How to protect your smartphone from being tapped using encryption tools

Defending your privacy on smartphones or other mobile devices from hackers and data thieves is not easy, actually not even impossible if you have decided to take advantage of special hardware contrivances as well as to install the right tools on. That’s the reason why we are going now to …

Mobile phone spy software: all you need to know before starting to spy on a cell phone

Why should anyone ever want to spy on a cell phone at a distance? Well, there could be a lot of reasons for that, actually as we said so many times, to spy on someone’s mobile is illegal. However there are extreme situations, related to the personal sphere, requiring an …

How to choose the best spy bugs without getting tricked

Lately searching for a valid product on the Internet has become a very difficult task. For example, in the case of spy bug transmitters or any other electronic device commonly used in the investigation field, you will note that along with those few old companies, come also across a lot …

The new frontier of biometric access: the body odor

The Universidad Politécnica de Madrid has added to the biometric recognition tools already on the market, another ingredient: the body odor. Identification parameter that, according to the researchers may soon be used for a reliable recognition through personal characteristics and biological properties. So we’ll be able to filter people based …

Microregistratori digitali

Technology applied to the animals at the Las Vegas technology fair

gennaio 14, 2014 Technology No Commenti

For someone are like children, for others are even more important. And the technology is riding the moment. We’re talking about animals. Domestic, beatiful and always faithful. From years, there are valid locators on the market that prevent the loss of the precious companions. These make possible to know the animal position and above all to be alerted if it moves away from a fixed perimeter. These tools are used by livestock farmers as well as by simple dogs or cats owners.

But that’s not all. At the Consumer Electronics Show, the electronics fair in Las Vegas, many exhibitors thought to the four-legged friends. It would seem that our dog will soon boast of being technologically advanced, just as the owner, with smartphones and smart bracelets.

One of the technologies that most impressed the visitors of the CES is FitBark. It’s a system for tracking the physical activity of the dog. It works thanks to a small plastic shell shaped bone, applicable to the collar, which encloses inside sensors to record each movement. It transmits via Bluetooth through a smartphone application.

The software, developed in collaboration with veterinaries, encloses the frames of reference divided by race to see if the animal performs the correct daily physical activity, monitored through challenges and scores to reach. The application is compatible with some fitness bracelets for men and allows you to perform human-animal challenges. You can also post pictures and messages, manage a diary to share on Facebook or Twitter. Throught a Wifi unit, shaped dog-house, sold separately, you can monitor the activity of your dog even remotely. If you’re out, for example, you can monitor the animal or control if your dog-sitter is working fine.

In this regard, they are already in use monitoring tools such as micro cameras or surveillance video cameras that monitor 24h-24h animals, people and environments. And Petzila, another American startup, has bring a normal camera at the show, claiming to have designed it especially for animals just like “monitor on the kids”.  In addition it’s possible to talk to the puppy through the microphone, and also give its a cookie via the built-in dispenser, pressing a button on your smartphone.

In short, the “genius” of the technology in Las Vegas have seized the opportunity dedicating the existing and widely experienced technology to the pets. While the “innovations” looking for a space in the market, there are those who relies on technologies tested in the security and surveillance field that not have the shape of a bone, but they are certainly very reliable.

2014: the counter-espionage year

gennaio 7, 2014 Self Defence No Commenti

2014 will be, without doubt, the counter-espionage year. After the Datagate scandal that hit the world with different effects depending on the area, many have asked during the  2013 to improve their security and surveillance systems. This isn’t a real innovation, but it’s a inevitable requirement. The principle is the that of the espionage, more and more frequent, especially by hackers, who in 2013 tried to develop them with testimonials and referrals to top-secret documents. In fact, 2014 will eliminate the espionage threats that causes uncontrolled daily damages to many businesses and people, even unsuspected. In 2013 it was brought to light the scandal, in 2014 it’s time to do the math.

We must recognize that numerous espionage acts are often make easy by the lack of equipment against external intrusion. In the course of 2013, smartest employers have already begun to increase the protection level of their companies with constant environmental bug sweeping and with the implementation of video surveillance and pc security tools.

These are monitoring tools that should be in every business whether large or small. In fact, it’s customary to think that small businesses are exempt from espionage, but in reality they are the most affected and subjected to the most disastrous damages.

To these systems are added personal attention for those who believe they can be subjected to indiscreet interception. This is for example the use of mobile phones impossible to intercept, as the Stealth Phone proposed by Endoacustica Europe. Unlike a mobile phone that operates on the encrypted voice data, codifying and making them unintelligible to any listener outside, the Stealth Phone instead protects the phone itself, making it untraceable. In addition there are other tools that can verify the presence of a bug on the phone line.

In short, the wide Endoacustica Europe range can be considered a great ally for the security of business and personal data and informations.

The wig with camera and GPS sensor

dicembre 23, 2013 Technology No Commenti

An idea in the wearable technology field born of two Japanese inventors, Hiroaki Tobita and Takuya Kuzi, of the Sony Computer Science Laboratories. It’s a SmartWig. The two engineers have developed a distinctive headdress with a dual functionality. While it’s able to hide any baldness, its also and above all has a camera, a navigation system and sensors that monitor the physiological values​​.

The wig is able to communicate wirelessly with a mobile device and it’s equipped with camera, a laser pointer and a GPS sensor; a real surveillance system to put in the head. From a long time the “big names” of the technology are searching for as much as wearable devices; just think to spy glasses, necklaces and watches equipped with tiny camera and bracelets with GPS sensors.

The first SmartWig model serves as a navigation system thanks to a GPS sensor. The gadget indicates the path through the micro-vibrations in the concerned part of the skull: a little shake on the right side indicates the direction to the right, for example. In this sense, the tool could also be useful to blind people so that they would receive directions while walking. The second model, however, is equipped with a laser pointer and can slide your PowerPoint simply by orienting the head from one side to another. Finally, the third prototype of the smart-wig: replace the thermometers and pressure gauges, and with a simple click, it monitors brain waves, stores sounds and images files and if necessary, the wearer can recover them.

Great application might have in the surveillance and security field. No one would notice a system hidden under the hair. We don’t known if the wig will never be launched. The SmartWig could be a real revolution in the wearable technologies area.

Even the stones spy on us

dicembre 13, 2013 Technology No Commenti

In addition to the telephone wiretapping and PC monitor tools, now also came the micro bugs hidden in the stones. As we know, the bugs can be hidden almost anywhere, but this new frontier of surveillance is rather new.

In this way we can be monitored even if we don’t use the phone, or if we don’t surf the internet. The stones are designed by Lockheed Martin, which produces the F-35 fighters and helicopters used by U.S. President, Barack Obama. It’s an hidden software powered through wireless sensors, able to provide a discrete and continuous monitoring in a unit so small that may be contained in a stone or in the rocks. This “stone” is equipped with some tiny sensors, able to switch on at the passage of a person, and send a signal to a drone or a camera that is located nearby.

Hidden in fake rocks or even buried, these micro bugs of the SPAN system (Self-Powered Ad-hoc Network) operate as real “overseers” that detect and transmit a signal of our presence to the nearest control center, where can be lied in wait the person who wants to control us.

It’s hoped to employ the “spy stone” primarily in the military field or for espionage, surveillance, border protection, monitoring and security of bridges and pipelines. So another solution to watch without being seen through the use of professional bugs.

Sport technologies: Sky dreams micro cameras on the players

novembre 28, 2013 Technology No Commenti

Spidercam, flycam, hypersensitive microphone and powerful cameras. The evolution of recording techniques applied to the football and sport in general seems to have no boundaries and continually acquires new words and ideas to improve production. The applications are renewed from year to year endless. There is no limit to the imagination and some product takes its cue directly from the superpowers. For now you can listen what athletes whisper or observe the smallest details of a goal through micro cameras placed on the goalposts.

“They’re all applications that result from the use of military money and research” recalls Angelo Carosi, Sky director, considered the Guru of the sport recordings; he follow from years the league from his cab in front of twenty monitor.

In recent years, the matches seem to have become almost marginal, the difference is the details. “Now a match has become a movie”, said the Sky director years ago.

Have not been found yet valid solutions for professional use of drones. In addition to special permission to fly over the heads of the spectators, the times seem still very limited (only 7-8 minutes of battery life) as well as the action range in the air that reaches 40 meters maximum, and there is also the dependence by weathering. At the moment the technology more “evolved” just seems to be about sound and HD video. Meanwhile, Sky, is stimulated by his talent Vialli who dreams about micro cameras on players. “On players is complicated – said the director – but about the referees is more feasible. The problem is the collaboration of stakeholders, which currently doesn’t exist”.

Wearable Technology: tattoo-microphone by Motorola

novembre 20, 2013 Biotechnology No Commenti

As we know, the technology is more and more wearable, but the new invention by Motorola will leave everyone breathless. The American company, which was acquired by Google for a long time, intends to focus on electronic tattoos. The technical term is “Coupling an electronic Skin Tattoo to a Mobile Communication Device. It seems a normal tattoo, most probably like an invisible patch, with the function of a microphone, Bluetooth connectivity, capable of interfacing with mobile devices. This will also work with animals and also as “lie detector”, through the analysis of the resistance of the skin during vocal expression, index of nervous tension.

The electronic tattoo consists of a sensor to detect the sounds produced by our vocal cords; when the sound is decoded then it’s forwarded to your smartphone or tablet connected via bluetooth. Surely the idea lends itself to many applications, first of all, it can work as invisible microphone for security and surveillance operations, combining the most technological tools already present in the same field. Now it’s difficult to predict how this tattoo will be produced. The more realistic idea is one that sees the construction of transparent patches that can be applied, but similarly removed. Already long Google in its section of research and development is carrying out the realization of the so called “biostamp”, transparent patches consist of electronic circuits that can be applied on devices and that interact with them while not being physically connected.

There are still numerous doubts on ​​Motorola’s idea. How the device can be powered up? Which is the effective use of the electronic tattoo?. If it’s true that its main function is a simple microphone, how can we communicate? The communication, as we knows, needs of a microphone and a speaker. It’s clear that if you want listen our interlocutor, you still need to have an ear device. Would be more appropriate to use an earpiece. We can’t know what are the real intentions and the actual developments of what for now remains the outline of an idea.

Discovered the secret interception base in the Mediterranean

novembre 11, 2013 Self Defence No Commenti

An hidden base to spy on all communications that cross the Mediterranean, created by British intelligence and managed in agreement with the Americans. The British surveillance structure is located in Cyprus, in the best position to control the relations between Europe and the Arab countries. It’s a series of buildings next to the slopes of a disused military airport. Particularly noteworthy are the parables of the satellites but also a large circular antenna, designed to intercept all radio signals in a large area. The espionage work, conducted from that structure, doesn’t concern only the transmission in the ether, but there is also the focus of the monitoring of all data – conversations, email, Internet traffic – that move along undersea cables positioned in the Mediterranean.

The building, remained in the hands of the British, has been in recent years at the service of the Comunication Government Headquarters activities, the British agency that makes electronic interception programs. The role of the Cypriot base takes particular importance for the English primacy in the surveillance of undersea fiber-optic cables, where today run all communications: telephone conversations, email or Internet data traffic. The Snowden’s dossier has reported the control of 14 fiber optic undersea cables: the key arteries that join America and Europe with Asia and Africa. Maps of the fiber-optic undersea cables indicate the island as a hub of numerous lines, that making it a site suited to spy on the communications of the eastern Mediterranean and the Middle East. There are cables that connect Cyprus and Israel to Syria, which are the Anglo-American targets. Other cables connecting Cyprus to Lebanon, Egypt, Turkey, Greece and continental Europe.

To protect your telephone conversations, the most reliable tools on the market today, is the Stealth Phone. Unlike a cell phone that operates on the encrypted data item, codifying and making them unintelligible to any outside listener, the Stealth Phone protects the call itself, making the phone untraceable, and impossible life for those who want to listen to it.   The wiretaps can be based on the IMEI number or on the phone number. So in the case where the interception is performed starting from the knowledge of your IMEI number, change the SIM card there will be of no help, because it’s the device itself to be intercepted.

The new frontier of biometric controls: the voice

ottobre 29, 2013 Biotechnology No Commenti

It’s enough pronounce short and simple sentences to be identified uniquely by computer systems. It would seem this, the new generation of biometric recognizers (Voice Biometrics).The voice will replace, as the biometric accesses have done for the locks, pin and password for computers, smartphones and tablets, to make online purchases, enable home banking services and bookings. And also access to personal files, photos and movies stored on the cloud. In this way, there will be less anxiety for the chance to forget the numerical combination or to push the wrong button.

All this will be possible thanks to parameters such as frequency, timbre and extension; through them, the voice becomes an unique element that characterizes each person. Just like the fingerprints and the ocular identification systems through the iris. So, it will be able to bring down the costs for the enterprise control. To realize a voice recognition system is enough a microphone coupled to the software. With Voice Biometrics saying single words or phrases, even meaningless, the system knows the identity through a sophisticated algorithm that analyzes the voice.

According to a survey, many people are stressed by numerical combinations. Each person has about eleven username and password.The new solutions will become more and more as biometrics method of personal authentication, convenient and useful also to prevent fraud and counterfeiting.

Drones and night visors to fight illegal immigration

ottobre 21, 2013 Technology No Commenti

Amphibious ships, but also drones and helicopters with night visors. Technologically advanced devices to fight illegal immigration and prevent tragedies such as Lampedusa. In the operation of surveillance and rescue in the Mediterranean Sea, called “Mare Nostrum”, promoted by the Italian Government, will primarily be used unmanned aircraft and infrared optical tools.

Among others vehicles involved, two units of type frigate, each with a naval helicopter and two patrol type naval units, two helicopters EH101 of the Navy, boarded onto the San Marco or usable from Lampedusa, an aircraft type P180, equipped with infrared  optical instruments and radars for surface search. Also, a naval unit for logistic support, an Atlantique Air Force, based in Sigonella, a Predator (drone) used for maritime surveillance. And the coastal radar network and stations of AIS-automatic identification system of the Navy.

The drones allow to have maximum surveillance in the sea area affected by the migration routes. “Mare Nostrum” will be a military and humanitarian operation which provides for the strengthening of the surveillance devices and rescue in the seas in order to increase the level of safety of human life. The goal is to bring the emergency service nearest to the ports of departure of the ships of the sea, so as to avoid more victims.

McAfee device against NSA espionage

ottobre 11, 2013 Self Defence No Commenti

With his new device he promises to block the access to users’ personal data by the NSA. This is the purpose of John McAfee, IT and American entrepreneur, famous for his namesake antivirus. For now, “D-Central”, the name of the device, it’s only a project, but may soon enter the market. The device will be able to create a protection networks around small private networks to make them impenetrable by the controls of the National Security Agency; it will be integrated with smartphones, tablets and notebooks to allow users to communicate with each other via different media. And above all, it will be lowcost: the price will be around $100. Thanks to D-central, internet users will be able to communicate via private networks in movement and sent files being invisible to the controls of the NSA.

McAfee is looking for partners for the development of “D-central”, but he hopes to be able to produce it within next six months. Anti-espionage devices and systems have become a new niche in the tech industry, given that from the “Datagate” on, the privacy issue is increasingly debated. The “D-Central” by McAfee isn’t the first and the only device that can create great protection systems. Just think to the Stealth Phone for telephone conversations, proven tool used from several years. With this phone it’s possible to communicate in complete safety, given that the Stealth Phone allows you to add a high level of protection, safeguarding against risks of interception, now increasingly common. Unlike a cell phone that operates on the encrypted data item, codifying and making them unintelligible to any outside listener, the Stealth Phone protects the call itself, making the phone untraceable. This cell phone becomes in fact a new device every time, thus making its interception and localization impossible, so you can speak freely without fear of being heard or traced.

Calendar

dicembre: 2017
L M M G V S D
« Nov    
 123
45678910
11121314151617
18192021222324
25262728293031

NEWSLETTER


e-mail:
name:
Newsletter Endoacustica Europe - ENGLISH

Login

CONTACT US

Endoacustica Europe srl
Via Umberto Terracini, 47
70029 Santeramo in Colle (BA)
P.IVA IT06836020724
ITALY
tel. 0039 080 30 26 530
tel. 0039 080 43 73 08 93
fax 0039 080 40 73 11 87
e-mail: info@endoacustica.com

Text ADS

 SPY PHONE
spyphone A Spy Phone or GSM spy cellphone is a normal mobile phone on which has been installed a software able to reply many crucial information such as: listening of all incoming and outgoing calls from the mobile, real time phone surrounding sounds, reading of all type of messages (SMS, WhatsApp, Facebook, Viber etc..) and GPS tracking. The spy software works on the most of Android, iOS, Blackberry smartphones.

 MICRO DIGITAL RECORDER
digital video recorder Micro digital recorder able to gather evidence or discover any kind of betrayals. Recording capability of up to 1200 hours in continuous. Long duration for those recorders using voice activation system VAS. Just for you the best micro digital voice recorders on the market in terms of efficacy and reliability at a low price.
 WALL MICROPHONES
Wall microphones able to listen through walls thick even up to 70 cm. Ultra sensitive professional stereo microphone, suitable to pick up the lowest noises thanks to its very high sensitive ceramic microphone. Limpid and stable sound. Endowed with sockets for recorder and earpiece.
 PHONE VOICE CHANGER
The phone voice changers when interposed between handset and phone, will change your voice into another one. It transforms any voice into a masculine, feminine, adult or child one.The voice changer can be adapted to cell phones, cordless phones, speakers and microphones, recording systems, or connected to switchboards. The reproduced voice is not a robotic but a human one.
 REAL TIME TRACKERS
localizzatore rf

Real time trackers are designed for those who need to keep their pets under control, while limiting the relevant cost, but also to locate precious objects or to remember where you parked your car.

 ANTI-DROWNING AND ANTI-LOSS ALARM
anti loss alarm

Anti-drowning defender is an alarm device which combines anti-drowning and anti-loss alarm, and works effectively as an electronic safety device for protecting children or pets from drowning and loss.

Relevant artilcle

Attention to the new gadgets of thieves

14 Feb 2014

This may be the last discover of ingenious thieves who don’t hesitate to resort to the technology to hit unsuspecting victims. The news of recent months shows several cases where someone complains of being robbed, at home or in the company, after agreeing to unknowns small gadgets, deployed on the street, particularly at the crossings or when the light is red. The hypothesis is that these gadgets (lighters, key chains …

Never lose things again with the geolocation tools

19 Set 2013

The geolocation is getting closer, at your fingertips. We’re all constantly losing things. Keys, bag, charger and many other tools of daily use are very often forgotten, lost. The hard part is finding them. This discomfort could be deleted with the help of geolocation devices. In particular, big companies and startups are trying to answer to the distraction effects with products that will come soon on the market. Their secret would be an accessory, …

Stop mobile phones theft

30 Lug 2013

One hundred twenty thousand a year, ten thousand a month are the mobile phones stolen (or loss). These are the numbers from the homeland of mobile phones, smartphones and tablets thieves: London. The Mayor, Boris Johnson, and the police are really troubled about the weight of these statistics and asked to the same companies devices producing to investigate about what is happening. In particular, they asked to Apple, Samsung and …

Locate a mobile phone with the technique used by bats and dolphins

4 Lug 2013

Locate the exact position of a cell phone in enclosed spaces may become possible thanks to an algorithm that allows us to reconstruct the 3D shape of a room, listening to the echo of the sounds produced inside, even simple ones like the snap of the fingers. The project was developed by a research group at the EPFL. The researchers were inspired by echolocation, the system by which some animals …

Fish-robot will patrol the Thames River

10 Mag 2013

It’s environmental surveillance, the new frontier crossed by the fish-robot that will be released, in the coming months, in the Thames in order to sniff out pollution. Scenes like science fiction movies are recorded during the tests in the water. The robots will be released in groups of five in order to provide a mapping of the critical points and pollutant elements. The search will rely to the sensors built-in …

At the supermarket with the navigator

17 Gen 2013

GPS technology has now numerous applications in daily activities. Keep an eye on the kids, monitor the pet, follow the partner’s car is a cakewalk if you have the right tools. Shortly, it will possible use a sophisticated development of GPS technology in a shopping center or on the shelves of the supermarket so you’ll save time and optimize the product comparison. To lead the tour will be our trusty …

Internet of things will revolutionize our daily

10 Dic 2012

Web 3.0 isn’t yet far away. All the big laboratories are working hard to develop new applications concerning the Internet of things. With this neologism has been named the last frontier of online technology. The strength lies in the possibility given to objects to interact with each other by capturing and exchanging information. The alarm clock may sound for example in advance once found, through the Internet, heavy traffic conditions. …

Hop! the suitcase that follows you

13 Nov 2012

Pack your bags is always a problem. Weather conditions, formal and informal dresses, comfortable and casual, but also suited to special occasions that may occur…In short, a grind. And what often we create is a baggage too heavy and almost entirely useless. About 25 years ago, a pilot of the Nortwestern Airlines tried to obviate to the problem of having to lift heavy luggage introducing the trolley as we know …

Even sharks tracked with GPS

22 Ott 2012

Until recently, GPS tracking systems were used for the control of small animals. Now the GPS challenges even the most dangerous animals. Indeed, it is in an experimental phase the scientific mission of the American non profit association, Ocearch, led by Chris Fischer. During the operation, the sharks are caught, mainly in North America, and to them is applied a GPS tracking device, then they come back to the sea. …

Home with the GPS shoes

1 Ott 2012

Dominic Wilcox, british designer, has created a fully functional prototype pair of shoes with a built-in GPS that will guide you home. The name of this extravagant invention is “No Place Like Home” and it’s inspired by the famous novel “The Wonderful Wizard of Oz” in witch the protagonist Dorothy, with her magic shoes, can go everywhere clicking her shoes together three times. For Wilcox’s shoes, with expertly decorated sole, …