ELECTRONIC SURVEILLANCE MANUALS
FOR LAW ENFORCEMENT
BENCH-TESTED CIRCUITS FOR SURVEILLANCE AND
COUNTERSURVEILLANCE TECHNICIANS
by Tom Larsen
Author Tom Larsen makes his living as a countersurveillance technician,
and he has bench-tested
every one of his designs. Not only do they actually do what they are supposed
to, these ingenious
circuits -- many never before published -- are simple, inexpensive and fun.
Get the low-down on a
hookswitch bypass that turns a telephone into a standing microphone while
on the hook, using only a
resistor capacitor and a jumper wire. Need a circuit that will stop most
spousal phone tapping? It's in
here too. So are some simple radio-control circuits, unique surreptitious
entry alarms, field-tested
firefly flasher (tailing device) circuits that can only be seen with night-vision
equipment, a carrier
current transmitter detection circuit that will detect all modulation forms,
including digital and much more. For academic study only. 5 1/2 x 8 1/2, softcover,
photos, illus., 128 pp. $20.00 [Order This Book]
BOOK II -- HOW TO GET ANYTHING ON ANYBODY
The Encyclopedia of Personal Surveillance
by Lee Lapin
This long-awaited follow-up to the best-selling original volume takes you
through a gold mine of
never-before-published tricks and techniques of intelligence collection
culled from the FBI, CIA,
engineers, computer hackers, PIs, dedicated researchers and others. You'll
learn how to read
computer screens from a distance, look or listen through solid walls, dig
out unlisted phone numbers,
bypass computer passwords and assemble a complete dossier on anyone from
the comfort of your
own living room. Plus, get the very latest on police intelligence kits,
state-of-the-art electronic gear,
spy conventions, surveillance schools and much more! Includes more than
200 suppliers of exotic
electronic equipment. 8 1/2 x 11, softcover, photos, illus., 232 pp. $35.00 [Order This Book]
CIA CATALOG OF CLANDESTINE WEAPONS, TOOLS, AND
GADGETS
by John Minnery
Basic to the CIA agent's mission is the ever-present threat of discovery
and apprehension. In such an
emergency, he must have a tool, weapon or gadget with which to evade arrest
or effect an escape. CIA developed an intriguing collection of specialized
devices designed to go undetected by airport scanners as well as pass the
careful scrutiny of enemy searches. Now, the author of the infamous How to
Kill series provides an exclusive inside look at a sampling of actual CIA
Escape and Evasion devices. The information contained herein is considered
so classified that CIA adamantly denies the very existence of some of these
clandestine guns, saws, knives, daggers and chemical weapons. 5 1/2 x 8 1/2,
softcover, photos, illus., 128 pp. $14.95 [Order This Book]
CIA FLAPS AND SEALS MANUAL
A must . . . the companion piece to Locks, Picks, and Clicks. Many of the
techniques taught
here were used by CIA and FBI personnel to effect surreptitious openings
of mail during the past three
decades. Chapters include Dry Openings, Wet Openings, Steam Openings, Re-Sealing,
Traps and
much more. This exposé will be invaluable in determining whether
your mail has been tampered with
or opened. 5 1/2 x 8 1/2, softcover, illus., 56 pp. $10.00 [Order This Book]
COVERT SURVEILLANCE AND ELECTRONIC PENETRATION
by William B. Moran
Here's info on spying and wiretapping that the layman can easily understand
and that professional
investigators and police will learn from. Don't be fooled by the length
of this book -- it has more data
than books much longer! Shadowing and tailing, eavesdropping techniques
and equipment,
wiretapping, night surveillance gar, telephone bugging and more. Learn how
"they" do it. 8 1/2 x 11, softcover, illus., 136 pp. $12.95 [Order This Book]
DEA CLASSIFIED INTELLIGENCE REPORTS
Inside Secrets of the Smuggling Trade
Nowhere else can you find this information, an authentic behind-the-scenes
look at the real world of
drug smuggling and the government's efforts to stop it. Scores of photos
detail seized contraband and
the often ingenious methods that did not escape the vigilance of narcotics
agents. 8 1/2 x 11,
Hackers, crackers, passwords, data encryption, Van Eck monitoring, theft
prevention -- here is the
very latest on these and other aspects of modern computer security vital
to any serious business or
security organization. This information-packed book asks: Do you need data
encryption? How secure
are encryption programs? Which program is right for you? How well does Van
Eck technology really work? Do you need outside professional help? Plus, it
presents no-holds-barred discussions of current security programs, alarms
and locks, gadgets and gimmicks, hackers and passwords, E-mail and the law,
portable computers and much more. 8 1/2 x 11, softcover, illus., 130 pp. $20.95 [Order This Book]
DON'T BUG ME
The Latest High-Tech Spy Methods
by M.L. Shannon
There are some people and institutions who don't respect your right to privacy
-- and they don't want
you to have the information in this book.
Don't Bug Me shows you how to protect yourself from electronic eavesdropping
and from the
surveillance and countersurveillance experts who prey on uninformed citizens.
This comprehensive
study discusses every kind of spying device, from inexpensive transmitters
often hidden in potted
plants, lamps and stereos to supersophisticated systems favored by governments
or big business. It
includes the latest technology that allows the watchers to spy on you from
your TV, VCR, computer,
cellular phone, baby monitor and other seemingly innocuous devices. 8 1/2
x 11, softcover, photos,
Let Lee Lapin fill you in on the most up-to-date equipment and techniques
for protecting yourself from
electronic surveillance. An engineering text written in layman's language,
it is a hands-on look at
threat assessment and covert equipment discovery, including room and telephone
weak points, bypass
techniques, tap installation points, RF detectors, spec analyzers, time
domain detectors and more.
Find out how to use available equipment to discover and defeat office, home
and telephone
surveillance. Designed for the serious investigator, technical countermeasures
person or anyone
seriously concerned with privacy, this report will tell those with a basic
understanding of electronic
countermeasures how to conduct on-site placements. 8 1/2 x 11, softcover,
photos, illus., 40 pp. $22.95 [Order This Book]
HANDS-ON ELECTRONIC SURVEILLANCE
by Lee Lapin
This report is the next-best thing to a private consultation with surveillance
specialist Lee Lapin. Not
only is it an exact blueprint of the latest equipment and techniques for
specific surveillance
applications, it presents cutting-edge electronic surveillance techniques
as taught to police technicians,
government agencies and the best private-sector electronic spies. You'll
get the latest on design and
placement of audio surveillance systems, plus transmitters, receivers and
integrated systems. You'll
also learn about system engineering and design, including placement of mics
and hardwiring,
placement of prefabricated transmitter-receiver systems, correct use of
body wires and setup of
listening posts. Also includes equipment tests and instructions for maximizing
any
intelligence-gathering operation. 8 1/2 x 11, softcover, photos, illus.,
30 pp. $22.95 [Order This Book]HOW TO AVOID ELECTRONIC EAVESDROPPING AND PRIVACY
INVASION
Bugging -- how it is done and how to combat this invasion of your privacy
-- is explored in this
informative handbook. Learn how to detect homing devices, have a free check
of your phone line,
prevent the placement of a bug or tap and thwart the listener. 5 1/2 x 8
1/2, softcover, photos, illus.,
How to Get Anything on Anybody tells how to get any information you want
about whomever
you want -- and how they (including the government) are getting to your
private info. You won't
believe the possibilities! This book covers 11 devices for listening through
walls, expert ways to
secretly bug any target, how polygraphs can be tricked, getting a 50-state
credit/license search and
much more! 8 1/2 x 11, softcover, illus., 272 pp. $30.00 [Order This Book]THE LAYMAN'S GUIDE TO ELECTRONIC EAVESDROPPING
How It's Done and Simple Ways to Prevent It
by Tom Larsen
Many people don't know that all types of phones can be tapped in dozens
of ways at very little cost or
that there are many other devices that can be used to invade a personÕs
privacy, including pinhole lens video cameras, room bugs, tracking devices
and many other tools that are readily available and require little or no know-how
to use.
This book shows you all the ways nosy neighbors, angry spouses, private
investigators and even the
government can get the goods on you through electronic means and, more importantly,
the simple
steps you can take to keep them in the dark. 5 1/2 x 8 1/2, softcover, photos,
112 pp. $17.00 [Order This Book]
RUNNING A RING OF SPIES
Spycraft and Black Operations in the Real World of Espionage
by Jefferson Mack
Thanks to Jefferson Mack, a career spy master, you can now use all the tricks
of the world's best
spies to get the goods on the other guys -- and keep them from doing it
to you. Whether you need to
find out who has been stealing your company's marketing strategy or what
your ex-spouse is up to,
this practical hands-on manual explains it in clear, easy-to-follow steps.
Brace yourself for a wild ride through the treacherous world of spying,
where you'll learn how to
recruit, train, handle and terminate a spy for whatever purposes you see
fit; set up a security apparatus
to detect and catch spies working for the other side; tap into private and
corporate computers to find
out what the other side has on you; and much, much more. 5 1/2 x 8 1/2,
softcover, 216 pp. $20.00 [Order This Book]
SATELLITE SURVEILLANCE
by Harold Hough
Once the exclusive tool of governments, satellite technology is now available
to anybody. Satellite
Surveillance will show you where to buy satellite images, how to enhance
and interpret them and
how to hide from the "eye in the sky." Exploring for oil and gold,
investing in commodities, assessing
for taxes, mapping, building and zoning are some of the areas that can be
explored creatively via
satellite photos. Get ahead of the others by getting into the 21st century.
5 1/2 x 8 1/2, softcover,
Radio scanner enthusiasts listen to cellular and cordless phones, police
and military transmissions,
industrial security lines and other supposedly private communication just
as casually as we overhear
conversations in an elevator. This wry, cynical and immensely entertaining
book describes the scanner
world, the people in it, the equipment they use and how they acquire and
tune in to the "secret"
frequencies. Top radio clubs and experts have hailed this book as "absolutely
the best" and "an
indispensable tool." 5 1/2 x 8 1/2, softcover, photos, illus., 320
pp. $19.95 [Order This Book]
SOE SECRET OPERATIONS MANUAL
This rare document, never before released to the public, is the original
manual used to train special
agents dropped behind enemy lines in Nazi-occupied Europe during World War
II. Used by the
British Special Operations Executive (SOE) and its American counterpart,
the Office of Strategic
Services (OSS), it is an authentic, word-for-word reproduction obtained
from a former operative with
the clandestine services. It includes sections on ciphers, propaganda, selection
of targets, methods of
attack, passive resistance, the liaison agent, interrogation and more. The
forerunner of all U.S.
government guides to sabotage, propaganda, interrogation, burglary and other
dirty tricks, the SOE
Secret Operations Manual is of extraordinary historical significance and
makes for riveting
reading. 5 1/2 x 8 1/2, softcover, illus., 272 pp. $20.00 [Order This Book]
SPOOK BOOK II
A Strange and Dangerous Look at Forbidden Technology
by Mick Tyner
Taking up where the classic first book (now out of print) left off, Spook
Book II delves into the
how-to-do-it world of spy gear and spookdom. Loads of schematics, illustrations
and photos provide
all the detail you'll need to understand an interesting array of powerful
mics, superquiet amps, tiny
recorders, "laser listeners," fiber-optic bugs and other spy toys
that are dangerously simple to build
and use. Because of the sensitive nature of this material, this book is
offered for academic study only., 8 1/2 x 11, softcover, photos, illus., 216
pp. $34.95 [Order This Book]
THE SPY'S WORKSHOP
America's Clandestine Weapons
by Don McLean
The Spy's Workshop reveals the most fascinating but least known aspect of
the modern spy: his
legendary black bag of secret tricks. The development of modern American
spy hardware began in
World War II, when an elite corps of scientists created a special arsenal
for America's pioneer spy
agency, the OSS. This heavily illustrated volume details the men and the
ingenious weapons they
devised -- AUNT JEMIMA (a high-explosive mixture camouflaged as common flour),
ZEPHYR (a
silencer for outboard motors used in covert landing operations) and more.
8 1/2 x 11, softcover, 92
Covert Communication Techniques of the Underground
by Lawrence W. Myers
Mercenaries, spies, drug smugglers, fugitives and terrorists all operate
within the subterranean society
of the "underground." SPYCOMM is a fascinating look at how these
groups exchange information
secretly in this hostile environment. Learn how CIA trains its agents in
clandestine communications.
Read the actual KGB instructions for covert document photography. Study
how criminals, terrorist
groups and rogue CIA agents steal long-distance phone service. A much needed
knowledge book for information security professionals and countermeasures
services. For information purposes only. 5 1/2 x 8 1/2, softcover, illus.,
256 pp. $19.95 [Order This Book]
SPYGAME
Winning through Super Technology
by Scott French and Lee Lapin
With SpyGame, you can see in the dark -- build your own starlight scope
or IR viewer, make your
own bulletproof vest, access hidden data banks to research anyone and anything,
change IDs at will,
construct three different weapons systems from a cheap commercial rifle
and much more! 8 1/2 x 11,
A Serious Guide to Detecting, Evading, and Eluding Threats to Personal
Privacy
by ACM IV Security Services
Privacy is a rare commodity in today's world; anyone can breach your personal
security with nothing
more than a computer and modem. Some will take this a step further, launching
sophisticated
surveillance efforts to obtain incriminating information not available through
the usual channels. The
threat of surveillance is everpresent, and accepting this is paramount to
the preservation of personal
security. Your only defense is to conduct surveillance countermeasures,
but first you must understand how surveillants operate. This book provides
a systematic approach to detecting and evading surveillance, including time-tested
tactics of observation, detection and evasion that are proven effective against
the most sophisticated surveillance techniques used anywhere in the world.
5 1/2 x 8 1/2, softcover, illus., 192 pp. $20.00 [Order This Book]
TUNE IN ON TELEPHONE CALLS
A Guide to Intercepting Cellphone, Cordless & Other Phone Calls
on Scanners & Shortwave Receivers
by Tom Kneitel
Few people have even the foggiest notion that "private" telephone
conversations over cordless phones, car phones and many other modern telecommunications
devices are openly broadcasted over the airwaves, where they can be easily
overheard by anybody with a shortwave receiver or inexpensive police-type
scanner. It takes no technical expertise or complex gear to tune in on these
calls, and this revised third edition of Tom Kneitel's classic book tells
you exactly how to do it. Includes frequencies, channels and tips for listening
in on cordless and car phones; calls made from planes, trains and ships; military,
satellite and VIP traffic; and more. 5 1/2 x 8 1/2, softcover, photos, illus.,
160 pp. $16.95 [Order This Book]
THE WHOLE SPY CATALOG
by Lee Lapin
The Whole Spy Catalog shows you exactly how to hire an ex-KGB agent, order
a photo of
anyplace on earth anytime during the last 20 years, utilize your fax to
get an instant background check
on anyone, find the person whom you can ask anything about anything for
free, get a CIA
scholarship, purchase and install the latest electronic surveillance gear
and much more. Some of the
secrets you will learn include the lock pick that works from 100 feet away,
the $5 phone call that
locates 90 percent of the population, the free on-line source to access
the five miles of stacks at the
Library of Congress, an easy way to turn a $45 recorder into a powerful
room monitor, what the FBI
is up to at its new top-secret facility, and plenty more tricks of the trade,
"inside" phone numbers,
ordering info and cutting-edge techniques. 8 1/2 x 11, softcover, photos,
illus., 448 pp. $44.95 [Order This Book]
WIRETAPPING AND ELECTRONIC SURVEILLANCE
Here are exact, unedited sections of a report written by government experts
on wiretapping and
electronic surveillance. The nuts and bolts of eavesdropping and bugging
are presented in this in-depth book. Wireless microphone transmitters, listen-backs
and keep-alives, tracking systems, audio security countermeasures, miniature
and microwave devices, radio-eavesdropping-device detection and more are covered.
Great training aid for countermeasures and information security professionals.7
3/4 x 10 1/4, softcover, illus., 104 pp. $12.95 [Order This Book]