Free-Reprint Article Written by: Jerry Tarrer 
See Terms of Reprint Below.


*****************************************************************
*
* This email is being delivered directly to members of the group:
* 
*    [email protected]
* 
*****************************************************************


We have moved our TERMS OF REPRINT to the end of the article.
Be certain to read our TERMS OF REPRINT and honor our TERMS 
OF REPRINT when you use this article. Thank you.

This article has been distributed by:
http://Article-Distribution.com

Helpful Link: 
  The Digital Millennium Copyright Act - Overview
  http://www.gseis.ucla.edu/iclp/dmca1.htm

---------------------------------------------------------------------

Article Title:
==============

How to Counter - Spy Phone Invasions of Privacy

Article Description:
====================

The rise of electronic bugging, terms used in phone spying, how
to protect yourself from electronic bugging.


Additional Article Information:
===============================

973 Words; formatted to 65 Characters per Line
Distribution Date and Time: 2007-02-23 10:00:00

Written By:     Jerry Tarrer
Copyright:      2007
Contact Email:  mailto:[EMAIL PROTECTED]



For more free-reprint articles by Jerry Tarrer, please visit:
http://thePhantomWriters.com/free_content/d/index.shtml#Jerry_Tarrer


=============================================
Special Notice For Publishers and Webmasters:
=============================================

If you use this article on your website or in your ezine,
We Want To Know About It. Use the following URL to let
us know where you have used this article, and we will
include a link to your website on thePhantomWriters.com: 

http://thephantomwriters.com/notify.php?id=4429&p=load


HTML Copy-and-Paste and TEXT Copy-and-Paste 
Versions Of Article Are Available at:
http://thePhantomWriters.com/free_content/db/t/spy-phone-invasions-privacy.shtml#get_code

---------------------------------------------------------------------

How to Counter - Spy Phone Invasions of Privacy
Copyright (c) 2007 Jerry Tarrer
Security Spy 4 U
http://www.securityspy4u.com



Security Countermeasures

After the end of the Cold War there was a rapid increase in
foreign economic and industrial espionage. This increase promoted
new federal legislation to enable a more effective means for law
enforcement to deal with this threat.

What evolved was the Economic Espionage Act of 1996.

All companies and organizations that handle sensitive information
need to have targeted programs for management and other employees
to protect their confidential information from theft. Alertness
in the work place to indicators of activities, which are
suspicious in nature and willingness by employees to protect
their employment by reporting to their managers, is essential.

Not only does spying occur in the work place, it also extends
it's reach into private homes of managers and workers who handle
confidential information. Source: Texas A&M Research Foundation

Surveillance

The word Surveillance usually brings a picture to mind of
electronic eavesdropping or video surveillance. A recent movie
featuring the famous actor, Gene Hackman had a memorable scene of
him in the back of an electronic eavesdropping truck with
earphones on.

Although most people are aware of legal video surveillance such
as in the work place, parking lots and airports, most of us are
totally unaware of mostly illegal covert eavesdropping and video
surveillance.

Courts around the globe have had to deal with illegal
eavesdropping and video surveillance in order to protect the
rights of their citizens.

Audio Surveillance Device

Audio surveillance devices are typically designed to illegally
intercept room conversations. Audio Surveillance devices are
specifically manufactured for the purpose of intercepting audio
and eavesdropping. Bug Detectors are employed to find these types
of audio surveillance devices, and many of them have become very
accurate.

Spy Listening Device

There are numerous Spy Listening Devices, which come in all
shapes and sizes, and are very easy to purchase, due to the
prevalance of spy shops. Depending upon the application, there
are spying devices that will wiretap phone conversations or
intercept room conversations.

Spy Phone

The Spy Phone is usually a cellular or mobile phone that has been
converted for the purpose of eavesdropping on room conversations
with and without the cell phone owner's knowledge. There are a
number of brands of mobile phones that can be programmed for this
purpose.

What happens is that when a pre-programmed telephone number dials
the cellular phone, it automatically answers without ringing and
activates the cell phone's internal speaker-phone which thereby
picks up any conversations in the area, while the spy phone's
display appears as if it's in the normal standby mode.

This type of Spy Phone is used as a "Leave Behind" device in
industrial espionage as well as in domestic eavesdropping. A"left
behind cell phone" is a favored spying technique.

When a spy uses a left behind cell phone, which is also a
"prepaid phone", it is almost impossible to determine who the
owner is.

A Cellular Infinity transmitter is another widely used name for
the Cell Spy Phone...

Cell Phone Tap

Since a Cellular phone is wireless and a physical tap is
impossible; a Cell phone tap usually refers to someone listening
in to a cell phone conversation without the user's knowledge.
This makes the term cellular phone tap, synonymous with cellular
eavesdropping.

To tap a cell phone requires very expensive computer equipment
costing more than $100,000, which can track a call as it moves
from cell to cell. Some professional bug detectors use a Bug
Detector with Strength Meter to locate cell phones being used for
eavesdropping.

RF Transmitter

Many eavesdropping bugs are radio frequency transmitter (RF
Transmitter) types, which allow the eavesdropper to quickly plant
an eavesdropping device without having to run wires. Plus, RF
Transmitter bugs allow the eavesdropper to monitor the
conversations from outside of the immediate target area.

A person can own a RF Transmitter but it is illegal to use one to
listen-in on someone's conservation without his or her
permission. Bug Detectors with Frequency Counters can easily be
deployed to find these types of eavesdropping bugs.

Spy Phones  & Counter Measures

TSCM

In the field of electronic eavesdropping detection the term
Technical Surveillance Countermeasures is abbreviated as TSCM.
TSCM is also referred to as de-bugguing, bug detection and bug
sweeps.

The TSCM Industry is quietly but quickly gaining the attention of
the security industry and electronic equipment manufacturers.
This new awareness is triggered by the rapid increase in
industrial espionage and the large number of eavesdropping tools
sold each year.

Phone Security and counter Measures

Telephone wiretapping devices can be purchased at any Radio Shack
or electronics store thereby making it extremely easy for people
having access to your residence, or even your neighbors to
eavesdrop on your phone conversations. Telephone security should
be a very important consideration for both your personal and
business life.

Things you can do to Detect, counter and Neutralize Spy Phones

 * Be on the lock-out for "left behind" cell phones and regular
phones left off the hook in meeting places and areas where
sensitive information is discussed.

 * Consider purchasing a bug detection device such as a Bug
Detector with a Frequency Counter that has a Low and high
frequency antenna for sweeping your home and business.

 * Establish a regular de-bugging or bug detection routine.

 * Schedule your sweeps at regular intervals, and throw in random
sweeps incase you have an internal snoop. Change your scheduled
sweeps quarterly or more often if you feel it's necessary.

 * Make sweeps when employees are present and when they are at
home.

  Sweep everywhere, including the ceiling. Don't leave a stone
unturned.

 * Contact a professional electronic eavesdropping detector if
you feel that you have not eliminated the threat.

 * Be aware of Phone Security issues at all times.

Lastly think about what you are saying on a phone call and who
may be listening. The phone can be a threat to your privacy,
safety and future. 




---------------------------------------------------------------------
The Author Jerry T. is 63 years of age. He was born in a small coal-mining 
town in Logan county, West Virginia. At the end of World War II his father 
returned from the war where he had served in the Pacific and moved the 
entire family to Chicago Illinois.  He was educated in the inner city 
completing high school and 2 years of college. After joining an 
apprentice-printing program, Jerry became a Master Printer and 
worked in his field for 37 years. Jerry is the father of 5 
adult children and 13 grandchildren. The author is now 
trying his hand at his own web business at http://www.securityspy4u.com


--- END ARTICLE ---

Get HTML or TEXT Copy-and-Paste Versions Of This Article at:
http://thePhantomWriters.com/free_content/db/t/spy-phone-invasions-privacy.shtml#get_code



.....................................

TERMS OF REPRINT - Publication Rules 
(Last Updated:  May 11, 2006)

Our TERMS OF REPRINT are fully enforcable under the terms of:

  The Digital Millennium Copyright Act
  http://thomas.loc.gov/cgi-bin/query/z?c105:H.R.2281.ENR:

.....................................

*** Digital Reprint Rights ***

* If you publish this article in a website/forum/blog, 
  You Must Set All URL's or Mailto Addresses in the body 
  of the article AND in the Author's Resource Box as
  Hyperlinks (clickable links).

* Links must remain in the form that we published them.
  Clean links should point to the Author's links without
  redirects having been inserted into the copy.

* You are not allowed to Change or Delete any Words or 
  Links in the Article or Resource Box. Paragraph breaks 
  must be retained with articles. You can change where
  the paragraph breaks fall, but you cannot eliminate all
  paragraph breaks as some have chosen to do.

* Email Distribution of this article Must be done through
  Opt-in Email Only. No Unsolicited Commercial Email.


* You Are Allowed to format the layout of the article for 
  proper display of the article in your website or in your 
  ezine, so long as you can maintain the author's interests 
  within the article.

* You may not use sentences from this article as an input
  for any software that steals sentences from others in 
  order to build an article with software. The copyright on
  this article applies to the "WHOLE" article.


*** Author Notification ***

  We ask that you notify the author of publication of his
  or her work. Jerry Tarrer can be reached at:
  [EMAIL PROTECTED]


*** Print Publication Reprint Rights ***

  If you desire to publish this article in a PRINT 
  publication, you must contact the author directly 
  for Print Permission at:  
  mailto:[EMAIL PROTECTED]



.....................................

If you need help converting this text article for proper 
hyperlinked placement in your webpage, please use this 
free tool:  http://thephantomwriters.com/link-builder.pl



=====================================================================

ABOUT THIS ARTICLE SUBMISSION

http://thePhantomWriters.com is a paid article distribution 
service. thePhantomWriters.com and Article-Distribution.com 
are owned and operated by Bill Platt of Stillwater, Oklahoma USA.

The content of this article is solely the property 
and opinion of its author, Jerry Tarrer
http://www.securityspy4u.com



---------------------------------------------------------------------
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
---------------------------------------------------------------------





Reply via email to