Home » transmitters gsm » Articoli recenti:

A bug that starts by itself

November 8, 2010 Technology No Commenti

Those who work in the surveillance field, such as law enforcement officers and private investigators, know that during an environmental eavesdropping operation, the amount of time occupied by background noises and useless sounds far exceeds that of conversations actually useful to the investigation.

For example, when planting a bugging device in an office, it may happen that the person under surveillance is not talking to anyone for long hours, and the eavesdropping operation would return only background noise, such as typing on a computer keyboard.

This kind of sounds make the process of listening to the information collected a long and tedious job, and especially if the bug is battery powered, it could run out of juice without giving real results. Therefore, care should be taken to optimize the operation of surveillance devices, using a tool such as a voice-activated bug.

This kind of bug, thanks to its activation sensor, can start working only when the sensor detects a sound above a certain threshold, thus avoiding to record and transmit background noise instead of real intelligence.
It is a GSM bug, with a SIM card just like that of an ordinary phone, which is used to transmit sounds and voices to a preset phone number, at any distance, even on the other side of the world!

The programming of its features (sensitivity, activation alert and so on) can be conveniently done via SMS, thus ensuring absolute safety. By connecting the GSM bug to the landline phone cables, you can easily listen to all incoming and outgoing calls, automatically starting to listen when the handset is released.

For more information and details about how GSM bugs are working, you can visit the Endoacustica website and contact our professional staff.

GSM Bug

December 28, 2009 Technology No Commenti

GSM Bug

GSM bugs are covert listening devices which, in order to transmit their intelligence, use the mobile phone network, thanks to a SIM card installed on them.

Among the endless possibilities offered by the eavesdropping devices market, the usage of a GSM bug has become more and more widespread, especially in the last few years, thanks to the possibility of carrying out surveillance operations without distance limits or radio coverage problems, this safeguarding the listener’s security and privacy, as he will no longer need to be hidden nearby but will be able to be sitting literally anywhere.

The increasing popularity of GSM bugs is due to the fact that they only come with advantages, such as the clarity of their signal (thanks to the digital network), the possibility of sending said signal worldwide just like you would do with a normal phone call, and all this without having to use any particular receiving device other than a normal mobile phone.

Our GSM-001 listening device is made up of a small shell with two cables, used to power the device and to connect it to a microphone with high sensitivity features. On the inside, along with the housing where the SIM card is placed, you can find a processor which manages all of the bug
‘s functionalities.

Generally, for all other covert listening devices based on GSM technology, one has to call the SIM card’s phone number to start listening in. In this case, the device is equipped with a high-sensitivity automatic activation sensor, which makes it possible to have the bug place a call towards a preset number. This happens when its built-in sensor detects a movement, a sound or, if planted inside a car, when the vehicle is started.

Furthermore, programming the settings can be done without being physically near the bug, as you just need to send a simple text message in a particular format, to make sure that the processor reads it as an operating command, enabling or disabling the relevant functions, or setting the sensitivity level of either the microphone or the sensor.

By sending an SMS it will be possible not only to change settings of the various functions, but also to reset the bug, in order to prevent it from being intercepted by any bug sweeping devices nearby. We will also be able to set up the telephone numbers enabled to control the bug, those towards which it will send a text notification, or those to be automatically called as soon as the sensor detects a motion.

You can also send a simple SMS to receive directly on your phone a report, where you will see the status of all functionalities installed on your GSM listening device.

Once you get hold of your bug, you also have to get to know the characteristics of the place where you intend to plant it, as well as the duration of the surveillance operation, in order to choose the most suitable power option for our needs. In fact, if the bug will have to stay away from us for a long time, or if we need a continuous monitoring, we will have to power it through the mains, in order to avoid performance gaps caused by a low or exhausted battery.

We will not have this kind of problem if our surveillance operation is a short-term one (up to one week), and non continuous, as in this case a normal 9V battery will be more than enough. Once the location and the power option of your bug have been set up, we will have to set up the usage mode.

At this point we will have to choose whether we will be calling our bug, or it will be calling us. Also, if installed inside a vehicle, we will have to choose whether we want or not to receive an SMS notification as soon as the car’s engine is started or stopped.

In order to make all this possible, we will have to choose the phone numbers that are enabled to call our bug to listen to the conversations around it, or those towards which the bug will call directly as soon as its sensor picks up a motion or a voice. For bugs planted inside a vehicle, we will have to set up the number towards which a notification must be sent in this case.

At the same time, you can set the sensitivity level of the activation sensor, in order to minimize the possibility of false alarms, caused by some noise coming from outside. For each of these functions, a maximum of three numbers enabled to control the device can be set.

Along with all the functions highlighted above, by sending a simple SMS you can run several utilities, such as restarting the bug, resetting it to factory settings, switching it off to prevent it from being detected by bug sweepers, enabling or disabling the flashing LED light, or setting up callback options in case of line failure.

In a few words, as you can see, by using a GSM bug you have at your disposal a faithful friend for your surveillance operations, with a high degree of flexibility that allows you to tailor its usage to best suit your needs, to make sure that success is achieved without any risk!

GSM bug, the defining standard for long-distance surveillance

November 15, 2009 Technology No Commenti

GSM Bug

Among the GSM type listening devices, that is, those hidden listening systems that feature a SIM card just like your normal mobile phone, and that are capable of transmitting their intelligence by using the GSM phone network, a special place is taken by the GSM-001 model.

In the investigation, surveillance and intelligence field, usage of GSM bugs shows undeniable advantages, especially in terms of comfort and safety, as the surveillance operation can be carried out from an unlimited distance, with a clear signal delivered by the digital phone network, and without having to use complicated and expensive radio receiving equipment with a limited operating range.

Inside a small box, the GSM bug contains the SIM card housing, mounted on a circuit board which contains the real core of the entire system. Unlike what happens with most normal listening devices of this kind, there is no need to call the GSM bug’s phone number to listen to what goes on around it.

On the contrary, thanks to its voice activation sensor, it will be the GSM transmitter to call us automatically when its high-sensitivity hidden microphone picks up a sound or a motion. And in the same fashion, but via SMS, for audio transmitters installed for example inside a vehicle, when the car is switched on or off the sensor will be activated, and the micro transmitter will send us a text message towards a preset number.

In fact, the possibility of programming its features remotely by sending an SMS, and of receiving notifications in the same format makes this listening device perfect to guarantee privacy and confidentiality.

Thanks to an SMS written in a particular format, you will for example be able to set up the number, towards which such notifications will have to be sent, or the preset number from which you can call the GSM transceiver (which will answer only when calls are coming from that particular number), or disable the GSM audio transmitter at once, and of course enable it later. You will also be able to receive a status report of the bug’s functionalities.

Depending on the audio surveillance operation we wish to undertake, we will have to choose whether to power our bug via the electricity mains, or with a normal 9V battery. The former is recommended for long-term hidden listening operations, while the latter is suitable for short term surveillance operations lasting just a few days.

Once this decision is made, you will have to configure the controlling number as explained above, and the number towards which your GSM transmitting device will call you as soon as its sensor detects a sound. It will also be possible to set the sensor sensitivity level, in order to allow it to call only when it is really necessary, and also set up the calling parameters when the vehicle is turned on or off.

For each function, it is possible to program up to three numbers that the bug will call. Of course, we will also have to make sure that, if the SIM card is a rechargeable one, it has enough credit, especially if the eavesdropping operation involves international or overseas calls.

For more information about how GSM bugs, hidden microphones and a wide range of surveillance and security devices are working, you can visit the Endoacustica site and contact our specialists, who will be glad to assist you.

Calendar

August 2014
M T W T F S S
« Jul    
 123
45678910
11121314151617
18192021222324
25262728293031

NEWSLETTER

e-mail:
name:
Newsletter Endoacustica Europe - ENGLISH

Login

CONTACT US

Endoacustica Europe srl
Via Umberto Terracini, 47
70029 Santeramo in Colle (BA)
P.IVA IT06836020724
ITALY
tel. 0039 080 30 26 530
tel. 0039 080 43 73 08 93
fax 0039 080 40 73 11 87
e-mail: info@endoacustica.com

Text ADS

 SPY PHONE
spyphone A SpyPhone or GSM Spy cellphone, is a normal mobile phone, where a software has been installed, which allows a third party to monitor the activities of the phone user. To avoid suspicions, a Spyphone must be given either as a present (for family members monitoring) or given as company equipment (for personnel monitoring).

 MICRO DIGITAL RECCORDER
digital video recorder Micro digital recorder with vocal activation have recording time of 1200 hours long. They went out from the big screen to enter by force in the life of every day, in the most diverse situations that until a few years ago even the vivid imagination of a writer of espionage could have imagined.
 WALL MICROPHONES
Wall microphones to listen through walls up to 70 cm. Ultra sensitive professional stereo microphone, suitable to pick up the lowest noises thanks to its very high sensitive ceramic microphone. Limpid and stable sound. Endowed with sockets for recorder and earpiece.
 PHONE VOICE CHANGER
The phone voice changers when interposed between handset and phone, will change your voice into another one. It transforms any voice into a masculine, feminine, adult or child one.The voice changer can be adapted to cell phones, cordless phones, speakers and microphones, recording systems, or connected to switchboards. The reproduced voice is not a robotic but a human one.
 REAL TIME TRACKERS
localizzatore rf

Real time trackers are designed for those who need to keep their pets under control, while limiting the relevant cost, but also to locate precious objects or to remember where you parked your car.

 ANTI-DROWNING AND ANTI-LOSS ALARM
anti loss alarm

Anti-drowning defender is an alarm device which combines anti-drowning and anti-loss alarm, and works effectively as an electronic safety device for protecting children or pets from drowning and loss.

Relevant artilcle

Attention to the new gadgets of thieves

14 Feb 2014

mendicante-a-semaforo

This may be the last discover of ingenious thieves who don’t hesitate to resort to the technology to hit unsuspecting victims. The news of recent months shows several cases where someone complains of being robbed, at home or in the company, after agreeing to unknowns small gadgets, deployed on the street, particularly at the crossings or when the light is red. The hypothesis is that these gadgets (lighters, key chains …

Never lose things again with the geolocation tools

19 Sep 2013

etichettatag

The geolocation is getting closer, at your fingertips. We’re all constantly losing things. Keys, bag, charger and many other tools of daily use are very often forgotten, lost. The hard part is finding them. This discomfort could be deleted with the help of geolocation devices. In particular, big companies and startups are trying to answer to the distraction effects with products that will come soon on the market. Their secret would be an accessory, …

Stop mobile phones theft

30 Jul 2013

furto-cellulare

One hundred twenty thousand a year, ten thousand a month are the mobile phones stolen (or loss). These are the numbers from the homeland of mobile phones, smartphones and tablets thieves: London. The Mayor, Boris Johnson, and the police are really troubled about the weight of these statistics and asked to the same companies devices producing to investigate about what is happening. In particular, they asked to Apple, Samsung and …

Locate a mobile phone with the technique used by bats and dolphins

4 Jul 2013

Pipistrelli

Locate the exact position of a cell phone in enclosed spaces may become possible thanks to an algorithm that allows us to reconstruct the 3D shape of a room, listening to the echo of the sounds produced inside, even simple ones like the snap of the fingers. The project was developed by a research group at the EPFL. The researchers were inspired by echolocation, the system by which some animals …

Fish-robot will patrol the Thames River

10 May 2013

robot_fish

It’s environmental surveillance, the new frontier crossed by the fish-robot that will be released, in the coming months, in the Thames in order to sniff out pollution. Scenes like science fiction movies are recorded during the tests in the water. The robots will be released in groups of five in order to provide a mapping of the critical points and pollutant elements. The search will rely to the sensors built-in …

At the supermarket with the navigator

17 Jan 2013

locata

GPS technology has now numerous applications in daily activities. Keep an eye on the kids, monitor the pet, follow the partner’s car is a cakewalk if you have the right tools. Shortly, it will possible use a sophisticated development of GPS technology in a shopping center or on the shelves of the supermarket so you’ll save time and optimize the product comparison. To lead the tour will be our trusty …

Internet of things will revolutionize our daily

10 Dec 2012

web-3-0

Web 3.0 isn’t yet far away. All the big laboratories are working hard to develop new applications concerning the Internet of things. With this neologism has been named the last frontier of online technology. The strength lies in the possibility given to objects to interact with each other by capturing and exchanging information. The alarm clock may sound for example in advance once found, through the Internet, heavy traffic conditions. …

Hop! the suitcase that follows you

13 Nov 2012

Hop-595x363

Pack your bags is always a problem. Weather conditions, formal and informal dresses, comfortable and casual, but also suited to special occasions that may occur…In short, a grind. And what often we create is a baggage too heavy and almost entirely useless. About 25 years ago, a pilot of the Nortwestern Airlines tried to obviate to the problem of having to lift heavy luggage introducing the trolley as we know …

Even sharks tracked with GPS

22 Oct 2012

ocearch-squali-gps

Until recently, GPS tracking systems were used for the control of small animals. Now the GPS challenges even the most dangerous animals. Indeed, it is in an experimental phase the scientific mission of the American non profit association, Ocearch, led by Chris Fischer. During the operation, the sharks are caught, mainly in North America, and to them is applied a GPS tracking device, then they come back to the sea. …

Home with the GPS shoes

1 Oct 2012

dominic_wilcox_sept_043

Dominic Wilcox, british designer, has created a fully functional prototype pair of shoes with a built-in GPS that will guide you home. The name of this extravagant invention is “No Place Like Home” and it’s inspired by the famous novel “The Wonderful Wizard of Oz” in witch the protagonist Dorothy, with her magic shoes, can go everywhere clicking her shoes together three times. For Wilcox’s shoes, with expertly decorated sole, …