/### /### /########### /### /### /### /### /########### /### /### /############ /////###/// /############ /############ /### /############ /###//////### /### /###//////### /### /### /### /### /### /// //// //// //// //// HIGH TECH HOODS PRESENTS... BURGLAR ALARM BYPASSING PART 3!! WRITTEN BY THE RAVEN ------------------------------------------------------------------------------ NOTE: LOOK SINCE I'M NOT IN THE MOOD TO TRY AND FUCKIN COVER MY ASS WITH A LONG SHIT DISCLAIMER, DO WHAT YA LIKE! ------------------------------------------------------------------------------ Anyway this so-far is the last file of the 'original' burglar bypassing text. If there is anything that I forgot I'll update it, And if anyone has any questions about a system around there way just give me a hollar at the listed bbs's at the end of this text! THE RAVEN +=======+ INDEX: I. THE CENTRAL STATION II. PREAMPLIFIED MICROPHONES III. POLICE AND GUARD RESPONSES IV. TELEVISION MONITORS AND AUTO-DIALERS V. GUERRILLA TACTICS VI. MISCELLANEOUS =============================================================================== CAN I KICK IT!?! In Part Three, we will dicuss the variety of systems that are monitored by a central station. Rather than announcing an intrusion (via bell,siren,etc.), this type of system silently sends a signal to the alarm company where people are monitoring for intrusions. This type of system, therefore, is often known as the "silent alarm." Although one can obtain his objective by bypassing the individual components of a local alarm system, when bypassing this type, one must shut off the entire system to be successful. The employees of the central station are led to believe that the alarm is being shut off by authorized personnel. I. THE CENTRAL STATION A few years ago, rich homeowners, business owners, and other potential targets for burglary, had alarms systems that were tied in directly to the local police ststion. As the use of burglar alarms increased, the police department began turning down more and more requests to be "hooked-up." As a result, there became a demand for central stsions, or companies whose specialty it was to simply monitor burglar alarms. Most police departments will still allow banks and large jewelry stores a direct link to the police station, but as a rule, homeowners are excluded. So as the demand for security has risen, many guard agencies and burglar alarm insttallers have begun to offer centralized monitoring as an option for their clients. When a silent alarm is installed, it is connected by a dedicated telephone line to the central station. In event of an intrusion, the control panel on the premises being monitored calls up to the central station. In the event of an intrusion, the cotrol panel on the premises being monitored calls up the central station and gives an electronic message to the answering computer. (All you hacks & phreaks should have a nice big bulb lit!!) It tells the computer exactly which switch or sensor has been violated, and the computer then tells the operator what has happened. For example if a burglar enetered throuhg a broken window, the panel would call the computer up and tell it that zone 4, a first floor window, has been broken. The operator would then see on his computer screen that Acct. #1234, the Johnson residence has had zone 4, the window foiling on the living room window, violated. As the theif progressed through the house, the panel would call the computer for every sensor that was violated. The operator may then receive 1234-17, meaning that zone 17, a passive Infra-Red dector in the master bedroom, has detected someone. The operator would then be fairly sure someone was in the house, so he would have three options. He may just send his companies guards to the scene, call 911 and dispatch the police, or he may send both the police and the guards. (I'll tell you how to deal with the both of them later.) When an authorized person enters through the designated entry/exit door,he goes directly to the control panel. Using a key, or his push-button code, he shuts the system off. If he enters at a strange hour, he must call the central station and give them his password or code phrase. And so, since the system was properly disarmed, the central station operator then pays no more attention to that particular account for the rest of the night. Because of the time delay, the owner is able to shut it off before the panel has time to call up the central station's computer. This, coupled with the fact that the owner calls the central station to give them his code, supposedly guarantees against foul play. The premise here is that even if a burglar can get to the panel, and shut it off, he will not know the code word. I suppose the people who think that must have never herd of bugs or telephone taps, not to mention laser surveillance devices, parabolic and directional microphones, or the "Oops, I forgot my coat last night" (which contained a voice-operated tape recorder) trick. The entry/exit door is another safeguard against illegal entry. It is designated by the owner at the time of the installation, to be the ONLY method of entrance when the alarm is armed. That doesn't mean that the owner always obeys this, but it causes the central station operator to be a bit more suspicious if someone shuts off an alarm, but does not enter through it. Since the best way to bypass a monitored alarm is to appear to be authorized to do so, a burglar usually doeas some surveillance to determine the entry/ exit door. A central station has an immense amount of control over the security of its city. The central station keeps blueprints (containing alarm design) of clients' buildings, the master codes and codewords for all alarms, and it sometimes even keeps a copy of their keys. It also knows when their clients are out of town, and how long they will be gone for. I'll show you how to gain access to the central stations weakness and how to exploite it later on in the GUERRILLA TACTICS section. It would greatly benefit a thief if he knew whether or not a system was monitored, and if so, by whom. Ordinarily, a security puts its sticker on the doors and windows of a monitored house or business. The thief could look through the local Yellow Pages, to find out if the company is legit, and also how long it may take the guards to respond to a call. A common way to test this is to throw a rock through a window. If a bell sounds its most likely a local alarm, if there is no sound but cops arrive moments later, it is monitored. After a house or business has been determined to have a monitored system, there are several ways to determine the company that monitors it. Let's say that the proposed target is Movie Rental at 716 Broadway Street. One could call every alarm company in the Yellow Pages, and say,"This is the police department, do you monitor Movie Rental on Broadway?" Usually, an answer will be given, but a reason for wanting to know should be prepared. Presumably, one company will eventually say that they do indeed monitor Movie Rental on Broadway. Another way to find out who monitord Movie Rental is to strike up a conversation with the proposed victim, and ask him to recommend a security company. A less risky way is to throw a rock through the containing foil, and see how comes out to fix it. The name of the company is usually written on the side of the car or truck for advertisement, but if not the license plate is run through the DMV computer (see the A-CORP newletters for more info on this.) In rural or suburban areas, one could also check the homeowner's mail for the alarm company's bill. An alarm company not only monitors for intrustions, but also for tampering and sabotage. Cutting the telephone lines, the power lines, or tampering with the control panel, will bring the cops just as fast as breaking down the door. Although leaving the telephone off the hook will prevent the alarm company from contacting the house, it will not keep the control panel from contacting the company's computer, because it features a "line seizure" mechanism. That means that no matter what happens, the alarm signal will get through to the central station's computer. II. PREAMPLIFIED MICROPHONES The preamplified microphone, or preamp, as it is called, is usually a small black box that sits in a centralized location, and listens for anything out of the ordinary. Many companies, notably Sonitrol Security, utilize preamps in addition to regular components. When the system is armed, the preamplifier sends sounds (via telephone wires) to the central station. The preamp can pick up the slightest noise, so that tell-tale sounds of a burglary betray the burglar even if the other components do not. The preamp does not know the difference between the sounds of burglary and everyday noises, so it also sends barking dogs, sirens,telephone rings,and virious other "harmless" noises into the ears of the central station operator. Although they are sometimes dectected with high-quality bug dectectors, it is often quite diffcult to know whether or not they are being used. However, if a thief knows (or thinks) a preamplifier is being used, they are quite easily overcome. If , prior to execution, one calls the residence or business, the ringing will continue until the burglar arrives. If the burglar is very quiet, the ringing will mask the noise that he is making, and the listener will be none the wiser. Also a tape recording of a siren or barking dog is often used to create the same effect. Some security supply companies sell sound generator or jamming device that nullifies bugs and other microphones, but the interference that this creates may arouse undue suspicion, so it may not be practical for all circumstances. One method that is practical, however, is the use of a CB linear. If a CB radio that is connected to a powerful linear (over 250 watts) is used near a preamplifier, the only thing that the operator at the central station will hear is the CB conversation. You may think that this shit would arouse suspicion but when we used it, it didn't! because this shit happens all the time. Everytime a trucker with a powerful CB radio passes by a home or business with a preamp this phenomenon happens (cool huh?). Since preamplified microphones also capture the sound of an authorized entry, the code is usually just given aloud upon entering, so the operator can shut off his system. This code, then, is extremely easy to obtain. III. POLICE AND GUARD RESPONSES Although a burglar may proceed with caution, defeat every alarm component in sight, and shut off the whole alarm panel, there is still a chance that he may make a mistake. If the mistake is insignificant, no one ever knows about it, and his mission comes off smoothly, but if the mistake raises the suspicion of the central operator, it may result in the dispatch of guards or police to the premises. The professional burglar recognizes this possiblity, and often takes steps to minimize the risks and dangers of getting caught. With enough planning, not only will his mission be accomplished, but the burglar will also probaly escape. If a burglar creates a silent alarm, or otherwise arouses the suspicion of the operator, the police, guards or both, may be sent. If the alarm company has its own mobile guards, it will dispatch them to the scene via radio. This radio frequency is easily discovered by networking with scanner enthusiasts, or by writting FCC. Once the freq is procured, the burglar can listen to and follow every move of the guards. If the guards are headquartered at the central station, a friend can keep the place under surveillance, and watch the guards activities. If they suddenly go to their vehicles, and proceed toward the place being burglarized, the 'friend' will notify the burglar by walkie-talkie. (I know of someone that did this and invested $300 for walkie talkies and it turned out that they were the same ones used by the guards so he just monitered his walkie-talkie during the whole mission!) If the potential take is large enough, burglars may even have several cars strategically placed along all possible routes that guards and police must use to arrive at the scene. If they observe anything relevent, they will notify the burglar. They may also bug the central station (see GUERRILLA TACTICS) to determine whether or not the guards will be sent. If a company does not have guards, or if they feel the police would be better equipped to handle the situation, they may just call 911. The operator will talk to the police department's dispatcher and tell him/her that he has an "alarm drop" at such-and-such address. The police dispatcher will then notify a nearby unit, by radio, that he received a call from XYZ Security, and that he should go and check it out. The burglar, who also has a scanner preset to the police frequency, has also been notified, and is mysteriously gone when the police arrive. The freq of local police departments are easily obtained from fellow scanner listeners, or from Radio Shack frequency guides. While the above will work in most cases, there may be times when a guard or policeman arrives, without the burglar knowing about it. If this occurs, it is usually during a routine check. This, however, is so incredibly rare that the chances of being caught in this manner are almost nil. If a burglar thinks that he has a chance of getting caught, he may get authentic or counterfeit credentials and documents that provide a plausible excuse for his being there. Willie Sutton, the famous bank robber, even went so far as to make a complete, but phony, police uniform to throw everyone off his trail. This technique would obviously have its uses in housebreaking as well. Professional burglars also know better than to hide on the premises to avoid capture. After the guards and police arrive, and verify an actual point of entry (POE), the police department will bring out its K9 unit to "sniff out" the place. Anyone hiding in the home or businesss will be found in a matter of minutes. It seems that thieves would rather take their chances as a moving target than to be a sitting duck by hidding under a bed. If one enters in a conventional manner, such as through the front door, he usually takes care to lock it behind him to give the appearance that nothing has been disturbed. If a guard or policeman arrives on the scene and doesn't notice anything suspicious, and doesn't see anyone inside, he will usually proceed no further, and write it off as a mechanical failure. But if the theif uses a crowbar to open a door or window then no one will think its a false alarm. Closing and locking a door behind him also minimizes the risk of being caught during a routine door check, which is quite common in some cities. Finally, it should be known that professional burglars are acutely aware that most guards are either 18 and just out of high school, or over 50 and extremely out of shape. Either way, they are poorly paid and very indifferent to their company and clients. Thwy have no inherent loyalty toward their employers, and this generally provides an incredible opportunity for the resourceful burglar. It is obvious that five thousand dollars in the hand of a $4.75 per hour security guard will sometimes make him look the other way for an hour or so. IV. TELEVISION MONITORS AND AUTO-DIALERS Closed Circuit Television (CCTV) cameras are used around the world to keep vigil over areas that are potential scenes of criminal activity. In many cases, a guard keeps watch over several monitors, or the cameras are connected to motion detectors, so that if anything is detected within the camera's field of view, it would scan for the intruder. The motion detector system is used when a guard has to monitor such a large number of cameras, it would be difficult to watch them all simultaneously. CCTVs are frequently seen in hotel lobbies, at bank teller windows, and other areas where the very presence of the camera deters crime. In reality, cameras do very little to guard against a proffessional burglary. In the movies and on television, there is a varity of methods used to defeat the lowly CCTV camera. Some thieves spray shaving cream into or tape cardboard over the lens. MacGyver simply places a mirror in front of the camera, and the Mission: Impossible team taps into the coaxial cable, and delivers a phony picture to the Third World guard. Fortunately, or Unfortunately, depending on your viewpoint, it is never quite that simple. CCTV cameras have the uncanny ability to penetrate seemingly opaque objects, therefore the shaving cream/cardboard method would probably not work. A mirror placed in front of a lens would be a definite giveaway for an observant guard that something was askew. Finally, the "tapping into the coax" trick would involve so many trial and error adjustments that no one could get it right the first time, let alone convince a guard that nothing out of the ordinary had happened. The primary characteristic of a CCTV that allows for easy bypass is its outstanding visibility. This fact alone allows an observant thief to watch the scanning rate of the camera, and do his "work" during the periods when the camera is looking the other way. There are often attempts made to disguise a CCTV, but any suspicious box aimed at a sensitive area is automatically assumed to be a surveillance camera. Sometimes video cameras or slow-speed Super-8mm cameras are hidden in liquor stores and gas stations, and are turned on by a hidden switch or foot pedal. These certainly won't deter crime, since the amateur criminal doesn't know they're there, nor will they apprehend many professional criminals, since a pro would obviously wear a mask or disguise during such an operation. There are two more techniques for defeating the surveillance camera, and their use depends om the manner in which it is monitored. If the camera is connected to a video-tape recorder, the lens may simply be covered with a glob of modeling clay, or any other moldable opaque substance. If this is done, no activity in the monitored area will be captured on film. If the camera is being monitored in real time by a guard or policeman, an FM oscillator can be used. If this device is brought anywhere near a TV monitor, the picture will be reduced to snow and stactic. This device is easy to find and goes for about $10 my H.T.H. staff got there's from JohnsonSmith catalog it goes under a device to fool your friends and mess-up the TV. Look for it in other electronic catalogs or magazines. The auto-dialer is equally worthless in preventing professional burglary. The auto-dialer is a device that calls a centrsl station or police station on the telephone and deliveres a short pre-recordeed message that there is a burglary in progress. There may be other numbers listed, such as those of friends and neighbors, in case some of the other calls did not get through. Modern auto-dialers have a line-seizing mechanism that disallows jamming the line, by calling the residence prior to the housebreaking, for example. They are usually hidden and housed in a locked box for added protection, but even with these safeguards, th evalue of the auto-dialer as a security device, is practically nil. If the alarm that is connected to the dialer cannot be bypassed, the telephone lines cannot be cut, and the lock on the housing cannot be picked, I will give you another way to defeat this system. Since auto-dialers are silent to the homeowner as well as the burglar, they are party to many false alarms. This fact has promoted many cities to ban the use of auto-dialers, since so many police man-hours have been wasted responding to them. In cities that do allow them the homeowners have been advised to install abort switches in the home. At least one abort switch, which shuts the dialer off immediatly will be placed near the dialer, in the bedroom, or near the control panel. Of course some dialers have a simple on/off switch on them, and they must rely on concealement alone to beat the burglar. However in the average home, there are not too many places that one can hide something as large as an auto-dialer. Perhaps the quickest way to defeat an auto-dialer is to simply erase the tape. Since the message is recorded on magnetic tape, an electromagnetic bulk eraser will leave the tape completely blank. V. GUERRILLA TACTICS There may be cases when you..oppss I mean when the burglar cannot bypass or avoid an alarm system, therefore he may have to resort to guerrilla tactics to accomplish his goal. When I say guerrilla, I mean a method of attack that is SO unorthodox, no one could possibly expect it. Guerrilla tactics are usually aimed at central station employees, or the central station itself, but they may be also used against the police department, if the need arises. Ideally, the central station would be a veritable fortress. The only security system that protects the central station is usually a TV camera at the front door, and a simple local alarm. The burglar could bug a police station and learn a great deal, such as information on potential targets or police schedules. (This also works for about anything else.. How do you think the High Tech Hoods gets me the down and dirty info for most files!?!?!) On the 4th of July one of my staff members lit 6 half sticks with extra long fuses (10 min long) in front of store front glasses and took off for the real target on the other side of town. When the sticks went off he was already at his target. The police used about 3 or 4 cars to make sure that those stores would not be looted while the robbery was taken place accross town. Vi. MISC. Now that brings us to the end of Burglar Alarm Bypassing hopefully I have been able to help you in your quest for knowledge, but if you have any questions or if your intrested in joining H.T.H.'s then also leave me mail as stated below and if you have written a file that you think is very good then let me know!! I would like to take this time to welcome PEBBLES to the HIGH TECH HOODS (H.T.H.) she is our first and only female thats serious about hacking and she can hold her own!! So give her the respect that she deserves! This girl can HACK! =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= I'm sorry it took me a long time to get this file out but I've been busy helping Mr. Hackx with his bbs (THE SOURCE) some place where I can call a Totally dedicated H/P/A & UGIW <-Thats whats going to make this bbs so fuckin hot! If you don't know what UGIW is then wait until I upload the file about it!! Also I've gotten a lot of e-mail for those who want to join The High Tech Hoods so thats also taking up time, and for everyone that applied I will let you know whats going on and answer back ALL applications! The following bbs's is where my files and High Tech Hood files can be obtained the same day there finished being written: BLITZKREIG (502) 499-8933 RIPCO (312) 528-5020 THE SOURCE (212) ???-???? THE RAVEN +=======+ ALSO COMMING: THE ULTIMATE PHONE PHREAKING TEXT FILE (CPP1.TXT) it should be avaible 2-28-92 and I think I will also release part 2 (cpp2.txt) that same day so so you don't have to wait to get in to it!!!!!!