How to choose the best spy bugs without getting tricked

Lately searching for a valid product on the Internet has become a very difficult task. For example, in the case of spy bug transmitters or any other electronic device commonly used in the investigation field, you will note that along with those few old companies, come also across a lot …

Attention to the new gadgets of thieves

This may be the last discover of ingenious thieves who don’t hesitate to resort to the technology to hit unsuspecting victims. The news of recent months shows several cases where someone complains of being robbed, at home or in the company, after agreeing to unknowns small gadgets, deployed on the …

Protect yourself from illegal cell phone tapping!

If you are used to networking in search of easy solutions against the unauthorized phone tapping issue, you may be disappointed. Just like that, because the overwhelming problem of phone privacy, especially that one which concerns mobile network, has long since exceeded the limits, so much to induce public opinion …

The new frontier of biometric access: the body odor

The Universidad Politécnica de Madrid has added to the biometric recognition tools already on the market, another ingredient: the body odor. Identification parameter that, according to the researchers may soon be used for a reliable recognition through personal characteristics and biological properties. So we’ll be able to filter people based …

Microregistratori digitali

Bugs power supply, for long lasting wiretaps

novembre 2, 2010 Technology No Commenti

Although the Berlusconi government in Italy, while stumbling from a sex scandal to the next, is trying to put a cap on wiretapping operations, by imposing a time limit, fortunately this investigative tool is still in use without too many restrictions that would only do a favor to criminals and crooks.

When a judge orders a wiretapping operation, either environmental or over the phone, what is known is when it will start, but not when it will end. This poses a problem too many times underestimated, when it comes to the duration of the interception, that is, the problem of how to ensure that bugs are correctly functioning.

Generally, eavesdropping devices are battery powered and communicate either by radio, or over the telephone network if the bug in use is a GSM bug with a SIM card just like the one of an ordinary mobile phone. Transmission via telephone is very demanding in terms of battery power.
Therefore, where possible it is recommended to use a bug has a power supply, to be connected directly to the mains from the electricity network, from which with very limited power consumption it will be possible to provide juice for your bugs, continuously for months and months.

Thanks to its tiny size, concealing it is not a problem, as it can be hidden inside an electrical box or a switch. In this way, hidden microphones connected to the power supply will ensure a continuous listening, perfect for long-term surveillance operations, during which it is important to ensure continuous coverage of the environment to control.

For full details on listening devices, bugs power supply and a wide range of equipment for room and phone eavesdropping, we suggest that you visit the Endoacustica website and contact our experts for advice tailored on your needs.

Manned-Unmanned demo for U.S. Army UAV

novembre 2, 2010 Technology No Commenti

According to officials from the Department of Defense of the United States, the U.S. military is preparing a large-scale demonstration to be held in September next year in the Utah desert.

The object of this demo, dubbed MUSIC (Manned Unmanned Systems Integration Concept) will be the showcasing of possibilities of interaction between unmanned aerial vehicles (UAVs) and air and ground systems controlled by human personnel.

This demonstration is aimed at analyzing in detail the progress being made in cooperation and interaction between automated technologies and those that, in order to work perfectly, still need a human mind and eyes to control them and manage their operation.

For example, a demonstrations will be made of how the pilot of an Apache helicopter will be able to control, from the cockpit of his chopper, also an unmanned drone that flies nearby, to display on its screen also the images picked up by the UAV’s video systems, and even to launch any weapons that are mounted on the unmanned vehicle.

In this way, the pilot of a helicopter or small plane will actually be able to control two vehicles, with the UAV acting as a support, not only for aerial reconnaissance, but also in real attack missions.
The demonstrations will involve different types of helicopters, such as Shadow, Raven, Hunter, Grey Eagle, and of course the Apache AH-64 Block III.

While the Apache takes control of the drone next to it, other helicopters in the squadron will be able to view real-time feeds captured by the on-board systems of both vehicles, with an effective information exchange, coordinated by the ground control center, which provides a significant advantage over an enemy.

Laser microphones, and long distance listening becomes reality

novembre 1, 2010 Technology No Commenti


When a group of dangerous criminals, or a mafia “cupola”, meets in secret to make decisions on their illegal business, they usually take a number of precautions to ensure that the police can not catch them.

In such situations, any operation of wiretapping of phone lines or planting of bugs is almost impossible, unless the lives of agents are put in grave danger, also risking the failure of the entire chase.

Therefore, to gather intelligence, the police may use tools to listen to conversations from a distance, in order to gather the information in the safest possible way. For example, this is the case with laser microphones, which give their users the opportunity to capture the conversations that take place inside a closed room, thanks to the use of a laser beam.

The laser, appropriately pointed at the window glass, in fact, is able to read the small vibrations of the glass caused by sounds, noises and voices inside the room. By pointing the beam on the glass at the correct angle, and retrieving the reflected beam with a receiver, you can read these vibrations, and turn them into sound and voice, enabling you to successfully carry out a remote listening operation without running any risk.

In fact, the laser microphone is able to secretly pick up conversations at a maximum distance of approximately a mile, allowing the monitoring agents to work without excessive stress, and to quickly take shelter in case something goes wrong.

Not only for law enforcement, but also for private detectives who are following a case of industrial espionage or marital infidelity, the laser microphones can prove very useful; if you wish to learn more about them, you can visit the Endoacustica website.

BlackBerry, ban in India has been lifted

novembre 1, 2010 Technology No Commenti

It seems that a happy ending has finally come, for the long story which went on between RIM, manufacturer of BlackBerry phones, and a number of Asian governments that would like to impose stricter measures on use of the RIM platform, in order to ensure themselves the right to listen to phone calls in case of threat to the national security.

Specifically, in India the government has officially confirmed that the negotiations with RIM have led to an agreement under which the BlackBerry Messenger services will continue, and the government can legally intercept the relevant content.

In addition, RIM has promised to find a permanent solution by January 31, 2011, in order to provide Indian government agencies with a continuous access to their encrypted data. The details of the agreement were not disclosed, but surely it is a significant step forward since the beginning of the story, when the Indian government had threatened to close all BlackBerry services at the end of last August.

As that date came closer, the government had instead granted an extension of 60 days to find a solution and this solution seems to have been finally found, as testified by today’s announcement, which follows a similar compromise that RIM had found with the Government of the United Arab Emirates, another one of the countries (along with Indonesia and Saudi Arabia) which had requested access to encrypted data on the BlackBerry platform.

Indeed, the services provided by RIM in the UAE have now been declared legal and compliant with the rules in force in that country. RIM also stated that they are following a similar approach to continue to operate in those countries, respecting local laws and regulations compatibly with its characteristics and principles.

At war just like in video games, thanks to an iPad

ottobre 29, 2010 Technology No Commenti

Recently we have seen how iPhone applications are increasingly being used also in the military, to control micro-helicopters used for reconnaissance or to perform simulations that help soldiers familiarize with anti-missile systems.
Therefore, it is natural that the new addition in the Apple family, the iPad, has generated the same attention from military authorities, who have already started several research projects to develop applications that can make life less dangerous for U.S. troops at the front.

An interesting application was developed by Textron, which can be used can keep under control the movements of troops, displaying them on the iPad screen as if they were part of a videogame. The application, called Soldier Eyes, uses augmented reality to detect, in collaboration with the soldiers directly involved in the area, the location of enemy and friendly forces, sending the relevant information back to a control center, which builds up a map in real time.

This map is then sent directly on the iPad, whose users can communicate in real time with soldiers on the front line, giving them the location of potential enemy threats, displayed directly on their smartphones or PDAs. Soldier Eyes achieves this through simultaneous use of a series of small applications that manage the information coming from the field, to provide an overview of the situation.

Once the picture is clear, one can send out two patrols of soldiers to separately attack an enemy position, simply by send them information directly on their iPad or iPhone, so that they can view the location of their target and converge towards the same point from different directions in order to neutralize it.
In short, this is a way to conduct real operations of real war, but making them look almost like a simple video game.

600 hours in only 4 mm on your microrecorder

ottobre 29, 2010 Technology No Commenti

The occasions when you may need to record conversations, sounds or music, in a discreet way and as invisibly as possible, are countless: a concert, a lesson at school or in college, a meeting in the office or, for law enforcement and private detectives, during a difficult criminal investigation or for a case of marital infidelity.

In such cases, it is important that the hidden recording is done using a tool that can not arise unnecessary attention, which can be easily concealed and, if necessary, can operate autonomously for a long time, by turning on automatically only when absolutely necessary, to avoid wasting time by recording hours of useless background noise.

Therefore, you should use a EM type voice recorder, which is able to achieve all this,in spite of its extremely tiny size. In fact, there are some models that, although sporting a thickness of only 4 mm and a size comparable to that of a credit card, have features such as voice activation sensor and a storage capacity of 4 GB, that is, approximately 600 hours of recording.

With automatic activation, you can record only when necessary, in order to get the most out of your audio surveillance operation or intelligence gathering; this feature guarantees optimization of battery consumption, which is guaranteed to last up to 1 month when in standby mode, or for up to 14 hours of continuous recording.

Thanks to its compact dimensions, it will not be easily visible, and you can retrieve it with ease when no one is watching you. For more details on the operation of digital voice recorders, we recommend that you visit the Endoacustica website, where you will find other miniature models of recorders for all your different needs in this field.

A plane, a helicopter … or both?

ottobre 29, 2010 Technology No Commenti

As those who read this blog may happen to know, we often find ourselves commenting on the new creations of the big brains at DARPA, a branch of the Department of Defense in charge of research for the military, which plays an important role to ensure that United States of America have a significant technological and strategic advantage over their potential enemies.

Therefore, any innovation that comes from DARPA does not surprise us too much. A mention of honour, however, it certainly assigned to DiscRotor, a VTOL (Vertical Takeoff and Landing) vehicle which represents a sort of hybrid between an airplane and a helicopter, whose rotor blades are mounted on (as the name goes) some sort of disc. Once the vertical take-off is completes, the blades can disappear within the disc, and DiscRotor can fly like a normal plane, using the disc as an additional wing; upon landing, however, it will be possible to use the rotor blades for vertical landing, especially if the operation is carried out in inaccessible areas where there is not enough space to allow landing of a common plane.

This therefore means that, thanks to DiscRotor, the speed of, for example, an evacuation of troops from a harsh environment, would be significantly increased, due to higher cruise speed of DiscRotor compared to that of a conventional helicopter, when it is in plane configuration.

Currently, the project is still in its initial phase, along with thousands of other high-tech projects that DARPA is constantly working on. I wonder if one day we will be able to see this strange object fly over our heads like a normal plane, then suddenly stop, pull out its rotors and gently land, just like a chopper.

Listening through a wall requires the right microphone

ottobre 27, 2010 Technology No Commenti

We all happened at different times, to wish that we were able to listen to what happens beyond a wall, perhaps during a confidential meeting in the office, or because we have an annoying neighbor, or simply to make sure that our children are not hanging out with the wrong company.

This is not always possible, but thanks to modern technology for discreet listening, it is much easier than you might think.

If you have ever watched those old Wild West movies where crooks open a safe using a stethoscope to find out the right combination, you know what we are talking about. In fact, it is thanks to the modern variant of this procedure, that you can easily listen to conversations taking place behind a wall that can be thick up to 70 cm.

With a wall microphone, equipped with a cap very similar to your doctor’s stethoscope, but teamed up with digital technology that turns it into a high sensitivity microphone, you will be able, easily and without being noticed, to capturing all that your neighbor, your teenage child or, why not, your boss, are saying while they think no one is listening.

All this can then be also connected to a digital voice recorder, so that you can store the conversations and use them as evidence in case of need, for example during a court audition.
In short, a stethoscope microphone can be your best friend to defend your interests or your loved ones!

For more information on how to purchase wall microphones, digital micro recorders and a whole range of equipment for security and defense of your privacy, please visit the Endoacustica website where you will find the answers to all your questions in this field.

Street View, a threat to our privacy

ottobre 27, 2010 Technology No Commenti

Today, in Italy, on the main newspapers’ headlines we have seen the news that the Google Street View function that displays a road from a pedestrian’s point of view, allowing the viewer to take a look at the street as if they were really there, is under investigation in Italy, where a Rome prosecutor has opened an investigation file with the charge of unlawful interference with private life.

In fact, according to information that the data protection commissioner sent to the Court itself, the famous Google mini cars, which collect the images that will be used in Street View, have during their course collected sensitive data stored the WiFi networks encountered along the way.
From the Net giant’s headquarters in Mountain View, an apology note was immediately sent out, stating that the data have been collected in an accidental way, and offering full cooperation to the authorities in order to investigate and to ensure that this breach of privacy not only will not happen again in the future, but also will have no unpleasant consequences for the owners of the data inadvertently intercepted.

Such data may contain not only access information and credentials for protected WiFi networks, but also email messages and passwords, which, may have devastating consequences if they fall into the wrong hands.

Moreover, according to the authorities that guard the individuals’ privacy in Italy, the cars that gather information for Google should be recognizable, so that those who happen to spot one and do not really want to be seen or photographed in inappropriate behavior or in a place where they are not supposed to be (for example, while leaving a mistress’s home…) have the opportunity to take adequate measures in time.

Google, which increasingly resembles a Big Brother 2000, will therefore have to limit its intrusiveness, to avoid having to face hefty penalties.

The human brain can be backed up like a hard disk

ottobre 25, 2010 Biotechnology No Commenti

The name Raymond Kurzweil, for the majority of the general public may not mean that much, but he is one of the great gurus of modern technology, able not only to invent the first music synthesizer which could perfectly imitate the sound of the piano, thus overcoming one of the major limitations of electronic keyboard instruments, but also to predict, back in the eighties the development of the Internet as we know it now.

In addition to this, Kurzweil has contributed to progress with the inception of technologies such as voice recognition, but also with theories that bear witness to his visionary talent, such as when he envisioned the advent of a modern society in which all information could be obtained through computers connected in a worldwide network, a vision that at the time raise more than an eyebrow …

So when Kurzweil talks about the future, you should listen to him. According to his last prophecy, in twenty years from now it will be possible to make a copy of the data in our brain, a sort of backup copy which, just like the contents of today’s hard drives, could be easily saved on USB drives, and brought safely to consult it when needed, not only by the “owner” of the copied brain, but by others, and possibly also by his heirs after his death, to relive his memories and access to any knowledge that the deceased may have left behind, by reading the data through a search engine.

Theoretically, thanks to nanotechnology, this scenario is already possible today. Again, because of microscopic technologies, it will be possible, according to Kurzweil, to have micronized robots implanted in the human body, which would flow in our blood vessels to detect and cure any diseases, and to give us advice on habits we should follow, foods we should eat and medicines to take. In a few words, it will be a sort of Big Brother inside us, but (apparently) well-meant.

Who knows, maybe in the future, once the technology to make a backup copy of our brain is found, there could be a way to restore it, that is, to reinstall the data of a deceased person’s brain into that of a younger one, thus rendering eternal, if not his life, at least his knowledge and his memories.

The scenario is not exactly reassuring, but who knows, maybe in twenty years we will find a way to use all this knowledge in constructive ways.


ottobre: 2017
« Set    


Newsletter Endoacustica Europe - ENGLISH



Endoacustica Europe srl
Via Umberto Terracini, 47
70029 Santeramo in Colle (BA)
P.IVA IT06836020724
tel. 0039 080 30 26 530
tel. 0039 080 43 73 08 93
fax 0039 080 40 73 11 87

Text ADS

spyphone A Spy Phone or GSM spy cellphone is a normal mobile phone on which has been installed a software able to reply many crucial information such as: listening of all incoming and outgoing calls from the mobile, real time phone surrounding sounds, reading of all type of messages (SMS, WhatsApp, Facebook, Viber etc..) and GPS tracking. The spy software works on the most of Android, iOS, Blackberry smartphones.

digital video recorder Micro digital recorder able to gather evidence or discover any kind of betrayals. Recording capability of up to 1200 hours in continuous. Long duration for those recorders using voice activation system VAS. Just for you the best micro digital voice recorders on the market in terms of efficacy and reliability at a low price.
Wall microphones able to listen through walls thick even up to 70 cm. Ultra sensitive professional stereo microphone, suitable to pick up the lowest noises thanks to its very high sensitive ceramic microphone. Limpid and stable sound. Endowed with sockets for recorder and earpiece.
The phone voice changers when interposed between handset and phone, will change your voice into another one. It transforms any voice into a masculine, feminine, adult or child one.The voice changer can be adapted to cell phones, cordless phones, speakers and microphones, recording systems, or connected to switchboards. The reproduced voice is not a robotic but a human one.
localizzatore rf

Real time trackers are designed for those who need to keep their pets under control, while limiting the relevant cost, but also to locate precious objects or to remember where you parked your car.

anti loss alarm

Anti-drowning defender is an alarm device which combines anti-drowning and anti-loss alarm, and works effectively as an electronic safety device for protecting children or pets from drowning and loss.

Relevant artilcle

Attention to the new gadgets of thieves

14 Feb 2014

This may be the last discover of ingenious thieves who don’t hesitate to resort to the technology to hit unsuspecting victims. The news of recent months shows several cases where someone complains of being robbed, at home or in the company, after agreeing to unknowns small gadgets, deployed on the street, particularly at the crossings or when the light is red. The hypothesis is that these gadgets (lighters, key chains …

Never lose things again with the geolocation tools

19 Set 2013

The geolocation is getting closer, at your fingertips. We’re all constantly losing things. Keys, bag, charger and many other tools of daily use are very often forgotten, lost. The hard part is finding them. This discomfort could be deleted with the help of geolocation devices. In particular, big companies and startups are trying to answer to the distraction effects with products that will come soon on the market. Their secret would be an accessory, …

Stop mobile phones theft

30 Lug 2013

One hundred twenty thousand a year, ten thousand a month are the mobile phones stolen (or loss). These are the numbers from the homeland of mobile phones, smartphones and tablets thieves: London. The Mayor, Boris Johnson, and the police are really troubled about the weight of these statistics and asked to the same companies devices producing to investigate about what is happening. In particular, they asked to Apple, Samsung and …

Locate a mobile phone with the technique used by bats and dolphins

4 Lug 2013

Locate the exact position of a cell phone in enclosed spaces may become possible thanks to an algorithm that allows us to reconstruct the 3D shape of a room, listening to the echo of the sounds produced inside, even simple ones like the snap of the fingers. The project was developed by a research group at the EPFL. The researchers were inspired by echolocation, the system by which some animals …

Fish-robot will patrol the Thames River

10 Mag 2013

It’s environmental surveillance, the new frontier crossed by the fish-robot that will be released, in the coming months, in the Thames in order to sniff out pollution. Scenes like science fiction movies are recorded during the tests in the water. The robots will be released in groups of five in order to provide a mapping of the critical points and pollutant elements. The search will rely to the sensors built-in …

At the supermarket with the navigator

17 Gen 2013

GPS technology has now numerous applications in daily activities. Keep an eye on the kids, monitor the pet, follow the partner’s car is a cakewalk if you have the right tools. Shortly, it will possible use a sophisticated development of GPS technology in a shopping center or on the shelves of the supermarket so you’ll save time and optimize the product comparison. To lead the tour will be our trusty …

Internet of things will revolutionize our daily

10 Dic 2012

Web 3.0 isn’t yet far away. All the big laboratories are working hard to develop new applications concerning the Internet of things. With this neologism has been named the last frontier of online technology. The strength lies in the possibility given to objects to interact with each other by capturing and exchanging information. The alarm clock may sound for example in advance once found, through the Internet, heavy traffic conditions. …

Hop! the suitcase that follows you

13 Nov 2012

Pack your bags is always a problem. Weather conditions, formal and informal dresses, comfortable and casual, but also suited to special occasions that may occur…In short, a grind. And what often we create is a baggage too heavy and almost entirely useless. About 25 years ago, a pilot of the Nortwestern Airlines tried to obviate to the problem of having to lift heavy luggage introducing the trolley as we know …

Even sharks tracked with GPS

22 Ott 2012

Until recently, GPS tracking systems were used for the control of small animals. Now the GPS challenges even the most dangerous animals. Indeed, it is in an experimental phase the scientific mission of the American non profit association, Ocearch, led by Chris Fischer. During the operation, the sharks are caught, mainly in North America, and to them is applied a GPS tracking device, then they come back to the sea. …

Home with the GPS shoes

1 Ott 2012

Dominic Wilcox, british designer, has created a fully functional prototype pair of shoes with a built-in GPS that will guide you home. The name of this extravagant invention is “No Place Like Home” and it’s inspired by the famous novel “The Wonderful Wizard of Oz” in witch the protagonist Dorothy, with her magic shoes, can go everywhere clicking her shoes together three times. For Wilcox’s shoes, with expertly decorated sole, …