POPULARITY
James Bruni is the Managing director at GBGIDology, an industry leader in identity verification, AML/KYC compliance, and fraud management solutions that help businesses establish trust, drive revenue, and deter fraud. He oversees IDology's growth and innovation throughout the Americas while ensuring strategic alignment with global teams and enabling customers to seamlessly and securely verify identities […] The post James Bruni With GBG Idology appeared first on Business RadioX ®.
When I think about the hottest areas in fintech these days identity verification is right at the top of the list. It impacts anyone doing business online so whether you are a bank or a fintech you need to stay on top of this fast-moving space.My next guest on the Fintech One on One podcast is Joel Sequeira, the Director of Product Management at IDology. Joel is an identity expert with a long history in the space and he talks about the new attack vectors that are in play today, particularly with Generative AI, and more importantly, what fintechs and banks can do to curtail fraud today.In this podcast you will learn:What Joel does exactly at IDology.The challenges for fintechs and banks in automating customer onboarding.How to incorporate automation and AI into your strategy.The role of human-supervised AI and how to maintain compliance.What he means by onboarding with inclusive customer journeys.How they define advanced identity verification.The different data sources that IDology works with.Why it is important to have deep data in different sectors.Some of the differences between KYC and KYB (Know Your Business).Examples of how Generative AI is being used to commit fraud.The trends that Joel is paying closest attention to.How fintechs and banks can future-proof their identity verification.Connect with Joel on LinkedInConnect with IDology on LinkedInConnect with Fintech One-on-One:Tweet me @PeterRentonConnect with me on LinkedInFind previous Fintech One-on-One episodes
When I think about the hottest areas in fintech these days identity verification is right at the top of the list. It impacts anyone doing business online so whether you are a bank or a fintech you need to stay on top of this fast-moving space.My next guest on the Fintech One on One podcast is Joel Sequeira, the Director of Product Management at IDology. Joel is an identity expert with a long history in the space and he talks about the new attack vectors that are in play today, particularly with Generative AI, and more importantly, what fintechs and banks can do to curtail fraud today.In this podcast you will learn:What Joel does exactly at IDology.The challenges for fintechs and banks in automating customer onboarding.How to incorporate automation and AI into your strategy.The role of human-supervised AI and how to maintain compliance.What he means by onboarding with inclusive customer journeys.How they define advanced identity verification.The different data sources that IDology works with.Why it is important to have deep data in different sectors.Some of the differences between KYC and KYB (Know Your Business).Examples of how Generative AI is being used to commit fraud.The trends that Joel is paying closest attention to.How fintechs and banks can future-proof their identity verification.Connect with Joel on LinkedInConnect with IDology on LinkedInConnect with Fintech One-on-One: Tweet me @PeterRenton Connect with me on LinkedIn Find previous Fintech One-on-One episodes
IDology's Crystal Blythe discusses in the BAI Banking Strategies podcast that the real-time fraud fight lies solidly with building out an information-sharing consortium across collaborators and competitors.
IDology is a podcast about industrial design-related topics. You can learn the dos and don'ts of product development and how to minimize risk when working with an industrial design company. In episode #21 of IDology, Voytek met with Piotr and Mikołaj to talk about the vital roles of prototyping and simulations in the industrial design process, their differences, and their specific features. Piotr Dalewski, a mechanical design engineer at Mindsailors, places emphasis on manufacturability, design for assembly, and product optimization within the value engineering approach throughout the R&D process. Mikołaj Wiewióra is a senior industrial designer at Mindsailors. He has extensive experience leading teams of designers and engineers at all stages of the design process. Voytek Holysz is the COO of Mindsailors, with 16 years of experience in running a business in creative B2B services, marketing, sales, and video production. Visit our website: https://mindsailors.com/ This episode is also available in written form: https://mindsailors.com/idology-21-industrial-design-prototyping-vs-simulations
IDology is a podcast about industrial design-related topics. You can learn the dos and don'ts of product development and how to minimize risk when working with an industrial design company. In episode #20 of IDology, Voytek sat down with Anita and Mikołaj to discuss the historical evolution of the relationship between design and manufacturing, from individual craftsmanship to the era of mass production and the democratization of design with Computer-Aided Design (CAD) software. Anita Rogoża is an experienced researcher & designer at Mindsailors. Her priority is on making functional designs that are both user and environment friendly. Mikołaj Wiewióra is a senior industrial designer at Mindsailors. He has extensive experience in leading teams of designers and engineers on all stages of the design process. Voytek Holysz is the COO of Mindsailors, with 16 years of experience in running a business in creative B2B services, marketing, sales and video production. Visit our website: https://mindsailors.com/ This episode is also available in written form: https://mindsailors.com/idology-20-how-manufacturing-and-design-co-exist
IDology is a podcast about industrial design-related topics. You can learn the dos and don'ts of product development and how to minimize risk when working with an industrial design company. In episode #19 of IDology, Voytek Holysz discusses with Piotr Dalewski and Rafał Piłat the evolution and critical importance of technical documentation in product development. They explore its role as a universal language among designers, manufacturers, and quality control, emphasizing its significance in ensuring product quality, meeting manufacturing standards, and avoiding costly errors in the production process. Piotr Dalewski, a mechanical design engineer at Mindsailors, places emphasis on manufacturability, design for assembly, and product optimization within the value engineering approach throughout the R&D process. Rafal Piłat is an entrepreneur and co-founder of Mindsailors, an awarded industrial design company, with over 18 years of experience as a designer himself. Voytek Holysz is the COO of Mindsailors, with 16 years of experience in running a business in creative B2B services, marketing, sales, and video production. Visit our website: https://mindsailors.com/ This episode is also available in written form: https://mindsailors.com/idology-19-technical-documentation-in-industrial-design
IDology is a podcast about industrial design-related topics. You can learn the dos and don'ts of product development and how to minimize risk when working with an industrial design company. In episode #18, Voytek met with Thomas Weber to explore the various attitudes and approaches companies in different industries have towards industrial design, ranging from those heavily investing in design to enhance brand image to those skeptical or unaware of its benefits. They discuss the challenges and misunderstandings businesses face when integrating design into their products and the impact of design on brand perception and product functionality. Thomas Weber is a seasoned business development manager, leveraging his extensive background in industrial design to drive business growth and adeptly guide new customers. Voytek Holysz is the COO of Mindsailors, with 16 years of experience in running a business in creative B2B services, marketing, sales, and video production. Visit our website: https://mindsailors.com/ This episode is also available in written form: https://mindsailors.com/idology-18-industrial-machinery-design-pain-points
IDology is a podcast about industrial design-related topics. You can learn the dos and don'ts of product development and how to minimize risk when working with an industrial design company. In episode #17, Voytek met with Rafał Piłat and Jakub Zarzyński to discuss the accessibility and influence of AI in product design, emphasizing the ethical use of AI-generated content and its potential to enhance creativity and efficiency in the design process. The conversation also addresses legal and ethical considerations surrounding AI tools. Jakub Zarzyński is a versatile computational designer specializing in integrating various design fields to find innovative solutions, with a focus on utilizing new technologies and collaborating intensively with diverse software. Rafal Piłat is an entrepreneur and co-founder of Mindsailors, an awarded industrial design company, with over 18 years of experience as a designer himself. Voytek Holysz is the COO of Mindsailors, with 16 years of experience in running a business in creative B2B services, marketing, sales, and video production. Visit our website: https://mindsailors.com/ This episode is also available in written form: https://mindsailors.com/idology-17-risks-of-using-generative-ai-in-product-design
IDology is a podcast about industrial design-related topics. You can learn the dos and don'ts of product development and how to minimize risk when working with an industrial design company. In episode #16, Voytek and Mikołaj explain the concept of failure in product design, emphasizing its role as a crucial learning tool. They discuss how embracing failure as a part of the design process can lead to innovation and growth, contrasting this approach with traditional, negative views of failure. Mikołaj Wiewióra is a senior industrial designer at Mindsailors. He has extensive experience leading teams of designers and engineers at all stages of the design process. Voytek Holysz is the COO of Mindsailors, with 16 years of experience in running a business in creative B2B services, marketing, sales, and video production. Visit our website: https://mindsailors.com/ This episode is also available in written form: https://bit.ly/3vqI5uO
IDology is a podcast about industrial design-related topics. You can learn the dos and don'ts of product development and how to minimize risk when working with an industrial design company. In episode #15, Voytek, along with Anita Rogoża and Rafał Piłat, discuss utilizing AI tools like ChatGPT and Midjourney for inspiration and research in product design, especially in the pre-design phase. They highlight AI's role in speeding up the design process, such as generating creative concepts and enhancing 3D renders, while acknowledging its limitations in producing final, detailed designs. Anita Rogoża is an experienced researcher and designer at Mindsailors. Her priority is to make functional designs that are both user- and environment-friendly. Rafal Piłat is an entrepreneur and co-founder of Mindsailors, an awarded industrial design company, with over 18 years of experience as a designer himself. Voytek Holysz is the COO of Mindsailors, with 16 years of experience in running a business in creative B2B services, marketing, sales, and video production. Visit our website: https://mindsailors.com/ This episode is also available in written form: https://bit.ly/3HdE4wi
IDology is a podcast about industrial design-related topics. You can learn the dos and don'ts of product development and how to minimize risk when working with an industrial design company. In episode #14, Voytek Holysz, Mikołaj Wiewióra, and Rafał Piłat discuss the critical importance of educating both sides—clients and the design team—in the product development process. They emphasize effective communication and setting clear expectations as key to ensuring mutual understanding and successful project outcomes. Mikołaj Wiewióra is a senior industrial designer at Mindsailors. He has extensive experience leading teams of designers and engineers at all stages of the design process. Rafal Piłat is an entrepreneur and co-founder of Mindsailors, an awarded industrial design company, with over 18 years of experience as a designer himself. Voytek Hołysz is the COO of Mindsailors, with 16 years of experience in running a business in creative B2B services, marketing, sales, and video production. Visit our website: https://mindsailors.com/ This episode is also available in written form: https://bit.ly/4aPQmsn
IDology is a podcast about industrial design related topics. You can learn the dos and don'ts of product development and how to minimize risk when working with an industrial design company. In episode #13 of IDology, Voytek met with Piotr and Rafał to discuss the limitations and realities of using generative AI in industrial design. The conversation uncovers how AI, despite its advancements, cannot fully replace the creativity and problem-solving capabilities essential to design while also indicating when to limit your AI usage. Piotr Dalewski, a mechanical design engineer at Mindsailors, places emphasis on manufacturability, design for assembly, and product optimization within the value engineering approach throughout the R&D process. Rafal Piłat is an entrepreneur and co-founder of Mindsailors, an awarded industrial design company, with over 18 years of experience as a designer himself. Voytek Holysz is the COO of Mindsailors, with 16 years of experience in running a business in creative B2B services, marketing, sales, and video production. Visit our website: https://mindsailors.com/ This episode is also available in written form: https://bit.ly/4aQoMv2
In episode 83, I speak to Heidi Hunter, Chief Product Officer at IDology, about how their platform helps businesses to create frictionless and secure eCommerce customer experiences. We discuss how the platform provides many features including dynamic Knowledge-based Authentication, Transaction Monitoring, document authentication, biometric verification and many others to streamline checkout processes, increase conversions and prevent fraud. We also discuss the challenges and opportunities of digital identity verification in the eCommerce industry, and how IDology adapts to changing regulations and customer expectations.VIDEO and PDF Transcript: - click here https://thepaymentsshow.substack.com/p/83 Summary of topics discussed:(01:02) - IDology Overview: Identity Verification and Fraud Management(02:29) - Statistics on Business Fraud and Data Breaches(03:32) - Exploring the Sophistication of Fraud Attacks(04:51) - The Role of Technology in Fraud Prevention(05:17) - Impact of COVID-19 on Digitization and Fraud(06:15) - The Importance of Data Collection in Fraud Prevention(06:59) - Challenges in Asserting Ownership of Data(08:58) - The Importance of a Smooth Onboarding Process(11:18) - Synthetic Identity Fraud(12:40) - Data Depth vs Richness(15:04) - Differentiating Factors of Ideology's Solutions(17:35) - eDNA: Data Collection Across Industries & Markets(18:49) - Money Moves: Find It Faster(21:27) - Layering Data: Data Breaches & The Dark Web(22:53) - Industry Consortium Fraud Network & Cross Border Verification(30:08) - Fraud Trends: Surge in Fraudulent Domains(32:44) - The Investment Fraudsters Make in Synthetic Identity Profiles(33:23) - The Surge in Voice Over IPs(33:52) - Efficiency of Fraudulent Submissions(34:10) - Regulation and Legislation Around Money Transfers(34:48) - The Challenge of Differentiating Fraudulent P2P Transfers(36:44) - Predictions & The Future(37:19) - Business Verification Is Increasingly Important(38:26) - The Impact of OpenAI on Fraud(41:45) - Know Your Business (KYB) Verification(49:09) - Get in Touch with IDologyDetails:- Recorded on 15 Nov 2023- Host: Satwant Phull- Guest: Heidi Hunter, Chief Product Officer, IDology[Next Steps]- Get in touch with Satwant: digitalmoneylab.com - IDology: idology.com | @idology
In episode #12 Anita and Voytek discuss some of the industries most mixed up phrases and definitions. As design, R&D and product development spread across industries and around the world, many definitions began changing. This led to problems in communication, as people with different industry backgrounds often have in mind different definitions of the same specific word or phrase.
In episode #11 Voytek Hołysz tries Rafał Piłat to spill as much as possible about common mistakes companies make when developing a new product. Rafał is an entrepreneur and co-founder of Mindsailors, an awarded industrial design company, with over 15 years of experience as a designer himself. Voytek is the COO of Mindsailors, with 15 years of experience in running a business in creative B2B services, marketing, sales and video production.
In episode #10 Anita and Mikołaj try to tackle the subject of responsibility in design and to what extent a designer might, or should feel responsible for a product's impact on the environment. Anita Rogoża is a researcher & designer at Mindsailors. Her priority is on making functional designs that are both user and environment friendly. Mikołaj Wiewióra is a senior designer at Mindsailors. He has extensive experience in leading teams of designers and engineers on all stages of the design process.
In episode #9 Voytek and Mikołaj discuss the famous TRL scale. A scale developed by NASA to deascribe a Technology's Readiness Level. This scale has been widely adapted in product development, even though it is not about products itself.
In episode #8 Voytek and Anita literally discuss the dos and don'ts of product development. They go through the entire product design process and point out best practices to consider and most common mistakes to avoid. Anita Rogoża is a researcher & designer at Mindsailors. Her priority is on making functional designs that are both user and environment friendly. Wojciech Hołysz is the COO of Mindsailors, with 15 years of experience in running a business in creative B2B services, marketing, sales and video production.
In episode #7 Rafał and Anita discuss different methods they use when they are part of a research and development process. Anita Rogoża is a researcher & designer at Mindsailors. Her priority is on making functional designs that are both user and environment friendly. Rafał Piłat is an entrepreneur and co-founder of Mindsailors, an awarded industrial design company, with over 15 years of experience as a designer himself.
In this episode Voytek Hołysz talks to Mikołaj Wiewióra, our senior designer, about how budgets for product development are structured. About how time and materials are allocated, what's the headcount on various product development stages and what decisions might make you burn your money.
In this episode Anita Rogoża, who is a designer and researcher at our company, sat down with senior designer Mikołaj Wiewióra, to talk about the Mindsailors' industrial design process, how it helps Mindsailors develop new products, communicate with our clients how it helps describe both time and budgeting for each phase of product development.
In this episode Voytek Hołysz speaks with Rafał Piłat, ar senior designer and the co-founder of Mindsailors, on how a company or an individual should prepare to outsourcing product development or R&D, and what one may expect from a 3rd party in regards to developing your product.
Rackspace reacts to ransomware. Third-party incidents in New Zealand and the Netherlands. Russian intelligence goes phishing. Mustang Panda uses Russia's war as phishbait. A Malicious package is found in PyPi. Kevin Magee from Microsoft Canada shares thoughts on cybersecurity startups in an economic downturn. Our guest is IDology's Christina Luttrell to discuss how consumers feel about digital identity, fraud, security and data privacy. And a French-speaking investment scam. For links to all of today's stories check out our CyberWire daily news briefing: https://thecyberwire.com/newsletters/daily-briefing/11/233 Selected reading. Rackspace Technology Hosted Exchange Environment Update (Rackspace Technology) Multiple government departments in New Zealand affected by ransomware attack on IT provider (The Record by Recorded Future) Antwerp's city services down after hackers attack digital partner (BleepingComputer) Russian hacking group spoofed Microsoft login page of US military supplier: report (The Record by Recorded Future) Mustang Panda Uses the Russian-Ukrainian War to Attack Europe and Asia Pacific Targets (BlackBerry) Inside the Face-Off Between Russia and a Small Internet Access Firm (New York Times) Apiiro's AI engine detected a software supply chain attack in PyPI (Apiiro | Cloud-Native Application Security) Anatomizing CryptosLabs: a scam syndicate targeting French-speaking Europe for years (Group-IB)
In this episode Voytek Hołysz speaks with Mikołaj Wiewióra, our senior designer, on what it is like to work for different industries as a designer and what is the most important aspect to keep in mind if you want to be a good fit for every project you find yourself in.
By end of this year, fraud is projected to cost U.S. businesses roughly $2.5 Billion, with some research suggesting that figure could rise as high as $5 Billion by 2025. There's no doubt that every business is vulnerable to fraud, due largely to the numerous ways in which scammers can attack your organization. So how do you prevent the unthinkable from occurring? A proper plan in place can assist you, and your company in effectively reducing the likelihood of fraud and minimizing losses. In this information prevention discussion, we're joined by Tom Algie, IDology's National Sales Manager for Consumer Finance, and Rich and Tom delving into the necessary fraud topics like: - What is ID verification authentication and fraud mitigation - First-party Fraud vs. Synthetic Fraud - How to identify a Synthetic Identity - Most common gaps in fraud mitigation process within financial services today - Correlations between fraud tools and loan increases available, and much more! About IDology IDology, a GBG company, delivers some of the industry's most innovative multi-layered identity verification solutions to help businesses drive revenue, deter fraud and maintain compliance. IDology's ExpectID® platform leverages thousands of diverse data sources to deliver the most accurate customer locate results, actionable transparency, and on-demand control over the identity-proofing process. With frictionless, secure digital identity verification, IDology empowers businesses to onboard more legitimate customers quickly and confidently. Under their parent company, GBG, IDology and Acuant recently united to form GBG Americas, the largest pure-play identity verification and fraud prevention provider in the Americas. About Tom Algie Tom Algie is National Sales Manager for Consumer Finance at IDology. As an 18-year veteran of fintech, his experience includes consulting and management roles in lending software, data processing, and payments processing industries. Tom actively participates in multiple industry trade associations, including Online Lenders Alliance, INFiN, American Financial Services Association, and National Automotive Finance Association. Be sure to follow Tom and our host Rich on LinkedIn, and for the latest GDS Link updates and news, follow us on Twitter and LinkedIn. You can subscribe to the Lending Link on Apple Podcasts, Spotify, Google Play, or wherever you prefer to listen to your podcasts! From the Episode: Fifth Annual Consumer Digital Identity Study: https://www.idology.com/5th-Annual-Consumer-Digital-Identity-Study/
In this episode Anita Rogoża, who is a designer and researcher at our company, sat down with senior designer Mikołaj Wiewióra, to discuss the importance of prototyping in the product development process. They discussed different types of prototypes, why they are important on what stages of the industrial design process and how you can save many in new product development by prototyping wisely.
In the premiere episode of IDology - the industrial design podcast by Mindsailors, our company's COO, Voytek Holysz, sat down with the co-founder of industrial design company Mindsailors and senior designer himself, Rafal Pilat, to talk about how you can get the best designs from an industrial design company like Mindsailors themselves. They talked about how to prepare a good brief document for an industrial design company, what mind traps to avoid when planning new product development and how to approach communicating what you know and don't know to your industrial design company partner. Watch on YouTube! https://bit.ly/IDology-yt
Tinggalkan komentar dan berikan pendapatmu: https://open.firstory.me/user/cl6vxh37u06o401z629mi3ftl/commentsyo yo yoooooooooooooooooo, G30s, Idology, Komunal, Kapital, Karl Marx, Pancasila, Bhinaka Tunggal Ika Powered by Firstory Hosting
Everyone in banking knows about KYC – Know Your Customer. Less well-known is its close cousin, Know Your Business. Heidi Hunter, chief product officer at IDology, joins us to talk about the role of KYB for banking institutions and how they can do it more effectively.
Trust in banking hinges on the ability of financial institutions to safeguard identities and keep consumer and business data private, particularly during online account opening and onboarding. Unfortunately, traditional Know Your Customer (KYC) and Know Your Business (KYB) verifications is often synonymous with tedious and manual processes, friction, and onboarding delays. The longer these processes take, the greater the negative impact to client acquisition. My guest on the Banking Transformed podcast is Chris Luttrell, the CEO of IDology. She discusses what can be done to foster trust across the entire customer journey, while improving the customer experience for consumers and businesses. This episode of Banking Transformed Solutions is sponsored by IDology ExpectID® Business is an automated KYB solution that is imperative for any business that wants to remain competitive. With ExpectID® Business, IDology has combined KYB and KYC due diligence with multiple layers of risk detection and fraud intelligence into one powerful, programmatic solution. The solution goes beyond KYB and KYC verification to provide a holistic perspective of the risk associated with both the business and the primary user. For more information visit https://www.idology.com/business-verification/
This recording is from Fintech Nexus USA (formerly known as LendIt Fintech USA) held at the Javits Center in New York City on May 25-26, 2022. It is from the track: Consumer Lending: BNPL, Cards and Personal Loans - Sponsored by FICO and is titled: Doing More with Less to Build Trust and Deter Fraud While Protecting Privacy.Speaking at this session are Dennis Maicon, IDology, Eric Levine, Berbix, Dr. Catherine Havasi, Basis Technology, with Moderator: Satish Lalchand, Deloitte.
Banking customers want fast, they want safe and they want both available to them digitally. Heidi Hunter, VP of product innovations at IDology, joins us to talk about digital identity verification and how it can help banks and credit unions deliver speed and security.
In a digital world where convenience, time savings and instant access reign supreme, a physical-first banking experience is no longer the preferred option for most consumers. But how can you verify the identity of someone wanting to do business with you? Banks should not have to make compromises between security and a seamless customer experience along their digital journey — but this requires the right identity strategy that reflects today's risks and the needs of the modern digital consumer. I am excited to have Heidi Hunter, VP, Product Innovations at IDology on the show today. Heidi will discuss how knowing who your customer is, across channels and at all times, can be a differentiator for success. This episode of Banking Transformed is sponsored by IDology IDology is the trusted leader in digital identity verification and offers the industry's most innovative suite of multi-layered solutions to streamline customer acquisition, deter fraud, and drive revenue. Since 2003, IDology has provided easy to implement identity solutions that are flexible and customizable. Their ExpectID® platform gives you the confidence to locate, verify, and approve more legitimate customers faster with nominal to no friction. For more information visit idology.com
Ever wonder what the journey may look like from small-town farm to big-time fintech? Well, I have the answer in this week's podcast! IDology CEO Chris Luttrell is my guest, and her story is a fascinating one.For starters, when she's not spending time overseeing one of the most credible fraud-prevention solutions in the industry, she's raising livestock and food on her small farm in northwest Georgia – not far from where she grew up. She began paving her climb up the corporate ladder straight out of high school and went to night school for her undergraduate degree. And this semester, she will graduate with her second Bachelor's degree in Business Administration – and not because she had to – because she wanted to.For those of you thinking “overachiever,” you would be right! And this innate drive has served her well throughout her journey in the fintech industry.For those of you who may not know, IDology is a well-established identity verification provider within the industry that offers a robust solution for identity verification and fraud prevention, which allows customers to meet KYC compliance while mitigating fraud and risk simultaneously.Originally hired on as their 10th employee and the sole product manager for the company, Chris has quite literally worked her way through every department, including product, fraud, marketing, security, technology and client relations until completing her climb in her well-deserved position as CEO beginning in 2020.According to her, it's been a “fun roller coaster ride” and she looks forward to ensuring the success of our industry in the future with solutions that help prevent some of the more popular types of fraud that come with the digital age, including mobile fraud, synthetic verification fraud and the like.
Live from Money2020: FindBiometrics' Doug OGorden speaks with Christina Luttrell, CEO of IDology. Luttrell tells us what makes IDology stand apart in the incredibly active identity verification and anti-fraud landscape, delving into the unique predictive aspects of her company's technology and underlining the importance of transparency and privacy when it comes to authentication and identification. To learn more about the topics discussed in this podcast, please visit https://www.idology.com/
Joel is joined by IDology's VP of Product Innovations, Heidi Hunter, and National Sales Manager, Tom Algie, to discuss how fraud has evolved from simple identity fraud, new trends like synthetic ID and credit washing, and simple steps we can all take to protect ourselves from it all. ConsumerFi is presented by Nortridge Software: Loan Software That Accelerates Change.And special thanks to The National Automotive Finance Association: The only trade association exclusively serving the nonprime auto finance industry.
When was the last time you visited a physical bank branch and talked to a real live human about your account? It's probably been a while — and that’s the point. The fintech world is becoming more digitized all the time. Eventually, there won’t even be brick-and-mortar banks. That’s all well and good. But, as we innovate the future of banking, we need to consider how to fight fraud online. Unlike in-person banking, digital banking doesn’t allow for a teller to verify someone’s ID with his own two eyes. In reality, it's not as scary as it sounds. Depending on how you think about it, there are more ways to detect fraud online than in person. You can track IP addresses, phone numbers, emails — and you can verify them all instantly. One hold up to fully digital banking (and transactions in general) remains: Your social security number. Those little paper cards with that long-form number have been used for ages as our unique identifiers. But really, SSNs have been breached so many times that they’re not an ideal universal identity option anymore. So, what’s next? In our latest podcast episode, host J Cornelius and guest Heidi Hunter reveal the future of identity verification for fintech companies and users alike. You’ll Also Learn: The importance of detecting fraud while providing a friction-free user experience. A three-tiered approach to innovation for customer-facing fintech companies. Hint: It involves sales, support, and biz collaboration. What tokenized IDs mean for the UX of transactions. About Heidi Hunter Heidi Hunter is the Vice President of Product Innovations at IDology. In her nine plus years with the company, she’s steadily (and impressively) moved up the ranks.IDology is a leader in digital identity verification and authentication, and Heidi is a trusted expert on and innovator of ID and fraud prevention solutions. Additionally, Heidi has a proven track record in client consulting, strategic partner management, and data science. She has also developed SaaS and deployed several successful, intricate client applications. See acast.com/privacy for privacy and opt-out information.
So folks full blown Socialism/Communism also known as the Karl Marx "Marxim" mindset or idelogy now seems to be the new thought of the left, and the law of the land. Freedom of speech is becoming harder to have as the days go by, freedom of religion, expression, thought, and right to who politically you want to vote for are all being stripped away by the evil left, and the right are not doing a damn thing about it like sheep being lead to their own slaughter. Tonights show will be a cheerful one from what you can tell. Sit back folks as Kate takes you to another ride down the rabbit hole. Better be ready..... To listen live remember check out first! www.publicstreamingnetwork.com www.youtube.com/c/psntvlive www.twitch.tv/psntvlive www.dlive.tv/PSNTV www.twitter.com/PSNBroadcast Share this podcast pages... Also check out Angels Patreon page over at www.patreon.com/angelespino
IDology Chief Operating Officer Christina Luttrell joins State of Identity to discuss the ongoing impact of COVID-19 on the customer experience across industries, how fraudsters targets have changed, and the technologies helping to friction low without increasing risk.
Connect with Fintech One-on-One: Tweet me @PeterRenton Connect with me on LinkedIn Find previous Fintech One-on-One episodes
Identity verification has been around for decades, ever since the advent of the driver’s license and social security cards. But in the digital age where anyone has the ability to conduct financial transactions remotely it has become more challenging. And with all the data breaches that have been happening today companies are less secure in […] The post Podcast 207: John Dancu of IDology appeared first on Lend Academy.
School is in session for the DJs as Kevin and Killa learn more about the world of K-Pop with a K-Pop columnist from IDOLOGY. Before that, we educate ourselves by learning about the world '멍청비용'
School is in session for the DJs as Kevin and Killa learn more about the world of K-Pop with a K-Pop columnist from IDOLOGY. Before that, let's talk about our earliest childhood memories. We also diverge and talk about the theory of 'past lives.'
School is in session for the DJs as Kevin and Killa learn more about the world of K-Pop with a K-Pop columnist from IDOLOGY. Before that, let's wake up with some talk about 'digital dementia.'
School is in session for the DJs as Kevin and Killa learn more about the world of K-Pop with a K-Pop columnist from IDOLOGY. Before that, let's freshen up with some talk about spring cleaning.
Our first episode of Double K Class with our expert teacher MANO from K-Pop web magazine IDOLOGY. Tune in and become experts right along with us! Double K class is in session!
The Solutions and Effects of Fraud on Lenders, Banks & Fintechs David Morgan, PerformLine Dennis Maicon, IDology Greg Coté, Accelitas Wayne Unger, One World Identity Husayn Kassai, OnFido Moderator: Jodi Pratt, Jodi Pratt and Associates
Click Here Or On Above Image To Reach Our ExpertsDPL Surveillance Equipment Supplies Hi-Tech Tools To GhostbustersDPL Surveillance Equipment sales and rents equipment such as thermal imaging cameras, wireless audio recording systems and electromagnetic field detectors to this fast-growing industry.Lots of things can thwart a home sale—ugly décor, a bad location or an unrealistic price. But some homeowners and real-estate agents cite another reason: ghosts.For help, there's a cottage industry of people who advertise themselves as psychics, ghostbusters and paranormal investigators. Some charge hundreds of dollars to visit “haunted” properties—either in person, or via astral travel—and “clear” them of unwanted spirits. Other wanna-be ghostbusters will comb homes with cheap low-tech gear to suss out paranormal activity.Plumbing, electrical, psychological or medication problems are the most common culprits, said Mr. Hawes, 44, a plumber in Warwick, R.I., who is the founder the Atlantic Paranormal Society, or TAPS.Jane Phillips, a paranormal investigator and self-described clearer in Santa Fe, N.M., markets her services to real-estate agents because “it's easier to get them to pay for something if it gets their houses sold.” Ms. Phillips, 65, was a mortgage banker for 30 years in Minneapolis, before moving to New Mexico in 2008, she said. Since then she has worked on hundreds of homes, mostly locally, charging about $350 to $400.Jobs require her to remove “energetic things,” that can include ghosts but can also be portals—energetic holes connected to planets—as well as what she calls dark energies, which are “energies from other dimensions,” she said. The work mostly occurs “in my imagination—but my imagination is real,” said Ms. Phillips.PRO-DTECH II FREQUENCY DETECTOR(Buy/Rent/Layaway)Suzanne Taylor, the broker/owner of Taylor Properties in Santa Fe, hired Ms. Phillips for six of her home listings, paying between $500 and $750 for services. She recently brought her in on a house listed for about $300,000 in Santa Fe. Ms. Phillips came into the house carrying “dowsing rods,” crooked rods that are traditionally used as divination tools for finding buried treasure or water.“She holds them and walks around the house and the rods move on their own,” said Ms. Taylor. At the end of the process, Ms. Phillips said she created a “white blanket of light” in her mind to “lift out any stray energies.”Shortly thereafter, “I got an offer and closed it,” Ms. Taylor said.CELLPHONE DETECTOR (PROFESSIONAL)(Buy/Rent/Layaway)Nicole Sassaman, a designer and home-décor retailer in Los Angeles, has seen her share of weird things in 20 years of flipping houses. But nothing prepared her for the strange occurrences at the fixer-upper she was renovating years ago in the Hollywood Hills neighborhood.PRO-DTECH III FREQUENCY DETECTOR(Buy/Rent/Layaway)“Doors would swing open. A box of plumbing supplies would move from one corner to the other when we weren't looking. The floors warped for no reason. The house got broken into,” said Ms. Sassaman, 45.PRO-DTECH III FREQUENCY DETECTOR(Buy/Rent/Layaway)About six months into the renovation, a neighbor dropped a bombshell: The former owner had died in the bathroom, Ms. Sassaman said. She paid a clearer $500 to rid the home of “spirits and negative energy.” The process, involving crystals, bells and murmured prayers, was weird but effective, Ms. Sassaman said. The problems stopped and the property sold quickly for its asking price of $995,000, nearly twice what she'd paid for it.Not everyone in the ghostbusting business automatically assumes that low-pitched hum coming from the basement is a ghost.“Eighty percent of the time, it isn't something paranormal at all,” said Jason Hawes, the star of “Ghost Hunters,” a reality show on the Syfy channel that started in 2004 and is currently in its last season.PRO-DTECH III FREQUENCY DETECTOR(Buy/Rent/Layaway)Joe Nickell, senior research fellow at the Center for Inquiry, an Amherst, N.Y.-based think tank focused on science and secularism, has investigated hundreds of claims of paranormal activity over the past 40 years.“I have never found evidence of an actual haunting,” said Mr. Nickell, 71. “Ghosts must be believed to be seen.”Laws addressing seller disclosures of “psychologically impacting factors” in properties vary widely from state to state, said Val Werness of LegalResearch.com in Minneapolis, which issued a report on disclosures for the National Association of Realtors last year. Only two states, Minnesota and Massachusetts, have laws that even mention reports of paranormal activity, and only to say they need not be disclosed, said Ms. Werness.WIRELESS/WIRED HIDDENCAMERA FINDER III(Buy/Rent/Layaway)Three other states, California, South Dakota and Alaska, have laws that require some form of disclosure of deaths on a property, even if the buyer doesn't ask about it. (Ms. Sassaman, who sold her house 15 years ago, said her agent told her disclosure wasn't required in the particular case of her house.)PRO-DTECH IV FREQUENCY DETECTOR(Buy/Rent/Layaway)Some people are content to live amid the spirits. In New Orleans, Keith Teachout, who owns an 1830s Greek Revival bed-and-breakfast in the French Quarter, said he spied a ghost in June.Mr. Teachout said he was carrying a load of laundry up to his private suite of rooms when he saw a man with a slim build, in his late 50s or early 60s, perched on a settee in the living room. The man looked as real as anyone on the street, Mr. Teachout said, except that he was dressed in a 1940s-style overcoat and fedora. After a few moments, the man disappeared.“I assumed he was a ghost,” said Mr. Teachout, 55.Wireless Camera Finder(Buy/Rent/Layaway)About a week later, by coincidence, a police officer stopped by the home and explained that his great-aunt had lived there in her youth. Mr. Teachout said he invited the aunt, now 99 years old, to lunch and learned that her husband had died of a heart attack, wearing his overcoat and fedora, in the very room where Mr. Teachout had spied the ghost.MAGNETIC, ELECTRIC, RADIO ANDMICROWAVE DETECTOR(Buy/Rent/Layaway)Mr. Teachout had met Cari Roy, a well-known psychic medium in New Orleans, at a party, so he called her up and asked her to come and see if she perceived the ghost. Ms. Roy said she has worked on ghost issues in over a hundred houses, hotels, restaurants and bars. For site visits, she typically charges $200 an hour, though she didn't charge Mr. Teachout, he said.Ms. Roy said she sensed the ghost and his reason for hovering: He wanted to protect his widow, she said. Ms. Roy and Mr. Teachout decided not to try to interfere. Ms. Roy considers ghosts part of New Orleans history, she said.COUNTERSURVEILLANCE PROBE / MONITOR(Buy/Rent/Layaway)“Who am I to throw out a ghost who has been here for hundreds of years?” she said.For those reluctant to hire a professional ghostbuster, there is a do-it-yourself solution. Last year, Yvonne Arias, owner of Los Angeles brokerage Property Lab, accompanied a client to a walk-through a few days before closing on a $600,000 house. The house was in poor condition—“there was a bad smell, all the windows were caulked shut,” said Ms. Arias. But even that didn't account for the “creepy, bad energy” both she and the seller perceived, Ms. Arias said.PRO-DTECH FREQUENCY DETECTOR(Buy/Rent/Layaway)The buyer handed Ms. Arias a bundle of sage, which they lighted on fire and toted from room to room. Burning sage to dispel spirits is traditional in several cultures, including some American Indian tribes. A few days later, the property closed as planned, Ms. Arias said.RF SIGNAL DETECTOR ( FREQUENCY COUNTER)(Buy/Rent/Layaway)Your questions and comments are greatly appreciated.Monty Henry, Owner (function () { var articleId = fyre.conv.load.makeArticleId(null); fyre.conv.load({}, [{ el: 'livefyre-comments', network: "livefyre.com", siteId: "345939", articleId: articleId, signed: false, collectionMeta: { articleId: articleId, url: fyre.conv.load.makeCollectionUrl(), } }], function() {}); }()); Additional Resources: * Prevention and Detection of Electronic Harassment and Surveillance* Electrical Hyper-Sensitivity: The-Truth!!* How Do I Know If I've Been Bugged? * Targeted Individuals* Operating The Brain By Remote Control* What is BitCoin and How Does It Work?* The Creature From Jekyll Island: This Blog And Video Playlist Explains Why The U.S. Financial System is Corrupt and How It Came To Be That Way* Number of Americans Renouncing Citizenship Surges To Escape Oppressive Tax Rules* Dropping Off The Grid: A Growing Movement In America: Part I* Online Privacy Tools and Tips www.DPL-Surveillance-Equipment.com (function() { var po = document.createElement('script'); po.type = 'text/javascript'; po.async = true; po.src = 'https://apis.google.com/js/plusone.js'; var s = document.getElementsByTagName('script')[0]; s.parentNode.insertBefore(po, s); })();
Click Here Or On Above Image To Reach Our ExpertsTerms of Service; Didn't Read (Browser Plug-in). Reviews T.O.S.We are a user rights initiative to rate and label website terms and privacy policies, from very good Class A to very bad Class E.Terms of service are often too long to read, but it's important to understand what's in them. Your rights online depend on them. We hope that our ratings can help you get informed about your rights.Do not hesitate to click on a service below, to have more details! You can also get the ratings directly in your browser by installing our web browser add-on:PRO-DTECH II FREQUENCY DETECTOR(Buy/Rent/Layaway)“Terms of Service; Didn't Read” (short: ToS;DR) is a young project started in June 2012 to help fix the “biggest lie on the web”: almost no one really reads the terms of service we agree to all the time.Background. The rough idea behind ToS;DR emerged during the 2011 Chaos Communication Camp near Berlin, with people fromUnhosted a movement to create web apps that give users control over their valuable user data and privacy.CELLPHONE DETECTOR (PROFESSIONAL)(Buy/Rent/Layaway)Since June 2012, Hugo Roy (@hugoroyd) has taken the lead for the project, and started the legal analysis. Ultimately, all the work is transparent and the discussions happen in public. Our work is funded by non-profits organizations and individual donations and gets released as free software and open data.PRO-DTECH III FREQUENCY DETECTOR(Buy/Rent/Layaway)Please bear in mind that the project is still in the early phase and that most data is subject to important changes. More information about our classification.PRO-DTECH III FREQUENCY DETECTOR(Buy/Rent/Layaway)What does “ToS;DR” mean? the name is inspired by internet acronym TL;DR which stands for "Too Long; Didn't Read" and is often used on blogs and emails when a block of text is just really long and that people are too lazy to read the whole stuff.It was intended more as a code name than as a real name. But it seems that people like it (do you?)PRO-DTECH III FREQUENCY DETECTOR(Buy/Rent/Layaway)WIRELESS/WIRED HIDDENCAMERA FINDER III(Buy/Rent/Layaway)PRO-DTECH IV FREQUENCY DETECTOR(Buy/Rent/Layaway)Wireless Camera Finder(Buy/Rent/Layaway)MAGNETIC, ELECTRIC, RADIO ANDMICROWAVE DETECTOR(Buy/Rent/Layaway)COUNTERSURVEILLANCE PROBE / MONITOR(Buy/Rent/Layaway)PRO-DTECH FREQUENCY DETECTOR(Buy/Rent/Layaway)RF SIGNAL DETECTOR ( FREQUENCY COUNTER)(Buy/Rent/Layaway)Your questions and comments are greatly appreciated.Monty Henry, Owner (function () { var articleId = fyre.conv.load.makeArticleId(null); fyre.conv.load({}, [{ el: 'livefyre-comments', network: "livefyre.com", siteId: "345939", articleId: articleId, signed: false, collectionMeta: { articleId: articleId, url: fyre.conv.load.makeCollectionUrl(), } }], function() {}); }()); Additional Resources: * Prevention and Detection of Electronic Harassment and Surveillance* Electrical Hyper-Sensitivity: The-Truth!!* How Do I Know If I've Been Bugged? * Targeted Individuals* Operating The Brain By Remote Control* What is BitCoin and How Does It Work?* The Creature From Jekyll Island: This Blog And Video Playlist Explains Why The U.S. Financial System is Corrupt and How It Came To Be That Way* Number of Americans Renouncing Citizenship Surges To Escape Oppressive Tax Rules* Dropping Off The Grid: A Growing Movement In America: Part I* Online Privacy Tools and Tips www.DPL-Surveillance-Equipment.com (function() { var po = document.createElement('script'); po.type = 'text/javascript'; po.async = true; po.src = 'https://apis.google.com/js/plusone.js'; var s = document.getElementsByTagName('script')[0]; s.parentNode.insertBefore(po, s); })();
Click Here Or On Above Image To Reach Our ExpertsSecurity Expert Says, "We Can Now Spy On Human Emotions" Emotional surveillance has an undeniably dystopian vibe, like George Orwell's 1984, but it's not science fiction. Banks are already signing up for services that incorporate it into their analysis of behavior. A startup founded by MIT graduates called Humanyze has created a sensor-laden badge that transmits data on speech, activity, and stress patterns.One of these days, the walls may know when you're happy, sad, stressed or angry by using an experimental device unveiled Tuesday by researchers at the Massachusetts Institute of Technology that uses wireless signals to recognize emotions through subtle changes in breathing and heartbeat.Computer scientist Dina Katabi and her colleagues at the university's Computer Science and Artificial Intelligence Lab developed a radar system for vital signs that uses reflected radio signals to track movements, moods and behavior, with potential applications for smart homes, offices and hospitals.They posted their new research online Tuesday and plan to present their test results next month at a mobile-computing conference in New York.These wireless signals—a thousand times less powerful than conventional Wi-Fi—are designed to bounce off anyone within range, capturing variations in vital signs that can be analyzed quickly by a computer algorithm able to detect emotional states, the researchers said. To distinguish one mood from another, their system measures patterns of respiration, cardiac rhythms, and minute variations in the length of each individual heartbeat.“All of us share so much in how our emotions affect our vital signs,” said Dr. Katabi. “We get an accuracy that is so high that we can look at individual heartbeats at the order of milliseconds.”The system, which they call EQ-Radio, is 87% accurate at detecting whether a person is joyful, angry, sad or content, they said.By providing an accurate readout of moods, the system promises to loop people more directly into wireless sensor networks, the researchers said. While still experimental, the system could one day give buildings the capacity to respond automatically to changes in vital signs among the people living or working in them, without a need for explicit commands or a direct link to a body sensor, the researchers said.A hospital emergency room might automatically monitor patients awaiting treatment. An amusement park might modulate special effects by monitoring the involuntary reactions of people on an exhilarating ride. A house might one day react to a family's stress by playing pleasant music.PRO-DTECH II FREQUENCY DETECTOR(Buy/Rent/Layaway)“We have explored this idea of allowing a home to recognize someone's emotions and adapt to it,” said project researcher Fadel Adib. “The idea is to enable you to seamlessly interact with your home.”The team is already testing an earlier version of the system that tracks movements and behavior in about 15 homes in the Boston area, including that of Dr. Katabi. She uses it to monitor her sleep patterns and eating habits. It can track movements even if the person is in another room.“I would really like future homes to be more health aware,” she said.In the research made public Tuesday, Dr. Katabi and her colleagues tested the wireless system on 10 women and 20 men, between 19 and 77 years old, while in a standard office setting, which contained desks, chairs, couches and computers.CELLPHONE DETECTOR (PROFESSIONAL)(Buy/Rent/Layaway)During the tests, the volunteers sat from three to 10 feet away from the wireless sensors while attempting to evoke specific emotions by recalling emotion-rich memories. As a control, their vital signs during the experiment were also monitored using conventional electrocardiography and a video-based emotion recognition system that homes in on facial expressions.PRO-DTECH III FREQUENCY DETECTOR(Buy/Rent/Layaway)All told, the researchers collected measurements of 130,000 individual heartbeats. To classify the mood changes, the computer employed a machine learning algorithm to match the waveforms within each heartbeat.PRO-DTECH III FREQUENCY DETECTOR(Buy/Rent/Layaway)When they compared results, they found that the experimental system was almost as accurate in recognizing changes in emotion as the electrocardiograms. It was about twice as accurate as the facial cues recorded by the video system, they said.“We use the wireless signal to obtain the changes in the vital signs and then run a machine learning algorithm to get to emotions,” she said. “The algorithm can immediately recognize the emotions of someone new.”PRO-DTECH III FREQUENCY DETECTOR(Buy/Rent/Layaway)Wall Street Uses Technology To Spy On Traders Emotional StateThe trader was in deep trouble. A millennial who had only recently been allowed to set foot on a Wall Street floor, he made bad bets, and in a panic to recoup his losses, he'd blown through risk limits, losing $4.9 million in a single afternoon.WIRELESS/WIRED HIDDENCAMERA FINDER III(Buy/Rent/Layaway)It wasn't a career-ending day. The trader was taking part in a simulation run by Andrew Lo, an MIT finance professor. The goal: find out if top performers can be identified based on how they respond to market volatility. Lo had been invited into the New York-based global investment bank—he wouldn't say which one—after giving a talk to its executives. So in 2014, unknown to the outside world, he rigged a conference room with monitors to create a lab where 57 stock and bond traders lent their bodies to science.PRO-DTECH IV FREQUENCY DETECTOR(Buy/Rent/Layaway)Banks have already set up big-data teams to harvest insights from the terabytes of customer information they possess. Now they're looking inward to see whether they can improve operations and limit losses in their biggest cost center: employees. Companies including JPMorgan Chase and Bank of America have had discussions with tech companies about systems that monitor worker emotions to boost performance and compliance, according to executives at the banks who didn't want to be identified speaking about the matter.As machines encroach on humans' role in the markets, technology offers a way to even the fight. The devices Lo used—wristwatch sensors that measure pulse and perspiration—could warn traders to step away from their desks when their emotions run wild. They could also be used to screen hires to find those whose physiology is best suited to risk-taking—what interested the bank that allowed the MIT study.Wireless Camera Finder(Buy/Rent/Layaway)The most promising application, and the one with the most profound privacy issues, would be for keeping tabs on employees, Lo says. Risk managers could use it to spot problems brewing on a specific desk, such as unauthorized trading, before too much damage is done. “Imagine if all your traders were required to wear wristwatches that monitor their physiology, and you had a dashboard that tells you in real time who is freaking out,” Lo says. “The technology exists, as does the motivation—one bad trade can cost $100 million—but you're talking about a significant privacy intrusion.”MAGNETIC, ELECTRIC, RADIO ANDMICROWAVE DETECTOR(Buy/Rent/Layaway)Emotional surveillance has an undeniably dystopian vibe, like a finance version of George Orwell's 1984, but it's not science fiction. Banks are already signing up for services that incorporate it into their analysis of behavior. A startup founded by MIT graduates called Humanyze has created a sensor-laden badge that transmits data on speech, activity, and stress patterns.COUNTERSURVEILLANCE PROBE / MONITOR(Buy/Rent/Layaway)Microphones and proximity sensors on the gadgets help employers understand what high-performing teams are doing differently from laggards. The Boston-based company is close to announcing a deal with a bank that's moving some employees to new offices, according to Chief Executive Officer Ben Waber. The bank wants to use Humanyze badges to determine seating locations for traders, asset managers, and support staff to improve productivity, he says.Another startup, Behavox, uses machine-learning programs to scan employee communications and trading records. Emotional analysis of telephone conversations is a part of a worker's overall behavioral picture, according to founder Erkin Adylov, a former Goldman Sachs research analyst. When a worker deviates from established patterns—shouting at someone he's trading with when previous conversations were calm—it could be a sign further scrutiny is warranted. “Emotion recognition and mapping in phone calls is increasingly something that banks really want from us,” says Adylov, whose company is based in London. “All the things you do as a human are driven by emotions.”Emotions are reflexes that developed to drive behavior, scientists say, improving our prospects of seizing opportunity and surviving risk. They're accompanied by measurable physiological changes such as increased blood pressure, sweating, and a pounding heart. Their role in investing has been established since at least the time of economist Benjamin Graham, the father of value investing. More recently, John Coates, a University of Cambridge neuroscientist and former derivatives trader, has studied how financial risk takers' decisions are influenced by biology. His experiments, chronicled in a 2012 book, The Hour Between Dog and Wolf, show that hormones such as testosterone and cortisol play a part in exacerbating booms and busts.The volunteers in Lo's study were given a $3 million risk limit and told to make money in markets including oil, gold, stocks, currencies, and Treasuries. They came from across the bank's fixed-income and equity desks and ranged from junior employees to veterans with 15 years of experience. Top traders have a signature response to volatility, says Lo, who plans to publish his findings by next year. Rather than being devoid of feeling, they are emotional athletes. Their bodies swiftly respond to stressful situations and relax when calm returns, leaving them primed for the next challenge. The top performer made $1.1 million in a couple of hours of trading.Those who fared less well, like the trader who lost almost $5 million, were hounded by their mistakes and remained emotionally charged, as measured by their heart rate and other markers such as cortisol levels, even after the volatility subsided. Lo's findings suggest there's a sweet spot for emotional engagement: too much, and you're overly aggressive or fearful; too little, and you aren't involved enough to care. Veteran traders had more controlled responses, suggesting that training and experience count.There are other ways to infer emotional states. Researchers led by Kellogg School of Management professor Brian Uzzi pored over 1.2 million instant messages sent by day traders over a two-year period. They found that, as in Lo's study, having too much or too little emotion made for poor trades. Uzzi, whose study was published this year, says he's working with two hedge funds to design a product based on the research.As younger traders accustomed to biometric devices like the Fitbit enter the industry, applications designed to boost performance and monitor employees will become commonplace, says Lo, who expects it to be widespread in less than 10 years. “The more data we have, the more we're able to characterize the emotional state of the individual,” he says. “Everybody will have to have these kinds of analytics.”PRO-DTECH FREQUENCY DETECTOR(Buy/Rent/Layaway)Detecting Emotions In Thin AirOne of the most writerly things a person can do is to characterize air as thick, or emotions as tangible. Sadness lingers in the air. The best dinner parties are powered by palpable tension. The practice suggests that you are keenly attuned to your surroundings. Beyond observant, you use your senses in ways others had not thought possible. That is why people want to have sex with writers.But if you told me that the air is actually transmitting chemical signals that influence emotions between humans, I would add you to a list that I keep in my head. It's not a bad list, per se, but it is titled “Chumps.”One person who would not be on that list is Jonathan Williams. An atmospheric chemist, he describes himself as “one of those wandering scientific souls,” but not in an annoying way. He maintains a jovial British lilt after moving to Colorado to work at the National Oceanic and Atmospheric Administration, and then to Germany for a job with the Max Planck Institute (which describes itself as “Germany's most successful research organization”). There Williams and his colleagues study air.They focus on gases that come from vegetation in the tropics, as well as carbon industry. In doing so, the chemists use finely calibrated machines that sense the slightest changes in the contents of air. Taking measurements in the field, Williams and his colleagues always noticed that when they themselves got too close to the machines, everything went haywire.That made sense, in that humans are bags of gas. As breathing people know, we tend to emit carbon dioxide. (Though each exhalation still contains about four times as much oxygen as carbon dioxide.) And there are many subtler ingredients in the concoctions we breathe out. So Williams began to wonder, are these gases “significant on a global scale”? Could they be, even, contributing to climate change? Especially as the number of humans on Earth rockets toward 8 billion?The answer was no. Just a clear, simple no. By measuring gases in soccer stadiums, the Planck chemists found no consequence of human breath. There might be some effect at a global scale, but it's just nothing compared to the air-ravaging effects of transportation and agriculture.But Williams didn't come away from the stadium empty handed. As he sat and watched the fluctuating readings on the air sensors, he got an idea. In the manner of a typical European soccer crowd, the people went through fits of elation and anger, joy and sorrow. So Williams began to wonder, as he later put it to me, “Do people emit gases as a function of their emotions?”If we do, it wouldn't be unprecedented. Tear some leaves off of a tree, for example, and it will emit chemical signals that may be part of a system of communication between trees. The behavior for bees and ants is clearly chemically dominated.“We're not like that—not like robots following chemicals,” Williams explained. “But it could be possible that we are influenced by chemicals emitted by other humans.”The idea of airborne pheromones—chemicals that specifically influence mating behaviors— has been a source of much fascination, but the actual evidence is weak. Some small studies have suggested an effect when people put cotton balls under their armpits, and then other people smell the balls—but in minor, unreliable ways.“I don't know why so many previous researchers have been so into armpits,” said Williams. “A much better way to communicate would be through your breath. Because you can direct your breath, and your breath is at roughly the same height as the person you're trying to communicate to, silently. In the dark, maybe, in your cave.” And if these behavior-modifying volatile chemicals exist (volatile meaning anything that goes into the air), then why would they be limited to sex? Why shouldn't we be able to signal fear or anxiety? It is true that birds seem to know that I'm afraid of them.Williams was so intrigued by the idea of gases and emotion that he designed another experiment—something more predictable than a German soccer game. This time he used a movie theater. Unlike the open-air stadium, the theater presented fewer variables. “You've got this box, the cinema, and you spool through air from outside at a continuous rate, and you have 250 people sitting there, not moving. And you show them all, simultaneously, something that should make them frightened or anxious or sad, or whatever.”The changes in any one person's breath might be minuscule, but a crowd of breathers could be enough to overcome the rest of the background signals. And more importantly, unlike a soccer match, the experiment could be done with the same film again and again. This could test the reproducibility of findings, which is critical to science.Rigging a mass spectrometer into the outflow vent of the theater, the Kino Cinestar in Mainz, Williams had a sense that the experiment as something of a lark. “I thought, we're probably just going to get a big mixture of popcorn and perfume,” he said. But, nonetheless, to measure relationships between scenes and gases, his team meticulously mapped out and labeled every scene in 16 films—from beginning to end. In 30 second increments, the team labeled each by its quality (kiss, pet, injury), as well as its emotional elements using a finite set of descriptors.
Click Here Or On Above Image To Reach Our ExpertsSecurity Expert Talks About ICANN, Verisign And The Demise of Free Speech On The InternetThe U.S. government plans within weeks to end much of its oversight of the California nonprofit that helps run the internet, a move with broad international support. But recent business deals by the nonprofit are threatening to roil those plans.Under the deals, the nonprofit Internet Corporation for Assigned Names and Numbers, known as Icann, is set to give significant new business to its largest contractor, Verisign Inc., under circumstances that some say show favoritism.One of the deals would give Verisign a no-bid extension on its current contract to run the huge dot-com domain. In the other deal, Verisign emerged as a surprise potential winner of the contract to operate the new dot-web domain by quietly putting $130 million behind another firm's bid in an Icann auction.Icann denies that it has given special treatment to Verisign, saying its focus has been promoting the internet's stability and security. Verisign, which is based in Reston, Va., is widely viewed as a highly competent manager of the domain-name system.The deals open a window into what is a netherworld to most users—the structures and firms that keep the chaotic-seeming internet running smoothly.Icann handles the internet's technical operations, including the crucial domain-name system, under a longstanding arrangement with the U.S. government. Icann also oversees the firms that run many of the internet's top-level domains, such as dot-com. Verisign currently runs the dot-com domain as well as dot-net, and also helps maintain the domain-name system. It makes money by receiving fees paid by people who register websites, while ensuring the registry's operation is smooth, stable and secure.The Obama administration is preparing to end much of its oversight of Icann on Oct. 1. The government hasn't intervened lately in Icann's operations, but its authority to do so has been seen as a backstop should something go wrong.Many high-tech firms view the shift as essential to maintaining international support for the internet's governance, as foreign countries increasingly bridle at the U.S. role. But some conservative critics, who have long worried that Icann could fall under foreign control, are seizing on the recent business deals as they try to block the government's move. They are hoping the deals will raise concerns among congressional Democrats, too.PRO-DTECH II FREQUENCY DETECTOR(Buy/Rent/Layaway)Critics including Sen. Ted Cruz (R., Texas) say Icann's recent deals with Verisign show it to be a feckless regulator.“Where there's smoke there's fire,” Rep. Sean Duffy (R., Wis.), who has lined up with Mr. Cruz, said in an interview. The lawmakers have called for a Justice Department investigation.Icann denies favoritism. Regarding accusations that Icann is too cozy with Verisign, Akram Atallah, president of Icann's global domains division, said, “‘Cozy with Verisign' is an oxymoron,” in reference to the firm's reputation as a tough bargainer.Critics face an uphill fight to derail the government's planned transfer.CELLPHONE DETECTOR (PROFESSIONAL)(Buy/Rent/Layaway)Icann has proposed giving Verisign a no-bid extension of its long-running contract to operate the dot-com domain, two years ahead of schedule. Verisign's current contract is set to expire in 2018; the extension would last through 2024. Verisign has had exclusive control of the dot-com registry since 2000. Starting in 2006, Verisign's contract with Icann has had an automatic-renewal clause, meaning no bidding is required so long as Verisign meets basic performance standards. Other domain operators have received similar deals. PRO-DTECH III FREQUENCY DETECTOR(Buy/Rent/Layaway)Critics say Verisign's hold on the dot-com domain already has made it an effective monopoly. Mr. Atallah says the contract extension is less significant than it appears, since Verisign would be entitled to automatic renewal in two years anyway.The agency that oversees Icann, the National Telecommunications and Information Administration, hasn't yet endorsed the contract extension. Noting that it hasn't yet been approved by the Icann and Verisign boards, an NTIA spokesman said, “We have not been presented with anything to consider at this point.” NTIA would be able to keep price limits in place for the duration of the contract extension.PRO-DTECH III FREQUENCY DETECTOR(Buy/Rent/Layaway)In the second deal, Verisign covertly provided most of the funding for a winning bid in a recent Icann auction for the right to run the potentially lucrative dot-web domain.The Verisign-backed bidder, Nu Dot Co LLC, won the July 27 auction with a bid of $135 million. Then Verisign disclosed that it had put up $130 million of the bid and said it expected Nu Dot Co to hand over the dot-web deal to Verisign. Nu Dot Co didn't respond to a request for comment. Such assignments aren't unusual.In a lawsuit against Icann in federal court in Los Angeles, one losing bidder, Donuts Inc., accused Icann of using its authority “to unfairly benefit” an applicant.Mr. Atallah said Icann and its ombudsman investigated the suspicions ahead of the auction but no action was merited. “Now we have some other evidence that is surfacing, and we are looking again,” Mr. Atallah said. “What happens, I cannot project.”United Nations Might Take Control of InternetWhen the Obama administration announced its plan to give up U.S. protection of the internet, it promised the United Nations would never take control. But because of the administration's naiveté or arrogance, U.N. control is the likely result if the U.S. gives up internet stewardship as planned at midnight on Sept. 30. On Friday Americans for Limited Government received a response to its Freedom of Information Act request for “all records relating to legal and policy analysis . . . concerning antitrust issues for the Internet Corporation for Assigned Names and Numbers” if the U.S. gives up oversight. The administration replied it had “conducted a thorough search for responsive records within its possession and control and found no records responsive to your request.”PRO-DTECH III FREQUENCY DETECTOR(Buy/Rent/Layaway)It's shocking the administration admits it has no plan for how Icann retains its antitrust exemption. The reason Icann can operate the entire World Wide Web root zone is that it has the status of a legal monopolist, stemming from its contract with the Commerce Department that makes Icann an “instrumentality” of government.Antitrust rules don't apply to governments or organizations operating under government control. In a 1999 case, the Second U.S. Circuit Court of Appeals upheld the monopoly on internet domains because the Commerce Department had set “explicit terms” of the contract relating to the “government's policies regarding the proper administration” of the domain system.Without the U.S. contract, Icann would seek to be overseen by another governmental group so as to keep its antitrust exemption. Authoritarian regimes have already proposed Icann become part of the U.N. to make it easier for them to censor the internet globally. So much for the Obama pledge that the U.S. would never be replaced by a “government-led or an inter-governmental organization solution.”Rick Manning, president of Americans for Limited Government, called it “simply stunning” that the “politically blinded Obama administration missed the obvious point that Icann loses its antitrust shield should the government relinquish control.”The administration might not have considered the antitrust issue, which would have been naive. Or perhaps in its arrogance the administration knew all along Icann would lose its antitrust immunity and look to the U.N. as an alternative. Congress could have voted to give Icann an antitrust exemption, but the internet giveaway plan is too flawed for legislative approval.As the administration spent the past two years preparing to give up the contract with Icann, it also stopped actively overseeing the group. That allowed Icann to abuse its monopoly over internet domains, which earns it hundreds of millions of dollars a year.Earlier this month, an independent review within Icann called the organization “simply not credible” in how it handled the application for the .inc, .llc and .llp domains. The independent review found Icann staffers were “intimately involved” in evaluating their own work. A company called Dot Registry had worked with officials of U.S. states to create a system ensuring anyone using these Web addresses was a legitimate registered company. Icann rejected Dot Registry's application as a community, which would have resulted in lowered fees to Icann.WIRELESS/WIRED HIDDENCAMERA FINDER III(Buy/Rent/Layaway)Delaware's secretary of state objected: “Legitimate policy concerns have been systematically brushed to the curb by Icann staffers well-skilled at manufacturing bureaucratic processes to disguise pre-determined decisions.” Dot Registry's lawyer, Arif Ali of the Dechert firm, told me last week his experience made clear “Icann is not ready to govern itself.”Icann also refuses to award the .gay domain to community groups representing gay people around the world. Icann's ombudsman recently urged his group to “put an end to this long and difficult issue” by granting the domain. Icann prefers to earn larger fees by putting the .gay domain up for auction among for-profit domain companies.And Icann rejects the community application for the .cpa domain made by the American Institute of CPAs, which along with other accounting groups argues consumers should expect the .cpa address only to be used by legitimate accountants, not by the highest bidder. An AICPA spokesman told me he has a pile of paperwork three feet high on the five-year quest for the .cpa domain. The professional group objected in a recent appeal: “The process seems skewed toward a financial outcome that benefits Icann itself.”The only thing worse than a monopoly overseen by the U.S. government is a monopoly overseen by no one—or by a Web-censoring U.N. Congress still has time to extend its ban on the Obama administration giving up protection of the internet. Icann has given it every reason to do so.PRO-DTECH IV FREQUENCY DETECTOR(Buy/Rent/Layaway)The U.S. Commerce Department on Monday delayed for at least a year its plans to give up oversight of a key component of Internet governance.The department said it would renew its contract with the Internet Corp. for Assigned Names and Numbers for one year. Icann administers the Internet's domain-name system, through contracts with the companies that sell website names and addresses.Commerce Department Renews Contract With The Internet Corp. For Assigned Names And NumbersCommerce has overseen Icann since the organization was created in 1998. Last year, the Obama administration said it planned to transfer Icann oversight to an unspecified group of international stakeholders by September 2015.Critics of the plan have expressed concerns that it may open the door to influence by foreign governments that aren't committed to Western principles of free expression, and may want to impose different rules for administering the Internet in different parts of the world.Wireless Camera Finder(Buy/Rent/Layaway)“It has become increasingly apparent over the last few months that the community needs time to complete its work, have the plan reviewed by the U.S. government and then implement it if it is approved,” Assistant Commerce Secretary Lawrence Strickling wrote in a blog post.Mr. Strickling wrote that the government plans to extend its contract with Icann for one year to Sept. 30 of 2016, with options to extend it another three years. Mr. Strickling said Commerce informed Congress of the plan on Friday.Commerce said the extension will provide time to work out additional details on how a “multistakeholder” governance approach might work.Icann Chief Executive Fadi Chehadé said in May he plans to leave in March 2016 to work in the private sector. Mr. Chehadé has championed greater independence for the group. In 2013, he praised Brazil's call for the U.S. to relinquish oversight of the agency in the wake of disclosures that the National Security Agency monitored Brazil's leaders and businesses online.“This is an important step,” said House Energy and Commerce Committee Chairman Fred Upton (R., Mich.) and Reps. Greg Walden (R., Ore.) and John Shimkus (R., Ill.) in a statement. “The administration is recognizing, as it should, that it is more important to get this issue right than it is to simply get it done.”In June, the House passed legislation to give Congress oversight of the Obama administration's plans to transfer stewardship of Icann.“We appreciate the administration's efforts and look forward to working with them, and the global Internet community, to get this done right,” the Republican legislators said Monday.Tuesday, Icann Senior Adviser Theresa Swinehart said in a statement that the agency is “pleased” by the contract extension. Ms. Swinehart said there has been progress in devising a new governance structure, but “additional time is necessary for the global community to complete its work and for Icann to implement the community's proposals.”MAGNETIC, ELECTRIC, RADIO ANDMICROWAVE DETECTOR(Buy/Rent/Layaway)The US government has formally approved a plan to transition control of the internet's administrative tasks to the private sector.In an announcement Thursday, the National Telecommunications And Information Administration (NTIA) gave the green light to a plan developed over two years by the internet community to hand control of the critical Internet Assigned Numbers Authority (IANA) contract to Californian non-profit Internet Corporation for Assigned Names and Numbers (ICANN)."Today's announcement marks an important milestone in the US government's 18-year effort to privatize the Internet's domain name system," said Commerce secretary Penny Pritzker. "This transition ensures that the Internet continues to flourish as a platform for innovation, economic growth and free expression."ICANN has run the IANA functions – which cover the highest level of internet: the DNS, IP addresses, and internet protocols – since the day it was incorporated in 1999, but through a contract awarded repeatedly to it by the NTIA.This plan moves the contract into ICANN's hands and so removes the US government from its position of direct control – an important change in an ever more global internet.Following the formal approval, the transition is in line to be completed by the end of the current IANA contract – 30 September 2016.COUNTERSURVEILLANCE PROBE / MONITOR(Buy/Rent/Layaway)
Click Here Or On Above Image To Reach Our ExpertsHow To Avoid Thermal Imaging CamerasNow this was written to help the military snipers to be able to blend in, and avoid Thermal Imaging Cameras. It does an awesome job of explaining how they work And their weak points etc. Well we can also use the same principles talked about here, to help those of you who need to avoid the detection by Thermal Heat Detecting Cameras.Knowledge Is PowerThermal Detection, there are some pretty gloomy postings about IR detection. As a security/surveillance expert, I might shed some light (pun intended) on the subject. To qualify this, I am using the latest (I think) commercially available FLIR product. These are my observations about IR imagers using the latest thermal imaging equipment. This is about THERMAL imaging avoidance.IR is not Xray, Hollywood be damned-it cannot detect a differential heat image through common solid materials, plastic film (black or otherwise) being an exception. PRO-DTECH II FREQUENCY DETECTOR(Buy/Rent/Layaway)However, a good imager system can see through holes in a masking material ("IR masking" camo net). And if you are inside a dumpster, body heating the bad guy's side, he can "see" the hot spot on the dumpster's outside. But if you are not leaning (heating) against that side, he can't "see you". Your body heat will not be detected behind most readily available unholed blinding materials if you are not differentially warming/cooling those materials or allowing your own IR to reflect off of something behind/over you. BUT, if the shielding materials are alien to the surroundings, the material itself will probably stand out.See Below:Glass will not allow your THERMAL image to transmit (pass) through; same as the dumpster scenario. The lenses of IR imagers are made of exotic nonglass materials because of this.CELLPHONE DETECTOR (PROFESSIONAL)(Buy/Rent/Layaway)Every piece (cluster) of matter, including gasses, emits IR if it is above Absolute Zero (minus 459.69 degrees F). The warmer a body gets, the more IR it will emit. Eventually it will enter the visible spectrum as it gets "red hot".PRO-DTECH III FREQUENCY DETECTOR(Buy/Rent/Layaway)The surface of a piece of matter is where IR is emitted. Altering an object's surface will alter the rate at which IR is emitted. Stoveblack is a classic example.Materials physically different from each other will likely emit IR at different rates. BUT the differences may be very slight.PRO-DTECH III FREQUENCY DETECTOR(Buy/Rent/Layaway)IR imaging (read DETECTION) depends upon two objects having one or more differences in Temperature, Emissivity/Reflectivity, and Absorption of the compared objects. For this application, we can forget about Absorption, and you should all understand Temperature. Now, E + R = 100%, thus the more emissive a surface is, the less reflective. If two dissimilar objects are at the same temperature, a high E will "look" hotter to an IR imager than a low E, thus forming an image. Objects with different Temperatures and the right E's could "look" the same, thus forming NO image. Two objects with similar temperatures and similar emissivities will present an unclear, poorly defined image. Herein lies your IR strength.Here are some Emissivity values for a few materials, all in percents, all plus/minus a point or two. These are for short wavelength commercial imagers and may vary slightly for long wavelength/long range military/LE equipment. Military techies should have similar emissivity tables for your equipment. PRO-DTECH III FREQUENCY DETECTOR(Buy/Rent/Layaway)* Human Skin: 97* Black Vinyl Electrical Tape: 97* Surface Sprayed With Dr. Scholl's Aerosol Foot Powder: 96* Water: 95* Rubber, Black, Hard: 94* Glass, Smooth: 94* Plywood, Raw Lumber: 90-95* Most Painted Surfaces (Non Aluminum Paint): 90-95* Aluminum Based Paints, Depending On Formula: 30-50* Oxidized (Blued, Parkerized) Steel: Around 90* Snow: 82-85* "Most" Organics (Vegetation): Around 80* Cloth, Untreated: Around 80 * Sand: 76 Clay: 40* Gravel: 38* Aluminum, Bare And "Shiny" (Read "Spaceblanket"): Under 10Note the materials that cluster around 95, 80, 40, and 10 Now, to apply IR-101: In all of the scenarios below, remember that your body (or ANYTHING above absolute zero) emits IR in ALL directions. If there is a reflective object behind or beside you, it will pick up your IR and reflect it like you were a light bulb. Whichever situation and methods you use, if you have the opportunity, have an ally check you out from a flank with your best IR detection equipment. Or get the flyboys to check you out with FLIR's namesake. Do this by day AND night, as the sun will do weird (but predictable) things to the differential temps.WIRELESS/WIRED HIDDENCAMERA FINDER III(Buy/Rent/Layaway)The BEST way to protect yourself from IR detection is get behind/under what is already there, and DON'T change the temperature of it. Since you obviously have to see and perhaps reach out, do so through the smallest portal(s) you can handle. Those "man-sized" targets detectable at 1100 yards are just that - man-sized -not the size of your nose and right eye. Remember that glass reflects some IR (100 - 94 = 6%), and the sky (space) is cold (approaching Absolute Zero), so if your scope is reflecting not sun, but sky, it will look COLD. If you have on a scope sunshade that is hot, the internal IR of the sunshade will reflect out as HOT.PRO-DTECH IV FREQUENCY DETECTOR(Buy/Rent/Layaway)I believe the GI Woodland BDU's are treated with an IR emittance reducer. If so, the "cloth" E figure in the table will change and you have to adjust for the following discussion. Or obtain untreated camo fabric or defeat that treatment (starch, I believe). The IR reducing treatment makes sense for a situation where the woods is cooler than 98.6 F. I hope the Desert Daylight BDU's are NOT treated, but the nighttime anti-starlight smocks probably should be. If your BDU's image "cold" against hot sand, you are just as "seen". I trust the techies were aware of this, and have specified correctly. But you need to confirm by looking through your equipment at your buddy against some typical backgrounds.It has been reported that "fresh" BDU's do indeed have an IR treatment that fatigues (pun) with laundering in "brightener" detergents. As a hunter, I am aware of the UV problem with animals with good night vision (is it an overabundance of rods, or cones, in the eye?) and there are detergents available via sporting goods stores that do not contain brighteners. If you need to maintain that BDU treatment, you might try that. But again, look at your buddies with your equipment.Now, in sand or vegetation (E = 76-80): If you HAVE to have artificial cover for situations where your clothing will approximate the temperature of the surroundings, you want to expose matching temperature "stuff" with a similar E (around 80). Cover as much of your skin (97) as possible with cloth (80) (remember that I don't know the E for treated BDU's). But also remember that sweaty cloth in a hot, dry background might look cold due to evaporative cooling. If you are in a hot dry situation, a tented, solid (not net), dry camo fabric applied as a screen might do the trick for IR. (Remember, same T, similar E). Visual is another problem. Keep the outlines irregular for both IR and visual. Square stuff in a curvy world stands out, no matter the technology. Fresh local vegetation in front of the screen will help both.Camo face paint is PROBABLY a high emitter, similar to regular paints (90-95), and sweat (water-95) is for sure. You really have to keep that face behind something. I don't know what a synthetic ski mask would have for an E, but I bet it is below 97. A plain old cotton tee shirt mask would work, but remember the wet/dry/cooling problem.Black ANYTHING is a good emitter. Blackened steel barrels, synthetic stocks, and painted surfaces (all E's in the 90's) should be cloth wrapped for IR and visual both. Black SWAT uniforms probably have a higher E than camo. You need to test.Dry rubber boot soles (94) are nearly as hot as your face - sock 'em (80).Old cut local vegetation will be drier, thus HOTTER due to lack of evaporation.The name of this game is to keep both the Emissivity and the Temperature of the screen and clothing the same as that of the surroundings and keep those portals small.If you are on bare clay or gravel (38-40) and are worried about aerial observation, dig in. Cover yourself with almost anything sufficiently rigid and then cover it with at least a thin but full layer of the local "dirt". This will match the E's. Once the moisture of the new cover layer equals the moisture of the surface around you (evaporative cooling), you will be in decent shape IR wise. Remember that these low E materials have a high Reflectivity, so block your own IR from getting out from under the cover. If there is a chance your body heat will affect the top surface of the dirt cover, use insulating material between you and the bottom of the "roof" to keep it the same temp as the ground around you. Foam board or sleeping bags will do that. The most critical times of day for this hide would be as the sun changes, because rapid heating/cooling of a thin layer of dirt will show up compared to the slower heating/cooling of the intact soil masses. If you can set up in a shaded spot where this will not occur, you should be in decent shape. If there is no shade, make the cover layer thick to create a heat sink approaching that of the surroundings.Wireless Camera Finder(Buy/Rent/Layaway)If there is no threat of aerial observation, and it is only a frontal threat, a "wall" of local dirt with small portals would be the best bet.Any new foxhole will print either hot or cold depending on the season and surface temperature, even if the surrounding soil is bare. The deeper soil temp is probably closer to 55 F than the surface.On snow (82-85), build a snow fort or tunnel in and make small portals. Try to dust loose snow to duplicate surface texture. Pray for new snow. If you wore an aluminized face shield behind that snow fort, it would reflect the "cold" off of the fort, and cover your hot face. This might be a shiny side application of the space blanket, and could be worth testing. Water (95) is your breath when it condenses. And it is warmer than the snow. Only thing I can think of to do here is breath through a ski mask and let it condense before it fogs up over your screen.As to "space blanket" applications: there might be some, BUT. If you are using the shiny side toward you to keep your IR from getting out, remember that the backside of it is probably not a good E match to the surroundings and it will heat/cool a lot differently than most natural things around you. If you are trying to put the shiny side out angled down to reflect the IR of the terrain right in front of you, there would be a 10% reduction in the reflection, more if it casts a shadow. If the shiny side is out and up, it will reflect the cold of outer space (or the heat of the sun) - and it is going to look REALLY weird to visual and starlight in EITHER case! I cannot think of a space blanket application that I would stake MY life on.MAGNETIC, ELECTRIC, RADIO ANDMICROWAVE DETECTOR(Buy/Rent/Layaway)In an urban situation, you will have lots of "normal" IR blockers to get under/behind. Just remember that you are an IR light bulb on the cold surfaces behind you. You cannot casually set up back in the room shadows of a windowless building anymore. Remember, glass will NOT pass through (transmit) your IR image. BUT, glass (94) has a high emissivity and will show its surface temperature rather well. If you are near the window warming it with your breath, you will reveal yourself. If you had a small barrel portal through an otherwise intact glass window, you would be IR blocked, but visually seen. A loose pane of glass back in the room shadows might be a possibility, especially for a spotter. If the room is painted (90-95) and warm (approaching 98.6 F), you might blend in IR wise. But if there is one warm window/room in an "empty" building, something is amiss. The painted walls behind you might not reflect your IR really well, but a metallic light fixture might blink every time you turn your face toward it. The best I can imagine is forget about the "room" and get behind/under something that should be there - sofas, chairs, drapes, etc. and keep your portal small.None of the above CONCEALMENT strategies are easy; none are guaranteed to make you disappear to an imager. But they will all help make you a less vivid IR image, thus less detectable. IR imagers may or may not have an adjustment to key in the emissivity for scanning and reading temperatures. I doubt military/LE targeting devices would have that - you don't care what the actual temp is, you just want to see a picture. Military/LEO devices probably have a temperature range adjustment to scale up/down according to environment. They probably have an adjustment to set the sensitivity - the difference in perceived T to go from black to white (dark green to light green; whatever).If this is finely tuned, it is like upping the contrast on your monitor.COUNTERSURVEILLANCE PROBE / MONITOR(Buy/Rent/Layaway)There is one comforting thing to consider: unless you are in the desert, there are a lot of different "things" around you, each of them with a slightly different Temperature and Emittance combination. If you can make yourself "nearly" match the most common IR surroundings and the sensitivity is set very high in order to pick up your small T/E difference, the other guy is seeing a lot more clutter around you, so your image will be just one spot on the Dalmatian.For the Ghillie fans: A man sized wad of only burlap and jute rope at 98.6 F plus or minus a few degrees will have the same E all over it. But if there was some leafage from an IR blocking camo net on one shoulder and a splotch of shredded BDU's at the waist and some foreign force camo material shredded in there somewhere in a cluster, all well supplemented with local veggies, from an IR standpoint it would look like a pile of dissimilar "stuff".If you have gotten this far, perhaps a little DECEPTION is in order to up your advantage.Remember that "Sarge WILL find something during an inspection, so ya might as well give him something so he will stop looking." If you want to determine if indeed IR detectors are out there, you might want to give them a cowboy hat to shoot at. I don't know what the E of a bare GI plastic canteen is, but if you either wrapped it with Scotch 33 electrical tape (97) from a demo/como kit or sprayed it with foot powder (96) from your ruck, and had 98 degree water (coffee? Body heat?) in it, it would make a darned good human face (97) to a distant IR imager. Topped with a BDU hat and moved about on a stick behind some intentionally inadequate screening after dark (by somebody else behind that cowboy's large rock), I suspect you would soon know the targeting capabilities of the opposition - and also acquire a muzzle flash. A piece of most anything warmer than the terrain drug remotely through the grass at night should get IR attention. Just don't pull it all the way to your position. But you get the idea.If you want to just give him/them something to worry about, scatter some old tire shreds (94) around at points distant from your position. They will look hotter than most surroundings when they are actually the same temperature. Plus, they will heat up more during sunlight, and hold their temperature for quite a while into dusk. If you can make them move a bit, so much the better. If they are behind intentionally poor screens, thus not visually or starlight identifiable, so much the better. This would be a great application for decoys specially made for the purpose - a visually camo'd, high E lollipop on a spindly, flexible stick.
Click Here Or On Above Image To Reach Our ExpertsMystery Shoppers Reveal Mortgage Loan Discrimination In 2013, a loan officer at BancorpSouth Bank's Madison, Ala., branch received visits from two people with similar profiles within 10 days of each other, both saying they were first-time home buyers—one white, the other black. The employee allegedly steered the black customer to a smaller and more expensive loan, even though her stated income and credit score were higher than the white applicant's.When the Consumer Financial Protection Bureau took action against the bank in June for allegedly discriminating against African-American customers in mortgage lending, the federal watchdog agency disclosed that the aspiring borrowers were “mystery shoppers,” or undercover investigators, sent in by the agency.The case is the latest example of the five-year-old CFPB testing boundaries with its enforcement tactics, a pattern that has sparked clashes between the agency and the financial industry and Republican lawmakers.PRO-DTECH II FREQUENCY DETECTOR(Buy/Rent/Layaway)Undercover operations are common in criminal probes. But they are rarely used by regulators in civil law-enforcement cases because of limits imposed under the 1974 Privacy Act and other concerns. That law maintains that government officials must identify themselves if seeking information from individuals. Some agencies interpret that as prohibiting any covert investigations. The CFPB and others argue it doesn't apply to “mystery shopping,” because that tactic is used only to seek information that would be available to any member of the public, and doesn't involve eliciting personal information about individuals.The agency won't discuss the extent of its use of such mystery shoppers, and the BancorpSouth case is the only one in which the CFPB has disclosed deploying them. Quyen Truong, a partner at Stroock And Stroock And Lavan LLP who served as the agency's deputy general counsel until May, said implementing the mystery-shopping program “took significant efforts but it's been up and running.” She added that the agency developed the program “after evaluating all the potential legal restrictions.”CELLPHONE DETECTOR (PROFESSIONAL)(Buy/Rent/Layaway)Related Article:Consumers File Complaints Directly To Consumer Financial Protection Bureau (CFPB)PRO-DTECH III FREQUENCY DETECTOR(Buy/Rent/Layaway)The use of mystery shoppers signals the CFPB's new emphasis on combating so-called redlining—a bank's refusal to lend to residents in certain neighborhoods marked by a hypothetical red line on a map—and other forms of alleged lending discrimination against minority borrowers. “To this day, the lines of segregation remain evident and their impact persists,” CFPB Director Richard Cordray said in a July 19 speech, as he pledged to fight “active discrimination.”PRO-DTECH III FREQUENCY DETECTOR(Buy/Rent/Layaway)BancorpSouth signed a $10.6 million settlement with the CFPB and the Justice Department on June 29. It didn't admit wrongdoing and it disputed the findings, though it didn't specify which parts. The bank also criticized the methods used in the case. “We have concerns with the way the information was collected, and selectively released,” the Tupelo, Miss.. bank said in a statement, adding that it has “zero tolerance for this type of behavior” from employees.The CFPB's use of undercover investigators “is a worrisome precedent, because...we see more and more aggressive civil law-enforcement activity by the government, so that civil law enforcement borders on, if not bleeds into, criminal law enforcement,” said Andrew Vollmer, a former deputy general counsel at the Securities and Exchange Commission who now teaches at the University of Virginia's law school. “What we do not have are the corresponding protections of the criminal law-enforcement system for the accused.”PRO-DTECH III FREQUENCY DETECTOR(Buy/Rent/Layaway)Sam Gilford, a CFPB spokesman, said the privacy act's limits pertain to personal information collected from individuals and don't apply to cases such as that of BancorpSouth, adding, “The Bureau will continue to use all available tools, as the circumstances warrant, to further its mission of protecting consumers from discrimination.”CFPB critics have previously raised questions about the agency's tactics, including the agency's reliance on educated guesses to identify minority borrowers in auto lending discrimination cases and the unusually heavy application of fines for a real-estate transaction law, now contested in court by lender PHH Corp.WIRELESS/WIRED HIDDENCAMERA FINDER III(Buy/Rent/Layaway)In a case revolving around the scope of the CFPB's investigative authority, a district court in April ruled against the agency's attempt to compel a college accrediting agency to hand over oral testimony in an investigation.PRO-DTECH IV FREQUENCY DETECTOR(Buy/Rent/Layaway)Spokesmen for the SEC and the Financial Crimes Enforcement Network, the Treasury Department's anti-money-laundering unit, said their agencies don't use undercover operations. In 2011, criticism from Republican lawmakers prompted the Department of Health and Human Services to drop plans to use mystery shoppers disguised as patients to probe care access at doctors' offices.Wireless Camera Finder(Buy/Rent/Layaway)In explaining the CFPB's actions, the agency's Mr. Gilford said that “testing has long been an investigative tool used by federal agencies” such as the Justice Department and the Department of Housing and Urban Development.But there appear to be differences between those efforts and the consumer agency's tactics.MAGNETIC, ELECTRIC, RADIO ANDMICROWAVE DETECTOR(Buy/Rent/Layaway)The Justice Department says it does use “testers” for civil fair-housing investigations, although the tactic appears to be applied on a smaller scale than that deployed by the CFPB. It says on its website that the 96 cases resolved using testers since 1992 have yielded a total of $12.9 million in penalties and other damages, about the same size as the single BancorpSouth settlement.COUNTERSURVEILLANCE PROBE / MONITOR(Buy/Rent/Layaway)A HUD spokeswoman said the agency doesn't do undercover investigations itself. But the department does provide funding to nonprofit fair-lending groups that routinely use testers, and HUD uses information gathered by these testers in building its cases.PRO-DTECH FREQUENCY DETECTOR(Buy/Rent/Layaway)The Federal Trade Commission also uses undercover tests to confirm whether certain types of firms, including funeral homes, comply with consumer-protection laws. A former director of the FTC's consumer protection bureau,Lydia Parnes, said the testers “obtained in the shoes of consumers” public information, rather than personal information, so their conduct doesn't call into question privacy laws, echoing the CFPB argument.RF SIGNAL DETECTOR ( FREQUENCY COUNTER)(Buy/Rent/Layaway)Your questions and comments are greatly appreciated.Monty Henry, Owner (function () { var articleId = fyre.conv.load.makeArticleId(null); fyre.conv.load({}, [{ el: 'livefyre-comments', network: "livefyre.com", siteId: "345939", articleId: articleId, signed: false, collectionMeta: { articleId: articleId, url: fyre.conv.load.makeCollectionUrl(), } }], function() {}); }());
Click Here Or On Above Image To Reach Our Experts Consumers File Complaints Directly To "Consumer Financial Protection Bureau" When Katherine Moody noticed in April that the terms of her student loan changed, she typed up a brief note and filed it through the Consumer Financial Protection Bureau's online complaint portal.A day later, a representative from Navient Solutions Inc. called and restored the previous terms, scrapping the surprise conditions that would have added about $7,000 to overall payments, Ms. Moody said.“In dealing with bureaucracy, I have low expectations,” said the 35-year-old librarian at a Wisconsin college. “But this worked out.” A Navient spokeswoman said a letter explaining the change wasn't received by Ms. Moody before the change occurred.PRO-DTECH II FREQUENCY DETECTOR(Buy/Rent/Layaway)The CFPB's complaint portal has emerged as a go-to spot for consumers with frustrations about their financial firms. It has burnished the agency's consumer-advocacy role, while also generating controversy with businesses and some lawmakers.The bureau began accepting consumer complaints when it opened five years ago this month. It has since handled more than 930,000 consumer complaints on a range of financial services from mortgages and bank accounts to payday loans and virtual currency.CELLPHONE DETECTOR (PROFESSIONAL)(Buy/Rent/Layaway)Consumers can opt to make public their verbatim complaints, which the CFPB calls narratives, without their personal information. All public complaints, whether they include narratives or not, name the company and response and note whether it was timely.PRO-DTECH III FREQUENCY DETECTOR(Buy/Rent/Layaway)Some industry officials and Republican lawmakers say the database is rife with inaccurate information and doesn't protect consumer privacy. The effort, some say, exemplifies government overreach, increases company expenses and undermines companies' own procedures for handling customer complaints.PRO-DTECH III FREQUENCY DETECTOR(Buy/Rent/Layaway)Grumbling intensified last year when the CFPB started publishing the narratives of complaints, a step that opponents say Congress didn't authorize.A House bill introduced in June would require the CFPB to verify all claims made in complaints. “Public disclosure of unverified consumer complaint narratives raises significant consumer-privacy issues and risks tarnishing the reputation of individual companies,” said Virginia O'Neill, senior vice president of the American Bankers Association's Center for Regulatory Compliance.PRO-DTECH III FREQUENCY DETECTOR(Buy/Rent/Layaway)CFPB Director Richard Cordray calls the database “part of our DNA,” playing an important role guiding the agency's supervision of companies, enforcement actions, rule making and consumer protection. The agency has said that while it doesn't verify claims made in complaints, it takes steps to authenticate all complaints, including checking documentation and verifying the consumer's business relationship with the company. The agency says the process gives companies time and space to respond.WIRELESS/WIRED HIDDENCAMERA FINDER III(Buy/Rent/Layaway)The CFPB processes many more complaints than similar programs run by other federal agencies. It handled around 271,600 in 2015, up 8% from 2014. The Transportation Department received 20,170 complaints last year from airline customers, and the Consumer Product Safety Commission's complaint portal, SaferProducts.gov, also established in 2011 and often compared with the CFPB's system, received 4,482 comments last year on products from cribs to drywall.PRO-DTECH IV FREQUENCY DETECTOR(Buy/Rent/Layaway)Companies have added staff to answer CFPB complaints swiftly and have begun poring over the database to learn how their products and services measure up against their competition, companies and lawyers say.Stephen Ross, a partner for Ernst And Young LLP's fraud investigation and dispute services, describes the database as a “very transparent dataset that really puts the onus on financial institutions to investigate and respond.” Ernst And Young is among a number of firms that coach companies on how to respond to the portal and make use of its data.Wireless Camera Finder(Buy/Rent/Layaway)Once a complaint is filed, the CFPB forwards it to the company, which has 15 days to respond to the CFPB. Complaints can be shared with other government agencies. Companies can resolve cases by providing monetary or nonmonetary relief or explanations to the customer. They can also flag inaccurate complaints. The CFPB says companies respond to 97% of the complaints.MAGNETIC, ELECTRIC, RADIO ANDMICROWAVE DETECTOR(Buy/Rent/Layaway)CFPB officials say the agency uses the database to aid its activities in inspection, enforcement and rule making.Navient, based in Wilmington, Del. and spun off from SLM Corp., also known as Sallie Mae, in 2014, said in its response that the change in her loan terms was prompted by a company review to set all customers at the “maximum term allowed by federal regulations.” Extending the duration of the loan lowers the customer's monthly payment but increases the total interest paid over the life of the loan.COUNTERSURVEILLANCE PROBE / MONITOR(Buy/Rent/Layaway)Earlier, citing some 1,300 complaints sent to the CFPB, the Justice Department ordered Navient and Sallie Mae in 2014 to pay back a total of $60 million to nearly 78,000 service members for allegedly overcharging on student loans. In settling the charges, the companies didn't admit or deny the allegations.PRO-DTECH FREQUENCY DETECTOR(Buy/Rent/Layaway)The company reviews customer comments in the database “to leverage their feedback to improve and enhance our service...and to make recommendations to policy makers on legislative and regulatory changes,” said Navient spokeswoman Patricia Christel.RF SIGNAL DETECTOR ( FREQUENCY COUNTER)(Buy/Rent/Layaway)Your questions and comments are greatly appreciated.Monty Henry, Owner (function () { var articleId = fyre.conv.load.makeArticleId(null); fyre.conv.load({}, [{ el: 'livefyre-comments', network: "livefyre.com", siteId: "345939", articleId: articleId, signed: false, collectionMeta: { articleId: articleId, url: fyre.conv.load.makeCollectionUrl(), } }], function() {}); }()); Additional Resources: * Prevention and Detection of Electronic Harassment and Surveillance* Electrical Hyper-Sensitivity: The-Truth!!* How Do I Know If I've Been Bugged? * Targeted Individuals* Operating The Brain By Remote Control* What is BitCoin and How Does It Work?* The Creature From Jekyll Island: This Blog And Video Playlist Explains Why The U.S. Financial System is Corrupt and How It Came To Be That Way* Number of Americans Renouncing Citizenship Surges To Escape Oppressive Tax Rules* Dropping Off The Grid: A Growing Movement In America: Part I* Online Privacy Tools and Tips www.DPL-Surveillance-Equipment.com (function() { var po = document.createElement('script'); po.type = 'text/javascript'; po.async = true; po.src = 'https://apis.google.com/js/plusone.js'; var s = document.getElementsByTagName('script')[0]; s.parentNode.insertBefore(po, s); })();
Click Here Or On Above Image To Reach Our ExpertsSecurity Expert Says, "Confidence In Local Police Depts. Reaches A 20yr. Low"Ronald Reagan famously stated, “The nine most terrifying words in the English language are: I'm from the government and I'm here to help.” But should we apply such thinking to the police? The answer depends on whom we ask. Many liberals who otherwise defend every government program and unionized job believe that the police are increasingly abusing their power. Many conservatives who otherwise complain about unaccountable government officials consider the police department beyond reproach and say that any form of de-policing will make America less safe. Crime has decreased significantly in the past two decades, and many attribute that outcome to the proactive “broken windows” policing first advocated by James Q. Wilson and George L. Kelling in a 1982 article. The theory goes that arresting offenders for minor crimes like loitering or drinking in public leads to a mien of order that in turn discourages major crimes. Citizens will be better off with, and thus prefer, police playing an active role in the community.Surveys today, though, show citizen confidence in the police at its lowest point in 20 years. It has dropped among Americans of all ages, education levels, incomes and races, with the decreases particularly pronounced among the young and minorities. According to a USA Today/Pew Research Center poll, only 30% of African-Americans say that they have a great deal or quite a lot of confidence in the police, and nine out of 10 say that the “police do an ‘only fair' or poor job when it comes to equal treatment and appropriate force.” Nine out of 10 Americans surveyed say that officers should be required to wear body cameras to check police violence.The past month has seen extraordinary killings, both by police officers and of police officers, in St. Paul, Baton Rouge and Dallas. All across the political spectrum, people agree that American policing is in turmoil. But different groups emphasize different aspects of the crisis. Where Black Lives Matter protesters emphasize the danger of being killed by the police, Blue Lives Matter counter-protesters emphasize the risks faced by hard-working policemen. The issues are so polarizing as to leave little room for considered thought or discussion.PRO-DTECH II FREQUENCY DETECTOR(Buy/Rent/Layaway)As an African/American security expert, I'd like to advocate taking a step back and looking at the data to begin to gain some perspective. In 2015, 41 officers were slain in the line of duty. That means the 900,000 U.S. law-enforcement officers face a victimization rate of 4.6 deaths per 100,000 officers. Any number greater than zero is a tragedy, but the average American faces a nearly identical homicide rate of 4.5 per 100,000, and the average male actually faces a homicide rate of 6.6 per 100,000. Being a police officer is thus dangerous but not as dangerous as being an average African/American male.In the same year, police killed 1,207 Americans, or 134 Americans per 100,000 officers, a rate 30 times the homicide rate overall. Police represent about 1 out of 360 members of the population, but commit 1 out of 12 of all killings in the United States. Many argue that these are justifiable, but are they necessary? In England and Germany, where the police represent a similar percentage of the population as in the U.S., they commit less than one-half of 1% of all killings. Are higher rates of violence inevitable in our country with its more heavily armed populace, or can things be done to reduce the growing tensions?CELLPHONE DETECTOR (PROFESSIONAL)(Buy/Rent/Layaway)Former policeman Norm Stamper's book “To Protect and Serve: How to Fix America's Police” provides a first-hand account of the changes in policing over the past few decades and is a useful survey of how we got here. He started as a beat cop in San Diego in 1966 and rose to be chief of police in Seattle from 1994 to 2000. He witnessed both the more discretionary eras of policing and the advent of broken windows policing, which was first adopted in New York City in the 1990s and evolved into an aggressive form of proactive and “zero-tolerance” law enforcement that spread across the nation.PRO-DTECH III FREQUENCY DETECTOR(Buy/Rent/Layaway)Mr. Stamper joined the force out of a desire to serve the community but quickly learned that his performance would be judged on the number of tickets he wrote and arrests he made. An experienced officer told him, “You can't let compassion for others get in the way.” There were quotas to fill. “The people on my beat were, in a word, irrelevant,” Mr. Stamper writes.PRO-DTECH III FREQUENCY DETECTOR(Buy/Rent/Layaway)The war on drugs was declared in 1971—then escalated in the 1980s—and Mr. Stamper noticed police increasingly treating civilians like enemy combatants. In 1994, President Clinton passed the largest crime bill in history. It allocated $8.8 billion to hire 100,000 more police officers and $10 billion for new prisons, and it established mandatory arrests for allegations like domestic violence and mandatory life sentences for third-time drug or violent offenders—the three-strikes provision. Incarceration rates spiked nationally. The rate at which the government incarcerates Americans is now seven times what it was in 1965.“To Protect and Serve” is particularly disturbing in showing that, as antagonism toward and disregard for the public increased among policemen, it had few consequences. Officers do not report on their colleagues, and prosecutors are averse to punishing people with whom they must work closely. Mr. Stamper quotes a fellow police chief saying: “As someone who spent 35 years wearing a police uniform, I've come to believe that hundreds of thousands of law-enforcement officers commit perjury every year testifying.” Instead of policemen serving the public, Mr. Stamper concludes, they end up viewing citizens as numbers or revenue sources. One important lesson from economics is that unaccountable government officials will not always act on the public's behalf.PRO-DTECH III FREQUENCY DETECTOR(Buy/Rent/Layaway)Another account of modern policing is “A Good Month for Murder: The Inside Story of a Homicide Squad” by Del Quentin Wilber, a newspaper reporter who spent a month alongside detectives in one of the Maryland suburbs of Washington, D.C. This attempt at a true-crime drama seems to have been meant in praise of police work, but Mr. Wilber unintentionally creates an unflattering picture. He shows us men who refer to their targets as “reptilian motherf—ers” and conduct multi-hour interrogations in the middle of the night to elicit confessions. They throw chairs against walls to intimidate suspects, lie boldly during interrogations and happily feed lines to witnesses to use in court.One detective “jokes with [another] that he could get [a suspect] to confess to anything: ‘Have any open murders that need to be closed?' ” The Fourth Amendment to the Constitution attempts to restrict search and seizure without probable cause, but judges here grant warrants without a thought: “He just immediately signed the paper and looked at me and winked and said, ‘Good luck.' ” At one point, a supervisor explains that a prisoner cannot be questioned about earlier crimes without having a lawyer present. The detective retorts: “F—ing Constitution.” In the end, the policemen excuse any mistakes they made by saying they had good intentions.WIRELESS/WIRED HIDDENCAMERA FINDER III(Buy/Rent/Layaway)A company that mistreats its customers cannot stay in business merely by saying it acted with good intentions. The police, by contrast, are a tax-funded monopoly, paid regardless of how well they serve or protect. Citizens subject to random fines or harassment cannot turn the police away if they are unhappy with their services. The Justice Department investigation of the Ferguson, Mo., police department last year provided an in-depth account of local politicians, police, prosecutors and judges using the legal system to extract resources from the public. In 2010, the city finance director even wrote to the police chief that “unless ticket writing ramps up significantly before the end of the year, it will be hard to significantly raise collections next year. . . . Given that we are looking at a substantial sales tax shortfall, it's not an insignificant issue.”PRO-DTECH IV FREQUENCY DETECTOR(Buy/Rent/Layaway)In 2013, he wrote to the city manager: “I did ask the Chief if he thought the PD could deliver [a] 10% increase. He indicated they could try.” The Ferguson police department evaluated officers and gave promotions based on “citation productivity,” and prosecutors and judges worked alongside them to collect revenue. In a city with 21,000 residents, the courts issued 9,000 arrest warrants in 2013 for such minor violations as parking and traffic tickets or housing-code violations like having an overgrown lawn.When the Ferguson citizenry started mass protests against police abuses last year, they were met with the equivalent of a standing army. The news photographs of police in camouflage, body armor and helmets working in military formation with guns drawn were a wake-up call for many Americans, who wondered just how the police came be so militarized. It was all part of the spread of zero-tolerance policing in the 1990s.Wireless Camera Finder(Buy/Rent/Layaway)After the 1994 crime bill, President Clinton signed a law encouraging the transfer of billions of dollars of surplus military equipment to police departments. Mr. Stamper describes applying for military hand-me-downs of “night-viewing goggles, grenade launchers, bayonets, assault rifles, armored land vehicles, watercraft, planes and helicopters.” The Department of Homeland Security provides $1.6 billion per year in anti-terrorism grants that police departments can use to purchase military equipment. Police in Hartford, Conn., for example, recently purchased 231 assault rifles, 50 sets of night-vision goggles, a grenade launcher and a mine-resistant vehicle. As recently as the 1970s, SWAT raids were rare, but police now conduct 50,000 per year. The weapons and tactics of war are common among what Mr. Clinton promised in 1994 would be “community policing.”MAGNETIC, ELECTRIC, RADIO ANDMICROWAVE DETECTOR(Buy/Rent/Layaway)The question is just what would happen if law enforcement toned down its zero-tolerance policies?One of the premier defenders of the police against critics is Heather Mac Donald, a scholar at the Manhattan Institute who publishes regularly in the nation's most popular newspapers, including this one. Her book “The War on Cops: How the New Attack on Law and Order Makes Everyone Less Safe” organizes and builds on her articles to create a narrative that warns against adjusting police tactics or lowering incarceration rates. She takes aim at groups ranging from Black Lives Matter to “the Koch brothers [who] have teamed up with the ACLU, for example, to call for lower prison counts and less law enforcement.”Much of the book is focused on the post-Ferguson state of policing, but it also includes some of her warnings and predictions from recent years. In a chapter drawn from a 2013 article, for instance, Ms. Mac Donald worries that in the first full year after the court-mandated 30% decrease in California's prison population, the state's “crime rate climbed considerably over the national average.” And in one from 2014 she writes that the 2013 ruling that led to the elimination of “stop-and-frisk” tactics in New York has set in motion “a spike in violence.” Yet between 2008 and 2014, homicides fell by 21% in California and 34% in New York; crime in other categories was down, too. In the very year when Ms. Mac Donald suggests crime rates were climbing in California, homicide rates fell 7%. This was equally true for New York City after stop and frisk was outlawed; homicide rates were ultimately down 0.5% in 2014. It appears that keeping those extra 46,000 Californians behind bars or subjecting New Yorkers to 4.4 million warrantless searches between 2004 and 2013 was unnecessary for public safety.COUNTERSURVEILLANCE PROBE / MONITOR(Buy/Rent/Layaway)More recently, Ms. Mac Donald has warned about a “Ferguson effect” that has led to a “rise in homicides and shootings in the nation's 50 largest cities.” Starting in the summer of 2014, anti-police-violence protests have prompted large reductions in aggressive policing, and Ms. Mac Donald points to increases in crime in cities including Baltimore, Minneapolis, Milwaukee and Nashville. She states that we are now seeing a “surge in lawlessness” and a “nationwide crime wave.” The latest FBI data, however, compares the first six months of 2014 and 2015 and shows that violent and property crime have both decreased in dozens of large cities, including Cleveland, Detroit, Houston, New York and Philadelphia. From 2014 to 2015, violent crime did increase by 1.7% nationwide, but property crime decreased by 4.2%. Any data series will have some fluctuation, and even with a sustained downward trend upticks are likely. The homicide rate, for example, has seen rises in four of the past 15 years but has fallen by 18% over the same period. To put the 1.7% “surge in lawlessness” into perspective, 2012 saw a 1.9% increase in violent crime and a 1.5% increase in property crime when zero-tolerance policing was still the norm nationwide. And such a modest increase from one of the safest years in decades did nothing to change the fact that crime remained—and remains—close to a record national low.Ms. Mac Donald is not alone in her thinking. Gallup does an annual survey asking, “Is there more crime in your area than there was a year ago, or less?” In 14 of the past 15 years, the majority of Americans felt that crime had increased. But answering empirical questions requires looking at the numbers. A data-driven book that does not engage in alarmism is “The Rise and Fall of Violent Crime in America” by Barry Latzer, a professor at the John Jay College of Criminal Justice. The long-term trends in violent crime he presents are telling: In 1900, the American homicide rate was 6 per 100,000 people. During Prohibition, it increased to 9 per 100,000 but fell to 4.5 per 100,000 by the 1950s. From the late 1960s and into the 1970s, the homicide rate spiked, reaching 11 per 100,000. In the late 1970s, it started falling, increasing slightly in the late 1980s but steadily decreasing since the 1990s to the current level of 4.5 per 100,000, among the lowest in the nation's history.PRO-DTECH FREQUENCY DETECTOR(Buy/Rent/Layaway)Should one attribute the decrease in crime to zero-tolerance policing and mass incarceration? It turns out that homicide rates in Canada start at a lower level but track the changes in American homicide rates almost exactly. In the past 25 years, our northern neighbor experienced equal declines in all major crime categories despite never having ramped up its policing or incarceration rates. Those attributing all decreases in crime to increases in American law enforcement are looking in the wrong place. As Mr. Latzer carefully says, “the jury is still out”: Violent crime rates “fell off all over the nation without any clear relationship between the enormous declines in some cities and the adoption of new policing models.” Even though American and Canadian homicide rates rose in the late 1980s, the long-term downward trend clearly began in the late 1970s and early 1980s. Mr. Latzer concludes that the major determinants of a crime rate are likely cultural factors and economic opportunity. The employed family man is going to be less interested in crime than the unemployed and unattached.A month ago we heard predictions about the world economy's impending collapse if Britain left the European Union. Yet within a week of the Brexit vote, British stock prices reached 2016 highs, and American stock prices are at an all-time high. We can be sure that we will hear similar warnings in response to proposals for lowering incarceration rates, reducing the number of policemen, de-militarizing police departments or even privatizing much or all of what they do. Yet, as Messrs. Stamper and Latzer point out, professional police departments were only invented a century and a half ago, and in 1865 New York incarcerated fewer than 2,000 citizens at any given time, compared with upward of 80,000 today (48 per 100,000 then versus 265 per 100,000 now).Then, as now, societies were kept safe by numerous factors beyond government-sanctioned law enforcement. These range today from the most informal eyes on the street to the more formal million-plus private security guards currently employed in America. Around New York City, business improvement districts pay for security personnel to do foot patrols, so the relevant policy choice is not between government police or no security whatsoever. My own research has also found a strong negative correlation between homicide rates and economic freedom in a society. Free markets let people put their passions into business to work for others' benefit. Restrictions on business, including minimum-wage laws that keep young inner-city residents out of the labor force, are particularly harmful. We need more markets, not more government, to discourage crime. One need not assume that unionized, militarized and unpopular policemen are the only option for keeping Americans safe.RF SIGNAL DETECTOR ( FREQUENCY COUNTER)(Buy/Rent/Layaway)Your questions and comments are greatly appreciated.Monty Henry, Owner (function () { var articleId = fyre.conv.load.makeArticleId(null); fyre.conv.load({}, [{ el: 'livefyre-comments', network: "livefyre.com", siteId: "345939", articleId: articleId, signed: false, collectionMeta: { articleId: articleId, url: fyre.conv.load.makeCollectionUrl(), } }], function() {}); }());
Click Here Or On Above Image To Reach Our ExpertsSecurity Expert Says, "Latest Trend Is Truck-Based Terrorism" Terrorists have long used vehicles as bomb-delivery weapons to kill people inside buildings: the U.S. Marines barracks in Lebanon in 1983, the World Trade Center in New York a decade later, then a federal office building in Oklahoma City in 1995.But vehicles have rarely been used to mow down pedestrians to such devastating and tragic effect as in Nice, France.The attack highlighted a vexing challenge to law enforcement: How to protect throngs of people in an open society. It is far more difficult to prevent that type of attack, and taking such measures could be far more debilitating and inconvenient to everyday life and commerce, officials said.“You can't harden every target,” said Eugene O'Donnell, a professor of law and police studies at John Jay College of Criminal Justice in New York. “Ultimately, it's a democracy and that's our ultimate vulnerability.”Law-enforcement experts said the Nice attack would likely heighten alert for potential copycats and lead to increased security at public events, potentially including new limits on vehicle access.PRO-DTECH II FREQUENCY DETECTOR(Buy/Rent/Layaway)“Before, we were conditioned to look for bombs,” said George Venizelos, the former top FBI official in New York who is now a senior executive at a private security firm. “Now you've got to worry about a truck driving into people, so it's a whole new twist to things.”Terrorists have used vehicular assaults in the past. In 2011 in Tel Aviv, a truck plowed into people on a busy street, killing one person and injuring 16 others, according to news reports. The driver denied intentionally causing the wreck.In December 2014, France was the scene of two such incidents. About a dozen people were injured in each, according to news reports.CELLPHONE DETECTOR (PROFESSIONAL)(Buy/Rent/Layaway)“We've seen similar vehicle attacks by individual Palestinians against Israelis, which have gotten enormous attention in jihadi circles, and al Qaeda has called for people to imitate them,” said Bruce Riedel, who spent 30 years at the Central Intelligence Agency, including posts in the Middle East and Europe. “Adding an armed driver is more deadly.”PRO-DTECH III FREQUENCY DETECTOR(Buy/Rent/Layaway)Groups like Islamic State and al Qaeda in the Arabian Peninsula have urged such attacks in the past, according to the SITE Intelligence Group, which monitors militant websites.In a widely distributed 2014 speech, Islamic State spokesman Abu Muhammad al-Adnani urged followers to kill Westerners and nonbelievers any way possible.“Smash his head with a rock, or slaughter him with a knife, or run him over with your car, or throw him down from a high place, or choke him, or poison him,” he said, according to SITE.In a 2010 article in the al Qaeda magazine “Inspire,” a leader of al Qaeda in the Arabian Peninsula urged followers to pursue “individual jihad” by using pickup trucks to run down civilians, mounting sharp blades on the front to maximize deaths and injuries. “The idea is to use a pickup truck as a mowing machine, not to mow grass, but mow down the enemies of Allah,” he wrote.PRO-DTECH III FREQUENCY DETECTOR(Buy/Rent/Layaway)Autonomous Trucks As New Terrorists WeaponOn July 14, Mohamed Lahouaiej Bouhlel drove a 19-ton cargo truck into a crowd at a Bastille Day celebration in Nice, France, killing 84 people. He carried out the attack on behalf of the Islamic State terrorist organization.Bouhlel was shot dead by police, a typical consequence for those who carry out jihadist attacks. However, an emerging technology seems as though it could take the suicidal terrorist out of the equation entirely: the autonomous truck.Autonomous trucks operate in much the same way as self-driving cars, using Wi-Fi-connected artificial intelligence. Anything that uses Wi-Fi can theoretically be hacked, including vehicles, as revealed last year in St. Louis, Missouri, when hacker duo Charlie Miller and Chris Valasek demonstrated how easy it was to hijack a Jeep Cherokee's brakes, dashboard functions, steering and transmission by remotely hacking into its Wi-Fi-connected entertainment system from a laptop 10 miles away.Does this mean that it's possible an attack such as the tragedy in Nice could happen again, this time carried out by someone controlling the vehicle from a remote location?There are currently only a few hundred of these trucks in operation, and the prevailing concern is not that they could be used in terrorist attacks but that they will put many truck drivers out of work. Still, as the technology becomes more prevalent, it's worth asking what the risks might be in the future.The Growing Road To AutonomyAutonomous trucks are predominantly in operation overseas. The Tokyo-based heavy-equipment company Komatsu Ltd. has been operating a small fleet at Codelco's Gabriela Mistral copper mine in Chile since 2008. Last year Alberta-based Suncor Energy signed an agreement to buy 175 trucks from Komatsu, with plans to make its entire fleet autonomous by 2020.There are also approximately 50 autonomous trucks in use in the mines of Pilbara in Western Australia. And last year the Nevada Department of Transportation granted the first license for an autonomous commercial truck to operate in daylight on the state's public highways in order to test its real-world capabilities. Although this truck operates at autonomy level 3, meaning a human driver still needs to be behind the wheel to take full control in critical traffic and environmental conditions, it is expected the driver will be needed only for occasional control. Michelle Culver, a spokesperson for industry research firm IHS Markit, said these numbers will likely grow in the coming years, particularly when it comes to trucks in the Class 8 segment, whose weight exceeds 33,000 pounds when hauling freight.PRO-DTECH III FREQUENCY DETECTOR(Buy/Rent/Layaway)"Within the next 10 years, IHS Automotive analysts expect that autonomous heavy trucks will gradually grow into the market and potentially hit the 20,000-unit annual sales mark in the United States by 2025, most of which will be expected in the Class 8 segment," she said. "Autonomous truck sales could reach 60,000 annually by 2035. That would amount to 15 percent of sales for trucks in the big Class 8 weight segment."In Other Words, The Trucks Are ComingA Whole New Level of RiskSo how worried should we be about the possibility of a terrorist using one as a remotely guided weapon? According to Jeremy Anwyl, CEO of Trucks.com, the scenario is not entirely likely, but even if it's the product of baseless paranoia, it couldn't hurt to give it some thought, he said."Paranoia is a good thing, because it will cause technology providers to take the risk seriously and prevent it from ever happening," he told DPL-Surveillance-Equipment.com. "It's one thing to protect our phones, but this is a whole other level of risk."Anwyl said that well over 50 percent of new vehicles being sold today have some form of connectivity, and he cited the St. Louis, Missouri, Jeep Cherokee "hijacking" test as a good case study in demonstrating the risk of this reality.WIRELESS/WIRED HIDDENCAMERA FINDER III(Buy/Rent/Layaway)"More and more vehicles today have some form of access to the internet, and somebody could hack into that signal," he said. "If a truck communicates its location, speed and fuel level to headquarters, somebody could intercept that message and trick the truck into thinking the person was fleet headquarters. It's not an easy thing to do, but anything's possible."Anwyl explained that the autonomous vehicle's wireless safety features present hackers with their biggest, juiciest opportunities. The technology that allows an autonomous vehicle to wirelessly inform another that it's coming around a blind corner is, ironically, where hackers would find the most vulnerabilities."Anytime you have wireless technology like that, there's an opportunity for a bad actor to hack into that system," he said. "In theory it would be possible for someone to take over a 70,000- or 80,000-pound vehicle.… If it was a fuel tanker, they could drive into anything and cause a big explosion."Chris Finan, former director for cybersecurity legislation and policy under President Obama and current CEO and co-founder of Manifold Technology, a start-up that offers security technology to financial institutions, agreed this scenario shouldn't be dismissed.PRO-DTECH IV FREQUENCY DETECTOR(Buy/Rent/Layaway)"We've seen vulnerability researchers in the last year or so prove that this technology can be hacked," he told us. "Really great hackers aren't always the smartest people, but the most creative. You succeed because of cleverness, not because you have the best technology. They always have the most clever ways of finding vulnerabilities."When we asked him if the Nice attack could be replicated elsewhere with an autonomous truck, his answer was an unequivocal "yes.""The hypothetical of remote reprogramming is plausible," he said. "You could have a malicious actor or group that would reprogram a truck and use it as a missile as a way to target bystanders."Finan added that one way of preventing such hacks was to use open-source technology, which is available to be viewed and updated by anyone from the general public, in a truck's programming."If you use open-source technology, you get millions of eyes on it, instead of just a few, on the type of bugs that hackers would exploit," he said. "In general, open-source code tends to be more secure, because you have so many people looking at it and finding flaws more quickly."Finan hastened to add that while the scenario is possible, it's unlikely to transpire anytime soon, due to jihadists' attitude toward technology."This isn't something people need to freak out about happening tomorrow with radical Islamists," he said. "They view cyberspace as a recruiting space, not as a threat delivery system. It's very possible that in the future that could change, but they've got very many people willing to be programmed to die carrying out these attacks."RECENT TRUCK ATTACKSDec. 21, 2014 Dijon and Nantes, France: A driver shouting Islamic phrases ran down 13 pedestrians in a half-hour span, seriously injuring two. The next day, another man drove into a crowd of holiday shoppers, wounding 11 people.Wireless Camera Finder(Buy/Rent/Layaway)Oct. 28, 2013 Beijing: Five people were killed after a Jeep crashed in front of the Forbidden City. Chinese police described it as a terrorist attack.MAGNETIC, ELECTRIC, RADIO ANDMICROWAVE DETECTOR(Buy/Rent/Layaway)May 15, 2011 Tel Aviv: One man was killed and 16 others injured after a truck crashed into several vehicles and pedestrians on a crowded Tel Aviv roadway. The driver denied intentionally causing the collision.COUNTERSURVEILLANCE PROBE / MONITOR(Buy/Rent/Layaway)June 8, 2008 Tokyo: A man drove a truck into a popular shopping street, killing three men with the vehicle before stabbing 14 people. Four of the stabbing victims died.PRO-DTECH FREQUENCY DETECTOR(Buy/Rent/Layaway)April 19, 1995 Oklahoma City: Timothy McVeigh parked a rental truck packed with explosives in front of a federal building in downtown Oklahoma City. The detonation killed 168, including 19 children, and injured more than 500 people.RF SIGNAL DETECTOR ( FREQUENCY COUNTER)(Buy/Rent/Layaway)Your questions and comments are greatly appreciated.Monty Henry, Owner (function () { var articleId = fyre.conv.load.makeArticleId(null); fyre.conv.load({}, [{ el: 'livefyre-comments', network: "livefyre.com", siteId: "345939", articleId: articleId, signed: false, collectionMeta: { articleId: articleId, url: fyre.conv.load.makeCollectionUrl(), } }], function() {}); }()); Additional Resources: * Prevention and Detection of Electronic Harassment and Surveillance* Electrical Hyper-Sensitivity: The-Truth!!* How Do I Know If I've Been Bugged? &l
Click Here Or On Above Image To Reach Our ExpertsSecurity Expert Says, "Pokémon Go Is A Major Security Risk!!!"The "augmented reality" smartphone game was released eight days ago. Now a zillion adults share their obsession alongside kids who are too young to remember the original anime game from the ‘90s. People have been busted trampling through cemeteries chasing the colorful pocket monsters. The Holocaust Museum in Washington, D.C. had to declare itself a Pokémon-free zone.The mobile game just outpaced Tinder and Twitter as the most-downloaded app since July 6, 2016, its first day of availability in the United States.Guess who's not playing Pokémon Go: cyber security experts.In order to play, the app needs to know your location through your device's GPS and access the camera."Pokémon Go is a huge security risk," warns Monty Henry, owner of DPL-Surveillance-Equipment.com LLC physical and cybersecurity expert.PRO-DTECH II FREQUENCY DETECTOR(Buy/Rent/Layaway)Here's a screenshot of the permissions screen that appears upon downloading Pokémon Go on an Android device, as posted by Twitter user @oscaron: Only iPhone users were informed they had to grant the app "full account access" on Google. The only other way to sign up is through the game's website at pokemongo.com, which has been overwhelmed with users and is currently limiting the number of new users that can sign up at once.CELLPHONE DETECTOR (PROFESSIONAL)(Buy/Rent/Layaway)What Does "Full Account Access" Mean?Reeve, who was among the first experts to sound this warning, claimed on his blog that downloading Pokémon Go would enable it to "read all your email, send email as you, access all your Google Drive documents (including deleting them), access any private photos you may store in Google Photos, and a whole lot more."PRO-DTECH III FREQUENCY DETECTOR(Buy/Rent/Layaway)"I really wish I could play, it looks like great fun, but there's no way it's worth the risk," Reeve wrote.PRO-DTECH III FREQUENCY DETECTOR(Buy/Rent/Layaway)Niantic, which developed the game for Nintendo's Pokémon brand, issued a statement July 11 that they had "recently discovered that the Pokémon GO account creation process on iOS erroneously requests full access permission for the user's Google account." They assured that though the mistake allowed them the ability to dive deep into personal data, the app only accesses a user's ID and email address.PRO-DTECH III FREQUENCY DETECTOR(Buy/Rent/Layaway)"No other Google account information is or has been accessed or collected," the statement read. Niantic said that they were working with Google to fix the permissions issue.iOS users now see this screen that includes the update, "Fixed Google account scope." WIRELESS/WIRED HIDDENCAMERA FINDER III(Buy/Rent/Layaway)Does That Fix The Security Concerns?We consulted David Kennedy, a a cyber security expert and founder of Ohio-based Binary Defense Systems (his official title: Chief Hacking Officer).PRO-DTECH IV FREQUENCY DETECTOR(Buy/Rent/Layaway)His company monitors his clients' systems and tries to break in to reveal where their security is weak. (Niantic is not a client.)We asked whether the fix by the app's developer means that Pokémon Go "trainers" (players, in the game's parlance) are in the clear.Wireless Camera Finder(Buy/Rent/Layaway)Kennedy said that the updated app will restrict what information it collects to the minimum required for it to function, which still includes location data, email address and camera access.Be sure, though, that other outside forces will be looking to exploit any cracks in Pokémon 's armor, Kennedy said, because mobile applications are prone to attack.MAGNETIC, ELECTRIC, RADIO ANDMICROWAVE DETECTOR(Buy/Rent/Layaway)"Let's say I hacked into that application; I would now have access to everyone who installed it, their gmail accounts and everything else," he said. "So it's a big security and privacy issue from that perspective."Even with the promised tweaks, Kennedy won't download it.COUNTERSURVEILLANCE PROBE / MONITOR(Buy/Rent/Layaway)Other ConcernsThere are other unsettling features of Pokémon Go that, while not unique to the game, might make privacy lovers think twice.Niantic's privacy policy is a 20-page document that no kid in reality, virtual or otherwise, is likely to read. Within the policy, Niantic describes how it may share user's information with third parties who "may not have agreed to abide by the terms of this Privacy Policy."Those third parties could be unspecified "private parties," according to the terms of service.They might sell or transfer personally identifiable information about users in the event of a "merger, sale of assets, acquisition, dissolution, reorganization, bankruptcy, change of control or other similar event."Kennedy says the third-party issue raises concerns. "With Google, it's a well-established service. Facebook is a well-established service, with terms and conditions you can read. These third-party applications could be selling your name, your address, your phone number, your contact list, what you're browsing — directly tied to your name."PRO-DTECH FREQUENCY DETECTOR(Buy/Rent/Layaway)A Word On Conspiracy TheoriesThen there's the matter of the app's developer's origins, which are a conspiracy theorist's all-you-can-eat buffet.Niantic's founder, John Hanke, created the startup that became Google Maps and Google Earth. Now he's cast as the man behind the curtain, using unwitting gamers to spy on each other for the CIA -- or so the nether regions of the ‘net would have you believe.Here's what Hanke said that set off musings about Pokémon Go being part of a more sinister plot (he was describing how Pokémon Go and it's predecessor, Ingress, work): "By exploiting the capabilities of smartphones and location technology and through building a unique massively scalable server and global location dataset, we have helped users all around the world have fun, socialize, and get more fit as they play and explore."As if the words "global location dataset" and "massively scalable server" didn't sound ominous enough, there's Hanke's prior business dealings. Hanke's mapping startup, called Keyhole, was funded by In-Q-Tel, a techie incubator which "identifies, adapts, and delivers innovative technology solutions to support the missions of the Central Intelligence Agency and broader U.S. Intelligence Community," according to its website. Such realizations spawned this Gawker headline "Pokémon Go is a Government Surveillance Psyop Conspiracy." A Reddit thread titled "Pokémon GO could be a photo-based intelligence gathering operation," emerged the day after Pokémon Go was released.All of that aside, Kathleen Stansberry, a Cleveland State University assistant professor with expertise in social media and strategic communications, told PolitiFact Ohio that it's easy to see the utilities the technology could provide to police."Google has a history of cooperating with law enforcement," Stansberry said, "and I would imagine Pokémon Go would as well." Another section of the app's privacy policy says it may "disclose any information about you (or your authorized child) that is in our possession or control to government or law enforcement officials or private parties."Despite the risks these issues raise, Stansberry plays Pokémon Go with her son."By closing that particular loophole (for Google account access), Pokémon Go will be much more on par with other location-based apps," Kennedy said. "I think this is something we're going to see increasingly, as virtual reality and augmented reality apps become more popular, and I think these privacy issues are going to become of greater concern."Privacy is a fallacy, she said."There's a big gap between what we believe is private, and what information is really out there about us," Stansberry said. "Did you use your debit card at Target? They're tracking your purchases so they know how to better target you for ads. CVS does the same thing. Let's say every month you buy a pregnancy test and then, suddenly you stop buying pregnancy tests. Now you get a coupon for diapers."RF SIGNAL DETECTOR ( FREQUENCY COUNTER)(Buy/Rent/Layaway)Your questions and comments are greatly appreciated.Monty Henry, Owner (function () { var articleId = fyre.conv.load.makeArticleId(null); fyre.conv.load({}, [{ el: 'livefyre-comments', network: "livefyre.com", siteId: "345939", articleId: articleId, signed: false, collectionMeta: { articleId: articleId, url: fyre.conv.load.makeCollectionUrl(), } }], function() {}); }()); Additional Resources: * Prevention and Detection of Electronic Harassment and Surveillance* Electrical Hyper-Sensitivity: The-Truth!!* How Do I Know If I've Been Bugged? * Targeted Individuals* Operating The Brain By Remote Control* What is BitCoin and How Does It Work?* The Creature From Jekyll Island: This Blog And Video Playlist Explains Why The U.S. Financial System is Corrupt and How It Came To Be That Way* Number of Americans Renouncing Citizenship Surges To Escape Oppressive Tax Rules* Dropping Off The Grid: A Growing Movement In America: Part I
Click Here Or On Above Image To Reach Our ExpertsSecurity Expert Shows You How To Get Through Airport Lines FasterMobile PassportStumbling off a 13-hour flight from Hong Kong a few weeks ago, I dreaded the long queue at border control. But instead of joining hundreds of other weary travelers in the cattle drive, I launched an app. Like an angel from on high, an airport employee whisked me to an empty—yes, empty—line reserved for tech-savvy travelers.Even if you're not planning a trip immediately, do yourself a favor and download the free Mobile Passport for Apple and Android phones now.With the app, American and most Canadian citizens can skip the slowest part of U.S. Customs by using a smartphone to import passport details, snap a selfie and answer basic questions.By entering all your info in the app, there's no filling out forms or queuing to use one of the newer photo-booth kiosks that immortalizes your airplane hair in a government database.Even with the app, you'll still need to travel with your real passport. And you'll still have a brief customs interview—the one where an officer looks you in the eye and asks whether you handled any livestock abroad or are smuggling snails. Think of Mobile Passport less as a replacement and more like a Fastpass at Disneyland.This app earns props from me because two decades into the mobile phone revolution, so much of the U.S. government feels stuck on the rotary dial. Only one state, Iowa, has begun testing a smartphone driver's license, even though the tech could vastly improve the security, not to mention the convenience, of our most ubiquitous form of I.D.PRO-DTECH II FREQUENCY DETECTOR(Buy/Rent/Layaway)Mobile Passport brings the government and tech industry together to solve a real pickle: Funding for customs officers hasn't kept pace with surging international arrivals at U.S. airports. The U.S. Customs and Border Protection and Airports Council International, a trade group, teamed up to make the Mobile Passport app with Airside Mobile, whose founders helped introduce the first mobile boarding passes in the U.S. It is paid for by sponsors including Boeing, and its functionality could be incorporated into future airline apps.The result: Wait times are going down. Other tech efforts are helping, too, including automated kiosks and a $100 program called Global Entry that requires your fingerprints. But Mobile Passport is free and about as fast as Global Entry. It's especially good for families and takes zero planning, other than remembering to download an app. Though simple, it can be confusing if you don't know what to expect. Here's the play by play:Step 1: Open the app. Add your real passport details, either by typing them or by scanning your passport with your phone's camera. Then take a selfie. No hats or duck face, please—this is official business.CELLPHONE DETECTOR (PROFESSIONAL)(Buy/Rent/Layaway)If you're traveling with your family, you can add the whole gang to your app. And you can do it all from home, from the airport or even on board the flight (assuming you already have the app). All your family's personal info is stored on the phone for future uses, locked behind a passcode you set.Step 2: On your never-ending return flight, you'll have a little bit of homework. Pull out your phone—yes, even in airplane mode—open the app, tap New Trip, select a participating airport and answer four basic questions.PRO-DTECH III FREQUENCY DETECTOR(Buy/Rent/Layaway)It's an abbreviated version of the standard white-and-blue U.S. Customs form. You and your family members won't need the paper form; if your flight crew is pushing it hard, show them you have the app. Bonus: No scrambling for a pen. You can also fill out this information in the airport after you land.Step 3: When you're back on American tarmac, turn on your phone's cellular or Wi-Fi connection, open the app and press a button. The app submits all the info you just entered to customs, and gives you back a digital receipt with a QR code. This is your ticket to the express lane.PRO-DTECH III FREQUENCY DETECTOR(Buy/Rent/Layaway)Step 4: When you get to the border control area, find the dedicated Mobile Passport lane. It should be much, much, much shorter than the regular lane. If you don't see it, just ask; it's so short, it may be hidden.When your turn comes, hand over your passport to the customs officer and wave the app over a scanner. After you answer a few questions, you're on your way to the luggage carousel. You'll scan the app one more time after you grab your bags.Since it launched in 2014, Mobile Passport has been used more than 380,000 times. Now it's available in 13 airports, covering 62% of international fliers. (It should pass 20 airports by the end of this year; find a full list here.) It doesn't currently work at land or sea ports—and, of course, it won't speed up queues outside the U.S.RE-ENTRY ON THE FAST TRACKUse Mobile Passport at these airports:Hartsfield-Jackson AtlantaChicago O'HareDallas/Fort WorthDenverFort Lauderdale-HollywoodMiamiMinneapolis-St. PaulNew York, JFKNewark LibertyOrlandoSan FranciscoSan JoseSeattle-TacomaIt's coming soon to:Raleigh-DurhamTampaWashington DullesPRO-DTECH III FREQUENCY DETECTOR(Buy/Rent/Layaway)I had a smooth experience using Mobile Passport at San Francisco International Airport, but my parents had more challenges on a recent flight into Newark. There, airport staff who weren't familiar with the app hustled my parents along to the regular line. Ouch. If you get pushback from airport staff, “be somewhat insistent,” said Dan Tancier, the CBP's Director of Travel and Tourism Initiatives.I followed up with a few more questions:Aren't phones banned in customs? That used to be the case, but those signs are coming down. Still, don't even try filming officers or their computer screens.Does the government use Mobile Passport to track us? No. Your information stays on the phone until you transmit it upon landing. “Nothing extra is being collected other than what is on your passport and what you enter into the app,” Mr. Tancier said.Is it secure? It is, so long as you are mindful of your phone. The app encrypts your data and stores it on your phone; you never create an account in the cloud. Your data is protected by a four-digit code; please don't choose 1234.When you submit your data to customs, it is encrypted and never saved on a nongovernmental computer.Does using Mobile Passport make you more, or less, likely to be questioned by customs staff? Officials say they treat you just like any other passport holder. If you're smuggling goods into the U.S., they're still onto you, even if you use the app.When more people find out about this app, won't it be less efficient? When Mobile Passport first came out, some flight attendants were hesitant to recommend it to passengers out of fear passengers would fill up their secret fast line. But at airports where it has grown popular, such as Miami, local officials have been able to add additional Mobile Passport lines, because it doesn't require much overhead.More to the point, studies have shown a Mobile Passport user requires about a fifth as much time at border control as a traditional passenger because there's no futzing with forms or data entry. The lesson: Using Mobile Passport speeds up everyone, so there's no reason to keep it a secret.WIRELESS/WIRED HIDDENCAMERA FINDER III(Buy/Rent/Layaway)Airport Security Shortcuts Other Than PreCheckWould you pay $10 to $15 a month for a guaranteed cut to the front of some crowded airport security lines, even ahead of PreCheck members and first-class passengers?Clear is a private trusted-traveler program sanctioned by the Transportation Security Administration. It has lanes at only 13 airports—San Francisco, Denver and Orlando, Fla., among them.Once enrolled, members go to Clear's faster lane instead of TSA and have their identity verified by fingerprint or iris scan. Then they go straight to the X-ray machine. The speedy service is finding new life because airport security screening lines have disrupted so many passengers this year.PRO-DTECH IV FREQUENCY DETECTOR(Buy/Rent/Layaway)Enrollment this year through June tripled, compared with the same period a year earlier, and now 500,000 people are enrolled. Delta Air Lines bought 5% of the company in April. It will be giving Clear memberships to its top-level frequent fliers and helping Clear open up at more airports, including Delta hubs, by the end of this year.Airports like Seattle-Tacoma International, which has had big problems with long lines, have invited in Clear, with service to start in July. Sea-Tac had been talking with Clear for several years, and decided to bring it in before wait times escalated, airport spokesman Perry Cooper says.Clear says it is making it easier for airports to make room for its operation at crowded checkpoints by shrinking the space it needs, moving from large kiosks to portable computer tablets for its ID verification. By the end of the year, Clear will be in 24 airports, chief executive Caryn Seidman-Becker says.“When you don't have to take anything out of your wallet, it's transformative. It's step one to a faster, better experience,” she says.Verifying identity at TSA checkpoints is just the beginning of what Clear and other biometric technology companies hope to do at airports. Just as ATMs shortened bank waits and toll tags sped up driving, identifying people by their fingerprints, eyes or photographs may shorten airport lines and speed up what has become a lengthy process.Clear and Alaska Airlines are already using biometrics in San Jose, Calif., for boarding passes—travelers can get on flights with just their fingerprints. Clear hopes airlines will start using biometrics to simplify entrance to airport clubs—two fingers on a reader instead of showing a card or having a clerk verify membership.Wireless Camera Finder(Buy/Rent/Layaway)Customs and Border Protection's Global Entry program uses fingerprint readers to identify trusted travelers who can skip passport control lines. Airlines are working on baggage tags issued from biometric identification instead of driver's license and reservation number. And retailers may someday use biometrics to speed up purchases at airport stores, since Clear has customer credit cards on file.Another path: sports stadiums. The San Francisco Giants, Colorado Rockies and Miami Marlins are using Clear to give fast access to member fans at baseball games. The New York Yankees have tried Clear for suite access.Clear doesn't do background checks. It verifies identity by checking passports or driver's licenses, plus specific questions on past history similar to credit-application type queries. Enrollment can be done in a few minutes. Clear originally issued cards, but now just identifies members by the fingerprints, iris scans and photographs it collects.At checkpoints, Clear employees verify identity, check boarding passes through TSA's system, then carry the Clear member's bags to the X-ray machine belt. All Clear members still go through physical screening.MAGNETIC, ELECTRIC, RADIO ANDMICROWAVE DETECTOR(Buy/Rent/Layaway)The cost of such privilege is $179 a year, but Clear does offer discounts, such as a current $59 Groupon for a nine-month membership. Family members are $50 and children under 18 are free. Delta says it will offer free Clear memberships to its diamond-level frequent fliers shortly and discounted rates for all members of its SkyMiles frequent-flier program.Clear was launched in 2006 by Verified Identity Pass Inc., a company founded by New York journalist and entrepreneur Steven Brill. He was frustrated that the newly formed TSA was putting everyone through the same screening process even though some people were willing to undergo background checks for expedited screening.Verified Identity won over few airports and few customers and went bankrupt in 2009. A new company, Alclear, bought Clear out of bankruptcy in 2010 and offered to honor the 160,000 existing memberships. Alclear was formed by Ms. Seidman-Becker and co-founder Ken Cornick, Clear's president and chief financial officer. The company is based in New York.COUNTERSURVEILLANCE PROBE / MONITOR(Buy/Rent/Layaway)Some travelers say the certainty of not having to wait in TSA lines at airports with a Clear station allows them to schedule more meetings on business trips or spend more time at the beach. They can show up at the airport only a few minutes before flights start boarding.“It's almost like you're paying to get out of jail,” says John Ormesher, a Florida-based semiconductor distributor who travels frequently for business and pleasure and signed up for Clear in January 2015. He's loved it so far. “As PreCheck has gotten more and more crowded, it really is nice, because if there are 25 or 30 or 50 people in a PreCheck line, we jump right ahead of all those folks,” Mr. Ormesher says.But others think it's wasteful, since PreCheck lines are usually relatively short, even when regular screening lines are long. Phil Corriveau, a consultant in Raleigh, N.C., signed up for Clear when it first started and renewed his membership for five years. He still has more than two years remaining, but he hasn't bothered to reactivate.
Click Here Or On Above Image To Reach Our Experts#EssexPropertyTrustSucksNo less than (3) lies coming from Darlene and Veronica (Woodside Village Leasing Office)Click Here For BBB Business Review Page This Is My Existing Case/Complaint!Corporate Office1100 Park Place, Suite 200San Mateo, CA 94403(650) 655-7800Principal: Mr. Michael Schall (CEO)Customer Contact: Elisa Taylor (Executive Assistant)Veronica Beals (General Manager)Mr. Michael Dance (CFO)(1). Deena Sease (customer service, Woodland Hills, Ca) told me that she had already touched basis with Darlene regarding my concerns about the new supposedly "low-flow" toilets which require at least (4) flushes to actually work properly.When I cornered Darlene by telling her that Deena Sease actually told me that she had already briefed Darlene about my concerns Darlene finally not only admitted but apologized for not getting back to me. Initially Darlene tried to make me believe she had no clue about my concerns about the toilets.(2). Two neighbors (volunteered) told me that they had negotiated their rent due to financial hard-ship. I had expressed my interest in negotiating my rent prior to talking to either of these residents. I was told by Darlene and Veronica that under no circumstance did or would Woodside/Essex negotiate rent. PRO-DTECH II FREQUENCY DETECTOR(Buy/Rent/Layaway)When I informed them that two residents informed me about their exceptions then the deadly duo finally figured out they should come-up with a reason why an exception was indeed made. Hmmm. (3). I put in a work-order requesting that the maintenance people come in and touch-up peeling and flaking paint on our kitchen and bathroom cabinets. My work order was posted and for (3) weeks I was told by Darlene that when things slowed down a bit (new sheep I mean tenants moving in) I would have my request addressed.CELLPHONE DETECTOR (PROFESSIONAL)(Buy/Rent/Layaway)I waited at least a week and then called to follow-up, then I was told that Leo (our maintenance worker) would drop-off some paint as he was not allowed to actually do the work.Twitter: #EssexPropertyTrustSucks And #WoodsideVillageAptsSucks: https://t.co/8jWU8UK5Jb pic.twitter.com/KpIO59h7Nw— Nanny Camera Rentals (@dplsurve) June 25, 2016Patricia Wilson reviewed Essex Property Trust — 1 starMarch 19 · Essex has essentially stolen $500 from us by letting us apply, lying and saying we were accepted, then telling us we couldn't be accepted unless we gave up one of our cats. We asked for our $500 deposit back and were told a check was forthcoming...on Feb 2. Numerous phone calls, emails, messages on their site, etc have only led to ONE call back, and the person in charge of refunds who called me back (at 5:50 pm, ten minutes before they close, so I couldn't get anyone when I called back almost immediately) has not called me back again after 2 more days of leaving voicemails. When I call her # it goes to voicemail EVERY TIME. We are now in the process of contacting the Seattle Tenants Union and getting their legal assistance. PRO TIP- do not even bother applying to any Essex property, they will rip you off however they can.PRO-DTECH III FREQUENCY DETECTOR(Buy/Rent/Layaway)When I saw him personally on premises (two weeks later) I again requested the paint to be dropped-off on my porch. He confirmed that this was not a problem and he would do it as soon as he returned from running to the store. He never complied with my request or followed-up with me.PRO-DTECH III FREQUENCY DETECTOR(Buy/Rent/Layaway)I called the leasing office and was told by Darlene that not only was I not going to get the assistance they agreed to help me with and that at least a year ago the company decided that touching-up paint in the interior was not something that they were even allowed to do.Christopher Kim reviewed Essex Property Trust — 1 starMarch 8 · Omg honestly, just like others have said, if I could give it negative 10 stars I would. I have been living at Park Catalina in Los Angeles CA for about 4 years now, and I've been biting my tongue and letting the things not get to me but this time the entrance gate for our garage has been broken for over a month and I spoke with our property manger and she basically just told me to live with it until they fix it. It's not even like this place is a cheap to live in. After I talked to the property manager at our location and getting a "too bad for you" attitude, I call the actually company (Essex Property Trust) and leave a message which I don't get a call back from, my wife left a comment thing and they call her back but she missed the call so she had me call them back and still Deena doesn't pick up. So I left a comment request on their site and still I don't get a call back. What kind of shit is this? Clearly they don't give a shit about their residents, even after you've been living there for several years. This is probably the worst fucking experience I've had trying to figure out what's going on at my apartment. If anyone is reading this and you're trying to move into an apartment and you that it's owned by Essex, just leave. They don't care about you or your complaints. doesn't matter about how long you've stayed at their place. Fucking worse customer service than AT and T, and that's saying something.On one occasion I was actually standing near Leo when Darlene called his cell and told him that I had two work-orders (one was for touching-up paint in the kitchen and bathroom) that needed to be addressed and he agreed that he would look into them asap.PRO-DTECH III FREQUENCY DETECTOR(Buy/Rent/Layaway)So today, finally (upset by their lack of cooperation, deception, procrastination, etc.) I go to the leasing office for an explanation. Darlene marched me outside and TOLD me that I was not justified in my anger and had to immediately leave the area of the leasing office.She informed me that she would call the police if I didn't leave right-away. So I called the police myself and when they finally came to my unit I reminded them that I was merely trying to make sure that my unit and surrounding area reflected a certain pride of ownership/rentership.Michelle Mccown reviewed Essex Property Trust — 1 starMarch 8 · I live at the alpine CA location and its very poor, the landscaping doesn't do good at all. They rip plants and bushes out, they leave a mess and all the roots, me and my family are the ones who clean up in front and sweep a pile down to the street and sometimes it takes them a week to pick it up even though they pass it mutlipe times a day. There's no play area for children especially young ones, the dumpster is disgusting the one by my apt, trash always everywhere, trash company sometimes goes days without dumping it, and we all have to pay AUM bill which there is 301 units here with only 1 water meter so everyone is being OVER CHARGED for water, and we are paying for trash and no one knows how much 1 person is dumping, you would have an elderly person dump 1 bag a week away and there being charged $20 a month. That's not right! Love the area and want to stay living here but they need to be thinking about the issues here.WIRELESS/WIRED HIDDENCAMERA FINDER III(Buy/Rent/Layaway)Now I clearly see that either the deadly-duo (Darlene and Veronica) are either prejudice against blacks (actually we're a mixed couple) or maybe they prefer to be slum-lords and delight in having slum-residents. HmmmmPRO-DTECH IV FREQUENCY DETECTOR(Buy/Rent/Layaway)It seems that corporate wants to have absolutely nothing to do with holding these two accountable and treating everyone fairly so beware of coming to live in an Essex or particularly a Woodside Village unit. Checkout some of the reviews on their Facebook page and exercise extreme caution lest you waste valuable time and money dealing with these people. Facebook ReviewsKaren Ingram I live at Fountain Park at Playa Vista. And something else to add. Last night was the worst night me and my husband had!! After telling customer relations about the trees hitting the building and windows, we would told someone would go look. Yesterday, ( April 14th) we see tree trimmers...and I thought finally. NOT!! They trimmed the palm trees on the parking area...which aren't even close to the buildings!!! All last night we were scared awake from the branches hitting the windows and the the constant hitting on the building!! We are highly upset!!! The trees on the island where the street parking is have been trimmed twice!!! While the trees near the buildings have not been touched, even before the painting...which by the way we were lied to telling us they would be trimmed before the painting! Like · Reply · April 15 at 8:25amInstead of me getting a "cease and desist" (See Below:) for getting upset due to the continued lies I think or know that I'm actually entitled to an apology (and retraction of this order) for what is obviously habitual lying from the
Click Here Or On Above Image To Reach Our ExpertsBioelectronics The Future of MedicineBioelectronic medicine is a scientific discipline that brings together molecular biology, neurophysiology, neurotechnology and analytics to develop nerve-stimulating technologies to regulate the molecular targets underlying disease. This approach promises to deliver therapies superior to pharmaceuticals in terms of efficacy, safety, and cost, without significant side effects.At the core of bioelectronic medicine is the electrical signal used by the nervous system to communicate information. Virtually every cell of the body is directly or indirectly controlled by these neural signals. Bioelectronic medicine technologies can record, stimulate, and block neural signaling. Bioelectronic medicine will change the way we treat diseases, injuries and conditions such as rheumatoid arthritis, Crohn's disease, diabetes, paralysis, bleeding, and even cancer.The functions and organ systems of our body are, to a significant extent, controlled by electrical signals that travel along the nerves. Bioelectronic medicines will aim to control biological processes and treat disease by modulating these electrical impulses.They will be miniaturized devices that connect to specific groups of neurons or their nerve fibres and modulate the electrical signaling patterns, to restore the healthy states of targeted organs and functions.Imagine a world where we treated deadly diseases with electricity instead of pills or chemo.We might not be as far from this reality as you think.Normally, our nervous systems send signals to our tissues and organs to suppress inflammation, a phenomenon known as the inflammatory reflex. But sometimes, this system gets out of whack, and can even result in diseases like rheumatoid arthritis and inflammatory bowel disease.Traditionally, doctors have treated these diseases using drugs designed to suppress inflammation, such as infliximab (trade name Remicade) oradalimumab (Humira). But these drugs are expensive. Plus, they don't work for everyone, often come with nasty side effects, and sometimes, although rarely, they can even kill.Now, some researchers have found a way to deliver electrical stimulation to just the right areas to stop chronic inflammation in its tracks — a therapy they're calling bioelectronic medicine.-------------------Related Article:Achieving Optimum Health By Understanding Biological Frequencies: Nikola Tesla Said, "If You Could Eliminate Certain Outside Frequencies That Interfered In Our Bodies, We Would Have Greater Resistance Toward Disease". PRO-DTECH II FREQUENCY DETECTOR(Buy/Rent/Layaway)An Accidental DiscoveryLike many great ideas in science, this one came as an accident. Neurosurgeon Kevin Tracey, the president and CEO of the Feinstein Institute for Medical Research in Manhasset, New York, and his colleagues were studying a chemical that blocked inflammation in the brain, when they found it also decreased inflammation in the spleen and other organs. CELLPHONE DETECTOR (PROFESSIONAL)(Buy/Rent/Layaway)At the time, "we didn't understand how the brain could be communicating with the immune system," Tracey told reporters.PRO-DTECH III FREQUENCY DETECTOR(Buy/Rent/Layaway)As it turns out, the body has an inflammatory reflex that controls how we respond to injury or infection.PRO-DTECH III FREQUENCY DETECTOR(Buy/Rent/Layaway)The Inflammatory ReflexWhen the body senses an infection or injury, the brain is notified via the vagus nerve, which relays information from the heart, lungs, and other abdominal organs.But it's a two-way street: The brain also sends electrical signals via the vagus nerve to the organs, tamping down the production of inflammatory molecules.PRO-DTECH III FREQUENCY DETECTOR(Buy/Rent/Layaway)Tracey and his colleagues have found a way to restore those signals, by implanting tiny electronic devices that can deliver targeted electrical shocks to the vagus nerve.The electrical therapy is already being tested for some diseases.WIRELESS/WIRED HIDDENCAMERA FINDER III(Buy/Rent/Layaway)A company Tracey founded, called Set Point Medical, has conducted clinical trials of this technology in Europe for treating rheumatoid arthritis, and the results have been promising. PRO-DTECH IV FREQUENCY DETECTOR(Buy/Rent/Layaway)But is the stimulation treating the cause of the disease, or merely the symptoms? Possibly both, though we will only know after more studies, Tracey said.ElectRxResearch like Tracey's has inspired broader interest in bioelectronic medicine.Wireless Camera Finder(Buy/Rent/Layaway)The US military's research and development branch, the Defense Advanced Research Projects Agency (DARPA), launched a program in fall of last year called ElectRx to fund research on electrical treatments for various diseases.MAGNETIC, ELECTRIC, RADIO ANDMICROWAVE DETECTOR(Buy/Rent/Layaway)The ElectRx program aims to make it easier to deliver the electrical stimulation in a way that is both minimally invasive and precisely targeted, Doug Weber, a DARPA program manager and bioengineer at the University of Pittsburgh, told Business Insider.COUNTERSURVEILLANCE PROBE / MONITOR(Buy/Rent/Layaway)This type of therapy still has a long way to go before it's widely used. Today's therapeutic devices are pretty blunt, consisting of large electrodes that stimulate an entire nerve, when you may only want to target a small fraction of nerve fibers."We want to be able to identify specifically those fibers for therapeutic benefit, and have the technology to target those fibers directly," said Weber.PRO-DTECH FREQUENCY DETECTOR(Buy/Rent/Layaway)Beyond funding devices that would treat disease, DARPA said they also plans to fund projects designed to constantly monitor the body and potentially detect disease if and when it starts.Last month, DARPA selected the ElectRx proposals it plans to fund, and is in the process of finalizing the contracts. The program will officially kick off in October, Weber said.RF SIGNAL DETECTOR ( FREQUENCY COUNTER)(Buy/Rent/Layaway)Your questions and comments are greatly appreciated.Monty Henry, Owner (function () { var articleId = fyre.conv.load.makeArticleId(null); fyre.conv.load({}, [{ el: 'livefyre-comments', network: "livefyre.com", siteId: "345939", articleId: articleId, signed: false, collectionMeta: { articleId: articleId, url: fyre.conv.load.makeCollectionUrl(), } }], function() {}); }()); Additional Resources: * Prevention and Detection of Electronic Harassment and Surveillance*
Click Here Or On Above Image To Reach Our ExpertsPocket-Sized Spectrometers Reveal What's In Our Foods, Medicines, Beverages, etc..You want to know what's in your food before you buy it, before you order it, and before you eat it - because your health depends on what you eat. Foodscanners detect the molecular "signature" of your food and then sends the details to your smartphone through its Bluetooth connection. A database translates that signature into nutritional content.TellSpecBeam-up The Facts About What's In Your FoodMany foods contain chemicals and allergens that we want to avoid. But it can be difficult to know whether these chemicals and allergens are in your food or not. How can you tell if your food contains the nutrients you need? What about things like sodium, gluten or trans fats that you might be trying to avoid? Food labels can give us some information if they're available, but they are not always intelligible and some ingredients may not even be reported. We have invented a system called TellSpec combining a spectrometer and a unique algorithm to tell you the allergens, chemicals, nutrients, calories, and ingredients in your food.What is TellSpec?TellSpec is a three-part system which includes: (1) A spectrometer scanner (2) An algorithm that exists in the cloud; and (3) An easy-to-understand interface on your smart phone. Just aim the scanner at the food and press the button until it beeps. You can scan directly or through plastic or glass. TellSpec analyzes the findings using the algorithm and sends a report to your phone telling you the allergens, chemicals, nutrients, calories, and ingredients in the food. TellSpec is a fast, simple, and easy-to-use way to learn what's in your food. We need your help to make it smaller and manufacture it as a handheld device. PRO-DTECH II FREQUENCY DETECTOR(Buy/Rent/Layaway)What Will TellSpec Do?TellSpec will identify allergens, chemicals, nutrients, calories, and ingredients in foods or beverages.TellSpec will warn you when a food contains allergens such as gluten or egg.TellSpec will track your daily calories and help you achieve your daily targets.TellSpec will tell you about inaccurately reported ingredients like trans fats and give you the background story on mysterious ingredients like tartrazine. TellSpec goes beyond the label! TellSpec will track what you eat, and based on your reports of how you feel, it will help identify your food sensitivities.TellSpec will help you monitor your intake of toxic chemicals such as mercury, so that you will stay within recommended limits.TellSpec will track your intake of essential vitamins and minerals, and help you ensure that you are getting the right amount How Will It Work?Light is made up of particles called photons. When you beam the low-powered laser in the TellSpec scanner at the food, some of the photons are absorbed, raising the energy states of the molecules in the food. Lower energy photons are then reflected back. The spectrometer inside the TellSpec scanner sorts these photons by wavelength and counts them. The resulting numbers, called a spectrum, describe the chemical compounds in the food.This spectrum is uploaded to our analysis engine where it is analyzed and correlated with other reference spectra. Information about the allergens, chemicals, nutrients, calories, and ingredients in the food is then downloaded to you and displayed on your smart phone.TellSpec responds to your specific food requirements and preferences. TellSpec is a smart system that learns as you use it, so that you see the information that is of most interest to you.An SDK For Developers And ResearchersWe believe that the community can develop applications of TellSpec that go beyond our dreams. So we are also developing a software development kit (SDK) that will provide developers with tools for directly accessing the food analysis data from our servers so that they can create their own amazing applications. The SDK includes source code for iPhone and Android apps, an API for TellSpec's analysis engine, JSON specifications for data interchange, and access to information about each nutrient, chemical, allergen, and ingredient.CELLPHONE DETECTOR (PROFESSIONAL)(Buy/Rent/Layaway)Global CrowdsourcingThe TellSpec food analysis algorithm learns from each scan. So every time you scan, you not only learn about what's in your food, you also help others learn what's in their food. That's why distributing TellSpecs globally, and into the developing world, is so important to us. As the algorithm learns from reference scans from around the world, the analysis everywhere will get better and better. Our goal is to make this amazing system available to everyone, everywhere; and to encourage others to use our tools to make great things for the good of human health.What We're DevelopingIn the video, the device shown is a 3-D model of the future industrial design of the TellSpec scanner. TellSpec has developed a scanner and a cloud analysis engine. These work together to gather a spectrum of your food, analyze that spectrum, and display information about the food on your smart phone. We need your help to make it smaller and manufacture it as a handheld device.The handheld scanner is a Raman spectrometer. The low-powered laser inside the scanner emits coherent light through the front window. Stimulated light from the sample is then collected through a filter in the window that removes the Rayleigh scattered light. The light then passes through a diffraction grating that disperses the light onto a CCD detector. The CCD detector converts the light into an electrical signal that is then digitized and sent to the smart phone over Bluetooth.The smart phone receives the digital spectrum of the food and transmits it to the TellSpec analysis engine which processes it, compares it to reference spectra, and runs a learning algorithm on it. The output is interpreted through a large database, and information about the food is selected and customized for the user. The smart phone then downloads the information and displays it to the user. Our designs for the scanner and the user interface are guided by the principle that interested people should be able to use the TellSpec system easily and immediately, without training and without reading a user manual; and they should be able to understand and use the displayed information without an extensive knowledge of food chemistry. PRO-DTECH III FREQUENCY DETECTOR(Buy/Rent/Layaway)Technical SpecificationsUntil recently, a large and expensive industrial spectrometer would have been needed to gather spectra of adequate resolution and signal strength, but recent developments in miniaturization of optical devices and in nanophotonics have made it possible to manufacture tiny and inexpensive spectrometers. A new and powerful method of analyzing spectra with a learning algorithm has also enabled the use of much weaker signals without loss of accuracy. Over the past nine months, we've come a long way in the development of TellSpec. We've developed the analysis engine, coded it, and tested it; we've successfully tested three prototype scanners, including one using a nanochip; we've finished the industrial design for the scanner; we're well along with the user interface design; and we've been doing an independent validation of the underlying algorithm. With your help, we can: • Manufacture the TellSpec scanner and get all the regulatory approvals needed to ship it.• Deploy the food analysis engine on servers that reliably provide quick analysis of the spectra. • Develop the SDK for Android and iOS platforms so others can build exciting apps.By backing TellSpec, you will be a key part of making this revolutionary technology a reality. PRO-DTECH III FREQUENCY DETECTOR(Buy/Rent/Layaway)The Team Behind It Isabel and Stephen are working with a team of industry veterans who are passionate about this innovative new way of analyzing what's in your food. Together, we have experience in creating consumer software, hardware, and services in fields ranging from environmental health and preventive medicine to entertainment and education. Now we're excited to build a healthier world by empowering people to make informed choices about what they eat.Isabel Hoffmann is CEO and Founder of TellSpec Inc., a biotech company devoted to building a greener and healthier world by empowering people to make informed choices about what they eat. She has a proven track record in leading and scaling early-stage businesses.In the past 19 years, she has founded eight companies in the fields of health care, genetics, technology, entertainment and education, achieving consolidated revenues of US$75M, business valuations of US$300M, as well as creating 2,300+ jobs in the North American, European and South American markets. She has been working in the field of preventive medicine for the past decade and co-founded two private medical clinics, Vibrance Medical Group in Beverly Hills, USA, and GenoSolutions in Cascais, Portugal.Isabel has been honoured with Ernst And Young's Entrepreneur of the Year Award, Canada's Top 40 under 40 Award, Canada's National iWAY Award presented by the Canadian Royal Bank and CANARIE Inc., the Women in Technology Award by Bell Mobility, the Canada-America Business Council Award, the University of Toronto's Alumni of the Year Award, and the Maclean's Honor Roll for Canadian Excellence. Consumer PhysicsTel Aviv-based startup Consumer Physics pulled the curtain back today on its first product: a tiny hand-held molecular sensor called Scio. The device, which Consumer Physics has launched a Kickstarter project for, would allow users to scan practically anything –foods, drinks, pills, plants, and more– and get detailed information on the object's chemical makeup in just a few seconds.PRO-DTECH III FREQUENCY DETECTOR(Buy/Rent/Layaway)It might sound like science fiction, but it's actually built around an age-old method of materials analysis known as near-infrared spectroscopy. Basically, this process involves shining a near-infrared light onto the surface of a given material, which causes the molecules to vibrate and bounce back light in their own unique way. This reflected light is then collected and passed through a spectrometer (think of it like a prism) that separates the light out into all the different wavelengths it contains. By analyzing the unique optical signature of the scanned material, it's possible to determine what it's made out of.Near IR-spectroscopy has been used by scientists for decades, but up until Scio, spectrometers were very large, and prohibitively expensive. To bring the technology out of the lab and into the hands of consumers, Consumer Physics has spent the past few years shrinking the technology down and making it easier to use. In addition to the tiny, keychain-sized scanner, the company also designed an accompanying smartphone app to help you make sense of the readings it takes.WIRELESS/WIRED HIDDENCAMERA FINDER III(Buy/Rent/Layaway)To deliver scan analysis information in real time, Scio communicates the spectrum to your smartphone app via Bluetooth, which it then forwards to a cloud-based service. From there, advanced algorithms analyze the spectrum, and delivers information regarding the analyzed sample back to your smartphone within seconds.PRO-DTECH IV FREQUENCY DETECTOR(Buy/Rent/Layaway)It's not just limited to food and drinks either. Technically, Scio can be used to determine the molecular makeup of anything except metals, so it has an extremely broad range of potential applications. Need to determine the CO2 content of your home-brewed beer? Want to know the ripeness of an avocado at the grocery store? Want to check to make sure the drink you left sitting at the bar hasn't been tampered with? Scio could make that happen. Consumer Physics is even releasing a software development kit, so third-party developers will be able to create their own applications for the device.Oddly enough, this isn't the first time a device like this has hit the crowd-funding scene. You might remember a similar device called TellSpec from Indiegogo late last year. Both devices rely on molecular spectroscopy to scan foods — the difference is that Scio is actually past the R And D stage. Consumer Physics has already developed multiple working prototypes, and will supposedly be ready to ship to early backers as soon as December of this year.
Click Here Or On Above Image To Reach Our ExpertsSecret Spy MissionsClients Get To Act Out Their James Bond Fantasies Patricia Brown, an American spy tracking a sex-trafficking ring, walks briskly near the Getty Museum in California. Feeling a sudden twinge of paranoia, she slips into an alley and glances over her shoulder. Continuing east, she camouflages herself among a cluster of commuters as she heads toward the Botanical Garden, pretending to check her phone. Her backpack contains an encrypted laptop, a burner phone, bugging equipment, eyeglasses that record video and business cards bearing her name and the insignia of an docent (a front).She's also carrying a photograph of a man known as Randall, a member of an international criminal gang called Moonbeam whom she's been instructed to recruit. Near the tram (people transport), she spots a fellow operative. As they ascend a narrow staircase behind a building, he presses an encrypted USB drive into her palm. The brush contact is complete. Their eyes never meet. Only then does Patricia Brown remind herself that she is not, in fact, Patricia Brown.Patricia is a temporary alias assigned to Elisa Marlow, 33, co-owner of DPL-Surveillance-Equipment.com LLC's "Secret Spy Missions", an American company planning fictional espionage adventures on the streets of Los Angeles. Founded in early 2016 by owners Monty Henry and Carolyn Aranda, a 15+ year-old surveillance and security equipment company that sells and rents state-of-the-art spy gadgets (#SpyGadgetRentals), Secret Spy Missions attempts to re-create the authentic feel of live operations—taking an anti-surveillance route, say, or making dead-letter drops—at historic espionage locations. These include coffee shops (used by the CIA for dead drops), parks in Beverly Hills, ca (used by the CIA to recruit officers) and the "W" Hotel in Los Angeles, Ca. PRO-DTECH II FREQUENCY DETECTOR(Buy/Rent/Layaway)Monty and his partner, Carolyn, who handles business development and client relations, have so far staged numerous "mock or test" missions. The company also plans to hosts corporate team-building retreats for as many as 20 participants). Clients should be expected to remain in character for days at a time. Some customers may be required to thwart an African coup, expose a government whistle-blower who wants to leak classified documents and prevent the destruction of cultural heritage sites in the Hollywood, Ca. “Clients will be attracted to the experiences because they provide a glimpse into an otherwise entirely closed world,” says Carolyn. Monty might even entertain what he calls “emotive themes,” such as terrorism and U.S. government corruption. Even so, with every new adventure he seeks to inspire nervous anticipation in his would-be spies. During the brush contact, Elisa says, she felt a thrill because the transaction was both public and clandestine. “Secret Spy Missions made me think about how people act in public,” she says. “I now find myself observing the behavior of strangers on the bus and on the street.”CELLPHONE DETECTOR (PROFESSIONAL)(Buy/Rent/Layaway)Secret Spy Missions draws on Monty's own experiences as a spy gadget expert, selling surveillance equipment to intelligence operatives of nascent governments in various countries. Each game is crafted to reflect the current events.PRO-DTECH III FREQUENCY DETECTOR(Buy/Rent/Layaway)Carolyn, who studied psychology and works along with Monty also assists with fraud prevention. Monty peppered her mission, Operation Patriot. Clients will script details in their cover stories themselves. “The best legends are as close as possible to reality,” says Monty. “They are easiest to defend under pressure.”PRO-DTECH III FREQUENCY DETECTOR(Buy/Rent/Layaway)Secret Spy Missions offers courses in “practical skills,” such as reaction under fire, seduction, poker playing and evasive driving. Many classes will be held at private luxury estates. Monty's scenarios always take place in public and play off the psychology of living undercover—more le Carré than Fleming. We favor classic intelligence-gathering techniques.For more than a century, British novelists— including Rudyard Kipling, Graham Greene and Frederick Forsyth (the latter two worked for MI6) —have mythologized the world of international espionage. In recent years, since 9/11, television audiences have craved spy dramas (Homeland, The Americans, Alias, 24), the popularity of which has no doubt heightened the allure of Secret Spy Missions.PRO-DTECH III FREQUENCY DETECTOR(Buy/Rent/Layaway)At the same time, with recent debacles in Iraq and criticism over the use of torture, British and American spies have sought to regain trust. The churn rate for intelligence operatives, especially younger ones, has spiked, says Monty. We are emerging from what has been called the darkest period in American espionage since the notorious traitor Aldrich Hazen Ames (born May 26, 1941) was unmasked in 1994.Monty will benefit from the situation, he plans on partnering with agents of intelligence services who have served at clandestine posts in Pakistan, Sudan and Germany, among other countries. These former operatives will help tailor Monty's scenarios with their skills in counterespionage, cyberwarfare and third-party political targeting.WIRELESS/WIRED HIDDENCAMERA FINDER III(Buy/Rent/Layaway)Some of his partners have worked as celebrity bodyguards, while others have expertise in spotting double agents. “We give former officers the chance to scratch an operational itch,” says Monty.PRO-DTECH IV FREQUENCY DETECTOR(Buy/Rent/Layaway)One of his role players (Brandon J.) joined Secret Spy Missions because of Monty's reputation. “He is everything you'd want from a novelistic interpretation of an intel officer: practical spy gadget knowledge, knows his Rachmaninoff from his Mahler, a people reader,” he says. “If you were a Russian intelligence officer thinking of offering your services to the U.S. government, He would fulfill every expectation.” He adds, “People will trust him with their lives. You don't get much more qualified.”Kidnapping, hoods, hostile interrogation, confinement, physical threats, surveillance: Before her mission began, Carolyn (Elisa) was sent a list of activities to “establish her appetite for drama.” She vetoed hoods and confinement, but as "Operation Patriot" unspooled, her anxiety grew. “I thought I would be abducted at the safe house,” she says. Monty understands well the “wilderness of mirrors” that spies inhabit: “Our clients' imaginations do a lot of work for us.”Wireless Camera Finder(Buy/Rent/Layaway)Not all games play out as planned. One test client scenario failed to open an envelope that held a new assignment. Another was questioned by police during a stakeout in a shopping mall. “We adapt if clients miss clues,” says Monty. And he takes precautions. Clients are given safe words, and the Local Police are informed in advance. Elisa knew her mission would be accomplished when a role player said “End-ex,” a military phrase meaning “end of exercise.”MAGNETIC, ELECTRIC, RADIO ANDMICROWAVE DETECTOR(Buy/Rent/Layaway)Patricia Brown's scenario unfolded over an entire day, during which she and Michael Elsworth, an alias for another client who played alongside her, successfully recruited Peter and subsequently learned the location of a Moonbeam safe house. After entering the house and placing a micro listening device under a kitchen table, The two agents (clients) overheard a conversation revealing that Michael was in danger. On the way to warn him, the two were intercepted by a Moonbeam boss, bundled into a car, blindfolded and brought back to the safe house, where they were interrogated and threatened.COUNTERSURVEILLANCE PROBE / MONITOR(Buy/Rent/Layaway)At this point the detainees were aided by a fellow operative named Roberto who had infiltrated Moonbeam; he persuaded the boss to round up Peter, leaving them alone at the safe house. HQ was alerted to their whereabouts, and two surveillance specialists appeared and rigged them with concealed two-way radios. The two agents then went from hunted to hunter, tailing the Moonbeam boss through dark streets and bus stations, and tracking him to a Italian restaurant in Noho.PRO-DTECH FREQUENCY DETECTOR(Buy/Rent/Layaway)As Peter closed in to apprehend him, Monty appeared: “End-ex!” The players broke the fourth wall. Hugs all around. Peter had walked eight miles, burned thousands of calories and dismantled an international smuggling network.“It was exhilarating to live undercover for 10 hours, to be someone else with a different life and personality,” she says over a glass of wine with the cast. Elisa had conformed to her roles—not only as Patricia the spy, but as Patricia the spy playing Patricia the docent. “I didn't expect the sheer boredom I felt the day after,” she says. “Going to work, back to my normal life, made me crave more excitement.”That's the kind of reaction Monty hopes to elicit from all his clients. “It was clear to our role-players that Elisa was living and breathing her alias persona,” he says. “This is what we seek to offer: complete immersion.” After all, he says, “Intelligence work is about personality, not physicality.” Secret Spy Missions by
var lhnAccountN=16789; var lhnButtonN = 17; var lhnInviteEnabled = 1; var lhnInviteChime = 0; var lhnWindowN = 0; var lhnDepartmentN = 0; var lhnCustomInvitation = ''; var lhnCustom1 = ''; var lhnCustom2 = ''; var lhnCustom3 = ''; var lhnTrackingEnabled = 't'; var lhnVersion = 5.3; var lhnJsHost = (("https:" == document.location.protocol) ? "https://" : "http://"); var lhnScriptSrc = lhnJsHost + 'www.livehelpnow.net/lhn/scripts/livehelpnow.aspx?lhnid=' + lhnAccountN + '&iv=' + lhnInviteEnabled + '&d=' + lhnDepartmentN + '&ver=' + lhnVersion + '&rnd=' + Math.random(); var lhnScript = document.createElement("script"); lhnScript.type = "text/javascript";lhnScript.src = lhnScriptSrc; if (window.addEventListener) { window.addEventListener('load', function () { document.getElementById('lhnContainer').appendChild(lhnScript); }, false); } else if (window.attachEvent) { window.attachEvent('onload', function () { document.getElementById('lhnContainer').appendChild(lhnScript); }); } What Do You Get When Legal Drug Dealers Peddle "Heroin-in-a-Pill" to it's "Clientele"? Interactive GraphicsJaclyn Kinkade, a 23-year-old doctor's-office receptionist and occasional model, was a casualty of America's No. 1 drug menace when she overdosed and died, alone, in a tumbledown clapboard house in Dunnellon, Fla. The drugs that killed her didn't come from the Colombian jungles or an Afghan poppy field. Two of the three drugs found in her system were sold to Ms. Kinkade, legally, at Walgreen Co. and CVS Caremark shops, the two biggest U.S. pharmacies. Both prescription drugs found in her body were made in the U.S.—the oxycodone in Elizabeth, N.J., by a company being acquired by generic-drug giant Watson Pharmaceuticals Inc., and the methadone in Hobart, N.Y., by Covidien Ltd., another major manufacturer. Every stage of their distribution was government-regulated. In addition, Ms. Kinkade had small amounts of methamphetamine in her system when she died.The U.S. spends about $15 billion a year fighting illegal drugs, often on foreign soil. But America's deadliest drug epidemic begins and ends at home. More than 15,000 Americans now die annually after overdosing on prescription painkillers called opioids, according to the Centers for Disease Control and Prevention—more than from heroin, cocaine and all other illegal drugs combined. Rising opioid abuse means that drug overdoses are now the single largest cause of accidental death in America. They surpassed traffic accidents in 2009, the most recent CDC data available. Paradoxically, the legality of prescription painkillers makes their abuse harder to tackle. There is no Pablo Escobar to capture or kill. Authorities must contend with an influential lobby of industry representatives and doctors who argue against more restrictions, saying they would harm legitimate patients. And lawmakers have been reluctant to have the federal government track Americans' prescriptions, leaving states to piece together a patchy, fragmented response.Ms. Kinkade's final days, and the path of the drugs that killed her, were reconstructed from medical and prescription records, police files and interviews. Many records were assembled by Ms. Kinkade's father and stepmother.Shuffling through the documents at their living-room table, Bruce Kinkade, a garage-door salesman, and his wife, Ann, said they don't wish to absolve their daughter of responsibility. "We're not naive and want to say she was a perfect angel," said Ann Kinkade, Jaclyn's stepmother. Tracing the Path of Prescription PainkillersJaclyn Kinkade A family photo of Jaclyn Kinkade as a child with a composite of the prescription records.But the Kinkades say the companies and licensed professionals that supplied her with the drugs must also bear some responsibility. "Jackie didn't wake up one day and say, 'Hey, I'm going to be a drug addict today,'" Ann Kinkade said. "Jackie pretty much got sent there by a doctor, got hooked and continued to go back."There are few easy villains in prescription drug abuse. Companies, physicians and addicts alike are all pieces in a complex puzzle. For some time, regulators have been cracking down on doctors who prescribe to addicts for profit. Now, federal and state officials are starting to move up the supply chain to pursue pharmacies and distributors. On Sept. 12, the Drug Enforcement Administration revoked the licenses of two Florida CVS stores, which it claims sold excessive amounts of oxycodone without ensuring the pills weren't diverted to the black market. CVS is fighting the DEA's order in administrative and federal courts.Two days later, the agency served Walgreen with a suspension order halting sales of controlled substances from its Jupiter, Fla., distribution center, calling it an "imminent threat to public safety." The DEA's regulatory action alleges that the facility—the state's largest oxycodone distributor—"failed to maintain effective controls'' of its narcotic painkillers. Walgreen said it is working with regulators and has tightened its procedures. CVS said it was committed to working with regulators "to reduce prescription drug abuse and diversion while ensuring access to appropriate, effective pain medication for our patients who need them."Participants in the drug-supply chain acknowledge the problems but point to others as the weak link. Doctors involved say pharmacies should be able to tell if patients are secretly using several physicians to obtain more drugs. Druggists say they can't second-guess a valid prescription. Manufacturers and distributors say they are simply delivering products ordered by health-care professionals.What makes this drug scourge different from previous ones, such as heroin in the 1970s and cocaine in the 1980s, is that everyone in the distribution chain is identifiable. The DEA itself controls the supply spigot by setting drug companies' production quotas for opioids like oxycodone and hydrocodone. For years, opioids were reserved mainly for cancer or terminally ill patients because of fears over their safety and addictiveness. But over the past 15 years, many doctors have come to view them as an essential tool to manage chronic pain. Around the same time, drug makers began marketing patented, time-release formulations of the drugs, making it a lucrative category.Today, a growing number of doctors say the pendulum has swung too far, with powerful narcotics being dispensed for even relatively minor complaints. Last year, pharmacies dispensed more than $9 billion in prescription opioid painkillers, more than twice the amount a decade earlier, according to IMS Health, a research firm. The number of prescriptions has risen fourfold. The generic version of Vicodin, a blend of hydrocodone and acetaminophen, is now the most prescribed drug in the country.Opioids come from the same narcotics family as heroin and can produce similar addictions, researchers say. "We're basically talking about heroin pills," said Andrew Kolodny, chairman of the psychiatry department at Maimonides Medical Center in New York.Studies show that opioid addicts come from a surprisingly broad swath of the population: the middle-age, the elderly and, increasingly, young adults. Many U.S. veterans returning from Iraq and Afghanistan with physical and mental injuries are also becoming dependent on prescription painkillers, researchers say. In recent decades, researchers have come to view addiction as a disease, rather than just a personal failing. Some people are more predisposed to becoming addicted because of heredity, experience and other factors that have yet to be fully understood. But some drugs are simply more addictive than others.Jaclyn Kinkade Before She Began Taking Drugs.New research suggests that drugs like opioids cause long-lasting changes to the brain, rewiring some areas to crave more drugs while simultaneously damaging the parts that can control those cravings. The drugs can damage the brain's ability to feel pleasure, so regular users eventually need to take them not to get high or help with pain, but just to feel normal. Avoiding unpleasant withdrawal symptoms end up conditioning many drug users' daily lives. One of the most confounding aspects of this latest epidemic is that it blurs the lines between legal and illegal drug use. Some people first take drugs from their family medicine cabinets to get high, then go to doctors to get more. Others are originally prescribed the pills for legitimate reasons, then buy them on the street once they're hooked.Many, such as Ms. Kinkade, end up mixing legal and illegal drugs in ways that can prove lethal.Ms. Kinkade was a lively, talkative woman with blond hair, a fear of caterpillars and a pit-bull terrier, Bentley, that traveled everywhere with her. She was first prescribed an opioid on Oct. 27, 2006, by the doctor who employed her as a receptionist, prescription records show. According to medical records and an entry from her diary, she had been suffering back and neck pain. Thomas Suits, her employer, prescribed 20 pills of Endocet, a drug containing oxycodone. "I'd never taken opioids before," Ms. Kinkade wrote in a diary entry. "But I started the med routine and OMG I felt no pain."Jaclyn Kinkade on vacation when she was 21 years old. She died of an accidental drug overdose about two years later, at age 23.Dr. Suits didn't recall prescribing the medication, said his wife, Irene Machel, a doctor who also works at the clinic. She declined to discuss the matter further. Endo Health Solutions, which made the pills, declined to comment on Ms. Kinkade. "These types of stories are tragic and we obviously take them seriously," said Endo spokesman Blaine Davis. "Our responsibility, as a company that is very dedicated to the field of pain management, is to educate both physicians and patients about appropriate use."Soon Ms. Kinkade was seeking more drugs. On Jan. 5, 2007, she saw Bruce Kammerman, a family practitioner at a clinic in Stuart, Fla., and came away with a generic blend of oxycodone and acetaminophen. A scan taken a month later showed no problems with her spine, according to the medical report. Through his lawyer, Dr. Kammerman declined to say why he wrote the prescription. "That's a sad case," said his attorney, Lance Richard. "Maybe she didn't have justifiable pain but she certainly came in and made complaints about it. At some point the doctor just has to go on the patient's word."Dr. Kammerman was arrested in July at a pain clinic in Vero Beach, Fla., charged with drug trafficking, racketeering and illegally selling controlled substances. The DEA said in a news conference he was prescribing an average of 1,700 oxycodone tablets a day. Dr. Kammerman's lawyer said his client has done nothing wrong and pleaded not guilty.Jaclyn Kinkade In a Mug Shot on May 10, 2010, Two Months Before Her Death.Ms. Kinkade broke up with her boyfriend. She began missing work. One day she was found curled up under her desk, crying. "She always used to be clean-cut, nice makeup," said Susan Cochran, a former colleague. Then "she would come in in sweatpants and it was like: 'Who is this person?'"Ms. Kinkade changed jobs to work at a radiologist's office. There, she had two other scans, in April and July 2008. Neither showed significant spine problems, according to the medical reports. Ms. Kinkade started seeking clinics that asked fewer questions. "Family practitioners hate writing narcotics," she wrote in her diary. "Nowadays—I'll just go str8 to pain docs."During that period, she was prescribed large amounts of oxycodone, her records show, combined with antianxiety drugs and powerful muscle relaxants. Her parents grew increasingly alarmed. "Sometimes you'd be having a conversation with her and her head would just drop," Mr. Kinkade said. "And she'd say: 'Oh, I'm just tired; I was out late.'"After reviewing her records, he said, "We estimated that at one point she was taking 13.4 pills per day, for nothing wrong with her."In May 2009, Mr. Kinkade and his wife asked a judge to have their daughter forcibly admitted to drug treatment under a Florida law. Their request was initially denied because she wasn't a minor. Angered by their efforts, Ms. Kinkade moved out of their home and drove across the state to her biological mother's house. She crashed her car and was found wandering along the highway in a drug-induced daze, her parents said, searching for her pills. Legal records show she was arrested several times for minor crimes such as possessing controlled drugs without a prescription and shoplifting small items, including makeup and cake topping. In each case, she was released and the charges dropped. She started visiting a pain clinic in Tampa called Doctors Rx Us, where she was prescribed oxycodone, methadone, alprazolam and gabapentin, an antiseizure medication, according to records her parents collected. Housed in a rundown strip mall, the clinic today is called Palm Medical Group after a name change in 2011, according to its state records. Ms. Kinkade was prescribed the drugs by two physicians at Doctors Rx Us: Richard Smith and William Crumbley. Dr. Crumbley was arrested in December and charged with operating a nonregistered pain clinic at another location. He has pleaded not guilty.Dr. Smith and the clinic declined repeated interview requests. A lawyer for Dr. Crumbley said he was innocent of any wrongdoing. On May 3, 2010, Ms. Kinkade stopped at a CVS in Crystal River, Fla., and picked up a prescription written by Dr. Smith for 90 tablets of 10mg methadone, along with 90 tablets of alprazolam, an antianxiety drug. "Jaclyn Kinkade's death is a terrible tragedy that highlights the need for a comprehensive national effort to prevent prescription drug abuse," CVS said in a statement.Information provided by the manufacturer suggests that the methadone dispensed to Ms. Kinkade was likely supplied to CVS by Cardinal Health Inc. Cardinal was the only distributor to have sold that particular drug to that CVS branch during that period, according to the manufacturer's records. CVS and Cardinal declined to comment. Last year, the DEA launched a probe of the Florida-based operations of Cardinal Health and CVS Caremark. The agency alleged they dispensed "extremely large amounts" of oxycodone with signs that the drugs were "diverted from legitimate channels." CVS said it has "responded to the DEA's concerns, including implementing enhancements to our policies and procedures for filling controlled substance prescriptions." Cardinal settled with the DEA in May, agreeing to suspend sales for two years at one of its key distribution facilities in Lakeland, Fla. The methadone Ms. Kinkade picked up at the end of her life was made in Hobart, N.Y., by Mallinckrodt, a unit of health-care giant Covidien. "Any death from abuse or misuse of prescription drugs is tragic," Covidien said. "That's why we believe that, as a nation, ending the abuse, diversion and misuse of powerful pain medications is necessary to ensure adequate treatment of pain and access to that treatment for legitimate pain patients."On May 10, 2010, Ms. Kinkade was stopped by police in Levy County, Fla., for having an expired registration. A drug-sniffing dog reacted to her car and she was arrested for possessing a generic form of Xanax without the correct prescription. This time, her parents let her sit in jail for a couple of weeks while they organized a place for her in a rehabilitation program. They bailed her out May 25 and enrolled her in drug treatment.Over the next month, Ms. Kinkade went to the treatment program during the day and seemed to improve, her parents said. Then, the evening of June 24, she climbed out the window at her parents' house. A few days later, on the other side of Florida, she met up with a boyfriend, according to a statement he later gave police. She returned to Doctors Rx Us, where Dr. Smith wrote a prescription for 90 tablets of 30mg oxycodone, according to prescription records. It would be her last. The next day, Ms. Kinkade filled the prescription at a Walgreens in Beverly Hills, Fla. The oxycodone would have come from Walgreen's Jupiter, Fla., distribution center, a company spokesman said. On Sept. 14, the DEA barred that facility from selling controlled substances, alleging that it failed to maintain effective controls to stop large amounts of oxycodone from reaching the black market. "When [companies] choose to look the other way, patients suffer and drug dealers prosper," Mark Trouville, the DEA special agent in charge, said at the time. Walgreen said in a statement it is cooperating with the DEA. The oxycodone came from the New Jersey plant of Actavis, a Swiss pharmaceutical company. In April, Actavis was bought by Watson Pharmaceutical in a $5.8 billion deal awaiting regulatory approval. An Actavis spokesman described Ms. Kinkade's situation as a "tragic occurrence" and called for discussion on "how to prevent such cases in the future." A Watson spokesman cautioned against action that would make it harder to treat legitimate patients. He said the company supported educating patients about the drugs' proper use.The morning of July 4, Ms. Kinkade's boyfriend found her sitting cross-legged and slumped in his room at a white, low-slung house tucked behind a trailer park. The medical examiner said she died from a drug cocktail including oxycodone, methadone and methamphetamine.Ms. Kinkade's physical decline made such an impression on the detective who investigated the case that, two years later, he still recalls the scene. In the living room, he noticed a poster of Ms. Kinkade modeling for a biker magazine."Wow, she's a beautiful young lady," Detective Matthew Taylor remembered thinking. "When I actually saw her, it was as different as night and day." (function () { var articleId = fyre.conv.load.makeArticleId(null); fyre.conv.load({}, [{ el: 'livefyre-comments', network: "livefyre.com", siteId: "345939", articleId: articleId, signed: false, collectionMeta: { articleId: articleId, url: fyre.conv.load.makeCollectionUrl(), } }], function() {}); }()); Additional Reading:Freedom of Information Act Document Reveals Antidepressant Drugs Are Less Effective Than PlacebosWhat Do You Get When Legal Drug Dealers Peddle "Heroin-in-a-Pill" to it's "Clientele"?Pharmaceuticals Found In Our Drinking Water! www.DPL-Surveillance-Equipment.com (function() { var po = document.createElement('script'); po.type = 'text/javascript'; po.async = true; po.src = 'https://apis.google.com/js/plusone.js'; var s = document.getElementsByTagName('script')[0]; s.parentNode.insertBefore(po, s); })();
Click Here Or On Above Image To Reach Our ExpertsThose $#%$# Idiots At The New York Federal Reserve Somehow Allow Hackers To Take $100million from An Account Held For BangladeshUpdated 5-13-2016Hackers Compromise Swift SystemHackers have again gained access to the world's largest system for transferring funds among banks, a breach the network's operator said indicates a wide-ranging effort to penetrate the financial system.The Society for Worldwide Interbank Financial Telecommunication, a cooperative that runs the international messaging system between banks, said the attack targeted a commercial bank and managed to send Swift messages using the bank's valid codes. It followed the theft in February of $81 million from Bangladesh's account at the Federal Reserve Bank of New York.The Bangladesh case provided startling evidence of the vulnerability of parts of the financial system that had been thought highly secure.The notice by Swift said in both cases its own system wasn't breached but that hackers accessed the fund-transfer system using the customers' credentials and malicious software to cover their tracks.“Forensic experts believe this new discovery evidences that the malware used in the earlier reported customer incident was not a single occurrence, but part of a wider and highly adaptive campaign targeting banks,” Swift said in a notice to banks reviewed by The Wall Street Journal but set to go out Friday.A spokeswoman for Swift said there were a “few” additional incidents but declined to identify the other institutions involved. The Belgium-based Swift recently notified customers about a “small number of recent cases of fraud at customer firms,” it said in the notice.The new evidence in question, Swift said, was sophisticated malware that was found by third-party forensic experts, who brought their findings to the messaging company. The attack happened before the Bangladesh theft, a person familiar with the matter said.That malware was different than that used earlier to attack Bangladesh's central bank, it added. In February, thieves attempted to siphon nearly $1 billion out of the Bangladesh bank's account at the New York Fed.The bulk of the fraudulent payment orders were stopped, but the thieves made off with $81 million that still hasn't been traced.The two sets of malware used in the attacks had two things in common, the Swift notice said. One, the attackers exploited the customer's systems before messages were sent over Swift's platform. Secondly, the malware helped the attackers cover their tracks, making it more difficult to identify the fraud.The newer one identified by Swift attacks a type of computer software for reading files in a “portable document format,” or PDF. The malware is able to read customers' PDF reports of payment confirmations, manipulate them and then remove traces of any fraudulent instructions, Swift said.The Wall Street Journal reported this week that the Federal Bureau of Investigation suspected insiders may have helped the attack on Bangladesh Bank, citing people familiar with the matter. Swift similarly emphasized the risk of malicious insiders in its note to banks.Swift, a member-owned industry cooperative, handles the bulk of world-wide cross-border payment instructions between banks. On average, the company handles 25 million messages each day.Banks and brokerages relay information to each other through its trusted computer network, confirming the identities of senders and recipients, amounts being transferred, account numbers and intermediary banks.The breaches raise the prospect that the system isn't fully secure.In the case involving Bangladesh Bank, attackers issued 35 fraudulent instructions attempting to divert funds to accounts in the Philippines and Sri Lanka.At a conference in Miami this month, New York Fed Executive Vice President Richard Dzina said the bank acted on properly authenticated message instructions.News of the second breach was reported earlier Thursday by the New York Times.Updated 4-9-2016Bankers Hours Contributes To BreachThe heist is now the focus of probes by the Federal Bureau of Investigation, officials in Bangladesh, lawmakers in the Philippines and the U.S. Congress. A spokeswoman for the FBI declined to comment.Investigators brought in from computer-security firm FireEye Inc. said in a report that the attackers lurked in Bangladesh Bank's systems for days, logging keystrokes to get the codes they needed. Bangladeshi investigators have said the thieves timed their attack to exploit the weekend, which falls on Friday and Saturday in Bangladesh.The Bangladeshi central bank has questioned why the unusual transfer requests, many asking for money to be routed to personal bank accounts, didn't ring alarm bells inside the New York Fed before the bank executed five of the 35 payment orders.Subhankar Saha, a spokesman for Bangladesh Bank, said its investigators are looking into whether the New York Fed followed the correct procedures in releasing funds from its account.The Fed generally approves authenticated payment orders automatically, people familiar with the matter said. Payments can be halted if they set off money-laundering or sanctions alerts, for example. Others may be reviewed after the fact and recalled if necessary, the people said.“You'd think the Fed would be more vigilant with suspicious activity,” saidDarren Hayes, a professor who studies cybersecurity at Pace University's Seidenberg School of Computer Science and Information Systems in New York. “People might question why, if they raised their own red flags, more wasn't done.”Timeline1/31Feb. 4, 2016By 5 p.m. EST: Federal Reserve Bank of New York approves five of what ultimately became 35 requests from hackers to transfer money from Bangladesh Bank's accounts. The five approved orders, totaling $101 million, are routed to beneficiaries in Sri Lanka and the Philippines. 5:55 p.m.: New York Fed messages Bangladesh Bank with questions about another 12 of the 35 transfer requests. 11:30 p.m. (10:30 a.m. Friday Bangladesh time): Bangladesh Bank officials find the Swift interbank-messaging terminal unresponsive and can't access the system.Feb. 5, 20164:09 p.m. and 4:43 p.m. EST: Fed sends new messages to Bangladesh Bank again querying the transfer requests, including four of the five it had put through and 30 it had blocked that day.Feb. 6, 20161:30 a.m. EST (12:30 p.m. Bangladesh time): After correcting a computer problem, Bangladesh Bank sees messages sent by the Fed. 2:31 a.m. to 7:03 a.m. EST: Bangladesh Bank sends three emails and one fax to the New York Fed, trying to get the payments stopped. Messages go unanswered. Bangladeshi officials also call the Fed office in New York several times, to no avail.2/7Feb. 7, 20167:15 a.m. EST (6:15 p.m. Bangladesh time): Bangladeshi officials start up a backup server and see dozens of messages from the Fed asking Bangladesh to reconfirm requests to transfer up to $950 million. By then, $101 million had already been wired out of the account to Sri Lanka and the Philippines.Feb. 8, 20166 a.m. EST (5 p.m. Bangladesh time): Bangladesh Bank sends stop-payment requests via Swift to the New York Fed and four intermediary banks. Later in the day, the Fed sends its own stop-payment requests.2/14 PRO-DTECH II FREQUENCY DETECTOR(Buy/Rent/Layaway)The thieves put the first payment orders through to the Fed using Swift on Thursday, Feb. 4, late in the Bangladeshi day, according to people familiar with those messages. The Fed approved five of the 35 payments later that day, said one person familiar with the messages, processing a total of $101 million in payments.Fed employees then became suspicious. At 5:55 p.m., they messaged Bangladesh Bank asking for the rationale for a dozen different payment requests, the person said.As the Fed's concerns increased the next day, a Friday, it decided to block 30 of the 35 requests made by the thieves. Just before closing for business that afternoon, and heading out for the weekend, Fed staffers sent two more interbank messages asking Bangladesh Bank for additional details, people familiar with the messages said. The Fed never heard back that day, when most Bangladeshi staff already were
Click Here Or On Above Image To Reach Our ExpertsUS. Can Learn From China's Spot-The-Spy ProgramPeople can respond to drugs very differently. A medication that brings relief for some patients might show no benefit at all in others, or even cause harmful side effects.A growing array of genetic tests is designed to help predict how people are likely to respond to many common medications, from antidepressants and antihistamines to pain relievers and blood thinners. The tests, which are controversial, look for tiny variations in genes that determine how fast or slow we metabolize medications.Because of such gene variations, codeine, frequently prescribed to relieve pain, has little effect on as much as 20% of the population, while 2% of people have such a strong reaction that a normal dose can be life-threatening. About 25% of people can't effectively absorb Plavix, a clot-busting drug, putting them at increased risk for a heart attack or stroke. PRO-DTECH II FREQUENCY DETECTOR(Buy/Rent/Layaway)Even everyday drugs such as Advil and Motrin, for pain relief, and Zocor, to lower cholesterol, can have widely varying effects. Testing patients for gene variations could avoid some of the 700,000 serious drug reactions in the U.S. each year, some experts say. Proponents of the tests, which are done with a cheek swab, say they also could help doctors rely less on trial and error in choosing the right drug and the right dosage for individual patients.CELLPHONE DETECTOR (PROFESSIONAL)(Buy/Rent/Layaway)The Food and Drug Administration has included cautionary information for people with certain gene variations on the labels of more than 100 prescription medications. As yet, only about 20% of doctors order such tests, according to a survey by the American Medical Association, and many patients don't know they exist.PRO-DTECH III FREQUENCY DETECTOR(Buy/Rent/Layaway)Some major medical associations, including the American College of Cardiology and the American Psychiatric Association, have been slow to endorse the testing, mainly because there are no large, randomized controlled trials showing the technique significantly improves patient care. And the tests, which range from $500 to $2,000, are only covered by some insurers in some cases.PRO-DTECH III FREQUENCY DETECTOR(Buy/Rent/Layaway)NOT RIGHT FOR EVERYONEMany common medications can affect people differently depending on minor variations in the genes that regulate key enzymes. The variations can make people metabolize certain drugs either more slowly or rapidly than normal. Some examples:DRUGSPain relievers codeine or oxycodone, including Tylenol 3 and PercocetENZYME PATHWAY AT WORKCYP2D6IMPACTA standard dose can have little effect in up to 20% of people, while as many as 2% can have a life-threatening reaction.DRUGSBlood thinner Plavix (clopidogrel) and acid reducers Prilosec (omeprazole) and Prevacid (lansoprazole)ENZYME PATHWAY AT WORKCYP2C19IMPACTUp to 15% of people metabolize these drugs very slowly, resulting in a higher effective dose and greater risk of side effects.DRUGBlood thinner Coumadin (warfarin)ENZYME PATHWAY AT WORKCYP2C9IMPACTPeople with some gene variants have twice the risk of severe bleeding, but other factors are involved and population percentages are unclear.DRUGCholesterol reducer Zocor (simvastatin)ENZYME PATHWAY AT WORKSLCO181IMPACTUp to 40% of people have impaired ability to metabolize this drug, giving them increased risk of muscle pain and other side effects.Source: Clinical Pharmacogenetics Implementation ConsortiumAlan Pocinki, an internist in Rockville, Md., says he orders gene testing for patients who have a history of unexplained symptoms or who haven't gotten relief from drugs in the past. In many cases, he is able to find a better treatment based on their DNA, he says. “It makes a huge difference clinically among people I see every day.”PRO-DTECH III FREQUENCY DETECTOR(Buy/Rent/Layaway)How people's genes affect their response to medic
Click Here Or On Above Image To Reach Our ExpertsUS. Can Learn From China's Spot-The-Spy ProgramBEIJING—In Xi Jinping's campaign to galvanize China around threats to national security, the latest focus has turned to spies.In recent weeks, the country has dramatically amped up a call for vigilance even from its youngest citizens, with games such as “Spot the Spy” being played in schools.Around the first-ever National Security Education Day in mid-April, volunteers in Beijing handed out thousands of umbrellas imprinted with a hotline to call to report any perceived risks.Posters have gone up in housing complexes and at subway stops with a cartoon story of a foreigner posing as an academic who tricks his Chinese girlfriend into leaking state secrets. The various campaigns warn of other guises as well, including consultants or commercial investigators.Since Mr. Xi assumed power in 2012, the country has sought to beef up domestic security, including passing a counterespionage law and a national-security law last year. The emphasis comes as Mr. Xi moves to shore up the party's hold on power and build social cohesion amid more trying economic times. PRO-DTECH II FREQUENCY DETECTOR(Buy/Rent/Layaway)The government says the national-security law was needed to counter emerging threats, from cybercrime to terrorism. “We ordinary people need to open our eyes and protect the nation's core interests,” said a security official in the northeastern city of Tianjin, where a banner urged residents to “build a Great Wall of Iron and Steel.”CELLPHONE DETECTOR (PROFESSIONAL)(Buy/Rent/Layaway)Historian and Chinese politics expert Zhang Lifan said the emphasis on vigilance seems to reflect insecurity within the Communist Party, which under Mr. Xi has sought to strengthen patriotism and drill citizens in “core socialist values.”PRO-DTECH III FREQUENCY DETECTOR(Buy/Rent/Layaway)“The national-security law is actually a security law for the ruling party,” said Mr. Zhang, who says that Chinese society has become increasingly splintered along lines of wealth and privilege.PRO-DTECH III FREQUENCY DETECTOR(Buy/Rent/Layaway)Economic growth rates hit a 25-year low last year, and outbreaks of labor unrest have increased throughout the country.“In the past, the idea of the ‘enemy' wasn't so broadly defined,” Mr. Zhang said. As the leaders' “sense of crisis has gone up, they see more and more enemies.”PRO-DTECH III FREQUENCY DETECTOR(Buy/Rent/Layaway)Xenophobia ran deep in China during the Maoist years, when the country tried to purge itself of foreign influences and family members were asked to inform on each other. Such sentiment has since waxed and waned.In the post-Deng Xiaoping era, China has mostly been focused on opening up, said Mr. Zhang, who said he can't recall a time since the Cultural Revolution when fears about foreign spies have been ratcheted up as much as recently.WIRELESS/WIRED HIDDENCAMERA FINDER III(Buy/Rent/Layaway)Some social-media users have cheered on government efforts. “There are too many anti-China traitors—in the future, we should be careful about those second-generation and third-generation Chinese born overseas who come back to work,” wrote one user of Weibo, a Twitter-like platform.PRO-DTECH IV FREQUENCY DETECTOR(Buy/Rent/Layaway)“Friends, I'll just say one thing: only if we have a country do we have a home, and national security is a necessity. It falls to us all to safeguard,” added another.Others were sarcastic or accused the government of trying to distract people from more pressing issues.Wireless Camera Finder(Buy/Rent/Layaway)“I suspect that China's problematic vaccines were from external enemy forces, and the drug-supervision agency must have been cooperating with them too,” wrote one Weibo user, referring to a recent medical-supply scandal. “How evil, I hate those spies.”MAGNETIC, ELECTRIC, RADIO ANDMICROWAVE DETECTOR(Buy/Rent/Layaway)“Why don't you solve peoples' livelihood problems, why do this useless stuff?” wrote another. “Are you hoping to eliminate people who think differently through this crime of ‘espionage'?”COUNTERSURVEILLANCE PROBE / MONITOR(Buy/Rent/Layaway)WARNINGS ABOUND“Made Friends Carelessly and Was Incited to Act Against the Country, Stole Secrets, Was Caught and Became a Prisoner”—a billboard displayed in Zibo, Shandong province.
Click Here Or On Above Image To Reach Our ExpertsSpy Gadgets For Grow Facilities / Weed DispensariesSurveillance And Counter-Surveillance Systems For Grow Facilities / Medical Marijuana DispensariesNow legal in several states, medical marijuana dispensaries represent a rapidly expanding industry. Depending on the location and size of the facility, some medical marijuana dispensaries include a small retail storefront whereas others are large in size and maintain cannabis growing operations.Medical marijuana dispensaries must meet state regulations in order to conduct business. PRO-DTECH II FREQUENCY DETECTOR(Buy/Rent/Layaway)Strictly enforced state regulations vary for each state but all have thing in common: all states permitting dispensaries require that the facility manager have a functioning video surveillance system monitoring the dispensary at all times. Security ThreatsLoss Prevention: Every dispensary manager knows the importance of protecting his or her assets, which is why it's critical to invest in retail loss prevention measures. CELLPHONE DETECTOR (PROFESSIONAL)(Buy/Rent/Layaway)Security cameras strategically placed at all entrances and exits help to prevent robbery and catch detailed imagery in case an unauthorized person breaks into the building.PRO-DTECH III FREQUENCY DETECTOR(Buy/Rent/Layaway)To increase cash or point-of-sale security, cameras should be installed in areas where cash is being handled.PRO-DTECH III FREQUENCY DETECTOR(Buy/Rent/Layaway)Finally, to reduce inventory shrinkage, the main sales floor as well as stock area should be monitored by HD security cameras in case an employee or customer shoplifts.Counter-SurveillanceGrow facilities / medical marijuana dispensaries should also take into consideration that competitors would love to find out as much about your operations as possible.PRO-DTECH III FREQUENCY DETECTOR(Buy/Rent/Layaway)We have law-enforcement grade bug detectors, cameras finders and cell phone detectors to help you keep your trade secrets from falling into the wrong hands.Employee Theft: Dishonest employees are not afraid to take directly from the cash register, and dispensary managers can't always be right there to make certain that all sales for the day have been added up correctly. WIRELESS/WIRED HIDDENCAMERA FINDER III(Buy/Rent/Layaway)An easy way to reduce employee theft is by strategically placing surveillance cameras above the cash register. PRO-DTECH IV FREQUENCY DETECTOR(Buy/Rent/Layaway)Employees performing cash transactions will think twice when there's a camera directly above them. Another fraudulent activity to be aware of is “sweethearting,” which occurs when the employee gives unauthorized discounts to friends or family. Wireless Camera Finder(Buy/Rent/Layaway)Security cameras facing the display monitor can catch instances of sweethearting to prevent it from becoming a problem. MAGNETIC, ELECTRIC, RADIO ANDMICROWAVE DETECTOR(Buy/Rent/Layaway)Cameras should also monitor grow operations, the cash safe or other restricted areas of the site that contain raw cash, and the retail space to ensure employees are not attempting to steal plants or product.COUNTERSURVEILLANCE PROBE / MONITOR(Buy/Rent/Layaway)Operations MonitoringGrow Monitoring: In addition to reducing security threats, video surveillance systems allow dispensary or grow facility operators to monitor their crops and growing process, ensuring that every marijuana plant is harvested efficiently and meets the highest standards of quality. Depending where cameras are placed, dispensary managers can gain keen insight into the daily operations of their facility by viewing live and recorded footage.PRO-DTECH FREQUENCY DETECTOR(Buy/Rent/Layaway)The cultivation of marijuana seeds requires detailed attention. Reviewing video footage of growing operations ensures only the best practices are used in the process. Video enables facility managers to pinpoint unnecessary or poor growing practices. Eliminating these processes from happening in the future will help prevent low-quality marijuana products and edibles from reaching the consumer.
Click Here Or On Above Image To Reach Our ExpertsSelling And Shopping Safely Online For Consumers And MerchantsDespite stability in the number of victims and losses last year, the ways that credit card fraud occurs have changed. With the switch to chip-enabled EMV cards in 2015, identity thieves are moving from cloning counterfeits of that existing plastic and, instead, are focusing on opening new fraudulent accounts with stolen Social Security numbers and other sensitive data.In its 2016 Identity Fraud Study, Javelin Strategy & Research reports that new-account fraud more than doubled in 2015 from the previous year — and with that 113 percent increase, it now accounts for one-fifth of all fraud losses.Meanwhile, using stolen credit card numbers on counterfeit clones for in-store shopping dropped by 4 percent but increased by 5 percent for fraudulent online purchases. PRO-DTECH II FREQUENCY DETECTOR(Buy/Rent/Layaway)Other trends worth noting from Javelin's analysis, based on a survey of more than 5,000 consumers: More victims, fewer losses. More than 13 million Americans fell victim to identity fraud last year; that's up 3 percent from 2014 and the second highest number in the past six years. But losses decreased by 6 percent to $15 billion, the lowest amount since 2010. Overall, identity thieves have stolen $112 billion in the past six years — roughly $35,600 per minute, or enough to pay for four years of college in just four minutes.CELLPHONE DETECTOR (PROFESSIONAL)(Buy/Rent/Layaway)Hacked here, used abroad. About 18 percent of identity fraud involves using stolen U.S. credit cards outside our borders. That amounts to $2.4 billion, with an average of $1,585 per incident. Because of government-mandated protections and zero percent liability policies offered by most providers, credit card companies, not their customers, typically eat those costs. Issuers are estimated to proactively detect two-thirds of these cases, according to Javelin.PRO-DTECH III FREQUENCY DETECTOR(Buy/Rent/Layaway)You may be your worst enemy. Consumers who say they don't trust their financial institutions fare worse: Their stolen information is used 75 percent longer by fraudsters, with expenses averaging 185 percent higher than those of customers who use services such as transaction monitoring and alerts, credit freezes and black-market monitoring.PRO-DTECH III FREQUENCY DETECTOR(Buy/Rent/Layaway)How To Protect Yourself1. Get A Credit Freeze. Once enacted, a credit (also known as a security) freeze restricts access to your credit report, which creditors check before issuing new financial or service accounts in your name. Without seeing your report, creditors won't approve accounts to ID thieves posing as you. A freeze must be placed with each of the three major credit-reporting bureaus — typically free for those 65 and older (state laws vary) — and can be unthawed when you are legitimately applying for credit.2. Secure Mobile Devices. If your financial life is on a smartphone or tablet, apply software updates that patch known vulnerabilities as soon as they become available. Use security features built into Android and iOS devices, such as passcode or biometric (fingerprint) protection, and programs that encrypt data and remotely wipe contents if the device is lost or stolen.PRO-DTECH III FREQUENCY DETECTOR(Buy/Rent/Layaway)3. Use Strong Passwords. They “remain the de facto first line of defense for most online accounts, which has motivated criminals to compromise them whenever possible,” Javelin notes. Using a password manager is a convenient way to maintain good password practices without resorting to writing these codes down, which could also place them at risk of physical compromise.4. Sign Up For Account Alerts. Offered by banks, credit card issuers and brokerages, these free notifications, via email or text message, provide you with real-time alerts of suspicious activity. When fraud occurs, contact the account issuer immediately.WIRELESS/WIRED HIDDENCAMERA FINDER III(Buy/Rent/Layaway)5. Take Data Breach Notifications Seriously. One in 5 data-breach victims suffered fraud in 2015, up from 1 in 7 in 2014. While data breaches at retailers remain an issue, the biggest jump in breaches was at government agencies and health care organizations, with a 64 percent rise in exposure of SSNs.PRO-DTECH IV FREQUENCY DETECTOR(Buy/Rent/Layaway)
Click Here Or On Above Image To Reach Our ExpertsCyber-Literacy Cybersecurity is considered a top priority for businesses, but a recent study found that two out of five respondents across board, C-suite and technical levels didn't feel responsible for the repercussions of a cyberattack.The research, called The Accountability Gap: Cybersecurity and Building a Culture of Responsibility, found that most executives don't have a clear picture of their network resilience nor are they prepared to detect and respond in the event of a breach.As legislation across the globe evolves to make organizations accountable for loss of personal data as a result of cybercrime, board members need to become as capable of reading a cyber report as they are of analyzing balance sheets. PRO-DTECH II FREQUENCY DETECTOR(Buy/Rent/Layaway)“As the leadership becomes more knowledgeable, you have a drip down effect,” said Chris Brauer, director of innovation and senior lecturer at the Institute of Management Studies, Goldsmiths, University of London, who directed the research commissioned by Nasdaq and Emeryville, Calif.-based cybersecurity firm Tanium Inc. He said that “drip down effect” was evident in corporate use of social media; as leaders gained fluency in it, organizations became more comfortable embracing social media.CELLPHONE DETECTOR (PROFESSIONAL)(Buy/Rent/Layaway)The study focused on measuring an organization's vulnerability to cyber risk by evaluating its awareness of the risk and its ability to address it. It combined a qualitative and quantitative approach that entailed interviews to define challenges to boosting an organization's awareness and readiness. PRO-DTECH III FREQUENCY DETECTOR(Buy/Rent/Layaway)It also surveyed 1,530 non-executive directors, C-suite executives, chief information officers and chief information security officers at companies with at least 1,000 employees in the U.S., U.K., Germany, Japan, Denmark, Norway, Sweden and Finland.PRO-DTECH III FREQUENCY DETECTOR(Buy/Rent/Layaway)After completing the survey, the participating organization received a vulnerability score. Eighty percent of respondents were found to have a medium-level of vulnerability, and another 10% were highly vulnerable to breaches.The remaining 10% presented low vulnerability. The study created a baseline for the participants and with the data in hand, organizations can start taking steps to move away from the high vulnerability corner, said Mr. Brauer.PRO-DTECH III FREQUENCY DETECTOR(Buy/Rent/Layaway)Among the highly vulnerable companies, 91% of non-executive directors cannot read a cybersecurity report and nearly 100% of those companies don't track devices on their network.Among this group, only 9% said their systems were regularly updated in response to cyberthreats, and 87% of them don't consider their malware, antivirus software and patches to be 100% up-to-date at all times.WIRELESS/WIRED HIDDENCAMERA FINDER III(Buy/Rent/Layaway)“Traditionally, IT spending is going to protection, to preventing the bad guy getting in; organizations aren't equipped to respond and remediate the [damage caused by] the bad guy,” said Richard Olver, vice president of Europe, Middle East and Africa for Tanium.PRO-DTECH IV FREQUENCY DETECTOR(Buy/Rent/Layaway)But as new rules become effective in making organizations disclose breaches and the steps taken to contain losses, boards will have to take ownership of cybersecurity, he said.Although chief information officers and chief information security officers are spending more time in front of boards, often times the exchange is truncated not only by the lack of cyber knowledge among board members but also because the technical experts aren't always effective communicators.Wireless Camera Finder(Buy/Rent/Layaway)“The technical security [teams] are owners of the documents they produce, they need to be able to define, quantify and convey the actual impact of a breach,” said Louis Modano, senior vice president of global infrastructure and chief information security officer at Nasdaq.MAGNETIC, ELECTRIC, RADIO ANDMICROWAVE DETECTOR(Buy/Rent/Layaway)Nasdaq plans to make the cybersecurity vulnerability assessment available to its members and others in the near future, so the data will continue to be collated and progress tracked.COUNTERSURVEILLANCE PROBE / MONITOR(Buy/Rent/Layaway)Not unlike other issues of compliance, cybersecurity can be managed by engendering a shift in the organization's culture, the report concluded.PRO-DTECH FREQUENCY DETECTOR(Buy/Rent/Layaway)It suggests creating a culture of vigilance, acknowledging that cybersecurity is a fundamental threat to the business; a culture of openness by increasing cyberliteracy and knowledge from the top-down; and a culture of innovation to ensure the right technology and technologists are in place to tackle current threats.RF SIGNAL DETECTOR ( FREQUENCY COUNTER)(Buy/Rent/Layaway)Your questions and comments are greatly appreciated.Monty Henry, Owner (function () { var articleId = fyre.conv.load.makeArticleId(null); fyre.conv.load({}, [{ el: 'livefyre-comments', network: "livefyre.com", siteId: "345939", articleId: articleId, signed: false, collectionMeta: { articleId: articleId, url: fyre.conv.load.makeCollectionUrl(), } }], function() {}); }()); Additional Resources: * Prevention and Detection of Electronic Harassment and Surveillance* Electrical Hyper-Sensitivity: The-Truth!!* How Do I Know If I've Been Bugged? * Targeted Individuals* Operating The Brain By Remote Control* What is BitCoin and How Does It Work?* The Creature From Jekyll Island: This Blog And Video Playlist Explains Why The U.S. Financial System is Corrupt and How It Came To Be That Way* Number of Americans Renouncing Citizenship Surges To Escape Oppressive Tax Rules* Dropping Off The Grid: A Growing Movement In America: Part I* Online Privacy Tools and Tips www.DPL-Surveillance-Equipment.com (function() { var po = document.createElement('script'); po.type = 'text/javascript'; po.async = true; po.src = 'https://apis.google.com/js/plusone.js'; var s = document.getElementsByTagName('script')[0]; s.parentNode.insertBefore(po, s); })();
Click Here Or On Above Image To Reach Our ExpertsHealth-Care CIOs Share Security Best Practices To Prevent Rasomware ThreatsHospital chief information officers say the health-care industry now needs to assume attackers are going to get into hospital networks. The key to avoiding damage, they say, is detection, response and containment.Attackers encrypted data at Methodist Hospital in Henderson, Kentucky and were holding it for ransom, security blogger Brian Krebs reported Wednesday. Additionally, NBC reported that two other hospitals were also recently victims of so-called ransomware attacks. Those attacks comes a little more than a month after Hollywood Presbyterian Medical Center said it had paid hackers 40 bitcoins, about $17,000, after an attack made certain systems unusable for more than two weeks.Methodist Hospital did not respond to a request for comment.Traditionally, hospitals have focused on prevention, Darren Dworkin, chief information officer at Cedars-Sinai told CIO Journal. “You still have to do that, but at the same time you need to acknowledge that stuff will come through so you can detect it, catch it, and contain it,” he said. PRO-DTECH II FREQUENCY DETECTOR(Buy/Rent/Layaway)Another hospital faced a problem with ransomware when a nurse clicked on a bad link, said a CIO who asked not to be identified. By isolating the laptop from the rest of the network, the CIO was able to contain the problem from spreading. These attacks can spread rapidly throughout a network, he said. Related Information: Healthcare Podcasters Talk Security (Blab)The CIO used backups to quickly restore the data. It's crucial to have data that's frequently backed up, he said. The difference between a problem that's caught and quickly handled and one that ends with a hospital paying thousands of dollars to hackers is often good backups.CELLPHONE DETECTOR (PROFESSIONAL)(Buy/Rent/Layaway)Malicious software often enters health-care organizations when an employee clicks on a bad link or downloads a bad attachment. The malicious software then targets unpatched software on the victim's computer. There are many Windows-based systems in health care and the patching of software is notoriously poor, said Scott Donnelly, senior analyst at Recorded Future, a security firm that sells real-time threat intelligence.PRO-DTECH III FREQUENCY DETECTOR(Buy/Rent/Layaway)According to the company's analysis, recent ransomware has targeted vulnerabilities in Adobe Flash Player and Microsoft Silverlight. Mr. Donnelly suggests updating that software as well as Web browsers.PRO-DTECH III FREQUENCY DETECTOR(Buy/Rent/Layaway)The best defense in the short term is to educate employees not to open unexpected attachments, click on any link embedded in an email and not to provide any personal information to unknown callers, said John D. Halamka, chief information officer at Beth Israel Deaconess Medical Center, in an email message.“Millions can be spent on technical security but you're still as vulnerable as the most gullible employee who provides their password in response to a phishing email or inserts an infected USB drive,” he added.PRO-DTECH III FREQUENCY DETECTOR(Buy/Rent/Layaway)Related Story:Virus Infects MedStar Health System's ComputersA virus infected the computer system of MedStar Health on Monday, forcing one of the Washington region's largest health care providers to shut down significant portions of its online operations.Hospital officials acknowledged the breach, which is being investigated by the FBI, but said they had “no evidence that information has been stolen.”“MedStar acted quickly with a decision to take down all system interfaces to prevent the virus from spreading throughout the organization,” spokeswoman Ann Nickels said in a statement. “We are working with our IT and cyber-security partners to fully assess and address the situation. Currently, all of our clinical facilities remain open and functioning.”WIRELESS/WIRED HIDDENCAMERA FINDER III(Buy/Rent/Layaway)The $5 billion health-care system operates 10 hospitals and more than 250 outpatient facilities in the Washington region. It serves hundreds of thousands of patients and employs more than 30,000 people.Hospital staff reported that they were unable to access email or a vast database of patient records.PRO-DTECH IV FREQUENCY DETECTOR(Buy/Rent/Layaway)One employee told The Post that the entire MedStar computer system was inaccessible.“Even the lowest level staff can't communicate with anyone. You can't schedule patients, you can't access records, you can't do anything,” said the woman, who asked that her name not be used because she wasn't authorized to speak about the incident.The woman also said she spoke to two other employees who saw a pop-up on their computer screens stating that they had been infected by a virus and asking for ransom in “some kind of internet currency.” She has not seen the pop-up herself.Though the nature of the MedStar infection remains unclear, Nickels said Monday she had “not been told that it's a ransom situation.”“Ransomware” — a virus that holds systems hostage until victims pay for a key to regain access — has twice been deployed against hospitals in recent cyber attacks.Last month, a hospital in Los Angeles paid hackers $17,000 in bitcoins, an internet currency, to free its system. Two weeks ago, a Kentucky facility announced it was in an “internal state of emergency” after a similar attack.Wireless Camera Finder(Buy/Rent/Layaway)For MedStar, the infection's impact may be widespread as staff members are forced to use paper charts and records.“Everything will be slowed down tremendously,” said a man who has worked closely with the hospital for 15 years. “It's huge.”Appointments and surgeries will be delayed, he said, adding that it will take longer for lab results to come back, patients to receive tests and medications to be ordered.MedStar has not announced how long it expects the system to remain offline.MAGNETIC, ELECTRIC, RADIO ANDMICROWAVE DETECTOR(Buy/Rent/Layaway)Updated 4-11-2016
Click Here Or On Above Image To Reach Our ExpertsRent Our Two-Way Radios For Your Special EventsApplications: Some of The Most Common Uses For Our Two-Way Radio Rentals Include:* Trade Shows* Meetings, Conferences, And Events* Fairs And Festivals* Sporting Events* Concerts* Petrochemical Refinery Turnarounds* School And Church Outings* Corporate Events* Security Operations* Transportation Companies* Travel Services* Industry Associations PRO-DTECH II FREQUENCY DETECTOR(Buy/Rent/Layaway) CELLPHONE DETECTOR (PROFESSIONAL)(Buy/Rent/Layaway)PRO-DTECH III FREQUENCY DETECTOR(Buy/Rent/Layaway)PRO-DTECH III FREQUENCY DETECTOR(Buy/Rent/Layaway)PRO-DTECH III FREQUENCY DETECTOR(Buy/Rent/Layaway)WIRELESS/WIRED HIDDENCAMERA FINDER III(Buy/Rent/Layaway)PRO-DTECH IV FREQUENCY DETECTOR(Buy/Rent/Layaway)Wireless Camera Finder(Buy/Rent/Layaway)MAGNETIC, ELECTRIC, RADIO ANDMICROWAVE DETECTOR(Buy/Rent/Layaway)COUNTERSURVEILLANCE PROBE / MONITOR(Buy/Rent/Layaway)PRO-DTECH FREQUENCY DETECTOR(Buy/Rent/Layaway)RF SIGNAL DETECTOR ( FREQUENCY COUNTER)(Buy/Rent/Layaway)Your questions and comments are greatly appreciated.Monty Henry, Owner (function () { var articleId = fyre.conv.load.makeArticleId(null); fyre.conv.load({}, [{ el: 'livefyre-comments', network: "livefyre.com", siteId: "345939", articleId: articleId, signed: false, collectionMeta: { articleId: articleId, url: fyre.conv.load.makeCollectionUrl(), } }], function() {}); }()); Additional Resources: * Prevention and Detection of Electronic Harassment and Surveillance* Electrical Hyper-Sensitivity: The-Truth!!* How Do I Know If I've Been Bugged? * Targeted Individuals* Operating The Brain By Remote Control* What is BitCoin and How Does It Work?* The Creature From Jekyll Island: This Blog And Video Playlist Explains Why The U.S. Financial System is Corrupt and How It Came To Be That Way* Number of Americans Renouncing Citizenship Surges To Escape Oppressive Tax Rules* Dropping Off The Grid: A Growing Movement In America: Part I* Online Privacy Tools and Tips www.DPL-Surveillance-Equipment.com (function() { var po = document.createElement('script'); po.type = 'text/javascript'; po.async = true; po.src = 'https://apis.google.com/js/plusone.js'; var s = document.getElementsByTagName('script')[0]; s.parentNode.insertBefore(po, s); })();
Click Here Or On Above Image To Reach Our ExpertsCybersecurity Expert Suggests Blockchain To Thwart HackersEveryone should have concerns about cybersecurity as there are many fronts in this battle. Hackers are increasingly targeting not just people's credit card details but also other personal details and critical infrastructure more often than you would think. The worst fear is that terrorists could take out a nuclear plant, causing a disaster like Fukishima. Corporations also target people's data in order to improve sales and expand their customer base. Mass surveillance means that someone might always be listening. Demand for services that ensure cybersecurity will grow rapidly in the years to come and blockchain technology is making multiple advances in addressing these concerns.Guardtime has recently announced its intention to use its own blockchain to secure the UK's energy infrastructure, including nuclear power plants and electricity distribution grids, as well as national flood defences, in partnership with Future Cities Catapult. PRO-DTECH II FREQUENCY DETECTOR(Buy/Rent/Layaway)CEO of Guardtime, Mike Gault, decided to base some of his operation out of Estonia, capitalizing on the talented pool of cryptographers. The key problem he was able to solve was how to protect the integrity of data without keeping secrets to verify whether such data is correct. The blockchain used by Guardtime, although inspired by Bitcoin, differs from virtual currency blockchains; it is based on Keyless Signature Infrastructure (KSI), which improves on the scalability and settlement time. CELLPHONE DETECTOR (PROFESSIONAL)(Buy/Rent/Layaway)This system relies on the integrity of the hash function to ensure integrity of data, allowing it to identify three attributes of data: first, proof of time, i.e. when the asset was actually registered on the Blockchain; second, identity, referring to where the asset was first recorded; and third, authenticity, referring to whether or not the data has been tampered with.PRO-DTECH III FREQUENCY DETECTOR(Buy/Rent/Layaway)The integrity of data in the system, not the confidentiality of data, was attacked at Iran's Natanz nuclear facility by Stuxnet, a malicious computer program, back in 2013. By using KSI digital signatures, Guardtime's blockchain monitors the integrity of digital assets and detects unauthorized changes in software and configurations.PRO-DTECH III FREQUENCY DETECTOR(Buy/Rent/Layaway)Also, by providing a complete chain of the history of the data that is generated and transmitted, a breach can be acted upon in real-time. This is how the technology will prevent attacks such as Stuxnet from hitting critical civilian infrastructure networks in the UK.The technology which Guardtime is employing is already used to secure Estonian IT systems and can be independently verified without having to trust the administrators of the system. Estonia now registers marriages, health records and other sensitive information on a blockchain. Guardtime's KSI Blockchain is best suited to cybersecurity, telecommunications and data management where its industrial capacity sets it apart from other blockchain providers. A move away from public key cryptography means that it is secure against potential threats in the future, such as quantum computing, as hash functions are immune. Also, their offering comes at a time when the nuclear power industry has come under scrutiny with regards to cybersecurity.PRO-DTECH III FREQUENCY DETECTOR(Buy/Rent/Layaway)Another venture is taking a similar approach, aiming to solve the biggest problem in telecommunications; trusting third-parties with sensitive data. BitMessage is an open-source project that has revamped Bitcoin's block-and-transfer system to decentralize and automate encrypted communication. The novel feature is transactional mixing, making it extremely difficult to eavesdrop even if the encrypted data has been captured. Once the project has been brought out of alpha testing, we could see it replace email and other forms of instant messaging. The software is only available on desktops at present but could soon expand to mobiles and other portable devices.WIRELESS/WIRED HIDDENCAMERA FINDER III(Buy/Rent/Layaway)Enigma is also based on the Bitcoin's blockchain and was developed by the MIT to create a marketplace where users can sell the rights to encrypted data without providing access to the underlying data itself.PRO-DTECH IV FREQUENCY DETECTOR(Buy/Rent/Layaway)This project is set to bring ‘perfect secrecy' to the blockchain by breaking data into pieces and mathematically guaranteeing that each of these pieces is masked, random and completely secure.Enigma has already caught the attention of banks, who want to be able to store, analyse and share data without it being revealed to other parties. Their white paper gives an illuminating example of how it can be used to reduce costs and offer a new income stream for customers. A pharmaceutical company looking for patients in clinical trials would be able to scan genomic databases for candidates. With guaranteed privacy and autonomous control, more consumers will feel comfortable selling their data. Wireless Camera Finder(Buy/Rent/Layaway)This will allow greater data-sharing between companies and lead to more value being created by businesses. However, Enigma needs to reach critical mass before the network can start working securely. To help expand the network and gain users, every time someone requests a computation from the Enigma network, they pay a bitcoin fee. The largest fraction of this fee goes to the nodes in the Enigma network as a reward for storing and processing the user's encrypted data.MAGNETIC, ELECTRIC, RADIO ANDMICROWAVE DETECTOR(Buy/Rent/Layaway)BitMessage directly addresses concerns held by many about the overarching power of corporations and governments to snoop on private data.COUNTERSURVEILLANCE PROBE / MONITOR(Buy/Rent/Layaway)Projects such as Enigma will allow consumers to capitalize on the explosion of ‘Big Data' and put more control into what personal data corporations can and cannot access.PRO-DTECH FREQUENCY DETECTOR(Buy/Rent/Layaway)Finally, the KSI Blockchain illustrates how a blockchain can be made resistant to decryption through quantum computing and how to achieve scalability for industrial use. In short, Bitcoin has inspired, and will continue to inspire, some exciting applications that will revolutionize cybersecurity.RF SIGNAL DETECTOR ( FREQUENCY COUNTER)(Buy/Rent/Layaway)Your questions and comments are greatly appreciated.Monty Henry, Owner
060215 Dancu
Dropping Off The Grid: A Growing Movement In AmericaNow is your chance to flee society. Drop off the grid. Pull a Thoreau. Be you a survivalist, an environmentalist or a cheapskate-ist, you can join the growing movement of Americans embracing off-grid living."There's a desire to step out of the rat race, and in America, that goes very deep in the national psyche," says Nick Rosen, author of "Off the Grid: Inside the Movement for More Space, Less Government, and True Independence in Modern America" and editor of www.off-grid.net. "You know, the pioneering spirit and sturdy self-reliance -- these things which define the American character."For some off-griders, it's a matter of having little or no impact on the environment -- literally living off the power grid. This lifestyle has been championed by celebrities Daryl Hannah and Ed Begley Jr. Then there are those who no longer want to be a blip on the societal radar."Off-grid living is a spectrum that unites greens and survivalists," says Rosen, referring to those who choose to escape city life because they either don't trust the government or don't want it meddling in their affairs.Whether you’re a Civil libertarian or just want to be private, you can relax and worry less about the intrusive State with its Big Brother databases, at least in the UK. Civil servants running the new systems are so incompetent (e.g. the Ministry of Defence stolen laptop) that the biggest fear is them losing your data. But private industry is another matter. From Facebook to Microsoft, They are watching You. Now the US Senate is considering a “do not track” command that could be issued by individual internet users.The Senate Commerce, Science and Transportation Committee held a hearing Wednesday to debate what – if any – privacy protections Internet users should be given. Most of the senators on hand agreed that consumers know little about who or what is tracking their browsing behavior.The UK government is burning $500m a year to build a national ID database that will duplicate the passport system and only cover those of us law abiding enough to register under our real names. Corporate databases will create their own parallel versions, or license government data for their own security checks.But you can take a few steps to protect your privacy. Follow these simple tips, and Big Brother will be no bother:1. How to Get an Anonymous CellphoneGo to a town you have never visited before, to an area with no CCTV cameras and pay a homeless person to buy a pay-as-you-go mobile phone for you. That way no shop will have your image on its CCTV. You will also have an anonymous mobile.In order to keep your anonymity, top it up in a shop with no CCTV outside. Or dispense with the phone altogether and return to the humble payphone, now the preserve of tourists and the super-poor.Even if you stick to your traceable phone, leave it switched off whenever possible to avoid having your movements tracked. Many phones are still traceable, so you need to take the battery out to be certain. If you have a Bluetooth phone, keep the service switched off because this is now being tested for advertising and other marketing activities.2. Hide Your EmailIf you use one of the free, web-based services like Gmail, your communications are being stored to build up a picture of your interests. Instead, you can use a service called Hushmail to send encrypted emails. Or work out a private code with friends you want to communicate with.You do not need an email address of your own. One hacker I spoke to sends emails from cybercafes via The Observer website, using the service which allows anyone to send any article to a friend. He embeds his message into the covering note which goes with the article.Others with their own computer use the free XeroBank browser (in preference to Explorer or Firefox), which includes several privacy-enhancing add-ons and sends all data through a network ‘cloud’ which hides most of the data you normally give away as you use a computer, but at the cost of reduced speed.3. Protect Your Computer FilesThere is sophisticated software that deletes all traces of your activities from your computer. Assuming you don’t have access to this, it is still worth remembering the data about you contained inside each file. Many digital photos, for example, contain within them the serial number of the camera that took them. Word documents contain the name of the author as well as traces of previous drafts.4. Stay Off Spam Mailing ListsEach time you submit your email address to register for a new website, create a special address, either on a free webmail service or on your own email server so you have control over it. Then, if the company later sells your email address or loses it through poor security, you will know exactly who to blame. And you will be able to close the account or block all email to that particular address. Again, Hushmail is useful for this. You can set it up to create these aliases for you.5. Stop Supermarkets Snooping on Your ShoppingSwap your supermarket loyalty card with a friend or acquaintance every few months, after having cashed in any points you have accumulated (treat Oyster and other local transport cards the same way). You lose no benefits and it prevents tracking of specific purchasing patterns (or journeys) tied to your name and address. Use cash more often – save your credit card for emergencies.6. Mess Up Utility Companies’ Marketing PlansLive off-grid, unplugged from the system with solar panels and rainwater harvesting. There are thousands of people living without mains power, water or sewerage, all over the UK and the US, in isolated cottages, behind hedgerows in caravans or in groups of yurts in country fields. And this is not just a movement for tree huggers and climate campers. Many live on boats in towns and cities, and if you live in a flat or house, you can still unplug.Get a laptop with wireless capability. There are plenty of hot spots where you can check your email or browse for free.Thunderbird Mail transfer agent is available free from the same folks that brought you Firefox. The Enigmail plug-in allows encrypted email and file transfer with up to a 4096 bit key. I’ve tested it with Windows, Mac and UNIX for interoperability. Combined with a Gmail account that be configured for TLS (Similar to HTTPS) connections, it makes for a fairly secure package and it’s all free. It won’t stop NSA from reading your mail but will for most everyone else.How does one just disappear off the face of the earth? Is it as simple as moving away to another country? First you have to understand who you are running from. If you are running from an abusive partner, know that they have limited resources and might have a problem if you move out of state or out of the country. If you are running from the FBI for example, understand that these people have unlimited resources and will do everything in your power to hunt you down even if you move to another country.Before going underground, you have to do a few things in order to throw your opposition away from your trail. You have to destroy the "old" you and build a new you. Destroy all photographs you can get possession of. Some of your friends or relatives might be hesitant to give you their photographs but let them understand that the people chasing you might go after them, too, because of their connection to you. They will threaten your loved ones with physical or other forms of abuse if they refuse to hand over photographs. If it is not possible; destroy all the most recent pictures of yourself and leave the old ones. Of course you don't want your face plastered all over the state but if it is an artist's rendition or just an old photo, chances are high that people won't recognize you.Destroy or throw away all your credit cards and ATM cards. Government authorities can pinpoint your location within seconds if you use your magnetic cards. Before going underground, be sure to withdraw all your money from the bank and max out all your credit cards with the things you'll need or you can resell for cash. Do not bring your car with you. That will be the first thing that the opposition will look for. Leave your car in place where car thieves will be and let them strip your car clean to remove any trace of it. If you need transportation, there are a lot of places where you can simply give money and get a new car without any identification required. Just make sure you aren't buying a stolen car or the car itself doesn't violate any safety rules. The last thing you want as you are making your escape is to be pulled over for a simple safety violation.if (WIDGETBOX) WIDGETBOX.renderWidget('66f56d16-759e-496f-bc83-6083e68c5e3d');Get the Surveillance and Security Video Library widget and many other great free widgets at Widgetbox! Not seeing a widget? (More info)if (WIDGETBOX) WIDGETBOX.renderWidget('a37c3242-37e2-4596-9572-786e643c3c89');Get the DPL-Surveillance-Equipment.com widget and many other at ()INTERNET-BASED NANNY SPY CAMERAS (Buy/Rent/Layway)NOW, look in on your home, second home, lake house or office anytime, anywhere from any internet connected PC/Lap-top or Internet active cell phone, including iphone or PDA.Watch your child's caregiver while sitting at a traffic light or lunch meeting, or check on your business security from the other side of the world. Our built-in hidden video features all digital transmissions providing a crystal clear image with zero interference. With the IP receiver stream your video over the internet through your router, and view on either a PC or smart phone. Designed exclusively for DPL-Surveillance-Equipment, these IP hidden wireless cameras come with multiple features to make the user's experience hassle-free.NOW, look in on your home, second home, lake house or office anytime, anywhere from any internet connected PC/Lap-top or Internet active cell phone, including iphone or PDA: http://www.dpl-surveillance-equipment.com/wireless_hidden_cameras.htmlWatch your child's caregiver while sitting at a traffic light or lunch meeting, or check on your business security from the other side of the world. Our built-in hidden video features all digital transmissions providing a crystal clear image with zero interference. With the IP receiver stream your video over the internet through your router, and view on either a PC or smart phone. Designed exclusively for DPL-Surveillance-Equipment, these IP hidden wireless cameras come with multiple features to make the user's experience hassle-free.• Remote Video Access• Video is Recorded Locally To An Installed SD Card (2GB SD Card included)• Email Notifications (Motion Alerts, Camera Failure, IP Address Change, SD Card Full)• Live Monitoring, Recording And Event Playback Via Internet• Back-up SD Storage Up To 32GB (SD Not Included)• SD Card Lock Box With Key So SD Card Can't Be Removed• Digital Wireless Transmission (No Camera Interference)• View LIVE On Your SmartPhone!Includes:* Nanny Cameras w/ Remote View* Wireless IP Receiver* Remote Control* A/C Adaptor* Key ( For SD Card Lock Box)* 2GB SD Card* Ethernet Network CableFACT SHEET: HIDDEN NANNY-SPY (VIEW VIA THE INTERNET) CAMERASSpecifications:Receiver Specs:* Transmission Range of 500 ft Line Of Sight* Uses 53 Channels Resulting In No Interference* 12V Power Consumption* RCA Output* RJ45/Ethernet Port* Supports up to 32gig SD* Key Lock Mechanism To Protect Video DataCamera Specs:* 640x480 / 320x240 up to 30fps* Image Sensor: 1/4" Micron Sensor* Resolution: 720x480 Pixels* S/N Ratio: >45 db* Sensitivity: >11.5V/lux-s @ 550nm* Video System: NTSC* White Balance: Auto Tracking Our New Layaway Plan Adds Convenience For Online ShoppersDPL-Surveillance-Equipment's layaway plan makes it easy for you to buy the products and services that you want by paying for them through manageable monthly payments that you set. Our intuitive calculator allows you to break down your order's purchase price into smaller payment amounts. Payments can be automatically deducted from your bank account or made in cash using MoneyGram® ExpressPayment® Services and you will receive your order once it's paid in full. Use it to plan and budget for holiday purchases, anniversaries, birthdays, vacations and more!DPL-Surveillance-Equipment's Customers can now use the convenience of layaway online to help them get through these tough economic times.We all shop now and then just to face a hard reality -- big credit card bills. However, our latest financing innovation can help you avoid that. Find out why more and more shoppers are checking out DPL-Surveillance-Equipment's e-layaway plan.If you're drooling over a new nanny camera, longing for a GPS tracker, or wishing for that spy watch, but you're strapped for cash and can't afford to do credit, do what Jennie Kheen did. She bought her iPod docking station (hidden camera w/motion-activated DVR) online using our convenient lay-away plan.Our online layaway plan works like the old-fashioned service stores used to offer. But, in Kheen's case, she went to DPL-Surveillance-Equipment.com, found the iPod docking station (hidden camera w/motion-activated DVR), then set up a payment plan."It's automatically drawn from my account," she said. "I have a budget, $208.00 a month.In three months, Kheen had paid off the $650.00 iPod docking station. She paid another 3.9 percent service fee, which amounted to about $25.35 (plus $12.00 for shipping) for a total of $687.35."You pay a little bit each month," Kheen said. "It's paid off when you get it and you don't have it lingering over your head. It's great."Flexible payment terms and automated payments make our layaway plan an affordable and fiscally responsible alternative to credit cards.1. Register:It's quick, easy and FREE! No credit check required!2. Shop:Select the items or service you want and choose "e-layaway" as your payment option. Our payment calculator makes it easy for you to set up your payment terms.3. Make Payments:Payments are made on the schedule YOU set. Check your order status or adjust your payments online in a secure environment.4. Receive Products:Receive the product shortly after your last payment. The best part, it's paid in full... NO DEBT.More Buying Power:* Our lay-away plan offers a safe and affordable payment alternative without tying up your credit or subjecting the purchase to high-interest credit card fees.No Credit Checks or Special Qualifications:* Anyone 18 years old or older can join. All you need is an active bank account.Freedom From Credit Cards:* If you are near or beyond your credit limit or simply want to avoid high interest credit card fees, our e-layaway is the smart choice for you.Flexible Payment Schedules:* Similar to traditional layaway, e-layaway lets you make regular payments towards merchandise, with delivery upon payment in full. Payments are automatically deducted from your bank account or made in cash using MoneyGram® ExpressPayment®A Tool for Planning Ahead:* Our e-layaway makes it easy for smart shoppers like you to plan ahead and buy items such as bug detectors, nanny cameras, audio bugs, gps trackers, and more!No Hidden Charges or Mounting Interest:Our e-layaway makes shopping painless by eliminating hidden charges and monthly interest fees. Our customers pay a flat transaction fee on the initial purchase price.NO RISK:* You have the right to cancel any purchase and will receive a refund less a cancellation fee. See website for details.Security and Identity Protection:DPL-Surveillance-Equipment has partnered with trusted experts like McAfee and IDology to ensure the security and integrity of every transaction. Identity verification measures are integrated into our e-layaway system to prevent fraudulent purchases.Note: Simply Choose e-Lay-Away as a "Payment Option" in The Shopping CartDPL-Surveillance-Equipment.com is a world leader in providing surveillance and security products and services to Government, Law Enforcement, Private Investigators, small and large companies worldwide. We have one of the largest varieties of state-of-the-art surveillance and counter-surveillance equipment including Personal Protection and Bug Detection Products.Buy, rent or lease the same state-of-the-art surveillance and security equipment Detectives, PI's, the CIA and FBI use. Take back control! DPL-Surveillance-Equipment.comPhone: (1888) 344-3742 Toll Free USALocal: (818) 344-3742Fax (775) 249-9320Monty@DPL-Surveillance-Equipment.comGoogle+ and GmailDPLSURVE TwitterDPLSURVEMSN Monty@DPL-Surveillance-Equipment.comAOL Instant MessengerDPLSURVE32SkypeMontyl32Yahoo Instant MessengerMontyi32Alternate Email Addressmontyi32@yahoo.comJoin my Yahoo Group!My RSS Feed
Is This World Actually Ready For Free Energy? Answer, No! if (WIDGETBOX) WIDGETBOX.renderWidget('66f56d16-759e-496f-bc83-6083e68c5e3d');Get the Surveillance and Security Video Library widget and many other great free widgets at Widgetbox! Not seeing a widget? (More info)if (WIDGETBOX) WIDGETBOX.renderWidget('a37c3242-37e2-4596-9572-786e643c3c89');Get the DPL-Surveillance-Equipment.com widget and many other at ()INTERNET-BASED NANNY SPY CAMERAS (Buy/Rent/Layway)NOW, look in on your home, second home, lake house or office anytime, anywhere from any internet connected PC/Lap-top or Internet active cell phone, including iphone or PDA.Watch your child's caregiver while sitting at a traffic light or lunch meeting, or check on your business security from the other side of the world. Our built-in hidden video features all digital transmissions providing a crystal clear image with zero interference. With the IP receiver stream your video over the internet through your router, and view on either a PC or smart phone. Designed exclusively for DPL-Surveillance-Equipment, these IP hidden wireless cameras come with multiple features to make the user's experience hassle-free.NOW, look in on your home, second home, lake house or office anytime, anywhere from any internet connected PC/Lap-top or Internet active cell phone, including iphone or PDA: http://www.dpl-surveillance-equipment.com/wireless_hidden_cameras.htmlWatch your child's caregiver while sitting at a traffic light or lunch meeting, or check on your business security from the other side of the world. Our built-in hidden video features all digital transmissions providing a crystal clear image with zero interference. With the IP receiver stream your video over the internet through your router, and view on either a PC or smart phone. Designed exclusively for DPL-Surveillance-Equipment, these IP hidden wireless cameras come with multiple features to make the user's experience hassle-free.• Remote Video Access• Video is Recorded Locally To An Installed SD Card (2GB SD Card included)• Email Notifications (Motion Alerts, Camera Failure, IP Address Change, SD Card Full)• Live Monitoring, Recording And Event Playback Via Internet• Back-up SD Storage Up To 32GB (SD Not Included)• SD Card Lock Box With Key So SD Card Can't Be Removed• Digital Wireless Transmission (No Camera Interference)• View LIVE On Your SmartPhone!Includes:* Nanny Cameras w/ Remote View* Wireless IP Receiver* Remote Control* A/C Adaptor* Key ( For SD Card Lock Box)* 2GB SD Card* Ethernet Network CableFACT SHEET: HIDDEN NANNY-SPY (VIEW VIA THE INTERNET) CAMERASSpecifications:Receiver Specs:* Transmission Range of 500 ft Line Of Sight* Uses 53 Channels Resulting In No Interference* 12V Power Consumption* RCA Output* RJ45/Ethernet Port* Supports up to 32gig SD* Key Lock Mechanism To Protect Video DataCamera Specs:* 640x480 / 320x240 up to 30fps* Image Sensor: 1/4" Micron Sensor* Resolution: 720x480 Pixels* S/N Ratio: >45 db* Sensitivity: >11.5V/lux-s @ 550nm* Video System: NTSC* White Balance: Auto Tracking Our New Layaway Plan Adds Convenience For Online ShoppersDPL-Surveillance-Equipment's layaway plan makes it easy for you to buy the products and services that you want by paying for them through manageable monthly payments that you set. Our intuitive calculator allows you to break down your order's purchase price into smaller payment amounts. Payments can be automatically deducted from your bank account or made in cash using MoneyGram® ExpressPayment® Services and you will receive your order once it's paid in full. Use it to plan and budget for holiday purchases, anniversaries, birthdays, vacations and more!DPL-Surveillance-Equipment's Customers can now use the convenience of layaway online to help them get through these tough economic times.We all shop now and then just to face a hard reality -- big credit card bills. However, our latest financing innovation can help you avoid that. Find out why more and more shoppers are checking out DPL-Surveillance-Equipment's e-layaway plan.If you're drooling over a new nanny camera, longing for a GPS tracker, or wishing for that spy watch, but you're strapped for cash and can't afford to do credit, do what Jennie Kheen did. She bought her iPod docking station (hidden camera w/motion-activated DVR) online using our convenient lay-away plan.Our online layaway plan works like the old-fashioned service stores used to offer. But, in Kheen's case, she went to DPL-Surveillance-Equipment.com, found the iPod docking station (hidden camera w/motion-activated DVR), then set up a payment plan."It's automatically drawn from my account," she said. "I have a budget, $208.00 a month.In three months, Kheen had paid off the $650.00 iPod docking station. She paid another 3.9 percent service fee, which amounted to about $25.35 (plus $12.00 for shipping) for a total of $687.35."You pay a little bit each month," Kheen said. "It's paid off when you get it and you don't have it lingering over your head. It's great."Flexible payment terms and automated payments make our layaway plan an affordable and fiscally responsible alternative to credit cards.1. Register:It's quick, easy and FREE! No credit check required!2. Shop:Select the items or service you want and choose "e-layaway" as your payment option. Our payment calculator makes it easy for you to set up your payment terms.3. Make Payments:Payments are made on the schedule YOU set. Check your order status or adjust your payments online in a secure environment.4. Receive Products:Receive the product shortly after your last payment. The best part, it's paid in full... NO DEBT.More Buying Power:* Our lay-away plan offers a safe and affordable payment alternative without tying up your credit or subjecting the purchase to high-interest credit card fees.No Credit Checks or Special Qualifications:* Anyone 18 years old or older can join. All you need is an active bank account.Freedom From Credit Cards:* If you are near or beyond your credit limit or simply want to avoid high interest credit card fees, our e-layaway is the smart choice for you.Flexible Payment Schedules:* Similar to traditional layaway, e-layaway lets you make regular payments towards merchandise, with delivery upon payment in full. Payments are automatically deducted from your bank account or made in cash using MoneyGram® ExpressPayment®A Tool for Planning Ahead:* Our e-layaway makes it easy for smart shoppers like you to plan ahead and buy items such as bug detectors, nanny cameras, audio bugs, gps trackers, and more!No Hidden Charges or Mounting Interest:Our e-layaway makes shopping painless by eliminating hidden charges and monthly interest fees. Our customers pay a flat transaction fee on the initial purchase price.NO RISK:* You have the right to cancel any purchase and will receive a refund less a cancellation fee. See website for details.Security and Identity Protection:DPL-Surveillance-Equipment has partnered with trusted experts like McAfee and IDology to ensure the security and integrity of every transaction. Identity verification measures are integrated into our e-layaway system to prevent fraudulent purchases.Note: Simply Choose e-Lay-Away as a "Payment Option" in The Shopping CartDPL-Surveillance-Equipment.com is a world leader in providing surveillance and security products and services to Government, Law Enforcement, Private Investigators, small and large companies worldwide. We have one of the largest varieties of state-of-the-art surveillance and counter-surveillance equipment including Personal Protection and Bug Detection Products.Buy, rent or lease the same state-of-the-art surveillance and security equipment Detectives, PI's, the CIA and FBI use. Take back control! DPL-Surveillance-Equipment.comPhone: (1888) 344-3742 Toll Free USALocal: (818) 344-3742Fax (775) 249-9320Monty@DPL-Surveillance-Equipment.comGoogle+ and GmailDPLSURVE TwitterDPLSURVEMSN Monty@DPL-Surveillance-Equipment.comAOL Instant MessengerDPLSURVE32SkypeMontyl32Yahoo Instant MessengerMontyi32Alternate Email Addressmontyi32@yahoo.comJoin my Yahoo Group!My RSS Feed
Mobile-Blok Cloth (Blocks Cell Phone Signals)Mobile Phone Etiquette:Send the right signal by giving business and dinner partners your undivided attention with this innovative, service-blocking hanky made with silver fibers that effectively block incoming calls and texts. "My phone is off for you," says it all, so you can, too. Cut, sewn, and printed in the USA of fabric made in China. The Mobile-Blok Cloth fabric is conductive (conducts electricity) because it is partially made up of silver fibers. When the fabric creates an unbroken enclosure (when it is wrapped tightly around a phone without any gaps), it creates a phenomenon that is known in science as a "Faraday Cage". This means that any external static electrical field, such as a phone signal, will cause the electrical charges within the conducting fabric to redistribute themselves so as to cancel the field's effects on what is inside. Again, in order for the Mobile-Blok Cloth to work effectively, the fabric must be wrapped tightly around the phone and create an unbroken enclosure.Mobile-Blok Cloth fabric is silver-grey in colorMaterials: 55% silver, 45% nylonDimensions: 10.5" L x 10.5" WHand Wash Only. No Bleach. 120-140 Celsius (Ironing). Hang Dry (Lay Flat)For best results: Wrap phone tightly, and spread this idea!if (WIDGETBOX) WIDGETBOX.renderWidget('66f56d16-759e-496f-bc83-6083e68c5e3d');Get the Surveillance and Security Video Library widget and many other great free widgets at Widgetbox! Not seeing a widget? (More info)if (WIDGETBOX) WIDGETBOX.renderWidget('a37c3242-37e2-4596-9572-786e643c3c89');Get the DPL-Surveillance-Equipment.com widget and many other at ()INTERNET-BASED NANNY SPY CAMERAS (Buy/Rent/Layway)NOW, look in on your home, second home, lake house or office anytime, anywhere from any internet connected PC/Lap-top or Internet active cell phone, including iphone or PDA.Watch your child's caregiver while sitting at a traffic light or lunch meeting, or check on your business security from the other side of the world. Our built-in hidden video features all digital transmissions providing a crystal clear image with zero interference. With the IP receiver stream your video over the internet through your router, and view on either a PC or smart phone. Designed exclusively for DPL-Surveillance-Equipment, these IP hidden wireless cameras come with multiple features to make the user's experience hassle-free.NOW, look in on your home, second home, lake house or office anytime, anywhere from any internet connected PC/Lap-top or Internet active cell phone, including iphone or PDA: http://www.dpl-surveillance-equipment.com/wireless_hidden_cameras.htmlWatch your child's caregiver while sitting at a traffic light or lunch meeting, or check on your business security from the other side of the world. Our built-in hidden video features all digital transmissions providing a crystal clear image with zero interference. With the IP receiver stream your video over the internet through your router, and view on either a PC or smart phone. Designed exclusively for DPL-Surveillance-Equipment, these IP hidden wireless cameras come with multiple features to make the user's experience hassle-free.• Remote Video Access• Video is Recorded Locally To An Installed SD Card (2GB SD Card included)• Email Notifications (Motion Alerts, Camera Failure, IP Address Change, SD Card Full)• Live Monitoring, Recording And Event Playback Via Internet• Back-up SD Storage Up To 32GB (SD Not Included)• SD Card Lock Box With Key So SD Card Can't Be Removed• Digital Wireless Transmission (No Camera Interference)• View LIVE On Your SmartPhone!Includes:* Nanny Cameras w/ Remote View* Wireless IP Receiver* Remote Control* A/C Adaptor* Key ( For SD Card Lock Box)* 2GB SD Card* Ethernet Network CableFACT SHEET: HIDDEN NANNY-SPY (VIEW VIA THE INTERNET) CAMERASSpecifications:Receiver Specs:* Transmission Range of 500 ft Line Of Sight* Uses 53 Channels Resulting In No Interference* 12V Power Consumption* RCA Output* RJ45/Ethernet Port* Supports up to 32gig SD* Key Lock Mechanism To Protect Video DataCamera Specs:* 640x480 / 320x240 up to 30fps* Image Sensor: 1/4" Micron Sensor* Resolution: 720x480 Pixels* S/N Ratio: >45 db* Sensitivity: >11.5V/lux-s @ 550nm* Video System: NTSC* White Balance: Auto Tracking Our New Layaway Plan Adds Convenience For Online ShoppersDPL-Surveillance-Equipment's layaway plan makes it easy for you to buy the products and services that you want by paying for them through manageable monthly payments that you set. Our intuitive calculator allows you to break down your order's purchase price into smaller payment amounts. Payments can be automatically deducted from your bank account or made in cash using MoneyGram® ExpressPayment® Services and you will receive your order once it's paid in full. Use it to plan and budget for holiday purchases, anniversaries, birthdays, vacations and more!DPL-Surveillance-Equipment's Customers can now use the convenience of layaway online to help them get through these tough economic times.We all shop now and then just to face a hard reality -- big credit card bills. However, our latest financing innovation can help you avoid that. Find out why more and more shoppers are checking out DPL-Surveillance-Equipment's e-layaway plan.If you're drooling over a new nanny camera, longing for a GPS tracker, or wishing for that spy watch, but you're strapped for cash and can't afford to do credit, do what Jennie Kheen did. She bought her iPod docking station (hidden camera w/motion-activated DVR) online using our convenient lay-away plan.Our online layaway plan works like the old-fashioned service stores used to offer. But, in Kheen's case, she went to DPL-Surveillance-Equipment.com, found the iPod docking station (hidden camera w/motion-activated DVR), then set up a payment plan."It's automatically drawn from my account," she said. "I have a budget, $208.00 a month.In three months, Kheen had paid off the $650.00 iPod docking station. She paid another 3.9 percent service fee, which amounted to about $25.35 (plus $12.00 for shipping) for a total of $687.35."You pay a little bit each month," Kheen said. "It's paid off when you get it and you don't have it lingering over your head. It's great."Flexible payment terms and automated payments make our layaway plan an affordable and fiscally responsible alternative to credit cards.1. Register:It's quick, easy and FREE! No credit check required!2. Shop:Select the items or service you want and choose "e-layaway" as your payment option. Our payment calculator makes it easy for you to set up your payment terms.3. Make Payments:Payments are made on the schedule YOU set. Check your order status or adjust your payments online in a secure environment.4. Receive Products:Receive the product shortly after your last payment. The best part, it's paid in full... NO DEBT.More Buying Power:* Our lay-away plan offers a safe and affordable payment alternative without tying up your credit or subjecting the purchase to high-interest credit card fees.No Credit Checks or Special Qualifications:* Anyone 18 years old or older can join. All you need is an active bank account.Freedom From Credit Cards:* If you are near or beyond your credit limit or simply want to avoid high interest credit card fees, our e-layaway is the smart choice for you.Flexible Payment Schedules:* Similar to traditional layaway, e-layaway lets you make regular payments towards merchandise, with delivery upon payment in full. Payments are automatically deducted from your bank account or made in cash using MoneyGram® ExpressPayment®A Tool for Planning Ahead:* Our e-layaway makes it easy for smart shoppers like you to plan ahead and buy items such as bug detectors, nanny cameras, audio bugs, gps trackers, and more!No Hidden Charges or Mounting Interest:Our e-layaway makes shopping painless by eliminating hidden charges and monthly interest fees. Our customers pay a flat transaction fee on the initial purchase price.NO RISK:* You have the right to cancel any purchase and will receive a refund less a cancellation fee. See website for details.Security and Identity Protection:DPL-Surveillance-Equipment has partnered with trusted experts like McAfee and IDology to ensure the security and integrity of every transaction. Identity verification measures are integrated into our e-layaway system to prevent fraudulent purchases.Note: Simply Choose e-Lay-Away as a "Payment Option" in The Shopping CartDPL-Surveillance-Equipment.com is a world leader in providing surveillance and security products and services to Government, Law Enforcement, Private Investigators, small and large companies worldwide. We have one of the largest varieties of state-of-the-art surveillance and counter-surveillance equipment including Personal Protection and Bug Detection Products.Buy, rent or lease the same state-of-the-art surveillance and security equipment Detectives, PI's, the CIA and FBI use. Take back control! DPL-Surveillance-Equipment.comPhone: (1888) 344-3742 Toll Free USALocal: (818) 344-3742Fax (775) 249-9320Monty@DPL-Surveillance-Equipment.comGoogle+ and GmailDPLSURVE TwitterDPLSURVEMSN Monty@DPL-Surveillance-Equipment.comAOL Instant MessengerDPLSURVE32SkypeMontyl32Yahoo Instant MessengerMontyi32Alternate Email Addressmontyi32@yahoo.comJoin my Yahoo Group!My RSS Feed
* Although it is not proven. The DESKTOP ELECTRO-MAGNETIC FIELD TUNER (DEFT) (USB-Powered) might be used to counter some of the ill-effects of Electronic Harassment!With this device you can precisely select any frequency from .01 Hz to 2 MHz, and adjust the power output as well. Produces a mammoth intensity signal: from 1 mG to over 100 mG! Digital display leaves no uncertainty about what frequency is selected. Includes memory for up to 10 favorite frequencies. USB powered from your computer or AC adapter (provided). Some people have said that it feels as though an invisible weight has been lifted off their shoulders. Irritability, eye strain, and general tiredness from using electrical appliances can feel lessened. Desktop Electro-Magnetic Field Tuner (USB-Powered) Tunable, Adjustable, Powerful This unit can also be used as an Audible Tone Generator or Frequency Counter. Produces Sine, Sawtooth and Square wave patterns. Step by step instructions included. Puts the full power of the Schumann Resonance in your hands! In 1952, the German scientist W.O.Schumann discovered a natural pulse resonating around our planet, beating at a frequency of 7.83 Hz (thereafter called the Schumann Resonance). Research has proved that electro-magnetic pollution can inhibit the human body's ability to synchronise with the Earth's natural magnetic pulse, thereby throtteling Melatonin, a major cancer suppressant and cell-rejuvenating neuro- hormone produced in the brain.Depending on your point of view, living beings either evolved in this natural electromagnetic environment (called The Schumann Resonances) or were created with Divine Intelligence to live in harmony with it. One thing is certain: Since life began, the Earth has been surrounding all living things with this natural frequency pulsation. Many experts believe that the wide spectrum of artificial man-made EMF radiation masks the natural beneficial frequency of the Earth.Electropollution may cause us to feel more stressed, fatigued and "out of balance." Laboratory research has shown that exposing living cells to the Schumann Resonance had beneficial effects when exposed to ambient EMFs, allowing the cells to increase their immune protection, and decrease the absorption of depression-inducing chemicals. Some researchers believe that by producing a 7.83 Hz signal we can counter the effects of the irritating man-made fields. By replicating the Earth's natural rhythm, we may be providing ourselves (at least in our immediate vicinity) with a more healthy environment.Research in Biophysics seems to suggest, that our biological system is "tuned into" the background frequency of our planet - the `Schumann Resonance'- a steady pulse of 7.8 Hz which beats around the planet within the earth/ionosphere cavity. It has been found that this is also the dominant brainwave rhythm of all mammals. Drowning out this natural frequency by overlaying it with manmade radiation noise, and in particular pulsed (digital) magnetic fields, can have devastating effects on our immune system, which is largely orchestrated by the release of certain neuro-transmitters and hormones within the human brain. By introducing interference signals, we create new previously unknown patterns, which thereby could set off new previously unknown auto-immune conditions.This could be likened to switches suddenly being turned on, which previously have been turned off and vice versa, leading to unforeseen consequences. Unless we accept the reality that the human brain is like a finely tuned electrical instrument, we will not be able to understand what is happening. The Schumann Resonances are quasi-standing electromagnetic waves that exist in the Earth's 'electromagnetic' cavity (the space between the surface of the Earth and the Ionosphere). Like waves on a string, they are not present all the time, but have to be 'excited' to be observed. They are not caused by anything internal to the Earth, its crust or its core. They seem to be related to electrical activity in the atmosphere, particularly during times of intense lightning activity. They occur at several frequencies, specifically 7.8 (strongest), 14, 20, 26, 33, 39 and 45 (weakest) Hertz, with a daily variation of about ± 0.5 Hertz. So long as the properties of Earth's electromagnetic cavity remains about the same, these frequencies remain the same. Presumably there is some change due to the solar sunspot cycle as the Earth's ionosphere changes in response to the 11-year cycle of solar activity. The resonant properties of this terrestrial cavity were first predicted by the German physicist W. O. Schumann between 1952 and 1957, and first detected in 1954.The Urgent Need For Further Research Into The Schumann Resonance Effect Although Schumann Resonance could easily be confirmed by measurements at the time of its discovery, it is no longer so obvious due to our atmosphere being filled with manmade radiation noise at different frequencies. This is almost drowning out the natural signals - signals that have been there through aeons of evolution. It is possible that these signals act like a natural tuning fork, not just for the biological oscillators of the brain, but for all processes of life.With the advent of new wireless technology, in particular microwaves pulsed at frequencies close to Schumann Resonance as in mobile telephony, another threat is emerging. We may be creating an environment that is literally `out of tune' with Nature itself. And it is at this point that there is an urgent need for us to understand how everything alive responds to the most subtle changes in magnetic and electromagnetic fields surrounding us.There is a great need for independent research into the bio-compatibility between natural and manmade signals. By linking together the potential importance of Schumann Resonance and the dangers posed by manmade pulsed frequencies, it will become apparent that unless we find a way to use bio-compatible signals to power new technology, we may expose all life to dangers previously not encountered. We may have to pay a high price for this shortsightedness. Serious attention must now be paid to the possible biological role of standing waves in the atmosphere, so that we do not overlook the importance of oscillations in nature that may be central to consciousness and life itself. The late Dr Neil Cherry, a fierce opponent of the frequencies used in mobile telephony, has also focused on the importance of Schumann Resonance in his publications 'Schumann Resonances, a plausible biophysical mechanism for the human health effects of Solar/Geomagnetic Activity' (2002), and 'Human intelligence: The brain, an electromagnetic system synchronised by the Schumann Resonance signal' (2003). Professor R.Wever from the Max Planck Institute for Behavioural Physiology in Erling-Andechs, built an underground bunker which completely screened out magnetic fields. Student volunteers lived there for four weeks in this hermetically sealed environment. Professor Wever noted that the student's circadian rhythms diverged and that they suffered emotional distress and migraine headaches. As they were young and healthy, no serious health conditions arose, which would not have been the case with older people or people with a compromised immune system. After only a brief exposure to 7.8 Hz (the very frequency which had been screened out), the volunteers health stabilized again.The same complaints were reported by the first astronauts and cosmonauts, who, out in space, also were no longer exposed to the Schumann waves. Now modern spacecrafts are said to contain a device which simulates the Schumann waves.A Tuning Fork For Life Although the existence of the Schumann Resonance is an established scientific fact, there are very few scientists who are aware of the importance of this frequency as a tuning fork for Life. I propose that it is not merely a phenomenon caused by lightning in the atmosphere, but a very important electromagnetic standing wave, acting as background frequency and influencing biological oscillators within the mammalian brain.At the time when Schumann published his research results in the journal `Technische Physik', Dr Ankermueller, a physician, immediately made the connection between the Schumann resonance and the alpha rhythm of brainwaves. He found the thought of the earth having the same natural resonance as the brain very exciting and contacted Professor Schumann, who in turn asked a doctorate candidate to look into this phenomenon. This candidate was Herbert König who became Schumann's successor at Munich University. König demonstrated a correlation between Schumann Resonances and brain rhythms. He compared human EEG recordings with natural electromagnetic fields of the environment (1979) and found that the main frequency produced by Schumann oscillations is very close to the frequency of alpha rhythms.Dr König carried out further measurements of Schumann resonance and eventually arrived at a frequency of exactly 7.83 Hz, which is even more interesting, as this frequency is one which applies to mammals. For instance, septal driving of the hippocampal rhythm in rats has been found to have a minimum threshold at 7.7 Hz (Gray, 1982).This relationship has been explored by a number of investigators. For further information see Natural electromagnetic fields research on the h.e.s.e. project website.If organisms do in fact respond to, and perhaps depend on, electromagnetic fields as weak as that produced by Schumann resonance, this is of major significance for the development of present and future wireless technologies. Funding for research projects investigating the Schumann Resonance Effect is now being sought and scientists who support this call for research are invited to contact me by e-mail. References Gray, J.A., 1982, The Neuropsychology of Anxiety: An Enquiry into the Functions of the Septo-Hippocampal System. Clarendon Press. Cherry, N.J., 2002, Schumann Resonances, a plausible biophysical mechanism for the human health effects of Solar/Geomagnetic Activity, Natural Hazards 26(3), p 279-331 Cherry, N.J. 2003, Human intelligence: The brain, an electromagnetic system synchronised by the Schumann Resonance signal, Medical Hypotheses 60(60):843-4 Cherry,N. Cell phone radiation poses a serious biological and health risk http://www.drscheiner-muenchen.de/Cherryeng.htm König, H.L Bioinformation - Electrophysical Aspects. In: Electromagnetic Bioinformation, Popp, F.A., Becker,G., König, H.L.Peschka,W.,(eds.) Urban und Schwarzenberg p 25, 1979 Ludwig,W `Informative Medizin' VGM Verlag fuer Ganzheitsmedizin, Essen, 1999 Schumann, W.O.Ueber die strahlungslosen Eigenschwingungen einer leitenden Kugel, die von einer Luftschicht und einer Ionosphaerenhuelle umgeben ist, Z.Naturforsch. 7a, 149, 1952 Schumann W.O. König, H. Ueber die Beobachtung von Atmospherics bei geringsten Frequenzen, Naturwissenschaften, 41, 183, 1954 Our New Layaway Plan Adds Convenience For Online ShoppersDPL-Surveillance-Equipment's layaway plan makes it easy for you to buy the products and services that you want by paying for them through manageable monthly payments that you set. Our intuitive calculator allows you to break down your order's purchase price into smaller payment amounts. Payments can be automatically deducted from your bank account or made in cash using MoneyGram® ExpressPayment® Services and you will receive your order once it's paid in full. Use it to plan and budget for holiday purchases, anniversaries, birthdays, vacations and more!DPL-Surveillance-Equipment's Customers can now use the convenience of layaway online to help them get through these tough economic times.We all shop now and then just to face a hard reality -- big credit card bills. However, our latest financing innovation can help you avoid that. Find out why more and more shoppers are checking out DPL-Surveillance-Equipment's e-layaway plan.If you're drooling over a new nanny camera, longing for a GPS tracker, or wishing for that spy watch, but you're strapped for cash and can't afford to do credit, do what Jennie Kheen did. She bought her iPod docking station (hidden camera w/motion-activated DVR) online using our convenient lay-away plan.Our online layaway plan works like the old-fashioned service stores used to offer. But, in Kheen's case, she went to DPL-Surveillance-Equipment.com, found the iPod docking station (hidden camera w/motion-activated DVR), then set up a payment plan."It's automatically drawn from my account," she said. "I have a budget, $208.00 a month.In three months, Kheen had paid off the $650.00 iPod docking station. She paid another 3.9 percent service fee, which amounted to about $25.35 (plus $12.00 for shipping) for a total of $687.35."You pay a little bit each month," Kheen said. "It's paid off when you get it and you don't have it lingering over your head. It's great."Flexible payment terms and automated payments make our layaway plan an affordable and fiscally responsible alternative to credit cards.1. Register:It's quick, easy and FREE! No credit check required!2. Shop:Select the items or service you want and choose "e-layaway" as your payment option. Our payment calculator makes it easy for you to set up your payment terms.3. Make Payments:Payments are made on the schedule YOU set. Check your order status or adjust your payments online in a secure environment.4. Receive Products:Receive the product shortly after your last payment. The best part, it's paid in full... NO DEBT.More Buying Power:* Our lay-away plan offers a safe and affordable payment alternative without tying up your credit or subjecting the purchase to high-interest credit card fees.No Credit Checks or Special Qualifications:* Anyone 18 years old or older can join. All you need is an active bank account.Freedom From Credit Cards:* If you are near or beyond your credit limit or simply want to avoid high interest credit card fees, our e-layaway is the smart choice for you.Flexible Payment Schedules:* Similar to traditional layaway, e-layaway lets you make regular payments towards merchandise, with delivery upon payment in full. Payments are automatically deducted from your bank account or made in cash using MoneyGram® ExpressPayment®A Tool for Planning Ahead:* Our e-layaway makes it easy for smart shoppers like you to plan ahead and buy items such as bug detectors, nanny cameras, audio bugs, gps trackers, and more!No Hidden Charges or Mounting Interest:Our e-layaway makes shopping painless by eliminating hidden charges and monthly interest fees. Our customers pay a flat transaction fee on the initial purchase price.NO RISK:* You have the right to cancel any purchase and will receive a refund less a cancellation fee. See website for details.Security and Identity Protection:DPL-Surveillance-Equipment has partnered with trusted experts like McAfee and IDology to ensure the security and integrity of every transaction. Identity verification measures are integrated into our e-layaway system to prevent fraudulent purchases.Note: Simply Choose e-Lay-Away as a "Payment Option" in The Shopping CartIn this video http://tinyurl.com/lva9hn we present to you (via our surveillance and security video library) information about our new products, counter-surveillance techniques, industry-news, etc.RSS Reader (Widget) for New Surveillance Product/Service Announcements: http://tinyurl.com/yzg66zjUse this new RSS Reader / Widget to automatically receive new product and service announcements. Preview the same state-of-the-art surveillance and security equipment Detectives, PI's, the CIA and FBI use.Join us on Facebook! (DPLSURVE) http://www.facebook.com/dplsurve Stay Informed!We have a life-time warranty / guarantee on all products. (Includes parts and labor).Whether you are monitoring a home, vacation property or in the office and would like to see the baby at home, employees at the office, etc.DPL-Surveillance-Equipment.com LLC is a world leader and pioneer of online video demonstration in the Surveillance and Security Industry and also, pioneer of renting a full range of equipment to Consumers, Government, Law Enforcement, Private Investigators, small and large companies worldwide. We have one of the largest varieties of state-of-the-art (one-of-a-kind) surveillance and counter-surveillance equipment including Biometric Identification Systems, Anti-terrorist-related equipment, Personal Protection and Bug Detection Products.Buy, rent or lease the same state-of-the-art surveillance and security equipment Detectives, PI's, the CIA and FBI use. Take back control!* Please feel free to use this link: http://feeds.feedburner.com/Dpl-surveillance-equipmentcom and iPodderX to subscribe to our Podcasts.Phone: (1888) 344-3742 Toll Free (USA)Local: (818) 344-3742Monty@DPL-Surveillance-Equipment.comTwitterDPLSURVEMSNMonty@DPL-Surveillance-Equipment.com Google+ and GmailDPLSURVEAOL Instant MessengerDPLSURVE32SkypeMontyl32Yahoo Instant MessengerMontyi32Alternate Email Addressmontyi32@yahoo.comhttp://www.dpl-surveillance-equipment.comSerious Inquiries Only!International OrdersFOB Los AngelesDelivery: Within 5 days in receipt of T/T wire transferPayment: T/T wire transfer (See Website)Purchase Orders:Accepted upon credit approval.Fax References w/Orders to: (1775) 249-9320My RSS Feed: http://feeds.feedburner.com/Dpl-surveillance-equipmentcom
* Although it is not proven. The DESKTOP ELECTRO-MAGNETIC FIELD TUNER (DEFT) might be used to counter some of the ill-effects of Electronic Harassment!The PEFT: has the unique ability to be tuned from about 2 Hz to over 20 Hz , to produce the exact frequency that will give maximum benefit to your specific body. And it can be re-adjusted in seconds at any time, for any new circumstance, including the changes taking place in the Earth's natural field. . Some people have said that it feels as though an invisible weight has been lifted off their shoulders. Irritability, eye strain, and general tiredness from using electrical appliances can feel lessened.Same tunable circuitry, but more powerful to cover a larger area. Includes optional ground cord to inject the signal into the wiring of your building. Some say it adds sound depth to high end audio equipment. 12V adapter plugs into AC outlet so no batteries to wear out. North American adapter supplied. In 1952, the German scientist W.O.Schumann discovered a natural pulse resonating around our planet, beating at a frequency of 7.83 Hz (thereafter called the Schumann Resonance). Research has proved that electro-magnetic pollution can inhibit the human body's ability to synchronise with the Earth's natural magnetic pulse, thereby throtteling Melatonin, a major cancer suppressant and cell-rejuvenating neuro- hormone produced in the brain.Depending on your point of view, living beings either evolved in this natural electromagnetic environment (called The Schumann Resonances) or were created with Divine Intelligence to live in harmony with it. One thing is certain: Since life began, the Earth has been surrounding all living things with this natural frequency pulsation. Many experts believe that the wide spectrum of artificial man-made EMF radiation masks the natural beneficial frequency of the Earth.Electropollution may cause us to feel more stressed, fatigued and "out of balance." Laboratory research has shown that exposing living cells to the Schumann Resonance had beneficial effects when exposed to ambient EMFs, allowing the cells to increase their immune protection, and decrease the absorption of depression-inducing chemicals. Some researchers believe that by producing a 7.83 Hz signal we can counter the effects of the irritating man-made fields. By replicating the Earth's natural rhythm, we may be providing ourselves (at least in our immediate vicinity) with a more healthy environment.Research in Biophysics seems to suggest, that our biological system is "tuned into" the background frequency of our planet - the `Schumann Resonance'- a steady pulse of 7.8 Hz which beats around the planet within the earth/ionosphere cavity. It has been found that this is also the dominant brainwave rhythm of all mammals. Drowning out this natural frequency by overlaying it with manmade radiation noise, and in particular pulsed (digital) magnetic fields, can have devastating effects on our immune system, which is largely orchestrated by the release of certain neuro-transmitters and hormones within the human brain. By introducing interference signals, we create new previously unknown patterns, which thereby could set off new previously unknown auto-immune conditions.This could be likened to switches suddenly being turned on, which previously have been turned off and vice versa, leading to unforeseen consequences. Unless we accept the reality that the human brain is like a finely tuned electrical instrument, we will not be able to understand what is happening. The Schumann Resonances are quasi-standing electromagnetic waves that exist in the Earth's 'electromagnetic' cavity (the space between the surface of the Earth and the Ionosphere). Like waves on a string, they are not present all the time, but have to be 'excited' to be observed. They are not caused by anything internal to the Earth, its crust or its core. They seem to be related to electrical activity in the atmosphere, particularly during times of intense lightning activity. They occur at several frequencies, specifically 7.8 (strongest), 14, 20, 26, 33, 39 and 45 (weakest) Hertz, with a daily variation of about ± 0.5 Hertz. So long as the properties of Earth's electromagnetic cavity remains about the same, these frequencies remain the same. Presumably there is some change due to the solar sunspot cycle as the Earth's ionosphere changes in response to the 11-year cycle of solar activity. The resonant properties of this terrestrial cavity were first predicted by the German physicist W. O. Schumann between 1952 and 1957, and first detected in 1954.The Urgent Need For Further Research Into The Schumann Resonance Effect Although Schumann Resonance could easily be confirmed by measurements at the time of its discovery, it is no longer so obvious due to our atmosphere being filled with manmade radiation noise at different frequencies. This is almost drowning out the natural signals - signals that have been there through aeons of evolution. It is possible that these signals act like a natural tuning fork, not just for the biological oscillators of the brain, but for all processes of life.With the advent of new wireless technology, in particular microwaves pulsed at frequencies close to Schumann Resonance as in mobile telephony, another threat is emerging. We may be creating an environment that is literally `out of tune' with Nature itself. And it is at this point that there is an urgent need for us to understand how everything alive responds to the most subtle changes in magnetic and electromagnetic fields surrounding us.There is a great need for independent research into the bio-compatibility between natural and manmade signals. By linking together the potential importance of Schumann Resonance and the dangers posed by manmade pulsed frequencies, it will become apparent that unless we find a way to use bio-compatible signals to power new technology, we may expose all life to dangers previously not encountered. We may have to pay a high price for this shortsightedness. Serious attention must now be paid to the possible biological role of standing waves in the atmosphere, so that we do not overlook the importance of oscillations in nature that may be central to consciousness and life itself. The late Dr Neil Cherry, a fierce opponent of the frequencies used in mobile telephony, has also focused on the importance of Schumann Resonance in his publications 'Schumann Resonances, a plausible biophysical mechanism for the human health effects of Solar/Geomagnetic Activity' (2002), and 'Human intelligence: The brain, an electromagnetic system synchronised by the Schumann Resonance signal' (2003). Professor R.Wever from the Max Planck Institute for Behavioural Physiology in Erling-Andechs, built an underground bunker which completely screened out magnetic fields. Student volunteers lived there for four weeks in this hermetically sealed environment. Professor Wever noted that the student's circadian rhythms diverged and that they suffered emotional distress and migraine headaches. As they were young and healthy, no serious health conditions arose, which would not have been the case with older people or people with a compromised immune system. After only a brief exposure to 7.8 Hz (the very frequency which had been screened out), the volunteers health stabilized again.The same complaints were reported by the first astronauts and cosmonauts, who, out in space, also were no longer exposed to the Schumann waves. Now modern spacecrafts are said to contain a device which simulates the Schumann waves.A Tuning Fork For Life Although the existence of the Schumann Resonance is an established scientific fact, there are very few scientists who are aware of the importance of this frequency as a tuning fork for Life. I propose that it is not merely a phenomenon caused by lightning in the atmosphere, but a very important electromagnetic standing wave, acting as background frequency and influencing biological oscillators within the mammalian brain.At the time when Schumann published his research results in the journal `Technische Physik', Dr Ankermueller, a physician, immediately made the connection between the Schumann resonance and the alpha rhythm of brainwaves. He found the thought of the earth having the same natural resonance as the brain very exciting and contacted Professor Schumann, who in turn asked a doctorate candidate to look into this phenomenon. This candidate was Herbert König who became Schumann's successor at Munich University. König demonstrated a correlation between Schumann Resonances and brain rhythms. He compared human EEG recordings with natural electromagnetic fields of the environment (1979) and found that the main frequency produced by Schumann oscillations is very close to the frequency of alpha rhythms.Dr König carried out further measurements of Schumann resonance and eventually arrived at a frequency of exactly 7.83 Hz, which is even more interesting, as this frequency is one which applies to mammals. For instance, septal driving of the hippocampal rhythm in rats has been found to have a minimum threshold at 7.7 Hz (Gray, 1982).This relationship has been explored by a number of investigators. For further information see Natural electromagnetic fields research on the h.e.s.e. project website.If organisms do in fact respond to, and perhaps depend on, electromagnetic fields as weak as that produced by Schumann resonance, this is of major significance for the development of present and future wireless technologies. Funding for research projects investigating the Schumann Resonance Effect is now being sought and scientists who support this call for research are invited to contact me by e-mail. References Gray, J.A., 1982, The Neuropsychology of Anxiety: An Enquiry into the Functions of the Septo-Hippocampal System. Clarendon Press. Cherry, N.J., 2002, Schumann Resonances, a plausible biophysical mechanism for the human health effects of Solar/Geomagnetic Activity, Natural Hazards 26(3), p 279-331 Cherry, N.J. 2003, Human intelligence: The brain, an electromagnetic system synchronised by the Schumann Resonance signal, Medical Hypotheses 60(60):843-4 Cherry,N. Cell phone radiation poses a serious biological and health risk http://www.drscheiner-muenchen.de/Cherryeng.htm König, H.L Bioinformation - Electrophysical Aspects. In: Electromagnetic Bioinformation, Popp, F.A., Becker,G., König, H.L.Peschka,W.,(eds.) Urban und Schwarzenberg p 25, 1979 Ludwig,W `Informative Medizin' VGM Verlag fuer Ganzheitsmedizin, Essen, 1999 Schumann, W.O.Ueber die strahlungslosen Eigenschwingungen einer leitenden Kugel, die von einer Luftschicht und einer Ionosphaerenhuelle umgeben ist, Z.Naturforsch. 7a, 149, 1952 Schumann W.O. König, H. Ueber die Beobachtung von Atmospherics bei geringsten Frequenzen, Naturwissenschaften, 41, 183, 1954 Our New Layaway Plan Adds Convenience For Online ShoppersDPL-Surveillance-Equipment's layaway plan makes it easy for you to buy the products and services that you want by paying for them through manageable monthly payments that you set. Our intuitive calculator allows you to break down your order's purchase price into smaller payment amounts. Payments can be automatically deducted from your bank account or made in cash using MoneyGram® ExpressPayment® Services and you will receive your order once it's paid in full. Use it to plan and budget for holiday purchases, anniversaries, birthdays, vacations and more!DPL-Surveillance-Equipment's Customers can now use the convenience of layaway online to help them get through these tough economic times.We all shop now and then just to face a hard reality -- big credit card bills. However, our latest financing innovation can help you avoid that. Find out why more and more shoppers are checking out DPL-Surveillance-Equipment's e-layaway plan.If you're drooling over a new nanny camera, longing for a GPS tracker, or wishing for that spy watch, but you're strapped for cash and can't afford to do credit, do what Jennie Kheen did. She bought her iPod docking station (hidden camera w/motion-activated DVR) online using our convenient lay-away plan.Our online layaway plan works like the old-fashioned service stores used to offer. But, in Kheen's case, she went to DPL-Surveillance-Equipment.com, found the iPod docking station (hidden camera w/motion-activated DVR), then set up a payment plan."It's automatically drawn from my account," she said. "I have a budget, $208.00 a month.In three months, Kheen had paid off the $650.00 iPod docking station. She paid another 3.9 percent service fee, which amounted to about $25.35 (plus $12.00 for shipping) for a total of $687.35."You pay a little bit each month," Kheen said. "It's paid off when you get it and you don't have it lingering over your head. It's great."Flexible payment terms and automated payments make our layaway plan an affordable and fiscally responsible alternative to credit cards.1. Register:It's quick, easy and FREE! No credit check required!2. Shop:Select the items or service you want and choose "e-layaway" as your payment option. Our payment calculator makes it easy for you to set up your payment terms.3. Make Payments:Payments are made on the schedule YOU set. Check your order status or adjust your payments online in a secure environment.4. Receive Products:Receive the product shortly after your last payment. The best part, it's paid in full... NO DEBT.More Buying Power:* Our lay-away plan offers a safe and affordable payment alternative without tying up your credit or subjecting the purchase to high-interest credit card fees.No Credit Checks or Special Qualifications:* Anyone 18 years old or older can join. All you need is an active bank account.Freedom From Credit Cards:* If you are near or beyond your credit limit or simply want to avoid high interest credit card fees, our e-layaway is the smart choice for you.Flexible Payment Schedules:* Similar to traditional layaway, e-layaway lets you make regular payments towards merchandise, with delivery upon payment in full. Payments are automatically deducted from your bank account or made in cash using MoneyGram® ExpressPayment®A Tool for Planning Ahead:* Our e-layaway makes it easy for smart shoppers like you to plan ahead and buy items such as bug detectors, nanny cameras, audio bugs, gps trackers, and more!No Hidden Charges or Mounting Interest:Our e-layaway makes shopping painless by eliminating hidden charges and monthly interest fees. Our customers pay a flat transaction fee on the initial purchase price.NO RISK:* You have the right to cancel any purchase and will receive a refund less a cancellation fee. See website for details.Security and Identity Protection:DPL-Surveillance-Equipment has partnered with trusted experts like McAfee and IDology to ensure the security and integrity of every transaction. Identity verification measures are integrated into our e-layaway system to prevent fraudulent purchases.Note: Simply Choose e-Lay-Away as a "Payment Option" in The Shopping CartIn this video http://tinyurl.com/lva9hn we present to you (via our surveillance and security video library) information about our new products, counter-surveillance techniques, industry-news, etc.RSS Reader (Widget) for New Surveillance Product/Service Announcements: http://tinyurl.com/yzg66zjUse this new RSS Reader / Widget to automatically receive new product and service announcements. Preview the same state-of-the-art surveillance and security equipment Detectives, PI's, the CIA and FBI use.Join us on Facebook! (DPLSURVE) http://www.facebook.com/dplsurve Stay Informed!We have a life-time warranty / guarantee on all products. (Includes parts and labor).Whether you are monitoring a home, vacation property or in the office and would like to see the baby at home, employees at the office, etc.DPL-Surveillance-Equipment.com LLC is a world leader and pioneer of online video demonstration in the Surveillance and Security Industry and also, pioneer of renting a full range of equipment to Consumers, Government, Law Enforcement, Private Investigators, small and large companies worldwide. We have one of the largest varieties of state-of-the-art (one-of-a-kind) surveillance and counter-surveillance equipment including Biometric Identification Systems, Anti-terrorist-related equipment, Personal Protection and Bug Detection Products.Buy, rent or lease the same state-of-the-art surveillance and security equipment Detectives, PI's, the CIA and FBI use. Take back control!* Please feel free to use this link: http://feeds.feedburner.com/Dpl-surveillance-equipmentcom and iPodderX to subscribe to our Podcasts.Phone: (1888) 344-3742 Toll Free (USA)Local: (818) 344-3742Monty@DPL-Surveillance-Equipment.comTwitterDPLSURVEMSNMonty@DPL-Surveillance-Equipment.com Google+ and GmailDPLSURVEAOL Instant MessengerDPLSURVE32SkypeMontyl32Yahoo Instant MessengerMontyi32Alternate Email Addressmontyi32@yahoo.comhttp://www.dpl-surveillance-equipment.comSerious Inquiries Only!International OrdersFOB Los AngelesDelivery: Within 5 days in receipt of T/T wire transferPayment: T/T wire transfer (See Website)Purchase Orders:Accepted upon credit approval.Fax References w/Orders to: (1775) 249-9320My RSS Feed: http://feeds.feedburner.com/Dpl-surveillance-equipmentcom
Shared secrets, such as your first pet's name or a high school mascot, are a common way to retrieve passwords and reset accounts. With the explosion of social networking these secrets are easier for fraudster's to find. To combat these problems IDology has developed a knowledge-based authentication solution that uses a company's data on an individual to create questions. Regarding ID's Gina Jordan spoke with John Dancu, CEO at IDology, about his company's new product.