DPL-Surveillance-Equipment.com

These are new product announcements from my main website (Open 24/7/365). We have a life-time warranty / guarantee on all products. (Includes parts and labor). Here you will find a variety of cutting-edge Surveillance and Security-Related products and services. (Buy/Rent/Layaway) Post your own comments and concerns related to the specific products or services mentioned or on surveillance, security, privacy, etc.

Wednesday, August 21, 2013

NSA’s Prism Could Cost American Businesses $180 Billion And Put Them At Competitive Disadvantage











NSA’s Prism Could Cost American Businesses $180 Billion And Put Them At Competitive Disadvantage 









Fears over the National Security Agency’s Prism spy project could cost cloud, hosting and outsourcing providers $180 billion in lost business, according to Forrester Research Inc. Revelations by former NSA contractor Edward Snowden that the U.S. government is collecting data from U.S. technology companies about the communications of foreign persons located abroad could lead to defections from cloud services vendors by multinational corporations. German government officials and companies have already raised questions about the security of data hosted by U.S.-based companies.

The $180 billion figure is a much higher estimate of potential losses than those published by the Information Technology & Innovation Foundation, a non-partisan think tank, which earlier this month suggested the U.S. cloud industry could lose between $21.5 billion and $35 billion in sales through 2016, due to concerns over Prism by non-U.S. companies. But James Staten, a Forrester analyst who follows IT services, argued in a blog post Wednesday that financial losses could prove substantially higher when other market segments are considered.

In calculating his higher estimate, Mr. Staten said that in addition to the $35 billion estimated by the ITIF, vendors of hosting and outsourcing services – which offer many of the same services as cloud companies, but use different processes and revenue models — could suffer an additional $100 billion in lost business. Moreover, non-U.S. cloud service providers could lose $35 billion worth of business from international customers, as awareness grows of the surveillance activities of other governments, such as the France government’s covert spying reported by Le Monde. Mr. Staten tossed in an additional $10 billion in lost revenue as a result of U.S. customers shunning U.S. cloud providers, to reach a total of $180 billion.

Mr. Staten defines cloud as an automated and multitenant pay-per-use service, while hosting is often similar but billed on a monthly basis. He defines outsourcing as traditional infrastructure management by a third-party on a multi-year contract.

But that $180 billion number is a worst-case scenario Mr. Staten said won’t come to fruition. Why? He said the benefit of IT services outstrips the potential risk that companies face due to government surveillance. “The IT services market is a part of our portfolios because it provides capabilities we value either against IT or business metrics,” Mr. Staten said.

Daniel Castro, the analyst who authored the ITIF report, largely agrees with Mr. Staten’s elaboration of his research, as well as the broader point that the benefits of the cloud outweigh the privacy pitfalls. But he said Mr. Staten is overlooking the potential political ramifications associated with Prism. He said global governments may make “national-level decisions” that can force corporate customers to curb their spending on cloud. “You can’t resist the cloud, but you can determine where you go for it,” Mr. Castro said.

Ed Anderson, an analyst who covers the cloud computing industry for Gartner Inc., said that privacy concerns about data stored in the cloud are overblown because data centers that host cloud services are often more secure than data centers owned and managed by individual companies. “The public cloud adoption juggernaut just keeps marching on,” Mr. Anderson said.

CIOs who spoke to CIO Journal for this article likewise feel confident in cloud services. Joe Fuller, CIO of Dominion Enterprises, a subsidiary of classified ad provider Landmark Media Enterprises LLC, said the company will continue using cloud services from Salesforce.com Inc. and Google Inc. despite Prism. Bill Swislow, CIO of automotive information provider Cars.com, which spends over $1 million a year on cloud software from Salesforce.com Inc., told CIO Journal Prism would have no impact on his business because the “nature of our content and audience don’t really play into government-focused privacy concerns.”

Salesforce.com spokesperson Ashish Patel said “we are not involved in the PRISM program, and we do not provide any governments with direct access to Salesforce servers.” He declined to say whether Prism had negatively impacted the company’s business.

Google spokesperson Jay Nancarrow referred CIO Journal to a June blog post penned by CEO Larry Page and Chief Legal Officer David Drummond, in which they claimed the company has not joined any program that would give any government “direct access to our servers.” Mr. Nancarrow said that the company’s enterprise cloud business has not experienced any significant changes during the last few months.



Germany Thumbs Nose at the NSA


The global backlash against the National Security Agency’s cyber spying picked up a notch as Germany’s leading telecom company announced that all email flowing among three of the nation’s email services will remain on German servers at all times. The move reflects powerful differences in the way that Americans and Europeans view privacy—and just happens to coincide quite nicely with the commercial interests of European Internet companies, who have yet to achieve anything close to the scale of Google Inc. or Amazon.com Inc.

Lost in the political and economic battle, which President Obama addressed are the interests of corporations and other users, who will find that their enhanced privacy—whether they want it or not—will add complexity to their business. President Obama called for an overhaul of surveillance policy that would disclose more information about a secret national security court and disclose more information about the National Security Agency. He also acknowledged that the review was prompted by NSA leaker Edward Snowden.

“It is completely political,” David Horrigan, an analyst and attorney at 451 Research, said of the new policy in Germany. Announced by Deutsche Telekom AG, the new program, called “Email Made in Germany,” will encrypt German email and warn Internet users when they are sending email to a service that isn’t part of the program. The three participating companies are DT’s T Online, GMX and web.de. A government mandate of the same policy has been discussed, but not enacted.

If national security demanded it, German and French law would allow authorities to exercise the same sort of surveillance powers that their counterparts in the U.S. wield, according to Mr. Horrigan, who specializes in e-discovery and information governance. He said that he wasn’t making an assessment of the merits of the NSA program one way or the other.

But political gestures often have huge business consequences. Mr. Horrigan said U.S. Internet companies need to take the European objections to NSA spying seriously. “I think the U.S. companies really must address the issue,” he said. He said that they need to explain just how narrow the differences in the U.S. and European government spying powers really are. If they don’t, European rivals may well succeed in using the NSA spying issue as a competitive opening.

At the technological level, the new program adds complexity to networking and IT, but it is technologically feasible, according to Mr. Horrigan. Even in developed countries, “you can stipulate that certain kinds of information have to be on certain servers,” he said. That’s true even in the case of U.S. operations of German companies, he said. That does not mean, however, that it is easy to do.

“Although it’s feasible technically to limit data to non-US servers, from a practical standpoint, it’s a nightmare. For instance, most large German-based multinationals have U.S. operations. Keeping that data off U.S. servers presents substantial challenges,” he said.

Compliance would add costs to doing business, Mr. Horrigan said. “One way to comply with the new policy would be to have silos of computer operations, which is not particularly efficient,” Mr. Horrigan said. That would mean keeping U.S. computer operations on U.S. servers, German computer operations on German servers, and so forth—adding layers of infrastructure for no technological reason, at a time when most operators are reducing them.

It’s also unclear just how effective a defense email encryption will be. One such service shut down this week, as the Download reported on Friday. Jon Callas, co-founder of Silent Circle Inc., said on Twitter and in a blog post that Silent Circle had ended Silent Mail. Silent Circle will continue to offer secure texting and secure phone calls, but email is harder to keep truly private, Mr. Callas wrote.

It has recently been revealed that the National Security Agency's spying tools extend deep into the domestic U.S. telecommunications infrastructure, giving the agency a surveillance structure with the ability to cover the majority of Internet traffic in the country, according to current and former U.S. officials and other people familiar with the system.

The information here is based on interviews with current and former intelligence and government officials, as well as people familiar with the companies' systems.

The NSA's surveillance network covers more Americans' Internet communications than officials have publicly disclosed, reaching roughly 75 percent of all U.S. internet traffic. Siobhan Gorman reports on the News Hub. 

Although the system is focused on collecting foreign communications, it includes content of Americans' emails and other electronic communications, as well as "metadata," which involves information such as the "to" or "from" lines of emails, or the IP addresses people are using.

At key points along the U.S. Internet infrastructure, the NSA has worked with telecommunications providers to install equipment that copies, scans and filters large amounts of the traffic that passes through.

This system had its genesis before the attacks of Sept. 11, 2001, and has expanded since then.

Updated: July 4, 2014



Germany Summons U.S. Ambassador Over Spy Allegations

Germany summoned the U.S. ambassador on Friday after allegations of American spying erupted anew, threatening to further damage one of Washington's most important alliances.

The German federal prosecutor announced that a 31-year-old German was arrested Wednesday on suspicion of working for foreign intelligence agencies. The arrested man was an employee of the German foreign-intelligence agency, known as the BND, according to two people familiar with the matter.

The worker initially raised suspicions because he apparently tried to contact Russian spies, but then told investigators he had been passing information to U.S. intelligence, one person said.

The people briefed on the investigation cautioned that the man's links to U.S. intelligence haven't been conclusively established.

But the suspicions were serious enough that Chancellor Angela Merkel was informed on Thursday and select members of parliament were briefed.

Outraged reactions in the media made clear the allegations were already dealing a new blow to the U.S.-German relationship—an alliance critical to matters as diverse as the Ukraine crisis and negotiations for a trans-Atlantic free-trade agreement.

"This is a very serious development," a spokesman for Ms. Merkel said. "The government will now await the conclusions of the federal prosecutor and federal criminal police's investigation."

Deputy Foreign Minister Stephan Steinlein urged U.S. Ambassador John B. Emerson in their Fourth of July meeting to help clear up the matter quickly, a ministry statement said.

U.S. officials in Washington and Berlin declined to comment.

Ties between the U.S. and Germany are still strained after last year's revelations of National Security Agency activities and U.S. monitoring of Ms. Merkel's cellphone. The leaks by former NSA contractor Edward Snowden struck a particular nerve in a country acutely sensitive to domestic spying because of its history with Communist and Nazi mass surveillance.

In one particularly explosive claim, several German media outlets reported that the arrested man may have sold information to the U.S. about a just-launched parliamentary inquiry of NSA surveillance programs.

"If the suspicion of a targeted attack on a German constitutional body is confirmed, just one year after the first Snowden disclosures, that would set the level of trust back to zero and result in political consequences," said Christian Flisek, a Social Democrat lawmaker and co-chairman of the NSA inquiry.

German authorities have increased their counterespionage efforts directed at friendly governments in the wake of the NSA disclosures.

But accusations of the U.S. working with double agents in Germany haven't come to light in recent memory. André Hahn, a top member of parliament for the opposition Left party, said such allegations would represent "one of the worst intelligence scandals in Germany in recent decades."

Investigators suspect he had financial motives in offering to leak documents, the two people familiar with the matter said.

Evidence suggests the man offered his services to the U.S. Embassy in Berlin, one person said. The U.S., rather than notifying the BND, may have taken him up on his offer, one person said.

The man was believed to have copied 218 BND documents on to a USB flash drive and sold them for €25,000 ($34,000), according to the newspaper Bild.

The evidence pointing to U.S. involvement was significant but not conclusive, and other intelligence agencies, particularly Russia's, could also be involved, those familiar with the case said.

Ms. Merkel's spokesman declined to say whether she brought up the matter with President Barack Obama in a phone call about the Ukraine crisis on Thursday.

The revelations spell fresh domestic political trouble for Ms. Merkel because of her pro-U.S. line.

The German chancellor has tried to quell public outrage over the NSA revelations. She has positioned Germany on the side of Washington in the Ukraine crisis, despite public skepticism, and joined Mr. Obama in threatening sanctions. And she continues to push for a trans-Atlantic free-trade agreement being negotiated this year, a deal that is important to American business but faces intense opposition in Germany.


"If the suspicion of spying on the parliamentary inquiry is confirmed, it will be a giant debacle for the BND and the federal government," said Katrin Göring-Eckardt, parliamentary leader of the opposition Greens.

What's New In This Report?

Previous reports have indicated that the NSA's surveillance of telecommunications lines in the U.S. focuses on international gateways and landing points. Other reports have indicated that surveillance of the U.S. telecom network was used to gather only metadata under a program that the NSA says ended in 2011.

This new report demonstrates that the NSA, in conjunction with telecommunications companies, has built a system that can reach deep into the U.S. Internet backbone and cover 75% of traffic in the country, including not only metadata but the content of online communications. The report also explains how the NSA relies on probabilities, algorithms and filtering techniques to sift through the data and find information related to foreign intelligence investigations.

What Is This Surveillance System?

NSA has worked with telecom companies to develop a surveillance system that covers roughly 75% of U.S. telecommunications. Armed with a court order, NSA can command that system to provide the information it asks for.

The telecoms have a system in place designed to do at least initial filtering and send streams of traffic most responsive to NSA's request to NSA machines, which then filter that stream of traffic for "selectors"—for instance, perhaps a set of IP addresses—and sift out the data that matches.

NSA can't reach in and touch the telecommunications company's, or anyone else's, unfiltered corporate system. But in general it can get what it needs from the system.

How Does This Work?

The exact technology used depends on the telecommunications carrier involved, when the equipment was installed and other factors.

In general, the system copies traffic flowing through the U.S. Internet system and then runs it through a series of filters. These filters are designed to sift out communications that involve at least one person outside the U.S. and that may be of foreign-intelligence value. The information that makes it through the filters goes to the NSA; the information that doesn't meet NSA's criteria is discarded.

More specifically, there are two common methods used, according to people familiar with the system.

In one, a fiber-optic line is split at a junction, and traffic is copied to a processing system that interacts with the NSA's systems, sifting through information based on NSA parameters.

In another, companies program their routers to do initial filtering based on metadata from Internet "packets" and send copied data along. This data flow goes to a processing system that uses NSA parameters to narrow down the data further.

What Kinds of Information Does The System Keep or Discard?

Initial filters might look at things such as the type of communication being sent. For example, videos downloaded from YouTube might not be of much interest, so they could be filtered out.

The filters also look at IP addresses in an effort to determine the geographic region involved in the transmission. This is done to focus on foreign communications.

The NSA ultimately decides what information to keep based on what it calls "strong selectors," such as specific email addresses or ranges of Internet addresses that belong to organizations. But it receives a broader stream of Internet traffic from which it picks out data that matches selectors.

Does This Mean NSA Analysts Are Reading All Your Emails And Watching You Surf The Web?

No. That would involve a tremendously large number of people and amount of time. However, the government is in some cases allowed to search Americans' information that is collected through this system.

How Much Internet Traffic Does The NSA Get?

The NSA-telecom surveillance system covers about 75% of U.S. communications, but the amount actually stored by the NSA is a small portion of that, current and former government officials say.

Why Does The NSA Have This System?

The NSA uses this system to help pursue foreign intelligence investigations.

Such investigations include those that aim to prevent attacks by international terrorist groups. Because the people involved in these groups can be within the U.S., investigators want to look at communications that involve people in America, particularly those who communicate with people outside the U.S.

In addition, a considerable amount of international traffic flows through the U.S. or to Internet services here, and national security investigators want to be able to monitor that information.

Why Can't They Just Focus On The International Undersea Cables?

The NSA began by focusing on cables that carry international traffic to and from the U.S. under the sea. But now the agency's reach covers a system that handles most domestic traffic as well.

Tapping only at cable landing points presents some logistical problems, says Jennifer Rexford, a computer science professor at Princeton University who studies Internet routing. First, those cables handle a huge amount of traffic at very high speeds, meaning that it is more likely for a tap there to drop or lose some of the data "packets" that make up Internet communications. Second, Internet routing is complicated: Not all parts of an Internet communication will flow over the same path, meaning it could be difficult to piece everything back together if taps are only on those lines.

The ability to access domestic communications networks means the system has redundancy and is better able to deliver the information the NSA needs.

In addition, many people overseas use Internet services located in the U.S., and the NSA wants to be able to access that traffic. For instance, one person overseas could log into a U.S.-based online email service and send an email to the account of another person who uses a different U.S. email. This email would actually travel from one server in the U.S. to another server in the U.S., even if the people communicating were outside it.

Is This Legal?

This system is currently conducted primarily under part of a law that was passed in 2008 amending the Foreign Intelligence Surveillance Act. Sometimes this part of the law is called "Section 702."

Section 702 allows the NSA and FBI to target surveillance of people "reasonably believed" to be located outside the U.S. Rules governing how the NSA collects data under this law are approved by the secret Foreign Intelligence Surveillance Court, or FISC, but after that, each instance of surveillance doesn't need a judge's approval.

The NSA and FBI must outline to the court the steps they take to help ensure the communications they gather are "reasonably believed" to have a foreign element, as well as the measures used to minimize Americans' communications that are collected inadvertently.

There Are Also a Few Other Legal Authorities Related To This Collection:

Before the 2008 law was passed, the system was allowed under a short-lived stopgap law that allowed largely the same thing. Before that stopgap measure, the system was part of President George W. Bush's warrantless surveillance program.

In addition, until the end of 2011, this same infrastructure allowed for a slightly different program that collected metadata from domestic U.S. communications in bulk. That program was possible under a part of the Foreign Intelligence Surveillance Act that allowed tools called "pen registers," which are used to collect metadata. U.S. officials say that particular program was canceled in part because it wasn't producing valuable information.

Some parts of the system are also carried out under foreign spying authorities. The intelligence community has long been able to apply for warrants under Title 1 of the Foreign Intelligence Surveillance Act. Those warrants are largely like warrants used in law enforcement, except that they are approved by the FISC because of their secret nature. In some cases, taps on Internet networks could be used to fulfill these warrants.

What Limitations Are There On This Program?

The NSA must follow procedures approved by the secret FISA court to narrow its targets and to "minimize," or discard, information collected about Americans. Documents leaked by former NSA contractor Edward Snowden outlined the procedures as they stood in 2009.

One paragraph in these documents is particularly relevant to domestic Internet collection. In that paragraph, marked Top Secret, the government says that it will "employ an Internet Protocol filter" "or it will target Internet links that terminate in a foreign country." This indicates that the rules allow the government either to rely on the fact that the cable runs to a foreign country or to rely on its IP filters, in order to provide reasonable assurances that the communication involves a foreigner.

The NSA also vets targets using more traditional methods, such as data it already has—and information from other agencies like human intelligence or contacts with foreign law enforcement—to decide whether they are "reasonably believed" to be outside the U.S.

In addition, people familiar with the legal process say lawyers at the telecommunications providers can serve as a check on the system.

After information is collected, the NSA has rules to minimize information about people in the U.S.

There are several exceptions to these minimization rules, though. The NSA is allowed to keep Americans' information and turn it over to the FBI if it is "reasonably believed to contain significant foreign intelligence information," "evidence of a crime" or information about communications security vulnerabilities, the documents say. Americans' communications also can be kept if they are encrypted, according to the documents.

How Does This System Fit In With Prism?

The Prism program collects stored Internet communications based on demands made to Internet companies such as Google Inc. under Section 702. Several companies have said the requests under this program don't result in bulk collection, meaning they are narrower than the filtering system on the domestic Internet backbone.

The NSA can use these Prism requests to target communications that were encrypted when they traveled across the Internet backbone, to focus on stored data that the filtering systems discarded earlier, and to get data that is easier to handle, among other things.

What Privacy Issues Does This System Raise?

One involves the reliance on algorithmic filtering to sift out domestic communications. Such algorithms can be complicated, and computer IP addresses don't always provide a good gauge of where the person is geographically.

Small changes in the algorithms can result in overcollection of Americans' data, which can then be stored by the NSA, say former U.S. officials, and current officials say it has stored some purely domestic communications within its systems.

Documents revealed by Mr. Snowden and disclosed recently indicate that the NSA has made mistakes because of technical error. Some people familiar with the systems say they are concerned that the huge amount of U.S. information accessible by these filtering systems, combined with the complicated nature of the filters, means it could be easy to sweep in domestic communications.

In 2011, the FISA court found part of the domestic NSA-telecom system unconstitutional, officials say. They say the NSA set the filters on the programs inappropriately in 2008, and the problem was discovered by the NSA in 2011 and reported.

"NSA's foreign intelligence collection activities are continually audited and overseen internally and externally," says NSA spokeswoman Vanee Vines. "When we make a mistake in carrying out our foreign intelligence mission, we report the issue internally and to federal overseers and aggressively get to the bottom of it."

Another possible concern is the ability of overseers, including the secret FISA court, to adequately police such technical systems. The court was created in the 1970s to oversee warrants on targets in national security investigations, not "to be in the business of approving very technical collection procedures," said one former government official who is familiar with the legal process.

President Obama and other supporters of the programs have said the NSA programs face careful oversight from all three branches of government. "We've got congressional oversight and judicial oversight," Mr. Obama has said. "And if people can't trust not only the executive branch but also don't trust Congress and don't trust federal judges to make sure that we're abiding by the Constitution, due process and rule of law, then we're going to have some problems here."

A person familiar with the legal process reported to us that the system relies in part on the telecom companies themselves to push back against what they see as problematic surveillance. This person said the appropriate rules aren't always clear, because of the complexities of Internet routing and surveillance.

A U.S. official said lawyers at these companies serve as an independent check on what the NSA receives.

Finally, the exceptions to minimization requirements mean information gathered on Americans could be used in ordinary criminal investigations, according to rules approved by the FISA court. NSA officials have said they are careful to use the information in accordance with the rules.



DPL-Surveillance-Equipment.com's Secure Messaging Address

BM-GuP5bGJH6un5dRdT2wV5MsB4Nv7zvVYz
Send Us  A Test Message Just To Say Hello.


Additional Resources:






Online Privacy Tools and Tips




www.DPL-Surveillance-Equipment.com










































NOW, look in on your home, second home, lake house or office anytime, anywhere from any internet connected PC/Lap-top or Internet active cell phone, including iphone or PDA.

Watch your child's caregiver while sitting at a traffic light or lunch meeting, or check on your business security from the other side of the world. Our built-in hidden video features all digital transmissions providing a crystal clear image with zero interference. With the IP receiver stream your video over the internet through your router, and view on either a PC or smart phone. Designed exclusively for DPL-Surveillance-Equipment, these IP hidden wireless cameras come with multiple features to make the user's experience hassle-free.

NOW, look in on your home, second home, lake house or office anytime, anywhere from any internet connected PC/Lap-top or Internet active cell phone, including iphone or PDA: http://www.dpl-surveillance-equipment.com/wireless_hidden_cameras.html

Watch your child's caregiver while sitting at a traffic light or lunch meeting, or check on your business security from the other side of the world. Our built-in hidden video features all digital transmissions providing a crystal clear image with zero interference. With the IP receiver stream your video over the internet through your router, and view on either a PC or smart phone. Designed exclusively for DPL-Surveillance-Equipment, these IP hidden wireless cameras come with multiple features to make the user's experience hassle-free.

• Remote Video Access

• Video is Recorded Locally To An Installed SD Card (2GB SD Card included)

• Email Notifications (Motion Alerts, Camera Failure, IP Address Change, SD Card Full)

• Live Monitoring, Recording And Event Playback Via Internet

• Back-up SD Storage Up To 32GB (SD Not Included)

• Digital Wireless Transmission (No Camera Interference)

• View LIVE On Your SmartPhone!

Includes:

* Nanny Cameras w/ Remote View
* Wireless IP Receiver
* Remote Control
* A/C Adaptor
* 2GB SD Card
* USB Receiver



FACT SHEET:  HIDDEN NANNY-SPY (VIEW VIA THE INTERNET) CAMERAS

Specifications:

Receiver Specs:

* Transmission Range of 500 ft Line Of Sight
* Uses 53 Channels Resulting In No Interference
* 12V Power Consumption
* RCA Output
* Supports up to 32gig SD

Camera Specs:

* 640x480 / 320x240 up to 30fps
* Image Sensor: 1/4" Micron Sensor
* Resolution: 720x480 Pixels
* S/N Ratio: 45 db
* Sensitivity: 11.5V/lux-s @ 550nm
* Video System: NTSC
* White Balance: Auto Tracking

Make Your Own Nanny Cameras:  Make Tons Of Money In A Booming, Nearly Recession-Proof Industry!


Your Primary Customers Include But Are Not Limited To Anyone In The Private Investigator, Government, Law Enforcement And/Or Intelligence Agencies Fields!

* You Buy Our DVR Boards And We'll Build Your Products! (Optional)

















Our New Layaway Plan Adds Convenience For Online Shoppers








DPL-Surveillance-Equipment's layaway plan makes it easy for you to buy the products and services that you want by paying for them through manageable monthly payments that you set. Our intuitive calculator allows you to break down your order's purchase price into smaller payment amounts. Payments can be automatically deducted from your bank account or made in cash using MoneyGram® ExpressPayment® Services and you will receive your order once it's paid in full. Use it to plan and budget for holiday purchases, anniversaries, birthdays, vacations and more!


DPL-Surveillance-Equipment's Customers can now use the convenience of layaway online to help them get through these tough economic times.

We all shop now and then just to face a hard reality -- big credit card bills. However, our latest financing innovation can help you avoid that. Find out why more and more shoppers are checking out DPL-Surveillance-Equipment's e-layaway plan.

If you're drooling over a new nanny camera, longing for a GPS tracker, or wishing for that spy watch, but you're strapped for cash and can't afford to do credit, do what Jennie Kheen did. She bought her iPod docking station (hidden camera w/motion-activated DVR) online using our convenient lay-away plan.

Our online layaway plan works like the old-fashioned service stores used to offer. But, in Kheen's case, she went to DPL-Surveillance-Equipment.com, found the iPod docking station (hidden camera w/motion-activated DVR), then set up a payment plan.

"It's automatically drawn from my account," she said. "I have a budget, $208.00 a month.

In three months, Kheen had paid off the $650.00 iPod docking station. She paid another 3.9 percent service fee, which amounted to about $25.35 (plus $12.00 for shipping) for a total of $687.35.

"You pay a little bit each month," Kheen said. "It's paid off when you get it and you don't have it lingering over your head. It's great."

Flexible payment terms and automated payments make our layaway plan an affordable and fiscally responsible alternative to credit cards.

1. Register:

It's quick, easy and FREE! No credit check required!

2. Shop:

Select the items or service you want and choose "e-layaway" as your payment option. Our payment calculator makes it easy for you to set up your payment terms.

3. Make Payments:

Payments are made on the schedule YOU set. Check your order status or adjust your payments online in a secure environment.

4. Receive Products:

Receive the product shortly after your last payment. The best part, it's paid in full... NO DEBT.

More Buying Power:

* Our lay-away plan offers a safe and affordable payment alternative without tying up your credit or subjecting the purchase to high-interest credit card fees.

No Credit Checks or Special Qualifications:

* Anyone 18 years old or older can join. All you need is an active bank account.

Freedom From Credit Cards:

* If you are near or beyond your credit limit or simply want to avoid high interest credit card fees, our e-layaway is the smart choice for you.

Flexible Payment Schedules:

* Similar to traditional layaway, e-layaway lets you make regular payments towards merchandise, with delivery upon payment in full. Payments are automatically deducted from your bank account or made in cash using MoneyGram® ExpressPayment®

A Tool for Planning Ahead:

* Our e-layaway makes it easy for smart shoppers like you to plan ahead and buy items such as bug detectors, nanny cameras, audio bugs, gps trackers, and more!

No Hidden Charges or Mounting Interest:

Our e-layaway makes shopping painless by eliminating hidden charges and monthly interest fees. Our customers pay a flat transaction fee on the initial purchase price.

NO RISK:

* You have the right to cancel any purchase and will receive a refund less a cancellation fee. See website for details.

Security and Identity Protection:

DPL-Surveillance-Equipment has partnered with trusted experts like McAfee and IDology to ensure the security and integrity of every transaction. Identity verification measures are integrated into our e-layaway system to prevent fraudulent purchases.

Note: Simply Choose e-Lay-Away as a "Payment Option" in The Shopping Cart



DPL-Surveillance-Equipment.com is a world leader in providing surveillance and security products and services to Government, Law Enforcement, Private Investigators, small and large companies worldwide. We have one of the largest varieties of state-of-the-art surveillance and counter-surveillance equipment including Personal Protection and Bug Detection Products.



Buy, rent or lease the same state-of-the-art surveillance and security equipment Detectives, PI's, the CIA and FBI use. Take back control!



DPL-Surveillance-Equipment.com

Phone: (1888) 344-3742 Toll Free USA
Local: (818) 344-3742
Fax (775) 249-9320

Monty@DPL-Surveillance-Equipment.com


Google+ and Gmail
DPLSURVE


Twitter
DPLSURVE


MSN
 Monty@DPL-Surveillance-Equipment.com

AOL Instant Messenger
DPLSURVE32

Skype
Montyl32

Yahoo Instant Messenger
Montyi32

Alternate Email Address
montyi32@yahoo.com

Join my Yahoo Group!

My RSS Feed



Bookmark and Share


0 Comments:

Post a Comment

Note: Only a member of this blog may post a comment.

<< Home