">Totally Spies</a>. One night, I simply could not take it anymore, and tried to fix the case with a Dremel. The result was the same I've attained whenever I've used the Dremel - total destruction of the case. However I was able to place in a project box using a 9v battery (instead of its regular 6 volts) and a nice-looking switch, and it now looks fairly professional. Learn from my lesson though: watch the delicate wires, especially around the speaker, since mine is now permanently silent.<br /><br />If you have any experience with the <a href="http://www.p3international.com/products/consumer/P7050/P7050.html">P3 Bug Detector</a> or any other detector, please let me know your findings. I'm of the mindset now that the only real detector I need is a good scanner and my frequency counter, but I'd love to be convinced otherwise.CloakSpyhttp://www.blogger.com/profile/12608616835137458262noreply@blogger.com0tag:blogger.com,1999:blog-6372094241049630427.post-7839771103581843812007-02-26T23:27:00.000-05:002007-02-26T23:31:24.289-05:00Method: Making Anonymous CallsYou may come across a need to send information to another party in an untraceable fashion - perhaps sending a tip for information or communicating with a hostile party. Voice changers are available as well as services to redirect your call, but a simpler method is available.<br /><br />First of all, know how to call without being identified by caller ID. I've been surprised at how many people aren't aware that you can suppress your phone number from being identified by dialing *69 before making your call. Note that some people will block unidentified calls. <br /><br />Other methods you can do is spoof your caller ID and make it appear as any number you want using a <a href="http://www.spoofcard.com/">SpoofCard</a>. Not only will change the number, it can record the log and even change your voice. <br /><br />An even cheaper method is call through a pre-paid phone card. The number that shows on the caller ID will not be the one you called from, and due to the huge volume of calls, it is virtually impossible to trace the call back to the original caller. You can get extra anonymity by either paying for the card with cash, or even getting a access from Coke Rewards.<br /><br />When making you call, it is a good idea to disguise your voice is some way. Don't rely on muffling your voice with a handkerchief, use a tone modifier described in our <a href="http://cloaknet.blogspot.com/2007/02/equipment-february-picks.html">February picks</a>.CloakSpyhttp://www.blogger.com/profile/12608616835137458262noreply@blogger.com0tag:blogger.com,1999:blog-6372094241049630427.post-64244021664338696422007-02-26T22:54:00.000-05:002007-02-26T23:34:07.670-05:00Books: Essential March ReadingAlready three months into the year, and you haven't started brushing up on your tradecraft? The field of espionage offers many good resources and far more poor ones. Before handing over your hard-earned money on any spy book, make sure it is well reviewed. As a rule of thumb, I would steer clear of Paladin press and see what other alternatives are out there.<br /><br />The CloakNet picks:<br /><ul><li><a href="http://www.amazon.com/Spycraft-Manual-Insiders-Espionage-Techniques/dp/0760320748/sr=8-1/qid=1172548500/ref=pd_bbs_sr_1/104-7922441-0400747?ie=UTF8&s=books">The Spycraft Manual</a>. If you want a good solid introduction to modern espionage, this is the book to buy. Well-priced at under $15, it offers the basics on escape-and-evasion, weaponry, basic modern equipment, some explosive coverage, and the basics of being a real-world spy. Good basics on lockpicking and surveillance as well, but really poor coverage of cryptography (is anyone that reads about a concealed briefcase MP5 even going to consider a basic substitution code)? There are some chapters that are a bit off-kilter in form, but lots of good information. A worthy buy.</li><li><a href="http://www.amazon.com/Open-Locks-Improvised-Tools-Non-Destructive/dp/0966608712/sr=8-5/qid=1172549096/ref=sr_1_5/104-7922441-0400747?ie=UTF8&s=books">How to Open Locks with Improvised Tools</a>. If you are going to buy one practical book, make this your pick. The authors guides you through many different methods, from lock picks guns to how to open handcuffs, all while assuming you do not have access to basic lock picking tools. Considering that you will more than likely not being carrying picks when you most need them, this book will be invaluable to you. And by the way, please don't carry picks with you anyway - they will get you into trouble.</li><li><a href="http://www.amazon.com/Spys-Guide-Office-Espionage/dp/1931686602/ref=pd_rhf_f_3/104-7922441-0400747">The Spy's Guide: Office Espionage</a>. Not a bad book at all, but brief. Some very good advice here on how to engage in some real and useful tradecraft. Even covers how to sneak into an corporate event (which, yes, does work - my advice: have a good cover) and disguise. A weird project is also covered on how to make a concealment device from a water bottle; I'll be honest, I haven't built it, but I don't see how it could work. A bit tongue-in-cheek, but useful nonetheless.<br /></li><li><a href="http://www.amazon.com/gp/product/0789489724/ref=pd_cp_b_title/104-7922441-0400747">Ultimate Spy</a>. Let me let you in on a little secret: WWII spy techniques still work, and are valuable today. Learn how it was done by examining equipment and some brief descriptions of techniques in this book. Don't expect heavy reading though: it is mostly a picture-by-picture book of an espionage collection. You will get good ideas from it though.<br /></li></ul>You should also avoid a few of the not-so-good. Some to give a miss:<br /><ul><li><a href="http://www.amazon.com/Sneaky-Uses-Everyday-Things-Aspirin/dp/0740738593/sr=1-4/qid=1172549818/ref=sr_1_4/104-7922441-0400747?ie=UTF8&s=books">Sneaky Uses for Everyday Things</a>. A bizarre book. Sometimes it seems it was written by a survivalist that wasn't too far gone, sometimes it seemed suited for maybe a young adolescent. Good ideas on how to find wire, substitute batteries, and even modify radios. Bad ideas include making a power ring (a ring... with a magnet. Wow.) and a security camera that uses a dart gun to shoot the shutter button on a camera. Oh so poor. Read at the bookstore instead.</li><li><a href="http://www.amazon.com/Surveillance-Countermeasures-Serious-Detecting-Personal/dp/0873647637/sr=1-1/qid=1172549778/ref=pd_bbs_sr_1/104-7922441-0400747?ie=UTF8&s=books">Surveillance Countermeasures</a>. Some good elements in here but reads worse than my Social Statistics textbook. It does indeed cover four-square surveillance, vehicular methods, and some electronics methods. However you are better off with a book like <span style="font-style: italic;">The Spycraft Manual</span> which has the basics plus more.</li><li><a href="http://www.amazon.com/Running-Ring-Spies-Operations-Espionage/dp/0873649028/sr=1-1/qid=1172549735/ref=sr_1_1/104-7922441-0400747?ie=UTF8&s=books">Running a Ring of Spies</a>. Man, did this guy want to impress upon the reader how absolutely worldly and cool he is. Best lesson from this book, <a href="http://en.wikipedia.org/wiki/False_flag#Spy_tradecraft">the false flag</a> - if you don't know it, you will be taken by it sooner or later - even bill collectors will use it). Some good things here and there, but nothing that justifies the money spent. Skip it.</li></ul>A final free resource: if you haven't already, bookmark the <a href="http://blog.foreignpolicy.com/">Foreign Policy blog</a>. You will be kept up-to-date with a regular briefing and get the scoop on the most important regions.CloakSpyhttp://www.blogger.com/profile/12608616835137458262noreply@blogger.com0tag:blogger.com,1999:blog-6372094241049630427.post-69404238340679698292007-02-05T22:34:00.000-05:002008-12-10T16:53:05.689-05:00Equipment: Card Stash<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiQPLwURB53F3vuKjIDkm-ybLxkmW3Bc8abzy3bL2hAfCFZq6kNPOD9zBFbktnjJrQL-emlzEFaDco1s6-sHCfvovFbRzxL7RDcY9L0Uf0u01q1FB49mp2SHnoXZdC4aJ5CkZ6WKwjwK4iC/s1600-h/StashCard.JPG"><img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiQPLwURB53F3vuKjIDkm-ybLxkmW3Bc8abzy3bL2hAfCFZq6kNPOD9zBFbktnjJrQL-emlzEFaDco1s6-sHCfvovFbRzxL7RDcY9L0Uf0u01q1FB49mp2SHnoXZdC4aJ5CkZ6WKwjwK4iC/s320/StashCard.JPG" alt="" id="BLOGGER_PHOTO_ID_5028259819649050162" border="0" /></a><br />One my associates recently provided me with a <a href="http://www.stashcard.com/">Stash Card</a>, a very clever device akin in spirit to those provided in 60s and 70s. The device is a metallic and serves as hidden storage for small objects such as film, papers, or even small equipment. The Stash Card fits into the PCMCIA slot of laptops - the one that you are probably not using right this instants - and is easily overlooked during a cursory search.<br /><br /><br />Conceivably, the card could be used as a low-tech way to transfer information between agents. By writing a message (preferably using a <a href="http://en.wikipedia.org/wiki/One-time_pad">one-time pad</a>) and concealing it within the card, it is a plausible object to exchange in public without raising security concerns.<br /><br />Some things could improve. My biggest issue: why emblazon the words "stash card" on the card? I have this problem with many spy gadgts. If it is a concealed device, let it be - don't alert the word to the fact that it is in fact a secret device. Also, it is simply not a good idea to hide valuables within it. If someone was trying to steal information, the laptop would likely be taken along with the card. Its primary purpose appears to be smuggling items within the laptop, Nonetheless not a bad device for $10.CloakSpyhttp://www.blogger.com/profile/12608616835137458262noreply@blogger.com0tag:blogger.com,1999:blog-6372094241049630427.post-42667936249215114762007-02-05T22:14:00.000-05:002007-02-05T22:34:02.503-05:00Crypto: Securing Your FilesYour biggest weak point in your business and at home is your PC. It is the single point that can potentially reveal all of your habits, secrets, and personal tastes. Up through the mid-nineties, if you wanted to ascertain a target, you would go through his or her trash, and then use whatever you found to draw up a personality file. With your PC, it is much easier and quicker, and likely would portray a more accurate portrait of your habits.<br /><br />To secure your files, the first step you should take is to create an encrypted drive on your PC. The process is much easier than you probably think. <a href="http://www.truecrypt.org/">TrueCrypt</a> is a free, open-source program that uses proven cryptographic methods to secure your data. Once installed on your PC, you can create any number of "drives" - files known as stores - that can be used just like your normal hard drive. The files are non-descript and can have any extension. When you are ready to use it, you "mount" the file, and it becomes whatever drive letter you specify. <br /><br />As an added bonus, TrueCrypt can provide plausible deniability by encrypting a store within a store. Since an encrypted drive within another encrypted drive is virtually undetectable, you can securely hide your files. Just place a few semi-confidential documents in the main store, and use the secret store for the ultra-classified files.<br /><br />A method to consider is to use TrueCrypt with a USB drive so you can safeguard your family documents; <span style="font-style: italic;">e.g. </span>take pictures of birth certificates, social security cards, credit cards, passport, <span style="font-style: italic;">etc.</span> within a encrypted store on a small USB key. Imagine the value of the USB if you had to evacuate a disaster area similar to New Orleans, or even if you just needed help during travel after losing your wallet.<br /><br />You can have faith in the crypto methods as long as you use a strong password. Even a government level effort will take considerable time to retrieve your data.<br /><br />Now that you know how to keep your files secret, you now need to know how to shred the files that are no longer useful. In case you aren't aware, when you delete something through Windows, it isn't really gone even if you empty your recycle bin. Each deleted file is simply marked for deletion, and isn't really gone until it is eventually overwritten. <br /><br />Accordingly, you will want to "shred" your files by using a program that deletes the file and then overwrites it with zeroes or random characters. I use my own program which I'll try to find somewhere to post; in the meantime, a popular free choice is <a href="http://sourceforge.net/projects/tfs/">The File Shredder</a>. <br /><br />There are many ways around even this type of security. Government services can reportedly read your monitor using electrical fields (again, reportedly, and I have my doubts), and there are plenty of ways to bypass standard security protocol. As with all counter-intelligence efforts, you want to tailor your security towards your likely threats, the most probable being key monitoring method. There are many programs that capture keystrokes, some of which are harder to detect than most. You can limit the threat by making sure nothing else but your programs are running in task manager. Additionally, there are hardware <a href="http://www.keykatcher.com/">key loggers</a> that capture everything you type. Only a visual inspection will find a planted device, but if you are using a laptop, you are in the clear.<br /><br />Basic file security is a must, and with these and a few other pointers, you can keep most of your data private from general threats. If you want to expand your knowledge of cryptology, some resources you may want to check out are:<br /><ul><li><a href="http://www.simonsingh.net/The_Code_Book.html">The Code Book</a>. A very engaging read about codes and ciphers throughout history, and a great place to start for anyone interested in the field. The book covers everything from medieval codes to WWII, and also explains the complicated modern algorithms in a way you will understand.</li><li><a href="http://www.schneier.com/crypto-gram.html">The Crypto-Gram</a>. A monthly newsletter from the absolute guru of the field, Bruce Schneier. As you explore cryptology, you will see more and more about him.</li></ul>Remember that any encryption measures you take are like putting valuables in a safe - if someone is keen enough, has access and time, they will get in eventually.CloakSpyhttp://www.blogger.com/profile/12608616835137458262noreply@blogger.com1tag:blogger.com,1999:blog-6372094241049630427.post-6648680656218330072007-02-03T23:50:00.000-05:002007-02-04T00:34:16.235-05:00Equipment: February PicksFebruary - it's a great month to re-evaluate our equipment. Often this means purchasing, and if you are like me, you want to do so as cheaply as possible. Here are some recent findings:<br /><ul><li>Voice-changing software. When masking your voice for calls or recordings, you can use hardware solutions, but why do that when you have your computer? A <a href="http://www.winsite.com/bin/Info?5000000036324">free voice pitch program</a> (unfortunately called "Funny Voice" - make sure to rename it) will plausibly mask your voice by altering pitch... just try to stay within +/- 3 of your normal pitch if you want to sound realistic. While on that topic, you might want to grab <a href="http://www.screamingbee.com/product/MorphVOXJunior.aspx">MorphVox Junior</a>. The free version only has three different voices, but you might find it handy.<br /></li><li>If you are considering a parabolic microphone, my recommendation is "no." Parabolics often require ideal conditions, and they are not really very stealthy. That one that you often see on <a href="http://search.ebay.com/parabolic-microphone_W0QQfrppZ50QQfsopZ1QQmaxrecordsreturnedZ300">EBay that has a recorder</a>? Be aware Walgreens has sold them for $10. The <a href="http://www.botac.com/bionearboos.html">Bionic Ear</a>? Worst equipment ever. Plastic that feels cheap, voices are unintelligible, and the dish seems totally ineffective. Definitely not worth the price. If you happen to have one, do what I did and hack it into an electronic stethoscope.</li><li>A flashlight is a key piece of equipment. Make sure it is well suited to your needs, which will typically be something that is small and has low-light output. Don't be fooled by something that says "tactical" - often the light will not have tactical components (<span style="font-style: italic;">e.g.</span> momentary switch, turns off when dropped, <span style="font-style: italic;">etc.</span>). Before you buy something that has CR123A batteries, review posts at <a href="http://www.candlepowerforums.com">CandlePowerForums</a> - they have seen considerable risk of dangerous explosion using them. My so-called tactical light is on the way out the door. I have the <a href="http://www.pocketlights.com/gerber_recon.asp">Gerber Recon</a> on my wishlist at the moment, but am currently using an <a href="http://www.sharperimagebest.com/em227.html">Inova Radiant</a> which has served adequately.<br /></li><li>Any one into espionage should strongly consider a PDA. Even <a href="http://archives.cnn.com/2001/US/02/20/fbi.spy.06/">Robert Hanssen</a>, a FBI agent turned Russian spy, was recommending the use of a Palm to his Russian superiors since it offered pocked sized encryption (although that also helped <a href="http://abcnews.go.com/2020/story?id=123776">his downfall</a>). With imaging software, recording capabilities, and encrypted stores, it is a very versatile tool to have in your arsenal. My top recommendation goes to the Palm T|X which I use now, and the best I've owned. If you choose to go the Palm way, some downloads to consider: <a href="http://www.klawitter.de/palm/cipher.html">Cipher</a> to encrypt your notes, <a href="http://www.freewarepalm.com/utilities/skeletonkey.shtml">SkeletonKey</a> to crack combination locks, and <a href="http://www.bigfattail.com/pocketsat/">PocketSat</a> to really solidify any espionage image you might have. You will also likely want to <a href="http://www.palminfocenter.com/forum/viewtopic.php?p=161843">ditch Graffiti 2 so you can use the original Graffiti 1</a>.</li></ul>We'll return soon to discuss securing your files with software and gadgets, but until then, I'd like to offer one final suggestion. You may notice at your job that people are often planting the <a href="http://www.thinkgeek.com/gadgets/electronic/8c52/">Annoy-a-tron</a> device - a chip that every 5 - 10 minutes emits a high-pitched beep. I immediately thought of several well-deserved targets at my job. However, most of the people that have this device also have no discretion, and will place it all over the office floor. If your office has that sort of fellow, be a good counter-intelligence agent and turn the tables: (a) use post-it notes to mark the last heard direction of the device; (b) slowly narrow its location down; (c) recover the device and put it in the post of the instigator's chair.CloakSpyhttp://www.blogger.com/profile/12608616835137458262noreply@blogger.com0tag:blogger.com,1999:blog-6372094241049630427.post-22039655765130277882007-01-22T21:08:00.000-05:002007-01-22T22:59:09.924-05:00Equipment: Every Day EquipmentAs you acquire more and more equipment, you'll find that there are three basic classifications: equipment that you keep at your base of operations (<span style="font-style: italic;">e.g.</span> large radios, safes), specialized equipment (transmitters, dead-drops), and equipment that can be carried every day. Any equipment that is carried all the time needs to meet a few criteria: it must be small, versatile, and plausible enough to carry around with you. The <a href="http://cloaknet.blogspot.com/2006/12/equipment-lighter-camera.html">concealed lighter</a> is a good example since it has multiple functions, and its concealment makes it a plausible item to carry with you. A collapsible baton is not - it has one purpose that is very clearly communicated when it is seen.<br /><br />If you are keen on espionage equipment, you will likely feel out of place if you don't have some resources at your daily disposal. Some equipment to consider:<br /><ul><li><span style="font-weight: bold;">A multitool</span>. Do not underestimate the value of carrying of Swiss Army knife or Leatherman. These tools give you immediate access to electronics, and also provide the opportunity to improvise additional equipment. I've used a very basic knife to re-enter my apartment after being locked out, and I've created picks from plastic using my Gerber tool. The versatility is something you'll find you can rely on. My recommendations:<br /></li><ul><li><a href="http://www.amazon.com/Swiss-Army-Tinker-Pocket-Knife/dp/B00004YVB4/sr=1-17/qid=1169518510/ref=sr_1_17/105-8404743-5442819?ie=UTF8&s=sporting-goods">Swiss Army "Tinker"</a>. The tools offer balance of good functionality and small size - nothing useless here. Taking apart or jury-rigging a device is easily within its capabilities. Something that will give it an added edge for espionage: take off one of the plastic sides so it can be easily attached and removed. In this way you can conceal even smaller tools or papers.</li><li><a href="http://www.amazon.com/Gerber-1471-Suspension-Multi-Pliers-22-01471/dp/B000A2ANY6/sr=8-2/qid=1169518410/ref=pd_bbs_sr_2/105-8404743-5442819?ie=UTF8&s=sporting-goods">Gerber Suspension</a>. A great price for a really good multitool - a bargain for the cost. It can be your primary tool for electronics, cutting through a wire fence, or disassembling anything you come across. The pliers are extremely comfortable, and the secondary tools are easily accessible when closed.</li><li><a href="http://www.amazon.com/s/ref=nb_ss_sg/105-8404743-5442819?url=search-alias%3Dsporting&field-keywords=gerber+urban&amp;amp;amp;Go.x=0&Go.y=0&Go=Go">Gerber Legend Series</a>. Both of these tools are on the expensive side, but they are good quality tools that are easily maintained (including replaceable tungsten wire cutters) and provide a wide functionality. The designers clearly focused on human factors as evidenced by the thumb-deployed knife blade and the well-designed handles. The Philips screwdriver will fit a standard socket driver, allowing it access to additional tools (don't be fooled by the Gerber Accessory kit - any socket will work). The Urban Legend is the one I own, and that appears to be a better deal than the Legend; the Legend only offers an replaceable saw and a slightly larger body.</li><li><a href="http://www.amazon.com/s/ref=nb_ss_sg/105-8404743-5442819?url=search-alias%3Dsporting&field-keywords=leatherman&amp;amp;amp;Go.x=0&Go.y=0&Go=Go">Leatherman Wave or Crunch</a>. I have not used these as much as some of my associates, but everyone seems to swear by them. Our photography agent has told me he can maintain his motorcycle almost exclusively with his Crunch.<br /></li></ul></ul><ul><li><span style="font-weight: bold;">A UV light.</span> Another basic but vital piece of equipment, but it offers additional cloak-and-dagger features:</li></ul><ul><ul><li>The basic light illuminates a room adequately. The battery lasts a very long time, and the LED itself will not need to be replaced.</li><li>The UV qualities will detect liquid in a disturbing way. If you use it in a hotel, you will find many things that you did not expect. However, if or when you have the need to detect such things, and the UV light is the only way to go.</li><li>Small breaks or imperfections in walls or objects are made more evident with a UV light. You can detect if someone has modified a section of your wall or tampered with a particular product.</li><li>Common "invisible ink" is displayed with UV. These pens are <a href="http://search.ebay.com/search/search.dll?from=R40&satitle=uv+pen">readily available</a> and can be used to mark possession to help protect against theft, or can be written between lines of a normal letter to pass on covert messages.</li><li>When using it with powder (sawdust or UV specific), you can detect what keys a person has pressed on a security keypad.</li><li>Any watch that is luminescent can be "charged" with the UV light. The watch glows extremely brightly for 2 - 5 minutes, and then has a good glow for an hour or more.</li></ul></ul>The beauty of the UV light is that it is like the classic espionage gadget - it has so much functionality, and it is hidden in plain sight. Even recently I had to use my Photon to determine what someone had written on a notepad; the UV made the pen pressure marks more evident so we could see what was written on the prior sheet. Some models offer additional modes, including a SOS flash, a rapid beacon flash, and low / high power modes.<br /><br />I typically use the <a href="http://www.photonlight.com/">Violet Photon Light</a> and have been very happy with it. Typically the UV versions of Photon lights are more expensive than their standard light. The "Violet" version, however, is usually the same price and has ample UV to meet all of your needs. EBay has several reasonably priced items at any given time and will be your best bet in acquiring one. Just make sure it has a black case instead of purple one<br /><br />As you find yourself more enthralled with what you can carry everyday, there is a forum that will help you considerably and perhaps make you totally obsessed at <a href="http://www.edcforums.com/">http://www.edcforums.com/</a>.CloakSpyhttp://www.blogger.com/profile/12608616835137458262noreply@blogger.com0tag:blogger.com,1999:blog-6372094241049630427.post-35522737162980834352007-01-12T00:13:00.000-05:002007-01-12T00:30:23.725-05:00News: Radio Trackers in Coins?One of our operatives has reported that Excite News is running a story on <a href="http://apnews.excite.com/article/20070111/D8MIVU6O0.html">hidden transmitters inside hollow coins</a> used to track movements of contractors in Canada. Allegedly, the Pentagon has found reason to believe that agents of unknown origin have placed the coins on targets to track their movements.<br /><br />My take on this: unlikely. As the story states, the intent of the device doesn't match the practicality of the device. Excite quotes a researcher who states that there is a risk that it might be spent, so the device wouldn't really be appropriate. I'll take it a step further: how would you plant it? A coin with a radio transmitter would have to be somewhat sizeable in order to transmit to a receiving station. So are their targets receiving these coins as change? If I received a half-dollar from a newstand, I'd say "thanks" and drop it off at my dresser at the earliest convenience.<br /><br />You may say that might just be the point - to find out where that dresser is and hence where the contractor lives. But how would using such a device be any more effective that traditional surveillance? A team of 4 agents - even 2 agents - could easily track the individual back to their home, work, and haunts. One of the original Moscow Rules was that "technology will let you down," and I seriously doubt that any intelligence service would rely on the such a device to find information of dubious value. Much better would be a coin with a hidden microphone and transmitter.<br /><br />Additionally, I don't think we have the technology for this anyway. You'd need a long-term battery and a good antenna. Unless, of course, you were using an old technique where you bounce a radio wave off the device to receive audio (à la <a href="http://www.cnn.com/SPECIALS/cold.war/experience/spies/spy.gadgets/espionage/thing.lrg.html">The Thing</a>) - but how would you aim at the coin in some poor sap's jeans? And would you want to? If it was me, after working with so many technical devices that fail when you need them, I'd throw up my hands and say "hell with this, let's just follow him in the car."<br /><br />Now, if you <em>really</em> want to use hollow coins, use them for the old WWII purpose - hiding film, messages, and microdots. Or do the standard practice hiding the key to <a href="http://en.wikipedia.org/wiki/One-time_pad">one-time pads</a>, just make sure to write the key on flash paper or cigarette paper so it can easily be destroyed. <br /><br />If you try to find hollow coins on the Internet, you'll probably be frustrated at first. In the early 90s, they were available for around $50, but they seemingly can't be found now. However, the device is available at magic shops. Look for the <em>Scotch and Soda </em>trick, and you'll have a hollow coin that can store your film or code at less than $25. It's also not a bad trick - you're sure to win a drink or two from it.CloakSpyhttp://www.blogger.com/profile/12608616835137458262noreply@blogger.com0tag:blogger.com,1999:blog-6372094241049630427.post-91689940769925915572007-01-11T23:45:00.000-05:002008-12-10T16:53:05.973-05:00Equipment: Micro Spy BugIn a previous post, I mentioned that I wasn't a big believer in FM bugs. I found out that I was in fact wrong. <a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhbsOoJ-jpF057RVkz0OHrWpfRXKntGZ3PlO8Syh3nk8sr0dstPHkj66vgntNjC351VkHcsn1iJmeSY5ShWfyakN0I8EqpG69TLnYwBknN5rHKPb_ywW2cSjrqMXramPOEj9wYuAip6WRW-/s1600-h/TransmitterEquipment.JPG"><img id="BLOGGER_PHOTO_ID_5019001165810250306" style="FLOAT: left; MARGIN: 0px 10px 10px 0px; CURSOR: hand" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhbsOoJ-jpF057RVkz0OHrWpfRXKntGZ3PlO8Syh3nk8sr0dstPHkj66vgntNjC351VkHcsn1iJmeSY5ShWfyakN0I8EqpG69TLnYwBknN5rHKPb_ywW2cSjrqMXramPOEj9wYuAip6WRW-/s320/TransmitterEquipment.JPG" border="0" /></a><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br /><br />Recently I had the chance to try out a Micro Spy Bug - one of several versions on eBay designed by member <a href="http://myworld.ebay.com/alilon">alilon</a> running $35 after shipping. This particular model runs off a 9V battery is very concealable, barely larger than the battery itself. The antenna is an extendable wire that is about two feet long. Rated at up to 1200 meters, it is an extremely well-made and durable device, and broadcasts anywhere from 80 - 115 MHz. Out of the box, it transmitters at around 92 (right around the public radio band of your FM dial). Running below 87MHz is extremely stealthy since it is a rare person who even bothers to scan in that region of the FM spectrum.<br /><br /><br /><br />A trial run of the device went extremely well. I placed the transmitter behind a curtain of our office and left our radio running. The Optoelectronics Scout indicated it <a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhA_zbz1wXU4-9zD4z-DB7ThjT8orv5tkQC7ZZItxgLhux9zdSoJvd_ruH9ncu74xcXyCDgsqLg1O_7xVaBZSxopExhNs7_fxTt3fAN9yS9JQcnx_e0giphgqFzu-MeeRrO6Hc7ORP5ezdb/s1600-h/TransmitterPlacement.JPG"><img id="BLOGGER_PHOTO_ID_5019002643279000146" style="FLOAT: right; MARGIN: 0px 0px 10px 10px; CURSOR: hand" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhA_zbz1wXU4-9zD4z-DB7ThjT8orv5tkQC7ZZItxgLhux9zdSoJvd_ruH9ncu74xcXyCDgsqLg1O_7xVaBZSxopExhNs7_fxTt3fAN9yS9JQcnx_e0giphgqFzu-MeeRrO6Hc7ORP5ezdb/s320/TransmitterPlacement.JPG" border="0" /></a>was transmitting at 92.425. Interestingly enough, I couldn't capture the frequency until I touched the Scout's antenna against the transmitter. However, once I tuned my IC-R20 scanner to the frequency, the sound came in crystal clear and the signal was strong. The audio continued to be stellar in all areas of our house. Taking the scanner for a walk, I was able to receive extremely well within a two house radius. I walked to the street adjacent to ours, and amazingly, the signal was still readable - in some cases, an 8 out of 10 signal strength. I could hear everything that was happening in the room. That sort of performance exceeds all expectations that I would have for this device.<br /><br /><br /><br />The next step was to determine how easily the bug was detected. I use a modified device based on the <a href="http://www.p3international.com/products/consumer/P7030/P7030.html">P3 camera detector</a>; <em>i.e.</em> the same electronics, but with an extended antenna and a silenced speaker. Though it normally detects wireless devices within 5 feet, it did <u>not</u> detect the micro bug even when touching the antenna. As mentioned above, the Optolectronics Scout also did not immediate capture the device, though if the filter was turned off, it knew that something was transmitting on that range. The only method that easily detected the bug was to:<br /><br /><ol><li>Remove my scanner antenna.</li><li>Scan the general FM spectrum.</li><li>The scanner would stop only on the bug frequency, since that is the only thing broadcasting nearby.</li></ol><p>These results are surprising, since the bug is fairly undetectable unless a technical individual is using good equipment. I am extremely impressed with this device. It offers strong features for a very competitive price.</p>CloakSpyhttp://www.blogger.com/profile/12608616835137458262noreply@blogger.com4tag:blogger.com,1999:blog-6372094241049630427.post-23795403965831617712007-01-10T23:43:00.000-05:002007-01-12T22:46:19.931-05:00General: Cloak and Dagger DrinksIf you are going to embrace the worldly lifestyle of international espionage, then you have to know the right drinks. It may depend on the type of spy you most relate to. Special Forces are likely more apt to drink a beer after their mission, and PIs might like whiskey as well. The fact is that real spies will drink very little during their missions, and they will have the local favorites in order to blend in. So should you while "on mission," but for R&R purposes, here's a few drink recommendations.<br /><br />The martini is the natural classic. Most think gin and olives, but the "real" James Bond martini is made with Vodka and with a lemon peel. Vermouth is optional, but it must be dry. All this is according to the movies, and, yes, they are shaken, not stirred, a choice that makes the vodka ice cold. According to the book (and also the recent movie, which by the way was great), the martini will not only be made with vodka, but also gin and Lillet blanc... may I wish you the best of luck in finding that.<br /><br />Here is my preferred recipe:<br /><ul><li>Place several ice cubes in a martini glass to chill it while you make the martini.</li><li>Peel off a bit of lemon peel.</li><li>Place more ice cubes in a cocktail shaker.</li><li>Pour any quantity of vermouth in the shaker - doesn't matter how much.</li><li>Shake, strain out the vermouth, and retain the ice. Discard the strained vermouth.</li><li>Open the shaker and add 1 - 3 shots of your favorite vodka.</li><li>Shake again, remove the ice from the martini glass, and pour in the martini.</li></ul><p>It is best to drink the martini immediately after creation, so lay out your equipment in advance or have someone else make it for you. If you want to try it out now, in you happen to be in the Atlanta area (unlike me), try <a href="http://www.oliveswaterside.com/">Olive's</a> – they have it on the menu, and is highly recommended by a fellow operative.<br /><br />You are not limited to martinis, of course. Sparking wine (e.g. Champagne) is a good bet as well. It is classy and something that is good to know a bit about. My advice to those of you that don't know much about it:</p><ul><li>Champagne is sparking wine from the Champagne region of France, everything else is simply sparking wine.</li><li>Know what you like before you buy. If you like wine dry, go for Brut or Extra Brut. If you like sweet, God knows why, then go for Spumante. A good rule of thumb: if you like your coffee sweet, you probably like your wine sweet, otherwise go dry.</li><li>Avoid any colors other than white. Steer clear of pink except in the rarest of circumstances.</li><li>Know how to pop the cork. The incorrect way is to shoot the cork out, especially towards an unsuspecting audience. The correct way is to firmly grasp the cork and turn the bottle slowly – the cork will pop but stay in your hand, and you won’t lose any of the wine. If you haven’t done it before, go out and buy 3 or 4 bottles of Cook’s. You’ll have it down in a very short time, and it will look like you’ve done it all your life.</li></ul><p>My personal favorite is Campari and tonic. It is an acquired taste, or so I hear. Since it is low alcohol, it is also an ideal drink on mission. Chances are your target won't order the same, and you can easily have three to his or her one martini. That is the very reason this is my choice for corporate parties. Bonus point: I later found out that Campari is also authenic to the espionage fantasy - if you read the novels, you'll find that James Bond had a fondness for them in his youth. </p>CloakSpyhttp://www.blogger.com/profile/12608616835137458262noreply@blogger.com0tag:blogger.com,1999:blog-6372094241049630427.post-36454450806833910502007-01-10T23:31:00.000-05:002007-01-10T23:41:51.002-05:00Books: 101 Spy Gadgets for the Evil Genius<p>There are countless books out on espionage technique. Very few are applicable to actual tradecraft, and most seem to be unfortunately published by Paladin Press. There are a few gems out there, and the recent book, <a href="http://www.amazon.com/101-Spy-Gadgets-Evil-Genius/dp/0071468943/sr=8-1/qid=1168490471/ref=pd_bbs_sr_1/105-5086769-1754831?ie=UTF8&s=books">101 Spy Gadgets for the Evil Genius</a>, is clearly one of them.<br /><br />As the book promised, there are 101 projects that result in actual espionage devices for a reasonable amount of money and have actual real-world applications. The authors assume that readers have some technical aptitude with electronics and present each project with an electronic diagram. Their recommendation seems to be “dive right in,” and I’d have to agree that the only way to learn is by doing. Topics include:</p><ul><li>Creating phone taps ranging from a world-wide accessible one from your PC to a hard-wired one that lets you sneak onto conversations undetected.</li><li>Building all sorts of camera electronics with a reasonable (typically less than $80) budget – normally these camera are sold for $500+.</li><li>Exploring the myth of laser listeners with an actual working project.</li><li>Building audio transmitters – from FM bugs to building one from a FRS radio.</li></ul><p>One of my favorites: a camera “killer.” This devices will let you target a camera with a laser, and then render it useless via an infrared laser. Brilliant idea.<br /><br />I immediately grabbed this book when a friend of mine brought it to my attention. At first I was just a bit skeptical at the idea of a “spy robot” project, since it brings to mind one of the <a href="http://www.jamesbondmm.co.uk/q-branch/avtak-gadgets.php?id=011">worst inventions that Q created</a>. However, it is very well thought out and practical. The robot is based on the SWAT bomb-squad robots, and has the capability to record audio / video as well as deploy devices. Not that I see myself building one in the future, but a great concept.<br /><br />The bad part about this book is that I immediately went out to by components and went to work that evening. It became, well, a bit obsessive. But I must say, even with very little background in electronics, I have learned more than I expected, and have working devices to boot. Highly recommended.<br /></p>CloakSpyhttp://www.blogger.com/profile/12608616835137458262noreply@blogger.com1tag:blogger.com,1999:blog-6372094241049630427.post-29034553003935379632007-01-10T23:14:00.000-05:002008-12-10T16:53:06.227-05:00Equipment: IC-R2 Communication Receiver<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgsxFn4lpx9z_xf-vtRP_cWaR9p0yk5IoqL_MvlnpMX4DcI8JmyirRkjNDBmf_Pj2ih1RyotcMe7ufYiPugEGi-FIZKMfGurwVNffOsNOnKls_4Htuz8-OU0dzvJuR9w6RvrVdOhQG4iSlM/s1600-h/IC-R2_Antennas.jpg"><img id="BLOGGER_PHOTO_ID_5018621808528863794" style="FLOAT: left; MARGIN: 0px 10px 10px 0px; CURSOR: hand" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgsxFn4lpx9z_xf-vtRP_cWaR9p0yk5IoqL_MvlnpMX4DcI8JmyirRkjNDBmf_Pj2ih1RyotcMe7ufYiPugEGi-FIZKMfGurwVNffOsNOnKls_4Htuz8-OU0dzvJuR9w6RvrVdOhQG4iSlM/s320/IC-R2_Antennas.jpg" border="0" /></a><br /><p>Happy new year! What a great year for espionage information - '007.<br /><br />Today's review is of a classic scanner: the Icom IC-R2. These units are nearly seven years old, but have an advanced design that is still competitive today. It is an extraordinarily compact receiver, so much so that without an antenna, the device will likely fit inside your palm. In fact, the included antenna is about twice its size. I have found it to be most useful when attaching a small multiband SMA antenna. Doing so provides you with a fully functional radio that is very concealable. I keep two other antennas in its case (one for utility bands and one for broad spectrum).</p><p></p><p>The scanner has a very large band plan. Coverage extends from the shortwave spectrum through 1310MHz. If you are in the US, you will receive a model that is missing the cellular band plan (around 860MHz), even though hardly anyone is using cell phones that use that frequency anymore. There are a few "birdies" (<em>i.e.</em> it thinks it is receiving a real transmission where there isn't one), but I have found those to be rare.<br /><br />If you have reviewed the IC-R2 elsewhere, you will have noticed that many people think it is deaf on certain frequencies. So much of this depends on the antenna. Yes, out of the box, it does not receive shortwave, CB, and higher frequencies well. With a shortwave reel antenna or even just copper wire, it receives broadcasts more than adequately - just below the performance of a Grundig Yacht Boy. With other antennas, performance also increases. Some experimentation is required to find what best suits you, just be aware that the antenna is a SMA antenna, not a standard BNC connector; of course, you can get adaptors as necessary.<br /><br />The receiver is less modern when it comes to connecting it to a PC. Reportedly, it can connect to the PC via the headphone jack, and there are programs to work with it, but I haven't dared. They also seem to be fairly limited in their usage.<br /><br />Since it lasts a fairly long time on two AAs, it is a great scanner to carry everywhere with you - AAs are typically readily available, and its portability allows it to be in your briefcase or jacket.<br /><br />Some warnings for new scanner users: </p><ul><li>The radio is more complex that other scanners, so expect a bit of a learning curve. </li><li>If you live in an area that uses trunking, the scanner will not follow local radio conversations as easily. </li><li>If you live in an area that uses digital transmissions, you will not be able to use the Icom to listen in on them. </li><li>Some government services use the 800MHz band - check before purchasing, since that band has some blocks on the Icom. </li><li>There is no keypad, so entering frequencies may be more laborious than you would want. </li><li>Icom is very clear this is a communications receiver, not a scanner. What I think they mean is that most scanners search through frequencies much faster and have more scan options. In my mind, it is still a scanner, just with a slower scan.</li></ul><br /><div></div>CloakSpyhttp://www.blogger.com/profile/12608616835137458262noreply@blogger.com0tag:blogger.com,1999:blog-6372094241049630427.post-12065079687743970542006-12-31T16:06:00.000-05:002006-12-31T16:44:51.623-05:00Equipment: Lighter CameraToday's review is a bit overdue: the <a href="http://www.amazon.co.uk/Digital-Dream-JB1-James-Camera/dp/B0000C05LE">007 Lighter Camera</a>. Who wouldn't want something that actually appeared to come from Q's laboratory? This gadget does fit that bill fairly well, and offers some good espionage points, but it does have its limits.<br /><br />The camera actually does look and feel like a Zippo, although slightly wider than the normal lighter. I imagine it was based on another camera that actually saw espionage missions, the <a href="http://www.vintagephoto.tv/echo8.shtml">Echo 8 Camera</a>. On the base of the lighter, it is stamped with the "007" logo and markings. Not sure why they did that, makes it a bit less subtle, but fortunately it is not often noticed.<br /><br />When opened, the camera controls are exposed so that you can immediately take a shot. The camera itself is removable. It is a plastic body and again has an even larger "007" logo (again, why?). On the front is the lens and a small microphone, the back has a very basic LCD display, an LED, and a mode selector button.<br /><br />The actual usage of the camera is a mixed bag. The camera is powered by a single AAA battery. Turning on the camera takes surprisingly long - the mode selector is pressed for 1-2 seconds, and the camera is ready in another 1-2 seconds. Available modes are:<br /><ul><li><strong>Standard 640 x 320 camera</strong>. Not bad pictures - of standard cell phone variety. Since there is no flash, it does not do indoor shots very well unless lit by florescent lighting. Taking pictures of documents works occasionally, so if using it that way, make sure to take a lot of shots.</li><li><strong>Lower resolution camera</strong>. Never used it, don't see the point.</li><li><strong>Self-timer for either resolution</strong>. Good for "civilian" use.</li><li><strong>Video clip mode with audio</strong>. This very useful feature can film a good length of time, maybe 45 seconds, and has better night vision than the regular camera. </li><li><strong>Audio recorder</strong>. Functions well for voice notes or recording a single source, but inadequate for most jobs.</li><li><strong>Surveillance</strong> (or "JB" for "James Bond mode" - ugh). Great feature with a silly name. You can specify an interval (from 1 minute on up) upon which the camera will take a picture. An unfortunate problem with this mode is that it still beeps every time it takes a photo. However, I have used this quite often and have found it useful. I have left the camera behind in an area I wanted to watch, and it works amazingly well. Typically it is a good idea to hide it in something else; <em>e.g.</em> a box of tissues (which masks the beep) or beside a computer.</li><li><strong>Clear memory</strong>. Erases everything on the camera.</li></ul><p>The device also works as a USB drive, but if you take a picture after using it that way, whatever you placed on the device will be overwritten. Connecting to the device as a regular USB drive is a much more pleasant way of recovering your photos.</p><p>Reviews will tell you that the camera records the video clips in a proprietary format. That's true, but if you use the included software to copy the files over, you can find those films under the <em>Bond </em>directory as AVIs. As for other media, the pictures are recorded as JPGs and the recordings as WAV.</p><p>The full package is very nicely packed in a clever, albeit cardboard, presentation box. Included with the device: a small case, a standard USB, and a smart compact USB cord.</p><p>Actual usage of the device has shown its strong points. Traveling with the camera is great, and this is how it works best as a true James Bond gadget. I've never tried to take it on a plane since it would likely cause a stir. Taking covert photos is not too difficult either, but it will take a bit of practice to learn the timing of the device. Is it a serious camera? Many people will say it is a toy, but practically it works just as well as many of the espionage cameras up through the late 80s. Russian intelligence was even experimenting with a pinhole camera for site surveillance, and they would have been very happy with this gadget. So, yes, the camera can be used for some serious work: pictures of sites, people, and vehicles. I would not rely on this camera for photographing documents except in dire circumstances, but I have found it to work in that capacity. The added bonus of being concealable and disguised is very nice indeed.</p><p>Though it was previously available at ThinkGeek, the camera has disappeared from their inventory. I have seen it on EBay a couple of times and I'm certain other sites will carry it. At its debut, it was $99. I was one of the early adopters since I am a sucker for Bond-like gadgets, so I was a bit dismayed when it lowered to $69. With the cameras available now, I would think that around $50 would be fair market value in 2007. That being said, I feel like I have gotten out of the camera what I paid for it.</p>CloakSpyhttp://www.blogger.com/profile/12608616835137458262noreply@blogger.com0tag:blogger.com,1999:blog-6372094241049630427.post-47430491018040955702006-12-30T14:35:00.000-05:002006-12-30T14:51:45.986-05:00Method: Your cellphone as a gadgetOn EBay and on the Internet in general, I notice people looking for infinity bugs and audio bugs, and they must pay astronomical sums for those items because, wow, those stores charge a lot. Not sure why people are going for these devices either.<br /><br />The infinity bug (a phone device that allows you to call the phone without it ringing and use the speaker to hear everything in the room) is unquestionably cool, but I have yet to find a reasonably priced device that does what it says it will do.<br /><br />The audio bugs, well, that's another story. First, I've heard that purchasing these might be illegal in the first place... but not sure if that's true. Second, why do all of them broadcast in the regular FM band? I mean, how hard is that to find? You don't even need a bug detector to find it, just use your regular FM radio. Not very smart, IMO - at least have it be off the FM band, right?<br /><br />Your cell phone, however, likely has all of these capabilities. Try this experiment:<br /><ul><li>Turn off all ringers and make sure vibrate is not on.</li><li>Set Auto Answer to On (or even better, Speakerphone).</li><li>Place the phone as your "bug" in the target area.</li><li>When ready, call from any other phone <strong>with mute on. </strong>If you want to be slick about it, dial *67 beforehand to make the other phone anonymous.</li></ul>You should notice that your phone works excellently in this regard. The speaker of these phones are excellent to get full room audio. They are also only somewhat larger than these expensive devices that are on the Net. Some nice extra bonus:<br /><ul><li>If it is a digital cell phone, it is sending the audio at 1800MHz - outside the range of some frequency counters and bug detectors.</li><li>The audio is essentially encrypted - you can't eavesdrop in on the transmission without really advanced equipment.</li><li>It is a needle in the haystack - even if audio transmission was suspected, it is just one of thousands of cell transmissions occurring at that moment.</li><li>It is with you at all time - the best device you've always wanted is right there with you and does not attract attention.</li></ul>So, skip those other devices... just use what you have.CloakSpyhttp://www.blogger.com/profile/12608616835137458262noreply@blogger.com0tag:blogger.com,1999:blog-6372094241049630427.post-78832358033390166302006-12-30T14:08:00.000-05:002006-12-31T16:46:43.387-05:00Equipment: Optoelectronics ScoutOne of the main components of my radio kit has been given high accolades by scanner enthusiasts everywhere: the <a href="http://www.optoelectronics.com/scout.htm">Optoelectronics Scout</a>. It is a frequency counter, which is a device that can be used to acquire frequencies that might be hard-to-acquire through normal means. An example of use would be to stroll by an individual using a radio - the Scout would log the radio frequency the agent was using so that later you could type it into your scanner and listen in.<br /><br />The Scout itself is large, and is unmistakably important and technical; <em>i.e.</em> you couldn't pass it off as a pager or garage door opener. It is slightly less tall than the very first GameBoys (for those of you that remember those), but about the same size in all other respects. The Scout does provide a number of features that are of interest for Intelligence value:<br /><ul><li>Logging of each frequency encountered - up to 400 seperate frequencies - and counts of how many times it was received. Very nice, of course, when strolling through an area with it under your jacket. It also means that you can leave it in an area unattended (say, for example, your car or in a briefcase).</li><li>A so-called "discreet" vibration alert when frequencies are received. However, this vibration is loud enough to be noticed - to the point that I typically will just use a "beep" instead.</li><li>Different modes: capture and logging of frequencies, unfiltered analysis, and review of receptions.</li></ul><p>The Scout also provides two things that set it apart from other counters. First, it typically is not fooled by non-voice transmissions - if it displays one, it typically is a real transmission (however, it can get overwhelmed by commercial FM radio broadcasts). Second, it can control certain other radios so that they are automatically tuned to the received frequency - the practical upshot is that you would hear whatever is being broadcast on the other radio without knowing their frequency.</p><p>Before you immediately jump in and buy one, you may want to assess how often you are going to need the Scout. Most frequencies are available on-line - just search for your city and add the word "scanner". For those radios that are not listed, you can typically find it out by social engineering. Just ask to see the radio and make note of the FCC ID - that can be checked to find out the frequency. Also, if you live in an area where most of the radio traffic is digital, you are out-of-luck since the Scout only picks up analog radio. Yes, there is a Digital Scout, but, alas, I know nothing about it.</p><p>However, the Scout is nice to find hidden transmitters and immediately display actual radio usage (or listen to them immediately with the right radio). There is a sale on them at Optoelectronics, but you can get an even better deal on EBay. Try to buy one with an included antenna. More importantly, make sure that the battery is holding a charge and they are including the charger.</p><p>Some information on the Scout that might be hard to find in case you don't have a manual:</p><ul><li><strong>The more-obvious</strong>: setting the beep / vibrate / silent mode is all on how the switches are set when the unit is turned on.</li><li><strong>The slightly-less-obvious</strong>: clearing the memory is done by holding down the button while turning off the unit.</li><li><strong>The unbelievably-hard-to-find</strong>: if you are using the Reaction Tune feature, the Scout must be in CI-V mode. To go into that mode, put both switches in the down position, turn on the unit, pause for a beat, and toggle both switches up - if you do it right, you'll see a CI-V message. I thought my cable was bad for the longest time. Good luck finding this information anywhere else.</li></ul><p>The Scout is a great piece of equipment for analyzing radio traffic in particular areas, and it is a reasonably affordable and very professional counter-surveillance device.</p><p>I've had my Scout for a long time, and it has been of some value acquiring frequencies. I am a big Icom radio fan, so I recently acquired an Icom IC-R20 with the sole purpose of using it with the Scout for a reaction tuning. If you go to the Optoelectronics website, it will say, yes, it will tune the IC-R10 and IC-R20... unless you go to purchase the actual cable, where it will say, no, in fact, it is not compatible. The truth of the matter is that you can reaction tune an Icom IC-R20. You will need to either create a specialized cable or purchase one. If you subscribe to the IC-R20 group, you will find an individual that will sell these cables, or you can make your own. Best source for that:</p><p><a href="http://www.dg8jz.de/Scanner/IC-R20/ic-r20.html">http://www.dg8jz.de/Scanner/IC-R20/ic-r20.html</a></p><p>An IC-R20 and a Scout is an ideal setup: both can be placed in a briefcase and used to acquire the frequencies. If the recording feature of the Icom is turned on, not only will the frequencies be saved, but any broadcasts will be saved to the Icom's internal recorder.</p>CloakSpyhttp://www.blogger.com/profile/12608616835137458262noreply@blogger.com4tag:blogger.com,1999:blog-6372094241049630427.post-12989364789894650282006-12-30T14:03:00.000-05:002006-12-30T14:08:01.630-05:00Launching of CloakNetWelcome to CloakNet, a blog started in '007 to provide intelligence news to the rest of us non-governmental types. Our mission: provide you with the straight scoop on how espionage works, equipment reviews and how-tos, and even provide a few martini recipes. I'll be your host, so step into our quiet office in a non-descript neighborhood and learn more about the shadows lurking around us.<br /><br />As we get started, let me first say that I want to hear from you. Let us know how we are doing and what you would like to see. Of course, if you see interesting espionage activities or items, please forward them to me.<br />Starting out, I'll have posts in 6 categories:<br /><ul><li><strong>News</strong>. Any sort of activities that are of interest to the modern intelligence community.</li><li><strong>Equipment</strong>. The facts on gear - to help prevent rip-offs by so-called spy shops and so you can get good gear.</li><li><strong>Methods</strong>. Actual methods used by spies, or methods that could be included in their repetoire.</li><li><strong>Books</strong>. Details on available books.</li><li><strong>Crypto</strong>. Anything related to codes and cryptography.</li><li><strong>General</strong>. Anything else.</li></ul><u>The Obligatory Disclaimer</u><br />We, of course, are not a government entity, nor do we attempt to represent one. We do not perform actual intelligence work, and certainly have not acquired this information via spying. Information presented in this blog is for information and education, and absolutely not for use in any crime. Espionage is a dangerous activity. If you choose to engage in it, be prepared for the not-so-fun activities (e.g. detainment, incarceration, and depending on what country you are in [including possibly the U.S. - which still amazes me], torture). So, in other words, you are responsible for your own actions!<br /><br />Enjoy the blog!CloakSpyhttp://www.blogger.com/profile/12608616835137458262noreply@blogger.com0