Home » Technology » Articoli recenti:

A bug inside your ordinary mouse

marzo 9, 2010 Technology No Commenti

Mouse

When it comes to long distance surveillance, one of the main factors is keeping the operation as secret as it gets, and when you have to use a remote monitoring system, you should try to make them as invisible as possible.

Thanks to the ever increasing miniaturization of technology, particularly the kind that is used in this specific field, it is now possible to conceal listening devices inside objects of everyday use and of small size, such as table calculators, office lamps, inside what looks like a USB drive or, for example, on the inside of a computer mouse, which can be equipped with a GSM bug.

The GSM mouse, at a first glance, is a perfectly normal mouse which, along with carrying out its ordinary duties, on the inside conceals a small but important secret: a micro transmitter teamed up with a SIM card.

All you have to do is replace your old mouse with this new one, and as soon as it is connected to the USB port, the transmitter will immediately be available to start working, allowing a third party listener to hear in real time the conversations in the room, no matter where he is. To listen in, all you have to do is a phone call.

When it is not used as a remote listening device, your GSM mouse works normally, in order to avoid arising any possible suspicion in its unaware user. When you want to be in touch with him, all you have to do is call the number connected to the SIM card, and in a completely invisible fashion you will be able to listen in real time to environmental conversations taking place within a few meters around your spy mouse.

Once the surveillance operation is completed, just hang up and the mouse will keep working normally, while the bug is in standby mode.

A shirt to tell you if you are connected

marzo 8, 2010 Technology No Commenti

AwareFashion

In our times, being always connected, always available and always traceable has become a modern need. The problem is that often, we may not be aware that even while we are offline, the net is always around us, as well as other surveillance and detection systems, mobile phones and Bluetooth connections.

To respond to this need, Richard Etter has created AwareFashion, the first clothing line made up of shirts which inform you about the presence of wireless networks, mobile phones or transmission systems around you.

By using a shirt from the AwareFashion line, it is for example possible to make sure that, inside a meeting or conference room, all mobile phones are duly switched off, or that no one is transmitting any confidential information to an outside receiver. The shirt is equipped with some sort of external pocket, with the same design as the shirt, which is attached on the shirt’s front or sleeve by means of buttons.

Inside this pocket, you can find a small lightweight antenna, which in turn is connected to thin optical fiber cables. When the antenna detects a transmission source, the end of the optical cable, placed on the shirt’s sleeve, will discreetly glow, informing its wearer that a source of transmission is nearby.

Optical fiber cables are sawn and inside the shirt’s stitches, making them look like an element of design and fashion rather than an electronic device, and the color of the glowing light can also be chosen by its wearer in order to add one further touch of style. Furthermore, the cables can easily be washed along with shirt and detachable pocket (but not with the antenna!).

The price of this techno-fashion wonder has not been disclosed yet, but quite sure, fashion or tech victims will anxiously be waiting to get one!

A micro helicopter for post-nuclear attack reconnaissance

marzo 8, 2010 Technology No Commenti

Nuclear UAV

At Virginia Tech University, a group of researchers is at work on designing an unmanned helicopter which, due to its characteristics, is one that its creators hope that they will never have the chance to use.

In fact, it is designed to be used for reconnaissance missions in areas hit by a nuclear strike or a dirty bomb, which combines conventional explosive and radioactive material, supporting investigators to detect radioactivity levels and gather intelligence data and images to assess the damage suffered.

The micro helicopter, approximately 6 foot long and with a weight around 200 pounds, is a Yamaha RMAX UAV (Unmanned Aerial Vehicle) which has been engineered by adding a software which, among other things, would have it head automatically towards a radioactivity source, if it is detected by the sensors mounted on the vehicle.

On top of that, it can carry, along with photo and video equipment, a mini robot, which is connected to a retractable wire and dropped on the affected area, where thanks to a small “vacuum cleaner” it can be used to gather evidence and debris, which is then analyzed to evaluate the level of radioactive contamination.

Thanks to its high maneuverability, this robot can reach the crater where an explosion took place, take pictures and measurements; furthermore, researchers are working to make it waterproof, in order to be able to use it in the difficult environmental conditions that follow an explosion, with broken water pipes, puddles and the like.

They are also studying the possibility of adding a range of devices to take 3D images of the ground, in order to better analyze characteristics of the blast and optimize rescue operations.
The project is being financed by the US Department of Defense, and should see the light before the end of the year although, for obvious reasons, we all hope that it is never used for applications for which it was designed.

Digital video recorders to expose cases of bribery

marzo 6, 2010 Technology No Commenti

Take the Money and Run

When it comes to having the possibility of using one’s position and power in the political arena, no matter how small or big, for a personal gain, the world is all the same, no matter which side of the fence one sits in.
So, at any latitude, at any level, you can hear about agreements reached under the table between majority and opposition, agreements which, instead of bringing about an advantage for the community, end up being profitable mostly for politicians of either side, or of both.

Generally this kind of agreement is reached silently, to avoid publicity and unpleasant political consequences. Sometimes though, it may happen that among the members of a chamber, or a local or regional council, there is someone who says no to this status quo and decides to expose these under-the-table agreements.

Something like this is what happened in a small Russian town, lost in the middle of the Siberian tundra. In that part of the world, corruption is unfortunately part of daily life, and opposing it means, too often, running a personal risk or putting one’s life in danger. All this was not enough to put down the local MP Sergei (not his real name) from his idea of making a corruption case known to the general public.

The question was about the opening of a waste processing plant near his town. The fact itself is quite a common thing which would not make the headlines, if not for the fact that, unbeknownst to the inhabitants, the plant was going to be used not only for common waste, but also to dispose of much more dangerous nuclear waste, of course without making the whole thing public.

To guarantee approval of this slight deviation from the official plan, both coalitions received promises of substantial sums of money, personal benefits or even luxury cars. This was being openly discussed during council meetings, with no shame whatsoever or any respect for the public.

To make this case public, Sergei equipped himself with a miniature video recorder, slightly smaller than a pack of cigarettes, concealed in the front pocket of his jacket.

A micro digital video recorder, in spite of its extremely small size, is capable of recording high quality video footage and clear sounds, without being visible at first sight, saving its recordings on a memory card, either built-in or additional, with a capacity of up to 32 Gb or more.

Recording can be easily started by casually pressing a button, without giving out any sign of activity and without raising any suspicion. Once the recording operation is completed, all you have to do is connect your digital video recorder to any computer thanks to the USB cable, and download your footage.

This is exactly what our Sergei did, and once he had his movies downloaded on his PC, he uploaded them on YouTube and made the link public in his town. Despite the fact that in Russia, people have a very lax attitude towards their politicians, and often turn a blind eye to corruption and bribery cases, getting to know that their hometown was to become the gravesite of tons of nuclear waste generated a widespread outrage, and several protests in the city ended up in having the project rejected. All this thanks to a local MP without a price tag on, and to his passion for technology.

If you want to give a go at taking video footage without being seen, not only to expose such cases, but just for work reasons, to take notes during a meeting, or for leisure (a day out with your friends, a concert and so on) and to have more information on how micro video recorders are working, you can visit the Endoacustica website.

Flying man really exists

marzo 5, 2010 Technology No Commenti

Jetpack

Human flight is nowadays really possible. Or at least, it is for those who can afford to spend at least 70000 dollars for this toy, which can turn anyone into a real jet man.

Manufactured by Martin Aircraft Company, a firm based in New Zealand (in Christchurch, to be more precise), the personal Jet Pack has a power of approximately 200 HP, and weighs around 115 kgs.
Thanks to its twin engines, it is capable of covering a distance of about 45 kilometers in half an hour with a full tank load. In order to use it, there is no need to have a pilot license, all you need is the 70000 dollars on its price tag and you are ready to experiment first-hand the thrill of human flight.

The latest evolution of Jet Pack can reach a speed of approximately 90 kilometers per hour, while taking its pilot to a height of over 2400 meters above sea level. At the current stage, Martin Aircraft has just started industrial production of what should be its commercial spearhead, and the first deliveries to their well-heeled customers should take place somewhere near the end of the current year.

Obviously, Martin Aircraft’s clientele is not limited to rich clients who wish to try human flight, but most of all the New Zealand manufacturer caters to other fields: for example, rescue and first aid services, or armed forces which might use it for reconnaissance missions or recovery of wounded personnel in war zones, especially where the terrain is particularly rough and unsuitable for conventional means of transport.

An iPhone application to delete your text messages

marzo 5, 2010 Technology 1 Commento

TigerText

As anyone living on planet Earth may have heard lately, the recent gossip news about world class professional golf player Tiger Woods teach us that sometimes, forgetting to delete text messages from your mobile phone may leave tracks and evidence which may turn out very harmful for our personal life, as well as for our finances, especially for those who, like Woods himself, are sitting on a substantial fortune.

Of course, the world of telephone communication could not leave the problem unsolved, and more specifically, the world of iPhone applications has quickly found a solution, by releasing a small piece of software which can automatically delete your text messages, both incoming and outgoing.

With a slight touch of irony, this application has been christened TigerText, and it works on iPhone and iPod Touch (but in the near future there will be a release for Android and BlackBerry). By using it, one will have the possibility to send text messages which, almost like in the movie Mission Impossible, will automatically self-destruct after being read, or will be automatically deleted after a certain time lapse which can be defined by the user, ranging from one minute to a maximum of 30 days after the message has been read.

Along with deleting text messages from the phone on which it is installed, TigerText can also remove it from the receiver’s handset, provided that both users are equipped with an iPhone and that the application is installed on both of them.
When a message is removed, the text disappears and is replaces by tiger footprints. By doing this, no dangerous tracks are left on either of the phones involved.

Unfaithful wives and husbands have a new friend now, and it comes really cheap: in fact, the service costs a maximum of 2.49 dollars a month; certainly an affordable price to protect peace in your family!

A high security USB drive

marzo 4, 2010 Technology No Commenti

SuperTalent

One of the main reasons for headaches, when using USB sticks to transfer data files from one computer to the other, especially if the transported files contain sensitive or private data, is that the key may, one way or the other, end up in the wrong hands, along with the data and files that it contains, with all the possible negative consequences that one may imagine.

To protect oneself from such kind of threat, the usage of USB encrypted keys is becoming more and more widespread, while the USB drives are becoming bigger (up to 256 GB of capacity) and most importantly, much safer than before, thanks to the application of several encryption technologies, which aim at making the data inaccessible for a non authorized user.

The latest example under this point of view is coming from the encrypted drive manufactured by the Californian company Super Talent, specializing in high security data storage devices and solutions.

Their new USB drive, called SuperCrypt, is equipped with AES type hardware encryption, and thanks to the USB 3.0 standard, it ensures an extremely high operating speed, which allows for a very quick transfer of large files (for example, transferring a 600 MB movie file would not take more than 7 seconds).

This USB drive is, of course, password protected, and is available with two different encoding levels (at 128 or 256 bit), which guarantee absolute protection for the data stored on your stick. The storage capacity varies from 16 to 256 GB, with different security and speed features depending on model and capacity of your choice.

A photo camera, a camera bag or…. both of them?

marzo 4, 2010 Technology No Commenti

Cloak Bag

For those who want to protect their photo camera in case of rain, for who wants to take quick shots without being immediately noticed, or simply for those who are just too lazy to take their camera out of its bag but still do not want to miss a single snapshot.

For all these situations and many more, a new product, called Cloak Bag, has just been launched on the market. At a first sight, it looks like your ordinary camera bag, but at a closer look you can see that it has a little secret: its bottom can be removed by unzipping it open, thus revealing its contents.

The photo camera is placed on the upper half of the bag, and by opening a slit on the side you can grab it and quickly take photos through the now open bottom. Thanks to its size and features, this bag is mostly suitable for reflex type cameras (SLR), which can be a little uncomfortable to use since they are not as quick as a digital camera, or because, especially in big cities, using them may not always be safe.

In some parts of the world, in fact, sometimes a gesture as simple as pulling out your camera (especially if it is as expensive as a SLR generally is) is tantamount to an invitation for pickpockets. For this reason, you may lose that special moment or that particular sight just out of fear that your camera might get stolen.

By using the Cloak Bag, the gesture is so quick and discreet that any potential robber would not have the time to figure out what you are really doing, and would not be able to do his dirty job.

In short, by spending a mere 49 dollars, we will no longer have to regret those pictures we could not take!

Mobile phone bugging is now made easier

febbraio 22, 2010 Technology No Commenti

Ear

If you are using your mobile phone frequently, especially for private and confidential conversations, or if because of your work you always have the handset on to carry out negotiations or exchange information, a small piece of news which appeared on newspapers worldwide should legitimately sound as a warning to you.

In fact, just a few weeks ago, a young hacker from Germany has declared that he has cracked the encryption key that is used to transmit voice and data over the GSM network. This standard key is adopted by all GSM network operators worldwide, and is based on a 64-bit algorithm which, no matter how safe it is, is still much less complicated to decipher than one might think, especially when compared to the highly advanced 128 or 256-bit keys in use on more recent systems, not only in telephone communications field.

Of course, the kind of job necessary to force the codes such as the one in use on GSM networks, called A5/1, is not so easy as to be done by anyone, and the devices used for this kind of operations are generally very expensive, which so far made this technology accessible only to government agencies and law enforcement.

Anyway, during a worldwide hackers’ symposium, one of them revealed that currently it is actually possible to sneak into the GSM network, by using simple equipment which costs not more than 3000 dollars. Once this device is started, all you need is 30 minutes of work and you will easily be able to listen to mobile phone conversations within the range reached by this system.

On top of this, with software tools such as Java Virtual Machine, it is possible to install any kind of program on a mobile phone, and the user would not even notice it, making it possible to remotely listen to his conversations, turning the handset into a real spy phone.

This said, what can the ordinary mobile phone network user do to protect himself from such invisible threats?
Of course we can not just stand still waiting for phone operators to upgrade their security standards, and in the meantime have our phone conversations exposed to the risk of being bugged.

The best option we have is to add one further layer of security on top of the GSM encryption, by providing ourselves with an encrypted mobile phone, that is, a normal cellphone on which a particular software is installed, that encodes its conversations, by using a 256-bit encryption key, much safer than the 64-bit standard GSM network key.

The conversation between two encrypted phones takes place following the same principle as key-protected email. By making sure that both cellphones engaged in a conversation share the same encryption key, any eavesdropping operation which could get through to the encrypted conversation would only be able to hear a white noise, and this means that your phone calls are absolutely secure.

Therefore, you will easily be able to talk about sensitive subjects, or carry our confidential or sensitive negotiations over the phone, without any fear that your conversations might be bugged by any prying ears. Naturally, if your counterpart has a mobile phone which is not equipped with the same encryption system, should his phone be bugged, your voice could be heard; it is therefore advisable to use at least two (or more) encrypted cell phones, to be used by the people whose conversations you wish to keep secret.

For more information about how the encryption software works, and the models of mobile phones on which it can be installed, we advise you to visit the Endoacustica website, and contact our specialists for specific advice tailored on your needs.

Stealth Phone and anonymous SIM card, for an absolute privacy

febbraio 9, 2010 Technology No Commenti

More than once, on this blog we mentioned the Stealth Phone, that is, a mobile phone which, thanks to a piece of software discreetly installed, is capable of working on the IMEI (International Mobile Equipment Identifier) number, which unequivocally identifies each and every cellphone in the world, and of making itself fully protected from any attempt at eavesdropping.

In fact, mobile phone call interception is carried out noy only, as one might think, by searching for the phone number, but also by using the IMEI number which identifies the handset, as well as the IMSI which is used to authenticate the SIM card mounted on our phone.

In most Western countries, SIM cards can be purchased only by presenting an identification document, and for many network operators they are also linked to a specific handset and its IMEI number. In practice, phone and SIM card are unequivocally linked to a person.

If you need to use your phone for private conversations or confidential business talks, it is advisable to keep the privacy level high by using an untraceable phone just like Stealth, which changes its IMEI number automatically each time it is switched on, basically turning into a different hone each time you use it.

Together with Stealth, the best way to maintain your anonymity is by using a rechargeable SIM card, not connected to any subscription contract which might reveal your identity to others. The problem is that in most countries, even to purchase a rechargeable card, a personal document must be presented, and this means that we would not be able to achieve a fully anonymous phone experience.

Fortunately though, thanks to Endoacustica it is possible to purchase form an extensive selection of anonymous SIM cards, that is, rechargeable phone cards, manufactured in several foreign countries, that do not require an identity document to be presented.

Furthermore, with this kind of service, recharging your credit on your mobile phone can be done with a Western Union money transfer, instead of using a bank transfer or, even worse, a credit card purchase, transactions which could become a visible link between your person and the anonymous phone number.

By adding an anonymous SIM card to a Stealth untraceable phone you will be completely safe and protected from interceptions.

In order to add one further layer of protection, we have created a new version of our Stealth software. This version, which can be used on a normal Nokia 6021 handset, will allow you to receive a notification in the highly unlikely case of an interception attempt.

In that case, your Nokia Stealth will discreetly vibrate, and at that point all you have to do is switch it off, then turn it on again to have a new IMEI number generated, and be once again safe from any unauthorized attempt at listening to your calls.

Thanks to these simple precautions, you will be able to carry out confidential business talks, private negotiations, or simply stay in touch with your loved ones, in a completely safe manner. Just make sure that your counterpart is equipped with the same level of protection and the same equipment, and you will no longer need to worry.

For more information about anonymous phone cards and invisible phones, we advise you to visit the Endoacustica website.

Calendar

ottobre: 2017
L M M G V S D
« Set    
 1
2345678
9101112131415
16171819202122
23242526272829
3031  

NEWSLETTER


e-mail:
name:
Newsletter Endoacustica Europe - ENGLISH

Login

CONTACT US

Endoacustica Europe srl
Via Umberto Terracini, 47
70029 Santeramo in Colle (BA)
P.IVA IT06836020724
ITALY
tel. 0039 080 30 26 530
tel. 0039 080 43 73 08 93
fax 0039 080 40 73 11 87
e-mail: info@endoacustica.com

Text ADS

 SPY PHONE
spyphone A Spy Phone or GSM spy cellphone is a normal mobile phone on which has been installed a software able to reply many crucial information such as: listening of all incoming and outgoing calls from the mobile, real time phone surrounding sounds, reading of all type of messages (SMS, WhatsApp, Facebook, Viber etc..) and GPS tracking. The spy software works on the most of Android, iOS, Blackberry smartphones.

 MICRO DIGITAL RECORDER
digital video recorder Micro digital recorder able to gather evidence or discover any kind of betrayals. Recording capability of up to 1200 hours in continuous. Long duration for those recorders using voice activation system VAS. Just for you the best micro digital voice recorders on the market in terms of efficacy and reliability at a low price.
 WALL MICROPHONES
Wall microphones able to listen through walls thick even up to 70 cm. Ultra sensitive professional stereo microphone, suitable to pick up the lowest noises thanks to its very high sensitive ceramic microphone. Limpid and stable sound. Endowed with sockets for recorder and earpiece.
 PHONE VOICE CHANGER
The phone voice changers when interposed between handset and phone, will change your voice into another one. It transforms any voice into a masculine, feminine, adult or child one.The voice changer can be adapted to cell phones, cordless phones, speakers and microphones, recording systems, or connected to switchboards. The reproduced voice is not a robotic but a human one.
 REAL TIME TRACKERS
localizzatore rf

Real time trackers are designed for those who need to keep their pets under control, while limiting the relevant cost, but also to locate precious objects or to remember where you parked your car.

 ANTI-DROWNING AND ANTI-LOSS ALARM
anti loss alarm

Anti-drowning defender is an alarm device which combines anti-drowning and anti-loss alarm, and works effectively as an electronic safety device for protecting children or pets from drowning and loss.

Relevant artilcle

Attention to the new gadgets of thieves

14 Feb 2014

This may be the last discover of ingenious thieves who don’t hesitate to resort to the technology to hit unsuspecting victims. The news of recent months shows several cases where someone complains of being robbed, at home or in the company, after agreeing to unknowns small gadgets, deployed on the street, particularly at the crossings or when the light is red. The hypothesis is that these gadgets (lighters, key chains …

Never lose things again with the geolocation tools

19 Set 2013

The geolocation is getting closer, at your fingertips. We’re all constantly losing things. Keys, bag, charger and many other tools of daily use are very often forgotten, lost. The hard part is finding them. This discomfort could be deleted with the help of geolocation devices. In particular, big companies and startups are trying to answer to the distraction effects with products that will come soon on the market. Their secret would be an accessory, …

Stop mobile phones theft

30 Lug 2013

One hundred twenty thousand a year, ten thousand a month are the mobile phones stolen (or loss). These are the numbers from the homeland of mobile phones, smartphones and tablets thieves: London. The Mayor, Boris Johnson, and the police are really troubled about the weight of these statistics and asked to the same companies devices producing to investigate about what is happening. In particular, they asked to Apple, Samsung and …

Locate a mobile phone with the technique used by bats and dolphins

4 Lug 2013

Locate the exact position of a cell phone in enclosed spaces may become possible thanks to an algorithm that allows us to reconstruct the 3D shape of a room, listening to the echo of the sounds produced inside, even simple ones like the snap of the fingers. The project was developed by a research group at the EPFL. The researchers were inspired by echolocation, the system by which some animals …

Fish-robot will patrol the Thames River

10 Mag 2013

It’s environmental surveillance, the new frontier crossed by the fish-robot that will be released, in the coming months, in the Thames in order to sniff out pollution. Scenes like science fiction movies are recorded during the tests in the water. The robots will be released in groups of five in order to provide a mapping of the critical points and pollutant elements. The search will rely to the sensors built-in …

At the supermarket with the navigator

17 Gen 2013

GPS technology has now numerous applications in daily activities. Keep an eye on the kids, monitor the pet, follow the partner’s car is a cakewalk if you have the right tools. Shortly, it will possible use a sophisticated development of GPS technology in a shopping center or on the shelves of the supermarket so you’ll save time and optimize the product comparison. To lead the tour will be our trusty …

Internet of things will revolutionize our daily

10 Dic 2012

Web 3.0 isn’t yet far away. All the big laboratories are working hard to develop new applications concerning the Internet of things. With this neologism has been named the last frontier of online technology. The strength lies in the possibility given to objects to interact with each other by capturing and exchanging information. The alarm clock may sound for example in advance once found, through the Internet, heavy traffic conditions. …

Hop! the suitcase that follows you

13 Nov 2012

Pack your bags is always a problem. Weather conditions, formal and informal dresses, comfortable and casual, but also suited to special occasions that may occur…In short, a grind. And what often we create is a baggage too heavy and almost entirely useless. About 25 years ago, a pilot of the Nortwestern Airlines tried to obviate to the problem of having to lift heavy luggage introducing the trolley as we know …

Even sharks tracked with GPS

22 Ott 2012

Until recently, GPS tracking systems were used for the control of small animals. Now the GPS challenges even the most dangerous animals. Indeed, it is in an experimental phase the scientific mission of the American non profit association, Ocearch, led by Chris Fischer. During the operation, the sharks are caught, mainly in North America, and to them is applied a GPS tracking device, then they come back to the sea. …

Home with the GPS shoes

1 Ott 2012

Dominic Wilcox, british designer, has created a fully functional prototype pair of shoes with a built-in GPS that will guide you home. The name of this extravagant invention is “No Place Like Home” and it’s inspired by the famous novel “The Wonderful Wizard of Oz” in witch the protagonist Dorothy, with her magic shoes, can go everywhere clicking her shoes together three times. For Wilcox’s shoes, with expertly decorated sole, …