Abstract
Perhaps I had better tell you first what this chapter is not about. It is not a “how-to” review of surveillance. Nor does it list all of the procedures and equipment that could be used in detecting and storing acoustic signals such as speech. What I will discuss are basic approaches to the process, common equipment and the types of problems that can—and very often do—occur.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Anonymous (1978) NILECS, Standards for Personal FM Transmitters, Washington, LEAA, Department of Justice.
Bloch, S. C., Lyons, P. W. and Ritterman, S. I. (1977) Enhancement of Speech Intelligibility by “Blind” Deconvolution, Proceed. Carnahan Conf., Crime Countermeasures, Lexington, KY, 167-174.
Buckwalter, A. (1983) Surveillance and Undercover Investigation, Boston, Butterworth Pubs.
Carrol, J. M. (1969) The Third Listener, New York, Dutton.
Dash, S., Schwartz, R. F. and Knowlton, R. E. (1971) The Eavesdroppers, New York, DaCapo Press.
Hartmann, H. P. (1979) Analog Scrambling vs. Digital Scrambling in Police Telecommunication Networks, Proceed. Carnahan Conf., Crime Countermeasures, Lexington, KY, 47-51.
Hong, S. T. and Kuebler, W. (1981) An Analysis of Time Segment Permutation Methods in Analog Voice Privacy Systems, Proceed. Carnahan Conf., Crime Countermeasures, Lexington, KY, 167-171.
Inocco, A. P. (1975) Investigative Recordings, Law Enforcement Communications, 20-21, 34-35.
Leitich, A. J. (1978) Scrambler Design Criteria, Proceed. Carnahan Conf., Crime Countermeasures, Lexington, KY, 5-9.
Lydon, K. (1982) Technical Surveillance Countermeasures, Security World 19:32–35.
Platt, E. and Bourbina, R. (1984) A Primer: Key Telephone Systems, Sound and Video Contractor, 50-57.
Pollack, D. A. (1973) Methods of Electronic Audio Surveillance, Springfield, IL, Charles C Thomas.
Salmon, V. (1986) Security By Masking, J. Acoust. Soc. Amer. 79:2077–2078.
Shapley, D. (1978) Pen Registers: The “Appropriate Technology” Approach to Bugging, Science 199:749–751.
Udalov, S. (1980) Analog Voice Privacy with a Microprocessor, Proceed. Carnahan Conf., Crime Countermeasures, Lexington, KY, 27-37.
Van Dewerker, J. S. (1976) State of the Art of Electronic Surveillance, NWC Commission Studies, 141-214.
Walker, C. P. (1980) Police Surveillance by Technical Devices, Public Law, 184-214.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 1990 Springer Science+Business Media New York
About this chapter
Cite this chapter
Hollien, H. (1990). Electronic Surveillance. In: The Acoustics of Crime. Applied Psycholinguistics and Communication Disorders. Springer, Boston, MA. https://doi.org/10.1007/978-1-4899-0673-1_5
Download citation
DOI: https://doi.org/10.1007/978-1-4899-0673-1_5
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4899-0675-5
Online ISBN: 978-1-4899-0673-1
eBook Packages: Springer Book Archive