Table of Contents
Foreword xiii
Preface xv
Acknowledgments xxi
Introduction 1
How Likely Is It That Someone Is Listening to Your Phone Calls? 3
What About Law Enforcement? 4
The Technology 9
Analog vs. Digital 10
A History of Cell Phones 13
Secure Cordless Phones: Shopping Tips 14
Pre-bugged Cell Phones 19
How Do They Get Away with This? 23
Spyphone Protection Essentials 24
Cell Phones as Bugs 25
ZombiePhone: The No. 1 Cell Phone Eavesdropping Trick 27
What Can You Do About a ZombiePhone? 29
GSM Micro-Bugs 31
What Is Cell Phone Spyware? 37
How Do Cell Phones Become Infected? 39
Spyware Prevention Checklist 40
Apps Against Taps 43
Spyware Detection: The Murray Method™ 47
Your Phone Is Infected: The 19 Warning Signs 49
The SpyWarn Mobile™ Transmission Detector 51
How SpyWarn Mobile™ Works 52
The SpyWarn Mobile™ Test 53
Yes, Your Phone Is Bugged-What Now? 67
Checklist: How to Deter Future Spyware Problems 68
Bonus for you 70
Spyware Scams, Misleading Notions & "Experts" 73
Beware of Spyware Scams 74
Spyware Detection Software 76
Spyware "Experts" 78
Spyware and Anti-Spyware 79
Cordless Phones and Other Wireless Devices 85
Equipment Recommendations 87
Good Communications Practices 87
Bluetooth® Eavesdropping 89
Bluetooth Security Mechanisms 91
Bluetooth Vulnerabilities 91
Bluetooth Use in the Department of Defense 93
Bluetooth Security Recommendations & Precautions 93
Other Phone Privacy Invasions 97
Murray's Test for Leaks™ Protocol 101
The Four Steps 103
The End Result 107
Choosing a Secure Cell Phone 109
Checklist: Basic Security Considerations 110
Checklist: Security Questions 111
Going One Step Beyond Basic 112
Do-It-Yourself Forensics 115
Legal Issues 121
Privacy Law 121
Additional Legal Information 126
The Truth About Caller ID 129
Myth vs. Reality 129
Caller ID Facts 134
Unwanted Calls, Text Messages & E-mails 137
The Basics 137
Fee-Based Services 139
Conclusion 145
Survey No. 1 145
Survey No. 2 146
The Future 147
Additional Assistance 149
About the Author 151
SpyWarn Mobile™ Coupon 157