Wonder Club world wonders pyramid logo
×

How to Get Anything on Anybody Book

How to Get Anything on Anybody
Be the First to Review this Item at Wonderclub
X
How to Get Anything on Anybody, Get the goods on others with this encyclopedia of advanced investigative and surveillance techniques. Here are expert ways to secretly bug any target! Info on lock-pick technology, how polygraphs and voice lie detectors can be tricked and much more, inclu, How to Get Anything on Anybody
out of 5 stars based on 0 reviews
5
0 %
4
0 %
3
0 %
2
0 %
1
0 %
Digital Copy
PDF format
1 available   for $99.99
Original Magazine
Physical Format

Sold Out

  • How to Get Anything on Anybody
  • Written by author Lee Lapin
  • Published by Paladin Press,U.S., 1986/12/01
  • Get the goods on others with this encyclopedia of advanced investigative and surveillance techniques. Here are expert ways to secretly bug any target! Info on lock-pick technology, how polygraphs and voice lie detectors can be tricked and much more, inclu
Buy Digital  USD$99.99

WonderClub View Cart Button

WonderClub Add to Inventory Button
WonderClub Add to Wishlist Button
WonderClub Add to Collection Button

Book Categories

Authors

Chapter 1 - STATE OF THE ART ELECTRONIC SURVEILLANCE.
Use Warning, Techinical Aspects Involved in Choosing a Transmitter, Frequency Ranges and Their Advantages, A Side By-Side Comaprison of Several Available Units, Increasing the Effective Range of a Transmitter, Telephone Transmetters.
Chapter 2 - PUTTING IT WHERE IT BELONGS.
Placement for Best Results, the Art of Hiding.
Chapter 3 - CARRY ALL
A Close Look at body Transmitters, A Look at the Best in the Business; the Cetec Vega, How Diversity Transmitting works.
Chapter 4 - SOPHISTICATED BUG
Frequency Hopping and Subcarrier Bugs for Extreme Jobs.
Chapter 5 - INFINITY TRANSMITTER CALL HOME
Infinity Transmitter Troubles, The Thing the Advertisements Never Mention, ESS Operation, Dedicated Lines for Real Operation.
Chapter 6 - PHONE PHREAK BUGS FBI
A Strange But True Tale . . .
Chapter 7 - RECORDERS
How to Choose Surveillance Recorder, The Difference in IC Types, Frequency Response, Pearlcorders, Cassette Types, the Viking Enhancement Circuit, A Look at Scientific Systems' VOX and Drop Out Relay.
Chapter 8 - LISTENING THROUGH WALLS
Giving the Walls Ears; From Sky King to the Present, Theory of Operation, Contact Mics, Spike Mics, Placement Tips Side-By-Side Unit Testing, The Best Deals in Each Price Range.
Chapter 9 - FAR AWAY
Going for the Distance Aurally, Tests of the Gibson EPM for Surveillance Applications, Tests of a top Shotgun Type How to Aim for Maximum Results, Frequency Response Curves for th EPM, Another Possibility.
Chapter 10 - IMPROVING AVAILABLE DEVICES
Improving Transmitters by the Buddy System, Upping Output Power, Eliminating Batteries, Choosing the Best Battery, Telephone Transmitter Enhancement, Tuning for Fun and Profit, Automatic On-Off Bugs, Procedure Tips, A Close Look at Antennas, Ground Plane Factor, Front End Amps, Improving and Securing Recorders.
Chapter 11 - AFTER MARKET PROCESSING
Using Equalizers for Recovering Lost Audio, the Keypec; a Little Known Tool, The Top and Bottom of the Processing Line, Some Aftermarket Optic Improvement Tips.
Chapter 12 - IMPROVISING SURVEILLANCE EQUIPMENT ON THE SPOT
Emergency Modification of Common Devices, Microphones, Transmitters, Carrier Current Bugs, Receivers, Relay Stations, Long Play Recorders, Auto Starts, the Magic Briefcase, Thru-Walls, Pen Registers, Cheese Boxes, Spike and Tube Mics.
Chapter 13 - IMPROVISED COUNTERMEASURES
Quick Checks for Phone Lines, Cloaks, and the Ultimate Countermeasure.
Chapter 14 - TRICKS
The Art of Passive Collection, the Miracle Bug, A Look at the Laser and Where it Can Be Purchased.
Chapter 15 - SCANNING
The Art of Non Selective Intervention, Unusual Methods of Sound Collection, A Look into Other People's Secret Lives, Opportunity as Power, How to Keep From Being Scanned.
Chapter 16 - UNDETECTABLE BUGS
11 Impossible to-Locate Units and How They Are Used.
Chapter 17 - HARDWIRING TODAY
Invisible Hardwiring Almost Invisible Hardwiring, Carrier Current Modification, One Wire Infinity Transmetter
Chapter 18 - EXPERTS TELL HOW THEY WOULD DO IT
A Transcribed Conversation Between 4 of the Best in the Business and Their Private Techniques
Chapter 19 - SUPER SYSTEMS
Details of Three Super Systems for All Types of Surveillance Work; Each is Designed With Economy and Performance in Mind, Sources for Every Device.
Chapter 20 - STATE OF THE ART COUNTERMEASURES
The Russian Approach, Countermeasure Equipment; Phone Analyzers The TDR, RF Detection Tips, Use of Feedback, Carrier Detection, Wire Tracers, Recorder Detectors, Desktop Bug Detectors, The Non-Linear Junction Detector; Fact of Fancy, Noise Generators, Secure Phones, Mini Systems, How to Embarrass a Bad Sweep Service.
Chapter 21 - SCRAMBLERS
Types of Scramblers, Choosing and Using, Unscrambling Those Private Messages, The Ultimate Scrambler.
Chapter 22 - UNAIDED SURVEILLANCE
Foot Surveillance, ABC Method, Ditching a Tail, Auto Tailing Methods and Tips Parallel Surveillance, Combination Surveillance, Combination Surveillance, Making and Ditching, Mechanical Assistance Progressive.
Chapter 23 - 2 WAYS
Two Methods of Secure Radio Communication.
Chapter 24 - FIXED SURVEILLANCE
Physical Surveillance and Stakeout, Trashing It . . .
Chapter 25 - OPTICS
Optical Aids, Understanding the Important Terms, Utilization and Sources.
Chapter 26 - NIGHT VISION OPTIONS
To See in the Dark; Active and Passive Methods, What Works for What, Thermals, OEM Sources, A Super Cheap Night Device, Another Way to Go.
Chapter 27 - READING UNOPENED MAIL
The Classical Methods as Well as a New Twist; the CIA Special
Chapter 28 - B AND E
Maximizing Surreptitious Entry.
Chapter 29 - MIRACLE LOCK PICKING
New Devices That Open Almost Anything, Sources.
Chapter 30 - ROCK TURNING: THE ART OF DIGGING OUT FACTS
Where to Find Out Anything, Directories, Private Sources, Listings, Government Files, Credit Bureaus and How to Access Them, Armed Service Sources, Using the Mail to Your Advantage, How to Get Birth, Death and Marriage Records, Social Security Card Reading, Special Sources.
Chapter 31 - PROCURRING CONFIDENTIAL TELEPHONE COMPANY INFORMATION
Obtaining Telco Listings, Unlisted Numbers and Private Data, CAN Listings, Depac Sources, Telephone Tricks.
Chapter 32 - INTELLIGENCE
Gathering Data, Using Feedback.
Chapter 33 - INTELLIGENCE ASSIMILATION
Order of Battle, Planning Your Attack, Increasing Response, Roles That Work, Sources.
Chapter 34 - CREATING AN INTELLIGENCE SYSTEM
Putting Together a Model File and Access System, Rating the Input Using a Personal Computer, a Manual Approach.
Chapter 35 - HEAD HUNTING
The Technique of Skip Tracing, Conducting a Person Search, Skip Trace Fill-in Forms.
Chapter 36 - HOW THE BIG GUYS DO IT
Practice Runs, Working Up a Dossier on Anybody, Anything, Information as Power.
Chapter 37 - LIE DETECTORS AND BEATING SAME
An Examination of the Machine, Accuracy Studies the CIA Experiment, Recommendations for Users, Mechanical Means.
Chapter 38 - A CLOSE LOOK AT STRESS ANALYZERS
Is the PSE a Lie Detector? Background.
Chapter 39 - CIA STUDIES
The CIA Looks at the PSE.
Chapter 40 - THE FORDHAM TESTS
Details of a Scientific Test on Stress Analyzers Conducted at Fordham University for the Army, A Close Look at the Test Results, Summary.
Chapter 41 - YOUR AUTHOR AND THE STRESS DEVICE GAME
Lee's Tests of a Stress Unit How to Beat Any Stress Unit, Other Methods.
Chapter 42 - SUPPLIERS AND SOURCES
Detailed Studies of Who Sells What and Where the Best Deals Are to be Found . . .


Login

  |  

Complaints

  |  

Blog

  |  

Games

  |  

Digital Media

  |  

Souls

  |  

Obituary

  |  

Contact Us

  |  

FAQ

CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!!

X
WonderClub Home

This item is in your Wish List

How to Get Anything on Anybody, Get the goods on others with this encyclopedia of advanced investigative and surveillance techniques. Here are expert ways to secretly bug any target! Info on lock-pick technology, how polygraphs and voice lie detectors can be tricked and much more, inclu, How to Get Anything on Anybody

X
WonderClub Home

This item is in your Collection

How to Get Anything on Anybody, Get the goods on others with this encyclopedia of advanced investigative and surveillance techniques. Here are expert ways to secretly bug any target! Info on lock-pick technology, how polygraphs and voice lie detectors can be tricked and much more, inclu, How to Get Anything on Anybody

How to Get Anything on Anybody

X
WonderClub Home

This Item is in Your Inventory

How to Get Anything on Anybody, Get the goods on others with this encyclopedia of advanced investigative and surveillance techniques. Here are expert ways to secretly bug any target! Info on lock-pick technology, how polygraphs and voice lie detectors can be tricked and much more, inclu, How to Get Anything on Anybody

How to Get Anything on Anybody

WonderClub Home

You must be logged in to review the products

E-mail address:

Password: