Bug Book : Everything You Ever Wanted to Know about Electronic Eavesdropping...but Were Afraid to Ask / Edition 1

Bug Book : Everything You Ever Wanted to Know about Electronic Eavesdropping...but Were Afraid to Ask / Edition 1

by M.L. Shannon
ISBN-10:
1581600658
ISBN-13:
9781581600650
Pub. Date:
03/01/2000
Publisher:
Paladin Press
ISBN-10:
1581600658
ISBN-13:
9781581600650
Pub. Date:
03/01/2000
Publisher:
Paladin Press
Bug Book : Everything You Ever Wanted to Know about Electronic Eavesdropping...but Were Afraid to Ask / Edition 1

Bug Book : Everything You Ever Wanted to Know about Electronic Eavesdropping...but Were Afraid to Ask / Edition 1

by M.L. Shannon

Paperback

$27.55
Current price is , Original price is $38.0. You
$27.55  $38.00 Save 27% Current price is $27.55, Original price is $38. You Save 27%.
  • SHIP THIS ITEM
    Temporarily Out of Stock Online
  • PICK UP IN STORE

    Your local store may have stock of this item.


Overview

What would you do if you thought you were being bugged? How would you defend yourself? How would you even know about it? If you've pondered these questions, and especially if you haven't, you need to read this book. It was written to tell you, the average Joe, everything there is to know about tiny hidden transmitters that can broadcast your personal and business conversations to spies, government agents . . . even the next-door neighbors. Find out how these devices work, how effective they are, how to find them and deal with them and how to use this technology in your own self-defense if necessary. Includes scores of ideas and resources for protecting the privacy of landline, cellular and cordless telephones, as well as pagers, fax machines and computers, plus phone phreaking terms and tricks and, as one reviewer put it, true tales of the Biz that "will spook you . . . and a few that will make you laugh."


Product Details

ISBN-13: 9781581600650
Publisher: Paladin Press
Publication date: 03/01/2000
Pages: 168
Product dimensions: 8.50(w) x 11.00(h) x (d)

About the Author

M.L. Shannon's lifelong interest in communications led him to work as a technician for a company that made surveillance and countermeasures gear as well as for a professional countermeasures company. He is well versed on privacy issues.

Table of Contents

Introduction
Who's (Bugging) Who?
What's New?
How Much Spying Is Going On?
Statistics
Quiet Victims
Surveillance and the Law
FCC Law
What, Me? Worry?
Stories: Self-Defense
Reality Check: Surveillance TV Style
Chapter 1 -
Species of Bugs
Remote Control
Remote Microphone
Crystal Controlled
Variable Frequency
The Burst Transmitter
Repeaters
Microwave
The Ultimate Bug?
Modulation Types
Frequency Modulation
Amplitude Modulation
Single Sideband
Digital Spread Spectrum
Bugs in Disguise
Where to Get Transmitters
Weasel Willie and the Black Market
The Internet
Wireless Microphones
Space-Age Hearing Aids
Improvised Look, Ma-No Hands
Two-way Radios as Bugs: Not!
Tone Squelch and Offset
The Cellular Bug
A Better Way
The Old But in the Battery Trick
No Disassembly Required
Another Way
Roll Your Own
An "Underground" Book from Paladin
Mr. Wilson
Mr. Arrington
The ARRL
Determining the Frequency
Subspace Interference and Air Polution
Chapter 2 -
How Far Will It Transmit?
Maximum Effective Range
Power
Repeaters and Blimp Hangars
Frequency
Chapter 3 -
Antennas in General
Resonance
Types of Antennas
The Ground Plane
The Dipole or Folded Dipole
The Longwire
Beams
ERP
Chapter 4 -
Electronics 105-Ohm's Law
Volts, Amps, Ohms, and Watts
Chapter 5 -
The Secret Lives of Batteries
Batteries Getting Wired
The Un-Battery
The Sun Battery
Chapter 6 -
Room Audio or Phone Line?
Room Audio
Using a Transmitter on a Phone Line
Chapter 7 -
Legal Applications for Transmitters
A Secret Radio System
A Burglar Alarm
The Phone Guard
A Perimeter Alarm
An Emergency Signaling System
Chapter 8 -
How to Install a Bug
The Perfect Situation
Recon-Case the Joint
Visualize
Diversionary Tactics
Let George Do It
Length of Service
More Ideas
In Between
Power
Antennas
Probability of Discovery
Location of the Listening Post
What Type of Transmitter to Use
Recovering the Transmitter
Know and Trust Your Equipment
Chapter 9 -
Receivers
Commercial FM Radios and Stereos
Modifying FM Receivers
Tailor Made
Using a Scanner
Communications Receivers
High-Frequency Receivers
Chapter 10 -
An Exercise in Surveillance
Recon Revisited
On the Farm
More Recon
The Listening Post
The Transmitter
Mister Murphy
Homework
Access
The Listening Post
Equipment
Stories: Did the Devil Make Them Do It?
Chapter 11 -
The Phone Book Revisited
Stories: Am I Tapped?
Thoughts
Dialog with Ma Bell
Fantasies
So, What Happened Already?
Do Try This at Home
Phone Phreaking Terms and Tricks
So, What Is a Phreaker?
Where Does a Newbie Start?
Is Phreaking, or Anything Related to It, Legal?
How Do I Find My Local Central Office?
What Is the Inside/Out Cable Plant?
What is the Layout of the Cable Plant?
What Is a Switch?
What Is a Loop?
What Is a AMA?
What Is POTS?
What Is a PBX?
What is a DISA Port and What Is It for?
What is SS7?
What is a Trunk?
What is an Extender?
What is an Internal Office?
What is a LATA?
What Are Inter-LATA Carriers?
Where Can I Get a List of Inter-LATA Carriers?
What Is NANPA?
What Is Remote Observation?
What Is COSMOS?
What Is a Red Box?
Do They Really Work?
Is This Legal?
What Is a COCOT?
What Is a Coin Signaling?
What Is Ground Detect?
What Is Scanning?
What Are These Programs?
Does the Telco Have a Way of Catching Me If I Use a Wardialer?
How Do I Avoid Getting Caught?
What Is Trashing?
Is Trashing Illegal?
What Is ANI?
What Is ANI II?
What Is Real-Time ANI?
What's a "Dark Call"?
What Is ONI?
What Is ANAC?
What Are Some ANAC Numbers?
What Are Test Numbers?
What Are Some Common Test Numbers and Their Uses?
What Is CAN?
Area Codes
What Are Test Prefixes?
Are There Unpublished (Secret) Exchanges?
How Do I Find Unpublished (Secret) Exchanges?
Uh, OK, Now What?
Sources of Information
Usenet
Web Sites
Periodicals
Chapter 12 -
Countermeasures
Has Thee Bugged Thyself?
The Strange Case of the Bugged Babies
The But in Your Pocket
The Software
The Radio
Put It All Together
And Then Along Came (Uncle) Sam
How To Defeat These Systems
Has Thy Neighbor Bugged Thee?
Using a Bug Detector
Mister Whidden
The Optoelectronics Xplorer
Mister Kaiser
Computer-Aided Scanning
The Computer
The Radio
The Interface
CAS Software
The Physical Search
The Grid
Finding Phone Transmitters
What If I Find a Bug?
Secret Lives Revisited
Transient Bugs
Defensive Measures
Chapter 13 -
Surveillance in General
Lasers
Data Encryption
Attack Methods
Libraries
Acceptance
Tempest & Company
The Spy in the Keyboard
Video Surveillance
Other Surveillance Methods

The Final Word
Appendix A Some Classic Books
Appendix B Glossary of Terms
Appendix C Places To Get Things
Appendix D Frequencies Used in Surveillance
Appendix E A Physical Search Checklist
Index
From the B&N Reads Blog

Customer Reviews