Oops! Looks like we're having trouble connecting to our server.
Refresh your browser window to try again.
About this product
Product Identifiers
PublisherPaladin Press
ISBN-100873646584
ISBN-139780873646581
eBay Product ID (ePID)891013
Product Key Features
Book TitleDon't Bug Me : the Latest High-Tech Spy Methods
Number of Pages152 Pages
LanguageEnglish
Publication Year1992
TopicIntelligence & Espionage, Espionage
IllustratorYes
GenrePolitical Science, True Crime
AuthorMichel L. Shannon
FormatTrade Paperback
Dimensions
Item Weight15.1 Oz
Item Length11 in
Item Width8.5 in
Additional Product Features
Intended AudienceTrade
Table Of ContentIntroductionSurveillance and EthicsA Speculative History of EavesdroppingYour Right to KnowThe Truth About CountersurveillanceWhy Me?The Laws That Concern SurveillanceSurveillance and Privacy in the PresentPart I Inside DevicesMicrophonesContactThe TubeThe Radio SpectrumRF TransmittersRemote ControlThe RepeaterThe Burst TransmitterMicrowaveLow FrequencyInfrared TransmittersVisible Light TransmittersWireless IntercomsPart II Telephone SurveillanceAn OverviewDirect Listening WiretapsRemote Listening WiretapsTypes of RF Phone BugsLine-PoweredThe Drop-InSeries and ParallelThe Infinity TransmitterSubcarrier ExtensionsDown-Line TapsREMOBS EavesdroppingCordless PhonesCellular PhonesAnswering MachinesVoice MailboxesSatellite and Microwave ListeningPhone TricksSecure Phone CommunicationsPart III Finding Bugs and WiretapsAn OverviewConducting a Physical SearchWhat Does a Bug Look LikeBatteriesAntennasCovering the Sound of a SearchThe Electronic Search: Types of Equipment AvailableThe Bug DetectorMicrowave DetectorsUltrasonic Sound GeneratorsTape-Recorder DetectorsUsing a ScannerThe HunterThe Scan-LockThe Spectrum AnalyzerNonlinear Junction DetectorsThe Frequency CounterPart IV Outside DevicesParabolic Reflectors and Shotgun MicrophonesMicrowave Listening DevicesFinding Microwave DevicesLasers: How They WorkFinding LasersDefeating LasersPart V Computer EavesdroppingTempest and the Van Eck TechnologyDefeating Van EckSecuring MethodsData EncryptionThe Pak-Rat ExperimentElectronic TypewritersPart VI Video Optical SurveillanceEquipment AvailableDefeating Video SurveillanceTwo-Way Television?Part VII Other Surveillance MethodsRain, Sleet, and Gloom of NightSticky FingersBumper Beepers, Lojack, and Cats1984Part VIII Preventing SurveillanceSecuring the Area: A Prisoner in Your Own Home?Old SparkyThe RF Room GuardPhone GuardsTrojan HorsesLook AroundPart IX Obtaining Surveillance EquipmentMake It YourselfWhere to Buy ItUring Surveillance DevicesThe Listening PostPart X Using Intercepted InformationSurveillance and Privacy in the FuturePart XI AppendicesAppendix A: The Story of a BuggingAppendix B: EquipmentAppendix C: List of SuppliersAppendix D Frequency ListAppendix E: Frequency Allocation TableAppendix F: How Cellular Radios WorkAppendix G: Modifying ScannersAppendix H: The Cellular Phone NAM LayoutAppendix I: GlossaryAppendix J: Suggested Reading
SynopsisThis comprehensive study of spying devices shows you how to stop others from tapping into your privacy and violating your right to be left alone. It covers everything from inexpensive transmitters hidden in potted plants to the latest high-tech supersystems favored by governments and businesses.