BN.com Gift Guide

Bug Book : Everything You Ever Wanted to Know about Electronic Eavesdropping...but Were Afraid to Ask / Edition 1

Paperback (Print)
Buy New
Buy New from BN.com
$25.15
Used and New from Other Sellers
Used and New from Other Sellers
from $7.64
Usually ships in 1-2 business days
(Save 78%)
Other sellers (Paperback)
  • All (11) from $7.64   
  • New (3) from $28.43   
  • Used (8) from $7.64   

Overview


What would you do if you thought you were being bugged? How would you defend yourself? How would you even know about it? If you've pondered these questions, and especially if you haven't, you need to read this book. It was written to tell you, the average Joe, everything there is to know about tiny hidden transmitters that can broadcast your personal and business conversations to spies, government agents . . . even the next-door neighbors. Find out how these devices work, how effective they are, how to find them and deal with them and how to use this technology in your own self-defense if necessary. Includes scores of ideas and resources for protecting the privacy of landline, cellular and cordless telephones, as well as pagers, fax machines and computers, plus phone phreaking terms and tricks and, as one reviewer put it, true tales of the Biz that "will spook you . . . and a few that will make you laugh."
Read More Show Less

Product Details

  • ISBN-13: 9781581600650
  • Publisher: Paladin Press
  • Publication date: 3/1/2000
  • Edition number: 1
  • Pages: 168
  • Sales rank: 800,656
  • Product dimensions: 8.48 (w) x 10.96 (h) x 0.41 (d)

Meet the Author


M.L. Shannon's lifelong interest in communications led him to work as a technician for a company that made surveillance and countermeasures gear as well as for a professional countermeasures company. He is well versed on privacy issues.
Read More Show Less

Table of Contents

Introduction
Who's (Bugging) Who?
What's New?
How Much Spying Is Going On?
Statistics
Quiet Victims
Surveillance and the Law
FCC Law
What, Me? Worry?
Stories: Self-Defense
Reality Check: Surveillance TV Style
Chapter 1 -
Species of Bugs
Remote Control
Remote Microphone
Crystal Controlled
Variable Frequency
The Burst Transmitter
Repeaters
Microwave
The Ultimate Bug?
Modulation Types
Frequency Modulation
Amplitude Modulation
Single Sideband
Digital Spread Spectrum
Bugs in Disguise
Where to Get Transmitters
Weasel Willie and the Black Market
The Internet
Wireless Microphones
Space-Age Hearing Aids
Improvised Look, Ma-No Hands
Two-way Radios as Bugs: Not!
Tone Squelch and Offset
The Cellular Bug
A Better Way
The Old But in the Battery Trick
No Disassembly Required
Another Way
Roll Your Own
An "Underground" Book from Paladin
Mr. Wilson
Mr. Arrington
The ARRL
Determining the Frequency
Subspace Interference and Air Polution
Chapter 2 -
How Far Will It Transmit?
Maximum Effective Range
Power
Repeaters and Blimp Hangars
Frequency
Chapter 3 -
Antennas in General
Resonance
Types of Antennas
The Ground Plane
The Dipole or Folded Dipole
The Longwire
Beams
ERP
Chapter 4 -
Electronics 105-Ohm's Law
Volts, Amps, Ohms, and Watts
Chapter 5 -
The Secret Lives of Batteries
Batteries Getting Wired
The Un-Battery
The Sun Battery
Chapter 6 -
Room Audio or Phone Line?
Room Audio
Using a Transmitter on a Phone Line
Chapter 7 -
Legal Applications for Transmitters
A Secret Radio System
A Burglar Alarm
The Phone Guard
A Perimeter Alarm
An Emergency Signaling System
Chapter 8 -
How to Install a Bug
The Perfect Situation
Recon-Case the Joint
Visualize
Diversionary Tactics
Let George Do It
Length of Service
More Ideas
In Between
Power
Antennas
Probability of Discovery
Location of the Listening Post
What Type of Transmitter to Use
Recovering the Transmitter
Know and Trust Your Equipment
Chapter 9 -
Receivers
Commercial FM Radios and Stereos
Modifying FM Receivers
Tailor Made
Using a Scanner
Communications Receivers
High-Frequency Receivers
Chapter 10 -
An Exercise in Surveillance
Recon Revisited
On the Farm
More Recon
The Listening Post
The Transmitter
Mister Murphy
Homework
Access
The Listening Post
Equipment
Stories: Did the Devil Make Them Do It?
Chapter 11 -
The Phone Book Revisited
Stories: Am I Tapped?
Thoughts
Dialog with Ma Bell
Fantasies
So, What Happened Already?
Do Try This at Home
Phone Phreaking Terms and Tricks
So, What Is a Phreaker?
Where Does a Newbie Start?
Is Phreaking, or Anything Related to It, Legal?
How Do I Find My Local Central Office?
What Is the Inside/Out Cable Plant?
What is the Layout of the Cable Plant?
What Is a Switch?
What Is a Loop?
What Is a AMA?
What Is POTS?
What Is a PBX?
What is a DISA Port and What Is It for?
What is SS7?
What is a Trunk?
What is an Extender?
What is an Internal Office?
What is a LATA?
What Are Inter-LATA Carriers?
Where Can I Get a List of Inter-LATA Carriers?
What Is NANPA?
What Is Remote Observation?
What Is COSMOS?
What Is a Red Box?
Do They Really Work?
Is This Legal?
What Is a COCOT?
What Is a Coin Signaling?
What Is Ground Detect?
What Is Scanning?
What Are These Programs?
Does the Telco Have a Way of Catching Me If I Use a Wardialer?
How Do I Avoid Getting Caught?
What Is Trashing?
Is Trashing Illegal?
What Is ANI?
What Is ANI II?
What Is Real-Time ANI?
What's a "Dark Call"?
What Is ONI?
What Is ANAC?
What Are Some ANAC Numbers?
What Are Test Numbers?
What Are Some Common Test Numbers and Their Uses?
What Is CAN?
Area Codes
What Are Test Prefixes?
Are There Unpublished (Secret) Exchanges?
How Do I Find Unpublished (Secret) Exchanges?
Uh, OK, Now What?
Sources of Information
Usenet
Web Sites
Periodicals
Chapter 12 -
Countermeasures
Has Thee Bugged Thyself?
The Strange Case of the Bugged Babies
The But in Your Pocket
The Software
The Radio
Put It All Together
And Then Along Came (Uncle) Sam
How To Defeat These Systems
Has Thy Neighbor Bugged Thee?
Using a Bug Detector
Mister Whidden
The Optoelectronics Xplorer
Mister Kaiser
Computer-Aided Scanning
The Computer
The Radio
The Interface
CAS Software
The Physical Search
The Grid
Finding Phone Transmitters
What If I Find a Bug?
Secret Lives Revisited
Transient Bugs
Defensive Measures
Chapter 13 -
Surveillance in General
Lasers
Data Encryption
Attack Methods
Libraries
Acceptance
Tempest & Company
The Spy in the Keyboard
Video Surveillance
Other Surveillance Methods

The Final Word
Appendix A Some Classic Books
Appendix B Glossary of Terms
Appendix C Places To Get Things
Appendix D Frequencies Used in Surveillance
Appendix E A Physical Search Checklist
Index
Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)