440315
9781581600650
IntroductionWho''s (Bugging) Who?What''s New?How Much Spying Is Going On?StatisticsQuiet VictimsSurveillance and the LawFCC LawWhat, Me? Worry?Stories: Self-DefenseReality Check: Surveillance TV StyleChapter 1 -Species of BugsRemote ControlRemote MicrophoneCrystal ControlledVariable FrequencyThe Burst TransmitterRepeatersMicrowaveThe Ultimate Bug?Modulation TypesFrequency ModulationAmplitude ModulationSingle SidebandDigital Spread SpectrumBugs in DisguiseWhere to Get TransmittersWeasel Willie and the Black MarketThe InternetWireless MicrophonesSpace-Age Hearing AidsImprovised Look, Ma-No HandsTwo-way Radios as Bugs: Not!Tone Squelch and OffsetThe Cellular BugA Better WayThe Old But in the Battery TrickNo Disassembly RequiredAnother WayRoll Your OwnAn "Underground" Book from PaladinMr. WilsonMr. ArringtonThe ARRLDetermining the FrequencySubspace Interference and Air PolutionChapter 2 -How Far Will It Transmit?Maximum Effective RangePowerRepeaters and Blimp HangarsFrequencyChapter 3 -Antennas in GeneralResonanceTypes of AntennasThe Ground PlaneThe Dipole or Folded DipoleThe LongwireBeamsERPChapter 4 -Electronics 105-Ohm''s LawVolts, Amps, Ohms, and WattsChapter 5 -The Secret Lives of BatteriesBatteries Getting WiredThe Un-BatteryThe Sun BatteryChapter 6 -Room Audio or Phone Line?Room AudioUsing a Transmitter on a Phone LineChapter 7 -Legal Applications for TransmittersA Secret Radio SystemA Burglar AlarmThe Phone GuardA Perimeter AlarmAn Emergency Signaling SystemChapter 8 -How to Install a BugThe Perfect SituationRecon-Case the JointVisualizeDiversionary TacticsLet George Do ItLength of ServiceMore IdeasIn BetweenPowerAntennasProbability of DiscoveryLocation of the Listening PostWhat Type of Transmitter to UseRecovering the TransmitterKnow and Trust Your EquipmentChapter 9 -ReceiversCommercial FM Radios and StereosModifying FM ReceiversTailor MadeUsing a ScannerCommunications ReceiversHigh-Frequency ReceiversChapter 10 -An Exercise in SurveillanceRecon RevisitedOn the FarmMore ReconThe Listening PostThe TransmitterMister MurphyHomeworkAccessThe Listening PostEquipmentStories: Did the Devil Make Them Do It?Chapter 11 -The Phone Book RevisitedStories: Am I Tapped?ThoughtsDialog with Ma BellFantasiesSo, What Happened Already?Do Try This at HomePhone Phreaking Terms and TricksSo, What Is a Phreaker?Where Does a Newbie Start?Is Phreaking, or Anything Related to It, Legal?How Do I Find My Local Central Office?What Is the Inside/Out Cable Plant?What is the Layout of the Cable Plant?What Is a Switch?What Is a Loop?What Is a AMA?What Is POTS?What Is a PBX?What is a DISA Port and What Is It for?What is SS7?What is a Trunk?What is an Extender?What is an Internal Office?What is a LATA?What Are Inter-LATA Carriers?Where Can I Get a List of Inter-LATA Carriers?What Is NANPA?What Is Remote Observation?What Is COSMOS?What Is a Red Box?Do They Really Work?Is This Legal?What Is a COCOT?What Is a Coin Signaling?What Is Ground Detect?What Is Scanning?What Are These Programs?Does the Telco Have a Way of Catching Me If I Use a Wardialer?How Do I Avoid Getting Caught?What Is Trashing?Is Trashing Illegal?What Is ANI?What Is ANI II?What Is Real-Time ANI?What''s a "Dark Call"?What Is ONI?What Is ANAC?What Are Some ANAC Numbers?What Are Test Numbers?What Are Some Common Test Numbers and Their Uses?What Is CAN?Area CodesWhat Are Test Prefixes?Are There Unpublished (Secret) Exchanges?How Do I Find Unpublished (Secret) Exchanges?Uh, OK, Now What?Sources of InformationUsenetWeb SitesPeriodicalsChapter 12 -CountermeasuresHas Thee Bugged Thyself?The Strange Case of the Bugged BabiesThe But in Your PocketThe SoftwareThe RadioPut It All TogetherAnd Then Along Came (Uncle) SamHow To Defeat These SystemsHas Thy Neighbor Bugged Thee?Using a Bug DetectorMister WhiddenThe Optoelectronics XplorerMister KaiserComputer-Aided ScanningThe ComputerThe RadioThe InterfaceCAS SoftwareThe Physical SearchThe GridFinding Phone TransmittersWhat If I Find a Bug?Secret Lives RevisitedTransient BugsDefensive MeasuresChapter 13 -Surveillance in GeneralLasersData EncryptionAttack MethodsLibrariesAcceptanceTempest & CompanyThe Spy in the KeyboardVideo SurveillanceOther Surveillance MethodsThe Final WordAppendix A Some Classic BooksAppendix B Glossary of TermsAppendix C Places To Get ThingsAppendix D Frequencies Used in SurveillanceAppendix E A Physical Search ChecklistIndexShannon, M. L. is the author of 'Bug Book Everything You Ever Wanted to Know About Electronic Eavesdropping...but Were Afraid to Ask' with ISBN 9781581600650 and ISBN 1581600658.
[read more]