655017
9780873646581
IntroductionSurveillance and EthicsA Speculative History of EavesdroppingYour Right to KnowThe Truth About CountersurveillanceWhy Me?The Laws That Concern SurveillanceSurveillance and Privacy in the PresentPart I Inside DevicesMicrophonesContactThe TubeThe Radio SpectrumRF TransmittersRemote ControlThe RepeaterThe Burst TransmitterMicrowaveLow FrequencyInfrared TransmittersVisible Light TransmittersWireless IntercomsPart II Telephone SurveillanceAn OverviewDirect Listening WiretapsRemote Listening WiretapsTypes of RF Phone BugsLine-PoweredThe Drop-InSeries and ParallelThe Infinity TransmitterSubcarrier ExtensionsDown-Line TapsREMOBS EavesdroppingCordless PhonesCellular PhonesAnswering MachinesVoice MailboxesSatellite and Microwave ListeningPhone TricksSecure Phone CommunicationsPart III Finding Bugs and WiretapsAn OverviewConducting a Physical SearchWhat Does a Bug Look LikeBatteriesAntennasCovering the Sound of a SearchThe Electronic Search: Types of Equipment AvailableThe Bug DetectorMicrowave DetectorsUltrasonic Sound GeneratorsTape-Recorder DetectorsUsing a ScannerThe HunterThe Scan-LockThe Spectrum AnalyzerNonlinear Junction DetectorsThe Frequency CounterPart IV Outside DevicesParabolic Reflectors and Shotgun MicrophonesMicrowave Listening DevicesFinding Microwave DevicesLasers: How They WorkFinding LasersDefeating LasersPart V Computer EavesdroppingTempest and the Van Eck TechnologyDefeating Van EckSecuring MethodsData EncryptionThe Pak-Rat ExperimentElectronic TypewritersPart VI Video Optical SurveillanceEquipment AvailableDefeating Video SurveillanceTwo-Way Television?Part VII Other Surveillance MethodsRain, Sleet, and Gloom of NightSticky FingersBumper Beepers, Lojack, and Cats1984Part VIII Preventing SurveillanceSecuring the Area: A Prisoner in Your Own Home?Old SparkyThe RF Room GuardPhone GuardsTrojan HorsesLook AroundPart IX Obtaining Surveillance EquipmentMake It YourselfWhere to Buy ItUring Surveillance DevicesThe Listening PostPart X Using Intercepted InformationSurveillance and Privacy in the FuturePart XI AppendicesAppendix A: The Story of a BuggingAppendix B: EquipmentAppendix C: List of SuppliersAppendix D Frequency ListAppendix E: Frequency Allocation TableAppendix F: How Cellular Radios WorkAppendix G: Modifying ScannersAppendix H: The Cellular Phone NAM LayoutAppendix I: GlossaryAppendix J: Suggested ReadingShannon, Michel L. is the author of 'Don't Bug Me The Latest High-Tech Spy Methods' with ISBN 9780873646581 and ISBN 0873646584.
[read more]