Bug Book : Everything You Ever Wanted to Know about Electronic Eavesdropping...but Were Afraid to Ask

Paperback
from $0.00

Author: M.L. Shannon

ISBN-10: 1581600658

ISBN-13: 9781581600650

Category: Electronics - General & Miscellaneous

What would you do if you thought you were being bugged? How would you defend yourself? How would you even know about it? If you've pondered these questions, and especially if you haven't, you need to read this book. It was written to tell you, the average Joe, everything there is to know about tiny hidden transmitters that can broadcast your personal and business conversations to spies, government agents . . . even the next-door neighbors. Find out how these devices work, how effective they...

Search in google:

What would you do if you thought you were being bugged? How would you defend yourself? How would you even know about it? If you've pondered these questions, and especially if you haven't, you need to read this book. It was written to tell you, the average Joe, everything there is to know about tiny hidden transmitters that can broadcast your personal and business conversations to spies, government agents . . . even the next-door neighbors. Find out how these devices work, how effective they are, how to find them and deal with them and how to use this technology in your own self-defense if necessary. Includes scores of ideas and resources for protecting the privacy of landline, cellular and cordless telephones, as well as pagers, fax machines and computers, plus phone phreaking terms and tricks and, as one reviewer put it, true tales of the Biz that "will spook you . . . and a few that will make you laugh."

Introduction Who's (Bugging) Who? What's New? How Much Spying Is Going On? Statistics Quiet Victims Surveillance and the Law FCC Law What, Me? Worry? Stories: Self-Defense Reality Check: Surveillance TV Style Chapter 1 - Species of Bugs Remote Control Remote Microphone Crystal Controlled Variable Frequency The Burst Transmitter Repeaters Microwave The Ultimate Bug? Modulation Types Frequency Modulation Amplitude Modulation Single Sideband Digital Spread Spectrum Bugs in Disguise Where to Get Transmitters Weasel Willie and the Black Market The Internet Wireless Microphones Space-Age Hearing Aids Improvised Look, Ma-No Hands Two-way Radios as Bugs: Not! Tone Squelch and Offset The Cellular Bug A Better Way The Old But in the Battery Trick No Disassembly Required Another Way Roll Your Own An "Underground" Book from Paladin Mr. Wilson Mr. Arrington The ARRL Determining the Frequency Subspace Interference and Air Polution Chapter 2 - How Far Will It Transmit? Maximum Effective Range Power Repeaters and Blimp Hangars Frequency Chapter 3 - Antennas in General Resonance Types of Antennas The Ground Plane The Dipole or Folded Dipole The Longwire Beams ERP Chapter 4 - Electronics 105-Ohm's Law Volts, Amps, Ohms, and Watts Chapter 5 - The Secret Lives of Batteries Batteries Getting Wired The Un-Battery The Sun Battery Chapter 6 - Room Audio or Phone Line? Room Audio Using a Transmitter on a Phone Line Chapter 7 - Legal Applications for Transmitters A Secret Radio System A Burglar Alarm The Phone Guard A Perimeter Alarm An Emergency Signaling System Chapter 8 - How to Install a Bug The Perfect Situation Recon-Case the Joint Visualize Diversionary Tactics Let George Do It Length of Service More Ideas In Between Power Antennas Probability of Discovery Location of the Listening Post What Type of Transmitter to Use Recovering the Transmitter Know and Trust Your Equipment Chapter 9 - Receivers Commercial FM Radios and Stereos Modifying FM Receivers Tailor Made Using a Scanner Communications Receivers High-Frequency Receivers Chapter 10 - An Exercise in Surveillance Recon Revisited On the Farm More Recon The Listening Post The Transmitter Mister Murphy Homework Access The Listening Post Equipment Stories: Did the Devil Make Them Do It? Chapter 11 - The Phone Book Revisited Stories: Am I Tapped? Thoughts Dialog with Ma Bell Fantasies So, What Happened Already? Do Try This at Home Phone Phreaking Terms and Tricks So, What Is a Phreaker? Where Does a Newbie Start? Is Phreaking, or Anything Related to It, Legal? How Do I Find My Local Central Office? What Is the Inside/Out Cable Plant? What is the Layout of the Cable Plant? What Is a Switch? What Is a Loop? What Is a AMA? What Is POTS? What Is a PBX? What is a DISA Port and What Is It for? What is SS7? What is a Trunk? What is an Extender? What is an Internal Office? What is a LATA? What Are Inter-LATA Carriers? Where Can I Get a List of Inter-LATA Carriers? What Is NANPA? What Is Remote Observation? What Is COSMOS? What Is a Red Box? Do They Really Work? Is This Legal? What Is a COCOT? What Is a Coin Signaling? What Is Ground Detect? What Is Scanning? What Are These Programs? Does the Telco Have a Way of Catching Me If I Use a Wardialer? How Do I Avoid Getting Caught? What Is Trashing? Is Trashing Illegal? What Is ANI? What Is ANI II? What Is Real-Time ANI? What's a "Dark Call"? What Is ONI? What Is ANAC? What Are Some ANAC Numbers? What Are Test Numbers? What Are Some Common Test Numbers and Their Uses? What Is CAN? Area Codes What Are Test Prefixes? Are There Unpublished (Secret) Exchanges? How Do I Find Unpublished (Secret) Exchanges? Uh, OK, Now What? Sources of Information Usenet Web Sites Periodicals Chapter 12 - Countermeasures Has Thee Bugged Thyself? The Strange Case of the Bugged Babies The But in Your Pocket The Software The Radio Put It All Together And Then Along Came (Uncle) Sam How To Defeat These Systems Has Thy Neighbor Bugged Thee? Using a Bug Detector Mister Whidden The Optoelectronics Xplorer Mister Kaiser Computer-Aided Scanning The Computer The Radio The Interface CAS Software The Physical Search The Grid Finding Phone Transmitters What If I Find a Bug? Secret Lives Revisited Transient Bugs Defensive Measures Chapter 13 - Surveillance in General Lasers Data Encryption Attack Methods Libraries Acceptance Tempest & Company The Spy in the Keyboard Video Surveillance Other Surveillance Methods The Final Word Appendix A Some Classic Books Appendix B Glossary of Terms Appendix C Places To Get Things Appendix D Frequencies Used in Surveillance Appendix E A Physical Search Checklist Index