Surveillance Demonstration Video: Counter Surveillance (Buy / Rent / Layaway)
Open 24/7/365! (888) 344-3742 or (818) 298-3292
We have a life-time warranty / guarantee on all products. (Includes parts and labor).
Surveillance and Security Equipment Demonstration Videos (Watch and Listen)
Bug Detection Solutions (Part II)
The following article is designed to assist you with finding hidden cameras (wired or wireless), locating hidden audio-based bugs (or transmitters), in addition to intercepting wireless camera and video signals.
Protect your home, office or car!
How Do I Know If I've Been Bugged?
If any of the following warning signs apply and you are concerned about covert eavesdropping or wiretapping then it would be wise to contact DPL-Surveillance-Equipment.com to rent or purchase one of our state-of-the-art bug detection products.
Are you a potential target?
1. If eavesdropping on anything you say, write, or do could increase someone else's wealth or influence, then the answer is yes, you are a potential target.
2. Others know your confidential business or professional trade secrets.
This is the most obvious indicator of covert eavesdropping activities. Theft of confidential information is a multi-billion dollar underground industry in the United States. Often the loss of your secrets will show up in very subtle ways so you should always trust your instincts in this matter. When your competitors, associates or co-workers know things that are obviously private, or the media finds out about thi ngs they should not know, then it is reasonable to suspect technical eavesdropping or bugging.
3. Secret meetings and bids seem to be less than secret.
Confidential meetings and bids are very popular targets for corporate spies. How would you like the plans for the corporate takeovers you're planning to become public knowledge? Would copies of your product designs be of any use to your competitors? Would it be beneficial for your competitors to know how much you're quoting for the same project?
4. People seem to know your activities when they shouldn't.
5. You have noticed strange sounds or volume changes on your phone lines.
This is commonly caused by an amateur eavesdropper when they attach a wiretap, or activate a similar listening device. Surveillance devices often cause slight anomalies on the telephone line such as volume shift or drop-out. Professional eavesdroppers and their equipment usually do not make such noises; so if this is goin g on it could indicate that an amateur eavesdropper is listening in. On the other hand you could simply be experiencing a flaw in the line, but you should check it out.
6. You have noticed static, popping, or scratching on your phone lines.
This is caused by the capacitive discharge which occurs when two conductors are connected together (such as a bug or wiretap on a phone line). This is also a sign that an amateur eavesdropper or poorly trained spy is playing with your phone lines. It could be nothing more then a problem with your phone line or instrument. However, it should be checked out by using one of our RF Detectors .
7. Sounds are coming from your phones handset when it's hung up.
This is often caused by a hook switch bypass, which turns the telephone receiver into an eavesdropping microphone (and also a speaker). There is probably somebody listening to everything you say or do within twenty feet of the telephone (if this is happening).
8. Your phone often rings and nobody is there, or a very faint tone, or high-pitched squeal/beep is heard for a fraction of a second.
This is an indicator of a slave device, or line extender being used on your phone line. This is also a key indicator of a harmonica bug, or infinity transmitter being used. Of course it may also be nothing more then a fax machine or modem calling the wrong number. However, using one of our Telephone Line Analyzers . should check it out.
9. You can hear a tone on your line when your phone is on the hook (by using an external amplifier). Contact us!
10. Your AM/FM radio has suddenly developed strange interference.
Many amateur and spy shop eavesdropping devices use frequencies within or just outside the FM radio band, these signals tend to drift and will "quiet" an FM radio in the vicinity of the bug. Look for the transmissions at far ends of the FM radio band, and at any quiet area within the FM band. If the radio begins to squeal then slowly move it around the room until the sound become very high pitched. This is referred to as feedback detection or loop detection and will often locate the bug. The "stereo" function should be turned off so the radio is operating in "mono" as this will provide a serious increase in sensitivity. If you find a "squealer" in this manner then immediately Contact us!
11. Your car radio suddenly starts "getting weird"
Keep in mind that the antenna your car radio uses may be (and often is) exploited by an eavesdropper, and that such usage may interfere with radio reception (so be concerned if your automobile radio suddenly starts getting weird).
12. Your television has suddenly developed strange interference.
Television broadcast frequencies are often used to cloak a eavesdropping signal, but such devices also tend to interfere with television reception (usually a UHF channel). Televisions also "suck in" a lot of RF energy and because of this are very sensitive to any nearby transmitters (this is technically called "Bandwidth, and TV signals use a lot of it). Contact us! asap!
13. You have been the victim of a burglary, but nothing was taken.
Professional eavesdroppers often break into a targets home or office, and very rarely leave direct evidence of the break-in; however, occupants of the premises will often "pickup on something not being right" such as the furniture being moved slightly.
14. Electrical wall plates appear to have been moved slightly or "jarred".
One of the most popular locations to hide eavesdropping devices is inside, or behind electrical outlets, switches, smoke alarms, and lighting fixtures. This requires that the wall plates be removed. Look for small amounts of debris located on the floor directly below the electrical outlet. Also, watch for slight variations in the color or appearance of the power outlets and/or light switches as these are often swapped out by an eavesdropper. Also note if any of the screws which hold the wallplate against the wall have been moved from their previous position.
15. A dime-sized discoloration has suddenly appeared on the wall or ceiling.
This is a tell tale sign that a pinhole microphone or small covert video camera has been recently installed.
16. One of your vendors just gave you any type of electronic device such as a desk radio, alarm clock, lamp, small TV, boom box, CD player, and so on.
Many of these "gifts" are actually Trojan horses which contain eavesdropping devices. Be very suspicious of any kind of pen, marker, briefcase, calculator, "post-it" dispenser, power adapter, pager, cell phone, cordless phone, clock, radio, lamp, and so on that is given as a gift. That little gift the salesman left for you may be a serious hazard.
17. A small bump or deformation has appeared on the vinyl baseboard near the floor.
Strong indicator that someone may have concealed covert wiring or a microphone imbedded into the adhesive which holds the molding to the wall. Such deformation will often appear as a color shift, or lightening of the color.
18. The smoke detector, clock, lamp, or exit sign in your office or home looks slightly crooked, has a small hole in the surface, or has a quasi-reflective surface.
These items are very popular concealment for covert eavesdropping devices. Often when these devices are installed at a target location they are rarely installed without small tale-tale clues.
19. Certain types of items have "just appeared" in your office or home, but nobody seems to know how they got there.
Typical items to watch for and be aware of are: clocks, exit signs, sprinkler heads, radios, picture frames, and lamps.
20. White dry-wall dust or debris is noticed on the floor next to the wall.
A sign that a pinhole microphone or video camera may have been installed nearby. It will appear as if someone has dropped a small amount of powdered sugar either on the floor, or on the wall.
21. You notice small pieces of ceiling tiles, or "grit" on the floor, or on the surface area of your desk.
Also, you may observe a cracked, chipped, or gouged ceiling tiles, or ones that are sagging, or not properly se t into the track.
Prime indicator that a ceiling tile has been moved around, and that someone may have installed a hidden video camera or other eavesdropping device in your office or near your desk. Also watch for cracks or chips in the ceiling tiles. Amateur and poorly trained spies tend to crack or damage acoustical tiles. The ceiling tiles in any executive areas should never contain any cracks, nicks, gouges, or stains. Any ceiling tile that becomes damaged (for what ever reason) should immediately be replaced and the cause of the damage documented.
22. You notice that "Phone Company" trucks and utilities workers are spending a lot of time near your home or office doing repair work.
If you see the same or similar vehicles more then three times then you may have a serious problem (at least according to the U.S. State Department training course on counter surveillance).
23. Telephone, cable, plumbing, or air conditioning repair people show up to do work when no one called them.
A very common ruse which eavesdroppers use to get into a facility is to fake a utility outage, and then show up to fix the problem. While they are fixing "the problem" they are also installing eavesdropping devices. Some of the more popular outages involve power, air conditioning, telephone, and even the occasional false fire alarm.
24. Service or delivery trucks are often parked nearby with nobody (you can see) in them.
These vehicles are commonly used as listening posts, be very cautious of any vehicle, which has a ladder or pipe rack on the roof. Also, be wary of any vehicle, which has tinted windows, or an area, which you cannot see though (like a service van). The listening post vehicle could be any vehicle from a small Geo Tracker, Suburban, Blazer, Trooper, or Cargo Van. Look for any vehicle, which could conceal a person in the back or has tinted windows. Also, keep in mind that the eavesdropper may relocate the vehicle several times, so look around. Typically, eavesdroppers like to get within 500-750 feet from the place or person they are eavesdropping on.
25. Your door locks suddenly don't "feel right", they suddenly start to get "sticky", or they completely fail.
Prime evidence that the lock has been picked, manipulated, or bypassed. Try to always use biaxial locks with sidebars (such as ASSA or Medeco). Also, only use double sided deadbolts in all doors, and good quality window bars on all windows, and a good quality door bar on all doors not used as a primary entry doors.
26. Furniture has been moved slightly, and no one knows why.
A very popular location for the installation of eavesdropping device is either behind, or inside furniture (couch, chair, lamp, etc.) People who live or work in a targeted area tend to notice when furnishings have been moved even a fraction of an inch. Pay close attention to the imprint which furniture makes on rugs, and the position of lamps sh ades. Also watch the distance between furniture and the wall as eavesdroppers are usually in a hurry and rarely put the furniture back in the right place.
27. Things "seem" to have been rummaged through, but nothing is missing (at least that you noticed).
A "less than professional spy" will often rummage through a targets home for hours, but very rarely will they do it in a neat and orderly fashion. The most common "rummaging" targets are the backs of desk drawers, the bottom of file cabinets, closets, and dresser drawers.
28. An eavesdropper sends you a copy of your private conversations.
As simple as it seems this is the strongest indicator, and solid proof of eavesdropping. An eavesdropper will sometimes send a victim a copy of a private conversation they intercepted in an attempt at blackmail, or in an attempt to terrorize, or to just stalk the victim. This is commonly seen in civil lawsuits, criminal court cases, marital problems, shareholder disputes, custody battles, and other situations were one side has a position of weakness and is trying to physiologically undermine their opponent.
When contacting DPL-Surveillance-Equipment.com please remember not to c all from any suspect area, do not use your cellular telephone, do not use your cordless phone, and do not use any suspect telephone (instead call from a sterile phone somewhere outside the suspect area).
Who Gets Bugged?
High Threat Business Situations
* Your company has stock, which is publicly traded (or will be soon)
* Your company is having labor problems, union activities, or negotiations
* Your company is involved in any type of litigation or lawsuit
* Your company has layoffs pending (or they have just happened)
* Your company is involved in the fashion, automotive, advertising, or marketing industry
Anyone can be the target of covert eavesdropping, however; some people are under greater risk than others because of financial position, occupation, legal, or domestic situation.
* Spouses bug each other on a regular basis
* Parents bug children
* Businessmen bug other businessmen
* Scientists bug other scientists
* Stud ents bug professors
* Attorneys bug other attorneys (and their clients)
* Insurance companies bug accident victims, and other claimants
* Construction companies bug other construction companies
* Salesmen bug clients
* Collection agencies bug debtors
* Police officers bug suspects
* Executive recruiters bug personnel directors
* Rock fans bug rock musicians
* Department stores bug customers and merchandise
The Neighbors, Coworkers, Friends, Enemies, Strangers, Your Spouse, Industrial Spies, Government Agents, Your Insurance Company, Your Boss...
High Threat Personal Situations (When to be seriously concerned)
You (or someone close to you) have been:
* Involved in any type of litigation or lawsuit
* Been questioned, arrested or arraigned by the police
* In the process of getting married, divorced, or separated
* A minister or religious leader (ie: priest, rabbi, deacon, bishop, elder...)
* Running for any type of ele cted public office
* Elected to any public office (ie: mayor, selectman, school principal)
* Executive or scientist at any large company
* Recently filed a insurance claim
* Engaging in political demonstrations or activism
* Employed by a defense contractor, Department of Energy, etc...
* Private Investigators have been "poking" around
* You are in the upper income bracket
Keep in mind that anybody with Money, Power, Influence, or access to sensitive, classified, or personal information is at serious personal risk.
On a related note: If you work (or have worked) for any kind of military, governmental, law enforcement or judicial agency the possibility of you being targeted for eavesdropping is very high.
Such eavesdropping can come from either side of the law, and is rarely legal or court sanctioned.
Additionally, people married to, associated with, divorced from, getting divorced from, dating, or getting intimate with a member of law enfor cement, private security, PI, or any level of the judicial system should be concerned about illegal eavesdropping (yes, cops love to bug their wives and girlfriends).
High Threat Occupations
* Attorney
* Doctor
* Chiropractor
* Dentist
* Architect
* Police Officer
* Court Clerk
* Judge
* Elected to any public office
* Mayor
* Selectman
* School Principal
* College Professor
* Product Engineer
* Software Developer
* Executive at any large company
* Scientist at any large company
* Employed by any defense contractor
* Employed by the Department of Energy
* Any minister or religious leader (ie: deacon, bishop, elder...)
* Corporate Buyer or Purchasing Agent
* Employee of a Construction Contractor
* Any type Sales or Marketing
* Labor or Union Official
* Fashion
* Advertising
* Personnel Directors
According the FBI the following types of businesses are under EXTREME risk and are popular targets of illegal bugging, wiretapping, and similar surveillance:
* Materials: Materials synthesis and processing
* Electronic and photonic materials
* Ceramics
* Composites
* High-performance metals and alloys
Manufacturing:
* Flexible computer-integrated manufacturing
* Intelligence processing equipment
* Micro- and nanofabrication
* Systems management technologies
Information and Communications:
* Software
* Micro and optoelectronics
* High-performance computing and networking
* High-definition imaging and displays
* Sensors and signal processing
* Data storage and peripherals
* Computer simulation and modeling
Biotechnology and Life Sciences:
* Applied molecular biology
* Computational Chemistry
* Medical technology
Transportation:
* Aeronautics
* Surface transportation technologies
Energy and Environment:
* Energy technologies
* Pollution minimization, remediation, and waste management
By the way, you may buy or rent any of these items on a weekly basis.
* Most of our product can be modified to use European 220v
Do-it-yourself Bug Sweeps, Counter-Surveillance and Bug Detection (http://www.dpl-surveillance-equipment.com/detection_devices.html)! Using our equipment! Buy, rent or lease the same state-of-the-art surveillance and security equipment Detectives, PI's, the CIA and FBI use. Take back control!
Our equipment is easy to use and comes complete with instructions, 24/7/365 tech. support and the option to rent!
Bug Detection, Electronic Sweeps, Debugging, Counter-Surveillance, Hidden Audio & Camera Detection...
If you are concerned about the security of your telephone conversations, or possible hidden cameras or audio bugs, call us today.
We provide security and peace of mind for your business, your home, and for you.
Look for this subscriber box on our home page
"Enter your email to subscribe to our Podcasts":
www.DPL-Surveillance-Equipment.com
INTERNET-BASED NANNY SPY CAMERAS (Buy/Rent/Layaway)
Our New Layaway Plan Adds Convenience For Online Shoppers
Next-Generation Bug / Microwave / ELF / Spy Phone / GSM And Camera Detectors (Buy, Rent, Layaway) tinyurl.com/2eo8mlz Open...
— Spy Store Rentals (@MontyHenry1)
Nanny IP (Internet) Cameras, GPS Trackers, Bug Detectors and Listening Devices, etc, (Buy / Rent / Layaway): tinyurl.com/396jlw6...
— Spy Store Rentals (@MontyHenry1)
NOW, look in on your home, second home, lake house or office anytime, anywhere from any internet connected PC/Lap-top or Internet active cell phone, including iphone or PDA.
Watch your child's caregiver while sitting at a traffic light or lunch meeting, or check on your business security from the other side of the world. Our built-in hidden video features all digital transmissions providing a crystal clear image with zero interference. With the IP receiver stream your video over the internet through your router, and view on either a PC or smart phone. Designed exclusively for DPL-Surveillance-Equipment, these IP hidden wireless cameras come with multiple features to make the user's experience hassle-free.
NOW, look in on your home, second home, lake house or office anytime, anywhere from any internet connected PC/Lap-top or Internet active cell phone, including iphone or PDA: http://www.dpl-surveillance-equipment.com/wireless_hidden_cameras.html
Watch your child's caregiver while sitting at a traffic light or lunch meeting, or check on your business security from the other side of the world. Our built-in hidden video features all digital transmissions providing a crystal clear image with zero interference. With the IP receiver stream your video over the internet through your router, and view on either a PC or smart phone. Designed exclusively for DPL-Surveillance-Equipment, these IP hidden wireless cameras come with multiple features to make the user's experience hassle-free.
• Remote Video Access
• Video is Recorded Locally To An Installed SD Card (2GB SD Card included)
• Email Notifications (Motion Alerts, Camera Failure, IP Address Change, SD Card Full)
• Live Monitoring, Recording And Event Playback Via Internet
• Back-up SD Storage Up To 32GB (SD Not Included)
• SD Card Lock Box With Key So SD Card Can't Be Removed
• Digital Wireless Transmission (No Camera Interference)
• View LIVE On Your SmartPhone!
Includes:
* Nanny Cameras w/ Remote View
* Wireless IP Receiver
* Remote Control
* A/C Adaptor
* Key ( For SD Card Lock Box)
* 2GB SD Card
* Ethernet Network Cable
FACT SHEET: HIDDEN NANNY-SPY (VIEW VIA THE INTERNET) CAMERAS
Specifications:
Receiver Specs:
* Transmission Range of 500 ft Line Of Sight
* Uses 53 Channels Resulting In No Interference
* 12V Power Consumption
* RCA Output
* RJ45/Ethernet Port
* Supports up to 32gig SD
* Key Lock Mechanism To Protect Video Data
Camera Specs:
* 640x480 / 320x240 up to 30fps
* Image Sensor: 1/4" Micron Sensor
* Resolution: 720x480 Pixels
* S/N Ratio: 45 db
* Sensitivity: 11.5V/lux-s @ 550nm
* Video System: NTSC
* White Balance: Auto Tracking
• Video is Recorded Locally To An Installed SD Card (2GB SD Card included)
• Email Notifications (Motion Alerts, Camera Failure, IP Address Change, SD Card Full)
• Live Monitoring, Recording And Event Playback Via Internet
• Back-up SD Storage Up To 32GB (SD Not Included)
• SD Card Lock Box With Key So SD Card Can't Be Removed
• Digital Wireless Transmission (No Camera Interference)
• View LIVE On Your SmartPhone!
Includes:
* Nanny Cameras w/ Remote View
* Wireless IP Receiver
* Remote Control
* A/C Adaptor
* Key ( For SD Card Lock Box)
* 2GB SD Card
* Ethernet Network Cable
FACT SHEET: HIDDEN NANNY-SPY (VIEW VIA THE INTERNET) CAMERAS
Specifications:
Receiver Specs:
* Transmission Range of 500 ft Line Of Sight
* Uses 53 Channels Resulting In No Interference
* 12V Power Consumption
* RCA Output
* RJ45/Ethernet Port
* Supports up to 32gig SD
* Key Lock Mechanism To Protect Video Data
Camera Specs:
* 640x480 / 320x240 up to 30fps
* Image Sensor: 1/4" Micron Sensor
* Resolution: 720x480 Pixels
* S/N Ratio: 45 db
* Sensitivity: 11.5V/lux-s @ 550nm
* Video System: NTSC
* White Balance: Auto Tracking
Our New Layaway Plan Adds Convenience For Online Shoppers
DPL-Surveillance-Equipment's
layaway plan makes it easy for you to buy the products and services
that you want by paying for them through manageable monthly payments
that you set. Our intuitive calculator allows you to break down your
order's purchase price into smaller payment amounts. Payments can be
automatically deducted from your bank account or made in cash using
MoneyGram® ExpressPayment® Services and you will receive your order once
it's paid in full. Use it to plan and budget for holiday purchases,
anniversaries, birthdays, vacations and more!
DPL-Surveillance-Equipment's
Customers can now use the convenience of layaway online to help them
get through these tough economic times.
We all shop now
and then just to face a hard reality -- big credit card bills. However,
our latest financing innovation can help you avoid that. Find out why
more and more shoppers are checking out DPL-Surveillance-Equipment's
e-layaway plan.
If you're drooling over a new nanny
camera, longing for a GPS tracker, or wishing for that spy watch, but
you're strapped for cash and can't afford to do credit, do what Jennie
Kheen did. She bought her iPod docking station (hidden camera
w/motion-activated DVR) online using our convenient lay-away plan.
Our
online layaway plan works like the old-fashioned service stores used to
offer. But, in Kheen's case, she went to
DPL-Surveillance-Equipment.com, found the iPod docking station (hidden
camera w/motion-activated DVR), then set up a payment plan.
"It's automatically drawn from my account," she said. "I have a budget, $208.00 a month.
In
three months, Kheen had paid off the $650.00 iPod docking station. She
paid another 3.9 percent service fee, which amounted to about $25.35
(plus $12.00 for shipping) for a total of $687.35.
"You
pay a little bit each month," Kheen said. "It's paid off when you get
it and you don't have it lingering over your head. It's great."
Flexible
payment terms and automated payments make our layaway plan an
affordable and fiscally responsible alternative to credit cards.
1. Register:
It's quick, easy and FREE! No credit check required!
2. Shop:
Select
the items or service you want and choose "e-layaway" as your payment
option. Our payment calculator makes it easy for you to set up your
payment terms.
3. Make Payments:
Payments are made on the schedule YOU set. Check your order status or adjust your payments online in a secure environment.
4. Receive Products:
Receive the product shortly after your last payment. The best part, it's paid in full... NO DEBT.
More Buying Power:
*
Our lay-away plan offers a safe and affordable payment alternative
without tying up your credit or subjecting the purchase to high-interest
credit card fees.
No Credit Checks or Special Qualifications:
* Anyone 18 years old or older can join. All you need is an active bank account.
Freedom From Credit Cards:
*
If you are near or beyond your credit limit or simply want to avoid
high interest credit card fees, our e-layaway is the smart choice for
you.
Flexible Payment Schedules:
*
Similar to traditional layaway, e-layaway lets you make regular payments
towards merchandise, with delivery upon payment in full. Payments are
automatically deducted from your bank account or made in cash using
MoneyGram® ExpressPayment®
A Tool for Planning Ahead:
*
Our e-layaway makes it easy for smart shoppers like you to plan ahead
and buy items such as bug detectors, nanny cameras, audio bugs, gps
trackers, and more!
No Hidden Charges or Mounting Interest:
Our
e-layaway makes shopping painless by eliminating hidden charges and
monthly interest fees. Our customers pay a flat transaction fee on the
initial purchase price.
NO RISK:
* You have the right to cancel any purchase and will receive a refund less a cancellation fee. See website for details.
Security and Identity Protection:
DPL-Surveillance-Equipment
has partnered with trusted experts like McAfee and IDology to ensure
the security and integrity of every transaction. Identity verification
measures are integrated into our e-layaway system to prevent fraudulent
purchases.
Note: Simply Choose e-Lay-Away as a "Payment Option" in The Shopping Cart
DPL-Surveillance-Equipment.com
is a world leader in providing surveillance and security products and
services to Government, Law Enforcement, Private Investigators, small
and large companies worldwide. We have one of the largest varieties of
state-of-the-art surveillance and counter-surveillance equipment
including Personal Protection
and Bug Detection Products.
Buy, rent or lease the same
state-of-the-art surveillance and security equipment Detectives, PI's,
the CIA and FBI use. Take back control!
DPL-Surveillance-Equipment.com
Phone: (1888) 344-3742 Toll Free USA
Local: (818) 344-3742
Fax (775) 249-9320
Monty@DPL-Surveillance-Equipment.com
Google+ and Gmail
DPLSURVE
Twitter
DPLSURVE
MSN
Monty@DPL-Surveillance-Equipment.com
AOL Instant Messenger
DPLSURVE32
Skype
Montyl32
Yahoo Instant Messenger
Montyi32
Alternate Email Address
montyi32@yahoo.com
Join my Yahoo Group!
My RSS Feed
Phone: (1888) 344-3742 Toll Free USA
Local: (818) 344-3742
Fax (775) 249-9320
Monty@DPL-Surveillance-Equipment.com
Google+ and Gmail
DPLSURVE
DPLSURVE
MSN
Monty@DPL-Surveillance-Equipment.com
AOL Instant Messenger
DPLSURVE32
Skype
Montyl32
Yahoo Instant Messenger
Montyi32
Alternate Email Address
montyi32@yahoo.com
Join my Yahoo Group!
My RSS Feed
0 Comments:
Post a Comment
Note: Only a member of this blog may post a comment.
<< Home