Smart browsing tip – If you arrived at this page from a search engine, click here to go to the Spy & CounterSpy home page, which gives you full access to all the free features at our site.

Archive of
News Releases

Updated:  September 2nd, 1998
News releases archived:  8


The following news release was distributed September 2, 1998 by fax and email to 282 news media organizations and journalists in the USA, Canada, and UK.
News Release
For Immediate Release
FBI "wheel artists" exposed.
     VICTORIA BC, CANADA – September 2, 1998 – Between 250 and 400 people a day are receiving countersurvellance training from a free Web site in California that bills itself as spy school for the rest of us.
     Since February, a spy watcher in Canada has been using the Internet to expose the methods used by the FBI to suppress protest and dissent in the USA. The current focus is on FBI vehicle surveillance teams.
     "They call them wheel artists," says Lee Adams. "But that's just spy-talk for a surveillance agent in a vehicle."
     "They don't follow you – they surround you," he says. "They become part of your environment. You never see the same vehicle twice. Up to twenty FBI agents at any one time. Even more if the investigation involves national security."
     According to Adams, the FBI trains its agents in the use of the floating-box system of vehicle surveillance.
     "The surveillance team creates a box of vehicles around you," he says. "The box floats with you as you travel along your route. Hence the name floating-box."
     Adams is using his Web site at http://www.spycounterspy.com to expose the tactics and diversions that FBI agents use to avoid detection by the people they're watching.
     A typical FBI vehicle surveillance unit is composed of sedans, coupes, stationwagons, pickup trucks, vans, minivans, sport utility vehicles, taxis, motorcycles, commercial trucks, ambulances – even 18-wheelers, according to Adams.
     "They'll even put a surveillance vehicle on the road ahead of you," he says.
     "When the vehicle that is watching you is in front of you, they call it a cheating surveillance vehicle. They fool a lot of people with that one."
     Adams says he has no plans to discontinue publishing his disclosures at his Web site at http://www.spycounterspy.com


The following news release was distributed June 12, 1998 by fax and email to 121 news media organizations and journalists in the USA, Canada, and UK.
News Release
For Immediate Release
FBI reads encrypted email.
     VICTORIA BC, CANADA – June 12, 1998 – A spy watcher in Canada says FBI surveillance teams routinely crack encrypted email.
     "PGP is a good example," says Lee Adams. "It's a first-rate encryption program – but most people aren't using it correctly, mainly because they don't understand how the FBI operates."
     "FBI methods are based on two classic strategies. Some methods rely on the FBI's ability to get inside your home or office undetected. Other methods involve electronic equipment that can detect at a distance what's happening on your computer."
     "Most people don't even realize they've been compromised," says Adams. "They continue to send email they think is confidential."
     Adams is using his web site at http://www.spycounterspy.com to expose the different methods used by FBI surveillance teams.
     "We explain ten methods," says Adams. "Six of those methods involve surreptitious entry by the FBI. That's spy-talk for break-and-enter. Most people have a difficult time accepting that a surveillance team can get inside undetected – not just once, but many times."
     "The FBI often needs to make repeated entries in order to pick through all your stuff," says Adams. "They've developed some fascinating methods for getting in – and we're finding that people are more serious about their privacy once they find out what the FBI has been up to."
     The web site provides step-by-step instructions on how to prevent an FBI surveillance team from reading your confidential email.
     "The first step is purely defensive," says Adams. "But once you've made it difficult for them to crack your email, you can go on the offensive. It's possible to use bogus email to detect the presence of a surveillance team you didn't realize was there. This method works against FBI and BATF teams. It's particularly effective against standard police surveillance."
     Adams says he has no plans to discontinue publishing his disclosures at his Web site at http://www.spycounterspy.com


The following news release was distributed May 11-12, 1998 by fax and email to more than 100 news media organizations and journalists in the USA, Canada, and UK.
News Release
For Immediate Release
Spy watcher exposes Bureaucrats' Toolkit.
Methods for political control over the American people.
     VICTORIA BC, CANADA – May 11, 1998 – A spy watcher in Canada continues to be a thorn in the side of the FBI by using the Internet to reveal suppressed information.
     Lee Adams warns that government has recently been provided with the opportunity – and the means – to permanently wrest control from the population.
     "We face three separate threats," he says. "Together these combine to give government a stranglehold on civil liberties – a death grip on traditional freedoms."
     Threat #1 – Computers have taken over surveillance. Entire populations can be supervised and monitored automatically. Dataveillance makes it easy for government to track certain classes of people – like minorities or dissidents– or anyone who dares think for themselves. Databases and CCTV video cameras are to blame.
     Threat #2 – The militarization of the police. The cops are now using some very nasty weapons. Half the stuff they use is prohibited by the Geneva Convention and the Hague Declaration. The government can't use it in war, but their own population is fair game – for CS and OC gas sprays, beanbag projectiles, new mark-free interrogation tools, and handgun ammunition that can amputate your arm or leg.
     Threat #3 – Proliferation by private companies. Most of these high-tech gadgets are dual-use. There's no regulation or control over research, manufacture, export, and deployment of this nightmarish technology. The surveillance cameras in Tiananmen Square were exported from the USA as advanced traffic control – but they enabled China's dreaded Guoanbu security service to round up all the "troublemakers". Private companies are reaping huge profits in the newly-emerging police-industrial complex.
     "These three conditions are being used by bureaucrats as a new technology for political control over people – not only in the USA, but worldwide," he says. "This information comes direct from a report commissioned by the European Parliament."
     Adams says he has no plans to discontinue publishing his disclosures at his Web site at http://www.SPYCOUNTERSPY.com


The following news release was distributed April 1, 1998 by fax and email to 63 news media organizations and journalists in the USA, Canada, and UK.
News Release
For Immediate Release
Spy watcher continues to taunt FBI.
Internet site teaches activists to resist surveillance.
     VICTORIA BC, CANADA – April 1, 1998 – A spy watcher in Canada continues to taunt the FBI by using the Internet to spread previously-secret information about countersurveillance to activists and dissident groups across the USA.
     Lee Adams warns that any group questioning the status quo should consider forming a countersurveillance section.
     "No matter how benign your goals you are considered a threat. Ipso facto you become a target for surveillance," says Adams. "The FBI uses surveillance for observation, infiltration, sabotage, and intimidation. Any one of these can stop your group reaching its goals."
     "You need to learn to set up cells in your organization and make it resistant to infiltration by the FBI. Their agent-provocateurs can seduce you into reckless behavior. Their informants can ruin your operations."
     "You need to learn to ensure the FBI can't arrest you on conspiracy charges," says Adams. "Conspiracy is the most common grounds for arrest when surveillance is involved."
     "You need to learn a system of tactical communication. This means things like spoken conversations, facial expressions, gestures, and mannerisms that can be used to keep your communication private – even when under hostile surveillance. The world's top intelligence agencies are already using this system. Of course, the FBI doesn't want you to know about it."
     Adams says his Web site is like spy school for the rest of us. "The only other people who could teach you this stuff are the spooks themselves. But they can't," says Adams. "They get prison sentences – or worse – for talking."
     Adams says he has no plans to discontinue publishing his countersurveillance disclosures at his Web site at http://www.SPYCOUNTERSPY.com


The following news release was distributed March 25, 1998 by fax and email to 57 news media organizations and journalists in the USA, Canada, and UK.
News Release
For Immediate Release
Internet site teaches victims of
FBI surveillance to cloak their actions.

     VICTORIA BC, CANADA – March 25, 1998 – A spy watcher in Canada is using the Internet to provide countersurveillance skills to activists and dissidents in the USA.
     "Our mission is to level the playing field by providing information to supporters of freedom, democracy, and fairness," says spy watcher Lee Adams.
     "The FBI is more than a police agency," he says. "It is a security service. There are important differences between police agencies and security services."
     "Every government has a security service. The mission of a security service is to suppress anti-government activity. The prime directive of a government is to stay in power. Most governments see their own population as a threat."
     "The nastier the government, the nastier the security service," says Adams. "The FBI does not have a history of respect for civil rights in its role as a security service. The FBI protects the government from the people. The people have no such protection against the government."
     Adams warns that any group questioning the status quo should consider forming a countersurveillance section. "No matter how benign your goals, you are considered a threat," he says. "You become a target for surveillance."
     "A security service like the FBI uses surveillance for observation, infiltration, sabotage, and intimidation. Any one of these can stop your group reaching its goals."
     "You can learn to detect surveillance teams," says Adams. "Even more important, you can learn to cloak your actions and carry on undetected even while you're under hostile surveillance."
     Adams says he has no plans to discontinue publishing his countersurveillance disclosures at his Web site at http://www.SPYCOUNTERSPY.com


The following news release was distributed March 7, 1998 by fax and email to 50 news media organizations and journalists in the USA, Canada, and UK.
News Release
For Immediate Release
Spy watcher reveals how to beat FBI surveillance.
Activist, militia, civil rights, other groups on mailing list.

     VICTORIA BC, CANADA -- March 7, 1998 -- A spy watcher in Canada is using the Internet to reveal the operating methods of FBI surveillance teams. Lee Adams says he is breaking no laws by telling what he learned by watching agents who were watching him.
     "The FBI utilizes a triple-threat scheme of multi-layered teams, same-day response, and managed aggression," says Adams.
     He claims that FBI surveillance strategy is built on military prinicples of space, time, and force.
     "The FBI has been at this game for many years. They've learned many lessons," says Adams. "Their surveillance strategy has meant ruin for many people who thought they could outfox the FBI."
     "Threat #1 -- FBI multi-layered surveillance teams play a classic scam. They lure you into thinking surveillance has ended. But they're still nearby, waiting for you to do something incriminating."
     "Threat #2 -- Same-day response anywhere in North America means surveillance might begin before you're ready. The FBI may end up watching you trying to hide the very material that you're hoping to conceal from them."
     "Threat #3 -- The FBI's strategy of managed aggression in surveillance operations can provoke you into losing your temper or your nerve -- or both. It's a wicked mind-game. That's why they use it."
     According to Adams, anyone can learn countersurveillance skills that make it difficult for the FBI to build a legitimate case against them.
     "Perhaps even more important, they can make it difficult for the FBI to build a phony case against them," he says.
     Adams says he has no plans to discontinue publishing his disclosures at his Web site at http://www.SPYCOUNTERSPY.com


The following news release was distributed February 17-18, 1998 by fax and email to 64 news media organizations and journalists in the USA, Canada, and UK.
News Release
For Immediate Release
Hacker divulges secrets of world's spy agencies.
CIA, FBI ops and foreign policy affected.

     VICTORIA BC, CANADA – February 18, 1998 – A spy watcher in Canada is using the Internet to reveal the operating methods of the world's spy agencies. Lee Adams says he is breaking no laws by telling what he learned by watching the spies who were watching him.
     "I'm just a hacker," admits Adams. "But I don't hack computer systems, I hack surveillance operations. I go after intelligence agencies and undercover cops."
     Adams first came to the attention of the US intelligence community eight years ago during a routine vetting by a defense research facility to renew his clearance. Using skills he had learned while writing computer programming books for McGraw-Hill, he became adept at spotting the spies. When he took his concerns to the authorities, he was rebuffed – but the surveillance intensified.
     Adams claims he found himself in the role of crash-test dummy as the spies attempted to upgrade their tradecraft. But while they were watching him, he was watching them.
     "They were inadvertently showing me their best stuff," claims Adams. "So I provoked other groups into watching me. I wanted to learn as much as I could."
     Adams claims that the United States has fallen 20 years behind the methods being used by other nations.
     "Nowhere is this more evident than Iraq. The CIA has no productive agents inside the country. Iraqi counterintelligence has neutralized them all," claims Adams. "US spy satellites and electronic eavesdropping can't find hidden weapons. To do that you need infiltration by human agents. And the US doesn't have any. That's why random bombing is the only option left."
     "While the US was spending billions on high-tech surveillance gadgets, other countries were developing low-cost, low-tech solutions," says Adams. "These other groups now have a 20-year lead in humint, which is spytalk for human skills in surveillance and intelligence work."
     Adams says he has no plans to discontinue publishing his disclosures at his Web site located at http://www.SPYCOUNTERSPY.com


The following news release was distributed February 11th, 1998 by fax and email to 59 news media organizations and journalists in the USA, Canada, and UK.
News Release
For Immediate Release
Spy watcher threatens to expose surveillance operations of FBI, CIA, and others on February 14th
     VICTORIA BC, CANADA – February 11, 1998 – A spy watcher in Canada is threatening to use the Internet to expose dozens of active surveillance operations across the United States on February 14th. His action puts in jeopardy a number of operations in U.S. cities by the FBI, ATF, DEA, and local law enforcement agencies. Operations by the CIA outside the U.S. may also be affected.
     Lee Adams says he will publish a simple three-step method that anyone can use to recognize surveillance teams operating in public locations.
     Adams claims exposure of surveillance teams is inevitable because the U.S. has fallen twenty years behind the methods being used in other nations. He says the situation is a result of tunnel vision of U.S. bureaucrats and politicians.
     "The United States spent the last two decades throwing billions of dollars at high-tech surveillance gadgets. During that same period, however, others have been developing low-cost, low-tech solutions," says Adams. "These other groups, not all of them friendly, now have a twenty-year lead in humint, which is spytalk for human skills in surveillance and intelligence work."
     Adams says he will publish his three-step detection method at his Web site at www.SPYCOUNTERSPY.com two days prior to February 14th, in order to give authorities time to protect their most sensitive surveillance operations.
     "If they leave those surveillance teams in place, they will be detected by anyone who chooses to try this simple three-step method," warns Adams. "The Web site says it all. How to catch your first spy this weekend."


Back to Home Page

Here is the small print.  It appears here because we have found that maintaining a corporate front is the only way we can protect ourselves against interference by governments and their agencies.  The legal underpinnings of our corporate front are our first line of defense against audit-attacks and other methods of economic warfare that the authorities use to suppress dissent, protest, and activism.  They are also determined to prove their hypothesis that Spy & CounterSpy is funded by a foreign intelligence agency or terrorist group – but our double entry accounting record of corporate revenue and expenses is our shield against fabricated evidence by an overzealous investigator or case officer.
Contents Copyright ©1998 Lee Adams Seminars.  All rights reserved.  Provided for entertainment and information purposes only.  Spy & CounterSpy and Spy school for the rest of us and How To Make People Say Yes! are trade-marks in USA, Canada, and/or other countries.  Lee Adams Seminars is a division of Here's-how, Right-now! Seminars Inc.
OFFICE:  3273 Tennyson Avenue, Victoria, British Columbia, Canada.
MAIL:  PO Box 8026, Victoria BC, CANADA V8W 3R7.
TELEPHONE:  (250) 475-1450.
FAX:  (250) 475-1460.
EMAIL: [email protected]
EMAIL ENCRYPTION:  Return to main page. Click on Ask Agent X for public key.