Advertisement

Electronic Surveillance

  • Harry Hollien
Part of the Applied Psycholinguistics and Communication Disorders book series (APCD)

Abstract

Perhaps I had better tell you first what this chapter is not about. It is not a “how-to” review of surveillance. Nor does it list all of the procedures and equipment that could be used in detecting and storing acoustic signals such as speech. What I will discuss are basic approaches to the process, common equipment and the types of problems that can—and very often do—occur.

Keywords

Audio Signal Tape Recorder Radio Transmitter Telephone Line Line Voltage 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Anonymous (1978) NILECS, Standards for Personal FM Transmitters, Washington, LEAA, Department of Justice.Google Scholar
  2. 2.
    Bloch, S. C., Lyons, P. W. and Ritterman, S. I. (1977) Enhancement of Speech Intelligibility by “Blind” Deconvolution, Proceed. Carnahan Conf., Crime Countermeasures, Lexington, KY, 167-174.Google Scholar
  3. 3.
    Buckwalter, A. (1983) Surveillance and Undercover Investigation, Boston, Butterworth Pubs.Google Scholar
  4. 4.
    Carrol, J. M. (1969) The Third Listener, New York, Dutton.Google Scholar
  5. 5.
    Dash, S., Schwartz, R. F. and Knowlton, R. E. (1971) The Eavesdroppers, New York, DaCapo Press.Google Scholar
  6. 6.
    Hartmann, H. P. (1979) Analog Scrambling vs. Digital Scrambling in Police Telecommunication Networks, Proceed. Carnahan Conf., Crime Countermeasures, Lexington, KY, 47-51.Google Scholar
  7. 7.
    Hong, S. T. and Kuebler, W. (1981) An Analysis of Time Segment Permutation Methods in Analog Voice Privacy Systems, Proceed. Carnahan Conf., Crime Countermeasures, Lexington, KY, 167-171.Google Scholar
  8. 8.
    Inocco, A. P. (1975) Investigative Recordings, Law Enforcement Communications, 20-21, 34-35.Google Scholar
  9. 9.
    Leitich, A. J. (1978) Scrambler Design Criteria, Proceed. Carnahan Conf., Crime Countermeasures, Lexington, KY, 5-9.Google Scholar
  10. 10.
    Lydon, K. (1982) Technical Surveillance Countermeasures, Security World 19:32–35.Google Scholar
  11. 11.
    Platt, E. and Bourbina, R. (1984) A Primer: Key Telephone Systems, Sound and Video Contractor, 50-57.Google Scholar
  12. 12.
    Pollack, D. A. (1973) Methods of Electronic Audio Surveillance, Springfield, IL, Charles C Thomas.Google Scholar
  13. 13.
    Salmon, V. (1986) Security By Masking, J. Acoust. Soc. Amer. 79:2077–2078.CrossRefGoogle Scholar
  14. 14.
    Shapley, D. (1978) Pen Registers: The “Appropriate Technology” Approach to Bugging, Science 199:749–751.PubMedCrossRefGoogle Scholar
  15. 15.
    Udalov, S. (1980) Analog Voice Privacy with a Microprocessor, Proceed. Carnahan Conf., Crime Countermeasures, Lexington, KY, 27-37.Google Scholar
  16. 16.
    Van Dewerker, J. S. (1976) State of the Art of Electronic Surveillance, NWC Commission Studies, 141-214.Google Scholar
  17. 17.
    Walker, C. P. (1980) Police Surveillance by Technical Devices, Public Law, 184-214.Google Scholar

Copyright information

© Springer Science+Business Media New York 1990

Authors and Affiliations

  • Harry Hollien
    • 1
  1. 1.University of FloridaGainesvilleUSA

Personalised recommendations