Professional Counter-Surveillance Services

Instruction and Information in plain English or in short stories about Security. Advise on Security, Surveillance and Counter-Surveillance.

About

Recent Posts

  • Telephone Tone Decoder
  • New Bugs that work off Cellular Services
  • Looking for a Body Guard or Executive Protection Professional
  • Microphone Audio wires lead to a Storeroom
  • UHF Cellular Telephone Battery Transmitter, a New Spy Tool
  • UHF Long Range Transmitters
  • Computer Mouse used for surveillance
  • The Smallest Known Occult Transmitter known to this writer.
  • Recorders in Garage Telephone Wire Box
  • Telephone Line Intercepted at Central Office
Subscribe to this blog's feed
Blog powered by Typepad

Telephone Tone Decoder

Tonedec


This device is known as a Telephone Tone Decoder it is used by surveillance professionals and spys for decoding tones recorded on prerecorded conversations. When the conversation recorded includes the pick up of the telephone including the tones of the touch tone buttons when the telephone is dialed this device will help you tremendously. This device is small and handheld it has an internal microphone that decodes the recorded tones of tape recorders, speakers or from scanners. The numbers will automatically appear on a digital display. It can and will display telephone numbers up to 16 digits. This devices are sold by surveillance suppliers for about 490 U.S. Dollars. This writer has obtained such devices at about 90 U.S. Dollars. A good surveillance expert installer has one or more of this devices near by.


Interested in getting Counter-Surveillance services contact me via e-mail :

danielpraker@yahoo.com

or

daniel102846@gmail.com

I do travel throughout the United States, Canada, Mexico and Latin America to complete such services.

In my Counter-Surveillance services, I can or will sweep your home or office searching for occult listening devices, occult recorders and hidden transmitters. I will review all wires and signals going into or out of the building.

If required I can train your security personnel to perform weekly reviews of your buildings. I can train your security personnel to install surveillance equipment and provide counter-surveillance sweeps.

I sell and provide counter-surveillance search equipment and surveillance devices. I will never reveal to anyone the names or services requested or given to any of my or possible clients. I will always maintain my honor and loyalty to my clients. All contract services are considered secret and confidential.


July 06, 2009 | Permalink | Comments (0) | TrackBack (0)

New Bugs that work off Cellular Services

The Newest Surveillance Product on the Public market is known as the Unlimited range audio/video miniaturized bug. It is an audio / video (bug) transmitter that is based on the new UMTS technology, which allows the transmitter the transmission of good real time audio and video images.The small dimensions of this transmitter device allow its easy concealment in a radio alarm and other household appliances, or by means of a micro power supply furnished by us it's possible to connect it straight to the house power supply hiding it in a 10 x 5 cm. electric box.

The transmitter bug is hard to detect even when it's working and causes no GSM interference with TV and stereos. Video transmission is possible where UMTS coverage is present, it will only work in audio mode where there is no such a coverage (environmental listening).

It's use is easy, you just make a voice call to the device using any telephone for a voice call or an UMTS telephone for a video call.

Interested in getting Counter-Surveillance services contact me via e-mail :

danielpraker@yahoo.com

or

daniel102846@gmail.com

I do travel throughout the United States, Canada, Mexico and Latin America to complete such services.

In my Counter-Surveillance services, I can or will sweep your home or office searching for occult listening devices, occult recorders and hidden transmitters. I will review all wires and signals going into or out of the building.

If required I can train your security personnel to perform weekly reviews of your buildings. I can train your security personnel to install surveillance equipment and provide counter-surveillance sweeps.

I sell and provide counter-surveillance search equipment and surveillance devices. I will never reveal to anyone the names or services requested or given to any of my or possible clients. I will always maintain my honor and loyalty to my clients. All contract services are considered secret and confidential.

July 03, 2009 | Permalink | Comments (0) | TrackBack (0)

Looking for a Body Guard or Executive Protection Professional

Do you need a bodyguard?

If you say "Yes" than lets start out describing how to find one. First of all bodyguards are usually identified as "Personal Security specialist" or "Executive Protection specialist ". Executive protection specialists are not difficult to find but you must find one that is qualified to provide executive protection, one that is qualified to insure that the individual will protect your or another person's life.

Being in the business of having trained Executive Protection specialized individuals for many years. It can be difficult in finding the right one that possesses the right important quality of serving you in protecting your life. To this writer the most important quality that an individual must have to provide you with a professional Executive Protection is Loyalty. The one person that serves you in protecting you must also be loyal to you. This individual must never reveal your conversations, the names of your friends, the location of your favorites places to shop or visit. This individual must remain loyal to you and that loyalty must include a secrecy of your life. Not only must the individual protect you physically he or she must also protect your words your personal secrets.

I have seen many of the famous, hire bodyguards that are 375 or 400 pound thugs these individuals have histories of having worked as night club bouncers or bodybuilders. This thugs are problems waiting to happen sooner or later they will react violently toward the wrong person and it will cost money. Somehow I don't see 400 pound gorillas as the best bodyguards for anybody. There are many people who say "need a bodyguard search the internet"; but I say don't do this.


Be careful with who makes contact with you for the position. There are individuals who go get a certificate that names them "bodyguard" or "protection specialist" or "personal protection specialist" such certificates can be obtained for about 100 dollars and a short 8 hour course.

This people are not bodyguards they are dangerous fools with a damn certificate in hand. When looking for a bodyguard look for graduates of government schools.

The best way to find a good candidate is to get a copy of your candidates military discharge certificate known as the DD214. In that certificate you can find the military schools attended, units served with and weapons certify in. Look for airborne Marines, Navy Seals, Security specialist, Military Police, Army Rangers or Airborne troops as 1st Cavalry, 82nd Airborne, Marine Recon, or anyone with long range patrol expertise. Sometimes you can copies of their certificates at times you can't but remember if its on the DD214 it's as good as being certified and notarized.

There are other government organizations where you can find qualified individuals such as graduates of an Executive Protection course from United States Secret Service, US Dept. of State's Diplomatic Security Service, Federal Law Enforcement Training Center (FLETC), US Army Military Police School (USAMPS), US Army Criminal Investigation Division (CID), US Naval Criminal Investigative Service (NCIS), US Air Force Office of Special Investigations (OSI), British Special Air Service (SAS) or graduates from one of the few, recognized and respected civilian executive protection schools like ESI, Kobetz (Executive Protection Int'l), R.L. Oatman, Vance, Steel,. Also consider “Executive Protection/Protective Services/Corporate Security” personnel from a Fortune 500 corporation like Microsoft, Dell, Boeing, IBM, etc., with direct (not limited or collateral) experience.

Unfortunately many of those trained by professional international executive protection schools usually request high dollar salaries.

Those who reside in Mexico or Central America and have need for the services of professional executive protection may search for candidates at local Army installations. At such locations local Army officers can make recommendations on good individuals about to be discharged from the army that can be trained as executive protection very well.

One thing that this writer can say about former Mexican Army soldiers is that they are very dedicated and extremely loyal to those they serve. I once hired a recently discharged Mexican Soldier for a client in Mexico. The young soldier turned out to be one of the best Executive Protection professionals that I have ever known. He possess incredible skills and extreme loyalty. This former soldier's was a small size compared to most. But this young soldier could bring down a 35o pound man in less than three seconds.

When hiring one or thinking of hiring one get the candidates driver's license, identification cards and social security cards if you are in the U.S. You can do a criminal background check on the internet for 40 dollars. As for background checks do them. Have your candidate get them to sign a Non-Disclosure Agreement. Look for specialized skills and experience that your candidate has. Look for fire-arms training, look for counter-measures skills, knowledge of electronic alarms and security controls. If the candidate has prior executive protection skills find out who the people are. If he gives you a list of names remind him that your name must never be revealed. Remember that if a candidate starts revealing personal information it is possible that they are violating non-disclosure and confidentiality statements they agreed to. Do not accept the response "I can't tell you for reasons of privacy." Professional bodyguards are very careful about divulging information about former clients or protects, and they will find a way for you to verify their claims without violating confidentiality agreements.

Remember the person you hire is going to blend-in to your lifestyle. Can this candidate dress and act like you and the people around you? Remember avoid hiring people with anger or a combative mentality.

The candidate should also have the following qualities;

  1. Loyalty

  2. Discretion

  3. Intelligence

  4. Patience

  5. Character

  6. Attention to service

  7. Honor

  8. Respect

  9. Confident

  10. Commitment

July 02, 2009 | Permalink | Comments (0) | TrackBack (0)

Microphone Audio wires lead to a Storeroom

On a recent contract I discovered 5 wired microphones that ran down a 60 foot hallway, down three floors through an elevator shaft down about 35 feet to a maintenance room. In the maintenance work on a small table laid 5 tape recorders. The wired system had low voltage signal amplifiers located in the elevator shaft that assisted the microphones in relaying a clear conversation to each of the recorders.

In the same office same building,in a records storeroom shelve in an unmarked 4 inch file folder I found a wireless colored closed circuit television micro-camera. The camera was focused on a large table in the center of the room. The wireless CCTV signals were most probability recorded at an unknown location near by because the wireless signal went out on a 2.4 G Hz signal. Strangely, the camera was located in a non- business area.

After some private conversation with the Client and company Senior managers, I discovered that one of the Senior managers of the company would have sex with an executive secretary on the table where the camera was focused on.

This information is given out, with some details changed in order to protect the client and managers.

It is a good important lesson of counter-surveillance .In this incident someone found enough value in paying off the maintenance manager of a building to record conversations on audio and the video of prohibited events in a file storeroom.

The maintenance man would maintain the recorders and would replace the cassettes as required. He would replace the batteries for the wireless color camera in the storeroom.


Interested in getting Counter-Surveillance services contact me via e-mail :

danielpraker@yahoo.com

or

daniel102846@gmail.com

I do travel throughout the United States, Canada, Mexico and Latin America to complete such services.

In my Counter-Surveillance services, I can or will sweep your home or office searching for occult listening devices, occult recorders and hidden transmitters. I will review all wires and signals going into or out of the building.

If required I can train your security personnel to perform weekly reviews of your buildings. I can train your security personnel to install surveillance equipment and provide counter-surveillance sweeps.

I sell and provide counter-surveillance search equipment and surveillance devices. I will never reveal to anyone the names or services requested or given to any of my or possible clients. I will always maintain my honor and loyalty to my clients. All contract services are considered secret and confidential.

July 02, 2009 | Permalink | Comments (0) | TrackBack (0)

UHF Cellular Telephone Battery Transmitter, a New Spy Tool

Spy_ba_100x100

UHF Cellular Telephone Battery Transmitter

There's a new surveillance tool out in the market that can be used by those that want to spy on a Cellular telephone user. The surveillance tool replaces the original battery of the cellular telephone with a new cellular battery that also acts as a microphone that listens to conversations of cellular telephone users. The received conversation is transmitted out about 210 yards in good conditions for about two days. When someone replaces the cellular battery on the original cellular telephone the spy does not have to worry about recharging the battery because the victim or cellular telephone owner does that every night. The battery transmitter operates on UHF frequencys and is crystal frequency control. The cellular telehone transmits even when not on all conversations are monitored and transmitted out. The sale price of this tool is around 1200 U.S. Dollars.


July 01, 2009 | Permalink | Comments (0) | TrackBack (0)

UHF Long Range Transmitters

Ka_100_220x288


Surveillance professionals have used the UHF Miniature Long Range Transmitter for many years. This device transmits about 400 meters in open areas, 70 to 150 meters in city congestion areas. The device uses lithium 3 volt batteries (CR2-NP).

It is about 6 inches long by 2 inches wide. It is highly sensitive to sound and can intercept conversations at up to 30 meters away. The device transmits in the UHF frequencies usually around 450 to 600 MHz. The device can transmit for about 8 days on its battery. This type of transmitter can be hidden or taped to almost any location in a home or office. It can be taped to under a dining chair, under a desk, store in a drawer or in a coat pocket in your closet.


Interested in getting Counter-Surveillance services contact me via e-mail : danielpraker@yahoo.com or

daniel102846@gmail.com I do travel throughout the United States, Canada, Mexico and Latin America to complete such services.

In my Counter-Surveillance services, I can or will sweep your home or office searching for occult listening devices, occult recorders and hidden transmitters. I will review all wires and signals going into or out of the building. If required I can train your security personnel to perform weekly reviews of your buildings. I can train your security personnel to install surveillance equipment and provide counter-surveillance sweeps. I also sell and provide counter-surveillance search equipment and surveillance devices. I will never reveal to anyone the names or services requested or given to any of my or possible clients. I will always maintain my honor and loyalty to my clients. All contract services are considered secret and confidential.


June 30, 2009 | Permalink | Comments (0) | TrackBack (0)

Computer Mouse used for surveillance


Cp_1_350x263

Surveillance devices are now built into any device that can be imagined. Currently in the public market, surveillance dealers in Europe are selling to the public, a computer mouse.

A computer mouse with an internal microphone that monitors all conversations and it uses the computer's power source to power itself and transmit what it hears to a nearby receiver. The mouse transmits in the frequencies of 350 to 600 MHz in the transmission power of 25mW. This mouse is compatible with any modern PC this PS/2 type mouse simply connects to the mouse port of the computer.Concealed inside is an ultra-miniature microphone and transmitter circuit. This enables the slightest sounds from up to 10 meters away to be monitored at another location with clarity.It is an ideal device for long term monitoring in any environment where a computer terminal is used.The sale price of this mouse runs around 1650 U.S.dollars. Next time you are using your computer mouse remember what you speak in front of it could be transmitted to unknown persons.

Interested in getting Counter-Surveillance services contact me via e-mail :

danielpraker@yahoo.com

or

daniel102846@gmail.com 

I do travel throughout the United States, Canada, Mexico and Latin America to complete such services.

In my Counter-Surveillance services, I can or will sweep your home or office searching for occult listening devices, occult recorders and hidden transmitters. I will review all wires and signals going into or out of the building. If required I can train your security personnel to perform weekly reviews of your buildings. I can train your security personnel to install surveillance equipment and provide counter-surveillance sweeps. I also sell and provide counter-surveillance search equipment and surveillance devices. I will never reveal to anyone the names or services requested or given to any of my or possible clients. I will always maintain my honor and loyalty to my clients. All contract services are considered secret and confidential.

June 29, 2009 | Permalink | Comments (0) | TrackBack (0)

The Smallest Known Occult Transmitter known to this writer.


USTX_1

The smallest occult transmitter that I know of is known as the Ultra Slim Card (transmitter).It looks like a credit card and is sold by surveillance equipment suppliers in Europe and South America. The dimensions of the card transmitter is 5mm (thickness)29mm width by 58mm in length. It operates on 3 volt hearing aid lithium type batteries which last for about 40 hours. The transmission power of this transmitter is 10mW, the frequency is modulated in the Narrow Band FM 3 Khz bandwidth and operates in the frequency range of 350 to 600 UHF MHz and is usually set with a crystal. It has an internal loop type antenna.It almost always comes with a microphone and a receiver (receptor). It seems to be sold by many dealers for about 1456 U.S.dollars but it is worth at about 800 U.S.dollars.Unlike many transmitters it can be hidden in a book, a wallet, the front pocket or on a high shelve.It has incredible sound quality, it can pick up whispers at about 12 yards away.I have determined that its distance is about 200 yards or less.


Interested in getting Counter-Surveillance services contact me via e-mail : danielpraker@yahoo.com or

daniel102846@gmail.com I do travel throughout the United States, Canada, Mexico and Latin America to complete such services.

In my Counter-Surveillance services, I can or will sweep your home or office searching for occult listening devices, occult recorders and hidden transmitters. I will review all wires and signals going into or out of the building. If required I can train your security personnel to perform weekly reviews of your buildings. I can train your security personnel to install surveillance equipment and provide counter-surveillance sweeps. I also sell and provide counter-surveillance search equipment and surveillance devices. I will never reveal to anyone the names or services requested or given to any of my or possible clients. I will always maintain my honor and loyalty to my clients. All contract services are considered secret and confidential.

June 25, 2009 | Permalink | Comments (0) | TrackBack (0)

Recorders in Garage Telephone Wire Box

On a recent Counter-Surveillance contract in Mexico City,   I discovered numerous tape recorders attached to private telephone lines in the parking garage of the client's building. I completed a complete sweep for my client and found that the telephone lines were intercepted. I reviewed the office interior and found nothing so I followed the lines down the building six floors until I reached the garage and the telephone where I found the recorders.

I remove the recorders and took them upstairs to the client and we both began talking about the recorders. As we talked, my detector which was still hooked up to the telephone lines went off to an alert signal. I check the scans and the electronics told me that the lines were still intercepted. I went back downstairs to telephone box and discovered new tape recorders on the lines. Someone had just installed new recorders while I was upstairs. I went to the Closed circuit television surveillance system and found a recent recording of someone who had fifteen minutes after I walked of the boxroom walk in with boxes of recorders. After a short investigation it was discovered that the person installing the recorders was the building parking attendant.

That same afternoon, I installed a new hidden surveillance camera in the telephone boxroom to catch people going into the room. We later found out that the parking attendant was related to the building doorman. It was the doorman who had given the parking attendant keys to the telephone boxroom. It seems that both relatives worked for a competitor of my client.


Interested in getting Counter-Surveillance services contact me via e-mail : danielpraker@yahoo.com or

daniel102846@gmail.com I do travel throughout the United States, Canada, Mexico and Latin America to complete such services.

In my Counter-Surveillance services, I can or will sweep your home or office searching for occult listening devices, occult recorders and hidden transmitters. I will review all wires and signals going into or out of the building. If required I can train your security personnel to perform weekly reviews of your buildings. I can train your security personnel to install surveillance equipment and provide counter-surveillance sweeps. I also sell and provide counter-surveillance search equipment and surveillance devices. I will never reveal to anyone the names and services requested by my or possible clients. I will always maintain my honor and loyalty to my clients. All contract services are considered secret and confidential.

June 24, 2009 | Permalink | Comments (0) | TrackBack (0)

Telephone Line Intercepted at Central Office

I am very sorry, I have been out of touch. I have been working down in Mexico doing counter-surveillance services and training security personnel for some good old friends. I had to train the clients to perform disinformation conversations on the phones and security personnel to complete telephone and environmental sweeps. Information kept going out even though, I had checked everything out and found nothing.
Completed sweeps did not reveal anything within a two mile perimeter of the building. I had to conduct a sweep at the telephone central station about seven (7) miles away. When I got there (10 am in the morning), a strange delay occurred even though I was accompanied by State Police and a Court ordered search.
I found nothing but on the way out I talked to the Police Officers and convinced them that I needed to come back at 4 am. At 4 am in the morning, I went back in to the telephone central with the State Police and discovered twelve recorders with voltage compensator adjusters on 12 different telephone lines.
My clients telephone line was intercepted by recorder. It was never revealed to me, who the other telephone lines belong to. After two days of investigation, the State Police found out who (the telephone man) that was intercepting telephones.
Remember, Telephone surveillance can occur anywhere on the line. It can occur in your building or across town at telephone central office. Telephone surveillance can be completed with tape recorders. telephone transmitters or direct telephone taps.

Interested in getting Counter-Surveillance services contact me via e-mail : danielpraker@yahoo.com or

daniel102846@gmail.com 

I do travel throughout the United States, Canada, Mexico and Latin America to complete such services.

In my Counter-Surveillance services, I can or will sweep your home or office searching for occult listening devices, occult recorders and hidden transmitters. I will review all wires and signals going into or out of the building. If required I can train your security personnel to perform weekly reviews of your buildings. I can train your security personnel to install surveillance equipment and provide counter-surveillance sweeps. I also sell and provide counter-surveillance search equipment and surveillance devices. I will never reveal to anyone the names or services requested or given to any of my or possible clients. I will always maintain my honor and loyalty to my clients. All contract services are considered secret and confidential.

Respectfully,

Daniel Parker

Direct your E-mails or inquiries to;

daniel102846@gmail.com

or

danielpraker@yahoo.com

June 23, 2009 | Permalink | Comments (0) | TrackBack (0)

Counter-Surveillance Services

Do you believe that your office or home is under surveillance?
Do you need Counter-Surveillance services?
Contact this writer, Daniel Parker via this blog.
Your name and data will be kept confidential.
I do counter-surveillance services beyond the United States.
I have recently renewed my passport and am ready to go.

June 18, 2009 | Permalink | Comments (0) | TrackBack (0)

Carrier Current Transmitters ( the baby monitor).

Carrier Current Transmitters

Carrier Current Transmitters are devices that make up the major transmission part of the well known “Baby” monitors. This monitors are plugged into the electric plug and transmit the signal or conversation received over the electrical line to which it is plugged into.


Many similar monitors are used in business offices which transmit from the front reception office to a manager's office. Not long after the monitors hit the market many years ago someone in surveillance work realized how they could be used to an advantage.

A good and resourceful agent with expertise in surveillance will remove the transmitter side and install the transmitter into almost any electrical item such as an electric lamp, a wall or desk clock and in almost any electrical item. Both the transmitter and receiver must be plugged into the same electrical supply line. The transmission travels through the electrical line and not through the air as does radio.


These monitors produce an RF signal that is in a frequency modulated in the region of 150–300 kHz.


It is said by many electrical engineers that if enough radio frequency power is coupled to the mains wiring, then the information can be transmitted to a much further distance. That is the signal can travel up to the first nearby power company transformer.


In the many years this writer has been doing counter surveillance services, I found many of this type of surveillance devices in use in offices, homes and buildings.

In many homes where I found a device in a table top electric clock or an electrical item I always suspected the receiver was located in a nearby home.

While conducting counter surveillance service's in numerous high rise offices I have found carrier current transmitters where the receiver could be on any floor above or below the targets office.

If you suspect you are under surveillance by unknown individuals and need counter-surveillance services contact me via this blog. Your name and contact information will be kept confidential. Borders do not keep me from traveling internationally.

June 17, 2009 | Permalink | Comments (0) | TrackBack (0)

Tape recorders

Tape recorders

Tape recorders are always attached to the telephone line. The telephone line could be within the home or building. The line could be heading away from the home or building toward a telephone pole. The important part of the line is anywhere it can be connected. The advantage of tape recorders is that surveillance is conducted without wasting hours and hours of sitting in an area listening to endless conversations.

With a good tape recorder, conversations on a telephone line are recorded on a tape recorder only when a conversation takes place. With a voice activated tape recorder the recorder records only conversations and not wasted time when the conversation is on hold.


It is recommended that when conducting surveillance with a telephone tape recorder be sure that the recorder has a VOX (voice operated) or voice activation. Remember tape recorders are available with or without voice activation.


Voice activated tape recorders usually operate by switching to the recording mode of operation. When a sufficiently loud noise is picked up by the recorders in-built microphone, the recording mechanism begins to work. The recorder cuts off after half a second if no further sounds are picked up, this conserves the tape and battery life.

For those conducting surveillance these units are the perfect stand-alone surveillance device.


When a voice operated automatic telephone recorder is connected to the telephone system. A Vox recorder will begin to record whenever it picks up conversations on the line. But will stop recording if the line is either not in use or if there is a silence of more than a second. There are recorders that will also record a telephone number being dailled out. By playing back the recording to a dailled pulse reader or number decoder, the number dailled is identified.


June 16, 2009 | Permalink | Comments (0) | TrackBack (0)

Need Counter-Suveillance services

Do you believe that your office or home is under surveillance?
Do you need Counter-Surveillance services?
Contact this writer, Daniel Parker via this blog.
Your name and data will be kept confidential.
I do counter-surveillance services beyond the United States.
I have recently renewed my passport and am ready to go.

June 16, 2009 | Permalink | Comments (0) | TrackBack (0)

DO YOU TRUST YOUR TELEPHONE? HOW ABOUT THAT COMPUTER?

Do you believe that your office or home is under surveillance?
Do you need Counter-Surveillance services? I travel the United States doing such services.
Contact this writer, Daniel Parker via this blog.
Your name and data will be kept confidential.
I also do counter-surveillance services beyond the United States.
I have recently renewed my passport and am ready to go.

June 15, 2009 | Permalink | Comments (0) | TrackBack (0)

Telephone Transmitters

Telephone transmitters

Telephone transmitters are devices connected to a target's telephone line that listens to telephone conversations and transmit those conversations to a hidden or standing recording device. Such devices as telephone transmitters are identified as two basic types or models;

the first and most commonly known type is the series connected transmitter.

The second type of telephone transmitter is known as the parallel connected telephone transmitter.


A series connected telephone transmitter is connected at a point in the telephone line where the line is cut and the device is connected between the two cut ends. A series telephone transmitter transmit only the conversation that takes place on that line. If the target has numerous lines than one must connect to each line individually with a series telephone transmitter. If the targets telephone system is multiple lines than we must use a demultiplexer or we must install individual transmitter on line by line.


A parallel connected telephone transmitter is connected at two points on the telephone line, the transmitter must be connected to each wire of the telephone line pair. When the telephone is used the conversation is transmitted to a hidden recorder or a known recording device.


In order to install any telephone transmitter the telephone and its line must be disconnected even if its a few seconds or momentarily. An installation of a telephone transmitter can be installed in the junction box of telephone wires or anywhere along the line.

When installing care must be taken to avoid cutting a line that is used by an intruder alarm system. Cutting this line may sound an alarm to the local police department. Cutting such a line could also set off a sensitive detector in your alarm system.

Most telephone transmitters are parasitic that means that the transmitter uses telephone line energy. Parallel connected telephone transmitters are most often connected with electronic clips such connections require minor stripping of the line insulation. There are series and parallel connected telephone transmitters that have their own batteries as back ups to avoid showing a voltage drop on the existing telephone lines.

Those connected telephone transmitters that use line voltage to transmit are also known as leeches or parasitic devices. The transmission distance of connected telephone transmitters depends on the small current off the line and the device using the telephone line as a long wire aerial antenna. Usually such distance of transmission is about 22 to 52 meters but there are devices that transmit about 500 to 1000 meters in distance.

In the telephone transmitter market you find small plastic shield waterproof transmitters which may be connected to the telephone line or up in the telephone pole wire box.


Inside a building, a transmitter may be connected to the

telephone line or hidden inside a telephone handset.

A drop-in telephone transmitter like those seen in spy films are designed to be installed by replacing the telephone microphone (mouthpiece) cartridge. The telephone microphone of the target is removed and the transmitting unit is installed. Most so called drop in microphones must attached to the microphone points of contact or terminals. The words “drop in” is not correct it takes time. Time is not safe you can be caught installing the unit.

In the next few days I will post design drawings of series and parallel transmitters.

Remember if you need to have your office or building swept for occult telephone transmitters or other surveillance equipment contact me through this blog. I will answer you as soon as possible. Remember, I do contracts outside the country.

June 15, 2009 | Permalink | Comments (0) | TrackBack (0)

Surveillance Transmitters / Room Listening Devices

Electronic surveillance occurs by using many different types of electronic devices. Today in this post I will discuss the common room transmitters. Room transmitters are designed to be placed or installed within a room or an area where conversation occurs. The device is designed to record or allow the installer the ability to listen to those conversations that happen to occur near his device. By near the device I determine that to be about 25 feet more or less. There are room transmitters that can hear a pin drop on a wood floor. Some transmitters are battery powered and some are powered by the local power supply. Some transmitters send the signal to a receiving recording device or to a monitoring station nearby.

Battery powered transmitters are devices that have an internal battery power supply are usually those cheap units that you can buy in a magazine. They usually are short range and not very reliable for those wishing to listen in on your conversations. Battery powered transmitters are installed or made in a wide range of products. Some disguises are;

  1. Calculators

  2. Clocks

  3. Photograph frames

  4. Inside door frames

  5. Inside clothing

  6. Briefcases

  7. Wastebaskets

  8. Radios

  9. Paperweights

  10. Wall plugs

  11. Extension cords

  12. Pens

  13. Shredders

Small transmitters used for room listening can be concealed or installed in almost item that can be imagined. This writer conducts counter surveillance sweeps and in the past many years has found transmitters in all type of items. One year, I found numerous listening devices in electronic toys given to children which were usually battery powered to function and would piggy back the power source to transmit the captured sounds. I have located transmitters powered by 9 volt batteries, hearing aid batteries and wired to a source. Battery sources vary and their signal strengths also varies. Transmitters in a pen or a calculator can transmit about 14 to 22 meters. If you find a pen or calculator transmitter look to the receiving recorder with a maximum of 22 meters.


Extra Powered Transmitters

There are also transmitters that are main or local power supplied. These type of transmitters can also be hidden almost anywhere. Current items or locations where they are hidden can be or are.

  1. Walls

  2. Dividers

  3. Ceiling panels

  4. Alarm boxes

  5. Outlet electrical plugs

  6. Office Equipment

  7. Wall clocks

  8. Table Lamps

  9. Radios

  10. Televisions

  11. Calculators

  12. Copiers

  13. Shredders

  14. Ventilators

  15. Ceiling lights



Extra powered transmitters

Extra powered transmitters that are supplied by a main line power supply usually last indefinitely. This units do not require regular replacement of batteries.


Depending upon the device, it is possible for it to obtain as much power as it requires for transmission. If such a device is hidden deep in a wall the counter surveillance detector operator might be afraid to dig out the bug because of damage he may cause.

Important points to remember about Battery powered transmitters the battery life is limited you will need to have repeated access to the device and sooner or later they will catch you replacing its batteries. When using batteries you will have to lower its power usage to permit to last longer periods of time. Any battery powered surveillance device installed or placed in a building must be considered disposable. The collection of information with battery powered devices must be completed within 72 hours to avoid any risks.

June 12, 2009 | Permalink | Comments (0) | TrackBack (0)

Lesson #02 Executive Protection

Sorry about delaying my posts, I have just returned from conducting a counter surveillance sweep south of the border it took longer than expected. It was a strange new twist to expected surveillance and interception. Someone installed a wired listening and recording system using a solar power as a energy source. The wire to the microphone was working piggy back on one wire within a CATV cable. The employer had recently about two months ago had cable moved and installed into his new office area. The installer must be working for the competitor. The microphone was part of a cable box inside the office. I failed to find it during my nighttime sweep but I found during my daytime review of the office roof and building. It seems that it would not operate during the evening hours due to a non-rechargeable battery being installed into the roof supply box. It would work great during sunlight hours but failed to work in darkness. Fortunately the employers most important business is conducted at night.

Now let's get to lesson #02 on executive protection services.


Lesson #02

Executive Protection Services

History displays many cases where individuals were assassinated due to a lack of proper protection and defense. Because of some assassinations millions of lives have suffered death and injury. Because of assassinations countrys have suffered political instability and wars.


Protecting your master or principal (as many call your employer)is the most important goal. The aim of executive protection is to protect your master against assault, murder, kidnapping and other risks of injury.


In many countries exceutive protection is controlled by government agencies. In some countries executive protection must pass through government schools and training besides an extensive background check. There are many business that provide services of executive protection to high-profile business persons, celebrities, actors, sports stars and tourists.


Executive protection services are performed 24 hours, seven days a week. Protection is provided to the employer, his family, wife and children. You must accompany your employer from the hotel to his office, from the office to the local restaurant. You must determine the risk factors you must have the intelligence for defense using hand to hand, weapons or materials at hand.

Executive Protection is usually completed by a close protection team or the personal escort team. Such a team includes the bodyguard, the pointman, the left flank, the right flank, the rear guard, the advanced guard, the team leader and the driver. Some executive protection details require extra personnel such as a back-up team.

The executive protection detail may often contact local police, business managers, restaurant managers and hotel managers.

The executive protection detail and every individual that is part of the team will assume different responsibilties to protect your employer. Some team members will secure locations, routes, exits or entrances. Others will supply weapons and required equipment. One may be assigned as the driver or the personal bodyguards. One will be asigned as the executive protection detail leader.

Every member of an executive protection detail goes through close protection training, position training, and skills training.

Assignments are described as;


The bodyguard

Every executive protection detail that I have seen or have made contacted with always has the biggest guy responsible for this position. The bodyguard must always remain close to his employer and must never leave the employer alone. The bodyguard directs the protection team and maintains radio contact with the team leader. The bodyguard reports the direction of travel and always requires clearance and permission from the leader.


The teamleader

The teamleader is the man responsible for a teams operation and control. The teamleader controls all go's from building to building, from vehicle to buildings, no employer should ever move without your control. The teamleader must maintain communication with the employer. Many teamleaders work as single bodyguards for low risk individuals.


The advance team

The advance team is a team of executive protection individuals assigned to research and check out any location in advance of the employers arrival. Advance teams are responsible for planning and conducting required executive measures. An advance team could be made up of 4 to 5 individuals. Advance teams conduct sweeps of the building to be visited by your employer. Advance teams conduct such sweeps hours or days before any visit. They will familiarise themselves to location of exits, doors and different areas such as kitchen, bathrooms and offices. They will learn who the employees are and who management is. Reaching the location the team will conduct many procedures such as securing the parking areas, toilets, hallways, kitchen. A serach will be conducted for explosives, hidden weapons and areas of attack.


The driver

The driver is an important part of any executive protection team. He is responsible for safely driving his employer. He is responsible for the operation and maintenance of the vehicle. The driver must always remain with his vehicle. The driver must never be distracted to leave his vehicle in some unknown person's control.


The back up vehicles

The back up vehicles provide close support in case of attack. In those vehicles weapons and communication devices are usually carried or transported.


The O.I.C.

The Officer in Charge is the man overseeing all men and teamleaders of Executive Protection details. This guy is usually the fellow with the maturity, expertise and experience in Executive Protection.

June 12, 2009 | Permalink | Comments (0) | TrackBack (0)

Body Guard Services Lesson 2

Be Prepared to defend

Be prepared to defend your benefactor or client.

You must be able to physically fight or restrain anyone that intends to harm or hurt your client.

You must be prepared mentally to kill someone that intends to harm or hurt your client.

You must be proficient in the usage of defensive weapons.

You must be trained in tactics, hand to hand combat and in close quarter weapons combat.

You must study the martial art's disciplines of Bushido.

You must learn and obey the discipline of loyalty.

You must never reveal to anyone the secrets of your master (client).

Do not even reveal the secrets to the owner of such secrets.


Learn and know your benefactor(s).

Know your master (client), know how he or she thinks.

Know his favorite newspaper, foods, movies, music, vacations, shopping's, hobbies and favorite restaurant.

Know what the master demands of you.

Know what he needs before he needs it.

Know his friends, they may be his worse enemies.

Know who his friends are, know their secrets and their friends.

Know his or her religious contacts.

Know the routes and alternate routes to his residence and office.


Learn his or her standing before the public.

Learn about your masters standing in public.

Some masters are politicians, some are business executives, some are just rich people.

What ever position in life your master has, it should not matter to you. Your client or master may be a dictator, a politician or a drug baron. His or her position in life is not important to you but learn his position well to defend him.

What should be important to you is completing your service of providing security and giving him or her your extreme loyalty.

By learning your masters standing in public, we learn how to serve and protect him.

If he is a politician your worse threat is the public voter.

If your master is a drug baron your masters threat could be another drug baron or competitor. It could also be internal, someone in his organization who has no loyalty or honor of service.

It could be law enforcement or politicians attempting to control your master.

If your master is a business executive his threat may be kidnappers or a competitors assassin.

Remember your duty and only duty is to protect and give loyalty.


Learn and know the threats or dangers against him or her.

Threats could be anything or anyone. Find out who your master's threats are. Talk to your master find out what negative history exists and who the negative happened with.

Are your master's threats business competition?

Are the threats old lovers?

Are the threats old competitors?

Are the threats people who owe your master money?

Are the threats politicians?

Are the threats those who are jealous of your master?

Are the threats those who are mentally ill?

Are the threats those who seek to take his power?

Are the threats those in government?


Learn and know the weakness of your benefactor(s).

Know the weakness's of your master.

Are the weakness's women for sex?

Are the weakness's men for sex?

Are the weakness's boy's for sex?

Are the weakness's girl's for sex?

Are the weakness's cars?

Are the weakness's jewelry or watches?

Are the weakness's power over people?

Know your master's weakness's so you can protect him.


Know who your enemy is.

Your master's enemies are your enemies.

Know who are all your master's enemies.

Learn everything about that enemy. Learn his favorite haunts, bars, shopping, golf course, hotel's and favorite restaurants. Learn everything about the enemy someday you may have to confront him and you will already know where to meet him.


Business competition.

At times your master's enemies may be business competitors. Learn where their offices and homes are located. Learn where they shop, eat, buy, and drink. Always remember that a competitor is always the enemy. Attempt to find someone to give you inside information from that threats office.


Competitors.

Competitors are your master's enemies therefore they are your enemies. If anyone is your enemy you must know him or her. Learn everything there is to know. Be Prepared by knowing the enemy. Attempt to find someone to give you inside information from that threats office.


Political threats.

Political threats are very and extreme deadly enemies. These type of enemies used their power to destroy others. The threats are most often carried out behind close doors and in secret. Political enemies use government officials and non-government people to do their dirty work. Attempt to find someone to give you inside information from that threats office.


Personal threats.

Personal threats are easier to keep an eye on. Learn who the friends of the threat are. Become a friend of those friends and get inside information. Attempt to find someone to give you inside information from the threats friends.


Levels of dangers and threats.

Those threats that have money and power are more dangerous than others. They can buy opportunities to cause problems.

The purchased threat(s) could be that mechanic that works on the masters cars.

The threat could be that medical doctor who treats your masters high blood pressure.

The threat could be that telephone man that could install telephone bugs.

The threat could be that parking lot attendant.

The threat could be that waiter at the master's favorite bar or restaurants.

The threat could be that new girlfriend.

The threat could be that golf teacher.

The threat could be that new maid.

The threat could be that new driver.

The threat could be that mailman.

Threats could be anyone and anything.


Data and information.

Data produced by your master's computer or office can be used as a threat.

Private information can be used many ways to hurt someone.

Data and information can be easily obtained from your master's garbage. Make sure all paper is burned or shredded.

Protect your master's data and information from others.


Personal.

Personal information such as social security number, credit card numbers and personal data can destroy your master's credit history.


Financial.

The lost of credit cards, bank account numbers and personal information can ruin financially anyone even the master.


Political.

Politicians can hurt anyone with the power they possess or control. A politician can destroy you by using others against your master. But remember politicians fear power and knowing their personal secrets is that power. Learn everything about that politician that is a threat.


Types of threats.

Types of threats have been listed and explained above but there are other threats that we often overlook or ignore.

That bum down the street sitting on the curb ahead next to the stop sign could be an assassin.

That doorman at the restaurant could be an assassin.

That lady with the baby carriage at the restaurant or store door could be an assassin.

That large envelope letter delivered by the mailman could be a bomb.

The forgotten garbage can by the driveway could be a remote controlled bomb.

That unknown package left at the front door could be explosive materials.


Organized terrorism.

Organized terrorism could be Sandero Luminso, Al Queda or the local crime family that controls via fear. Terrorist come from any part of society. The local church could be doing an anti-abortion group.


Organized crime.

Organized crime groups can be a group of criminals banded together. A security services group can become an organized crime family very easy. You can provide security to a neighbor hood business area and easily threaten those who fail to accept your services.


Organized extremist's.

Religious fanatics can become terrorists very easy by crossing a thin line.


Mercenaries.

Former soldiers can be recruited to join a private army. That army can be used to defend or to attack or they can be recruited to provide security services. This writer can personally recruit over 400 former soldiers and marines to provide security services.


Angry employees.

Angry employees can become threats very easy. Especially if they hold anger and grudges for a long time.

Always remember that there are individuals in life that are still angry about events in history that took place over twenty years ago. There are those who are still angry over Al Gore losing the vote to Bush.


Religious groups.

Anti-abortion groups can cross the line very easy and become terrorists without they themselves realizing it.Environment protection groups and animal rights groups are also border line terrorists. In recent news an abortion doctor was recently murdered by a member of a religious anti-abortion group.


Fanatical groups.

Islamic groups and individuals are brainwashed during their religious studies for years. Than one day they go out and kill innocents in the name of Allah.


Threats and assassins.

Assassins come from every part of society at large. Assassins can appear from political groups.


Mentally ill, psychologically impaired.

There are mentally ill individuals who firmly believe that there distorted thought is the right thought and some are willing to kill others to prove their point.


Beggars and bums.

Many of this individuals are going through hard times in their personal lives. But there are those individuals who have been beggars for many years and are those unknown and unregistered mentally ill.


Drifters.

Drifters are those who travel across the country. No one knows where they come from or what they are thinking. They are most often the unseen. You must never ignore these people.


Fanatical martyrs.

These fools are out to seek their fifteen minutes of fame or have been brainwashed into believing that G^d is on their side.




Methods of attack.

The methods of attack are many, I will attempt to list some;

A waiter could poison your food or drinks.

A bum could attack you with a knife or sharp edge.

A maid could put chemicals on your bed sheets.

A gardener could attack you with cutting blade.

A plumber could install a bomb in your home.

A mechanic could cut your brake lines.

A doctor could prescribe a deadly drug with bad side effects.

A neighbor could poison your guard dogs.

A pool man could electrify your pool water.

A politician could attack you via a secret partner.

A politician could delay your building permits.

A business associate could sue you.

A maid could poison your toothpaste or hair gel.

A competitor could buy off your workers to spy on you.


In the above list the term or words you, your refers to your client or master.

The most important point to learn is loyalty and service.


June 09, 2009 | Permalink | Comments (0) | TrackBack (0)

Course to provide Body Guard Services.

In the next few months I will post information that will give you skills required for becoming a professional body guard. The posts will serve as or like an online course on professional body guard training. If the student or security professional takes time and effort to study the posts he or she can become an independant profesional bodyguard.

The purpose of next and following posts will teach or give a class in independent professional bodyguard services. Among the lesson posts I will continue to offer skills, knowledge and expertise.The goals of the classes to follow will be to enable important security personnel and give them the abilities, skills and expertise to protect their assigned client. The assigned client will be provided protection against harmful threats while in movement in a vehicle or on foot. Professional protection will be provided to the client and their family.

The person who takes time to learn all instruction given via the authors posts will be able to provide excellent service by learning:

  1. Skills and expertise to determine the clients risks.

  2. Identify the clients history

  3. Plan and design the travel routes of the client.

  4. Plan and design the protective services arround the client.

  5. How to effectively protect the client against threats.

  6. How to exit a protection plan or route and give quick alternate roures of protection.

  7. Will learn specialized knowledge and skills.

  8. Will learn skills to drive a vehicle under duress and threat.

  9. Will learn the local, state and federal laws that affect your work as a professional body guard.

  10. Learn to handle firearms correctly and with safety.

  11. Learn the state and federal regulations for the lawful possession of weapons (firearms).

  12. Learn to operate, use and care for your firearm

  13. Learn to fire your weapons correctly in related duty.

The most efficient way to learn and study. Study each post carefully. Keep in mind your goal of becoming a professional body guard. Be sure to take the posted test at the end of a group of lessons. If you do not understand the language or words, used look them up in a dictionary. Always read the posts which is a part of the course out loud that your ears hear the words. The more you hear the more you will remember.

At the end of each lesson you should be able to know and define what a client is;

describe the goals of being a body guard

explain the needs for bodyguards

Via this post, we will now be introduced to the world of close protection or body guard services.

Think back in your mind how many times you have heard about an assassination or attempted assassination. We remember President Reagan's attempted assassination by Hinckly or Rabin's assassination in Israel. This are but two described, but there are thousands of attempted assassinations that take place every year. This assassinations or attempted take place all over the world. They take place in the United States, Mexico, Central America, Africa, Europe and Asia. They place everywhere and anywhere. Assassinations take place at night or in the day. On Sunday or Monday any day it does matter what day it is to an assassin.

In some countries body guards services are provided by local police officers some are good and most often they are very poor at their work.

In the body guard service a client is an individual or a family or a group of people that require personal protection to insure their safety. The client may be a politician, a doctor, an industrialist or a very important person known as a VIP. A professional body guard may be protecting directors or heads of a corporation or international company. A client may be among and from movie stars, celebrities, sports members, families of the rich or celebrities.

The goal and function of body guards (BG) is to protect the client or clients. A BG may be an individual or a group of individuals working for the client.

In history there have been assassinations where the body guards were involved in the assassination of the client. To this author's opinion those BG's did not have the most important principle in their hearts and minds. To this author that important principle is loyalty. A BG (bodyguard) must be loyal to his client. If you do not understand the word loyalty check it out in your dictionary. Loyalty to this author is Bushido. Loyalty must be the most important part of the BG. His or her loyalty must be strong. If the BG does not feel loyalty to his client he or she must part ways and allow a new BG to take his place. A BG that leaves his client must never reveal anything about his former client that means everything. Do not speak ill of your former client even though he may have been the worst person in the world. Maintain loyalty in your thoughts and words. If I were ever approached by a BG looking to be hired for one of my clients and I heard him speaking ill of his former client. I would not trust him with any of my clients. I would never permit him within a thousand meters of my client. In history, smart rulers or clients had their unloyal body guards killed. Don't be a fool be loyal to your client. Remember the words, “Loyalty” and “Bushido” think of them as one. In the world exist many instruments or weapons that are used by men to provide protection but the most effective way to protect individuals has been and is the BG, body guard.

If you know history you will remember that Julius Caesar was murdered (assassinated) by disloyal members of his government and his personal guard. We know that murder and assassination are the same crime, the difference is that assassination is a word used mostly for heads of state.

In the next lesson post I will discuss how an assassination plan begins. The lesson will describe how the assassination is planned and carried out. By learning how it is completed and carried the student BG will be able to learn skills and expertise that allow him to provide excellent protection that is required of him or her.

June 08, 2009 | Permalink | Comments (0) | TrackBack (0)

ZETA's in Mexico

The Mexican Organized Criminal Organization spoken of and known as the ZETAS, are not a criminal organization. They are the security forces of the Gulf Cartel. The true criminal organization is the Gulf Cartel.

The Zetas are former professional military officers and soldiers of the Mexican army. In 1996, Mexico's Federal Attorney General classified the ZETAS correctly when he called them the armed division of the Gulf Cartel.

The ZETAS are a true mercenary force that follows a BUSHIDO type code of honor and loyalty. They are a major and real threat to Mexico's national security. They, the Zetas possess military expertise and experience in combat tactics which include urban warfare and guerrilla warfare. It's military leaders possess military skills and expertise in security and warfare. They use military logistics and military sciences to continue operations for the Gulf Cartel.

The Zetas are a formidable force that possesses skill, experience, expertise, honor and loyalty for their employer the Gulf Cartel. It is a force that will exist for many decades.  It will exist as long as the force receives respect from its employer. The only way the Zeta's can be defeated will be if the leaders of the Gulf Cartel begins to lose respect for its mercenary force.

If the Zetas continue to grow they will eventually take over all of Mexico. They will expand their territories and take away from rival drug cartels. They as a group possess loyalty and honor to each other. They respect their officers and will die for them.

They, the Zetas are modern samurai's, serving their warlord leaders the Gulf Cartel. In a matter of a few years they will no longer cross or smuggle weapons or handguns in from the United States. They will buy needed weapons directly from Venezuela, Bolivia, Nicaragua or Cuba. If they have not bought any yet, it is simply because they have no one in their organization that has yet approached any of this mentioned countries.

This writer believes that contact between the Zetas and such a Latin American consulate can be completed with ease. In a few years the Zetas will make Mexico change. The changes will be political and the results could be full of prosperity for all of Mexico. In time the Zetas will become a political party such as Hamas and Hezballah are in the middle east. In the near future, look to Mexico for majors changes in government brought about by the Zetas as they become independent of the Gulf Cartel.

June 08, 2009 | Permalink | Comments (0) | TrackBack (0)

Getting Pass the Door

Getting pass doors is often required of a security officer. The following information is given to inform or instruct that officer on how it must be done without getting hurt.

Interior doors

In the movies we always see the hero slam a door with his shoulder and opening it.

Reality is, that the shoulder does not have the needed force that is required to open an interior door. Interior doors required a kick or more to the locks area to enter the door. Use your foot, give that door a Bruce Lee kick at the area around the lock.

The alternative method to entering that door is look at the doorknob. Find the small hole or key hole. From your pen, yes that Bic pen in your front pocket. Remove the pen core, that long dark plastic or metal center that contains the ink well. Insert the pen core and push the locking mechanism. Turn the door knob. The door should open.

Exterior doors

The exterior door is constructed with sturdier materials. It was designed with the mind and thought of security. Such a door will require more force or skill. This type of door will often have a entry-lock for latching and a dead-bolt for security.

Give this door several or more well placed Bruce Lee kicks near the locks. It might take several kicks so keep going.

An alternative way to open the front door . Use a crowbar insert it between the door and the lock. Pry the crowbar back and forth until some entry is gained.

If the door hinges are facing you, use a flat edge screwdriver and a hammer to tap out the pins from the door hinges.

Types of force required

Interior doors require a minimum force compared to exterior doors. Interior doors are hollow and are made with poor construction materials.

In older homes you often find solid wood doors that required extra force above minimum force. They often require crowbars or other tools.

Solid Core doors require average force, where metal clad doors require above average force. Metal doors almost always require maximum force.


Other than brute force, we can refine door opening by professional lock-picking.

June 06, 2009 | Permalink | Comments (0) | TrackBack (0)

Secrets of Life that will improve your security and prosperity.

There are many life experiences and events that have given me the following important discoveries. Follow the advise described and they will help you in life and become wealthy.

Never trust your enemies they will betray you. An enemy lives on envy. Learn to use your enemy. If you have the power hire an enemy. He or she will be more loyal to you than your friends. Fear your friends more than your enemies.

Never outdo your boss. Always avoid displaying your skills too much, doing so will result in giving fear and insecurity to your managers or boss.

Allow your managers or superiors to benefit, allow them to appear more intelligent and superior to you. Let your boss look good and you will be allowed to a greater power.

Never show your cards to anyone. In other words never revealed your plans to anyone. Keep your enemies and friends off balance.

Never speak unless spoken to. When you speak do not try to impress anyone. The powerful often impress or scare others by saying less than others. By speaking less you lessen the chances of putting your foot in your mouth.

Make yourself a mystery make yourself a very small target in fact become a non-target. Avoid being part of the crowed or group. Stand out as being your own man. Become conspicuous become a flower among weeds.

Get others to do your work but take the credit for it. Use other peoples talents, expertise, knowledge and work to gain power.

Make yourself and your reputation unassailable, unbreakable. Create a reputation that will fight your battles. Learn to destroy your enemies by destroying their reputation first.

Never argue with anyone, their resentment and anger will last longer than your actions. Behave as the Gentleman and Leader that you are.

Learn to keep your boss or managers dependent on you. The more that they depend on you the less they will fear you. Never teach your managers more than they need.

Never let them be free of your services.

June 05, 2009 | Permalink | Comments (0) | TrackBack (0)

According to Forbes, America's Most Dangerous Cities

Do you need security for your office or home? What if you live in these cities? Learn to be prepared.

America' s Top 5 Most Dangerous Cities:

No. 1 Detroit, Mich.

(Detroit-Livonia-Dearborn, Mich., metropolitan statistical area)

Population: 1,951,186

Violent Crimes per 100,000: 1,220



No. 2 Memphis, Tenn.

(Memphis, Tenn.-Miss.-Ark. metropolitan statistical area)

Population: 1,295,670

Violent Crimes per 100,000: 1,218



No. 3. Miami, Fla.

(Miami-Miami Beach-Kendall, Fla. metropolitan statistical area)

Population: 2,401,971

Violent Crimes per 100,000: 988



No. 4 Las Vegas, Nev.

(Las Vegas-Paradise, Nev., metropolitan statistical area)

Population: 1,834,533

Violent Crimes per 100,000: 887



No. 5 Stockton, Calif.

(Stockton, Calif., metropolitan statistical area)

Population: 684,406

Violent Crimes per 100,000: 885



Source: Forbes

June 05, 2009 | Permalink | Comments (0) | TrackBack (0)

Tennis Balls and a Security Guard.

Some years ago back in the seventies, I used to do consulting and training for a Latin country that was having a minor guerrilla war. I spent about six months training security detachments for the government. The security units would be assigned to guard numerous government buildings.

One night, I had one security officer walking the perimeter of a national bank building. He completed a walk around the building at about 2am.

As he neared the front door again. He saw seven (7) five gallon cans up against the front door. On top of the cans were two yellow tennis balls. The cans he thought might had been delivered by a truck while he checked the back of the building. The guard got near the cans and realized that they smelled like gasoline. The guard immediately contacted his supervisor and his supervisor contacted this writer, their instructor. The supervisor and I arrived together. As I neared the cans I realized it was a bomb of some unknown type. We immediately contacted Army bomb disposal. After all the cans were gone. Later, the Army disposal officer told us that the cans were filled with homemade napalm and that the yellow tennis balls were the detonators. The tennis balls had a small slit on the side and had been filled with hundreds of striking match heads. Why the balls were left on top of the cans was unknown.

Years later during the interrogation of a captured guerrilla it was discovered that.

  1. The young guerrilla who set up the napalm cans was not instructed on how to set off the cans.

  2. There were suppose to be six napalm cans and one gasoline can. Not seven napalm cans.

  3. The guerrilla was supposed to be given an ice pick to punch a hole in the gasoline can. The punched can would spill gasoline and create a combustible area. The guerrilla was not given a pick or gasoline.

  4. The guerrilla was supposed to throw the tennis balls at the cans. Upon impact a tennis ball filled with match heads would explode into a fire ball. The fireball would set off the napalm cans.

The lesson to be learned here is;

Never be surprised by what you find in your perimeter but be prepared by your actions to what you find. Above all your actions remain calm.

June 04, 2009 | Permalink | Comments (0) | TrackBack (0)

SATELLITE VEHICLE TRACKING and GPS SYSTEMS.

Currently, Vehicle tracking equipment is freely available to the general public. Satellite tracking can be also be contracted with minimal equipment costs and a monthly fee.

In security and surveillance, there is nothing better than having your ‘eyes’ on your target.

A surveillance team wishes it could be able to keep watch on their target by having him in view constantly but we know that's not possible. Especially, when the target knows he's being observed. When this happens we can use electronic technology to help the surveillance or security team.

What seems to be many years ago this author would use Direction Finding transmitters (DF) to keep watch on a target. We would attached a transmitter to a vehicle and track it using special receivers. The transmitters would send out a beep every few seconds for a good distance of a thousand yards or little more. The system worked but it could give you headaches and it required several or more vehicles working together to track down a vehicle in the city.

However the world has changed, technology has greatly improved everything it touches and it has touched tracking.

I believe that zoologist and animal trackers have been instrumental in these new advances. It was always important for this author to stay aware of such people and their systems.

To me they always seem to be about five to six years ahead of security and surveillance professionals.

In this new age, thanks to animal trackers, we now track people and their vehicles with satellites. Security and companies across the nation now employ GPS tracking technology to monitor their mobile assets such as vehicles and people.

To quote LandAirSea at vehicle-tracking.com

“Sensitive receivers placed inside the vehicles get readings from a system of 24 satellites in space, then transmit location data by wireless network so that they can be read from a remote computer. By capturing readings at regular intervals, usually every few minutes, GPS tracking systems illustrate the bus as it progresses on its route. Multiple vehicles can be viewed over a map simultaneously. This is called active tracking.”

Administrators at a large school district in Colorado plan to take Global Positioning System ( GPS tracking) technology a step further, by monitoring the buses in their fleet while they’re out on their routes, and also the students in them. The school system has its eye on a dual-purpose vehicle tracking system that will show – on computer in real time - their buses as they travel around the district. It will also monitor the comings and goings of their students, who will carry individualized ID cards that will scan as they embark and disembark the bus. The technology is similar to a key card. There are numerous tracking system's and providers currently available.

I recommend LandAirSea's at http://www.vehicle-tracking.com.

LandAirSea's tracking equipment is very durable and fairly inexpensive compared to other providers. The equipment is easy to install and easy to operate. A LandAirSea's GPS tracking system records 300 hours of driving data. It is downloaded to computer using LandAirSea’s free software, included in it's package. Driving activity will be or can be displayed over an animated digital street map, in a text report or over satellite imagery using Google Earth.

Lesson to be learned here is;

Tracking a vehicle is now easier than ever.



June 03, 2009 | Permalink | Comments (0) | TrackBack (0)

DO YOU TRUST YOUR TELEPHONE? HOW ABOUT THAT COMPUTER?

We, in the business of security know that intercepting, listening and recording telephone conversations is the best way to collect private and secret information. People in general believe that everything they say on a telephone is protected and secure.

Security know's that the telephone can be bugged for as little as 40 dollars. In fact someone with very little technical knowledge can bug your telephone lines. Such bugs can be installed at your company office, private office or at home and all on your telephone. Any individual, spy or investigator can easily purchase a telephone transmitter and or recorder for about 40 dollars.

But we also know that there's a greater threat than a bug on the telephone. That bug is in your company computer or your home computer. We named this type of system the Covert Computer Monitoring System, it is designed to monitor the actions and activities of a computer user. This system is an installed software, it is very easy to install. It can be installed to the computer or electronic devices attached to the computer. With this system installed no home, personal or office computer is safe. With the software installed everything done, all work is monitored.

All your e-mails will be seen,

all the keystrokes touched will known,

all the images that you saw will be seen by the spy or visitor,

all the websites that you visited will be seen and known,

everything that you see, visit, or look at on your computer will be seen and known.

This system is so good that it will give you access to 100% of what the computer operator does or sees.

This unique software program is named “SPECTOR” it is made and produced in the United States by a company named Spectorsoft. This program takes about three minutes to install and can be quickly accessed by the file with a password. The system is designed to take a picture of the screen every 5 to 4 seconds. It stores the picture for the installer to view at his or her convenience. The pictures of the screen can be view on the computer screen like a video recorder with controls like Fast Forward, Rewind, and Play. Anything and everything that appears on the screen while it is installed will be revealed to the installer via his password. What appears on the installer's screen will be typed letters, web site's visited, your e-mail, all keystrokes typed, all images viewed and all applications.

This program is the best that there is. It is a Five Star program.

The programs are available for Mac's and PC's, so no computer is immune.


Need such a program?

Contact Spector at 1-888-598-2788 or visit there web site at www.spector360.com or at www.spectorsoft.com/products -

For about 100 dollars plus shipping you will get to know what your boss, your secretary, your office personnel, and your computer access workers are doing.


The lesson to be learned here is:

Always act and work responsibly and honorably, you never know who is watching.

June 02, 2009 | Permalink | Comments (0) | TrackBack (0)

Security procedures for the discovery of a body.

Security procedures for the discovery of a body.

Very often, the position and work of a security officer leads him or her to be the first person to discover a deceased person in his perimeter or perimeters of security. As security officers, we have state or federal statutory responsibilities and a legal responsibility to report such events immediately to law enforcement.

Most deaths occur by natural causes but security must be maintained around the scene. There are and will be times when the death could have been inflicted by unknown person or persons. When law enforcement officers arrive, the scene of death immediately belongs to them and they assume control of the scene and evidence.

Do Not interfere. It is important that security and law enforcement communicate.

You must report to them what you saw, who you saw, what you heard and most importantly at what time.

Your goal will be to aid verbally upon initial contact. Identify yourself, give them the required information and get out of the way.

The rules upon discovery of a body are;

  1. Immediately verify if it's death or an injured person. Look for a pulse around the neck and wrist.

  2. Secured the scene. Attempt to prevent family members away from the body. The word is attempt. Do not use force.

  3. Note mentality, any odors or items out of place.

  4. Do not move the body.

  5. Immediately call law enforcement.

  6. Immediately call your supervisor or director.

  7. Notify law enforcement of any hazards in the area where the body is located.

  8. If the property has video surveillance, do not stop recording until after the police arrive at the scene.

  9. When law enforcement arrives identify yourself.

  10. Give them all the requested and required information.

  11. Do not interfere.

  12. Law enforcement will officially confirm death.

  13. Do not give opinions, suggestions or comments. They may make a suspect.

  14. Step away from their work.

  15. Remain where they can see you.

  16. Do not make any statement to the press or reporters. Allow law enforcement to do so.

  17. If you must go out of sight, inform an officer, remember his badge number and name.

  18. Notification of property management must be done by your Senior Security Officer or Director.

June 01, 2009 | Permalink | Comments (0) | TrackBack (0)

Bugging can be very inexpensive.

ROOM BUGS AND RADIO MICROPHONES

When people hear the words “spying” “eavesdropping” and “bugs” they automatically think of government agencies doing the service to other governments. This is far from true, in today's new world almost 90% of electronic surveillance is performed by civilians doing it for individuals, attorney's, business and companies.

In most cases of bugging, simple devices are used. Simply because they are the most effective for the costs. Bugging is very commonly used by amateur investigators, news reporters, and investigative journalists to gather information. Bugs are small devices such as radio microphone transmitters that are concealed in a target's living or working area. Such devices pick up sound and conversations. Such conversations are transmitted to a receiver or recorder somewhere nearby.

Majority of bugging systems are built up of the transmitters, the receiver and the recorder. Transmitters can look like calculators, clocks, ash trays, lamps or pens. In fact transmitters can be operated by battery or wired to an electrical power supply. Some battery powered transmitters can last a few days and power supplied transmitters can last indefinitely. Anyone can purchase such listening devices on the Internet, from hobby magazines, electronic magazines or a local Radio Shack.

The receiver is usually very simple it could be a table top or battery operated radio,

The tape recorder could any vox controlled recorder.

The transmitter cost starts at $12.00

The receiver cost starts at $10.00

The tape recorder casts starts at $30.00

So far about $52.00 plus sales tax we can start bugging.

The lesson to be learned here:

Bugging can be very inexpensive. Federal law prohibits it.


May 30, 2009 | Permalink | Comments (0) | TrackBack (0)

Security Risks Are?

Security Risks Are?

We must define all security risks in order to determine our responses and actions for when they are required. By identifying the risks and preparing for them, we will be able to make critical, important and valued decisions of response

  1. Identify all risks and list them down on paper.

  2. Who is the corporate officer or security director that has authority to accept any risks for the company?

  3. What is the risk has its cause been eliminated? If the risk is beyond our control are we prepared for it?

  4. What controls can we implement to stop, prevent or delay such risks?

  5. Has corporate management insured the company against such risks?


A few common known risks for business are

  1. Dark parking lots. Dark hallways or common areas.

  2. Slippery common area sidewalks or walkways.

  3. Defective entrance doors, handicap doors or delivery doors.

  4. Defective windows, chipped, cracked or broken.

  5. Maintenance equipment creating obstacles in internal and external common areas

  6. Lawn irrigation system activating during working hours. Creating pools of water.

  7. Faulty or defective elevator.

  8. Defective fire or blackout emergency lights or shortage / lack of necessary lighting.

  9. Defective locks.

  10. Poor Security service.

  11. Vehicle access to business entrance.

  12. Defective alarm system or poor coverage of areas.

  13. Defective video surveillance system or poor coverage.

  14. Lack of fire response equipment.

  15. Lack of fire extinguishers in office areas.

  16. Lack of “electronic equipment” designated fire extinguishers.

  17. Lack of security car escort service for late working employees.

  18. Gasoline station across the street. Potential fire hazards

  19. Distance to municipal fire response.

  20. Earthquake fault area.

  21. Coastline area.

  22. County jail down the street.

  23. Chemical plant within two miles. Potential for a disaster.

  24. Lack of well identified escape routes.

  25. Lack of Preparedness


To described list you can add many more potential risks. If you are a Security Officer you should be able to recognize them fairly easy.


The lesson to be learned here is;

Expect the unexpected and Be prepared.


May 29, 2009 | Permalink | Comments (0) | TrackBack (0)

»