Home » Self Defence » Articoli recenti:

Anti spy tent: Obama outwits spies

febbraio 25, 2014 Self Defence No Commenti

The U.S. President, Barak Obama, certainly knows what are interceptions. Every time that he passes the night in a hotel, his staff assembles a tent. No, not a game for his daughters, but a protection in order to securely communicate with employees. The tent in fact protects him, thanks to a special fabric used to isolate and protect sensitive communications and speeches from prying eyes and ears. Furthermore, the anti bugs system is equipped with an apparatus called “white noise generator” capable of generating a noise that prevents bugs and micro voice recorders to transmit or record what happens inside the tent.

It seems that the security agents of the White House, take it for granted that the President is spied wherever he goes, so they are equipped to protect him. The anti spy tent is used to protect a variety of situations: read a secret document, make a call, use a computer or speak with other members of the government.

Our photo, for example, published by the “Times”, shows Obama in the tent in a Rio de Janeiro hotel, while talking on the phone of the latest developments in Libya. But the tent is not the only precaution taken by Obama. The president uses a phone impossible to intercept, shielded precisely to prevent eavesdropping, and it’s very likely that in his limo, which follows him wherever he goes, are made constant environmental bug sweeping to avoid the presence of any hidden bugs.

These defenses are mandatory for all members of the administration who receive a smaller structure similar to a phone booth. All other devices are practically prohibited, especially in rival countries like Russia and China, and after every meeting in the room of foreign governments, all equipment are subject to bug sweeping.

Spy apps and games: Angry Birds also in the viewfinder

febbraio 5, 2014 Self Defence No Commenti

The number of the areas in which it’s possible to spy is more and more large, day by day. After the revelations of last June, of Edward Snowden who had revealed to the world the spy programs of the National Security Agency (NSA), the news follow each other in a continuous manner.

And users have attacked the high-tech companies in order to obtain more details about their relationship with the U.S. government. This led to an agreement between the U.S. Department of Justice and the technology giants. With this compromise the companies can publish more details about the information shared with the Intelligence. Now, the agreement must be approved by the court created with the Foreign Intelligence Surveillance Act (FISA).

In particular, the internet groups will publish general information about how many requests they receive and from whom: NSA or FBI, for example. Also they can reveal the numbers of requests on the basis of one thousand and the number of accounts involved. In addition, Facebook and other companies will be able to provide data in real time, except for the requirements of the Foreign Intelligence Surveillance court that will be made ​​public after six months.

The terms of the agreement have the aim to find the right balance between the interests of the government (which doesn’t accept the leak of information that can help people under control) with the needs of hi-tech groups that need to respond to user requests always more concerned about internet control. In addition, any decision will also be applied to other technology companies that haven’t directly participated in the legal process.

And while more and more people are adopting systems in order to maintain the integrity of their privacy as Stealth Phone and defense tools against unauthorized interceptions, new secret documents, always provided by Snowden, reveal that since 2007, the NSA and the Government Communications Headquarters (GCHQ), have worked together to collect and store data from dozens of applications for smartphones, including the famous game “Angry Birds”.

In fact, among the most valuable tools to collect data, intelligence agencies ​​use  “leaky apps”, like “Angry Birds”, applications for mobile phones that share almost all the user information: from the identification codes of the devices, to gender, age, geographical location and other personal information. The two security agencies have sought to identify the physical location of users via “Google maps”, tried to copy telephone book and phone records, lists of friends and geographic data embedded in photos of who sends a post.

The SuperPhone to protect conversations

gennaio 22, 2014 Self Defence No Commenti

In this historical moment more than ever, the pressure to maintain their privacy in everyday life  and business field has become a priority. And as often happens the technology tries to respond to market demands by offering new tools, but sometimes could be the “same old story”.  But let’s look specifically. From years, there is a device adopted and widely used by business people, celebrities and businessmen, the Stealth Phone. This privileged tool, is a technologically advanced phone that can protect 100% of the telephone conversations.

In this regard, a few days ago news speaks about a new Superphone which will be showed from 24 February at the Mobile World Congress in Barcelona. This phone was born by a joint venture between the American Silent Circle and the Spanish Geeksphone; the phone will mount a new operating system derived from Android, named PrivatOS. They wrongly defined it as “the first device in the world to put personal privacy literally in our hands”.

The concrete, this tool has been riding the wave of Datagate, imitating existing tools such as the Crypto Phone or the Stealth Phone. The noise of the web and daily news promote the launch of the new SuperPhone as a good market operation.

This device will be of high profile. The goodness of the operation will depend obviously by the technical specifications of the new operating system, hardware and context in which it will be used: in short, we must consider the user. If our interlocutor will not use the same high-level system, the tool may be not very useful. It isn’t the same for the already tested Endoacustica Europe‘s products to which we have explained before, they’re certainly much more userfriendly.

2014: the counter-espionage year

gennaio 7, 2014 Self Defence No Commenti

2014 will be, without doubt, the counter-espionage year. After the Datagate scandal that hit the world with different effects depending on the area, many have asked during the  2013 to improve their security and surveillance systems. This isn’t a real innovation, but it’s a inevitable requirement. The principle is the that of the espionage, more and more frequent, especially by hackers, who in 2013 tried to develop them with testimonials and referrals to top-secret documents. In fact, 2014 will eliminate the espionage threats that causes uncontrolled daily damages to many businesses and people, even unsuspected. In 2013 it was brought to light the scandal, in 2014 it’s time to do the math.

We must recognize that numerous espionage acts are often make easy by the lack of equipment against external intrusion. In the course of 2013, smartest employers have already begun to increase the protection level of their companies with constant environmental bug sweeping and with the implementation of video surveillance and pc security tools.

These are monitoring tools that should be in every business whether large or small. In fact, it’s customary to think that small businesses are exempt from espionage, but in reality they are the most affected and subjected to the most disastrous damages.

To these systems are added personal attention for those who believe they can be subjected to indiscreet interception. This is for example the use of mobile phones impossible to intercept, as the Stealth Phone proposed by Endoacustica Europe. Unlike a mobile phone that operates on the encrypted voice data, codifying and making them unintelligible to any listener outside, the Stealth Phone instead protects the phone itself, making it untraceable. In addition there are other tools that can verify the presence of a bug on the phone line.

In short, the wide Endoacustica Europe range can be considered a great ally for the security of business and personal data and informations.

Discovered the secret interception base in the Mediterranean

novembre 11, 2013 Self Defence No Commenti

An hidden base to spy on all communications that cross the Mediterranean, created by British intelligence and managed in agreement with the Americans. The British surveillance structure is located in Cyprus, in the best position to control the relations between Europe and the Arab countries. It’s a series of buildings next to the slopes of a disused military airport. Particularly noteworthy are the parables of the satellites but also a large circular antenna, designed to intercept all radio signals in a large area. The espionage work, conducted from that structure, doesn’t concern only the transmission in the ether, but there is also the focus of the monitoring of all data – conversations, email, Internet traffic – that move along undersea cables positioned in the Mediterranean.

The building, remained in the hands of the British, has been in recent years at the service of the Comunication Government Headquarters activities, the British agency that makes electronic interception programs. The role of the Cypriot base takes particular importance for the English primacy in the surveillance of undersea fiber-optic cables, where today run all communications: telephone conversations, email or Internet data traffic. The Snowden’s dossier has reported the control of 14 fiber optic undersea cables: the key arteries that join America and Europe with Asia and Africa. Maps of the fiber-optic undersea cables indicate the island as a hub of numerous lines, that making it a site suited to spy on the communications of the eastern Mediterranean and the Middle East. There are cables that connect Cyprus and Israel to Syria, which are the Anglo-American targets. Other cables connecting Cyprus to Lebanon, Egypt, Turkey, Greece and continental Europe.

To protect your telephone conversations, the most reliable tools on the market today, is the Stealth Phone. Unlike a cell phone that operates on the encrypted data item, codifying and making them unintelligible to any outside listener, the Stealth Phone protects the call itself, making the phone untraceable, and impossible life for those who want to listen to it.   The wiretaps can be based on the IMEI number or on the phone number. So in the case where the interception is performed starting from the knowledge of your IMEI number, change the SIM card there will be of no help, because it’s the device itself to be intercepted.

McAfee device against NSA espionage

ottobre 11, 2013 Self Defence No Commenti

With his new device he promises to block the access to users’ personal data by the NSA. This is the purpose of John McAfee, IT and American entrepreneur, famous for his namesake antivirus. For now, “D-Central”, the name of the device, it’s only a project, but may soon enter the market. The device will be able to create a protection networks around small private networks to make them impenetrable by the controls of the National Security Agency; it will be integrated with smartphones, tablets and notebooks to allow users to communicate with each other via different media. And above all, it will be lowcost: the price will be around $100. Thanks to D-central, internet users will be able to communicate via private networks in movement and sent files being invisible to the controls of the NSA.

McAfee is looking for partners for the development of “D-central”, but he hopes to be able to produce it within next six months. Anti-espionage devices and systems have become a new niche in the tech industry, given that from the “Datagate” on, the privacy issue is increasingly debated. The “D-Central” by McAfee isn’t the first and the only device that can create great protection systems. Just think to the Stealth Phone for telephone conversations, proven tool used from several years. With this phone it’s possible to communicate in complete safety, given that the Stealth Phone allows you to add a high level of protection, safeguarding against risks of interception, now increasingly common. Unlike a cell phone that operates on the encrypted data item, codifying and making them unintelligible to any outside listener, the Stealth Phone protects the call itself, making the phone untraceable. This cell phone becomes in fact a new device every time, thus making its interception and localization impossible, so you can speak freely without fear of being heard or traced.

The anti sleeping driving alarm can save your life

agosto 30, 2013 Self Defence No Commenti

Numerous videos on the web portray inattentive or completely asleep drivers at the wheel of public transports. Dramatic pictures if you think to the high number of users who travel daily by public transport and that entrust their lives in the hands of a stranger.

A research has estimated that between 15 and 40% of major incidents is attributable to sleep or tiredness, often associated with other factors such as alcohol, drugs, hearty meal. It’s enough a moment. The eyes close, the head swoops over handlebar while the hands that grab it are more and more soft.
The “dozing off” is therefore responsible of about one incident in twenty. Tiredness is one of the most important factors with regard to safety. In fact you shouldn’t drive for more than two consecutive hours and every driving time should be followed by 10 minute of break and rest. Little sleep leads to drive more nervous and fast. And then the speed could be another consequence of the bad habit.

A coffee, the radio on, a person beside or a little break often aren’t enough. Endoacustica Europe has tested an antisleep device , which is positioned comfortably over the ear and, in the case in which the head is inclined by more than 15-20 degrees, it starts to produce a loud sound that brings the driver quickly to reality. The product can be purchased online from the site www.endoacustica.com, the “Self Defense”. A little trick that can save your life and the lives of the passengers. The tools should be adopted not only by individuals, but also, and above all, by the administrators of transport companies. Only the smartest administrator always puts safety first.

The PRISM system, what it is

agosto 6, 2013 Self Defence No Commenti

On 6 June, the Washington Post has shocked the world spreading the news of the existence of a clandestine surveillance system, which is managed entirely by the U.S. government through its two most important agencies, the NSA and FBI.
The code name is PRISM and it’s responsible to monitor everything passes through nine of the most important sites in the world: Microsoft, Google, Facebook, Yahoo, YouTube, PalTalk, AOL, Apple and Skype.
But let’s see what is PRISM, code-named of the US-984XN system. It’s a program of electronic surveillance and signal intelligence, classified “top secret” and used for the management of information collected from the internet and other electronic and telecommunication service providers.

It’s in operation for the National Security Agency (NSA) from 2007. Snowden (former employee of a computer company who works for the NSA) has described the PRISM program as enabled at the live surveillance of communications for much of the global Internet traffic and information stored. So with this tool you can get the contents of email, chat, voice and video chat, videos, photos, VoIP conversations, file transfer, and notification details of social networking sites. All this is possible thanks to the collaboration with leading service providers.

Furthermore PRISM exploits the characteristics of routing typical of the network: in particular the fact that the path followed by the packets during IP connections isn’t always the shortest but rather the cheapest. Thanks to these characteristics of routing much of the global traffic of communications between users/servers in different countries goes through the United States or U.S. ISPs; this allows to the system to store not only american data.

Snowden explained that the NSA, to expand the interceptions area, habitually carries tens of thousands of attacks against Internet backbone, both to friendly countries and Chinese providers. The only truly effective countermeasure that citizens can use to defend themselves by PRISM is, according to Snowden, the use of encryption systems (such as PGP, Tor and similar means.)
Cryptography is already used by leading security and surveillance companies to ensure the protection of telephone conversations. One example is the Stealth Phone of Endoacustica Europe that ensures maximum security making untraceable the phone and protecting the data. The intercepts often collaborate with the law, but that doesn’t mean that they should be carried out them without reason.

Spain: a trojan to spy on suspects

giugno 28, 2013 Self Defence No Commenti

A virus of State, a trojan, perfectly legal, to be installed on computers, smartphones and tablets of those is under suspicion. The proposal comes from Spain and if it passes, will allow to the authorities – after the penal code reform – to spy on any electronic devices of a person under investigation or in remand. All this, of course, without that the subject is aware of them.

The idea is of a commission from the Spanish Ministry of Justice following the German example. In Germany, the trojans are already used for terrorism investigations. What it does discuss is the indiscriminate use of intercepted data. Once installed, the trojan, in fact, the possibilities are endless for the police. They can access to the passwords of all profiles and to bank details, use Skype and even e-mail services. When the police have obtained the permission of the judge to install it, the program is automatically extended to all electronic devices, including smartphones, tablets and USB drives. And operators are obliged to cooperate with the authorities.

According to the proponents of the law, this system would be useful against pornography, organized crime and terrorism. The debate in Spain is about the production of the trojans. Who will develop it will have big gains and power. What is certain is that also in Europe is raising the question of controls (and interceptions) on the web. Always in Germany, the government and the federal police have admitted to monitor Skype, Google Mail, MSN Hotmail, Yahoo Mail, Facebook and chats if it appear necessary.

The main tools currently used for this type of interceptions are spy softwares able to listen calls live, read incoming and outgoing messages, know the location of the phone and thus also of the suspect and listen what is happening in the surrounding environment. All this in an absolutely discrete manner. The same thing is valid for computers: key loggers and key hunters can find out everything that happens on a computer, including passwords and chat. Apparently the trojan is already in action!

How U.S. monitor citizens

giugno 14, 2013 Self Defence No Commenti

A few days ago it appeared the news about high controls implemented by the National Security Agency with the tacit agreement of the White House and the Department of Justice, in short, for account of the U.S. Government.

We wanted to find out more about how these data are captured and transferred. Massimiliano Sala, one of the leading European experts, director of the encryption laboratory of the Trento University gave an interview to “La Repubblica” in which he explains how work the great interceptions machine “made ​​in the USA”.

According to his experience, “The U.S. government, through the National Security Agency, first takes the “metadata”, records with summary data about communications: who called whom, at what time, what sites were visited”. As if they had installed a phone bug per citizen and key loggers for the PC.

The real interception probably is carried out “with the collaboration of a telephone or internet operator then provides the records to the government. Would it be possible to get them without the help of operators, through bugs inserted on all nodes of communication”, but considering the large number of U.S. citizens would be too expensive.

From the metadata, then they try to understand what conversations and connections should be further explored in content. “It’s probably using an algorithm that triggers an alarm when it detects some abnormal behavior“.

“In short, if the metadata has a match with a pattern of behavior usually associated with dangerous people, an alarm is triggered and the government acquires the contents of the emails and phone calls. Then, it goes to Google and searching for the suspect email texts. So it asks to the operator to work together to intercept phone calls, through special devices connected to systems and telephone lines”.

Control is carried out “using a sophisticated artificial intelligence, which simulates the human. The terrorists and gangsters certainly don’t write or say suspect words on the phone, but they use periphrasis. So the algorithm doesn’t seek for exact words, but processes the sentence to understand. “Later, the algorithm triggers the alarm and the case goes to the agent in flesh and blood.

In targeted cases, it works in the same way with extremely professional tools such as telephone bugs or parabolic microphones, both able to listen conversations at distance virtual or physical. In this way, the control being targeted, not affecting the privacy of honest citizens who most of the times are intercepted without real reasons.

Calendar

agosto: 2017
L M M G V S D
« Lug    
 123456
78910111213
14151617181920
21222324252627
28293031  

NEWSLETTER


e-mail:
name:
Newsletter Endoacustica Europe - ENGLISH

Login

CONTACT US

Endoacustica Europe srl
Via Umberto Terracini, 47
70029 Santeramo in Colle (BA)
P.IVA IT06836020724
ITALY
tel. 0039 080 30 26 530
tel. 0039 080 43 73 08 93
fax 0039 080 40 73 11 87
e-mail: info@endoacustica.com

Text ADS

 SPY PHONE
spyphone A Spy Phone or GSM spy cellphone is a normal mobile phone on which has been installed a software able to reply many crucial information such as: listening of all incoming and outgoing calls from the mobile, real time phone surrounding sounds, reading of all type of messages (SMS, WhatsApp, Facebook, Viber etc..) and GPS tracking. The spy software works on the most of Android, iOS, Blackberry smartphones.

 MICRO DIGITAL RECORDER
digital video recorder Micro digital recorder able to gather evidence or discover any kind of betrayals. Recording capability of up to 1200 hours in continuous. Long duration for those recorders using voice activation system VAS. Just for you the best micro digital voice recorders on the market in terms of efficacy and reliability at a low price.
 WALL MICROPHONES
Wall microphones able to listen through walls thick even up to 70 cm. Ultra sensitive professional stereo microphone, suitable to pick up the lowest noises thanks to its very high sensitive ceramic microphone. Limpid and stable sound. Endowed with sockets for recorder and earpiece.
 PHONE VOICE CHANGER
The phone voice changers when interposed between handset and phone, will change your voice into another one. It transforms any voice into a masculine, feminine, adult or child one.The voice changer can be adapted to cell phones, cordless phones, speakers and microphones, recording systems, or connected to switchboards. The reproduced voice is not a robotic but a human one.
 REAL TIME TRACKERS
localizzatore rf

Real time trackers are designed for those who need to keep their pets under control, while limiting the relevant cost, but also to locate precious objects or to remember where you parked your car.

 ANTI-DROWNING AND ANTI-LOSS ALARM
anti loss alarm

Anti-drowning defender is an alarm device which combines anti-drowning and anti-loss alarm, and works effectively as an electronic safety device for protecting children or pets from drowning and loss.

Relevant artilcle

Attention to the new gadgets of thieves

14 Feb 2014

This may be the last discover of ingenious thieves who don’t hesitate to resort to the technology to hit unsuspecting victims. The news of recent months shows several cases where someone complains of being robbed, at home or in the company, after agreeing to unknowns small gadgets, deployed on the street, particularly at the crossings or when the light is red. The hypothesis is that these gadgets (lighters, key chains …

Never lose things again with the geolocation tools

19 Set 2013

The geolocation is getting closer, at your fingertips. We’re all constantly losing things. Keys, bag, charger and many other tools of daily use are very often forgotten, lost. The hard part is finding them. This discomfort could be deleted with the help of geolocation devices. In particular, big companies and startups are trying to answer to the distraction effects with products that will come soon on the market. Their secret would be an accessory, …

Stop mobile phones theft

30 Lug 2013

One hundred twenty thousand a year, ten thousand a month are the mobile phones stolen (or loss). These are the numbers from the homeland of mobile phones, smartphones and tablets thieves: London. The Mayor, Boris Johnson, and the police are really troubled about the weight of these statistics and asked to the same companies devices producing to investigate about what is happening. In particular, they asked to Apple, Samsung and …

Locate a mobile phone with the technique used by bats and dolphins

4 Lug 2013

Locate the exact position of a cell phone in enclosed spaces may become possible thanks to an algorithm that allows us to reconstruct the 3D shape of a room, listening to the echo of the sounds produced inside, even simple ones like the snap of the fingers. The project was developed by a research group at the EPFL. The researchers were inspired by echolocation, the system by which some animals …

Fish-robot will patrol the Thames River

10 Mag 2013

It’s environmental surveillance, the new frontier crossed by the fish-robot that will be released, in the coming months, in the Thames in order to sniff out pollution. Scenes like science fiction movies are recorded during the tests in the water. The robots will be released in groups of five in order to provide a mapping of the critical points and pollutant elements. The search will rely to the sensors built-in …

At the supermarket with the navigator

17 Gen 2013

GPS technology has now numerous applications in daily activities. Keep an eye on the kids, monitor the pet, follow the partner’s car is a cakewalk if you have the right tools. Shortly, it will possible use a sophisticated development of GPS technology in a shopping center or on the shelves of the supermarket so you’ll save time and optimize the product comparison. To lead the tour will be our trusty …

Internet of things will revolutionize our daily

10 Dic 2012

Web 3.0 isn’t yet far away. All the big laboratories are working hard to develop new applications concerning the Internet of things. With this neologism has been named the last frontier of online technology. The strength lies in the possibility given to objects to interact with each other by capturing and exchanging information. The alarm clock may sound for example in advance once found, through the Internet, heavy traffic conditions. …

Hop! the suitcase that follows you

13 Nov 2012

Pack your bags is always a problem. Weather conditions, formal and informal dresses, comfortable and casual, but also suited to special occasions that may occur…In short, a grind. And what often we create is a baggage too heavy and almost entirely useless. About 25 years ago, a pilot of the Nortwestern Airlines tried to obviate to the problem of having to lift heavy luggage introducing the trolley as we know …

Even sharks tracked with GPS

22 Ott 2012

Until recently, GPS tracking systems were used for the control of small animals. Now the GPS challenges even the most dangerous animals. Indeed, it is in an experimental phase the scientific mission of the American non profit association, Ocearch, led by Chris Fischer. During the operation, the sharks are caught, mainly in North America, and to them is applied a GPS tracking device, then they come back to the sea. …

Home with the GPS shoes

1 Ott 2012

Dominic Wilcox, british designer, has created a fully functional prototype pair of shoes with a built-in GPS that will guide you home. The name of this extravagant invention is “No Place Like Home” and it’s inspired by the famous novel “The Wonderful Wizard of Oz” in witch the protagonist Dorothy, with her magic shoes, can go everywhere clicking her shoes together three times. For Wilcox’s shoes, with expertly decorated sole, …