Printer Friendly

Telephone Eavesdropping and Detection.

Authors: Charles L. Taylor and Richard J. Udovich

Publisher: Taylor-Hill Publishing Company, P.O. Box 1815, Bay City, TX 77404; 1990, 500 pages, hardback: $189

Reviewer: Richard J. Heffernan, CPP; President of R. J. Heffernan Associates Inc.; Chairman of the ASIS Standing Committee on Safeguarding Proprietary Information Security practitioners looking for a book that unravels the mysteries of technical surveillance countermeasures and explains telephone plants in depth have found a must for their security library. Telephone Eavesdropping and Detection is not only the foundation for understanding telephone systems but also an easily understood work on telephone technical surveillance countermeasures (TSCM).

Even the most seasoned TSCM professional will benefit from the authors' insight and experience. Taylor and Udovich, who have taught courses on telephone countermeasures at Texas A & M University, have written a book dedicated to understanding telephone attacks and the methods of locating compromises without the hyperbole typical of past countermeasure works.

Telephone Eavesdropping and Detection first discusses how a telephone plant and its instruments actually work. The in-depth information gives even a telephone equipment installer insight into the mechanical and electrical operations of a plant and its facilities.

The book contains excellent charts and diagrams of telephone cable from the central office through underground and aerial cables to different telephones. It is the first book to my knowledge that teaches not only the whys and wherefores of the telephone plant but also the methods of passive and active attacks on plant facilities. Taylor and Udovich give readers detailed information on locating these attacks through physical inspection procedures and a variety of testing equipment.

Another interesting aspect of this book is that 500 pages have been written about inside and outside telephone cables, terminals, phones, and PBX switches-equipment that only a few years ago was not considered important in commercial TSCM surveys. Previously only physical searches, telephone instrument testing, and radio frequency spectrum analysis were taken into account. No detailed testing was done on the cable extending beyond the telephone mounting cord to the central office, and in many cases only a cursory check was made.

Telephone Eavesdropping and Detection was a long time in coming but gives security managers who have responsibility over TSCM teams a way of measuring the professionalism of in-house and contract personnel.

I hope this volume will be the first in a series of TSCM books by Taylor and Udovich.
COPYRIGHT 1990 American Society for Industrial Security
No portion of this article can be reproduced without the express written permission from the copyright holder.
Copyright 1990 Gale, Cengage Learning. All rights reserved.

Article Details
Printer friendly Cite/link Email Feedback
Author:Heffernan, Richard J.
Publication:Security Management
Article Type:Book Review
Date:Aug 1, 1990
Previous Article:Aviation Security: Strategies for the '90s.
Next Article:Are we being misled?

Related Articles
A raid on bugs.
Espionage 101 ... and much more.
Personal telephone security.
Eavesdropping; a life by ear.
Telephone tap detection.

Terms of use | Copyright © 2016 Farlex, Inc. | Feedback | For webmasters