An Advanced micro helicopter At Virginia Tech University, a group of researchers is at work on designing an unmanned helicopter which, due to its characteristics, is one that its creators hope that they will never have the chance to use. In fact, it is designed to be used for reconnaissance
Digital video recorders to expose cases of bribery
Digital Video Recorders? When it comes to having the possibility of using one’s position and power in the political arena, no matter how small or big, for a personal gain, the world is all the same, no matter which side of the fence one sits in. So, at any latitude,
Flying man really exists
Flying man? Human flight device is nowadays really possible. Or at least, it is for those who can afford to spend at least 70000 dollars for this toy, which can turn anyone into a real jet man into a flying man. Manufactured by Martin Aircraft Company, a firm based in
A high security USB drive
One of the main reasons for headaches, when using USB sticks to transfer data files from one computer to the other, especially if the transported files contain sensitive or private data, is that the key may, one way or the other, end up in the wrong hands, along with the
Stealth Phone, the untraceable phone
Untraceable Phone? Those who, either professionally or as simple users, are involved with telecommunication security, know that encryption of telephone calls makes them more difficult to be bugged, but not impossible, especially if only one of the two users engaged in a conversation is using an encrypted mobile phone, while
Mobile phone bugging is now made easier
Mobile Phone Bugging? If you are using your mobile phone frequently, especially for private and confidential conversations, or if because of your work you always have the handset on to carry out negotiations or exchange information, a small piece of news which appeared on newspapers worldwide should legitimately sound as
Stealth Phone and anonymous SIM card, for an absolute privacy
Anonymous SIM card? More than once, on this blog we mentioned the Stealth Phone, that is, a mobile phone which, thanks to a piece of software discreetly installed, is capable of working on the IMEI (International Mobile Equipment Identifier) number, which unequivocally identifies each and every cellphone in the world,
Micro Earpiece: Equipment No Surveillance Agency Can Afford to Neglect
Jagson Global Network was a private detective agency run by Mr. Steve Jagson. He had a small team of eight detectives and its office located at the top floor his apartments. Jagson had over twenty years of experience in detective and surveillance activities. The agency was just four years old
An Illegal Empire Comes Down Crashing
Illegal Empire comes Crashing due to a wireless earpiece? This was going to be a never before opportunity for the City Police Department. They got an inside information that Mr. Robin Leister was hosting a big bash on his marriage anniversary; and many people wanted by police were expected to
How to turn a mobile phone into a bug
Ever heard of a mobile phone bug? One of those actions that we take automatically and without thinking, such as turning off our mobile phone, is basically just like hanging a “Do Not Disturb” sign outside a hotel door when we want to sleep a bit more, and allows us