Part 1: Cell phone and wireless security
Introduction to wireless communications security
Cell phone fraud: unauthorized use of your account
Frequently asked questions about wireless telephone fraud
Wireless telephone fraud consumer tips
Third generation (3G) wireless: does converging technology mean converging fraud?
Addressing wireless device privacy and security concerns
Experts say cell sites are safe; some security in place
Smartphones: consumer convenience and emergency assistance or privacy invasion?
As cell phones get smarter, they become prone to viruses
Mobile device viruses: nothing to worry about?
Global positioning system at risk
Wireless payment technology uses and risks
Is wireless phone radiation harmful?
Part 2: Security issues and your telephone company
What your telephone company knows about you
Slamming: when your telephone service is switched without your permission
Cramming: unauthorized, misleading or deceptive charges placed on consumers' telephone bills
Surcharges for international calls to wireless phones
Understanding phone cards: usage, problems, and complaints
Caller ID service: your rights under the law
Part 3: Long distance telephone scams
How long distance scams work
The latest telephone scams
Recurring telephone scams
Part 4: Telemarketing fraud and other nuisances
What is telemarketing fraud?
What kinds of telemarketing schemes are out there?
Unwanted telephone marketing calls
What can I do about telemarketing fraud?
The Federal Trade Commission and the National "Do not call" registry
Predictive dialing: silence on the other end of the line
Telemarketing recovery scams
Fraudulent telemarketers snatching bank account numbers
Inbound telemarketing fraud
Telephone harassment: how to cope with the crank caller
Telephone harassment: using Caller ID, trap and trace, and other methods
Unwanted faxes: what you can do
Part 5: Wiretapping and electronic eavesdropping
Wiretapping/eavesdropping on telephone conversations: is there cause for concern?
The lazy person's guide to wireless network security
New attach intercepts wireless net messages
Aircracked! Wireless hacking and "drive-by" cracking
Roving wiretaps: explanation and analysis
Cell phone security: taking steps against eavesdropping and cloning
Detection and prevention of eavesdropping
Voice mail, answering machine, and fax surveillance vulnerabilities
Wireless intercom, baby monitor, cordless phone, and cellular surveillance vulnerabilities
A guide to Federal Law on electronic surveillance
Communications Assistance for Law Enforcement Act (CALEA)
Frequently asked questions about Echelon
Part 6: Additional help and information.