Also available as a printable booklet with graphics.
Adobe Acrobat 3.01 file
Who are
these snoops?
Competitors, vendors, investigators, business intelligence
consultants, colleagues vying for positions, overbearing bosses, suspicious
partners, the press, labor negotiators, government agencies. The list is
long.
Why would I be a target?
Money and Power are the top two reasons behind illegal
surveillance. If anything you say or write could increase someone else's
wealth or influence, you are a target.
Is snooping common?
Yes. The news is full of stories about stolen information.
In fact, many news stories themselves begin with leaks.
Can I protect myself?
Yes. Espionage is preventable. If you know the vulnerabilities,
you can take the proper security precautions. Some spy tricks are obvious,
if you stop to think about it. Some are clever abuses of the new technology
we live with every day. All are devastating.
Time has shown that many of the same tricks are used successfully
over and over again. We present the top ten. Prepare to fight back.
#1 - Trash Trawling
Dumpster diving, waste archeology, or trashing, all refer
to rifling garbage in an effort to cull valuable information. This is believed
to be the number one method of business and personal espionage.
Surprise. In and of itself, stealing garbage is legal.
On May 17, 1988 the U. S. Supreme Court confirmed that there is no expectation
of privacy, or ownership, once an item is left for garbage pickup. Scraps
of seemingly useless information are synergistically related. The counterespionage
process is one of reducing the availability of these puzzle parts. Shredding
all waste paper is a major step in the protection process.
Recommendations & Tips
Encourage the destruction of all waste paper.
Purchase shredders appropriate for your needs.
Use crosscut destruction for high levels of security.
Computer paperwork and large volume waste require a central
bulk shredder.
Snoops love it when you save confidential papers in a cardboard
box under the desk. Shred it now.
Do not entrust wastepaper destruction to paper recycling
vendors. Destroy it before recycling.
Don't forget: you also need shredders next to copiers and
in the executives' home offices.
The big shredder purchasing mistake... Buying just one large
shredder for everyone to use. Reason: Not everyone will use it. Why? Some
people are too busy to be bothered. The better choice is several convenient
desk-side shredders. This is one perk / status symbol which has a very
positive payback. Bonus... Some companies promote their use of shredders
for protecting their clients' privacy. A service not offered by competitors.
#2 - Bugs & Wiretaps
Although most snooping involves other methods listed in
this briefing, electronic surveillance is the most devastating spy trick
there is. Very private - and irrefutable - secrets are the target of this
attack.
Common mistake... Saying, "Oh, I'm just being paranoid,"
when you suspect electronic surveillance. Think... You wouldn't be suspicious
if everything were fine. Something is wrong.
Course of Action...
Do not discuss your suspicions with others unless they have
a real need to know.
Do not discuss suspicions in suspected areas.
Do not attempt a do-it-yourself solution.
Do not waste money buying spybuster toys.
Seek professional guidance without delay. Contrary to what
you see on television, in the movies, or in catalogs, detection of bugs
and wiretaps is equipment and knowledge intensive work. Expect a professional
sweep team to have about $100,000 dollars invested in their instrumentation.
Their personnel will have deep experience in security, investigations,
electronics and telecommunications.
Hint: Don't bother to check the yellow pages. Contact
a corporate security director or professional
security organization for a knowledgeable recommendation. It's worth
the effort. We hope you will consider Murray
Associates services too.
#3 -The Drop By Spies
Check - and photocopy - the credentials and work orders
of anyone performing technical work in or around your offices. Double check.
Verify the work was actually requested and necessary. This includes:
telecommunications technicians
computer technicians
office equipment repair persons
paper recyclers
cleaning crews
electricians
et cetera
Have someone representing your interests accompany these
visitors while on your property. If possible, have them complete their
work during normal business hours. Outside contractors and unauthorized
company employees should never be allowed to roam unescorted within areas
containing sensitive information.
One professional snoop brags openly that any building
can be entered at any time, simply by posing as the air conditioning /
heating guy. His props include a clipboard with forms and an industrial
thermometer. Optional: a 2-way radio and a hard hat. If challenged, he
threatens not to come back for three weeks. Busy schedule, you know. No
one wants responsibility for denying this guy entry.
Other tips...
Check your locks and alarm system regularly. Make sure each
component really works. It is surprising how many effective-looking broken
locks and alarm sensors are relied upon for protection.
If key control has long since gone out of control, tackle
the problem now. Change locks and set up a system which will work. Consider
card key access.
When seeking assistance with security matters, be sure to
hire consultants who don't also sell products, and who will not accept
remuneration from companies they recommend.
#4 - Hacking & Cracking
Espionage aimed specifically at personal computers, laptop
computers, networks and remote access ports is rampant. Explain to everyone
who keeps sensitive data in their computers why security precautions are
necessary.
Example: The protect your laptop at all times rule. Replacement
cost is not your only loss, consider the...
valuable competitive and confidential data
time it took for someone to compile the data
time it will take to reconstruct the data
company's modem telephone numbers, and mainframe passwords
are probably stored on the drive.
When this information is lost, the company is vulnerable
to...
wholesale theft / corruption of mainframe data
and sabotage via viruses, Trojan horses, etc.
Bottom line:
Lower profitability.
Reduced job security for everyone.
More computer security tips...
Develop a communal sense of security responsibility.
Limit physical access to computers by outsiders.
Limit software access. Use quality passwords.
Secure PC related materials; disks, backups, etc.
Never leave an active terminal. Always log-off.
Report suspected intrusions and altered data.
Remove sensitive data from the PC when not in use.
Protect memory media: floppies and optical disks.
Copy commands can move sensitive data inadvertently.
Do not rely on deletion commands. Format instead.
Erase disks before disposal, or transfer to other use.
Disconnect PCs from networks when not in use.
Computers using phone lines need access protection.
Do not use unsolicited or borrowed software.
Backup all data on a regular basis.
Reformat hard drives before retiring old computers.
Do not discuss system security with anyone you don't know
- no matter what they tell you.
Q. What is the first rule of espionage?
A. There are no rules. If you have what they want, they
will use any means to get it. - M. Russell
#5 - Mobile Phone Leeches
Cellular and cordless telephones are among the easiest
of eavesdropping targets. Contrary to common perception, reception of these
conversations is generally crystal clear, without static or interference.
Each and every word can be understood. Use them with discretion.
Cellular radio-telephone communications can be received
by the general public over hundreds of square miles. In addition to being
an espionage windfall, monitoring of these transmissions has also become
a national pastime with opportunistic hobbyists selling their "finds" as
well.
Monitoring of cellular and cordless telephone transmissions
is illegal. Do not rely on the laws to protect your privacy, though. They
are generally considered unenforceable.
New techniques in cellular eavesdropping include computer
assisted, totally automated monitoring. This allows monitoring of specific
phones, 24-hours a day, from cell to cell, without human assistance. To
protect car telephone conversations...
Arrange to call in on a number which is not answered with
a company name or other identifying information.
Use first names and code words to identify special projects.
Speak in general and uninteresting terms.
Home cordless telephones can be received up to one mile
away. Use them only as an answering convenience. Switch to your regular
telephone for increased - not absolute - security.
If you must have a cordless phone, buy one which operates
in the 900 MHz frequency range using digital spread spectrum technology.
Other telephones which can be monitored include:
Commercial airline and rail telephones.
Ocean liner phone calls.
Long distance calls sent via satellite.
Long distance calls sent via microwave radio links.
#6 - Technology Traitors
Technological advancements give us many communications
conveniences. Portable telephones, for example. Unfortunately, they also
bring new opportunities for the snoops. Here are a few vulnerabilities
you need to know about...
Answering Machines. Messages left on many home
units can be remotely accessed using a simple two or three digit code.
Easy to hack. Most people never change the code which comes preset in new
machines. Some units also have a remote listen-in feature. Read your manual
carefully.
Voice Mail. The business version of an answering
machine can also be monitored. Use the longest password possible. Change
it often.
Baby Monitors. In reality, very sensitive room
bugs which transmit 24-hours a day. Monitored by passing burglars to see
if the house is empty, and by nosy neighbors. Use monitors sparingly. Plug
the transmitter into a light timer. Keep baby's door closed.
Fax Machines I. Some fax machines use disposable
rolls of black film in their printing process. Used rolls contain an exact
copy of all faxes received.
Fax Machines II. Receiving an after hours fax
transmission is similar to receiving mail without an envelope. Sensitive
messages are routinely read by bored guards and workers roaming around
the building burning up their overtime. Use a fax vault.
Cordless Microphones. Presenters at meetings
love using them. Unfortunately, they transmit crystal clear audio about
a quarter mile. Ban them from any meeting to which the general public would
not be invited.
Dictation Machines. You may shred the rough
drafts, lock up the file copies, and send the originals in security sealed
envelopes... but the dictation tape sits on the secretary's desk waiting
to be swapped.
#7 - Meeting Chameleons
Off-site meetings, conventions, trade shows, seminars,
etc. present the snoop with excellent opportunities for infiltration and
information collection. Alert your people to the problems. A simple briefing
should include the following advisories...
Off-site meetings are prime targets for snoops.
Spy methods used may be unethical or illegal.
Security will control meeting room access (24 hours).
Electronic eavesdropping detection will be employed.
Attendees must wear ID badges at all times.
Never leave your laptop or briefcase unattended.
Leave written proprietary information with security.
Proprietary data should remain in the secured area.
Do not discuss business in public areas.
Be suspicious of strangers who befriend you.
Report suspicious activity to security immediately.
Define Proprietary Information for your employees. It is
information which is not general knowledge and is related to the company's
products, methods, customers, plans, etc. It is any information which would
cause the loss of profit, or a competitive advantage, if it fell into the
wrong hands.
#8 - The Silver Platter
Sometimes we just give information away. How many of the
following items apply to someone you know?
Unlocked offices, desks and file cabinets.
Confidential paperwork left out overnight.
Posted, shared or simpleton passwords.
Phone directories which list everything but salary.
Credit card, Social Security, and unlisted phone numbers
posted in Rolodex files left on desktops.
Answering probing questions over the phone from people they
don't really know.
Sensitive topics discussed with known gossips.
etc., etc., etc.
The list gets longer the more you think about it. Solution:
Think about it, the list will shorten.
#9 - Business Phone Attacks
Feature-rich business phones provide snoops with a variety
of powerful eavesdropping options. The phones themselves provide: electrical
power; built-in microphones and speakers which can serve dual purposes;
and ample hiding space for bugs and taps.
Telephone security checklist...
Provide high-level security for telephone rooms.
Restrict direct dialing into the main telephone switch. Some
dangers of unauthorized phone system access include:
-
Complete deprogramming of the switch.
-
Secret reprogramming to allow access to...
-
free calls,
-
voice mail,
-
executive override features (which allow forced access to
busy extensions),
-
bridge tap creation (allows silent monitoring from other
extensions),
-
hands-free intercom (allows room monitoring from other phones),
-
and monitoring of the station message detail recording which
maintains a record of all phone calls.
-
Recommendation: Replace the regular dial-up modem - which
connects the switch to the outside line - with a call back type modem.
With this configuration, PBX connections are limited to authorized phone
numbers.
Secure the on-site programming terminals.
Be sure the System Administrator is trustworthy.
Conduct periodic inspections for wiretaps.
Conduct surprise audits of the software settings.
Remove all unused wiring from sensitive areas.
Make sure that voice mail and switch access passwords are
high quality.
Ask phone system users to report all suspicious calls and
voice mail aberrations to the security department immediately. In addition
to snooping, these may also be indications of hackers trying to enter to
steal services.
#10 - Treason
Another type of spy - the trusted employee - is one of
the most dangerous and hardest to spot. The most likely candidates are
employees who may...
Be disgruntled, possibly related to insufficient raises,
promotions, etc.
Have incurred large debts due to gambling habits, unavoidable
personal circumstances, or drug use.
Be involved with labor / management issues.
Have entrepreneurial personalities.
Protection tips...
Inspect for eavesdropping devices. These people have the
time and opportunity to place and monitor.
Selectively drop false bits of information and watch to see
where they surface.
Conduct background checks on all new employees and periodic
checks on anyone with access to sensitive information.
Check previous employment carefully.
Uncover periods of employment not mentioned.
Verify periods of unemployment.
Living beyond their means may indicate extra income paid
by the recipient of your business secrets.
The good news...
Espionage is preventable, and knowing a snoop's tactics
is the first step toward obtaining protection. You now have enough knowledge
to begin that process confidently.
What does a spy look like?
There is no exact answer, but a composite picture was
developed by the Business Espionage Controls and Countermeasures Association...
21-35 years old. Female as often as male.
College graduate with a low-value degree.
Broad, short-term employment background.
Money problems - low pay, poor self management.
Military intelligence experience.
Acquaintances with law enforcement backgrounds.
Considered an outsider or loner.
Disability precluding a law enforcement career.
No police record prohibiting sensitive employment.
Has driver's license, possibly a poor driving record.
Romantic hobby / interest. (Writer, photographer, sky diver,
scuba, etc.)
Collects underground & paramilitary literature.
An active interest in firearms, often with training.
Recruited from a want ad for Investigative Trainee.
Often just a drone of a professional handler.
Abilities in music, chess, math, etc. - skills associated
with code breaking and espionage.
Keep this list in mind, but remember... Your snoop could
be anybody.
* * *
About the author...
Kevin D. Murray - CPP, CFE, CCO, BCFE has been solving
electronic eavesdropping, security and counterespionage matters for business
and government since 1973. His many written works include:
- Electronic Eavesdropping Detection section of The Protection
of Assets Manual.
- Security Management magazine articles.
- Electronic Eavesdropping Detection and Industrial Espionage
- The Missing Business School Courses.
His course - Electronic Eavesdropping Detection &
Industrial Espionage was especially prepared for the John Jay College of
Criminal Justice in New York.
Mr. Murray is a Board Certified Forensic Examiner; a Board
Member of the International Association
of Professional Security Consultants; on the advisory board of the
Business Espionage Controls & Countermeasures Association; and is a
member of the American Society for Industrial Security.
He may be reached via:
email - murray@spybusters.com
Phone - 908-832-7900
Mail - PO Box 668, Oldwick, NJ
08858 (USA)
URL - www.spybusters.com
Murray Associates services are available to corporations
and government agencies only, throughout North America and selected foreign
countries.
This briefing may be distributed freely... provided:
- all text, formatting, and this notice, remains intact;
- it is not used for commercial purposes;
- and the author is advised of the usage.
Thank you.
©1992-98, Kevin D. Murray - CPP, CFE, CCO, BCFE
|