655017
9780873646581
Out of Stock
The item you're looking for is currently unavailable.
IntroductionSurveillance and EthicsA Speculative History of EavesdroppingYour Right to KnowThe Truth About CountersurveillanceWhy Me?The Laws That Concern SurveillanceSurveillance and Privacy in the PresentPart I Inside DevicesMicrophonesContactThe TubeThe Radio SpectrumRF TransmittersRemote ControlThe RepeaterThe Burst TransmitterMicrowaveLow FrequencyInfrared TransmittersVisible Light TransmittersWireless IntercomsPart II Telephone SurveillanceAn OverviewDirect Listening WiretapsRemote Listening WiretapsTypes of RF Phone BugsLine-PoweredThe Drop-InSeries and ParallelThe Infinity TransmitterSubcarrier ExtensionsDown-Line TapsREMOBS EavesdroppingCordless PhonesCellular PhonesAnswering MachinesVoice MailboxesSatellite and Microwave ListeningPhone TricksSecure Phone CommunicationsPart III Finding Bugs and WiretapsAn OverviewConducting a Physical SearchWhat Does a Bug Look LikeBatteriesAntennasCovering the Sound of a SearchThe Electronic Search: Types of Equipment AvailableThe Bug DetectorMicrowave DetectorsUltrasonic Sound GeneratorsTape-Recorder DetectorsUsing a ScannerThe HunterThe Scan-LockThe Spectrum AnalyzerNonlinear Junction DetectorsThe Frequency CounterPart IV Outside DevicesParabolic Reflectors and Shotgun MicrophonesMicrowave Listening DevicesFinding Microwave DevicesLasers: How They WorkFinding LasersDefeating LasersPart V Computer EavesdroppingTempest and the Van Eck TechnologyDefeating Van EckSecuring MethodsData EncryptionThe Pak-Rat ExperimentElectronic TypewritersPart VI Video Optical SurveillanceEquipment AvailableDefeating Video SurveillanceTwo-Way Television?Part VII Other Surveillance MethodsRain, Sleet, and Gloom of NightSticky FingersBumper Beepers, Lojack, and Cats1984Part VIII Preventing SurveillanceSecuring the Area: A Prisoner in Your Own Home?Old SparkyThe RF Room GuardPhone GuardsTrojan HorsesLook AroundPart IX Obtaining Surveillance EquipmentMake It YourselfWhere to Buy ItUring Surveillance DevicesThe Listening PostPart X Using Intercepted InformationSurveillance and Privacy in the FuturePart XI AppendicesAppendix A: The Story of a BuggingAppendix B: EquipmentAppendix C: List of SuppliersAppendix D Frequency ListAppendix E: Frequency Allocation TableAppendix F: How Cellular Radios WorkAppendix G: Modifying ScannersAppendix H: The Cellular Phone NAM LayoutAppendix I: GlossaryAppendix J: Suggested ReadingShannon, Michel L. is the author of 'Don't Bug Me The Latest High-Tech Spy Methods' with ISBN 9780873646581 and ISBN 0873646584.
[read more]