How to protect your smartphone from being tapped using encryption tools

Defending your privacy on smartphones or other mobile devices from hackers and data thieves is not easy, actually not even impossible if you have decided to take advantage of special hardware contrivances as well as to install the right tools on. That’s the reason why we are going now to …

Mobile phone spy software: all you need to know before starting to spy on a cell phone

Why should anyone ever want to spy on a cell phone at a distance? Well, there could be a lot of reasons for that, actually as we said so many times, to spy on someone’s mobile is illegal. However there are extreme situations, related to the personal sphere, requiring an …

How to choose the best spy bugs without getting tricked

Lately searching for a valid product on the Internet has become a very difficult task. For example, in the case of spy bug transmitters or any other electronic device commonly used in the investigation field, you will note that along with those few old companies, come also across a lot …

The new frontier of biometric access: the body odor

The Universidad Politécnica de Madrid has added to the biometric recognition tools already on the market, another ingredient: the body odor. Identification parameter that, according to the researchers may soon be used for a reliable recognition through personal characteristics and biological properties. So we’ll be able to filter people based …

Microregistratori digitali

A biometric access hard drive from Apricom

luglio 16, 2010 Technology No Commenti

The need for security has become an absolute must not only for our personal safety, our home or our office, but, in a world that is totally computer-centered, also for our data, either work-related or of a personal nature. To protect it while carrying it, in the unfortunate case of loss of our portable hard drive or USB stick, one can use different levels and systems of security.

This is exactly where Apricom is heading, through the launch of its Aegis Bio, a biometric hard drive which, along with the option to choose among several levels of capacity up to 640 GB to carry your data, allows you to protect them securely against unauthorized access attempts.

Protection is delivered by using an embedded biometric scanner, on which all you have to do is store your fingerprint, to make sure you are really the only one who can access your hard drive. Furthermore, along with a biometric scanner protection and a traditional password access control, Aegis Bio can store the saved data in encrypted format, wit a 128-bit encryption key.

In practice, even if someone should be able to put their hands on your hard drive (in case you lose it or someone steals it from you), it would be basically impossible for them to gain access to your sensitive data, unless they chop off your finger… and ask you the password!

This level of protection can be found on the market at a very convenient price; in fact, the 640 Gb version is on sale at only 160 dollars, a price that makes Aegis Bio a highly competitive accessory in terms of performance, security and quality/cost ratio.

A wall is not enough to stop you from listening

luglio 15, 2010 Technology No Commenti

If law enforcement agents should not be able, due to the infamous gag bill being discussed in Italy, to use telephone wiretapping at its best to gather intelligence and evidence against dangerous criminals, they should resort to alternative methods. For example, during an operation that involves chasing the suspect, an undoubtedly vital tool is the so called wall microphone.

A classic situation that may happen during an investigation occurs when agents need to follow the suspect during its movements, and the guy, to remain unnoticed, takes a room in a hotel. In such situations, agents will have to try and take lodging in the next room, in order to start doing their job.

To gather information in such cases, one can use a wall microphone, equipped with a stethoscope that resembles exactly the one that our doctor would use, but is connected to an amplifier. Just place the stethoscope against the wall to pick up the smallest vibrations caused by conversations taking place in the next room, without arising any suspicions in the people inside it.

For this task, there are several types of wall microphones available, ranging from those that look like a stethoscope to micro bugs that can be placed on the outside of a window, and can pick up voices inside the room by reading the vibrations in the glass, and transmitting the gathered intelligence to an agent hidden within a few hundred meters. This method involves a lower risk level, as detectives would not need to be too close to the suspects.

To have more information on how wall microphones are working, and how it can help you to gather the intelligence you need, we recommend that you visit the Endoacustica website.

No more wheelchairs: here comes the robotic exoskeleton

luglio 15, 2010 Technology No Commenti

Those who are forced to use a wheelchair to move around know perfectly how life can be complicated, not only in the difficulty they have to face when negotiating the smallest obstacle such as, for example, a sidewalk, but most of all in the feeling of having to depend on others at all times and in all occasions even for their basic needs.

Finally now, after seven years of studies and fine tuning, the New Zealand based Rex Bionics has launched its exoskeleton, which aims at making life a lot easier for paraplegic patients, and to allow them to leave the wheelchair and start moving not on wheels while sitting, but on two legs, albeit robotic, while standing.

The Rex exoskeleton is capable of standing a person’s weight, and is controlled thanks to a joystick, allowing its user to carry out tasks apparently as easy as 1-2-3, but impossible for those who can’t use their legs; in fact, thanks to it, it will be possible not only to stand up and walk, but also to go up and down a flight of stairs or an upward or downward slope.

Apart from immediate benefits from a physical point of view, and concerning movement and self-sufficiency, thanks to Rex patients will not only improve their morale and live their condition in a better way, but will also be able to improve their physical conditions in the long term.

For example, the risk of muscular atrophy and decubitus ulcers will be minimized, keeping the patient in a better shape which will help them, if awaiting a therapy or a surgery, not only to face it but also to better go through the post-surgery process.

The only problem is the 150000 dollar price tag, but the possibility to walk and lead an almost normal life is priceless!

Telecommunication buoys for submerged submarines

luglio 15, 2010 Technology No Commenti

The aerospace and armament US giant Lockheed Martin has just completed, in cooperation with other industries in the electronics field, a test run on a communications program called CSD (Communications at Speed and Depth).

It is a telecommunication system that allows submarines of any class in service with the US Navy to stay under the water without needing to go back up to periscope level to communicate with other ships, planes or with the ground-based control center. Normally this is the moment of highest risk for submarines, which are more exposed to enemy fire or danger of being intercepted just when they come up to sea level.

The CSD, for which Lockheed Martin has been granted a $35 million contract, is made up of a series of floating buoys, which are launched by the submarine and are tethered to it via a cable. The buoys are equipped with antennas for telephone communication through the Iridium network, and for very high frequency radio transmission. The floating antennas receive incoming communications coming from the ground base via a satellite, and use the same connection to send signals back to the ground.

Another buoy turns acoustic signals into radio waves, allowing the submarine personnel to communicate with any airplanes stationing or passing above the sea.

Thanks to CSD, submarines will be constantly connected to the global telecommunication network, without having to face unwanted dangers when emerging. The continuous connection allows not only to minimize this kind of danger, but also to ensure a higher operational flexibility, so that a mission’s schedule can be changed instantly at any time, without having to wait for the next reemergence.

Untraceable cell phones against unwelcome listeners

luglio 14, 2010 Technology 2 Commenti

Even though all the song and dance that we are witnessing in Italy about the law that would regulate (that is, limit) the usage of telephone wiretapping would only benefit a few people who would want their dirty business to remain secret, it is actually true that, at least theoretically, there is a problem concerning eavesdropping; that is, our phone calls are at risk because the GSM network, as it has been proven several times, is not completely secure.

Therefore, this places us at risk of having our conversations intercepted by prying ears, and that the information gathered could be used against us. Of course, for those who live an ordinary life, the risk of having their calls listened to by a third party does not pose a serious threat.

But for those who have interests to protect, because their professional activity moves substantial amounts of money, or simply because they want their private matters to remain confidential, the danger of telephone wiretapping might mean losing a big order, or even having to close down their business, not to mention potential family problems.

To protect ourselves against mobile phone interception, it is possible to use a tool that makes sure that no one can listen to our conversations. The Stealth untraceable cell phone delivers absolute protection against the possibility of being intercepted, by adopting a dynamic defense strategy.

To understand how it works, you should keep in mind that wiretapping on our mobile phone can be done not only by the phone number, but mostly by keeping track of phone calls placed and received by a specific handset, intercepting it by its IMEI number, that is, the 15-digit number that uniquely identifies every single telephone. So, changing your SIM card is no use if you are being intercepted, and it would actually place you into a greater risk, as while you think you are protected, you may reveal secrets and compromising details.

Instead, the Stealth Phone, thanks to a modification in its installed firmware, can automatically change its IMEI number each time it is switched on and off, or after each call; the IMEI number can also be changed manually. By doing this, even though you are physically using the same handset, for the network operator (and for those who want to discover our secrets) it will be like you are using a different phone each time.

In the extremely unlikely case that an interception attempt should be detected, your invisible Stealth phone will warn you immediately, by a sound or a vibration. In such cases, all you have to do is close your call and change the IMEI number, either manually or by switching the phone off and on again. At this point, with a new IMEI number it will be like having a new (and non traceable) phone, so you will be able to resume your call where you left it.

Of course, using a Stealth phone does not protect you if it is your conversation counterpart who is being intercepted. Therefore, for those who call always the same person (a business partner or spouse) it is recommended that both use a Stealth Phone, in order to keep your conversations 100% secure and protected.

For more information on operation and different models of untraceable mobile phones, with prices and characteristics, we recommend that you visit the Endoacustica website and request a tailored consulting, one of our operators will contact you shortly.

A fabric that can record or produce sounds

luglio 14, 2010 Technology No Commenti

As we know, optical fibers can be used to transmit data as light pulses, thus making high-speed Internet surfing as we know it today possible. They can also have some more sophisticated properties, such as the possibility to detect, transmit and play sounds.

A team of researchers from the MIT is developing a particular type of optical fibers which could be used to create clothes that, along from being normally worn, might work as real microphones, to pickup and intercept sounds, but also to measure blood flow and brain or blood vessel pressure.

The acoustic fibers that the MIT research team is working on are manufactured by using a special plastic material, and with a procedure that is slightly different from standard optical fibers, which involves the materials inside each fiber being positioned according to a complicated geometrical scheme.

The molecules of this special polymer are asymmetrical, and thanks to this, it can be defined as piezoelectric, since it changes its shape in presence of an electrical current, just like a normal piezo microphone would do. Thanks to this process (briefly described) fibers can capture sounds just like common microphones would do, and by reversing the process they can produce sounds as well.

In practice, it would be like wearing a microphone, and by connecting it to a micro recorder (or in future, integrating the recorder inside a dress manufactured with these fibers), creating a shirt that can work as a recorder as well, and that might for example sport a USB plug inside a cuff, used to download its recordings directly into a computer.

For those who work in the audio surveillance field, like law enforcement agents of private detectives, it would definitely be a tool worth using.

Robot sentries on the Korean border

luglio 14, 2010 Technology No Commenti

One day, we might all be replaced by robots that do our job in silence, in an absolutely efficient way, with no complaints and most of all, without joining any workers’ union.
The latest development in this respect comes not from the world of labor, but from the military: in fact, the South Korean government has decided to install, inside the famed DMZ, the de-militarized zone which runs along the 38th parallel and separates the two Koreas, a set of robot sentries.

We are talking about robots equipped with sensors that can detect voice, movement and heat generated by a possible intruder within their operating range, and that in extreme cases can shoot with an automatic gun or throw grenades. As soon as the robot sentry detects an intruder, it immediately sends an alert to its control center.

If the personnel from the center can ensure that the intruder is not a real threat, the robot will not act, but if it is identified as a foe, then an order would be given to shoot and neutralize it.

Currently, these robots are only used near a single border post (of course the name and location has not been disclosed) and should this test be successful, the South Korean government would install automatic sentries, at a cost of 330 thousand dollars each, all along the 250-kilometre long border between South Korea and the no man’s land that separates it from North Korea, one of the most dangerous areas on the planet, as well as the most heavily guarded border line in the world.

Those who might not agree with installation of these robots are animals, which have populated the demilitarized zone taking advantage of the lack of humans, and might find themselves in danger in their involuntary natural reserve.

Spy plane stays four days in the air, with no pollution

luglio 13, 2010 Technology No Commenti

Every single day we happen to read (and to write) about some new spy plane, and with so many of them around, our skies (especially above areas where peace is at risk or absent, such as Middle East, Iraq or Afghanistan) are crowded with drones keeping a watchful eye over the terrain below from different angles and heights.

The latest novelty in this field was introduced by Boeing a few days ago and is called Phantom Eye. This spy plane with its peculiar egg-like shape and a 45m wingspan, can reach an altitude of approximately 65000 feet (around 20000 meters) and thanks to its twin 2300 cc engines, it can stay up in the air for up to 4 consecutive days while carrying a payload of approximately 200 kgs, and reaching a maximum speed of 150 knots, and all this without a pilot.

Furthermore, Phantom Eye is capable of flying in an absolutely clean way, with a decidedly reduced operating cost, since its engines are powered by a hydrogen fuel cell; unlike normal engines mounted on commercial airliners, the hydrogen engine does not produce carbon monoxide, but pure and simple water, thus playing its small part to keep our skies clean.

For now, Phantom Eye is just a prototype, but by the early months of next year, after the first tests on the ground, we will start to see tests in the air of a vehicle that seems set to revolutionize the world of spy planes, not only for its technical characteristics (the surveillance equipment mounted on board should not dramatically differ from what is currently available on this market), but rather for being the first high-altitude UAV built with an eye to energy saving and clean energy.

An unmanned combat aircraft, completely invisible to radars

luglio 13, 2010 Technology No Commenti

The British Ministry of Defence has just introduced Taranis, the first prototype of pilotless combat aircraft (or UCAS, Unmanned Combat Aircraft System) capable of flying in stealth mode, without being detected by enemy radars along its way, and of striking at very long range, even thousands of kilometers away from its base.

The aircraft, called Taranis, is the result of a design and development work which lasted more than three years and a half, and it is bound to become the largest unmanned combat aircraft operating in war zones, once the test flights have been completed (its maiden flight is scheduled by 2011).

It will be equipped with two bays for weaponry, and although it is fitted with equipment that allow it to function in a completely independent manner for most of its mission, the ultimate control and final decision over use of force will be taken by the ground personnel that operates it remotely.

The Taranis project brings together, under the Ministry of Defence umbrella, giants of the avionics, aerospace and electronics fields. Big names such as BAE Systems (which will supervise the entire project), GE Aviation, Qinetiq and Rolls Royce are cooperating to deliver Her Majesty’s troops a new tool to strike from a distance and in complete safety.

During the unveiling ceremony, which took place at BAE Systems’ plant in Warton, no details have been provided yet about weapons, navigation systems and the technology that will be mounted on board the Taranis, but we are sure it will be the best available, to ensure absolute flexibility and an equally absolute precision to strike without being detected by enemy defences.

Invisible earpieces, for a continuous and discreet contact

luglio 11, 2010 Technology No Commenti

If telephone wiretapping is becoming a more difficult tool to use, at least in Italy, law enforcement can certainly not stop their investigation work, and in order to fight crime, in some cases they must resort to a more cumbersome and dangerous method, that is, for example, trying to infiltrate a criminal organization or a terrorist cell, in order to try and gather in first person information that might be collected with listening bugs.

In order to carry out this kind of operations, one of the most useful instruments that surveillance technology can provide is certainly an invisible earpiece, that is, a miniaturized transmitter that, once placed inside the ear canal, can be used to listen to what is happening around its wearer, and to send him information and instructions from a remote location, in order to guide him in his intelligence gathering operation.

Invisible earpieces conceal, in their tiny size, a micro transmitter which can be connected via Bluetooth to a radio transmitting or GSM watch, that is, something that looks like your ordinary wristwatch but on the inside contains a radio transmitter or a SIM card just like the ones we use on mobile phones. Through this set, the information gathered through the earpiece can be sent via radio to a listener hidden somewhere within a range of a couple of kilometers, or by using the GSM phone network, it can be sent to any corner of the world towards a preset phone number, starting the transmission operation with the simple click of a button.

For more information on how invisible earpieces are working, we recommend you visit the Endoacustica website and ask one of our consultants.

Calendar

dicembre: 2017
L M M G V S D
« Nov    
 123
45678910
11121314151617
18192021222324
25262728293031

NEWSLETTER


e-mail:
name:
Newsletter Endoacustica Europe - ENGLISH

Login

CONTACT US

Endoacustica Europe srl
Via Umberto Terracini, 47
70029 Santeramo in Colle (BA)
P.IVA IT06836020724
ITALY
tel. 0039 080 30 26 530
tel. 0039 080 43 73 08 93
fax 0039 080 40 73 11 87
e-mail: info@endoacustica.com

Text ADS

 SPY PHONE
spyphone A Spy Phone or GSM spy cellphone is a normal mobile phone on which has been installed a software able to reply many crucial information such as: listening of all incoming and outgoing calls from the mobile, real time phone surrounding sounds, reading of all type of messages (SMS, WhatsApp, Facebook, Viber etc..) and GPS tracking. The spy software works on the most of Android, iOS, Blackberry smartphones.

 MICRO DIGITAL RECORDER
digital video recorder Micro digital recorder able to gather evidence or discover any kind of betrayals. Recording capability of up to 1200 hours in continuous. Long duration for those recorders using voice activation system VAS. Just for you the best micro digital voice recorders on the market in terms of efficacy and reliability at a low price.
 WALL MICROPHONES
Wall microphones able to listen through walls thick even up to 70 cm. Ultra sensitive professional stereo microphone, suitable to pick up the lowest noises thanks to its very high sensitive ceramic microphone. Limpid and stable sound. Endowed with sockets for recorder and earpiece.
 PHONE VOICE CHANGER
The phone voice changers when interposed between handset and phone, will change your voice into another one. It transforms any voice into a masculine, feminine, adult or child one.The voice changer can be adapted to cell phones, cordless phones, speakers and microphones, recording systems, or connected to switchboards. The reproduced voice is not a robotic but a human one.
 REAL TIME TRACKERS
localizzatore rf

Real time trackers are designed for those who need to keep their pets under control, while limiting the relevant cost, but also to locate precious objects or to remember where you parked your car.

 ANTI-DROWNING AND ANTI-LOSS ALARM
anti loss alarm

Anti-drowning defender is an alarm device which combines anti-drowning and anti-loss alarm, and works effectively as an electronic safety device for protecting children or pets from drowning and loss.

Relevant artilcle

Attention to the new gadgets of thieves

14 Feb 2014

This may be the last discover of ingenious thieves who don’t hesitate to resort to the technology to hit unsuspecting victims. The news of recent months shows several cases where someone complains of being robbed, at home or in the company, after agreeing to unknowns small gadgets, deployed on the street, particularly at the crossings or when the light is red. The hypothesis is that these gadgets (lighters, key chains …

Never lose things again with the geolocation tools

19 Set 2013

The geolocation is getting closer, at your fingertips. We’re all constantly losing things. Keys, bag, charger and many other tools of daily use are very often forgotten, lost. The hard part is finding them. This discomfort could be deleted with the help of geolocation devices. In particular, big companies and startups are trying to answer to the distraction effects with products that will come soon on the market. Their secret would be an accessory, …

Stop mobile phones theft

30 Lug 2013

One hundred twenty thousand a year, ten thousand a month are the mobile phones stolen (or loss). These are the numbers from the homeland of mobile phones, smartphones and tablets thieves: London. The Mayor, Boris Johnson, and the police are really troubled about the weight of these statistics and asked to the same companies devices producing to investigate about what is happening. In particular, they asked to Apple, Samsung and …

Locate a mobile phone with the technique used by bats and dolphins

4 Lug 2013

Locate the exact position of a cell phone in enclosed spaces may become possible thanks to an algorithm that allows us to reconstruct the 3D shape of a room, listening to the echo of the sounds produced inside, even simple ones like the snap of the fingers. The project was developed by a research group at the EPFL. The researchers were inspired by echolocation, the system by which some animals …

Fish-robot will patrol the Thames River

10 Mag 2013

It’s environmental surveillance, the new frontier crossed by the fish-robot that will be released, in the coming months, in the Thames in order to sniff out pollution. Scenes like science fiction movies are recorded during the tests in the water. The robots will be released in groups of five in order to provide a mapping of the critical points and pollutant elements. The search will rely to the sensors built-in …

At the supermarket with the navigator

17 Gen 2013

GPS technology has now numerous applications in daily activities. Keep an eye on the kids, monitor the pet, follow the partner’s car is a cakewalk if you have the right tools. Shortly, it will possible use a sophisticated development of GPS technology in a shopping center or on the shelves of the supermarket so you’ll save time and optimize the product comparison. To lead the tour will be our trusty …

Internet of things will revolutionize our daily

10 Dic 2012

Web 3.0 isn’t yet far away. All the big laboratories are working hard to develop new applications concerning the Internet of things. With this neologism has been named the last frontier of online technology. The strength lies in the possibility given to objects to interact with each other by capturing and exchanging information. The alarm clock may sound for example in advance once found, through the Internet, heavy traffic conditions. …

Hop! the suitcase that follows you

13 Nov 2012

Pack your bags is always a problem. Weather conditions, formal and informal dresses, comfortable and casual, but also suited to special occasions that may occur…In short, a grind. And what often we create is a baggage too heavy and almost entirely useless. About 25 years ago, a pilot of the Nortwestern Airlines tried to obviate to the problem of having to lift heavy luggage introducing the trolley as we know …

Even sharks tracked with GPS

22 Ott 2012

Until recently, GPS tracking systems were used for the control of small animals. Now the GPS challenges even the most dangerous animals. Indeed, it is in an experimental phase the scientific mission of the American non profit association, Ocearch, led by Chris Fischer. During the operation, the sharks are caught, mainly in North America, and to them is applied a GPS tracking device, then they come back to the sea. …

Home with the GPS shoes

1 Ott 2012

Dominic Wilcox, british designer, has created a fully functional prototype pair of shoes with a built-in GPS that will guide you home. The name of this extravagant invention is “No Place Like Home” and it’s inspired by the famous novel “The Wonderful Wizard of Oz” in witch the protagonist Dorothy, with her magic shoes, can go everywhere clicking her shoes together three times. For Wilcox’s shoes, with expertly decorated sole, …