How to record conversations in the office, or wherever you want, hiddenly and safely

Credit card shaped micro recorder REC-CARD. A champion of discretionary and effectiveness on the field! We know too well there are many efficient and “invisible” micro recorders available on the market. However whenever we take a look at this ultra-thin credit card shaped mini recorder we remain everytime fascinated. That’s …

Attention to the new gadgets of thieves

This may be the last discover of ingenious thieves who don’t hesitate to resort to the technology to hit unsuspecting victims. The news of recent months shows several cases where someone complains of being robbed, at home or in the company, after agreeing to unknowns small gadgets, deployed on the …

Protect yourself from illegal cell phone tapping!

If you are used to networking in search of easy solutions against the unauthorized phone tapping issue, you may be disappointed. Just like that, because the overwhelming problem of phone privacy, especially that one which concerns mobile network, has long since exceeded the limits, so much to induce public opinion …

The new frontier of biometric access: the body odor

The Universidad Politécnica de Madrid has added to the biometric recognition tools already on the market, another ingredient: the body odor. Identification parameter that, according to the researchers may soon be used for a reliable recognition through personal characteristics and biological properties. So we’ll be able to filter people based …

Microregistratori digitali

The listening bug that hides in a computer mouse

novembre 9, 2010 Technology No Commenti

When we need to hide something, we often go crazy trying to find a place to hide it where no one can discover it. Sometimes, however, one tends to forget that often the best way to hide something is to put it in full view, right there before those who might be looking for it.

This is especially true in the surveillance field, and there are many environmental bugs concealed in everyday objects, where no one would ever think that a threat might be hiding. For example, thanks to the increasing miniaturization of surveillance technology, a hidden microphone can be contained inside a pen, a desk calculator, or even a belt buckle.

There is a particular model that is contained inside a computer mouse. At first glance it looks like a normal mouse, and indeed it is fully functional, but the secret is on the inside, where along with a sensitive microphone that allows you to intercept conversations inside a room or an office, it contains a SIM card, just like the one of your phone, which is used to send any intelligence and information that it picks up, to a remote listener who can be literally anywhere.

With its voice activation sensor, as soon as a sound is detected, the bug is automatically activated and starts its transmission towards a preset phone number. Moreover, this number can remotely set the operating parameters of the GSM bug, simply by sending an SMS, which is processed as an operation command.
The automatic activation can also happen when the mouse moves, which could signal the fact that the person under surveillance just reached his or her office.

If you want more information about how the Spy Mouse works, we recommend that you visit the Endoacustica website, and contact us for a personal consultation regarding remote monitoring options.

A perfect wireless signal even in remote areas

novembre 9, 2010 Technology No Commenti

Anyone who found themselves away from the nearest sign of civilization, for example in the mountains or on a remote island in the middle of the ocean, knows perfectly that even trying to use a mobile phone could be a major problem because of lack of network signal. Just imagine how one could ever think of connecting to a wireless network.

To solve this problem, and ensure wireless coverage even in the remotest corners of our planet, Fujitsu unveiled its GaN-HEMT project, a new power amplifier that has reached a record level of output for wireless radio and telecommunications.

Thanks to this wireless amplifier it will be possible to multiply the power of a wireless communications system up to six times the current level, managing to bring the wireless signal in areas that are currently cut off from the network because it would be impossible to lay down optic fiber cables.

The GaN HEMT (Gallium Nitride High Electron Mobility Transistor) system is able to provide a transmission speed of about 10 Gbps, a speed at the same level of the best optical fiber networks.

So far, laboratory tests at Fujitsu have succeeded in developing a power of 350 milliwatts using amplifiers of this kind, operating on the C and Ku bands which, unlike W-band millimeter-wave transmissions, do not suffer significant loss of power caused by weather, for example during a tropical storm that could greatly reduce the signal strength on a remote island.

In the coming months, the engineers at Fujitsu will work to improve the signal strength and stability, using this technology to create trunk lines that would carry high-speed wireless signal to provide an access without geographical limits.

A bug that starts by itself

novembre 8, 2010 Technology No Commenti

Those who work in the surveillance field, such as law enforcement officers and private investigators, know that during an environmental eavesdropping operation, the amount of time occupied by background noises and useless sounds far exceeds that of conversations actually useful to the investigation.

For example, when planting a bugging device in an office, it may happen that the person under surveillance is not talking to anyone for long hours, and the eavesdropping operation would return only background noise, such as typing on a computer keyboard.

This kind of sounds make the process of listening to the information collected a long and tedious job, and especially if the bug is battery powered, it could run out of juice without giving real results. Therefore, care should be taken to optimize the operation of surveillance devices, using a tool such as a voice-activated bug.

This kind of bug, thanks to its activation sensor, can start working only when the sensor detects a sound above a certain threshold, thus avoiding to record and transmit background noise instead of real intelligence.
It is a GSM bug, with a SIM card just like that of an ordinary phone, which is used to transmit sounds and voices to a preset phone number, at any distance, even on the other side of the world!

The programming of its features (sensitivity, activation alert and so on) can be conveniently done via SMS, thus ensuring absolute safety. By connecting the GSM bug to the landline phone cables, you can easily listen to all incoming and outgoing calls, automatically starting to listen when the handset is released.

For more information and details about how GSM bugs are working, you can visit the Endoacustica website and contact our professional staff.

Finland, a 3D speed camera fines you in seconds

novembre 8, 2010 Technology No Commenti

Scandinavian countries are often taken as a benchmark for the accuracy and honesty of their citizens, especially when they get behind the wheel, a situation in which they tend to show their respect for other drivers, for speed limits and for safety on the road.

Obviously though, not all of them comply with these rules. Precisely for this reason, in Finland, which has always been at the forefront of technology (think of Nokia, for example), the highway police has just been equipped with cutting-edge traffic cameras, able not only to detect when you are pushing too hard on the gas and exceeding the speed limit, but also to check your insurance and even tax situation!

This futuristic speed radar features cameras which, in addition to measuring speed, can also read the license plate number. Connected via satellite to the police database, the system checks that the car insurance associated with that number has been regularly paid, and even if the car owner has unpaid taxes or fines.

Also, the three-dimensional cameras of this advanced system, called ASSET (Advanced Safety and Driver Support for Essential Road Transport) and funded with about 8 million euro from the European Union, are able, thanks to their sensors, to take pictures of the inside of your car, to verify that the driver is wearing the requisite seat belt. Thanks to its sensors, then, it can also detect other violations, such as the non-observance of safety distances, which can often cause fatal accidents.

The Finnish authorities are hoping that such equipment will further increase road safety by reducing the number of accidents caused by speed or risky behavior, in a country which anyway is always on one of the top positions of the worldwide ranking for road safety. But you know that on the road, caution is never too much, even in Finland.

A bug can hide in the power outlet

novembre 4, 2010 Technology No Commenti

When you think you are safe in a protected environment, you let yourself go, and mistakenly believing belief that no one can hear you, you may end up revealing details which, if heard by someone else, may be highly compromising for anyone who has something to hide.

Whoever is afraid that their words could be intercepted, for personal or business reasons, should carefully check their environment, to make sure that their workplace or home are not concealing devices that can be used for secret listening by unauthorized parties or, for those who have something to hide, by the police.

Sometimes, though, checking carefully everywhere may not be enough to find bugs, or hidden transmitters, if they are well concealed so as not to generate any kind of suspicion, for example by placing them inside everyday objects, where one would never think that something fishy can hide.

A desktop calculator can hide a secret microphone, a pen may contain a camera, inside a computer mouse there could be a bug and so on, even hiding a GSM bug in a multiple power outlet, just like the ones that everyone has at home to power their computers or TV sets. By concealing a bug, connected to a SIM card, into a power outlet, there are two benefits for the surveillance operation.

First of all, you have the opportunity to hear what happens in the room from any distance, because the transmission of the intelligence intercepted takes place via a phone call, and the bug works just like a regular cell phone that calls you on a preset number, when its automatic activation sensor detects a sound.

The second benefit is the unlimited duration of the wiretapping operation, because the bug is powered through the same electrical outlet where it is hidden .

In short, a complete surveillance package, continuously operating and almost impossible to spot! For more information on the GSM bugs you can visit the Endoacustica website.

Metaflex, the invisibility cloak really exists

novembre 4, 2010 Technology No Commenti

Since ancient times, the most desired piece of clothing for men and women alike has always been an item … that does not exist: the invisibility cloak.
Metaphor for unattainable wishes, such an impossible cloth was the prerogative of characters from fantasy stories, and often ended up causing more harm than good to those who used it.

Now, according to a research by scientists at the University of St. Andrews in Scotland, this dream could finally become a reality. In fact, the team of researchers is developing a new metamaterial (that is, an artificial material with properties not available in nature), capable of “bending” electromagnetic waves.

This material, called Metaflex has a “negative refraction index” which allows it to bend not only electromagnetic waves but also rays of visible light, in a way which, at least in theory, would make any object coated with this material invisible to human eyes.

The properties of this material could be used to make ships or submarines invisible to sonar waves, but being able to make it usable with visible light and with its shorter length waves, and on flexible objects such as a piece of clothing, is a very difficult challenge.

The Metaflex addresses this challenge by using meta-atoms that are stacked together. Previously, meta-atoms, which as the name suggests are the ones that make up meta materials, were used on hard and flat surfaces, such as the outer shell of a submarine. Manipulating their structure, it will be possible, according to researchers, to create a flexible metamaterial with which to manipulate the behavior of visible light, creating not only the legendary invisibility cloak, but also super-lenses to be used for artificial eyes, certainly less fascinating but more useful for visually impaired people.

Marital infidelity, the Net is the new frontier

novembre 3, 2010 Technology No Commenti

According to statistics, cases of marital infidelity worldwide are on the rise. In fact, according to a research from the Italian Association of Matrimonial Lawyers, at least 55% of husbands and 45% of wives have cheated on their spouse at least once.

A large chunk of this increase is certainly due to the widespread presence of social networks, which allow people to start more easily a correspondence with people of the opposite sex, thus creating the conditions for an extramarital fling.
Thanks to Facebook, a bored or unsatisfied husband or wife can find an old boyfriend or girlfriend from school days, and the correspondence can eventually lead to meeting for a coffee or perhaps something else.

The possibilities offered by the virtual world allow even the shyest ones to overcome insecurities due to a not always perfect physical appearance, leaving aside their fears, and freely express their hidden or repressed true personality. From this to a secret meeting, the road is not too long, and in no time the statistics of marital infidelity could have one more case.

In Italy, for example, there is a specialized website for finding short-term partners (no, we are not giving you the address…), a perfect example of “technologically assisted adultery” where everyone can find a casual partner compatible with their tastes and privacy needs. This site already has over 90,000 members, most of which are of course men, especially over forty years of age.

On the one hand, however, if technology is a great help for those who are in search of adventure, on the other side it can also become their worst enemy; in fact, many cases of adultery are discovered by wives or husbands, who notice a suspicious or stealthy attitude in their loved one, and spy a mobile phone in search of compromising signs such as a message or phone call.

A good half of infidelity cases, in fact, are exposed by snooping on cell phones, while the remaining half is split more or less equally between hiring a private detective, checking spouses’ email correspondence or taking an active technological stance, by using a spy phone, which lets you listen to its user’s calls, in real time and invisibly, and also gives you access to all messages, incoming and outgoing, while the user is completely unaware.

In short, while technology provides unexpected opportunities for cheating spouses, on the other, the cheated husband or wife can use it take a nice revenge …

Car, plane, helicopter and speedboat, all in one

novembre 3, 2010 Technology No Commenti

We have seen more than once cars that, by pressing a button or so, can turn into small planes, two-seat helicopters or small speedboats, but we have not yet seen one that could be able to transform into all three.

The idea was developed by British designer Philip Pauley, who has given birth to his Halo Intersceptor, a concept hybrid vehicle which, in normal conditions, is a normal (albeit sporty) car.
The interior of this car is essentially unchanged in each of the four configurations. What changes are the different accessories that must be strapped on the car depending on whether you want to use this vehicle to fly like a plane or a helicopter, or ride the waves on a boat.

The car itself is already very powerful, as it would be able to reach, in its designer’s intentions, a top speed of 500 kilometers per hour.
By strapping on it a couple of triangular wings and two Pratt & Whitney engines, Halo would become an aircraft capable of reaching a top speed of Mach 2, flying at over 20 thousand meters of altitude.

As a helicopter, it would have a range of 450 nautical miles and a top speed of 185 knots at an altitude of about 4500 meters.
Finally, for those who want to use it in water, Halo would be able to turn into a speedboat capable of a range of 1200 nautical miles and a cruising speed of 38 knots, with a maximum of around 60 knots.

This high-profile performance in each of the four configurations, suggests that Halo Intersceptor would probably never see the light, and if it should ever hit the markets, it is certainly not a vehicle that could be affordable for those who would love turn their cars into helicopters to escape the city traffic on a Monday morning.

Bugs power supply, for long lasting wiretaps

novembre 2, 2010 Technology No Commenti

Although the Berlusconi government in Italy, while stumbling from a sex scandal to the next, is trying to put a cap on wiretapping operations, by imposing a time limit, fortunately this investigative tool is still in use without too many restrictions that would only do a favor to criminals and crooks.

When a judge orders a wiretapping operation, either environmental or over the phone, what is known is when it will start, but not when it will end. This poses a problem too many times underestimated, when it comes to the duration of the interception, that is, the problem of how to ensure that bugs are correctly functioning.

Generally, eavesdropping devices are battery powered and communicate either by radio, or over the telephone network if the bug in use is a GSM bug with a SIM card just like the one of an ordinary mobile phone. Transmission via telephone is very demanding in terms of battery power.
Therefore, where possible it is recommended to use a bug has a power supply, to be connected directly to the mains from the electricity network, from which with very limited power consumption it will be possible to provide juice for your bugs, continuously for months and months.

Thanks to its tiny size, concealing it is not a problem, as it can be hidden inside an electrical box or a switch. In this way, hidden microphones connected to the power supply will ensure a continuous listening, perfect for long-term surveillance operations, during which it is important to ensure continuous coverage of the environment to control.

For full details on listening devices, bugs power supply and a wide range of equipment for room and phone eavesdropping, we suggest that you visit the Endoacustica website and contact our experts for advice tailored on your needs.

Manned-Unmanned demo for U.S. Army UAV

novembre 2, 2010 Technology No Commenti

According to officials from the Department of Defense of the United States, the U.S. military is preparing a large-scale demonstration to be held in September next year in the Utah desert.

The object of this demo, dubbed MUSIC (Manned Unmanned Systems Integration Concept) will be the showcasing of possibilities of interaction between unmanned aerial vehicles (UAVs) and air and ground systems controlled by human personnel.

This demonstration is aimed at analyzing in detail the progress being made in cooperation and interaction between automated technologies and those that, in order to work perfectly, still need a human mind and eyes to control them and manage their operation.

For example, a demonstrations will be made of how the pilot of an Apache helicopter will be able to control, from the cockpit of his chopper, also an unmanned drone that flies nearby, to display on its screen also the images picked up by the UAV’s video systems, and even to launch any weapons that are mounted on the unmanned vehicle.

In this way, the pilot of a helicopter or small plane will actually be able to control two vehicles, with the UAV acting as a support, not only for aerial reconnaissance, but also in real attack missions.
The demonstrations will involve different types of helicopters, such as Shadow, Raven, Hunter, Grey Eagle, and of course the Apache AH-64 Block III.

While the Apache takes control of the drone next to it, other helicopters in the squadron will be able to view real-time feeds captured by the on-board systems of both vehicles, with an effective information exchange, coordinated by the ground control center, which provides a significant advantage over an enemy.

Calendar

agosto: 2017
L M M G V S D
« Lug    
 123456
78910111213
14151617181920
21222324252627
28293031  

NEWSLETTER


e-mail:
name:
Newsletter Endoacustica Europe - ENGLISH

Login

CONTACT US

Endoacustica Europe srl
Via Umberto Terracini, 47
70029 Santeramo in Colle (BA)
P.IVA IT06836020724
ITALY
tel. 0039 080 30 26 530
tel. 0039 080 43 73 08 93
fax 0039 080 40 73 11 87
e-mail: info@endoacustica.com

Text ADS

 SPY PHONE
spyphone A Spy Phone or GSM spy cellphone is a normal mobile phone on which has been installed a software able to reply many crucial information such as: listening of all incoming and outgoing calls from the mobile, real time phone surrounding sounds, reading of all type of messages (SMS, WhatsApp, Facebook, Viber etc..) and GPS tracking. The spy software works on the most of Android, iOS, Blackberry smartphones.

 MICRO DIGITAL RECORDER
digital video recorder Micro digital recorder able to gather evidence or discover any kind of betrayals. Recording capability of up to 1200 hours in continuous. Long duration for those recorders using voice activation system VAS. Just for you the best micro digital voice recorders on the market in terms of efficacy and reliability at a low price.
 WALL MICROPHONES
Wall microphones able to listen through walls thick even up to 70 cm. Ultra sensitive professional stereo microphone, suitable to pick up the lowest noises thanks to its very high sensitive ceramic microphone. Limpid and stable sound. Endowed with sockets for recorder and earpiece.
 PHONE VOICE CHANGER
The phone voice changers when interposed between handset and phone, will change your voice into another one. It transforms any voice into a masculine, feminine, adult or child one.The voice changer can be adapted to cell phones, cordless phones, speakers and microphones, recording systems, or connected to switchboards. The reproduced voice is not a robotic but a human one.
 REAL TIME TRACKERS
localizzatore rf

Real time trackers are designed for those who need to keep their pets under control, while limiting the relevant cost, but also to locate precious objects or to remember where you parked your car.

 ANTI-DROWNING AND ANTI-LOSS ALARM
anti loss alarm

Anti-drowning defender is an alarm device which combines anti-drowning and anti-loss alarm, and works effectively as an electronic safety device for protecting children or pets from drowning and loss.

Relevant artilcle

Attention to the new gadgets of thieves

14 Feb 2014

This may be the last discover of ingenious thieves who don’t hesitate to resort to the technology to hit unsuspecting victims. The news of recent months shows several cases where someone complains of being robbed, at home or in the company, after agreeing to unknowns small gadgets, deployed on the street, particularly at the crossings or when the light is red. The hypothesis is that these gadgets (lighters, key chains …

Never lose things again with the geolocation tools

19 Set 2013

The geolocation is getting closer, at your fingertips. We’re all constantly losing things. Keys, bag, charger and many other tools of daily use are very often forgotten, lost. The hard part is finding them. This discomfort could be deleted with the help of geolocation devices. In particular, big companies and startups are trying to answer to the distraction effects with products that will come soon on the market. Their secret would be an accessory, …

Stop mobile phones theft

30 Lug 2013

One hundred twenty thousand a year, ten thousand a month are the mobile phones stolen (or loss). These are the numbers from the homeland of mobile phones, smartphones and tablets thieves: London. The Mayor, Boris Johnson, and the police are really troubled about the weight of these statistics and asked to the same companies devices producing to investigate about what is happening. In particular, they asked to Apple, Samsung and …

Locate a mobile phone with the technique used by bats and dolphins

4 Lug 2013

Locate the exact position of a cell phone in enclosed spaces may become possible thanks to an algorithm that allows us to reconstruct the 3D shape of a room, listening to the echo of the sounds produced inside, even simple ones like the snap of the fingers. The project was developed by a research group at the EPFL. The researchers were inspired by echolocation, the system by which some animals …

Fish-robot will patrol the Thames River

10 Mag 2013

It’s environmental surveillance, the new frontier crossed by the fish-robot that will be released, in the coming months, in the Thames in order to sniff out pollution. Scenes like science fiction movies are recorded during the tests in the water. The robots will be released in groups of five in order to provide a mapping of the critical points and pollutant elements. The search will rely to the sensors built-in …

At the supermarket with the navigator

17 Gen 2013

GPS technology has now numerous applications in daily activities. Keep an eye on the kids, monitor the pet, follow the partner’s car is a cakewalk if you have the right tools. Shortly, it will possible use a sophisticated development of GPS technology in a shopping center or on the shelves of the supermarket so you’ll save time and optimize the product comparison. To lead the tour will be our trusty …

Internet of things will revolutionize our daily

10 Dic 2012

Web 3.0 isn’t yet far away. All the big laboratories are working hard to develop new applications concerning the Internet of things. With this neologism has been named the last frontier of online technology. The strength lies in the possibility given to objects to interact with each other by capturing and exchanging information. The alarm clock may sound for example in advance once found, through the Internet, heavy traffic conditions. …

Hop! the suitcase that follows you

13 Nov 2012

Pack your bags is always a problem. Weather conditions, formal and informal dresses, comfortable and casual, but also suited to special occasions that may occur…In short, a grind. And what often we create is a baggage too heavy and almost entirely useless. About 25 years ago, a pilot of the Nortwestern Airlines tried to obviate to the problem of having to lift heavy luggage introducing the trolley as we know …

Even sharks tracked with GPS

22 Ott 2012

Until recently, GPS tracking systems were used for the control of small animals. Now the GPS challenges even the most dangerous animals. Indeed, it is in an experimental phase the scientific mission of the American non profit association, Ocearch, led by Chris Fischer. During the operation, the sharks are caught, mainly in North America, and to them is applied a GPS tracking device, then they come back to the sea. …

Home with the GPS shoes

1 Ott 2012

Dominic Wilcox, british designer, has created a fully functional prototype pair of shoes with a built-in GPS that will guide you home. The name of this extravagant invention is “No Place Like Home” and it’s inspired by the famous novel “The Wonderful Wizard of Oz” in witch the protagonist Dorothy, with her magic shoes, can go everywhere clicking her shoes together three times. For Wilcox’s shoes, with expertly decorated sole, …