How to protect your smartphone from being tapped using encryption tools

Defending your privacy on smartphones or other mobile devices from hackers and data thieves is not easy, actually not even impossible if you have decided to take advantage of special hardware contrivances as well as to install the right tools on. That’s the reason why we are going now to …

Mobile phone spy software: all you need to know before starting to spy on a cell phone

Why should anyone ever want to spy on a cell phone at a distance? Well, there could be a lot of reasons for that, actually as we said so many times, to spy on someone’s mobile is illegal. However there are extreme situations, related to the personal sphere, requiring an …

How to choose the best spy bugs without getting tricked

Lately searching for a valid product on the Internet has become a very difficult task. For example, in the case of spy bug transmitters or any other electronic device commonly used in the investigation field, you will note that along with those few old companies, come also across a lot …

The new frontier of biometric access: the body odor

The Universidad Politécnica de Madrid has added to the biometric recognition tools already on the market, another ingredient: the body odor. Identification parameter that, according to the researchers may soon be used for a reliable recognition through personal characteristics and biological properties. So we’ll be able to filter people based …

Microregistratori digitali

Terrorism: a guide for Western people converted to jihad.

maggio 18, 2012 Technology No Commenti

“Muslims follow a religion of peace, mercy and forgiveness, and most of them do not have anything to do with the violent events somebody has associated with Muslims. If a Muslim commits an act of terrorism, this person is guilty of violating the laws of Islam. ”
This is what we read on a website that introduce itself as a guide to Islam. Ideas which any human being agrees with.

However, on the Internet it is possible to find an English guide on how to become a perfect terrorist and how to export the creed of Al Qaeda to the West. A handbook for Western converts to jihad, in other words, written by Samir Khan, an American who worked for the Yemeni cell of Al Qaeda and who was killed by a drone (unmanned aerial vehicle) together with the radical Imam Anwar Al Awlaki.

There are several chapters in the guide and all deal with different aspects of a terrorist life. He is given, for example, some advice about personal hygiene in precarious situations, “a daily shower is ideal but in many cases is not possible.” Terrorists are encouraged to keep in order the environments in which they live, and they hide, often shared with other “brothers”.
The handbook even discusses the possibility for a terrorist to take along his family. However, he is discouraged, to avoid seeing their loved ones raped and tortured, if they were discovered.

In the section entitled “Air Bombing”, Khan describes the sound of the drones, “as the buzzing of a bee,” and advises his potential disciples, in the case of fear, to think about the virgins of Heaven and the prophets that they are going to meet once dead.
Surely the most important and interesting chapters are those in which he gives practical advice on terrorism targets and guidelines to be complied with in order to avoid being detected.

He writes about “attacking America in his own backyard” because in this way the resonance, the effect and consideration that they would get, is much stronger, especially if the attack is carried out by a single individual, more difficult to control.
So, with the spread of the Web, it is even easier for terrorists in general to disseminate their ideas and get emulated in and against Western countries. They have moved, in fact, from the initial face to face indoctrination to pamphlets and books, up to the Network, Youtube for example, and dissemination of guides on it.

Fortunately, however, the technology is not always in favor of terror. For this purpose, in fact, Khan emphasizes the importance of not using cell phones for communication, to avoid being wiretapped in some way. Who knows whether he has considered or not the fact that maybe intelligence service can monitor potential terrorists through state-of-the-art eavesdropping devices and video surveillance systems, such as 3G spy camera which allows you to see, with a simple video call,what is going on in the place where it is concealed or, in the case there is no UMTS network coverage, enables at least unlimited and high sound quality remote listening.

Discovering and fighting usury with the use of bugs

maggio 8, 2012 Technology No Commenti
picture against usury

Reading the newspapers in these last months, on a first sight you can easily understand what is going on all over the world: the economic crisis is having devastating consequences on society, of which it is slowly eroding the fabric, making those who have problems performing extreme measures, such as criminal actions or suicide.

The economic crisis in Europe has affected several nations, but Greece, Ireland and Italy the most, and an alarming increase in suicide rates among entrepreneurs and small-business owners is leading some European newspapers to call the trend “suicide by economic crisis”.

Furthermore, reading the newspapers and watching the television you can also understand how the crisis is leading people to commit different crimes: burglary, drug pushing and usury.

Yesterday in Italy, for example, five people were arrested for having lent money at usury rate to several Tuscan entrepreneurs, threatened and intimidated with actions which are typical of the mafia behaviour.

To get rid of from the clutches of usury is not simple. You may fear retaliation in case of complaint against the loan shark, the same retaliation you would probably have in case of nonpayment.

Nevertheless, who is victim of usury should find the strength to face the problem for his own good and for his loved ones.

It goes without saying that cooperation with the police force is vital, but to catch the usurer red-handed you can rely on several technological devices, such as bugs and micro digital voice recorders. Thanks to their small size, they can easily be hidden in any medium, allowing the person who brings them with herself to have her conversations listened and recorded. In this way, the police can intervene at the right time and arrest the criminal.

Your routes in a few clicks, with the GPS tracker

maggio 4, 2012 Technology No Commenti
Route from a gps tracker

The tracker is a small and efficient portable GPS locator that allows you to chart your course anywhere on the Earth.
This GPS tracker can be easily concealed due to its small size, to a removable magnetic support and to a belt clip, which allow you to hide it discreetly in any medium whether you are in the sea, on the street or on a plane.
Simple to use, this particular GPS tracker can work for over a month with the power of only two AAA batteries, allowing you to record your routes for weeks. Furthermore, it has a 4MB flash  USB memory that, connected to a PC and through the use of a mapping software like Google Earth, can easily show your routes, with no additional costs.
Do you like cycling or jogging? With the new GPS tracker you will be able to control your sport performances, checking how far you ran.
You may also feel the need to monitor a person who is supposed to be in danger. Nothing could be easier with the GPS tracker! All you need is to get that person to bring with herself the GPS locator. In this way you will obtain the map of her course.
Does your son have a strange behaviour and do you fear for his safety? From today on, you can also rely on a GSM bug with a GPS tracker.
If your need is not only to track and record a route but also to know what is happening in a particular circumstance, you could obtain a GPS tracker embedded in a GSM bug.
Easily controlled from anywhere in the world, the GSM bug allows those who control it to catch conversations and background noise with excellent sound quality, thanks to a highly sensitive microphone.
Hidden in a backpack or a piece of clothing, the GSM bug allows you not only to know where your son is but also to find out what is happening around him. All you have to do is making a call from any phone to the number of your bug.

Politic repression against the population in Syria: three american companies accused of having provided the Damascus regime tools for wiretapping and monitoring of dissidents

novembre 28, 2011 Technology No Commenti
syria protest

United States of America are not only exporting democracy, but also controlling tools sold directly to ‘rogue governments’ and schemes. Of course this practice is not new, but lately it has become a little awkward in the Obama administration.

The U.S. Commerce Department is seeking whether the technology produced by a Californian company, has been able to help the Syrian Police to map and monitor dissidents by bugs. Revolts have been followed by a violent and bloody repression that led to the death of thousands of unarmed civilians.

Trade officials are trying to know if Blue Coat Systems of Sunnyvale, Calif., was aware that its equipment and its software could be used by the Syrian government.

The company has already clearly expressed that it did not sell tools or spy software to the Syrian government, but it is aware that its products are used, however in Syria and maybe the regime got them through a third party. The U.S. sanctions imposed on Syria prohibit the tradings of most of the categories and the investigators are trying to determine who gave the Blue Coat technology to Syria.

Here is a declaration from the company, dating back to this month: “Blue Coat is aware of the violence in Syria, and is really sad because of the suffering and loss of human lives that could be the result of actions made by a repressive regime. We do not want our products to be used by the government of Syria or any other country embargoed by the United States.”

According to statements of the company, Blue Coat technology is not designed for surveillance purposes, but it has features that could help the authorities to monitor electronic communications, even allowing to block selected people access to certain websites and certain forms of social media.

Few days ago, in U.S. Parliament, three senators asked the Obama administration to see if Blue Coat and another California company, HP, have been provided with “instruments of repression”  Damascus.

“If the sale of US-made technology devices may have contributed to the ongoing violence, it is unacceptable and a solution should be investigated as soon as possible.”
If the Commerce Department found out that Blue Coat has clearly violated the license, U.S. could make the company pay a fine up to $ 1 million.

U.S. companies wishing to export devices that are “primarily used for hidden interception of oral or electronic communications cable” must contact the Department of Commerce for a license, according to current regulations regarding export. However, sales by U.S. companies in Syria are illegal, starting from the sanctions imposed by President George W. Bush, in 2004.

There’s more. During a Congress audition that took place on November 9, the Assistant Secretary of State, Jeffrey Feltman, said that the Blue Coat technology used in Syria, no export license had been granted.

In addition to Blue Coat, there is also Hewlett-Packard (HP), which has installed more than $ 500,000 of equipment in computer rooms located in Syria. These electronic brains are the basis of a surveillance system being built, able to monitor the use of e-mail and Internet in the country. The operational base of HP is therefore a control center for Syrian officials in Damascus, with whom they could keep track of citizens’ communications and track datas, models and personal contacts. An Italian company, Area SpA, is in charge of running the project.

“HP’s policy is to comply with all applicable export control laws and regulations of the United States,” the company said in a declaration. “We have no employees or facilities in Syria, and our sales in this country have been limited to groups that are recognized by U.S. law. Compliance with the United States and the laws of international trade are the highest priority for HP. “

BiKN and your Apple iPhone become a powerful device to find lost objects and even people

novembre 22, 2011 Technology No Commenti
localizzatore per iphone

When we talk about Apple’s mobile devices, namely the iPhone, we know that we can find a huge variety of gadgets and cases to protect it and keep it safe. We also know that there is a software to locate your phone via GPS in the unlucky event of theft or loss. Perhaps we did not know that engineers from Treehouse Lab have designed an interesting way to keep track of everything: phone, keys, wallets.

We are speaking about an innovative system, designed specifically for those who often lose things around, either because they are careless, or because they are running into a busy life, full of unexpected events.

The new system is called BiKN, a term that is pronounced as “beacon”: just as a light it acts illuminating your life, helping you to regain everything lost (if it bears the rught tag).

But let’s step back and focus on the system, thet consists of a special case for the iPhone keeping inside a receiver that interacts with a tracking tag. On your phone, a special iOS application manages the operations, allowing you to locate up to 8 cards simultaneously. All you have to do is to stuck ‘tags’ on items that you often lose.

Your bag, key ring, camera, wallet or even your dog (putting the special ‘tag’ on the collar). But the most interestingthing regards the possibility to set a maximum distance for each item, after which an alarm on the BiKN iPhone case. In this way, busy parents shoppingin the mall will not have to worry too much when they leave their children in the playground area.

User interface is clear and intuitive. “Find” mode includes an audio and video signal meter that helps you find everything that has been lost, every item that has gone out of place. The “Leash” function activates control within exact spatial boundaries. “Page” mode will sound an alert on one or more active tags (or other devices compatible with smart BiKN), becoming very useful for  families or groups.

The special BiKN clips are designed to be easily stuck to any object, a belt, a keychain, a pocket of a jacket. Each tag is equipped with a plug that opens and reveals a micro-USB port, letting users to set and synchronize via the BiKN iPhone case every single clip. in a mall.

Once purchased the case, the USB tag can be bought with an extra charge and they have to be charged through a computer. All equipment is useful and very practical and it will be available in 2012 for Apple iPhone 4 and 4S. There is still no information about the price.

Telephone interception is already banned on Google

aprile 4, 2011 Technology No Commenti

While on Italian newspapers, forums and blogs there is a lot of talk about the bill on wiretapping that the government is attempting to pass, along with an array of other “ad personam” bills clearly aimed at defending solely the prime minister’s interests, on the web this bill seems to be already in effect, in a quiet way, without explicitly banning eavesdropping or telephone interception.

We are talking about Google, which has recently updated the list of categories of items that can not be promoted through its AdWords advertising service, in addition to the usual restrictions that prevent from advertising pornography, material which incites to racial hatred or violence, or any other illegal product or service.

A few days ago, the Italian branch of the Mountain View giant has sent a message to some of its advertisers, and more specifically those who produce or market listening devices, miniature recorders, hidden microphones, miniature cameras, listening bugs and all equipment used by law enforcement or detective agencies for their investigations against organized crime, fraud, corporate espionage or marital infidelity suspicions.

Google informs its advertisers that they have changed their advertising rules, and they no longer accept ads promoting products for espionage or wiretapping equipment.
We have already seen how, as it was the case with China, the Big G programmers have turned a blind eye to the surfers’ right to access to free information, setting up the filters that the Beijing government required to grant Google access to the world’s largest market, with its wealth of over a billion potential customers for advertisers.

In this case, we do not have (nor it is expected) a confirmation in this direction, but as the Italian long-running politician and former Prime Minister Giulio Andreotti said, “bad thoughts are a sin, but they are often right”, it is not too unlikely that the long-reaching arm of the Italian government has targeted Google and the search engine’s main source of income: advertising.

If we consider that Mediaset, the broadcasting company owned by the Prime Minister have sued YouTube (which, as you know, is owned by Google), claiming a compensation for copyright infringement over publishing of video footage from its channels, the idea of an “exchange” between the lawsuit and a ban on advertising may not sound too unrealistic.

It would be a small and invisible move, but which would make life more difficult not only for those who use listening bugs to fight crime, but also for those who work behind the scenes in this field, manufacturing the bugs that are used during interception operations.

In short, if the Parliament does not pass the bill, in Italy there is always a way to work around that annoying little thing called law, and achieve the planned bill’s main objective: cutting down on telephone wiretapping.

BEAR, a robot to rescue wounded soldiers and not only

novembre 25, 2010 Technology No Commenti

The U.S. Army researchers are working to test a new robot, designed by Vecna Robotics, which would be used to recover and rescue wounded soldiers during combat. The robot, called BEAR (Battlefield Extraction Assist Robot), can spot a soldier in trouble thanks to its sensors and its cameras.

BEAR is controlled remotely via a special glove that allows the use of simple hand gestures to operate it, to make it approach the wounded soldier, pick him up from the ground and take him as soon as possible to the nearest medical point.

The rescue robot can carry a load of about 230 kg, lifting it gently with its hydraulic “arms”. With a height of about 1.80 m, BEAR can also inspect any area behind a wall, or lift its load on a raised surface. The arms are equipped with “hands” that can carry out precision tasks, ensuring that a wounded soldier will be treated with care and not moved abruptly.

Moreover, thanks to these features, BEAR can be used not only for rescue operations, but also for reconnaissance and surveillance, to transport explosives or hazardous materials that must be handled with care, or to inspect parcels which could conceal a bomb, defuse a mine, all this without putting human lives at risk.

The simulations and tests on BEAR are going on since about a year, and also include the development of a new iGlove, the glove used to control it, which will allow for a more precise control and for the ability to send advanced instructions, for example when defusing a bomb. In addition, the future version of BEAR will have several autonomous functions, which can be carried out without human intervention.

For leisure, for business and not only: digital micro recorders

novembre 24, 2010 Technology No Commenti

Until a few years ago, the only ones to use a miniature audio recorder, of the kind with micro cassette tapes, were journalists, and many times we happened to see one only on television during an interview with a politician, a celebrity or a sportsman.

Nowadays, not only audio cassettes, but also compact discs, are obsolete audio media, and have been replaced by digital media and memory cards which provide for a much larger storage space and ease of use, all this teamed up with a much smaller encumbrance.

Thanks to this, the world of audio recording as we know it today is totally different than it was a few years ago.

Now, with devices that are small but highly powerful, yet flexible and very easy to use, the ones that use a digital voice recorder are no longer only journalists, but many other types of professionals: managers may want to use it to record an important meeting in the office; students can take notes in audio format, or simply record their teachers during a lecture; private detectives and police officers, thanks to a digital recorder which comes in microscopic size, are able to gather evidence against a criminal or an unfaithful spouse, and use them as decisive evidence before a court of law.

These of course are just a few examples, but the bottom line is that digital technology of the twenty-first century is now present in many fields, and if used in the right way, may prove useful not only at work, but also in leisurely opportunities.

To find out the various models of digital micro recorders available in the market, and their different characteristics that make them suitable for professional use, for leisure or for investigation and surveillance, we recommend that you visit the Endoacustica website to find the right model for you.

A new helmet to protect U.S. soldiers’ faces

novembre 24, 2010 Technology No Commenti

For U.S. soldiers deployed on the frontline in war zones, danger is always around the corner, in the form of an IED (Improvised Explosive Device), an ambush or a sniper. The most common effect of these threats is represented by the injuries sustained by soldiers, and of all wounds, the most dangerous ones are those which are not visible, ie those caused by head injuries or concussions.

Modern helmets provide adequate protection to the skull, but to protect the head, one often forgets that the face is exposed. To overcome these shortcomings, researchers at the Massachusetts Institute of Technology are working to create some sort of shield to be applied to helmets, which by increasing the protection for the user’s face, can similarly reduce the risk of head injury.

This sort of helmet shield, has been developed by the Department of Aeronautics and Astronautics, by analyzing via computer simulation the different consequences on the soldiers’ skull caused by exposure to explosions without a helmet, with an ACH (Advanced Combat Helmet) or wearing one with a transparent polycarbonate shield. In the latter case, the shock at brain level was significantly lower.

So far, the test was conducted by using only one scenario, involving an explosion taking place in front of the soldier. In the future, other tests will be made, simulating explosions of varying intensity, distance and angle, so as to measure the consequences, for example, in the neck area, and find ways to provide adequate protection to that part of a soldier’s body.

Obviously, everything is still in the planning phase, and the shield is not yet in production. American soldiers at the front look forward to the day when they will be able to use it to protect their faces from enemy threats.

Defense from telephone harassment, with a voice changer

novembre 22, 2010 Technology No Commenti

Stalking is a phenomenon that we often happens to read about on papers, when we see reports about of annoying fans of actresses, singers and celebrities who follow them everywhere, harassing them by phone and in some cases even reaching extreme consequences, with attacks such as the one that claimed the life of John Lennon in 1980.

Unfortunately, however, it is only famous people who can fall victims of this kind of harassment: every day we can see news about rejected ex boyfriends who attack their ex, or they “simply” call them on the phone at any time, day and night.
To protect oneself against this kind of occurrence, there is a simple and painless way that does not even require changing your phone number or even your home address: Just change your voice!

This is made possible through the use of a voice changing device, a simple box which, when connected to your home phone or your mobile handset, works on the frequencies of the human voice, so that when you speak normally, your counterpart on the other side of the receiver will think that they are talking to someone else.

This device, in fact, can change the voice in an absolutely natural and clean way, with no metallic tones, making you sound like a man, a woman, an elderly or young person, or even a child: a great way to protect yourselves from telephone harassment, not only of this kind but also by annoying creditors or telemarketing companies, without having to hide or change your address.

To find out in detail how the voice changer works, and discover the range of available models, as well as several items for protection of your privacy, we recommend that you contact Endoacustica, an industry leader with many years of experience in the security field at your complete disposal.

Calendar

dicembre: 2017
L M M G V S D
« Nov    
 123
45678910
11121314151617
18192021222324
25262728293031

NEWSLETTER


e-mail:
name:
Newsletter Endoacustica Europe - ENGLISH

Login

CONTACT US

Endoacustica Europe srl
Via Umberto Terracini, 47
70029 Santeramo in Colle (BA)
P.IVA IT06836020724
ITALY
tel. 0039 080 30 26 530
tel. 0039 080 43 73 08 93
fax 0039 080 40 73 11 87
e-mail: info@endoacustica.com

Text ADS

 SPY PHONE
spyphone A Spy Phone or GSM spy cellphone is a normal mobile phone on which has been installed a software able to reply many crucial information such as: listening of all incoming and outgoing calls from the mobile, real time phone surrounding sounds, reading of all type of messages (SMS, WhatsApp, Facebook, Viber etc..) and GPS tracking. The spy software works on the most of Android, iOS, Blackberry smartphones.

 MICRO DIGITAL RECORDER
digital video recorder Micro digital recorder able to gather evidence or discover any kind of betrayals. Recording capability of up to 1200 hours in continuous. Long duration for those recorders using voice activation system VAS. Just for you the best micro digital voice recorders on the market in terms of efficacy and reliability at a low price.
 WALL MICROPHONES
Wall microphones able to listen through walls thick even up to 70 cm. Ultra sensitive professional stereo microphone, suitable to pick up the lowest noises thanks to its very high sensitive ceramic microphone. Limpid and stable sound. Endowed with sockets for recorder and earpiece.
 PHONE VOICE CHANGER
The phone voice changers when interposed between handset and phone, will change your voice into another one. It transforms any voice into a masculine, feminine, adult or child one.The voice changer can be adapted to cell phones, cordless phones, speakers and microphones, recording systems, or connected to switchboards. The reproduced voice is not a robotic but a human one.
 REAL TIME TRACKERS
localizzatore rf

Real time trackers are designed for those who need to keep their pets under control, while limiting the relevant cost, but also to locate precious objects or to remember where you parked your car.

 ANTI-DROWNING AND ANTI-LOSS ALARM
anti loss alarm

Anti-drowning defender is an alarm device which combines anti-drowning and anti-loss alarm, and works effectively as an electronic safety device for protecting children or pets from drowning and loss.

Relevant artilcle

Attention to the new gadgets of thieves

14 Feb 2014

This may be the last discover of ingenious thieves who don’t hesitate to resort to the technology to hit unsuspecting victims. The news of recent months shows several cases where someone complains of being robbed, at home or in the company, after agreeing to unknowns small gadgets, deployed on the street, particularly at the crossings or when the light is red. The hypothesis is that these gadgets (lighters, key chains …

Never lose things again with the geolocation tools

19 Set 2013

The geolocation is getting closer, at your fingertips. We’re all constantly losing things. Keys, bag, charger and many other tools of daily use are very often forgotten, lost. The hard part is finding them. This discomfort could be deleted with the help of geolocation devices. In particular, big companies and startups are trying to answer to the distraction effects with products that will come soon on the market. Their secret would be an accessory, …

Stop mobile phones theft

30 Lug 2013

One hundred twenty thousand a year, ten thousand a month are the mobile phones stolen (or loss). These are the numbers from the homeland of mobile phones, smartphones and tablets thieves: London. The Mayor, Boris Johnson, and the police are really troubled about the weight of these statistics and asked to the same companies devices producing to investigate about what is happening. In particular, they asked to Apple, Samsung and …

Locate a mobile phone with the technique used by bats and dolphins

4 Lug 2013

Locate the exact position of a cell phone in enclosed spaces may become possible thanks to an algorithm that allows us to reconstruct the 3D shape of a room, listening to the echo of the sounds produced inside, even simple ones like the snap of the fingers. The project was developed by a research group at the EPFL. The researchers were inspired by echolocation, the system by which some animals …

Fish-robot will patrol the Thames River

10 Mag 2013

It’s environmental surveillance, the new frontier crossed by the fish-robot that will be released, in the coming months, in the Thames in order to sniff out pollution. Scenes like science fiction movies are recorded during the tests in the water. The robots will be released in groups of five in order to provide a mapping of the critical points and pollutant elements. The search will rely to the sensors built-in …

At the supermarket with the navigator

17 Gen 2013

GPS technology has now numerous applications in daily activities. Keep an eye on the kids, monitor the pet, follow the partner’s car is a cakewalk if you have the right tools. Shortly, it will possible use a sophisticated development of GPS technology in a shopping center or on the shelves of the supermarket so you’ll save time and optimize the product comparison. To lead the tour will be our trusty …

Internet of things will revolutionize our daily

10 Dic 2012

Web 3.0 isn’t yet far away. All the big laboratories are working hard to develop new applications concerning the Internet of things. With this neologism has been named the last frontier of online technology. The strength lies in the possibility given to objects to interact with each other by capturing and exchanging information. The alarm clock may sound for example in advance once found, through the Internet, heavy traffic conditions. …

Hop! the suitcase that follows you

13 Nov 2012

Pack your bags is always a problem. Weather conditions, formal and informal dresses, comfortable and casual, but also suited to special occasions that may occur…In short, a grind. And what often we create is a baggage too heavy and almost entirely useless. About 25 years ago, a pilot of the Nortwestern Airlines tried to obviate to the problem of having to lift heavy luggage introducing the trolley as we know …

Even sharks tracked with GPS

22 Ott 2012

Until recently, GPS tracking systems were used for the control of small animals. Now the GPS challenges even the most dangerous animals. Indeed, it is in an experimental phase the scientific mission of the American non profit association, Ocearch, led by Chris Fischer. During the operation, the sharks are caught, mainly in North America, and to them is applied a GPS tracking device, then they come back to the sea. …

Home with the GPS shoes

1 Ott 2012

Dominic Wilcox, british designer, has created a fully functional prototype pair of shoes with a built-in GPS that will guide you home. The name of this extravagant invention is “No Place Like Home” and it’s inspired by the famous novel “The Wonderful Wizard of Oz” in witch the protagonist Dorothy, with her magic shoes, can go everywhere clicking her shoes together three times. For Wilcox’s shoes, with expertly decorated sole, …