Intelligence - sounds a funny occupation for a bunch of hippies?
But to be really effective it's not just enough to hit sites and
get away with it. You must also be aware of what's going on around
you, and what those around you (mainly the police and government
anti-terrorist bunch) are doing about you.
Intelligence is primarily about three issues...
- Collecting data on the sites you want to hit;
- Finding out what the 'opposition' are doing in general;
- Preventing the opposition getting to you.
Also, this type of work does not provide instant answers - you
must assemble different pieces of the puzzle to produce the answer.
So, in the normal course of events you would find out about something,
take steps to discover more, and if you are lucky, come up with
an answer which pre-empts the opposition.
In relation to what other 'intelligence' operatives are doing
about you, it's also a matter of developing ways of living and
working which give as little information away as possible on your
For your information, following completion of this tome I might
write a document specifically for techno-freaks who want to do
some proper intelligence and encryption work of their own. Keep
your eyes open!
5.1 Anti-surveillance measures
If you are the type who stirs things in your community, political
things, peace, environment or civil rights type things, chances
are you will be on somebody's list. There are various bodies who
'monitor' the community...
- Government departments: If you pester any department
enough, for example the Department of Transport, you will go on
a list. After a certain amount of time you may even be privileged
to be the subject of study for government funded private investigators.
- The Security Services: MI5 is the internal security
service for the UK. MI6 deals with external matters, but if you
have lots of associates outside the UK you may attract their interest
too. They keep records on everyone from politicians and trade
unionists to key local authority employees and leading environmentalists.
They control all anti-terrorist work, and have access to the full
range of surveillance tactics - bugs, phone taps and post intercepts;
- Special Branch: A division of the police force, but
in practice they do the everyday legwork for MI5. They are like
any other uniformed or plain-clothes police officer, except they
tend to be more interested in your activities!;
- Government Communications Headquarters (GCHQ): Based
in Cheltenham, GCHQ runs all government communications interception
and decryption work. If you use encrypted computer files, or you
use encrypted email a lot, your work will end up here;
- Police: The police have powers to get telephone taps
and other observation resources, but in general, if they become
interested in you, you are more likely to find them knocking at
your door with a search warrant;
- National Security Agency (NSA): The NSA is a branch
of the American government which conducts work similar to GCHQ,
and which is allowed to freely operate in the UK, spying on UK
citizens, as part of Britain's contribution to the defence of
the "free world" (rather a contradiction in terms).
From their communication bases at Menwith Hill, Chicksands and
Croughton, they keep watch on the citizens of Western Europe.
If your work involves American air bases, communication facilities,
or you have associates making trouble in the USA, you may come
under their watchful eye;
- Economic League: The Economic League is a bunch of
right-wing industrialists who keep information on hundreds of
individuals for either their political, union or campaign affiliations.
They then make this information available to large industrial
corporations who are monitoring new employees, or campaigners
taking action against them;
- Private Investigators: If you really annoy somebody,
to the point where you are losing someone a lot of money, it is
possible that they might employ private investigators to find
out more about you, and keeps tabs on your movements. The main
problem with PIs is that the UK does not have any sort of regulation
or licensing system, so they can pretty much do anything they
- Other citizens: There are many examples of groups who
keep tabs on other groups or citizens - anti-Nazi organisations
for example. Don't be surprised if someone else is watching you.
In the UK, the warrants granted to intercept post, or tap phones,
are granted on an 'organisational wide' basis. Thus, when granting
a warrant against CND for example, it would not only cover the
CND head office, but also any person who worked or was an active
member of the organisation. This is why Home Office figures are
so misleading - they refer to the number of groups of people covered,
not the actual number of intercepts.
So, potentially all these people are watching you. What can you
do about it?
5.1.1 Your phone
Phone taps, especially for people who use phones a lot, are a
good way to pick up information. As well as taping your voice
conversations, with the appropriate equipment, private investigators
as well as the 'official' government departments can monitor fax
and computer/modem transmissions too.
There is no way to prevent, or detect, any official (Government)
telephone tap. Today, with digital telephone switching technology,
government agencies do not even have to physically visit your
exchange to set a tap on your phone - they just instruct their
computer to tell BT's or Mercury's computers to redirect a copy
of your phone conversations to their computer systems.
Unofficial taps are another matter. Generally unofficial taps
are physically connected to your phone line, either taking power
from the line (in which case, the line will be cut and the device
connected into the circuit) or picking up the phone signals by
inductance (in which case the device will have a coil of wire
around the phone line - with no physical connection - and it will
have to have its own power supply). Those with direct connection
will reduce the voltage on the telephone line, but voltages can
vary so much anyway they are still difficult to detect unless
you have very expensive equipment.
The traditional image of official phone taps is a large tape machine
which records when you pick your phone up. These machines produced
hours of tape, which all had to be listened to costing lots of
staff time and money. This meant tapping was only used where the
results were guaranteed, or it was an absolute necessity to have
Today, with computer technology, this is no longer the case. The
phone tap plays into a computer. The computer is programmed with
snippets of your voice speaking 'keywords' - for example "hit",
"nuclear", "explosive", "bomb",
etc. - gathered from previous phone recordings. When the conversation
has been recorded, the computer digitally examines the playback
looking for these words. If it finds a match then it keeps the
recording for later use. This has made tapping easier, and thus
There is absolutely no way to defend yourself against phone tapping
- you just have to work around the problem. Rather than organising
things on the phone you have to do it in person, or invent a variable
and confusing set of codewords to fool the listeners. If you have
a computer things get easier - it is possible to send encrypted
(scrambled) messages via a modem, or just on a floppy disk through
the post. Even so, the growing power of computers means that unless
you have a very good encryption program the code may be broken
Mobile phones are another option - but make sure it is the 'digital'
type which encrypts the call. Even then, this does not stop the
Government eavesdropping on you because, via the phone company,
they will have access to your code.
Another practice used by various tappers, and widely used by the
police and security services, is number logging. The authorities
only have to have a warrant to actually 'listen' to the call -
they can make a note of the numbers dialled from the premises
without any control whatsoever. Also, now that exchanges are fully
digital, they can also find out the number of people calling you.
From this information it is possible to draw up a 'web' of your
contacts and associates.
Another tip - if someone suspicious phones you up, if you are
on a digital exchange, dialling 1471 immediately after you finish
the call will give you their number. If the voice tells you that,
'there is no number stored', this means that the number was withheld
deliberately, that the person was ex-directory, that they were
phoning from a non-digital exchange (pretty difficult thing to
do these days) or that they were calling from a mobile phone.
If for any reason you wish to withhold your number when dialling
someone, simply dial 141 before you dial the number and the switching
computer will not release your number to them.
5.1.2 Your mail
Unless you leave your post in a box at the end of the drive (common
in country areas) it is difficult for unofficial bodies to intercept
your post. The government, the police or the security services
can get a warrant to do so at any time.
Not all your post will be searched. Those plastic packages marked
'sealed under licence' will not be searched - there is no need
as no one apart from the sender can put stuff inside. Likewise
identifiable communications from companies (normally identifiable
by the franking machine mark) or the DHSS may not be searched.
Hand-written envelopes, and anything which is not immediately
identifiable will be.
The techniques used to open your post are very good - it is often
difficult to tell that it has been tampered with. I suspect that
my post is intercepted (I wonder why - could it be the things
I write?) and the only indication that there is something wrong
is that packages sent at the same time from the same place take
a day or so longer to get to me than it does to others in the
same area as me.
There is little you can do to prevent your post being read. The
only easy solution is to write your letters on computer, encrypt
them, and then send them on floppy disk through the post or if
the recipient has an Internet connection email it to them.
5.1.3 Your home
There are various ways to extract information from your home.
Bugs are the simple and much hyped way, although there are others...
- Rubbish: A good way to pick up information is to sort
through someone's rubbish. For this reason you should beware of
what you throw away. Pieces of paper, bank statements, till receipts,
invoices - all can be removed from your rubbish bin and assembled
to depict a record of your life. Never throw anything away - not
in your general household rubbish anyway - relating to your eco-sabotage
- Impersonation: Door to door sales-people, meter readers
and market researchers can also come to your home. They may not
get anything in particular, but by coming inside they can map
the layout of your house, look for signs of security systems,
and locate computers, filing cabinets and possible bug locations
for a return visit. I have my house arranged so that it must be
deliberately searched to find the really useful information. I
also have two computers - the main one hidden away somewhere else
in the house, and the 'decoy' in full view in the study.
- Burglary: Next, there is the straightforward burglary.
Increasingly people are getting burgled - but what if the offenders
only open the filing cabinets, or take the computer and floppy
disks, leaving all the expensive video and hi-fi equipment behind?
Also, with members of the security services being highly skilled
in lock picking, it is possible that people may enter your home
with no apparent evidence of them doing so - except that things
may have moved around the house.
- Bugs: It is possible to place miniaturised transmitters
inside your house. The main problem here is access. Experts in
lock picking and security systems have little problem in gaining
access to your home. The problem will be placing the device where
it is undetectable, and getting electrical power to the device
to keep it working. The latter is normally the key factor which
causes the problem.
- It is normally assumed that bugs get the information out of
the house by radio waves - this may not be the case. It you fix
a bug to the main wiring, the bug can transmit a high frequency
signal back along the mains wire, to be picked up outside your
house. Likewise, a bug in the phone can be powered from the phone
line, and will send its signal back down the line too. The other
option is to have some sort of voice activated tape recorder placed
into a room - if they can get into your home to place a device,
they are more than likely to return to remove it rather than let
it be discovered.
- For those bugs that do emit radio waves, there are detectors
available that can pick up the carrier wave. You then 'sweep'
your house, and if the detector registers nothing, you could assume
you are clear. However, the micro-miniaturisation of electrical
components means that even small bugs can contain complex circuitry,
enabling them to switch frequency, or scramble the transmission,
making detection harder. Like bugs, sweepers are also advertised
in hobbyist magazines, but with these designs you are not likely
to pick up the really professional devices - they are made not
to be detected. If you do pick up a device, it is more likely
to be the amateur or mass produced type used by small organisations
or private investigators.
- It is also possible to pick up mains bugs and bugs that transmit
down the phone - but this equipment is not commonly available,
although a reasonably competent amateur electrician could cook
something up (as a tip, it's basically a high pass filter that
screens out the 50Hz mains frequency, then rectifies and amplifies
any remaining AF or RF frequencies).
- Personal information: Anyone outside the security services,
with money and the right and contacts, can find out pretty much
all there is to know about your public life. If they know the
general area you live, they either look you up in the phone book
or the electoral role - then they have your address.
Once they have an address they can use the measures outlined above
to stake out your home and your phone. If you have a car they
can illicitly get information on you via the DVLC, and increasingly
information from the police national computer is finding its way
into private hands.
By sorting your rubbish they can find out where your bank account
is. Having done that they can pose as, or pay, a loans company
to get details about your credit worthiness. Again, by bribery
and corruption, it is also possible to get your benefits details.
Finally, by tracing your movements, logging incoming and outgoing
call numbers, or watching your house, they can build up a comprehensive
picture of your friends and associates.
Of course, all the above relates primarily to private investigators
or determined snoops - official authorities can do much more than
5.1.4 Your information
Any information you keep at your home is vulnerable. Some associates
of mine have been 'burgled', and all the people were interested
in was the information in their filing cabinets or on their floppy
disks. You must be aware that if you keep any significant amount
of data at home, especially where that data is an essential part
of any campaigning activities, you are giving an open initiation
to the 'opposition' to burgle or burn you home.
A journalist friend working on defence related investigation a
number of years ago gave me four basic principles for keeping
information at home...
- Always copy important/useful information to someone else -
that way it it gets stolen or incinerated then you can reconstruct
you paper filing system from the copies held by your associates;
- If you work extensively on computer, regularly back-up data
onto floppy disks (this is actually a basic safety practice for
anyone using a computer) rather than leaving it on your hard disk.
You should then make copies of your back-ups and give them to
friends so that you do not lose data by theft or fire;
- Never keep incriminating data on the premises - don't even
try to hide it. The police and security services can get warrant
which allow them to rip your house to pieces, dig up the garden,
and search the premises of your employer, so basically there is
no way of keeping it safe on your premises;
- If you must keep sensitive or incriminating data at your home
or workplace, keep it on computer disk and encrypt it using a
military grade encryption system.
The most important of these rules must be that you copy any useful
information to your associates. This is good for two reasons.
Firstly it keeps the data safe. Secondly, it encourages the sharing
of data and resources which makes life a lot simpler for everyone
5.2 Basic surveillance equipment
The information above outlines what others can do to you to invade
your privacy. If circumstances warrant, there may be times when
you will want to invade the privacy of others. The following information
should help. However, I would advise you to always consider how
you do anything like this. Unless, if the situation were reversed,
you could not justify taking the same actions - don't do it.
It is possible to see working bugs or kits advertised in many
electrical hobbyists magazines. But realistically using these
devices is another matter.
Most bugs you see advertised work in or near the VHF broadcast
band - 88MHz (megahertz) to 108MHz. This presents an obvious difficulty
if your target tunes through the radio band one day and hears
a conversation in the room next door! To be secure it is necessary
to tune outside of the normal broadcast band - this means having
the technical know-how to do this yourself, or paying £75
to £1000 for a radio which will pick up just about any frequency.
Even then, if the target sweeps their home for bugs, or if they
are a radio freak who has multiband receivers in their home/office,
then they might find out anyway.
Having got your bug, your receiver, utilising frequencies outside
everyday broadcast bands, the next problem is locating the device.
As noted above, your greatest problem will be finding a power
source. Unless you can wire the thing into the mains, you will
have to rely upon a finite amount of battery power. You will therefore
have to select the most appropriate time to plant the device to
get the best effect. It will also be necessary to gain access
to the room you want to bug - potentially the flaw in the whole
scheme. If you are bugging a site office such as a portakabin
this can be easier - you can sneak up to the office overnight,
drill a small hole in the wall or ceiling where it will not be
seen, and poke the microphone through the hole. In more substantial
premises, you are either going to have to break in (a bit obvious
to your target) or get proficient in lock picking.
There is another option - if the persons concerned are themselves
using radio equipment to communicate, you could drop in on their
communications using the appropriate type of receiver.
When planting the device, unless you want to create an enormous
fuss when it is eventually found, you have to consider how you
will retrieve it. For example, it would be quite easy to bug a
secret council meeting since the council chamber is open for most
of the time - but what if the cleaner finds the device the next
The next thing you have to consider is how you will monitor the
device. The range of the average bug is about half a kilometre,
if you're lucky. The presence of buildings, structures, and especially
metal such as reinforced concrete will limit the range. You will
have to find somewhere to sit and listen at the appropriate time
where you will not be disturbed, or noticed. The other option
is to plug the earphone/recording output from the receiver into
some sort of dictaphone which will give you a couple of hours
of recording time on one tape, or a device that has some sort
of detection level system so that it only switches on when it
picks up a noise.
All in all, I think you have to be pretty desperate to use any
sort of bug, mainly because of all the hassle involved in getting
what may turn out to be completely useless information.
5.2.2 Phone taps
Interfering with people's phones is problematic. The slightest
mistake and the line might develop a fault - in which case BT
will be out and will track down your device in a matter of hours.
There are basically two sorts of phone tap which are within the
technical capability of the average electrical hobbyist - direct
connection devices and induction taps.
Direct connection devices are wired into the phone line, and draw
power from it so removing the need for batteries. However, the
half-kilometre range factor still applies and so you'll still
have to find somewhere nearby to receive the signal. Again, kits
can be illicitly bought through hobby magazines.
Induction devices require that you wind a couple of hundred coils
of wire around the phone line - and then amplify and transmit
the signal. You can have higher powered transmitters because the
device is not solely reliant on power from the phone line, but
you have the problem of actually supplying the power to the device,
much in the same way as a conventional bug.
The problem about transmission frequency still applies - most
of these devices are tuned to the 88-108MHz broadcast band. However,
because the device can be connected anywhere along the phone line
from the house to the exchange, they are easier to place and monitor,
and will not be picked up when sweeping the house. However, there
is (expensive) equipment available that can pick up directly connected
5.2.3 Audio/recording devices
My preferred way of working is a concealed dictaphone. You have
the same problems about batteries and actually placing the thing,
but you tend to get better results. Most modern models will also
have 'voice activation' features so that it will only record when
there is actually a noise to record. The only problem is that
the price of a dictaphone is about five or seven times that of
a bug (£50-£70, as opposed to £10 for a simple
Another option, rather than planting the dictaphone inside a building,
is to fix a 'contact' microphone to a window, and plug the mike
into a dictaphone. The contact mike picks up the vibration cause
by noises in the room and sends them to the dictaphone. The only
problem is that the mike also picks up bangs and bumps in the
building, and an awful lot of wind noise.
Finally, you could just drill a small hole through the wall of
a building and then insert a micro-miniature microphone. The microphone
has an amplifier mounted just behind it so that the signal can
be sent many metres down a cable to a recorder - the device also
receives its power back along the same cable. A similar design
of a device is also very good for 'wiring up' a building using
the mains trunking as the transmission system, with the microphones
placed in the junction boxes/wall sockets.
There are two requirements for good photographic observation -
a high powered lens and a direct, clear view.
A video camera is not the sort of thing that is normally use for
unofficial eavesdropping because of the expense - although a concealed
camera, activated by motion switches or pressure pads, is a good
way to keep watch on your home for uninvited intruders while you
5.3 Rubbish sorting
A disgusting job, but one which produces a surprisingly large
amount of useful information. Having identified your target you
next find out where their dustbin is, and what day they put their
rubbish out. Then, when no one is around, you remove it to sort
for any interesting information, then return it later.
Domestic targets can produce some - very messy - information,
but commercial targets provide possibly the best source. This
is because much of what they put out is paper, normally dealing
with the business that is happening there and then. From experience,
paperwork from people's homes tends to be sporadically put out,
perhaps during the odd spring clean of a person's filing cabinet.
Phones present an interesting avenue for information gathering.
You simply find out the phone number of a person or corporate/government
department, and then phone up posing as someone (preferably someone
not too familiar to the person concerned). In fact, it has been
found that the majority of computer hacking incidents not related
to company employees get the necessary computer access codes in
this way (see below for further details).
There is little the individual can do about postal intercepts
- so there's not much mileage there.
Faxes, in a similar way to phones, can also be useful for getting
information, but this tends to be best suited to the forgery of
faxes rather than intercepting faxes.
5.5 Social engineering
'Social engineering' is the term used to describe the practice
of getting information, or creating a response, by making the
target consider that something is what it is not. History has
shown that such methods are a very effective way of causing trouble.
Phones are lovely impersonal things - you actually have no way
of knowing that the person on the other end is who they say they
are. You can check the number by dialling 1471 after receiving
a call, but dialling 141 before you call prevents this. It is
also possible for the person to try and phone you back - but as
long as you are careful not to give out a number there is no problem.
Results are gained by dominating the conversation by manner, familiarity
or the structure of questions, so that the person receiving the
call is continually answering your questions rather than putting
their own themselves.
The simplest way of engineering a phone call is to identify your
target, and get to know some detail about their lives, activities
and friends. Then you call up their secretary, wife, etc., posing
as one of their associates who has forgotten the date and place
of a meeting, or the location of a development, or how much money
they had to give to the local chief planning officer. With luck,
and a lot of verbal bullshit, you can get what you want.
Impersonating people in person is very difficult - particularly
since most of my friends are hippies and the people we are getting
at wear suits. However, with total strangers there are possibilities.
Impersonating a police officer is difficult - there are a whole
set of mannerisms and structures of vocabulary to master apart
from the costume. But little finishing touches like a small scanning
receiver in your pocket to give you the traditional chattering
police radio talk in your pocket, may help.
In practice it is safer to impersonate someone unknown and lowly,
but who might hold some sort of power. For example, if you wanted
to start a fuss about quarrying, dress as the average shabby construction
labourer, and just walk around a village with a theodolite, and
get your friend to play along holding a measure. When someone
asks what you are doing say that you have come along to measure
up for a new opencast coal pit. You could even say that you are
conducting a feasibility study for a new six lane bypass next
to some posh residences. Impersonating someone lowly can therefore
have as much effect as someone who is important.
Forging letters is very difficult these days, mainly because letters
are printed on elaborate coloured paper, with watermarks, etc.
However, faxes are monochrome, and have no distinguishing marks.
Also fax machines, by the way they scan and transmit the page,
destroy much of the quality and effectively mask any slight error
in a forger's reproduction. Hence, faxes present the best avenue
To forge a really good fax you need a computer, an image scanner,
a fax machine, and a sample of the standard letter or fax release
that your target puts out. You scan all the identifying features
of the letter such as letterheads, logos and signatures, and then
set these up as images on a page of a desk-top-publisher or wordprocessor.
Then, using a typeface of similar style and point size to the
real thing, you write your own message.
What you do then is up to you. You could just copy the fax using
your fax machine, and then stick it up on a noticeboard somewhere.
Better still, to make it look as if the fax has been 'leaked'
by an employee, reprogram the fax machine with the fax number
of the company, make sure you dial 141 to prevent reception of
your number, and then fax it to all the local newspapers.
Some people consider harassment an acceptable way to campaign
- I don't. This is because you can never be sure about only getting
the person you are after. For example, many of the animal rights
protesters have picketed people's houses - but what about the
neighbours who are unconnected with the issue concerned?
The only form of harassment I indulge in is swamping businesses
with phone call or faxes. This is justifiable because you are
attacking a business as an organisation rather than one person
in particular, and you can be sure that the action only hits the
There are various ways to do this. If you are just calling by
voice you will need to have many tens of people doing it at the
same time or BT will intervene for phone harassment.
The other option is to send a very long fax. If you have a fax
modem this is easy because you create a 60-100 page document on
your wordprocessor, and then send it electronically to the fax
machine at the other end until you run it out of paper. To do
this manually with a normal fax machine is more difficult.
Figure 51: Fax loops
Many modern fax machines are made to disconnect if a page longer
than 60cm is sent. Thus, if you made a simple paper loop, the
other end would disconnect. The way around this (illustrated below)
is to chop chunks out of the end of three sheets of paper, connect
them together, and while you are transmitting the first two connect
the first sheet to the last. The reason this works is because
the paper detector is normally in the centre of the sheet feeder.
The gaps in the paper loop are therefore interpreted as a break
between pages. However, this system does not work for all fax
machines - so you will have to experiment a little with this standard
The other option, if you have a fax modem and a lot of numbers,
is to get your fax modem to systematically call all the voice
numbers and try to send them a fax, over and over again. If there
is any comeback from BT there is a simple response... how were
you to know there were no fax machines connected to these numbers!
Computers, and how to use, abuse and destroy them is a topic in
itself. There are many constructive ways to uses computers, there
are many destructive ways to use computers, and there are many
ways to foul up or damage computers - (generally an axe through
the motherboard and hard drive works best).
Rather than give an in-depth analysis of how to constructively
use or foul up computers, it is easier for the purposes of this
handbook to describe what to do if presented with one. This really
only applies to desktop or laptop computers.
If I got close enough to a desktop computer to do damage to it
- I wouldn't. I'd remove it from the site, take it home, after
holding it in quarantine at the stash for a few weeks, and extract
all the data I could from its hard disk. Computers are generally
protected by a password which prevents unauthorised access when
you first turn it on. The password is held in an electrical memory,
supplied with electricity from a small battery - disconnecting
the battery clears the password and allows access. If you take
the computer apart, the battery is normally mounted somewhere
inaccessible such as under the hard disk. Alternatively, find
the CMOS ROM and short the power pins together - this also clears
However, when you've finished with the computer, get rid of it!
Sell it on to someone unconnected with sabbing - for cash - or
just dump it. Computers and the chips inside them are very valuable,
and for this reason they all contain identifying serial numbers.
If you get raided and they check the computer, you will be caught.
But - how do you do serious harm to a computerised system?...
Be aware that not all computers are the friendly looking beasts
you see on office desktops in the reception of your local authority.
A computer controls the switching of traffic lights; it controls
the machinery on many complex industrial processes; it controls
the management of the telephone network; it controls the electronics
and engine timings in nearly all modern cars.
Computers fall into three broad categories:
- Mini's/mainframes: These are large systems used by
corporations or institutions. They generally consist of one or
more large cabinets full of circuit boards with the name 'Sun',
'IBM', 'Digital' etc. written all over them. They will also have
a number of printers, large hard disk drive, and a large amount
of cabling associated with them. Chances are that if you are confronted
by one of these systems, then you are about to be caught as you've
activated every security device in the building!
There's not a lot you can do with these systems - straightforward
smashing, hammering and cutting is the best options. If you don't
have a lot of time, just remove some of the larger circuit boards,
place them between two blocks lean them against the wall, and
stamp in the middle to snap it in two.
- Desktops/laptops: These are the machines you see in
offices, or you might have at home. They are generally used for
'human' related work. If you are unable to get the computer off
the site there are a number of options...
- Throw it out of an upstairs window;
- Hammer a screwdriver into the floppy disk drives;
- Remove the cover of the main unit to gain access to the inside,
then using a blunt screwdriver, hammer holes in the hard drives/CD-ROM
drives (usually large metal boxes about 3"-6" square
and 2" deep), and the CPU (small black 'chips' on the circuit
board, about 3cm-4cm square).
- If you have access to the floppy disks, take them, but you
may not get anything off. Some systems encrypt data on disks making
them unusable. Alternatively, just bend the disks in half.
- Programmable logic controllers (PLCs)/Hardwired logic controllers:
These machines, varying in size from a small shoe box to a
bedside cabinet, control complex mechanical or electrical systems
such as security alarms, traffic lights and 'command and control'
PLC's are identifiable because they normally have small keypads
and LCD/LED dot matrix displays. Hardwired units are essentially
small circuit-board based computers that control specific small
scale tasks, and are not programmable. A good example are automatic
washing machines, or a video recorder. In terms of extracting
information these systems are worthless, but there are a number
of alternative options...
The whole subject of using computers will be covered in depth
in Volume III of this series.