How to turn a mobile phone into a bug

January 28, 2010 Technology No Commenti

Cellphone

One of those actions that we take automatically and without thinking, such as turning off our mobile phone, is basically just like hanging a “Do Not Disturb” sign outside a hotel door when we want to sleep a bit more, and allows us not to be disturbed by people we do not really want to talk right now, enjoy a bit of privacy or maybe just take a short nap.

Along with all this, switching off their mobile phone might mean, for those who have something to hide, that they can talk about their private business, without worries or fear to be disturbed by prying ears… or not?

If the person in question is unaware that he is actually using a spy cellphone, the answer to this question is indeed a no. In fact, modern surveillance technology allows you to turn almost any phone equipped with Symbian operating system, into a full package for remote long distance surveillance.

Thanks to the installation of a spy software, it is in fact possible to keep constantly under control the person to monitor, listen to their conversations in real time as soon as a call is placed or received, receive on your cellphone a copy of all incoming and outgoing text messages; furthermore, for mobile phone models equipped with GPS navigation system, you can also receive geographical coordinates of its position, so as to know at any time where it is.

But certainly, the most interesting function featured by Spy Phone is certainly the one that allows to use your spy handset as if it were a real bugging device, just like the ones you see in spy movies, to listen not to incoming or outgoing phone calls, but rather to conversations taking place around it.

To do this, the spy software secretly installed on your spyphone uses the handset’s microphone to pick up sounds and voices within a range of approximately 5 meters. Just call from your normal cellphone, whose number has been stored as monitoring phone upon installation, and something amazing and unexpected will happen.

In fact, by calling from this number, the phone will not ring, nor will the phone call leave a record in the phone activity history, but instead, it will answer automatically, allowing the person at the other end to listen to what is happening around the handset, until the moment when the phone user places or receives a call; in that case, in fact, secret listening will be automatically be interrupted and the spy phone will turn into a normal mobile.

It is also possible to use the environmental listening mode when the mobile phone is turned off! In fact, it is exactly in these moments that those who fear that they are being bugged feel secure, believing that they are really safe from prying ears. Instead, if they are using a spy telephone, this is the moment when their privacy is running the highest risk.

When the spy handset is turned off, all you have to do is call from the controlling number, and even though in theory it should not be possible to talk, the spy software will give green light to your call, without giving out any visible sign of activity, and of course arising no suspicion in the person under surveillance.

If you want to know more about how spy cellphones are working, we advise you to visit the Endoacustica site, and request support from our experts, who will certainly be able to find the right option for your needs.

How a Spy Phone works

January 26, 2010 Technology No Commenti

Nokia Spy

For those who do not happen to be experts of surveillance technology, the term spy phone may bring to their mind stories from a movie, with complicated secret agent machinery used to follow their targets basically anywhere.

The truth is actually very different, as a spy cellphone, even after more than a glance, on the outside looks exactly like your everyday mobile handset; and even by going through all its functionalities and features, you would not be able to see its true colors. In fact, the surveillance activity is carried out by a spy software, installed in an absolutely invisible way inside your mobile phone’s processor.

Thanks to this software, a third party listener will be able to keep in constant touch with the user of the handset under surveillance, and the latter would not be able to figure it out in any way.

All his conversations, both incoming and outgoing, will be listened to, from any distance; any text message sent or received can be comfortably read right on your cellphone; you will be able to listen to the conversations and sounds taking place around the spy phone, simply by dialing its number, even while it is turned off; And for cellphone models equipped with GPS positioning system, you will also be able to know in real time the geographical coordinates of your subject’s position.

All these functions, thanks to its invisible software, are carried out in an equally discreet fashion, without giving out any sign of activity like a ringtone, the glowing of its screen, the sound of an incoming text message and so on, and without leaving any trace in the phone activity history, which also means that no unnecessary suspicion could be raised.

The person who is remotely monitoring the spy phone can send commands by SMS to enable or disable its features and functions, to receive an activity report, a list of calls placed and received, or a list of all text messages both incoming and outgoing. These SMS messages, written in a particular easy format, are intercepted by the spy software and read as operating instructions, therefore they are not displayed on the screen.

Furthermore, always by sending a text message, it is now possible to activate the new recording function, to save conversations or eavesdropped conversations. By doing this, you will be able to record any call through the spy software, and the relevant audio file can be later sent, with another command, directly on your cellphone or your mailbox, via GPRS, Bluetooth or e-mail.

Like that, you will be able to use any compromising conversation as evidence before a court of law, to solve a child custody litigation, or a divorce, or even as a support for law enforcement to gather evidence against criminals or suspects.

In a few words, inside your ordinary cellphone you can conceal a valuable tool for complete surveillance. For more information on spy phones and how they work, you can visit the Endoacustica website and request more info.

Your MiFi hotspot might reveal your whereabouts

January 18, 2010 Technology No Commenti

MiFi

MiFi cards, or hotspots, normally used to share your 3G Internet connection on a wireless network, are certainly a very useful device for those who need to be connected at any time, no matter where they are.

Unfortunately though, sharing your network connection, aside from providing a useful service to other Internet users, might be a very high risk operation as far as your security, and the privacy of your data, is concerned, as it may lead to sharing some information that should instead be kept strictly private.

For those who living in the United States and who use hotspots manufactured and marketed my big providers such as Verizon and Sprint, the risk lies in a flaw which has been identified by some hackers, and which might lead people with malicious intentions to get to know the GPS coordinates of your position, while you are sitting checking your email, completely unaware.

Of course, this kind of attack requires a certain technical knowledge, but the dangerous part is that it can take place without password or key authentication, while the user has no idea of what is going on right before his eyes. On top of that, it looks like it is possible to download system configuration information, including private information stored in a non encrypted way on your computer.

On the other side of the fence, law enforcement might effectively use this tool to pinpoint dangerous criminals thanks to their Internet connection, follow their movements, gather evidence on their whereabouts and track them down when necessary.

To cut a long story short, if you have something to hide, or if you fear that your private information might end up in the wrong hands, from now on be very careful when you are connected to a wireless network!

Augmented reality can make our driving safer

January 18, 2010 Technology No Commenti

Just a couple of days ago we mentioned how usage of augmented reality can help you to repair your car or to carry out highly skilled tasks. Today we would like to demonstrate how this technology can make our roads safer, allowing car drivers to see vehicles or obstacles coming from behind a curve or a building.

This system, which is being developed by a group of researchers at Carnegie Mellon University, merges two video feeds shot by two different surveillance cameras into one feed, giving the illusion of being able to see through a wall thanks to its processor, which matches common points from the two cameras. By identifying these spots, the software changes the video perspective to make it compatible with the driver’s view.

The resulting feed would then be displayed on the car’s windscreen, giving the realistic impression of seeing through a wall. Images to create this impression would be picked up by a video processor which can capture feeds from security cameras that you can literally find on every street corner in our cities.

In the future, should its usage become common, it might even capture images from other cars driving nearby and using the same system, but of course, at the current stage, this is just a speculation, as development and planning of such a software carries along a wide range of obstacles to overcome before we can really see it mounted on our cars.

For now, we can only see this new augmented reality application, which has been presented at the ISMAR fair in Florida, in the demo that you can see in the video above. And who knows, maybe one day we will really be able to use it!

Optical fibers to see through a wall

January 17, 2010 Technology No Commenti

Viewer

Being able to see without being seen is one of mankind’s great dreams, and the principle on which our work in the information gathering and surveillance field is based; this work is of course supported by technology, and when it comes to seeing without being noticed, even a thick wall is no obstacle if the right devices are on our side.

For example, optical fibers are greatly useful in this respect, because they have great capabilities within a space that can be as thin and long as a hair, but much more resistant; thanks to these capabilities, devices such as, for example, a fiberscope, can be used as if they were hidden cameras, by simply digging a hole and squeezing its tiny cable (just 5mm wide) inside it.

At one end of the cable, the fiberscope has a miniature viewer, which allows its user to examine an environment without being noticed, as well as using the fiberscope to inspect hidden corners such as home pipes or the engine of a car.

Other optical fibre devices which can find applications in the surveillance field are, for examples, fiberscopes which allow you to see through a ceiling thanks to their cable which is just 2.5 mm thin, or small monoculars which, if placed on the peephole of a door, can show you what is going on behind the door and inside the apartment.

This kind of device is very useful in intelligence gathering and surveillance, for example when law enforcement agents are chasing a suspect who takes a room in a hotel. In this case, they will just have to take a room next to his, plug a hole in the wall (of course while he is away!) and place the fiberscope inside it, if possible connecting it to a micro digital video recorder in order to store any footage captured and use it as evidence. Simple, huh?

Hope against Alzheimer disease can come from the eyes

January 17, 2010 Technology No Commenti

Alzheimer

Alzheimer’s disease, the terrible and subtle illness which slowly kills brain cells, is currently incurable. The population affected by this disease worldwide amounts to approximately 30 million people, but will reach a 100 million peak within the next 40 years.

In the last few days, some therapies and options have been made public, which might help cure the disease, slow down its process and, hopefully, prevent its development.
For example, a simple and cheap eye test might help diagnose the illness in its early stages, while a cocktail of common use medicines might improve our memory and its response in fighting the subtle Alzheimer, which hurts patients not only in their bodies but also in their pride, hampering their personal relations with their peers.

The research carried out by London University College has shown how a common eye checkup may help measuring in real time the speed at which brain cells are degrading, by simply measuring the same speed on retinal cells.
In fact, the retina is a direct extension of the brain, and the health of our retinal cells is proportional to that of brain cells; therefore with a simple visit to out optician, we will be able to obtain answers to a broad range of question on our conditions, and will also be able to provide an accurate diagnosis in due time to cure neurodegenerative diseases.

Death of nerve cells is a key factor in studying this kind of diseases, and so far it was not possible to measure its velocity in real time. Thanks to this technique, doctors will be able to follow and observe it at any given time, without complicated and expensive tests, and by diagnosing the disease in its early stages, it will be possible to try and reverse it, and measure the effect of therapies in real time.

Use augmented reality to repair your car

January 17, 2010 Technology No Commenti

ARMAR

Modern cars have become less and less easy to repair, even for the savviest driver, because of the high technological contents and the huge amount of computerized systems installed, which make our mechanic’s job look more and more like a software programmer’s.

Fortunately, it is the very technology that makes our cars increasingly complicated (but much safer) that lends us a hand when it comes to fixing them, thanks to the usage of augmented reality.
In fact, researchers from Columbia University have created a system called ARMAR (Augmented Reality for Maintenance and Repair).

The system consists of a helmet similar to those used in virtual reality based videogames, which would display virtual images on top of the real ones, according to the augmented reality principle. The graphics are controlled through a mobile phone equipped with Android operating system.

In short, the system is guiding its user towards the damaged area, and by displaying 3D animations, it guides him step by step towards solving the problem. It has recently been successfully tested by the US Marine Corps on an armored turret, and repair time was cut by 50% compared to a normal manual job.

In the future, should this device enter the commercial vehicles market, it might be a real breakthrough, and allow almost all car drivers and users to take a shot at repairing their own car.

In the latest years, augmented reality is being used in an increasing number of applications: generally it is used to add details to satellite maps, or for leisurely purposes. ARMAR is one of the first systems to use augmented reality to carry out a specific and specialized task, and might me a spearhead towards introducing this technology in production and maintenance of complex systems.

The advantage lies in the fact that, along with solving the problem, ARMAR also teaches him how to do it, so one day, augmented reality might even chance educational programs in our schools…

A micro camera hidden inside a cap

January 17, 2010 Technology No Commenti

SpyCap

Miniaturization of video technologies allows us to have micro video recorders with an embedded camera, so small that they can be concealed inside objects that we use every day, such as watches, pens, or even car key holders.

In this case, what at a first glance might be mistaken for a key holder is actually the remote control of our micro camera, as the recorder is concealed inside a baseball cap, and what looks like normal holes on top of the shade are actually concealing a tiny video camera and an equally small microphone.

It is a device for amateur use, powered by a rechargeable battery and capable of recording footage with a 640×480 resolution at 27 frames per second, storing it on a built-in 4 Gb memory card. By pressing any button on the remote control, the cap will slightly vibrate in response.

The characteristics of this micro recorder make it more suitable for a young audience, as it can be used in leisurely occasions, for example to shoot movies during a ride on a bicycle or a motorcycle, from the rider’s point of view, or to tape a university lesson instead of taking notes, to be able to review it later at home.

The fact that it is targeted to non-professional users is also reflected on price, as it would set you back a mere 55 dollars, a price range non comparable to digital micro recorders designed for professional use, aimed at surveillance and gathering of evidence to be used before a court of law.

Protection from eavesdropping

January 16, 2010 Technology No Commenti

BugSweeper

When the information which is being circulated on our workplace is confidential, and when getting to know it might mean an advantage position and a substantial financial gain, one must make sure that all necessary measures are taken to make sure that our words are not being listened to by prying ears, who might have planted some hidden microphones and bugged our office.

For this reason, it might certainly be useful to address yourselves to a bug sweeping expert who, by using the appropriate systems for detection of covert listening devices, can reveal a threat that could otherwise be invisible.

In order to identify a hidden transmitter, these detection systems flood the area with radio waves, and can thus detect radio transmission sources hidden in the less accessible corners of our working room, for example in the back of a drawer, behind a pot of flowers, or even inside objects of everyday use, such as for example table calculators, key rings and fountain pens.

The most advanced bug sweeping systems can detect not only bugs or microphones, but also hidden video cameras or sources of Bluetooth or WiFi transmission. When you are searching for hidden transmitters, the main problem comes when trying to detect bugs which are either turned off or disabled, and may not be located after a first search.

Fortunately, there are some particular types of bug sweepers which can detect transmitters which are either turned off or even buried into a wall, allowing for a thorough cleanup of your premises, where you will soon be able to talk freely.

To obtain more information on systems for bug sweeping and find the most suitable option for your needs, we advise you to contact Endoacustica and its experienced staff, who will certainly be able to assist.

Internet-based home surveillance, wherever you are

January 16, 2010 Technology No Commenti

Liveline

To keep a watchful eye on your loved ones, your home or even the situation in your office while you are away, there is a system for remote surveillance called LiveLine which, thanks to the installation of a video camera in the place to be monitored, allows its users to display images in real time over the Internet.

This convenient anti theft service has a monthly fee of only 10 dollars, on top of which you should add the cost for purchasing dedicated cameras (between 130 and 200 dollars.
During its launch phase, the cameras were supplied for free, while now this offer is no longer available, although the price of the cameras is within the reasonable range for surveillance cameras designed for home or office use.

Once the camera is installed, all you have to do is connect it to your home computer, and you will be able to activate it and display its images in real time, wherever you are, just by logging into your online account. Furthermore, images captured by the LiveLine system are stored on the provider server, and can thus be used at any time as evidence, in case someone should break into your home, or if you should prove a marital infidelity or a case of corporate espionage taking place in your office.

This system is convenient not only to protect your home during your holidays, but also for those who leave their home often due to business trips, or those who live alone and work night shifts, leaving their home unattended during dark hours.
The LiveLine camera is also equipped with a motion detection sensor, which starts recording immediately and sends a notification either via email or via SMS, allowing you to acct immediately in case of danger.

Calendar

January 2010
M T W T F S S
« Dec   Feb »
 123
45678910
11121314151617
18192021222324
25262728293031

NEWSLETTER

e-mail:
name:
Newsletter Endoacustica Europe - ENGLISH

Login

CONTACT US

Endoacustica Europe srl
Via Umberto Terracini, 47
70029 Santeramo in Colle (BA)
P.IVA IT06836020724
ITALY
tel. 0039 080 30 26 530
tel. 0039 080 43 73 08 93
fax 0039 080 40 73 11 87
e-mail: info@endoacustica.com

Text ADS

 SPY PHONE
spyphone A SpyPhone or GSM Spy cellphone, is a normal mobile phone, where a software has been installed, which allows a third party to monitor the activities of the phone user. To avoid suspicions, a Spyphone must be given either as a present (for family members monitoring) or given as company equipment (for personnel monitoring).

 MICRO DIGITAL RECCORDER
digital video recorder Micro digital recorder with vocal activation have recording time of 1200 hours long. They went out from the big screen to enter by force in the life of every day, in the most diverse situations that until a few years ago even the vivid imagination of a writer of espionage could have imagined.
 WALL MICROPHONES
Wall microphones to listen through walls up to 70 cm. Ultra sensitive professional stereo microphone, suitable to pick up the lowest noises thanks to its very high sensitive ceramic microphone. Limpid and stable sound. Endowed with sockets for recorder and earpiece.
 PHONE VOICE CHANGER
The phone voice changers when interposed between handset and phone, will change your voice into another one. It transforms any voice into a masculine, feminine, adult or child one.The voice changer can be adapted to cell phones, cordless phones, speakers and microphones, recording systems, or connected to switchboards. The reproduced voice is not a robotic but a human one.
 REAL TIME TRACKERS
localizzatore rf

Real time trackers are designed for those who need to keep their pets under control, while limiting the relevant cost, but also to locate precious objects or to remember where you parked your car.

 ANTI-DROWNING AND ANTI-LOSS ALARM
anti loss alarm

Anti-drowning defender is an alarm device which combines anti-drowning and anti-loss alarm, and works effectively as an electronic safety device for protecting children or pets from drowning and loss.

Relevant artilcle

Attention to the new gadgets of thieves

14 Feb 2014

mendicante-a-semaforo

This may be the last discover of ingenious thieves who don’t hesitate to resort to the technology to hit unsuspecting victims. The news of recent months shows several cases where someone complains of being robbed, at home or in the company, after agreeing to unknowns small gadgets, deployed on the street, particularly at the crossings or when the light is red. The hypothesis is that these gadgets (lighters, key chains …

Never lose things again with the geolocation tools

19 Sep 2013

etichettatag

The geolocation is getting closer, at your fingertips. We’re all constantly losing things. Keys, bag, charger and many other tools of daily use are very often forgotten, lost. The hard part is finding them. This discomfort could be deleted with the help of geolocation devices. In particular, big companies and startups are trying to answer to the distraction effects with products that will come soon on the market. Their secret would be an accessory, …

Stop mobile phones theft

30 Jul 2013

furto-cellulare

One hundred twenty thousand a year, ten thousand a month are the mobile phones stolen (or loss). These are the numbers from the homeland of mobile phones, smartphones and tablets thieves: London. The Mayor, Boris Johnson, and the police are really troubled about the weight of these statistics and asked to the same companies devices producing to investigate about what is happening. In particular, they asked to Apple, Samsung and …

Locate a mobile phone with the technique used by bats and dolphins

4 Jul 2013

Pipistrelli

Locate the exact position of a cell phone in enclosed spaces may become possible thanks to an algorithm that allows us to reconstruct the 3D shape of a room, listening to the echo of the sounds produced inside, even simple ones like the snap of the fingers. The project was developed by a research group at the EPFL. The researchers were inspired by echolocation, the system by which some animals …

Fish-robot will patrol the Thames River

10 May 2013

robot_fish

It’s environmental surveillance, the new frontier crossed by the fish-robot that will be released, in the coming months, in the Thames in order to sniff out pollution. Scenes like science fiction movies are recorded during the tests in the water. The robots will be released in groups of five in order to provide a mapping of the critical points and pollutant elements. The search will rely to the sensors built-in …

At the supermarket with the navigator

17 Jan 2013

locata

GPS technology has now numerous applications in daily activities. Keep an eye on the kids, monitor the pet, follow the partner’s car is a cakewalk if you have the right tools. Shortly, it will possible use a sophisticated development of GPS technology in a shopping center or on the shelves of the supermarket so you’ll save time and optimize the product comparison. To lead the tour will be our trusty …

Internet of things will revolutionize our daily

10 Dec 2012

web-3-0

Web 3.0 isn’t yet far away. All the big laboratories are working hard to develop new applications concerning the Internet of things. With this neologism has been named the last frontier of online technology. The strength lies in the possibility given to objects to interact with each other by capturing and exchanging information. The alarm clock may sound for example in advance once found, through the Internet, heavy traffic conditions. …

Hop! the suitcase that follows you

13 Nov 2012

Hop-595x363

Pack your bags is always a problem. Weather conditions, formal and informal dresses, comfortable and casual, but also suited to special occasions that may occur…In short, a grind. And what often we create is a baggage too heavy and almost entirely useless. About 25 years ago, a pilot of the Nortwestern Airlines tried to obviate to the problem of having to lift heavy luggage introducing the trolley as we know …

Even sharks tracked with GPS

22 Oct 2012

ocearch-squali-gps

Until recently, GPS tracking systems were used for the control of small animals. Now the GPS challenges even the most dangerous animals. Indeed, it is in an experimental phase the scientific mission of the American non profit association, Ocearch, led by Chris Fischer. During the operation, the sharks are caught, mainly in North America, and to them is applied a GPS tracking device, then they come back to the sea. …

Home with the GPS shoes

1 Oct 2012

dominic_wilcox_sept_043

Dominic Wilcox, british designer, has created a fully functional prototype pair of shoes with a built-in GPS that will guide you home. The name of this extravagant invention is “No Place Like Home” and it’s inspired by the famous novel “The Wonderful Wizard of Oz” in witch the protagonist Dorothy, with her magic shoes, can go everywhere clicking her shoes together three times. For Wilcox’s shoes, with expertly decorated sole, …