Log in

No account? Create an account
log f-list backlog .nfo weev.net back back forward forward
Andrew Auernheimer
Oðinnsson. Market abuser. Internationally notorious computer criminal.
17 comments / leave comment
elder_quakers From: elder_quakers Date: January 9th, 2010 03:04 am (UTC) (link)
There are a lot of options. Your best bet is to start by using a basic one that just picks up RF transmission, but be aware that with the prevalence of cellular and wifi technologies, you will definitely be getting some some false positives, so they become useless for sweeping people (since they will most likely have a cellular phone that is on). After that, you can move into spectrum analyzers, but I think a neater place to head in that direction is to start using software definable radios. Using SDR transmission, you can also start bumping the devices to find out where they are being received.

If you're able to fingerprint the device by transmission freq / style, you can sometimes get lucky and find the agency using the device by public record spending reports if it's a government tap, or you can use a prior purchase to assist in prosecuting corporate espionage.

With smaller CCD's and increased memory storage, there is a trend to move into non-transmitting recording devices. White noise generating speakers (preferably RF-shielded & enclosed) on every reflective surface and lens detection are helpful here. If you find a nick or prism in externally visible glass, you can use a laser and IR cameras in assisting with finding the origin. I'm still working on non-visible camera defeating tools, but with a large amount of legislation on using lasers to scan another human and high quality IR deflection, this is still a fairly uncharted area.
17 comments / leave comment