|
Multi-Channel Detector for Wireless Protocols
Designed as a Smartphone and GPS detection devices the DD1207 offers highly sophisticated portable detection in an easy to operate handheld scanner. Capable of detecting the most common digital cellular frequencies, the system offers the ability to adjust the antenna sensitivity while either scanning the entire frequency spectrum or simply scanning one spectrum at a time, such as GSM.
Features:
Portable device for the inspection and location of wireless sources
6 channels of detection for different kinds of protocols
-Detection of GSM/CDMA/3G/4G
-Detection of Bluetooth/Wi-Fi/Wi-Max
-Can be used for tracing both regular sources and illegal eavesdropping devices
-6 bar graphs with 10-segments each, for accurate location of RF sources
-4 modes: Silent, Vibration, Visual and Listen
-2 levels of sensitivity (attenuator)
-Extra display shows which signal type has been detected
-Durable metallic body
-Microprocessor controlled
-Setup mode with selection the threshold level for vibration.
Detect the following kinds of bugging devices:
-GSM baby-monitors/GSM alarm/GSM bugs
-GSM/GPRS/EDGE/3G video cameras
-GSM Spy phones
-GPS Trackers
-Bluetooth bugging devices
-Spy phones with Bluetooth/Wi-Fi
-Wi-Fi/Wi-Max bugging devices
-Wireless videocameras 2.4 Ghz
Detection range is 30 feet
Technical Specs
Detection range is 30 feet
CDMA 824-849 MHz
GSM 880-920 MHz
GSM (DCS) 1710-1790 MHz
WCDMA, 3G, GSM (PCS), DECT 1920-2000 MHz
Bluetooth, Wi-Fi 2400-2480
Wi-Max 3000-7000 MHz
Antenna 2 Omni-directional antennas
Detection distance 1-10 meters
operation time 10-15 hours
power 2 AAA
Box Size 7 x 5 x 1.50
Unit Size 2.75 x 4.75 x .50
Weight 1.00
Detects CDMA, GSM, WCDMA/3G, 4G, Bluetooth/Wi-Fi, and Wi-Max
Frequency range
Includes:
Manual
Cleaning Cloth
2 Antennas
Screw driver
2 Batteries size AAA
Detector
Standard shipping is FREE for all retail orders totaling $100.00 or more! (48 Continental US orders only) Flat rate of $8.50 shipping applies to orders under $100.00
|
795.00 |
|
|
Phone Security
These phone recorders allow you to record conversations on a telephone line. All of these telephone recorders will silently record both sides of the conversation. Units are activated by sound or by someone picking up the phone. You can connect these phone recorders to an open phone jack and set them to record only conversations or you can use them as room recorders. You will not record dead time, only actual conversations.
Digital conversation recorders record with their own memory; there is no tape to flip. The digital phone recorders on this page can also be uploaded to your computer via high speed USB.
|
|
|
Every semester of every year you can read hundreds of reports where a woman was physically assaulted on campus. While colleges and universities have tried to step up security patrols, especially at night, reports of attacks and attempted rape continue to persist. While there are precautions a woman can take to lessen the chances of becoming a victim, one of the best weapons she can have at her disposal when confronted in a threatening situation is a shot of pepper spray. A less than $20, the MACE Keyguard Pepper Spray is compact, convenient, and has a key ring that easily attaches to your house, dorm room, car, and other keys you carry. Be alert, be cautious, and be prepared.
http://www.thecoverteye.com/preview/m7/80365--mace-key-guard-pepper-spray.html
http://www.athensohiotoday.com/news/woman-uses-pepper-spray-to-allegedly-fight-off-attacker/article_00fc4e80-8d84-55d7-a989-90264ed2f3be.html
|
|
|
GPS Car Tracking Systems
GPS car tracking or vehicle tracking is often used for covert tracking of the driver in the car. We will not look to this kind of applications, but rather the business variant for which GPS asset tracking would be a better name. Cars, trucks, trailers, railcars, containers and boats can be tracked, using GPS car tracking.
The market for GPS vehicle tracking systems is considered as one of the fasted growing markets for GPS applications. There are many levels of sophistication, but what all systems have in common is a GPS receiver and software to put the tracking results on a map. The differences in mapping programs are huge and it is very difficult to judge in advance how well these software solutions will perform.
Two main categories of GPS car tracking solutions are the ‘passive’ systems and the ‘real time’ systems. Passive systems store the gathered data in their internal memory and the owner has only access to the data when the unit returns to ... |
|
|
I make mention of this story out of Scranton, PA., because it illustrates three things. These burglaries were happening during the day when many of the victims were in the house. The entries were made either through a window or through doors that were forced open. Many of the residents in the neighborhood didn't think it would happen to them.
http://thetimes-tribune.com/news/burglary-investigated-in-scranton-1.2074431
Most home break-ins occur during the day. Locking doors and windows won't deter a burglar. Installing an inexpensive window and door alarm will. And YES, it can happen to you, and it's probably only a manner of time until it does.
http://www.thecoverteye.com/Home_Alarms
|
|
|
Phone Safe Ultra
Out of Stock
Stop accidental info leakage in conference rooms or group meetings with the PHONE SAFE ULTRA. Mobile phones have an infinite number of benefits for communication and business; however, they also create certain threats of information leakage. One of the potential leakage channels is the phone's microphone picking up surrounding acoustics with a high sensitivity. The PHONE SAFE ULTRA has been developed by information security professionals to protect against this exact type of threat.
While developing this product the following features and vulnerabilities of modern mobile phones were taken into account:
• The smart phone can be intentionally, or covertly, ‘off-hook’ during important negotiations
• Voice recording software can intentionally, or secretly, run on the smartphone
• Listening software can run in a ‘stealth’ mode
• Spyware can be installed on the smartphone without the owner's knowledge, allowing attackers to activate covert eavesdropping around the phone. There are known cases of transmission of such software by exploiting the vulnerabilities of some messengers
• The acoustic environment around the phone can be transmitted to the server, or cloud service of the attackers either in real time or with a postponed uploading
• Smartphone apps which have access to the phone's microphone can be used for eavesdropping in cases of them having been hacked (usually messengers or social network apps)
• Uploading of information can be done in the following ways: Conventional voice call; Mobile internet; Wi-Fi; Bluetooth; The phone's connector
Other audio security devices use radio interference to protect conversations. Unfortunately, the creation of radio interference (RF jamming mobile communications, Wi-Fi and Bluetooth) does not guarantee protection: there is still the possibility of accumulating information in the phone's memory (voice recorder mode). Given this factor, the only reliable way to protect is to block the phone's acoustic channel. This prevents acoustic information from leaking, regardless of how it is listened to or transmitted. A number of modern technologies have been used in the PHONE SAFE ULTRA device for your protection.
Features:
• Blocks the microphone of the phone with the help of non-filterable ultrasonic interference
• Efficiently prevents surround recording app from capturing conversations and sounds
• The frequency of interference has been optimally selected for the best performance and affects all existing models of smartphones
• Made with the design of an attractive natural wood stand
• The acoustically isolated phone can remain close to the owner where the screen can be easily observed
• The phone stays online and available for incoming calls
• No illegal radio jamming
• Can be powered by the external USB, or from the built-in rechargeable battery
• Has 2 sensors, increasing the battery’s resource: the device starts producing interference when a phone is inserted (IN USE sensor) and a conversation is present (ACTIVITY sensor)
• The rechargeable battery provides a continuous working time of 6 hours if the USB source is unavailable
• Is compatible with all types of phones (max. width 88 mm)
Specifications
• Power of noise <2 W in the active area
• Guaranteed suppression area 10 cm from the transducer
• Power Source1) USB 5V 2) Built-in rechargeable battery
• Current consumption 500 mA (noise mode) 5 mA (stand-by mode)
• Current consumption 500 mA (noise mode) 5 mA (stand-by mode)
• Battery Li-Ion, 3.2 В, 3200 mAh
• Connector Mini USB;
• Battery resource 6 hours
• Recharging time 6 hours
Download Manual
Includes:
• PHONE SAFE ULTRA device
• Mini USB cable
• Transparent cover
• User manual
Standard shipping is FREE for all retail orders totaling $100.00 or more! (48 Continental US orders only) Flat rate of $8.50 shipping applies to orders under $100.00
|
489.00 |
|
|
Detection and Counter Surveillance Kit
Feel safe, secure and protect your environment and information from outside threats. We've created a detection and counter surveillance kit that will aid and identify surveillance threats of any kind.
No job is too small or too big with this detection kit on hand. Comes standard and nicely organized in tactical case including the iProtect DD1216, DD1207, DD1206, DD1200 and DD12051. Mission ready, this case makes it easy to keep track and transport your detection devices regardless of the job or if you don't need the whole kit you can take whatever you need with you on-the-go. All devices are small and portable in size.
FREQUENCY RANGE: 50MHz-12GHz
Includes:
DD1216: iProtect 3-Band RF Detector [50MHz-12GHz]
DD1207: iProtect Wireless Detector [824MHz-7000MHz]
DD1206: iProtect Digital RF Detector [50MHz-12GHz]
DD1200: iProtect Camera Finder [Finds Non Transmitting Cameras]
DD12051: iProtect RF Wireless Signal Wand [50MHz-8GHz]
The Bug, Camera & GPS Detectors included help assist in sweeping and locating modern (digital) and classic (analog) forms of surveillance devices. Locate hidden cameras, listening devices or GPS trackers that could be invaiding your private space at home, the office or vehicle.
Secure your home, office and vehicles. Each device has specialized features, adjustable settings, threat level indicators to help uncover and find unwanted surveillance devices. Each one designed to search covertly, LED, Sound or Graph Indicators will help you narrow down the search and type of devices to look out for based upon what's registering. Be sure to turn off all authorized devices in the environment to not impead the investigation. All electronics emit a frequency, these anti-surveillance devices will measure and monitor those in range giving off a RF signature of 50MHz-12GHz.
Stronger the singal, closer the device. Detection devices pick up the RF frequencies given off by Cellular, Bluetooth and WiFi spy gadgets that could be hidden in your everyday items. [GSM, 2G, 3G, LTE, Bluetooth, 2.4GHz & 5GHz WiFi and Wi-Max]
Standard shipping is FREE for all retail orders totaling $100.00 or more! (48 Continental US orders only) Flat rate of $8.50 shipping applies to orders under $100.00.
|
2989.00 |
|
|
“As diligent and hardworking as campus police are, they cannot protect all the many people on campus at all time, so let those folks protect themselves.”
State Representative Buzz Brockway plans to file a bill next week that would let students at least 18 years of age carry electroshock weapons on all of Georgia's public campuses. The bill, according to Brockway, was written after he discover...ed students are allowed to carry pepper spray on campus but not Tasers or stun-guns.
Many Georgia lawmakers are pushing for legislation that would permit students to carry handguns on campus but state law currently prohibits concealed handgun license holders from exercising their rights on school grounds. Most efforts to bring guns to campus have stalled at the capitol because university presidents oppose the idea. House Bill 544, which would allow anyone to carry guns on Georgia's public campuses, was introduced in 2015 but has not received a committee hearing.
“Students told me they were not allowed to carry pepper spray with them on campus. I thought this was strange so I did some research. I found they were mistaken, and they are allowed to possess pepper spray and similar chemically based protection items. However, several of the public colleges I examined in Georgia explicitly prohibited stun-guns and Tasers on campus. So I decided to introduce a bill to change that,” Brockway told Campus Reform.
Brockway added that he thinks campus police departments are not staffed well enough to account for all of the crimes on campus.
“What I hear from students, faculty, and other campus employees, especially folks at colleges and universities in the city of Atlanta, is a desire to protect themselves,” he said. “As diligent and hardworking as campus police are, they cannot protect all the many people on campus at all time, so let those folks protect themselves.”
Some state senators, however, have raised concerns about the safety of stun-guns. Senator Vincent Fort said Tasers in the hands of college students could lead to many accidental injuries. Brockway disagrees and thinks students who purchase stun-guns will be responsible enough to avoid injuries.
“Pepper spray is allowed and we don't see much misuse of those products on college campuses. I think the people who will choose to purchase electroshock weapons for their personal protection will act responsibly,” Brockway argued.
Unlike campus carry legislation, Brockway's bill would not require students to pass a background check before purchasing a stun-gun.
“As best I can tell, there is currently no requirement in Georgia law for screening or training before purchasing Tasers, stun guns or other electroshock weapons and my bill does not require those things either,” he said.
|
|
|
.
How to protect yourself from Russian hackers who stole whopping 1.2 billion passwords across globe.
If you've ever used a computer, you might want to change your passwords.
A Russian crime gang has compiled the biggest known collection of... stolen Internet information, swiping 1.2 billion usernames and passwords from nearly half a million websites, a Tuesday report revealed.
The small group of hackers, nicknamed CyberVor, also has 542 million email addresses on file, the New York Times reported
Read more: http://www.nydailynews.com/news/world/russian-hackers-stole-1-2-billion-passwords-safe-article-1.1893695#ixzz39qWW9s3J
|
|
|
As a parent, our primary role is to protect our children, but for many of us it's not possible to keep a watch on them 24 hours a day. When leaving for work in the morning it's natural to experience some anxiety when leaving our children with another person. This may be the nanny, a babysitter, or even a family friend. To help ease that anxiety of leaving children under the care of someone else, many parents are choosing to install a "Nanny Cam" to keep an eye on how the caregiver is behaving with their children.
Unless you're intimately familiar with the person who will be caring for your children while you're at work, finding someone you can entrust your children to and feel good about is your first concern. Remember, people have a tendency to present themselves one way in your presence, and then act differently when you're gone. Ask yourself these questions:
1. Is the babysitter or nanny the only one around your child when you leave? Do their friends or boyfriends enter your home after you've gone?
2. Have any of your personal items gone missing without explanation? Jewelry and cash are the usual targets.
3. Is your nanny or caregiver watching TV and talking on the phone all day? Is your child being neglected?
4. Does your nanny or babysitter have a drug or alcohol abuse problem?
5. Worse of all, are they abusing your child? Verbal and physical abuse of children happens every day in this country.
Why a Nanny Cam?
Recently, there have been a lot of cases of abuse from caregivers that have gained media attention. While it's not advised to believe that all nannies have the potential to mistreat children, it is still a problem that should cause some concern. While many potentially abusive nannies can be screened out during the proper interview process, it can still be difficult to know when you're choosing a nanny that is truly dedicated to keeping your children safe.
For a concerned parent, a Nanny Cam can help you gain insight in how your nanny is interacting with your children while you're away. It can either provide you with peace of mind, or allow you to identify a potentially dangerous situation for your children.
What kind of Nanny Camera should I get?
Basically, a “Nanny Cam” is a hidden camera that you install in a non-visible location inside your home. This camera may be hidden in a potted plant, a stuffed animal, a desk lamp, or other household object. The primary purpose of the camera is to allow you to see how a caregiver interacts with your children when you're not around. The two main types of cameras are wired and wireless. As the name implies, wired cameras are direct connected to a PC or some other kind of recording device, like a VCR. This is the most economical option, but concealing the cable can sometimes be a bit of a problem, especially if you're running it for several feet. A wireless camera solves that problem by eliminating the cable, and all come with a 2.4 GHz receiver which connects to the PC or recorder. Signal strength is around 300 feet. With either camera you would press “record” before leaving in the morning and “stop” when you return. You then open the video file you've created and fast forward until something catches your attention. Depending on how many hours you've recorded, this can be very time consuming.
Motion Activated Nanny Cam
Using a motion activated nanny cam is a bit better option. Whenever motion is detected within its sensing range, the camera comes on to trigger the recording device (PC, VCR, DVD) to start recording. When motion stops, it automatically resets itself to standby again to await the next movement. This makes the viewing of the captured video much easier.
The StealthCam Option
The StealthCam systems are the next step up in hidden cameras. They feature the camera and the digital video recorder in one self-contained unit. They also have an “adjustable” motion activated recording system built in, so basically all you need to do is plug it in, turn it on with the included IR remote control, and you're good to go.
The StealthCam system records onto an SD memory card, which can be found everywhere. All of today's digital cameras use SD cards. The StealthCam systems can support up to 32GB, which is inserted into a hidden slot somewhere on the camera.
The StealthCam systems can either record full motion video (30fps) or take snapshot pictures every 3 seconds while motion is detected. Video is best, although it consumes roughly 1GB for every 2.5 hours of video. StealthCam nanny cams can be found in everything, from clocks and radios to stuff bears and picture frames. To see what the camera has captured, either remove the SD card and pop into your PC or card reader, or connect the included USB cable right from the camera to your computer.
A StealthCam system with built-in DVR (SD card) is the most popular nanny cam on the market. Although they have typically cost more than wired or wireless cameras, the prices continue to fall. The technology has also improved, to where now you can get a simple working pen or wristwatch with the same built-in recording ability for just over $100. In fact, with a StealthCam system being disguised into so many common everyday household products, you could afford to place a motion activated nanny cam into two or three rooms of your house.
|
|