Part 1: Cell phone and wireless security -- Introduction to wireless communications security -- Cell phone theft -- Cell phone fraud: unauthorized use of your account -- Frequently asked questions about wireless telephone fraud -- Wireless telephone fraud consumer tips -- Third generation (3G) wireless: does converging technology mean converging fraud? -- Addressing wireless device privacy and security concerns -- Experts say cell sites are safe; some security in place -- Smartphones: consumer convenience and emergency assistance or privacy invasion? -- As cell phones get smarter, they become prone to viruses -- Mobile device viruses: nothing to worry about? -- Global positioning system at risk -- Wireless payment technology uses and risks -- Is wireless phone radiation harmful? -- Part 2: Security issues and your telephone company -- What your telephone company knows about you -- Slamming: when your telephone service is switched without your permission -- Cramming: unauthorized, misleading or deceptive charges placed on consumers' telephone bills -- Surcharges for international calls to wireless phones -- Understanding phone cards: usage, problems, and complaints -- Caller ID service: your rights under the law -- Part 3: Long distance telephone scams -- How long distance scams work -- The latest telephone scams -- Recurring telephone scams -- Part 4: Telemarketing fraud and other nuisances -- What is telemarketing fraud? -- What kinds of telemarketing schemes are out there? -- Unwanted telephone marketing calls -- What can I do about telemarketing fraud? -- The Federal Trade Commission and the National "Do not call" registry -- "No call law" hangups -- Predictive dialing: silence on the other end of the line -- Telemarketing recovery scams -- Fraudulent telemarketers snatching bank account numbers -- Inbound telemarketing fraud -- Telephone harassment: how to cope with the crank caller -- Telephone harassment: using Caller ID, trap and trace, and other methods -- Unwanted faxes: what you can do -- Part 5: Wiretapping and electronic eavesdropping -- Wiretapping/eavesdropping on telephone conversations: is there cause for concern? -- The lazy person's guide to wireless network security -- New attach intercepts wireless net messages -- Aircracked! Wireless hacking and "drive-by" cracking -- Roving wiretaps: explanation and analysis -- Cell phone security: taking steps against eavesdropping and cloning -- Detection and prevention of eavesdropping -- Voice mail, answering machine, and fax surveillance vulnerabilities -- Wireless intercom, baby monitor, cordless phone, and cellular surveillance vulnerabilities -- A guide to Federal Law on electronic surveillance -- Communications Assistance for Law Enforcement Act (CALEA) -- Frequently asked questions about Echelon -- Part 6: Additional help and information.
Author(s): Wilma Caldwell
Publisher: Omnigraphics
Year: 2003
Language: English
Pages: 400
City: Detroit, MI