These are new product announcements from my main website (Open 24/7/365).
We have a life-time warranty / guarantee on all products. (Includes parts and labor).
Here you will find a variety of cutting-edge Surveillance and Security-Related products and services. (Buy/Rent/Layaway)
Post your own comments and concerns related to the specific products or services mentioned or on surveillance, security, privacy, etc.
We have a life-time warranty / guarantee on all products. (Includes parts and labor).
Color
This item rents for $95.00 per week.
We Also Have Various Other Hidden (Baby-Sitter Catcher) Cameras With a Built-in Motion-Activated Digital Video Recorder (See Below)!
Our new Clock Radio with built-in Digital Video Recorder is completely self contained, totally secure, and easy to use. It's a full function Emerson clock radio, but hidden inside is high resolution color and B/W camera and motion activated DVR!
We Also Have Various Other Cameras With a Built-in Motion-Activated Digital Video Recorder (See Below)!
Self-contained totally covert motion activated real time video or high-resolution "still shots" are recorded on a tiny SD card, housed in a hidden compartment.
Day/Night Operation: Automatically changes from Sony Ex-View Color to Sony Ex-view ultra low light (.0001 Lux) when light levels fall below .05 Lux.
High Resolution Video at 12 fps: (640 X 480) High Resolution fluid motion recording capability. (user adjustable from 1 to 12 fps)
Medium Resolution Video at 30 fps (320 X 240) (user adjustable from 1 to 30 fps)
16GB SDHC Card Support- Up to 80 hours recording at full 30 fps- (records 5 hours per GB on lower capacity SD cards) Hundreds of hours possible with lower frame rate selections.
Firmware Upgrade - New firmware can be quickly installed via USB port.
Embedded Time/Date Stamp - Embedded in video- Time/Date stamp is seen on both playback from unit and PC via SD Card.
Enhanced Motion Activation: Not only is sensitivity adjustable, but also features a "grid" setting with multiple blocks to eliminate unwanted triggers in the camera view such as a computer screen or rotating fan.
Schedule Recording: Record time can be set to record at only times of interest.
Event Search Function: Property and fist image of selected file is displayed to quickly find a particular event.
IR Remote Control: For setting system parameters and arming and disarming unit.
Two Playback Options - Recorded images/video can be played back directly from the unit by simply connecting the included RCA cable to your TV/Monitor and touching the play button on IR remote control. SD card can also be removed from unit and played on your PC via included SD card reader. No additional PC software needed.
Everything Included:
No extra costs! Our system includes the DVR/Camera, Two SD cards (1Gb), USB SD card reader with extension cable, RCA video connector cable for use with your TV/Monitor, IR remote control, and instruction manual.
We Offer The Most Product Selections Available.
Our system is expertly built into more than a dozen different everyday items commonly used in a household or business environment. Our wide selection insures that a product is available for most any security application without raising suspension from anyone.This is the ultimate spy gadget of spy-gadgets.
Approx. 1-2 Days of Continous Recording on a 1Gb SD Card. Approx. 2-3 Days of Continous Recording on a 2Gb SD Card.
Options:
380 Lines of Resolution, 0.0003 Lux, Add $100.00 (Sony Chip) 480 Lines of Resolution, 0.01 Lux, Day and Night Camera: Add $50.00
Day and Night Capability: Add: $50.00 480 Lines of Resolution
DPL-Surveillance-Equipment.com is a world leader in providing surveillance and security products and services to Government, Law Enforcement, Private Investigators, small and large companies worldwide. We have one of the largest varieties of state-of-the-art surveillance and counter-surveillance equipment including Biometric Identification Systems, Anti-terrorist-related equipment, Personal Protection (recommended for our female customers) and Bug Detection Products.
Buy, rent or lease the same state-of-the-art surveillance and security equipment Detectives, PI's, the CIA and FBI use. Take back control!
Enter Coupon Code: "Blogger" and save 5% (Please do not use quotes).
We have a life-time warranty / guarantee on all products. (Includes parts and labor).
Surveillance and Security Equipment Demonstration Videos (Watch & Listen):
This Item Rents for $75.00 Per Week.
Protect Yourself From Spying Eyes And Ears With The RF (Multi-Functional) 1Mz-8Ghz Detector!
The high-tech RF (Multi-Functional) 8Ghz Detector finds phone taps, hidden cameras, eavesdropping devices or “bugs,” GPS trackers, cell phone bugs and room bugs, to ensure that your private life stays private. An engineering breakthrough in counter surveillance is now available to the public.
And, for all the telephone tests, the unit connects into the telephone line just as easily as plugging in an extension telephone.
* Easy-To-Use, Just Flip The Switch And Start Debugging * Detects and Locates Analog, Digital & Spread Spectrum Up To 25 Feet Away * Incredible Detection Range Up To 8 GHZ
Feel like you’re being watched? Find out the truth with the RF (Multi-Functional) 8Ghz Detector that Does It All. This eavesdropping device detector locates phone taps, hidden video cameras, eavesdropping devices or “bugs” in one easy-to-use handheld device. Make sure your privacy is protected with the ultimate eavesdropping detection device.
Free “White Noise” Generator which is included with each order
The RF (Multi-Functional) 8Ghz Detector Can Locate Most Major Types Of Bugs:
* Analog and Digital Bugs * The “Infinity” Spy Device (Hook-Switch Bypass, Third Wire Tap, Harmonica, Etc.) * “Series” and “Parallel” Telephone Taps * Cell Phone Bugging Devices * Body Transmitters (i.e. Body Wires) * Computer and Fax Eavesdropping Devices * Room Bugs * Concealed Video Cameras * GPS Vehicle and Personal Tracking Devices * Many, many, more…
Are You Being Spied On?
Could someone be listening in or watching you? With the small and hidden designs of the latest eavesdropping and surveillance devices, you might never know if you are being spied on in your own bathroom, shower, office, or home. You might even have people listening to your private conversions with a phone tap or audio surveillance device. With all of this eavesdropping equipment on the market, what can you do to protect yourself? Take action against prying eyes with RF (Multi-Functional) 8Ghz Detector. This device is a form of counter surveillance that can locate most eavesdropping equipment installed in your home or office no matter how hidden they are.
Don’t Give Thieves Access To Your Personal Information Or Possessions:
Being spied on can be more than just embarrassing. Oftentimes, thieves use eavesdropping equipment or “bugs” such as sound amplifying devices for audio surveillance or hidden cameras for video surveillance to find out valuable information about your personal finances and possessions. Your private conversations can give thieves all the information they need to steal your identity, break into your home, or even abduct your children. Protect yourself with the RF (Multi-Functional) 8Ghz Detector.
Find Hidden Cameras & Audio Surveillance To Protect Your Personal Privacy.
Hidden cameras and listening devices can be anywhere. Oftentimes these surveillance devices are hidden in showers or bedrooms, where people don’t know they are there. These videos and images are sometimes sold on the Internet without permission from those featured in the hidden camera videos. Also these audio surveillance devices can secure incriminating evidence or personal information. This is not only embarrassing but also a dangerous. Make sure that your privacy and safety are protected by de-bugging your home with the RF (Multi-Functional) 8Ghz Detector. This counter surveillance device makes sure to locate most hidden cameras and audio surveillance devices to ensure that you are not the victim of this type of crime.
Features:
* Protects your privacy and personal safety * Locates hidden cameras, eavesdropping devices or “bugs,” phone taps, GPS trackers, room bugs and body wires * “Sensitivity Mode” homes in on even the smallest hidden bugs * Detects the “Infinity Device,” one of the most popular Eavesdropper’s bugs * Features 2 modes: “Eavesdropping Transmitter Detection Mode” and “Infinity Test Mode” to locate bugs and hidden cameras * Detects Analog and Digital bugs for the ultimate in protection * Scans At The Highest Frequency Range Found Anywhere!
Specifications:
* Operates on one 9-volt battery * No external antenna that can break or malfunction * LED lights and audio to alert you of hidden bugs * 8GHz Detection Frequency to locate the newest eavesdropping devices
Includes:
* One Frequency Finder Debugger * Earphone Jack * Earphones
Different bugs include audio surveillance, video surveillance, as well as a GPS location devices used to transmit and record incriminating evidence and personal information. These eavesdropping devices, or “bugs,” are widely purchased and easy to install. With their covert designs and hidden models, you might never know if your house is being bugged. These bugs are covert, hidden, and strong, being able to pick up sounds in as much as a 400 foot range.
White Noise Generator Software:
After many years of research, we have finally developed an effective "White Noise" Generator and burned the acoustic masking frequencies onto a standard CD.
By uniquely reproducing the masking frequencies on a CD, we have eliminated the relatively expensive electronic equipment presently required to produce the masking effect.
The electronic equipment normally required is offered on the Internet and elsewhere at prices ranging anywhere from $200 up to $1,700 and more, depending upon the manufacturer and the dealer profit margins. The development of our unique software CD has made it possible to completely eliminate all the previously required electronic reproduction equipment and has resulted in considerable savings in our cost to produce the audio masking effect.
If you are new to, or unfamiliar with "white noise" and its use in defeating audio eavesdropping, a brief, non-technical explanation follows:
In normal conversation, sound waves carry the audio from the speaker to the listener. If these sound waves can be over-ridden with frequencies designed specifically to disrupt and "jumble" the normal audio frequencies, a deadening effect is created. This deadening effect known as "white noise" effectively hides the conversation from would be eavesdroppers.
The software produces the "white noise" and effectively defeats all types of Eavesdropping Devices utilizing any type of microphone for sound pick-up including tape recorders, hard-wired microphones, parabolic and shotgun mikes and even protects against "Micro-Wave" and "Laser" devices that carry audio to the Eavesdropper.
The RF (Multi-Functional) 8Ghz Detector picks up frequencies being emitted throughout your home or office. That means that if any of these devices are installed in your space, you will be able to detect them no matter how hidden they are. Listed below are the different types of bugs and their capabilities that include total audio surveillance, telephone transmitting surveillance, and GPS location. Make sure that your privacy stays private and that you do not fall victim to one of these eavesdropping devices.
Bugs Let Spies Listen and Record Without Detection
The Infinity Device:
(a.k.a Hookswitch, Third Wire, Harmonica Bug) This is the most sophisticated bug on the market because it not only intercepts telephone conversations but it also picks up sounds and conversations within a 400 square foot area. Unlike other telephone bugs, the Infinity Device can record sounds or conversations while the phone remains on the hook. That means that once it is installed, it can pick up all telephone conversations and regular sounds in your home.
This device is remotely activated and triggered by a particular frequency tone, combination of tones, or external voltage requiring no ring. It can be hidden directly inside a telephone or anywhere on the premises being watched. It is about 1 inch by 2 inches and has 2-4 wires, making it small and practically undetectable by the naked eye. There is no range restriction and all room sounds and conversations (even international) can be monitored and or recorded. The only way to detect this device is with a counter surveillance device or bug detector such as the RF (Multi-Functional) 8Ghz Detector.
Concealed Wall Plug Transmitter:
This audio surveillance unit can pick up all sounds within a 20 x 20 foot room. Disguised as a wall plug and fully functional, you will probably never notice it’s there. This unit is built into the wall and has three functional sockets and a small pinhole microphone that can pick up even the most sensitive sounds. The Frequency Finder can locate even these hidden surveillance devices so you can protect your own privacy.
Concealed 6 Socket Plug Transmitter:
Similar to the concealed wall plug transmitter, this device has 6 fully functional sockets and a hidden microphone. The size of this unit allows for greater amplification that can pick up even more sensitive sounds for the best audio surveillance, and transmit them as far as 250’ feet away.
Concealed Wall Transmitter:
Similar to the other wall plugs, this device has one frightening feature: it has an antenna for greater audio surveillance. This means that you may have a hidden wall outlet transmitter with up to 3 foot cord hidden in your walls. This device can pick up sound and transmit it as far away as 1,500 feet. Upon visual examination you would never be able to tell that this wall outlet is actually a hidden audio surveillance unit.
Concealed Lamp Transmitter:
Unlike wall transmitters, this concealed lamp transmitter requires no installation and is easily put in place. With a hidden antenna, this lamp can also pick up sounds and transmit them as far away as 1,500 feet away. Some of these devices only pick up sounds when they are illuminated, while others can pick up sound all of the time. Similar devices can be concealed in radios and TV’s. You might never know if your lamp is actually a concealed audio transmitter.
Bumper-Beeper Tracking Device:
This device attaches to the underside of a vehicle and is used for GPS Tracking. It functions in heavy traffic within a range of 5 miles. The Bumper-Beeper is usually attached to the underside of the car in an area where even auto mechanics rarely check. This device transmits to a receiver through radio signal and can be used in conjunction with another receiver for exact triangulation therefore obtaining an exact location of the vehicle being tracked.
Body Transmitter:
More commonly known as a “wire,” this device can be concealed on the body to pick up conversations and sounds. Trusted by law enforcement for obtaining rock solid evidence, this device is also used by private citizens since it doesn’t violate most state or federal statutes pertaining to “surreptitious” interception. This device picks up sounds and transmits them anywhere between 300 and 2,000 feet away from the person wearing the wire.
Automatic Telephone Recording Device:
This device installs into your telephone and is programmed to start recording whenever the telephone is picked up. This device is installed directly into your phone so that there is no chance of detection upon visual inspection unless the phone is disassembled.
“Series” Telephone Transmitter:
This device transmits both sides of any telephone conversation to a receiver anywhere from 100 to 500 feet away. This device utilizes the phone’s power so there are no batteries to charge or change, ever. This device only utilizes the phone’s power during a conversation so when the phone is hung up little or no power is used lessening the possibility of detection by the phone company. It’s about 1 inch by 1 inch, making it small enough to avoid detection.
“Parallel’ Telephone Transmitter:
Like the “Series” Telephone Transmitter, the “Parallel” Telephone Transmitter also transmits both sides of a conversation to a receiver within 200 to 1,000 feet away. This device requires external battery power but may also be wired directly into the AC source for your phone. It’s about 1 inch by 2 inches, which is small enough to avoid detection. This audio surveillance device may have an antenna for increased listening capabilities.
Modular Jack Telephone Transmitter:
This is a Telephone Transmitter disguised as a Modular Jack. Comes completely assembled and picks up sound, transmitting it to a receiver as far as 1,000 feet away. This device inserts into an existing telephone jack for undetectable audio surveillance.
Computer Surveillance:
Keyloggers and computer surveillance spyware can be installed to monitor the use of your computer and save all information onto an external hard drive or disk. With these devices, you will have a record of all the sites you have visited as well as all the conversations or e-mail you have had online.
What To Do?
How do you protect yourself against these devices if they are all hidden and not detectable? By sweeping your house with the RF (Multi-Functional) 8Ghz Detector or any of our other more specialized detectors . These devices will locate even the most hard to find audio surveillance, video surveillance, and GPS Trackers to keep your privacy protected and prevent anything from identity theft and even child abduction.
Representing the next generation of radio frequency detection is our Smart RF Detector. This high quality unit features a 7 digit LCD, ultra sensitive synchronous detector and 16 section bar graph to show RF signal strength. Detects digital and analog signals.
Specifications: * Detects digital and analog signals * 16 Section bar graph to show RF signal strength * Selectable detection ranges: 1Ghz/2.8Ghz * 1 GHz range: 30 MHz to 0.8Ghz * 2.8 GHz range: 500 MHZ to 2.8 Ghz * Sensitivity adjustment * Hold switch to lock display * Low battery indicator * Sensitivity of less than 5mV * 15 dBm maximum input * 9V DC 300mA reachargeable battery power
Size: 33/4" x 2 3/4" x 1 1/4"
Includes: * AC wall charger * 2.4 GHz antenna * Telescopic antenna * User manual Do-it-yourself Bug Sweeps, Counter-Surveillance and Bug Detection! Using our equipment! Buy, rent or lease the same state-of-the-art surveillance and security equipment Detectives, PI's, the CIA and FBI use. Take back control!
Our equipment is easy to use and comes complete with instructions, 24/7/365 tech. support and the option to rent!
If you are concerned about the security of your telephone conversations, or possible hidden cameras or audio bugs, call us today.
We provide security and peace of mind for your business, your home, and for you.
We also have other "bug" detection products. See below:
This item rents for $480.00 per week.
The DPL-CPM-2000 is a broadband receiver designed to detect and locate all major types of electronic surveillance devices including room, phone, body bugs, video transmitters, and tape recorders.
Frequency Response: 15kHz-1MHz-3dB MAX input voltage: 300 VAC 50-60Hz Isolation: 1500 VAC 60Hz Sensitivity: -38dBm (1 segment) -60 M.D.L.
Audio Amplifier:
Input Impedance: 50K Ohm balanced Input Range: 1.7uV-10V (135dB) AGC Dynamic Range: 100dB (high and low gain) Frequency Response: 100Hz- 15kHz±3dB (filtered) 500Hz-24dB/octave, 2.5kHz-18dB/octave Headphone Output: 5Vp-p 220 Record Out: 25 mVp-p nominal with AGC
Display:
LCD barograph: 18 segment with pulsing single segment trip point 50dB dynamic range (1 segment High Gain to MAX Low Gain) Alert Output: 2.8kHz tone or silent red LED at 2Hz Remote Output: N.O. contact (300mA 25V MAX)
Battery:
8 ea. MN1500 AA Alkaline - Life 10-16 hrs (Optional) 8 ea. 550mAh NiCad - life 3-5 hrs per charge Low Battery Indicator : approx. 10% remaining power
AC Adapter/Charger:
Input: 95-l30VAC 50-60Hz, or 200-275VAC 50-60Hz Output: 12VDC with 500mA NiCad Recharge Time: 8-10 hrs
DPL-CPM-2000 Unit:
Size: 9 1/8 x 6 1/8 x 1 3/4 in, 23.2 x 15.6 x 4.4 cm Weight: 39 oz, 1.1 kg
Carry Case with all standard Items:
Size: 16 3/8 x 11 1/4 x 3 in, 41.6 x 28.6 x 7.6cm Weight: 7 lbs, 3.18 kg
FACT SHEET: COUNTER-SURVEILLANCE PROBE / MONITOR Broadband receivers such as the DPL-CPM-2000 provide a very important cost-effective tool for professional sweep teams, government security personnel, and private citizens with important security needs.
The DPL-CPM-2000 is very effective for rapidly detecting and locating transmitted signals, while being very easy to learn to use. The DPL-CPM-2000 sweep kit includes a custom Cordura case that contains all items necessary to conduct a professional sweep.
There are several 'imitations' of the DPL-CPM-2000 on the market because of its success as a product. While some of these copies may be cheaper, they do not provide the frequency performance and sensitivity of the DPL-CPM-2000. We guarantee it! DPL-CPM-2000 Advantages
Portable Sweep Kit - provides everything needed to perform a professional sweep; fits inside a standard briefcase.
Multi-Functional Utility - Comes with probes to detect RF transmitters (audio and video), carrier current transmitters, and telephone bugs. Probes also available to detect for infrared transmitters, tape recorders, and acoustic leakage.
Wideband Coverage - from 200Hz to over 3GHz with no holes or gaps.
Monitor Mode - after a sweep, the alarm monitor (silent or audible alert) guards against new devices brought in or remote control activation of surveillance devices.
Auxiliary Audio Input - allows user to listen to telephones or lines for 'hotmikes,' hookswitch by-pass and 'infinity' bugs. Unknown wires and cables can be tested for wired microphones.
The following article is designed to assist you with finding hidden cameras (wired or wireless), blocking GPS tracking devices, locating hidden audio-based bugs (or transmitters), blocking or jamming cell phones in addition to intercepting wireless camera and video signals.
If any of the following warning signs apply and you are concerned about covert eavesdropping or wiretapping then it would be wise to contact DPL-Surveillance-Equipment.com to rent or purchase one of our state-of-the-art bug detection products.
Are you a potential target?
1. If eavesdropping on anything you say, write, or do could increase someone else's wealth or influence, then the answer is yes, you are a potential target.
2. Others know your confidential business or professional trade secrets.
This is the most obvious indicator of covert eavesdropping activities. Theft of confidential information is a multi-billion dollar underground industry in the United States. Often the loss of your secrets will show up in very subtle ways so you should always trust your instincts in this matter. When your competitors, associates or co-workers know things that are obviously private, or the media finds out about thi ngs they should not know, then it is reasonable to suspect technical eavesdropping or bugging.
3. Secret meetings and bids seem to be less than secret.
Confidential meetings and bids are very popular targets for corporate spies. How would you like the plans for the corporate takeovers you're planning to become public knowledge? Would copies of your product designs be of any use to your competitors? Would it be beneficial for your competitors to know how much you're quoting for the same project?
4. People seem to know your activities when they shouldn't.
5. You have noticed strange sounds or volume changes on your phone lines.
This is commonly caused by an amateur eavesdropper when they attach a wiretap, or activate a similar listening device. Surveillance devices often cause slight anomalies on the telephone line such as volume shift or drop-out. Professional eavesdroppers and their equipment usually do not make such noises; so if this is goin g on it could indicate that an amateur eavesdropper is listening in. On the other hand you could simply be experiencing a flaw in the line, but you should check it out.
6. You have noticed static, popping, or scratching on your phone lines.
This is caused by the capacitive discharge which occurs when two conductors are connected together (such as a bug or wiretap on a phone line). This is also a sign that an amateur eavesdropper or poorly trained spy is playing with your phone lines. It could be nothing more then a problem with your phone line or instrument. However, it should be checked out by using one of our RF Detectors .
7. Sounds are coming from your phones handset when it's hung up.
This is often caused by a hook switch bypass, which turns the telephone receiver into an eavesdropping microphone (and also a speaker). There is probably somebody listening to everything you say or do within twenty feet of the telephone (if this is happening).
8. Your phone often rings and nobody is there, or a very faint tone, or high-pitched squeal/beep is heard for a fraction of a second.
This is an indicator of a slave device, or line extender being used on your phone line. This is also a key indicator of a harmonica bug, or infinity transmitter being used. Of course it may also be nothing more then a fax machine or modem calling the wrong number. However, using one of our Telephone Line Analyzers . should check it out.
9. You can hear a tone on your line when your phone is on the hook (by using an external amplifier). Contact us!
10. Your AM/FM radio has suddenly developed strange interference.
Many amateur and spy shop eavesdropping devices use frequencies within or just outside the FM radio band, these signals tend to drift and will "quiet" an FM radio in the vicinity of the bug. Look for the transmissions at far ends of the FM radio band, and at any quiet area within the FM band. If the radio begins to squeal then slowly move it around the room until the sound become very high pitched. This is referred to as feedback detection or loop detection and will often locate the bug. The "stereo" function should be turned off so the radio is operating in "mono" as this will provide a serious increase in sensitivity. If you find a "squealer" in this manner then immediately Contact us!
11. Your car radio suddenly starts "getting weird"
Keep in mind that the antenna your car radio uses may be (and often is) exploited by an eavesdropper, and that such usage may interfere with radio reception (so be concerned if your automobile radio suddenly starts getting weird).
12. Your television has suddenly developed strange interference.
Television broadcast frequencies are often used to cloak a eavesdropping signal, but such devices also tend to interfere with television reception (usually a UHF channel). Televisions also "suck in" a lot of RF energy and because of this are very sensitive to any nearby transmitters (this is technically called "Bandwidth, and TV signals use a lot of it). Contact us! asap!
13. You have been the victim of a burglary, but nothing was taken.
Professional eavesdroppers often break into a targets home or office, and very rarely leave direct evidence of the break-in; however, occupants of the premises will often "pickup on something not being right" such as the furniture being moved slightly.
14. Electrical wall plates appear to have been moved slightly or "jarred".
One of the most popular locations to hide eavesdropping devices is inside, or behind electrical outlets, switches, smoke alarms, and lighting fixtures. This requires that the wall plates be removed. Look for small amounts of debris located on the floor directly below the electrical outlet. Also, watch for slight variations in the color or appearance of the power outlets and/or light switches as these are often swapped out by an eavesdropper. Also note if any of the screws which hold the wallplate against the wall have been moved from their previous position.
15. A dime-sized discoloration has suddenly appeared on the wall or ceiling.
This is a tell tale sign that a pinhole microphone or small covert video camera has been recently installed.
16. One of your vendors just gave you any type of electronic device such as a desk radio, alarm clock, lamp, small TV, boom box, CD player, and so on.
Many of these "gifts" are actually Trojan horses which contain eavesdropping devices. Be very suspicious of any kind of pen, marker, briefcase, calculator, "post-it" dispenser, power adapter, pager, cell phone, cordless phone, clock, radio, lamp, and so on that is given as a gift. That little gift the salesman left for you may be a serious hazard.
17. A small bump or deformation has appeared on the vinyl baseboard near the floor.
Strong indicator that someone may have concealed covert wiring or a microphone imbedded into the adhesive which holds the molding to the wall. Such deformation will often appear as a color shift, or lightening of the color.
18. The smoke detector, clock, lamp, or exit sign in your office or home looks slightly crooked, has a small hole in the surface, or has a quasi-reflective surface.
These items are very popular concealment for covert eavesdropping devices. Often when these devices are installed at a target location they are rarely installed without small tale-tale clues.
19. Certain types of items have "just appeared" in your office or home, but nobody seems to know how they got there.
Typical items to watch for and be aware of are: clocks, exit signs, sprinkler heads, radios, picture frames, and lamps.
20. White dry-wall dust or debris is noticed on the floor next to the wall.
A sign that a pinhole microphone or video camera may have been installed nearby. It will appear as if someone has dropped a small amount of powdered sugar either on the floor, or on the wall.
21. You notice small pieces of ceiling tiles, or "grit" on the floor, or on the surface area of your desk. Also, you may observe a cracked, chipped, or gouged ceiling tiles, or ones that are sagging, or not properly se t into the track.
Prime indicator that a ceiling tile has been moved around, and that someone may have installed a hidden video camera or other eavesdropping device in your office or near your desk. Also watch for cracks or chips in the ceiling tiles. Amateur and poorly trained spies tend to crack or damage acoustical tiles. The ceiling tiles in any executive areas should never contain any cracks, nicks, gouges, or stains. Any ceiling tile that becomes damaged (for what ever reason) should immediately be replaced and the cause of the damage documented.
22. You notice that "Phone Company" trucks and utilities workers are spending a lot of time near your home or office doing repair work.
If you see the same or similar vehicles more then three times then you may have a serious problem (at least according to the U.S. State Department training course on counter surveillance).
23. Telephone, cable, plumbing, or air conditioning repair people show up to do work when no one called them.
A very common ruse which eavesdroppers use to get into a facility is to fake a utility outage, and then show up to fix the problem. While they are fixing "the problem" they are also installing eavesdropping devices. Some of the more popular outages involve power, air conditioning, telephone, and even the occasional false fire alarm.
24. Service or delivery trucks are often parked nearby with nobody (you can see) in them.
These vehicles are commonly used as listening posts, be very cautious of any vehicle, which has a ladder or pipe rack on the roof. Also, be wary of any vehicle, which has tinted windows, or an area, which you cannot see though (like a service van). The listening post vehicle could be any vehicle from a small Geo Tracker, Suburban, Blazer, Trooper, or Cargo Van. Look for any vehicle, which could conceal a person in the back or has tinted windows. Also, keep in mind that the eavesdropper may relocate the vehicle several times, so look around. Typically, eavesdroppers like to get within 500-750 feet from the place or person they are eavesdropping on.
25. Your door locks suddenly don't "feel right", they suddenly start to get "sticky", or they completely fail.
Prime evidence that the lock has been picked, manipulated, or bypassed. Try to always use biaxial locks with sidebars (such as ASSA or Medeco). Also, only use double sided deadbolts in all doors, and good quality window bars on all windows, and a good quality door bar on all doors not used as a primary entry doors.
26. Furniture has been moved slightly, and no one knows why.
A very popular location for the installation of eavesdropping device is either behind, or inside furniture (couch, chair, lamp, etc.) People who live or work in a targeted area tend to notice when furnishings have been moved even a fraction of an inch. Pay close attention to the imprint which furniture makes on rugs, and the position of lamps sh ades. Also watch the distance between furniture and the wall as eavesdroppers are usually in a hurry and rarely put the furniture back in the right place.
27. Things "seem" to have been rummaged through, but nothing is missing (at least that you noticed).
A "less than professional spy" will often rummage through a targets home for hours, but very rarely will they do it in a neat and orderly fashion. The most common "rummaging" targets are the backs of desk drawers, the bottom of file cabinets, closets, and dresser drawers.
28. An eavesdropper sends you a copy of your private conversations.
As simple as it seems this is the strongest indicator, and solid proof of eavesdropping. An eavesdropper will sometimes send a victim a copy of a private conversation they intercepted in an attempt at blackmail, or in an attempt to terrorize, or to just stalk the victim. This is commonly seen in civil lawsuits, criminal court cases, marital problems, shareholder disputes, custody battles, and other situations were one side has a position of weakness and is trying to physiologically undermine their opponent.
When contacting DPL-Surveillance-Equipment.com please remember not to c all from any suspect area, do not use your cellular telephone, do not use your cordless phone, and do not use any suspect telephone (instead call from a sterile phone somewhere outside the suspect area).
Who Gets Bugged?
High Threat Business Situations
* Your company has stock, which is publicly traded (or will be soon) * Your company is having labor problems, union activities, or negotiations * Your company is involved in any type of litigation or lawsuit * Your company has layoffs pending (or they have just happened) * Your company is involved in the fashion, automotive, advertising, or marketing industry
Anyone can be the target of covert eavesdropping, however; some people are under greater risk than others because of financial position, occupation, legal, or domestic situation.
* Spouses bug each other on a regular basis * Parents bug children * Businessmen bug other businessmen * Scientists bug other scientists * Stud ents bug professors * Attorneys bug other attorneys (and their clients) * Insurance companies bug accident victims, and other claimants * Construction companies bug other construction companies * Salesmen bug clients * Collection agencies bug debtors * Police officers bug suspects * Executive recruiters bug personnel directors * Rock fans bug rock musicians * Department stores bug customers and merchandise
The Neighbors, Coworkers, Friends, Enemies, Strangers, Your Spouse, Industrial Spies, Government Agents, Your Insurance Company, Your Boss...
High Threat Personal Situations (When to be seriously concerned)
You (or someone close to you) have been:
* Involved in any type of litigation or lawsuit * Been questioned, arrested or arraigned by the police * In the process of getting married, divorced, or separated * A minister or religious leader (ie: priest, rabbi, deacon, bishop, elder...) * Running for any type of ele cted public office * Elected to any public office (ie: mayor, selectman, school principal) * Executive or scientist at any large company * Recently filed a insurance claim * Engaging in political demonstrations or activism * Employed by a defense contractor, Department of Energy, etc... * Private Investigators have been "poking" around * You are in the upper income bracket
Keep in mind that anybody with Money, Power, Influence, or access to sensitive, classified, or personal information is at serious personal risk.
On a related note: If you work (or have worked) for any kind of military, governmental, law enforcement or judicial agency the possibility of you being targeted for eavesdropping is very high.
Such eavesdropping can come from either side of the law, and is rarely legal or court sanctioned. Additionally, people married to, associated with, divorced from, getting divorced from, dating, or getting intimate with a member of law enfor cement, private security, PI, or any level of the judicial system should be concerned about illegal eavesdropping (yes, cops love to bug their wives and girlfriends).
High Threat Occupations
* Attorney * Doctor * Chiropractor * Dentist * Architect * Police Officer * Court Clerk * Judge * Elected to any public office * Mayor * Selectman * School Principal * College Professor * Product Engineer * Software Developer * Executive at any large company * Scientist at any large company * Employed by any defense contractor * Employed by the Department of Energy * Any minister or religious leader (ie: deacon, bishop, elder...) * Corporate Buyer or Purchasing Agent * Employee of a Construction Contractor * Any type Sales or Marketing * Labor or Union Official * Fashion * Advertising * Personnel Directors
According the FBI the following types of businesses are under EXTREME risk and are popular targets of illegal bugging, wiretapping, and similar surveillance:
* Materials: Materials synthesis and processing * Electronic and photonic materials * Ceramics * Composites * High-performance metals and alloys
Manufacturing:
* Flexible computer-integrated manufacturing * Intelligence processing equipment * Micro- and nanofabrication * Systems management technologies
Information and Communications:
* Software * Micro and optoelectronics * High-performance computing and networking * High-definition imaging and displays * Sensors and signal processing * Data storage and peripherals * Computer simulation and modeling
Biotechnology and Life Sciences:
* Applied molecular biology * Computational Chemistry * Medical technology
* Energy technologies * Pollution minimization, remediation, and waste management
By the way, you may buy or rent any of these items on a weekly basis.
* Most of our product can be modified to use European 220v
Do-it-yourself Bug Sweeps, Counter-Surveillance and Bug Detection (http://www.dpl-surveillance-equipment.com/detection_devices.html)! Using our equipment! Buy, rent or lease the same state-of-the-art surveillance and security equipment Detectives, PI's, the CIA and FBI use. Take back control!
Our equipment is easy to use and comes complete with instructions, 24/7/365 tech. support and the option to rent!
If you are concerned about the security of your telephone conversations, or possible hidden cameras or audio bugs, call us today.
We provide security and peace of mind for your business, your home, and for you.
DPL-Surveillance-Equipment.com is a world leader in providing surveillance and security products and services to Government, Law Enforcement, Private Investigators, small and large companies worldwide. We have one of the largest varieties of state-of-the-art surveillance and counter-surveillance equipment including Biometric Identification Systems, Anti-terrorist-related equipment, Personal Protection (recommended for our female customers) and Bug Detection Products.
Buy, rent or lease the same state-of-the-art surveillance and security equipment Detectives, PI's, the CIA and FBI use. Take back control!
Enter Coupon Code: "Blogger" and save 5% (Please do not use quotes).
We have a life-time warranty / guarantee on all products. (Includes parts and labor).
Surveillance and Security Equipment Demonstration Videos (Watch & Listen):
Representing the next generation of radio frequency detection is our Smart RF Detector. This high quality unit features a 7 digit LCD, ultra sensitive synchronous detector and 16 section bar graph to show RF signal strength. Detects digital and analog signals.
Specifications: * Detects digital and analog signals * 16 Section bar graph to show RF signal strength * Selectable detection ranges: 1Ghz/2.8Ghz * 1 GHz range: 30 MHz to 0.8Ghz * 2.8 GHz range: 500 MHZ to 2.8 Ghz * Sensitivity adjustment * Hold switch to lock display * Low battery indicator * Sensitivity of less than 5mV * 15 dBm maximum input * 9V DC 300mA reachargeable battery power
Size: 33/4" x 2 3/4" x 1 1/4"
Includes: * AC wall charger * 2.4 GHz antenna * Telescopic antenna * User manual Do-it-yourself Bug Sweeps, Counter-Surveillance and Bug Detection! Using our equipment! Buy, rent or lease the same state-of-the-art surveillance and security equipment Detectives, PI's, the CIA and FBI use. Take back control!
Our equipment is easy to use and comes complete with instructions, 24/7/365 tech. support and the option to rent!
If you are concerned about the security of your telephone conversations, or possible hidden cameras or audio bugs, call us today.
We provide security and peace of mind for your business, your home, and for you.
We also have other "bug" detection products. See below:
This item rents for $480.00 per week.
The DPL-CPM-2000 is a broadband receiver designed to detect and locate all major types of electronic surveillance devices including room, phone, body bugs, video transmitters, and tape recorders.
Frequency Response: 15kHz-1MHz-3dB MAX input voltage: 300 VAC 50-60Hz Isolation: 1500 VAC 60Hz Sensitivity: -38dBm (1 segment) -60 M.D.L.
Audio Amplifier:
Input Impedance: 50K Ohm balanced Input Range: 1.7uV-10V (135dB) AGC Dynamic Range: 100dB (high and low gain) Frequency Response: 100Hz- 15kHz±3dB (filtered) 500Hz-24dB/octave, 2.5kHz-18dB/octave Headphone Output: 5Vp-p 220 Record Out: 25 mVp-p nominal with AGC
Display:
LCD barograph: 18 segment with pulsing single segment trip point 50dB dynamic range (1 segment High Gain to MAX Low Gain) Alert Output: 2.8kHz tone or silent red LED at 2Hz Remote Output: N.O. contact (300mA 25V MAX)
Battery:
8 ea. MN1500 AA Alkaline - Life 10-16 hrs (Optional) 8 ea. 550mAh NiCad - life 3-5 hrs per charge Low Battery Indicator : approx. 10% remaining power
AC Adapter/Charger:
Input: 95-l30VAC 50-60Hz, or 200-275VAC 50-60Hz Output: 12VDC with 500mA NiCad Recharge Time: 8-10 hrs
DPL-CPM-2000 Unit:
Size: 9 1/8 x 6 1/8 x 1 3/4 in, 23.2 x 15.6 x 4.4 cm Weight: 39 oz, 1.1 kg
Carry Case with all standard Items:
Size: 16 3/8 x 11 1/4 x 3 in, 41.6 x 28.6 x 7.6cm Weight: 7 lbs, 3.18 kg
FACT SHEET: COUNTER-SURVEILLANCE PROBE / MONITOR Broadband receivers such as the DPL-CPM-2000 provide a very important cost-effective tool for professional sweep teams, government security personnel, and private citizens with important security needs.
The DPL-CPM-2000 is very effective for rapidly detecting and locating transmitted signals, while being very easy to learn to use. The DPL-CPM-2000 sweep kit includes a custom Cordura case that contains all items necessary to conduct a professional sweep.
There are several 'imitations' of the DPL-CPM-2000 on the market because of its success as a product. While some of these copies may be cheaper, they do not provide the frequency performance and sensitivity of the DPL-CPM-2000. We guarantee it! DPL-CPM-2000 Advantages
Portable Sweep Kit - provides everything needed to perform a professional sweep; fits inside a standard briefcase.
Multi-Functional Utility - Comes with probes to detect RF transmitters (audio and video), carrier current transmitters, and telephone bugs. Probes also available to detect for infrared transmitters, tape recorders, and acoustic leakage.
Wideband Coverage - from 200Hz to over 3GHz with no holes or gaps.
Monitor Mode - after a sweep, the alarm monitor (silent or audible alert) guards against new devices brought in or remote control activation of surveillance devices.
Auxiliary Audio Input - allows user to listen to telephones or lines for 'hotmikes,' hookswitch by-pass and 'infinity' bugs. Unknown wires and cables can be tested for wired microphones.
The following article is designed to assist you with finding hidden cameras (wired or wireless), blocking GPS tracking devices, locating hidden audio-based bugs (or transmitters), blocking or jamming cell phones in addition to intercepting wireless camera and video signals.
If any of the following warning signs apply and you are concerned about covert eavesdropping or wiretapping then it would be wise to contact DPL-Surveillance-Equipment.com to rent or purchase one of our state-of-the-art bug detection products.
Are you a potential target?
1. If eavesdropping on anything you say, write, or do could increase someone else's wealth or influence, then the answer is yes, you are a potential target.
2. Others know your confidential business or professional trade secrets.
This is the most obvious indicator of covert eavesdropping activities. Theft of confidential information is a multi-billion dollar underground industry in the United States. Often the loss of your secrets will show up in very subtle ways so you should always trust your instincts in this matter. When your competitors, associates or co-workers know things that are obviously private, or the media finds out about thi ngs they should not know, then it is reasonable to suspect technical eavesdropping or bugging.
3. Secret meetings and bids seem to be less than secret.
Confidential meetings and bids are very popular targets for corporate spies. How would you like the plans for the corporate takeovers you're planning to become public knowledge? Would copies of your product designs be of any use to your competitors? Would it be beneficial for your competitors to know how much you're quoting for the same project?
4. People seem to know your activities when they shouldn't.
5. You have noticed strange sounds or volume changes on your phone lines.
This is commonly caused by an amateur eavesdropper when they attach a wiretap, or activate a similar listening device. Surveillance devices often cause slight anomalies on the telephone line such as volume shift or drop-out. Professional eavesdroppers and their equipment usually do not make such noises; so if this is goin g on it could indicate that an amateur eavesdropper is listening in. On the other hand you could simply be experiencing a flaw in the line, but you should check it out.
6. You have noticed static, popping, or scratching on your phone lines.
This is caused by the capacitive discharge which occurs when two conductors are connected together (such as a bug or wiretap on a phone line). This is also a sign that an amateur eavesdropper or poorly trained spy is playing with your phone lines. It could be nothing more then a problem with your phone line or instrument. However, it should be checked out by using one of our RF Detectors .
7. Sounds are coming from your phones handset when it's hung up.
This is often caused by a hook switch bypass, which turns the telephone receiver into an eavesdropping microphone (and also a speaker). There is probably somebody listening to everything you say or do within twenty feet of the telephone (if this is happening).
8. Your phone often rings and nobody is there, or a very faint tone, or high-pitched squeal/beep is heard for a fraction of a second.
This is an indicator of a slave device, or line extender being used on your phone line. This is also a key indicator of a harmonica bug, or infinity transmitter being used. Of course it may also be nothing more then a fax machine or modem calling the wrong number. However, using one of our Telephone Line Analyzers . should check it out.
9. You can hear a tone on your line when your phone is on the hook (by using an external amplifier). Contact us!
10. Your AM/FM radio has suddenly developed strange interference.
Many amateur and spy shop eavesdropping devices use frequencies within or just outside the FM radio band, these signals tend to drift and will "quiet" an FM radio in the vicinity of the bug. Look for the transmissions at far ends of the FM radio band, and at any quiet area within the FM band. If the radio begins to squeal then slowly move it around the room until the sound become very high pitched. This is referred to as feedback detection or loop detection and will often locate the bug. The "stereo" function should be turned off so the radio is operating in "mono" as this will provide a serious increase in sensitivity. If you find a "squealer" in this manner then immediately Contact us!
11. Your car radio suddenly starts "getting weird"
Keep in mind that the antenna your car radio uses may be (and often is) exploited by an eavesdropper, and that such usage may interfere with radio reception (so be concerned if your automobile radio suddenly starts getting weird).
12. Your television has suddenly developed strange interference.
Television broadcast frequencies are often used to cloak a eavesdropping signal, but such devices also tend to interfere with television reception (usually a UHF channel). Televisions also "suck in" a lot of RF energy and because of this are very sensitive to any nearby transmitters (this is technically called "Bandwidth, and TV signals use a lot of it). Contact us! asap!
13. You have been the victim of a burglary, but nothing was taken.
Professional eavesdroppers often break into a targets home or office, and very rarely leave direct evidence of the break-in; however, occupants of the premises will often "pickup on something not being right" such as the furniture being moved slightly.
14. Electrical wall plates appear to have been moved slightly or "jarred".
One of the most popular locations to hide eavesdropping devices is inside, or behind electrical outlets, switches, smoke alarms, and lighting fixtures. This requires that the wall plates be removed. Look for small amounts of debris located on the floor directly below the electrical outlet. Also, watch for slight variations in the color or appearance of the power outlets and/or light switches as these are often swapped out by an eavesdropper. Also note if any of the screws which hold the wallplate against the wall have been moved from their previous position.
15. A dime-sized discoloration has suddenly appeared on the wall or ceiling.
This is a tell tale sign that a pinhole microphone or small covert video camera has been recently installed.
16. One of your vendors just gave you any type of electronic device such as a desk radio, alarm clock, lamp, small TV, boom box, CD player, and so on.
Many of these "gifts" are actually Trojan horses which contain eavesdropping devices. Be very suspicious of any kind of pen, marker, briefcase, calculator, "post-it" dispenser, power adapter, pager, cell phone, cordless phone, clock, radio, lamp, and so on that is given as a gift. That little gift the salesman left for you may be a serious hazard.
17. A small bump or deformation has appeared on the vinyl baseboard near the floor.
Strong indicator that someone may have concealed covert wiring or a microphone imbedded into the adhesive which holds the molding to the wall. Such deformation will often appear as a color shift, or lightening of the color.
18. The smoke detector, clock, lamp, or exit sign in your office or home looks slightly crooked, has a small hole in the surface, or has a quasi-reflective surface.
These items are very popular concealment for covert eavesdropping devices. Often when these devices are installed at a target location they are rarely installed without small tale-tale clues.
19. Certain types of items have "just appeared" in your office or home, but nobody seems to know how they got there.
Typical items to watch for and be aware of are: clocks, exit signs, sprinkler heads, radios, picture frames, and lamps.
20. White dry-wall dust or debris is noticed on the floor next to the wall.
A sign that a pinhole microphone or video camera may have been installed nearby. It will appear as if someone has dropped a small amount of powdered sugar either on the floor, or on the wall.
21. You notice small pieces of ceiling tiles, or "grit" on the floor, or on the surface area of your desk. Also, you may observe a cracked, chipped, or gouged ceiling tiles, or ones that are sagging, or not properly se t into the track.
Prime indicator that a ceiling tile has been moved around, and that someone may have installed a hidden video camera or other eavesdropping device in your office or near your desk. Also watch for cracks or chips in the ceiling tiles. Amateur and poorly trained spies tend to crack or damage acoustical tiles. The ceiling tiles in any executive areas should never contain any cracks, nicks, gouges, or stains. Any ceiling tile that becomes damaged (for what ever reason) should immediately be replaced and the cause of the damage documented.
22. You notice that "Phone Company" trucks and utilities workers are spending a lot of time near your home or office doing repair work.
If you see the same or similar vehicles more then three times then you may have a serious problem (at least according to the U.S. State Department training course on counter surveillance).
23. Telephone, cable, plumbing, or air conditioning repair people show up to do work when no one called them.
A very common ruse which eavesdroppers use to get into a facility is to fake a utility outage, and then show up to fix the problem. While they are fixing "the problem" they are also installing eavesdropping devices. Some of the more popular outages involve power, air conditioning, telephone, and even the occasional false fire alarm.
24. Service or delivery trucks are often parked nearby with nobody (you can see) in them.
These vehicles are commonly used as listening posts, be very cautious of any vehicle, which has a ladder or pipe rack on the roof. Also, be wary of any vehicle, which has tinted windows, or an area, which you cannot see though (like a service van). The listening post vehicle could be any vehicle from a small Geo Tracker, Suburban, Blazer, Trooper, or Cargo Van. Look for any vehicle, which could conceal a person in the back or has tinted windows. Also, keep in mind that the eavesdropper may relocate the vehicle several times, so look around. Typically, eavesdroppers like to get within 500-750 feet from the place or person they are eavesdropping on.
25. Your door locks suddenly don't "feel right", they suddenly start to get "sticky", or they completely fail.
Prime evidence that the lock has been picked, manipulated, or bypassed. Try to always use biaxial locks with sidebars (such as ASSA or Medeco). Also, only use double sided deadbolts in all doors, and good quality window bars on all windows, and a good quality door bar on all doors not used as a primary entry doors.
26. Furniture has been moved slightly, and no one knows why.
A very popular location for the installation of eavesdropping device is either behind, or inside furniture (couch, chair, lamp, etc.) People who live or work in a targeted area tend to notice when furnishings have been moved even a fraction of an inch. Pay close attention to the imprint which furniture makes on rugs, and the position of lamps sh ades. Also watch the distance between furniture and the wall as eavesdroppers are usually in a hurry and rarely put the furniture back in the right place.
27. Things "seem" to have been rummaged through, but nothing is missing (at least that you noticed).
A "less than professional spy" will often rummage through a targets home for hours, but very rarely will they do it in a neat and orderly fashion. The most common "rummaging" targets are the backs of desk drawers, the bottom of file cabinets, closets, and dresser drawers.
28. An eavesdropper sends you a copy of your private conversations.
As simple as it seems this is the strongest indicator, and solid proof of eavesdropping. An eavesdropper will sometimes send a victim a copy of a private conversation they intercepted in an attempt at blackmail, or in an attempt to terrorize, or to just stalk the victim. This is commonly seen in civil lawsuits, criminal court cases, marital problems, shareholder disputes, custody battles, and other situations were one side has a position of weakness and is trying to physiologically undermine their opponent.
When contacting DPL-Surveillance-Equipment.com please remember not to c all from any suspect area, do not use your cellular telephone, do not use your cordless phone, and do not use any suspect telephone (instead call from a sterile phone somewhere outside the suspect area).
Who Gets Bugged?
High Threat Business Situations
* Your company has stock, which is publicly traded (or will be soon) * Your company is having labor problems, union activities, or negotiations * Your company is involved in any type of litigation or lawsuit * Your company has layoffs pending (or they have just happened) * Your company is involved in the fashion, automotive, advertising, or marketing industry
Anyone can be the target of covert eavesdropping, however; some people are under greater risk than others because of financial position, occupation, legal, or domestic situation.
* Spouses bug each other on a regular basis * Parents bug children * Businessmen bug other businessmen * Scientists bug other scientists * Stud ents bug professors * Attorneys bug other attorneys (and their clients) * Insurance companies bug accident victims, and other claimants * Construction companies bug other construction companies * Salesmen bug clients * Collection agencies bug debtors * Police officers bug suspects * Executive recruiters bug personnel directors * Rock fans bug rock musicians * Department stores bug customers and merchandise
The Neighbors, Coworkers, Friends, Enemies, Strangers, Your Spouse, Industrial Spies, Government Agents, Your Insurance Company, Your Boss...
High Threat Personal Situations (When to be seriously concerned)
You (or someone close to you) have been:
* Involved in any type of litigation or lawsuit * Been questioned, arrested or arraigned by the police * In the process of getting married, divorced, or separated * A minister or religious leader (ie: priest, rabbi, deacon, bishop, elder...) * Running for any type of ele cted public office * Elected to any public office (ie: mayor, selectman, school principal) * Executive or scientist at any large company * Recently filed a insurance claim * Engaging in political demonstrations or activism * Employed by a defense contractor, Department of Energy, etc... * Private Investigators have been "poking" around * You are in the upper income bracket
Keep in mind that anybody with Money, Power, Influence, or access to sensitive, classified, or personal information is at serious personal risk.
On a related note: If you work (or have worked) for any kind of military, governmental, law enforcement or judicial agency the possibility of you being targeted for eavesdropping is very high.
Such eavesdropping can come from either side of the law, and is rarely legal or court sanctioned. Additionally, people married to, associated with, divorced from, getting divorced from, dating, or getting intimate with a member of law enfor cement, private security, PI, or any level of the judicial system should be concerned about illegal eavesdropping (yes, cops love to bug their wives and girlfriends).
High Threat Occupations
* Attorney * Doctor * Chiropractor * Dentist * Architect * Police Officer * Court Clerk * Judge * Elected to any public office * Mayor * Selectman * School Principal * College Professor * Product Engineer * Software Developer * Executive at any large company * Scientist at any large company * Employed by any defense contractor * Employed by the Department of Energy * Any minister or religious leader (ie: deacon, bishop, elder...) * Corporate Buyer or Purchasing Agent * Employee of a Construction Contractor * Any type Sales or Marketing * Labor or Union Official * Fashion * Advertising * Personnel Directors
According the FBI the following types of businesses are under EXTREME risk and are popular targets of illegal bugging, wiretapping, and similar surveillance:
* Materials: Materials synthesis and processing * Electronic and photonic materials * Ceramics * Composites * High-performance metals and alloys
Manufacturing:
* Flexible computer-integrated manufacturing * Intelligence processing equipment * Micro- and nanofabrication * Systems management technologies
Information and Communications:
* Software * Micro and optoelectronics * High-performance computing and networking * High-definition imaging and displays * Sensors and signal processing * Data storage and peripherals * Computer simulation and modeling
Biotechnology and Life Sciences:
* Applied molecular biology * Computational Chemistry * Medical technology
* Energy technologies * Pollution minimization, remediation, and waste management
By the way, you may buy or rent any of these items on a weekly basis.
* Most of our product can be modified to use European 220v
Do-it-yourself Bug Sweeps, Counter-Surveillance and Bug Detection (http://www.dpl-surveillance-equipment.com/detection_devices.html)! Using our equipment! Buy, rent or lease the same state-of-the-art surveillance and security equipment Detectives, PI's, the CIA and FBI use. Take back control!
Our equipment is easy to use and comes complete with instructions, 24/7/365 tech. support and the option to rent!
If you are concerned about the security of your telephone conversations, or possible hidden cameras or audio bugs, call us today.
We provide security and peace of mind for your business, your home, and for you.
DPL-Surveillance-Equipment.com is a world leader in providing surveillance and security products and services to Government, Law Enforcement, Private Investigators, small and large companies worldwide. We have one of the largest varieties of state-of-the-art surveillance and counter-surveillance equipment including Biometric Identification Systems, Anti-terrorist-related equipment, Personal Protection (recommended for our female customers) and Bug Detection Products.
Buy, rent or lease the same state-of-the-art surveillance and security equipment Detectives, PI's, the CIA and FBI use. Take back control!