Actual forms of
attack and its corresponding methods of defense we will reveal to you
together with a few illustrations on this page:
There are
unmeasurable possibilities of interception attacks as you can see by
the below shown picture. The attack can occur wireless or along wires.
Either way the attacker has the possibility to transmit, record,
evaluate and transfer words and pictures without being recognized.
Great dangers can be
produced by masked mini-transmitters in ashtrays, ball point pens,
multiple sockets a.s.o, but also by the tapping of data and telephone
lines. Video bugs are also becoming more popular; weak points can be
found anywhere in your premises.
Just nowadays, when
more and more businesspeople have decided to meaningful encrypt their
telephone conversation, faxes, E-mails and video conferences, an
interceptor is only enabled to attain the “not yet
encrypted” valuable data and conversation through internal
informtion lines.
You would be shocked, how easy it is, to have you intercepted frequently !
Here we will
introduce to you a basic choice of of control resp. electronic
attacking methods, since the possibilities are enlarged resp. furter
developed day by day.
It is almost
impossible for us to advise you of all combination possibilities for
devices in espionage attacks because the limits of execution are only
stopped by your imagination, your special knowledge and your portfolio.
Moreover we would
like to memtion that unlocking devices for all kinds of doors resp.
doorlocks exist since many years, with no traces left behind. To see
such a small tool in action will leave you sleepless. You can ask key
services in your area.
“Bugs” Mini-transmitter
FUNKTION:
Hidden, masked room microphones will transmit conversation via radio,
range from 20 m to 5 km.Connected to scanner mobile unit range
worldwide. Power supply usually by battery, but also by power-line and
telephone net or solar cells. Passive bugs do not need a built-in power
support. The power used is transmitted from outside.
HIDING PLACES:
The electronical Hardware is very small and can be hidden in each
cavity, in double ceilings, double floors, furniture, electronical
devices or plants. The success of the attacker depends on his
experience and creativity.
EXPENDITURE:
The installation is very easy. Simple bugs are available for 100 Euro.
Very popular are hidden installations (for example in electronical
presents like watches, pocket calculators) which are placed in the
surrounding of the victim by himself.
PERPETRATOR:
Each person with access to business/conference rooms. Employees,
visitors, cleaning/service personnel, craftsmen. In fact everybody with
a strong motivation is able to enter the target rooms, if they are not
strong secured.
Back to the general map
Mini-Recording Tape
FUNKTION:
Very small devices which records conversation. A recording tape not
bigger than a bankcard is able to record 3 hours, the smallest unit in
a pencil records minimum 70 minutes.
Newer products have digital record times of more than 4 hours.
HIDING PLACES:
Almost always visitors are bringing tapes along to record confidential
talk. These devices are carried along close to the body, in briefcases
or built in other conference utensils (The thermos bottle is winking).
EXPENDITURE:
Every amateur can make use of such mini transmitters. One such
instrument in the size of a checking card starts at about €
300.00.
PERPETRATOR:
Visitors who want to secretly record the spoken words.
Back to the general map
Electronic Stethoscope
FUNKTION:
The attacker uses for example a radiator or the whole wall as a
microphone. Sound waves, forcened for example by the body of a
radiator, are recorded, filtered and made audible.
HIDING PLACES:
The attacker usually is located in a neighbor room. Very effective
places are as well logistic shafts which are constructed vertically
through each floor.
EXPENDITURE:
Top products are able to guarantee a brilliant audio quality, they cost
around 2.000€. Weaker units are available for 200€.
PERPETRATOR:
Each person with access to the specific rooms. This procedure works
even through a glasswall or window. Internal and external attackers
possible.
Back to the general map
Radio by Wire
FUNKTION:
Functions within the building. The longitudinal-wave transmitter uses
the 220-Volt power lines as an antenna and receives the power from the
power net. These power net bugs therefore don’t need batteries.
They are especially suitable for a long-lasting “data
connection” (This babyphone technique is well known by every
father).
HIDING PLACES:
Built in 220-V electronic devices. Very often interceptors change
actual against specially prepared devices or implant this small
transmitter while repairing it or during favorable updates. Most likely
is the fitting into well known trade multiple sockets (Is offered ready
for use via internet including manual since years).
Tip: One should check the junction sockets in their rooms !.
EXPENDITURE:
Additional receiver systems are needed with bugs (is simply put into
anyone socket in the house). This system is from € 500 –
1,000.
PERPETRATOR:
Visitors, engineers, employees. The reception is only within the building.
Back to the general map
Permanently wired room microphones
FUNKTION:
The classical Stasi-bug is often permanently installed during the
erection of a building. Conversations are intercepted from a stationary
interception unit in the building, evaluated and transmited.
HIDING PLACES:
These room microphones are mostly placed in ceiling panels and wall cavities.
Expenditures: Can only be achieved with high expenditures, but then unlimited working and service life.
PERPETRATOR:
Professional interceptors in embassies and foreign country-offices,
hotels and especially conference centers, first class passengers in
airplanes of certain airlines (we will not mention a special airline
hiere !) a.s.o.
Back to the general map
Directional Microphones
FUNKTION:
The sound is captured by a parabol directional microphone and standard
directional microphone. The sound-waves are repeatedly amplified,
filtered and evaluated just like body sound microphones.
HIDING PLACES:
The interceptors are on the watch in the surrounding area on benches
and direct the tip of their umbrella unnoticed toward you or your open
office window. This tip of the umbrella, secured with a small casing
while taking a walk, is the actual directional microphone (Umbrellas
are naturally made for interception, shooting and avoiding rain).
Expenditures: Every amateur can point this directional
microphone at you. Simple application. Efficient devices start at
approx. € 400.
PERPETRATOR:
If amateur or professional, everyone is capable.
Back to the general map
Telephone Bugs
FUNKTION:
The perpetrator clips it directly onto the telephone lines, which also
provides the power. The transmitter is activated when the receiver is
lifted off the phone or permanently observes the room in matters of
sound waves or is activated from outside.
HIDING PLACES:
Telephones, telephone connecting sockets, within our outside the
telephone lines of the building (distribution box, switchboard of the
telephone company).
Expenditures: A trained amateur can easily place the
sugar-cube sized telephone bugs. Price starting at approx. € 150
including manual.
PERPETRATOR:
Service engineers, husbands, in the end everyone who knows how to buy
at the internet (You also know how an internet shop functions,
don’t you ?)
One has to assume high criminal energy of the perpetrator when installing them into distributor boxes.
Back to the general map
Camera bugs
FUNKTION:
Hidden camera bugs transmit audio and video signals via radio with a reach of 20m up to 5km.
In connection with a reciever-mobilephone-unit it has a global reach.
The power supply is mostly done by battery, power net units are also
available.
HIDING PLACES:
The cameras are very small, not bigger than a thumbnail, and can be
hidden in each cavity, in double ceilings, double floors, furniture,
electronical devices or plants. The success of the attacker depends on
his experience and creativity.
EXPENDITURE:
The installation can be done very quickly. If installed in a wall clock
or in a computer monitor, the infected object will be placed well
visible in the specific room.
Pre-installed radio camera systems in ceiling panels for double
ceilings have just to be replaced with the original above the target
working place. This will take a maximum of 30 to 60 seconds
installation time.
Simple systems are available for 50€ and are very often installed in business presents or other gifts.
PERPETRATOR:
Each person with access to the specific rooms like employees, visitors,
cleaning/service personnel, craftsmen. The attacker could also carry an
active hidden system at his body (i.e. tie or pencil). He will be able
to copy each document or information in his view in realtime.
Back to the general map
Fax Monitoring System
FUNKTION:
This system additionally controls all incoming and outgoing fax
messages on paper or hard disk without participants taking notice.
HIDING PLACES:
This device is directly connected to the fax line (telephone line), the same as the permanently installed telephone bug.
EXPENDITURE:
Fax monitoring systems start at € 4,000.
PERPETRATOR:
Professionals who act on purpose and can spend enormous amounts of money.
Back to the general map
As already mentioned, this is only a short list of
espionage utensils which can be acquired by everyone and is only a
short overview for you concerning the aforementioned matters. If these
individual methods of attack are usefully combined together, the
perpetrator achieves a highly effective and secure espionage attacking
method (e.g. bug is hidden in the office, scanner is positioned
three floors above it in the hinged on ceiling of a room and transmits
the conversation to a mobile phone or landline, perpetrator is located
overseas and is happy about the upcoming video conference).
|