Advanced Criminal Investigations and Intelligence Operations

Home > Nonfiction > Advanced Criminal Investigations and Intelligence Operations > Page 22
Advanced Criminal Investigations and Intelligence Operations Page 22

by Unknown


  166

  Advanced Criminal Investigations and Intelligence Operations

  it, is easier. Visa, MasterCard, and American Express have started producing payment cards that use a computer chip to speed transactions and make it

  more difficult to compromise than a magstripe.

  Credit and ATM card skimming is on the rise worldwide. It relies on

  data-reading electronics to copy the magnetic stripe information from your credit card or debit card. It can capture both your credit card number and the PIN at restaurants, gas pumps, ATM machines, and almost anywhere where

  cards are used. ATMs are vulnerable for the same reasons that gas pumps

  are. They are exposed and unattended.

  An identity thief or skimmer merely needs to place an electronic mag-

  netic strip reader over the existing ATM card slot or a point of sale device.

  When you slide your card in, the skimming device reads it first, and then the actual card reader does, at which point the transaction proceeds as

  expected. Now a skimmer has an exact copy of your card data. Older

  card-skimming devices required data harvesting thieves to return and

  collect the information periodically, exposing them to risk of discovery.

  But newer skimmers can transmit data to thieves by either short-range

  Bluetooth or by GSM cellular. This enables the thieves, who may be sitting in a car nearby or in a building on the other side of the planet, to capture the account numbers live as the account holder makes a purchase or a

  withdrawal.

  Collecting credit card data is a relatively simple matter of capturing

  the account number. But debit cards are even more desirable to thieves

  because the bad guys can plunder a bank account quickly and completely

  without the account holders realizing what is happening. The card networks monitor credit card usage and have rigorous risk- and fraud-prevention

  policies in place, whereas debit cards are linked directly to a bank account, though obtaining the PIN associated with a debit card is somewhat more

  difficult.

  The most common high-tech ways to steal PINs are with tiny cameras

  mounted within a fish-eye mirror or with an electronic mesh overlaid on the keyboard. But data harvesting thieves have found a less obvious and risky way to steal PINs. PINs may be four or six digits long. When you key in your PIN, software at the ATM or point of sale automatically converts it into a one-way algorithm called a hash. Then, if someone captures the data steam, they will see only the resulting hash value, not the original four or six digits.

  By itself, a hashed PIN is a useless string of numbers. You can’t type in the hashed PIN as it appears on your debit card or within a database inside a bank network, because those digits will be converted into yet another value.

  Instead, you have to find a way to generate that hash value.

  Data harvesting attackers located the PIN data in a data breach, analyzed and decrypted the algorithm used, and generated a table of all the possible four- and six-digit PIN codes that the algorithm might produce, called a

  Emanations Intelligence

  167

  rainbow table in cryptography. Thieves do not have to match a PIN exactly, only the four or six digits that would produce the same hash value.

  In a related story in Rhode Island, magnetic keyboards were used to turn on the pumps at a closed gas station. This illustrates the constant innovation of high-tech thieves in our ever-increasingly high-tech society.

  RFID

  RFID is a wireless noncontact system that uses radio-frequency electromagnetic fields to transfer data from tags attached to objects, for automatic identification and tracking. Some tags require no battery and are powered and read at short ranges via magnetic fields (electromagnetic induction). Others use a local power source and emit radio waves (electromagnetic radiation at radio frequencies). Unlike a barcode, the tag does not need to be within line of sight of the reader and may be embedded in the tracked object. The tag contains electronically stored information that can be read from several feet away.

  Active RFID tags also have the potential to function as low-cost remote sensors that broadcast telemetry back to a base station. Applications of

  tagometry data could include sensing of road conditions by implanted bea-

  cons, weather reports, and noise-level monitoring.

  Passive RFID tags can also report sensor data, for example, the Wireless Identification and Sensing Platform is a passive tag that reports temperature, acceleration, and capacitance to commercial Gen2 RFID readers:

  • Low-frequency (LF 125–134.2 and 140–148.5 kHz) (LowFID) tags

  and high-frequency (HF 13.56 MHz) (HighFID) tags can be used

  globally without a license.

  • Ultrahigh-frequency (UHF 868–928 MHz) (Ultra-HighFID

  [UHFID]) tags cannot be used globally as there is no single global

  standard.

  See Table 9.1 and Figures 9.5 and 9.6, RFID tag frequencies and readers.

  Other Frequencies

  Other frequencies of interest include invisible fence and dog training collar frequencies:

  • Invisible fence frequencies—7.5–10.8 kHz with a 30 Hz modulation

  frequency.

  • Training collar frequencies—216.0, 433.825, 915.0 MHz.

  168

  Advanced Criminal Investigations and Intelligence Operations

  Table 9.1 RFID Tag Frequencies

  Band

  Range

  Data Speed

  Remarks

  Tag Cost

  120–150 kHz (LF)

  10 cm

  Low

  Animal identification

  $1

  and factory data

  collection

  13.56 MHz (HF)

  1 m

  Low to

  Smart cards

  $0.50

  moderate

  (MIFARE, ISO/IEC

  14443)

  433 MHz (UHF)

  1–100 m

  Moderate

  Defense applications

  $5

  (active tags)

  865–868 MHz

  1–2 m

  Moderate

  EAN, various

  $0.15 (passive

  (Europe)

  to high

  standards

  tags)

  902–928 MHz

  (North America)

  UHF

  2450–5800 MHz

  1–2 m

  High

  802.11 WLAN,

  $25 (active

  (microwave)

  Bluetooth standards

  tags)

  3.1–10 GHz

  Up to

  High

  requires semiactive

  $5 projected

  (microwave)

  200 m

  or active tags

  Figure 9.5 Intermec RFID scanners and tags.

  • Automobile door lock and starter remote frequencies are covered in

  automobile locks.

  • Garage door frequencies (see Table 9.2 Garage Door Opener

  Frequencies).

  Remote Electromagnetic Sensors

  Magnetic sensors can detect objects composed of ferrous metals (containing iron), such as equipment or vehicles. Magnetic intrusion detection systems (MAGID) can detect vehicles from 60 to 80 feet away and personnel from 10

  to 15 feet away. They can transmit warnings up to 1000–2000 yards away or further, suing buried cable transmission lines. They are used for perimeter security or for surveillance in an area of operation.

  Emanations Intelligence

  169

  Figure 9.6 Motorola RFID scanners–readers.

  Table 9.2 Garage Door Opener Frequencies

  Color of Programming Button

  (on Chamberlain

  Dates

  System />
  Manufactured Units)

  1984–2004

  8–12 DIP Switch on 300–400 MHz

  White, gray, or yellow button

  with red LED

  1993–1997

  Billion Code on 390 MHz

  Green button with green or

  red LED

  1997–present

  Security+ {rolling code} on

  Orange or red button with

  390 MHz

  amber LED

  2005–present

  Security+ {rolling code} on

  Purple button with amber LED

  315 MHz

  2011–present

  Security+ 2.0 {rolling code} on

  Yellow button with amber LED

  310, 315, and 390 MHz

  and yellow antenna wires

  Seismic sensors detect vibrations and can be used to detect earthquakes, atomic energy tests, and, on a smaller scale, intrusion into security perimeters or areas of operational surveillance. Disposable seismic intrusion detector systems can remain in place for 7–60 days, until the batteries expire, and can detect vehicles from 100 yards and personnel up to 30 yards away. The U.S. Army’s Patrol Seismic Intrusion Device (PSID) can detect movement up

  170

  Advanced Criminal Investigations and Intelligence Operations

  to 130 yards away and transmit warnings up to 21,000 yards away. They are affected by background clutter or the natural vibrations of the earth surface.

  Acoustic sensors are basically mics that detect sounds up to 300–400 feet away and transmit them back to receivers. Acoustic buoys can be hidden, can be suspended from tree foliage, and are concealed in other manners.

  Disturbance sensors transmit warnings when moved or stepped on, interrupting the electric current. They are also concealed or disguised as natural objects in the area.

  IR sensors monitor changes in heat or temperature to detect intrusion, usually in areas 50 × 100 feet.

  The AN/TRS-2 is the platoon early warning system ( PEWS) (Figure 9.7) and was used throughout the 1980s (operating approximately between 139.250

  and 141.100 MHz). These systems will detect either seismic or magnetic disturbances within 10 m of the transmitter detector and report to the receiver up to 1500 m away with either a P for personnel intrusion or C for vehicle intrusion, along with the transmitter’s ID for the location of the intrusion. The receiver will cache alerts received (with the most recent first) and has an audio alert tone that can be enabled or disabled. It can also be hardwired to the transmitters. All components use standard 9 V batteries (each transmitter takes one and the receiver takes two). Each transmitter detector is programmed with an area code and an ID code (1–5). The receiver can monitor up to 10 transmitter detectors in each of up to 8 areas. It can only monitor 1 area of up to 10 detector transmitters at a time and is switch selectable on the receiver.

  Figure 9.7 The AN/TRS-2 PEWS.

  Emanations Intelligence

  171

  Figure 9.8 The AN/PRS-9 BAIS or PEWD II.

  The AN/TRS-2 PEWS was replaced by the AN/PRS-9 battlefield

  anti-intrusion system (BAIS), or platoon early warning device (PEWD II)

  (Figure 9.8) is the U.S. Army’s standard unattended physical security system, providing early warning, intrusion detection, and threat classification at the platoon and higher levels. It is both a seismic and an acoustic detection system, which can be supplemented by IR and magnetic sensors.

  The AN/GSQ-159 is a disposable seismic intrusion detection system and

  the AN/GSQ-160 is an electromagnetic detection system, both used by the

  military. The DT-515/GSQ is another detection device that has been used.

  The PEWS was in wider use and the BAIS/PEWD II is the current standard

  and state of the art.

  Explosives Trace Detectors (Vapor Detectors)

  Explosives trace detectors (ETDs) (vapor detectors) are security equipment able to detect explosives of small magnitude, using ion mobility spectrometry, thermo-redox technologies, and chemiluminescence and amplifying fluorescent polymer. The detection can be done by sniffing vapors as in an explosive vapor detector or by sampling traces of particulates or by utilizing both methods depending on the scenario. Most explosive detectors in the market today can detect both vapors and particles of explosives. Devices similar to ETDs are also used to detect narcotics. The equipment is often used in airports and other high-security areas considered susceptible to acts of unlawful interference. These are related flammable gas and vapor detection systems (see Figure 9.9.).

  172

  Advanced Criminal Investigations and Intelligence Operations

  Figure 9.9 Thermo-redox detector ( sniffer) Sintrex/IDS EVD-3000.

  Imagery Intelligence

  10

  Imagery and remote sensing are the use of technology that ranges from simple film and digital cameras, to IR (night vision) and thermal imaging, to satellite images and mapping. Looking through the keyhole, as satellite imagery is often called, has made great advances since the days of the Cuban missile crisis when film canisters had to be retrieved, developed, analyzed, interpreted, and distributed. Ground imagery includes photography, IR imaging and

  viewing (such as forward-looking IR or FLIR), thermal imaging and viewing, and radar. Satellite imagery and remote sensing include aerial photography, mapping and geological data, digital data, radar, and meteorological and cli-matological images and data.

  Before satellites, aerial photography was the source of high-level imagery.

  Film, rather than digital photos or real-time video, was the state of the art in intelligence imagery (Figures 10.1 through 10.9).

  Night Vision Devices

  Night vision technology consists of two major types: light amplification imaging (or intensification) and thermal imaging (IR) (Figure 10.10).

  Most commercially available night vision products are light-amplifying devices. This technology takes the small amount of light from the surrounding area (moonlight, starlight, or streetlights) and converts the protons that make up the light energy into electrons or electrical energy. The electrons are then directed through a thin disk that can be as small as a quarter. This disk has millions of channels through which the electrons pass. As the electrons pass through the channels, they bounce around, and when they strike the

  walls of the channels, they release even more electrons. By turning the light energy into electrical energy, the technology is in a position to increase the amount of electrical energy. The increased amount of electrons bounces off a phosphor screen and turn them back into protons or visible light energy (Foster, 2005, pp. 324–325).

  Thermal imaging devices work by using the upper portion of the IR light spectrum. This portion of the light spectrum is emitted as heat instead of as light, so the hotter an object is, the more heat it will radiate. This radiated heat can be seen as IR light. Thermal imagers take the IR light that is emitted 173

  174

  Advanced Criminal Investigations and Intelligence Operations

  Figure 10.1 Japanese aerial photograph of Battleship Row in Pearl Harbor on December 7, 1941.

  Figure 10.2 Satellite (NASA). (Available at http://en.wikipedia.org/wiki/File:2001_

  mars_odyssey_wizja.jpg.)

  Imagery Intelligence

  175

  Figure 10.3 Cuban missile crisis: August 29, 1962, U-2 photograph showing no construction at San Cristobal.

  Figure 10.4 Cuban missile crisis: September 26, 1962, U-2 photograph showing surface-to-surface cruise missile (named Kennel by the United States and FKR in Soviet plans) launch area at Banes.

  176

  Advanced Criminal Investigations and Intelligence Operations

  Figure 10.5 Cuban missile crisis: October 23, 1962, U.S. Navy low-level photograph of San Cristobal MRBM site No. 1 (mission led by Commander William Ecker).

  Figure 10.6 USGS satellite photo. (Landsat data, acquired by the U.S. Geological Sur
vey on March 20, 2011, shows the Sendai, Japan region. (Available at http://

  www.usgs.gov/blogs/features/2011/03/28/preliminary-magnitude-8-9-near-the-east-coast-of-japan/.)

  Imagery Intelligence

  177

  Figure 10.7 The seals of the NGA and the NRO.

  Preinspection material removal

  Amiriyah Serum and Vaccine Institute

  25 Nov 2002

  Main building

  Laboratory

  building

  Increased vehicle

  activity

  Figure 10.8 Serum and Vaccine Institute in Al-A’amiriya, Iraq, as imaged by a U.S. reconnaissance satellite in November 2002.

  by objects and focus it on an array of IR light detectors. These detectors are used to create a thermogram or a temperature pattern image. The thermal

  imager takes the information from the thermogram and converts it into electrical data. These data impulses are sent to a microprocessor that creates an image for display. Thermal imagers are significantly more complex than light amplification devices (Foster, 2005, p. 325).

  178

  Advanced Criminal Investigations and Intelligence Operations

  Turkmen

  Tu

  istan

  ta

  Caspia

  sp n se

  ia

  a

  Iran

  Iraq

  Kuwait

  Ku

  Persian Gulf

  Saudi Arabi

  Sa

  a

  udi Arabi

  100 km

  Figure 10.9 Satellite image of Kuwait dust storm April 13, 2012 (NASA).

  (Available at http://www.ncdc.noaa.gov/sotc/hazards/.)

  (a)

  (b)

  Figure 10.10 Night vision devices. NVG-500 double-tube night vision goggle (a).

  AN/PVS-7B third-generation monotube goggles (b).

  Satellite Imagery

  Satel ite imagery and remote sensing (detecting something from a distance) are complex applications of several scientific and technological disciplines, including orbital mechanics, physics, and optics. It involves the application of how light reacts with the target package, how the image is received, and how the data are manipulated and interpreted (Hough, 1991, p. 37).

 

‹ Prev