|
Phone Security
These phone recorders allow you to record conversations on a telephone line. All of these telephone recorders will silently record both sides of the conversation. Units are activated by sound or by someone picking up the phone. You can connect these phone recorders to an open phone jack and set them to record only conversations or you can use them as room recorders. You will not record dead time, only actual conversations.
Digital conversation recorders record with their own memory; there is no tape to flip. The digital phone recorders on this page can also be uploaded to your computer via high speed USB.
|
|
|
Every semester of every year you can read hundreds of reports where a woman was physically assaulted on campus. While colleges and universities have tried to step up security patrols, especially at night, reports of attacks and attempted rape continue to persist. While there are precautions a woman can take to lessen the chances of becoming a victim, one of the best weapons she can have at her disposal when confronted in a threatening situation is a shot of pepper spray. A less than $20, the MACE Keyguard Pepper Spray is compact, convenient, and has a key ring that easily attaches to your house, dorm room, car, and other keys you carry. Be alert, be cautious, and be prepared.
http://www.thecoverteye.com/preview/m7/80365--mace-key-guard-pepper-spray.html
http://www.athensohiotoday.com/news/woman-uses-pepper-spray-to-allegedly-fight-off-attacker/article_00fc4e80-8d84-55d7-a989-90264ed2f3be.html
|
|
|
GPS Car Tracking Systems
GPS car tracking or vehicle tracking is often used for covert tracking of the driver in the car. We will not look to this kind of applications, but rather the business variant for which GPS asset tracking would be a better name. Cars, trucks, trailers, railcars, containers and boats can be tracked, using GPS car tracking.
The market for GPS vehicle tracking systems is considered as one of the fasted growing markets for GPS applications. There are many levels of sophistication, but what all systems have in common is a GPS receiver and software to put the tracking results on a map. The differences in mapping programs are huge and it is very difficult to judge in advance how well these software solutions will perform.
Two main categories of GPS car tracking solutions are the ‘passive’ systems and the ‘real time’ systems. Passive systems store the gathered data in their internal memory and the owner has only access to the data when the unit returns to ... |
|
|
Transducer for White Noise Generator
The TD2300 vibroacoustic transducer is part of a complete counter surveillance protection system. It inducts noise into walls, floors, ceilings, windows and other surfaces of the building,preventing leakage of sound signals. To provide a sufficient level of protection the system consists of a number of transducers installed on different structures in the room and is connected to the DNG-2300 generator.
Need more transducers, determine the quantity of transducers needed by these recommendations:
WALLS - One placed every eight linear feet, centered between floor and ceiling. Mount on or within 6 inches of a stud.
FLOOR and CEILING - One centered on every 64 square feet. (Use the OMS-2000 speaker for drop ceiling.)
WINDOWS - One placed on every major pane of glass within 6" of the corner.
DOORS - One placed adjacent to the center hinge on the doorframe.
Attractive design, looks good in any interior
Fits well on windows, walls and other structures
The included mounting set makes it possible to install the transducer on any surface
Passes most of the generated noise into the desired construction in the form of vibration, while also producing less audible interference
Specifications:
The frequency characteristics optimally correspond to the spectrum of human speech
Perfectly suited for the DNG-2300 white noise generator
High power output
Small Size
Impedance 4 Ohm
Frequency response 58 Hz -12 kHz
Power 10W
Dimensions: 0” L x 0” W x 0” H
Included:
1 Transducer
Spacer
Bolt, double ended
Screw double ended
Plastic Anchor
Mounting disk
Metal Wall anchor
Standard shipping is FREE for all retail orders totaling $100.00 or more! (48 Continental US orders only) Flat rate of $8.50 shipping applies to orders under $100.00.
|
72.99 |
|
|
Orion 2.4 Non-Linear Junction Detector
New Smaller, lighter, 2.4 GHz transmit frequency. A Non-Linear Junction Detector detects the presence of electronics, regardless of whether the electronic target is radiating, hard wired, or even turned off. The ORION 2.4 quickly detects and locates all hidden electronic surveillance devices.
DIGITAL MODULATION & CORRELATION: provides improved detection & minimizes interference.
WIDE BANDWIDTH TRANSMIT SIGNAL: 1.25MHz increases detection sensitivity
MULTIPLE ALERT METHODS: Alert tones and vibration alert can be selected to alert when signal levels surpass the trip levels
LINE OF SIGHT ANTENNA MOUNTED DISPLAY: allows user to focus eyes on sweeping target and display at same time.
2.4 GHz TRANSMIT FREQUENCY: for detecting small electronics
MANUAL OR AUTOMATIC POWER CONTROL: up to 3.3 watts
SMALL LIGHTWEIGHT: weighs 2.8 lbs/1.3 kg
INTEGRATED TELESCOPING POLE
SYNTHESIZED TRANSCEIVER: frequency stability and agility to automatically search for clean operating frequencies (2.404GHz - 2.472GHz).
CIRCULARLY POLARIZED TRANSMIT AND RECEIVE ANTENNA: removes risk of missing a threat due to incorrect antenna polarization.
Specifications:
Display:
Antenna-mounted Display
Bar Graph Display for transmit power level, 2nd harmonic level, 3rd harmonic level, data field display, for other information (operation mode, low battery, volume, DSP gain, etc.)
Transmitter
Frequency Bands: 2.404GHz-2.472GHZ
Transmit Channels: Manual or auto selection, more than 60 available
Transmit Power: 3.3 watts E.I.R.P.
Power Control: Manual or Auto Control
Transmit Modulation: Digital 1.24 MHz BW
Receiver:
Simultaneous 2nd & 3rd harmonic receive Digitally Correlated
Frequency Bands: Transmit Band (2.404GHz - 2.472GHz); Second Harmonic (4.808GHz - 4.944GHz); Third Harmonic (7.212GHz - 7.416GHz)
Sensitivity:140 dBm for both harmonics
Battery Specifications:
Input AC: 100–240 V, 50–60 Hz
Run Time: >8 hours per battery (typical)
Charge Time: 2.5 hours per battery (typical)
Batteries: Lithium Ion Rechargeable Battery (2 included)
Extension Lengths:16-51 in (40.6-129.5 cm)
Overall Length Extended: 58 in (1.5 m)
Case Dimensions: 6.25 in x 14.9 in x 18.5 in (15.9 cm x 37.8 cm x 47.0 cm)
ORION 2.4 Dim: 22.4 in x 3.75 in x 3 in (57 cm x 9cm x 7.5 cm)
ORION 2.4 Weight w/Battery: 2.8 lbs (1.3kg)
Case Weight Including ORION 2.4 & Accessories: 11.6 lbs (5.2kg)
Standard shipping is FREE for all retail orders totaling $100.00 or more! (48 Continental US orders only) Flat rate of $8.50 shipping applies to orders under $100.00.
|
14900.00 |
|
|
3 N 1 BNC COMPRESSION TOOL
3 n 1 BNC Compression Tool. Adjustable 3 in 1 tool (F, BNC, RCA). For use with RG-58, 59, and 6
|
37.00 |
|
|
Phone Safe Ultra
Out of Stock
Stop accidental info leakage in conference rooms or group meetings with the PHONE SAFE ULTRA. Mobile phones have an infinite number of benefits for communication and business; however, they also create certain threats of information leakage. One of the potential leakage channels is the phone's microphone picking up surrounding acoustics with a high sensitivity. The PHONE SAFE ULTRA has been developed by information security professionals to protect against this exact type of threat.
While developing this product the following features and vulnerabilities of modern mobile phones were taken into account:
• The smart phone can be intentionally, or covertly, ‘off-hook’ during important negotiations
• Voice recording software can intentionally, or secretly, run on the smartphone
• Listening software can run in a ‘stealth’ mode
• Spyware can be installed on the smartphone without the owner's knowledge, allowing attackers to activate covert eavesdropping around the phone. There are known cases of transmission of such software by exploiting the vulnerabilities of some messengers
• The acoustic environment around the phone can be transmitted to the server, or cloud service of the attackers either in real time or with a postponed uploading
• Smartphone apps which have access to the phone's microphone can be used for eavesdropping in cases of them having been hacked (usually messengers or social network apps)
• Uploading of information can be done in the following ways: Conventional voice call; Mobile internet; Wi-Fi; Bluetooth; The phone's connector
Other audio security devices use radio interference to protect conversations. Unfortunately, the creation of radio interference (RF jamming mobile communications, Wi-Fi and Bluetooth) does not guarantee protection: there is still the possibility of accumulating information in the phone's memory (voice recorder mode). Given this factor, the only reliable way to protect is to block the phone's acoustic channel. This prevents acoustic information from leaking, regardless of how it is listened to or transmitted. A number of modern technologies have been used in the PHONE SAFE ULTRA device for your protection.
Features:
• Blocks the microphone of the phone with the help of non-filterable ultrasonic interference
• Efficiently prevents surround recording app from capturing conversations and sounds
• The frequency of interference has been optimally selected for the best performance and affects all existing models of smartphones
• Made with the design of an attractive natural wood stand
• The acoustically isolated phone can remain close to the owner where the screen can be easily observed
• The phone stays online and available for incoming calls
• No illegal radio jamming
• Can be powered by the external USB, or from the built-in rechargeable battery
• Has 2 sensors, increasing the battery’s resource: the device starts producing interference when a phone is inserted (IN USE sensor) and a conversation is present (ACTIVITY sensor)
• The rechargeable battery provides a continuous working time of 6 hours if the USB source is unavailable
• Is compatible with all types of phones (max. width 88 mm)
Specifications
• Power of noise <2 W in the active area
• Guaranteed suppression area 10 cm from the transducer
• Power Source1) USB 5V 2) Built-in rechargeable battery
• Current consumption 500 mA (noise mode) 5 mA (stand-by mode)
• Current consumption 500 mA (noise mode) 5 mA (stand-by mode)
• Battery Li-Ion, 3.2 В, 3200 mAh
• Connector Mini USB;
• Battery resource 6 hours
• Recharging time 6 hours
Download Manual
Includes:
• PHONE SAFE ULTRA device
• Mini USB cable
• Transparent cover
• User manual
Standard shipping is FREE for all retail orders totaling $100.00 or more! (48 Continental US orders only) Flat rate of $8.50 shipping applies to orders under $100.00
|
489.00 |
|
|
“As diligent and hardworking as campus police are, they cannot protect all the many people on campus at all time, so let those folks protect themselves.”
State Representative Buzz Brockway plans to file a bill next week that would let students at least 18 years of age carry electroshock weapons on all of Georgia's public campuses. The bill, according to Brockway, was written after he discover...ed students are allowed to carry pepper spray on campus but not Tasers or stun-guns.
Many Georgia lawmakers are pushing for legislation that would permit students to carry handguns on campus but state law currently prohibits concealed handgun license holders from exercising their rights on school grounds. Most efforts to bring guns to campus have stalled at the capitol because university presidents oppose the idea. House Bill 544, which would allow anyone to carry guns on Georgia's public campuses, was introduced in 2015 but has not received a committee hearing.
“Students told me they were not allowed to carry pepper spray with them on campus. I thought this was strange so I did some research. I found they were mistaken, and they are allowed to possess pepper spray and similar chemically based protection items. However, several of the public colleges I examined in Georgia explicitly prohibited stun-guns and Tasers on campus. So I decided to introduce a bill to change that,” Brockway told Campus Reform.
Brockway added that he thinks campus police departments are not staffed well enough to account for all of the crimes on campus.
“What I hear from students, faculty, and other campus employees, especially folks at colleges and universities in the city of Atlanta, is a desire to protect themselves,” he said. “As diligent and hardworking as campus police are, they cannot protect all the many people on campus at all time, so let those folks protect themselves.”
Some state senators, however, have raised concerns about the safety of stun-guns. Senator Vincent Fort said Tasers in the hands of college students could lead to many accidental injuries. Brockway disagrees and thinks students who purchase stun-guns will be responsible enough to avoid injuries.
“Pepper spray is allowed and we don't see much misuse of those products on college campuses. I think the people who will choose to purchase electroshock weapons for their personal protection will act responsibly,” Brockway argued.
Unlike campus carry legislation, Brockway's bill would not require students to pass a background check before purchasing a stun-gun.
“As best I can tell, there is currently no requirement in Georgia law for screening or training before purchasing Tasers, stun guns or other electroshock weapons and my bill does not require those things either,” he said.
|
|
|
.
How to protect yourself from Russian hackers who stole whopping 1.2 billion passwords across globe.
If you've ever used a computer, you might want to change your passwords.
A Russian crime gang has compiled the biggest known collection of... stolen Internet information, swiping 1.2 billion usernames and passwords from nearly half a million websites, a Tuesday report revealed.
The small group of hackers, nicknamed CyberVor, also has 542 million email addresses on file, the New York Times reported
Read more: http://www.nydailynews.com/news/world/russian-hackers-stole-1-2-billion-passwords-safe-article-1.1893695#ixzz39qWW9s3J
|
|
|
As a parent, our primary role is to protect our children, but for many of us it's not possible to keep a watch on them 24 hours a day. When leaving for work in the morning it's natural to experience some anxiety when leaving our children with another person. This may be the nanny, a babysitter, or even a family friend. To help ease that anxiety of leaving children under the care of someone else, many parents are choosing to install a "Nanny Cam" to keep an eye on how the caregiver is behaving with their children.
Unless you're intimately familiar with the person who will be caring for your children while you're at work, finding someone you can entrust your children to and feel good about is your first concern. Remember, people have a tendency to present themselves one way in your presence, and then act differently when you're gone. Ask yourself these questions:
1. Is the babysitter or nanny the only one around your child when you leave? Do their friends or boyfriends enter your home after you've gone?
2. Have any of your personal items gone missing without explanation? Jewelry and cash are the usual targets.
3. Is your nanny or caregiver watching TV and talking on the phone all day? Is your child being neglected?
4. Does your nanny or babysitter have a drug or alcohol abuse problem?
5. Worse of all, are they abusing your child? Verbal and physical abuse of children happens every day in this country.
Why a Nanny Cam?
Recently, there have been a lot of cases of abuse from caregivers that have gained media attention. While it's not advised to believe that all nannies have the potential to mistreat children, it is still a problem that should cause some concern. While many potentially abusive nannies can be screened out during the proper interview process, it can still be difficult to know when you're choosing a nanny that is truly dedicated to keeping your children safe.
For a concerned parent, a Nanny Cam can help you gain insight in how your nanny is interacting with your children while you're away. It can either provide you with peace of mind, or allow you to identify a potentially dangerous situation for your children.
What kind of Nanny Camera should I get?
Basically, a “Nanny Cam” is a hidden camera that you install in a non-visible location inside your home. This camera may be hidden in a potted plant, a stuffed animal, a desk lamp, or other household object. The primary purpose of the camera is to allow you to see how a caregiver interacts with your children when you're not around. The two main types of cameras are wired and wireless. As the name implies, wired cameras are direct connected to a PC or some other kind of recording device, like a VCR. This is the most economical option, but concealing the cable can sometimes be a bit of a problem, especially if you're running it for several feet. A wireless camera solves that problem by eliminating the cable, and all come with a 2.4 GHz receiver which connects to the PC or recorder. Signal strength is around 300 feet. With either camera you would press “record” before leaving in the morning and “stop” when you return. You then open the video file you've created and fast forward until something catches your attention. Depending on how many hours you've recorded, this can be very time consuming.
Motion Activated Nanny Cam
Using a motion activated nanny cam is a bit better option. Whenever motion is detected within its sensing range, the camera comes on to trigger the recording device (PC, VCR, DVD) to start recording. When motion stops, it automatically resets itself to standby again to await the next movement. This makes the viewing of the captured video much easier.
The StealthCam Option
The StealthCam systems are the next step up in hidden cameras. They feature the camera and the digital video recorder in one self-contained unit. They also have an “adjustable” motion activated recording system built in, so basically all you need to do is plug it in, turn it on with the included IR remote control, and you're good to go.
The StealthCam system records onto an SD memory card, which can be found everywhere. All of today's digital cameras use SD cards. The StealthCam systems can support up to 32GB, which is inserted into a hidden slot somewhere on the camera.
The StealthCam systems can either record full motion video (30fps) or take snapshot pictures every 3 seconds while motion is detected. Video is best, although it consumes roughly 1GB for every 2.5 hours of video. StealthCam nanny cams can be found in everything, from clocks and radios to stuff bears and picture frames. To see what the camera has captured, either remove the SD card and pop into your PC or card reader, or connect the included USB cable right from the camera to your computer.
A StealthCam system with built-in DVR (SD card) is the most popular nanny cam on the market. Although they have typically cost more than wired or wireless cameras, the prices continue to fall. The technology has also improved, to where now you can get a simple working pen or wristwatch with the same built-in recording ability for just over $100. In fact, with a StealthCam system being disguised into so many common everyday household products, you could afford to place a motion activated nanny cam into two or three rooms of your house.
|
|