SIX COMMON WAYS AN
EAVESDROPPER
WILL TRY AND FOOL
A COUNTERMEASURES SWEEP
By Ralph Thomas

You are looking At A Reading Of A Snuggled Bug
THROWDOWNS
A throwndown is a planted bug the eavesdropper wants you to find. It's placed
so it's generally easy to find, you'll call the job a success and declare
the premises clean leaving the real bug in place.
FREQUENCY HOPPERS
Frequency hoppers are bugs that change frequency with a reciever in tune
with the changing bug. You'll get a spike that will quickly disappear before
you have time to test it. What for them! Generally, the only way to spot
them is with a good Spectrum Analyser.
SNUGGLING
Snuggled bugs are bugs that are tuned very close to a radio station. Again,
becuase of bleed, cheap bug detectors will miss them.
BURST BUG
A burst bug is a bug that stores audio in memory and then sends is out all
at once in small bursts. Again, cheap bug detectors are liekly to miss it.
CURRIER CURRENT
An older method but still releavant, currier current uses existing wiring
to send audio which is then picked up somewhere else.
IR CARRIER
Infra-red bugs use invisable light beams to transmit audio.

OTHER RELATED ARTICLES
- DEFINING COUNTERMEASURES THREAT LEVEL AND
ANALYSIS
New Opportunities Exist In Information Security But Require Higher Level
Of Knowledge, Equipment Investment And Selection And Know-How
By Ralph D. Thomas
- ARE YOU BUGGED?
- An Article On Bugging And Wiretapping And What To Do About It!
- By Electronic Experts
-
- THE BOOMING COUNTERMEASURES FIELD: By Ralph
Thomas
How To Add Lucrative Countermeasures To Your Investigative Service
FAQ: COUNTER-INTELLIGENCE APPLICATIONS
Doctor Robert Ing, D. Sc., F.A.P.Sc.
SPREAD SPECTRUM MICROWAVE BUGGING DEVISES
FOR COUNTERMEASURES PROFESSIONALS
By James Atkinson, Granite Island Group
-
- HOW TO PLUG UP AND INVESTIGATE INFORMATION
LEAKS
By CJ Bronstrup And The Gator Gazette
BYPASSING PASSWORDS
By CJ Bronstrup And The Gator Gazette
-
- FAX EAVESDROPPING
Technical Data On Monitoring Of Faxes
-
- HOW TO OBTAIN PRETTY GOOD PRIVACY WITH
DIGITAL TEXT AND VOICE COMMUNICATION By Ralph Thomas
-
- PGP: FREQUENTLY ASKED QUESTIONS
By Andre Bacard, Author of "Computer Privacy Handbook"
[FAQ Version April 28, 1995]
-
- BUSINESS LOSS PREVENTION TECHNIQUES
By D. J. (Skip) Lamoureaux, President
-
-
- LASER EAVESDROPPING SYSTEMS
What They Are- How they work. By Insight Technologies
-
- PGP FOR PRIVACY By Joseph Seanor
Nation's Top Cyber Detective Reveals Privacy Techniques
OTHER RELATED PAGES
CHECK OUT THE EXTENSIVE SELECTION OF
COUNTERMEASURES TESTING GEAR
GO THE THE COUNTERNMEASURES RESOURCE CENTER
GO TO BOOKS ON CONDUCTING COUNTERMEASURES.
HAND PICKED COUNTERMEASURES GEAR REVIEWS
New State-Of-The-Art Gear For High Info Security
OSCOR: THE OMNI SPECTRAL CORRELATOR
Step-Up To The Choice Of Professionals!
THE CPM-700 COUNTERMEASURES PROBE
Wide And Extensive Testing Options!
THE CMS COUNTERMEASURES KIT
Packs More Options In One Box Than Anything
On The Market!
THE ADVANCED COUNTERMEASURES SYSTEM
Our Best Seller-True Value For The Money
THE CSR-1 HIGH END COUNTERMEASURES
KIT