*CLANDESTINE*
 
 

Welcome to the Clandestine Files, the most complete open source for privacy, surveillance and counter-surveillance information on the net.

The Clandestine Files were created in order to provide cyber-liberty advocates with resources to help prevent invasions of their privacy by government, big business and snoops. Too many privacy sites focus solely on encryption without addressing other threats to privacy and security or their solutions.
 

*THREATS*

The threats section details specific surveillance methods and potential threats to privacy. Brief explanations are offered for each threat, along with a method of detection and measures that can be taken to prevent or counter each threat.
 
  • Bugging: Surveillance Transmitters.

  •  
  • Carrier Current: Carrier Current Devices.

  •  
  • Data Tapping: Methods and countermeasures.

  •  
  • Internet Telephones: Privacy compromises of internet telephones.

  •  
  • Pentium: The Processor Serial Number debate. *NOTE*: This is a link to an offsite resource.

  •  
  • Telecommunications Surveillance: Telephone tapping, telephone bugging, fax interception, etc.

  •  
  • TEMPEST: Van Eck monitoring.

  •  
  • Video Surveillance: Candid camera on a whole new level.

  •  

    *RESOURCES*

    The resources section provides further materials to help you better understand the surveillance threat and tools to help enhance your privacy.
     
     
  • Books and Articles: Recommended reading.

  •  
  • Companies: TSCM firms and equipment suppliers.

  •  
  • Email: Email encryption

  •  
  • Equipment: Equipment, tools, suppliers and improvisation.

  •  
  • Law: Links to relevant legal information

  •  
  • Internet: Privacy assurance on the Net.

  •  
  • Search: Physical search techniques

  •  
  • Software: To help enhance your privacy.

  •  
  • Training: Security and countermeasures schools.

  •  
  • Voice Encryption: An overview with sources.

  •  


    Mail