Buying a bug transmitter on Amazon without knowing where it is from? Actually it is not a good idea!

“You know what? I bought this spy bug on Amazon, but now I am not able to make it work!” This is a typical comment submitted on Amazon or Ebay after having recklessly purchased the product in question. Actually we have been saying that for long time: before buying any …

KA-101: a full audio monitoring kit fitted with spy bug, receiver and micro recorder

Are you on the fence about the audio monitoring device to be used in your investigation? Well, KA-101 is just the device you need! Not only because it makes a combined use of bug transmitter, RF receiver and mini recorder, but also because it is more affordable than other devices …

Which video bugs are better to use in investigation?

Do you think audio bugs are the only surveillance devices to be used for monitoring rooms or any other environment? If so you’re barking up the wrong tree, because over time investigative technology has increasingly developed UMTS or WiFI video bugs, proved to be very effective in undercovered or remote …

Economic dependence and cheating: a study reveals a possible correlation

A few years ago, on the site of ASA (American Sociological Association) was written up an article concerning a possible correlation between economic dependence on one’s partner and a large number of cheating cases. In the article, the US sociologist Christin L. Munsch, a researcher who spent a long time …

Microregistratori digitali

How to power your mobile phone through your car’s kinetic energy

novembre 23, 2009 Technology No Commenti


Some time ago we have seen, one the pages of this blog, how it is possible, by placing a particular kind of panels on the road near highway exits, to harness and store kinetic energy generated by cars.
The next step will be gathering this kinetic energy directly from vehicles in motion, and using the stored energy to power small electronic devices on board the cars, trucks or planes.

This operation of kinetic energy harnessing will be possible by the application of particular piezoelectric crystals, developed by the City College of New York, about half inch by one inch in size, which can be mounted on the roof of a vehicle, be it a car or a plane, and their vibration would generate an airflow that would be gathered in order to produce a voltage.

At the moment, researchers are working on optimizing the system according to the vehicle on which it is mounted: as you can imagine, turbulence and vibrations to which the crystals are exposed will vary enormously between a car, a truck and a plane.

Of course, the energy generated is not enough to ride a car or to fly a plane, but it could be used to power some small electronic devices inside the vehicle. For example, of mounted on an aircraft, it could be used to supply electricity to the passengers’ portable computers, mobile phones or MP3 players.

Inside a moving car, usage of this kind of system could be used to charge the battery of your mobile phone; in the surveillance field, specifically, it could be very useful to power hidden listening devices such as GSM bugs. In that case, the problem will be how to mount the whole system, including sensors on the roof… Stay tuned, time will tell!

Invisible mobile phones

novembre 22, 2009 Technology No Commenti

Stealth Phone

As we have seen in many previous posts on this blog, our conversations on mobile phone are far from being secure, far from being private and far from interception-proof. On the contrary, cellphone is the means of communications that carries the highest risk of having our conversations eavesdropped by prying ears, which could be interested in extracting information to be used against us, either in the personal life field or in business, especially if high-figure interests are at stake.

The most common mistake is made by thinking that, as far as telephone interception is concerned, it is only the telephone number that is placed under surveillance. By doing this, people think that they can be safe by simply changing the SIM card on their mobile phone, especially when travelling abroad.

Once the card is changed, erroneously believing to be safe, they start talking freely about confidential business. This is a very big mistake, because most of the mobile phone eavesdropping operations are carried out not only by picking up conversations from a specific telephone number, but also by using the IMEI (International Mobile Equipment Identity) number, that is, the unique number that identifies each and every mobile phone on the market.

Every mobile phone has its unique IMEI number that identifies it, and the modern systems for covert listening and eavesdropping are capable of intercepting conversations carried out on a mobile phone, by using this number. Once the handset is being intercepted, changing your SIM card will not protect you from prying ears.

In theory, the solution would be using a different cellphone every time you change your SIM card, but aside from being not so practical, this method does not protect us from interceptions at all, or at least not as safely as it is the case by using an invisible mobile phone, otherwise called Stealth Phone which, instead of requiring to change the SIM card each time, changes its IMEI number upon request, whenever we want and without having to change the handset.

Invisible cellphones are normal Siemens S65 handsets, on which a special software has been installed which, automatically or upon request, interacts with the device’s firmware, thus dynamically changing the phone’s IMEI number. By doing this, it will be as if you are using a different handset each time, without actually changing your phone.

Furthermore, the Stealth untraceable phone is equipped with some sort of built-in firewall which, in the unlikely event of an interception attempt, will immediately send an alert to its user. Once you receive this kind of notification, all you have to do is close the call, change the IMEI number, and you will be able to resume your conversation from where you left it, without fear of any unauthorized listener.

Therefore, the Stealth Phone is a method which guarantees a 100% efficiency to protect the privacy of our conversations. By using a Stealth secure phone we will be protected from unauthorized listeners, and will be able to carry on with our business, or talk to our loved ones, without fearing that our conversations could be intercepted and used against us. To be sure that our counterpart is also protected, and that our conversations are absolutely impossible to intercept, it is recommended that both parties use a Stealth Phone.

For more information about how a secure phone works, as well as to view a wide array of devices for interception defense, you can visit the Endoacustica website.

New analog surveillance cameras with night vision from JVC

novembre 20, 2009 Technology No Commenti


JVC has just announced the launch of four different models of analog cameras for closed circuit surveillance systems, which are capable of working even in extremely low lighting conditions (0.05 lux for color images, 0.006 for black and white), and with an electricity consumption reduced by 40%.

In spite of the fact that the security industry is taking giant leaps towards a widespread usage of digital systems, at the current stage analog CCTV systems are still holding a 90% market share for this kind of installations.

JVC-made Super LoLux surveillance cameras along with their high sensitivity, also feature a high resolution (580 TV lines) and are equipped with a digital signal processor. They also have an automatic electronic shutter, automatic gain controls and a 2.0x digital zoom.

The dome-shaped model is protected against vandalism and attempted theft, so it’s more suitable for outside usage or for protection of places such as banks and shopping malls; its aluminum chassis mounted with special screws provides total protection against any attempt to remove it, while the transparent polycarbonate dome can withstand even the most violent shocks. The box type is equipped with ExDR Plus system, which improves the camera performance in conditions of high brightness, allowing for a better vision of objects or people in the foreground against an illuminated background.

Although the trend of technological advancements is quickly heading towards switching to digital systems with IP transmission, good ole analog systems are still more than able of doing their steady job, even at night!

Spoof Card, beware of identity theft on your phone

novembre 20, 2009 Biotechnology No Commenti


The latest threat against protection from identity theft was born in a relatively innocent way, to play tricks on your friends, but may end up creating a different kind of problems to victims of its use, as well as to its users.

We are talking about the Spoof Card, a mobile phone service which allows its users to keep calling from their usual handset, but while displaying another number as Caller ID. Not only, by using the Spoof Card service it is also possible to disguise one’s voice, turning it from male to female, from boy to old man and vice versa.

In its early days it was mostly used to play innocent tricks on friends, like calling on a friend’s number while he was on holiday, displaying his home number and scaring the hell out of him by making him believe that burglars were visiting his house.

Unfortunately though, as its creators should have foreseen, the usage of such a service can closely border with stalking, with annoying ex-boyfriends sneaking into their ex-girlfriends’ private life, or people who call others who really don’t want to talk to them, forcing them to answer by displaying their office number or so.

In short, despite its creators label Spoof Card as perfectly legal, its use may not always be. To be 100% sure that your telephone identity is protected, it is recommended to provide yourself with the right tools, such as an invisible phone, to protect yourselves from unwanted listening attempts.

To find more information on privacy protection, on how to defend yourselves from identity theft and from intrusions into your personal life, you can visit the Endoacustica site.

Unfaithful husbands, beware of spy mobile phones!

novembre 19, 2009 Technology No Commenti

Secret Love

During the course of our work, we happen to step into strange cases, and situation weirdly funny if they were not true. Such a case happened recently to a female customer of ours, who was getting increasingly suspicious about her husband and asked for our cooperation.

The lady’s husband is often travelling for business, and since approximately one year he started going frequently to Germany, a country he had seldom visited in previous years. This tickled our friend’s female instinct, and she immediately turned to us to ask for some piece of advice.

It took her a while to decide to use a spy mobile phone, that is, a normal mobile phone, enhanced with the installation of an invisible software which turns it into a real spy following its unaware user.

She bought her husband a spy cellphone for his birthday, and he was just happy to start using it right away, without knowing that his every call could be listened to remotely, and any SMS sent or received could be read from his wife, no matter how far. On top of that, a spy phone also works like a listening device, a bug that transmits the sounds around it, even while the phone is turned off.

And thanks to this latter function, our client found out that the reason for her husband’s frequent trips to Germany was not exactly professional, since instead of visiting new potential customers, he was visiting a famed bordello in the outskirts of Frankfurt, a place where a certain kind of pleasure goes hand-in-hand with the city’s business reputation.

I can’t add further details, but sure enough I would not have wanted to be in her husband’s shoes upon his return…

Protection against chemical weapons starts on your iPhone

novembre 19, 2009 Technology No Commenti

iPhone sensor

The threat of terrorist attacks against cities of the industrialized West is always present, even though the common people tend to forget it. Certainly, the governments are not forgetting this threat, and scientific research is also silently working to protect us from enemies as invisible as their weapons, such as chemical agents, that can strike lethally before we can realize.

For example, the NASA is working on a network of sensors for chemical weapons detection, to be installed, go figure, on our mobile phones, or more specifically, on iPhones.

In fact, they are studying a small device, to be connected to an iPhone’s port, made up of a chip which houses 16 microscopic sensors capable of detecting the presence, in the air around them, of dangerous gases, and to inform a central processing center immediately using the phone connection or via WiFi network.
All this is concealed within a tiny device (just 1 cm wide) which does not give much encumbrance to its user. By installing sensors of this kind on every iPhone present in our cities, one could – theoretically – create a huge network for detection of harmful chemical agents.

This network could be used not only to fight a possible terrorist attack, but also (and mainly) to safeguard our health, for example by detecting the level of polluting agents in the city air, and providing valuable information to fight pollution, another invisible enemy which, despite it is not equipped with firearms or missiles, kills certainly more than terrorism.

Sure enough, thanks to everyone’s joint effort, we would have the chance to do something to fight this enemy. Personally, I would warmly welcome a small sensor on my iPhone, if it helps…

Digital micro recorders

novembre 18, 2009 Biotechnology No Commenti


Thanks to the ever increasing miniaturization in size of technological devices, items that a few years ago would have been used only at home took to the streets and to our offices, and became faithful travel companions during our weekend trips or in any leisurely occasion.

A typical example is applicable to digital micro recorders. Once, we were using bulky cassette recorders, which certainly did not have maneuverability as one of their main features, to tape from the radio, from a record or live. Nowadays, the recording is no longer stored on a cassette, but rather saved in an audio file inside extremely small memory cards with enormous storage capacity (up to 32 Gb).

At the same time, the modern digital recorders have dramatically shrunk their size. They can be as small as a cigarette pack or as your car’s remote control, and in spite of their size still be able to record, through high-sensitivity miniature microphones, an extremely clear sound, with an operating time of hundreds of hours.

On the marketplace, you can find several types of digital recorders, as small as a cigarette pack and suitable for several applications: for concerts or leisure, to take quick notes on the go while stuck in a traffic jam, or while participating in a conference or meeting. A micro digital recorder of smaller size, just like a credit card, can instead be suitable for covert recordings, surveillance or espionage operations, or for law enforcement gathering evidence against suspects or criminals.

In a few words, a micro audio recorder can be used in a whole lot of different ways. if you want to know more and to find the right model  for your needs, just visit the Endoacustica site!

Praise for our night vision glasses

novembre 18, 2009 Biotechnology No Commenti


Those who work in the security and privacy field are generally not too prone to boasting, but a letter that we just received makes us feel that there is more to our job than spy gear and surveillance devices, that sometimes we are able to help people in need.

Here is the full text:

“You have no idea how much these Night Vision Glasses have helped me! After a severe retinal detachment, I was left legally blind and with almost no night vision at all. I own a small business, and not being able to function at night has really made it very difficult for me to meet customers after dark. With my new night glasses, I can now get around at night and can do all the things I was not able to do previously.

It’s amazing how Eyenight glasses work! I can now see just as good whether it’s noon or midnight! In the past, I have used many different flashlights in order to get around at night, but it was always difficult, especially on rainy evenings when the light from these flashlights didn’t illuminate sidewalks and steps very well.

Now I can walk down the darkest streets without any fear of tripping over a curb or falling. I was so scared to be out at night before, worried that I would fall. No longer!

I would recommend these glasses for anyone in my same position. I feel like I have my life back!”

I guess there is no comment to be added; just that receiving such letters really strengthens our belief in our job not only as a service, but as a mission. Thanks to all our faithful customers for helping us carry this mission out!

Anti fraud credit cards, with keypad and display

novembre 18, 2009 Technology No Commenti


A new generation of credit cards is being presented during the Cartes exhibition, currently taking place in Paris, and showcasing the latest technologies and developments in the Digital Security field.

The anti fraud credit card, manufactured by Emue Technologies, has the same size of your normal card, but on the inside it contains a battery with an expected life of around 3 years, which powers a processor, a numeric keypad and an E-Ink 12-digit display.

When the cardholder is about to close an online purchase deal, thanks to the numeric keypad he will be able to authenticate the transaction, entering the relevant information and a one-time automatically generated PIN which is shown on the display. This technology has been developed in close cooperation with Visa, to provide a solution for fighting online credit card fraud and usage of clone cards, and is suitable not only for online purchases, but also for those carried out via iPhone applications.

The one-time PIN code has a limited life (generally a few minutes), which makes hackers’ and credit card thieves’ job useless, as they generally are able to obtain only the credit card number, name of the cardholder and CVC 3-digit security code. This information will not be enough to validate transactions carried out via this new card, and actual use will only be possible for those who not only get a hold of the card, but also have the relevant access codes.

Currently, the solution provided by Emue is being tested by some banks in Switzerland, France, Italy and the UK, and in the future it could become the defining standard for security of our credit cards when used online.

Mantis, the largest UK-made unmanned aircraft

novembre 18, 2009 Technology No Commenti


The UK Ministry of Defense has just completed the maiden flight of Mantis, an unmanned aircraft with a wingspan of approximately 20 meters, suitable for long-range aerial surveillance and intelligence gathering operations. Its size makes it the largest vehicle of this kind ever built in the UK, and among the largest in Europe.

Manufactured by BAE Systems, it can be easily dismantled and loaded on a transport aircraft, thanks to the lack of hydraulic parts as it is entirely electrically powered. Thanks to this characteristic, Mantis is capable of being deployed with extreme flexibility, also for carrying military equipment, ammunition and weapons within war zones, especially on rough terrains.

Its high level of automation allows it to automatically detect a sensitive target, and to transmit the relevant information to the ground station, as well as autonomously manage the flight, so that ground operators will only have to concentrate on the quality of intelligence and not on the flight operation, thus reducing any possible risk of mission failure due to human errors.

At BAE Systems, Mantis is labeled as an UAS (Unmanned Aerial System) rather than an UAV (Unmanned Aerial Vehicle) thanks to these automation features, which make it easy to be integrated with other vehicles of this kind produced by the same manufacturer and supplied to the British Ministry of Defense.

It took only 19 months from the first sketches of the project to this maiden flight, thanks to the quick interaction among manufacturers of individual system parts, and the same waiting time is expected before seeing a second version of Mantis, to be developed according to information gathered from this first set of test flights.


maggio: 2020
« Giu    


Newsletter Endoacustica Europe - ENGLISH


Endoacustica Europe srl
Via Umberto Terracini, 47
70029 Santeramo in Colle (BA)
P.IVA IT06836020724
tel. 0039 080 30 26 530
tel. 0039 080 43 73 08 93
fax 0039 080 40 73 11 87

Text ADS

spyphone A Spy Phone or GSM spy cellphone is a normal mobile phone on which has been installed a software able to reply many crucial information such as: listening of all incoming and outgoing calls from the mobile, real time phone surrounding sounds, reading of all type of messages (SMS, WhatsApp, Facebook, Viber etc..) and GPS tracking. The spy software works on the most of Android, iOS, Blackberry smartphones.

digital video recorder Micro digital recorder able to gather evidence or discover any kind of betrayals. Recording capability of up to 1200 hours in continuous. Long duration for those recorders using voice activation system VAS. Just for you the best micro digital voice recorders on the market in terms of efficacy and reliability at a low price.
Wall microphones able to listen through walls thick even up to 70 cm. Ultra sensitive professional stereo microphone, suitable to pick up the lowest noises thanks to its very high sensitive ceramic microphone. Limpid and stable sound. Endowed with sockets for recorder and earpiece.
The phone voice changers when interposed between handset and phone, will change your voice into another one. It transforms any voice into a masculine, feminine, adult or child one.The voice changer can be adapted to cell phones, cordless phones, speakers and microphones, recording systems, or connected to switchboards. The reproduced voice is not a robotic but a human one.
localizzatore rf

Real time trackers are designed for those who need to keep their pets under control, while limiting the relevant cost, but also to locate precious objects or to remember where you parked your car.

anti loss alarm

Anti-drowning defender is an alarm device which combines anti-drowning and anti-loss alarm, and works effectively as an electronic safety device for protecting children or pets from drowning and loss.

Relevant artilcle

Find the exact vehicle position with the QUAD-TRACK tracking module

13 Apr 2018


Real time tracking of cars, motos, trucks, containers etc. Extremely resistant, waterproof/weatherproof device! Are you looking for a compact, efficient and professional GPS tracker to find a vehicle position? Well, in this case Quad Track is the best choice you can make. This brand-new quad band real-time locator system has indeed a higher gear than other similar devices on the market today. For example, it allows to follow the path …

Attention to the new gadgets of thieves

14 Feb 2014

This may be the last discover of ingenious thieves who don’t hesitate to resort to the technology to hit unsuspecting victims. The news of recent months shows several cases where someone complains of being robbed, at home or in the company, after agreeing to unknowns small gadgets, deployed on the street, particularly at the crossings or when the light is red. The hypothesis is that these gadgets (lighters, key chains …

Never lose things again with the geolocation tools

19 Set 2013

The geolocation is getting closer, at your fingertips. We’re all constantly losing things. Keys, bag, charger and many other tools of daily use are very often forgotten, lost. The hard part is finding them. This discomfort could be deleted with the help of geolocation devices. In particular, big companies and startups are trying to answer to the distraction effects with products that will come soon on the market. Their secret would be an accessory, …

Stop mobile phones theft

30 Lug 2013

One hundred twenty thousand a year, ten thousand a month are the mobile phones stolen (or loss). These are the numbers from the homeland of mobile phones, smartphones and tablets thieves: London. The Mayor, Boris Johnson, and the police are really troubled about the weight of these statistics and asked to the same companies devices producing to investigate about what is happening. In particular, they asked to Apple, Samsung and …

Locate a mobile phone with the technique used by bats and dolphins

4 Lug 2013

Locate the exact position of a cell phone in enclosed spaces may become possible thanks to an algorithm that allows us to reconstruct the 3D shape of a room, listening to the echo of the sounds produced inside, even simple ones like the snap of the fingers. The project was developed by a research group at the EPFL. The researchers were inspired by echolocation, the system by which some animals …

Fish-robot will patrol the Thames River

10 Mag 2013

It’s environmental surveillance, the new frontier crossed by the fish-robot that will be released, in the coming months, in the Thames in order to sniff out pollution. Scenes like science fiction movies are recorded during the tests in the water. The robots will be released in groups of five in order to provide a mapping of the critical points and pollutant elements. The search will rely to the sensors built-in …

At the supermarket with the navigator

17 Gen 2013

GPS technology has now numerous applications in daily activities. Keep an eye on the kids, monitor the pet, follow the partner’s car is a cakewalk if you have the right tools. Shortly, it will possible use a sophisticated development of GPS technology in a shopping center or on the shelves of the supermarket so you’ll save time and optimize the product comparison. To lead the tour will be our trusty …

Internet of things will revolutionize our daily

10 Dic 2012

Web 3.0 isn’t yet far away. All the big laboratories are working hard to develop new applications concerning the Internet of things. With this neologism has been named the last frontier of online technology. The strength lies in the possibility given to objects to interact with each other by capturing and exchanging information. The alarm clock may sound for example in advance once found, through the Internet, heavy traffic conditions. …

Hop! the suitcase that follows you

13 Nov 2012

Pack your bags is always a problem. Weather conditions, formal and informal dresses, comfortable and casual, but also suited to special occasions that may occur…In short, a grind. And what often we create is a baggage too heavy and almost entirely useless. About 25 years ago, a pilot of the Nortwestern Airlines tried to obviate to the problem of having to lift heavy luggage introducing the trolley as we know …

Even sharks tracked with GPS

22 Ott 2012

Until recently, GPS tracking systems were used for the control of small animals. Now the GPS challenges even the most dangerous animals. Indeed, it is in an experimental phase the scientific mission of the American non profit association, Ocearch, led by Chris Fischer. During the operation, the sharks are caught, mainly in North America, and to them is applied a GPS tracking device, then they come back to the sea. …