Is My Cell Phone Bugged?: Everything You Need to Know to Keep Your Mobile Conversations Private

Hardcover
$13.17
BN.com price
(Save 26%)$17.95 List Price

Pick Up In Store

Reserve and pick up in 60 minutes at your local store

Other sellers (Hardcover)
  • All (12) from $2.35   
  • New (5) from $10.83   
  • Used (7) from $2.35   
Is My Cell Phone Bugged?: Everything You Need to Know to Keep Your Mobile Conversations Private

Available on NOOK devices and apps  
  • NOOK Devices
  • Samsung Galaxy Tab 4 NOOK
  • NOOK HD/HD+ Tablet
  • NOOK
  • NOOK Color
  • NOOK Tablet
  • Tablet/Phone
  • NOOK for Windows 8 Tablet
  • NOOK for iOS
  • NOOK for Android
  • NOOK Kids for iPad
  • PC/Mac
  • NOOK for Windows 8
  • NOOK for PC
  • NOOK for Mac
  • NOOK for Web

Want a NOOK? Explore Now

NOOK Book (eBook)
$8.49
BN.com price
(Save 15%)$9.99 List Price

Product Details

  • ISBN-13: 9781934572887
  • Publisher: Emerald Book Co.
  • Publication date: 6/1/2011
  • Pages: 158
  • Sales rank: 1,382,668
  • Product dimensions: 5.26 (w) x 8.31 (h) x 0.74 (d)

Meet the Author

Fight back. Regain your privacy and prevent future invasions with tips from a professional counterespionage consultant.

In an age when nearly everyone relies on wireless phone service, text messages, and email, tapping and electronic surveillance has become a common problem that demands personal protection.

In Is My Cell Phone Bugged?, eavesdropping detection specialist Kevin D. Murray draws from experience and detailed research to show you how to take control of your information security by using spybusting technology to your own advantage. In simple, clear-cut language, he explains the basics of counterespionage, including how to

- Shop for a secure cordless device and avoid pre-bugged cell phones
- Identify nineteen warning signs that a cell phone is spyware infected
- Find the best apps to prevent tapping and information leaks
- Protect oneself using a ''Spyware Prevention Checklist''
- Catch the spy when a phone is already under surveillance

Whether you're new to spybusting or a security expert, this comprehensive guide offers an array of information that will help you regain the privacy of your information and communications.

Read More Show Less

Table of Contents

Foreword xiii

Preface xv

Acknowledgments xxi

Introduction 1

How Likely Is It That Someone Is Listening to Your Phone Calls? 3

What About Law Enforcement? 4

The Technology 9

Analog vs. Digital 10

A History of Cell Phones 13

Secure Cordless Phones: Shopping Tips 14

Pre-bugged Cell Phones 19

How Do They Get Away with This? 23

Spyphone Protection Essentials 24

Cell Phones as Bugs 25

ZombiePhone: The No. 1 Cell Phone Eavesdropping Trick 27

What Can You Do About a ZombiePhone? 29

GSM Micro-Bugs 31

What Is Cell Phone Spyware? 37

How Do Cell Phones Become Infected? 39

Spyware Prevention Checklist 40

Apps Against Taps 43

Spyware Detection: The Murray Method™ 47

Your Phone Is Infected: The 19 Warning Signs 49

The SpyWarn Mobile™ Transmission Detector 51

How SpyWarn Mobile™ Works 52

The SpyWarn Mobile™ Test 53

Yes, Your Phone Is Bugged-What Now? 67

Checklist: How to Deter Future Spyware Problems 68

Bonus for you 70

Spyware Scams, Misleading Notions & "Experts" 73

Beware of Spyware Scams 74

Spyware Detection Software 76

Spyware "Experts" 78

Spyware and Anti-Spyware 79

Cordless Phones and Other Wireless Devices 85

Equipment Recommendations 87

Good Communications Practices 87

Bluetooth® Eavesdropping 89

Bluetooth Security Mechanisms 91

Bluetooth Vulnerabilities 91

Bluetooth Use in the Department of Defense 93

Bluetooth Security Recommendations & Precautions 93

Other Phone Privacy Invasions 97

Murray's Test for Leaks™ Protocol 101

The Four Steps 103

The End Result 107

Choosing a Secure Cell Phone 109

Checklist: Basic Security Considerations 110

Checklist: Security Questions 111

Going One Step Beyond Basic 112

Do-It-Yourself Forensics 115

Legal Issues 121

Privacy Law 121

Additional Legal Information 126

The Truth About Caller ID 129

Myth vs. Reality 129

Caller ID Facts 134

Unwanted Calls, Text Messages & E-mails 137

The Basics 137

Fee-Based Services 139

Conclusion 145

Survey No. 1 145

Survey No. 2 146

The Future 147

Additional Assistance 149

About the Author 151

SpyWarn Mobile™ Coupon 157

Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously
Sort by: Showing all of 5 Customer Reviews
  • Posted June 2, 2011

    The new "bible on the subject of cellphone privacy"

    "Is my cellphone bugged?" To answer that, a lot depends on who you are, how much money you have and how you live your life. To assure absolute cell phone privacy would require a lot of expense. This could entail the discipline and inconvenience of quality degrading voice encryption devices or the hassle of frequent changing of phone instruments and numbers using talk and toss phones (prepaid phones).

    A forensic analysis of your cellphone in a laboratory for spyware would cost several hundred dollars more than your phone and you'd lose the use of your phone for several days. Then there's the question of whether could you trust the people who you had contracted to do the testing.

    Corporate counterespionage consultant and electronic eavesdropping detection specialist, Kevin Murray, worked over a year to exhaustively deal with the subject of cellphone privacy and bugging. Included with the purchase is a nifty little device called a "SpyWarn Mobile" which allows you to perform basic self-testing. Also included is access to a private readers-only page at his homeage. Here he has placed a multitude of links which compliment the information in the book. A special stopwatch is also located there which is used in conjunction with the SpyWarn Mobile device during the spyware test.

    If you have any privacy concerns you can't afford not to own this book which I can only describe as the "bible on the subject". The knowledge contained herein is "priceless."

    1 out of 1 people found this review helpful.

    Was this review helpful? Yes  No   Report this review
  • Posted June 1, 2011

    Is My Cell Phone Bugged?

    We get this question all the time. In fact, in the past year we've seen three Blackberry's that were compromised with spyware.

    Murray's book is excellent. And for a few dollars (the cost of the book) he makes it easy for you to check your own cell phone. You can literally save hundreds of dollars by buying the book "Is My Cell Phone Bugged?"

    Another question we get is, "How do I know who has tapped my cell phone?" Kevin Murray has devised clever tests where you can tell who has compromised your cell phone.

    Skipp Porteous
    President, Sherlock Investigagtions, Inc.

    TSCM specialist

    1 out of 1 people found this review helpful.

    Was this review helpful? Yes  No   Report this review
  • Posted June 1, 2011

    A Must Have BEFORE You Get Your Next Cell Phone

    Another great tool to have in an arsenal to protect yourself from falling victim to privacy invasion or identity theft. This book fills a major information gap in today's connected world. Whereas lots of non-fiction guides help us protect the information stored on our personal computers, there has been little information offered in the way of protecting the same info on our phones - until now! Kevin D. Murray provides the basics using easy-to-grasp concepts and real-life examples that anybody can identify with. Anybody who feels their privacy may not be as secure as they'd like will find this book extremely valuable.

    1 out of 1 people found this review helpful.

    Was this review helpful? Yes  No   Report this review
  • Posted May 15, 2011

    Buy this book! If you want to learn the truth about cellular spying...,

    Kevin Murray's "Is My Cell Phone Bugged" book is a refreshing, honest behind the scenes look at the technology used to spy on cellular phones and smart phones. Kevin explains the technology in a no nonsense tone and separates fact from fiction regarding the varied technologies used to spy on your private conversations, while also providing the countermeasures used to thwart those threats. Required reading for the professional and layman alike. J.D. LeaSure, CEO, ComSec LLC

    1 out of 1 people found this review helpful.

    Was this review helpful? Yes  No   Report this review
  • Posted May 15, 2011

    Buy this book! If you want to learn the truth about cellular spying...,

    Kevin Murray's "Is My Cell Phone Bugged" book is a refreshing, honest behind the scenes look at the technology used to spy on cellular phones and smart phones. Kevin explains the technology in a no nonsense tone and separates fact from fiction regarding the varied technologies used to spy on your private conversations, while also providing the countermeasures used to thwart those threats. Required reading for the professional and layman alike. J.D. LeaSure, CEO, ComSec LLC

    1 out of 1 people found this review helpful.

    Was this review helpful? Yes  No   Report this review
Sort by: Showing all of 5 Customer Reviews

If you find inappropriate content, please report it to Barnes & Noble
Why is this product inappropriate?
Comments (optional)