Buying a bug transmitter on Amazon without knowing where it is from? Actually it is not a good idea!

“You know what? I bought this spy bug on Amazon, but now I am not able to make it work!” This is a typical comment submitted on Amazon or Ebay after having recklessly purchased the product in question. Actually we have been saying that for long time: before buying any …

KA-101: a full audio monitoring kit fitted with spy bug, receiver and micro recorder

Are you on the fence about the audio monitoring device to be used in your investigation? Well, KA-101 is just the device you need! Not only because it makes a combined use of bug transmitter, RF receiver and mini recorder, but also because it is more affordable than other devices …

Which video bugs are better to use in investigation?

Do you think audio bugs are the only surveillance devices to be used for monitoring rooms or any other environment? If so you’re barking up the wrong tree, because over time investigative technology has increasingly developed UMTS or WiFI video bugs, proved to be very effective in undercovered or remote …

Economic dependence and cheating: a study reveals a possible correlation

A few years ago, on the site of ASA (American Sociological Association) was written up an article concerning a possible correlation between economic dependence on one’s partner and a large number of cheating cases. In the article, the US sociologist Christin L. Munsch, a researcher who spent a long time …

Microregistratori digitali

Listening through a wall requires the right microphone

ottobre 27, 2010 Technology No Commenti

We all happened at different times, to wish that we were able to listen to what happens beyond a wall, perhaps during a confidential meeting in the office, or because we have an annoying neighbor, or simply to make sure that our children are not hanging out with the wrong company.

This is not always possible, but thanks to modern technology for discreet listening, it is much easier than you might think.

If you have ever watched those old Wild West movies where crooks open a safe using a stethoscope to find out the right combination, you know what we are talking about. In fact, it is thanks to the modern variant of this procedure, that you can easily listen to conversations taking place behind a wall that can be thick up to 70 cm.

With a wall microphone, equipped with a cap very similar to your doctor’s stethoscope, but teamed up with digital technology that turns it into a high sensitivity microphone, you will be able, easily and without being noticed, to capturing all that your neighbor, your teenage child or, why not, your boss, are saying while they think no one is listening.

All this can then be also connected to a digital voice recorder, so that you can store the conversations and use them as evidence in case of need, for example during a court audition.
In short, a stethoscope microphone can be your best friend to defend your interests or your loved ones!

For more information on how to purchase wall microphones, digital micro recorders and a whole range of equipment for security and defense of your privacy, please visit the Endoacustica website where you will find the answers to all your questions in this field.

Street View, a threat to our privacy

ottobre 27, 2010 Technology No Commenti

Today, in Italy, on the main newspapers’ headlines we have seen the news that the Google Street View function that displays a road from a pedestrian’s point of view, allowing the viewer to take a look at the street as if they were really there, is under investigation in Italy, where a Rome prosecutor has opened an investigation file with the charge of unlawful interference with private life.

In fact, according to information that the data protection commissioner sent to the Court itself, the famous Google mini cars, which collect the images that will be used in Street View, have during their course collected sensitive data stored the WiFi networks encountered along the way.
From the Net giant’s headquarters in Mountain View, an apology note was immediately sent out, stating that the data have been collected in an accidental way, and offering full cooperation to the authorities in order to investigate and to ensure that this breach of privacy not only will not happen again in the future, but also will have no unpleasant consequences for the owners of the data inadvertently intercepted.

Such data may contain not only access information and credentials for protected WiFi networks, but also email messages and passwords, which, may have devastating consequences if they fall into the wrong hands.

Moreover, according to the authorities that guard the individuals’ privacy in Italy, the cars that gather information for Google should be recognizable, so that those who happen to spot one and do not really want to be seen or photographed in inappropriate behavior or in a place where they are not supposed to be (for example, while leaving a mistress’s home…) have the opportunity to take adequate measures in time.

Google, which increasingly resembles a Big Brother 2000, will therefore have to limit its intrusiveness, to avoid having to face hefty penalties.

The human brain can be backed up like a hard disk

ottobre 25, 2010 Biotechnology No Commenti

The name Raymond Kurzweil, for the majority of the general public may not mean that much, but he is one of the great gurus of modern technology, able not only to invent the first music synthesizer which could perfectly imitate the sound of the piano, thus overcoming one of the major limitations of electronic keyboard instruments, but also to predict, back in the eighties the development of the Internet as we know it now.

In addition to this, Kurzweil has contributed to progress with the inception of technologies such as voice recognition, but also with theories that bear witness to his visionary talent, such as when he envisioned the advent of a modern society in which all information could be obtained through computers connected in a worldwide network, a vision that at the time raise more than an eyebrow …

So when Kurzweil talks about the future, you should listen to him. According to his last prophecy, in twenty years from now it will be possible to make a copy of the data in our brain, a sort of backup copy which, just like the contents of today’s hard drives, could be easily saved on USB drives, and brought safely to consult it when needed, not only by the “owner” of the copied brain, but by others, and possibly also by his heirs after his death, to relive his memories and access to any knowledge that the deceased may have left behind, by reading the data through a search engine.

Theoretically, thanks to nanotechnology, this scenario is already possible today. Again, because of microscopic technologies, it will be possible, according to Kurzweil, to have micronized robots implanted in the human body, which would flow in our blood vessels to detect and cure any diseases, and to give us advice on habits we should follow, foods we should eat and medicines to take. In a few words, it will be a sort of Big Brother inside us, but (apparently) well-meant.

Who knows, maybe in the future, once the technology to make a backup copy of our brain is found, there could be a way to restore it, that is, to reinstall the data of a deceased person’s brain into that of a younger one, thus rendering eternal, if not his life, at least his knowledge and his memories.

The scenario is not exactly reassuring, but who knows, maybe in twenty years we will find a way to use all this knowledge in constructive ways.

How to work for the CIA

ottobre 25, 2010 Technology No Commenti

For those whose criminal record and personal history are absolutely squeaky clean, and want to try to give their contribution to make the world a safer place, helping to defend it against terrorist threats, the CIA is constantly looking for staff.

But be careful, because those who already see themselves as an international spy, infiltrating dangerous terrorist groups, or dealing with collection of information in a foreign country, may be disappointed. In fact, in reality, modern espionage is highly technological, and most of the work of the Agency takes place behind a desk, carried out by analysts, experts in foreign languages and engineers with the highest possible professional profile and technological knowledge.

Knowing a foreign language perfectly, so that you can easily pass for native speakers (apart from the obvious visible differences) may be a first step. Languages in demand reflect the world’s current political situation, as for example, the CIA currently needs staff who speaks fluently, for example, Farsi or Mandarin Chinese, Korean or Russian, since the relations with the countries where these languages are spoken are a bit shaky, to say the least.

The most important conditions for becoming a CIA Agent, then, are to have an absolutely perfect personal background and history, and to be flexible, with an analytical mind and able to react quickly under high stress.
If anyone thinks he can hide, for example, a fine not paid for a parking ticket, or that they have smoked some weed when they were young, and think they can pass the polygraph test, they do not have to waste their time, as the CIA can, and will, find out.

Those who aspire to a job in Langley must be able to keep secrets so strictly that not even the closest family members can discover the true nature of a cover job, for example, at real estate or insurance agency.

Those who think they have the right characteristics must also be prepared for a long wait, because the background checks during the selection process are extremely accurate, and only the best manage to get through a process which will single out the best out of a bunch of hopefuls.

Ah, one last condition: if you think you are the best in the world, but you are not a U.S. citizen, you need not apply!

Can text messages be intercepted?

ottobre 24, 2010 Technology No Commenti

Those who fear that their conversations could be intercepted, especially if they use the phone to discuss sensitive topics, confidential subjects or matters of a certain financial relevance, sometimes think that, to avoid being tapped, they can use SMS to communicate securely.

Unfortunately for them, though, this is not true, and actually, an SMS would leave an indelible track, which could easily be used against us at any time and in any situation. In fact, thanks to modern systems mobile phone wiretapping, not only one can listen to calls from any phone within a radius of several hundred meters, but also read all SMS traffic in the same area.

These systems are able to read the encoding used by cell phone networks to encrypt conversations; therefore, to protect oneself from covert listening, the best way is certainly to encrypt our conversations, using a code that is not the one used to encrypt the signal sent through the network, and thus add an extra layer of protection to our telephone conversations.

The principle used to make encrypted phone calls is the same that we see every day on our computers, if we use a system such as PGP to protect our e-mail.

In fact, on the cell phone is installed a simple encryption software, which combined with the relevant encryption key, converts the audio track into an unintelligible noise. If our counterpart’s phone has the same software and the same encryption key, it can decode this noise, and our conversation will go on regularly and without prying ears.

Any attempt to intercept, would only be able to hear only the noise of the encoded phone call, but would not be able to decipher it. In this way, our phones are safe from being tapped, and we will not have to worry that sensitive information could end up in the wrong hands, with the potential risk to create serious damage to our work or our family.

Anyone wishing to learn more about various ways to ensure privacy protection, by telephone, at home or in the office, may visit the Endoacustica website and consult our experts, at your disposal to find the solution that best suits your safety needs.

Telephone harassment? Use a voice changer

ottobre 23, 2010 Technology No Commenti

Often, for a woman who lives alone, a call is not necessarily bringing good news or the warm sound of a friendly voice. On the contrary, as we can see from the growing number of stalking cases anywhere in the world, sometimes at the other end of the line there can be a molester, often a known person, such as a persistent ex boyfriend.

In such cases, change phone number may not be enough, in addition to being very uncomfortable (for example, to communicate your new number to friends, acquaintances, relatives and business associates). So instead of running away from telephone harassment, security technology offers the opportunity to defend yourselves in a more subtle way, without having to hide.

In fact, if you can not avoid phone calls, the best way to make them stop quickly is to use an electronic voice changer, which is a device that, when connected to your home phone or mobile phone, would electronically modify the human voice through an algorithm which works on the voice’s frequencies, with the result of transforming, for example, the voice of a woman in that of a man and vice versa.

Thanks to the voice changer, you can change your voice to make people believe that the person who picks up the phone is a child or an elderly person, a boy or a girl. All this in an absolutely natural way, because the algorithm does makes the voice “metallic”, and the person at the other end of the phone can easily be led to believe that they dialed the wrong number or that the person they are looking for is no longer there.

Thanks to this voice changing device, you can avoid not only phone stalkers, but also dodge pressing creditors, telemarketing companies trying to force you to buy products that you do not really need, and so on. For more information on how it works, we recommend that you visit the Endoacustica website.

http://www.endoacustica.com/blog/tecnologia/molestie-telefoniche-cambiatevi-la-voce/

How to build your listening bug

ottobre 23, 2010 Technology No Commenti

For those who want to give audio surveillance a try and, despite not having the necessary resources to purchase a complete set of bugging devices and hidden microphones for secret listening, are equipped with a good deal of patience as well as some basic knowledge of electronics, today on the Internet it is very easy to find instructions to build your own equipment that can perform the same job at a fraction of the cost.

For example, on one of the many specialized sites, you can find detailed instructions to concoct your own spy bug, with simple off-the-shelf pieces that can easily be obtained by recycling an old radio.

Obviously the result will not be something that can be used by a surveillance professional for performance at the highest level, but it can be more than enough, for example, to listen to your neighbors or your children while they are playing in their room.

The intelligence you gather can be easily listened to with a standard FM radio, so maybe if you’re going to pull a prank on your neighbors, make sure that they do not have their radio on, or they may end up listening to themselves in real time!

Detailed instructions for building this device, that must be considered nothing more than a toy, are quite simple for those who have a basic understanding of electronics, and with just a few hours of work, you can build your first bug and start playing the secret agent!

Obviously though, if you plan to use an audio surveillance system, made up not only of spy bugs and hidden microphones, but also of radio transmitters suitable for professional use, for example to resolve a case of marital infidelity, it is strongly advised to consult experts in this field, who could give you professional advice, according to your surveillance needs, and why not, to your budget.

Spy on your neighbors, with a pen recorder

ottobre 21, 2010 Technology No Commenti

Sometimes, for various reasons, you may need to gather information discreetly, making sure that no one around you would be able to notice it.

Certainly, one of the best ways to do this is by recording conversations, but this must be done without drawing unwanted attention. Therefore, it is necessary that the hidden recording is done by using tools and devices that are not easily identifiable as tape recorders, which could alert everyone around you.

To achieve this, audio surveillance technology provides us with different types of micro recorders, so small that they can easily be hidden inside objects we use every day, without losing anything in terms of efficiency, reliability and ease of use.

A typical example of this kind is a pen recorder. In many years of spy movies, we have seen how pens can be used to shoot bullets or poison arrows, to launch sleeping gas and so on, and now, thanks to the miniaturization of recording technologies and storage media, a pen can easily contain a miniature-sized digital voice recorder, along with an equally small memory card, which can be used to save long hours of conversation.

In addition, recording can be started easily; in fact, to prevent any suspicion, a pen recorder is able to function normally, the only difference being that, by pressing the button at the top, not only it can write but you can also start recording, while everyone else is unaware.
With these features, possible applications are unlimited: confidential office meetings, school and university classes, gathering evidence in cases of industrial espionage, and so on.

For more information on operation and details of micro recorders of this kind, Endoacustica invites you to visit our website, where you can also find great deals and special offers on this type of articles!

Secret photos and videos on your iPhone

ottobre 21, 2010 Technology No Commenti

The choice of iPhone apps on the market is so wide that it seems that the mobile phone manufactured by Apple can do almost everything (with the exception of coffee… maybe!). One option that, oddly enough, no one has been deeply looking into so far, is to use the iPhone to take secret photos and movies.

This gap has now been filled: in fact, on iTunes, the Cupertino guys are showcasing Camera Camouflage, an application that turns your iPhone into a secret photo and video camera.

The application can make your phone ring on demand (for example at a specific time), just like a normal incoming call. When you pick up the receiver and answer this fake call, the camera will start working, and while everyone thinks that you are talking on the phone, you are actually recording them!

To take pictures, the shutter is activated by voice. By speaking in short sentences, every voice burst will be taken as a command, and you will be able to take pictures in sequence, while those around you are completely unaware. In addition, the shutter sound that the iPhone makes when taking a photograph will no longer be heard (which could generate suspicions in the people around you), but you will hear it directly into your ears.

Obviously, to run in hidden mode, the application disables the phone flash, so it is not advisable to use it in a dark place, unless you really want to be exposed. Surely this is an interesting tool to have on your mobile phones if you are carrying out investigations or surveillance activities professionally, but it can also be used, in a much more innocent way, to take photographs and videos of your friends in compromising or funny moments.

In any case, since the cost of the application is less than a dollar, it is certainly worth a try!

A watch or a radio transmitter?

ottobre 21, 2010 Technology No Commenti

Those who have reached the 35-40 years mark, when they were kids, were dreaming of a pair of two-way radios, or walkie-talkies, to play war or spy games with their friends, or to keep in touch with them at a (relatively) remote distance without having to call.
Later on, radio transmitters have been introduced into our every day lives, for example in homes with small children, giving mothers the opportunity to hear what happens in the babies’ room while they are busy with household chores.

In the age of cell phones, people tend to think that all communications should be conducted by telephone; on the contrary, however, radio transmission can surely be helpful to keep in touch within a short distance, without having to use the phone.

For example, when you are hunting in an area not covered by the telephone network, or for police forces engaged in an operation which requires a continuous and discreet contact, or simply for parents wishing to leave their children free to roam in a shopping center while they are busy spending their money on Christmas presents for friends.

In all these cases, a valuable aid may come from the use of an R-Watch, that is, a radio watch. Inside what looks like your ordinary wristwatch with a digital display, in fact, lies a powerful radio transmitter that can operate within a maximum range of 3 km.
R-Watch is also able to interact with other devices that use the same radio frequencies. Therefore, it can communicate remotely with anyone with a walkie-talkie.

For more information and details on the operation of radio watch, you can visit the Endoacustica website, a leading manufacturer and distributor of products for your security, as well as for audio and video surveillance and monitoring.

Calendar

dicembre: 2018
L M M G V S D
« Giu    
 12
3456789
10111213141516
17181920212223
24252627282930
31  

NEWSLETTER


e-mail:
name:
Newsletter Endoacustica Europe - ENGLISH

CONTACT US

Endoacustica Europe srl
Via Umberto Terracini, 47
70029 Santeramo in Colle (BA)
P.IVA IT06836020724
ITALY
tel. 0039 080 30 26 530
tel. 0039 080 43 73 08 93
fax 0039 080 40 73 11 87
e-mail: info@endoacustica.com

Text ADS

 SPY PHONE
spyphone A Spy Phone or GSM spy cellphone is a normal mobile phone on which has been installed a software able to reply many crucial information such as: listening of all incoming and outgoing calls from the mobile, real time phone surrounding sounds, reading of all type of messages (SMS, WhatsApp, Facebook, Viber etc..) and GPS tracking. The spy software works on the most of Android, iOS, Blackberry smartphones.

 MICRO DIGITAL RECORDER
digital video recorder Micro digital recorder able to gather evidence or discover any kind of betrayals. Recording capability of up to 1200 hours in continuous. Long duration for those recorders using voice activation system VAS. Just for you the best micro digital voice recorders on the market in terms of efficacy and reliability at a low price.
 WALL MICROPHONES
Wall microphones able to listen through walls thick even up to 70 cm. Ultra sensitive professional stereo microphone, suitable to pick up the lowest noises thanks to its very high sensitive ceramic microphone. Limpid and stable sound. Endowed with sockets for recorder and earpiece.
 PHONE VOICE CHANGER
The phone voice changers when interposed between handset and phone, will change your voice into another one. It transforms any voice into a masculine, feminine, adult or child one.The voice changer can be adapted to cell phones, cordless phones, speakers and microphones, recording systems, or connected to switchboards. The reproduced voice is not a robotic but a human one.
 REAL TIME TRACKERS
localizzatore rf

Real time trackers are designed for those who need to keep their pets under control, while limiting the relevant cost, but also to locate precious objects or to remember where you parked your car.

 ANTI-DROWNING AND ANTI-LOSS ALARM
anti loss alarm

Anti-drowning defender is an alarm device which combines anti-drowning and anti-loss alarm, and works effectively as an electronic safety device for protecting children or pets from drowning and loss.

Relevant artilcle

Find the exact vehicle position with the QUAD-TRACK tracking module

13 Apr 2018

gps-gprs-tracking-system

Real time tracking of cars, motos, trucks, containers etc. Extremely resistant, waterproof/weatherproof device! Are you looking for a compact, efficient and professional GPS tracker to find a vehicle position? Well, in this case Quad Track is the best choice you can make. This brand-new quad band real-time locator system has indeed a higher gear than other similar devices on the market today. For example, it allows to follow the path …

Attention to the new gadgets of thieves

14 Feb 2014

This may be the last discover of ingenious thieves who don’t hesitate to resort to the technology to hit unsuspecting victims. The news of recent months shows several cases where someone complains of being robbed, at home or in the company, after agreeing to unknowns small gadgets, deployed on the street, particularly at the crossings or when the light is red. The hypothesis is that these gadgets (lighters, key chains …

Never lose things again with the geolocation tools

19 Set 2013

The geolocation is getting closer, at your fingertips. We’re all constantly losing things. Keys, bag, charger and many other tools of daily use are very often forgotten, lost. The hard part is finding them. This discomfort could be deleted with the help of geolocation devices. In particular, big companies and startups are trying to answer to the distraction effects with products that will come soon on the market. Their secret would be an accessory, …

Stop mobile phones theft

30 Lug 2013

One hundred twenty thousand a year, ten thousand a month are the mobile phones stolen (or loss). These are the numbers from the homeland of mobile phones, smartphones and tablets thieves: London. The Mayor, Boris Johnson, and the police are really troubled about the weight of these statistics and asked to the same companies devices producing to investigate about what is happening. In particular, they asked to Apple, Samsung and …

Locate a mobile phone with the technique used by bats and dolphins

4 Lug 2013

Locate the exact position of a cell phone in enclosed spaces may become possible thanks to an algorithm that allows us to reconstruct the 3D shape of a room, listening to the echo of the sounds produced inside, even simple ones like the snap of the fingers. The project was developed by a research group at the EPFL. The researchers were inspired by echolocation, the system by which some animals …

Fish-robot will patrol the Thames River

10 Mag 2013

It’s environmental surveillance, the new frontier crossed by the fish-robot that will be released, in the coming months, in the Thames in order to sniff out pollution. Scenes like science fiction movies are recorded during the tests in the water. The robots will be released in groups of five in order to provide a mapping of the critical points and pollutant elements. The search will rely to the sensors built-in …

At the supermarket with the navigator

17 Gen 2013

GPS technology has now numerous applications in daily activities. Keep an eye on the kids, monitor the pet, follow the partner’s car is a cakewalk if you have the right tools. Shortly, it will possible use a sophisticated development of GPS technology in a shopping center or on the shelves of the supermarket so you’ll save time and optimize the product comparison. To lead the tour will be our trusty …

Internet of things will revolutionize our daily

10 Dic 2012

Web 3.0 isn’t yet far away. All the big laboratories are working hard to develop new applications concerning the Internet of things. With this neologism has been named the last frontier of online technology. The strength lies in the possibility given to objects to interact with each other by capturing and exchanging information. The alarm clock may sound for example in advance once found, through the Internet, heavy traffic conditions. …

Hop! the suitcase that follows you

13 Nov 2012

Pack your bags is always a problem. Weather conditions, formal and informal dresses, comfortable and casual, but also suited to special occasions that may occur…In short, a grind. And what often we create is a baggage too heavy and almost entirely useless. About 25 years ago, a pilot of the Nortwestern Airlines tried to obviate to the problem of having to lift heavy luggage introducing the trolley as we know …

Even sharks tracked with GPS

22 Ott 2012

Until recently, GPS tracking systems were used for the control of small animals. Now the GPS challenges even the most dangerous animals. Indeed, it is in an experimental phase the scientific mission of the American non profit association, Ocearch, led by Chris Fischer. During the operation, the sharks are caught, mainly in North America, and to them is applied a GPS tracking device, then they come back to the sea. …