Re: [TSCM-L] {3828} Insights from an expert on eavesdropping, technical surveillance

From: Rik Lund <srtec..._at_yahoo.com>
Date: Wed, 1 Jul 2009 13:24:56 -0700 (PDT)

>From - Sat Mar 02 00:57:23 2024
Received: by 10.210.88.3 with SMTP id l3mr759652ebb.5.1246475544656;
        Wed, 01 Jul 2009 12:12:24 -0700 (PDT)
Return-Path: <fernand..._at_kanguru.pt>
Received: from mailrly04.isp.novis.pt (mailrly04.isp.novis.pt [195.23.133.224])
        by gmr-mx.google.com with ESMTP id 15si382974ewy.4.2009.07.01.12.12.24;
        Wed, 01 Jul 2009 12:12:24 -0700 (PDT)
Received-SPF: neutral (google.com: 195.23.133.224 is neither permitted nor denied by best guess record for domain of fernand..._at_kanguru.pt) client-ip=195.23.133.224;
Authentication-Results: gmr-mx.google.com; spf=neutral (google.com: 195.23.133.224 is neither permitted nor denied by best guess record for domain of fernand..._at_kanguru.pt) smtp.mail=fernand..._at_kanguru.pt
Received: (qmail 9247 invoked from network); 1 Jul 2009 19:12:23 -0000
Received: from unknown (HELO mailfrt05.isp.novis.pt) ([195.23.133.197])
          (envelope-sender <fernand..._at_kanguru.pt>)
          by mailrly04.isp.novis.pt with compressed SMTP; 1 Jul 2009 19:12:23 -0000
Received: (qmail 24688 invoked from network); 1 Jul 2009 19:12:21 -0000
Received: from unknown (HELO acer93dc35eaa2) (Sent_by_authenticated_user_opt050369_at_[93.102.38.245])
          (envelope-sender <fernand..._at_kanguru.pt>)
          by mailfrt05.isp.novis.pt with SMTP; 1 Jul 2009 19:12:21 -0000
Message-ID: <EC40935817A243E4A6BB884B92875E35_at_acer93dc35eaa2>
From: "Fernando Martins" <fernand..._at_kanguru.pt>
To: <TSCM-..._at_googlegroups.com>
References: <DC273E61.AB73.49B7.A96F.B7F651400ED2_at_aol.com>
Subject: Re: [TSCM-L] {3828} Insights from an expert on eavesdropping, technical surveillance
Date: Wed, 1 Jul 2009 20:12:17 +0100
Mime-Version: 1.0
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 6.00.2900.5512
Disposition-Notification-To: "Fernando Martins" <fernand..._at_kanguru.pt>
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.5579

It is always amusing when somebody says "John Doe, the secret agent ...".
If the expertise is about secrecy, we are talked ...

"I also received training from a guy who was the top technical spy for the=
=20
CIA for 41 years and was their primary eavesdropper."
To who exactly his he trying to compromise the identity?

"Florida has one of the most advanced technical integrated systems in the=
=20
union "
So the bad guys only have to hack one system, right?

"Q. What type of security system do people generally use?
A. A four-camera system. Something that will allow you to watch the front=
=20
door, the back yard and maybe one camera inside that could connect right to=
=20
your television and record on your hard drive."
Ok, so even the wannabe black hat burgler knows that it doesn't mater where=
=20
the recorder is, he just have to smash the cabe tv conection box first...

"Q. Any new advances in technology we should be aware of?
A. One of the biggest crazes right now is Web video surveillance."
Well, it's my kind of guy ... let's start google then: intitle:"live view"=
=20
...

Why people forget the basics and became blind with technology?
yo, Peros (that in portuguese mean apple) do you know why CCTV stands for=
=20
CLOSED CIRCUIT TV?
Do you ever wonder why it should be CLOSED?

This world is full of new revolutions of software and hardware, while the=
=20
peoplesware is becaming more and more stupid because the hi-tech can think=
=20
for them.

The use of the internet in the electronic security systems is good, is not =
a=20
bad thing. But this days there is a HUGE diference from who is able to=20
install cameras or other systems, and other that is able to install SECURIT=
Y=20
systems. I wonder how many times clients understand the diferences? probabl=
y=20
in the price ...

DARPA invented the internet with the goal to create a communication system=
=20
that could be alive when others where gone. WEB means a WEB of connections=
=20
where a packet can travel in almost infinite routes to reach his destiny.

Most security systems are design forgeting this basis. They don't have=20
several communication channels and they are usualy full centralized in one=
=20
server. If the ONLY comunication channel and/or the ONLY database is=20
compromised, where is the security on that kind of system?

Regarding real intelligence (not secret services ...) one good reading is=
=20
the history about how portuguese where able to discover the maritime route=
=20
to India, in the times of the king D.Jo=E3o II, a real master in intelligen=
ce=20
services for the nation.The agreement of Tordesilhas was the only in our=20
history where we had an advantage in the negociation, because of our=20
intelligence services. This was in 2 July 1494. For speaking the true, ever=
=20
since and after him was only "secret agents" without "intelligence", and=20
that's why we had at the time half of the planet and now we don't have even=
=20
our litle frontiers secured from outside interests.

FM

----- Original Message -----=20
From: socalsweeps
To: TSCM-..._at_googlegroups.com
Sent: Wednesday, July 01, 2009 6:18 PM
Subject: [TSCM-L] {3828} Insights from an expert on eavesdropping, technica=
l=20
surveillance


Insights from an expert on eavesdropping, technical surveillance
business and economy By ANDREW DELONG, St. Petersburg Times
Modern-day 007s and average Joes can learn valuable lessons from Michael=20
Peros, who is a secret agent man in his own right.
He's an expert when it comes to communication security such as eavesdroppin=
g=20
and technical surveillance. He has crisscrossed the globe on assignment and=
=20
has been interviewed on CBS News' "48 Hours."
Privacy Electronics, his Largo, Fla., store of 23 years, houses some of the=
=20
most advanced technological surveillance equipment available. Many of the=
=20
products are custom manufactured by Peros and his team. Two decades ago, he=
=20
had no idea that a business like his would be so significant.
Here are some insights from Peros:
Question: Does it seem as if everything is wired these days?
Answer: It really is. Due to increased public and corporate awareness,=20
demand for technology has increased. We're going into the new digital age,=
=20
where everything is stored on a database. All cell phone activity and credi=
t=20
card transactions are being stored. We're getting away from the cash societ=
y=20
and going into the digital society.
Q: How did you get into the spy business?
A: I was educated at the University of South Florida in mechanical=20
engineering. From that point, I got involved in the electronic=20
countermeasurebusiness, which is currently what I do. It is communication=
=20
security and technical surveillance. I also received training from a guy wh=
o=20
was the top technical spy for the CIA for 41 years and was their primary=20
eavesdropper.
Q. Would people be surprised to find out how much Big Brother is watching?
A: I think people would be very surprised. At every major intersection,=20
you'll see multiple cameras installed for recording live video. A lot of=20
that is being tied into the central database system for the Department of=
=20
Transportation. Florida has one of the most advanced technical integrated=
=20
systems in the union when it comes to monitoring, recording, and storing of=
=20
public transportation areas.
Q. What type of security system do people generally use?
A. A four-camera system. Something that will allow you to watch the front=
=20
door, the back yard and maybe one camera inside that could connect right to=
=20
your television and record on your hard drive. It will allow you to store=
=20
between one and three months of video, so if something were to happen you=
=20
could come back and review it. This is very popular right now and is gettin=
g=20
to be very cost-effective, selling for only $599.
Q. Any new advances in technology we should be aware of?
A. One of the biggest crazes right now is Web video surveillance. There are=
=20
also a lot of things going on with spyware technology, which are programs=
=20
that can be put into computer networks in either e-mail or cell phones that=
=20
allow someone to monitor the activity. It captures information pertaining t=
o=20
text messages, phone numbers dialed, Web sites visited and what is being=20
typed on a keyboard on a target computer.
(Distributed by Scripps Howard News Service www.scrippsnews.com)
Must credit St. Petersburg Times
--

Michael Tomamichel
Security Specialist
FHG Properties - SoCal Sweeps
http://socaltscm.com







No virus found in this incoming message.
Checked by AVG - www.avg.com
Version: 8.5.339 / Virus Database: 270.12.91/2201 - Release Date: 06/25/09=
=20
06:22:00=20

Received on Sat Mar 02 2024 - 00:57:23 CST

This archive was generated by hypermail 2.3.0 : Sat Mar 02 2024 - 01:11:45 CST