Anti spy tent: Obama outwits spies

The U.S. President, Barak Obama, certainly knows what are interceptions. Every time that he passes the night in a hotel, his staff assembles a tent. No, not a game for his daughters, but a protection in order to securely communicate with employees. The tent in fact protects him, thanks to …

Bookmark / Share

How to use a voice changer?

We are usual to think that a voice changer is a toy to make prank phone calls and have fun with friends. But the device has potentials much more higher and in many cases it has been of help to get out of difficult situations. Take, for example, the story …

Bookmark / Share

The new frontier of biometric access: the body odor

The Universidad Politécnica de Madrid has added to the biometric recognition tools already on the market, another ingredient: the body odor. Identification parameter that, according to the researchers may soon be used for a reliable recognition through personal characteristics and biological properties. So we’ll be able to filter people based …

Bookmark / Share

Defend the privacy, the self-destruct devices

There is no limit to the technological research in order to protect the privacy of users. They are spreading self-destuct tools. From some time are in use of the leading experts some pen drive self destructing. These are apparently normal usb pens, but if they come into the wrong hands, …

Bookmark / Share

Microregistratori digitali

How to use a voice changer?

April 3, 2014 Technology No Commenti
anziana-al-telefono

We are usual to think that a voice changer is a toy to make prank phone calls and have fun with friends. But the device has potentials much more higher and in many cases it has been of help to get out of difficult situations.

Take, for example, the story told by Elena, a 81-year old lady, who lives alone in her house. For about two months was haunted by phone calls from spiteful people intent to break into her apartment after verifying that the lady was always alone.  But Elena’s sons haven’t had afraid by the threats and have connected a voice changer to the phone. In this way, the voice of the lady who answered to the phone appeared, on the other side of the receiver, a clearly masculine voice. The result? The calls have ended in about a week. But Elena doesn’t renounce more to her voice changer.

Even more alarming is Rosaria’s story, 33-year old, stalked by her ex-husband. To ease the burden of continuous calls, she has pretended to be a man, a new partner, installing a voice changer on her cell phone and starting fake interferences during the call, again through the same device.

And there would be many other cases reported by Endoacustica Europe‘s customers after the introduction of powerful voice transformer provided by the company. Charles, who has freed himself of his mother-in-law with fake baby crying, Lucy, who spoke like a man to his employer too confidential and James that he pretended the sensual lover of himself to retake Miriam. And he succeeded!

The new frontier of biometric access: the body odor

March 27, 2014 Biotechnology No Commenti
biom

The Universidad Politécnica de Madrid has added to the biometric recognition tools already on the market, another ingredient: the body odor. Identification parameter that, according to the researchers may soon be used for a reliable recognition through personal characteristics and biological properties. So we’ll be able to filter people based on the scent they emit.

The challenge is identify and isolate, in the safest way, the odorous signature that characterized each of us. In fact, it isn’t the single odor, but the pattern of odors that characterizes us in the course of life. This smell remains stable and it’s the unmistakable signature that tomorrow will help us to embark on an airplane or go into the bank. Today the control of our identity, in many airports or border crossings, is based on the physical resemblance to the picture of an identity card or a passport. Limit that can be easily crossed. In the future will be increasingly difficult to tamper the new electronic documents, the use of biometric techniques that do leverage on the physical characteristics of a person will increase the levels of safety. On the other hand from many years, the accesses through biometric recognition make the public and private places more confident, drastically raising the level of protection.

At the moment the rate of recognition of the new system is estimated around 85%, in addition the odor of the body can vary over time and the sensors available are not yet very precise. So the new technology isn’t comparable to the reliability of biometric systems as the most advanced iris scanning, the reading of the fingerprint or the facial recognition. We’ll have to wait a little longer to see electronic noses in the areas of access.

Defend the privacy, the self-destruct devices

March 5, 2014 Self Defence No Commenti
pendriveautod

There is no limit to the technological research in order to protect the privacy of users. They are spreading self-destuct tools. From some time are in use of the leading experts some pen drive self destructing. These are apparently normal usb pens, but if they come into the wrong hands, at a minimum force, the microchip in it will self-destruct thanks to micro sensors positioned on the inside, causing the leak of all data irretrievably. These are very useful for entrepreneurs and businessmen who wish to keep secret important data and information without running the risk that the leak of these decrees company failure.

A recent news talks about the presentation at the Mobile World Congress of a self-destruct smartphone. Basically, the phone will self-destruct if someone tries to violate the memory to retrieve data without permission. The smartphone use android system and it seems a phone like the others. But if someone tries to read the data, the software activates the self-destruction of the smartphone making data unusable. This happens through a program that delete indelibly the information making impossible to recover data even for experts in computer science.

It’s certain that at many people don’t like spending a large sum for a device that could destroy itself. Experts in the field, use from years the Stealth Phone, a particular  Endoacustica Europe’s phone, able to make impossible any type of wiretap. Unlike a cell phone that operates on the encrypted data item, codifying and making them unintelligible to any outside listener, the Stealth Phone protects the call itself, making the phone untraceable. In addition, this device instantly alerts the user via a message or a discreet vibrating alarm when someone tries to get into listening. At this point, simply turn off and then turn on your cell phone to be safe again.

Anti spy tent: Obama outwits spies

February 25, 2014 Self Defence No Commenti
obamatenda

The U.S. President, Barak Obama, certainly knows what are interceptions. Every time that he passes the night in a hotel, his staff assembles a tent. No, not a game for his daughters, but a protection in order to securely communicate with employees. The tent in fact protects him, thanks to a special fabric used to isolate and protect sensitive communications and speeches from prying eyes and ears. Furthermore, the anti bugs system is equipped with an apparatus called “white noise generator” capable of generating a noise that prevents bugs and micro voice recorders to transmit or record what happens inside the tent.

It seems that the security agents of the White House, take it for granted that the President is spied wherever he goes, so they are equipped to protect him. The anti spy tent is used to protect a variety of situations: read a secret document, make a call, use a computer or speak with other members of the government.

Our photo, for example, published by the “Times”, shows Obama in the tent in a Rio de Janeiro hotel, while talking on the phone of the latest developments in Libya. But the tent is not the only precaution taken by Obama. The president uses a phone impossible to intercept, shielded precisely to prevent eavesdropping, and it’s very likely that in his limo, which follows him wherever he goes, are made constant environmental bug sweeping to avoid the presence of any hidden bugs.

These defenses are mandatory for all members of the administration who receive a smaller structure similar to a phone booth. All other devices are practically prohibited, especially in rival countries like Russia and China, and after every meeting in the room of foreign governments, all equipment are subject to bug sweeping.

Attention to the new gadgets of thieves

February 14, 2014 Localization No Commenti
mendicante-a-semaforo

This may be the last discover of ingenious thieves who don’t hesitate to resort to the technology to hit unsuspecting victims.

The news of recent months shows several cases where someone complains of being robbed, at home or in the company, after agreeing to unknowns small gadgets, deployed on the street, particularly at the crossings or when the light is red.

The hypothesis is that these gadgets (lighters, key chains or luck charms) conceal internal micro locators that are able to track the movements of the victims and, at the right time, allow to the criminals to enter in their environments and rob them.

For example, it’s circulating a warning by the police which states: “These days are distributed key rings to attach inside your car. People offer them for free at parking lots or fuel distributors. Don’t accept them. They contain a microchip. These criminals will then follow you and so they know your movements to make intrusions and thefts”.

For example, it’s circulating a warning by the police which states: “These days are distributed key rings to put inside your car. People offer them for free at parking lots or fuel distributors. Don’t accept them. They contain a microchip. These criminals will follow you and so they will know your movements to the aim of intrusions and theft”.

The police is therefore faced with super technological criminals even able to insert a GPS transmitter and a power source of long duration in the limited space of a keychain or any other small gadgets. Operation worthy of the best companies of espionage.

Of course there is no surprise seen that in recent times, the stratagems adopted by the criminals to carry out robberies or burglaries have become increasingly refined.

The police are gearing up with detectors that can evidence the presence of micro systems, impossible to recognize with the naked eye, as in the case of key rings, lighters, lucky charms and similar items. Same thing can do private individuals: use a bug detector to clean up their environments. If the tracker is contained in so tiny gadget, let alone in larger objects. These micro systems come into the house through postal parcels, gifts, books and tools of all kinds. The protection has become an obligation.

Spy apps and games: Angry Birds also in the viewfinder

February 5, 2014 Self Defence No Commenti
angrybirds

The number of the areas in which it’s possible to spy is more and more large, day by day. After the revelations of last June, of Edward Snowden who had revealed to the world the spy programs of the National Security Agency (NSA), the news follow each other in a continuous manner.

And users have attacked the high-tech companies in order to obtain more details about their relationship with the U.S. government. This led to an agreement between the U.S. Department of Justice and the technology giants. With this compromise the companies can publish more details about the information shared with the Intelligence. Now, the agreement must be approved by the court created with the Foreign Intelligence Surveillance Act (FISA).

In particular, the internet groups will publish general information about how many requests they receive and from whom: NSA or FBI, for example. Also they can reveal the numbers of requests on the basis of one thousand and the number of accounts involved. In addition, Facebook and other companies will be able to provide data in real time, except for the requirements of the Foreign Intelligence Surveillance court that will be made ​​public after six months.

The terms of the agreement have the aim to find the right balance between the interests of the government (which doesn’t accept the leak of information that can help people under control) with the needs of hi-tech groups that need to respond to user requests always more concerned about internet control. In addition, any decision will also be applied to other technology companies that haven’t directly participated in the legal process.

And while more and more people are adopting systems in order to maintain the integrity of their privacy as Stealth Phone and defense tools against unauthorized interceptions, new secret documents, always provided by Snowden, reveal that since 2007, the NSA and the Government Communications Headquarters (GCHQ), have worked together to collect and store data from dozens of applications for smartphones, including the famous game “Angry Birds”.

In fact, among the most valuable tools to collect data, intelligence agencies ​​use  “leaky apps”, like “Angry Birds”, applications for mobile phones that share almost all the user information: from the identification codes of the devices, to gender, age, geographical location and other personal information. The two security agencies have sought to identify the physical location of users via “Google maps”, tried to copy telephone book and phone records, lists of friends and geographic data embedded in photos of who sends a post.

Low cost microphones, micro bugs and micro recorder

January 29, 2014 Technology No Commenti
sicurezza-ufficio

Directional microphones as big as a pin. Micro cameras and micro bugs hidden in eyeglasses or sunglasses, common pens, keys and key rings, buttons, shirts, pillows and stuffed animals. In short, everywhere. Batteries that last for hours and turn on  from a distance or turn on/off automatically when they receive a noise. The market for  bugs and their derivatives is constantly evolving and the offer is really wide. Bargain prices and low cost solutions for products which are often throwaway. The key isn’t spending a fortune, but only knowing how to evaluate an offer. You know that it’s really difficult to have a rechargeable GSM bug, at unlimited distance, at 19.90€. But the same will be sold by companies able to guarantee it for life, spending a couple of hundred euro. And the investment is done.

If you want exaggerate, at 499 euros you can buy a software able to intercept and transfer every phone conversation and even text message. And there’s no need to be friends with CIA agents: it’s enough a visit on the site www.endoacustica.com, leader company in the field, that also sells online all type of gadgets for investigators more or less professional, from jealous husband to more experienced  agent. And the power supply is no longer a problem, just think of the bugs that find their natural habitat within the electrical outlets.

The truth is that, as many have commented, there isn’t a place not suitable to place a bug. And above all, in every corner of the planet you can pick up useful informations. A meeting room, the study or the home of a bureaucrat or a politician, but also a suspect enterprise. The operating modes are truly endless.

The reality is often much easier than it looks. Just use the right tools.

The SuperPhone to protect conversations

January 22, 2014 Self Defence No Commenti
cellularesicuro

In this historical moment more than ever, the pressure to maintain their privacy in everyday life  and business field has become a priority. And as often happens the technology tries to respond to market demands by offering new tools, but sometimes could be the “same old story”.  But let’s look specifically. From years, there is a device adopted and widely used by business people, celebrities and businessmen, the Stealth Phone. This privileged tool, is a technologically advanced phone that can protect 100% of the telephone conversations.

In this regard, a few days ago news speaks about a new Superphone which will be showed from 24 February at the Mobile World Congress in Barcelona. This phone was born by a joint venture between the American Silent Circle and the Spanish Geeksphone; the phone will mount a new operating system derived from Android, named PrivatOS. They wrongly defined it as “the first device in the world to put personal privacy literally in our hands”.

The concrete, this tool has been riding the wave of Datagate, imitating existing tools such as the Crypto Phone or the Stealth Phone. The noise of the web and daily news promote the launch of the new SuperPhone as a good market operation.

This device will be of high profile. The goodness of the operation will depend obviously by the technical specifications of the new operating system, hardware and context in which it will be used: in short, we must consider the user. If our interlocutor will not use the same high-level system, the tool may be not very useful. It isn’t the same for the already tested Endoacustica Europe‘s products to which we have explained before, they’re certainly much more userfriendly.

Technology applied to the animals at the Las Vegas technology fair

January 14, 2014 Technology No Commenti
gpspet

For someone are like children, for others are even more important. And the technology is riding the moment. We’re talking about animals. Domestic, beatiful and always faithful. From years, there are valid locators on the market that prevent the loss of the precious companions. These make possible to know the animal position and above all to be alerted if it moves away from a fixed perimeter. These tools are used by livestock farmers as well as by simple dogs or cats owners.

But that’s not all. At the Consumer Electronics Show, the electronics fair in Las Vegas, many exhibitors thought to the four-legged friends. It would seem that our dog will soon boast of being technologically advanced, just as the owner, with smartphones and smart bracelets.

One of the technologies that most impressed the visitors of the CES is FitBark. It’s a system for tracking the physical activity of the dog. It works thanks to a small plastic shell shaped bone, applicable to the collar, which encloses inside sensors to record each movement. It transmits via Bluetooth through a smartphone application.

The software, developed in collaboration with veterinaries, encloses the frames of reference divided by race to see if the animal performs the correct daily physical activity, monitored through challenges and scores to reach. The application is compatible with some fitness bracelets for men and allows you to perform human-animal challenges. You can also post pictures and messages, manage a diary to share on Facebook or Twitter. Throught a Wifi unit, shaped dog-house, sold separately, you can monitor the activity of your dog even remotely. If you’re out, for example, you can monitor the animal or control if your dog-sitter is working fine.

In this regard, they are already in use monitoring tools such as micro cameras or surveillance video cameras that monitor 24h-24h animals, people and environments. And Petzila, another American startup, has bring a normal camera at the show, claiming to have designed it especially for animals just like “monitor on the kids”.  In addition it’s possible to talk to the puppy through the microphone, and also give its a cookie via the built-in dispenser, pressing a button on your smartphone.

In short, the “genius” of the technology in Las Vegas have seized the opportunity dedicating the existing and widely experienced technology to the pets. While the “innovations” looking for a space in the market, there are those who relies on technologies tested in the security and surveillance field that not have the shape of a bone, but they are certainly very reliable.

2014: the counter-espionage year

January 7, 2014 Self Defence No Commenti
privat

2014 will be, without doubt, the counter-espionage year. After the Datagate scandal that hit the world with different effects depending on the area, many have asked during the  2013 to improve their security and surveillance systems. This isn’t a real innovation, but it’s a inevitable requirement. The principle is the that of the espionage, more and more frequent, especially by hackers, who in 2013 tried to develop them with testimonials and referrals to top-secret documents. In fact, 2014 will eliminate the espionage threats that causes uncontrolled daily damages to many businesses and people, even unsuspected. In 2013 it was brought to light the scandal, in 2014 it’s time to do the math.

We must recognize that numerous espionage acts are often make easy by the lack of equipment against external intrusion. In the course of 2013, smartest employers have already begun to increase the protection level of their companies with constant environmental bug sweeping and with the implementation of video surveillance and pc security tools.

These are monitoring tools that should be in every business whether large or small. In fact, it’s customary to think that small businesses are exempt from espionage, but in reality they are the most affected and subjected to the most disastrous damages.

To these systems are added personal attention for those who believe they can be subjected to indiscreet interception. This is for example the use of mobile phones impossible to intercept, as the Stealth Phone proposed by Endoacustica Europe. Unlike a mobile phone that operates on the encrypted voice data, codifying and making them unintelligible to any listener outside, the Stealth Phone instead protects the phone itself, making it untraceable. In addition there are other tools that can verify the presence of a bug on the phone line.

In short, the wide Endoacustica Europe range can be considered a great ally for the security of business and personal data and informations.

Calendar

April 2014
M T W T F S S
« Mar    
 123456
78910111213
14151617181920
21222324252627
282930  

NEWSLETTER

e-mail:
name:
Newsletter Endoacustica Europe - ENGLISH

Login

CONTACT US

Endoacustica Europe srl
Via Umberto Terracini, 47
70029 Santeramo in Colle (BA)
P.IVA IT06836020724
ITALY
tel. 0039 080 30 26 530
tel. 0039 080 43 73 08 93
fax 0039 080 40 73 11 87
e-mail: info@endoacustica.com

Text ADS

 SPY PHONE
spyphone A SpyPhone or GSM Spy cellphone, is a normal mobile phone, where a software has been installed, which allows a third party to monitor the activities of the phone user. To avoid suspicions, a Spyphone must be given either as a present (for family members monitoring) or given as company equipment (for personnel monitoring).

 MICRO DIGITAL RECCORDER
digital video recorder Micro digital recorder with vocal activation have recording time of 1200 hours long. They went out from the big screen to enter by force in the life of every day, in the most diverse situations that until a few years ago even the vivid imagination of a writer of espionage could have imagined.
 WALL MICROPHONES
Wall microphones to listen through walls up to 70 cm. Ultra sensitive professional stereo microphone, suitable to pick up the lowest noises thanks to its very high sensitive ceramic microphone. Limpid and stable sound. Endowed with sockets for recorder and earpiece.
 PHONE VOICE CHANGER
The phone voice changers when interposed between handset and phone, will change your voice into another one. It transforms any voice into a masculine, feminine, adult or child one.The voice changer can be adapted to cell phones, cordless phones, speakers and microphones, recording systems, or connected to switchboards. The reproduced voice is not a robotic but a human one.
 REAL TIME TRACKERS
localizzatore rf

Real time trackers are designed for those who need to keep their pets under control, while limiting the relevant cost, but also to locate precious objects or to remember where you parked your car.

 ANTI-DROWNING AND ANTI-LOSS ALARM
anti loss alarm

Anti-drowning defender is an alarm device which combines anti-drowning and anti-loss alarm, and works effectively as an electronic safety device for protecting children or pets from drowning and loss.

Relevant artilcle

Attention to the new gadgets of thieves

14 Feb 2014

mendicante-a-semaforo

This may be the last discover of ingenious thieves who don’t hesitate to resort to the technology to hit unsuspecting victims. The news of recent months shows several cases where someone complains of being robbed, at home or in the company, after agreeing to unknowns small gadgets, deployed on the street, particularly at the crossings or when the light is red. The hypothesis is that these gadgets (lighters, key chains …

Never lose things again with the geolocation tools

19 Sep 2013

etichettatag

The geolocation is getting closer, at your fingertips. We’re all constantly losing things. Keys, bag, charger and many other tools of daily use are very often forgotten, lost. The hard part is finding them. This discomfort could be deleted with the help of geolocation devices. In particular, big companies and startups are trying to answer to the distraction effects with products that will come soon on the market. Their secret would be an accessory, …

Stop mobile phones theft

30 Jul 2013

furto-cellulare

One hundred twenty thousand a year, ten thousand a month are the mobile phones stolen (or loss). These are the numbers from the homeland of mobile phones, smartphones and tablets thieves: London. The Mayor, Boris Johnson, and the police are really troubled about the weight of these statistics and asked to the same companies devices producing to investigate about what is happening. In particular, they asked to Apple, Samsung and …

Locate a mobile phone with the technique used by bats and dolphins

4 Jul 2013

Pipistrelli

Locate the exact position of a cell phone in enclosed spaces may become possible thanks to an algorithm that allows us to reconstruct the 3D shape of a room, listening to the echo of the sounds produced inside, even simple ones like the snap of the fingers. The project was developed by a research group at the EPFL. The researchers were inspired by echolocation, the system by which some animals …

Fish-robot will patrol the Thames River

10 May 2013

robot_fish

It’s environmental surveillance, the new frontier crossed by the fish-robot that will be released, in the coming months, in the Thames in order to sniff out pollution. Scenes like science fiction movies are recorded during the tests in the water. The robots will be released in groups of five in order to provide a mapping of the critical points and pollutant elements. The search will rely to the sensors built-in …

At the supermarket with the navigator

17 Jan 2013

locata

GPS technology has now numerous applications in daily activities. Keep an eye on the kids, monitor the pet, follow the partner’s car is a cakewalk if you have the right tools. Shortly, it will possible use a sophisticated development of GPS technology in a shopping center or on the shelves of the supermarket so you’ll save time and optimize the product comparison. To lead the tour will be our trusty …

Internet of things will revolutionize our daily

10 Dec 2012

web-3-0

Web 3.0 isn’t yet far away. All the big laboratories are working hard to develop new applications concerning the Internet of things. With this neologism has been named the last frontier of online technology. The strength lies in the possibility given to objects to interact with each other by capturing and exchanging information. The alarm clock may sound for example in advance once found, through the Internet, heavy traffic conditions. …

Hop! the suitcase that follows you

13 Nov 2012

Hop-595x363

Pack your bags is always a problem. Weather conditions, formal and informal dresses, comfortable and casual, but also suited to special occasions that may occur…In short, a grind. And what often we create is a baggage too heavy and almost entirely useless. About 25 years ago, a pilot of the Nortwestern Airlines tried to obviate to the problem of having to lift heavy luggage introducing the trolley as we know …

Even sharks tracked with GPS

22 Oct 2012

ocearch-squali-gps

Until recently, GPS tracking systems were used for the control of small animals. Now the GPS challenges even the most dangerous animals. Indeed, it is in an experimental phase the scientific mission of the American non profit association, Ocearch, led by Chris Fischer. During the operation, the sharks are caught, mainly in North America, and to them is applied a GPS tracking device, then they come back to the sea. …

Home with the GPS shoes

1 Oct 2012

dominic_wilcox_sept_043

Dominic Wilcox, british designer, has created a fully functional prototype pair of shoes with a built-in GPS that will guide you home. The name of this extravagant invention is “No Place Like Home” and it’s inspired by the famous novel “The Wonderful Wizard of Oz” in witch the protagonist Dorothy, with her magic shoes, can go everywhere clicking her shoes together three times. For Wilcox’s shoes, with expertly decorated sole, …