Home » Technology » Articoli recenti:

How to find out if my phone is intercepted?

ottobre 19, 2010 Technology No Commenti

int

In an era where communication is mostly happening via phone, wiretapping must also be able to follow the new trends, and adopt new technologies. Unlike the eavesdropping of phone calls made on normal land line networks, however, cell phone interception does not require planting bugs on the line cable, or straight into the phone, of the person under surveillance.

In fact, in most cases, interception of mobile phones is carried through a device, as small as a suitcase, which can hack into the mobile network, decoding the encryption code that protects the conversations, and enabling its users (usually police or law enforcement) to listen undisturbed to calls that occur within a few hundred meters.

These devices operate in a completely non-invasive way, and the persons intercepted are generally not able to figure out that they are being listened to. Therefore, all the urban legends on this subject are completely unfounded, like the one that says that by typing in a particular sequence of numbers you can find out if your phone is under control, or that the buzzing sound that you can hear when your phone is close to a radio or TV (which indicates a connection to the nearest cell) is actually and interference caused by an interception device.

To protect our conversations from this kind of eavesdropping, the best way is to add an extra level of protection to out phone calls, by using an encrypted mobile phone handset. The conversations between two devices of this type, in fact, take place via an encryption key, which is installed directly on the cell and therefore impossible to access from the outside.

Just like an email sent in encrypted format, the caller uses an encryption key to make his call. If the call receiver has a phone which is equipped with the same key, any unauthorized listener can hear nothing but an unintelligible white noise. Therefore, for your secure phone calls, usage of an encrypted phone allows you to stay safe from prying ears.

In any case, if you have doubts or suspicions that your phone can be under control, certainly the best thing to do is to consult an expert. For all your telephone privacy needs, we recommend that you contact Endoacustica, with its several years of experience at your disposal to find the best solution for your case.

GSM Bug, remote surveillance in 4 cm

ottobre 19, 2010 Technology 2 Commenti

We heard more than once that “size does not matter”, and this is especially true in audio surveillance technology, in which very often the best results are achieved by using equipment the size of a few millimeters, which despite their tiny size are capable of providing outstanding performance.

For example, this is the case with GSM bugs, which can have a size even smaller than 4 cm, but which, thanks to a sensitive microphone, and most of all to their built-in SIM card, are able not only to listen to conversations that take place within their operating range, but above all to transmit their intelligence in real time to a distant listener, even on the other side of the world!

In fact, thanks to its voice-activated sensor, as soon as the GSM bug detects a sound above 60 decibels around it, the SIM card will automatically initiate a telephone call, towards a preset phone number (i.e. your cell phone number, for example), and you can listen live and in absolute secrecy, to the conversations picked up by its microphone.

The GSM Bug , thanks to its tiny size, is suitable for being concealed almost anywhere, with its battery which provides enough juice to operate for long periods of time. Concealing it in places such as the inside of a car, you can start listening in, as soon as it is switched on. In addition, the operating parameters of the bug, as well as its sensitivity settings can be changed remotely, by simply sending an SMS to the SIM card.

To find out in detail the operation of GSM Bug and of a wide range of listening devices, you can visit the Endoacustica website and contact our experts in surveillance, for a tailored advice.

Free WiFi, anytime and anywhere? Now you can

ottobre 19, 2010 Technology No Commenti

In our cities, it has become quite common to see people who, with their laptops or smartphones, roam around trying to find a free wireless network to check their mail, or to surf for study or work while they are outside.

Now, thanks to the latest technological development, a device called WiFi Stealth, this view could become a thing of the past, because anyone can become a hacker and be able to always find a free connection.
In fact, WiFi Stealth is not just a wireless receiver, but allows it to decode any key (that is, WEP security keys used to protect wireless networks), allowing its users to access not only open networks, but also to those protected with a password.

It has an operating range much wider than that of common wireless cards mounted on our computers or cell phones; in fact, WiFi Stealth is able to detect wireless networks within a radius of two kilometers, and with a simple click, you can easily decode the WEP key and access it.

It is a standalone device, which does not need to be connected to a computer to function, and therefore can be used to create a hotspot, simply by exploiting the wireless network from your neighbor of from the office upstairs.

The price that the manufacturer declares, on its website, is just over $ 150, surely a worthwhile investment in the long term, as it allows you to save on connection fees. Obviously though, such a technology is probably prone to a usage less innocent than simply saving on subscription, but it could put into the public domain some confidential information, stored on encrypted networks.

For further information, you can visit the Endoacustica website.

Marital infidelity? Fix it with a bug

ottobre 14, 2010 Technology No Commenti

It happened to all of us, or at least most of us, to have doubts about the reliability of their spouses, perhaps because of odd behavior, suspicious phone calls or unexpected absences. Often it can happen, fortunately, that such fears will prove unfounded, but this is not always the case.

To avoid sleepless nights and endless self-questioning, and to be reassured on the stability of your relationship, technology provides us with the bugs or hidden microphones, invaluable tools to solve cases of marital infidelity silently, unobtrusively and with maximum efficiency.

In fact, by connecting a bug to your home phone line, you can easily listen to conversations without the parties being aware. In addition, thanks to items such as GSM bugs, you can listen to these conversations in real time, even if you are on the other side of the world.

The bug, in fact, contains a SIM card just like the one of an ordinary mobile phone, and can be set to start operating as soon as the telephone handset is lifted. At that point, via the SIM card, it will automatically call your phone, enabling you to listen to what happens on the home phone, in a discreet and unnoticeable way.

The GSM bugs can be remotely programmed via SMS, and can be configured to suit your surveillance needs, to ensure absolute control of the situation. Power is supplied by connecting the cable directly into the mains, to operate continuously.

By using a hidden listening device, you can determine whether your fears are well founded or not, and solve the problem one way or another. For more details on the various types of bugs and their operation, you should contact Endoacustica.

Military security and sturdiness for USB drives

ottobre 14, 2010 Technology No Commenti

One of the latest developments in the field of data security, when files and documents are traveling on a small USB drive, comes from Japan, where Adata has just presented its last product for data storage, which has military-grade specifications in terms of protection and security of the files it stores.

This drive has been dubbed S007, with a nod to dear old James Bond and the gadgets you can see in his movies; just like the super spy in the movies, this USB drive is extremely difficult to defeat, at least for any hackers or whoever should find a lost one and wants to take a look into it. It is also shock resistant and waterproof, making it suitable for use in the field and in action, when the situation becomes dangerous, bullets fly and you have to get dirty if you want to complete your mission.

Also, when it comes to items suitable for military use, one must also take into account not only strength, but also data protection. From this point of view, the S007 drive is compatible with the most advanced military standards, in terms of encoding used for the encryption.

The data is also transferred quickly through the USB 2.0 protocol, and thanks to its OS To Go feature, you can launch Windows 7 on the computer you connect it to, without installation and without having to use the original DVD.

The cost and date of launch of the S007 have not yet been specified, guess we will just have to wait and, as good secret agents, keep eyes and ears open!

Biometric identity verification… through your ears!

ottobre 14, 2010 Technology No Commenti

With the advancement of biometric technologies for identification, the traditional method of ID-ing individuals by fingerprints could soon be obsolete, and our identity could be verified through our ears!

In fact, according to a team from the University of Southampton in the UK, every human being has different ears, unique in the world, and therefore they can be used as an identification method.
Moreover, unlike other biometric identification methods, their characteristics remain unchanged along the entire life of a human.

On the other hand, fingerprints may change due to a cut or burn, and therefore would not be comparable with a previous scan, while facial recognition systems would not be able to recognize the face of an elderly person if the stored image belongs to the same person when he or she was young.

The British University team created a software that can capture the biometric image of an ear, adding it to an identity verification database of the photographed subjects. This software is based on a technology that accurately measures the internal structures of the ear; that during the testing phase, it has shown a reliability of 99 percent.

The next step is to use it in real life situations, and more specifically as a form of identification at British airports; Stansted airport is already operating a biometric identification system with facial recognition, whose features were fine-tuned over the course of two years of use. Along with the reliability already proven, identification through biometric photos of the ear also has an advantage for the people being identified.

In fact, if for example for retinal identification, the person must be standing near a scanner that collects the image of their iris, this has disadvantages for the elderly or disabled. Instead, the software developed at Southampton gives the opportunity to collect the image with a special camera that can be used easily even on people with disabilities who can not stand or walk.

Tracking down pets, kids and objects … via radio!

ottobre 13, 2010 Technology No Commenti

Anyone who has children or pets, or often both, at home, knows that it is difficult, if not impossible, to curb their curiosity, which pushes them to take a look around, not only in hidden corners of the house, but also outside, looking for something to play with; in such cases, it may be difficult to locate them immediately.

On the other hand, those who work at night and come back home tired, on the next morning may not be able to remember where they parked the car, or maybe they can not find the keys because they left them inside their coat, inside a drawer and so on.

For these two types of requirements, so different but so similar, technology comes to the rescue with a device that allows us to track pets, children, lost items and more.

In fact, thanks to a radio frequency locator, you can track down the location of the object or person you are looking for. The system consists of a small transmitter and a receiver.
The transmitter is mounted on some kind of bracelet, which a child can wear on his wrist, or you can place on a pet’s neck, or leave inside your car; when the main unit starts the search, the bracelet, with its signal, will guide you in the right direction, allowing you to find what you are looking for

The tracker, with an operating range of up to 5 km, is a valuable tool for all those situations where you lose sight of someone or something, and it is vital to find it immediately. For more details on the various object tracking options available on the market, please visit the Endoacustica website.

Remote surveillance with a grain of sand

ottobre 13, 2010 Technology No Commenti

The Israeli Defense Ministry, which for obvious reasons has always been at the forefront of research applied to defense and surveillance, has created the world’s smallest gyroscope, roughly the size of a grain of sand.
Despite its microscopic size that makes it absolutely invisible, it is so sensitive that it can provide accurate tracking of its position, and that of who unknowingly takes it along.

Thanks to the collaboration of scientists from the University of Tel Aviv, who developed it from a technology very similar to what is being used for sensors mounted on aircraft and ships. Everything has been miniaturized to the maximum, without losing anything in terms of accuracy. The gyroscope is teamed up with a standard GPS sensor so as to establish its exact location.

At the basis of this new gyroscope, there are microscopic laser semiconductor particles. When the gyroscope rotates (for example when mounted on a mobile phone), the light emitted by the lasers changes imperceptibly in terms of intensity and wavelength. By measuring these differences, the gyroscope is therefore able to measure the rotation, and any movement.

Therefore, combining this sensitivity to that of a GPS sensor, you can determine its user’s location with greater precision than it can be achieved now, especially in areas where GPS signal may have difficulty reaching you, such as in a narrow street in the city between two tall buildings.

Obviously, remote surveillance is only one of the possible applications of this technology, especially if the researchers manage to miniaturize the GPS sensors in the same way.

Long distance listening, without being noticed

ottobre 5, 2010 Technology No Commenti

How many times have we seen two people, whether friends or perfect strangers, engaged in a conversation, at a distance from which we could not hear what they were saying, and wanted to be able to hear it without being exposed? Of course, those who have found themselves in these situations, have mostly been left with nothing and could not listen.

But now, thanks to audio technology, long distance listening of conversations of your neighbors, colleagues, or family members, or even collecting evidence of industrial espionage or of a possible marital infidelity, has become much easier, especially if you use a directional microphone or a laser microphone.

Through the use of microphones of this kind, with their high sensitivity features and characteristics, it is possible to listen to conversations within a range between about ten meters and more than a mile! By hiding in a car behind a fence, and pointing the microphone in its direction, you can easily listen to what the people behind it are talking about.

Actually, you can even easily hear what goes on behind a closed window, thanks to a directional laser microphone. In fact, by pointing the invisible laser beam on a window, the beam will read the vibrations on the glass caused by voices inside the room behind the closed window, and transmit them to a decoder located at a safe distance, which reads them, transforming vibrations into human voice.

Be it to listen to your neighbors or to gather evidence against dangerous criminals, from a distance of a few meters up to more than one kilometer, a highly sensitive directional microphone allows you to listen to everything!

To find out in detail how long range microphones are working, and to discover the endless possibilities of application, you can visit the Endoacustica website and contact our experts for personalized advice.

The first plane with no flaps is an unmanned plane

ottobre 5, 2010 Technology No Commenti

BAE Systems has just made history of aviation, with the first ever flight of an aircraft not fitted with flaps on its wings. In fact, this unmanned aircraft, or UAVs (Unmanned Aerial Vehicle), called DEMON, instead of flaps and ailerons, resorts to the use of controlled air jets to move upward or downward while in the air.

Normally, the wings of a conventional aircraft are equipped with moving parts (the flaps) in the back, which are opened and extended backwards and downwards during takeoff and landing. This changes the shape of the wing, and air must follow a different path to travel around the wing itself, creating a lift.

The Demon UAV, instead, achieves the same result via controlled air jets, which alter the course of the air near the wings, instead of modifying the shape of the wing itself. Sensors mounted on the tips are used to continuously monitor the air flow and to change the direction of the air jets.

According to experts, this could make flying much easier, due to lack of moving parts that could potentially get stuck. In addition, a plane with a profile like that leaves a smaller radar footprint, with easily imaginable advantages for stealth-mode flights, which makes these UAVs particularly suitable for use in reconnaissance missions behind enemy lines.

Demon is in its experimental stage and is still not entirely autonomous, but once then tests are successfully completed, it will operate independently from any human control from the ground, except for setting up the mission coordinates and mounting the necessary equipment to carry it out.
Although this is a prototype, its features have sparked a great interest in aviation, because in a not too distant future, the solutions used for this UAV could also become commonplace in commercial aviation.

Calendar

agosto: 2017
L M M G V S D
« Lug    
 123456
78910111213
14151617181920
21222324252627
28293031  

NEWSLETTER


e-mail:
name:
Newsletter Endoacustica Europe - ENGLISH

Login

CONTACT US

Endoacustica Europe srl
Via Umberto Terracini, 47
70029 Santeramo in Colle (BA)
P.IVA IT06836020724
ITALY
tel. 0039 080 30 26 530
tel. 0039 080 43 73 08 93
fax 0039 080 40 73 11 87
e-mail: info@endoacustica.com

Text ADS

 SPY PHONE
spyphone A Spy Phone or GSM spy cellphone is a normal mobile phone on which has been installed a software able to reply many crucial information such as: listening of all incoming and outgoing calls from the mobile, real time phone surrounding sounds, reading of all type of messages (SMS, WhatsApp, Facebook, Viber etc..) and GPS tracking. The spy software works on the most of Android, iOS, Blackberry smartphones.

 MICRO DIGITAL RECORDER
digital video recorder Micro digital recorder able to gather evidence or discover any kind of betrayals. Recording capability of up to 1200 hours in continuous. Long duration for those recorders using voice activation system VAS. Just for you the best micro digital voice recorders on the market in terms of efficacy and reliability at a low price.
 WALL MICROPHONES
Wall microphones able to listen through walls thick even up to 70 cm. Ultra sensitive professional stereo microphone, suitable to pick up the lowest noises thanks to its very high sensitive ceramic microphone. Limpid and stable sound. Endowed with sockets for recorder and earpiece.
 PHONE VOICE CHANGER
The phone voice changers when interposed between handset and phone, will change your voice into another one. It transforms any voice into a masculine, feminine, adult or child one.The voice changer can be adapted to cell phones, cordless phones, speakers and microphones, recording systems, or connected to switchboards. The reproduced voice is not a robotic but a human one.
 REAL TIME TRACKERS
localizzatore rf

Real time trackers are designed for those who need to keep their pets under control, while limiting the relevant cost, but also to locate precious objects or to remember where you parked your car.

 ANTI-DROWNING AND ANTI-LOSS ALARM
anti loss alarm

Anti-drowning defender is an alarm device which combines anti-drowning and anti-loss alarm, and works effectively as an electronic safety device for protecting children or pets from drowning and loss.

Relevant artilcle

Attention to the new gadgets of thieves

14 Feb 2014

This may be the last discover of ingenious thieves who don’t hesitate to resort to the technology to hit unsuspecting victims. The news of recent months shows several cases where someone complains of being robbed, at home or in the company, after agreeing to unknowns small gadgets, deployed on the street, particularly at the crossings or when the light is red. The hypothesis is that these gadgets (lighters, key chains …

Never lose things again with the geolocation tools

19 Set 2013

The geolocation is getting closer, at your fingertips. We’re all constantly losing things. Keys, bag, charger and many other tools of daily use are very often forgotten, lost. The hard part is finding them. This discomfort could be deleted with the help of geolocation devices. In particular, big companies and startups are trying to answer to the distraction effects with products that will come soon on the market. Their secret would be an accessory, …

Stop mobile phones theft

30 Lug 2013

One hundred twenty thousand a year, ten thousand a month are the mobile phones stolen (or loss). These are the numbers from the homeland of mobile phones, smartphones and tablets thieves: London. The Mayor, Boris Johnson, and the police are really troubled about the weight of these statistics and asked to the same companies devices producing to investigate about what is happening. In particular, they asked to Apple, Samsung and …

Locate a mobile phone with the technique used by bats and dolphins

4 Lug 2013

Locate the exact position of a cell phone in enclosed spaces may become possible thanks to an algorithm that allows us to reconstruct the 3D shape of a room, listening to the echo of the sounds produced inside, even simple ones like the snap of the fingers. The project was developed by a research group at the EPFL. The researchers were inspired by echolocation, the system by which some animals …

Fish-robot will patrol the Thames River

10 Mag 2013

It’s environmental surveillance, the new frontier crossed by the fish-robot that will be released, in the coming months, in the Thames in order to sniff out pollution. Scenes like science fiction movies are recorded during the tests in the water. The robots will be released in groups of five in order to provide a mapping of the critical points and pollutant elements. The search will rely to the sensors built-in …

At the supermarket with the navigator

17 Gen 2013

GPS technology has now numerous applications in daily activities. Keep an eye on the kids, monitor the pet, follow the partner’s car is a cakewalk if you have the right tools. Shortly, it will possible use a sophisticated development of GPS technology in a shopping center or on the shelves of the supermarket so you’ll save time and optimize the product comparison. To lead the tour will be our trusty …

Internet of things will revolutionize our daily

10 Dic 2012

Web 3.0 isn’t yet far away. All the big laboratories are working hard to develop new applications concerning the Internet of things. With this neologism has been named the last frontier of online technology. The strength lies in the possibility given to objects to interact with each other by capturing and exchanging information. The alarm clock may sound for example in advance once found, through the Internet, heavy traffic conditions. …

Hop! the suitcase that follows you

13 Nov 2012

Pack your bags is always a problem. Weather conditions, formal and informal dresses, comfortable and casual, but also suited to special occasions that may occur…In short, a grind. And what often we create is a baggage too heavy and almost entirely useless. About 25 years ago, a pilot of the Nortwestern Airlines tried to obviate to the problem of having to lift heavy luggage introducing the trolley as we know …

Even sharks tracked with GPS

22 Ott 2012

Until recently, GPS tracking systems were used for the control of small animals. Now the GPS challenges even the most dangerous animals. Indeed, it is in an experimental phase the scientific mission of the American non profit association, Ocearch, led by Chris Fischer. During the operation, the sharks are caught, mainly in North America, and to them is applied a GPS tracking device, then they come back to the sea. …

Home with the GPS shoes

1 Ott 2012

Dominic Wilcox, british designer, has created a fully functional prototype pair of shoes with a built-in GPS that will guide you home. The name of this extravagant invention is “No Place Like Home” and it’s inspired by the famous novel “The Wonderful Wizard of Oz” in witch the protagonist Dorothy, with her magic shoes, can go everywhere clicking her shoes together three times. For Wilcox’s shoes, with expertly decorated sole, …