Laser Microphones

laser microphone

Can Spy On:

Anybody with a window.

How It Does It:

Here’s the thing about “bugs,” even if they’re attached to living cockroaches. They have to emit radio waves in order to transmit their signal back to the listeners, which means they’re pretty easy to detect. With the right tools you could scan your apartment right now to see if the feds are listening in.

All they need is a laser microphone. Sound is nothing more than vibrations created in the air. Your thin windows vibrate ever so slightly with every sound (the same principle that lets a certain pitch of voice break glass). So if somebody outside your house can capture that vibration, they can “hear” what’s being said quietly inside the room.

It’s very easy to do. All they need to do is fire a laser at the glass at an angle, and set up a second device to “catch” the reflecting beam. As you talk, the sound wiggles the window, which makes the beam bounce. The listening device can interpret those bounces and translate them back into sound.

Of course, this kind of expensive, high-end device is only available to spy agencies… oh, wait, no: Here’s a guide on how anyone can make their own laser listening device with stuff you can easily buy off the shelf.

But you’ll see this laser beam firing through your window, right? And probably see the red dot on your wall and assume there’s a sniper out there? Not quite. The device doesn’t need visible light to work. You’ll never know they’re doing it. Isn’t science awesome?

CCTV Systems

small camera

Nowadays, video cameras have become one of the most common things used by many people. Different people use them for different purposes. Some people use cameras while enjoying with their families & to capture those memorable moments; whereas, some people use them for security purpose.

Today, security being one of the biggest concerns, installation of a well enhanced security unit has become very important. You will find many enhanced video cameras available in the market. CCTV is one of those video cameras used for securing many places like: Railways, Airports, Banks, Malls, Jewelry shops, very sensitive areas where most of the criminal activities are likely to take place.

The CCTV system helps to transmit signals to a specific place & on limited set of monitors. These are mostly those areas which are under surveillance. It is very important for government to keep these places very secure and under observation throughout the day. In order to secure all these places and keep a watch on activities happening, CCTV’s (also known as Surveillance cameras) are installed at these sensitive areas.

CCTV system has succeeded in controlling the criminal activities; however, it has not completely eradicated them. These units are big evidences for any criminal activities that take place. Along with the installation of these units, it is also important to monitor these areas thoroughly.

Also, other important units in this system are spy gadgets. They are the advanced versions used to secure your place. These spy gadgets can be used by any individual as they come in various portable equipments like your mobile phone, pen, your AC adapter, ladies purse and your sun glasses etc.

These equipments help you to secure many places and also protect you from any outside threat. These gadgets are portable and easily available in the market.

Hi-Tech Spy Equipments

In this hi-tech era, whether you have to monitor your employees in the office or to inspect your children’s mobile phone that what are they doing, spy surveillance system must be required for the monitoring. In this competitive era, no one has enough time to monitor their employees as well as their children physically. So, the importance of spy equipment in terms of mobile or hidden cameras is crucial to monitor your employees’ or children’s activities by sitting anywhere. There is no any need of inspection by going here and there if you have already installed spy system in your office or the place where you need to monitor.

If you have installed the spy surveillance system in your office, it doesn’t mean that you can monitor your employees securely and safely. You will have to install the latest and updated spy software from which your monitoring could accurate, easy and reliable. Means, you will always have to update about your spy equipments and the software which are to be used in it. There are various kinds of spy equipments available in the market and you can purchase it as per your custom needs and requirements, that too within your financial budget. Have a glance on these equipments which are mentioned below:

  • Pen Spy Camera

It’s like a small tiny surveillance system which acts deliberately as a spy cam and no one can believe it. Such pen is ideal for convert surveillance by putting in your pocket and you can record it in an easy and convenient way.

  • Hidden Camera in Glasses

It’s one of the most secret ways to record each and every moment you want to record your employees’ activities in the office. In this equipment, camera is fitted in the glasses and it’s one of the popular surveillance systems.

  • Spy Camera in Your Watch

It’s another amazed way to record the activities of your employees or children at office or home respectively. Who can imagine that your watch is equipped with hidden camera and you are recording each & every activity in a very convenient, comfortable and reliable way.

  • Spy Mobile Camera

There are many hi-tech mobiles available in the markets which are equipped with high quality camera. Theses mobiles are also used as a surveillance system. Although, it’s not a secret way for spying activities however it’s used because there is no any need of installation spy cameras.

Spy Technology – Top 5 Gadgets Available to the Public

Throughout the years, there have been many dazzling bits of spy technology that have wowed the crowds and left them wondering, “what if that was possible?” In many cases, this equipment has become a reality and is available in stores and online to any customer willing to make the purchase. Some types of “spy technology” are used in our daily lives. The Top Gadgets Available There are five primary espionage movie gadgets available to the public for purchase. These include: 1. Microchips 2. Flashlights with extra features 3. Incredible watches 4. Remote monitoring equipment 5. Mobile phones Microchips Microchips are becoming smaller and smaller. As a result, they are in nearly every piece of equipment around. In espionage movies, microchips would act as a “homing beacon” or global positioning system (GPS) to track the hero. They would typically be embedded in his jacket or on another other article of clothing. Although this type of “spy technology” isn’t standard in microchipping a human, many animal shelters provide this service. GPS systems are available in most mobile devices to track where your friends or children are currently located. Flashlights with Extra Features In the movies, the hero had a flashlight that had many functions. Currently available to consumers are flashlights that also work as a two-way radio in the case of an emergency. Other common elements found on a flashlights include laser pointers, UV lighting, laser sights, sirens, mobile device chargers and blinking lights for emergencies. Incredible Watches Watches in espionage movies always had to be flashy while multifunctional. Current watches provide audio recording and display video with microcard expansion storage. Other features include small weapons, a USB drive, a mobile phone and a screen to play recordings. The bulkier the watch, the more features it can provide. Remote Monitoring Equipment Espionage movies often show a hero monitoring a villain from some type of device. Remote monitoring equipment currently serves many purposes in modern society. Web cams and home surveillance equipment can help you see into your residence from a remote location. This is also beneficial for businesses, banks, laboratories or any other type of area that needs monitoring. There’s even an entire industry devoted to hidden cameras. Mobile Phones Mobile devices are used by most of us daily. We live in a fast-moving, need-an-answer now society. Mobile communication allows us to be connected at all times and has had a major impact on all societies. Previous spy technology depicted in movies involved shoe phones, small two-way buttons to click and chat and satellite phones. Although advanced at the time, mobile phones have evolved beyond that technology to offer so many more features. Mobile phones offer games, cameras, texting, video recording, video chat, internet access, email access and much other advancement from the shoe phone. The gadgets used in various espionage movies over the years have surpassed our wildest dreams. The equipment of the future has become the advancements of today. Who knows, the gear we are impressed with in movies today, could be available to consumers in the near future.

Total protection from eavesdropping, thanks to the invisible mobile phone

Important Calls

Since the beginning of time, men have always been dreaming about being able to fly, being invisible or talk freely wherever they are without anyone else listening, Unfortunately, as far as the first two dreams are concerned, your blogger is not able to assist, but he can surely give you good suggestions to talk without being listened to, specifically when you are on your mobile phone.

Conversations carried out through the GSM network, in fact, are much less private than we can actually imagine, and the network provider can listen to our phone calls at any time. But if you are taking the appropriate measures, for example by using an invisible cellphone, no one will ever be able to listen to your calls, which will remain as private as you want them to be.

Stealth Phone works according to the principle that it’s not the mobile phone number that is being intercepted, but it’s rather the handset itself. Therefore it is completely useless, if not dangerous, to change your SIM card, and then keep using the same handset, to make highly confidential calls, either of a personal or business nature.

Mobile phone interception is not based only on the telephone number, as one may think, but mostly on the IMEI number, that is, the number which identifies each single handset in the world. In order to protect yourself from an unwanted listener, you should theoretically change your phone, but this option comes with its risk as well.

Therefore the safest option is to keep using your mobile phone as you would normally do, but after providing yourselves with a Stealth mobile phone, a handset which changes its IMEI number dynamically. For example, it can be set to change the IMEI number after every call, and for those who try to intercept you it will be as if you are using a different phone every time you place a single call.

Generally, the calls that we wish to keep private are directed towards one number, for example our business partner, our spouse or… our lover! So, if someone wants to listen to our calls but can not do it because we are equipped with a Stealth untraceable phone, they should intercept conversations from our counterpart’s phone.

At this point, to keep these calls 100% private, all you need to do is simply make sure that also the person you are talking to is using a Stealth phone. By doing this, protection from unauthorized eavesdropping is absolute and total, you will be able to talk in absolute freedom and your private calls will remain private.

The Stealth cellphone is derived from a normal Siemens S65 phone, on which a special software is installed which generates a random IMEI number upon request, interacting with the handset’s firmware. Furthermore, Stealth Phone also features a protection similar to your home computer’s firewall, which would immediately notify you in the unlikely case of an eavesdropping attempt.

All you have to do in this case is close the call, generate a new IMEI code, and you will be able to restart the conversation where you left it. To obtain more information on how the invisible Stealth mobile phone works, you can visit Endoacustica, where you can find answers to all your question in the privacy protection field, to protect yourselves as well as your business and loved ones.

Recharge your mobile phone with alcohol, just like a cigarette lighter!

As of now, you can recharge your cellphone as if it was a lighter, but fortunately, you will not be able to use it to light a cigarette! In fact, Toshiba has just announced the launch, as of 29 october, of Dynario, an alcohol battery charger which, once its small fuel tank is filled with methanol, is capable of supplying power to recharge two mobile phones, MP3 players or small electronic devices, connected via a USB cable.

To fill up the alcohol tank, you just need 20 seconds, and once this simple task is carried out, you will have at your disposal a comfortable self-powered battery charger, that you can use also when travelling, for example on a train or a bus where there are no electricity plugs. Thanks to the optimization of the methanol flow, Dynario is a source of stable and continuous power, perfectly suitable for applications such as, as mentioned above, recharging mobile phones, small gadgets or pocket-sized electronic devices.

Futrhermore, its performance is also stabilized by adding a lithium-ion battery, which is powered by the methanol itself and serves as a backup power source when the tank runs out of alcohol. Maybe you will not be able to take it with you on a plane due to the flammable liquid ion the inside, but under this point of view, the ethanol battery charger is compliant with all security regulations.

If you want to put your hands on a Dynario, though, you have to go a long way, and do it quick, as it will be available only in 3000 pieces, which can only be ordered on the Japanese market through the Toshiba website.

A spy phone will protect your children


Any parent knows that, during the age of growth, our kids’ curiosity, and their natural ingenuity which makes them trust anyone, may expose them to serious danger, for example when meeting people who, behind a respectable face, turn out to be real monsters.

Unfortunately it is not always possible to be physically near our children, but fortunately, technology lends us a hand, thanks to the introduction of spy phones.

A spy phone, on the outside, looks exactly the same as an ordinary handset. What makes it different is on the inside, thanks to the installation of an absolutely invisible piece of software, which allows a third party to listen to the user’s conversations in real time, while the latter is completely unaware.

Furthermore, it can send to a third party number, a copy of all text messages (incoming and outgoing), as well as a list of all calls placed and received, and if this software is installed on a phone that supports GPS mode, even geographical coordinates of longitude and latitude of the phone’s current location, to track down the phone and its user at any time.

And if your son’s handset is off, no need to worry: you can call from your preset number, and listen to his conversations, even while the phone is off.
In fact, the spy software is capable of using the mobile phone’s microphone as if it was a covert listening bug, and if you call it from your mobile, it will recognize your call and will immediately allow you to listen to what goes on around it, without giving out any visible sign of activity.

And if you smell danger, you can request the geographical coordinates and act immediately!

GPS Puzzle Box: It started out as a wedding gift…


It was originally born as a wedding present from a university researcher who wanted to surprise his friends, but GPS Puzzle Box, in fact, could have a potential for many more applications in several fields.
It is a real modern version of the “treasure box” we read about in many adventure books, with the difference that it is not protected by a secret code or hidden in some faraway island, but it will open automatically only when it is taken to a specific place.

The GPS Box is a carved wooden box, of the sort you would find in any Middle Eastern street market, but on its lid it sports a display and a button.

By pushing this button, you will be able to see the distance from the point where the box will automatically open (but not the direction!). the button can be pushed up to 50 times, and once you reach this limit you will no longer be able to open it, so a bit of logic is required to find out the right direction to take.

It looks very easy like this, although the practical usage of such a box might fail some of us. The prototype was born as a wedding present, concealing a USB key with some books in PDF format, and the opening location was a place dear to the newlyweds.

But just try to think that such a system, if applied for example on a safety suitcase, could be used to send documents of an extremely confidential nature, and making sure that they are opened and read only in the right place and by the right people.

At this point, applications for this GPS security system could be practically endless… and yes, they might even include a wedding present!

Turn your phone into a safe haven, and talk free from prying ears!


The very technology that makes us free to communicate with our business and with your loved ones at any time and from any place, could turn into our worst nightmare if, by chance, someone is trying to listen to our conversations to illegally gather information that can be used against us, either on a personal or financial level.

The good news, though, is that you do not need to be a secret agent, or a tycoon, to afford protection for your conversations from this kind of attacks, which are much more common than one can imagine. Basically, every mobile phone of the latest generations can be protected from interceptions, by using the right encryption software.

By providing your cellphone with this kind of software, very easy to install, the signal is encoded using two possible options: a 256-bit symmetric or 1024-bit asymmetric encryption key; once encrypted, it is transmitted over the GSM network in a format that the network itself would only recognize as white noise. By making sure that the phone at the other end is equipped with the same encryption key, its user will be the only person enabled to communicate with you, and the other way around.

Thanks to Safe & Talk, the encryption software marketed by Endoacustica, you will not need to worry anymore when you are talking on the phone, as your phone calls will be as private as you want them to be.

To make sure that your private conversations really stay private


As the old and wise saying goes, even walls have ears. We know that this saying is particularly true if, within those walls, conversations take place which are highly confidential, or at least, the participants would like them to remain as confidential as possible.
We also know, though, that especially if the stakes are high and there are high amounts of money involved, there is always a chance, as narrow as it may be, that prying ears could be listening to our words.

To provide protection against this kind of events, a group of scientists from MIT (Massachusetts Institute of Technology) is working on a system that would mask conversations by producing sounds through a network of small loudspeakers placed in the area to protect.

The so-called Distributed Acoustic Conversation Shielding System is made up of a series of portable transceivers equipped with an infrared sensor, a microphone and a small loudspeaker; each of the participants is equipped with one of these personal sensors, recognized by the main unit, towards which they send their position when they are moving from room to room.

As soon as the IR sensor detects the presence of someone not equipped with a similar device, the loudspeakers on the individual transceiver would send out a sound on the same frequency of the one that must be masked (like human voice) making eavesdroppers’ life impossible.

Currently this system is still in its early development stages, it will take a few years before we can see it working. To obtain more information on bug sweeping and anti-eavesdropping systems available on the market, you can visit the Endoacustica site.