Recommendations for checking wirelines using ST-301"SPIDER"
- Main types of threats
Special threats – are created by the perpetrator directly for information interception. Their compound and parameters are determined by the operational and technical capabilities of the perpetrator. In case of such threats present at the site, the information leakage is inevitable.
Functional threats – are not linked by any actions of the perpetrator. They can appear due to technical peculiarities of the office equipment and ways of cable line installation and so on. The information leakage due to the existence at the premise of such threats is possible, but it is necessary not to overlook the search for them.
The most common ways of technical realization of special (artificially created) threats are:
• acoustic interception devices that transmit a signal over wired lines in the speech frequency range (electret and dynamic cable microphones)
• means of intercepting acoustic information that transmit a signal over standard power and low-current lines in the RF frequency range (over 50 kHz)
• means of intercepting telephone information connected to telephone lines by contact and contactless means (telephone transmitters and voice-recorder adapters)
• interception of acoustic information using "high-frequency imposition" equipment»
• use of software and hardware capabilities of office PBX to intercept acoustic information when the handset is "on"
• using the hardware and software capabilities of IP phones to intercept acoustic information when the handset is "on".
• information leakage due to acoustoelectric transformations
• leakage of information due to the interference of an informative signal with a parallel run of wire lines.
-
Main Stages of operations when checking wirelines
- Object search operations
To perform a visual inspection, you will need:
- a set of tools for disassembling instrument housings and communication equipment
- magnifier
- set of inspection mirrors
- UV and conventional lights
- UV marking agents (markers, varnishes, etc.)
ü Before inspecting any device, device, or section of wire line with exposed live parts, use the voltage indicator to make sure that there is no life-threatening voltage on them. If there is a dangerous voltage, disconnect this device or a section of the line.
ü It is necessary to check the presence and integrity of previously applied hidden marks (seals) on the covers and other removable elements of the equipment being checked. If the labels are not broken, it is not advisable to disassemble the case. If the marks (seals) are broken, disassembly of the case is mandatory! Disassembly is also required if there is no previously applied mark (seal) on the case. The attacker is likely to replace the device with a similar one equipped with an eavesdropping device. If this is the first time a site inspection is performed, disassembly of the equipment is mandatory.
ü If unauthorized opening or substitution of equipment is suspected, this equipment is opened, disassembled and inspected. At the same time, you need to make sure that the standard arrangement of the internal device elements, the absence of foreign objects, new parts or elements of unknown purpose, connections of foreign conductors to current-carrying parts. One of the most characteristic features of installing an eavesdropping device may be the presence of a microphone (if it is not included in the standard scheme).
ü When checking electrical panels and other distribution equipment, special attention should be paid to the inspection of incoming cables, cable channels, corrugated hoses, electrical pipes and process holes in the enclosing structures. During the inspection, cables are pulled out of cable channels, pipes and process holes to the maximum length. This is necessary to make sure that there are no abnormal connections in the hidden area.
ü All consumers and splitters connected to the power grid (not related to complex electronic devices) must be disassembled and inspected directly in the room to be checked. These devices include: extension cords, tees, stationary and table lamps, air conditioners, fans, heating devices, etc.the purpose of the inspection is to detect abnormal elements and foreign objects connected to the current-carrying conductors of the devices being checked.
ü All open sections of wire lines, as well as areas where the lines are laid in cable channels, are subject to inspection. To do this, all cable channels must be opened at the time of inspection. If the lines are laid in the cavity of a collapsible raised ceiling, the ceiling panels must be removed to allow access to the lines. During the inspection, foreign objects connected to the lines are detected, as well as abnormal wire connections.
ü At the end of the inspection, it is recommended to apply hidden marks (seals) on the cases of devices and equipment. Information about the place marks must be specified in the report.
3.2. Search for wired microphones
3.2.1 Wired microphones and their peculiarities
Cable microphones are one of the simplest, but at the same time reliable types of listening devices. They are designed to intercept speech information at the place where they are installed and transmit this information outside the premises (or object) via a wired line. The end device for a cable microphone is either a microphone switch or a low-frequency amplifier, or less often a sound recording device itself.
The guaranteed range of interception of information at the microphone is no more than 3-4 meters from its source. Although in practice, the attacker tries to bring the microphone as close as possible to the source of information.
The range of data transmission over the cable is from several tens of meters to several kilometers (depending on the microphone model). Information is transmitted in the spectrum of the source signal (i.e., the speech frequency range).
As a transmission channel for cable microphones, a specially laid wire line is often used. Less often, unused pairs of standard multi-core cables are used, which are brought to the desired room.
The need for special cable routing is probably the main drawback of such eavesdropping devices. The attacker does not always have the opportunity to lay the cable to the desired room. The most convenient time to install cable microphones is to repair or reconstruct the room.
IMPORTANT!!!
The microphone can be installed in a room adjacent to the one where the source of information is located. In this case, a hole is made in the wall where the microphone is inserted. A thin tube is placed directly on the microphone, which acts as a sound guide. With this method of installing a microphone, it is almost impossible to detect it without getting into an adjacent room.
The disadvantages of a dynamic microphone include its relatively large dimensions. The advantages include simplicity of design, high reliability, and no need for power and a pre – amplifier.
Some types of dynamic microphones are presented on the picture.
According to the principle of operation, an electret microphone is one of the varieties of condenser microphones, but unlike standard condenser microphones (used, as a rule, in Studio conditions), it is widely used in a variety of equipment due to its low price and suitability for operation in the "field".
The design of the electret microphone provides a pre-amplifier, so you must observe the polarity of the connection and provide the device with power. This is achieved by applying the so-called "phantom power supply" to the microphone (simultaneous transmission of DC power and information signals over the same wires). Some models of electret microphones are equipped with their own independent power source (batteries or batteries). Electret microphones use a three-wire (less often two-wire) line
The advantages of electret microphones include relatively small dimensions, low cost and a significant signal transmission distance (up to several kilometers). The disadvantages are the need to power the device.
In addition, since electret microphones use semiconductor electronic components in their assemblies, they can be easily detected by non-linear location during search operations. This circumstance can also be attributed to disadvantages.
Some types of electret microphone assemblies are shown in the figure.
3.2.2 Detection and localization of dynamic microphone
Source Data |
Results of visual inspection and preliminary stage |
Device and accessories |
Wire Line analyzer ST301 (modes «LFA» and «Switch») Electronic switch Connection cable (in accordance with the type of line) Control sound emitter Headphones Installation instruments |
Search premises |
Place of checkup Adjacent rooms |
Checkup wire lines |
Regular low-current lines (if there is a free pair) and low-current wires of "unknown" purpose that are installed in the premises being checked and adjacent to it |
3.2.2.1 Detection of dynamic microphone in manual mode
As a channel of transmission, can be used:
• two-wire dedicated transit line
• a two-wire dedicated line terminated with an outlet or connector
• multi-core dedicated transit line
• multi-core dedicated line terminated with a socket or connector
• multi-core regular (telephone, LAN, etc.), which has unused pairs.
Depending on which of the listed options occurs the following options are used for connecting the analyzer to the line being checked:
Type of wire lines |
Ways of connection |
two line highlighted transit line |
- probe clip piercer |
multi-wire highlighted transit line |
|
two line highlighted lines, ended with a socket or jack. |
- probe-clip piercer, - to the RJ45 socket of the switch with a cable, - to the RJ45 socket of the switch directly |
multi wire highlighted line, ended with a socket or jack |
|
Multiwire stated (telephone, LAN, etc.) having unused pairs |
When establishing the presence of a dynamic microphone in the tested room connected to a known pair of wires of the tested cable, you should find out where it is installed. The dynamic microphone is not a non-linear element, and its connection to the line is consistent. Based on this, it is impractical to use a non-linear locator and a reflectometer for its localization.
Localization can be performed using the ICS. This operation will require two people. One will control the signal using the ST301, and the other will move the ICS around the room.
In the room being checked, you need to reduce the volume level of the icz. ST301 is connected to the pair of wires on which the microphone was detected. The signal is monitored via headphones. By moving the ICS around the room, the signal level in the headphones is controlled. The approximate location of the microphone installation will coincide with the place where the sound level and quality (in headphones) of the ICS were recorded at the maximum.
The building's power grid and its elements can be used by an attacker to install and power embedded devices, as well as transmit intercepted information. Wired hidden audio monitoring systems are designed for covert removal and transmission of audio information over wired lines. Audio information signals are received by special receivers. The products are designed to control the acoustic environment of the room with the transmission of information via wired communication lines: AC-220 V 50 Hz (KPL-S) or telephone network on subcarrier frequencies (KPL-T). Reception of the transmitted information is carried out on a special receiving device that allows you to receive a signal from three information transmitters. The receiver is equipped with sockets for connecting headsets, a tape recorder, and an external power source. In addition, embedded devices can be camouflaged under a socket, tee-socket, various adapters, in lamps, electric lamps, floor lamps, etc.some embedded devices are produced without camouflage so that the consumer can install them at their discretion. Embedded devices associated with the grid, can be divided into two groups: - embedded devices providing control of acoustic information space with the transmission of intercepted information in power network; - radionuclide device that allows for room monitoring powered by mains and transmission of the intercepted information over the air. One of the essential features of such embedded devices is their unlimited operation time (as long as there is a power supply network). Camouflaged for devices that are widely used in everyday life and work, such as extension cords, tees, wall lamps and other household electrical appliances, such embedded devices can easily be "embedded" in the room of interest. In such devices, the acoustic channel of the microphone is performed as structural gaps of the device, into which the bookmark is camouflaged. The dimensions of camouflage devices ensure the location of transmitting devices and, if necessary, antenna systems. All camouflage devices retain their direct purpose. The inclusion of embedded devices is provided, as a rule, by including a camouflage device (extension cable, tee, etc.) in the network. However, there are a number of limitations for such devices. For example, it is not recommended to use the product for connecting devices with high power consumption (more than 0.5 kW), as otherwise the network background may appear in the acoustic channel. It is not recommended to install a radio microphone near sources of acoustic interference such as a refrigerator, fan, transformer, TV, etc. To ensure greater secrecy of embedded devices, remote control is used, which allows you to turn on the embedded device only for the necessary time.