Home » Self Defence » Articoli recenti:

Spain: a trojan to spy on suspects

giugno 28, 2013 Self Defence No Commenti

A virus of State, a trojan, perfectly legal, to be installed on computers, smartphones and tablets of those is under suspicion. The proposal comes from Spain and if it passes, will allow to the authorities – after the penal code reform – to spy on any electronic devices of a person under investigation or in remand. All this, of course, without that the subject is aware of them.

The idea is of a commission from the Spanish Ministry of Justice following the German example. In Germany, the trojans are already used for terrorism investigations. What it does discuss is the indiscriminate use of intercepted data. Once installed, the trojan, in fact, the possibilities are endless for the police. They can access to the passwords of all profiles and to bank details, use Skype and even e-mail services. When the police have obtained the permission of the judge to install it, the program is automatically extended to all electronic devices, including smartphones, tablets and USB drives. And operators are obliged to cooperate with the authorities.

According to the proponents of the law, this system would be useful against pornography, organized crime and terrorism. The debate in Spain is about the production of the trojans. Who will develop it will have big gains and power. What is certain is that also in Europe is raising the question of controls (and interceptions) on the web. Always in Germany, the government and the federal police have admitted to monitor Skype, Google Mail, MSN Hotmail, Yahoo Mail, Facebook and chats if it appear necessary.

The main tools currently used for this type of interceptions are spy softwares able to listen calls live, read incoming and outgoing messages, know the location of the phone and thus also of the suspect and listen what is happening in the surrounding environment. All this in an absolutely discrete manner. The same thing is valid for computers: key loggers and key hunters can find out everything that happens on a computer, including passwords and chat. Apparently the trojan is already in action!

How U.S. monitor citizens

giugno 14, 2013 Self Defence No Commenti

A few days ago it appeared the news about high controls implemented by the National Security Agency with the tacit agreement of the White House and the Department of Justice, in short, for account of the U.S. Government.

We wanted to find out more about how these data are captured and transferred. Massimiliano Sala, one of the leading European experts, director of the encryption laboratory of the Trento University gave an interview to “La Repubblica” in which he explains how work the great interceptions machine “made ​​in the USA”.

According to his experience, “The U.S. government, through the National Security Agency, first takes the “metadata”, records with summary data about communications: who called whom, at what time, what sites were visited”. As if they had installed a phone bug per citizen and key loggers for the PC.

The real interception probably is carried out “with the collaboration of a telephone or internet operator then provides the records to the government. Would it be possible to get them without the help of operators, through bugs inserted on all nodes of communication”, but considering the large number of U.S. citizens would be too expensive.

From the metadata, then they try to understand what conversations and connections should be further explored in content. “It’s probably using an algorithm that triggers an alarm when it detects some abnormal behavior“.

“In short, if the metadata has a match with a pattern of behavior usually associated with dangerous people, an alarm is triggered and the government acquires the contents of the emails and phone calls. Then, it goes to Google and searching for the suspect email texts. So it asks to the operator to work together to intercept phone calls, through special devices connected to systems and telephone lines”.

Control is carried out “using a sophisticated artificial intelligence, which simulates the human. The terrorists and gangsters certainly don’t write or say suspect words on the phone, but they use periphrasis. So the algorithm doesn’t seek for exact words, but processes the sentence to understand. “Later, the algorithm triggers the alarm and the case goes to the agent in flesh and blood.

In targeted cases, it works in the same way with extremely professional tools such as telephone bugs or parabolic microphones, both able to listen conversations at distance virtual or physical. In this way, the control being targeted, not affecting the privacy of honest citizens who most of the times are intercepted without real reasons.

Texting while walking, accidents on the rise

giugno 5, 2013 Self Defence No Commenti

There are numerous videos on YouTube that show episodes in which people, focused on the smartphone screen, have accidents, only sometimes ridiculous, sometimes with much more serious consequences. It will be they have just received a text message, who are monitoring their partner or who want to know where is their child, at all happened to be distracted by cell phone while there are on the street. Few people stop themselves to handling the tool, the most, distractedly, continuing their own path in haste or simply by habit.

It seems a trivial matter, but if the action is carried out distracted in a busy street or with intense traffic, walk without attention can be really dangerous. The same is true if you pay attention on the phone while you are driving.

Crash Alert is the application for pedestrians that has the aim to reduce the dangerousness of that which could only seem an innocent habit. The app is based on a quite simple technology. It’s a microcamera, equipped with distance sensors, which replaces the eyes of those who are distracted by the phone, scanning the road, and impediments. When it detects one, on the top of the smartphone display appears a bar with a red square. The position of the square indicates the direction in which you risk a collision. According to the first tests with this app you avoid 60 percent of obstacles, without, the percentage drops to 20 percent. Clearly, the special software reduces the dangerousness, but it doesn’t delete it altogether.

In 2008, an American research found that the cases of accidents related to the texting on the street had doubled over the previous year. Some people involved had only the nose or a cheekbone broken against a street lamp or a wall, others had much more serious problems. According to the data relating to the accident of pedestrians, in 59 per cent of cases, the fault is of the distraction for the cellphone.

But it isn’t only the direction of the gaze on the display to generate problems for texting while walking; at the base there is the natural limit of the attention span of human beings. In fact, we can focus our attention only on three different objects. This is the reason that leads a person to crash against a wall, while his attention is absorbed by the smartphone or any other type of tools. In practice, while we are writing a text message, our brain is temporarily unable to engage, in a conscious way, to any other aspect of our reality. So there is no app that can change the nature of man.

The technology applied to the surveillance at school

maggio 16, 2013 Self Defence No Commenti

With the increasing use by the young people of smartphones, tablets and electronic devices with internet connection, it became necessary to take countermeasures in order to ensure the smooth conduct of tests, exams and competitions. It’s clear the absolute prohibition of any technological aid during the written tests. Obviously the advices of discouragement aren’t enough to inhibit the employ of these tools.

And so the italian school principals have asked to the Minister of Education to assess the possibility to use, in the examination centers, of electronic devices designed to detect the presence of cell phones on or even in stand-by.
Let’s see how they work. These are systems that work with a range of about 30 meters. As soon as they locates a cellphone they can allert in differen ways: with a red light signal, with a sound alarm, or sending a message to the user asking him to turn off the device.


In the case of Endoacustica Cell Detector, the device doesn’t detect only the phones in use (for a conversation or in sending data), but also those are in stand-by mode.
The usage is very simple, suitable even for less experienced teacher. Just a few minutes to set various operating parameters and put it to work immediately, configuring it to your liking the level of sensitivity and volume of the notice. Once in action, its batteries allow a range of use of more than one year, all in a discreet manner, simple and above all, absolutely legal.

In short, students that intended to copy thanks to its smartphones should start studying seriously. In fact we have to contradict students who have judged unreliable these kinds of tools and who believe that it takes months for the delivery of the same. The Endoacustica products are professional and of highest level, used by leading investigative agencies; the same can be found on the website www.endoacustica.com, ordered and delivered in a couple of days.

Everybody wants drones

aprile 23, 2013 Self Defence No Commenti

In the U.S. everybody wants a drone, many civil administrations have request them. The Federal Aviation Administration is looking for six sites where realize tests to the use of drones (unarmed) in national territory and it has received offers from numerous organizations from 37 states. There isn’t money for the project, but most of the proponents believe in future applications in the security field to show that, in the fight against crime, they are unbeatable.

The idea is to use the drones to observe with bird’s-eye view the cities, but in different parts of the U.S. there is a high intensity of air traffic and drones could pose a danger. Added to this are the issues related to privacy and intrusiveness of government in the private lives of citizens. Over time, it’s clear the risk of abuses of all kinds: the drones will end up into the hands of anybody and they could be used in private. Excellent video surveillance systems have been already adopted by many administrations without having the need of drones and damming, in the same way, incidents of crime.

There isn’t doubt, instead, about the drones success in military field. From the entry in office of Obama to now, the robots have taken part in many military campaigns, including Yemen, Somalia, Afghanistan, killing many victims. In Pakistan, the drones are controlled directly by the CIA. More than half of American citizens appreciate the fact that the soldiers in the flesh and blood don’t risk their lives.

In short, the unmanned aircrafts attract the attention of many countries that haven’t the resources to manage air force. The Americans obviously are advantaged and they are keen to remain so; they don’t exclude the application in other fields such as marine or forestry.

There remain many shadows about the use of drones in the field of civil security. At the moment exist on the market powerful video surveillance systems that have little or nothing to envy to the robot and, above all, they don’t jeopardize the privacy of citizens.

U.S. look to recruit hackers for digital defence

aprile 18, 2013 Self Defence No Commenti

The USA Department of Homeland Security searching for about 600 hackers to employ in the next years to reinforce the digital defence of the country. The research is part of a program to discover young talents that emerge from software competitons, real challenges of computer security and creativity.

In reality isn’t the first time that United States are looking for “border line” people to involve in the security field. Also others agencies are searching for informatic experts to enrich their activities.
This need arises from the continuous increase of cyber crime that endangers the existence of institutions, public and private companies. The intrusion in database and unauthorized access to reserved information taking place every day and provide huge damages to the businesses.

Many companies had adopted security systems for PC and make regular environmental bug sweeps to verify the presence of any bugs or other hacking and control systems. Only in this manner they can prevent leakage of data, and the consequent losses.

According to the estimates of McAfee, large computer security company, the potential damage caused by cybercrime and by data loss amounted at $4.6 million on average for each company in a sample examined by a study in collaboration with Purdue University. The telecommunications giant At&t estimates that the U.S. companies will double or triple the cost of digital defenses.

Last summer, the National Security Agency has even sent some talent scouts to a famous conference of hackers, Defcon, so to enter step by step in a particular world. But on the best digital experts don’t bet only the U.S., but also many other nations. Recently ended in the United Kingdom, the third edition of the Cyber ​​Security Challenge: the competition included the work on a software application with mathematical formulas of encryption that protect business communications.
At the moment to help companies and institutions there are only self-defence tools.

The car without driver

aprile 9, 2013 Self Defence No Commenti

The dream of many drivers could become reality. Travel miles and miles without concerns and in safety it might be possible with the car that drives itself, or rather, the car without driver.

To lead the project is a team of researchers from the University of Oxford that has developed a model that, using cameras and laser, is able to move autonomously in traffic, without requiring that the person at the wheel do anything and without even the need somebody to be sitting in the driver’s seat. This type of car is ideal for those who repeat the same route every day, for example, to go to work or to accompany children to school. In any case, the human pilots can resume anytime the vehicle driving, simply by touching the brake pedal with your foot and then turning off the autopilot.

At the moment there are still some limitations: the prototype “doesn’t know the road” so it’s necessary that a human teaches the path so that the cameras installed on the car record it on a dedicated computer or on an iPad. Once the route has been stored out of the car, just plug it in again, as you would with a navigation system, and the “automatic pilot” repeats exactly the same.
A system of laser beams, naturally, probe the road in search of all kinds of obstacles: other vehicles, pedestrians, dams, and softly presses the brake until it stops if it finds one, restarting only when the obstacle is no longer visible on its screens. Also today the cost of the new technology is quite high, about 5000 pounds (about 6000 euro), but the English experts think that in a short time the price will drop down to £ 100 (120 Euros).

So we still have to wait and in the meantime make use of valid measures in support of our safety on the road. An example is definitely the anti sleep driving alarm of Endoacustica Europe which drastically reduces the risk of accidents caused by tiredness and sleep. The device is positioned above the ear and, in the case in which the head is inclined more than 30 degrees, it starts to produce a loud sound that gives the driver quickly to reality. The product is already available for purchase online from the website www.endoacustica.com, in the section “Self Defense”.

The answer to the wiretapping: the Stealth Phone

aprile 4, 2013 Self Defence No Commenti

More and more frequently, on newspapers’ headlines, we can read news about telephone wiretapping of conversations between politicians, business men, public officials and “important” people. Nowadays, anyone who knows even just a little of a person in certain circles risks that his conversations are intercepted. The only solution is the use of an encrypted phone.

Through the different systems developed by the technology applied to the cell phone (GPS trackers, network access, app and software ..) we are always reachable at any place and at any time. This advantage can quickly turn into a curse at a time when we share sensitive information, or simply personal ones with a person whose phone is placed under control. We would be in danger of having our name exposed, and might be facing consequences for our personal life or business.

To save ourselves from this kind of intrusion of our private space, and to make sure that our confidential conversations remain confidential, we need to be equipped with an Endoacustica encrypted cellphone. It’s like a normal cell phone, but inside, there are a powerful 256-bit encryption software that guarantees transmission of our phone calls in an encoded format, which cannot be decrypted by any third party. We just need that the person at the other end of the phone call is equipped with the same encryption key, and our calls will be absolutely safe, impossible to decode. The secret key can be edited at any time, thus adding one more layer of security. The installed software is completely invisible and can be password-protected.

You have to know that wiretappings are mainly based on the identification number of the device. So, who thinks to be safe changing the SIM card and using the same cellphone solves nothing. In this moment, the most advanced model is the Stealth Phone. It’s equipped with a software that continuously changes its handset identification number (IMEI). This phone doesn’t need another encrypted phone to work properly and it can work even as stand-alone. It also has a built-in firewall that would notify you in real time of any intrusion attempt with acoustic sound or blinking light notification. There are also landline phones to ensure secure phone calls at any time.

The functional clothing: between defense and help

marzo 8, 2013 Self Defence No Commenti

More and more often the clothing assumes functional roles well as aesthetic. Just think of military equipment or articles for extreme sports. A garment that contains both previous examples can surely be the Endoacustica suit with rubber shock (purchased separately).
The fabric that carries the padding, is in lycra, while the padded areas are covered with an abrasion resistant cordura with Teflon finish. This type of padding, combined with an hard and resistant shell, works much better than any other rigid protection currently available on the market, which clearly penalizes the flexibility and freedom of movement.

Even if they are very resistent, the overalls are very thin (max. 9 mm) and therefore can be worn like a second skin under clothing. As absurd, the harder you hit the padding, the better it works. The padding material is flexible, breathable, re-usable and washable and it’s made of a revolutionary material called d3o (dee-three-oh) which is made of “Intelligent Molecules” that flow with you as you move but on shock/impact lock together, in a fraction of a second, to absorb the impact.
A revolutionary garment in short, increasingly used by athletes of extreme sports, stuntmen, actors, martial artists, groups attack and many other enthusiasts and professionals.

The clothing also tries to help people with physical problems, such as the overall made ​​by the University of Illinois, which could help the blinds. The outfit applies pressure on the body that warns you when someone is nearby or when you are close to objects and obstacles. The dress is made ​​up of robotic arms and sensors which send an ultrasonic signals, it’s called SpiderSense, because it recalls the abilities of spiders.

The suit is organized in modules and each module is a small box of 6x4x3 cm which contains both the sensor for ultrasound both the arm, length 6 cm, able to rotate and to provide the necessary pressure to alert the user. SpiderSense can also be used by cyclists to provide them an idea of traffic, putting some sensors on the back and arms (such as rearview mirrors).

The songs that we listen to driving could be dangerous

febbraio 12, 2013 Self Defence No Commenti

We have spoken before of the dangerousness of cell phones at the wheel and how affect in these cases the fatigue and lack of sleep.

To this can be remedied with valid antisleep driving alarm such as that Endoacustica which, positioned comfortably over the ear, in the case in which the head is inclined more than 30 degrees, it starts to produce a loud sound that gives the driver quickly to reality.

To these cases most obvious, it’s added a list of “dangerous songs”, songs considered dangerous driving, compiled by Confused.com. In general, according to research, women who listen hip-hop tend to drive more aggressively, the same is true for men with the rock music.

In the first place there is “Hey Mama” by The Black Eyed Peas, followed by “Dead on Arrival” (Fall Out Boy) and “Paper Planes” (M.I.A.).

On the other hand have been classified songs which would help to improve concentration driving. In pole position “Come Away With Me” by Norah Jones, “Billionaire Feat Bruno Mars” (Travie McCoy) and “I’m Yours” (Jason Mraz).

Here are the classifications:

Dangerous songs”

    1. Hey Mama – The Black Eyed Peas
    2. Dead on Arrival – Fall Out Boy
    3. Paper Planes – M.I.A
    4. Walkie Talkie Man – Steriogram
    5. Paradise City – Guns N’ Roses
    6. How You Remind Me – Nickelback
    7. Hit the Road, Jack – Ray Charles
    8. Get Rhythm – Johnny Cash
    9. Heartless – Kanye West
    10. Young, Wild and Free – Snoop Dogg & Wiz Khalifa (feat. Bruno Mars)
    1. Come Away With Me – Norah Jones
    2. Billionaire Feat. Bruno Mars – Travie McCoy
    3. I’m Yours – Jason Mraz
    4. The Scientist – Coldplay
    5. Tiny Dancer – Elton John
    6. Cry Me a River – Justin Timberlake
    7. I Don’t Want to Miss a Thing – Aerosmith
    8. Karma Police – Radiohead
    9. Never Had a Dream Come True – S Club
    10. Skinny Love – Bon Iver

Relaxing” songs:

Calendar

dicembre: 2017
L M M G V S D
« Nov    
 123
45678910
11121314151617
18192021222324
25262728293031

NEWSLETTER


e-mail:
name:
Newsletter Endoacustica Europe - ENGLISH

Login

CONTACT US

Endoacustica Europe srl
Via Umberto Terracini, 47
70029 Santeramo in Colle (BA)
P.IVA IT06836020724
ITALY
tel. 0039 080 30 26 530
tel. 0039 080 43 73 08 93
fax 0039 080 40 73 11 87
e-mail: info@endoacustica.com

Text ADS

 SPY PHONE
spyphone A Spy Phone or GSM spy cellphone is a normal mobile phone on which has been installed a software able to reply many crucial information such as: listening of all incoming and outgoing calls from the mobile, real time phone surrounding sounds, reading of all type of messages (SMS, WhatsApp, Facebook, Viber etc..) and GPS tracking. The spy software works on the most of Android, iOS, Blackberry smartphones.

 MICRO DIGITAL RECORDER
digital video recorder Micro digital recorder able to gather evidence or discover any kind of betrayals. Recording capability of up to 1200 hours in continuous. Long duration for those recorders using voice activation system VAS. Just for you the best micro digital voice recorders on the market in terms of efficacy and reliability at a low price.
 WALL MICROPHONES
Wall microphones able to listen through walls thick even up to 70 cm. Ultra sensitive professional stereo microphone, suitable to pick up the lowest noises thanks to its very high sensitive ceramic microphone. Limpid and stable sound. Endowed with sockets for recorder and earpiece.
 PHONE VOICE CHANGER
The phone voice changers when interposed between handset and phone, will change your voice into another one. It transforms any voice into a masculine, feminine, adult or child one.The voice changer can be adapted to cell phones, cordless phones, speakers and microphones, recording systems, or connected to switchboards. The reproduced voice is not a robotic but a human one.
 REAL TIME TRACKERS
localizzatore rf

Real time trackers are designed for those who need to keep their pets under control, while limiting the relevant cost, but also to locate precious objects or to remember where you parked your car.

 ANTI-DROWNING AND ANTI-LOSS ALARM
anti loss alarm

Anti-drowning defender is an alarm device which combines anti-drowning and anti-loss alarm, and works effectively as an electronic safety device for protecting children or pets from drowning and loss.

Relevant artilcle

Attention to the new gadgets of thieves

14 Feb 2014

This may be the last discover of ingenious thieves who don’t hesitate to resort to the technology to hit unsuspecting victims. The news of recent months shows several cases where someone complains of being robbed, at home or in the company, after agreeing to unknowns small gadgets, deployed on the street, particularly at the crossings or when the light is red. The hypothesis is that these gadgets (lighters, key chains …

Never lose things again with the geolocation tools

19 Set 2013

The geolocation is getting closer, at your fingertips. We’re all constantly losing things. Keys, bag, charger and many other tools of daily use are very often forgotten, lost. The hard part is finding them. This discomfort could be deleted with the help of geolocation devices. In particular, big companies and startups are trying to answer to the distraction effects with products that will come soon on the market. Their secret would be an accessory, …

Stop mobile phones theft

30 Lug 2013

One hundred twenty thousand a year, ten thousand a month are the mobile phones stolen (or loss). These are the numbers from the homeland of mobile phones, smartphones and tablets thieves: London. The Mayor, Boris Johnson, and the police are really troubled about the weight of these statistics and asked to the same companies devices producing to investigate about what is happening. In particular, they asked to Apple, Samsung and …

Locate a mobile phone with the technique used by bats and dolphins

4 Lug 2013

Locate the exact position of a cell phone in enclosed spaces may become possible thanks to an algorithm that allows us to reconstruct the 3D shape of a room, listening to the echo of the sounds produced inside, even simple ones like the snap of the fingers. The project was developed by a research group at the EPFL. The researchers were inspired by echolocation, the system by which some animals …

Fish-robot will patrol the Thames River

10 Mag 2013

It’s environmental surveillance, the new frontier crossed by the fish-robot that will be released, in the coming months, in the Thames in order to sniff out pollution. Scenes like science fiction movies are recorded during the tests in the water. The robots will be released in groups of five in order to provide a mapping of the critical points and pollutant elements. The search will rely to the sensors built-in …

At the supermarket with the navigator

17 Gen 2013

GPS technology has now numerous applications in daily activities. Keep an eye on the kids, monitor the pet, follow the partner’s car is a cakewalk if you have the right tools. Shortly, it will possible use a sophisticated development of GPS technology in a shopping center or on the shelves of the supermarket so you’ll save time and optimize the product comparison. To lead the tour will be our trusty …

Internet of things will revolutionize our daily

10 Dic 2012

Web 3.0 isn’t yet far away. All the big laboratories are working hard to develop new applications concerning the Internet of things. With this neologism has been named the last frontier of online technology. The strength lies in the possibility given to objects to interact with each other by capturing and exchanging information. The alarm clock may sound for example in advance once found, through the Internet, heavy traffic conditions. …

Hop! the suitcase that follows you

13 Nov 2012

Pack your bags is always a problem. Weather conditions, formal and informal dresses, comfortable and casual, but also suited to special occasions that may occur…In short, a grind. And what often we create is a baggage too heavy and almost entirely useless. About 25 years ago, a pilot of the Nortwestern Airlines tried to obviate to the problem of having to lift heavy luggage introducing the trolley as we know …

Even sharks tracked with GPS

22 Ott 2012

Until recently, GPS tracking systems were used for the control of small animals. Now the GPS challenges even the most dangerous animals. Indeed, it is in an experimental phase the scientific mission of the American non profit association, Ocearch, led by Chris Fischer. During the operation, the sharks are caught, mainly in North America, and to them is applied a GPS tracking device, then they come back to the sea. …

Home with the GPS shoes

1 Ott 2012

Dominic Wilcox, british designer, has created a fully functional prototype pair of shoes with a built-in GPS that will guide you home. The name of this extravagant invention is “No Place Like Home” and it’s inspired by the famous novel “The Wonderful Wizard of Oz” in witch the protagonist Dorothy, with her magic shoes, can go everywhere clicking her shoes together three times. For Wilcox’s shoes, with expertly decorated sole, …