skip navigation

PUBLICATIONS

Register for Latest Research

Stay Informed
Register with NCJRS to receive NCJRS's biweekly e-newsletter JUSTINFO and additional periodic emails from NCJRS and the NCJRS federal sponsors that highlight the latest research published or sponsored by the Office of Justice Programs.

NCJRS Abstract

The document referenced below is part of the NCJRS Virtual Library collection. To conduct further searches of the collection, visit the Virtual Library. See the Obtain Documents page for direction on how to access resources online, via mail, through interlibrary loans, or in a local library.

 

NCJ Number: 118449 Find in a Library
Title: Raid on Bugs
Journal: Security Management  Volume:33  Issue:6  Dated:(June 1989)  Pages:85-88
Author(s): G Whidden
Date Published: 1989
Page Count: 4
Type: Training (Aid/Material)
Format: Article
Language: English
Country: United States of America
Annotation: A good defense against electronic eavesdropping includes education, secure areas, access control, and detection.
Abstract: Key personnel must be educated, persuaded, and regularly reminded about being discreet in public and on the telephone. Misunderstandings persist about the vulnerability of telephone lines to taps. The security department should prepare an article on telephone security for inclusion in the company newsletter. Another element of an effective defense against eavesdropping is the provision of secure areas for personnel to use for sensitive discussions. Secure rooms are sparsely furnished and positioned in the interior of the building. This location makes the use of an eavesdropping transmitter difficult because of the many barriers through which its signal must pass to reach a reception point outside the building. These secure areas can be protected against audio penetration through the proper application of physical barriers and access controls. Secure rooms should be kept locked, with only one person controlling access. The use of detection devices is essential. Such devices should take into account the eavesdropper's purpose. Since a bug is only likely to be used when the room is occupied, this is the time when the bug-detection operation should be performed.
Main Term(s): Electronic surveillance
Index Term(s): Industrial espionage; Security management
To cite this abstract, use the following link:
http://www.ncjrs.gov/App/publications/abstract.aspx?ID=118449

*A link to the full-text document is provided whenever possible. For documents not available online, a link to the publisher's website is provided. Tell us how you use the NCJRS Library and Abstracts Database - send us your feedback.