>>3547
Let me pull from parts of a manual I wrote:
>Section 3.1: Information Exfiltration and Best Practices
>Your first goal in infiltrating is exfiltrating information. However this is a pretty difficult task, for three reasons. The first of these is the information itself. Its difficult to capture conversations covertly. The second is scale. Its hard to know whats important and what isn't, and you most likely have a lot of information to cover. The third is utilization. What can be released without hurting sources? How can information be used to your advantage?
>These questions are very broad and each require their own chapter. This chapter will deal with collecting & processing information. Later chapters will deal with how to use it for various tasks, such as gatecrashing, asset development, and group subversion.
>On Person Microphones:
>As an infiltrator, it is your job to collect every word, every message, and every document. The first of these items, and the hardest to collect, is audio. Hidden recording devices must fulfill some basic requirements. The device must be small and concealable, be inconspicuous, and have a reason to be around.
>The best recording device for this type of operation is a common smartphone. There are plenty of hidden recording apps out there. Everyone has a phone, and there is no real reason you wouldn't want one with you while you are at a meeting or talking with guys from an associated group. The modern smart phone has a pretty decent microphone that will work well for this kind of task. The main problem with this happens to be space. Audio recording for this long requires a ton of memory. You might have to dump some of your old files on your hard drive to free up space. These recording take memory, and lots of them.
>There are other devices that you can get for your uses. You can find a variety of hats, sunglasses, pens, buttons, and other object that contain cameras and audio recorders. Any video should be secondary unless you want to nab some faceshots of people. Audio is always more important. These types of devices are significantly more risky than say, a smart phone, because these devices, when discovered, have no other explanation behind them other than “you were recording.”
>Leave Behind Microphones:
>If you cannot be present in an area and you need to make a recording, there are plenty of simple solutions out there for you. The most robust and flexible system that can be purchased for cash is an FM microphone transmitter kit and a scanner/radio kit with an aux out. These tiny FM microphones generally broadcast at 100ish MHZ with about 200 meters of range. With a radio that has an aux out, you can plug the aux cord directly into the microphone slot and record it directly into audacity. The sound will be complete shit in quality, but some work in audacity will make it bearable.
>Although not technically a leave behind microphone, if for some reason the people you are monitoring are a smuck enough to use a lavier microphone, just hop on with a scanner and start searching through CB ranges. These microphones are notorious for not only being easy to intercept, but easy to manipulate. These are actually banned from use at popular security conventions like DEFCON because crafty infosec analysts would broadcast their presentations OVER TOP of the real presenters.
>A less involved option is to purchase a wifi pinhole camera. These things are hit and miss, and really the wifi feature is secondary, you want the microsd card functions. Because you can leave them, forget about them, and then pick them back up with your audio. Oh also these things are motion activated, so they are really hit and miss.
>There are plenty of GPS GSM tracker out there that are surprisingly robust. Although these boxes are marketed as GPS “trackers” they are mainly used for audio recordings. You can easily call into a GSM card number and hear what the microphone is saying. You can get these as fake powerbank looking things with an android logo on it, weird microusb cables, and even these weird fake key clickers designed to track old people. The “GPS” trackers aren't even real gps trackers, they just triangulate the position via cell phone towers.
>You can also get these over the powerline microphones, but you can't find them anywhere anymore and they are complete garbage at this point. Now over the powerline routers are sweet for other things, which I may get into later, but not this.
>However through all this there is one huge problem with all leave behind microphones. Recovery: you have to pick up the evidence afterward. Don't rely on these. In fact, avoid using these like the plauge. There are way better ways to get these things done here.