DPL-Surveillance-Equipment.com

These are new product announcements from my main website (Open 24/7/365). We have a life-time warranty / guarantee on all products. (Includes parts and labor). Here you will find a variety of cutting-edge Surveillance and Security-Related products and services. (Buy/Rent/Layaway) Post your own comments and concerns related to the specific products or services mentioned or on surveillance, security, privacy, etc.

Thursday, January 02, 2014

Secure Cell Phone Communications And Software That Covers The Tracks Of Financial Transactions Made With Bitcoin

Secure Cell Phone Communications
And
Software That Covers
The Tracks Of Financial Transactions Made With Bitcoin








A Crypto War Is Coming To Your Wallet/Pocket

In the Paris area, two security contractors are jumping into a burgeoning market for secure mobile phones and encrypted communications as revelations of widespread U.S. government surveillance accelerate a security race among businesses, government agencies and hackers.

This month a maker of cybersecurity and intelligence gear—is starting to ship a new smartphone for businesses. Based on Google Inc.'s Android software, it has been re-engineered to resist hacking and encrypt calls. "Unnecessary to speak in 'coded language,'" brags a marketing brochure.

Just a few miles away, a partly state-owned defense contractor is selling an enterprise-software system. The software will split any Android phone or tablet "in two,", with one side for personal use and the other encrypted for sensitive business applications—and secure phone calls.





The dueling companies are part of a growing niche—spanning tiny firms and defense giants—that is banking on growing demand for high-end encryption amid rising threats from organized hackers and growing fears of ubiquitous surveillance.

Some are secure messaging apps like U.S.-based Wickr or mobile-device security platforms like California-based Good Technology Corp. Others offer actual hardware.

The market for security software used in mobile devices was expected to grow 38% in 2013 to $1.33 billion, and it should hit $3 billion by 2017, according to market-research firm Infonetics Inc.

Interest in security and encryption has risen since the U.S. National Security Agency was accused in the fall of having hacked into the cellphone of German Chancellor Angela Merkel, among dozens of world leaders. Though the NSA says it doesn't conduct industrial espionage, security experts say businesses have woken up to the need for tighter security.



"Five years ago, businesses were asking me why I was so paranoid. "Now they're all excited when you give the presentation."

In Europe, cloud-computing services have tried to cash in on espionage fears, arguing that by hosting their data on European soil they can avoid the prying eyes of U.S. spies. But many U.S. companies that offer communications services say that well-implemented cryptography can remain secure.

U.S.-based Silent Circle, for instance, preemptively shut down its encrypted email service because it feared the government could request data that remained on central servers. But the company continues to offer its mobile calling and messaging services because only subscribers have the encryption keys.

Despite the growth of the sector, it is difficult to verify how secure many of the new products actually are, security experts say. While several well-known cryptography schemes aren't thought to be breakable for the moment, experts say they can be difficult to implement properly, possibly allowing hackers to access data on a phone before it is encrypted.

To guard against that, independent security consultants often recommend open-source solutions, because outsiders can more easily spot security holes and notify the public. But many companies are reluctant to share their methods with competitors. And open-source approaches still require a leap of faith—both that the published code is the real code, and that the open-source community has properly vetted it.
"Using privacy applications and specialized hardware is a positive step, but it isn't a silver bullet," says Mark Dowd, a director of Azimuth Security, an Australia-based information-security consultancy. "It is possible to be secure, but it is difficult because phones do so much stuff."

To back up its security claims, one company says its software is based partly on technology from its military-grade phone. It has supplied 14,000 of those phones to the armed forces and top civilian leaders. The gray, clamshell device doesn't have the features of a smartphone, but it can encrypt calls and documents at a country's second-highest classification level. It is also thought to be used by French president François Hollande.

"Having people who work with the highest levels of cryptography is obviously a strong point, even in the civilian world.

Companies disagree on which of their approaches is more secure—dedicated phone or  software, which works on any Android phone or tablet.

If you're not worried about sophisticated attacks, maybe a software solution is good enough for you, considering that advanced hackers can sidestep software encryption by attacking the phone itself.

"Our product is just as secure, but it is infinitely more flexible," responds the software-based secure cell phone provider. He says hardware-based cryptophones become outdated too quickly for users' tastes.


"If you force people to use something obsolete, they won't," he adds.



Software That Covers The Tracks Of Financial Transactions Made With Bitcoin



Cody Wilson rattled lawmakers and law-enforcement agencies with a plastic gun created from a 3-D printer, home computer and blueprints he posted online for anyone to download.

Now, the 25-year-old law-school dropout (the same person who brought us Dark Mail) is about to launch software aimed at covering the tracks of financial transactions made with bitcoin, the virtual currency that has exploded in popularity among spenders and speculators—and raised concerns among regulators that it might be used for illegal activity.

"We need an anonymous cash online," says Mr. Wilson, who oversees from his apartment near the University of Texas at Austin about a dozen self-described antiestablishment techies working on the software, called Dark Wallet. Some of them are paid in bitcoin.

"It's not that I want you to buy drugs," he says. "It's just that I think you should have the freedom to do it."

Bits And Pieces

Mystery still surrounds Bitcoin. Its creator — or creators — has remained anonymous and specific details surrounding the history of the virtual currency remain fuzzy. Still, buzz is growing. Here's a rough timeline of the Bitcoin evolution.

Mr. Wilson is one of the most prominent examples in a band of hackers, programmers and agitators trying to deploy technology in ways that disrupt what they see as limits on personal freedom. Even though they often live, work or mingle in Silicon Valley, they claim its rise has created too much technology that benefits corporate America or helps government snoop.

In the 1980s, such techies were known as cypherpunks and obsessed with using complex encryption to keep communications secret. The modern version is more consumer-oriented and often focuses on mainstream products, such as Web browsers, open-source software and iPhones, with the aim of having world-wide impact.

Mr. Wilson, who graduated from the University of Central Arkansas in 2010 and then started law school here, shuns political labels. His bedroom features a Texas flag that says "Come and take it," a bookshelf with copies of the Federalist Papers and Austrian-born economist Friedrich von Hayek's libertarian treatise "Road to Serfdom," and several random bullets.

While bitcoin critics claim the online currency is vulnerable to use to lawbreakers because people can make online transactions without giving their real names or addresses, Mr. Wilson and other bitcoin purists says it isn't secret enough.

To prevent fraud, all transactions made with each jumble of computer code tied to the currency are automatically posted in a public ledger called the "block chain." That means it is possible for authorities to track a person's transactions if they can determine the user's unique bitcoin address.

Dark Wallet is a no-frills, low-budget push led by Mr. Wilson to make bitcoin the electronic-commerce equivalent of a Swiss bank account. Attached to a browser such as Google Inc.'s Chrome, Dark Wallet will try to scramble the long strings of numbers and letters that form bitcoins. The scrambling will occur as bitcoins are spent, making it harder to detect who is buying what.

The first version of Dark Wallet is set for release in early 2014, though a specific date hasn't been decided. It will be free, though the developers are accepting donations.

Supporters concede it is likely impossible to make bitcoin transactions absolutely untraceable. Still, if Dark Wallet delivers as hoped and catches on with the virtual currency's users, law-enforcement officials will have more trouble tracking the flow of online commerce, some people close to U.S. government officials say.

Scott Dueweke, a virtual-currency expert at consulting firm Booz Allen Hamilton Inc., includes a Dark Wallet video made by Mr. Wilson when he explains bitcoin to regulators and law-enforcement officials. Mr. Wilson's video features ominous music and an image of Edward Snowden, the National Security Agency contractor turned leaker.

"It spooked the hell out of them," Mr. Dueweke says.

Stephen Hudak, spokesman for the U.S. government's Financial Crimes Enforcement Network, declined to discuss Dark Wallet, but says: "We'd be concerned about anything that would increase the threat level of money laundering."

Federal officials also have said they see benefits from digital forms of money. Federal Reserve Chairman Ben Bernanke told lawmakers in November that online currencies "may hold long-term promise, particularly if the innovations promote a faster, more secure, and more efficient payment system."

Jon Matonis, executive director of the Bitcoin Foundation, a nonprofit group that serves as unofficial curator of the online currency, released on the Internet in 2009, says the Dark Wallet project is consistent with his efforts to promote and develop the digital cash a private, government-free currency.

But some of Dark Wallet's image and marketing are hard to stomach, he says. "I have a serious problem with what they named it," he says. "The average person ... will think it's this criminal thing for buying drugs."

Mr. Wilson focused on Dark Wallet after his plastic-gun effort was blocked. In 2013, he posted online instructions for how to make a gun called "Liberator" with 3-D printing. Three-dimensional printers use plastic materials to make objects as simple as a figurine or coffee cup.

Federal officials warned that new plastic guns could fool metal detectors and compromise security, and the State Department ordered him in May 2013 to remove his online gun blueprints, citing arms-export laws. He complied.

Bitcoin captured Mr. Wilson's interest. PayPal founder Peter Thiel, a billionaire libertarian, invited Mr. Wilson to a private Wyoming retreat, where the two men discussed the future of bitcoin. Mr. Thiel sees promise in the young entrepreneur, a person close to the billionaire says.

In another sign of Mr. Wilson's growing reach, he helped find a lawyer for Ross Ulbricht, the alleged ringleader of a popular Internet black market called Silk Road that used bitcoin as its currency. In November, federal prosecutors filed criminal charges against Mr. Ulbricht that include conspiracy to traffic in narcotics and hack computers. His lawyer, Joshua Dratel, says Mr. Ulbricht is innocent.

Mr. Wilson says Mr. Ulbricht should be embraced by the libertarian community. Dark Wallet could make it harder to bust users of future Silk Roads of the future, Mr. Wilson says.

His closest partner in Dark Wallet is 25-year-old Amir Taaki, a computer coder in the U.K. who sometimes wears apparel—shirts, pins—with the online currency's symbol: a "B" sliced by two vertical bars. Mr. Wilson, who sometimes wears sunglasses at night, is the management and fundraising expert. "They're literally the only prescription glasses I have right now," he says.

An online fundraising effort for Dark Wallet has so far attracted about $100,000, Mr. Wilson says. All told, Mr. Wilson says he has raised nearly $250,000, most of it in bitcoin and through Defense Distributed, a self-described nonprofit group he began in 2012.

The Internal Revenue Service hasn't approved the group's application for tax-exempt status. The agency declined to comment on the reason or the application. Mr. Wilson says he has been asked to explain his dealings with the State Department.

Mr. Wilson dropped out of law school in May to work on plastic guns full-time. Later the same day, he got the government's edict to remove his online gun blueprints. Because of his suspicions of the government, Mr. Wilson had his home address removed from the University of Texas law school's student directory. On business matters, he communicates with encrypted email or chat systems.

Dark Wallet "captures everything we want to do," he says. "My particular brand of activism is crisis-forcing."

Help Raise Funds For Development: Indiegogo

Anonymous Donors Can Use: 32wRDBezxnazSBxMrMqLWqD1ajwEqnDnMc







Monty Henry, Owner














Some of Our Latest Articles:


Mixing Services Add Complete (NSA-Proof) Anonymity To Bitcoin Transactions






www.DPL-Surveillance-Equipment.com


















































NOW, look in on your home, second home, lake house or office anytime, anywhere from any internet connected PC/Lap-top or Internet active cell phone, including iphone or PDA.

Watch your child's caregiver while sitting at a traffic light or lunch meeting, or check on your business security from the other side of the world. Our built-in hidden video features all digital transmissions providing a crystal clear image with zero interference. With the IP receiver stream your video over the internet through your router, and view on either a PC or smart phone. Designed exclusively for DPL-Surveillance-Equipment, these IP hidden wireless cameras come with multiple features to make the user's experience hassle-free.

NOW, look in on your home, second home, lake house or office anytime, anywhere from any internet connected PC/Lap-top or Internet active cell phone, including iphone or PDA: http://www.dpl-surveillance-equipment.com/wireless_hidden_cameras.html

Watch your child's caregiver while sitting at a traffic light or lunch meeting, or check on your business security from the other side of the world. Our built-in hidden video features all digital transmissions providing a crystal clear image with zero interference. With the IP receiver stream your video over the internet through your router, and view on either a PC or smart phone. Designed exclusively for DPL-Surveillance-Equipment, these IP hidden wireless cameras come with multiple features to make the user's experience hassle-free.

• Remote Video Access

• Video is Recorded Locally To An Installed SD Card (2GB SD Card included)

• Email Notifications (Motion Alerts, Camera Failure, IP Address Change, SD Card Full)

• Live Monitoring, Recording And Event Playback Via Internet

• Back-up SD Storage Up To 32GB (SD Not Included)

• Digital Wireless Transmission (No Camera Interference)

• View LIVE On Your SmartPhone!

Includes:

* Nanny Cameras w/ Remote View
* Wireless IP Receiver
* Remote Control
* A/C Adaptor
* 2GB SD Card
* USB Receiver



FACT SHEET:  HIDDEN NANNY-SPY (VIEW VIA THE INTERNET) CAMERAS

Specifications:

Receiver Specs:

* Transmission Range of 500 ft Line Of Sight
* Uses 53 Channels Resulting In No Interference
* 12V Power Consumption
* RCA Output
* Supports up to 32gig SD

Camera Specs:

* 640x480 / 320x240 up to 30fps
* Image Sensor: 1/4" Micron Sensor
* Resolution: 720x480 Pixels
* S/N Ratio: 45 db
* Sensitivity: 11.5V/lux-s @ 550nm
* Video System: NTSC
* White Balance: Auto Tracking

Make Your Own Nanny Cameras:  Make Tons Of Money In A Booming, Nearly Recession-Proof Industry!


Your Primary Customers Include But Are Not Limited To Anyone In The Private Investigator, Government, Law Enforcement And/Or Intelligence Agencies Fields!

* You Buy Our DVR Boards And We'll Build Your Products! (Optional)

















Our New Layaway Plan Adds Convenience For Online Shoppers








DPL-Surveillance-Equipment's layaway plan makes it easy for you to buy the products and services that you want by paying for them through manageable monthly payments that you set. Our intuitive calculator allows you to break down your order's purchase price into smaller payment amounts. Payments can be automatically deducted from your bank account or made in cash using MoneyGram® ExpressPayment® Services and you will receive your order once it's paid in full. Use it to plan and budget for holiday purchases, anniversaries, birthdays, vacations and more!


DPL-Surveillance-Equipment's Customers can now use the convenience of layaway online to help them get through these tough economic times.

We all shop now and then just to face a hard reality -- big credit card bills. However, our latest financing innovation can help you avoid that. Find out why more and more shoppers are checking out DPL-Surveillance-Equipment's e-layaway plan.

If you're drooling over a new nanny camera, longing for a GPS tracker, or wishing for that spy watch, but you're strapped for cash and can't afford to do credit, do what Jennie Kheen did. She bought her iPod docking station (hidden camera w/motion-activated DVR) online using our convenient lay-away plan.

Our online layaway plan works like the old-fashioned service stores used to offer. But, in Kheen's case, she went to DPL-Surveillance-Equipment.com, found the iPod docking station (hidden camera w/motion-activated DVR), then set up a payment plan.

"It's automatically drawn from my account," she said. "I have a budget, $208.00 a month.

In three months, Kheen had paid off the $650.00 iPod docking station. She paid another 3.9 percent service fee, which amounted to about $25.35 (plus $12.00 for shipping) for a total of $687.35.

"You pay a little bit each month," Kheen said. "It's paid off when you get it and you don't have it lingering over your head. It's great."

Flexible payment terms and automated payments make our layaway plan an affordable and fiscally responsible alternative to credit cards.

1. Register:

It's quick, easy and FREE! No credit check required!

2. Shop:

Select the items or service you want and choose "e-layaway" as your payment option. Our payment calculator makes it easy for you to set up your payment terms.

3. Make Payments:

Payments are made on the schedule YOU set. Check your order status or adjust your payments online in a secure environment.

4. Receive Products:

Receive the product shortly after your last payment. The best part, it's paid in full... NO DEBT.

More Buying Power:

* Our lay-away plan offers a safe and affordable payment alternative without tying up your credit or subjecting the purchase to high-interest credit card fees.

No Credit Checks or Special Qualifications:

* Anyone 18 years old or older can join. All you need is an active bank account.

Freedom From Credit Cards:

* If you are near or beyond your credit limit or simply want to avoid high interest credit card fees, our e-layaway is the smart choice for you.

Flexible Payment Schedules:

* Similar to traditional layaway, e-layaway lets you make regular payments towards merchandise, with delivery upon payment in full. Payments are automatically deducted from your bank account or made in cash using MoneyGram® ExpressPayment®

A Tool for Planning Ahead:

* Our e-layaway makes it easy for smart shoppers like you to plan ahead and buy items such as bug detectors, nanny cameras, audio bugs, gps trackers, and more!

No Hidden Charges or Mounting Interest:

Our e-layaway makes shopping painless by eliminating hidden charges and monthly interest fees. Our customers pay a flat transaction fee on the initial purchase price.

NO RISK:

* You have the right to cancel any purchase and will receive a refund less a cancellation fee. See website for details.

Security and Identity Protection:

DPL-Surveillance-Equipment has partnered with trusted experts like McAfee and IDology to ensure the security and integrity of every transaction. Identity verification measures are integrated into our e-layaway system to prevent fraudulent purchases.

Note: Simply Choose e-Lay-Away as a "Payment Option" in The Shopping Cart



DPL-Surveillance-Equipment.com is a world leader in providing surveillance and security products and services to Government, Law Enforcement, Private Investigators, small and large companies worldwide. We have one of the largest varieties of state-of-the-art surveillance and counter-surveillance equipment including Personal Protection and Bug Detection Products.



Buy, rent or lease the same state-of-the-art surveillance and security equipment Detectives, PI's, the CIA and FBI use. Take back control!



DPL-Surveillance-Equipment.com

Phone: (1888) 344-3742 Toll Free USA
Local: (818) 344-3742
Fax (775) 249-9320

Monty@DPL-Surveillance-Equipment.com


Google+ and Gmail
DPLSURVE


Twitter
DPLSURVE


MSN
 Monty@DPL-Surveillance-Equipment.com

AOL Instant Messenger
DPLSURVE32

Skype
Montyl32

Yahoo Instant Messenger
Montyi32

Alternate Email Address
montyi32@yahoo.com

Join my Yahoo Group!

My RSS Feed



Bookmark and Share


0 Comments:

Post a Comment

Note: Only a member of this blog may post a comment.

<< Home