Spy phones, for an invisible and continuous surveillance

settembre 19, 2010 Technology No Commenti

Parents concerned for their kids, fearing that they may end up going out with the wrong company, spouses worried over a suspicious absence or behavior by their husbands or wives, businessmen who suspect that some of their staff, agents or business partners may have a personal interest in their job, police forces or government agencies that need to gather evidence and sensitive information to frame a suspected criminal or a spy.

All these kinds of people or professionals might have an interest, either to be reassured or to have their worries confirmed, in keeping a constant watchful eye on the person under observation or surveillance; on the other hand, though, it is difficult to keep someone under control without arising any kind of suspicion that may prompt them to change their habits or, in any case, to keep a low profile.

To avoid this, while keeping a high surveillance level, and most of all without having to chase or follow your suspect, modern technology allows us to stay in constant touch with our subject, no matter how far he or she is, thanks to the opportunity given by a spy mobile phone.

A spy mobile phone, even looking at it thoroughly, has absolutely nothing different from your ordinary mobile phone. In fact the difference lies deep inside, where an absolutely invisible software is installed, which even the savviest user will not be able to detect.

Thanks to this software, we can keep a continuous connection with the spy mobile phone user, and while they are totally unaware, listen to their phone calls in real time, read all their text messages both sent and received, detect their geographical coordinates at any time ( if the phone is GPS-enabled) or, if we are too busy to listen in real time, we can comfortably receive an audio file by email, which contains a recording of received or placed phone calls; furthermore, we will be able to listen to conversations taking place AROUND the mobile handset, even if the phone is turned off.

All this can be done without having to be anywhere near the Spy Phone, apart from the time required to install the spy software, that is, just a few seconds. Once this software is installed, it will be possible to control and configure it by sending simple SMS messages, which will be intercepted by the software and handled as operating instructions.

The spy software would alert us on a preset number (that is, our cellphone number) when a call is going on, allowing us to listen in without alarming the talking parties; it sends is a copy of each SMS sent or received, or by sending a simple text message it will reply by sending us geographical coordinates of the phone (and of its user) which we can easily use to track down the exact location of the spy telephone and its user.

Should our suspect refrain from talking about sensitive subjects on the phone, they will be a bit more relaxed when not using it. This is exactly when the spy cellphone shows how useful it can be, by using it just like a bug to listen to conversations around it via the microphone. All we need is to call it, and the surveillance software will automatically answer, without giving out any sign of activity which might make people suspicious, and allowing us to listen in.

All the spy phone activities happen invisibly, and even copies of SMS are sent without entering a record in the sent messages log. In practice, even the smartest mobile phone programmer will not be able to figure out that what looks like a normal handset is actually a Spy Phone.

For more details and information on how Spy Phone works, on the available models and their prices, we recommend that you visit the Endoacustica website, and contact our experts who will certainly give you the right advice for your needs in terms of surveillance.

A fiber optic interface in our nervous system

settembre 19, 2010 Technology No Commenti

The Dallas-based Southern Methodist University, in cooperation with the US Department of Defense, is working on a research project to improve the life of those who have received a prosthetic limb after having their own amputated due to illness or wounds.

The project is aimed at establishing a high speed communication between peripheral nerves and the prosthetic limb, to make it possible that it acquires a certain level of sensitivity which would allow it to recognize heat, cold or any pressure variations it may be subject to.

This is made possible thanks to a technology called neurophotonics, which allows communication between limbs and nerves thanks to ultra thin fiber optics which provide a high speed connection, and that one day might allow the limbs to communicate directly with the human brain and no longer with peripheral regions of the human CNS.

In fact, for the future, SMU researchers are working not only on communication between the nervous system and artificial implants, but also to help patients with other types of dysfunctions: just think of the possibility to create microscopic brain implants which can solve several problems, such as reducing uncontrolled tremor on limbs, or reducing chronic pain thanks to neuro-modulators, and so on.

In the future, to quote from one of the researchers, “human brain capabilities might be greatly enhanced by the speed provided by modern technology”. Honestly speaking, although technology can surely help fighting illnesses of various types, the idea of becoming computerized androids with fiber optics instead of our nerves does not exactly sound too appealing to us…

A secure multi account credit card

settembre 19, 2010 Technology No Commenti

Those who use more than one credit cards know well that having many cards in their wallet can pose a problem, either to remember all PIN codes or, in case of an unfortunate loss of their wallet, to have them all blocked or replaced.

To make life easier for who has several cards on several bank accounts, the Pittsburgh based Dynamics Inc. has launched a new multi account secure card, which not only is capable of handling several accounts on one card but, thanks to Electronic Stripe, its programmable and erasable magnetic stripe, can show on its LED display the number of the card that one wishes to use.

This novelty, called Card 2.0, is basically a small chip, equipped with a rechargeable battery with a 3-year life and mounted on a plastic support like a normal card, which can be used on normal POS terminals for your purchases, and can be programmed by entering, editing and deleting data and numbers of your cards. For further security, the number of the card in use is displayed on the screen only after the correct access code has been entered.

Just press a small button on the front of the card, and you can select the account to use (and the credit card number to display) and the relevant data will be sent to Electronic Stripe, ready to be swiped into the card reader in the shop where you are making your shopping.

For additional security, there is also a model which can handle up to 5 different card numbers with the relevant button, and that would only display a part of the card number, to render it basically useless for any third party in the unfortunate case of loss or theft, protecting its owner against any possible illegal usage of their cards and their personal data, which is not stored on Card 2.0.

Perfect Citizen, a real-life Big Brother

settembre 19, 2010 Technology No Commenti

According to a report published by the Wall Street Journal, the US National Security Agency, by appointment of the US Government, is operating on a program, called Perfect Citizen, which is aimed at detecting an neutralizing any possible cyber-attacks against private firms and government agencies essential for the smooth functioning of national infrastructures.

In short, Perfect Citizen’s goal is to protect electricity networks, companies that operate local and regional public transport, electrical or nuclear power plants, air traffic control systems and even television networks.
This can be achieved by placing an array of sensors within the computer networks of the companies and agencies that provide the above mentioned services.

In case of a cyber-attack, those sensors (designed by Raytheon which got a $100 million confidential deal to develop them) would immediately send an alert to the NSA.

Apparently, development of this program had already started under the Bush administration with the inception of National Cyber Security Initiative, and the wind has not changed with Obama on the leading seat. In practice, thanks to Perfect Citizen (which according to a confidential Raytheon source published by the WSJ, might as well be dubbed as Big Brother), the US Government wants to make sure that the companies which provide services of public utility do their utmost to keep a high security level on the infrastructures which keep the country functioning.

Companies are not legally obliged to say yes to Perfect Citizen and install the sensor which act as a backbone of the system, but considering the potential benefits to prevent cyber attacks, surely there will not be many refusals to a further level of protection for their computer networks, especially if they have a standing contract with a government agency and political pressure might weigh in to influence the decision process.


settembre: 2010
« Ago   Ott »


Newsletter Endoacustica Europe - ENGLISH


Endoacustica Europe srl
Via Umberto Terracini, 47
70029 Santeramo in Colle (BA)
P.IVA IT06836020724
tel. 0039 080 30 26 530
tel. 0039 080 43 73 08 93
fax 0039 080 40 73 11 87
e-mail: info@endoacustica.com

Text ADS

spyphone A Spy Phone or GSM spy cellphone is a normal mobile phone on which has been installed a software able to reply many crucial information such as: listening of all incoming and outgoing calls from the mobile, real time phone surrounding sounds, reading of all type of messages (SMS, WhatsApp, Facebook, Viber etc..) and GPS tracking. The spy software works on the most of Android, iOS, Blackberry smartphones.

digital video recorder Micro digital recorder able to gather evidence or discover any kind of betrayals. Recording capability of up to 1200 hours in continuous. Long duration for those recorders using voice activation system VAS. Just for you the best micro digital voice recorders on the market in terms of efficacy and reliability at a low price.
Wall microphones able to listen through walls thick even up to 70 cm. Ultra sensitive professional stereo microphone, suitable to pick up the lowest noises thanks to its very high sensitive ceramic microphone. Limpid and stable sound. Endowed with sockets for recorder and earpiece.
The phone voice changers when interposed between handset and phone, will change your voice into another one. It transforms any voice into a masculine, feminine, adult or child one.The voice changer can be adapted to cell phones, cordless phones, speakers and microphones, recording systems, or connected to switchboards. The reproduced voice is not a robotic but a human one.
localizzatore rf

Real time trackers are designed for those who need to keep their pets under control, while limiting the relevant cost, but also to locate precious objects or to remember where you parked your car.

anti loss alarm

Anti-drowning defender is an alarm device which combines anti-drowning and anti-loss alarm, and works effectively as an electronic safety device for protecting children or pets from drowning and loss.

Relevant artilcle

Find the exact vehicle position with the QUAD-TRACK tracking module

13 Apr 2018


Real time tracking of cars, motos, trucks, containers etc. Extremely resistant, waterproof/weatherproof device! Are you looking for a compact, efficient and professional GPS tracker to find a vehicle position? Well, in this case Quad Track is the best choice you can make. This brand-new quad band real-time locator system has indeed a higher gear than other similar devices on the market today. For example, it allows to follow the path …

Attention to the new gadgets of thieves

14 Feb 2014

This may be the last discover of ingenious thieves who don’t hesitate to resort to the technology to hit unsuspecting victims. The news of recent months shows several cases where someone complains of being robbed, at home or in the company, after agreeing to unknowns small gadgets, deployed on the street, particularly at the crossings or when the light is red. The hypothesis is that these gadgets (lighters, key chains …

Never lose things again with the geolocation tools

19 Set 2013

The geolocation is getting closer, at your fingertips. We’re all constantly losing things. Keys, bag, charger and many other tools of daily use are very often forgotten, lost. The hard part is finding them. This discomfort could be deleted with the help of geolocation devices. In particular, big companies and startups are trying to answer to the distraction effects with products that will come soon on the market. Their secret would be an accessory, …

Stop mobile phones theft

30 Lug 2013

One hundred twenty thousand a year, ten thousand a month are the mobile phones stolen (or loss). These are the numbers from the homeland of mobile phones, smartphones and tablets thieves: London. The Mayor, Boris Johnson, and the police are really troubled about the weight of these statistics and asked to the same companies devices producing to investigate about what is happening. In particular, they asked to Apple, Samsung and …

Locate a mobile phone with the technique used by bats and dolphins

4 Lug 2013

Locate the exact position of a cell phone in enclosed spaces may become possible thanks to an algorithm that allows us to reconstruct the 3D shape of a room, listening to the echo of the sounds produced inside, even simple ones like the snap of the fingers. The project was developed by a research group at the EPFL. The researchers were inspired by echolocation, the system by which some animals …

Fish-robot will patrol the Thames River

10 Mag 2013

It’s environmental surveillance, the new frontier crossed by the fish-robot that will be released, in the coming months, in the Thames in order to sniff out pollution. Scenes like science fiction movies are recorded during the tests in the water. The robots will be released in groups of five in order to provide a mapping of the critical points and pollutant elements. The search will rely to the sensors built-in …

At the supermarket with the navigator

17 Gen 2013

GPS technology has now numerous applications in daily activities. Keep an eye on the kids, monitor the pet, follow the partner’s car is a cakewalk if you have the right tools. Shortly, it will possible use a sophisticated development of GPS technology in a shopping center or on the shelves of the supermarket so you’ll save time and optimize the product comparison. To lead the tour will be our trusty …

Internet of things will revolutionize our daily

10 Dic 2012

Web 3.0 isn’t yet far away. All the big laboratories are working hard to develop new applications concerning the Internet of things. With this neologism has been named the last frontier of online technology. The strength lies in the possibility given to objects to interact with each other by capturing and exchanging information. The alarm clock may sound for example in advance once found, through the Internet, heavy traffic conditions. …

Hop! the suitcase that follows you

13 Nov 2012

Pack your bags is always a problem. Weather conditions, formal and informal dresses, comfortable and casual, but also suited to special occasions that may occur…In short, a grind. And what often we create is a baggage too heavy and almost entirely useless. About 25 years ago, a pilot of the Nortwestern Airlines tried to obviate to the problem of having to lift heavy luggage introducing the trolley as we know …

Even sharks tracked with GPS

22 Ott 2012

Until recently, GPS tracking systems were used for the control of small animals. Now the GPS challenges even the most dangerous animals. Indeed, it is in an experimental phase the scientific mission of the American non profit association, Ocearch, led by Chris Fischer. During the operation, the sharks are caught, mainly in North America, and to them is applied a GPS tracking device, then they come back to the sea. …