Survival, Security Books, Manuals: Telephones, Cell Phones, Fax Machines, Voice Mail Systems, Answering Machines, Pagers, Beepers, Zons, PBX, Phone Phreakers, Social Engineering, Phone Color Boxes, Security, Privacy, Surveillance, Countermeasures Technologies!
Consumertronics Combined Online Catalog
  Framed: www.consumertronics.net/index2.htm   Unframed: .../index1.html
P.O. Box 23097, ABQ, NM 87192, USA
FAX (call first (7-day, 24-hr)): (call to schedule)  VOICE ( 9-5 MST): 505-321-1034
TO ORDER: Order Form (MAIL/FAX) or Call in Your Order
Or write down order on paper, add it up + S/H, Mail/Email (PDF or TXT attach) to us.
Check, Money Order, PayPal*, Money Transfer Service (MTS), Trade =>
    *PAYPAL (orders over $150 or foreign order requires our prior, written OK)
      Log onto PAYPAL; Do a PayPal "Send Money" for Item Total + S/H,
      Pay to: wizguru@consumertronics.net, Then Email Us with Order Details

2014 Catalog Webpages now on CDROM or Disk (only $15)
Contact Us:
wizguru


Hardware Sales!
1000+ Items!



...tell your friends!
policies.htm
USA site - No cookies - No spyware - No adware - No trojans - No viruses - No worms - No spam - No pop-ups
We Respect Your Privacy - We do NOT Monitor nor Track Your Activities Online, nor Share Your Data

Welcome to Consumertronics security books,disks,tutorials,services: Phone,phreaking,cellular,faxes,voice mail,answering machines,pagers,pbx,countermeasuresWelcome to Consumertronics security books,disks,tutorials,services: Phone,phreaking,cellular,faxes,voice mail,answering machines,pagers,pbx,countermeasures Welcome to Consumertronics security books,disks,tutorials,services: Phone,phreaking,cellular,faxes,voice mail,answering machines,pagers,pbx,countermeasures
We are technical professionals to serve YOUR High-Tech Survival & Security needs.
In business 30+ years. Featured on CBS "60 Minutes," New York Times, Forbes, - many more!

Consumertronics.net Phones Online Catalog
Hi-tech survival, security books, manuals, ebooks (email / CDROM), software, services: Telephones, phone phreakers, phone color boxes, cellular phones, fax machines, voice mail systems, answering machines, pagers / beepers, pbx, zons, social engineering, privacy, security, surveillance, countermeasures ... !

Major Discounts all for Products on this Website: 15% OFF all Orders over $79, or 10% OFF for all Orders over $49 effective immediately and until changed here! Please order today! (No other types of discounts apply except $2.00 OFF for all online/mail/fax orders). Short of money? We can also accept trades (mostly electronic parts, test equip., computers) =>

NOTE: Some of the technology products described herein are controversial so WE CANNOT GUARANTEE LATER AVAILABILITIES. Everything we sell is sold for legal educational and-or entertainment purposes only under the Policies of this Catalog (e.g. to help you protect yourself from crimes). Consumertronics assumes no responsibility for anything it publishes. If you are a minor, please consult with your parent or legal guardian for guidance.

Dropdown Topic Menus Feature all Major Consumertronics Book, Disk Topics/Titles
Compatible with IE + most other Browsers, else for Hotlinked lists => Topics & Titles Directories page
Please Select General Topic (all caps) or Title (from Topic dropdown), then click Go!
(because of overlap in what each Topic covers, please also visit related Topics)






























HARD COPY or EBOOK: You can now choose Hard Copy (Disk, if specified), Ebook-EM (Emailed), Ebook-CD (CDROM), or Ebook-Disk (3.5", some offers) for your Selections (most offers and same prices). For each Ebook you want, add "Ebook" and then "-EM", "-CD" or "-Disk" in its Order Form Selection box, else Hard Copy version (or Disk, if specified) will be shipped.


Our Printed CATALOG : Sorry, our Printed Catalog is no longer available. See top of this page for our CDROM Catalog offer.

Top of Page       Topics & Titles Directories
ORDER FORMS: Mail/Fax Order Form    Phone Order: 505-321-1034 (9AM-6PM,M-F; 1PM-6PM,Sat)

MAJOR TOPIC #1:

PHONES, PHREAKING, CELLPHONES, FAXES, VOICE MAIL, ANSWERING MACHINES, SECURITY

CALLER ID & ANI SECURITY: Want to keep your ID secret when calling? This manual details how they work and the dozens of vulnerabilities of Caller ID, ANI, *69, *57, and Call Blocking and *67. Also describes Caller ID, Orange, Beige, Cheese and CF Boxes, ESS, SS7, E-911, various CLASS services, CN/A, NON PUB DA, CAMA, DNR, 800-ECR, Diverters, LD Extenders, Centrex, more! Topics also include: What is Caller ID?, Class Per-Call Services, Advantages and Disadvantages of Caller ID, Phone Privacy, Technical Details, Countermeasures. Most methods are clever techniques only and no special equipment is used. Some use inexpensive, commonly-available equipment. Comprehensive. ("ANI" is Automatic Number Identification, the type of Caller ID commonly used as part of toll-free number service). words=15.2K. $24. ISBN: 0-934274-56-8

CELLULAR & CORDLESS GUIDE: Details how cellphones operate and are cloned and reprogrammed. Vulnerabilities to hack attack and countermeasures. Comprehensive info on reprogramming NAMs and ESNs, control data formats, computing encoded MINs, ESNs, SIDHs, operating system, PROMs and their programming, forcing ACK, Test Mode and resets, scanning, tracking, scanner restorations, wireless freq and channel allocations, roaming, ESN and SIDH tables, parts/equipment sources, Attendant Stations, non-USA cellular, health concerns, and the ECPA and its critique. Step-by-step descriptions on how to keypad reprogram 100+ popular cellphones; specific cellphone models include:AT&T 1300, 1300C, 1400; AUDIOVOX BC55, BC55A, CMT410, CMT410A, CTX1500, CTX1900, CTX2500, CTX3100, CTX3100A, CTX4000, CTX4100, CTX4100A, SP85, SP85A, Transport., CMT300 (BMW), CTX3200A, CTX4200A, 832CO, C1D00, CTR2000, TCT400; COLT Transport.; DIAMONDTEL MESA 52, 55, 90X, 92, 95, 99X; FUJITSU Mobile Phone, 364A (XT/LT/FX/DX/XL); GATEWAY CP900; GE CF1000, CF2000, CF2500, CF3000, CF4000, MINI, MINI II, EXEC XR, MONOGRAM XR, XR3000, XR4000; GOLDSTAR SERIES 5000; HITACHI CR-211H, CR2121H; MITSUBISHI 555, 560, 600, 800, 900, 3000; MOTOROLA 4800, 8000H, Ultra Classic, MICRO-TAC BFLIP"; NEC 1000, 3500, 5000, 7000, M3700, M4500, M4600, P200, P300, P9100, 4500, 4600; NOKIA 101, 1000, 232, PT228, LX-11, M-11, M-10, P-30; NOVATEL PTR800, PTR825, 8305, TRANSPORTABLE CA08; OKI CDL400, 750, 900; PANASONIC CM800, TF800, 6106, 6110, EB311, EB300, EB362, EB500, CM500, EB-T10, EB2500, EB2501, EB2502, EB-C10, TP500, TP800, HP600, HH700, HH900, EB-H10, EB-H105, EB3500, EB3501, EZ-542, EF6106EA, EF6110EA; RADIO SHACK 17-1002, CT200, CT201, CT300, CT301; UNIDEN CP-900 through 6000 (14 models). C&CP also contains a complete section on how hackers phreak cordless phones, and more. words=80.0K.$29. ISBN: 0-934274-55-X.

Only $39 when combined with "PAGER (Beeper) MANUAL."

Beyond PHONE COLOR BOXES: This incredible manual describes in gut-wrenching detail: RED, BLUE, BLACK, GRAY, SILVER, YELLOW, GREEN, BROWN, PURPLE, WHITE, BEIGE, CF, S&M, CLEAR, CHEESE, and "MUTE" BOXES! Many modern schematics are provided as well as computer routines to simulate popular phone boxes! Some of these boxes were designed by phone phreakers to:

Completely rewritten and with much more info on diverters, extenders, loops, 3rd-party and other non-box related phone techniques, bridging heads and cans, REMOBS, lineman's handsets, and boxes (including the Optocom Box!). Also includes simple and effective methods hackers use to "mine" pay phones of their change. Due to sophisticated phone system changes and countermeasures, some of the boxing methods don't work in most U.S. areas. However, phone boxing activity has increased in recent years due to cellular phone phreaking, so protect yourself. Comprehensive, includes glossary of phone phreak terms. words=42.5K. $29. ISBN: 0-934274-86-X

PHONE PAGER (Beeper) MANUAL : Eye-popping manual describes in detail how Pagers and Beepers work, different types and uses, frequencies, advantages over and uses with cellphones, tips and tricks. How phone phreaks hack Pagers and countermeasures. Topics also include: Types of Pagers, Advantages & Disadvantages, Paging Services, Selecting a Pager, Pagers for Security Applications, Pager Decoding, Terminal Data Ports, Pager Security, Interception & the Law, more! Includes plans for your own Personal Pocket Paging System (transmitter and receiver). words=11.7K. $19. ISBN: 0-934274-76-2. Only $49 when combined with "CELLULAR & CORDLESS GUIDE."

PBX SECURITY: A PBX (Private Branch eXchange) is an in-house phone system characterized by messages such as, "Press 1 for Sales, 2 for Service...". PBXs are hacked at a total annual loss of $5 - $10 Billion! This manual exposes most issues relating to PBXs, including effective countermeasures! Topics include: the Scope of PBX crime, Intro to PBX systems, Computer-based PBXs, PBXs and WATS, Benefits, 3rd Party Frauds, 800 Exchange list, PBX phone list. Consider that the Aug 3, 1992 Forbes Magazine, "For Whom the Bells Toll" article on PBX hackers devoted an entire half-page to only one PBX hackers expert - John Williams of Consumertronics! When it comes to hacking and phreaking, we clearly are the best! words=17.5K. $19. ISBN: 0-934274-57-6

VOICE MAIL SECURITY: Voice Mail Systems (VMS) are hacked to:

Damage or destroy the VMS or the PBX itself. Finally, the authoritative source on VMB and PBX hackers is here! Written by a master hacker / master phreaker, "The Shark," VMH manual includes descriptions of VMSs, details on how they and PBXs are hacked, and specific step-by-step hackers information for ASPEN, MESSAGE CENTER, BIX, SYDNEY, AUDIX, PHONE MAIL, EZ, CINDY, CENTAGRAM, SPERRY LINK, RSVP, and more! If you are a VMB sysop, user or just curious - protect yourself - order today! words=14.2K. $24. ISBN: 0-934274-58-4

ANSWERING MACHINE SECURITY: Describes in eye-popping detail every known way answering machines are hacked to listen to, change and even erase messages on machines (with remote access features), and to convert answering machines into temporary mini-VMBs. Includes countermeasures! Specific makes include: AT&T, Bell South, Cobra, Conair, Code-a-Phone, GE, Goldstar, Panasonic, PhoneMate, Spectra, Uniden, Unisonic, more! Also includes many general techniques. Words=7.6K. $19. ISBN: 0-934274-59-2

STOP JUNK FAXES: Fed up with receiving, paying for and wasting your valuable time with those aggravating spam faxes day after day?! Tired of losing valuable business because your customers can't get through because your fax is tied up with the latest offer for free exotic vacation, pump & dump stock, your "Nigerian uncle" who willed you $6 million, offer to make a million dollars by licking envelopes, or your huge contest win or UK lottery win?! You've called their opt-out number only to find that it either does not connect or the opt-out lasted for about a week, and now you are getting even more junk faxes - now that they know that you read their junk faxes and emotionally respond to them. Caller ID screening doesn't work because few fax blasters reveal their phone numbers, and restricting faxers to a list is time-consuming and almost always misses important faxers. Sure, unsolicited junk faxes are illegal. Suing fax blasters is not the problem - collecting from them is the problem. Some are overseas; others regularly go out of business and then pop up as new fax businesses the next day. They have been sued countless times and that hasn't stopped them. Most law enforcement is so bogged down with violent crimes and terrorism that few prosecute fax criminals.
           The cost of one unsolicited fax is about $1 in toner or ribbon, paper, wear and tear on your fax machine, and annoyances and disruptions to you and your family and/or employees. At a buck each, a mere 3 junk faxes per day cost YOU about $1,000/yr of YOUR hard-earned money! With money tighter than ever, who can afford that! If you are a business, agency or institution, junk faxes can even be more costly to you because it leaves you wide open to competitors, pranksters and disgruntled customers and former employees to sabotage you with junk faxes. Junk faxes is also an easy, low-tech type of denial of service attack ripe for exploitation by criminals, terrorists and rogue states. In some cases, the cost to you of even one junk fax can be very high - if not devastating to you - for example, if the junk fax tie-up of your fax machine loses you an important client or a critical medical, legal, or financial document.
           Until we fixed this seriously irritating and costly problem, we got about 4 unsolicited faxes daily! We had tried about a dozen methods to stop the junk faxes that didn't work until we found a method that works great. We also had tried replacing the fax machine with an answering machine for periods up to a week at a loss of fax business to us, only to find that within a day of reconnecting the fax machine, the junk faxes resumed full force. We also had tried CNG filters (CNG notch filters or CNG band stop filters) to filter out the fax CNG tone (the 3-second beeps transmit fax machines send receive fax machines to alert it to prepare for a fax transfer) in conjunction with a fax controller / fax switch (also often referred to as a phone controller / phone switch) from reaching the fax controller / fax switch and causing it to automatically transfer to fax function. While the notch filters worked well to filter out the CNG beeps, however, they also sometimes interfered with the fax transfer itself if the sender or us manually punched in the fax code to allow the fax. We also tested about a dozen fax controllers / fax switches and found that even those that permit you to program in a fax transfer code would still automatically transfer to fax machine upon receipt of the CNG beeps (their fax transfer codes work only with silent fax machines which don't transmit CNG beeps, however, fax blasters typically use CNG beeps to force your fax controller / fax switch to automatically transfer). Finally, we found one high quality fax controller / fax switch you could program to not respond to CNG beeps, but instead to always automatically transfer calls to answering machine (where you would have instructions on the fax transfer code needed to activate transfer to your fax machine (or other procedure you require) so that your fax machine can only be manually activated by the sender or you by pressing in your fax transfer code) - although its user manual clearly states that it automatically switches to fax machine if CNG beeps arrive (do they intentionally mislead so they don't upset the fax manufacturers and office supply and electronic retailers who sell a lot of fax machines to replace spam worn-out fax machines, and fax toner, fax ribbons and paper - heavily profiting from fax spam?)! We often see this fine fax controller / fax switch sell Online for about $20 + shipping.
           This book provides you full details on the fax controller / fax switch we found that can be programmed for manual fax switching regardless of CNG tone input to defeat junk faxes, and how we programmed it to to ignore the CNG tone and always transfer to the answering machine (works with all of the makes and models of fax machines and answering machines we tested it with) to require manual fax transfer code entry to activate fax transfers. Also included is our experiences in trying to discover and perfect this method (including our simple, passive fax filter design), much information on the laws that apply to junk faxes, information on fax counterfeiting, and exposes the shocking methods others use to turn the tables on fax spammers. No hardware included.
Words=11.3K. $19.

FAX MACHINE SECURITY: Describes in detail all known methods phone phreaks use to hack Faxes (Fax attacks) and countermeasures (much more complex than just connecting a third facsimile to the phone line, which doesn't work). Topics include: Computer Fax modems, Fax crimes done with impunity, avoiding Fax harassment and Fax scams, Fax counterfeiting, Fax interception, Fax crime countermeasures, Fax servers, Fax on Demand, Fax protocols, Fax commo parameters, Fax compression, Fax encryption, Fax machine designs, and Fax machine modifications. Words=29.0K. $29. ISBN: 0-934274-60-6

SOCIAL ENGINEERING: "Social Engineering" is the science of persuasion and manipulating people to do exactly what you want them to do - even if it against their best judgment or interests - with minimal loss, costs and risks to yourself. While the term was originated by hackers and phreakers (adept social engineers) to describe socializing techniques they developed for obtaining vital information from sysops, security personnel, and phone operators, it is as old as time itself, and is the tool of every adept politician, sales person, preacher and con man. Even chimps know how to "Social Engineer," while many humans have lost this vital skill over the millennia. Words=12.6K. $29. ISBN: 0-934274-73-8

82S23 PROM EMULATOR PLANS: Many popular electronic devices (e.g. cellphones, scanners, other radios, etc) use the 82S23 and 82S123 PROM. Fully-labeled computer-drawn plans for an interface between any PROM programmer that can program 2758 PROMs and an 8223 socket. Words=0.2K. $19.

ROBOFONE "WARGAMES" AUTODIALER: RWA was a powerful and versatile "Wargames" DOS autodialer program that allowed you to dial any phone # (up to 10K) or mix of local and LD phone #s, in any order, over any length of time, whether busy or answered (your choice) and log the results (including phone call duration times) to the monitor, printer and-or disk file. Ideal as a phone call logger. And a real life saver as an auto redialer for emergency calls, and ideal for chronically busy and hold numbers.

Words=5.2K + disk text. $29 (SORRY, NO REFUNDS AS WE NO LONGER SUPPORT THIS PROGRAM AND SELL IT AS A COLLECTIBLE ONLY).

Top of Page       Topics & Titles Directories
ORDER FORMS: Mail/Fax Order Form    Phone Order: 505-321-1034 (9AM-6PM,M-F; 1PM-6PM,Sat)

MAJOR TOPIC #13:
INFAMOUS DIRTY-2-DOZEN Disk Files
High-Tech Security & Survival Topics
(Relevant to Topics herein. For listing of all D-2-D disks => www.consumertronics.net/dirty2doz.htm)

Disks are 3.5" PC Windows format, and each has a (Acrobat) PDF file of about 1 MB in size, consisting of several .TXT, .HTM, et al ASCII Text files appended to each other. The combined compressed PDF file size is about half the total sizes of its ASCII files. We carefully sifted through our gigantic and growing private underground database (much of it NOT on the Net) and found the best files relating to the exciting topics of this webpage. Each PDF file is raw and mostly unedited content (substantial formatting editing is done to much improve readability); therefore there may be some inaccuracies, omissions, duplications. To preserve the rich and colorful expressions of some of the original authors, we mostly left intact those file parts which are crude. Most of this material is controversial (but applicable countermeasures are also usually included), and may require adult maturity. We take no responsibility for anything we publish, including file content. To read these PDF files requires Acrobat Reader 4.x or higher (Adobe Acrobat is standard software not provided by us). Once you’ve loaded a file, you can use the Acrobat Find feature to quickly search for keywords. NOTE: All Sales Final! - No Refunds on all D-2-D PURCHASES.

PRICES: 1 DISK $19, 2 DISKs $34, 3 DISKs $47, EACH ADD'L $13 EACH

Top of Page       Topics & Titles Directories
ORDER FORMS: Mail/Fax Order Form    Phone Order: 505-321-1034 (9AM-6PM,M-F; 1PM-6PM,Sat)

Blacklisted 411 Magazine is back! Recall a decade or so ago that, Blacklisted 411 Magazine, 2600 Magazine and Tap were the best freedom-loving hacker and phreaker magazines. Now in a very similar format as before - what I personally find to be just as exciting and informative as ever - Blacklisted 411 Magazine is back! They are at: www.blacklisted411.net, and at P.O. Box 2506, Cypress, CA 90630. (again, as policy, we never recommend for or against another business or product, no matter how strongly we feel about it).

Customers, Contributors, Authors:
Relevant Topics, Titles, Chapters to this Webpage

SINGLE WORDS: The blackbox. The bluebox. The cellphone. The cellphones. The cheesebox. The cordless. The consultants. The consulting. The Consumertronics. The Consumertronics.net. The countermeasures. The duplex. The hacker. The organgebox. The payphone. The payphones. The phone. The phones. The phonebox. The phoneboxes. The phreaker. The phreakers. The phreaking. The redbox. The silverbox. The telecos. The telephone. The telephones. The telephonic. The tone. The tones. The tutorials. The voice.

A: The "acrylic box." The "all system security." The "analog voice." The "aqua box."

Answering Machine: The "answering machine abuse." The "answering machine abuses." The "answering machine accessory." The "answering machine accessories." The "answering machine boxes." The "answering machine boxing." The "answering machine bugs." The "answering machine bypasses." The "answering machine casing." The "answering machine charges." The "answering machine cheats." The "answering machine circuits." The "answering machine controllers." The "answering machine switchers." The "answering machine switches." The "answering machine descramblers." The "answering machine circuit designs." The "answering machine color boxes." The "answering machine companies." The "answering machine costs." The "answering machine countermeasures." The "answering machine crime." The "answering machine crimes." The "answering machine defeats." The "answering machine designs." The "answering machine device." The "answering machine devices." The "answering machine equipment." The "answering machine fraud." The "answering machine fraud countermeasures." The "answering machine frauds." The "answering machine hacks." The "answering machine hackers." The "answering machine harassment." The "answering machine hardware." The "answering machine invasion of privacy." The "answering machine operation." The "answering machine operators." The "answering machine pirates." The "answering machine phreaker." The "answering machine phreakers." The "answering machine phreaking." The "answering machine privacy." The "answering machine products." The "answering machine scam." The "answering machine scams." The "answering machine security." The "answering machine security system." The "answering machine service." The "answering machine services." The "answering machine social engineering." The "answering machine science project." The "answering machine science projects." The "answering machine scramblers." The "answering machine special projects." The "answering machine spoofs." The "answering machine spoofing." The "answering machine spying." The "answering machine system abuses." The "answering machine stalking." The "answering machine strategy." The "answering machine strategies." The "answering machine surveillance." The "answering machine survival." The "answering machine systems." The "answering machine system bypasses." The "answering machine system countermeasures." The "answering machine system crime." The "answering machine system crimes." The "answering machine system defeats." The "answering machine system privacy." The "answering machine system vulnerability." The "answering machine system vulnerabilities." The "answering machine tactic." The "answering machine tactics." The "answering machine taps." The "answering machine tapping." The "answering machine technique." The "answering machine techniques." The "answering machine technology." The "answering machine technologies." The "answering machine tempest methods." The "answering machine tutorials." The "answering machine vulnerability." The "answering machine vulnerabilities." The "automatic number identification."

B-E: The "beige box." The "black box." The "black boxes." The "black boxing." The "Blacklisted 411 Magazine." The "blast box." The "blotto box." The "blue box." The "blue boxes." The "blue boxing." The "bridging heads." The "brown box." The "bud box." The "bugged answering machine." The "bugged cellphone." The "bugged fax." The "bugged payphones." The "bugged phones." The "bugged telephones." The "bugging answering machines." The "bugging cellphones." The "bugging faxes." The "bugging payphones." The "bugging phones." The "bugging telephones." The "busy tone." The "call blocking." The "call forwarding." The "caller id." The "caller id defeats." The "caller id security." The "caller id vulnerabilities." The "caller identity." The "caller identity defeats." The "caller identity security." The "caller identity vulnerabilities." The "call waiting." The "Captain Crunch." The "cell towers." The "central office terminal." The "chartreuse box." The "cheese box." The "chrome box." The "clear box." The "CNG band stop filters." The "CNG beeps." The "CNG codes." The "CNG detection." The "CNG filters." The "CNG notch filters." The "CNG tone detection." The "color box." The "copper box." The "crime fighting." The "crimson box." The "dark box." The "dayglo box." The "dial tone." The "digital lines." The "digital phone lines." The "digital signal level." The "digital voice." The "diverter box." The "DLOC box." The "dual tone multi-frequency tones." The "dumpster diving." The "dumpster diving."

The "end fax spam." The "end fax spammers." The "end fax spamming." The "end junk faxes." The "end spam faxes." The "end unsolicited faxes." The "end unsolicited junk faxes." The "end unsolicited spam faxes." The "electronic serial number." The "extender box."

Cellphone: The "cellphone abuse." The "cellphone abuses." The "cellphone accessory." The "cellphone accessories." The "cellphone areas." The "cellphone bands." The "cellphone bill." The "cellphone bills." The "cellphone boxes." The "cellphone boxing." The "cellphone bugs." The "cellphone bypasses." The "cellphone casing." The "cellphone charges." The "cellphone cheats." The "cellphone circuits." The "cellphone circuit designs." The "cellphone color box." The "cellphone color boxes." The "cellphone company." The "cellphone companies." The "cellphone costs." The "cellphone countermeasures." The "cellphone coverage." The "cellphone crime." The "cellphone crimes." The "cellphone defeats." The "cellphone descramblers." The "cellphone designs." The "cellphone device." The "cellphone devices." The "cellphone equipment." The "cellphone frequencies." The "cellphone fraud." The "cellphone fraud countermeasures." The "cellphone frauds." The "cellphone hacks." The "cellphone hackers." The "cellphone harassment." The "cellphone hardware." The "cellphone invasion of privacy." The "cellphone long distance." The "cellphone operation." The "cellphone operators." The "cellphone pirates." The "cellphone phreaker." The "cellphone phreakers." The "cellphone phreaking." The "cellphone privacy." The "cellphone products." The "cellphone relays." The "cellphone receivers." The "cellphone scam." The "cellphone scams." The "cellphone scramblers." The "cellphone security." The "cellphone security system." The "cellphone service." The "cellphone services." The "cellphone sites." The "cellphone social engineering." The "cellphone science project." The "cellphone science projects." The "cellphone sites." The "cellphone special projects." The "cellphone spoofs." The "cellphone spoofing." The "cellphone spying." The "cellphone system abuses." The "cellphone stalking." The "cellphone strategy." The "cellphone strategies." The "cellphone surveillance." The "cellphone survival." The "cellphone systems." The "cellphone system bypasses." The "cellphone system countermeasures." The "cellphone system crime." The "cellphone system crimes." The "cellphone system defeats." The "cellphone system privacy." The "cellphone system vulnerability." The "cellphone system vulnerabilities." The "cellphone system security." The "cellphone tactic." The "cellphone tactics." The "cellphone taps." The "cellphone tapping." The "cellphone technique." The "cellphone techniques." The "cellphone technology." The "cellphone technologies." The "cellphone tempest methods." The "cellphone tones." The "cellphone towers." The "cellphone transmissions." The "cellphone tutorials." The "cellphone vulnerability." The "cellphone vulnerabilities."

Cellular: The "cellular abuse." The "cellular abuses." The "cellular accessory." The "cellular accessories." The "cellular areas." The "cellular bands." The "cellular bill." The "cellular bills." The "cellular boxes." The "cellular boxing." The "cellular bugs." The "cellular bypasses." The "cellular casing." The "cellular charges." The "cellular cheats." The "cellular circuits." The "cellular circuit designs." The "cellular color box." The "cellular color boxes." The "cellular company." The "cellular companies." The "cellular costs." The "cellular countermeasures." The "cellular coverage." The "cellular crime." The "cellular crimes." The "cellular defeats." The "cellular descramblers." The "cellular designs." The "cellular device." The "cellular devices." The "cellular equipment." The "cellular frequencies." The "cellular fraud." The "cellular fraud countermeasures." The "cellular frauds." The "cellular hacks." The "cellular hackers." The "cellular harassment." The "cellular hardware." The "cellular invasion of privacy." The "cellular long distance." The "cellular operation." The "cellular operators." The "cellular pirates." The "cellular phreaker." The "cellular phreakers." The "cellular phreaking." The "cellular privacy." The "cellular products." The "cellular relays." The "cellular receivers." The "cellular scam." The "cellular scams." The "cellular scramblers." The "cellular security." The "cellular security system." The "cellular service." The "cellular services." The "cellular sites." The "cellular social engineering." The "cellular science project." The "cellular science projects." The "cellular sites." The "cellular special projects." The "cellular spoofs." The "cellular spoofing." The "cellular spying." The "cellular system abuses." The "cellular stalking." The "cellular strategy." The "cellular strategies." The "cellular surveillance." The "cellular survival." The "cellular systems." The "cellular system bypasses." The "cellular system countermeasures." The "cellular system crime." The "cellular system crimes." The "cellular system defeats." The "cellular system privacy." The "cellular system vulnerability." The "cellular system vulnerabilities." The "cellular system security." The "cellular tactic." The "cellular tactics." The "cellular taps." The "cellular tapping." The "cellular technique." The "cellular techniques." The "cellular technology." The "cellular technologies." The "cellular tempest methods." The "cellular tones." The "cellular towers." The "cellular transmissions." The "cellular tutorials." The "cellular vulnerability." The "cellular vulnerabilities."

Cellular Phone: The "cellular phone abuse." The "cellular phone abuses." The "cellular phone accessory." The "cellular phone accessories." The "cellular phone areas." The "cellular phone bands." The "cellular phone bill." The "cellular phone bills." The "cellular phone boxes." The "cellular phone boxing." The "cellular phone bugs." The "cellular phone bypasses." The "cellular phone casing." The "cellular phone charges." The "cellular phone cheats." The "cellular phone circuits." The "cellular phone circuit designs." The "cellular phone color box." The "cellular phone color boxes." The "cellular phone company." The "cellular phone companies." The "cellular phone costs." The "cellular phone countermeasures." The "cellular phone coverage." The "cellular phone crime." The "cellular phone crimes." The "cellular phone defeats." The "cellular phone descramblers." The "cellular phone designs." The "cellular phone device." The "cellular phone devices." The "cellular phone equipment." The "cellular phone frequencies." The "cellular phone fraud." The "cellular phone fraud countermeasures." The "cellular phone frauds." The "cellular phone hacks." The "cellular phone hackers." The "cellular phone harassment." The "cellular phone hardware." The "cellular phone invasion of privacy." The "cellular phone long distance." The "cellular phone operation." The "cellular phone operators." The "cellular phone pirates." The "cellular phone phreaker." The "cellular phone phreakers." The "cellular phone phreaking." The "cellular phone privacy." The "cellular phone products." The "cellular phone relays." The "cellular phone receivers." The "cellular phone scam." The "cellular phone scams." The "cellular phone scramblers." The "cellular phone security." The "cellular phone security system." The "cellular phone service." The "cellular phone services." The "cellular phone sites." The "cellular phone social engineering." The "cellular phone science project." The "cellular phone science projects." The "cellular phone sites." The "cellular phone special projects." The "cellular phone spoofs." The "cellular phone spoofing." The "cellular phone spying." The "cellular phone system abuses." The "cellular phone stalking." The "cellular phone strategy." The "cellular phone strategies." The "cellular phone surveillance." The "cellular phone survival." The "cellular phone systems." The "cellular phone system bypasses." The "cellular phone system countermeasures." The "cellular phone system crime." The "cellular phone system crimes." The "cellular phone system defeats." The "cellular phone system privacy." The "cellular phone system vulnerability." The "cellular phone system vulnerabilities." The "cellular phone system security." The "cellular phone tactic." The "cellular phone tactics." The "cellular phone taps." The "cellular phone tapping." The "cellular phone technique." The "cellular phone techniques." The "cellular phone technology." The "cellular phone technologies." The "cellular phone tempest methods." The "cellular phone tones." The "cellular phone towers." The "cellular phone transmissions." The "cellular phone tutorials." The "cellular phone vulnerability." The "cellular phone vulnerabilities."

Cordless Phone: The "cordless phone abuse." The "cordless phone abuses." The "cordless phone accessory." The "cordless phone accessories." The "cordless phone bands." The "cordless phone bill." The "cordless phone bills." The "cordless phone boxes." The "cordless phone boxing." The "cordless phone bugs." The "cordless phone bypasses." The "cordless phone casing." The "cordless phone charges." The "cordless phone cheats." The "cordless phone circuits." The "cordless phone circuit designs." The "cordless phone color box." The "cordless phone color boxes." The "cordless phone companies." The "cordless phone costs." The "cordless phone countermeasures." The "cordless phone crime." The "cordless phone crimes." The "cordless phone defeats." The "cordless phone descramblers." The "cordless phone designs." The "cordless phone device." The "cordless phone devices." The "cordless phone equipment." The "cordless phone frequencies." The "cordless phone fraud." The "cordless phone fraud countermeasures." The "cordless phone frauds." The "cordless phone hacks." The "cordless phone hackers." The "cordless phone harassment." The "cordless phone hardware." The "cordless phone invasion of privacy." The "cordless phone operation." The "cordless phone operators." The "cordless phone pirates." The "cordless phone phreaker." The "cordless phone phreakers." The "cordless phone phreaking." The "cordless phone privacy." The "cordless phone products." The "cordless phone receivers." The "cordless phone scam." The "cordless phone scams." The "cordless phone scramblers." The "cordless phone security." The "cordless phone security system." The "cordless phone service." The "cordless phone services." The "cordless phone sites." The "cordless phone social engineering." The "cordless phone science project." The "cordless phone science projects." The "cordless phone special projects." The "cordless phone spoofs." The "cordless phone spoofing." The "cordless phone spying." The "cordless phone system abuses." The "cordless phone stalking." The "cordless phone strategy." The "cordless phone strategies." The "cordless phone surveillance." The "cordless phone survival." The "cordless phone systems." The "cordless phone system security." The "cordless phone tactic." The "cordless phone tactics." The "cordless phone taps." The "cordless phone tapping." The "cordless phone technique." The "cordless phone techniques." The "cordless phone technology." The "cordless phone technologies." The "cordless phone tempest methods." The "cordless phone tones." The "cordless phone tutorials." The "cordless phone vulnerability." The "cordless phone vulnerabilities."

Fax: The "fax abuse." The "fax abuses." The "fax accessory." The "fax accessories." The "fax attacks." The "fax boxes." The "fax boxing." The "fax bugs." The "fax bypasses." The "fax casing." The "fax charges." The "fax cheats." The "fax circuits." The "fax codes." The "fax CNG beeps." The "fax CNG codes." The "fax CNG detection." The "fax CNG tone detection." The "fax commo." The "fax communications." The "fax crime countermeasures." The "fax counterfeiting." The "fax denial of service."The "fax descramblers." The "fax circuit designs." The "fax color boxes." The "fax companies." The "fax compression." The "fax costs." The "fax counterfeiting." The "fax countermeasures." The "fax crime." The "fax crimes." The "fax decryption." The "fax defeats." The "fax designs." The "fax device." The "fax devices." The "fax encryption." The "fax equipment." The "fax fraud." The "fax fraud countermeasures." The "fax frauds." The "fax hacks." The "fax hackers." The "fax harassment." The "fax hardware." The "fax interceptions." The "fax interference." The "fax invasion of privacy." The "fax modems." The "fax on demand services." The "fax operation." The "fax operators." The "fax pirates." The "fax phreaker." The "fax phreakers." The "fax phreaking." The "fax port codes." The "fax port transfer codes." The "fax privacy." The "fax products." The "fax protocols." The "fax sabotage." The "fax scam." The "fax scams." The "fax scramblers." The "fax security." The "fax security system." The "fax servers." The "fax service." The "fax services." The "fax social engineering." The "fax science project." The "fax science projects." The "fax special projects." The "fax spoofs." The "fax spoofing." The "fax spying." The "fax stalking." The "fax strategy." The "fax strategies." The "fax surveillance." The "fax survival." The "fax systems." The "fax system bypasses." The "fax system countermeasures." The "fax system crime." The "fax system crimes." The "fax system defeats." The "fax system privacy." The "fax system vulnerability." The "fax system vulnerabilities." The "fax system security." The "fax tactic." The "fax tactics." The "fax taps." The "fax tapping." The "fax technique." The "fax techniques." The "fax technology." The "fax technologies." The "fax tempest methods." The "fax tones." The "fax transfer codes." The "fax transfers." The "fax tutorials." The "fax vulnerability." The "fax vulnerabilities."

Fax Machine: The "fax blasters." The "fax blasting." The "fax business." The "fax control methods." The "fax controllers." The "fax filter designs." The "fax filter methods." The "fax filter techniques." The "fax filtering methods." The "fax filtering techniques." The "fax machine abuse." The "fax machine abuses." The "fax machine accessory." The "fax machine accessories." The "fax machine boxes." The "fax machine boxing." The "fax machine bugs." The "fax machine bypasses." The "fax machine casing." The "fax machine charges." The "fax machine cheats." The "fax machine circuits." The "fax machine descramblers." The "fax machine circuit designs." The "fax machine color boxes." The "fax machine companies." The "fax machine costs." The "fax machine countermeasures." The "fax machine crime." The "fax machine crimes." The "fax machine defeats." The "fax machine designs." The "fax machine device." The "fax machine devices." The "fax machine equipment." The "fax machine fraud." The "fax machine fraud countermeasures." The "fax machine frauds." The "fax machine hacks." The "fax machine hackers." The "fax machine harassment." The "fax machine hardware." The "fax machine invasion of privacy." The "fax machine modifications." The "fax machine operation." The "fax machine operators." The "fax machine pirates." The "fax machine phreaker." The "fax machine phreakers." The "fax machine phreaking." The "fax machine privacy." The "fax machine products." The "fax machine scam." The "fax machine scams." The "fax machine security." The "fax machine security system." The "fax machine service." The "fax machine services." The "fax machine social engineering." The "fax machine science project." The "fax machine science projects." The "fax machine scramblers." The "fax machine special projects." The "fax machine spoofs." The "fax machine spoofing." The "fax machine spying." The "fax machine system abuses." The "fax machine stalking." The "fax machine strategy." The "fax machine strategies." The "fax machine surveillance." The "fax machine survival." The "fax machine systems." The "fax machine system bypasses." The "fax machine system countermeasures." The "fax machine system crime." The "fax machine system crimes." The "fax machine system defeats." The "fax machine system privacy." The "fax machine system vulnerability." The "fax machine system vulnerabilities." The "fax machine tactic." The "fax machine tactics." The "fax machine taps." The "fax machine tapping." The "fax machine technique." The "fax machine techniques." The "fax machine technology." The "fax machine technologies." The "fax machine tempest methods." The "fax machine tones." The "fax machine tutorials." The "fax machine vulnerability." The "fax machine vulnerabilities." The "fax machines." The "fax spammers." The "fax spamming." The "fax switchers." The "fax switches."

F-G: The "family radio service." The "fiber optic cable." The "fight crime." The "filter fax spam." The "filter fax spammers." The "filter fax spamming." The "filter junk faxes." The "filter spam faxes." The "filter unsolicited faxes." The "filter unsolicited junk faxes." The "filter unsolicited spam faxes." The "filter out fax spam." The "filter out fax spammers." The "filter out fax spamming." The "filter out junk faxes." The "filter out spam faxes." The "filter out unsolicited faxes." The "filter out unsolicited junk faxes." The "filter out unsolicited spam faxes." The "free long distance calls." The "free long distance phone calls." The "free long distance telephone calls." The "free payphone calls." The "free overseas calls." The "free phone calls." The "free telephone calls." The "full-duplex." The "general mobile radio service." The "gold box." The "green box."

H: The "half-duplex." The "high tech books." The "hi-tech books." The "high tech consultants." The "hi-tech consultants." The "high tech consulting." The "hi-tech consulting." The "high tech manuals." The "hi-tech manuals." The "high tech offers." The "hi-tech offers." The "high tech products." The "hi-tech products." The "high tech publications." The "hi-tech publications." The "high tech services." The "hi-tech services." The "high tech security books." The "hi-tech security books." The "high tech security consultants." The "hi-tech security consultants." The "high tech security consulting." The "hi-tech security consulting." The "high tech security manuals." The "hi-tech security manuals." The "high tech security offers." The "hi-tech security offers." The "high tech security products." The "hi-tech security products." The "high tech security publications." The "hi-tech security publications." The "high tech security services." The "hi-tech security services." The "high tech survival books." The "hi-tech survival books." The "high tech survival consultants." The "hi-tech survival consultants." The "high tech survival consulting." The "hi-tech survival consulting." The "high tech survival manuals." The "hi-tech survival manuals." The "high tech survival offers." The "hi-tech survival offers." The "high tech survival products." The "hi-tech survival products." The "high tech survival publications." The "hi-tech survival publications." The "high tech survival services." The "hi-tech survival services." The "how to build a blackbox." The "how to build a black box." The "how to build a bluebox." The "how to build a blue box." The "how to build a cheesebox." The "how to build a cheese box." The "how to build an orangebox." The "how to build an orange box." The "how to build a phone box." The "how to build a phone color box." The "how to build a redbox." The "how to build a red box." The "how to build a silverbox." The "how to build a silver box." The "how to build blackboxes." The "how to build black boxes." The "how to build blueboxes." The "how to build blue boxes." The "how to build cheeseboxes." The "how to build cheese boxes." The "how to build orangeboxes." The "how to build orange boxes." The "how to build phone boxes." The "how to build phone color boxes." The "how to build redboxes." The "how to build red boxes." The "how to build silverboxes." The "how to build silver boxes."

I-O: The "infinity box." The "internet phone scams." The "internet telephone calls." The "jack box." The "light box." The "line interface unit." The "lineman's handsets." The "lineman's test sets." The "line switch unit." The "long distance bill." The "long distance charges." The "long distance costs." The "lunch box." The "ma bell." The "magenta box." The "mauve box." The "missing calls." The "neon box." The "noise box." The "off-hook problems." The "olive box." The "orange box." The "orange boxes." The "orange boxing."

PAA-PAX: The "party box." The "pearl box." The "pink box." The "purple box."

Pager: The "pager abuse." The "pager abuses." The "pager accessory." The "pager accessories." The "pager beeper manual." The "pager boxes." The "pager boxing." The "pager bugs." The "pager bypasses." The "pager casing." The "pager charges." The "pager cheats." The "pager circuits." The "pager descramblers." The "pager circuit designs." The "pager color boxes." The "pager companies." The "pager costs." The "pager countermeasures." The "pager crime." The "pager crimes." The "pager defeats." The "pager designs." The "pager device." The "pager devices." The "pager equipment." The "pager fraud." The "pager fraud countermeasures." The "pager frauds." The "pager hacks." The "pager hackers." The "pager harassment." The "pager hardware." The "pager invasion of privacy." The "pager operation." The "pager operators." The "pager pirates." The "pager phreaker." The "pager phreakers." The "pager phreaking." The "pager privacy." The "pager products." The "pager scam." The "pager scams." The "pager security." The "pager security system." The "pager service." The "pager services." The "pager social engineering." The "pager science project." The "pager science projects." The "pager scramblers." The "pager special projects." The "pager spoofs." The "pager spoofing." The "pager spying." The "pager system abuses." The "pager stalking." The "pager strategy." The "pager strategies." The "pager surveillance." The "pager survival." The "pager systems." The "pager system bypasses." The "pager system countermeasures." The "pager system crime." The "pager system crimes." The "pager system defeats." The "pager system privacy." The "pager system vulnerability." The "pager system vulnerabilities." The "pager tactic." The "pager tactics." The "pager taps." The "pager tapping." The "pager technique." The "pager techniques." The "pager technology." The "pager technologies." The "pager tempest methods." The "pager tones." The "pager tutorials." The "pager vulnerability." The "pager vulnerabilities."

Payphone: The "payphone abuse." The "payphone abuses." The "payphone bill." The "payphone bills." The "payphone boxes." The "payphone boxing." The "payphone bugs." The "payphone bypasses." The "payphone casing." The "payphone charges." The "payphone cheats." The "payphone circuits." The "payphone circuit designs." The "payphone color box." The "payphone color boxes." The "payphone color boxing." The "payphone color box defeats." The "payphone company." The "payphone companies." The "payphone costs." The "payphone color box countermeasures." The "payphone countermeasures." The "payphone crime." The "payphone crimes." The "payphone defeats." The "phone descramblers." The "payphone designs." The "payphone device." The "payphone devices." The "payphone equipment." The "payphone fraud." The "payphone fraud countermeasures." The "payphone frauds." The "payphone hacks." The "payphone hackers." The "payphone harassment." The "payphone hardware." The "payphone invasion of privacy." The "payphone long distance." The "payphone operation." The "payphone operators." The "payphone pirates." The "payphone phreaker." The "payphone phreakers." The "payphone phreaking." The "payphone privacy." The "payphone scam." The "payphone scams." The "phone scramblers." The "payphone security." The "payphone security system." The "payphone service." The "payphone services." The "payphone social engineering." The "payphone special projects." The "payphone spoofs." The "payphone spoofing." The "payphone spying." The "payphone system abuses." The "payphone stalking." The "payphone strategy." The "payphone strategies." The "payphone surveillance." The "payphone survival." The "payphone systems." The "payphone system bypasses." The "payphone system countermeasures." The "payphone system crime." The "payphone system crimes." The "payphone system defeats." The "payphone system privacy." The "payphone system vulnerability." The "payphone system vulnerabilities." The "payphone system security." The "payphone system security bypasses." The "payphone system security countermeasures." The "payphone system security defeats." The "payphone system security vulnerabilities." The "payphone tactic." The "payphone tactics." The "payphone taps." The "payphone tapping." The "payphone technique." The "payphone techniques." The "payphone technology." The "payphone technologies." The "payphone tempest methods." The "payphone tones." The "payphone tutorials." The "payphone vulnerability." The "payphone vulnerabilities."

PBX: The "pbx abuse." The "pbx abuses." The "pbx boxes." The "pbx boxing." The "pbx bugs." The "pbx bypasses." The "pbx casing." The "pbx charges." The "pbx cheats." The "pbx circuits." The "pbx descramblers." The "pbx circuit designs." The "pbx color boxes." The "pbx companies." The "pbx costs." The "pbx countermeasures." The "pbx crime." The "pbx crimes." The "pbx defeats." The "pbx designs." The "pbx device." The "pbx devices." The "pbx equipment." The "pbx fraud." The "pbx fraud countermeasures." The "pbx frauds." The "pbx hacks." The "pbx hackers." The "pbx harassment." The "pbx hardware." The "pbx invasion of privacy." The "pbx operation." The "pbx operators." The "pbx pirates." The "pbx phreaker." The "pbx phreakers." The "pbx phreaking." The "pbx privacy." The "pbx products." The "pbx scam." The "pbx scams." The "pbx security." The "pbx security system." The "pbx service." The "pbx services." The "pbx social engineering." The "pbx science project." The "pbx science projects." The "pbx scramblers." The "pbx special projects." The "pbx spoofs." The "pbx spoofing." The "pbx spying." The "pbx system abuses." The "pbx stalking." The "pbx strategy." The "pbx strategies." The "pbx surveillance." The "pbx survival." The "pbx systems." The "pbx system bypasses." The "pbx system countermeasures." The "pbx system crime." The "pbx system crimes." The "pbx system defeats." The "pbx system privacy." The "pbx system vulnerability." The "pbx system vulnerabilities." The "pbx tactic." The "pbx tactics." The "pbx taps." The "pbx tapping." The "pbx technique." The "pbx techniques." The "pbx technology." The "pbx technologies." The "pbx tempest methods." The "pbx tones." The "pbx tutorials." The "pbx vulnerability." The "pbx vulnerabilities."

Phone: The "phone abuse." The "phone abuses." The "phone accessory." The "phone accessories." The "phone bill." The "phone billing." The "phone bills." The "phone boxes." The "phone boxing." The "phone controllers." The "phone line controllers." The "phone bug detectors." The "phone bugs." The "phone bypasses." The "phone call length limiters." The "phone cards." The "phone casing." The "phone charges." The "phone cheats." The "phone circuits." The "phone circuit designs." The "phone color box." The "phone color boxes." The "phone color boxing." The "phone color box defeats." The "phone company." The "phone companies." The "phone costs." The "phone color box countermeasures." The "phone countermeasures." The "phone crime." The "phone crimes." The "phone defeats." The "phone designs." The "phone device." The "phone devices." The "phone dtmf decoders." The "phone dtmf encoders." The "phone equipment." The "phone fraud." The "phone fraud countermeasures." The "phone frauds." The "phone hacks." The "phone hackers." The "phone harassment." The "phone hardware." The "phone invasion of privacy." The "phone line controllers." The "phone line privacy." The "phone line security." The "phone line simulators." The "phone lines." The "phone long distance."

The "phone operation." The "phone operators." The "phone pirates." The "phone phreaker." The "phone phreakers." The "phone phreaking." The "phone privacy." The "phone products." The "phone scam." The "phone scams." The "phone safety." The "phone security." The "phone security system." The "phone service." The "phone services." The "phone simulators." The "phone social engineering." The "phone science project." The "phone science projects." The "phone special projects." The "phone spoofs." The "phone spoofing." The "phone spying." The "phone system abuses." The "phone stalking." The "phone strategy." The "phone strategies." The "phone surveillance." The "phone line switchers." The "phone line switches." The "phone switchers." The "phone switches." The "phone survival." The "phone systems." The "phone system bypasses." The "phone system countermeasures." The "phone system crime." The "phone system crimes." The "phone system defeats." The "phone system privacy." The "phone system vulnerability." The "phone system vulnerabilities." The "phone system security." The "phone system security bypasses." The "phone system security countermeasures." The "phone system security defeats." The "phone system security vulnerabilities." The "phone tactic." The "phone tactics." The "phone tap detectors." The "phone taps." The "phone tapping." The "phone technique." The "phone techniques." The "phone technology." The "phone technologies." The "phone tempest methods." The "phone tones." The "phone tutorials." The "phone vulnerability." The "phone vulnerabilities."

PHR-PZ: The "phreaking countermeasures." The "phreaking phones." The "phreaking telephones." The "pulse amplitude modulated." The "pulse code modulated." The "pulse frequency modulated."

Q-T: The "rainbow box." The "razz box." The "red box." The "red boxes." The "red boxing." The "remote terminal." The "ring tone."

The "scarlet box." The "science project." The "science project." The "shoulder surfing." The "silent fax machines." The "silver box." The "silver boxes." The "silver boxing." The "social engineer." The "social engineering." The "special projects." The "static box." The "stop fax spam." The "stop fax spammers." The "stop fax spamming." The "stop junk faxes." The "stop spam faxes." The "stop unsolicited faxes." The "stop unsolicited junk faxes." The "stop unsolicited spam faxes." The "switch box." The "synchronous optical networks."

The "tan box." The "tapped answering machine." The "tapped cellphone." The "tapped fax." The "tapped payphones." The "tapped phones." The "tapped telephones." The "tapping answering machines." The "tapping cellphones." The "tapping faxes." The "tapping payphones." The "tapping phones." The "tapping telephones." The "theft of services." The "theft of fax services." The "theft of pager services." The "theft of payphone services." The "theft of pbx services." The "theft of phone services." The "theft of telephone services." The "theft of voice mail services." The "toll free calls." The "toll free numbers." The "toll fraud devices." The "toll frauds." The "tolled calls." The "tron box." The "TV cable box."

Telephone: The "telephone abuse." The "telephone abuses." The "telephone accessory." The "telephone accessories." The "telephone bill." The "telephone bills." The "telephone boxes." The "telephone boxing." The "telephone bugs." The "telephone bypasses." The "telephone casing." The "telephone charges." The "telephone cheats." The "telephone circuits." The "telephone circuit designs." The "telephone color box." The "telephone color boxes." The "telephone color boxing." The "telephone color box defeats." The "telephone company." The "telephone companies." The "telephone controllers." The "telephone line controllers." The "telephone costs." The "telephone color box countermeasures." The "telephone countermeasures." The "telephone crime." The "telephone crimes." The "telephone descramblers." The "telephone defeats." The "telephone designs." The "telephone device." The "telephone devices." The "telephone equipment." The "telephone fraud." The "telephone fraud countermeasures." The "telephone frauds." The "telephone hacks." The "telephone hackers." The "telephone harassment." The "telephone hardware." The "telephone invasion of privacy." The "telephone lines." The "telephone long distance." The "telephone operation." The "telephone operators." The "telephone pirates." The "telephone phreaker." The "telephone phreakers." The "telephone phreaking." The "telephone privacy." The "telephone products." The "telephone scam." The "telephone scams." The "telephone science project." The "telephone science projects." The "telephone security." The "telephone security system." The "telephone service." The "telephone services." The "telephone social engineering." The "telephone scramblers." The "telephone special projects." The "telephone spoofs." The "telephone spoofing." The "telephone spying." The "telephone stalking." The "telephone strategy." The "telephone strategies." The "telephone surveillance." The "telephone survival." The "telephone line switchers." The "telephone line switches." The "telephone switchers." The "telephone switches." The "telephone system." The "telephone system abuses." The "telephone system bypasses." The "telephone system countermeasures." The "telephone system crime." The "telephone system crimes." The "telephone system defeats." The "telephone system privacy." The "telephone system vulnerability." The "telephone system vulnerabilities." The "telephone system security." The "telephone system security bypasses." The "telephone system security countermeasures." The "telephone system security defeats." The "telephone system security vulnerabilities." The "telephone tactic." The "telephone tactics." The "telephone taps." The "telephone tapping." The "telephone technique." The "telephone techniques." The "telephone technology." The "telephone technologies." The "telephone tempest methods." The "telephone tones." The "telephone tutorials." The "telephone vulnerability." The "telephone vulnerabilities."

Voice Mail: The "voice mail abuse." The "voice mail abuses." The "voice mail boxes." The "voice mail boxing." The "voice mail bugs." The "voice mail bypasses." The "voice mail casing." The "voice mail charges." The "voice mail cheats." The "voice mail descramblers." The "voice mail circuit designs." The "voice mail color boxes." The "voice mail companies." The "voice mail costs." The "voice mail countermeasures." The "voice mail crime." The "voice mail crimes." The "voice mail defeats." The "voice mail designs." The "voice mail device." The "voice mail devices." The "voice mail equipment." The "voice mail fraud." The "voice mail fraud countermeasures." The "voice mail frauds." The "voice mail hacks." The "voice mail hackers." The "voice mail harassment." The "voice mail hardware." The "voice mail invasion of privacy." The "voice mail operation." The "voice mail operators." The "voice mail pirates." The "voice mail phreaker." The "voice mail phreakers." The "voice mail phreaking." The "voice mail privacy." The "voice mail products." The "voice mail scam." The "voice mail scams." The "voice mail security." The "voice mail security system." The "voice mail service." The "voice mail services." The "voice mail social engineering." The "voice mail science project." The "voice mail science projects." The "voice mail scramblers." The "voice mail special projects." The "voice mail spoofs." The "voice mail spoofing." The "voice mail spying." The "voice mail system abuses." The "voice mail stalking." The "voice mail strategy." The "voice mail strategies." The "voice mail surveillance." The "voice mail survival." The "voice mail systems." The "voice mail system bypasses." The "voice mail system countermeasures." The "voice mail system crime." The "voice mail system crimes." The "voice mail system defeats." The "voice mail system privacy." The "voice mail system vulnerability." The "voice mail system vulnerabilities." The "voice mail tactic." The "voice mail tactics." The "voice mail taps." The "voice mail tapping." The "voice mail technique." The "voice mail techniques." The "voice mail technology." The "voice mail technologies." The "voice mail tempest methods." The "voice mail tones." The "voice mail tutorials." The "voice mail vulnerability." The "voice mail vulnerabilities."

U-Z: The "unsolicited faxes." The "unsolicited junk faxes." The "unsolicited spam faxes." The "violet box." The "voice frequency signals." The "voice quality." The "white box." The "wireless phone." The "wireless phones." The "wireless technology." The "wireless technologies." The "wireless telephone." The "wireless telephones." The "yellow box."

HARDWARE & SPECIAL SERVICES (for legal educational and/or entertainment purposes only)! Our exciting books and manuals are described on our Online Catalog webpage: www.consumertronics.net/index2.htm. Many of these include comprehensive circuit diagrams and functional descriptions. We designed and built here almost all of these circuits (and many, many more), and sold them as our Off-the-Shelf Hardware and Special Projects. We no longer sell functional hardware that we make. We do sell nonfunctional hardware of what we used to make - mostly electronic (www.consumertronics.net/oshpast.html) strictly as salvage: www.consumertronics.net/salvage.html (LIMITED QUANTITIES REMAINING! - once sold there will be no more! - buy all you need as soon as possible - before they are all forever gone!), and also strictly as very realistically-looking models, mockups, replicas and novelties as SPECIAL PROJECTS: www.consumertronics.net/spaf-spp.html. NOTE: For salvage and SP hardware, while priced very low compared to the original functional versions, we provide no guarantees, support, user manuals, schematics, batteries or refunds (Special Projects also does consulting and research services).
         HARDWARE SALES: We also sell functional hardware which others make as surplus and salvage: For comprehensive list of 10,000s of item types we Sell, Buy and Trade for (including in exchange for our popular books and manuals), see our popular: ABQ-Techzonics - 1,000,000 integrated circuits (ICs) + 1,000,000 other small electronic parts + plus electronic test equipment + many other high-tech electronic and non-electronic Items.
        LONE STAR CONSULTING, INC. (7250 N. Mesa, Suite C, PMB 70, El Paso, TX 79912, 915-474-0334, www.lonestarconsultinginc.com) makes customized device types much closer than any other company we know of to the popular and exciting functional device types we used to make and sell as Special Projects and Off-the-Shelf Hardware - plus many other device types - plus extensive invention prototyping and invention consulting services - plus they also sell Historical Diagrams for many controversial device types! Their device types are described at ==> LONE STAR CONSULTING, INC. NOTE: We are not LONE STAR CONSULTING, INC. Neither one owns the other, is a subsidiary of the other, or is responsible for the other. Should you wish to do business with Lone Star Consulting, Inc., please contact them DIRECTLY as you would any other business (as with all purchases one makes, you should check out all available sources for items of interest). Furthermore, Lone Star Consulting, Inc. has an excellent free tutorial on mind control and electronic attacks (if you go to it, please return here): FREE MIND CONTROL /ELECTRONIC ATTACK TUTORIAL. As policy, we never recommend or endorse for or against any other company, product or service - even if you find a link for it on our webpages. (Our privacy and other policies are at: www.consumertronics.net/policies.htm).
       OTHER SPECIAL SERVICES: NO AC ADAPTER EQUIPMENT RESCUE: Lost or broken AC Power Adapter to your valuable equipment too hard to replace? We have 100s of AC adapters, and may be able to help: www.consumertronics.net/no-adapter-rescue.htm. INTERNET AUCTION SERVICES: We also offer Net Auction/Sales Services (eBay, Amazon.com, Craigslist, ABQ-Techzonics, etc.) for your stuff that you don't need so much any more but are just too busy to sell yourself: www.consumertronics.net/netauctions.htm. HOME/OFFICE TUTORING SERVICES: We also offer home and office tutoring services (Albuquerque, NM only): www.consumertronics.net/tutorservices.pdf. PROFESSIONAL PERSONAL PROPERTY APPRAISALS: We also offer Professional Property Appraisal Services (non-Real Estate): www.consumertronics.net/ppa/. COMPUTER SERVICING: Need to get your computer or software repaired, installed, modified, upgraded, updated, tuned-up, or lost data retrieved? Computer damaged by or inflicted with viruses, worms, trojan horses, adware/spyware, popups, other malware, and/or spam? Let us computer geeks confidentially service your computer hardware and software needs: www.consumertronics.net/compservice.htm. LEGAL RESEARCH SERVICES: Need/interested in being educated about civil or criminal legal topics important to you? Let us provide you relatively very low cost legal research. John Williams is an experienced lay litigant (District Court + Appeals Court), lecturer of "pro se" law, and a prolific legal researcher, legal author and legal publisher of legal books (we are not licensed attorneys and we don't offer legal advice, legal opinion or legal claims; New Mexico residents only): www.consumertronics.net/legalresearch.htm.
echzonics.
        OTHER SPECIAL SERVICES: INTERNET AUCTION SERVICES: We also offer Net Auction Services (eBay, iOffer, Yahoo!, etc): www.consumertronics.net/netauctions/. PROFESSIONAL PERSONAL PROPERTY APPRAISALS: We also offer Professional Property Appraisal Services (non-Real Estate): www.consumertronics.net/ppa/. COMPUTER SERVICING: Need to get your computer or software repaired, installed, modified, upgraded, updated, tuned-up, or lost data retrieved? Computer damaged by or inflicted with viruses, worms, trojan horses, adware/spyware, popups and/or spam? Let us computer geeks confidentially service your computer hardware and software needs: www.consumertronics.net/compservice.htm. LEGAL RESEARCH SERVICES: Need/interested in being educated about civil or criminal legal topics important to you? Let me provide you relatively very low cost legal research. I am an experienced lay pro se litigant (District Court + Appeals Court), lecturer of pro se law, and a prolific researcher, writer and publisher of legal books (I am not an attorney and I don't offer legal advice; New Mexico residents only): www.consumertronics.net/legalresearch.htm.
        LONE STAR CONSULTING, INC. (7250 N. Mesa, Suite C, PMB 70, El Paso, TX 79912, 915-474-0334) does much of the incredible and exciting functional hardware we used to make - mostly electronic (plus many other similar items we did not previously make - plus they also sell Historical Diagrams for much of their Hardware types!), described at: www.lonestarconsultinginc.com/devices.htm (not a hotlink). NOTE: We are not LONE STAR CONSULTING, INC. Neither one owns the other, is a subsidiary of the other, or is responsible for the other. Should you wish to do business with them, please contact them DIRECTLY (as with all purchases one makes, you should check out all available sources for the item of interest). As policy, we never recommend or endorse for or against any other company, product or service. (Our privacy and other policies are at: www.consumertronics.net/policies.htm).

WE TRADE, BUY, SELL MANY THINGS!
Prefer to trade rather than buy our products and services? Have items you no longer need but we do? Short of cash? We are interested in trading and buying (and also selling) numerous electronic parts, electronic test equipment, hardware, modern computer systems, computer peripherals, software, printing / publishing equipment / parts / supplies, books, small parts, scientific equipment, industrial equipment, commercial equipment, et al - too numerous to list here! For details of some of the items we are interested in trading for or buying from you that can eliminate or much reduce your out-of-pocket expenses for, see our items4trade.htm website, CLICK HERE =>
Items for Trade/Items to Buy/Items for Sale


Great Consumertronics Products and Services!

       IMAGE SPONSORED BY:
 Consumertronics
 Lone Star Consulting, Inc.
 ABQ-Techzonics
       REPRINT POW-MIA IMAGE=>
             ON YOUR WEBSITE

Copyright © 1998-2014, Consumertronics. All rights reserved.

NOTE: By policy, we never recommend for or against, approve or disapprove, sponsor, endorse, support, guarantee, or take any responsibility for any of the content of any non-Consumertronics webpage, website, advertisement, publication or other statement EVEN IF WE HAVE PROVIDED A HOTLINK TO IT. And by policy, we never recommend for or against, approve or disapprove, sponsor, endorse, support, guarantee, or assume any liability or any other responsibility for any non-Consumertronics company, product or service EVEN IF WE HAVE PROVIDED A HOTLINK TO IT and EVEN IF WE HAVE DISCUSSED IT OR INFORMED YOU ABOUT IT on a webpage, or by phone, email, mail or fax, or by any other means of communications. For more information on our policies, please refer to our policies.htm webpage.
Test Source Links only (no visitor use): Source-1, Source-2, Source-3, Source-4, Source-5, Source-6, Source-7, Source-10, Source-11

Site Map