At war just like in video games, thanks to an iPad

October 29, 2010 Technology No Commenti

Recently we have seen how iPhone applications are increasingly being used also in the military, to control micro-helicopters used for reconnaissance or to perform simulations that help soldiers familiarize with anti-missile systems.
Therefore, it is natural that the new addition in the Apple family, the iPad, has generated the same attention from military authorities, who have already started several research projects to develop applications that can make life less dangerous for U.S. troops at the front.

An interesting application was developed by Textron, which can be used can keep under control the movements of troops, displaying them on the iPad screen as if they were part of a videogame. The application, called Soldier Eyes, uses augmented reality to detect, in collaboration with the soldiers directly involved in the area, the location of enemy and friendly forces, sending the relevant information back to a control center, which builds up a map in real time.

This map is then sent directly on the iPad, whose users can communicate in real time with soldiers on the front line, giving them the location of potential enemy threats, displayed directly on their smartphones or PDAs. Soldier Eyes achieves this through simultaneous use of a series of small applications that manage the information coming from the field, to provide an overview of the situation.

Once the picture is clear, one can send out two patrols of soldiers to separately attack an enemy position, simply by send them information directly on their iPad or iPhone, so that they can view the location of their target and converge towards the same point from different directions in order to neutralize it.
In short, this is a way to conduct real operations of real war, but making them look almost like a simple video game.

600 hours in only 4 mm on your microrecorder

October 29, 2010 Technology No Commenti

The occasions when you may need to record conversations, sounds or music, in a discreet way and as invisibly as possible, are countless: a concert, a lesson at school or in college, a meeting in the office or, for law enforcement and private detectives, during a difficult criminal investigation or for a case of marital infidelity.

In such cases, it is important that the hidden recording is done using a tool that can not arise unnecessary attention, which can be easily concealed and, if necessary, can operate autonomously for a long time, by turning on automatically only when absolutely necessary, to avoid wasting time by recording hours of useless background noise.

Therefore, you should use a EM type voice recorder, which is able to achieve all this,in spite of its extremely tiny size. In fact, there are some models that, although sporting a thickness of only 4 mm and a size comparable to that of a credit card, have features such as voice activation sensor and a storage capacity of 4 GB, that is, approximately 600 hours of recording.

With automatic activation, you can record only when necessary, in order to get the most out of your audio surveillance operation or intelligence gathering; this feature guarantees optimization of battery consumption, which is guaranteed to last up to 1 month when in standby mode, or for up to 14 hours of continuous recording.

Thanks to its compact dimensions, it will not be easily visible, and you can retrieve it with ease when no one is watching you. For more details on the operation of digital voice recorders, we recommend that you visit the Endoacustica website, where you will find other miniature models of recorders for all your different needs in this field.

A plane, a helicopter … or both?

October 29, 2010 Technology No Commenti

As those who read this blog may happen to know, we often find ourselves commenting on the new creations of the big brains at DARPA, a branch of the Department of Defense in charge of research for the military, which plays an important role to ensure that United States of America have a significant technological and strategic advantage over their potential enemies.

Therefore, any innovation that comes from DARPA does not surprise us too much. A mention of honour, however, it certainly assigned to DiscRotor, a VTOL (Vertical Takeoff and Landing) vehicle which represents a sort of hybrid between an airplane and a helicopter, whose rotor blades are mounted on (as the name goes) some sort of disc. Once the vertical take-off is completes, the blades can disappear within the disc, and DiscRotor can fly like a normal plane, using the disc as an additional wing; upon landing, however, it will be possible to use the rotor blades for vertical landing, especially if the operation is carried out in inaccessible areas where there is not enough space to allow landing of a common plane.

This therefore means that, thanks to DiscRotor, the speed of, for example, an evacuation of troops from a harsh environment, would be significantly increased, due to higher cruise speed of DiscRotor compared to that of a conventional helicopter, when it is in plane configuration.

Currently, the project is still in its initial phase, along with thousands of other high-tech projects that DARPA is constantly working on. I wonder if one day we will be able to see this strange object fly over our heads like a normal plane, then suddenly stop, pull out its rotors and gently land, just like a chopper.

Listening through a wall requires the right microphone

October 27, 2010 Technology No Commenti

We all happened at different times, to wish that we were able to listen to what happens beyond a wall, perhaps during a confidential meeting in the office, or because we have an annoying neighbor, or simply to make sure that our children are not hanging out with the wrong company.

This is not always possible, but thanks to modern technology for discreet listening, it is much easier than you might think.

If you have ever watched those old Wild West movies where crooks open a safe using a stethoscope to find out the right combination, you know what we are talking about. In fact, it is thanks to the modern variant of this procedure, that you can easily listen to conversations taking place behind a wall that can be thick up to 70 cm.

With a wall microphone, equipped with a cap very similar to your doctor’s stethoscope, but teamed up with digital technology that turns it into a high sensitivity microphone, you will be able, easily and without being noticed, to capturing all that your neighbor, your teenage child or, why not, your boss, are saying while they think no one is listening.

All this can then be also connected to a digital voice recorder, so that you can store the conversations and use them as evidence in case of need, for example during a court audition.
In short, a stethoscope microphone can be your best friend to defend your interests or your loved ones!

For more information on how to purchase wall microphones, digital micro recorders and a whole range of equipment for security and defense of your privacy, please visit the Endoacustica website where you will find the answers to all your questions in this field.

Street View, a threat to our privacy

October 27, 2010 Technology No Commenti

Today, in Italy, on the main newspapers’ headlines we have seen the news that the Google Street View function that displays a road from a pedestrian’s point of view, allowing the viewer to take a look at the street as if they were really there, is under investigation in Italy, where a Rome prosecutor has opened an investigation file with the charge of unlawful interference with private life.

In fact, according to information that the data protection commissioner sent to the Court itself, the famous Google mini cars, which collect the images that will be used in Street View, have during their course collected sensitive data stored the WiFi networks encountered along the way.
From the Net giant’s headquarters in Mountain View, an apology note was immediately sent out, stating that the data have been collected in an accidental way, and offering full cooperation to the authorities in order to investigate and to ensure that this breach of privacy not only will not happen again in the future, but also will have no unpleasant consequences for the owners of the data inadvertently intercepted.

Such data may contain not only access information and credentials for protected WiFi networks, but also email messages and passwords, which, may have devastating consequences if they fall into the wrong hands.

Moreover, according to the authorities that guard the individuals’ privacy in Italy, the cars that gather information for Google should be recognizable, so that those who happen to spot one and do not really want to be seen or photographed in inappropriate behavior or in a place where they are not supposed to be (for example, while leaving a mistress’s home…) have the opportunity to take adequate measures in time.

Google, which increasingly resembles a Big Brother 2000, will therefore have to limit its intrusiveness, to avoid having to face hefty penalties.

The human brain can be backed up like a hard disk

October 25, 2010 Biotechnology No Commenti

The name Raymond Kurzweil, for the majority of the general public may not mean that much, but he is one of the great gurus of modern technology, able not only to invent the first music synthesizer which could perfectly imitate the sound of the piano, thus overcoming one of the major limitations of electronic keyboard instruments, but also to predict, back in the eighties the development of the Internet as we know it now.

In addition to this, Kurzweil has contributed to progress with the inception of technologies such as voice recognition, but also with theories that bear witness to his visionary talent, such as when he envisioned the advent of a modern society in which all information could be obtained through computers connected in a worldwide network, a vision that at the time raise more than an eyebrow …

So when Kurzweil talks about the future, you should listen to him. According to his last prophecy, in twenty years from now it will be possible to make a copy of the data in our brain, a sort of backup copy which, just like the contents of today’s hard drives, could be easily saved on USB drives, and brought safely to consult it when needed, not only by the “owner” of the copied brain, but by others, and possibly also by his heirs after his death, to relive his memories and access to any knowledge that the deceased may have left behind, by reading the data through a search engine.

Theoretically, thanks to nanotechnology, this scenario is already possible today. Again, because of microscopic technologies, it will be possible, according to Kurzweil, to have micronized robots implanted in the human body, which would flow in our blood vessels to detect and cure any diseases, and to give us advice on habits we should follow, foods we should eat and medicines to take. In a few words, it will be a sort of Big Brother inside us, but (apparently) well-meant.

Who knows, maybe in the future, once the technology to make a backup copy of our brain is found, there could be a way to restore it, that is, to reinstall the data of a deceased person’s brain into that of a younger one, thus rendering eternal, if not his life, at least his knowledge and his memories.

The scenario is not exactly reassuring, but who knows, maybe in twenty years we will find a way to use all this knowledge in constructive ways.

How to work for the CIA

October 25, 2010 Technology No Commenti

For those whose criminal record and personal history are absolutely squeaky clean, and want to try to give their contribution to make the world a safer place, helping to defend it against terrorist threats, the CIA is constantly looking for staff.

But be careful, because those who already see themselves as an international spy, infiltrating dangerous terrorist groups, or dealing with collection of information in a foreign country, may be disappointed. In fact, in reality, modern espionage is highly technological, and most of the work of the Agency takes place behind a desk, carried out by analysts, experts in foreign languages and engineers with the highest possible professional profile and technological knowledge.

Knowing a foreign language perfectly, so that you can easily pass for native speakers (apart from the obvious visible differences) may be a first step. Languages in demand reflect the world’s current political situation, as for example, the CIA currently needs staff who speaks fluently, for example, Farsi or Mandarin Chinese, Korean or Russian, since the relations with the countries where these languages are spoken are a bit shaky, to say the least.

The most important conditions for becoming a CIA Agent, then, are to have an absolutely perfect personal background and history, and to be flexible, with an analytical mind and able to react quickly under high stress.
If anyone thinks he can hide, for example, a fine not paid for a parking ticket, or that they have smoked some weed when they were young, and think they can pass the polygraph test, they do not have to waste their time, as the CIA can, and will, find out.

Those who aspire to a job in Langley must be able to keep secrets so strictly that not even the closest family members can discover the true nature of a cover job, for example, at real estate or insurance agency.

Those who think they have the right characteristics must also be prepared for a long wait, because the background checks during the selection process are extremely accurate, and only the best manage to get through a process which will single out the best out of a bunch of hopefuls.

Ah, one last condition: if you think you are the best in the world, but you are not a U.S. citizen, you need not apply!

Can text messages be intercepted?

October 24, 2010 Technology No Commenti

Those who fear that their conversations could be intercepted, especially if they use the phone to discuss sensitive topics, confidential subjects or matters of a certain financial relevance, sometimes think that, to avoid being tapped, they can use SMS to communicate securely.

Unfortunately for them, though, this is not true, and actually, an SMS would leave an indelible track, which could easily be used against us at any time and in any situation. In fact, thanks to modern systems mobile phone wiretapping, not only one can listen to calls from any phone within a radius of several hundred meters, but also read all SMS traffic in the same area.

These systems are able to read the encoding used by cell phone networks to encrypt conversations; therefore, to protect oneself from covert listening, the best way is certainly to encrypt our conversations, using a code that is not the one used to encrypt the signal sent through the network, and thus add an extra layer of protection to our telephone conversations.

The principle used to make encrypted phone calls is the same that we see every day on our computers, if we use a system such as PGP to protect our e-mail.

In fact, on the cell phone is installed a simple encryption software, which combined with the relevant encryption key, converts the audio track into an unintelligible noise. If our counterpart’s phone has the same software and the same encryption key, it can decode this noise, and our conversation will go on regularly and without prying ears.

Any attempt to intercept, would only be able to hear only the noise of the encoded phone call, but would not be able to decipher it. In this way, our phones are safe from being tapped, and we will not have to worry that sensitive information could end up in the wrong hands, with the potential risk to create serious damage to our work or our family.

Anyone wishing to learn more about various ways to ensure privacy protection, by telephone, at home or in the office, may visit the Endoacustica website and consult our experts, at your disposal to find the solution that best suits your safety needs.

Telephone harassment? Use a voice changer

October 23, 2010 Technology No Commenti

Often, for a woman who lives alone, a call is not necessarily bringing good news or the warm sound of a friendly voice. On the contrary, as we can see from the growing number of stalking cases anywhere in the world, sometimes at the other end of the line there can be a molester, often a known person, such as a persistent ex boyfriend.

In such cases, change phone number may not be enough, in addition to being very uncomfortable (for example, to communicate your new number to friends, acquaintances, relatives and business associates). So instead of running away from telephone harassment, security technology offers the opportunity to defend yourselves in a more subtle way, without having to hide.

In fact, if you can not avoid phone calls, the best way to make them stop quickly is to use an electronic voice changer, which is a device that, when connected to your home phone or mobile phone, would electronically modify the human voice through an algorithm which works on the voice’s frequencies, with the result of transforming, for example, the voice of a woman in that of a man and vice versa.

Thanks to the voice changer, you can change your voice to make people believe that the person who picks up the phone is a child or an elderly person, a boy or a girl. All this in an absolutely natural way, because the algorithm does makes the voice “metallic”, and the person at the other end of the phone can easily be led to believe that they dialed the wrong number or that the person they are looking for is no longer there.

Thanks to this voice changing device, you can avoid not only phone stalkers, but also dodge pressing creditors, telemarketing companies trying to force you to buy products that you do not really need, and so on. For more information on how it works, we recommend that you visit the Endoacustica website.

http://www.endoacustica.com/blog/tecnologia/molestie-telefoniche-cambiatevi-la-voce/

How to build your listening bug

October 23, 2010 Technology 1 Commento

For those who want to give audio surveillance a try and, despite not having the necessary resources to purchase a complete set of bugging devices and hidden microphones for secret listening, are equipped with a good deal of patience as well as some basic knowledge of electronics, today on the Internet it is very easy to find instructions to build your own equipment that can perform the same job at a fraction of the cost.

For example, on one of the many specialized sites, you can find detailed instructions to concoct your own spy bug, with simple off-the-shelf pieces that can easily be obtained by recycling an old radio.

Obviously the result will not be something that can be used by a surveillance professional for performance at the highest level, but it can be more than enough, for example, to listen to your neighbors or your children while they are playing in their room.

The intelligence you gather can be easily listened to with a standard FM radio, so maybe if you’re going to pull a prank on your neighbors, make sure that they do not have their radio on, or they may end up listening to themselves in real time!

Detailed instructions for building this device, that must be considered nothing more than a toy, are quite simple for those who have a basic understanding of electronics, and with just a few hours of work, you can build your first bug and start playing the secret agent!

Obviously though, if you plan to use an audio surveillance system, made up not only of spy bugs and hidden microphones, but also of radio transmitters suitable for professional use, for example to resolve a case of marital infidelity, it is strongly advised to consult experts in this field, who could give you professional advice, according to your surveillance needs, and why not, to your budget.

Calendar

October 2010
M T W T F S S
« Sep   Nov »
 123
45678910
11121314151617
18192021222324
25262728293031

NEWSLETTER

e-mail:
name:
Newsletter Endoacustica Europe - ENGLISH

Login

CONTACT US

Endoacustica Europe srl
Via Umberto Terracini, 47
70029 Santeramo in Colle (BA)
P.IVA IT06836020724
ITALY
tel. 0039 080 30 26 530
tel. 0039 080 43 73 08 93
fax 0039 080 40 73 11 87
e-mail: info@endoacustica.com

Text ADS

 SPY PHONE
spyphone A SpyPhone or GSM Spy cellphone, is a normal mobile phone, where a software has been installed, which allows a third party to monitor the activities of the phone user. To avoid suspicions, a Spyphone must be given either as a present (for family members monitoring) or given as company equipment (for personnel monitoring).

 MICRO DIGITAL RECCORDER
digital video recorder Micro digital recorder with vocal activation have recording time of 1200 hours long. They went out from the big screen to enter by force in the life of every day, in the most diverse situations that until a few years ago even the vivid imagination of a writer of espionage could have imagined.
 WALL MICROPHONES
Wall microphones to listen through walls up to 70 cm. Ultra sensitive professional stereo microphone, suitable to pick up the lowest noises thanks to its very high sensitive ceramic microphone. Limpid and stable sound. Endowed with sockets for recorder and earpiece.
 PHONE VOICE CHANGER
The phone voice changers when interposed between handset and phone, will change your voice into another one. It transforms any voice into a masculine, feminine, adult or child one.The voice changer can be adapted to cell phones, cordless phones, speakers and microphones, recording systems, or connected to switchboards. The reproduced voice is not a robotic but a human one.
 REAL TIME TRACKERS
localizzatore rf

Real time trackers are designed for those who need to keep their pets under control, while limiting the relevant cost, but also to locate precious objects or to remember where you parked your car.

 ANTI-DROWNING AND ANTI-LOSS ALARM
anti loss alarm

Anti-drowning defender is an alarm device which combines anti-drowning and anti-loss alarm, and works effectively as an electronic safety device for protecting children or pets from drowning and loss.

Relevant artilcle

Attention to the new gadgets of thieves

14 Feb 2014

mendicante-a-semaforo

This may be the last discover of ingenious thieves who don’t hesitate to resort to the technology to hit unsuspecting victims. The news of recent months shows several cases where someone complains of being robbed, at home or in the company, after agreeing to unknowns small gadgets, deployed on the street, particularly at the crossings or when the light is red. The hypothesis is that these gadgets (lighters, key chains …

Never lose things again with the geolocation tools

19 Sep 2013

etichettatag

The geolocation is getting closer, at your fingertips. We’re all constantly losing things. Keys, bag, charger and many other tools of daily use are very often forgotten, lost. The hard part is finding them. This discomfort could be deleted with the help of geolocation devices. In particular, big companies and startups are trying to answer to the distraction effects with products that will come soon on the market. Their secret would be an accessory, …

Stop mobile phones theft

30 Jul 2013

furto-cellulare

One hundred twenty thousand a year, ten thousand a month are the mobile phones stolen (or loss). These are the numbers from the homeland of mobile phones, smartphones and tablets thieves: London. The Mayor, Boris Johnson, and the police are really troubled about the weight of these statistics and asked to the same companies devices producing to investigate about what is happening. In particular, they asked to Apple, Samsung and …

Locate a mobile phone with the technique used by bats and dolphins

4 Jul 2013

Pipistrelli

Locate the exact position of a cell phone in enclosed spaces may become possible thanks to an algorithm that allows us to reconstruct the 3D shape of a room, listening to the echo of the sounds produced inside, even simple ones like the snap of the fingers. The project was developed by a research group at the EPFL. The researchers were inspired by echolocation, the system by which some animals …

Fish-robot will patrol the Thames River

10 May 2013

robot_fish

It’s environmental surveillance, the new frontier crossed by the fish-robot that will be released, in the coming months, in the Thames in order to sniff out pollution. Scenes like science fiction movies are recorded during the tests in the water. The robots will be released in groups of five in order to provide a mapping of the critical points and pollutant elements. The search will rely to the sensors built-in …

At the supermarket with the navigator

17 Jan 2013

locata

GPS technology has now numerous applications in daily activities. Keep an eye on the kids, monitor the pet, follow the partner’s car is a cakewalk if you have the right tools. Shortly, it will possible use a sophisticated development of GPS technology in a shopping center or on the shelves of the supermarket so you’ll save time and optimize the product comparison. To lead the tour will be our trusty …

Internet of things will revolutionize our daily

10 Dec 2012

web-3-0

Web 3.0 isn’t yet far away. All the big laboratories are working hard to develop new applications concerning the Internet of things. With this neologism has been named the last frontier of online technology. The strength lies in the possibility given to objects to interact with each other by capturing and exchanging information. The alarm clock may sound for example in advance once found, through the Internet, heavy traffic conditions. …

Hop! the suitcase that follows you

13 Nov 2012

Hop-595x363

Pack your bags is always a problem. Weather conditions, formal and informal dresses, comfortable and casual, but also suited to special occasions that may occur…In short, a grind. And what often we create is a baggage too heavy and almost entirely useless. About 25 years ago, a pilot of the Nortwestern Airlines tried to obviate to the problem of having to lift heavy luggage introducing the trolley as we know …

Even sharks tracked with GPS

22 Oct 2012

ocearch-squali-gps

Until recently, GPS tracking systems were used for the control of small animals. Now the GPS challenges even the most dangerous animals. Indeed, it is in an experimental phase the scientific mission of the American non profit association, Ocearch, led by Chris Fischer. During the operation, the sharks are caught, mainly in North America, and to them is applied a GPS tracking device, then they come back to the sea. …

Home with the GPS shoes

1 Oct 2012

dominic_wilcox_sept_043

Dominic Wilcox, british designer, has created a fully functional prototype pair of shoes with a built-in GPS that will guide you home. The name of this extravagant invention is “No Place Like Home” and it’s inspired by the famous novel “The Wonderful Wizard of Oz” in witch the protagonist Dorothy, with her magic shoes, can go everywhere clicking her shoes together three times. For Wilcox’s shoes, with expertly decorated sole, …