How to choose the best spy bugs without getting tricked

Lately searching for a valid product on the Internet has become a very difficult task. For example, in the case of spy bug transmitters or any other electronic device commonly used in the investigation field, you will note that along with those few old companies, come also across a lot …

Attention to the new gadgets of thieves

This may be the last discover of ingenious thieves who don’t hesitate to resort to the technology to hit unsuspecting victims. The news of recent months shows several cases where someone complains of being robbed, at home or in the company, after agreeing to unknowns small gadgets, deployed on the …

Protect yourself from illegal cell phone tapping!

If you are used to networking in search of easy solutions against the unauthorized phone tapping issue, you may be disappointed. Just like that, because the overwhelming problem of phone privacy, especially that one which concerns mobile network, has long since exceeded the limits, so much to induce public opinion …

The new frontier of biometric access: the body odor

The Universidad Politécnica de Madrid has added to the biometric recognition tools already on the market, another ingredient: the body odor. Identification parameter that, according to the researchers may soon be used for a reliable recognition through personal characteristics and biological properties. So we’ll be able to filter people based …

Microregistratori digitali

The PRISM system, what it is

agosto 6, 2013 Self Defence No Commenti

On 6 June, the Washington Post has shocked the world spreading the news of the existence of a clandestine surveillance system, which is managed entirely by the U.S. government through its two most important agencies, the NSA and FBI.
The code name is PRISM and it’s responsible to monitor everything passes through nine of the most important sites in the world: Microsoft, Google, Facebook, Yahoo, YouTube, PalTalk, AOL, Apple and Skype.
But let’s see what is PRISM, code-named of the US-984XN system. It’s a program of electronic surveillance and signal intelligence, classified “top secret” and used for the management of information collected from the internet and other electronic and telecommunication service providers.

It’s in operation for the National Security Agency (NSA) from 2007. Snowden (former employee of a computer company who works for the NSA) has described the PRISM program as enabled at the live surveillance of communications for much of the global Internet traffic and information stored. So with this tool you can get the contents of email, chat, voice and video chat, videos, photos, VoIP conversations, file transfer, and notification details of social networking sites. All this is possible thanks to the collaboration with leading service providers.

Furthermore PRISM exploits the characteristics of routing typical of the network: in particular the fact that the path followed by the packets during IP connections isn’t always the shortest but rather the cheapest. Thanks to these characteristics of routing much of the global traffic of communications between users/servers in different countries goes through the United States or U.S. ISPs; this allows to the system to store not only american data.

Snowden explained that the NSA, to expand the interceptions area, habitually carries tens of thousands of attacks against Internet backbone, both to friendly countries and Chinese providers. The only truly effective countermeasure that citizens can use to defend themselves by PRISM is, according to Snowden, the use of encryption systems (such as PGP, Tor and similar means.)
Cryptography is already used by leading security and surveillance companies to ensure the protection of telephone conversations. One example is the Stealth Phone of Endoacustica Europe that ensures maximum security making untraceable the phone and protecting the data. The intercepts often collaborate with the law, but that doesn’t mean that they should be carried out them without reason.

Stop mobile phones theft

luglio 30, 2013 Localization No Commenti

One hundred twenty thousand a year, ten thousand a month are the mobile phones stolen (or loss). These are the numbers from the homeland of mobile phones, smartphones and tablets thieves: London.

The Mayor, Boris Johnson, and the police are really troubled about the weight of these statistics and asked to the same companies devices producing to investigate about what is happening. In particular, they asked to Apple, Samsung and Microsoft to study which is the mechanism to disable illegal or dubious origin smartphone.

The case arose from a guy who ,in one year, has gone over 170 times in the Apple store in Regent Street asking and obtaining the replacement of “his” iPhone promptly dented. For each request he has got a new smartphone. But clearly the situation has intrigued managers, because it wasn’t a single case and, under similar circumstances, there had been also in Samsung.

The three giants have proposed a “Kill Switch”, an option, that works also from a distance, that “kills” the phone, making it useless and at the same time recognizable as a product stolen from its rightful owner (a evolution of the existing application “Find My iPhone”). So to prevent that the villains, like the boy of the 170 visits, to get away and even have, thanks to the exchange used-new, a nice packed smartphone. It isn’t clear if all the companies have accepted the option. 



Against thieves of smartphone & co there are battles going on in different parts of the world; the American police notes 113 phones stolen (or lost) every minute, for a total of 162,000 per day. The ideas and the means to achieve the “kill switch” are there, but who knows if corporations will act in haste and by mutual agreement. Meanwhile we cannot stand with folded hands, there are already efficient devices to prevent that our smartphone is lost, along with all the sensitive data in it.
Among the most reliable systems there is a software proposed by Endoacustica Europe. It’s a program that is installed on the mobile phone easily and allows to receive on another default smartphone (called pilot) the GPS location of the same. So if the smartphone is stolen you will know in a few minutes where the phone is and then get him back in your hands in few time. A solution already adopted by many people to protect the large number of personal data contained in the devices. The loss of these informations could cause damages higher than the subtraction of the same cell phone.

Google announced the algorithm for preventing online crimes

luglio 16, 2013 Technology No Commenti

The authorities use, as we known, a great number of micro-devices to monitor discreetly pc, smartphone and technological tools. Through them circulate every day millions and millions of informations. In this way, everything that is written is intercepted: email, sms and e-texts of all kinds. Now it seems that Mountain View want to patent an algorithm able to capture also what has not yet been written, that is, read the user’s mind while using Gmail, to block the spread of ideas in case of infringement of laws or if the system believes that the contents are dangerous.

It’s called Policy Violation Checker. An idea that could turn Google into a controller without respite, a kind of self-censorship digital unit for the thoughts in order to avoid that the user writes wrong contents. The Policy Violation Checker want catch the criminal before that he commits the crime. Indicting the thought made ​​up of words potentially dangerous, the algorithm would be ready to lock before the user presses the “Send” button. Protecting him from breaking laws or compromise relationships.

Many observers consider the Google idea a double edged sword. A tool that could certainly be very useful to curb the spread of dangerous digital contents. But also a system of assisted reasoning, a limit that should at least be optional. From Google says that the algorithm, once patented, not will adopted for its products. In the future, we don’t know.

It could be another additional tool, verified the reliability and trustworthiness, but for the moment it’s more appropriate to rely on concrete actions. Already adopt valid devices tested, professional and highly reliable to block criminals on the web, it would be a big step forward for both the authorities and citizens that will cooperate with law enforcement.

Locate a mobile phone with the technique used by bats and dolphins

luglio 4, 2013 Localization No Commenti

Locate the exact position of a cell phone in enclosed spaces may become possible thanks to an algorithm that allows us to reconstruct the 3D shape of a room, listening to the echo of the sounds produced inside, even simple ones like the snap of the fingers. The project was developed by a research group at the EPFL.

The researchers were inspired by echolocation, the system by which some animals such as bats and dolphins emit ultrasounds and register the returning echoes to locate the position of obstacles or food. In the same way, the method uses a sound source and four microphones to reconstruct a environment 3D. Each microphone picks up sound from the source and the echoes from various walls. The algorithm then compares the signal from each microphone.
The signals delays are used to calculate not only the distance between the microphones, but also the distance from each microphone between the walls and the sound source, locating in an exact and precise manner. By testing the algorithm in an empty room, in which is changed the position of a movable wall, was obtained a 3D map with pinpoint accuracy.


In the future, according to the research team, the method can be used to define the shape of a room by the echoes of a chat on a cell phone. Not only, the same technique could help to locate, thanks to the mobile phone, the precise location of a person in a room.
Today tracking systems are widely used both for surveillance and anti theft systems. In fact, if on the one hand allow to observe the movements of cell phones and monitor people or objects, on the other allow you to track goods or valuables in case of theft or loss. The localization is one of the most useful application in our day!

Spain: a trojan to spy on suspects

giugno 28, 2013 Self Defence No Commenti

A virus of State, a trojan, perfectly legal, to be installed on computers, smartphones and tablets of those is under suspicion. The proposal comes from Spain and if it passes, will allow to the authorities – after the penal code reform – to spy on any electronic devices of a person under investigation or in remand. All this, of course, without that the subject is aware of them.

The idea is of a commission from the Spanish Ministry of Justice following the German example. In Germany, the trojans are already used for terrorism investigations. What it does discuss is the indiscriminate use of intercepted data. Once installed, the trojan, in fact, the possibilities are endless for the police. They can access to the passwords of all profiles and to bank details, use Skype and even e-mail services. When the police have obtained the permission of the judge to install it, the program is automatically extended to all electronic devices, including smartphones, tablets and USB drives. And operators are obliged to cooperate with the authorities.

According to the proponents of the law, this system would be useful against pornography, organized crime and terrorism. The debate in Spain is about the production of the trojans. Who will develop it will have big gains and power. What is certain is that also in Europe is raising the question of controls (and interceptions) on the web. Always in Germany, the government and the federal police have admitted to monitor Skype, Google Mail, MSN Hotmail, Yahoo Mail, Facebook and chats if it appear necessary.

The main tools currently used for this type of interceptions are spy softwares able to listen calls live, read incoming and outgoing messages, know the location of the phone and thus also of the suspect and listen what is happening in the surrounding environment. All this in an absolutely discrete manner. The same thing is valid for computers: key loggers and key hunters can find out everything that happens on a computer, including passwords and chat. Apparently the trojan is already in action!

How U.S. monitor citizens

giugno 14, 2013 Self Defence No Commenti

A few days ago it appeared the news about high controls implemented by the National Security Agency with the tacit agreement of the White House and the Department of Justice, in short, for account of the U.S. Government.

We wanted to find out more about how these data are captured and transferred. Massimiliano Sala, one of the leading European experts, director of the encryption laboratory of the Trento University gave an interview to “La Repubblica” in which he explains how work the great interceptions machine “made ​​in the USA”.

According to his experience, “The U.S. government, through the National Security Agency, first takes the “metadata”, records with summary data about communications: who called whom, at what time, what sites were visited”. As if they had installed a phone bug per citizen and key loggers for the PC.

The real interception probably is carried out “with the collaboration of a telephone or internet operator then provides the records to the government. Would it be possible to get them without the help of operators, through bugs inserted on all nodes of communication”, but considering the large number of U.S. citizens would be too expensive.

From the metadata, then they try to understand what conversations and connections should be further explored in content. “It’s probably using an algorithm that triggers an alarm when it detects some abnormal behavior“.

“In short, if the metadata has a match with a pattern of behavior usually associated with dangerous people, an alarm is triggered and the government acquires the contents of the emails and phone calls. Then, it goes to Google and searching for the suspect email texts. So it asks to the operator to work together to intercept phone calls, through special devices connected to systems and telephone lines”.

Control is carried out “using a sophisticated artificial intelligence, which simulates the human. The terrorists and gangsters certainly don’t write or say suspect words on the phone, but they use periphrasis. So the algorithm doesn’t seek for exact words, but processes the sentence to understand. “Later, the algorithm triggers the alarm and the case goes to the agent in flesh and blood.

In targeted cases, it works in the same way with extremely professional tools such as telephone bugs or parabolic microphones, both able to listen conversations at distance virtual or physical. In this way, the control being targeted, not affecting the privacy of honest citizens who most of the times are intercepted without real reasons.

Texting while walking, accidents on the rise

giugno 5, 2013 Self Defence No Commenti

There are numerous videos on YouTube that show episodes in which people, focused on the smartphone screen, have accidents, only sometimes ridiculous, sometimes with much more serious consequences. It will be they have just received a text message, who are monitoring their partner or who want to know where is their child, at all happened to be distracted by cell phone while there are on the street. Few people stop themselves to handling the tool, the most, distractedly, continuing their own path in haste or simply by habit.

It seems a trivial matter, but if the action is carried out distracted in a busy street or with intense traffic, walk without attention can be really dangerous. The same is true if you pay attention on the phone while you are driving.

Crash Alert is the application for pedestrians that has the aim to reduce the dangerousness of that which could only seem an innocent habit. The app is based on a quite simple technology. It’s a microcamera, equipped with distance sensors, which replaces the eyes of those who are distracted by the phone, scanning the road, and impediments. When it detects one, on the top of the smartphone display appears a bar with a red square. The position of the square indicates the direction in which you risk a collision. According to the first tests with this app you avoid 60 percent of obstacles, without, the percentage drops to 20 percent. Clearly, the special software reduces the dangerousness, but it doesn’t delete it altogether.

In 2008, an American research found that the cases of accidents related to the texting on the street had doubled over the previous year. Some people involved had only the nose or a cheekbone broken against a street lamp or a wall, others had much more serious problems. According to the data relating to the accident of pedestrians, in 59 per cent of cases, the fault is of the distraction for the cellphone.

But it isn’t only the direction of the gaze on the display to generate problems for texting while walking; at the base there is the natural limit of the attention span of human beings. In fact, we can focus our attention only on three different objects. This is the reason that leads a person to crash against a wall, while his attention is absorbed by the smartphone or any other type of tools. In practice, while we are writing a text message, our brain is temporarily unable to engage, in a conscious way, to any other aspect of our reality. So there is no app that can change the nature of man.

Two masks to have super powers

maggio 21, 2013 Biotechnology No Commenti

They’re coming superheroes, or rather, super powers. After the smart glasses that promise an “augmented reality”, come from England, Eidos, two masks that will enhance sight and hearing. The appearance of the tool is quite aseptic: white plastic and squared traits.

The mask, hearing dedicated, covers mouth and ears as an helmet without the top. Inside there is a directional microphone that allows you to isolate a sound source while a processor analyzes the received sounds and purifies them from any noise. Then, it sends them to the ear through two speakers and a system of bone vibration so you can hear clearly what is happening at several meters away. The mechanism is very similar to that of the most advanced models of directional microphones that from years excellently fulfill the amplifying function for remote listening.

The second mask, sight dedicated, looks like a pair of giant glasses that cover eyes, forehead and cheeks, the parts left uncovered by the other complementary mask. The surface is perforated with holes of different sizes. Under this sheath is placed a tiny camera that takes everything that happens in front of the wearer. An internal processor elaborates the images captured and projected onto a screen allowing you to see a movement in its sequences. The idea seems taken directly from the chrono-photography, photographic technique of the late nineteenth century that allowed you to record moving objects by taking pictures in rapid sequences.

The creators, a group of students from the Royal College of Art in London, expressed the purpose of the masks: to isolate and analyze the information separtaing them from the chaos of everyday life. In a practical sense the applications can be many, from the the medical to entertainment. At a concert, for example, you could hear in a detached manner the performance of a single instrument. Children with attention deficit and hyperactivity disorder could be focused towards the teacher who speaks, calcelling other sounds. And much more.

Beyond aesthetics, very flashy and impractical, the tools are inserted into the modern “wearable” technology. But the prototype isn’t still perfect in form and substance. Fortunately there are useful tools tested and trusted as directional microphones and micro cameras that offer excellent performances at low prices.

The technology applied to the surveillance at school

maggio 16, 2013 Self Defence No Commenti

With the increasing use by the young people of smartphones, tablets and electronic devices with internet connection, it became necessary to take countermeasures in order to ensure the smooth conduct of tests, exams and competitions. It’s clear the absolute prohibition of any technological aid during the written tests. Obviously the advices of discouragement aren’t enough to inhibit the employ of these tools.

And so the italian school principals have asked to the Minister of Education to assess the possibility to use, in the examination centers, of electronic devices designed to detect the presence of cell phones on or even in stand-by.
Let’s see how they work. These are systems that work with a range of about 30 meters. As soon as they locates a cellphone they can allert in differen ways: with a red light signal, with a sound alarm, or sending a message to the user asking him to turn off the device.


In the case of Endoacustica Cell Detector, the device doesn’t detect only the phones in use (for a conversation or in sending data), but also those are in stand-by mode.
The usage is very simple, suitable even for less experienced teacher. Just a few minutes to set various operating parameters and put it to work immediately, configuring it to your liking the level of sensitivity and volume of the notice. Once in action, its batteries allow a range of use of more than one year, all in a discreet manner, simple and above all, absolutely legal.

In short, students that intended to copy thanks to its smartphones should start studying seriously. In fact we have to contradict students who have judged unreliable these kinds of tools and who believe that it takes months for the delivery of the same. The Endoacustica products are professional and of highest level, used by leading investigative agencies; the same can be found on the website www.endoacustica.com, ordered and delivered in a couple of days.

Fish-robot will patrol the Thames River

maggio 10, 2013 Localization No Commenti

It’s environmental surveillance, the new frontier crossed by the fish-robot that will be released, in the coming months, in the Thames in order to sniff out pollution.

Scenes like science fiction movies are recorded during the tests in the water. The robots will be released in groups of five in order to provide a mapping of the critical points and pollutant elements. The search will rely to the sensors built-in each of these strange fishes, to the GPS system and a micro camera installed in them, ensuring the exact identification of the area in which they are found. The data will instead be transmitted through Wi-Fi network, used also for a “dialogue” between these fishes-robot. The project has cost about 22,000 euros.

The fish-robot seems like a carp, is one meter and a half and swim at a speed of 1m/s. Every 8 hours back to the base to recharge the batteries and start over.
If the experiment will be successful, the fish may be used to combat seas pollution. The road of fish-robot was follow a few years ago, but the researchers encountered a problem: the previous version wasn’t able to swim on their own. Today, this issue should be resolved.

Once again, the satellite tracking systems together with the most modern video control technologies are fundamental in the field of surveillance in small houses such as in the open sea.

Calendar

ottobre: 2017
L M M G V S D
« Set    
 1
2345678
9101112131415
16171819202122
23242526272829
3031  

NEWSLETTER


e-mail:
name:
Newsletter Endoacustica Europe - ENGLISH

Login

CONTACT US

Endoacustica Europe srl
Via Umberto Terracini, 47
70029 Santeramo in Colle (BA)
P.IVA IT06836020724
ITALY
tel. 0039 080 30 26 530
tel. 0039 080 43 73 08 93
fax 0039 080 40 73 11 87
e-mail: info@endoacustica.com

Text ADS

 SPY PHONE
spyphone A Spy Phone or GSM spy cellphone is a normal mobile phone on which has been installed a software able to reply many crucial information such as: listening of all incoming and outgoing calls from the mobile, real time phone surrounding sounds, reading of all type of messages (SMS, WhatsApp, Facebook, Viber etc..) and GPS tracking. The spy software works on the most of Android, iOS, Blackberry smartphones.

 MICRO DIGITAL RECORDER
digital video recorder Micro digital recorder able to gather evidence or discover any kind of betrayals. Recording capability of up to 1200 hours in continuous. Long duration for those recorders using voice activation system VAS. Just for you the best micro digital voice recorders on the market in terms of efficacy and reliability at a low price.
 WALL MICROPHONES
Wall microphones able to listen through walls thick even up to 70 cm. Ultra sensitive professional stereo microphone, suitable to pick up the lowest noises thanks to its very high sensitive ceramic microphone. Limpid and stable sound. Endowed with sockets for recorder and earpiece.
 PHONE VOICE CHANGER
The phone voice changers when interposed between handset and phone, will change your voice into another one. It transforms any voice into a masculine, feminine, adult or child one.The voice changer can be adapted to cell phones, cordless phones, speakers and microphones, recording systems, or connected to switchboards. The reproduced voice is not a robotic but a human one.
 REAL TIME TRACKERS
localizzatore rf

Real time trackers are designed for those who need to keep their pets under control, while limiting the relevant cost, but also to locate precious objects or to remember where you parked your car.

 ANTI-DROWNING AND ANTI-LOSS ALARM
anti loss alarm

Anti-drowning defender is an alarm device which combines anti-drowning and anti-loss alarm, and works effectively as an electronic safety device for protecting children or pets from drowning and loss.

Relevant artilcle

Attention to the new gadgets of thieves

14 Feb 2014

This may be the last discover of ingenious thieves who don’t hesitate to resort to the technology to hit unsuspecting victims. The news of recent months shows several cases where someone complains of being robbed, at home or in the company, after agreeing to unknowns small gadgets, deployed on the street, particularly at the crossings or when the light is red. The hypothesis is that these gadgets (lighters, key chains …

Never lose things again with the geolocation tools

19 Set 2013

The geolocation is getting closer, at your fingertips. We’re all constantly losing things. Keys, bag, charger and many other tools of daily use are very often forgotten, lost. The hard part is finding them. This discomfort could be deleted with the help of geolocation devices. In particular, big companies and startups are trying to answer to the distraction effects with products that will come soon on the market. Their secret would be an accessory, …

Stop mobile phones theft

30 Lug 2013

One hundred twenty thousand a year, ten thousand a month are the mobile phones stolen (or loss). These are the numbers from the homeland of mobile phones, smartphones and tablets thieves: London. The Mayor, Boris Johnson, and the police are really troubled about the weight of these statistics and asked to the same companies devices producing to investigate about what is happening. In particular, they asked to Apple, Samsung and …

Locate a mobile phone with the technique used by bats and dolphins

4 Lug 2013

Locate the exact position of a cell phone in enclosed spaces may become possible thanks to an algorithm that allows us to reconstruct the 3D shape of a room, listening to the echo of the sounds produced inside, even simple ones like the snap of the fingers. The project was developed by a research group at the EPFL. The researchers were inspired by echolocation, the system by which some animals …

Fish-robot will patrol the Thames River

10 Mag 2013

It’s environmental surveillance, the new frontier crossed by the fish-robot that will be released, in the coming months, in the Thames in order to sniff out pollution. Scenes like science fiction movies are recorded during the tests in the water. The robots will be released in groups of five in order to provide a mapping of the critical points and pollutant elements. The search will rely to the sensors built-in …

At the supermarket with the navigator

17 Gen 2013

GPS technology has now numerous applications in daily activities. Keep an eye on the kids, monitor the pet, follow the partner’s car is a cakewalk if you have the right tools. Shortly, it will possible use a sophisticated development of GPS technology in a shopping center or on the shelves of the supermarket so you’ll save time and optimize the product comparison. To lead the tour will be our trusty …

Internet of things will revolutionize our daily

10 Dic 2012

Web 3.0 isn’t yet far away. All the big laboratories are working hard to develop new applications concerning the Internet of things. With this neologism has been named the last frontier of online technology. The strength lies in the possibility given to objects to interact with each other by capturing and exchanging information. The alarm clock may sound for example in advance once found, through the Internet, heavy traffic conditions. …

Hop! the suitcase that follows you

13 Nov 2012

Pack your bags is always a problem. Weather conditions, formal and informal dresses, comfortable and casual, but also suited to special occasions that may occur…In short, a grind. And what often we create is a baggage too heavy and almost entirely useless. About 25 years ago, a pilot of the Nortwestern Airlines tried to obviate to the problem of having to lift heavy luggage introducing the trolley as we know …

Even sharks tracked with GPS

22 Ott 2012

Until recently, GPS tracking systems were used for the control of small animals. Now the GPS challenges even the most dangerous animals. Indeed, it is in an experimental phase the scientific mission of the American non profit association, Ocearch, led by Chris Fischer. During the operation, the sharks are caught, mainly in North America, and to them is applied a GPS tracking device, then they come back to the sea. …

Home with the GPS shoes

1 Ott 2012

Dominic Wilcox, british designer, has created a fully functional prototype pair of shoes with a built-in GPS that will guide you home. The name of this extravagant invention is “No Place Like Home” and it’s inspired by the famous novel “The Wonderful Wizard of Oz” in witch the protagonist Dorothy, with her magic shoes, can go everywhere clicking her shoes together three times. For Wilcox’s shoes, with expertly decorated sole, …