|
Archive of News Releases Updated: September 2nd, 1998 News releases
archived: 8
|
|
The following news release was distributed
September 2, 1998 by fax and email to 282 news media organizations and
journalists in the USA, Canada, and UK. News Release For
Immediate Release FBI "wheel artists" exposed. VICTORIA
BC, CANADA September 2, 1998 Between 250 and 400 people a day are
receiving countersurvellance training from a free Web site in California that
bills itself as spy school for the rest of us. Since
February, a spy watcher in Canada has been using the Internet to expose the
methods used by the FBI to suppress protest and dissent in the USA. The current
focus is on FBI vehicle surveillance teams. "They
call them wheel artists," says Lee Adams. "But that's just
spy-talk for a surveillance agent in a vehicle." "They
don't follow you they surround you," he says. "They become
part of your environment. You never see the same vehicle twice. Up to twenty
FBI agents at any one time. Even more if the investigation involves national
security." According to Adams, the FBI
trains its agents in the use of the floating-box system of vehicle
surveillance. "The surveillance team
creates a box of vehicles around you," he says. "The box floats with
you as you travel along your route. Hence the name floating-box." Adams
is using his Web site at http://www.spycounterspy.com to expose the
tactics and diversions that FBI agents use to avoid detection by the people
they're watching. A typical FBI vehicle
surveillance unit is composed of sedans, coupes, stationwagons, pickup trucks,
vans, minivans, sport utility vehicles, taxis, motorcycles, commercial trucks,
ambulances even 18-wheelers, according to Adams. "They'll
even put a surveillance vehicle on the road ahead of you," he says. "When
the vehicle that is watching you is in front of you, they call it a cheating
surveillance vehicle. They fool a lot of people with that one." Adams
says he has no plans to discontinue publishing his disclosures at his Web site
at http://www.spycounterspy.com
|
|
The following news release was distributed
June 12, 1998 by fax and email to 121 news media organizations and journalists
in the USA, Canada, and UK. News Release For
Immediate Release FBI reads encrypted email. VICTORIA
BC, CANADA June 12, 1998 A spy watcher in Canada says FBI
surveillance teams routinely crack encrypted email. "PGP
is a good example," says Lee Adams. "It's a first-rate encryption
program but most people aren't using it correctly, mainly because they
don't understand how the FBI operates." "FBI
methods are based on two classic strategies. Some methods rely on the FBI's
ability to get inside your home or office undetected. Other methods involve
electronic equipment that can detect at a distance what's happening on your
computer." "Most people don't even
realize they've been compromised," says Adams. "They continue to send
email they think is confidential." Adams
is using his web site at http://www.spycounterspy.com to expose the different
methods used by FBI surveillance teams. "We
explain ten methods," says Adams. "Six of those methods involve
surreptitious entry by the FBI. That's spy-talk for break-and-enter. Most
people have a difficult time accepting that a surveillance team can get inside
undetected not just once, but many times." "The
FBI often needs to make repeated entries in order to pick through all your
stuff," says Adams. "They've developed some fascinating methods for
getting in and we're finding that people are more serious about their
privacy once they find out what the FBI has been up to." The
web site provides step-by-step instructions on how to prevent an FBI
surveillance team from reading your confidential email. "The
first step is purely defensive," says Adams. "But once you've made it
difficult for them to crack your email, you can go on the offensive. It's
possible to use bogus email to detect the presence of a surveillance team you
didn't realize was there. This method works against FBI and BATF teams. It's
particularly effective against standard police surveillance." Adams
says he has no plans to discontinue publishing his disclosures at his Web site
at http://www.spycounterspy.com
|
|
The following news release was distributed
May 11-12, 1998 by fax and email to more than 100 news media organizations and
journalists in the USA, Canada, and UK. News Release For
Immediate Release Spy watcher exposes Bureaucrats' Toolkit. Methods for political control over the American people. VICTORIA
BC, CANADA May 11, 1998 A spy watcher in Canada continues to be a
thorn in the side of the FBI by using the Internet to reveal suppressed
information. Lee Adams warns that government
has recently been provided with the opportunity and the means to
permanently wrest control from the population. "We
face three separate threats," he says. "Together these combine to
give government a stranglehold on civil liberties a death grip on
traditional freedoms." Threat #1
Computers have taken over surveillance. Entire populations can be supervised and
monitored automatically. Dataveillance makes it easy for government to track
certain classes of people like minorities or dissidents or anyone
who dares think for themselves. Databases and CCTV video cameras are to blame. Threat
#2 The militarization of the police. The cops are now using some very
nasty weapons. Half the stuff they use is prohibited by the Geneva Convention
and the Hague Declaration. The government can't use it in war, but their own
population is fair game for CS and OC gas sprays, beanbag projectiles,
new mark-free interrogation tools, and handgun ammunition that can amputate your
arm or leg. Threat #3 Proliferation by
private companies. Most of these high-tech gadgets are dual-use. There's no
regulation or control over research, manufacture, export, and deployment of this
nightmarish technology. The surveillance cameras in Tiananmen Square were
exported from the USA as advanced traffic control but they enabled
China's dreaded Guoanbu security service to round up all the "troublemakers".
Private companies are reaping huge profits in the newly-emerging
police-industrial complex. "These three
conditions are being used by bureaucrats as a new technology for political
control over people not only in the USA, but worldwide," he says. "This
information comes direct from a report commissioned by the European Parliament." Adams
says he has no plans to discontinue publishing his disclosures at his Web site
at http://www.SPYCOUNTERSPY.com
|
|
The following news release was distributed
April 1, 1998 by fax and email to 63 news media organizations and journalists in
the USA, Canada, and UK. News Release For
Immediate Release Spy watcher continues to taunt FBI. Internet site teaches activists to resist surveillance. VICTORIA
BC, CANADA April 1, 1998 A spy watcher in Canada continues to
taunt the FBI by using the Internet to spread previously-secret information
about countersurveillance to activists and dissident groups across the USA. Lee
Adams warns that any group questioning the status quo should consider forming a
countersurveillance section. "No matter
how benign your goals you are considered a threat. Ipso facto you become a
target for surveillance," says Adams. "The FBI uses surveillance for
observation, infiltration, sabotage, and intimidation. Any one of these can
stop your group reaching its goals." "You
need to learn to set up cells in your organization and make it resistant to
infiltration by the FBI. Their agent-provocateurs can seduce you into reckless
behavior. Their informants can ruin your operations." "You
need to learn to ensure the FBI can't arrest you on conspiracy charges,"
says Adams. "Conspiracy is the most common grounds for arrest when
surveillance is involved." "You need
to learn a system of tactical communication. This means things like spoken
conversations, facial expressions, gestures, and mannerisms that can be used to
keep your communication private even when under hostile surveillance.
The world's top intelligence agencies are already using this system. Of course,
the FBI doesn't want you to know about it." Adams
says his Web site is like spy school for the rest of us. "The only other
people who could teach you this stuff are the spooks themselves. But they
can't," says Adams. "They get prison sentences or worse
for talking." Adams says he has no plans
to discontinue publishing his countersurveillance disclosures at his Web site at
http://www.SPYCOUNTERSPY.com
|
|
The following news release was distributed
March 25, 1998 by fax and email to 57 news media organizations and journalists
in the USA, Canada, and UK. News Release For
Immediate Release Internet site teaches victims of FBI
surveillance to cloak their actions. VICTORIA
BC, CANADA March 25, 1998 A spy watcher in Canada is using the
Internet to provide countersurveillance skills to activists and dissidents in
the USA. "Our mission is to level the
playing field by providing information to supporters of freedom, democracy, and
fairness," says spy watcher Lee Adams. "The
FBI is more than a police agency," he says. "It is a security
service. There are important differences between police agencies and security
services." "Every government has a
security service. The mission of a security service is to suppress
anti-government activity. The prime directive of a government is to stay in
power. Most governments see their own population as a threat." "The
nastier the government, the nastier the security service," says Adams. "The
FBI does not have a history of respect for civil rights in its role as a
security service. The FBI protects the government from the people. The people
have no such protection against the government." Adams
warns that any group questioning the status quo should consider forming a
countersurveillance section. "No matter how benign your goals, you are
considered a threat," he says. "You become a target for surveillance." "A
security service like the FBI uses surveillance for observation, infiltration,
sabotage, and intimidation. Any one of these can stop your group reaching its
goals." "You can learn to detect
surveillance teams," says Adams. "Even more important, you can learn
to cloak your actions and carry on undetected even while you're under hostile
surveillance." Adams says he has no plans
to discontinue publishing his countersurveillance disclosures at his Web site at
http://www.SPYCOUNTERSPY.com
|
|
The following news release was distributed
March 7, 1998 by fax and email to 50 news media organizations and journalists in
the USA, Canada, and UK. News Release For
Immediate Release Spy watcher reveals how to beat FBI
surveillance. Activist, militia, civil rights, other groups on mailing list. VICTORIA
BC, CANADA -- March 7, 1998 -- A spy watcher in Canada is using the Internet to
reveal the operating methods of FBI surveillance teams. Lee Adams says he is
breaking no laws by telling what he learned by watching agents who were watching
him. "The FBI utilizes a triple-threat
scheme of multi-layered teams, same-day response, and managed aggression,"
says Adams. He claims that FBI surveillance
strategy is built on military prinicples of space, time, and force. "The
FBI has been at this game for many years. They've learned many lessons,"
says Adams. "Their surveillance strategy has meant ruin for many people
who thought they could outfox the FBI." "Threat
#1 -- FBI multi-layered surveillance teams play a classic scam. They lure you
into thinking surveillance has ended. But they're still nearby, waiting for you
to do something incriminating." "Threat
#2 -- Same-day response anywhere in North America means surveillance might begin
before you're ready. The FBI may end up watching you trying to hide the very
material that you're hoping to conceal from them." "Threat
#3 -- The FBI's strategy of managed aggression in surveillance operations can
provoke you into losing your temper or your nerve -- or both. It's a wicked
mind-game. That's why they use it." According
to Adams, anyone can learn countersurveillance skills that make it difficult for
the FBI to build a legitimate case against them. "Perhaps
even more important, they can make it difficult for the FBI to build a phony
case against them," he says. Adams says
he has no plans to discontinue publishing his disclosures at his Web site at
http://www.SPYCOUNTERSPY.com
|
|
The following news release was distributed
February 17-18, 1998 by fax and email to 64 news media organizations and
journalists in the USA, Canada, and UK. News Release For
Immediate Release Hacker divulges secrets of world's spy
agencies. CIA, FBI ops and foreign policy affected. VICTORIA
BC, CANADA February 18, 1998 A spy watcher in Canada is using the
Internet to reveal the operating methods of the world's spy agencies. Lee Adams
says he is breaking no laws by telling what he learned by watching the spies who
were watching him. "I'm just a hacker,"
admits Adams. "But I don't hack computer systems, I hack surveillance
operations. I go after intelligence agencies and undercover cops." Adams
first came to the attention of the US intelligence community eight years ago
during a routine vetting by a defense research facility to renew his clearance.
Using skills he had learned while writing computer programming books for
McGraw-Hill, he became adept at spotting the spies. When he took his concerns to
the authorities, he was rebuffed but the surveillance intensified. Adams
claims he found himself in the role of crash-test dummy as the spies attempted
to upgrade their tradecraft. But while they were watching him, he was watching
them. "They were inadvertently showing me
their best stuff," claims Adams. "So I provoked other groups into
watching me. I wanted to learn as much as I could." Adams
claims that the United States has fallen 20 years behind the methods being used
by other nations. "Nowhere is this more
evident than Iraq. The CIA has no productive agents inside the country. Iraqi
counterintelligence has neutralized them all," claims Adams. "US spy
satellites and electronic eavesdropping can't find hidden weapons. To do that
you need infiltration by human agents. And the US doesn't have any. That's why
random bombing is the only option left." "While
the US was spending billions on high-tech surveillance gadgets, other countries
were developing low-cost, low-tech solutions," says Adams. "These
other groups now have a 20-year lead in humint, which is spytalk for human
skills in surveillance and intelligence work." Adams
says he has no plans to discontinue publishing his disclosures at his Web site
located at http://www.SPYCOUNTERSPY.com
|
|
The following news release was distributed
February 11th, 1998 by fax and email to 59 news media organizations and
journalists in the USA, Canada, and UK. News Release For
Immediate Release Spy watcher threatens to expose
surveillance operations of FBI, CIA, and others on February 14th VICTORIA
BC, CANADA February 11, 1998 A spy watcher in Canada is
threatening to use the Internet to expose dozens of active surveillance
operations across the United States on February 14th. His action puts in
jeopardy a number of operations in U.S. cities by the FBI, ATF, DEA, and local
law enforcement agencies. Operations by the CIA outside the U.S. may also be
affected. Lee Adams says he will publish a
simple three-step method that anyone can use to recognize surveillance teams
operating in public locations.
Adams claims exposure of surveillance teams is
inevitable because the U.S. has fallen twenty years behind the methods being
used in other nations. He says the situation is a result of tunnel vision of
U.S. bureaucrats and politicians. "The
United States spent the last two decades throwing billions of dollars at
high-tech surveillance gadgets. During that same period, however, others have
been developing low-cost, low-tech solutions," says Adams. "These
other groups, not all of them friendly, now have a twenty-year lead in humint,
which is spytalk for human skills in surveillance and intelligence work." Adams
says he will publish his three-step detection method at his Web site at
www.SPYCOUNTERSPY.com two days prior to February 14th, in order to give
authorities time to protect their most sensitive surveillance operations. "If
they leave those surveillance teams in place, they will be detected by anyone
who chooses to try this simple three-step method," warns Adams. "The
Web site says it all. How to catch your first spy this weekend."
|