Communications Security Sourcebook: Basic Information for General Readers About Cell Phone and Wireless Communication Security, Telephone Company Security Issues, Telephone Slamming and Cramming, Long Distance Telephone Scams, Telemarketing Fraud and Other Nuisances, Wiretapping and Eavesdropping, and More: Along With Glossaries of Related Terms

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

Part 1: Cell phone and wireless security -- Introduction to wireless communications security -- Cell phone theft -- Cell phone fraud: unauthorized use of your account -- Frequently asked questions about wireless telephone fraud -- Wireless telephone fraud consumer tips -- Third generation (3G) wireless: does converging technology mean converging fraud? -- Addressing wireless device privacy and security concerns -- Experts say cell sites are safe; some security in place -- Smartphones: consumer convenience and emergency assistance or privacy invasion? -- As cell phones get smarter, they become prone to viruses -- Mobile device viruses: nothing to worry about? -- Global positioning system at risk -- Wireless payment technology uses and risks -- Is wireless phone radiation harmful? -- Part 2: Security issues and your telephone company -- What your telephone company knows about you -- Slamming: when your telephone service is switched without your permission -- Cramming: unauthorized, misleading or deceptive charges placed on consumers' telephone bills -- Surcharges for international calls to wireless phones -- Understanding phone cards: usage, problems, and complaints -- Caller ID service: your rights under the law -- Part 3: Long distance telephone scams -- How long distance scams work -- The latest telephone scams -- Recurring telephone scams -- Part 4: Telemarketing fraud and other nuisances -- What is telemarketing fraud? -- What kinds of telemarketing schemes are out there? -- Unwanted telephone marketing calls -- What can I do about telemarketing fraud? -- The Federal Trade Commission and the National "Do not call" registry -- "No call law" hangups -- Predictive dialing: silence on the other end of the line -- Telemarketing recovery scams -- Fraudulent telemarketers snatching bank account numbers -- Inbound telemarketing fraud -- Telephone harassment: how to cope with the crank caller -- Telephone harassment: using Caller ID, trap and trace, and other methods -- Unwanted faxes: what you can do -- Part 5: Wiretapping and electronic eavesdropping -- Wiretapping/eavesdropping on telephone conversations: is there cause for concern? -- The lazy person's guide to wireless network security -- New attach intercepts wireless net messages -- Aircracked! Wireless hacking and "drive-by" cracking -- Roving wiretaps: explanation and analysis -- Cell phone security: taking steps against eavesdropping and cloning -- Detection and prevention of eavesdropping -- Voice mail, answering machine, and fax surveillance vulnerabilities -- Wireless intercom, baby monitor, cordless phone, and cellular surveillance vulnerabilities -- A guide to Federal Law on electronic surveillance -- Communications Assistance for Law Enforcement Act (CALEA) -- Frequently asked questions about Echelon -- Part 6: Additional help and information.

Author(s): Wilma Caldwell
Publisher: Omnigraphics
Year: 2003

Language: English
Pages: 400
City: Detroit, MI