Monday, May 5, 2014

Audio recording laws in the United States

With so much great technology on the market these days, it is easier to record conversations than ever before – either over a land line, on a mobile phone or even in-person with a hidden recording device. Recorded conversations (either tape or digital) are often very helpful in a variety of scenarios. These audio recordings may assist in an investigation of employee misconduct or in business or personal lawsuits, even in potential criminal investigations.
It is very important, however, to make sure that any recording, either of a phone conversation or an in-person conversation, complies with federal and state laws.  Otherwise, you may very well open yourself up to criminal charges or civil suits.  And it is unlikely that you will be legally able to use the recording for your original purpose.
So, if you’re thinking about recording some phone calls or placing a voice-activated recorder in a room to record conversations, you’ll need to take a look at the applicable laws.  The first place to look is at the federal wiretapping statute – also known as the Electronic Communications Privacy Act.  Federal law allows phone calls (traditional, cellular and cordless) and other electronic communication to be recorded with the consent of at least one party to the conversation.
This means that if you are one of the people taking part in the conversation, it can be recorded (because one person – you – has consented to the recording).  If you are not taking part in the conversation, at least one of the people in the conversation must know about and consent to the recording.
You can’t stop, however, after considering federal law and assume that your recording passes muster.  Each state and territory has its own statutes regarding the recording of conversations.  Most state wiretapping and eavesdropping laws are based upon the federal law and allow recording with the consent of one party to the conversation.
The 37 states which allow “one party consent” recording of oral communications are: Alaska, Arkansas, Colorado, Georgia, Hawaii, Idaho, Indiana, Iowa, Kansas, Kentucky, Louisiana, Maine, Michigan, Minnesota, Mississippi, Missouri, Nebraska, Nevada, New Jersey, New Mexico, New York, North Carolina, North Dakota, Ohio, Oklahoma, Oregon, Rhode Island, South Carolina, South Dakota, Tennessee, Texas, Utah, Vermont, Virginia, West Virginia, Wisconsin and Wyoming.  The District of Columbia also allows people to record conversations with the consent of only one party.  Nevada has a one party consent statute but there is some question as to how the law should be interpreted by the courts – it could be considered an “all party consent” state.
The 12 states which definitely require all parties to a conversation to consent before it can be recorded are: California, Connecticut, Delaware, Florida, Illinois, Maryland, Massachusetts, Montana, New Hampshire, Pennsylvania and Washington.  (In California, there is an exception – you can record a conversation with the consent of only one party if certain criminal activity (kidnapping, extortion, bribery or a violent felony) is involved.)

So, the basic rule is that it is illegal to record conversations or communications in which you are not a participant, unless you have consent of at least one, if not all, of the participants.  The obvious exception to this general rule is that law enforcement officials can seek permission from a court to perform no-consent wiretaps as part of a criminal investigation.  For the finer points of your own state’s laws and requirements, you should always consult with an attorney.

Friday, May 2, 2014

How to detect if there is a hidden voice recorder

If you suspect that someone is spying on you, you might want to know how to detect spy devices. There are tools you can use, which are essentially high-frequency scanners, that will tell you when someone is watching you or listening in on your conversations. These tools can be used to detect cameras, cell phones or microphones.


1. Choose your radio frequency (RF) scanner. There are a number of scanners available that will detect both audio and video transmissions of both wired and wireless devices. These devices come in various sizes and strengths. Some of them will fit on a key chain while the more professional ones will fit in the palm of your hand. As of 2009, these devices range in price from $50 to $700, depending on your needs.  
2.Scan your office or home using a spy detection device. These are very easy to use. You simply wave it around the area that you wish to scan and when it detects a signal-transmitting device on a high frequency, such as those emitted by a cellular phone or peeping camera, an LED will light up and there will be a beeping sound that will become more rapid as the signal gets stronger.

3.Adjust the device to your preference. Some scanners can detect both digital and analog signals and will detect signals from 1-6 GHZ, which is typically the frequency people use to communicate. Some scanners can be set to vibrate mode so that you do not alert those who are listening that they are being scanned. This way you can provide misinformation if you want.

Tuesday, April 22, 2014

Reasons why I need a GPS Tracker

It's always been difficult to know when to invest in a new piece of technology. Undoubtedly, in gsm gps trackeryears long past, farmers fretted over whether they could afford a McCormick reaper, or whether it really was time to buy a car and see what the livery's giving for a used horse.
Of course, this has only accelerated in recent years. These days, you can't go six months without someone telling you about some new future technology that's suddenly here after all. This is great if you like high tech, but the market reality is that this rapid innovation also leaves many husks of failed products in its wake.
So, if your transportation  is looking for new ways to save money on your fleet, it's understandable if you were reticent to add more gadgets to them as a solution. However, fleet tracking is a technology that is here to stay.
GSM GPS Tracker Technologies Are Stable
GSM GPS Tracker Systems combine two long-established technologies into a single solution that gives you unparalleled oversight of your fleet. At heart, all they do is take the GPS satellite navigation data for your vehicle, and relay it to you through the standard GSM cell phone network. The tracker itself is long-lived, unobtrusive, and inexpensive, and everything else is handled by the mapping software back in the office.
As far as longevity goes, this is nearly as rock-solid as it gets. The GPS system required putting satellites into orbit, and is used in nearly every country on Earth. It's not going anywhere. Similarly, the GSM bands aren't leaving any time soon, given how ubiquitous cell phone use has become. Even if the voice market shifted to something with more bandwidth, GSM would continue to be perfect for industrial applications.
In short, this is a technology your vehicles should be able to rely on for years, if not decades, to come.
Five Solid Reasons To Invest In GSM GPS Tracker Systems
These fleet tracking technologies can solve a number of different issues within a fleet operation. Here are a few of the scenarios where GSM GPS trackers make sense:
  1. Maintenance issues with your vehicles tend to rear their head unexpectedly, making for costly additions to your budget. A GPS tracker includes sensors for a number of vehicle functions, allowing the system to track the performance of each vehicle over time. Subtle clues such as an increase in fuel use can tip you off before a small problem becomes a big one.
  2. If you're having trouble with getting complete data sets to submit, whether for GPS vehicle fleet trackingreimbursement or government bureaucracy, GPS vehicle fleet tracking gives you all the data you need. Besides having precise numbers, it enables the creation of detailed reports covering numerous aspects of your vehicles.
  3. Those simply looking to save money can also harness the data being tracked. You'll get a detailed view of your fuel and maintenance costs. By examining them, you'll be able to put together more detailed recommendations for driver procedures, based on hard data gathered in the field.
  4. Performance reviews also become far easier, as you'll now truly know what your drivers are doing in the field. Those who regularly break speed limits or internal policies can be flagged, and those with exemplary driving can be praised or rewarded for it. It takes the guess work out of performance reviews by giving you and your drivers the data you need to improve.
  5. Cargo can also be tracked.  Add on RFID readers and you can track exactly where and when your cargo was loaded and unloaded.
Adding GSM GPS tracker systems to your fleet is an idea that has certainly come into its time. It's a solid piece of technology that will continue to be in use well into the foreseeable future, based on technologies that already have decades behind them.
Contact us if you have any further questions about GSM GPS tracker units!

Friday, April 11, 2014

How Do I Know If My Cell Phone Has Been Bugged

How do you find out if your cell phone is tapped? Well, someone who is wondering why the battery life on that newly purchased cell phone is shorter than expected or suspecting that weird sound the phone makes has something to do with privacy meaning their cell phone being tapped, they have hit the nail on the head!
Unless that person is involved in a crime, breach of trust, unpleasant activities or feeling some discomfort, there is nothing to worry about but to stay cool and get going.
Of course, no one really wants their cell phone to be tapped so here is some more information on how you can tell if your cell phone is tapped and what exactly you can do about it.

What to Look for When Suspicious

Although it is illegal to tap someone’s cell phone without their consent, the advent of high-tech has shown those culprits who are looking into intruding personal space of an unsuspecting victim in order to steal that critical information or call records, various sophisticated ways to do it without leaving a trace. Following is a list of signs to look for, that might indicate that the cell phone security has been compromised:
  • The cell phone battery feels warmer than usual room temperature when not in use
  • The cell phone goes on or off without operating it, unless the battery is too low
  • Static noise heard with regular intervals, clicking or other background sounds
  • The cell phone needs frequent charging which is unusual when the device is new
  • The switch off time long enough to make someone frustrated is another sign, unless the phone is experiencing hardware glitches
  • Screen distortion
  • Strange numbers on the display or monthly statement

Victims of Cell Phone Tapping

The chances are high that a well-mannered person’s cell phone is clean and free from malicious stuffs but one need to be highly vigilant when it comes to protecting privacy as there are many reasons to believe why it was invaded in the first place. Some of the potential suspects to make note of are:
  • Spouse of dubious nature
  • A nosy boss
  • A random prankster
  • Marketing spammers
  • Investigating departments
It is most likely that the person whose cell phone gets tapped is either unaware of any signs of phone tapping or just leading a busy life.

Techniques to Tap a Cell Phone

A broad knowledge in the abuse of hi-tech gadgets is as important to one as the fancy usage of them. Taking that into mind, though it is not recommended, calls and other details from a cell phone can be tapped using various techniques as explained below:
  1. The Multi-track system, an external device manufactured and distributed by some surveillance product companies or Spy data extractor similar to USB drive can be used to read the data from the Cell Phone into the computer which then reveals all the messages and numbers that has been deleted from the phone and in some cases, recorded conversations.
  2. Another option is to purchase a call recorder card that can be filled in with minutes during purchase and the phone number to be tapped is entered according to the instructions given, while all the calls that are received by the phone being tapped are forwarded to a switch provided by the company which are retrieved later.
  3. Certain softwares like FlexiSpy and RecordiaPro installed into the cell phone, makes the conversation available in real time or records it for later usage by accessing the relevant system. Other software that are coupled with GPS features make it possible for someone to track down the exact location of the device at a fingertip.
  4. Online surveillance providers let the user track the phone by entering the number in their website thus pin-pointing the geographic position of the device.

How to Protect a Cell Phone from Being Tapped

Just like every problem has a solution and every virus has an anti-virus, a tapped cell phone has an easy way out of all the mess if one knows how to dot all the i’s and cross all the t’s. Here are a few:
  • Reporting the intrusion to anti-crime squads or private investigating agencies will save a lot of time and energy spent in figuring out the possibility.
  • Taking a chance by asking the suspect directly is another way to get through it.
  • Service providers normally are equipped with all the required technology to find out the breach and provide them to customers upon request. The providers can then completely wipe out the bugs and restore the device manufacturer settings.
  • Having a password enabled lock system or taking the battery out when not in use is recommended too.
  • Phones and devices that are less sophisticated and less experimented with are a better option if one is really concerned about the security issues because the software for such devices are either outdated or hard to find making it hard for the intruder to break through it precisely.
  • Leaving the cell phone around to bask in the sun or warm-up at the gym or listen to the rest of the speech will make it easier for the culprit to get a hand on it. Hence it is always good to be on the safe side than to repent later.
Last but not least, only authorized Government agents are allowed to tap a cell phone. For the rest of the population doing such a thing is highly illegal which in fact could land them in jail.
Many cell phone tapping crimes happening each and every day some of which go unnoticed and untraced, adversely affect the life of both personal users and large scale businesses. While most monetary losses can be compensated with proper backup or insurance, the ones that are irreplaceable, like trust, are lost forever.

Monday, March 31, 2014

How A GPS Tracker Works

GPS tracking devices can be used to track people, vehicles and other assets, anywhere on Earth. Currently, there are 27 satellites orbiting the earth, 24 are operational, the other three will become operational if one of the satellites happen to fail. At any given time there are at least three satellites that are visible in the sky from a location. These satellites then triangulate on the position of the GPS tracking device. By continuing to triangulate the coordinates at regular intervals, the satellites can determine the speed of an object, the distance traveled and how long it has been stationary.
There are two main types of GPS tracking systems currently on the market today. They are classified as Passive and Active/Live (real-time) Tracking
KJB Security's passive GPS tracking devices include the I Trail historical tracker.
US Fleet Tracking's active GPS tracking systems include the PT-X5 real-time GPS tracker and the OBD-X5 tracker.
Not all GPS tracking devices are created equal. When considering the purchase of a GPS tracking unit, comparisons should be made based on accuracy, sensitivity, frequency of sampling points, power sources, reliability, and the software that translates the data into an understandable, easy-to-use format.

GPS Tracking Accuracy

All Us Fleet Tracking GPS tracking devices, whether they are active or passive, provide locations that are accurate within 2.5 meters (or roughly 7 feet).

GPS Tracking Sensitivity

Since GPS Tracking for many users is covert in nature, the tracking device needs to be manufactured in a way that maximizes GPS reception. Most traditional GPS devices need a clear view of the sky and will lose GPS reception if placed in some concealed positions. The Us Fleet Tracking line of GPS tracking devices have been designed with that concern in mind. They are sensitive enough that they can be hidden in covert locations while retaining and maintaing good reception.

GPS Tracking Frequency of Sampling Points

The KJB Security passive I Trail GPS Tracking device capture and store GPS signals including time, position, and speed once every second. Competing products capture data once every five (5) to ten (10) seconds per sampling. The second-by-second data represents a better flow of information that can be used to generate greater and more detailed reports.

GPS Tracking Power Sources

Since the majority of GPS tracking customers prefer portability from their units, it is critical for the devices to be able to manage power efficiently. All of Us Fleet Tracking's devices provide a minimum of 20 hours of wheels in motion tracking. Internal sensors put the device into sleep mode when the vehicle is not in motion, which helps in extending battery life. Users of the device can expect to receive days or even weeks of tracking ability. Results will vary based on the number of hours in motion per day.

GPS Tracking Reliability

All Us Fleet Tracking products go through extensive pre-development research and testing to ensure that our customers are purchasing products that are at the forefront of GPS tracking technology. These strict requirements have helped in establishing Us Fleet Tracking as an industry leader, making our GPS tracking solutions the systems of choice, regardless of customer type.

GPS Tracking Software

Us Fleet Tracking's vehicle tracking software offers three ways to view and evaluate tracking data in a user-friendly package that will appeal to both novices and advanced computer users.
  • Digital street map: Gives a historical, moment-by-moment replay. Shows when and where the vehicle traveled. Screen shows animated tools, including speedometer, clock with second hand and compass.
  • Google Earth satellite map: Accurately displays the driving path and stops on a satellite image.
  • Text activity report: Gives a daily summary, divides driving activity into segments with detailed descriptions including starting address, departure time, time en route, arrival time, miles traveled and how long the vehicle stayed at each location.
The significance of second by second data is critical in providing a comprehensive, fluid replay of any and all historical tracking data. Any device providing less than second by second recording falls short of these expectations. As an example, Kjb Security Product's Passive GPS Tracking devices are able to record 3,600 positions per driving hour whereas competing devices recording every 5 seconds, which only provides 720 positions per driving hour.

Tuesday, March 25, 2014

How to find a good Private Investigator

A good private investigator is essential for a number of jobs, and there are several qualities that a professional should have.

Need For A Good Private Investigator

Private detectives are often used by lawyers, and they can research material that is used in a criminal defense case. Police departments have teams of detectives, but a defense lawyer needs a way to research a case on their own.
Detectives are also useful in a divorce and come in handy in a number of specialized situations. Finding an exceptional detective is made easy when shoppers rely on some of the following attributes that should be found in a good private investigator.

Powers of Observation and Concentration

Detectives often have to follow people and need to pay attention to their activities. For this reason, it is essential to find a professional who is astute and catches on very quickly.
This trait is essential and will help investigators find out more about the person or subject that they are investigating. Investigators often have to look past the obvious in order to find the missing link. This is essential when it comes to finding reclusive people.

Communication and Listening Skills

Investigators need to be able to listen closely to their clients, and they must communicate their findings. Searching for a detective that has these attributes will make it easy to retain the right professional.
There are plenty of times when these skills come in handy. Most detectives get paid a good hourly rate, and communication that is short and effective is the key to finding a great investigator at an economical price.

Ability to Keep Secrets

Lots of detectives work in secretive areas, and they may find out a number of disturbing or illegal things about the people who they watch. Privacy is crucial for most people, and clients should be sure that their detective has the discretion to keep everything to themselves.
Most detectives usually operate according to the code of silence, but it is imperative to make sure of this. Communicating this issue from the onset will assist in the selection process.
Imagine if your detective tells your wife you paid him to follow her. This could lead to a disaster, and this is why it is imperative to find a detective who can keep a secret.

Master of Technology

There are plenty of innovations in technology that can be used by investigators to make their jobs more efficient.
Finding a detective that has and knows how to use GPS systems is essential. Chips can now be left on cars, and they will transmit detailed reports as to the vehicle’s whereabouts. This makes it easy to follow anyone and see where they go.
Technology can also be used to perform skip tracing and find missing people. This is the same type of software that is used by professional collection agents. It can provide names and addresses and often tracks people down through third parties. This is the most economical way to find anyone who has dropped off the grid.
Surveillance cameras are another essential component of the job. The latest recording devices can do audio and video, and they are easy to hide in any location. Their data can be downloaded to a computer, and the entire system is incredibly sneaky. This is a great way to track anyone through their entire days.

Organization and Analytical Skills

Often, investigators use their analytical powers to help them break open hard to crack cases.
For instance, cheating spouses usually work hard to disguise their activities. They may buy another cell phone, and they keep their private conversations to this line. They sneak around and meet in out of the way places, and they work hard not to be seen.
Detectives need to be able to see through the smoke and mirrors and track people using their intuition.

Finding an Exceptionally Good Private Investigator
There are many detectives that have some or a combination of these traits. They are often effective at many jobs, but there are times when a person really needs the best.
Detectives should be able to integrate all of the above qualities, and it is ideal when they have a good team to work with. This makes it easy for them to track multiple people at the same time and finish any job quickly.
Divorces, legal proceedings and other issues often cause people to need to learn more about a person. Trusting a good private investigator is the best way for anyone to track someone down or find out some secrets.
Most people have secrets, but a good private investigator can find them out. There are several qualities that the consummate professional should have, and intelligence and analytical ability are two traits that come in handy.

Wednesday, March 19, 2014

How a Bug Detector Works

How a Bug Detector Works

Bug detectors are RF (radio frequency) finders. Bug detectors will respond to any wireless device within its range.  This make searching for a bug difficult but not impossible.

Lets first look at what rangesBug detector will cover. Many detectors cover from 50MHz - 6.0GHz. This covers the normal frequencies that wireless devices use.
50 MHZ (megahertz) is the low end of the scale this is where you will find most voice transmitters. As you move up the scale to the GHZ (gigahertz) you get into the wireless camera frequencies.
MHz and GHz are just frequency denominators IE: 1000 MHZ is equal to 1 GHZ so a 2.4 GIG camera can also be considered to be a 2400 MHZ and a 5.8 GHZ can be a 5800 MHZ.
This is not to be confused with say a 10 meter radio that runs around 29.0 (lower than the range) or 27.0 (cb radio).

Between 50 and 6000 MHz are where most spy devices are located. The federal government uses between 406- 420 MHZ ( approx).

The process for locating bugs is simple but time consuming. You need to be aware of all the wireless devices you possess. This can include but is not limited to,
Baby monitors 900 - 1200 MHZ (many others)
Wireless Routers 802.11 -(close to 2.4 GHZ)
Cordless phones 5.8-6 GHZ
Some Cell Phones (approx) 900MHz
Wireless Keyboards and Mice
Wireless speakers
There are many other wireless devices that can set off a bug detector so everything that you know to be wireless needs to be turned off, so you can avoid false signals. Other things to keep in mind are that your neighbours may have wireless devices such as routers and cordless phones.

So to start the process turn off everything that you know is wireless. The simple conclusion here is that what ever else you find is a bug or a wireless camera but that is not always true. You need to take interference into account. There is RF everywhere and our bug detectors are sensitive enough to pick it up. RF is generated by microwaves TVs high power lines ans so on.  Di you ever walk under a high power line , like the big towers that run through the US. The feeling you get is RF so much rf that you can feel it. An experiment we used to do is hold a florescet bulb under the power line and it will light up. The RF activates the gas in the tube causing light.

How do you know if you find a bug? Well if you cant use the sensitivity setting on a detector to tune out the alarm . Then you start looking for devices. Bug detectors will not just light up and point to the bug, it is a process. If you get a reading from a solid wall go to the other side of that wall and make sure that ther are no other wireless devices in the area r that the house or apartment next door does not have a wireless router.

Remember that who ever put the bug is had to have access for a certain amount of time, you must take into account wether they had time to open a wall and then repair it so well that you cant tell. Look for more obvious places like in or around cluttered areas or under furniture. that is a much more likely location.