Secrets of Computer Espionage: Tactics and Countermeasures* Covers electronic and wireless eavesdropping, computer surveillance, intelligence gathering, password cracking, keylogging, data duplication, black bag computer spy jobs, reconnaissance, risk assessment, legal issues, and advanced spying techniques used by the government * Author shares easily-implemented countermeasures against spying to detect and defeat eavesdroppers and other hostile individuals * Addresses legal issues, including the U.S. Patriot Act, legal spying in the workplace, and computer fraud crimes * Companion Web site contains links to security tools and useful security information resources |
Common terms and phrases
algorithm antenna application attack authentication BIOS passwords black bag job boot brute-force camera Chapter client commercial communications compromise computer cops computer espionage computer forensics copy countermeasures covertly crackers cracking criminal cryptography decrypt default deleted detect devices dictionary attack documents downloaded e-mail eavesdropping electronic employees encryption espionage evidence example exploit firewall floppy disk folder forensics hard drive hardware keyloggers include the following installed intelligence agencies intercepted Internet investigation IP address keyboard laptop law enforcement Linux logon MAC address messages Microsoft monitoring NetStumbler operating system password phone numbers physical access popular port protected Registry running scan scanners server sniffer snooping someone spies SSID steganography storage media stored surveillance Tactics target computer there's Trojan utility vulnerabilities Windows wireless network wiretap WLAN x-ref