How to choose the best spy bugs without getting tricked

Lately searching for a valid product on the Internet has become a very difficult task. For example, in the case of spy bug transmitters or any other electronic device commonly used in the investigation field, you will note that along with those few old companies, come also across a lot …

Attention to the new gadgets of thieves

This may be the last discover of ingenious thieves who don’t hesitate to resort to the technology to hit unsuspecting victims. The news of recent months shows several cases where someone complains of being robbed, at home or in the company, after agreeing to unknowns small gadgets, deployed on the …

Protect yourself from illegal cell phone tapping!

If you are used to networking in search of easy solutions against the unauthorized phone tapping issue, you may be disappointed. Just like that, because the overwhelming problem of phone privacy, especially that one which concerns mobile network, has long since exceeded the limits, so much to induce public opinion …

The new frontier of biometric access: the body odor

The Universidad Politécnica de Madrid has added to the biometric recognition tools already on the market, another ingredient: the body odor. Identification parameter that, according to the researchers may soon be used for a reliable recognition through personal characteristics and biological properties. So we’ll be able to filter people based …

Microregistratori digitali

New analog surveillance cameras with night vision from JVC

novembre 20, 2009 Technology No Commenti

LoLux

JVC has just announced the launch of four different models of analog cameras for closed circuit surveillance systems, which are capable of working even in extremely low lighting conditions (0.05 lux for color images, 0.006 for black and white), and with an electricity consumption reduced by 40%.

In spite of the fact that the security industry is taking giant leaps towards a widespread usage of digital systems, at the current stage analog CCTV systems are still holding a 90% market share for this kind of installations.

JVC-made Super LoLux surveillance cameras along with their high sensitivity, also feature a high resolution (580 TV lines) and are equipped with a digital signal processor. They also have an automatic electronic shutter, automatic gain controls and a 2.0x digital zoom.

The dome-shaped model is protected against vandalism and attempted theft, so it’s more suitable for outside usage or for protection of places such as banks and shopping malls; its aluminum chassis mounted with special screws provides total protection against any attempt to remove it, while the transparent polycarbonate dome can withstand even the most violent shocks. The box type is equipped with ExDR Plus system, which improves the camera performance in conditions of high brightness, allowing for a better vision of objects or people in the foreground against an illuminated background.

Although the trend of technological advancements is quickly heading towards switching to digital systems with IP transmission, good ole analog systems are still more than able of doing their steady job, even at night!

Spoof Card, beware of identity theft on your phone

novembre 20, 2009 Biotechnology No Commenti

Spoof

The latest threat against protection from identity theft was born in a relatively innocent way, to play tricks on your friends, but may end up creating a different kind of problems to victims of its use, as well as to its users.

We are talking about the Spoof Card, a mobile phone service which allows its users to keep calling from their usual handset, but while displaying another number as Caller ID. Not only, by using the Spoof Card service it is also possible to disguise one’s voice, turning it from male to female, from boy to old man and vice versa.

In its early days it was mostly used to play innocent tricks on friends, like calling on a friend’s number while he was on holiday, displaying his home number and scaring the hell out of him by making him believe that burglars were visiting his house.

Unfortunately though, as its creators should have foreseen, the usage of such a service can closely border with stalking, with annoying ex-boyfriends sneaking into their ex-girlfriends’ private life, or people who call others who really don’t want to talk to them, forcing them to answer by displaying their office number or so.

In short, despite its creators label Spoof Card as perfectly legal, its use may not always be. To be 100% sure that your telephone identity is protected, it is recommended to provide yourself with the right tools, such as an invisible phone, to protect yourselves from unwanted listening attempts.

To find more information on privacy protection, on how to defend yourselves from identity theft and from intrusions into your personal life, you can visit the Endoacustica site.

Unfaithful husbands, beware of spy mobile phones!

novembre 19, 2009 Technology 3 Commenti

Secret Love

During the course of our work, we happen to step into strange cases, and situation weirdly funny if they were not true. Such a case happened recently to a female customer of ours, who was getting increasingly suspicious about her husband and asked for our cooperation.

The lady’s husband is often travelling for business, and since approximately one year he started going frequently to Germany, a country he had seldom visited in previous years. This tickled our friend’s female instinct, and she immediately turned to us to ask for some piece of advice.

It took her a while to decide to use a spy mobile phone, that is, a normal mobile phone, enhanced with the installation of an invisible software which turns it into a real spy following its unaware user.

She bought her husband a spy cellphone for his birthday, and he was just happy to start using it right away, without knowing that his every call could be listened to remotely, and any SMS sent or received could be read from his wife, no matter how far. On top of that, a spy phone also works like a listening device, a bug that transmits the sounds around it, even while the phone is turned off.

And thanks to this latter function, our client found out that the reason for her husband’s frequent trips to Germany was not exactly professional, since instead of visiting new potential customers, he was visiting a famed bordello in the outskirts of Frankfurt, a place where a certain kind of pleasure goes hand-in-hand with the city’s business reputation.

I can’t add further details, but sure enough I would not have wanted to be in her husband’s shoes upon his return…

Protection against chemical weapons starts on your iPhone

novembre 19, 2009 Technology No Commenti

iPhone sensor

The threat of terrorist attacks against cities of the industrialized West is always present, even though the common people tend to forget it. Certainly, the governments are not forgetting this threat, and scientific research is also silently working to protect us from enemies as invisible as their weapons, such as chemical agents, that can strike lethally before we can realize.

For example, the NASA is working on a network of sensors for chemical weapons detection, to be installed, go figure, on our mobile phones, or more specifically, on iPhones.

In fact, they are studying a small device, to be connected to an iPhone’s port, made up of a chip which houses 16 microscopic sensors capable of detecting the presence, in the air around them, of dangerous gases, and to inform a central processing center immediately using the phone connection or via WiFi network.
All this is concealed within a tiny device (just 1 cm wide) which does not give much encumbrance to its user. By installing sensors of this kind on every iPhone present in our cities, one could – theoretically – create a huge network for detection of harmful chemical agents.

This network could be used not only to fight a possible terrorist attack, but also (and mainly) to safeguard our health, for example by detecting the level of polluting agents in the city air, and providing valuable information to fight pollution, another invisible enemy which, despite it is not equipped with firearms or missiles, kills certainly more than terrorism.

Sure enough, thanks to everyone’s joint effort, we would have the chance to do something to fight this enemy. Personally, I would warmly welcome a small sensor on my iPhone, if it helps…

Digital micro recorders

novembre 18, 2009 Biotechnology No Commenti

Microrecorder

Thanks to the ever increasing miniaturization in size of technological devices, items that a few years ago would have been used only at home took to the streets and to our offices, and became faithful travel companions during our weekend trips or in any leisurely occasion.

A typical example is applicable to digital micro recorders. Once, we were using bulky cassette recorders, which certainly did not have maneuverability as one of their main features, to tape from the radio, from a record or live. Nowadays, the recording is no longer stored on a cassette, but rather saved in an audio file inside extremely small memory cards with enormous storage capacity (up to 32 Gb).

At the same time, the modern digital recorders have dramatically shrunk their size. They can be as small as a cigarette pack or as your car’s remote control, and in spite of their size still be able to record, through high-sensitivity miniature microphones, an extremely clear sound, with an operating time of hundreds of hours.

On the marketplace, you can find several types of digital recorders, as small as a cigarette pack and suitable for several applications: for concerts or leisure, to take quick notes on the go while stuck in a traffic jam, or while participating in a conference or meeting. A micro digital recorder of smaller size, just like a credit card, can instead be suitable for covert recordings, surveillance or espionage operations, or for law enforcement gathering evidence against suspects or criminals.

In a few words, a micro audio recorder can be used in a whole lot of different ways. if you want to know more and to find the right model  for your needs, just visit the Endoacustica site!

Praise for our night vision glasses

novembre 18, 2009 Biotechnology No Commenti

Eyenight

Those who work in the security and privacy field are generally not too prone to boasting, but a letter that we just received makes us feel that there is more to our job than spy gear and surveillance devices, that sometimes we are able to help people in need.

Here is the full text:

“You have no idea how much these Night Vision Glasses have helped me! After a severe retinal detachment, I was left legally blind and with almost no night vision at all. I own a small business, and not being able to function at night has really made it very difficult for me to meet customers after dark. With my new night glasses, I can now get around at night and can do all the things I was not able to do previously.

It’s amazing how Eyenight glasses work! I can now see just as good whether it’s noon or midnight! In the past, I have used many different flashlights in order to get around at night, but it was always difficult, especially on rainy evenings when the light from these flashlights didn’t illuminate sidewalks and steps very well.

Now I can walk down the darkest streets without any fear of tripping over a curb or falling. I was so scared to be out at night before, worried that I would fall. No longer!

I would recommend these glasses for anyone in my same position. I feel like I have my life back!”

I guess there is no comment to be added; just that receiving such letters really strengthens our belief in our job not only as a service, but as a mission. Thanks to all our faithful customers for helping us carry this mission out!

Anti fraud credit cards, with keypad and display

novembre 18, 2009 Technology No Commenti

Emue

A new generation of credit cards is being presented during the Cartes exhibition, currently taking place in Paris, and showcasing the latest technologies and developments in the Digital Security field.

The anti fraud credit card, manufactured by Emue Technologies, has the same size of your normal card, but on the inside it contains a battery with an expected life of around 3 years, which powers a processor, a numeric keypad and an E-Ink 12-digit display.

When the cardholder is about to close an online purchase deal, thanks to the numeric keypad he will be able to authenticate the transaction, entering the relevant information and a one-time automatically generated PIN which is shown on the display. This technology has been developed in close cooperation with Visa, to provide a solution for fighting online credit card fraud and usage of clone cards, and is suitable not only for online purchases, but also for those carried out via iPhone applications.

The one-time PIN code has a limited life (generally a few minutes), which makes hackers’ and credit card thieves’ job useless, as they generally are able to obtain only the credit card number, name of the cardholder and CVC 3-digit security code. This information will not be enough to validate transactions carried out via this new card, and actual use will only be possible for those who not only get a hold of the card, but also have the relevant access codes.

Currently, the solution provided by Emue is being tested by some banks in Switzerland, France, Italy and the UK, and in the future it could become the defining standard for security of our credit cards when used online.

Mantis, the largest UK-made unmanned aircraft

novembre 18, 2009 Technology No Commenti

Mantis

The UK Ministry of Defense has just completed the maiden flight of Mantis, an unmanned aircraft with a wingspan of approximately 20 meters, suitable for long-range aerial surveillance and intelligence gathering operations. Its size makes it the largest vehicle of this kind ever built in the UK, and among the largest in Europe.

Manufactured by BAE Systems, it can be easily dismantled and loaded on a transport aircraft, thanks to the lack of hydraulic parts as it is entirely electrically powered. Thanks to this characteristic, Mantis is capable of being deployed with extreme flexibility, also for carrying military equipment, ammunition and weapons within war zones, especially on rough terrains.

Its high level of automation allows it to automatically detect a sensitive target, and to transmit the relevant information to the ground station, as well as autonomously manage the flight, so that ground operators will only have to concentrate on the quality of intelligence and not on the flight operation, thus reducing any possible risk of mission failure due to human errors.

At BAE Systems, Mantis is labeled as an UAS (Unmanned Aerial System) rather than an UAV (Unmanned Aerial Vehicle) thanks to these automation features, which make it easy to be integrated with other vehicles of this kind produced by the same manufacturer and supplied to the British Ministry of Defense.

It took only 19 months from the first sketches of the project to this maiden flight, thanks to the quick interaction among manufacturers of individual system parts, and the same waiting time is expected before seeing a second version of Mantis, to be developed according to information gathered from this first set of test flights.

Mobile Phone Eavesdropping

novembre 17, 2009 Technology No Commenti

SpyCell

To secretly listen to someone’s phone conversations, you do not need to be spies or millionaires, as today’s advancement gives everyone the chance to use devices of a high technological level and low cost, as well as easy to use even for those who are not professionals in the espionage field.

You do not need high-priced complicated machinery, as the best system for mobile phone eavesdropping, the easiest one and the one that guarantees a higher privacy level, is the mobile phone itself!

In fact, thanks to the use of a spy mobile phone, you will not waste energies, as your best friend will be the very phone of the person under control, thanks to the installation of a small spy software on the handset.

This software, completely invisible to the Spy Phone’s user, allows a third party listener to keep an eye on the activities of the handset on which it is installed, and most of all to listen in real time both to phone and environmental conversations, even while the phone is turned off!

If you doubt your spouse’s fidelity, if you think that your son is hanging around with bad companies, if you fear that your business partner or an employee are in cahoots with competitors, a spy mobile phone can reassure you.

Its software can be installed in seconds on most of the modern mobile phones using the Symbian operating system, and once it is installed you will be able to operate it remotely by simply sending a text message from your phone, whose number you will have configured as controlling number during the installation. When sending an SMS from this number, the spy software will intercept it and read it as an operating instruction, without displaying it on the mobile phone screen.

Communication between you and the spy handset is always taking place via SMS: when the phone is engaged in a call, you will receive an alert message, showing the counterpart number, and all you have to do is call the Spy Phone, and you will listen in real time without being noticed. Furthermore, all sent and received SMS will automatically be copied to you, always showing the other party’s number.

By sending a particular text message, you will receive a list of messages or calls, both incoming and outgoing, with a timestamp. For phones equipped with GPS positioning system, you will also be able to receive geographical coordinates of the phone’s current location. These functions, for example, may prove very useful in a complicated divorce lawsuit involving infidelity.

But what makes the spy phone unique is certainly the possibility to use the microphone like a covert listening device, to listen to conversations taking place around it. Thanks to this function, you can call at any time, and you will be able to listen to conversations within 5 meters, picked up by the microphone. This function is active also when the phone is off, when your subject feels safe and talks freely, revealing all his secrets to you.

For more information and advice on on mobile phone eavesdropping and its operation, you can visit the Endoacustica site for advice from our experts.

GSM bug, the defining standard for long-distance surveillance

novembre 15, 2009 Technology No Commenti

GSM Bug

Among the GSM type listening devices, that is, those hidden listening systems that feature a SIM card just like your normal mobile phone, and that are capable of transmitting their intelligence by using the GSM phone network, a special place is taken by the GSM-001 model.

In the investigation, surveillance and intelligence field, usage of GSM bugs shows undeniable advantages, especially in terms of comfort and safety, as the surveillance operation can be carried out from an unlimited distance, with a clear signal delivered by the digital phone network, and without having to use complicated and expensive radio receiving equipment with a limited operating range.

Inside a small box, the GSM bug contains the SIM card housing, mounted on a circuit board which contains the real core of the entire system. Unlike what happens with most normal listening devices of this kind, there is no need to call the GSM bug’s phone number to listen to what goes on around it.

On the contrary, thanks to its voice activation sensor, it will be the GSM transmitter to call us automatically when its high-sensitivity hidden microphone picks up a sound or a motion. And in the same fashion, but via SMS, for audio transmitters installed for example inside a vehicle, when the car is switched on or off the sensor will be activated, and the micro transmitter will send us a text message towards a preset number.

In fact, the possibility of programming its features remotely by sending an SMS, and of receiving notifications in the same format makes this listening device perfect to guarantee privacy and confidentiality.

Thanks to an SMS written in a particular format, you will for example be able to set up the number, towards which such notifications will have to be sent, or the preset number from which you can call the GSM transceiver (which will answer only when calls are coming from that particular number), or disable the GSM audio transmitter at once, and of course enable it later. You will also be able to receive a status report of the bug’s functionalities.

Depending on the audio surveillance operation we wish to undertake, we will have to choose whether to power our bug via the electricity mains, or with a normal 9V battery. The former is recommended for long-term hidden listening operations, while the latter is suitable for short term surveillance operations lasting just a few days.

Once this decision is made, you will have to configure the controlling number as explained above, and the number towards which your GSM transmitting device will call you as soon as its sensor detects a sound. It will also be possible to set the sensor sensitivity level, in order to allow it to call only when it is really necessary, and also set up the calling parameters when the vehicle is turned on or off.

For each function, it is possible to program up to three numbers that the bug will call. Of course, we will also have to make sure that, if the SIM card is a rechargeable one, it has enough credit, especially if the eavesdropping operation involves international or overseas calls.

For more information about how GSM bugs, hidden microphones and a wide range of surveillance and security devices are working, you can visit the Endoacustica site and contact our specialists, who will be glad to assist you.

Calendar

ottobre: 2017
L M M G V S D
« Set    
 1
2345678
9101112131415
16171819202122
23242526272829
3031  

NEWSLETTER


e-mail:
name:
Newsletter Endoacustica Europe - ENGLISH

Login

CONTACT US

Endoacustica Europe srl
Via Umberto Terracini, 47
70029 Santeramo in Colle (BA)
P.IVA IT06836020724
ITALY
tel. 0039 080 30 26 530
tel. 0039 080 43 73 08 93
fax 0039 080 40 73 11 87
e-mail: info@endoacustica.com

Text ADS

 SPY PHONE
spyphone A Spy Phone or GSM spy cellphone is a normal mobile phone on which has been installed a software able to reply many crucial information such as: listening of all incoming and outgoing calls from the mobile, real time phone surrounding sounds, reading of all type of messages (SMS, WhatsApp, Facebook, Viber etc..) and GPS tracking. The spy software works on the most of Android, iOS, Blackberry smartphones.

 MICRO DIGITAL RECORDER
digital video recorder Micro digital recorder able to gather evidence or discover any kind of betrayals. Recording capability of up to 1200 hours in continuous. Long duration for those recorders using voice activation system VAS. Just for you the best micro digital voice recorders on the market in terms of efficacy and reliability at a low price.
 WALL MICROPHONES
Wall microphones able to listen through walls thick even up to 70 cm. Ultra sensitive professional stereo microphone, suitable to pick up the lowest noises thanks to its very high sensitive ceramic microphone. Limpid and stable sound. Endowed with sockets for recorder and earpiece.
 PHONE VOICE CHANGER
The phone voice changers when interposed between handset and phone, will change your voice into another one. It transforms any voice into a masculine, feminine, adult or child one.The voice changer can be adapted to cell phones, cordless phones, speakers and microphones, recording systems, or connected to switchboards. The reproduced voice is not a robotic but a human one.
 REAL TIME TRACKERS
localizzatore rf

Real time trackers are designed for those who need to keep their pets under control, while limiting the relevant cost, but also to locate precious objects or to remember where you parked your car.

 ANTI-DROWNING AND ANTI-LOSS ALARM
anti loss alarm

Anti-drowning defender is an alarm device which combines anti-drowning and anti-loss alarm, and works effectively as an electronic safety device for protecting children or pets from drowning and loss.

Relevant artilcle

Attention to the new gadgets of thieves

14 Feb 2014

This may be the last discover of ingenious thieves who don’t hesitate to resort to the technology to hit unsuspecting victims. The news of recent months shows several cases where someone complains of being robbed, at home or in the company, after agreeing to unknowns small gadgets, deployed on the street, particularly at the crossings or when the light is red. The hypothesis is that these gadgets (lighters, key chains …

Never lose things again with the geolocation tools

19 Set 2013

The geolocation is getting closer, at your fingertips. We’re all constantly losing things. Keys, bag, charger and many other tools of daily use are very often forgotten, lost. The hard part is finding them. This discomfort could be deleted with the help of geolocation devices. In particular, big companies and startups are trying to answer to the distraction effects with products that will come soon on the market. Their secret would be an accessory, …

Stop mobile phones theft

30 Lug 2013

One hundred twenty thousand a year, ten thousand a month are the mobile phones stolen (or loss). These are the numbers from the homeland of mobile phones, smartphones and tablets thieves: London. The Mayor, Boris Johnson, and the police are really troubled about the weight of these statistics and asked to the same companies devices producing to investigate about what is happening. In particular, they asked to Apple, Samsung and …

Locate a mobile phone with the technique used by bats and dolphins

4 Lug 2013

Locate the exact position of a cell phone in enclosed spaces may become possible thanks to an algorithm that allows us to reconstruct the 3D shape of a room, listening to the echo of the sounds produced inside, even simple ones like the snap of the fingers. The project was developed by a research group at the EPFL. The researchers were inspired by echolocation, the system by which some animals …

Fish-robot will patrol the Thames River

10 Mag 2013

It’s environmental surveillance, the new frontier crossed by the fish-robot that will be released, in the coming months, in the Thames in order to sniff out pollution. Scenes like science fiction movies are recorded during the tests in the water. The robots will be released in groups of five in order to provide a mapping of the critical points and pollutant elements. The search will rely to the sensors built-in …

At the supermarket with the navigator

17 Gen 2013

GPS technology has now numerous applications in daily activities. Keep an eye on the kids, monitor the pet, follow the partner’s car is a cakewalk if you have the right tools. Shortly, it will possible use a sophisticated development of GPS technology in a shopping center or on the shelves of the supermarket so you’ll save time and optimize the product comparison. To lead the tour will be our trusty …

Internet of things will revolutionize our daily

10 Dic 2012

Web 3.0 isn’t yet far away. All the big laboratories are working hard to develop new applications concerning the Internet of things. With this neologism has been named the last frontier of online technology. The strength lies in the possibility given to objects to interact with each other by capturing and exchanging information. The alarm clock may sound for example in advance once found, through the Internet, heavy traffic conditions. …

Hop! the suitcase that follows you

13 Nov 2012

Pack your bags is always a problem. Weather conditions, formal and informal dresses, comfortable and casual, but also suited to special occasions that may occur…In short, a grind. And what often we create is a baggage too heavy and almost entirely useless. About 25 years ago, a pilot of the Nortwestern Airlines tried to obviate to the problem of having to lift heavy luggage introducing the trolley as we know …

Even sharks tracked with GPS

22 Ott 2012

Until recently, GPS tracking systems were used for the control of small animals. Now the GPS challenges even the most dangerous animals. Indeed, it is in an experimental phase the scientific mission of the American non profit association, Ocearch, led by Chris Fischer. During the operation, the sharks are caught, mainly in North America, and to them is applied a GPS tracking device, then they come back to the sea. …

Home with the GPS shoes

1 Ott 2012

Dominic Wilcox, british designer, has created a fully functional prototype pair of shoes with a built-in GPS that will guide you home. The name of this extravagant invention is “No Place Like Home” and it’s inspired by the famous novel “The Wonderful Wizard of Oz” in witch the protagonist Dorothy, with her magic shoes, can go everywhere clicking her shoes together three times. For Wilcox’s shoes, with expertly decorated sole, …