Climbing up the stairs, the three men look like anybody else coming into the SUN office except for the load of briefcases each carried. But as they start to open those black leather cases and pull out a strange array of electronic equipment, we know they are the men from CMSS. Formally, the Counter Measure Security Systems (CMSS) sa counter-surveillance or "debugging" company based right here n Ann Arbor. Using the same electronic technology which makes massive Ilegal bugging possible, CMSS makes machines to f ind microphones and transmitters hidden in an office or home. Without a word to tip off any potential listeners to their presence, the three go to work. Dave immediately begins to disconnect the red desk phone, while Dan is extending the antenna on another mysterious-looking contraption. "There's ten ways to bug the average phone," explains Dave as he hooks my phone into a Telephone Analyzer. "This machine tests a series of abnormalities in the phone and along the lines which would show a possible tap. People often think their phone is tapped when t isn't. Clicks, buzzesand pops on the line don't necessarily mean the line is bugged. In fact, we most often find taps on lines which are free of noise." First, Dave runs a voltage test on the phone lines. Any high or low readings could indícate an electronic device plugged in on the lines and puiling off power. This test s run with the receiver both on and off the line. The next test runs a high gain amplif ication along the lines to piek up noises in the phone. "If you can hear yourselves talking, you know the phone's bugged somewhere and picking up conversation in the room," Dave says. The Phone Analyzer is making lots of electronic noise, although none of it sounds like words. "You've got a noisy bell on this phone," he comments, and he doesn't mean for ringing. "You can see how the bell can be used as a place for planting a bug." So far, nothing unusual. In the next test, he takes the phone and puts it nto a briefcase. "This test s for inf nity or "harmonica" bugs," he explains as a loud electronic tone becomes audible. Beginning at a low frequency, the sound quickly becomes a high pitched, annoying scream and moves on out of human audio range. A "harmonica" bug is a devious device, since most bugs which aren't operating are hard to f ind. This one turns dn and off by remote control. The eavesdropper plants it in the victims' phone, then calis the number from somewhere else. Just before the f irst ring, he blows a tone from a pitch pipe or rings a tuning fork sending the sound over the wire. The bug goes on and prevents the phone from ringing. Voila, the listener can now hear any conversation in the room. Another note from his "harmonica," and the device is nactive until he wants to try it again. By running through the entire audio range, the Telephone Analyzer should actívate any "harmonica" bug on the line, thus making it detectable. "l've heard that an infinity bug has been developed which uses two tones to actívate it rather than just one," I ask, "so just running through the scale wouldn't trigger t." Dave admits he has seen such a device, and indeed it would be difficult to lócate. "However, the technology for the two-tone bug is still not developed, so they're extremely unreliable. As yet, they're not in common use and we probably won't f ind any for a few years," he comments to quell my fears we may miss something. Suddenly, the phone rings, the machine instantly shuts off, and a tiny light goes on. "That also happens f anyone picks up the phone to cali out," he continúes. "It guarantees others won't know the line is being tested." The SUN's phone lines are clean and so is my desk phone. But since the tap could be on any individual instrument in the office, Dave moves off to check out the other phones. In the meantime. Dan is in the next room running a square box with a long antenna over the walls and furniture. "This is a Transmitter Locator," Dan tells me. "It picks up any radio transmissions coming from the room. Nicknamed "the screamer," the device emits a constant electronic whine. "If we f ind anything, it will really scream," he laughs. As he moves along the room, he keeps tilting and turning the antenna. Much simpler than the Telephone Analyzer, this device doesn't require any special training. All you do is turn t on and "sweep" the walls. Suddenly, the steady hum goes crazy. A signal in the walls? Dan takes a second box out of his briefcase which makes t possible to "hear" the transmission coming from our wall - a Transmitter Verifier. He holds it up next to the spot where the "screamer" had gone off, and what do we hear, but - music? "If we'd heard ourselves talking, we would have known there was a transmitter planted in the wall," laughs Dan. "But in these old buildings, we almost always get pipes picking up local radio stations. Nothing here." Taking back out fhe Locator, Dan finds several more spots around the room. Along a door frame, we hear a pólice radio relaying calis. "Must be parked around the block somewhere," Dan mumbles. Everyone cracks up a few minutes later when the radiator starts playing "You Got to Knock on Wood." The last major test is along the electrical lines in the office, another prime place for planting a bugging device. The Line Analyzer turns the electric signal into audio, letting the tester "listen" to the AC lines. "Dave is really the genius in this operation," comments Kerry . "He needed something to run this kind of test, so he built this Power Line Analyzer in just one night. Looks real professional - would have taken anyone else at least three months." He plugs the box into the wall and puts on a set of headphones. Immediately he starts tapping his feet. "WPAG comes in loud and clear," he comments as he hands me the headphones to try on. "It's just like listening to AM radio." After a thorough test throughout the SUN office, the men from CMSS have not found a single bugging device operating anywhere in the building. When we admit we had not been too discreet about discussing their approaching visit, they suggest any bugger would have been tipped off and probably removed the transmitters in the office. Of course, we're relieved they found nothing but it would have been interesting if they had. ■fter this demonstration of a "debugging" operation, I f""Bwejit back to their office at 300 South Thayer, Suite ■8 (in the basement of the Bell Tower Hotel) to find out more about the debugying business. "We have a find rate of about twelve percent," syas Dave. "Some of the people for whom we've found devices have been f lipped right out and thought the world was coming to an end. Other people have just shrugged and said 'I know. At least now I know where t is!'" Dave and Dan have been involved in the business for about six years, doing work on a personal service basis for friends and occasionally for private detectives. After Watergate, bugging became a popular pasttime for all kinds of people. "There's quite a bit of industrial spying going on," Dave tel Is me. "We are finding more and more people are bugging for smaller and smaller amounts. It used to be on things Mke road contracts where bids were around $8 million and a $2,000 difference might take t. Now, people are bugging for amounts as small as $25,000." Other people nvolved in the bugging business include , private detectives (bugging is popular for marital cases), lo, cal pólice and prosecutors. In each case, the bugging is I, legal. "We have all kinds of laws about it," comments Dave, "but they don't do a damn thing to stop it." Counter Measure Security Systems was founded three I months ago, as demands for Dave and Dan and their equipI ment increased beyond their ability to fulfill them. "If someone desires our services," Dan explains, "either walk in to our office or cali from a pay phone. Don't say I anything in your home or office. We are quite cool about I it - we will even walk into your place and not say a word to I each other about what we're doing. We've been known to I write little notes back and forth if necessary." "But if we spot any il legal activities," continúes Dave, I "we have to get up and walk right out. For example, if I someone wants phones checked for taps and it's obviously I a bookie organization, we'd have to leave. If it's impossible I to clean up your act enough to let us walk through your home, then we'll sell you the equipment, teach you to use it and you'll get the same results." CMSS has had numerous people buy equipment, in fact, up to $30,000 worth. "You don't know if it's a dope dealer I or a law firm," comments Dave. People have sent money I orders or wired money by Western Union and had the machines in as little as eight hours. Some requests go to i post office boxes, and aliases used ncluded such ñames as Ben Dover, or Rob N. Cheatum, a used car dealer. Dan ! claims some people writing for catalogues and equipment even spell their names different each time they write. The technology involved in wiretapping and debugging ! is constantly changing, so CMSS is continually updating its equipment. "It's a regular war," comments Dave. "Some of the elecI tronie systems in our devices date back to the forties, I others are only three weeks old." "It's not legal to make or sell bugging devices anymore, except to law enforcement agents - and that's only with specif ie paper work," he explains while showing me some of the bugs they've found in their work. "This device was commercially made, and probably sold for about $80 about three years ago. There used to be a store n New York City where you could walk in off the street and just buy these. People were buying them by the ton because they knew they'd be made Ilegal. Now this sort of thing would sell for $250 to $1,000 depending on who made it and where it was being sold. That's because it's Ilegal. But it's got about $10 worth of parts and maybe $25 in labor. And anyone who's completed electronics one in high school is capable of understanding the technology." Bccording to Dan, CMSS has located equipment in Ann r"BArbor far more sophisticated than that used in the ■Watergate bugging. While they won't talk about any of their clients (conf identiality is a major part of their business), they did admit many of their clients included major f irms whose names would be familiar. "One company where devices were found was very cool about it," tells Dave. "They took their people, f lew them out of town and set up this whole soap opera. They carne back and played t out in tfie office. In conversation, they discussed a product they had been thinking about, giving out wrong nformation on it for three months. "A competitor brought out a similar product within days of the release date they had used in their drama. The formula was within percentage points of the mixture they had talked about. The quantity and price trade off were not good, because they had informed the competitor it was what they were going to use. The competitor had released $212 million of this product all over the country the first day. It was a costly use of bugs for that competitor, and it was awful obvious who t was at that point." Usually, when CMSS f inds a bugging device after quietly searching the premises, they leave it there. Anything they find is considered clandestine, and the person is told of the find. "What they do from there is their business," said Dave. "We're not private detectives. It's really impossible to determine when you find one of these devices whether the law enforcement put it there, a competitor or fly-by-night private detective. "Once you know your phone is tapped, for example, you can buy a device that will allow you to switch the bug on and off at will for less than $3,000. That's one of your options - you can exist with it and fooi it. Or you could get yourself a roll of dimes and start using the phone booth for your calis." There are cheaper ways to thwart an undesired eavesdropper. At the CMSS office, a radio is constantly playing in the background. Because a microphone does not have the capabilities of the human ear, a background noise will ruin the transmission. A brief experiment with my portable tape recorder quickly conf irmed this method's effectiveness. CMSS also sells a pair of "scramblers" which can be used on any phone for about $750 per pair. Such transmissions would at least slow down any eavesdropper, since randomly trying to descramble takes at least 24 hours. Legal wiretaps are another problem, and CMSS admits that since most of these are done through a phone company's central office, they could not be detected. "Your local county cop doesn't have any legal wiretap powers," explains Dave. "But we've heard that many purchase devices under the guise of buying extra electronic parts for pólice radios. We've even heard rumors some cops sell them to private detectives." The State Pólice already have extensive wiretap powers. They can authorize a 48 hour wiretap on an emergency basis without a court order, and the tap is legal. After 48 hours, they're supposed to show the evidence to a judge and if shehe beiieves there is cause, shehe can authorize a warrant. All the evidence gained is admissable in court. "There have been revelations recently that 22 domestic federal agencies are nvolved n wiretapping," Dave adds. "The Internal Revenue Service buys more bugging devices than the CIA and FBI put together. The IRS does an incredible amount of snooping on normal, individual citizens with everything imaginable, including night visión equipment. As far as we can teil, this is strictly up to the control of the local IRS field director." CMSS is unique in one way from all the other countersurveillance organizations in the country. Of the five or six major firms now operating, Counter Measure Securities Systems is the only major one not started by former law enforcement people. "The other people have worked offensively for the CIA or the FBI," Dave says. "I can't imagine many people who are our clientèle asking these people into their homes. "We are a morally committed f irm to debugging; it's a whole different atmosphere. Too many of the most competent men have no moral commitments either way. They don't care - they bug, they debug, and as long as they get their money they do their job. Again, who really wants to hire that?" Counter Measure Security Systems does debugging anywhere in the country, and their fees are reputed to be about the lowest in the business. Dave said they could do the phones in an average house for about $200. A small law office with about six lawyers would run about $600 per day, and would take twó-three days for a complete sweep. Once debugged, CMSS sells a device which detects anyone coming into a room carrying an active transmitter. They I also warn that a good "garbologist" can learn many secrets, I and have a paper shredder which goes for only $139.50. Most people may never need a debugging f irm, but as one-anonymous letter to CMSS said, "l'm glad there's a place like yours around,"signed:"name withheld from fear."l IThere are ten ways to bug the average phone. But clicks, buzzesand pops don't necessarily mean a phone is tapped. In fact, many taps are found on lines with virtually no noise or static. CMSS has located electronic equipment in Ann Arbor far more sophisticated than the devices used for the Watergate bugging. People have purchased up to $30,000 worth ofequipment from CMSS to "debug" homes and offices.