Cell phone tapping continues to explode. Please find some interesting videos from withing the links below, to follow on from our recent blog article that we posted on the 28th of December 2009, called Cell Phone Calls & Text Messages Interception.
Cell Phone Tapping
Is Your Cell Phone Bugged?
Here are some suppliers who will set up these cell phone tapping and cell phone bugging systems.
Cell Spy Pro
FlexiSpy
e-stealth
Professional Spy Phone Tools
PJL 3rd January 2010
Sunday, January 3, 2010
Online Enrolment Verification Facility
Have you ever needed to verify your own Australian Electoral Roll listing or check the Australian Electoral Roll listing for of a person living in Australia. If you have certain information about a person you can confirm an Australian Electoral Roll listing for that person.
Check your own or another persons Australian Electoral Roll listing by using the Online Enrolment Verification Facility. All you need to do is to enter a persons information into the online form. The Australian Electoral Roll information will be either confirmed or failed to confirm instantly. Confirm those details 24 hours a day 365 days of the year.
Please visit the website link below to the Online Enrolment Verification Facility.
Australian Electoral Commission Online Enrolment Verification Facility
PJL 3rd January 2009
Check your own or another persons Australian Electoral Roll listing by using the Online Enrolment Verification Facility. All you need to do is to enter a persons information into the online form. The Australian Electoral Roll information will be either confirmed or failed to confirm instantly. Confirm those details 24 hours a day 365 days of the year.
Please visit the website link below to the Online Enrolment Verification Facility.
Australian Electoral Commission Online Enrolment Verification Facility
PJL 3rd January 2009
Saturday, January 2, 2010
Acoustic Leakage & Eavesdropping
A contact microphone can be used to pick up sounds through sound wave vibration on walls, windows, doors & materials glass, timber, and concrete. Information can be transferred from the microphone through a wire connected to a listening device, recording device or modulated into radio waves and then transmitted to an unwanted listener outside of the room, or even transmitted to any where in the world if GSM transmission technology is utilised.
Sound masking systems such as the ANG-2200 are designed to create a perimeter of noise around a target area that defeats wired microphones inside of walls, contact microphones, laser reflections from windows and audio transmitters located in AC outlets.
ANG-2200 injects noise into the environment perimeter and not directly into the environment. This process creates a countermeasure to defeat eavesdropping devices that rely on acoustic leakage.
Please visit the website link below for further information about ANG-2200.
ANG-2200
PJL 2nd January 2010
Sound masking systems such as the ANG-2200 are designed to create a perimeter of noise around a target area that defeats wired microphones inside of walls, contact microphones, laser reflections from windows and audio transmitters located in AC outlets.
ANG-2200 injects noise into the environment perimeter and not directly into the environment. This process creates a countermeasure to defeat eavesdropping devices that rely on acoustic leakage.
Please visit the website link below for further information about ANG-2200.
ANG-2200
PJL 2nd January 2010
Confessions of a Female Private Investigator
An interesting and entertaining read, Confessions of a Female Private Investigator by Tiffany Bond. Real life experiences from a private investigator specialising in Infidelity Investigations.
Please click on the website link below to read more about this excellent book.
Confessions of a Female Private Investigator
PJL 2nd January 2010
Please click on the website link below to read more about this excellent book.
Confessions of a Female Private Investigator
PJL 2nd January 2010
Thursday, December 31, 2009
Research Tools
Copernic Agent Professional is helpful when that hard to find information is required for a case or background check. We have been extremely surprised with the results achieved to date using Copernic Agent Professional.
Also our popular list of search engines are Google, Altavista, Yahoo, Hotbot, Exite, Lycos, Ask Jeeves, MSN, Metacrawler, Dogpile, Mamma, Surfwax, & Clusty for best search results.
Please visit the website link below to the Coprenic website where you can view Copernic Agent Professional & the Copernic Agent Family of products. Copernic Agent Basic is free.
Copernic
PJL 31st December 2010
Also our popular list of search engines are Google, Altavista, Yahoo, Hotbot, Exite, Lycos, Ask Jeeves, MSN, Metacrawler, Dogpile, Mamma, Surfwax, & Clusty for best search results.
Please visit the website link below to the Coprenic website where you can view Copernic Agent Professional & the Copernic Agent Family of products. Copernic Agent Basic is free.
Copernic
PJL 31st December 2010
Wednesday, December 30, 2009
Reverse Telephone Number Search - Name Search - Address Search
Before the end of 2009 we would like to provide some information regarding an excellent database that has been available this year. Mirus Online covers Australian names, addresses, landline telephone numbers and mobile telephone numbers and many other records.
If you need access to the latest data for business reasons, Mirus Online provides custom tools to search, cross reference and verify from over 110 million Australian records.
Please visit the Mirus Online website via the website link below.
Mirus Online
Have a prosperous New Year.
PJL 30th December 2009
If you need access to the latest data for business reasons, Mirus Online provides custom tools to search, cross reference and verify from over 110 million Australian records.
Please visit the Mirus Online website via the website link below.
Mirus Online
Have a prosperous New Year.
PJL 30th December 2009
Monday, December 28, 2009
Cell Phone Calls & Text Messages Interception
In the last few months we have been inundated with calls regarding the interception of cell telephone calls and text messages. There are many programs on the market and many more becoming available that allow people to monitor, track you and eavesdrop on you. Your cell telephone can be monitored by a remote eavesdropper who taps into your cell telephone and listens to your calls, your conversations or reads your text messages.
A program called Flexispy can bug a cell telephone, allowing people to listen into your voice audio call and compromise your cell telephone converstaions. Your conversations can be heard from within the vicinity of your cell telephone even if you are not talking on the cell telephone. The microphone can be turned on in your cell telephone by a remote eavesdropper and then your conversations listened into from within the vicinity of where your cell telephone is sitting, eavesdropped on by a remote cell telephone from almost any where in the world.
Smart phones don't offer much protection and the spyware programs used to compromise them are inexpensive but they require someone to physically access your cell telephone in order to install the spyware program. Lovers, spouses, parents and coworkers are the victims.
To determine if your cell telephone is being eavesdropped on or intercepted there are signs that your cell telephone may have had spyware programs installed:
1. If your LCD screen flashes on and off without cause could indicate an incoming eavesdropper call.
2. If your cell telephone is warm and you haven't been using it or charging it, this could indicate unauthorised
transmissions.
3. If the cell telephone battery looses power in short periods of time for no reason at all, this could indicate
surreptitious communication.
4. Your monthly bill may show an unknown rise in sms or data transmission activity. This could indicate that
your cell telephone is being accessed without your permission or knowledge.
5. Maybe your cell telephone has been receiving text messages that don't make sense (for example,
<#*56><54321789>) which could indicate failed attempts to send systems commands.
Read more at Flexispy
PJL 28th December 2009
A program called Flexispy can bug a cell telephone, allowing people to listen into your voice audio call and compromise your cell telephone converstaions. Your conversations can be heard from within the vicinity of your cell telephone even if you are not talking on the cell telephone. The microphone can be turned on in your cell telephone by a remote eavesdropper and then your conversations listened into from within the vicinity of where your cell telephone is sitting, eavesdropped on by a remote cell telephone from almost any where in the world.
Smart phones don't offer much protection and the spyware programs used to compromise them are inexpensive but they require someone to physically access your cell telephone in order to install the spyware program. Lovers, spouses, parents and coworkers are the victims.
To determine if your cell telephone is being eavesdropped on or intercepted there are signs that your cell telephone may have had spyware programs installed:
1. If your LCD screen flashes on and off without cause could indicate an incoming eavesdropper call.
2. If your cell telephone is warm and you haven't been using it or charging it, this could indicate unauthorised
transmissions.
3. If the cell telephone battery looses power in short periods of time for no reason at all, this could indicate
surreptitious communication.
4. Your monthly bill may show an unknown rise in sms or data transmission activity. This could indicate that
your cell telephone is being accessed without your permission or knowledge.
5. Maybe your cell telephone has been receiving text messages that don't make sense (for example,
<#*56><54321789>) which could indicate failed attempts to send systems commands.
Read more at Flexispy
PJL 28th December 2009
Subscribe to:
Posts (Atom)