DPL-Surveillance-Equipment.com

These are new product announcements from my main website (Open 24/7/365). We have a life-time warranty / guarantee on all products. (Includes parts and labor). Here you will find a variety of cutting-edge Surveillance and Security-Related products and services. (Buy/Rent/Layaway) Post your own comments and concerns related to the specific products or services mentioned or on surveillance, security, privacy, etc.

Sunday, January 31, 2016

Microsoft & Google To Start Notifying Victims of 'State Sponsored' Hacking

Microsoft And Google To Start Notifying Victims of
'State Sponsored' Hacking










Company changes policy to notify users if government-related attacks take place after previously not alerting users when Hotmail accounts were hacked

Microsoft has announced that it will start notifying users it believes have been targeted by government-linked hackers, after failing to do so when Chinese authorities allegedly compromised over 1,000 Hotmail accounts.

Joining other US technology companies – including Google, Facebook, Yahoo and Twitter – Microsoft said that the change in policy was designed to help users protect their data.







Scott Charney, corporate vice president of Microsoft’s Trustworthy Computing division, said: “We will now notify you if we believe your account has been targeted or compromised by an individual or group working on behalf of a nation state.

“We’re taking this additional step of specifically letting you know if we have evidence that the attacker may be ‘state-sponsored’ because it is likely that the attack could be more sophisticated or more sustained than attacks from cybercriminals and others.”






The change follows revelations that Microsoft corporate executives concluded that over 1,000 of the company’s Hotmail email accounts had been hacked into by elements linked to Chinese authorities over three years starting in July 2009, but did not tell users.

Targets included the emails of high-ranking Uighur and Tibetan leaders in multiple countries, African diplomats, human rights lawyers and others in sensitive positions inside China.



PRO-DTECH II FREQUENCY DETECTOR
(Buy/Rent/Layaway)



Microsoft, after being alerted by security company Trend Micro in 2011, patched the security holes in its web services that allowed the hackers access to the emails and to reset user passwords. But it did not alert the affected users to the intrusions and the scope of the snooping, allowing the hackers to continue their campaign, according to former Microsoft employees.

Microsoft officials did not dispute that most of the attacks came from China, including a Chinese network known as AS4808 which has been publicly attributed to China by US intelligence, but said some came from elsewhere. They did not give further details.







“We weighed several factors in responding to this incident, including the fact that neither Microsoft nor the US government were able to identify the source of the attacks, which did not come from any single country,” the company said. “We also considered the potential impact on any subsequent investigation and ongoing measures we were taking to prevent potential future attacks.”

The Chinese government “is a resolute defender of cyber security and strongly opposes any forms of cyberattacks”, a Chinese Foreign Ministry spokesman said.








Charney said: “The evidence we collect in any active investigation may be sensitive, so we do not plan on providing detailed or specific information about the attackers or their methods. But when the evidence reasonably suggests the attacker is ‘state sponsored’, we will say so.”






Google admits Middle Eastern governments could be spying on its users as it warns of 'state-sponsored' hacking attacks

Google has launched a new effort to warn its users that they could be the victims of cyberattacks from hostile governments.







Account-holders working in international relations, development and other sensitive areas have received messages from the search giant informing them of recent efforts to spy on their online history.

The move comes after the company started detecting 'tens of thousands' of new hacking attacks originating in the Middle East.







Google is a tempting target for hackers, as it is not focussed solely on search but also offers its users services such as email, mapping and Chrome, one of the most popular web browsers.

This week, according to the New York Times, users thought to have been targeted saw a message attached to their accounts saying, 'Warning: We believe state-sponsored attackers may be attempting to compromise your account or computer.'





This is not the first time that Google has detected hostile online activity apparently coming from or supported by national governments.

The firm first issued warnings about cybersecurity to a few users in June this year - but an investigation since then has revealed many more security breaches than previously thought.




A member of Google's security team, Mike Wiacek, told the Times that 'tens of thousands of new users' would receive warnings that their accounts had been compromised.

Those who took to Twitter to report receiving the warnings include national-security journalists and employees of international think-tanks.





Mr Wiacek added that the Middle East had been a particularly common source of state-sponsored hacking attacks, with online spies active in 'a slew of different countries'.

While he refused to specify which governments were suspected to be behind the cyber-espionage, countries such as Bahrain, Iran and Turkmenistan have recently been accused of spying on dissidents through the internet.



(Buy/Rent/Layaway)



And Iran in particular has been active in using online warfare to supplement its conventional capabilities, according to security experts.

However, many of the most spectacular instances of computer-based hostility have come from the U.S. and its allies such as Israel.

Most spectacularly, a virus known as Stuxnet which temporarily shut down Iran's nuclear program is believed to have resulted from a collaboration between the CIA and Israeli intelligence.

As well as the complex task of crippling whole computer systems, state-sponsored hackers can attempt to gather information about other regimes or on political dissidents from their own country.







Google has previously clashed with governments attempting to exert control over their citizens' use of the web.

The firm launched a Chinese version of its search engine with certain sites excluded from the results, but later pulled out of the country for fear of violating its own free-speech principles.




Wireless Camera Finder
(Buy/Rent/Layaway)



In June, many Google users were surprised to see an unusual greeting at the top of their Gmail inbox, Google home page or Chrome browser. “Warning: We believe state-sponsored attackers may be attempting to compromise your account or computer.”
On Tuesday, tens of thousands more Google users will begin to see that message. The company said that since it started alerting users to malicious — probably state-sponsored — activity on their computers in June, it has picked up thousands more instances of cyberattacks than it anticipated.







Mike Wiacek, a manager on Google’s information security team, said in an interview on Tuesday that since Google started to alert users to state-sponsored attacks three months ago, it had gathered new intelligence about attack methods and the groups deploying them. He said the company was using that information to warn “tens of thousands of new users” that they may have been targets, starting on Tuesday.




By Tuesday afternoon, several people — many of them American journalists and foreign policy experts — had already taken to Twitter to say they had seen the warning. Noah Schactman, the editor of Wired’s national security blog “Danger Room,” tweeted: “Aaaaand I just got Google’s ‘you may be a victim of a state-sponsored attack’ notice. #WhatTookYouSoLong?” Daveed Gartenstein-Ross, a senior fellow at the Foundation for Defense of Democracies, also reported getting the message.  As did Joshua Foust, a fellow at the American Security Project, a nonprofit research organization, who has written extensively about Afghanistan.



(Buy/Rent/Layaway)



Mr. Wiacek noted that Google had seen an increase in state-sponsored activity coming from the Middle East. He declined to call out particular countries, but he said the activity was coming from “a slew of different countries” in the region.

Those findings triangulate with recent discoveries by security researchers that Middle Eastern states, including Iran, Qatar, the United Arab Emirates and Bahrain, have used spyware to monitor citizens and activists overseas.

Last week, several American banks were hit with cyberattacks by hackers claiming Middle Eastern ties. Security researchers have said they have noticed an increase in cyberattacks originating in the region. “We absolutely have seen more activity from the Middle East, and in particular Iran has been increasingly active as they build up their cybercapabilities,” George Kurtz, the president of CrowdStrike, a computer security company, said in a recent interview.

Mr. Wiacek said there were several steps Google users, especially those who get its warning, could take to protect themselves, like changing their e-mail and account passwords, enabling Google’s two-step authentication service and running their computer software updates.





Your questions and comments are greatly appreciated.



Monty Henry, Owner














www.DPL-Surveillance-Equipment.com










































NOW, look in on your home, second home, lake house or office anytime, anywhere from any internet connected PC/Lap-top or Internet active cell phone, including iphone or PDA.

Watch your child's caregiver while sitting at a traffic light or lunch meeting, or check on your business security from the other side of the world. Our built-in hidden video features all digital transmissions providing a crystal clear image with zero interference. With the IP receiver stream your video over the internet through your router, and view on either a PC or smart phone. Designed exclusively for DPL-Surveillance-Equipment, these IP hidden wireless cameras come with multiple features to make the user's experience hassle-free.

NOW, look in on your home, second home, lake house or office anytime, anywhere from any internet connected PC/Lap-top or Internet active cell phone, including iphone or PDA: http://www.dpl-surveillance-equipment.com/wireless_hidden_cameras.html

Watch your child's caregiver while sitting at a traffic light or lunch meeting, or check on your business security from the other side of the world. Our built-in hidden video features all digital transmissions providing a crystal clear image with zero interference. With the IP receiver stream your video over the internet through your router, and view on either a PC or smart phone. Designed exclusively for DPL-Surveillance-Equipment, these IP hidden wireless cameras come with multiple features to make the user's experience hassle-free.

• Remote Video Access

• Video is Recorded Locally To An Installed SD Card (2GB SD Card included)

• Email Notifications (Motion Alerts, Camera Failure, IP Address Change, SD Card Full)

• Live Monitoring, Recording And Event Playback Via Internet

• Back-up SD Storage Up To 32GB (SD Not Included)

• Digital Wireless Transmission (No Camera Interference)

• View LIVE On Your SmartPhone!

Includes:

* Nanny Cameras w/ Remote View
* Wireless IP Receiver
* Remote Control
* A/C Adaptor
* 2GB SD Card
* USB Receiver



FACT SHEET:  HIDDEN NANNY-SPY (VIEW VIA THE INTERNET) CAMERAS

Specifications:

Receiver Specs:

* Transmission Range of 500 ft Line Of Sight
* Uses 53 Channels Resulting In No Interference
* 12V Power Consumption
* RCA Output
* Supports up to 32gig SD

Camera Specs:

* 640x480 / 320x240 up to 30fps
* Image Sensor: 1/4" Micron Sensor
* Resolution: 720x480 Pixels
* S/N Ratio: 45 db
* Sensitivity: 11.5V/lux-s @ 550nm
* Video System: NTSC
* White Balance: Auto Tracking

Make Your Own Nanny Cameras:  Make Tons Of Money In A Booming, Nearly Recession-Proof Industry!


Your Primary Customers Include But Are Not Limited To Anyone In The Private Investigator, Government, Law Enforcement And/Or Intelligence Agencies Fields!

* You Buy Our DVR Boards And We'll Build Your Products! (Optional)

















Our New Layaway Plan Adds Convenience For Online Shoppers










DPL-Surveillance-Equipment's layaway plan makes it easy for you to buy the products and services that you want by paying for them through manageable monthly payments that you set. Our intuitive calculator allows you to break down your order's purchase price into smaller payment amounts. Payments can be automatically deducted from your bank account or made in cash using MoneyGram® ExpressPayment® Services and you will receive your order once it's paid in full. Use it to plan and budget for holiday purchases, anniversaries, birthdays, vacations and more!


DPL-Surveillance-Equipment's Customers can now use the convenience of layaway online to help them get through these tough economic times.

We all shop now and then just to face a hard reality -- big credit card bills. However, our latest financing innovation can help you avoid that. Find out why more and more shoppers are checking out DPL-Surveillance-Equipment's e-layaway plan.

If you're drooling over a new nanny camera, longing for a GPS tracker, or wishing for that spy watch, but you're strapped for cash and can't afford to do credit, do what Jennie Kheen did. She bought her iPod docking station (hidden camera w/motion-activated DVR) online using our convenient lay-away plan.

Our online layaway plan works like the old-fashioned service stores used to offer. But, in Kheen's case, she went to DPL-Surveillance-Equipment.com, found the iPod docking station (hidden camera w/motion-activated DVR), then set up a payment plan.

"It's automatically drawn from my account," she said. "I have a budget, $208.00 a month.

In three months, Kheen had paid off the $650.00 iPod docking station. She paid another 3.9 percent service fee, which amounted to about $25.35 (plus $12.00 for shipping) for a total of $687.35.

"You pay a little bit each month," Kheen said. "It's paid off when you get it and you don't have it lingering over your head. It's great."

Flexible payment terms and automated payments make our layaway plan an affordable and fiscally responsible alternative to credit cards.

1. Register:

It's quick, easy and FREE! No credit check required!

2. Shop:

Select the items or service you want and choose "e-layaway" as your payment option. Our payment calculator makes it easy for you to set up your payment terms.

3. Make Payments:

Payments are made on the schedule YOU set. Check your order status or adjust your payments online in a secure environment.

4. Receive Products:

Receive the product shortly after your last payment. The best part, it's paid in full... NO DEBT.

More Buying Power:

* Our lay-away plan offers a safe and affordable payment alternative without tying up your credit or subjecting the purchase to high-interest credit card fees.

No Credit Checks or Special Qualifications:

* Anyone 18 years old or older can join. All you need is an active bank account.

Freedom From Credit Cards:

* If you are near or beyond your credit limit or simply want to avoid high interest credit card fees, our e-layaway is the smart choice for you.

Flexible Payment Schedules:

* Similar to traditional layaway, e-layaway lets you make regular payments towards merchandise, with delivery upon payment in full. Payments are automatically deducted from your bank account or made in cash using MoneyGram® ExpressPayment®

A Tool for Planning Ahead:

* Our e-layaway makes it easy for smart shoppers like you to plan ahead and buy items such as bug detectors, nanny cameras, audio bugs, gps trackers, and more!

No Hidden Charges or Mounting Interest:

Our e-layaway makes shopping painless by eliminating hidden charges and monthly interest fees. Our customers pay a flat transaction fee on the initial purchase price.

NO RISK:

* You have the right to cancel any purchase and will receive a refund less a cancellation fee. See website for details.

Security and Identity Protection:

DPL-Surveillance-Equipment has partnered with trusted experts like McAfee and IDology to ensure the security and integrity of every transaction. Identity verification measures are integrated into our e-layaway system to prevent fraudulent purchases.

Note: Simply Choose e-Lay-Away as a "Payment Option" in The Shopping Cart



DPL-Surveillance-Equipment.com is a world leader in providing surveillance and security products and services to Government, Law Enforcement, Private Investigators, small and large companies worldwide. We have one of the largest varieties of state-of-the-art surveillance and counter-surveillance equipment including Personal Protection and Bug Detection Products.



Buy, rent or lease the same state-of-the-art surveillance and security equipment Detectives, PI's, the CIA and FBI use. Take back control!



DPL-Surveillance-Equipment.com

Phone: (1888) 344-3742 Toll Free USA
Local: (818) 344-3742
Fax (775) 249-9320

Monty@DPL-Surveillance-Equipment.com


Google+ and Gmail
DPLSURVE


Twitter
DPLSURVE


MSN
 Monty@DPL-Surveillance-Equipment.com

AOL Instant Messenger
DPLSURVE32

Skype
Montyl32

Yahoo Instant Messenger
Montyi32

Alternate Email Address
montyi32@yahoo.com

Join my Yahoo Group!

My RSS Feed



Bookmark and Share

Tuesday, January 26, 2016

New Spy Service Shows You Unsecured Webcams And Baby-Cams, Etc.

New Spy Service Shows You Unsecured
Webcams And Baby-Cams, etc.













Shodan has made it even easier for our inner voyeur to spy upon the open webcams of homes across the world -- but are the ramifications more pronounced than idle surveillance?

Launched in 2013, Shodan is a search engine used to find Internet of Things (IoT) connected devices around the world. Webcams, security systems and routers are only some of the devices which, once connected to the Web, can offer a glimpse into our lives behind locked doors should poor security turn the key.

Unfortunately, despite a steep rise in home Internet connectivity and the use of connected home devices -- from lighting to cameras -- and IoT-based vehicles, security comes up short.






We've heard of Jeeps hacked by attackers able to control braking systems, IoT devices with obsolete firmware that can be easily compromised by a remote hacker, and routers placed at risk should you fall for a phishing campaign.






The rapid push to capitalise on consumer IoT devices has left a rift which security needs to fill, and much of it can be solved by forcing consumers to take control of their basic security right at the start -- while other elements, such as patching firmware flaws, are the responsibility of vendors.

Shodan, while potentially a dangerous tool, is also the absolute example of what can happen when devices with lax security enter our daily lives.



Related Article:








In some ways, Shodan is a voyeur's dream. A quick scan either through paid or free membership using terms such as port:554 has_screenshot:true reveals cameras installed in places ranging from car parks in Japan to bars in France, private lounges in Korea to rabbit cages in Germany.

As reported by Ars Technica, you can use the vulnerable cam feed to find everything from "marijuana plantations, back rooms of banks, children, kitchens, living rooms, garages, front gardens, back gardens, ski slopes, swimming pools, colleges and schools, laboratories, and cash register cameras in retail stores."

Once you've gotten over contemplating the decor choices of citizens in countries including the UK, US and Russia, you begin to realize being able to snoop in bedrooms, kitchens, garages, lounges and gardens has a far darker side than fleeting amusement.



PRO-DTECH II FREQUENCY DETECTOR
(Buy/Rent/Layaway)



A swift, short search also shows cameras honing in on sleeping children, oblivious couples snuggled on the sofa and happy patrons at bars, unaware their faces are being broadcast to the Internet while they enjoy a cheeky pint.


But Why Does This Happen?

Shodan scours the Web for devices which use Real Time Streaming Protocol (RTSP port 554) which are left open without basic password protection -- or only the default password settings -- in place. Luckily for those with vulnerable webcams, Shodan trawls the web for open feeds but only takes a snapshot before moving on.

This is bad enough, however, to highlight how important security has become for the average consumer, whether they realise it or not.






There's no easy answer for consumers. Home cameras come in useful, especially when they are used for security. I use one myself, which remains on its own network and disconnected from any other IoT devices I have installed as one of the few measures I can take to improve the security of my devices.

When I'm out and about or abroad, I like knowing that intruders will set off both motion sensors and my camera, there will be a live stream, alert and the option to record footage of any unwanted guests. I also enjoy the fact I can 'check-in' to make sure everything is fine when i'm away.

There was something else I did straight out of the box, however: I changed the default passwords on every IoT device I operate at home. But not every device even allows you to do this, and this responsibility lies at the feet of vendors -- which may require regulatory pressure to get their act together.








Security researcher Dan Tentler told Ars there are likely "millions" of vulnerable webcams in use. However, solving the problems this idea prompts cannot be done with a simple over-air patch.

Money, trust, and interest lie at the core. Consumers will often choose cheaper products that do the job over more expensive options, vendors wish to create the best profit margins possible, and a current lack of IoT security regulations set the trend.

In addition, consumers often expect vendors to provide secure products as a matter-of-course, and may not understand or care about ensuring complex passwords and barriers are in place before using their latest gadget.






It is possible that regulators such as the US Federal Trade Commission (FTC) may step in to stem the tide of vulnerable IoT devices, but until regulations are firmly in place, consumers are left in limbo.

The FTC issued a report last year urging IoT device makers to adopt a set of best practices to keep devices secure, but more must be done in the future to protect our connected homes.

If nothing else, make sure you change the default password on your device, if you can. Default passwords can be easily found by search engines such as Shodan, and by leaving default settings in place, you may be unwittingly inviting the interested eyes of the Web into your home.







But perhaps you should ask yourself: In a world where the Internet of Things is a fledgling industry and security is yet to catch up, do we really need a camera to enhance a baby monitor? In order to protect our privacy, is it completely outside of the realm of possibility to take a step back and downgrade some of our technology to maintain our privacy at home?

If the answer to the latter is no, then at the very least, any device connected to the Internet which can stream video or audio should not be placed in areas you would prefer to keep private.

Shodan is not the devil, but rather a messenger which should make us take responsibility for our own security in a world of webcams and mobile devices.








Explore The Internet of Things

Use Shodan to discover which of your devices are connected to the Internet, where they are located and who is using them.

See The Big Picture

Websites are just one part of the Internet. There are power plants, Smart TVs, refrigerators and much more that can be found with Shodan!

Monitor Network Security

Keep track of all the computers on your network that are directly accessible from the Internet. Shodan lets you understand your digital footprint.




Get A Competitive Advantage

Who is using your product? Where are they located? Use Shodan to perform empirical market intelligence.

A self-described security "amateur" discovered hundreds of Internet-connected devices ranging from cameras to industrial control systems that were connected to the Internet without even basic password protection -- meaning they could be easily turned on and off or otherwise manipulated with a single click of a mouse.

"You would be amazed [what] you could find," Espen Sandli, a journalist at the Norwegian newspaper Dagbladet, told the Computer Assisted Reporting conference Thursday. "The project was made from people who had no idea about data security at the start."





They began by searching for basic security cameras, such as finding and taking control of a surveillance camera inside a nightclub. After that, they graduated to finding compromised control systems at military installations and railroads. In one case, they found a security company's list of clients and passwords in the clear online. In another, they could have accessed who was allowed to enter or leave a military building. Another device on the open Internet could have allowed them to switch off a railway fire-alarm system.

Sandli and a colleague used the publicly available Shodan search engine, which allows searching by factors such as IP address range, device type, operating system and geography. After getting results, they used investigative reporting skills to track down device owners, including some painstaking tasks such as using Google Earth data to try to match outdoor webcams with their owners.



He said the Dagbladet team didn't do their own port scanning (instead relying on Shodan's) and never attempted to enter passwords, even when it was likely that devices were simply using defaults. Those ground rules were part of the project's ethics baseline, he said. But after just a few hours, it became clear he wouldn't need to try basic password cracking because there were so many Internet-connected devices where no passwords were needed.




(Buy/Rent/Layaway)




The NullCtrl project team also always contacted owners of affected devices before publishing a story about one, ensuring they had time to secure or remove them.







The Dagbladet journalists consulted with lawyers in Norway to make sure the NullCtrl project wasn't breaking any laws there. 



Wireless Camera Finder
(Buy/Rent/Layaway)



In a discussion after Sandli's presentation, one American investigative journalist said doing a similar project could be illegal in the U.S. if anyone crosses the threshold from looking at Shodan search results to clicking through and attempting to control a device, even one as harmless as moving a webcam to see a different view.







In Norway, the standard is that there was no malicious action taken. Advice to journalists or would-be white hat security hackers trying to undertake a similar project in the U.S.: Get your own legal advice first.





Sandli said it is his understanding that government security agencies in the U.S. have their own means of searching for unsecured critical infrastructure devices on the Internet and informing their owners of the need to beef up protection. 


(Buy/Rent/Layaway)




The Norwegian national security agency did not. But after NullCtrl, Dagbladet said, the agency made their own Shodan and started conducting proactive searches too.




Your questions and comments are greatly appreciated.



Monty Henry, Owner














www.DPL-Surveillance-Equipment.com










































NOW, look in on your home, second home, lake house or office anytime, anywhere from any internet connected PC/Lap-top or Internet active cell phone, including iphone or PDA.

Watch your child's caregiver while sitting at a traffic light or lunch meeting, or check on your business security from the other side of the world. Our built-in hidden video features all digital transmissions providing a crystal clear image with zero interference. With the IP receiver stream your video over the internet through your router, and view on either a PC or smart phone. Designed exclusively for DPL-Surveillance-Equipment, these IP hidden wireless cameras come with multiple features to make the user's experience hassle-free.

NOW, look in on your home, second home, lake house or office anytime, anywhere from any internet connected PC/Lap-top or Internet active cell phone, including iphone or PDA: http://www.dpl-surveillance-equipment.com/wireless_hidden_cameras.html

Watch your child's caregiver while sitting at a traffic light or lunch meeting, or check on your business security from the other side of the world. Our built-in hidden video features all digital transmissions providing a crystal clear image with zero interference. With the IP receiver stream your video over the internet through your router, and view on either a PC or smart phone. Designed exclusively for DPL-Surveillance-Equipment, these IP hidden wireless cameras come with multiple features to make the user's experience hassle-free.

• Remote Video Access

• Video is Recorded Locally To An Installed SD Card (2GB SD Card included)

• Email Notifications (Motion Alerts, Camera Failure, IP Address Change, SD Card Full)

• Live Monitoring, Recording And Event Playback Via Internet

• Back-up SD Storage Up To 32GB (SD Not Included)

• Digital Wireless Transmission (No Camera Interference)

• View LIVE On Your SmartPhone!

Includes:

* Nanny Cameras w/ Remote View
* Wireless IP Receiver
* Remote Control
* A/C Adaptor
* 2GB SD Card
* USB Receiver



FACT SHEET:  HIDDEN NANNY-SPY (VIEW VIA THE INTERNET) CAMERAS

Specifications:

Receiver Specs:

* Transmission Range of 500 ft Line Of Sight
* Uses 53 Channels Resulting In No Interference
* 12V Power Consumption
* RCA Output
* Supports up to 32gig SD

Camera Specs:

* 640x480 / 320x240 up to 30fps
* Image Sensor: 1/4" Micron Sensor
* Resolution: 720x480 Pixels
* S/N Ratio: 45 db
* Sensitivity: 11.5V/lux-s @ 550nm
* Video System: NTSC
* White Balance: Auto Tracking

Make Your Own Nanny Cameras:  Make Tons Of Money In A Booming, Nearly Recession-Proof Industry!


Your Primary Customers Include But Are Not Limited To Anyone In The Private Investigator, Government, Law Enforcement And/Or Intelligence Agencies Fields!

* You Buy Our DVR Boards And We'll Build Your Products! (Optional)

















Our New Layaway Plan Adds Convenience For Online Shoppers










DPL-Surveillance-Equipment's layaway plan makes it easy for you to buy the products and services that you want by paying for them through manageable monthly payments that you set. Our intuitive calculator allows you to break down your order's purchase price into smaller payment amounts. Payments can be automatically deducted from your bank account or made in cash using MoneyGram® ExpressPayment® Services and you will receive your order once it's paid in full. Use it to plan and budget for holiday purchases, anniversaries, birthdays, vacations and more!


DPL-Surveillance-Equipment's Customers can now use the convenience of layaway online to help them get through these tough economic times.

We all shop now and then just to face a hard reality -- big credit card bills. However, our latest financing innovation can help you avoid that. Find out why more and more shoppers are checking out DPL-Surveillance-Equipment's e-layaway plan.

If you're drooling over a new nanny camera, longing for a GPS tracker, or wishing for that spy watch, but you're strapped for cash and can't afford to do credit, do what Jennie Kheen did. She bought her iPod docking station (hidden camera w/motion-activated DVR) online using our convenient lay-away plan.

Our online layaway plan works like the old-fashioned service stores used to offer. But, in Kheen's case, she went to DPL-Surveillance-Equipment.com, found the iPod docking station (hidden camera w/motion-activated DVR), then set up a payment plan.

"It's automatically drawn from my account," she said. "I have a budget, $208.00 a month.

In three months, Kheen had paid off the $650.00 iPod docking station. She paid another 3.9 percent service fee, which amounted to about $25.35 (plus $12.00 for shipping) for a total of $687.35.

"You pay a little bit each month," Kheen said. "It's paid off when you get it and you don't have it lingering over your head. It's great."

Flexible payment terms and automated payments make our layaway plan an affordable and fiscally responsible alternative to credit cards.

1. Register:

It's quick, easy and FREE! No credit check required!

2. Shop:

Select the items or service you want and choose "e-layaway" as your payment option. Our payment calculator makes it easy for you to set up your payment terms.

3. Make Payments:

Payments are made on the schedule YOU set. Check your order status or adjust your payments online in a secure environment.

4. Receive Products:

Receive the product shortly after your last payment. The best part, it's paid in full... NO DEBT.

More Buying Power:

* Our lay-away plan offers a safe and affordable payment alternative without tying up your credit or subjecting the purchase to high-interest credit card fees.

No Credit Checks or Special Qualifications:

* Anyone 18 years old or older can join. All you need is an active bank account.

Freedom From Credit Cards:

* If you are near or beyond your credit limit or simply want to avoid high interest credit card fees, our e-layaway is the smart choice for you.

Flexible Payment Schedules:

* Similar to traditional layaway, e-layaway lets you make regular payments towards merchandise, with delivery upon payment in full. Payments are automatically deducted from your bank account or made in cash using MoneyGram® ExpressPayment®

A Tool for Planning Ahead:

* Our e-layaway makes it easy for smart shoppers like you to plan ahead and buy items such as bug detectors, nanny cameras, audio bugs, gps trackers, and more!

No Hidden Charges or Mounting Interest:

Our e-layaway makes shopping painless by eliminating hidden charges and monthly interest fees. Our customers pay a flat transaction fee on the initial purchase price.

NO RISK:

* You have the right to cancel any purchase and will receive a refund less a cancellation fee. See website for details.

Security and Identity Protection:

DPL-Surveillance-Equipment has partnered with trusted experts like McAfee and IDology to ensure the security and integrity of every transaction. Identity verification measures are integrated into our e-layaway system to prevent fraudulent purchases.

Note: Simply Choose e-Lay-Away as a "Payment Option" in The Shopping Cart



DPL-Surveillance-Equipment.com is a world leader in providing surveillance and security products and services to Government, Law Enforcement, Private Investigators, small and large companies worldwide. We have one of the largest varieties of state-of-the-art surveillance and counter-surveillance equipment including Personal Protection and Bug Detection Products.



Buy, rent or lease the same state-of-the-art surveillance and security equipment Detectives, PI's, the CIA and FBI use. Take back control!



DPL-Surveillance-Equipment.com

Phone: (1888) 344-3742 Toll Free USA
Local: (818) 344-3742
Fax (775) 249-9320

Monty@DPL-Surveillance-Equipment.com


Google+ and Gmail
DPLSURVE


Twitter
DPLSURVE


MSN
 Monty@DPL-Surveillance-Equipment.com

AOL Instant Messenger
DPLSURVE32

Skype
Montyl32

Yahoo Instant Messenger
Montyi32

Alternate Email Address
montyi32@yahoo.com

Join my Yahoo Group!

My RSS Feed



Bookmark and Share