DPL-Surveillance-Equipment.com

These are new product announcements from my main website (Open 24/7/365). We have a life-time warranty / guarantee on all products. (Includes parts and labor). Here you will find a variety of cutting-edge Surveillance and Security-Related products and services. (Buy/Rent/Layaway) Post your own comments and concerns related to the specific products or services mentioned or on surveillance, security, privacy, etc.

Sunday, July 24, 2016

Security Expert Says, "Latest Trend Is Truck-Based Terrorism"





Security Expert Says,
"Latest Trend Is Truck-Based Terrorism"










Terrorists have long used vehicles as bomb-delivery weapons to kill people inside buildings: the U.S. Marines barracks in Lebanon in 1983, the World Trade Center in New York a decade later, then a federal office building in Oklahoma City in 1995.

But vehicles have rarely been used to mow down pedestrians to such devastating and tragic effect as in Nice, France.

The attack highlighted a vexing challenge to law enforcement: How to protect throngs of people in an open society. It is far more difficult to prevent that type of attack, and taking such measures could be far more debilitating and inconvenient to everyday life and commerce, officials said.






“You can’t harden every target,” said Eugene O’Donnell, a professor of law and police studies at John Jay College of Criminal Justice in New York. “Ultimately, it’s a democracy and that’s our ultimate vulnerability.”




Law-enforcement experts said the Nice attack would likely heighten alert for potential copycats and lead to increased security at public events, potentially including new limits on vehicle access.


PRO-DTECH II FREQUENCY DETECTOR
(Buy/Rent/Layaway)


“Before, we were conditioned to look for bombs,” said George Venizelos, the former top FBI official in New York who is now a senior executive at a private security firm. “Now you’ve got to worry about a truck driving into people, so it’s a whole new twist to things.”
Terrorists have used vehicular assaults in the past. In 2011 in Tel Aviv, a truck plowed into people on a busy street, killing one person and injuring 16 others, according to news reports. The driver denied intentionally causing the wreck.


In December 2014, France was the scene of two such incidents. About a dozen people were injured in each, according to news reports.



“We’ve seen similar vehicle attacks by individual Palestinians against Israelis, which have gotten enormous attention in jihadi circles, and al Qaeda has called for people to imitate them,” said Bruce Riedel, who spent 30 years at the Central Intelligence Agency, including posts in the Middle East and Europe. “Adding an armed driver is more deadly.”





Groups like Islamic State and al Qaeda in the Arabian Peninsula have urged such attacks in the past, according to the SITE Intelligence Group, which monitors militant websites.


In a widely distributed 2014 speech, Islamic State spokesman Abu Muhammad al-Adnani urged followers to kill Westerners and nonbelievers any way possible.

“Smash his head with a rock, or slaughter him with a knife, or run him over with your car, or throw him down from a high place, or choke him, or poison him,” he said, according to SITE.

In a 2010 article in the al Qaeda magazine “Inspire,” a leader of al Qaeda in the Arabian Peninsula urged followers to pursue “individual jihad” by using pickup trucks to run down civilians, mounting sharp blades on the front to maximize deaths and injuries. “The idea is to use a pickup truck as a mowing machine, not to mow grass, but mow down the enemies of Allah,” he wrote.








Autonomous Trucks As New Terrorists Weapon



On July 14, Mohamed Lahouaiej Bouhlel drove a 19-ton cargo truck into a crowd at a Bastille Day celebration in Nice, France, killing 84 people. He carried out the attack on behalf of the Islamic State terrorist organization.

Bouhlel was shot dead by police, a typical consequence for those who carry out jihadist attacks. However, an emerging technology seems as though it could take the suicidal terrorist out of the equation entirely: the autonomous truck.

Autonomous trucks operate in much the same way as self-driving cars, using Wi-Fi-connected artificial intelligence. Anything that uses Wi-Fi can theoretically be hacked, including vehicles, as revealed last year in St. Louis, Missouri, when hacker duo Charlie Miller and Chris Valasek demonstrated how easy it was to hijack a Jeep Cherokee's brakes, dashboard functions, steering and transmission by remotely hacking into its Wi-Fi-connected entertainment system from a laptop 10 miles away.

Does this mean that it's possible an attack such as the tragedy in Nice could happen again, this time carried out by someone controlling the vehicle from a remote location?




There are currently only a few hundred of these trucks in operation, and the prevailing concern is not that they could be used in terrorist attacks but that they will put many truck drivers out of work. Still, as the technology becomes more prevalent, it's worth asking what the risks might be in the future.

The Growing Road To Autonomy

Autonomous trucks are predominantly in operation overseas. The Tokyo-based heavy-equipment company Komatsu Ltd. has been operating a small fleet at Codelco's Gabriela Mistral copper mine in Chile since 2008. Last year Alberta-based Suncor Energy signed an agreement to buy 175 trucks from Komatsu, with plans to make its entire fleet autonomous by 2020.

There are also approximately 50 autonomous trucks in use in the mines of Pilbara in Western Australia. And last year the Nevada Department of Transportation granted the first license for an autonomous commercial truck to operate in daylight on the state's public highways in order to test its real-world capabilities. Although this truck operates at autonomy level 3, meaning a human driver still needs to be behind the wheel to take full control in critical traffic and environmental conditions, it is expected the driver will be needed only for occasional control. 


Michelle Culver, a spokesperson for industry research firm IHS Markit, said these numbers will likely grow in the coming years, particularly when it comes to trucks in the Class 8 segment, whose weight exceeds 33,000 pounds when hauling freight.


"Within the next 10 years, IHS Automotive analysts expect that autonomous heavy trucks will gradually grow into the market and potentially hit the 20,000-unit annual sales mark in the United States by 2025, most of which will be expected in the Class 8 segment," she said. "Autonomous truck sales could reach 60,000 annually by 2035. That would amount to 15 percent of sales for trucks in the big Class 8 weight segment."

In Other Words, The Trucks Are Coming





A Whole New Level of Risk

So how worried should we be about the possibility of a terrorist using one as a remotely guided weapon? According to Jeremy Anwyl, CEO of Trucks.com, the scenario is not entirely likely, but even if it's the product of baseless paranoia, it couldn't hurt to give it some thought, he said.

"Paranoia is a good thing, because it will cause technology providers to take the risk seriously and prevent it from ever happening," he told DPL-Surveillance-Equipment.com. "It's one thing to protect our phones, but this is a whole other level of risk."

Anwyl said that well over 50 percent of new vehicles being sold today have some form of connectivity, and he cited the St. Louis, Missouri, Jeep Cherokee "hijacking" test as a good case study in demonstrating the risk of this reality.


"More and more vehicles today have some form of access to the internet, and somebody could hack into that signal," he said. "If a truck communicates its location, speed and fuel level to headquarters, somebody could intercept that message and trick the truck into thinking the person was fleet headquarters. It's not an easy thing to do, but anything's possible."


Anwyl explained that the autonomous vehicle's wireless safety features present hackers with their biggest, juiciest opportunities. The technology that allows an autonomous vehicle to wirelessly inform another that it's coming around a blind corner is, ironically, where hackers would find the most vulnerabilities.

"Anytime you have wireless technology like that, there's an opportunity for a bad actor to hack into that system," he said. "In theory it would be possible for someone to take over a 70,000- or 80,000-pound vehicle.… If it was a fuel tanker, they could drive into anything and cause a big explosion."

Chris Finan, former director for cybersecurity legislation and policy under President Obama and current CEO and co-founder of Manifold Technology, a start-up that offers security technology to financial institutions, agreed this scenario shouldn't be dismissed.


(Buy/Rent/Layaway)




"We've seen vulnerability researchers in the last year or so prove that this technology can be hacked," he told us. "Really great hackers aren't always the smartest people, but the most creative. You succeed because of cleverness, not because you have the best technology. They always have the most clever ways of finding vulnerabilities."

When we asked him if the Nice attack could be replicated elsewhere with an autonomous truck, his answer was an unequivocal "yes."

"The hypothetical of remote reprogramming is plausible," he said. "You could have a malicious actor or group that would reprogram a truck and use it as a missile as a way to target bystanders."

Finan added that one way of preventing such hacks was to use open-source technology, which is available to be viewed and updated by anyone from the general public, in a truck's programming.

"If you use open-source technology, you get millions of eyes on it, instead of just a few, on the type of bugs that hackers would exploit," he said. "In general, open-source code tends to be more secure, because you have so many people looking at it and finding flaws more quickly."

Finan hastened to add that while the scenario is possible, it's unlikely to transpire anytime soon, due to jihadists' attitude toward technology.

"This isn't something people need to freak out about happening tomorrow with radical Islamists," he said. "They view cyberspace as a recruiting space, not as a threat delivery system. It's very possible that in the future that could change, but they've got very many people willing to be programmed to die carrying out these attacks."





RECENT TRUCK ATTACKS

Dec. 21, 2014 Dijon and Nantes, France: A driver shouting Islamic phrases ran down 13 pedestrians in a half-hour span, seriously injuring two. The next day, another man drove into a crowd of holiday shoppers, wounding 11 people.


Wireless Camera Finder
(Buy/Rent/Layaway)





Oct. 28, 2013 Beijing: Five people were killed after a Jeep crashed in front of the Forbidden City. Chinese police described it as a terrorist attack.








May 15, 2011 Tel Aviv: One man was killed and 16 others injured after a truck crashed into several vehicles and pedestrians on a crowded Tel Aviv roadway. The driver denied intentionally causing the collision.





June 8, 2008 Tokyo: A man drove a truck into a popular shopping street, killing three men with the vehicle before stabbing 14 people. Four of the stabbing victims died.


(Buy/Rent/Layaway)



April 19, 1995 Oklahoma City: Timothy McVeigh parked a rental truck packed with explosives in front of a federal building in downtown Oklahoma City. The detonation killed 168, including 19 children, and injured more than 500 people.




Your questions and comments are greatly appreciated.



Monty Henry, Owner














www.DPL-Surveillance-Equipment.com















































NOW, look in on your home, second home, lake house or office anytime, anywhere from any internet connected PC/Lap-top or Internet active cell phone, including iphone or PDA.

Watch your child's caregiver while sitting at a traffic light or lunch meeting, or check on your business security from the other side of the world. Our built-in hidden video features all digital transmissions providing a crystal clear image with zero interference. With the IP receiver stream your video over the internet through your router, and view on either a PC or smart phone. Designed exclusively for DPL-Surveillance-Equipment, these IP hidden wireless cameras come with multiple features to make the user's experience hassle-free.

NOW, look in on your home, second home, lake house or office anytime, anywhere from any internet connected PC/Lap-top or Internet active cell phone, including iphone or PDA: http://www.dpl-surveillance-equipment.com/wireless_hidden_cameras.html

Watch your child's caregiver while sitting at a traffic light or lunch meeting, or check on your business security from the other side of the world. Our built-in hidden video features all digital transmissions providing a crystal clear image with zero interference. With the IP receiver stream your video over the internet through your router, and view on either a PC or smart phone. Designed exclusively for DPL-Surveillance-Equipment, these IP hidden wireless cameras come with multiple features to make the user's experience hassle-free.

• Remote Video Access

• Video is Recorded Locally To An Installed SD Card (2GB SD Card included)

• Email Notifications (Motion Alerts, Camera Failure, IP Address Change, SD Card Full)

• Live Monitoring, Recording And Event Playback Via Internet

• Back-up SD Storage Up To 32GB (SD Not Included)

• Digital Wireless Transmission (No Camera Interference)

• View LIVE On Your SmartPhone!

Includes:

* Nanny Cameras w/ Remote View
* Wireless IP Receiver
* Remote Control
* A/C Adaptor
* 2GB SD Card
* USB Receiver



FACT SHEET:  HIDDEN NANNY-SPY (VIEW VIA THE INTERNET) CAMERAS

Specifications:

Receiver Specs:

* Transmission Range of 500 ft Line Of Sight
* Uses 53 Channels Resulting In No Interference
* 12V Power Consumption
* RCA Output
* Supports up to 32gig SD

Camera Specs:

* 640x480 / 320x240 up to 30fps
* Image Sensor: 1/4" Micron Sensor
* Resolution: 720x480 Pixels
* S/N Ratio: 45 db
* Sensitivity: 11.5V/lux-s @ 550nm
* Video System: NTSC
* White Balance: Auto Tracking

Make Your Own Nanny Cameras:  Make Tons Of Money In A Booming, Nearly Recession-Proof Industry!


Your Primary Customers Include But Are Not Limited To Anyone In The Private Investigator, Government, Law Enforcement And/Or Intelligence Agencies Fields!

* You Buy Our DVR Boards And We'll Build Your Products! (Optional)









Our New Layaway Plan Adds Convenience For Online Shoppers










DPL-Surveillance-Equipment's layaway plan makes it easy for you to buy the products and services that you want by paying for them through manageable monthly payments that you set. Our intuitive calculator allows you to break down your order's purchase price into smaller payment amounts. Payments can be automatically deducted from your bank account or made in cash using MoneyGram® ExpressPayment® Services and you will receive your order once it's paid in full. Use it to plan and budget for holiday purchases, anniversaries, birthdays, vacations and more!


DPL-Surveillance-Equipment's Customers can now use the convenience of layaway online to help them get through these tough economic times.

We all shop now and then just to face a hard reality -- big credit card bills. However, our latest financing innovation can help you avoid that. Find out why more and more shoppers are checking out DPL-Surveillance-Equipment's e-layaway plan.

If you're drooling over a new nanny camera, longing for a GPS tracker, or wishing for that spy watch, but you're strapped for cash and can't afford to do credit, do what Jennie Kheen did. She bought her iPod docking station (hidden camera w/motion-activated DVR) online using our convenient lay-away plan.

Our online layaway plan works like the old-fashioned service stores used to offer. But, in Kheen's case, she went to DPL-Surveillance-Equipment.com, found the iPod docking station (hidden camera w/motion-activated DVR), then set up a payment plan.

"It's automatically drawn from my account," she said. "I have a budget, $208.00 a month.

In three months, Kheen had paid off the $650.00 iPod docking station. She paid another 3.9 percent service fee, which amounted to about $25.35 (plus $12.00 for shipping) for a total of $687.35.

"You pay a little bit each month," Kheen said. "It's paid off when you get it and you don't have it lingering over your head. It's great."

Flexible payment terms and automated payments make our layaway plan an affordable and fiscally responsible alternative to credit cards.

1. Register:

It's quick, easy and FREE! No credit check required!

2. Shop:

Select the items or service you want and choose "e-layaway" as your payment option. Our payment calculator makes it easy for you to set up your payment terms.

3. Make Payments:

Payments are made on the schedule YOU set. Check your order status or adjust your payments online in a secure environment.

4. Receive Products:

Receive the product shortly after your last payment. The best part, it's paid in full... NO DEBT.

More Buying Power:

* Our lay-away plan offers a safe and affordable payment alternative without tying up your credit or subjecting the purchase to high-interest credit card fees.

No Credit Checks or Special Qualifications:

* Anyone 18 years old or older can join. All you need is an active bank account.

Freedom From Credit Cards:

* If you are near or beyond your credit limit or simply want to avoid high interest credit card fees, our e-layaway is the smart choice for you.

Flexible Payment Schedules:

* Similar to traditional layaway, e-layaway lets you make regular payments towards merchandise, with delivery upon payment in full. Payments are automatically deducted from your bank account or made in cash using MoneyGram® ExpressPayment®

A Tool for Planning Ahead:

* Our e-layaway makes it easy for smart shoppers like you to plan ahead and buy items such as bug detectors, nanny cameras, audio bugs, gps trackers, and more!

No Hidden Charges or Mounting Interest:

Our e-layaway makes shopping painless by eliminating hidden charges and monthly interest fees. Our customers pay a flat transaction fee on the initial purchase price.

NO RISK:

* You have the right to cancel any purchase and will receive a refund less a cancellation fee. See website for details.

Security and Identity Protection:

DPL-Surveillance-Equipment has partnered with trusted experts like McAfee and IDology to ensure the security and integrity of every transaction. Identity verification measures are integrated into our e-layaway system to prevent fraudulent purchases.

Note: Simply Choose e-Lay-Away as a "Payment Option" in The Shopping Cart



DPL-Surveillance-Equipment.com is a world leader in providing surveillance and security products and services to Government, Law Enforcement, Private Investigators, small and large companies worldwide. We have one of the largest varieties of state-of-the-art surveillance and counter-surveillance equipment including Personal Protection and Bug Detection Products.



Buy, rent or lease the same state-of-the-art surveillance and security equipment Detectives, PI's, the CIA and FBI use. Take back control!



DPL-Surveillance-Equipment.com

Phone: (1888) 344-3742 Toll Free USA
Local: (818) 344-3742
Fax (775) 249-9320

Monty@DPL-Surveillance-Equipment.com


Google+ and Gmail
DPLSURVE


Twitter
DPLSURVE


MSN
 Monty@DPL-Surveillance-Equipment.com

AOL Instant Messenger
DPLSURVE32

Skype
Montyl32

Yahoo Instant Messenger
Montyi32

Alternate Email Address
montyi32@yahoo.com

Join my Yahoo Group!

My RSS Feed



Bookmark and Share

Thursday, July 21, 2016

Security Expert Says, "Pokémon Go Is A Major Security Risk!!!"





Security Expert Says, 
"Pokémon Go Is A Major Security Risk!!!"









The "augmented reality" smartphone game was released eight days ago. Now a zillion adults share their obsession alongside kids who are too young to remember the original anime game from the ‘90s. People have been busted trampling through cemeteries chasing the colorful pocket monsters. The Holocaust Museum in Washington, D.C. had to declare itself a Pokémon-free zone.




The mobile game just outpaced Tinder and Twitter as the most-downloaded app since July 6, 2016, its first day of availability in the United States.

Guess who’s not playing Pokémon Go: cyber security experts.











In order to play, the app needs to know your location through your device’s GPS and access the camera.

"Pokémon Go is a huge security risk," warns Monty Henry, owner of DPL-Surveillance-Equipment.com LLC physical and cybersecurity expert.


PRO-DTECH II FREQUENCY DETECTOR
(Buy/Rent/Layaway)


Here’s a screenshot of the permissions screen that appears upon downloading Pokémon Go on an Android device, as posted by Twitter user @oscaron: 



Only iPhone users were informed they had to grant the app "full account access" on Google. The only other way to sign up is through the game’s website at pokemongo.com, which has been overwhelmed with users and is currently limiting the number of new users that can sign up at once.



What Does "Full Account Access" Mean?

Reeve, who was among the first experts to sound this warning, claimed on his blog that downloading Pokémon Go would enable it to "read all your email, send email as you, access all your Google Drive documents (including deleting them), access any private photos you may store in Google Photos, and a whole lot more."





"I really wish I could play, it looks like great fun, but there’s no way it’s worth the risk," Reeve wrote.







Niantic, which developed the game for Nintendo’s Pokémon  brand, issued a statement July 11 that they had "recently discovered that the Pokémon GO account creation process on iOS erroneously requests full access permission for the user’s Google account." 



They assured that though the mistake allowed them the ability to dive deep into personal data, the app only accesses a user’s ID and email address.


"No other Google account information is or has been accessed or collected," the statement read.




Niantic said that they were working with Google to fix the permissions issue.





iOS users now see this screen that includes the update, "Fixed Google account scope." 



Does That Fix The Security Concerns?

We consulted David Kennedy, a a cyber security expert and founder of Ohio-based Binary Defense Systems (his official title: Chief Hacking Officer).


(Buy/Rent/Layaway)




His company monitors his clients’ systems and tries to break in to reveal where their security is weak. (Niantic is not a client.)





We asked whether the fix by the app’s developer means that Pokémon Go "trainers" (players, in the game’s parlance) are in the clear.


Wireless Camera Finder
(Buy/Rent/Layaway)




Kennedy said that the updated app will restrict what information it collects to the minimum required for it to function, which still includes location data, email address and camera access.

Be sure, though, that other outside forces will be looking to exploit any cracks in Pokémon ’s armor, Kennedy said, because mobile applications are prone to attack.







"Let’s say I hacked into that application; I would now have access to everyone who installed it, their gmail accounts and everything else," he said. "So it’s a big security and privacy issue from that perspective."

Even with the promised tweaks, Kennedy won’t download it.




Other Concerns

There are other unsettling features of Pokémon Go that, while not unique to the game, might make privacy lovers think twice.

Niantic’s privacy policy is a 20-page document that no kid in reality, virtual or otherwise, is likely to read. Within the policy, Niantic describes how it may share user’s information with third parties who "may not have agreed to abide by the terms of this Privacy Policy."

Those third parties could be unspecified  "private parties," according to the terms of service.

They might sell or transfer personally identifiable information about users in the event of a "merger, sale of assets, acquisition, dissolution, reorganization, bankruptcy, change of control or other similar event."

Kennedy says the third-party issue raises concerns. "With Google, it’s a well-established service. Facebook is a well-established service, with terms and conditions you can read. These third-party applications could be selling your name, your address, your phone number, your contact list, what you’re browsing — directly tied to your name."


(Buy/Rent/Layaway)



A Word On Conspiracy Theories

Then there’s the matter of the app’s developer’s origins, which are a conspiracy theorist’s all-you-can-eat buffet.

Niantic’s founder, John Hanke, created the startup that became Google Maps and Google Earth. Now he’s cast as the man behind the curtain, using unwitting gamers to spy on each other for the CIA -- or so the nether regions of the ‘net would have you believe.
Here’s what Hanke said that set off musings about Pokémon Go being part of a more sinister plot (he was describing how Pokémon Go and it’s predecessor, Ingress, work): "By exploiting the capabilities of smartphones and location technology and through building a unique massively scalable server and global location dataset, we have helped users all around the world have fun, socialize, and get more fit as they play and explore."

As if the words "global location dataset" and "massively scalable server" didn’t sound ominous enough, there’s Hanke’s prior business dealings. Hanke’s mapping startup, called Keyhole, was funded by In-Q-Tel, a techie incubator which "identifies, adapts, and delivers innovative technology solutions to support the missions of the Central Intelligence Agency and broader U.S. Intelligence Community," according to its website.  

Such realizations spawned this Gawker headline "Pokémon Go is a Government Surveillance Psyop Conspiracy." A Reddit thread titled "Pokémon GO could be a photo-based intelligence gathering operation," emerged the day after Pokémon Go was released.

All of that aside, Kathleen Stansberry, a Cleveland State University assistant professor with expertise in social media and strategic communications, told PolitiFact Ohio that it’s easy to see the utilities the technology could provide to police.

"Google has a history of cooperating with law enforcement," Stansberry said, "and I would imagine Pokémon Go would as well."






Another section of the app’s privacy policy says it may "disclose any information about you (or your authorized child) that is in our possession or control to government or law enforcement officials or private parties."

Despite the risks these issues raise, Stansberry plays Pokémon Go with her son.

"By closing that particular loophole (for Google account access), Pokémon Go will be much more on par with other location-based apps," Kennedy said. "I think this is something we’re going to see increasingly, as virtual reality and augmented reality apps become more popular, and I think these privacy issues are going to become of greater concern."

Privacy is a fallacy, she said.


"There’s a big gap between what we believe is private, and what information is really out there about us," Stansberry said. "Did you use your debit card at Target? They’re tracking your purchases so they know how to better target you for ads.  CVS does the same thing. Let’s say every month you buy a pregnancy test and then, suddenly you stop buying pregnancy tests. Now you get a coupon for diapers."




Your questions and comments are greatly appreciated.



Monty Henry, Owner














www.DPL-Surveillance-Equipment.com















































NOW, look in on your home, second home, lake house or office anytime, anywhere from any internet connected PC/Lap-top or Internet active cell phone, including iphone or PDA.

Watch your child's caregiver while sitting at a traffic light or lunch meeting, or check on your business security from the other side of the world. Our built-in hidden video features all digital transmissions providing a crystal clear image with zero interference. With the IP receiver stream your video over the internet through your router, and view on either a PC or smart phone. Designed exclusively for DPL-Surveillance-Equipment, these IP hidden wireless cameras come with multiple features to make the user's experience hassle-free.

NOW, look in on your home, second home, lake house or office anytime, anywhere from any internet connected PC/Lap-top or Internet active cell phone, including iphone or PDA: http://www.dpl-surveillance-equipment.com/wireless_hidden_cameras.html

Watch your child's caregiver while sitting at a traffic light or lunch meeting, or check on your business security from the other side of the world. Our built-in hidden video features all digital transmissions providing a crystal clear image with zero interference. With the IP receiver stream your video over the internet through your router, and view on either a PC or smart phone. Designed exclusively for DPL-Surveillance-Equipment, these IP hidden wireless cameras come with multiple features to make the user's experience hassle-free.

• Remote Video Access

• Video is Recorded Locally To An Installed SD Card (2GB SD Card included)

• Email Notifications (Motion Alerts, Camera Failure, IP Address Change, SD Card Full)

• Live Monitoring, Recording And Event Playback Via Internet

• Back-up SD Storage Up To 32GB (SD Not Included)

• Digital Wireless Transmission (No Camera Interference)

• View LIVE On Your SmartPhone!

Includes:

* Nanny Cameras w/ Remote View
* Wireless IP Receiver
* Remote Control
* A/C Adaptor
* 2GB SD Card
* USB Receiver



FACT SHEET:  HIDDEN NANNY-SPY (VIEW VIA THE INTERNET) CAMERAS

Specifications:

Receiver Specs:

* Transmission Range of 500 ft Line Of Sight
* Uses 53 Channels Resulting In No Interference
* 12V Power Consumption
* RCA Output
* Supports up to 32gig SD

Camera Specs:

* 640x480 / 320x240 up to 30fps
* Image Sensor: 1/4" Micron Sensor
* Resolution: 720x480 Pixels
* S/N Ratio: 45 db
* Sensitivity: 11.5V/lux-s @ 550nm
* Video System: NTSC
* White Balance: Auto Tracking

Make Your Own Nanny Cameras:  Make Tons Of Money In A Booming, Nearly Recession-Proof Industry!


Your Primary Customers Include But Are Not Limited To Anyone In The Private Investigator, Government, Law Enforcement And/Or Intelligence Agencies Fields!

* You Buy Our DVR Boards And We'll Build Your Products! (Optional)









Our New Layaway Plan Adds Convenience For Online Shoppers










DPL-Surveillance-Equipment's layaway plan makes it easy for you to buy the products and services that you want by paying for them through manageable monthly payments that you set. Our intuitive calculator allows you to break down your order's purchase price into smaller payment amounts. Payments can be automatically deducted from your bank account or made in cash using MoneyGram® ExpressPayment® Services and you will receive your order once it's paid in full. Use it to plan and budget for holiday purchases, anniversaries, birthdays, vacations and more!


DPL-Surveillance-Equipment's Customers can now use the convenience of layaway online to help them get through these tough economic times.

We all shop now and then just to face a hard reality -- big credit card bills. However, our latest financing innovation can help you avoid that. Find out why more and more shoppers are checking out DPL-Surveillance-Equipment's e-layaway plan.

If you're drooling over a new nanny camera, longing for a GPS tracker, or wishing for that spy watch, but you're strapped for cash and can't afford to do credit, do what Jennie Kheen did. She bought her iPod docking station (hidden camera w/motion-activated DVR) online using our convenient lay-away plan.

Our online layaway plan works like the old-fashioned service stores used to offer. But, in Kheen's case, she went to DPL-Surveillance-Equipment.com, found the iPod docking station (hidden camera w/motion-activated DVR), then set up a payment plan.

"It's automatically drawn from my account," she said. "I have a budget, $208.00 a month.

In three months, Kheen had paid off the $650.00 iPod docking station. She paid another 3.9 percent service fee, which amounted to about $25.35 (plus $12.00 for shipping) for a total of $687.35.

"You pay a little bit each month," Kheen said. "It's paid off when you get it and you don't have it lingering over your head. It's great."

Flexible payment terms and automated payments make our layaway plan an affordable and fiscally responsible alternative to credit cards.

1. Register:

It's quick, easy and FREE! No credit check required!

2. Shop:

Select the items or service you want and choose "e-layaway" as your payment option. Our payment calculator makes it easy for you to set up your payment terms.

3. Make Payments:

Payments are made on the schedule YOU set. Check your order status or adjust your payments online in a secure environment.

4. Receive Products:

Receive the product shortly after your last payment. The best part, it's paid in full... NO DEBT.

More Buying Power:

* Our lay-away plan offers a safe and affordable payment alternative without tying up your credit or subjecting the purchase to high-interest credit card fees.

No Credit Checks or Special Qualifications:

* Anyone 18 years old or older can join. All you need is an active bank account.

Freedom From Credit Cards:

* If you are near or beyond your credit limit or simply want to avoid high interest credit card fees, our e-layaway is the smart choice for you.

Flexible Payment Schedules:

* Similar to traditional layaway, e-layaway lets you make regular payments towards merchandise, with delivery upon payment in full. Payments are automatically deducted from your bank account or made in cash using MoneyGram® ExpressPayment®

A Tool for Planning Ahead:

* Our e-layaway makes it easy for smart shoppers like you to plan ahead and buy items such as bug detectors, nanny cameras, audio bugs, gps trackers, and more!

No Hidden Charges or Mounting Interest:

Our e-layaway makes shopping painless by eliminating hidden charges and monthly interest fees. Our customers pay a flat transaction fee on the initial purchase price.

NO RISK:

* You have the right to cancel any purchase and will receive a refund less a cancellation fee. See website for details.

Security and Identity Protection:

DPL-Surveillance-Equipment has partnered with trusted experts like McAfee and IDology to ensure the security and integrity of every transaction. Identity verification measures are integrated into our e-layaway system to prevent fraudulent purchases.

Note: Simply Choose e-Lay-Away as a "Payment Option" in The Shopping Cart



DPL-Surveillance-Equipment.com is a world leader in providing surveillance and security products and services to Government, Law Enforcement, Private Investigators, small and large companies worldwide. We have one of the largest varieties of state-of-the-art surveillance and counter-surveillance equipment including Personal Protection and Bug Detection Products.



Buy, rent or lease the same state-of-the-art surveillance and security equipment Detectives, PI's, the CIA and FBI use. Take back control!



DPL-Surveillance-Equipment.com

Phone: (1888) 344-3742 Toll Free USA
Local: (818) 344-3742
Fax (775) 249-9320

Monty@DPL-Surveillance-Equipment.com


Google+ and Gmail
DPLSURVE


Twitter
DPLSURVE


MSN
 Monty@DPL-Surveillance-Equipment.com

AOL Instant Messenger
DPLSURVE32

Skype
Montyl32

Yahoo Instant Messenger
Montyi32

Alternate Email Address
montyi32@yahoo.com

Join my Yahoo Group!

My RSS Feed



Bookmark and Share