SIX COMMON WAYS AN
EAVESDROPPER
WILL TRY AND FOOL
A COUNTERMEASURES SWEEP
By Ralph Thomas


You are looking At A Reading Of A Snuggled Bug
WARNING: SNUGGLED BUG!

 

THROWDOWNS
A throwndown is a planted bug the eavesdropper wants you to find. It's placed so it's generally easy to find, you'll call the job a success and declare the premises clean leaving the real bug in place.

FREQUENCY HOPPERS
Frequency hoppers are bugs that change frequency with a reciever in tune with the changing bug. You'll get a spike that will quickly disappear before you have time to test it. What for them! Generally, the only way to spot them is with a good Spectrum Analyser.

SNUGGLING
Snuggled bugs are bugs that are tuned very close to a radio station. Again, becuase of bleed, cheap bug detectors will miss them.

BURST BUG
A burst bug is a bug that stores audio in memory and then sends is out all at once in small bursts. Again, cheap bug detectors are liekly to miss it.


CURRIER CURRENT
An older method but still releavant, currier current uses existing wiring to send audio which is then picked up somewhere else.

IR CARRIER
Infra-red bugs use invisable light beams to transmit audio.

 



OTHER RELATED ARTICLES

DEFINING COUNTERMEASURES THREAT LEVEL AND ANALYSIS
New Opportunities Exist In Information Security But Require Higher Level
Of Knowledge, Equipment Investment And Selection And Know-How
By Ralph D. Thomas

ARE YOU BUGGED?
An Article On Bugging And Wiretapping And What To Do About It!
By Electronic Experts
 
THE BOOMING COUNTERMEASURES FIELD: By Ralph Thomas
How To Add Lucrative Countermeasures To Your Investigative Service

FAQ: COUNTER-INTELLIGENCE APPLICATIONS
Doctor Robert Ing, D. Sc., F.A.P.Sc.

SPREAD SPECTRUM MICROWAVE BUGGING DEVISES
FOR COUNTERMEASURES PROFESSIONALS

By James Atkinson, Granite Island Group
 
HOW TO PLUG UP AND INVESTIGATE INFORMATION LEAKS
By CJ Bronstrup And The Gator Gazette

BYPASSING PASSWORDS
By CJ Bronstrup And The Gator Gazette
 
FAX EAVESDROPPING
Technical Data On Monitoring Of Faxes
 
HOW TO OBTAIN PRETTY GOOD PRIVACY WITH DIGITAL TEXT AND VOICE COMMUNICATION By Ralph Thomas
 
PGP: FREQUENTLY ASKED QUESTIONS
By Andre Bacard, Author of "Computer Privacy Handbook"
[FAQ Version April 28, 1995]
 
BUSINESS LOSS PREVENTION TECHNIQUES
By D. J. (Skip) Lamoureaux, President
 
 
LASER EAVESDROPPING SYSTEMS
What They Are- How they work. By Insight Technologies
 
PGP FOR PRIVACY By Joseph Seanor
Nation's Top Cyber Detective Reveals Privacy Techniques

OTHER RELATED PAGES

CHECK OUT THE EXTENSIVE SELECTION OF
COUNTERMEASURES TESTING GEAR


GO THE THE COUNTERNMEASURES RESOURCE CENTER

GO TO BOOKS ON CONDUCTING COUNTERMEASURES.

HAND PICKED COUNTERMEASURES GEAR REVIEWS

New State-Of-The-Art Gear For High Info Security
OSCOR: THE OMNI SPECTRAL CORRELATOR


Step-Up To The Choice Of Professionals!
THE CPM-700 COUNTERMEASURES PROBE


Wide And Extensive Testing Options!
THE CMS COUNTERMEASURES KIT


Packs More Options In One Box Than Anything On The Market!
THE ADVANCED COUNTERMEASURES SYSTEM


Our Best Seller-True Value For The Money
THE CSR-1 HIGH END COUNTERMEASURES KIT