Spy Gadgets, Spy Equipment, Spy Gear and Software
Spy gadgets, spy equipment, spy gear are all headings that make you think of James Bond and other similar movies, where the heroes are always equipped with exotic equipment for tracking and dealing with their foes. In fact one wonders how successful our heroes would have been without these devices. Some of these so called devices (which only a few years ago seemed far fetched) are now available to all, at fairly low prices. For example, tracking moving vehicles via the GPS satellite system, can now be carried out in around 200 countries throughout the world.
When choosing any form of spy gadget you must take into account the laws of the country you are going to use them in. In many cases there use could be prohibited by law. However, many law abiding people still use spy gadgets, even if it does mean breaking the law - this is often after having tried other legal means to protect themselves, their loved ones and their property without success.
It is up to you to determine any laws that are applicable to the use of spy gadgets in your particular country or area.
Many of us are also being spied on daily, without even knowing it: at work, in places we visit, even on our computers. Are spy gadgets or spy software watching you now, perhaps even while you are reading this article on your computer? Many people and companies now protect themselves by using anti spy devices and software.Typical Spy Gadgets
See also our pages on
Covert Telephone Recording
This type of spy gadget can be used with a voice activated or an ordinary tape recorder to capture and save both sides of important telephone conversations. You can have accurate recordings of all your personal and business dealings, to protect yourself and or your business from deceptive talk by others. When used with voice activated recorders, these units can be used without the knowledge of those speaking on the phone. Simply connect one end into the phone jack and the other end into your recorder.
Other telephone recording devices are more covert, namely:
The 'series' transmitters which take there power from the phone line, so no additional batteries or power supplies are required. These devices are only active when the phone is in use and have a transmitting range of between 100 and 500 feet.
The 'parallel' transmitters which require external power, normally by a battery. These units are constantly on and therefore need the battery to be changed at regular periods, they are also therefore easier to detect. Transmitting range is between 200 to 1000 feet.
A typical eavesdropper device is like a hearing aid with a difference. The ear mounted amplifier allows you to secretly listen to conversations up to 80 feet away via an earphone. Conversations and other sounds are picked up by the units microphone, amplified and then sent to the earphone. These inexpensive spy gadgets can be used for fun (listening to office gossip etc.), or more serious applications.
Digital Voice Pen Recorders
Record up to two and a half hours of meetings, quotes and details, whether its a phone conversation, a business discussion or a conference. You can review all recordings at your leisure or download the recorded files to your PC. These small pens are battery powered and are fitted with omni-directional microphones.
One manufacturers pen has a built in laser for highlighting charts and maps during business meetings.
Telephone Voice Changers
These devices have a number of pitch level adjustments which enables a mans voice to sound like a womans and a woman to sound like a man. Simple to install by plugging into the handset and the base of the phone.
Rearview Spy Glasses
These glasses allow you to see what is happening behind you, through the use of a mirrored strip on the outside edge of each lens. These strips do not show through the darkened lenses. Have been used in competitive sports to determine where fellow competitors are.
This device can be fired from a carbon-dioxide powered dart gun, in an area which is inaccessible to the eavesdropper. The dart will embed itself into a wall or tree and then transmit all nearby sounds to a radio receiver up to 300 feet away.
The Infinity Transmitter
So called, because there are no range restrictions, the eavesdropper can be anywhere in the world where he has phone access.
These spy gadgets are becoming the most commonly used and most feared eavesdropping device, due both to, the large numbers that have been sold and the devices overall performance. The infinity transmitter transforms any telephone into a sensitive bug. The devices can be hidden directly inside the telephone or anywhere in the premises along the telephone line. The device may use the actual telephone microphone or a highly sensitive external microphone which is hidden or disguised. They can pick up even whispered conversations in a room via your telephone (without your telephone even ringing), and will transmit all speech and sounds down the telephone line to the eavesdropper - with the handset still remaining on the hook. The eavesdroppers can safely carry this out from anywhere in the world. All they have to do is simply dial your number and use an electroinc means to prevent your phone from ringing - they can then listen to all happenings in the room. Any incoming callers trying to reach the activated bugged phone will receive the normal 'line is busy' signal.
NOTE: Infinity transmitters will not monitor phone conversations on the bugged phone as you are already using the line to monitor the room.
The infinity transmitters are activated by one or more tones, as generated by touch tone telephones. The eavesdropper dials his victims telephone number and quickly enters the activation code before the telephone begins ringing, leaving the victim totally unaware of the devices activation. Some older units often fail to trigger the unit before the first ring leaving the eavesdropper having to tell the victim he has the 'wrong number'. When the victim hangs up the phone the infinity transmitter is automatically activated. Some transmitters can be triggered by the introduction of an external voltage into the telephone line, thereby overcoming the possible ringing problem.
Infinity transmitters will not work on most electronic and computer based systems as used in most businesses today.
Other commonly found spy gadgets and bugging devices include: wall plug transmitters, multi socket plug board transmitters, concealed wall outlet transmitters, concealed lamp transmitters, radio transmitters, TV transmitters, wristwatch transmitters and modular jack telephone transmitters.
Anti Spy, Counter Spy Equipment
Why is counter surveillance equipment needed?
Bugging devices, telephone taps, body-wires, room transmitters, wireless microphones, infinity devices and other spy gadgets are all easily purchased on the open market for relatively low prices. Industrial espionage is growing at an unprecedented rate. Suspicious husbands and wives are using hidden cameras and microphones to see and hear what is really happening while they are away. Business people are watching and listening to employees in a number of highly sensitive areas. They in turn are being monitored and recorded by unauthorised personnel for their own ends or the ends of competitors. With todays technology an illegal microphone or audio transmitting bug can be hidden almost anywhere.
Some companies are saying that 'if you have any confidential information that could in any way, be of interest or profitable to other parties, you can be fairly certain that someone is at least monitoring your telephone conversations'.
Miniature eavesdropping devices can be hidden in innocent looking every day items that are transmitting every word and whisper of your most confidential discussions to receivers placed some considerable distance away. The receiver may perhaps be hidden in a car boot, which in turn may be connected to a voice activated recorder, all your telephone conversations from beginning to end are recorded.
Companies have admitted to selling many, many thousands of these and other spy gadgets, in fact growing competition has driven the prices of the various spy gadgets down to very low levels.
To date legislation has done very little to actually reduce the number of spy gadgets getting into the hands of crooked individuals, who employ them for a variety of illegitimate motives.
This threat will not disappear, it will and is growing and will become even more intrusive in the future.
The eavesdropper can be anyone - his invasion of your privacy can cause untold damage to you, your family, your home and your business
YOU must protect your own privacy
no one is going to do it for you
In these and many other situations counter-surveillance equipment which will detect all types of spy gadget and bugging devices, with pinpoint accuracy is necessary.
Many bug detectors weigh only a few ounces and will fit in a pocket.
Could someone be LISTENING IN or WATCHING YOU NOW?
Some counter surveillance, bug detectors will only detect certain types of bugs, operating on particular frequencies and missing the others all together. Bug detectors should be chosen that will detect:
- Series and parallel transmitters
- Bumper beepers
- Concealed transmitters - all types
- GPS vehicle tracking devices
- Body transmitters
- Computer and fax eavesdropping transmitters
- Transmitting spy cameras
- Infinity devices of all types
All detection should be carried out without the eavesdropper becoming aware.
To be effective, detectors should cover transmitting frequency ranges of 1MHz to 5GHz, as todays eavesdroppers are increasing the frequencies of their bugs to make them undetectable to many of the detectors currently being used.
Legal wire/phone taps (government bodies), are installed in such a way that no variation in line voltage is detectable, which makes them appear normal and undetectable.
Points to Note
Do people tell you that they have frequently tried to reach you, but have found your line engaged for considerable periods of time, in fact times when you know the phone was not in use. This could be an indication that an infinity device is installed on your system.
If you suspect that your building or phone is tapped, DO NOT contact companies that scan for bugs from that phone or suspect rooms, phone from outside the area. You don't want to alert the eavesdroppers, who may come and remove the bugs before checking is carried out and will probably reinstall subsequent to the negative search.
It is cheaper to replace home phones that may be bugged, rather than having them checked out.
Cellular phones are relatively easy to monitor and should never be used for discussing confidential matters.
Additional information and hundreds more tips on how to protect your family, are now available in
our new book
'How to Protect your Family and Belongings Now'
Back to home page