www.1001TopWords.com |
Someone Spying?
Someone Spying? So are the Teddy Bear and the Potted Plant See the cuddly teddy bear over on the shelf? Well, it sees you too. "Right here in the camera, behind the left eye." said Marvin Badler, the owner of The Spy Mart a Monmouth County company dedicated to the proposition that what you don't know can hurt you and what you do know can protect you from being caught off guard. "There's a wireless camera transmitter in here." Mr. Badler said, holding the teddy bear in his arms and pointing to it's furry little head. " It can send a signal up to 300 feet away , so you don't even need a wire to attach it to a VCR. Mr. Badler a licensed Private investigator since 1961 and former chief investigator for the New York City Department of Correction, was demonstrating some of the item he sells from The Spy Mart's showroom. "See that planter over there." Mr. Badler said, pointing in the direction of an ordinary-looking potted plant. "There's a camera in the pot. We build it last week. I was shopping with my wife, I saw the planter and came up with the idea." Mr. Badler's business is answer to a challenge: how do you find out what someone is up to without his finding out what are you up to first? "Most of my customers are law enforcement types." Mr. Badler said, referring to police, private detectives and prosecutors investigators. Investigators who come to avail themselfs of the latest in clandestine surveillance technology. But we also have a lot of private-sector people and businessman who come in because they want to record their own telephone conversation or because they're afraid of their business are being bugged." Paramilitary Atmosphere The Spy Mart, which Mr. Badler opened about two years ago, is on the second floor of an office building in Marlboro, New Jersey. Mr. Badler, a tall, burly man with a penchant for 10-gallon hats, also runs his private investigation and security business from the location. The atmosphere is decisively paramilitary, with a secretary and an assistant calling Mr. Badler "sir" in terse formal exchanges. He instructed the secretary to call him on a telephone atop one of glass display cases that line the walls of the showroom. The phone rang , and Mr. Badler lifted the receiver. "This is a prototype." he said, telling his assistant to pick up an extension in another room. A red light on the phone blinked on. "See? The phone went dead." Mr. Badler said holding the receiver our for a visitor to verify that the phone was quite dead." "What happened was, if I'm talking and somebody gets on the line with a listening device or comes in the room with a transmitter , the light goes on and the phone automatically disconnects the conversation." He intends to market the new telephone to other spy shop around the country. The price? About $750.00. Many of the devices in The Spy Mart showroom, including the phone that goes dead, are items Mr. Badler designed himself and then built out of components available at any well - stocked electronics store. "This is a microphone in a button." he said, holding out for inspection what appeared to be, well, a button with wire attached to it. "You can put it on a selves of your shirt and attached it to any tape recorder." he said. "It's battery powered, and you can change the actual button so it matches the buttons on your shirt." He then showed me a pen that, he said, has a tiny microphone inside. Even upon close inspection, nothing about the pen appeared unusual. "The microphone is behind that hole," he said, indication a hold bout the size of a period at the end of this sentence. "It's supersensitive, too."he said, asserting that the tiny microphone is about 10 times more sensitive then the microphones built into microcassettee recorders now on the market."See the calculator?" he said, pointing to a credit-card-size calculator."That's a transmitter. But it's not for public use, only law enforcement. It's not FCC approved". Mr. Badler's clandestine eavesdropping devices fall into two general t for public use: hard-wired, like the shirt button microphone, which plugs into a microcassettee recorder, and wireless, like the calculator that transmits to an FM receiver some distance away. Behind the Picture Frame Some of the wireless transmitters, like the one that replaces an ordinary electric wall socket, can transmit up to a half mile away, drawing power from the house current. Others, which use tiny batteries for power and are about the same size as a sugar cube, transmit for a less distance but are handy for surreptitious placement in vases, behind picture frames and attached under tables and other furniture. "Again," Mr. Badler said, "these are for law enforcement, not for public use. It's illegal to record audio unless you are a party to the conversation." But if that's' the case, who might use the teddy bear camera with a video camera for a brain? "Anybody," Mr. Badler replied. It's not illegal to videotape." In fact, he said, the teddy bear was designed for clients who wanted to be able to keep track of how a child's nanny was treating the child when the parents weren't home. The teddy bear was set on a high shelf in the chid's room and connected to a video recorder locked in the parents room. The cost? "Around $1,000.00, not including the ,VCR." Mr. Badler said. "And there are ways we can make them work in total darkness." Mr. Badler pointed to what looked like a clock hung on a wall. He instructed his visitor to look at the a video monitor just underneath the clock. On the screen was an image of a confused reporter looking at himself looking at a video monitor. "Now watch this," Mr. Badler said, switching off the office lights, The image on the video monitor dimmed slightly but remained clear and distinct. "All we do is introduce a small infrared light source - we can hide it anywhere in the room - and it will bounce around and illuminate the room like it was daylight." A regular customer of The Spy Mart, a private investigator who declined to give his name, described yet another product that make use on infrared light. "I bought infrared filters for the headlights on my car." the investigator said, explaining that he used the filters while staking out errant spouses for divorce clients. "I sit in my car with a video camera , aim the headlights at the house or motel and wait. The infrared filters light up the place like it was daytime. I can see them, but they can't see me." The investigator said The Spy Mart was more then a high-the toy store for real-life Sam Spades and amateur spies. Marvin doesn't just sell you things and send you out the door," the man said. "He tells you how to use what you buy. He gives suggestions. You tell him what you want to do and he'll figure out how to do it." And for those new to the business of espionage and counterespionage, Mr. Badler also offers a small library of arcane books with such titles as "How to Disappear Completely and Never be Found." "Get Even: The Complete Book of Dirty Tricks," "How the Underdog Gets Justice" and "Methods of Disguise." Though The Spy Mart caters to law enforcement officials, Mr. Badler said, a growing segment of his business involves executive and business manages concerned about employee theft and corporate espionage. "We have a lot of small businesses installing hidden video systems," he said, adding that it is illegal to install such equipment in areas where people are entitled to expect privacy, like dressing rooms and bathrooms. Worries About Wiretapping "We also sell lot of systems to people who think their businesses or home items he showed his offices are being bugged or wiretapped by the competition," he said. "And we help people who want to record their telephone conversation. A lot of insurance brokers are now recording customer conversation, which is legal." Though the market for surveillance devices for law enforcement never seems to dry up, he said, the market among business customers tracks the economy."When things are bad out there for business, then business is good for me." Mr. Badler said. "When the economy is bad, people are stealing more, and there are ad thins going on." One of the last items he showed his visitor was is personal favorite. "This is a bug detector," he said, opening a case that contained a small electronic control panel. He took a small wand with a wire attached to it of the case and pointed the wand at the calculator, which really a hidden transmitter and was supposed to be virtually undetectable. The bug detector flashed and beeped and electronic warning. "It's one of my most popular items,"he said. Badler is now on the web: http://www.thespymart.com & http://www.implexsecurityproducts.com THE NEW YORK TIMES, JANUARY 30, 1994 Marvin Badler the founder is executive level experienced security and investigative expert with proven diversified experiences in: managed operations, applied automation and technical information systems, administrative, staff development, and supervisory skills. Career spans more then thirty-five years in both the private and government sectors, with increasing levels of professional responsibility to the highest level. The first American to be commissioned by the Israel Government as Security Consultant/Security Chief for El Al Israel Airlines throughout the USA.
|
RELATED ARTICLES
The Real Desire for the UK House Buyer Location location location, central heating, air conditioning, double glazing, good neighbours,good schools and a long lease these are just some of the factors that buyers consider when buying a property. So it was some surprise when we learnt that that new UK research (Jan 05) commissioned by the Homebuyer Show revealed something completely different. Emergency Telephone Numbers Emergency is a situation that poses an instant threat to human life or possessions though this description may be different in some areas. Deliberate bogus reports of an emergency are usually prosecuted as an offense. One should call for help any time there is a danger for life or public order. The emergency telephone number is a special case in the country's telephone number sketch. Alarm System: Wireless Remotes WIRELESS ALARM SYSTEM REMOTES Eavesdropping and Counter-Measures: Technology and Techniques You need to know how to protect yourself, since your security department or any consultant may not be truly aware of these threats and therefore not dependable. Since September 11th, a number of businesses entered the security field with little to no knowledge of the trade itself; only of its profit potential. Even outfits that have been around for some time and well-established have not been able to stay current with the latest innovations.Realistically, viewing your threat level has to be considered since everyone should expect some sort of impending privacy issue no matter how small. Thanks largely to the Internet you can arm yourself with much of the knowledge and equipment that the so-called experts use. If a respected agent of computer crimes for the Secret Service in NYC had his T-Mobile Sidekick hacked, who knows what else happens out there to others in any business.Realistically, viewing your threat level has to be considered since everyone should expect some sort of impending privacy issue no matter how small. Thanks largely to the Internet you can arm yourself with much of the knowledge and equipment that the so-called experts use. If a respected agent of computer crimes for the Secret Service in NYC had his T-Mobile Sidekick hacked, who knows what else happens out there to others in any business.We'll start acoustic ducting evaluation is the inspection of air ducts, baseboard heaters, coffee rooms, lounges, bathrooms or any way the architecture of a building can transfer sound. A simple example is to put your ear to a wall and listen. Basically anything that requires the use of the naked ear is called an acoustic bug. Softer surfaces can help muffle sounds but there are more efficient means out there. So be aware that the way an office site is designed can act as a conduit for conversations. Also, be aware of any changes can have adverse affects. Simply playing music can do wonders for masking conversations.Inspection of telephone equipment and wiring is called line analysis. This is trickier than it seems since sometimes a possible weakness has an actual purpose to the telecommunication system. Especially if it requires constant maintenance and software upgrades.All instruments should be opened and inspected. Ideally they should be compared with a known safe phone or device. If you're not sure, just remove that piece of loose components and wiring and see if the phone still works. The wiring can be modified in a switch within the handset that essentially turns it into a microphone. If you bypass this hook switch, you can listen in from anywhere on the landline. Technicalequipment won't be able to detect this. Time Domain Reflectometry is the sending of a pulse down a telephone line. If there is some sort of disruption; a wall outlet or wiretap; a portion of the pulse will besent back to the device called a Time Domain Reflectometer (TDR). Then the time difference between the reflection and the continuous run is measured. This helps in determining the distance to the anomaly.These devices can perform all sorts of diagnostics including mapping a wire network. That can be useful in locating a hidden phone. Hidden phones have several obvious uses such as making long distance phone calls to being placed in an office across the street to receive betting requests by bookies; a practice called back strapping. If you open up the modular jacks where you connect your phone, you'll usually see four wires. In most cases only two wires are connected; commonly known as ring and tip. If you see all four connected, be aware that is not usually consistent for most wiring situations, especially in homes. The other two wires could be used for a bugging device.For instance, the microphone you use in a voice recorder can be cut in half. Connect the mike head to one set of unused wires anywhere on the phone wire. Then, so long as there are no breaks in the wire, connect the other end to the jack that connects to your recorder. Now place your recorder to be VOX (voice) activated and now you have an extremely reliable bug. By the way, this should be manually inspected for since using a specialized bug detector may see nothing wrong or inconsistent. A bug such as this that connects to a wire is called a direct tap. The other general type is called an inductive tap. This is when an instrument is outside a wire but can still distinguish what's transacting over a wire. They are harder to detect since they don't draw power from the line such a standard telephone would. These are referred to as snuffle bugs. A simple probe used in hunting wire signals has a speaker, which can display sounds. Byaccident one day I was working on an apartment intercom system while using a probe. I could hear conversations throughout the building quite clearly just through the intercom boxes mounted on walls from the master unit in the basement.If you're using wireless headsets or cordless phones, the radio signals can be intercepted. A cordless phone acts like a radio, but depending on the frequency and a few other factors, can make interception extremely difficult. With some manufacturers, you can buy the same model as your neighbors or the office and have it join their phone system. Double check Caller ID boxes to see if they also record numbers dialed besides obviously those being received. If you're using VOIP (Voice Over IP), remember that calls can be recorded in a fashion identical to intercepting data between two computers. These packets of data can reassemble an audio file. Obviously electronic devices possess semiconductor components such as diodes, resistors and such. The method to hunt for these components is called Non-Linear Junction Detection (NLJD). The NLJD unit emits a radio signal while listening for the return signal from an electronic device. This becomes very useful when a bug is embedded in a picture frame or wall. The eavesdropping device doesn't have to be active for it to be discovered. If a device is active and transmitting wirelessly (or even on a wire), you can detect it with a Radio Frequency Spectrum Analyzer. Depending on the detection device used, you can determine whether voice, data or video is being sent, and possibly listen to the data. Try to use different size antennas or buy one that collapses. Different frequencies can be detected more efficiently by using various sizes. The use of filters with antennas can also help pinpoint devices on specific frequencies. Electronics such as computers, FAX machines and especially CRT monitors can radiate electromagnetic signals or pulses that can be received by other equipment. This is known TEMPEST. One way to complicate the surveillance of this is to use certain fonts and line walls or equipment with different gauges of copper mesh wire. You can further enhance this posture by using special paints, which block radio transmissions. Radio waves will look for a leak or break, so be careful of defensive applications. One-way window tints can help in blocking signals. Since an electronic device could generate some heat they can be detected in another way. The use of a thermal imagery device can detect and actually see minute amounts of heat radiated for your viewing. You can hide the heat signatures by using creams or neoprene. Technology exists to collect information from blinking LEDs of modems, routers, print servers and similar devices. You can only see some general blinking but with the use of properly tuned optics, filters, oscilloscopes and good timing you can discern much more. One of the LEDs on your keyboard can be altered to blink while you are typing in a fashion similar to Morse Code. You can also use a tap in the keyboard that sends out radio waves again similar to Morse Code and no anti-virus software will ever be able to find it. Even when a CRT computer monitor is facing a wall the light can be in a sense read by its flickering emanations from some distance. A good defensive measure is to buy new LCD flat panel types.Another approach to attacking FAX machines is to simply record the noises it makes and play it back to another machine. I used to do this for a client so they could keep a record of all the faxes they made and received. There are creative and potentially illegal defenses against wiretappers and Peeping Toms. One is to transmit an extremely high pitch down the wire, thereby rupturing the listener's eardrums. I knew someone who once sent a powerful electrical spike down his phone wire thereby destroying his divorced wife's recorder. By the way, this leads to another topic-expect the device to be discovered someday. Don't leave your fingerprints on it. He found it and had it dusted, thereby producing some prints. My friend used this as leverage against the Private Investigator that planted it. Advice to Private Investigators, a word to the wise: if you do this part-time, hire someone who does this full-time. This P.I. lost his license and almost went to jail. The lawyer who recommended him got into a lot of trouble as well. He received some unwanted attention from the Feds because of his telephone dealings went across state lines and also happened to involve the Post Office. There is another budding field related to this topic called Protective Intelligence. Currently there are only a few experts who do this kind of work.A laser or an infrared beam can be used at a considerable distance from a target building. Conversational sounds can vibrate unto solid objects such as windows. The beam's reflection varies in relation to the movement to the window, which is received and converted back into something audible. To mask the sounds, you could attach a vibrating device (basically an altered electric razor) to the window.Of course if the window is open, then a laser can target another object instead of the window. A beam of light or laser can be directed to go through a window onto a solid object thereby nullifying such defensive measures again. Generally you really can't detect such attacks unless the laser, infrared or light beam is being used that moment. Certain materials can be used to detect IR emissions, as well as the use of passive night vision gear. Certain fabrics or even a curtain may actually show the spot where a beam of light or laser is being focused. Unless the room is dusty or you have an artificial can smoke, you can follow the beam up to a point and guesstimate it's location. One type of optical bug is an infrared transmitter. When placed in the area of interest for transmission of the conversation to an infrared receiver which will then translate the conversation into an audible format.Many of these same procedures used can be applied to locating hidden cameras. A relatively new device uses a series of lasers to seek out optics. This wasoriginally intended to locate snipers by bodyguards.I have listed the techniques, counter-measures and then the counter to the counter-measures to prevent any false sense of security. Usually constant vigilance is your best weapon besides knowing what to look for. Even if you find a "bug sweeper" with good credentials, certifications and experience, ask them detailed questions. Not just to test them but also for your own peace-of-mind. This makes our job easier and we appreciate greatly when dealing with knowledgeable customers. Tips for Keeping Your Home Invasion Free Home invasion formerly known as burglary is the type of crime that you can do something to prevent. Home invasion falls into two categories burglary and robbery. In my book "Crime Awareness 101" I discuss the differences of both and what you can do. In this article I am going to address preventative steps to protect your home from being unlawfully entered. What is home invasion? Home invasion is where someone enters a dwelling with the intent to commit a felony, larceny (theft), or assault. In most cases these criminals look for easy opportunities or in other words look for the path of least resistance. In fact it is stated that statistically a home invasion criminal will not at the most spend more then two minutes attempting to break into a home. By understanding this, your best defense is to create a path of great resistance. Here some suggestions to securing your home. How to Use a Fire Extinguisher Millions of people everyday rely on fire extinguishers to put out minor fires which start in the home. Fire extinguishers contain a powder which is known to instantly put out a fire and prevent it from spreading any further. In 2004, fire extinguishers saved over 25 lives in the United States and prevented over 1,500 injuries. Fire departments all over the world encourage home owners to have at least one fire extinguisher in the home at all times. That said, studies show that approximately 80% of homeowners do have at least one in their home, but the question is do they know how to use it? What is Your Security Awareness IQ? Are you aware of the need for security? Fire Safety Tips Did you know that fire is the third leading cause of accidental deaths in the United States, yet most people ignore it. More than 150 workplace fires occur every day. So many of theses untimely deaths could have been prevented if they only had a plan. Alarm System Keypads The keypad is the device you and your loved ones will interface with daily. It is typically placed at one or more of the following locations: How to Keep Your Postal Mail Private and Secure Surreptious opening of most envelopes sent through the mail takeslittle effort and only minimal skill. Instructions are readily available on the Internet and in books suc as "CIA Flaps and Seals Manual"(Paladin Press). Alarm System: Sirens Alarm Sirens- There is both inside and outside sirens. Many towns have a noise ordinance, which should prevent your installer from putting yours outside, unless you are on a ranch where you need to know what's going on while your out in the barn. You would not want a neighbor running over to your place during an alarm as they might be confronting a dangerous situation. It is better to let the police do that instead. Kevlar Sheets for Your Home Walls Home security is more important today than ever. You may have even considered Kevlar Sheets for your home or car. They are available and there are some companies who specialize in these things. The military uses them in Humvees and other vehicles. In the Vietnam War the spotter planes and helicopter pilots would put bullet-proof vests on the floor boards since the AK-47 rounds would come up thru the aluminum and kill pilots. Without getting too dramatic you might wish to employ the same strategy in your home. Handling a Hurricane; Part 2 - Preparing for and Surviving an Approaching Hurricane Part 1 of this article described some of the characteristics of hurricanes and the damage they can cause. In the days before high tech weather forecasting, well organized emergency services, and mandatory evacuation, major hurricanes resulted in hundreds, if not thousands of deaths. Numbers That Can Save Your Life It's one of those things we don't give a second thought about. Many of us move into a house and never even change the number that's on the house. Why should you, it's the right number and that's all that matters. Well it may be the right number but can you see it at night or from the road? If there is an emergency and you have to call an ambulance, you certainly don't want them wasting valuable seconds looking for your home. Having a visible house number both day and night is critical. Home Security After An Earthquake After an Earthquake you need to do an immediate damage assessment. First go turn off the gas if you smell anything, a leaky gas line could explode and take out your entire home and your cats nine lives. Look for cracks in the slab or any areas where the house carpet is lifted up. Then walk around the exterior of the house, what do you see? Do you see downed fences, retaining walls, support structures holding up the garage at weird angles or any areas where your house was knocked off its foundation? Look also for water pipes which have been broken, if so shut off the main water line coming into the house. If there is extensive damage then that means the other neighbors have also and the entire area. Stand Alone Keyless Access - How Does It Work? Security and convenience are usually delicately balanced. If something is secure it isn't convenient and vice versa. It's convenient to leave your keys in the ignition, but it isn't secure. Keyless access products offer both aspects in an attractive package. How To Turn Thirty Dollar Web Camera Into Home Surveillance System Web cameras are really inexpensive these days. With no technical knowledge, you can hook up one or several camerass to your PC and create own surveillance system, much like CCTV (closed curcuit television). But you'll need the right tools first. Alarm Systems & Automobile Tires? What do alarm systems and automobile tires have in common? This may sound like a strange question to the untrained ear, but lend me yours and I will make sense of it. Security Alarm System Motion Detectors Passive Infrared Motion Detectors- These detectors are also known as PIR detectors. The technology they utilize is "passive infrared". The device is mounted on a wall or in the corner of a room. It sends invisible fingers out into the covered area in several layers. The top layer goes the furthest and averages about 60 feet straight ahead and 35 feet on the sides. Security Cameras For Your Peace of Mind The reasons for installing cctv cameras are the same whether you own a home or business. Protecting your property, family and employees is probably at the top of your list of priorities. You're not the only one that feels that way. Sales of home and business security systems have exploded in recent years. Even before 9/11, security system sales were on the rise. After the terrorist attacks, sales of home and business security cameras rose by as much as 20% over the course of three months. |
© Athifea Distribution LLC - 2013 |