Home » Technology » Articoli recenti:

A photo camera, a camera bag or…. both of them?

marzo 4, 2010 Technology No Commenti

Cloak Bag

For those who want to protect their photo camera in case of rain, for who wants to take quick shots without being immediately noticed, or simply for those who are just too lazy to take their camera out of its bag but still do not want to miss a single snapshot.

For all these situations and many more, a new product, called Cloak Bag, has just been launched on the market. At a first sight, it looks like your ordinary camera bag, but at a closer look you can see that it has a little secret: its bottom can be removed by unzipping it open, thus revealing its contents.

The photo camera is placed on the upper half of the bag, and by opening a slit on the side you can grab it and quickly take photos through the now open bottom. Thanks to its size and features, this bag is mostly suitable for reflex type cameras (SLR), which can be a little uncomfortable to use since they are not as quick as a digital camera, or because, especially in big cities, using them may not always be safe.

In some parts of the world, in fact, sometimes a gesture as simple as pulling out your camera (especially if it is as expensive as a SLR generally is) is tantamount to an invitation for pickpockets. For this reason, you may lose that special moment or that particular sight just out of fear that your camera might get stolen.

By using the Cloak Bag, the gesture is so quick and discreet that any potential robber would not have the time to figure out what you are really doing, and would not be able to do his dirty job.

In short, by spending a mere 49 dollars, we will no longer have to regret those pictures we could not take!

Mobile phone bugging is now made easier

febbraio 22, 2010 Technology No Commenti

Ear

If you are using your mobile phone frequently, especially for private and confidential conversations, or if because of your work you always have the handset on to carry out negotiations or exchange information, a small piece of news which appeared on newspapers worldwide should legitimately sound as a warning to you.

In fact, just a few weeks ago, a young hacker from Germany has declared that he has cracked the encryption key that is used to transmit voice and data over the GSM network. This standard key is adopted by all GSM network operators worldwide, and is based on a 64-bit algorithm which, no matter how safe it is, is still much less complicated to decipher than one might think, especially when compared to the highly advanced 128 or 256-bit keys in use on more recent systems, not only in telephone communications field.

Of course, the kind of job necessary to force the codes such as the one in use on GSM networks, called A5/1, is not so easy as to be done by anyone, and the devices used for this kind of operations are generally very expensive, which so far made this technology accessible only to government agencies and law enforcement.

Anyway, during a worldwide hackers’ symposium, one of them revealed that currently it is actually possible to sneak into the GSM network, by using simple equipment which costs not more than 3000 dollars. Once this device is started, all you need is 30 minutes of work and you will easily be able to listen to mobile phone conversations within the range reached by this system.

On top of this, with software tools such as Java Virtual Machine, it is possible to install any kind of program on a mobile phone, and the user would not even notice it, making it possible to remotely listen to his conversations, turning the handset into a real spy phone.

This said, what can the ordinary mobile phone network user do to protect himself from such invisible threats?
Of course we can not just stand still waiting for phone operators to upgrade their security standards, and in the meantime have our phone conversations exposed to the risk of being bugged.

The best option we have is to add one further layer of security on top of the GSM encryption, by providing ourselves with an encrypted mobile phone, that is, a normal cellphone on which a particular software is installed, that encodes its conversations, by using a 256-bit encryption key, much safer than the 64-bit standard GSM network key.

The conversation between two encrypted phones takes place following the same principle as key-protected email. By making sure that both cellphones engaged in a conversation share the same encryption key, any eavesdropping operation which could get through to the encrypted conversation would only be able to hear a white noise, and this means that your phone calls are absolutely secure.

Therefore, you will easily be able to talk about sensitive subjects, or carry our confidential or sensitive negotiations over the phone, without any fear that your conversations might be bugged by any prying ears. Naturally, if your counterpart has a mobile phone which is not equipped with the same encryption system, should his phone be bugged, your voice could be heard; it is therefore advisable to use at least two (or more) encrypted cell phones, to be used by the people whose conversations you wish to keep secret.

For more information about how the encryption software works, and the models of mobile phones on which it can be installed, we advise you to visit the Endoacustica website, and contact our specialists for specific advice tailored on your needs.

Stealth Phone and anonymous SIM card, for an absolute privacy

febbraio 9, 2010 Technology No Commenti

More than once, on this blog we mentioned the Stealth Phone, that is, a mobile phone which, thanks to a piece of software discreetly installed, is capable of working on the IMEI (International Mobile Equipment Identifier) number, which unequivocally identifies each and every cellphone in the world, and of making itself fully protected from any attempt at eavesdropping.

In fact, mobile phone call interception is carried out noy only, as one might think, by searching for the phone number, but also by using the IMEI number which identifies the handset, as well as the IMSI which is used to authenticate the SIM card mounted on our phone.

In most Western countries, SIM cards can be purchased only by presenting an identification document, and for many network operators they are also linked to a specific handset and its IMEI number. In practice, phone and SIM card are unequivocally linked to a person.

If you need to use your phone for private conversations or confidential business talks, it is advisable to keep the privacy level high by using an untraceable phone just like Stealth, which changes its IMEI number automatically each time it is switched on, basically turning into a different hone each time you use it.

Together with Stealth, the best way to maintain your anonymity is by using a rechargeable SIM card, not connected to any subscription contract which might reveal your identity to others. The problem is that in most countries, even to purchase a rechargeable card, a personal document must be presented, and this means that we would not be able to achieve a fully anonymous phone experience.

Fortunately though, thanks to Endoacustica it is possible to purchase form an extensive selection of anonymous SIM cards, that is, rechargeable phone cards, manufactured in several foreign countries, that do not require an identity document to be presented.

Furthermore, with this kind of service, recharging your credit on your mobile phone can be done with a Western Union money transfer, instead of using a bank transfer or, even worse, a credit card purchase, transactions which could become a visible link between your person and the anonymous phone number.

By adding an anonymous SIM card to a Stealth untraceable phone you will be completely safe and protected from interceptions.

In order to add one further layer of protection, we have created a new version of our Stealth software. This version, which can be used on a normal Nokia 6021 handset, will allow you to receive a notification in the highly unlikely case of an interception attempt.

In that case, your Nokia Stealth will discreetly vibrate, and at that point all you have to do is switch it off, then turn it on again to have a new IMEI number generated, and be once again safe from any unauthorized attempt at listening to your calls.

Thanks to these simple precautions, you will be able to carry out confidential business talks, private negotiations, or simply stay in touch with your loved ones, in a completely safe manner. Just make sure that your counterpart is equipped with the same level of protection and the same equipment, and you will no longer need to worry.

For more information about anonymous phone cards and invisible phones, we advise you to visit the Endoacustica website.

Micro Earpiece: Equipment No Surveillance Agency Can Afford to Neglect

febbraio 8, 2010 Technology No Commenti

Wireless Micro Earpiece

Jagson Global Network was a private detective agency run by Mr. Steve Jagson. He had a small team of eight detectives and its office located at the top floor his apartments. Jagson had over twenty years of experience in detective and surveillance activities. The agency was just four years old but gained quite a reputation for itself in the field.

The credit belonged to none other than Jagson and his acumen in utilizing advance technology for the purpose. But many times, communicating secretly with the men on mission proved troublesome for him. His men needed his guidance at many crucial moments but could not communicate openly. Going away from the scene to communicate or use of mobile phones proved a distracting and wasted lot of crucial time.

Jagson was hell bent on finding a perfect technical solution to discrete listening problems in surveillance activities. He approached none other than Endoacustica Europe, leading manufacturers of surveillance equipment. After going through their unbelievable wide range of products, he picked up Ear-GSM kit. It is a cordless invisible micro earpiece that snugs inside the ear and is almost invisible to the naked eye.

This 12x6x5 mm piece is so powerful that it can covertly listen to any conversation, without compromising on clarity, from where a cell phone is kept. It works with transmitters as well as cellular phones. This invisible micro earpiece can receive voice signal from any distance. Its standard zinc-air battery can last 50-100 hours. To adapt to latest technology, it comes with Bluetooth collar as well.

The performance of Jagson’s team enhanced dramatically. With the help of invisible micro earpiece, Jagson could guide and control his men precisely to accomplish missions.

An Illegal Empire Comes Down Crashing

febbraio 5, 2010 Technology No Commenti

An Illegal Empire Comes Down Crashing

This was going to be a never before opportunity for the City Police Department. They got an inside information that Mr. Robin Leister was hosting a big bash on his marriage anniversary; and many people wanted by police were expected to attend the party.

Leister was a famous industrialist. He made his fortune mainly in brewery and liquor business. But the police knew that he ran a drugs racket under the disguise and his anniversary bash will be attended by many people linked to his racket and drug paddling.

City Police Chief Mr. Pereira was ready with his plan. He printed a fake invitation card and trained one of his best personnel to attend the party. It could fetch crucial information about the drugs racket and the people present over there. But the problem was that except him, nobody knew the insides of the mansion where the big celebration was planned to be held. Further, only he could give the clues about the people at the party and how to deal with them.

Pereira’s experience and research came handy. He purchased Micro earpiece, a wireless ear piece that could enable discreet, two ways communication. It is so tiny that it could easily fit inside the earlobe. It requires very less energy and can operate for 15 to 30 hours on zinc-air battery. It is so sensitive that it can pick up very subtle and distant noises but filters unnecessary background noise.

Need not say, with the help of Micro earpiece, a wireless earpiece Pereira guided his man precisely to go around in the party, talk to various guests and collect critical information about the drug racket. A tiny wireless earpiece brought an illegal empire down.

How to turn a mobile phone into a bug

gennaio 28, 2010 Technology No Commenti

Cellphone

One of those actions that we take automatically and without thinking, such as turning off our mobile phone, is basically just like hanging a “Do Not Disturb” sign outside a hotel door when we want to sleep a bit more, and allows us not to be disturbed by people we do not really want to talk right now, enjoy a bit of privacy or maybe just take a short nap.

Along with all this, switching off their mobile phone might mean, for those who have something to hide, that they can talk about their private business, without worries or fear to be disturbed by prying ears… or not?

If the person in question is unaware that he is actually using a spy cellphone, the answer to this question is indeed a no. In fact, modern surveillance technology allows you to turn almost any phone equipped with Symbian operating system, into a full package for remote long distance surveillance.

Thanks to the installation of a spy software, it is in fact possible to keep constantly under control the person to monitor, listen to their conversations in real time as soon as a call is placed or received, receive on your cellphone a copy of all incoming and outgoing text messages; furthermore, for mobile phone models equipped with GPS navigation system, you can also receive geographical coordinates of its position, so as to know at any time where it is.

But certainly, the most interesting function featured by Spy Phone is certainly the one that allows to use your spy handset as if it were a real bugging device, just like the ones you see in spy movies, to listen not to incoming or outgoing phone calls, but rather to conversations taking place around it.

To do this, the spy software secretly installed on your spyphone uses the handset’s microphone to pick up sounds and voices within a range of approximately 5 meters. Just call from your normal cellphone, whose number has been stored as monitoring phone upon installation, and something amazing and unexpected will happen.

In fact, by calling from this number, the phone will not ring, nor will the phone call leave a record in the phone activity history, but instead, it will answer automatically, allowing the person at the other end to listen to what is happening around the handset, until the moment when the phone user places or receives a call; in that case, in fact, secret listening will be automatically be interrupted and the spy phone will turn into a normal mobile.

It is also possible to use the environmental listening mode when the mobile phone is turned off! In fact, it is exactly in these moments that those who fear that they are being bugged feel secure, believing that they are really safe from prying ears. Instead, if they are using a spy telephone, this is the moment when their privacy is running the highest risk.

When the spy handset is turned off, all you have to do is call from the controlling number, and even though in theory it should not be possible to talk, the spy software will give green light to your call, without giving out any visible sign of activity, and of course arising no suspicion in the person under surveillance.

If you want to know more about how spy cellphones are working, we advise you to visit the Endoacustica site, and request support from our experts, who will certainly be able to find the right option for your needs.

How a Spy Phone works

gennaio 26, 2010 Technology No Commenti

Nokia Spy

For those who do not happen to be experts of surveillance technology, the term spy phone may bring to their mind stories from a movie, with complicated secret agent machinery used to follow their targets basically anywhere.

The truth is actually very different, as a spy cellphone, even after more than a glance, on the outside looks exactly like your everyday mobile handset; and even by going through all its functionalities and features, you would not be able to see its true colors. In fact, the surveillance activity is carried out by a spy software, installed in an absolutely invisible way inside your mobile phone’s processor.

Thanks to this software, a third party listener will be able to keep in constant touch with the user of the handset under surveillance, and the latter would not be able to figure it out in any way.

All his conversations, both incoming and outgoing, will be listened to, from any distance; any text message sent or received can be comfortably read right on your cellphone; you will be able to listen to the conversations and sounds taking place around the spy phone, simply by dialing its number, even while it is turned off; And for cellphone models equipped with GPS positioning system, you will also be able to know in real time the geographical coordinates of your subject’s position.

All these functions, thanks to its invisible software, are carried out in an equally discreet fashion, without giving out any sign of activity like a ringtone, the glowing of its screen, the sound of an incoming text message and so on, and without leaving any trace in the phone activity history, which also means that no unnecessary suspicion could be raised.

The person who is remotely monitoring the spy phone can send commands by SMS to enable or disable its features and functions, to receive an activity report, a list of calls placed and received, or a list of all text messages both incoming and outgoing. These SMS messages, written in a particular easy format, are intercepted by the spy software and read as operating instructions, therefore they are not displayed on the screen.

Furthermore, always by sending a text message, it is now possible to activate the new recording function, to save conversations or eavesdropped conversations. By doing this, you will be able to record any call through the spy software, and the relevant audio file can be later sent, with another command, directly on your cellphone or your mailbox, via GPRS, Bluetooth or e-mail.

Like that, you will be able to use any compromising conversation as evidence before a court of law, to solve a child custody litigation, or a divorce, or even as a support for law enforcement to gather evidence against criminals or suspects.

In a few words, inside your ordinary cellphone you can conceal a valuable tool for complete surveillance. For more information on spy phones and how they work, you can visit the Endoacustica website and request more info.

Your MiFi hotspot might reveal your whereabouts

gennaio 18, 2010 Technology No Commenti

MiFi

MiFi cards, or hotspots, normally used to share your 3G Internet connection on a wireless network, are certainly a very useful device for those who need to be connected at any time, no matter where they are.

Unfortunately though, sharing your network connection, aside from providing a useful service to other Internet users, might be a very high risk operation as far as your security, and the privacy of your data, is concerned, as it may lead to sharing some information that should instead be kept strictly private.

For those who living in the United States and who use hotspots manufactured and marketed my big providers such as Verizon and Sprint, the risk lies in a flaw which has been identified by some hackers, and which might lead people with malicious intentions to get to know the GPS coordinates of your position, while you are sitting checking your email, completely unaware.

Of course, this kind of attack requires a certain technical knowledge, but the dangerous part is that it can take place without password or key authentication, while the user has no idea of what is going on right before his eyes. On top of that, it looks like it is possible to download system configuration information, including private information stored in a non encrypted way on your computer.

On the other side of the fence, law enforcement might effectively use this tool to pinpoint dangerous criminals thanks to their Internet connection, follow their movements, gather evidence on their whereabouts and track them down when necessary.

To cut a long story short, if you have something to hide, or if you fear that your private information might end up in the wrong hands, from now on be very careful when you are connected to a wireless network!

Augmented reality can make our driving safer

gennaio 18, 2010 Technology No Commenti

Just a couple of days ago we mentioned how usage of augmented reality can help you to repair your car or to carry out highly skilled tasks. Today we would like to demonstrate how this technology can make our roads safer, allowing car drivers to see vehicles or obstacles coming from behind a curve or a building.

This system, which is being developed by a group of researchers at Carnegie Mellon University, merges two video feeds shot by two different surveillance cameras into one feed, giving the illusion of being able to see through a wall thanks to its processor, which matches common points from the two cameras. By identifying these spots, the software changes the video perspective to make it compatible with the driver’s view.

The resulting feed would then be displayed on the car’s windscreen, giving the realistic impression of seeing through a wall. Images to create this impression would be picked up by a video processor which can capture feeds from security cameras that you can literally find on every street corner in our cities.

In the future, should its usage become common, it might even capture images from other cars driving nearby and using the same system, but of course, at the current stage, this is just a speculation, as development and planning of such a software carries along a wide range of obstacles to overcome before we can really see it mounted on our cars.

For now, we can only see this new augmented reality application, which has been presented at the ISMAR fair in Florida, in the demo that you can see in the video above. And who knows, maybe one day we will really be able to use it!

Optical fibers to see through a wall

gennaio 17, 2010 Technology No Commenti

Viewer

Being able to see without being seen is one of mankind’s great dreams, and the principle on which our work in the information gathering and surveillance field is based; this work is of course supported by technology, and when it comes to seeing without being noticed, even a thick wall is no obstacle if the right devices are on our side.

For example, optical fibers are greatly useful in this respect, because they have great capabilities within a space that can be as thin and long as a hair, but much more resistant; thanks to these capabilities, devices such as, for example, a fiberscope, can be used as if they were hidden cameras, by simply digging a hole and squeezing its tiny cable (just 5mm wide) inside it.

At one end of the cable, the fiberscope has a miniature viewer, which allows its user to examine an environment without being noticed, as well as using the fiberscope to inspect hidden corners such as home pipes or the engine of a car.

Other optical fibre devices which can find applications in the surveillance field are, for examples, fiberscopes which allow you to see through a ceiling thanks to their cable which is just 2.5 mm thin, or small monoculars which, if placed on the peephole of a door, can show you what is going on behind the door and inside the apartment.

This kind of device is very useful in intelligence gathering and surveillance, for example when law enforcement agents are chasing a suspect who takes a room in a hotel. In this case, they will just have to take a room next to his, plug a hole in the wall (of course while he is away!) and place the fiberscope inside it, if possible connecting it to a micro digital video recorder in order to store any footage captured and use it as evidence. Simple, huh?

Calendar

dicembre: 2017
L M M G V S D
« Nov    
 123
45678910
11121314151617
18192021222324
25262728293031

NEWSLETTER


e-mail:
name:
Newsletter Endoacustica Europe - ENGLISH

Login

CONTACT US

Endoacustica Europe srl
Via Umberto Terracini, 47
70029 Santeramo in Colle (BA)
P.IVA IT06836020724
ITALY
tel. 0039 080 30 26 530
tel. 0039 080 43 73 08 93
fax 0039 080 40 73 11 87
e-mail: info@endoacustica.com

Text ADS

 SPY PHONE
spyphone A Spy Phone or GSM spy cellphone is a normal mobile phone on which has been installed a software able to reply many crucial information such as: listening of all incoming and outgoing calls from the mobile, real time phone surrounding sounds, reading of all type of messages (SMS, WhatsApp, Facebook, Viber etc..) and GPS tracking. The spy software works on the most of Android, iOS, Blackberry smartphones.

 MICRO DIGITAL RECORDER
digital video recorder Micro digital recorder able to gather evidence or discover any kind of betrayals. Recording capability of up to 1200 hours in continuous. Long duration for those recorders using voice activation system VAS. Just for you the best micro digital voice recorders on the market in terms of efficacy and reliability at a low price.
 WALL MICROPHONES
Wall microphones able to listen through walls thick even up to 70 cm. Ultra sensitive professional stereo microphone, suitable to pick up the lowest noises thanks to its very high sensitive ceramic microphone. Limpid and stable sound. Endowed with sockets for recorder and earpiece.
 PHONE VOICE CHANGER
The phone voice changers when interposed between handset and phone, will change your voice into another one. It transforms any voice into a masculine, feminine, adult or child one.The voice changer can be adapted to cell phones, cordless phones, speakers and microphones, recording systems, or connected to switchboards. The reproduced voice is not a robotic but a human one.
 REAL TIME TRACKERS
localizzatore rf

Real time trackers are designed for those who need to keep their pets under control, while limiting the relevant cost, but also to locate precious objects or to remember where you parked your car.

 ANTI-DROWNING AND ANTI-LOSS ALARM
anti loss alarm

Anti-drowning defender is an alarm device which combines anti-drowning and anti-loss alarm, and works effectively as an electronic safety device for protecting children or pets from drowning and loss.

Relevant artilcle

Attention to the new gadgets of thieves

14 Feb 2014

This may be the last discover of ingenious thieves who don’t hesitate to resort to the technology to hit unsuspecting victims. The news of recent months shows several cases where someone complains of being robbed, at home or in the company, after agreeing to unknowns small gadgets, deployed on the street, particularly at the crossings or when the light is red. The hypothesis is that these gadgets (lighters, key chains …

Never lose things again with the geolocation tools

19 Set 2013

The geolocation is getting closer, at your fingertips. We’re all constantly losing things. Keys, bag, charger and many other tools of daily use are very often forgotten, lost. The hard part is finding them. This discomfort could be deleted with the help of geolocation devices. In particular, big companies and startups are trying to answer to the distraction effects with products that will come soon on the market. Their secret would be an accessory, …

Stop mobile phones theft

30 Lug 2013

One hundred twenty thousand a year, ten thousand a month are the mobile phones stolen (or loss). These are the numbers from the homeland of mobile phones, smartphones and tablets thieves: London. The Mayor, Boris Johnson, and the police are really troubled about the weight of these statistics and asked to the same companies devices producing to investigate about what is happening. In particular, they asked to Apple, Samsung and …

Locate a mobile phone with the technique used by bats and dolphins

4 Lug 2013

Locate the exact position of a cell phone in enclosed spaces may become possible thanks to an algorithm that allows us to reconstruct the 3D shape of a room, listening to the echo of the sounds produced inside, even simple ones like the snap of the fingers. The project was developed by a research group at the EPFL. The researchers were inspired by echolocation, the system by which some animals …

Fish-robot will patrol the Thames River

10 Mag 2013

It’s environmental surveillance, the new frontier crossed by the fish-robot that will be released, in the coming months, in the Thames in order to sniff out pollution. Scenes like science fiction movies are recorded during the tests in the water. The robots will be released in groups of five in order to provide a mapping of the critical points and pollutant elements. The search will rely to the sensors built-in …

At the supermarket with the navigator

17 Gen 2013

GPS technology has now numerous applications in daily activities. Keep an eye on the kids, monitor the pet, follow the partner’s car is a cakewalk if you have the right tools. Shortly, it will possible use a sophisticated development of GPS technology in a shopping center or on the shelves of the supermarket so you’ll save time and optimize the product comparison. To lead the tour will be our trusty …

Internet of things will revolutionize our daily

10 Dic 2012

Web 3.0 isn’t yet far away. All the big laboratories are working hard to develop new applications concerning the Internet of things. With this neologism has been named the last frontier of online technology. The strength lies in the possibility given to objects to interact with each other by capturing and exchanging information. The alarm clock may sound for example in advance once found, through the Internet, heavy traffic conditions. …

Hop! the suitcase that follows you

13 Nov 2012

Pack your bags is always a problem. Weather conditions, formal and informal dresses, comfortable and casual, but also suited to special occasions that may occur…In short, a grind. And what often we create is a baggage too heavy and almost entirely useless. About 25 years ago, a pilot of the Nortwestern Airlines tried to obviate to the problem of having to lift heavy luggage introducing the trolley as we know …

Even sharks tracked with GPS

22 Ott 2012

Until recently, GPS tracking systems were used for the control of small animals. Now the GPS challenges even the most dangerous animals. Indeed, it is in an experimental phase the scientific mission of the American non profit association, Ocearch, led by Chris Fischer. During the operation, the sharks are caught, mainly in North America, and to them is applied a GPS tracking device, then they come back to the sea. …

Home with the GPS shoes

1 Ott 2012

Dominic Wilcox, british designer, has created a fully functional prototype pair of shoes with a built-in GPS that will guide you home. The name of this extravagant invention is “No Place Like Home” and it’s inspired by the famous novel “The Wonderful Wizard of Oz” in witch the protagonist Dorothy, with her magic shoes, can go everywhere clicking her shoes together three times. For Wilcox’s shoes, with expertly decorated sole, …