This is an incomplete document known as the so-called "DOC DOC"
-- allegedly fragments of lecture notes for a lecture given in 1978 to law enforcement detectives in Irvine, California called "Disorganizing Organized Crime."
Allegedly it was originally written in WordStar for the old Kaypro 10 computers and the floppy it was extracted from was allgedly recovered from a trash bin outside of a hotel where a number of lecture attendees were staying. If I'm not mistaken, the Kaypro 10 wasn't out by 1978 but the Kaypro 4 -- the floppy based computer -- was. The Kaypro 10 with the 5 megabyte Winchester didn't come out until 1982, I believe, so I suspect that it was written with the floppy-based WordStar on the old Kaypro 4. A program called "MiltiForm" (also known as MF and "Mother Fucker" because it took hours some times) was said to have been used to recover sectors on the floppy though only fragments were recoverable.
The file was fairly widely disseminated among the older 8080- based and XeroX 820-based BBSes back in the early 1980's and a check of AltaVista shows that it's otherwise disappeared. It has cropped up on a version of the old WeirdBase files so I'll post it here to keep it alive and because it is hauntingly appropriate to a.r.s. Supposedly there are other fragments yet I couldn't find them, even in the WierdBase archives and I'd love to know if anyone has all of the fragments of this.
I've cleaned it up some and out of the fragmentary text I've filled in holes with what I belive was the crux of what was missing, and before posting it to newsgroups I've removed other blocks of text since some of it I consider irresponsible to post publically even though it's been out in the public for over two decades. Where I've made corrections, I've indicated as such with a [flr] Where I took a guess at what the original text said I mark it with a [flr?] Blocks of text I removed entirely are marked with [...cuts...flr] I've mentioned the likelyhood of an underground shooting range out at the armed and fortified compound out at Gilman Hot Springs, and I've mentioned military-grade OSCOR hardware before. It's this document that got me thinking about these methodologies and technologies (which are circa late 1970!) The automated testing of sewage expulsion of the armed compound (for drug manufacture and for rendered human remains) are, I believe, a matter of public record and can be found to be discussed on the Internet due to the privacy issues and issues of probable cause and evidence gathering without subpoenas (and thus without "due process.") The issue here -- sampling wind and ground vibrations for evidnce without a subpoena -- raises like issues.
Fredric L. Rice frice@skeptictank.org - July 2001 -=- [ Much text was garbaged here. It's impossible to determine the context so I've removed everything up to the following sentence - flr ] Domestic terrorism task forces like to develop infiltrated agents and disaffected prior members of organized crime rings and terrorist organizations. Information that is provided by [both of these types of sources - flr] comprises the backbone of America's organized crime fighting agencies. Resentment- motivated factions and ideologically based factions within the organized crime group also provide an extremely useful conduit of [information - flr] to law enforcement. Development of electronic assets [within the organized crime syndicate - flr] generally form a secondary layer of information gathering procedures however they will take a primary role in the lack of successful infiltration.
For our fictional criminal compound, let's assume that the organization maintains an underground firing range for the firearm training of their field operative and [text garbaged at this point - flr] high-profile law enforcement egress into [the facility. -flr?] Law enforcement agencies might like to know how often that range is used, a classification of the weapons typically or specifically used, and maybe an idea as to what percentage of firearms being used are either fully automatic or have been modified to be fully automatic. [I believe that should read "are either semi-automatic or have been modified... flr] There are several ways that such information can be gathered remotely without assigning an infiltrated officer to the task.
One way could rely upon the placement of particulate materials- gathering devices along the [compound's -flr] property down wind of the prevalent wind flow. The law enforcement agency could deploy equipment along the highway which has horizontally exposed surfaces coated with a catalyst which chemically bonds to the typical commercial-grade propellants one finds in off-the-shelf ammunition. The catalyst would trap and record out-gassing from the presumably ventilated underground firing range.
Such devices would be disguised as local sedimentary rocks common in the hills surrounding the compound, made out of paper and plaster with coarse filter paper raised an inch or so above the chemically coated horizontal surfaces. They would unroll an exposed surface slowly and at a measured rate so that, after a week of being in the field, the rolled-up record would show bands of particulate propellant, offering some rough idea as to frequency of use of the firing range. A forensic examination of the deposits would yield some information as to the types of ammunition being used in the underground firing range.
[Text fragment entirely missing here -flr] but doesn't give enough details to give law enforcement a strong [enough -flr?] profile to work around. A high-profile agency -- [...cuts...flr] -- which would have to go into the facility to rescue a hostage or to acquire a fugitive, might like to know better specifics about the threat potential they're being asked to pacify. So we go to the second, superior choice:
Electronic surveillance.
OSCOR has facilities and capabilities that enable him to monitor, record, trigger, and report upon the ambient acoustic environment. Even better: OSCOR has the capabilities to recognize specific audio signatures within a spectrum of probability. Percussion incidents resulting from the firing of firearms underground can be detected and recognized by OSCOR, and with a degree of sophistication that enables OSCOR to report the velocity of the projectiles being used. The period of time between the initial shock wave front of the propellant gasses leaving the firearm to the time that the projectile impacts the backstop can be measured. Humans can't detect such audio or ground waves very easily but it's [easy -flr?] for OSCOR who can sniff the air with sophisticated microphones, and can monitor ground waves using a custom-tailored sound-conducting device (which [your agency -flr?] must manufacture yourself.)
How can OSCOR recognize a firearm being used underground and from 50 meters away? OSCOR has the capability to store events, then to monitor its environment for any such stored event -- within a [spectrum of probability. - flr?] Prior to placing OSCOR in the field, law enforcement [replicates -flr] expected conditions by recording within OSCOR audio envelopes containing sample audio signatures of a series of different firearms and ammunition being expended at different distances and depths below ground in the law enforcement agencies' own facilities.
Those tests are retained by OSCOR and, when deployed to the field, can be constantly compared against incident events.
One can specify a degree of probability so that OSCOR will ignore anything it might otherwise consider to be a firearm discharge if, for instance, it decides there's less than an 80% chance of what it heard being a firearm (and for our fictional compound, a vehicle backfire on the highway could be filtered out by OSCOR.) [I believe at least one word is entirely missing in this sentence -flr] Electronic devices that perform this type of work can come with triangulation hardware and/or software, either standard or as an option. Triangulating the point of fire and the point of impact gives an accurate indication of the firing range's length and, after time, possibly the range's width and likely number of firing positions.
[Text is garbaged here -flr] [If -flr?] you can hear acoustical incidents of firearm discharge, record, analyze, and report events, there's quite a bit you can learn about the firearms being used, the facility they're being used in, the types of ammunition being used, and the types [of -flr] fire arms being used. Analysis of frequency of use coupled with other intelligence information can give an idea about the quality of opposition law enforcement might expect if they were called in to rescue a hostage.
In addition to OSCOR's audio-frequency capability, the radio spectrum is also covered. Designed as counter-surveillance equipment, I think the capabilities of the hardware and software broaden the designation to include covert surveillance with a little ingenuity. Since the frequency sweep capabilities can locate, identify, classify, and report on everything [that's -flr] transmitting within a wide radio spectrum, routine visits to the compound would yield a list of frequencies and transmission types being used at the compound.
Law enforcement agencies doubtlessly monitor and record every transmission coming out of the offices of an organized crime ring, with or without a lawful subpoena to do so. That's just the way things are done when combating organized crime and domestic terrorism in America where drugs are the prevalent monetary medium. Law enforcement also routinely place covert transmitters of their own within organized crime and enclaves of domestic terrorists -- with or without subpoenas granting them the legal power to do so.
With inexpensive yet sophisticated electronic counter- surveillance hardware like OSCOR, the average citizen can acquire a list of transmitters within our hypothetical compound -- those used by the criminals and those placed covertly by law enforcement -- and thus know where to tune their radio scanners to listen in on organized crime -- assuming the transmissions aren't encrypted, of course. And the possibilities for utilizing information acquired covertly by monitoring organized crime are endless.
[More garbaged text then it ends -flr]
---
Send information concerning incidents of racketeering and
terrorism by the Scientology cult to the Domestic Terrorism
Task Force at norfolk@fbi.gov http://www.skeptictank.org/
Scientology's L. Ron Hubbard: http://www.RonTheNut.ORG/
PGP Key: http://www.skeptictank.org/frice.pgp