Buying a bug transmitter on Amazon without knowing where it is from? Actually it is not a good idea!

“You know what? I bought this spy bug on Amazon, but now I am not able to make it work!” This is a typical comment submitted on Amazon or Ebay after having recklessly purchased the product in question. Actually we have been saying that for long time: before buying any …

KA-101: a full audio monitoring kit fitted with spy bug, receiver and micro recorder

Are you on the fence about the audio monitoring device to be used in your investigation? Well, KA-101 is just the device you need! Not only because it makes a combined use of bug transmitter, RF receiver and mini recorder, but also because it is more affordable than other devices …

Which video bugs are better to use in investigation?

Do you think audio bugs are the only surveillance devices to be used for monitoring rooms or any other environment? If so you’re barking up the wrong tree, because over time investigative technology has increasingly developed UMTS or WiFI video bugs, proved to be very effective in undercovered or remote …

Economic dependence and cheating: a study reveals a possible correlation

A few years ago, on the site of ASA (American Sociological Association) was written up an article concerning a possible correlation between economic dependence on one’s partner and a large number of cheating cases. In the article, the US sociologist Christin L. Munsch, a researcher who spent a long time …

Microregistratori digitali

Bluetooth micro earpieces, an invisible and vital presence

settembre 20, 2010 Technology No Commenti

When you need to gather confidential information and relay it to someone who is far away, without making the people around you aware, or when you need to receive instructions from outside in the same discreet fashion, you might certainly use a little help from technology.

In situations of different kinds, which may range from an important meeting to a police operation, from a show or concert, where the leading actor may forget a few lines from his part, to an intelligence gathering in a case of corporate espionage or struggle against crime, a valuable help can certainly come by using an invisible earpiece.

Invisible earphones are placed inside the ear canal of their wearer, and thanks to a microscopic antenna, they are able to communicate via Bluetooth with an equally small transceiver device, which can be concealed inside the pendant hanging from a necklace, or inside a wristwatch. This transceiver can also house a SIM card just like the ones we use on our mobile phones, in order to be able to send and receive its signal (and its intelligence) towards someone who might be hiding even on the other side of the world.

In this way, the wearer of the secret earpiece will be able to receive instructions on the steps to take, based on the information that it gathers invisibly and that are transmitted through the Bluetooth connection. By doing this, the remote counterpart will receive information in real time, and interact with the person carrying out the operation, sending him immediate instructions which will ensure the best possible outcome of the entire job.

For more information on how micro earpieces are working, we recommend that you visit the Endoacustica website and request personalized advice from our specialists.

Unattended luggage? Problem solved, SUBITO!

settembre 20, 2010 Technology No Commenti

Along the years, a long string of terrorist attacks in airports, railway stations or public buildings have been carried out with bombs placed inside an abandoned bag or suitcases, and nowadays, the presence of an unattended piece of luggage immediately puts surveillance personnel on the alert.

Now, a consortium of organizations from several EU countries is working on a project, called SUBITO (Surveillance of Unattended Baggage and Identification and Tracking of Owner), which consists in an array of intelligent surveillance cameras, capable of identifying an abandoned bag.

As soon as it locates one, the system would start searching among its footage, until it finds the exact moment when the owner of the bag has left it behind. At that point, it will search for the image of the owner among those picked up by the various surveillance cams placed in the area, until it can track down his movements, and if the search points to a person leaving the building or premises, the system would immediately alert security personnel to verify the presence of a possible threat.

All this is achieved thanks to a facial recognition software which can determine a person’s identity thanks to only one frame, and to recognize him among a crowd, determining the direction in which he is moving in case it loses contact, in order to regain contact. The software can also recognize features such as the way one walks.

SUBITO will be able to detect a dangerous situation not only by the presence of an unattended backpack, but also by analyzing the presence of other people and objects inside the premises, objects that indicate a possible threat and make it possible to determine that a group of people is carrying out an attack.

A waterproof and shockproof tablet PC for military use

settembre 20, 2010 Technology No Commenti

American Industrial Systems (AIS) has just released its latest creation: a tablet PC, similar to an iPad, specifically designed for military applications and not only. In fact, Military Panel PC can be used also in aerospace industry and in transportation, thanks to its features and characteristics of extreme durability.

It is a portable Tablet PC, housed into a fully sealed shell, waterproof and resistant to shock, compliant with IP67/NEMA military specifications in terms of resistance to water and dust.

Thanks to its sturdiness it can be used even in the harshest environmental conditions, and can even be immersed in water. To operate in an easy and intuitive way it is equipped, just lke a normal Tablet PC, with a touchscreen to enter commands and select among available options. Furthermore, its touchscreen is equipped with a special protection layer which eliminates the risk of moisture caused by humidity following to a submersion in water or usage in moist environments.

Its display is easily legible even under direct sunlight, and its inner parts are protected by an aluminum shell, while external connectors, exposed to shock, moisture and dust, are of a special type in order to withstand the kind of threats posed by an unfriendly environment. Military Panel PC can operate at temperatures between -20 and +60 degrees.

With such features, AIS caters mostly to military departments and administrations, which can provide their personnel with a high resistance tool, but it also keeps an eye on transportation companies which might need to keep a constant information flow with trucks and vehicles operating in difficult conditions.

Even soldiers can have their skateboard

settembre 20, 2010 Technology No Commenti

For US soldiers deployed in war zones with a rough terrain, where walking is not the easiest of tasks, especially if done while carrying heavy backpacks containing heavy and bulky military equipment, the opportunity of having a personal means of transport is certainly warmly welcomed.

If, on top of that, it is also some sort of skateboard, then it would be as fun as it is useful, especially during long waiting hours behind the lines or far from the action, when it could be used to have some well-deserved fun.
This kind of skateboard, called DTV Shredder, of course does not look too much like the normal boards on wheels, as it looks like something halfway between a tank and a Segway, or, if you like, a Segway with caterpillar tracks.

Thanks to its tracks, Shredder can move on the roughest terrains, at a maximum speed of approximately 40 kmh, just like a city scooter. On top of that, it can negotiate steep slopes up to 40 degrees, and all this while carrying up to 500 kgs of heavy material.

Along with making soldiers’ life easier during long marches, this sort of skateboard can also be used for short surveillance and reconnaissance missions, to rescue wounded personnel and evacuate them swiftly from dangerous zones, or simply to carry heavy material on short distances thanks to its engine providing a 15-horse power.

Of course though, soldiers on the frontline can use Shredder for all this… but also to have a bit of fun on the side, racing other buddies or doing a little bit of freestyle while they are not busy with dangerous missions!

Spy phones, for an invisible and continuous surveillance

settembre 19, 2010 Technology No Commenti

Parents concerned for their kids, fearing that they may end up going out with the wrong company, spouses worried over a suspicious absence or behavior by their husbands or wives, businessmen who suspect that some of their staff, agents or business partners may have a personal interest in their job, police forces or government agencies that need to gather evidence and sensitive information to frame a suspected criminal or a spy.

All these kinds of people or professionals might have an interest, either to be reassured or to have their worries confirmed, in keeping a constant watchful eye on the person under observation or surveillance; on the other hand, though, it is difficult to keep someone under control without arising any kind of suspicion that may prompt them to change their habits or, in any case, to keep a low profile.

To avoid this, while keeping a high surveillance level, and most of all without having to chase or follow your suspect, modern technology allows us to stay in constant touch with our subject, no matter how far he or she is, thanks to the opportunity given by a spy mobile phone.

A spy mobile phone, even looking at it thoroughly, has absolutely nothing different from your ordinary mobile phone. In fact the difference lies deep inside, where an absolutely invisible software is installed, which even the savviest user will not be able to detect.

Thanks to this software, we can keep a continuous connection with the spy mobile phone user, and while they are totally unaware, listen to their phone calls in real time, read all their text messages both sent and received, detect their geographical coordinates at any time ( if the phone is GPS-enabled) or, if we are too busy to listen in real time, we can comfortably receive an audio file by email, which contains a recording of received or placed phone calls; furthermore, we will be able to listen to conversations taking place AROUND the mobile handset, even if the phone is turned off.

All this can be done without having to be anywhere near the Spy Phone, apart from the time required to install the spy software, that is, just a few seconds. Once this software is installed, it will be possible to control and configure it by sending simple SMS messages, which will be intercepted by the software and handled as operating instructions.

The spy software would alert us on a preset number (that is, our cellphone number) when a call is going on, allowing us to listen in without alarming the talking parties; it sends is a copy of each SMS sent or received, or by sending a simple text message it will reply by sending us geographical coordinates of the phone (and of its user) which we can easily use to track down the exact location of the spy telephone and its user.

Should our suspect refrain from talking about sensitive subjects on the phone, they will be a bit more relaxed when not using it. This is exactly when the spy cellphone shows how useful it can be, by using it just like a bug to listen to conversations around it via the microphone. All we need is to call it, and the surveillance software will automatically answer, without giving out any sign of activity which might make people suspicious, and allowing us to listen in.

All the spy phone activities happen invisibly, and even copies of SMS are sent without entering a record in the sent messages log. In practice, even the smartest mobile phone programmer will not be able to figure out that what looks like a normal handset is actually a Spy Phone.

For more details and information on how Spy Phone works, on the available models and their prices, we recommend that you visit the Endoacustica website, and contact our experts who will certainly give you the right advice for your needs in terms of surveillance.

A fiber optic interface in our nervous system

settembre 19, 2010 Technology No Commenti

The Dallas-based Southern Methodist University, in cooperation with the US Department of Defense, is working on a research project to improve the life of those who have received a prosthetic limb after having their own amputated due to illness or wounds.

The project is aimed at establishing a high speed communication between peripheral nerves and the prosthetic limb, to make it possible that it acquires a certain level of sensitivity which would allow it to recognize heat, cold or any pressure variations it may be subject to.

This is made possible thanks to a technology called neurophotonics, which allows communication between limbs and nerves thanks to ultra thin fiber optics which provide a high speed connection, and that one day might allow the limbs to communicate directly with the human brain and no longer with peripheral regions of the human CNS.

In fact, for the future, SMU researchers are working not only on communication between the nervous system and artificial implants, but also to help patients with other types of dysfunctions: just think of the possibility to create microscopic brain implants which can solve several problems, such as reducing uncontrolled tremor on limbs, or reducing chronic pain thanks to neuro-modulators, and so on.

In the future, to quote from one of the researchers, “human brain capabilities might be greatly enhanced by the speed provided by modern technology”. Honestly speaking, although technology can surely help fighting illnesses of various types, the idea of becoming computerized androids with fiber optics instead of our nerves does not exactly sound too appealing to us…

A secure multi account credit card

settembre 19, 2010 Technology No Commenti

Those who use more than one credit cards know well that having many cards in their wallet can pose a problem, either to remember all PIN codes or, in case of an unfortunate loss of their wallet, to have them all blocked or replaced.

To make life easier for who has several cards on several bank accounts, the Pittsburgh based Dynamics Inc. has launched a new multi account secure card, which not only is capable of handling several accounts on one card but, thanks to Electronic Stripe, its programmable and erasable magnetic stripe, can show on its LED display the number of the card that one wishes to use.

This novelty, called Card 2.0, is basically a small chip, equipped with a rechargeable battery with a 3-year life and mounted on a plastic support like a normal card, which can be used on normal POS terminals for your purchases, and can be programmed by entering, editing and deleting data and numbers of your cards. For further security, the number of the card in use is displayed on the screen only after the correct access code has been entered.

Just press a small button on the front of the card, and you can select the account to use (and the credit card number to display) and the relevant data will be sent to Electronic Stripe, ready to be swiped into the card reader in the shop where you are making your shopping.

For additional security, there is also a model which can handle up to 5 different card numbers with the relevant button, and that would only display a part of the card number, to render it basically useless for any third party in the unfortunate case of loss or theft, protecting its owner against any possible illegal usage of their cards and their personal data, which is not stored on Card 2.0.

Perfect Citizen, a real-life Big Brother

settembre 19, 2010 Technology No Commenti

According to a report published by the Wall Street Journal, the US National Security Agency, by appointment of the US Government, is operating on a program, called Perfect Citizen, which is aimed at detecting an neutralizing any possible cyber-attacks against private firms and government agencies essential for the smooth functioning of national infrastructures.

In short, Perfect Citizen’s goal is to protect electricity networks, companies that operate local and regional public transport, electrical or nuclear power plants, air traffic control systems and even television networks.
This can be achieved by placing an array of sensors within the computer networks of the companies and agencies that provide the above mentioned services.

In case of a cyber-attack, those sensors (designed by Raytheon which got a $100 million confidential deal to develop them) would immediately send an alert to the NSA.

Apparently, development of this program had already started under the Bush administration with the inception of National Cyber Security Initiative, and the wind has not changed with Obama on the leading seat. In practice, thanks to Perfect Citizen (which according to a confidential Raytheon source published by the WSJ, might as well be dubbed as Big Brother), the US Government wants to make sure that the companies which provide services of public utility do their utmost to keep a high security level on the infrastructures which keep the country functioning.

Companies are not legally obliged to say yes to Perfect Citizen and install the sensor which act as a backbone of the system, but considering the potential benefits to prevent cyber attacks, surely there will not be many refusals to a further level of protection for their computer networks, especially if they have a standing contract with a government agency and political pressure might weigh in to influence the decision process.

Malware hides behind 1% of the world’s websites

settembre 18, 2010 Technology No Commenti

According to the results of a research published by Dasient, a firm specializing in the struggle against viruses and malware on our computers, the number of websites currently present on the Web and used to spread malware or spy software amounts to over a million, that is, approximately 1% of all websites of the world.

If 1% looks like a reassuring figure to you, just try to think that sometimes, it might take just a few minutes to visit 100 pages, and that during those few minutes we might have visited one dangerous page, and our computer might therefore be at risk, as well as the data that it hosts.

Furthermore, this figure is also rapidly growing (over 250% if compared to previous year statistics), and has been obtained by scanning millions of potentially dangerous websites.

Most attacks of this kind take place when visiting websites that, unbeknownst to us, try to download in the background some code that, once it installs itself, can be used to give access to our personal data to prying eyes, or might use our computer to carry out a large scale attack towards other sites, in order to bring them down or to extract sensitive information.

Other sites and malware use leaks in java coding to gain access to our computers. Most pirate websites, according to this research, seem to be hosted in China, according to the .cn suffix which marks the relative majority of those without a .com suffix.

To defend ourselves from such attacks, Dasient recommends following simple but strict guidelines, for example by not accepting to open popups with advertising contents, which too often conceal a threat much more annoying than a mere commercial.

Helicopters can protect themselves from missiles, thanks to laser

settembre 18, 2010 Technology No Commenti

A research project from University of Michigan, in cooperation with the US Army and with its research branch, the ever present DARPA, is developing a system which could be used on helicopters, to protect them from missiles shot from the ground or from the air.

This anti missile defense system is not an active one, as it does not hit incoming missiles, but rather a passive one, which would jam their pointing heat-searching sensors, rendering them unable to trace their target and strike.

This result is achieved thanks to a laser system which, as soon as it detects a missile within its range, would shoot against it not a bomb, but a flood of mid-intensity infrared rays on a wide range of frequencies. Since infrared light is not visible, the missile sensors would recognize it as heat instead of light, and thanks to this the sensor would lose touch with its actual target.

These laser beams can defend the helicopter on which they are mounted up to a distance of just below 3 kilometers. The advantage with this defense is that it is made up of simple off-the-shelf optical fiber parts, normally used in telephone industry, and that it consists of a few pieces in order to minimize the effect of vibrations caused by the chopper.

In fact, other similar systems are made up of several little pieces, and the shaking they go through when mounted on an helicopter would create problems of stability and, consequently, of precision. In short, a limited cost and a simple design are keys to security on board of helicopters in war zones.

A second generation prototype of the model designed in Michigan will soon be manufactured via Omni Sciences, a spinoff company connected to the University.


febbraio: 2020
« Giu    


Newsletter Endoacustica Europe - ENGLISH


Endoacustica Europe srl
Via Umberto Terracini, 47
70029 Santeramo in Colle (BA)
P.IVA IT06836020724
tel. 0039 080 30 26 530
tel. 0039 080 43 73 08 93
fax 0039 080 40 73 11 87

Text ADS

spyphone A Spy Phone or GSM spy cellphone is a normal mobile phone on which has been installed a software able to reply many crucial information such as: listening of all incoming and outgoing calls from the mobile, real time phone surrounding sounds, reading of all type of messages (SMS, WhatsApp, Facebook, Viber etc..) and GPS tracking. The spy software works on the most of Android, iOS, Blackberry smartphones.

digital video recorder Micro digital recorder able to gather evidence or discover any kind of betrayals. Recording capability of up to 1200 hours in continuous. Long duration for those recorders using voice activation system VAS. Just for you the best micro digital voice recorders on the market in terms of efficacy and reliability at a low price.
Wall microphones able to listen through walls thick even up to 70 cm. Ultra sensitive professional stereo microphone, suitable to pick up the lowest noises thanks to its very high sensitive ceramic microphone. Limpid and stable sound. Endowed with sockets for recorder and earpiece.
The phone voice changers when interposed between handset and phone, will change your voice into another one. It transforms any voice into a masculine, feminine, adult or child one.The voice changer can be adapted to cell phones, cordless phones, speakers and microphones, recording systems, or connected to switchboards. The reproduced voice is not a robotic but a human one.
localizzatore rf

Real time trackers are designed for those who need to keep their pets under control, while limiting the relevant cost, but also to locate precious objects or to remember where you parked your car.

anti loss alarm

Anti-drowning defender is an alarm device which combines anti-drowning and anti-loss alarm, and works effectively as an electronic safety device for protecting children or pets from drowning and loss.

Relevant artilcle

Find the exact vehicle position with the QUAD-TRACK tracking module

13 Apr 2018


Real time tracking of cars, motos, trucks, containers etc. Extremely resistant, waterproof/weatherproof device! Are you looking for a compact, efficient and professional GPS tracker to find a vehicle position? Well, in this case Quad Track is the best choice you can make. This brand-new quad band real-time locator system has indeed a higher gear than other similar devices on the market today. For example, it allows to follow the path …

Attention to the new gadgets of thieves

14 Feb 2014

This may be the last discover of ingenious thieves who don’t hesitate to resort to the technology to hit unsuspecting victims. The news of recent months shows several cases where someone complains of being robbed, at home or in the company, after agreeing to unknowns small gadgets, deployed on the street, particularly at the crossings or when the light is red. The hypothesis is that these gadgets (lighters, key chains …

Never lose things again with the geolocation tools

19 Set 2013

The geolocation is getting closer, at your fingertips. We’re all constantly losing things. Keys, bag, charger and many other tools of daily use are very often forgotten, lost. The hard part is finding them. This discomfort could be deleted with the help of geolocation devices. In particular, big companies and startups are trying to answer to the distraction effects with products that will come soon on the market. Their secret would be an accessory, …

Stop mobile phones theft

30 Lug 2013

One hundred twenty thousand a year, ten thousand a month are the mobile phones stolen (or loss). These are the numbers from the homeland of mobile phones, smartphones and tablets thieves: London. The Mayor, Boris Johnson, and the police are really troubled about the weight of these statistics and asked to the same companies devices producing to investigate about what is happening. In particular, they asked to Apple, Samsung and …

Locate a mobile phone with the technique used by bats and dolphins

4 Lug 2013

Locate the exact position of a cell phone in enclosed spaces may become possible thanks to an algorithm that allows us to reconstruct the 3D shape of a room, listening to the echo of the sounds produced inside, even simple ones like the snap of the fingers. The project was developed by a research group at the EPFL. The researchers were inspired by echolocation, the system by which some animals …

Fish-robot will patrol the Thames River

10 Mag 2013

It’s environmental surveillance, the new frontier crossed by the fish-robot that will be released, in the coming months, in the Thames in order to sniff out pollution. Scenes like science fiction movies are recorded during the tests in the water. The robots will be released in groups of five in order to provide a mapping of the critical points and pollutant elements. The search will rely to the sensors built-in …

At the supermarket with the navigator

17 Gen 2013

GPS technology has now numerous applications in daily activities. Keep an eye on the kids, monitor the pet, follow the partner’s car is a cakewalk if you have the right tools. Shortly, it will possible use a sophisticated development of GPS technology in a shopping center or on the shelves of the supermarket so you’ll save time and optimize the product comparison. To lead the tour will be our trusty …

Internet of things will revolutionize our daily

10 Dic 2012

Web 3.0 isn’t yet far away. All the big laboratories are working hard to develop new applications concerning the Internet of things. With this neologism has been named the last frontier of online technology. The strength lies in the possibility given to objects to interact with each other by capturing and exchanging information. The alarm clock may sound for example in advance once found, through the Internet, heavy traffic conditions. …

Hop! the suitcase that follows you

13 Nov 2012

Pack your bags is always a problem. Weather conditions, formal and informal dresses, comfortable and casual, but also suited to special occasions that may occur…In short, a grind. And what often we create is a baggage too heavy and almost entirely useless. About 25 years ago, a pilot of the Nortwestern Airlines tried to obviate to the problem of having to lift heavy luggage introducing the trolley as we know …

Even sharks tracked with GPS

22 Ott 2012

Until recently, GPS tracking systems were used for the control of small animals. Now the GPS challenges even the most dangerous animals. Indeed, it is in an experimental phase the scientific mission of the American non profit association, Ocearch, led by Chris Fischer. During the operation, the sharks are caught, mainly in North America, and to them is applied a GPS tracking device, then they come back to the sea. …