DPL-Surveillance-Equipment.com

These are new product announcements from my main website (Open 24/7/365). We have a life-time warranty / guarantee on all products. (Includes parts and labor). Here you will find a variety of cutting-edge Surveillance and Security-Related products and services. (Buy/Rent/Layaway) Post your own comments and concerns related to the specific products or services mentioned or on surveillance, security, privacy, etc.

Thursday, March 29, 2007

MICRO REAL-TIME GPRS TRACKER / EXTRA LONG-TERM CASE (Buy or Rent) $964.00



We Also Have Numerous Covert Tracking Devices. (See below!)


We Also Have Numerous Covert Tracking Devices. (See below!)

This Item Rents for $145.00 per Week.


The MICRO REAL-TIME GPRS TRACKER is a self-contained complete hardware and software package small enough to fit in the palm of your hand. When placed with packages, vehicles, or personnel, the MICRO REAL-TIME GPRS TRACKER provides detailed reports of routes traveled for quality-control and security purposes.

Featuring SiRF star III technology for extra sensitive reception outdoors, indoors and through metal. WAAS enabled receiver providing GPS signal corrections, giving better position accuracy. How much better? Try an average of up to five times better. A WAAS-capable receiver can give you a position accuracy of better than three meters 95 percent of the time.

MICRO REAL-TIME GPRS TRACKER provides real-time navigation in urban canyons as well as high sensitivity acquisition needed for indoor use.

Features:

* Self contained device fits in the palm of your hand. No external antennae needed, just plug-&-play.
* Location information is reported using a direct GPRS data connection.
* Mapping for the entire world using the latest cutting edge 3D maps from Google and Microsoft.
* Real-time location reports every 15 seconds.
* Geofence feature sends alert if the target moves from pre-defined area.
* Parking and Anti-theft Function: Pressing the Parking Button will start the anti-theft function. If your vehicle has been moved 100 meters the MICRO REAL-TIME GPRS TRACKER will send messages to the pre-set phone numbers to warn you of the vehicle movement.
* GPS assist function using GSM network, boosting location sensitivity when GPS signal is temporarily lost.
* Durable, lightweight, water-resistant housing.
* Enhanced sensitivity for indoor and outdoor reporting.
* Tri-band GSM 900/1800/1900 MHz for worldwide coverage.
* 12 volt DC adapter connects to vehicle power.
* Can be hooked up to 12 volt DC for permanent hardwire connection

Technical Specifications:

GPS Frequency: L1, 1575.42 MHz
C/A Code: 1.023MHz Chip Rate
Datum: WGS-84
Sensitivity: -159 db
Channels: 20 Channel All-In-View Tracking

Acquisition Time

Reacquisition: Less Than 0.1 Sec.
Cold:
Less Than 42 Sec. TTFF (Time To First Fix)
Warm:
Less Than 38 Sec. TTFF
Hot:
Less Than 1 Sec. TTFF

GSM Transceiver

Frequency:
Tri-Band 850/1800/1900/MHz
Compliant To GSM 2/2+

GPRS Transmission
GPRS Multi-Slot Class 10
GPRS Mobile Station Class B

General

Antenna
Internal GSM Antenna and Active GSM Patch Antenna

External Power Supply
5.0 ~ 8.0V DC Input Charging Current 500mA

Battery Power Supply
3.7 VDC

Rechargeable Li-ion Batteries
Standard 1100mA
Optional 1800mA

Battery Life
22 Hours After Being Charged and Sending One Report Every 60 Minutes.

Device Size
64.66mm (L) x 43.19mm (W) x 22.81mm (H)

Device Weight
85g

Environmental
Operation Temperature -5 ~ +60 C
Storage Temperature -5 ~ +60 C




Our New Long-Term Weather-Proof Case = The Longest Lasting GPRS Tracker in the World!

We have combined our popular Micro Real-Time GPRS Tracking Device with a brand new weatherproof magnetic enclosure. This new pack can provide up to 90 days of unattended use by utilizing dual layers of state-of-the-art Lithium Ion Batteries and a motion sensor which puts the tracker into hibernation after 5 minutes of inactivity.

One of the most convenient and cost-effective features of the new hibernating case is that it can be left unattended for months. Completely programmable, the battery pack virtually eliminates the need for human monitoring by automatically calling up to five cell phones and sending email alerts when it detects motion.

A mere 6.5 inches long, our new battery pack is about half the size of its conventional counterparts when housed in its waterproof and crush-proof Pelican™ case.

Hibernator Case Features

* 5.43" x 4.06" x 2.12" (13.8 x 10.3 x 5.4 cm).
* Longest lasting tracker available, up to 90 days of unattended use.
* Crush Proof.
* Water Tight.
* Dirt Proof.
* Motion Detector Board with switch capability.
* 50lb Magnetic Mount.
* Charger Included. 3.7-volt 1.5amp. Charge time 4 to 6 hours.

Two different battery configurations are available with the new pack; 3.7-volt at 7.8 or 15.6 amp per hour.

Pack Type: 7.8-amp/Hr or 15.6-amp/Hr

Constant Power: 7 days or 14 days

With Motion Detector: 60 days or 90 days

All times are approximate and will vary on ambient temperature and number of times the battery is charged. These durations are all with standard usage of 1 location report per hour and an average travel time of 8 hours per day.

We Also Have:

* MICRO REAL-TIME GPS TRACKER $689.00 Buy or Rent!

* MICRO REAL-TIME GPS TRACKER II W/AUDIO $925.95 Buy or Rent!

* DPL-VLTS VEHICLE LOGGING / TRACKING SYSTEM (w/RF RECIEVER) $925.95 Buy or Rent!

* DPL-VLTS VEHICLE LOGGING / TRACKING SYSTEM $625.95 (Buy or Rent)

* MICRO GPS TRACKING MODULE $609.00 (Buy or Rent)

* Micro GPS Tracker/Logger $465.00 (Buy or Rent)

* HOSTAGE TRACKING SYSTEM $3,272.58 (Buy or Rent)

* CELLPHONE INTERCEPTORS $2,741.52 (Can Double as Tracking Devices) (Buy or Rent)

DPL-Surveillance-Equipment.com is a world leader in providing surveillance and security products and services to Government, Law Enforcement, Private Investigators, small and large companies worldwide. We have one of the largest varieties of state-of-the-art surveillance and counter-surveillance equipment including Biometric Identification Systems, Anti-terrorist-related equipment, Personal Protection (recommended for our female customers) and Bug Detection Products.

Buy, rent or lease the same state-of-the-art surveillance and security equipment Detectives, PI's, the CIA and FBI use. Take back control!

DPL-Surveillance-Equipment.com

Phone: (1888) 344-3742 Toll Free (USA)
Local: (818) 344-3742
Fax (775) 249-9320

Monty@DPL-Surveillance-Equipment.com

MSN
Monty@DPL-Surveillance-Equipment.com

AOL Instant Messenger
DPLSURVE32

Skype
Montyl32

Yahoo Instant Messenger
Montyl32

Alternate Email Address
montyl32@yahoo.com

Join my Yahoo Group!

My RSS Feed

Tuesday, March 27, 2007

Peep Hole Door Color Camera & Motion-Activated Digital Video Recorder $776.00





Used for covert video and surveillance operations!

Peep Hole Door Color Camera $201.00:

Installs into standard "peep hole" door cut out. Produces and incredible 170 degree viewing angle using special "fish eye" lens. 1/3" super grade imager assures high quality picture.

Signal System: NTSC or PAL

Image Sensor: 1/3" SONY SUPER HAD CCD

Total pixels: 537(H) X 505(V) 537(H) X 597(V)

Effective pixels: 510(H) X 492(V) 500(H) X 582(V)

Horizontal Resolution: 380 TV Lines

Electronic shutter: 1/60-1/100,000(sec) automatic 1/50-1/100,000(sec) automatic

S/N Ratio: More Than 45dB(AGC OFF)

Sensitivity: 0.5Lux / F2.0 (30IRE)

Sync System: Internal

Gamma Correction: ¡Ó=0.45

Video Output: 1 [Vp-p] Composite 75¥Ø unbalanced

Current consumption: 120mA or less

Input Power Source: DC12V (¡3⁄410%)

Operating Temperature: -10¢ªC ~ +50¢ªC

Door View Lens: f1.78mm

Water Resistant: IP67

Dimension: 19mm
--------------------------------------

Motion-Activated Digital Video Recorder $575.00:


Only 5-1/2 X 2-1/2 X 1 inches (a little larger than a pack of king size cigarettes) this Motion-Activated Digital Video Recorder is a COLOR single channel, miniature solid state digital video recorder (DVR) has no moving parts. This means there is no more day - to - day interventions or any need for maintenance. Connects via RCA video input jack to your or our wired or wireless CCD or CMOS cameras.

Recording rates are user programmable from 10 fps to 1 frame every 5 minutes. Unit features full time/date stamping of each image. This Motion-Activated Digital Video Recorder automatically records events on the Memory Card following an alarm. Up to 100,000 images (video stream) can be recorded on a postage stamp size 1Gb SD card. (1Gb card optional) The alarm can be activated by external triggers and/or by the internal Video Motion Detection (VMD).

The VMD (motion detection) technology enables you to define specific areas of interest within the picture frame. This is useful to eliminate pets and other moving objects of no interest from triggering unit.

When the unit is turned on the configuration is read automatically from the memory card. The unit is then activated from the remote control.

The recorded events are easily analyzed by simply removing the Memory Card from the unit and inserting it into an included Memory Card Reader and connected to a PC, laptop or Pocket PC.

The remote control enables the user to Arm/Disarm the event recording process or record events manually.

The
Motion-Activated Digital Video Recorder is powered by a 12 VCD power adaptor and can be used with an automobile cigarette lighter adaptor or direct wired to other 12 VCD power sources or batteries. Amazing video resolution of 640 X 480 (VGA) produces a crystal clear picture upon playback.

Unit includes software disc, remote control, 64Mb secure digital card, AC power adaptor, and full instruction manual.

Evidence recording has never been so easy!

Approx. 3-4 Days of Continuous Recording on a 1Gb SD Card.
Approx. 6-8 Days of Continuous Recording on a 2Gb SD Card.


DPL-Surveillance-Equipment.com is a world leader in providing surveillance and security products and services to Government, Law Enforcement, Private Investigators, small and large companies worldwide. We have one of the largest varieties of state-of-the-art surveillance and counter-surveillance equipment including Biometric Identification Systems, Anti-terrorist-related equipment, Personal Protection (recommended for our female customers) and Bug Detection Products.

Buy, rent or lease the same state-of-the-art surveillance and security equipment Detectives, PI's, the CIA and FBI use. Take back control!


DPL-Surveillance-Equipment.com

Phone: (1888)
344-3742 Toll Free (USA)
Local: (818) 344-3742
Fax (775) 249-9320

Monty@DPL-Surveillance-Equipment.com

MSN
Monty@DPL-Surveillance-Equipment.com

AOL Instant Messenger
DPLSURVE32

Skype
Montyl32

Yahoo Instant Messenger
Montyl32

Alternate Email Address
montyl32@yahoo.com

Join my Yahoo Group!

My RSS Feed


Sunday, March 25, 2007

MINIATURE WIRELESS NANNY/BABYSITTER CAMERA w/AUDIO: Pinhole, Color $252.00! (Buy or Rent!)






This item rents for $50.00 per week.

This is the smallest wireless video and audio camera on the market. The camera is a high quality color CMOS with 380 lines of resolution at 1 lux. The entire unit is operated by batteries and can transmit not only a video signal but also audio signals.

It comes with a 2.4 Ghz transmitter that allows you to operate the camera up to 400 feet.

* Color: 380 lines resolution, 0.5 Lux
* Shutter Speed: 1/60 ~ 1/100,000 Sec
* Wireless Transmitter Included
* Camera operates with a 9V battery
* Up to 400 feet



DPL-Surveillance-Equipment.com is a world leader in providing surveillance and security products and services to Government, Law Enforcement, Private Investigators, small and large companies worldwide. We have one of the largest varieties of state-of-the-art surveillance and counter-surveillance equipment including Biometric Identification Systems, Anti-terrorist-related equipment, Personal Protection (recommended for our female customers) and Bug Detection Products.

Buy, rent or lease the same state-of-the-art surveillance and security equipment Detectives, PI's, the CIA and FBI use. Take back control!


DPL-Surveillance-Equipment.com

Phone: (1800) 548-2939 Ext. 01
Local: (818) 344-3742
Fax (775) 249-9320

Monty@DPL-Surveillance-Equipment.com

MSN
MontyHenry@Earthlink.net

AOL Instant Messenger
DPLSURVE32

Skype
Montyl32

Yahoo Instant Messenger
Montyl32

Alternate Email Address
montyl32@yahoo.com

Join my Yahoo Group!

My RSS Feed



Click Here for Details on our Rental Policy.

Monday, March 19, 2007

Squeezing the Most Out of Your Digital Video Recording System (Part II)



Rather than primarily being used after the fact to review a scenario or sequence of events, video also can be used in more proactive ways as a prevention
tool. Properly integrated with existing systems and operational processes, network video can help a wide variety of businesses operate in a more secure environment.

Rather than primarily being used after the fact to review a scenario or sequence of events, video also can be used in more proactive ways as a prevention tool. Properly integrated with existing systems and operational processes, network video can help a wide variety of businesses operate in a more secure environment.

Proper hardware and software integration is only half of the equation. The other requirements for successful implementation and continual use of video is to
correctly address, adjust and strategize how personnel can best integrate their processes with this tool.

Network Versus Analog

The advent of network video -- also known as IP -- has brought new power and relevance to surveillance in businesses. Network video offers many advantages over
traditional, analog video, which has been used by security professionals for decades, largely to review events after the fact. New technology makes network
video more convenient, easier to manage and generally more user friendly -- all of which make it a data source that is more valuable than ever before.

Previously, security professionals had to spend time and effort reviewing and managing video using specialized equipment (VCRs), now video recording,
viewing and archiving are managed using a digital video recorder with access to the Internet. This adds a level of reliability and flexibility not previously available with traditional analog systems. Simplicity encourages the use of video for more than just emergencies. It would have been too time consuming to scan through hours of analog video to find a certain event or to review daily activities. Now, network
video information is available immediately. The transformation to video management software housed on a dedicated digital video recorder gives video a new level of usability that it did not have before, encouraging more frequent and consistent use.

Increased accessibility also is a benefit of video being housed on the general IT network. Cameras are now just another peripheral attached to the network,
just like a printer or scanner. Video management software can be installed on multiple DVRs, granting users across the organization access to video. Security professionals used to be exclusive video gatekeepers, having access to tapes and equipment. Now, IT can give access to other users at their desks,
greatly expanding the number and type of potential users. This makes video another data source that can be used to make business decisions regarding security, operations, customer service and training.

Digital Video -- part of the mainstream IT network -- makes it easier to collaborate video with data coming from other systems. For example, many software
solutions are available that integrate video with the point-of-sale system, allowing retailers to put data from the POS in context. For instance, if an exception
report identifies a single credit card number used three times in a store in one day, loss prevention professionals can immediately access video of those transactions to see if the same customer visited the store three times that day or if the cashier was ringing up a transaction with no customer at the counter.

In other environments, video is used to corroborate alarm information from critical equipment. If an alarm sounds, video can be used to verify if there is a genuine emergency, allowing for deployment of appropriate personnel or saving the expense of a false alarm. Video has the power to provide irrefutable context to a situation, making data from other systems even more valuable.

Furthermore, network video is more scalable than analog technology, which requires the addition of specialized cables, power supplies, recording equipment and even personnel. Network cameras need only a network cable run and a spot on the appropriate network switch to be added to the system quickly and
easily -- causing minimal disruption and requiring negligible installation time.

Best Practices

Making video proactive is not as simple as purchasing and installing network video solutions. Significant planning and effort is required to successfully deploy video. Unfortunately, many organizations implement technology for technology's sake without taking time to consider what the system needs to accomplish.

Organizations should make a list of objectives by asking hypothetical questions: Is there a history of vandalism or break ins that has sparked investment in network video? Is the system being placed to monitor customers and to help prevent needless lawsuits?

The purposes outlined will determine the type of equipment, placement and the operational processes that need to be built around a new system.

Here are a few steps security and IT professionals can take to maximize the benefits of network video in an organization.

Establish proactive usage. Perhaps the most powerful change digital video brings is the ability to use video reactively, as well as proactively. Instead of being used exclusively after the fact, video can be used to prevent problems. Security managers can use video to create a systematic security check from a remote location without dispatching personnel on site. By performing a virtual tour, security personnel are able to be in more places at one time and intelligently dispatch team members when the situation requires.

For example, during evening and weekend hours when the business is closed, it's unusual to see people wandering the halls at 2 a.m. With network video, the security manager can have the video management system notify them via his cell phone of the activity. They can log on, assess the situation and make an informed
decision about what action to take.

The analysis process. Video is a powerful tool because it provides irrefutable visual proof, but it is only valuable when placed in the right hands. Traditionally, video was used by a few, select security professionals in the organization, largely due to the difficulty of distribution. Now available on the network via a DVR, it is easier to share video with others in the organization. This allows different departments to take a proactive role in security, risk management and operational improvement.

Consider a retail business where a cashier is taking longer amounts of time getting customers checked out. From the loss prevention department's perspective,
this may mean that employee theft is taking place, but the operations department could review the same video and conclude that the cashier needs additional
training and clarification about their role. By making sure the right people have access to and actually use the video, the organization will receive much greater
value from it.

Flag suspicious events. Digital video solutions have the capability to automatically capture notable events, thanks to analytics, or software that can automatically detect and flag certain kinds of motion taking place on video. While some analytical tools are more powerful, most have the basic capability to trigger recording with motion. This makes it easier to flag and review key events that may otherwise have gone completely unnoticed on an analog system, since it would have taken a pair of human eyes continuously monitoring the surveillance to notice an exception. This can more easily help prevent events before they occur.

For example, during evening and weekend hours when a business is closed, activity in the parking lot may not be welcome. With network video, the security
manager can program the system to automatically begin recording video if motion is detected in the lot. If suspicious vehicles are entering and exiting the
parking lot for several days, scouting out the building, the security manager can come in each morning, review the video, identify the vehicle and/or individuals and take extra security precautions to prevent a break in.

Build cases. Video is helpful for building cases of suspicious activity. For example, in the case described above, if video captures someone receiving supply shipments after they had been asked not to, the organization may file the video with other incidences and begin to build a case to investigate employee theft. An outdoor camera in the parking lot may reveal the person loading their car with boxes taken from the office. Together, these incidences caught on video paint a pretty clear picture of what is going on, allowing the organization to accurately assess the
situation and take appropriate action.

Protecting Students

Some examples of how organizations are using video for proactive security programs are extremely valuable to understand how security professionals can use the technology to greatly improve operations. Schools are just beginning to use video proactively.

Obligated and pressured by recent catastrophic events to provide safe learning environments for children and staff, school administrators face the challenges of
protecting students from threats inside and outside the building. Network video is the newest tool that schools nationwide are successfully leveraging to advance security on campus by taking a proactive approach to safety.

Several years ago, if a school was fortunate enough to be able to install a video system, it was in hallways, mainly to review cases of vandalism or break ins.
Today, schools are using network video in much more strategic, proactive ways. Well-placed and publicized, video surveillance equipment in common areas, such as cafeterias, hallways and gymnasiums, serve as a deterrent to violent behavior.

Schools also are using video to communicate and prove a child's defensive behavior to sometimes defensive and in-denial parents. For example, a parent may not
believe their child has instigated a fight with another child. With video proof, administrators can simply pull up relevant video.

The savviest users of video are collaborating with local law enforcement, providing them with links to live video in the case of a serious incident or hazardous conditions to assess a situation and formulate the appropriate response.

All of the applications are allowing K-12 schools to offer more secure environments where administrators are genuinely aware of the day-to-day interactions of
students.

A Safe Place to Live

Network video also is being used by housing authorities to combat serious security problems among tenants. In these environments, threats to people and property are just as likely to come from within the building as the outside. Vandalism has been a problem in the past. Network video is combating security issues on all fronts in low income housing complexes. Well-placed and well-selected cameras with appropriate housings can withstand mistreatment and capture events on video. Events are automatically flagged and brought to security officers' attention so they can respond immediately with the right resources.

In light of budget cuts, there is an urgent need to help security officers as productively and efficiently as possible. Network video offers tremendous
efficiency, giving law enforcement officers the ability to view video from different areas of the building or even remotely. A single officer may be able to monitor multiple facilities simultaneously and dispatch appropriate resources when an event occurs.

Video management software also is used to help ensure the premises is locked down at all times, allowing security personnel to identify propped doors or
tailgating. The issues can be addressed in the short term by dispatching an officer to close the door. In long-term situations, video can be used to train tenants on the proper protocol and reasons for these safety precautions.

Innovation at Work

The savviest institutions will improve security by using video to identify issues and make changes that will impact the organization as a whole. In-the-know
security professionals may benefit greatly by introducing new users of video into the equation. The best thing security professionals can do is to have a clear understanding of specific objectives for using network video and take steps to manage successful video deployments throughout an organization.


In this lesson plan we will cover the various features and applications of the Digital Video Recorder Surveillance System. Available to buy or lease.

Digital Video Recorder Surveillance System (Audio File).



DPL-Surveillance-Equipment.com is a world leader in providing surveillance and security products and services to Government, Law Enforcement, Private Investigators, small and large companies worldwide. We have one of the largest varieties of state-of-the-art surveillance and counter-surveillance equipment including Biometric Identification Systems, Anti-terrorist-related equipment, Personal Protection (recommended for our female customers) and Bug Detection Products.

Buy, rent or lease the same state-of-the-art surveillance and security equipment Detectives, PI's, the CIA and FBI use. Take back control!

DPL-Surveillance-Equipment.com

Phone: (1888)
344-3742
Local: (818) 344-3742
Fax (775) 249-9320

Monty@DPL-Surveillance-Equipment.com

MSN
Monty@DPL-Surveillance-Equipment.com

AOL Instant Messenger
DPLSURVE32

Skype
Montyl32

Yahoo Instant Messenger
Montyl32

Alternate Email Address
montyl32@yahoo.com

Join my Yahoo Group!

My RSS Feed



Click Here for Details on our Rental Policy.

Thursday, March 15, 2007

REMOTE LAND-LINE (Cellular-Based) MONITORING DEVICE $1,144.00! (Buy or Rent!)





This item rents for $195.00 per week.

Use our Remote Land-Line (Cellular-Based) Monitoring Device to discretely connect to an indoor telephone line. Once programmed it automatically transmits all (incoming or outgoing) calls to a cellular or land line phone for "live" remote monitoring.

This powerful and flexible audio surveillance tool can be hooked up directly to the target's telephone line, inside or outside of the premises. It can be left there permanently, using AC adapters, or temporarily, using the rechargeable battery inside the cellular telephone itself or via additional rechargeable battery pack. Solar recharge-packs can also be used when the Remote Land-Line (Cellular-Based) Monitoring Device is mounted outside on a telephone pole.

DPL-Surveillance-Equipment.com is a world leader in providing surveillance and security products and services to Government, Law Enforcement, Private Investigators, small and large companies worldwide. We have one of the largest varieties of state-of-the-art surveillance and counter-surveillance equipment including Biometric Identification Systems, Anti-terrorist-related equipment, Personal Protection (recommended for our female customers) and Bug Detection Products.

Buy, rent or lease the same state-of-the-art surveillance and security equipment Detectives, PI's, the CIA and FBI use. Take back control!


DPL-Surveillance-Equipment.com

Phone: (1888)
344-3742 Toll Free (USA)
Local: (818) 344-3742
Fax (775) 249-9320

Monty@DPL-Surveillance-Equipment.com

MSN
Monty@DPL-Surveillance-Equipment.com

AOL Instant Messenger
DPLSURVE32

Skype
Montyl32

Yahoo Instant Messenger
Montyl32

Alternate Email Address
montyl32@yahoo.com

Join my Yahoo Group!

My RSS Feed



Click Here for Details on our Rental Policy.

NOKIA CELL PHONE INTERCEPTOR SOFTWARE $1,650.00


This software is the very first and only software in the world with which allows you to also log into the live phone conversation.

FACT SHEET: NOKIA 3250 CELL PHONE INTERCEPTOR

Audio File: Overview
Video File: Overview

With a normal Spy phone you can only Log into the phone when the target isn't using the phone (stand-by mode). So when he/she is making a phone call you will only get the busy signal and wont be able to spy on the target.

With the Cell phone Interceptor you can call and listen into surrounding sounds (around the Cell phone Interceptor) when the target is not using the Cell phone Interceptor and also listen to "live" conversations (taking place on the Cell phone Interceptor) when they are making a phone call. One channel, one phone, one line. You may program into the phone either a cell phone or land line (one number only) number and call into the Cell phone Interceptor for monitoring. This single number can be quickly and easily changed. You can call into the Cell phone Interceptor from anywhere in the world.

There will be no record of calls received from the special access number in the phone's list of received calls.

The Listening Mode will be immediately interrupted if:

1. The Cell phone Interceptor receives a call or

2. If any key of the Cell phone Interceptor is pressed.

Therefore, the interruption of the Listening Mode often means that there is an incoming or outgoing call from or to the Cell phone Interceptor. Just call the Cell phone Interceptor from the special access number again and start listening to the conversation.



1. Interception of mobile calls for BOTH side conversations

2. Cellphone interceptor (Listen-in feature)

3. Text Interception with Remote Control

4. SMS notifications on boot and SIM change

5. Incoming and outgoing call notifications

6. Get location of the cellphone interceptor user by sending a SMS command


FAQ's:

Q. Can I use this phone to monitor or intercept calls from other phones?

A. No. No. No.

Q. Who pays this SMS ? Will it not be marked on the phone bill of the owner ?

A. It will show on the phone bill. We don't have any control over the billing.

Proper Instructions for ordering Software:

1. Purchase or use your own cell phone. This list contains all currently compatible phones you can use with our software: 3230 6600 6260 6620 6670 7610 6630 6680 6681 6682 N70 N72 N90 N71 N73 N75 N80 N91 N92 N93 N95 E50 E60 E61 E62 E70 3250 5500 (We will add newer models as they become available).

2. Once you purchase the cell phone, place your order and provide us with the IMEI# for that phone. Mention the IMEI# in the "Comments/Special Instructions" section of the order form.

We will email you the software including instructions.

P.S. You can install the software using BlueTooth, SMS, Infra-Red or USB.


DPL-Surveillance-Equipment.com is a world leader in providing surveillance and security products and services to Government, Law Enforcement, Private Investigators, small and large companies worldwide. We have one of the largest varieties of state-of-the-art surveillance and counter-surveillance equipment including Biometric Identification Systems, Anti-terrorist-related equipment, Personal Protection (recommended for our female customers) and Bug Detection Products.

Buy, rent or lease the same state-of-the-art surveillance and security equipment Detectives, PI's, the CIA and FBI use. Take back control!


DPL-Surveillance-Equipment.com

Phone: (1888)
344-3742 Toll Free (USA)
Local: (818) 344-3742
Fax (775) 249-9320

Monty@DPL-Surveillance-Equipment.com

MSN
Monty@DPL-Surveillance-Equipment.com

AOL Instant Messenger
DPLSURVE32

Skype
Montyl32

Yahoo Instant Messenger
Montyl32

Alternate Email Address
montyl32@yahoo.com

Join my Yahoo Group!

My RSS Feed




Wednesday, March 14, 2007

DPL-M2000 HAND-HELD DRUG DETECTOR $24,000.00





Introducing the DPL-M2000 Hand-Held Drug Detector. One of the most advanced chemical detection systems in the world.

In demand around the world, the DPL-M2000 is a reliable drug detection
system for combating trafficking and enforcing the law. If portability,
ease-of-use, reliability and cost-effective operation are critical, then this drug
detector is the answer.

FEATURES

* Cost-effective: The
DPL-M2000 is your cost-effective choice, with low
maintenance and consumable costs.

* Portable: The
DPL-M2000 is self-contained, lightweight and comes in a
fully equipped, rugged carrying case - ready to use when and where
you need it.

* Easy-to-Use: The
DPL-M2000 offers a simple, one-step operating
process and its LCD gives a clear view of the results. Its simplicity and
ease-of-use make the
DPL-M2000 ideal for all your security and law
enforcement personnel.

* Flexible Power Sources: The
DPL-M2000 comes with a choice of 12
volt DC rechargeable battery pack, standard plug-in and vehicle
adapter power options convenient for use in a variety of field
conditions.

* Sensitive and Selective: The
DPL-M2000 can detect minute traces
of cocaine, opiates (heroin and morphine), cannabis (marijuana
and hashish) and amphetamine-type stimulants (amphetamine,
ecstasy and methamphetamine) , making it a valuable partner in
critical drug detection scenarios.

* No Radioactive Source: The
DPL-M2000 operates without a
radioactive source, eliminating operator, environmental and
regulatory concerns.


OPERATING THE
DPL-M2000

A sample is obtained from a suspected article using a cotton glove. The
sample is then transferred to a screen which is inserted into the sampling
port. The
DPL-M2000 then processes the sample immediately and provides
a detailed analysis in seconds. All results are indicated on the LCD and by a
volume-adjustable audio alarm, making detection a simple one-step process.

The
DPL-M2000 is the reliable choice in hand-held drug detection for:

* Police
* Security forces
* Correctional Facilities
* Custom and border control
* Aviation and marine carriers
* Postal and courier services
* Schools
* Private Industry
* Military

. . . Worldwide

SPECIFICATIONS

Detection Principle
Gas chromatography/surface ionization detection
No radioactive source

Detectable Compounds
Cocaine,
Opiates (heroin and morphine),
Cannabis (marijuana and hashish),
Amphetamine-type stimulants (amphetamine, ecstasy and methamphetamine)

Analysis Time
Approximately 40 seconds

Warm-up Time
Less than 20 minutes

Carrier Gas
None required (ambient air)

Controls
Power switch
Keypad
Volume control

Operational Status Indicators
LED indicator lights
2 X 16 character LCD for status messages
Audible alarm (with optional earphone)

Data Storage & Communication
550 retrievable data records
RS-232 serial output port for remote control and monitoring

Power Supply
12 volt DC rechargeable battery pack
Vehicle power adapter cable (cigarette lighter)
AC power 100-240 V

Operating & Storage Temperatures
Operating: -5°C to +55°C (+23°F to +131°F)
Storage: -5°C to +65°C (+23°F to +149°F)

Weight & Dimensions:

Unit weight: 2.95 kg (less than 6.5 lbs.) without battery pack;
5.23 kg (less than 11.5 lbs.) with battery
Unit dimensions (LxWxH) 51 x 12.5 x 14 cm / 20 x 5 x 5.5"
Shipping weight: 23 kg (51 lbs.)
Shipping dimensions (LxWxH) 80x54x31 cm / 31x21x12"

Warranty
One year return to manufacturer

Anti-Terrorist Surveillance and Security Equipment (Buy or Rent)


DPL-Surveillance-Equipment.com is a world leader in providing anti-terrorist surveillance and security equipment to Government, Law Enforcement, Private Investigators, small and large companies worldwide. We also have one of the largest varieties of state-of-the-art surveillance and counter-surveillance equipment including Biometric Identification Systems, Personal Protection (recommended for our female customers) and Bug Detection Products.


Buy, rent or lease the same state-of-the-art surveillance and security equipment Detectives, PI's, the CIA and FBI use. Take back control!















Some of Our Recommended Products Include:

BULLET PROOF HIDDEN AGENDA JACKET $1,099.95! (Buy or Rent!)

BULLET PROOF VEST $550.00! (Buy or Rent)

PD 6500i WALK THROUGH CONCEALED WEAPONS DETECTOR $4,070.00! (Buy or Rent!)

DPL-PWMD PORTABLE WALK THROUGH CONCEALED WEAPONS DETECTOR $6,770.00! (Buy or Rent)!

AUTOCLEAR 400+ Multi-Energy (High Capacity, Portable Parcel X-ray For Explosives, Weapons & Narcotics) $23,638.00

DPL-E5000 NARCOTICS AND EXPLOSIVES DETECTOR $46,000.00

DPL-EVD3500 HAND-HELD EXPLOSIVES DETECTOR $23,900.00


DPL-EVD3000 HAND-HELD EXPLOSIVES DETECTOR $20,700.00

DPL-NDD2000 HAND-HELD DRUG DETECTOR $22,800.00



















DPL-Surveillance-Equipment.com

Phone: (1888)
344-3742
Local: (818) 344-3742
Fax (775) 249-9320

Monty@DPL-Surveillance-Equipment.com

MSN
Monty@DPL-Surveillance-Equipment.com

AOL Instant Messenger
DPLSURVE32

Skype
Montyl32

Yahoo Instant Messenger
Montyl32

Alternate Email Address
montyl32@yahoo.com

Join my Yahoo Group!

My RSS Feed

Saturday, March 10, 2007

Surveillance and Counter-Surveillance Techniques. (Part I)

In this lesson plan (Audio File) we will cover Surveillance and Counter-Surveillance Techniques. (Part I)

DPL-Surveillance-Equipment.com is a world leader in providing surveillance and security products and services to Government, Law Enforcement, Private Investigators, small and large companies worldwide. We have one of the largest varieties of state-of-the-art surveillance and counter-surveillance equipment including Biometric Identification Systems, Anti-terrorist-related equipment, Personal Protection (recommended for our female customers) and Bug Detection Products.

Buy, rent or lease the same state-of-the-art surveillance and security equipment Detectives, PI's, the CIA and FBI use. Take back control!


DPL-Surveillance-Equipment.com

Phone: (1888)
344-3742 Toll Free (USA)
Local: (818) 344-3742
Fax (775) 249-9320

Monty@DPL-Surveillance-Equipment.com

MSN
Monty@DPL-Surveillance-Equipment.com

AOL Instant Messenger
DPLSURVE32

Skype
Montyl32

Yahoo Instant Messenger
Montyl32

Alternate Email Address
montyl32@yahoo.com

Join my Yahoo Group!

My RSS Feed

Thursday, March 08, 2007

Come Join Our SkypeCast For Provocative Discussion!

SkypeCasts, Special Events, Limited Time Offers on Products and Services, etc.

In this SkypeCast we discuss all matters relating to the surveillance and security industry including associated products and services. English Speaking!

Calendar of Events


DPL-Surveillance-Equipment.com is a world leader in providing surveillance and security products and services to Government, Law Enforcement, Private Investigators, small and large companies worldwide. We have one of the largest varieties of state-of-the-art surveillance and counter-surveillance equipment including Biometric Identification Systems, Anti-terrorist-related equipment, Personal Protection (recommended for our female customers) and Bug Detection Products.

Buy, rent or lease the same state-of-the-art surveillance and security equipment Detectives, PI's, the CIA and FBI use. Take back control!


DPL-Surveillance-Equipment.com

Phone: (1888)
344-3742 Toll Free (USA)
Local: (818) 344-3742
Fax (775) 249-9320

Monty@DPL-Surveillance-Equipment.com

MSN
Monty@DPL-Surveillance-Equipment.com

AOL Instant Messenger
DPLSURVE32

Skype
Montyl32

Yahoo Instant Messenger
Montyl32

Alternate Email Address
montyl32@yahoo.com

Join my Yahoo Group!

My RSS Feed

Wednesday, March 07, 2007

ALARM CLOCK RADIO HIDDEN AUDIO (Cellular-Based) Monitoring Device




We Have Various Audio Monitoring Devices On Our Website

This item rents for $175.00 per week.

This revolutionary wireless (GSM-based) audio monitoring device is a fully-functional Alarm Clock. When used in the spy mode, you call (from anywhere) and conduct covert room monitoring without anyone knowing. You can hear all conversations around the Alarm Clock Radio and when you're finished simply hang-up. You can hear a sounds up to approx. 20ft. from anywhere on the planet.


This version is a Fully-functional
Alarm Clock.

* High-Sensitivity Microphone.


Also Ask About Our (Portable) SMOKE DETECTOR HIDDEN AUDIO (GSM-Based) MONITORING DEVICE.

Options:

* Battery Pack and/or AC Power Adapter.

DPL-Surveillance-Equipment.com is a world leader in providing surveillance and security products and services to Government, Law Enforcement, Private Investigators, small and large companies worldwide. We have one of the largest varieties of state-of-the-art surveillance and counter-surveillance equipment including Biometric Identification Systems, Anti-terrorist-related equipment, Personal Protection (recommended for our female customers) and Bug Detection Products.

Buy, rent or lease the same state-of-the-art surveillance and security equipment Detectives, PI's, the CIA and FBI use. Take back control!


DPL-Surveillance-Equipment.com

Phone: (1888)
344-3742 Toll Free (USA)
Local: (818) 344-3742
Fax (775) 249-9320

Monty@DPL-Surveillance-Equipment.com

MSN
Monty@DPL-Surveillance-Equipment.com

AOL Instant Messenger
DPLSURVE32

Skype
Montyl32

Yahoo Instant Messenger
Montyl32

Alternate Email Address
montyl32@yahoo.com

Join my Yahoo Group!

My RSS Feed

Monday, March 05, 2007

Portable Surveillance-Grade Multi-Functional Camcorder $596.00 Buy or Rent



This item Rents For $95.00 Per Week.




Introducing the new all-in-one
Portable Surveillance-Grade Multi-Functional Camcorder "pocket DVR" and advanced 16 Mega Pixel, 8X ZOOM camcorder. Never have so many features been packed into one very small unit. AV input makes it great for use as a "pocket DVR" with your own covert camera or as a self-contained rapid-fire multi shot still camera/video camcorder. Advanced surveillance features include "night shot" and "stabilization mode" to insure smooth and stable images even while walking or running. IR remote control allows for easy downloading of data from the unit to your computer or DVD burner. Included CD package contains software to convert video clips into DVD. Uses standard Nokia cell phone NP60 Li-ion rechargeable battery which can be "quick swapped" for added power. SD/MMC card compatible with 32Mb internal memory.

Multi-Functions Include:

* Portable Surveillance-Grade Multi-Functional Camcorder
* Digital Still Camera
* Digital Audio Recorder
* MP3 Music Player
* Portable Media Player
* PC Webcam
* USB Storage Device (32 MB built-in memory)
* Video Recorder


Advanced Surveillance Features:
* In Video Or Still Photo Mode Activate Night Shot Feature For Night Time Conditions
* In Still Photo Mode Activate Multi-Snap To Take Five Rapid-Fire Stills
* In Video Or Still Photo Mode Activate Stabilization To Reduce Shaking
* In Video Or Still Photo Mode Activate Backlight When Background Is Much Brighter
* With Extra Plug Input, Use As A Digital Video Recorder With Third Party Cameras
* In Review Mode Quickly Review Video Or Still Photo Evidence You Obtained.
* Fast USB Download And Recharging While Connected to Computer
* Remote Control For Covert Action As Stationary Video Or Still Camera

Specifications:

* AV-IN / AV-OUT
* Display: 2,5" LTPS LCD Display, 270° rotatable
* Image Sensor: 5 Mega Pixel CCD, Interpolating Adjustment up to 16 Mega Pixels
* Video Resolution:
* VGA 640 x 480, 30 fps
* QVGA 320 x 240, 30fps
* High Image Resolution: Amazing Interpolating Adjustments up to 16 Mega Pixels!
* 3856 x 2892 (11 Mega Pixels)
* 2592 x 1944 (5 Mega Pixels)
* 1600 x 1200 (2 Mega Pixels)
* Digital Zoom: 8x
* Focus Range: Normal 140 cm to infinity; Portrait 70 cm to 140 cm; Macro 20cm
* White Balance: Auto, Daylight, Fluorescent, Tungsten
* Flash: Auto / Off
* Still Image Effect: 4 modes (Normal, Black & White, Classic, Solarized
* Self Timer: 10 second delay
* Internal Memory: 32 MB Flash Memory, 16 MB for Storage
* External Memory: SD/MMC (up to 1G)
* Interface: Mini USB 2.0 Port, Video In/Out, Earphone (3.5mm), Built-in speaker and microphone
* TV in: Yes
* TV Out: Yes (Video: NTSC / PAL; Audio: Stereo)
* Storage Media: Secure Digital (SD) and MultiMedia (MMC) Cards
* Still Image Format: JPEG
* Video File Format: MPEG4 (ASF)
* Digital Audio Format: MP3, WAV
* USB type: USB 2.0 mass storage
* Dimensions (cm): 109 x 70 x 32
* Weight: 157g (without battery)
* Color: Black
* Included Remote Control
* Battery: Long Lasting NP60 Li-ion Rechargeable Battery (1100mAH)

Package Includes:
* Button Camera
* Multi-function 8 In 1 CCD High End Camcorder
* AC Adapter (100-240V)
* NP60 Li-ion Battery
* USB cable
* AV cable
* Quick Guide
* Software CD
* Earphone
* Strap
* Pouch
* Remote Control
* One Year Warranty


DPL-Surveillance-Equipment.com is a world leader in providing surveillance and security products and services to Government, Law Enforcement, Private Investigators, small and large companies worldwide. We have one of the largest varieties of state-of-the-art surveillance and counter-surveillance equipment including Biometric Identification Systems, Anti-terrorist-related equipment, Personal Protection (recommended for our female customers) and Bug Detection Products.

Buy, rent or lease the same state-of-the-art surveillance and security equipment Detectives, PI's, the CIA and FBI use. Take back control!





DPL-Surveillance-Equipment.com

Phone: (1888)
344-3742
Local: (818) 344-3742
Fax (775) 249-9320

Monty@DPL-Surveillance-Equipment.com

MSN
Monty@DPL-Surveillance-Equipment.com

AOL Instant Messenger
DPLSURVE32

Skype
Montyl32

Yahoo Instant Messenger
Montyl32

Alternate Email Address
montyl32@yahoo.com

Join my Yahoo Group!

My RSS Feed

Saturday, March 03, 2007

How Do I Know If I’ve Been Bugged?



If any of the following warning signs apply and you are concerned about covert eavesdropping or wiretapping then it would be wise to contact DPL-Surveillance-Equipment.com to rent or purchase one of our state-of-the–art bug detection products.

Are you a potential target?

1. If eavesdropping on anything you say, write, or do could increase someone else's wealth or influence, then the answer is yes, you are a potential target.

2. Others know your confidential business or professional trade secrets.

This is the most obvious indicator of covert eavesdropping activities. Theft of confidential information is a multi-billion dollar underground industry in the United States. Often the loss of your secrets will show up in very subtle ways so you should always trust your instincts in this matter. When your competitors, associates or co-workers know things that are obviously private, or the media finds out about things they should not know, then it is reasonable to suspect technical eavesdropping or bugging.

3. Secret meetings and bids seem to be less than secret.

Confidential meetings and bids are very popular targets for corporate spies. How would you like the plans for the corporate takeovers you're planning to become public knowledge? Would copies of your product designs be of any use to your competitors? Would it be beneficial for your competitors to know how much you're quoting for the same project?

4. People seem to know your activities when they shouldn't.


5. You have noticed strange sounds or volume changes on your phone lines.

This is commonly caused by an amateur eavesdropper when they attach a wiretap, or activate a similar listening device. Surveillance devices often cause slight anomalies on the telephone line such as volume shift or drop-out. Professional eavesdroppers and their equipment usually do not make such noises; so if this is going on it could indicate that an amateur eavesdropper is listening in. On the other hand you could simply be experiencing a flaw in the line, but you should check it out.

6. You have noticed static, popping, or scratching on your phone lines.

This is caused by the capacitive discharge which occurs when two conductors are connected together (such as a bug or wiretap on a phone line). This is also a sign that an amateur eavesdropper or poorly trained spy is playing with your phone lines. It could be nothing more then a problem with your phone line or instrument. However, it should be checked out by using one of our RF Detectors.


7. Sounds are coming from your phones handset when it's hung up.

This is often caused by a hook switch bypass, which turns the telephone receiver into an eavesdropping microphone (and also a speaker). There is probably somebody listening to everything you say or do within twenty feet of the telephone (if this is happening).

8. Your phone often rings and nobody is there, or a very faint tone, or high-pitched squeal/beep is heard for a fraction of a second.

This is an indicator of a slave device, or line extender being used on your phone line. This is also a key indicator of a harmonica bug, or infinity transmitter being used. Of course it may also be nothing more then a fax machine or modem calling the wrong number. However, using one of our Telephone Line Analyzers. should check it out.


9. You can hear a tone on your line when your phone is on the hook (by using an external amplifier). Contact us!

10. Your AM/FM radio has suddenly developed strange interference.

Many amateur and spy shop eavesdropping devices use frequencies within or just outside the FM radio band, these signals tend to drift and will "quiet" an FM radio in the vicinity of the bug. Look for the transmissions at far ends of the FM radio band, and at any quiet area within the FM band. If the radio begins to squeal then slowly move it around the room until the sound become very high pitched. This is referred to as feedback detection or loop detection and will often locate the bug. The "stereo" function should be turned off so the radio is operating in "mono" as this will provide a serious increase in sensitivity. If you find a "squealer" in this manner then immediately Contact us!

11. Your car radio suddenly starts "getting weird"

Keep in mind that the antenna your car radio uses may be (and often is) exploited by an eavesdropper, and that such usage may interfere with radio reception (so be concerned if your automobile radio suddenly starts getting weird).

12. Your television has suddenly developed strange interference.

Television broadcast frequencies are often used to cloak a eavesdropping signal, but such devices also tend to interfere with television reception (usually a UHF channel). Televisions also "suck in" a lot of RF energy and because of this are very sensitive to any nearby transmitters (this is technically called "Bandwidth, and TV signals use a lot of it). Contact us! asap!

13. You have been the victim of a burglary, but nothing was taken.

Professional eavesdroppers often break into a targets home or office, and very rarely leave direct evidence of the break-in; however, occupants of the premises will often "pickup on something not being right" such as the furniture being moved slightly.

14. Electrical wall plates appear to have been moved slightly or "jarred".

One of the most popular locations to hide eavesdropping devices is inside, or behind electrical outlets, switches, smoke alarms, and lighting fixtures. This requires that the wall plates be removed. Look for small amounts of debris located on the floor directly below the electrical outlet. Also, watch for slight variations in the color or appearance of the power outlets and/or light switches as these are often swapped out by an eavesdropper. Also note if any of the screws which hold the wallplate against the wall have been moved from their previous position.

15. A dime-sized discoloration has suddenly appeared on the wall or ceiling.

This is a tell tale sign that a pinhole microphone or small covert video camera has been recently installed.

16. One of your vendors just gave you any type of electronic device such as a desk radio, alarm clock, lamp, small TV, boom box, CD player, and so on.

Many of these "gifts" are actually Trojan horses which contain eavesdropping devices. Be very suspicious of any kind of pen, marker, briefcase, calculator, "post-it" dispenser, power adapter, pager, cell phone, cordless phone, clock, radio, lamp, and so on that is given as a gift. That little gift the salesman left for you may be a serious hazard.

17. A small bump or deformation has appeared on the vinyl baseboard near the floor.

Strong indicator that someone may have concealed covert wiring or a microphone imbedded into the adhesive which holds the molding to the wall. Such deformation will often appear as a color shift, or lightening of the color.

18. The smoke detector, clock, lamp, or exit sign in your office or home looks slightly crooked, has a small hole in the surface, or has a quasi-reflective surface.

These items are very popular concealment for covert eavesdropping devices. Often when these devices are installed at a target location they are rarely installed without small tale-tale clues.

19. Certain types of items have "just appeared" in your office or home, but nobody seems to know how they got there.
Typical items to watch for and be aware of are: clocks, exit signs, sprinkler heads, radios, picture frames, and lamps.

20. White dry-wall dust or debris is noticed on the floor next to the wall.

A sign that a pinhole microphone or video camera may have been installed nearby. It will appear as if someone has dropped a small amount of powdered sugar either on the floor, or on the wall.

21. You notice small pieces of ceiling tiles, or "grit" on the floor, or on the surface area of your desk. Also, you may observe a cracked, chipped, or gouged ceiling tiles, or ones that are sagging, or not properly set into the track.

Prime indicator that a ceiling tile has been moved around, and that someone may have installed a hidden video camera or other eavesdropping device in your office or near your desk. Also watch for cracks or chips in the ceiling tiles. Amateur and poorly trained spies tend to crack or damage acoustical tiles. The ceiling tiles in any executive areas should never contain any cracks, nicks, gouges, or stains. Any ceiling tile that becomes damaged (for what ever reason) should immediately be replaced and the cause of the damage documented.

22. You notice that "Phone Company" trucks and utilities workers are spending a lot of time near your home or office doing repair work.

If you see the same or similar vehicles more then three times then you may have a serious problem (at least according to the U.S. State Department training course on counter surveillance).

23. Telephone, cable, plumbing, or air conditioning repair people show up to do work when no one called them.

A very common ruse which eavesdroppers use to get into a facility is to fake a utility outage, and then show up to fix the problem. While they are fixing "the problem" they are also installing eavesdropping devices. Some of the more popular outages involve power, air conditioning, telephone, and even the occasional false fire alarm.

24. Service or delivery trucks are often parked nearby with nobody (you can see) in them.

These vehicles are commonly used as listening posts, be very cautious of any vehicle, which has a ladder or pipe rack on the roof. Also, be wary of any vehicle, which has tinted windows, or an area, which you cannot see though (like a service van). The listening post vehicle could be any vehicle from a small Geo Tracker, Suburban, Blazer, Trooper, or Cargo Van. Look for any vehicle, which could conceal a person in the back or has tinted windows. Also, keep in mind that the eavesdropper may relocate the vehicle several times, so look around. Typically, eavesdroppers like to get within 500-750 feet from the place or person they are eavesdropping on.

25. Your door locks suddenly don't "feel right", they suddenly start to get "sticky", or they completely fail.

Prime evidence that the lock has been picked, manipulated, or bypassed. Try to always use biaxial locks with sidebars (such as ASSA or Medeco). Also, only use double sided deadbolts in all doors, and good quality window bars on all windows, and a good quality door bar on all doors not used as a primary entry doors.

26. Furniture has been moved slightly, and no one knows why.

A very popular location for the installation of eavesdropping device is either behind, or inside furniture (couch, chair, lamp, etc.) People who live or work in a targeted area tend to notice when furnishings have been moved even a fraction of an inch. Pay close attention to the imprint which furniture makes on rugs, and the position of lamps shades. Also watch the distance between furniture and the wall as eavesdroppers are usually in a hurry and rarely put the furniture back in the right place.

27. Things "seem" to have been rummaged through, but nothing is missing (at least that you noticed).

A "less than professional spy" will often rummage through a targets home for hours, but very rarely will they do it in a neat and orderly fashion. The most common "rummaging" targets are the backs of desk drawers, the bottom of file cabinets, closets, and dresser drawers.

28. An eavesdropper sends you a copy of your private conversations.

As simple as it seems this is the strongest indicator, and solid proof of eavesdropping. An eavesdropper will sometimes send a victim a copy of a private conversation they intercepted in an attempt at blackmail, or in an attempt to terrorize, or to just stalk the victim. This is commonly seen in civil lawsuits, criminal court cases, marital problems, shareholder disputes, custody battles, and other situations were one side has a position of weakness and is trying to physiologically undermine their opponent.

When contacting DPL-Surveillance-Equipment.com please remember not to call from any suspect area, do not use your cellular telephone, do not use your cordless phone, and do not use any suspect telephone (instead call from a sterile phone somewhere outside the suspect area).

Who Gets Bugged?

High Threat Business Situations

* Your company has stock, which is publicly traded (or will be soon)
* Your company is having labor problems, union activities, or negotiations
* Your company is involved in any type of litigation or lawsuit
* Your company has layoffs pending (or they have just happened)
* Your company is involved in the fashion, automotive, advertising, or marketing industry

Anyone can be the target of covert eavesdropping, however; some people are under greater risk than others because of financial position, occupation, legal, or domestic situation.

* Spouses bug each other on a regular basis
* Parents bug children
* Businessmen bug other businessmen
* Scientists bug other scientists
* Students bug professors
* Attorneys bug other attorneys (and their clients)
* Insurance companies bug accident victims, and other claimants
* Construction companies bug other construction companies
* Salesmen bug clients
* Collection agencies bug debtors
* Police officers bug suspects
* Executive recruiters bug personnel directors
* Rock fans bug rock musicians
* Department stores bug customers and merchandise

The Neighbors, Coworkers, Friends, Enemies, Strangers, Your Spouse, Industrial Spies, Government Agents, Your Insurance Company, Your Boss...

High Threat Personal Situations (When to be seriously concerned)

You (or someone close to you) have been:

* Involved in any type of litigation or lawsuit
* Been questioned, arrested or arraigned by the police
* In the process of getting married, divorced, or separated
* A minister or religious leader (ie: priest, rabbi, deacon, bishop, elder...)
* Running for any type of elected public office
* Elected to any public office (ie: mayor, selectman, school principal)
* Executive or scientist at any large company
* Recently filed a insurance claim
* Engaging in political demonstrations or activism
* Employed by a defense contractor, Department of Energy, etc...
* Private Investigators have been "poking" around
* You are in the upper income bracket

Keep in mind that anybody with Money, Power, Influence, or access to sensitive, classified, or personal information is at serious personal risk.

On a related note: If you work (or have worked) for any kind of military, governmental, law enforcement or judicial agency the possibility of you being targeted for eavesdropping is very high. Such eavesdropping can come from either side of the law, and is rarely legal or court sanctioned.

Additionally, people married to, associated with, divorced from, getting divorced from, dating, or getting intimate with a member of law enforcement, private security, PI, or any level of the judicial system should be concerned about illegal eavesdropping (yes, cops love to bug their wives and girlfriends).

High Threat Occupations

* Attorney
* Doctor
* Chiropractor
* Dentist
* Architect
* Police Officer
* Court Clerk
* Judge
* Elected to any public office
* Mayor
* Selectman
* School Principal
* College Professor
* Product Engineer
* Software Developer
* Executive at any large company
* Scientist at any large company
* Employed by any defense contractor
* Employed by the Department of Energy
* Any minister or religious leader (ie: deacon, bishop, elder...)
* Corporate Buyer or Purchasing Agent
* Employee of a Construction Contractor
* Any type Sales or Marketing
* Labor or Union Official
* Fashion
* Advertising
* Personnel Directors



According the FBI the following types of businesses are under EXTREME risk and are popular targets of illegal bugging, wiretapping, and similar surveillance:

* Materials: Materials synthesis and processing
* Electronic and photonic materials
* Ceramics
* Composites
* High-performance metals and alloys

Manufacturing:
* Flexible computer-integrated manufacturing
* Intelligence processing equipment
* Micro- and nanofabrication
* Systems management technologies

Information and Communications:
* Software
* Micro and optoelectronics
* High-performance computing and networking
* High-definition imaging and displays
* Sensors and signal processing
* Data storage and peripherals
* Computer simulation and modeling

Biotechnology and Life Sciences:
* Applied molecular biology
* Computational Chemistry
* Medical technology

Transportation:
* Aeronautics
* Surface transportation technologies

Energy and Environment:
* Energy technologies
* Pollution minimization, remediation, and waste management



DPL-Surveillance-Equipment.com is a world leader in providing surveillance and security products and services to Government, Law Enforcement, Private Investigators, small and large companies worldwide. We have one of the largest varieties of state-of-the-art surveillance and counter-surveillance equipment including Biometric Identification Systems, Anti-terrorist-related equipment, Personal Protection (recommended for our female customers) and Bug Detection Products.

Buy, rent or lease the same state-of-the-art surveillance and security equipment Detectives, PI's, the CIA and FBI use. Take back control!


DPL-Surveillance-Equipment.com

Phone: (1888)
344-3742 Toll Free (USA)
Local: (818) 344-3742
Fax (775) 249-9320

Monty@DPL-Surveillance-Equipment.com

MSN
Monty@DPL-Surveillance-Equipment.com

AOL Instant Messenger
DPLSURVE32

Skype
Montyl32

Yahoo Instant Messenger
Montyl32

Alternate Email Address
montyl32@yahoo.com

Join my Yahoo Group!

My RSS Feed