References
- 2DR112 Pennsylvania Digital Modes 27mhz CB radio. (2016). https://2dr112.wordpress.com/
- Bury, J. (2007). From the archives: The U.S. and West German agent radio ciphers. Cryptologia, 31(4), 343–357.
- Bury, J. (2012a). Finding needles in a haystack: The Eastern Bloc’s counterintelligence capabilities. International Journal of Intelligence and CounterIntelligence, 25(4), 727–770.
- Bury, J. (2012b). Project Kalina: The Lotos operation conundrum. Cryptologia, 36(2), 119–128.
- Can Amateur Radio Talk to CB? (2022). Ham Radio Planet. https://hamradioplanet.com/can-amateur-radio-talk-to-cb/.
- Christensen, C. (2021). Radio war: The secret espionage war of the radio security service 1938-1946. Cryptologia, pre-print.
- Citizens Band Radio Service. (2017). Federal Communications Commission. https://www.fcc.gov/wireless/bureau-divisions/mobility-division/citizens-band-radio-service-cbrs.
- Cluley, G. (2011). German ‘ Government ‘ R2D2 Trojan FAQ. https://nakedsecurity.sophos.com/2011/10/10/german-government-r2d2-trojan-faq/.
- Csete, A. (2021). Gqrx SDR. https://gqrx.dk/.
- CubicSDR. (2018). https://cubicsdr.com/.
- Cunliffe, K. S. (2021). Hard target espionage in the information era: new challenges for the second oldest profession. Intelligence and National Security, 36(7), 1018–1034.
- David, J. (2003). Soviet secrets in the ether - clandestine radio stations at the New York and San Francisco consulates in World War II. Cryptologia, 27(2), 135–147.
- Fischer, B. B. (2011). Spy dust and ghost surveillance: How the KGB spooked the CIA and hid aldrich ames in plain sight. International Journal of Intelligence and CounterIntelligence, 24(2), 268–306.
- Jansson, G. (2021). Nummersändare. http://signalspaning.se/nummersandare/.
- Laptop from Operation Ghost Stories. (n.d.). Federal Bureau of Investigation. https://www.fbi.gov/history/artifacts/laptop-from-operation-ghost-stories.
- Lei, Z., Yang, P., & Zheng, L. (2018). Detection and frequency estimation of frequency hopping spread spectrum signals based on channelized modulated wideband converters. Electronics, 7(9), 170. 1–18.
- Lucas, E. (2019). The Spycraft Revolution. Foreign Policy, Spring 2019. https://foreignpolicy.com/2019/04/27/the-spycraft-revolution-espionage-technology/.
- Mk. 328 Receiver. (2020). Crypto Museum. https://cryptomuseum.com/spy/mk328/index.htm.
- Noone, G. (2022). The fight against facial recognition. Tech Monitor. April 14, 2022. https://techmonitor.ai/policy/privacy-and-data-protection/the-fight-against-facial-recognition.
- Numbers stations. (2019). Sigidwiki.Com. https://www.sigidwiki.com/wiki/Category:Numbers_Stations.
- Osborne, C. (2021, March 11). Sky ECC denies police have ‘cracked’ encrypted messaging platform. ZDNet.Com. https://www.zdnet.com/article/sky-ecc-denies-police-have-cracked-encryption-messaging-platform/.
- Paraset. (2021). Crypto Museum. https://cryptomuseum.com/spy/paraset/index.htm.
- Priyom.org. (2022). https://priyom.org.
- Recommendation T/R 61-02. (2018). CEPT Electronic Communications Committee. https://docdb.cept.org/download/2569.
- Rubin, F. (1996). One-time pad cryptography. Cryptologia, 20(4), 359–364.
- Sarkar, S., Chakraborty, A., Saha, A., Bannerjee, A., & Bose, A. (2020). Securing Air-Gapped Systems in Proceedings of International Ethical Hacking Conference 2019, Advances in Intelligent Systems and Computing, Vol. 1065. Singapore: Springer Nature Singapore.
- Seybold, J. S. (2005). Introduction to RF propagation. John Wiley & Sons.
- Šorejs, P. (2015). Spektrum. https://github.com/pavels/spektrum.
- Strizh. (2020). Crypto Museum. https://cryptomuseum.com/spy/r394/index.htm.
- Symonds, T. (2021). Encrochat: Secret network messages can be used in court, judges rule. BBC News. https://www.bbc.com/news/uk-55953247.
- US Government - CIA. (2009). A Tradecraft Primer : Structured Analytic Techniques for Improving Intelligence Analysis Prepared by the US Government March 2009. Intelligence, March, 1–45. https://www.cia.gov/static/955180a45afe3f5013772c313b16face/Tradecraft-Primer-apr09.pdf.
- Volunteer Monitoring Program. (n.d.). The National Association for Amateur Radio. https://www.arrl.org/volunteer-monitor-program.
- Wege, C. A. (2014). Hezbollah’s communication system: A most important weapon. International Journal of Intelligence and CounterIntelligence, 27(2), 240–252.
- Westcott, B. (2021). For years, the underworld thought its phones were safe. They fell for an encrypted app trap. CNN. https://www.cnnphilippines.com/world/2021/6/9/ustralia-underworld-phone-encrypted-app.html.
- Wippl, J. W. (2010). The CIA and Tolkachev vs. the KGB/SVR and Ames: A comparison. International Journal of Intelligence and CounterIntelligence, 23(4), 636–646.