POPULARITY
WidgetBox: Color Widgets&Icons - iPad 2017
Click Here Or On Above Image To Reach Our Experts#EssexPropertyTrustSucksNo less than (3) lies coming from Darlene and Veronica (Woodside Village Leasing Office)Click Here For BBB Business Review Page This Is My Existing Case/Complaint!Corporate Office1100 Park Place, Suite 200San Mateo, CA 94403(650) 655-7800Principal: Mr. Michael Schall (CEO)Customer Contact: Elisa Taylor (Executive Assistant)Veronica Beals (General Manager)Mr. Michael Dance (CFO)(1). Deena Sease (customer service, Woodland Hills, Ca) told me that she had already touched basis with Darlene regarding my concerns about the new supposedly "low-flow" toilets which require at least (4) flushes to actually work properly.When I cornered Darlene by telling her that Deena Sease actually told me that she had already briefed Darlene about my concerns Darlene finally not only admitted but apologized for not getting back to me. Initially Darlene tried to make me believe she had no clue about my concerns about the toilets.(2). Two neighbors (volunteered) told me that they had negotiated their rent due to financial hard-ship. I had expressed my interest in negotiating my rent prior to talking to either of these residents. I was told by Darlene and Veronica that under no circumstance did or would Woodside/Essex negotiate rent. PRO-DTECH II FREQUENCY DETECTOR(Buy/Rent/Layaway)When I informed them that two residents informed me about their exceptions then the deadly duo finally figured out they should come-up with a reason why an exception was indeed made. Hmmm. (3). I put in a work-order requesting that the maintenance people come in and touch-up peeling and flaking paint on our kitchen and bathroom cabinets. My work order was posted and for (3) weeks I was told by Darlene that when things slowed down a bit (new sheep I mean tenants moving in) I would have my request addressed.CELLPHONE DETECTOR (PROFESSIONAL)(Buy/Rent/Layaway)I waited at least a week and then called to follow-up, then I was told that Leo (our maintenance worker) would drop-off some paint as he was not allowed to actually do the work.Twitter: #EssexPropertyTrustSucks And #WoodsideVillageAptsSucks: https://t.co/8jWU8UK5Jb pic.twitter.com/KpIO59h7Nw— Nanny Camera Rentals (@dplsurve) June 25, 2016Patricia Wilson reviewed Essex Property Trust — 1 starMarch 19 · Essex has essentially stolen $500 from us by letting us apply, lying and saying we were accepted, then telling us we couldn't be accepted unless we gave up one of our cats. We asked for our $500 deposit back and were told a check was forthcoming...on Feb 2. Numerous phone calls, emails, messages on their site, etc have only led to ONE call back, and the person in charge of refunds who called me back (at 5:50 pm, ten minutes before they close, so I couldn't get anyone when I called back almost immediately) has not called me back again after 2 more days of leaving voicemails. When I call her # it goes to voicemail EVERY TIME. We are now in the process of contacting the Seattle Tenants Union and getting their legal assistance. PRO TIP- do not even bother applying to any Essex property, they will rip you off however they can.PRO-DTECH III FREQUENCY DETECTOR(Buy/Rent/Layaway)When I saw him personally on premises (two weeks later) I again requested the paint to be dropped-off on my porch. He confirmed that this was not a problem and he would do it as soon as he returned from running to the store. He never complied with my request or followed-up with me.PRO-DTECH III FREQUENCY DETECTOR(Buy/Rent/Layaway)I called the leasing office and was told by Darlene that not only was I not going to get the assistance they agreed to help me with and that at least a year ago the company decided that touching-up paint in the interior was not something that they were even allowed to do.Christopher Kim reviewed Essex Property Trust — 1 starMarch 8 · Omg honestly, just like others have said, if I could give it negative 10 stars I would. I have been living at Park Catalina in Los Angeles CA for about 4 years now, and I've been biting my tongue and letting the things not get to me but this time the entrance gate for our garage has been broken for over a month and I spoke with our property manger and she basically just told me to live with it until they fix it. It's not even like this place is a cheap to live in. After I talked to the property manager at our location and getting a "too bad for you" attitude, I call the actually company (Essex Property Trust) and leave a message which I don't get a call back from, my wife left a comment thing and they call her back but she missed the call so she had me call them back and still Deena doesn't pick up. So I left a comment request on their site and still I don't get a call back. What kind of shit is this? Clearly they don't give a shit about their residents, even after you've been living there for several years. This is probably the worst fucking experience I've had trying to figure out what's going on at my apartment. If anyone is reading this and you're trying to move into an apartment and you that it's owned by Essex, just leave. They don't care about you or your complaints. doesn't matter about how long you've stayed at their place. Fucking worse customer service than AT and T, and that's saying something.On one occasion I was actually standing near Leo when Darlene called his cell and told him that I had two work-orders (one was for touching-up paint in the kitchen and bathroom) that needed to be addressed and he agreed that he would look into them asap.PRO-DTECH III FREQUENCY DETECTOR(Buy/Rent/Layaway)So today, finally (upset by their lack of cooperation, deception, procrastination, etc.) I go to the leasing office for an explanation. Darlene marched me outside and TOLD me that I was not justified in my anger and had to immediately leave the area of the leasing office.She informed me that she would call the police if I didn't leave right-away. So I called the police myself and when they finally came to my unit I reminded them that I was merely trying to make sure that my unit and surrounding area reflected a certain pride of ownership/rentership.Michelle Mccown reviewed Essex Property Trust — 1 starMarch 8 · I live at the alpine CA location and its very poor, the landscaping doesn't do good at all. They rip plants and bushes out, they leave a mess and all the roots, me and my family are the ones who clean up in front and sweep a pile down to the street and sometimes it takes them a week to pick it up even though they pass it mutlipe times a day. There's no play area for children especially young ones, the dumpster is disgusting the one by my apt, trash always everywhere, trash company sometimes goes days without dumping it, and we all have to pay AUM bill which there is 301 units here with only 1 water meter so everyone is being OVER CHARGED for water, and we are paying for trash and no one knows how much 1 person is dumping, you would have an elderly person dump 1 bag a week away and there being charged $20 a month. That's not right! Love the area and want to stay living here but they need to be thinking about the issues here.WIRELESS/WIRED HIDDENCAMERA FINDER III(Buy/Rent/Layaway)Now I clearly see that either the deadly-duo (Darlene and Veronica) are either prejudice against blacks (actually we're a mixed couple) or maybe they prefer to be slum-lords and delight in having slum-residents. HmmmmPRO-DTECH IV FREQUENCY DETECTOR(Buy/Rent/Layaway)It seems that corporate wants to have absolutely nothing to do with holding these two accountable and treating everyone fairly so beware of coming to live in an Essex or particularly a Woodside Village unit. Checkout some of the reviews on their Facebook page and exercise extreme caution lest you waste valuable time and money dealing with these people. Facebook ReviewsKaren Ingram I live at Fountain Park at Playa Vista. And something else to add. Last night was the worst night me and my husband had!! After telling customer relations about the trees hitting the building and windows, we would told someone would go look. Yesterday, ( April 14th) we see tree trimmers...and I thought finally. NOT!! They trimmed the palm trees on the parking area...which aren't even close to the buildings!!! All last night we were scared awake from the branches hitting the windows and the the constant hitting on the building!! We are highly upset!!! The trees on the island where the street parking is have been trimmed twice!!! While the trees near the buildings have not been touched, even before the painting...which by the way we were lied to telling us they would be trimmed before the painting! Like · Reply · April 15 at 8:25amInstead of me getting a "cease and desist" (See Below:) for getting upset due to the continued lies I think or know that I'm actually entitled to an apology (and retraction of this order) for what is obviously habitual lying from the
Click Here Or On Above Image To Reach Our ExpertsBioelectronics The Future of MedicineBioelectronic medicine is a scientific discipline that brings together molecular biology, neurophysiology, neurotechnology and analytics to develop nerve-stimulating technologies to regulate the molecular targets underlying disease. This approach promises to deliver therapies superior to pharmaceuticals in terms of efficacy, safety, and cost, without significant side effects.At the core of bioelectronic medicine is the electrical signal used by the nervous system to communicate information. Virtually every cell of the body is directly or indirectly controlled by these neural signals. Bioelectronic medicine technologies can record, stimulate, and block neural signaling. Bioelectronic medicine will change the way we treat diseases, injuries and conditions such as rheumatoid arthritis, Crohn's disease, diabetes, paralysis, bleeding, and even cancer.The functions and organ systems of our body are, to a significant extent, controlled by electrical signals that travel along the nerves. Bioelectronic medicines will aim to control biological processes and treat disease by modulating these electrical impulses.They will be miniaturized devices that connect to specific groups of neurons or their nerve fibres and modulate the electrical signaling patterns, to restore the healthy states of targeted organs and functions.Imagine a world where we treated deadly diseases with electricity instead of pills or chemo.We might not be as far from this reality as you think.Normally, our nervous systems send signals to our tissues and organs to suppress inflammation, a phenomenon known as the inflammatory reflex. But sometimes, this system gets out of whack, and can even result in diseases like rheumatoid arthritis and inflammatory bowel disease.Traditionally, doctors have treated these diseases using drugs designed to suppress inflammation, such as infliximab (trade name Remicade) oradalimumab (Humira). But these drugs are expensive. Plus, they don't work for everyone, often come with nasty side effects, and sometimes, although rarely, they can even kill.Now, some researchers have found a way to deliver electrical stimulation to just the right areas to stop chronic inflammation in its tracks — a therapy they're calling bioelectronic medicine.-------------------Related Article:Achieving Optimum Health By Understanding Biological Frequencies: Nikola Tesla Said, "If You Could Eliminate Certain Outside Frequencies That Interfered In Our Bodies, We Would Have Greater Resistance Toward Disease". PRO-DTECH II FREQUENCY DETECTOR(Buy/Rent/Layaway)An Accidental DiscoveryLike many great ideas in science, this one came as an accident. Neurosurgeon Kevin Tracey, the president and CEO of the Feinstein Institute for Medical Research in Manhasset, New York, and his colleagues were studying a chemical that blocked inflammation in the brain, when they found it also decreased inflammation in the spleen and other organs. CELLPHONE DETECTOR (PROFESSIONAL)(Buy/Rent/Layaway)At the time, "we didn't understand how the brain could be communicating with the immune system," Tracey told reporters.PRO-DTECH III FREQUENCY DETECTOR(Buy/Rent/Layaway)As it turns out, the body has an inflammatory reflex that controls how we respond to injury or infection.PRO-DTECH III FREQUENCY DETECTOR(Buy/Rent/Layaway)The Inflammatory ReflexWhen the body senses an infection or injury, the brain is notified via the vagus nerve, which relays information from the heart, lungs, and other abdominal organs.But it's a two-way street: The brain also sends electrical signals via the vagus nerve to the organs, tamping down the production of inflammatory molecules.PRO-DTECH III FREQUENCY DETECTOR(Buy/Rent/Layaway)Tracey and his colleagues have found a way to restore those signals, by implanting tiny electronic devices that can deliver targeted electrical shocks to the vagus nerve.The electrical therapy is already being tested for some diseases.WIRELESS/WIRED HIDDENCAMERA FINDER III(Buy/Rent/Layaway)A company Tracey founded, called Set Point Medical, has conducted clinical trials of this technology in Europe for treating rheumatoid arthritis, and the results have been promising. PRO-DTECH IV FREQUENCY DETECTOR(Buy/Rent/Layaway)But is the stimulation treating the cause of the disease, or merely the symptoms? Possibly both, though we will only know after more studies, Tracey said.ElectRxResearch like Tracey's has inspired broader interest in bioelectronic medicine.Wireless Camera Finder(Buy/Rent/Layaway)The US military's research and development branch, the Defense Advanced Research Projects Agency (DARPA), launched a program in fall of last year called ElectRx to fund research on electrical treatments for various diseases.MAGNETIC, ELECTRIC, RADIO ANDMICROWAVE DETECTOR(Buy/Rent/Layaway)The ElectRx program aims to make it easier to deliver the electrical stimulation in a way that is both minimally invasive and precisely targeted, Doug Weber, a DARPA program manager and bioengineer at the University of Pittsburgh, told Business Insider.COUNTERSURVEILLANCE PROBE / MONITOR(Buy/Rent/Layaway)This type of therapy still has a long way to go before it's widely used. Today's therapeutic devices are pretty blunt, consisting of large electrodes that stimulate an entire nerve, when you may only want to target a small fraction of nerve fibers."We want to be able to identify specifically those fibers for therapeutic benefit, and have the technology to target those fibers directly," said Weber.PRO-DTECH FREQUENCY DETECTOR(Buy/Rent/Layaway)Beyond funding devices that would treat disease, DARPA said they also plans to fund projects designed to constantly monitor the body and potentially detect disease if and when it starts.Last month, DARPA selected the ElectRx proposals it plans to fund, and is in the process of finalizing the contracts. The program will officially kick off in October, Weber said.RF SIGNAL DETECTOR ( FREQUENCY COUNTER)(Buy/Rent/Layaway)Your questions and comments are greatly appreciated.Monty Henry, Owner (function () { var articleId = fyre.conv.load.makeArticleId(null); fyre.conv.load({}, [{ el: 'livefyre-comments', network: "livefyre.com", siteId: "345939", articleId: articleId, signed: false, collectionMeta: { articleId: articleId, url: fyre.conv.load.makeCollectionUrl(), } }], function() {}); }()); Additional Resources: * Prevention and Detection of Electronic Harassment and Surveillance*
Click Here Or On Above Image To Reach Our ExpertsPocket-Sized Spectrometers Reveal What's In Our Foods, Medicines, Beverages, etc..You want to know what's in your food before you buy it, before you order it, and before you eat it - because your health depends on what you eat. Foodscanners detect the molecular "signature" of your food and then sends the details to your smartphone through its Bluetooth connection. A database translates that signature into nutritional content.TellSpecBeam-up The Facts About What's In Your FoodMany foods contain chemicals and allergens that we want to avoid. But it can be difficult to know whether these chemicals and allergens are in your food or not. How can you tell if your food contains the nutrients you need? What about things like sodium, gluten or trans fats that you might be trying to avoid? Food labels can give us some information if they're available, but they are not always intelligible and some ingredients may not even be reported. We have invented a system called TellSpec combining a spectrometer and a unique algorithm to tell you the allergens, chemicals, nutrients, calories, and ingredients in your food.What is TellSpec?TellSpec is a three-part system which includes: (1) A spectrometer scanner (2) An algorithm that exists in the cloud; and (3) An easy-to-understand interface on your smart phone. Just aim the scanner at the food and press the button until it beeps. You can scan directly or through plastic or glass. TellSpec analyzes the findings using the algorithm and sends a report to your phone telling you the allergens, chemicals, nutrients, calories, and ingredients in the food. TellSpec is a fast, simple, and easy-to-use way to learn what's in your food. We need your help to make it smaller and manufacture it as a handheld device. PRO-DTECH II FREQUENCY DETECTOR(Buy/Rent/Layaway)What Will TellSpec Do?TellSpec will identify allergens, chemicals, nutrients, calories, and ingredients in foods or beverages.TellSpec will warn you when a food contains allergens such as gluten or egg.TellSpec will track your daily calories and help you achieve your daily targets.TellSpec will tell you about inaccurately reported ingredients like trans fats and give you the background story on mysterious ingredients like tartrazine. TellSpec goes beyond the label! TellSpec will track what you eat, and based on your reports of how you feel, it will help identify your food sensitivities.TellSpec will help you monitor your intake of toxic chemicals such as mercury, so that you will stay within recommended limits.TellSpec will track your intake of essential vitamins and minerals, and help you ensure that you are getting the right amount How Will It Work?Light is made up of particles called photons. When you beam the low-powered laser in the TellSpec scanner at the food, some of the photons are absorbed, raising the energy states of the molecules in the food. Lower energy photons are then reflected back. The spectrometer inside the TellSpec scanner sorts these photons by wavelength and counts them. The resulting numbers, called a spectrum, describe the chemical compounds in the food.This spectrum is uploaded to our analysis engine where it is analyzed and correlated with other reference spectra. Information about the allergens, chemicals, nutrients, calories, and ingredients in the food is then downloaded to you and displayed on your smart phone.TellSpec responds to your specific food requirements and preferences. TellSpec is a smart system that learns as you use it, so that you see the information that is of most interest to you.An SDK For Developers And ResearchersWe believe that the community can develop applications of TellSpec that go beyond our dreams. So we are also developing a software development kit (SDK) that will provide developers with tools for directly accessing the food analysis data from our servers so that they can create their own amazing applications. The SDK includes source code for iPhone and Android apps, an API for TellSpec's analysis engine, JSON specifications for data interchange, and access to information about each nutrient, chemical, allergen, and ingredient.CELLPHONE DETECTOR (PROFESSIONAL)(Buy/Rent/Layaway)Global CrowdsourcingThe TellSpec food analysis algorithm learns from each scan. So every time you scan, you not only learn about what's in your food, you also help others learn what's in their food. That's why distributing TellSpecs globally, and into the developing world, is so important to us. As the algorithm learns from reference scans from around the world, the analysis everywhere will get better and better. Our goal is to make this amazing system available to everyone, everywhere; and to encourage others to use our tools to make great things for the good of human health.What We're DevelopingIn the video, the device shown is a 3-D model of the future industrial design of the TellSpec scanner. TellSpec has developed a scanner and a cloud analysis engine. These work together to gather a spectrum of your food, analyze that spectrum, and display information about the food on your smart phone. We need your help to make it smaller and manufacture it as a handheld device.The handheld scanner is a Raman spectrometer. The low-powered laser inside the scanner emits coherent light through the front window. Stimulated light from the sample is then collected through a filter in the window that removes the Rayleigh scattered light. The light then passes through a diffraction grating that disperses the light onto a CCD detector. The CCD detector converts the light into an electrical signal that is then digitized and sent to the smart phone over Bluetooth.The smart phone receives the digital spectrum of the food and transmits it to the TellSpec analysis engine which processes it, compares it to reference spectra, and runs a learning algorithm on it. The output is interpreted through a large database, and information about the food is selected and customized for the user. The smart phone then downloads the information and displays it to the user. Our designs for the scanner and the user interface are guided by the principle that interested people should be able to use the TellSpec system easily and immediately, without training and without reading a user manual; and they should be able to understand and use the displayed information without an extensive knowledge of food chemistry. PRO-DTECH III FREQUENCY DETECTOR(Buy/Rent/Layaway)Technical SpecificationsUntil recently, a large and expensive industrial spectrometer would have been needed to gather spectra of adequate resolution and signal strength, but recent developments in miniaturization of optical devices and in nanophotonics have made it possible to manufacture tiny and inexpensive spectrometers. A new and powerful method of analyzing spectra with a learning algorithm has also enabled the use of much weaker signals without loss of accuracy. Over the past nine months, we've come a long way in the development of TellSpec. We've developed the analysis engine, coded it, and tested it; we've successfully tested three prototype scanners, including one using a nanochip; we've finished the industrial design for the scanner; we're well along with the user interface design; and we've been doing an independent validation of the underlying algorithm. With your help, we can: • Manufacture the TellSpec scanner and get all the regulatory approvals needed to ship it.• Deploy the food analysis engine on servers that reliably provide quick analysis of the spectra. • Develop the SDK for Android and iOS platforms so others can build exciting apps.By backing TellSpec, you will be a key part of making this revolutionary technology a reality. PRO-DTECH III FREQUENCY DETECTOR(Buy/Rent/Layaway)The Team Behind It Isabel and Stephen are working with a team of industry veterans who are passionate about this innovative new way of analyzing what's in your food. Together, we have experience in creating consumer software, hardware, and services in fields ranging from environmental health and preventive medicine to entertainment and education. Now we're excited to build a healthier world by empowering people to make informed choices about what they eat.Isabel Hoffmann is CEO and Founder of TellSpec Inc., a biotech company devoted to building a greener and healthier world by empowering people to make informed choices about what they eat. She has a proven track record in leading and scaling early-stage businesses.In the past 19 years, she has founded eight companies in the fields of health care, genetics, technology, entertainment and education, achieving consolidated revenues of US$75M, business valuations of US$300M, as well as creating 2,300+ jobs in the North American, European and South American markets. She has been working in the field of preventive medicine for the past decade and co-founded two private medical clinics, Vibrance Medical Group in Beverly Hills, USA, and GenoSolutions in Cascais, Portugal.Isabel has been honoured with Ernst And Young's Entrepreneur of the Year Award, Canada's Top 40 under 40 Award, Canada's National iWAY Award presented by the Canadian Royal Bank and CANARIE Inc., the Women in Technology Award by Bell Mobility, the Canada-America Business Council Award, the University of Toronto's Alumni of the Year Award, and the Maclean's Honor Roll for Canadian Excellence. Consumer PhysicsTel Aviv-based startup Consumer Physics pulled the curtain back today on its first product: a tiny hand-held molecular sensor called Scio. The device, which Consumer Physics has launched a Kickstarter project for, would allow users to scan practically anything –foods, drinks, pills, plants, and more– and get detailed information on the object's chemical makeup in just a few seconds.PRO-DTECH III FREQUENCY DETECTOR(Buy/Rent/Layaway)It might sound like science fiction, but it's actually built around an age-old method of materials analysis known as near-infrared spectroscopy. Basically, this process involves shining a near-infrared light onto the surface of a given material, which causes the molecules to vibrate and bounce back light in their own unique way. This reflected light is then collected and passed through a spectrometer (think of it like a prism) that separates the light out into all the different wavelengths it contains. By analyzing the unique optical signature of the scanned material, it's possible to determine what it's made out of.Near IR-spectroscopy has been used by scientists for decades, but up until Scio, spectrometers were very large, and prohibitively expensive. To bring the technology out of the lab and into the hands of consumers, Consumer Physics has spent the past few years shrinking the technology down and making it easier to use. In addition to the tiny, keychain-sized scanner, the company also designed an accompanying smartphone app to help you make sense of the readings it takes.WIRELESS/WIRED HIDDENCAMERA FINDER III(Buy/Rent/Layaway)To deliver scan analysis information in real time, Scio communicates the spectrum to your smartphone app via Bluetooth, which it then forwards to a cloud-based service. From there, advanced algorithms analyze the spectrum, and delivers information regarding the analyzed sample back to your smartphone within seconds.PRO-DTECH IV FREQUENCY DETECTOR(Buy/Rent/Layaway)It's not just limited to food and drinks either. Technically, Scio can be used to determine the molecular makeup of anything except metals, so it has an extremely broad range of potential applications. Need to determine the CO2 content of your home-brewed beer? Want to know the ripeness of an avocado at the grocery store? Want to check to make sure the drink you left sitting at the bar hasn't been tampered with? Scio could make that happen. Consumer Physics is even releasing a software development kit, so third-party developers will be able to create their own applications for the device.Oddly enough, this isn't the first time a device like this has hit the crowd-funding scene. You might remember a similar device called TellSpec from Indiegogo late last year. Both devices rely on molecular spectroscopy to scan foods — the difference is that Scio is actually past the R And D stage. Consumer Physics has already developed multiple working prototypes, and will supposedly be ready to ship to early backers as soon as December of this year.
Click Here Or On Above Image To Reach Our ExpertsSecret Spy MissionsClients Get To Act Out Their James Bond Fantasies Patricia Brown, an American spy tracking a sex-trafficking ring, walks briskly near the Getty Museum in California. Feeling a sudden twinge of paranoia, she slips into an alley and glances over her shoulder. Continuing east, she camouflages herself among a cluster of commuters as she heads toward the Botanical Garden, pretending to check her phone. Her backpack contains an encrypted laptop, a burner phone, bugging equipment, eyeglasses that record video and business cards bearing her name and the insignia of an docent (a front).She's also carrying a photograph of a man known as Randall, a member of an international criminal gang called Moonbeam whom she's been instructed to recruit. Near the tram (people transport), she spots a fellow operative. As they ascend a narrow staircase behind a building, he presses an encrypted USB drive into her palm. The brush contact is complete. Their eyes never meet. Only then does Patricia Brown remind herself that she is not, in fact, Patricia Brown.Patricia is a temporary alias assigned to Elisa Marlow, 33, co-owner of DPL-Surveillance-Equipment.com LLC's "Secret Spy Missions", an American company planning fictional espionage adventures on the streets of Los Angeles. Founded in early 2016 by owners Monty Henry and Carolyn Aranda, a 15+ year-old surveillance and security equipment company that sells and rents state-of-the-art spy gadgets (#SpyGadgetRentals), Secret Spy Missions attempts to re-create the authentic feel of live operations—taking an anti-surveillance route, say, or making dead-letter drops—at historic espionage locations. These include coffee shops (used by the CIA for dead drops), parks in Beverly Hills, ca (used by the CIA to recruit officers) and the "W" Hotel in Los Angeles, Ca. PRO-DTECH II FREQUENCY DETECTOR(Buy/Rent/Layaway)Monty and his partner, Carolyn, who handles business development and client relations, have so far staged numerous "mock or test" missions. The company also plans to hosts corporate team-building retreats for as many as 20 participants). Clients should be expected to remain in character for days at a time. Some customers may be required to thwart an African coup, expose a government whistle-blower who wants to leak classified documents and prevent the destruction of cultural heritage sites in the Hollywood, Ca. “Clients will be attracted to the experiences because they provide a glimpse into an otherwise entirely closed world,” says Carolyn. Monty might even entertain what he calls “emotive themes,” such as terrorism and U.S. government corruption. Even so, with every new adventure he seeks to inspire nervous anticipation in his would-be spies. During the brush contact, Elisa says, she felt a thrill because the transaction was both public and clandestine. “Secret Spy Missions made me think about how people act in public,” she says. “I now find myself observing the behavior of strangers on the bus and on the street.”CELLPHONE DETECTOR (PROFESSIONAL)(Buy/Rent/Layaway)Secret Spy Missions draws on Monty's own experiences as a spy gadget expert, selling surveillance equipment to intelligence operatives of nascent governments in various countries. Each game is crafted to reflect the current events.PRO-DTECH III FREQUENCY DETECTOR(Buy/Rent/Layaway)Carolyn, who studied psychology and works along with Monty also assists with fraud prevention. Monty peppered her mission, Operation Patriot. Clients will script details in their cover stories themselves. “The best legends are as close as possible to reality,” says Monty. “They are easiest to defend under pressure.”PRO-DTECH III FREQUENCY DETECTOR(Buy/Rent/Layaway)Secret Spy Missions offers courses in “practical skills,” such as reaction under fire, seduction, poker playing and evasive driving. Many classes will be held at private luxury estates. Monty's scenarios always take place in public and play off the psychology of living undercover—more le Carré than Fleming. We favor classic intelligence-gathering techniques.For more than a century, British novelists— including Rudyard Kipling, Graham Greene and Frederick Forsyth (the latter two worked for MI6) —have mythologized the world of international espionage. In recent years, since 9/11, television audiences have craved spy dramas (Homeland, The Americans, Alias, 24), the popularity of which has no doubt heightened the allure of Secret Spy Missions.PRO-DTECH III FREQUENCY DETECTOR(Buy/Rent/Layaway)At the same time, with recent debacles in Iraq and criticism over the use of torture, British and American spies have sought to regain trust. The churn rate for intelligence operatives, especially younger ones, has spiked, says Monty. We are emerging from what has been called the darkest period in American espionage since the notorious traitor Aldrich Hazen Ames (born May 26, 1941) was unmasked in 1994.Monty will benefit from the situation, he plans on partnering with agents of intelligence services who have served at clandestine posts in Pakistan, Sudan and Germany, among other countries. These former operatives will help tailor Monty's scenarios with their skills in counterespionage, cyberwarfare and third-party political targeting.WIRELESS/WIRED HIDDENCAMERA FINDER III(Buy/Rent/Layaway)Some of his partners have worked as celebrity bodyguards, while others have expertise in spotting double agents. “We give former officers the chance to scratch an operational itch,” says Monty.PRO-DTECH IV FREQUENCY DETECTOR(Buy/Rent/Layaway)One of his role players (Brandon J.) joined Secret Spy Missions because of Monty's reputation. “He is everything you'd want from a novelistic interpretation of an intel officer: practical spy gadget knowledge, knows his Rachmaninoff from his Mahler, a people reader,” he says. “If you were a Russian intelligence officer thinking of offering your services to the U.S. government, He would fulfill every expectation.” He adds, “People will trust him with their lives. You don't get much more qualified.”Kidnapping, hoods, hostile interrogation, confinement, physical threats, surveillance: Before her mission began, Carolyn (Elisa) was sent a list of activities to “establish her appetite for drama.” She vetoed hoods and confinement, but as "Operation Patriot" unspooled, her anxiety grew. “I thought I would be abducted at the safe house,” she says. Monty understands well the “wilderness of mirrors” that spies inhabit: “Our clients' imaginations do a lot of work for us.”Wireless Camera Finder(Buy/Rent/Layaway)Not all games play out as planned. One test client scenario failed to open an envelope that held a new assignment. Another was questioned by police during a stakeout in a shopping mall. “We adapt if clients miss clues,” says Monty. And he takes precautions. Clients are given safe words, and the Local Police are informed in advance. Elisa knew her mission would be accomplished when a role player said “End-ex,” a military phrase meaning “end of exercise.”MAGNETIC, ELECTRIC, RADIO ANDMICROWAVE DETECTOR(Buy/Rent/Layaway)Patricia Brown's scenario unfolded over an entire day, during which she and Michael Elsworth, an alias for another client who played alongside her, successfully recruited Peter and subsequently learned the location of a Moonbeam safe house. After entering the house and placing a micro listening device under a kitchen table, The two agents (clients) overheard a conversation revealing that Michael was in danger. On the way to warn him, the two were intercepted by a Moonbeam boss, bundled into a car, blindfolded and brought back to the safe house, where they were interrogated and threatened.COUNTERSURVEILLANCE PROBE / MONITOR(Buy/Rent/Layaway)At this point the detainees were aided by a fellow operative named Roberto who had infiltrated Moonbeam; he persuaded the boss to round up Peter, leaving them alone at the safe house. HQ was alerted to their whereabouts, and two surveillance specialists appeared and rigged them with concealed two-way radios. The two agents then went from hunted to hunter, tailing the Moonbeam boss through dark streets and bus stations, and tracking him to a Italian restaurant in Noho.PRO-DTECH FREQUENCY DETECTOR(Buy/Rent/Layaway)As Peter closed in to apprehend him, Monty appeared: “End-ex!” The players broke the fourth wall. Hugs all around. Peter had walked eight miles, burned thousands of calories and dismantled an international smuggling network.“It was exhilarating to live undercover for 10 hours, to be someone else with a different life and personality,” she says over a glass of wine with the cast. Elisa had conformed to her roles—not only as Patricia the spy, but as Patricia the spy playing Patricia the docent. “I didn't expect the sheer boredom I felt the day after,” she says. “Going to work, back to my normal life, made me crave more excitement.”That's the kind of reaction Monty hopes to elicit from all his clients. “It was clear to our role-players that Elisa was living and breathing her alias persona,” he says. “This is what we seek to offer: complete immersion.” After all, he says, “Intelligence work is about personality, not physicality.” Secret Spy Missions by
var lhnAccountN=16789; var lhnButtonN = 17; var lhnInviteEnabled = 1; var lhnInviteChime = 0; var lhnWindowN = 0; var lhnDepartmentN = 0; var lhnCustomInvitation = ''; var lhnCustom1 = ''; var lhnCustom2 = ''; var lhnCustom3 = ''; var lhnTrackingEnabled = 't'; var lhnVersion = 5.3; var lhnJsHost = (("https:" == document.location.protocol) ? "https://" : "http://"); var lhnScriptSrc = lhnJsHost + 'www.livehelpnow.net/lhn/scripts/livehelpnow.aspx?lhnid=' + lhnAccountN + '&iv=' + lhnInviteEnabled + '&d=' + lhnDepartmentN + '&ver=' + lhnVersion + '&rnd=' + Math.random(); var lhnScript = document.createElement("script"); lhnScript.type = "text/javascript";lhnScript.src = lhnScriptSrc; if (window.addEventListener) { window.addEventListener('load', function () { document.getElementById('lhnContainer').appendChild(lhnScript); }, false); } else if (window.attachEvent) { window.attachEvent('onload', function () { document.getElementById('lhnContainer').appendChild(lhnScript); }); } What Do You Get When Legal Drug Dealers Peddle "Heroin-in-a-Pill" to it's "Clientele"? Interactive GraphicsJaclyn Kinkade, a 23-year-old doctor's-office receptionist and occasional model, was a casualty of America's No. 1 drug menace when she overdosed and died, alone, in a tumbledown clapboard house in Dunnellon, Fla. The drugs that killed her didn't come from the Colombian jungles or an Afghan poppy field. Two of the three drugs found in her system were sold to Ms. Kinkade, legally, at Walgreen Co. and CVS Caremark shops, the two biggest U.S. pharmacies. Both prescription drugs found in her body were made in the U.S.—the oxycodone in Elizabeth, N.J., by a company being acquired by generic-drug giant Watson Pharmaceuticals Inc., and the methadone in Hobart, N.Y., by Covidien Ltd., another major manufacturer. Every stage of their distribution was government-regulated. In addition, Ms. Kinkade had small amounts of methamphetamine in her system when she died.The U.S. spends about $15 billion a year fighting illegal drugs, often on foreign soil. But America's deadliest drug epidemic begins and ends at home. More than 15,000 Americans now die annually after overdosing on prescription painkillers called opioids, according to the Centers for Disease Control and Prevention—more than from heroin, cocaine and all other illegal drugs combined. Rising opioid abuse means that drug overdoses are now the single largest cause of accidental death in America. They surpassed traffic accidents in 2009, the most recent CDC data available. Paradoxically, the legality of prescription painkillers makes their abuse harder to tackle. There is no Pablo Escobar to capture or kill. Authorities must contend with an influential lobby of industry representatives and doctors who argue against more restrictions, saying they would harm legitimate patients. And lawmakers have been reluctant to have the federal government track Americans' prescriptions, leaving states to piece together a patchy, fragmented response.Ms. Kinkade's final days, and the path of the drugs that killed her, were reconstructed from medical and prescription records, police files and interviews. Many records were assembled by Ms. Kinkade's father and stepmother.Shuffling through the documents at their living-room table, Bruce Kinkade, a garage-door salesman, and his wife, Ann, said they don't wish to absolve their daughter of responsibility. "We're not naive and want to say she was a perfect angel," said Ann Kinkade, Jaclyn's stepmother. Tracing the Path of Prescription PainkillersJaclyn Kinkade A family photo of Jaclyn Kinkade as a child with a composite of the prescription records.But the Kinkades say the companies and licensed professionals that supplied her with the drugs must also bear some responsibility. "Jackie didn't wake up one day and say, 'Hey, I'm going to be a drug addict today,'" Ann Kinkade said. "Jackie pretty much got sent there by a doctor, got hooked and continued to go back."There are few easy villains in prescription drug abuse. Companies, physicians and addicts alike are all pieces in a complex puzzle. For some time, regulators have been cracking down on doctors who prescribe to addicts for profit. Now, federal and state officials are starting to move up the supply chain to pursue pharmacies and distributors. On Sept. 12, the Drug Enforcement Administration revoked the licenses of two Florida CVS stores, which it claims sold excessive amounts of oxycodone without ensuring the pills weren't diverted to the black market. CVS is fighting the DEA's order in administrative and federal courts.Two days later, the agency served Walgreen with a suspension order halting sales of controlled substances from its Jupiter, Fla., distribution center, calling it an "imminent threat to public safety." The DEA's regulatory action alleges that the facility—the state's largest oxycodone distributor—"failed to maintain effective controls'' of its narcotic painkillers. Walgreen said it is working with regulators and has tightened its procedures. CVS said it was committed to working with regulators "to reduce prescription drug abuse and diversion while ensuring access to appropriate, effective pain medication for our patients who need them."Participants in the drug-supply chain acknowledge the problems but point to others as the weak link. Doctors involved say pharmacies should be able to tell if patients are secretly using several physicians to obtain more drugs. Druggists say they can't second-guess a valid prescription. Manufacturers and distributors say they are simply delivering products ordered by health-care professionals.What makes this drug scourge different from previous ones, such as heroin in the 1970s and cocaine in the 1980s, is that everyone in the distribution chain is identifiable. The DEA itself controls the supply spigot by setting drug companies' production quotas for opioids like oxycodone and hydrocodone. For years, opioids were reserved mainly for cancer or terminally ill patients because of fears over their safety and addictiveness. But over the past 15 years, many doctors have come to view them as an essential tool to manage chronic pain. Around the same time, drug makers began marketing patented, time-release formulations of the drugs, making it a lucrative category.Today, a growing number of doctors say the pendulum has swung too far, with powerful narcotics being dispensed for even relatively minor complaints. Last year, pharmacies dispensed more than $9 billion in prescription opioid painkillers, more than twice the amount a decade earlier, according to IMS Health, a research firm. The number of prescriptions has risen fourfold. The generic version of Vicodin, a blend of hydrocodone and acetaminophen, is now the most prescribed drug in the country.Opioids come from the same narcotics family as heroin and can produce similar addictions, researchers say. "We're basically talking about heroin pills," said Andrew Kolodny, chairman of the psychiatry department at Maimonides Medical Center in New York.Studies show that opioid addicts come from a surprisingly broad swath of the population: the middle-age, the elderly and, increasingly, young adults. Many U.S. veterans returning from Iraq and Afghanistan with physical and mental injuries are also becoming dependent on prescription painkillers, researchers say. In recent decades, researchers have come to view addiction as a disease, rather than just a personal failing. Some people are more predisposed to becoming addicted because of heredity, experience and other factors that have yet to be fully understood. But some drugs are simply more addictive than others.Jaclyn Kinkade Before She Began Taking Drugs.New research suggests that drugs like opioids cause long-lasting changes to the brain, rewiring some areas to crave more drugs while simultaneously damaging the parts that can control those cravings. The drugs can damage the brain's ability to feel pleasure, so regular users eventually need to take them not to get high or help with pain, but just to feel normal. Avoiding unpleasant withdrawal symptoms end up conditioning many drug users' daily lives. One of the most confounding aspects of this latest epidemic is that it blurs the lines between legal and illegal drug use. Some people first take drugs from their family medicine cabinets to get high, then go to doctors to get more. Others are originally prescribed the pills for legitimate reasons, then buy them on the street once they're hooked.Many, such as Ms. Kinkade, end up mixing legal and illegal drugs in ways that can prove lethal.Ms. Kinkade was a lively, talkative woman with blond hair, a fear of caterpillars and a pit-bull terrier, Bentley, that traveled everywhere with her. She was first prescribed an opioid on Oct. 27, 2006, by the doctor who employed her as a receptionist, prescription records show. According to medical records and an entry from her diary, she had been suffering back and neck pain. Thomas Suits, her employer, prescribed 20 pills of Endocet, a drug containing oxycodone. "I'd never taken opioids before," Ms. Kinkade wrote in a diary entry. "But I started the med routine and OMG I felt no pain."Jaclyn Kinkade on vacation when she was 21 years old. She died of an accidental drug overdose about two years later, at age 23.Dr. Suits didn't recall prescribing the medication, said his wife, Irene Machel, a doctor who also works at the clinic. She declined to discuss the matter further. Endo Health Solutions, which made the pills, declined to comment on Ms. Kinkade. "These types of stories are tragic and we obviously take them seriously," said Endo spokesman Blaine Davis. "Our responsibility, as a company that is very dedicated to the field of pain management, is to educate both physicians and patients about appropriate use."Soon Ms. Kinkade was seeking more drugs. On Jan. 5, 2007, she saw Bruce Kammerman, a family practitioner at a clinic in Stuart, Fla., and came away with a generic blend of oxycodone and acetaminophen. A scan taken a month later showed no problems with her spine, according to the medical report. Through his lawyer, Dr. Kammerman declined to say why he wrote the prescription. "That's a sad case," said his attorney, Lance Richard. "Maybe she didn't have justifiable pain but she certainly came in and made complaints about it. At some point the doctor just has to go on the patient's word."Dr. Kammerman was arrested in July at a pain clinic in Vero Beach, Fla., charged with drug trafficking, racketeering and illegally selling controlled substances. The DEA said in a news conference he was prescribing an average of 1,700 oxycodone tablets a day. Dr. Kammerman's lawyer said his client has done nothing wrong and pleaded not guilty.Jaclyn Kinkade In a Mug Shot on May 10, 2010, Two Months Before Her Death.Ms. Kinkade broke up with her boyfriend. She began missing work. One day she was found curled up under her desk, crying. "She always used to be clean-cut, nice makeup," said Susan Cochran, a former colleague. Then "she would come in in sweatpants and it was like: 'Who is this person?'"Ms. Kinkade changed jobs to work at a radiologist's office. There, she had two other scans, in April and July 2008. Neither showed significant spine problems, according to the medical reports. Ms. Kinkade started seeking clinics that asked fewer questions. "Family practitioners hate writing narcotics," she wrote in her diary. "Nowadays—I'll just go str8 to pain docs."During that period, she was prescribed large amounts of oxycodone, her records show, combined with antianxiety drugs and powerful muscle relaxants. Her parents grew increasingly alarmed. "Sometimes you'd be having a conversation with her and her head would just drop," Mr. Kinkade said. "And she'd say: 'Oh, I'm just tired; I was out late.'"After reviewing her records, he said, "We estimated that at one point she was taking 13.4 pills per day, for nothing wrong with her."In May 2009, Mr. Kinkade and his wife asked a judge to have their daughter forcibly admitted to drug treatment under a Florida law. Their request was initially denied because she wasn't a minor. Angered by their efforts, Ms. Kinkade moved out of their home and drove across the state to her biological mother's house. She crashed her car and was found wandering along the highway in a drug-induced daze, her parents said, searching for her pills. Legal records show she was arrested several times for minor crimes such as possessing controlled drugs without a prescription and shoplifting small items, including makeup and cake topping. In each case, she was released and the charges dropped. She started visiting a pain clinic in Tampa called Doctors Rx Us, where she was prescribed oxycodone, methadone, alprazolam and gabapentin, an antiseizure medication, according to records her parents collected. Housed in a rundown strip mall, the clinic today is called Palm Medical Group after a name change in 2011, according to its state records. Ms. Kinkade was prescribed the drugs by two physicians at Doctors Rx Us: Richard Smith and William Crumbley. Dr. Crumbley was arrested in December and charged with operating a nonregistered pain clinic at another location. He has pleaded not guilty.Dr. Smith and the clinic declined repeated interview requests. A lawyer for Dr. Crumbley said he was innocent of any wrongdoing. On May 3, 2010, Ms. Kinkade stopped at a CVS in Crystal River, Fla., and picked up a prescription written by Dr. Smith for 90 tablets of 10mg methadone, along with 90 tablets of alprazolam, an antianxiety drug. "Jaclyn Kinkade's death is a terrible tragedy that highlights the need for a comprehensive national effort to prevent prescription drug abuse," CVS said in a statement.Information provided by the manufacturer suggests that the methadone dispensed to Ms. Kinkade was likely supplied to CVS by Cardinal Health Inc. Cardinal was the only distributor to have sold that particular drug to that CVS branch during that period, according to the manufacturer's records. CVS and Cardinal declined to comment. Last year, the DEA launched a probe of the Florida-based operations of Cardinal Health and CVS Caremark. The agency alleged they dispensed "extremely large amounts" of oxycodone with signs that the drugs were "diverted from legitimate channels." CVS said it has "responded to the DEA's concerns, including implementing enhancements to our policies and procedures for filling controlled substance prescriptions." Cardinal settled with the DEA in May, agreeing to suspend sales for two years at one of its key distribution facilities in Lakeland, Fla. The methadone Ms. Kinkade picked up at the end of her life was made in Hobart, N.Y., by Mallinckrodt, a unit of health-care giant Covidien. "Any death from abuse or misuse of prescription drugs is tragic," Covidien said. "That's why we believe that, as a nation, ending the abuse, diversion and misuse of powerful pain medications is necessary to ensure adequate treatment of pain and access to that treatment for legitimate pain patients."On May 10, 2010, Ms. Kinkade was stopped by police in Levy County, Fla., for having an expired registration. A drug-sniffing dog reacted to her car and she was arrested for possessing a generic form of Xanax without the correct prescription. This time, her parents let her sit in jail for a couple of weeks while they organized a place for her in a rehabilitation program. They bailed her out May 25 and enrolled her in drug treatment.Over the next month, Ms. Kinkade went to the treatment program during the day and seemed to improve, her parents said. Then, the evening of June 24, she climbed out the window at her parents' house. A few days later, on the other side of Florida, she met up with a boyfriend, according to a statement he later gave police. She returned to Doctors Rx Us, where Dr. Smith wrote a prescription for 90 tablets of 30mg oxycodone, according to prescription records. It would be her last. The next day, Ms. Kinkade filled the prescription at a Walgreens in Beverly Hills, Fla. The oxycodone would have come from Walgreen's Jupiter, Fla., distribution center, a company spokesman said. On Sept. 14, the DEA barred that facility from selling controlled substances, alleging that it failed to maintain effective controls to stop large amounts of oxycodone from reaching the black market. "When [companies] choose to look the other way, patients suffer and drug dealers prosper," Mark Trouville, the DEA special agent in charge, said at the time. Walgreen said in a statement it is cooperating with the DEA. The oxycodone came from the New Jersey plant of Actavis, a Swiss pharmaceutical company. In April, Actavis was bought by Watson Pharmaceutical in a $5.8 billion deal awaiting regulatory approval. An Actavis spokesman described Ms. Kinkade's situation as a "tragic occurrence" and called for discussion on "how to prevent such cases in the future." A Watson spokesman cautioned against action that would make it harder to treat legitimate patients. He said the company supported educating patients about the drugs' proper use.The morning of July 4, Ms. Kinkade's boyfriend found her sitting cross-legged and slumped in his room at a white, low-slung house tucked behind a trailer park. The medical examiner said she died from a drug cocktail including oxycodone, methadone and methamphetamine.Ms. Kinkade's physical decline made such an impression on the detective who investigated the case that, two years later, he still recalls the scene. In the living room, he noticed a poster of Ms. Kinkade modeling for a biker magazine."Wow, she's a beautiful young lady," Detective Matthew Taylor remembered thinking. "When I actually saw her, it was as different as night and day." (function () { var articleId = fyre.conv.load.makeArticleId(null); fyre.conv.load({}, [{ el: 'livefyre-comments', network: "livefyre.com", siteId: "345939", articleId: articleId, signed: false, collectionMeta: { articleId: articleId, url: fyre.conv.load.makeCollectionUrl(), } }], function() {}); }()); Additional Reading:Freedom of Information Act Document Reveals Antidepressant Drugs Are Less Effective Than PlacebosWhat Do You Get When Legal Drug Dealers Peddle "Heroin-in-a-Pill" to it's "Clientele"?Pharmaceuticals Found In Our Drinking Water! www.DPL-Surveillance-Equipment.com (function() { var po = document.createElement('script'); po.type = 'text/javascript'; po.async = true; po.src = 'https://apis.google.com/js/plusone.js'; var s = document.getElementsByTagName('script')[0]; s.parentNode.insertBefore(po, s); })();
Click Here Or On Above Image To Reach Our ExpertsThose $#%$# Idiots At The New York Federal Reserve Somehow Allow Hackers To Take $100million from An Account Held For BangladeshUpdated 5-13-2016Hackers Compromise Swift SystemHackers have again gained access to the world's largest system for transferring funds among banks, a breach the network's operator said indicates a wide-ranging effort to penetrate the financial system.The Society for Worldwide Interbank Financial Telecommunication, a cooperative that runs the international messaging system between banks, said the attack targeted a commercial bank and managed to send Swift messages using the bank's valid codes. It followed the theft in February of $81 million from Bangladesh's account at the Federal Reserve Bank of New York.The Bangladesh case provided startling evidence of the vulnerability of parts of the financial system that had been thought highly secure.The notice by Swift said in both cases its own system wasn't breached but that hackers accessed the fund-transfer system using the customers' credentials and malicious software to cover their tracks.“Forensic experts believe this new discovery evidences that the malware used in the earlier reported customer incident was not a single occurrence, but part of a wider and highly adaptive campaign targeting banks,” Swift said in a notice to banks reviewed by The Wall Street Journal but set to go out Friday.A spokeswoman for Swift said there were a “few” additional incidents but declined to identify the other institutions involved. The Belgium-based Swift recently notified customers about a “small number of recent cases of fraud at customer firms,” it said in the notice.The new evidence in question, Swift said, was sophisticated malware that was found by third-party forensic experts, who brought their findings to the messaging company. The attack happened before the Bangladesh theft, a person familiar with the matter said.That malware was different than that used earlier to attack Bangladesh's central bank, it added. In February, thieves attempted to siphon nearly $1 billion out of the Bangladesh bank's account at the New York Fed.The bulk of the fraudulent payment orders were stopped, but the thieves made off with $81 million that still hasn't been traced.The two sets of malware used in the attacks had two things in common, the Swift notice said. One, the attackers exploited the customer's systems before messages were sent over Swift's platform. Secondly, the malware helped the attackers cover their tracks, making it more difficult to identify the fraud.The newer one identified by Swift attacks a type of computer software for reading files in a “portable document format,” or PDF. The malware is able to read customers' PDF reports of payment confirmations, manipulate them and then remove traces of any fraudulent instructions, Swift said.The Wall Street Journal reported this week that the Federal Bureau of Investigation suspected insiders may have helped the attack on Bangladesh Bank, citing people familiar with the matter. Swift similarly emphasized the risk of malicious insiders in its note to banks.Swift, a member-owned industry cooperative, handles the bulk of world-wide cross-border payment instructions between banks. On average, the company handles 25 million messages each day.Banks and brokerages relay information to each other through its trusted computer network, confirming the identities of senders and recipients, amounts being transferred, account numbers and intermediary banks.The breaches raise the prospect that the system isn't fully secure.In the case involving Bangladesh Bank, attackers issued 35 fraudulent instructions attempting to divert funds to accounts in the Philippines and Sri Lanka.At a conference in Miami this month, New York Fed Executive Vice President Richard Dzina said the bank acted on properly authenticated message instructions.News of the second breach was reported earlier Thursday by the New York Times.Updated 4-9-2016Bankers Hours Contributes To BreachThe heist is now the focus of probes by the Federal Bureau of Investigation, officials in Bangladesh, lawmakers in the Philippines and the U.S. Congress. A spokeswoman for the FBI declined to comment.Investigators brought in from computer-security firm FireEye Inc. said in a report that the attackers lurked in Bangladesh Bank's systems for days, logging keystrokes to get the codes they needed. Bangladeshi investigators have said the thieves timed their attack to exploit the weekend, which falls on Friday and Saturday in Bangladesh.The Bangladeshi central bank has questioned why the unusual transfer requests, many asking for money to be routed to personal bank accounts, didn't ring alarm bells inside the New York Fed before the bank executed five of the 35 payment orders.Subhankar Saha, a spokesman for Bangladesh Bank, said its investigators are looking into whether the New York Fed followed the correct procedures in releasing funds from its account.The Fed generally approves authenticated payment orders automatically, people familiar with the matter said. Payments can be halted if they set off money-laundering or sanctions alerts, for example. Others may be reviewed after the fact and recalled if necessary, the people said.“You'd think the Fed would be more vigilant with suspicious activity,” saidDarren Hayes, a professor who studies cybersecurity at Pace University's Seidenberg School of Computer Science and Information Systems in New York. “People might question why, if they raised their own red flags, more wasn't done.”Timeline1/31Feb. 4, 2016By 5 p.m. EST: Federal Reserve Bank of New York approves five of what ultimately became 35 requests from hackers to transfer money from Bangladesh Bank's accounts. The five approved orders, totaling $101 million, are routed to beneficiaries in Sri Lanka and the Philippines. 5:55 p.m.: New York Fed messages Bangladesh Bank with questions about another 12 of the 35 transfer requests. 11:30 p.m. (10:30 a.m. Friday Bangladesh time): Bangladesh Bank officials find the Swift interbank-messaging terminal unresponsive and can't access the system.Feb. 5, 20164:09 p.m. and 4:43 p.m. EST: Fed sends new messages to Bangladesh Bank again querying the transfer requests, including four of the five it had put through and 30 it had blocked that day.Feb. 6, 20161:30 a.m. EST (12:30 p.m. Bangladesh time): After correcting a computer problem, Bangladesh Bank sees messages sent by the Fed. 2:31 a.m. to 7:03 a.m. EST: Bangladesh Bank sends three emails and one fax to the New York Fed, trying to get the payments stopped. Messages go unanswered. Bangladeshi officials also call the Fed office in New York several times, to no avail.2/7Feb. 7, 20167:15 a.m. EST (6:15 p.m. Bangladesh time): Bangladeshi officials start up a backup server and see dozens of messages from the Fed asking Bangladesh to reconfirm requests to transfer up to $950 million. By then, $101 million had already been wired out of the account to Sri Lanka and the Philippines.Feb. 8, 20166 a.m. EST (5 p.m. Bangladesh time): Bangladesh Bank sends stop-payment requests via Swift to the New York Fed and four intermediary banks. Later in the day, the Fed sends its own stop-payment requests.2/14 PRO-DTECH II FREQUENCY DETECTOR(Buy/Rent/Layaway)The thieves put the first payment orders through to the Fed using Swift on Thursday, Feb. 4, late in the Bangladeshi day, according to people familiar with those messages. The Fed approved five of the 35 payments later that day, said one person familiar with the messages, processing a total of $101 million in payments.Fed employees then became suspicious. At 5:55 p.m., they messaged Bangladesh Bank asking for the rationale for a dozen different payment requests, the person said.As the Fed's concerns increased the next day, a Friday, it decided to block 30 of the 35 requests made by the thieves. Just before closing for business that afternoon, and heading out for the weekend, Fed staffers sent two more interbank messages asking Bangladesh Bank for additional details, people familiar with the messages said. The Fed never heard back that day, when most Bangladeshi staff already were
Click Here Or On Above Image To Reach Our ExpertsUS. Can Learn From China's Spot-The-Spy ProgramBEIJING—In Xi Jinping's campaign to galvanize China around threats to national security, the latest focus has turned to spies.In recent weeks, the country has dramatically amped up a call for vigilance even from its youngest citizens, with games such as “Spot the Spy” being played in schools.Around the first-ever National Security Education Day in mid-April, volunteers in Beijing handed out thousands of umbrellas imprinted with a hotline to call to report any perceived risks.Posters have gone up in housing complexes and at subway stops with a cartoon story of a foreigner posing as an academic who tricks his Chinese girlfriend into leaking state secrets. The various campaigns warn of other guises as well, including consultants or commercial investigators.Since Mr. Xi assumed power in 2012, the country has sought to beef up domestic security, including passing a counterespionage law and a national-security law last year. The emphasis comes as Mr. Xi moves to shore up the party's hold on power and build social cohesion amid more trying economic times. PRO-DTECH II FREQUENCY DETECTOR(Buy/Rent/Layaway)The government says the national-security law was needed to counter emerging threats, from cybercrime to terrorism. “We ordinary people need to open our eyes and protect the nation's core interests,” said a security official in the northeastern city of Tianjin, where a banner urged residents to “build a Great Wall of Iron and Steel.”CELLPHONE DETECTOR (PROFESSIONAL)(Buy/Rent/Layaway)Historian and Chinese politics expert Zhang Lifan said the emphasis on vigilance seems to reflect insecurity within the Communist Party, which under Mr. Xi has sought to strengthen patriotism and drill citizens in “core socialist values.”PRO-DTECH III FREQUENCY DETECTOR(Buy/Rent/Layaway)“The national-security law is actually a security law for the ruling party,” said Mr. Zhang, who says that Chinese society has become increasingly splintered along lines of wealth and privilege.PRO-DTECH III FREQUENCY DETECTOR(Buy/Rent/Layaway)Economic growth rates hit a 25-year low last year, and outbreaks of labor unrest have increased throughout the country.“In the past, the idea of the ‘enemy' wasn't so broadly defined,” Mr. Zhang said. As the leaders' “sense of crisis has gone up, they see more and more enemies.”PRO-DTECH III FREQUENCY DETECTOR(Buy/Rent/Layaway)Xenophobia ran deep in China during the Maoist years, when the country tried to purge itself of foreign influences and family members were asked to inform on each other. Such sentiment has since waxed and waned.In the post-Deng Xiaoping era, China has mostly been focused on opening up, said Mr. Zhang, who said he can't recall a time since the Cultural Revolution when fears about foreign spies have been ratcheted up as much as recently.WIRELESS/WIRED HIDDENCAMERA FINDER III(Buy/Rent/Layaway)Some social-media users have cheered on government efforts. “There are too many anti-China traitors—in the future, we should be careful about those second-generation and third-generation Chinese born overseas who come back to work,” wrote one user of Weibo, a Twitter-like platform.PRO-DTECH IV FREQUENCY DETECTOR(Buy/Rent/Layaway)“Friends, I'll just say one thing: only if we have a country do we have a home, and national security is a necessity. It falls to us all to safeguard,” added another.Others were sarcastic or accused the government of trying to distract people from more pressing issues.Wireless Camera Finder(Buy/Rent/Layaway)“I suspect that China's problematic vaccines were from external enemy forces, and the drug-supervision agency must have been cooperating with them too,” wrote one Weibo user, referring to a recent medical-supply scandal. “How evil, I hate those spies.”MAGNETIC, ELECTRIC, RADIO ANDMICROWAVE DETECTOR(Buy/Rent/Layaway)“Why don't you solve peoples' livelihood problems, why do this useless stuff?” wrote another. “Are you hoping to eliminate people who think differently through this crime of ‘espionage'?”COUNTERSURVEILLANCE PROBE / MONITOR(Buy/Rent/Layaway)WARNINGS ABOUND“Made Friends Carelessly and Was Incited to Act Against the Country, Stole Secrets, Was Caught and Became a Prisoner”—a billboard displayed in Zibo, Shandong province.
Click Here Or On Above Image To Reach Our ExpertsUS. Can Learn From China's Spot-The-Spy ProgramPeople can respond to drugs very differently. A medication that brings relief for some patients might show no benefit at all in others, or even cause harmful side effects.A growing array of genetic tests is designed to help predict how people are likely to respond to many common medications, from antidepressants and antihistamines to pain relievers and blood thinners. The tests, which are controversial, look for tiny variations in genes that determine how fast or slow we metabolize medications.Because of such gene variations, codeine, frequently prescribed to relieve pain, has little effect on as much as 20% of the population, while 2% of people have such a strong reaction that a normal dose can be life-threatening. About 25% of people can't effectively absorb Plavix, a clot-busting drug, putting them at increased risk for a heart attack or stroke. PRO-DTECH II FREQUENCY DETECTOR(Buy/Rent/Layaway)Even everyday drugs such as Advil and Motrin, for pain relief, and Zocor, to lower cholesterol, can have widely varying effects. Testing patients for gene variations could avoid some of the 700,000 serious drug reactions in the U.S. each year, some experts say. Proponents of the tests, which are done with a cheek swab, say they also could help doctors rely less on trial and error in choosing the right drug and the right dosage for individual patients.CELLPHONE DETECTOR (PROFESSIONAL)(Buy/Rent/Layaway)The Food and Drug Administration has included cautionary information for people with certain gene variations on the labels of more than 100 prescription medications. As yet, only about 20% of doctors order such tests, according to a survey by the American Medical Association, and many patients don't know they exist.PRO-DTECH III FREQUENCY DETECTOR(Buy/Rent/Layaway)Some major medical associations, including the American College of Cardiology and the American Psychiatric Association, have been slow to endorse the testing, mainly because there are no large, randomized controlled trials showing the technique significantly improves patient care. And the tests, which range from $500 to $2,000, are only covered by some insurers in some cases.PRO-DTECH III FREQUENCY DETECTOR(Buy/Rent/Layaway)NOT RIGHT FOR EVERYONEMany common medications can affect people differently depending on minor variations in the genes that regulate key enzymes. The variations can make people metabolize certain drugs either more slowly or rapidly than normal. Some examples:DRUGSPain relievers codeine or oxycodone, including Tylenol 3 and PercocetENZYME PATHWAY AT WORKCYP2D6IMPACTA standard dose can have little effect in up to 20% of people, while as many as 2% can have a life-threatening reaction.DRUGSBlood thinner Plavix (clopidogrel) and acid reducers Prilosec (omeprazole) and Prevacid (lansoprazole)ENZYME PATHWAY AT WORKCYP2C19IMPACTUp to 15% of people metabolize these drugs very slowly, resulting in a higher effective dose and greater risk of side effects.DRUGBlood thinner Coumadin (warfarin)ENZYME PATHWAY AT WORKCYP2C9IMPACTPeople with some gene variants have twice the risk of severe bleeding, but other factors are involved and population percentages are unclear.DRUGCholesterol reducer Zocor (simvastatin)ENZYME PATHWAY AT WORKSLCO181IMPACTUp to 40% of people have impaired ability to metabolize this drug, giving them increased risk of muscle pain and other side effects.Source: Clinical Pharmacogenetics Implementation ConsortiumAlan Pocinki, an internist in Rockville, Md., says he orders gene testing for patients who have a history of unexplained symptoms or who haven't gotten relief from drugs in the past. In many cases, he is able to find a better treatment based on their DNA, he says. “It makes a huge difference clinically among people I see every day.”PRO-DTECH III FREQUENCY DETECTOR(Buy/Rent/Layaway)How people's genes affect their response to medic
Click Here Or On Above Image To Reach Our ExpertsSpy Gadgets For Grow Facilities / Weed DispensariesSurveillance And Counter-Surveillance Systems For Grow Facilities / Medical Marijuana DispensariesNow legal in several states, medical marijuana dispensaries represent a rapidly expanding industry. Depending on the location and size of the facility, some medical marijuana dispensaries include a small retail storefront whereas others are large in size and maintain cannabis growing operations.Medical marijuana dispensaries must meet state regulations in order to conduct business. PRO-DTECH II FREQUENCY DETECTOR(Buy/Rent/Layaway)Strictly enforced state regulations vary for each state but all have thing in common: all states permitting dispensaries require that the facility manager have a functioning video surveillance system monitoring the dispensary at all times. Security ThreatsLoss Prevention: Every dispensary manager knows the importance of protecting his or her assets, which is why it's critical to invest in retail loss prevention measures. CELLPHONE DETECTOR (PROFESSIONAL)(Buy/Rent/Layaway)Security cameras strategically placed at all entrances and exits help to prevent robbery and catch detailed imagery in case an unauthorized person breaks into the building.PRO-DTECH III FREQUENCY DETECTOR(Buy/Rent/Layaway)To increase cash or point-of-sale security, cameras should be installed in areas where cash is being handled.PRO-DTECH III FREQUENCY DETECTOR(Buy/Rent/Layaway)Finally, to reduce inventory shrinkage, the main sales floor as well as stock area should be monitored by HD security cameras in case an employee or customer shoplifts.Counter-SurveillanceGrow facilities / medical marijuana dispensaries should also take into consideration that competitors would love to find out as much about your operations as possible.PRO-DTECH III FREQUENCY DETECTOR(Buy/Rent/Layaway)We have law-enforcement grade bug detectors, cameras finders and cell phone detectors to help you keep your trade secrets from falling into the wrong hands.Employee Theft: Dishonest employees are not afraid to take directly from the cash register, and dispensary managers can't always be right there to make certain that all sales for the day have been added up correctly. WIRELESS/WIRED HIDDENCAMERA FINDER III(Buy/Rent/Layaway)An easy way to reduce employee theft is by strategically placing surveillance cameras above the cash register. PRO-DTECH IV FREQUENCY DETECTOR(Buy/Rent/Layaway)Employees performing cash transactions will think twice when there's a camera directly above them. Another fraudulent activity to be aware of is “sweethearting,” which occurs when the employee gives unauthorized discounts to friends or family. Wireless Camera Finder(Buy/Rent/Layaway)Security cameras facing the display monitor can catch instances of sweethearting to prevent it from becoming a problem. MAGNETIC, ELECTRIC, RADIO ANDMICROWAVE DETECTOR(Buy/Rent/Layaway)Cameras should also monitor grow operations, the cash safe or other restricted areas of the site that contain raw cash, and the retail space to ensure employees are not attempting to steal plants or product.COUNTERSURVEILLANCE PROBE / MONITOR(Buy/Rent/Layaway)Operations MonitoringGrow Monitoring: In addition to reducing security threats, video surveillance systems allow dispensary or grow facility operators to monitor their crops and growing process, ensuring that every marijuana plant is harvested efficiently and meets the highest standards of quality. Depending where cameras are placed, dispensary managers can gain keen insight into the daily operations of their facility by viewing live and recorded footage.PRO-DTECH FREQUENCY DETECTOR(Buy/Rent/Layaway)The cultivation of marijuana seeds requires detailed attention. Reviewing video footage of growing operations ensures only the best practices are used in the process. Video enables facility managers to pinpoint unnecessary or poor growing practices. Eliminating these processes from happening in the future will help prevent low-quality marijuana products and edibles from reaching the consumer.
Click Here Or On Above Image To Reach Our ExpertsSelling And Shopping Safely Online For Consumers And MerchantsDespite stability in the number of victims and losses last year, the ways that credit card fraud occurs have changed. With the switch to chip-enabled EMV cards in 2015, identity thieves are moving from cloning counterfeits of that existing plastic and, instead, are focusing on opening new fraudulent accounts with stolen Social Security numbers and other sensitive data.In its 2016 Identity Fraud Study, Javelin Strategy & Research reports that new-account fraud more than doubled in 2015 from the previous year — and with that 113 percent increase, it now accounts for one-fifth of all fraud losses.Meanwhile, using stolen credit card numbers on counterfeit clones for in-store shopping dropped by 4 percent but increased by 5 percent for fraudulent online purchases. PRO-DTECH II FREQUENCY DETECTOR(Buy/Rent/Layaway)Other trends worth noting from Javelin's analysis, based on a survey of more than 5,000 consumers: More victims, fewer losses. More than 13 million Americans fell victim to identity fraud last year; that's up 3 percent from 2014 and the second highest number in the past six years. But losses decreased by 6 percent to $15 billion, the lowest amount since 2010. Overall, identity thieves have stolen $112 billion in the past six years — roughly $35,600 per minute, or enough to pay for four years of college in just four minutes.CELLPHONE DETECTOR (PROFESSIONAL)(Buy/Rent/Layaway)Hacked here, used abroad. About 18 percent of identity fraud involves using stolen U.S. credit cards outside our borders. That amounts to $2.4 billion, with an average of $1,585 per incident. Because of government-mandated protections and zero percent liability policies offered by most providers, credit card companies, not their customers, typically eat those costs. Issuers are estimated to proactively detect two-thirds of these cases, according to Javelin.PRO-DTECH III FREQUENCY DETECTOR(Buy/Rent/Layaway)You may be your worst enemy. Consumers who say they don't trust their financial institutions fare worse: Their stolen information is used 75 percent longer by fraudsters, with expenses averaging 185 percent higher than those of customers who use services such as transaction monitoring and alerts, credit freezes and black-market monitoring.PRO-DTECH III FREQUENCY DETECTOR(Buy/Rent/Layaway)How To Protect Yourself1. Get A Credit Freeze. Once enacted, a credit (also known as a security) freeze restricts access to your credit report, which creditors check before issuing new financial or service accounts in your name. Without seeing your report, creditors won't approve accounts to ID thieves posing as you. A freeze must be placed with each of the three major credit-reporting bureaus — typically free for those 65 and older (state laws vary) — and can be unthawed when you are legitimately applying for credit.2. Secure Mobile Devices. If your financial life is on a smartphone or tablet, apply software updates that patch known vulnerabilities as soon as they become available. Use security features built into Android and iOS devices, such as passcode or biometric (fingerprint) protection, and programs that encrypt data and remotely wipe contents if the device is lost or stolen.PRO-DTECH III FREQUENCY DETECTOR(Buy/Rent/Layaway)3. Use Strong Passwords. They “remain the de facto first line of defense for most online accounts, which has motivated criminals to compromise them whenever possible,” Javelin notes. Using a password manager is a convenient way to maintain good password practices without resorting to writing these codes down, which could also place them at risk of physical compromise.4. Sign Up For Account Alerts. Offered by banks, credit card issuers and brokerages, these free notifications, via email or text message, provide you with real-time alerts of suspicious activity. When fraud occurs, contact the account issuer immediately.WIRELESS/WIRED HIDDENCAMERA FINDER III(Buy/Rent/Layaway)5. Take Data Breach Notifications Seriously. One in 5 data-breach victims suffered fraud in 2015, up from 1 in 7 in 2014. While data breaches at retailers remain an issue, the biggest jump in breaches was at government agencies and health care organizations, with a 64 percent rise in exposure of SSNs.PRO-DTECH IV FREQUENCY DETECTOR(Buy/Rent/Layaway)
Click Here Or On Above Image To Reach Our ExpertsCyber-Literacy Cybersecurity is considered a top priority for businesses, but a recent study found that two out of five respondents across board, C-suite and technical levels didn't feel responsible for the repercussions of a cyberattack.The research, called The Accountability Gap: Cybersecurity and Building a Culture of Responsibility, found that most executives don't have a clear picture of their network resilience nor are they prepared to detect and respond in the event of a breach.As legislation across the globe evolves to make organizations accountable for loss of personal data as a result of cybercrime, board members need to become as capable of reading a cyber report as they are of analyzing balance sheets. PRO-DTECH II FREQUENCY DETECTOR(Buy/Rent/Layaway)“As the leadership becomes more knowledgeable, you have a drip down effect,” said Chris Brauer, director of innovation and senior lecturer at the Institute of Management Studies, Goldsmiths, University of London, who directed the research commissioned by Nasdaq and Emeryville, Calif.-based cybersecurity firm Tanium Inc. He said that “drip down effect” was evident in corporate use of social media; as leaders gained fluency in it, organizations became more comfortable embracing social media.CELLPHONE DETECTOR (PROFESSIONAL)(Buy/Rent/Layaway)The study focused on measuring an organization's vulnerability to cyber risk by evaluating its awareness of the risk and its ability to address it. It combined a qualitative and quantitative approach that entailed interviews to define challenges to boosting an organization's awareness and readiness. PRO-DTECH III FREQUENCY DETECTOR(Buy/Rent/Layaway)It also surveyed 1,530 non-executive directors, C-suite executives, chief information officers and chief information security officers at companies with at least 1,000 employees in the U.S., U.K., Germany, Japan, Denmark, Norway, Sweden and Finland.PRO-DTECH III FREQUENCY DETECTOR(Buy/Rent/Layaway)After completing the survey, the participating organization received a vulnerability score. Eighty percent of respondents were found to have a medium-level of vulnerability, and another 10% were highly vulnerable to breaches.The remaining 10% presented low vulnerability. The study created a baseline for the participants and with the data in hand, organizations can start taking steps to move away from the high vulnerability corner, said Mr. Brauer.PRO-DTECH III FREQUENCY DETECTOR(Buy/Rent/Layaway)Among the highly vulnerable companies, 91% of non-executive directors cannot read a cybersecurity report and nearly 100% of those companies don't track devices on their network.Among this group, only 9% said their systems were regularly updated in response to cyberthreats, and 87% of them don't consider their malware, antivirus software and patches to be 100% up-to-date at all times.WIRELESS/WIRED HIDDENCAMERA FINDER III(Buy/Rent/Layaway)“Traditionally, IT spending is going to protection, to preventing the bad guy getting in; organizations aren't equipped to respond and remediate the [damage caused by] the bad guy,” said Richard Olver, vice president of Europe, Middle East and Africa for Tanium.PRO-DTECH IV FREQUENCY DETECTOR(Buy/Rent/Layaway)But as new rules become effective in making organizations disclose breaches and the steps taken to contain losses, boards will have to take ownership of cybersecurity, he said.Although chief information officers and chief information security officers are spending more time in front of boards, often times the exchange is truncated not only by the lack of cyber knowledge among board members but also because the technical experts aren't always effective communicators.Wireless Camera Finder(Buy/Rent/Layaway)“The technical security [teams] are owners of the documents they produce, they need to be able to define, quantify and convey the actual impact of a breach,” said Louis Modano, senior vice president of global infrastructure and chief information security officer at Nasdaq.MAGNETIC, ELECTRIC, RADIO ANDMICROWAVE DETECTOR(Buy/Rent/Layaway)Nasdaq plans to make the cybersecurity vulnerability assessment available to its members and others in the near future, so the data will continue to be collated and progress tracked.COUNTERSURVEILLANCE PROBE / MONITOR(Buy/Rent/Layaway)Not unlike other issues of compliance, cybersecurity can be managed by engendering a shift in the organization's culture, the report concluded.PRO-DTECH FREQUENCY DETECTOR(Buy/Rent/Layaway)It suggests creating a culture of vigilance, acknowledging that cybersecurity is a fundamental threat to the business; a culture of openness by increasing cyberliteracy and knowledge from the top-down; and a culture of innovation to ensure the right technology and technologists are in place to tackle current threats.RF SIGNAL DETECTOR ( FREQUENCY COUNTER)(Buy/Rent/Layaway)Your questions and comments are greatly appreciated.Monty Henry, Owner (function () { var articleId = fyre.conv.load.makeArticleId(null); fyre.conv.load({}, [{ el: 'livefyre-comments', network: "livefyre.com", siteId: "345939", articleId: articleId, signed: false, collectionMeta: { articleId: articleId, url: fyre.conv.load.makeCollectionUrl(), } }], function() {}); }()); Additional Resources: * Prevention and Detection of Electronic Harassment and Surveillance* Electrical Hyper-Sensitivity: The-Truth!!* How Do I Know If I've Been Bugged? * Targeted Individuals* Operating The Brain By Remote Control* What is BitCoin and How Does It Work?* The Creature From Jekyll Island: This Blog And Video Playlist Explains Why The U.S. Financial System is Corrupt and How It Came To Be That Way* Number of Americans Renouncing Citizenship Surges To Escape Oppressive Tax Rules* Dropping Off The Grid: A Growing Movement In America: Part I* Online Privacy Tools and Tips www.DPL-Surveillance-Equipment.com (function() { var po = document.createElement('script'); po.type = 'text/javascript'; po.async = true; po.src = 'https://apis.google.com/js/plusone.js'; var s = document.getElementsByTagName('script')[0]; s.parentNode.insertBefore(po, s); })();
Click Here Or On Above Image To Reach Our ExpertsRent Our Two-Way Radios For Your Special EventsApplications: Some of The Most Common Uses For Our Two-Way Radio Rentals Include:* Trade Shows* Meetings, Conferences, And Events* Fairs And Festivals* Sporting Events* Concerts* Petrochemical Refinery Turnarounds* School And Church Outings* Corporate Events* Security Operations* Transportation Companies* Travel Services* Industry Associations PRO-DTECH II FREQUENCY DETECTOR(Buy/Rent/Layaway) CELLPHONE DETECTOR (PROFESSIONAL)(Buy/Rent/Layaway)PRO-DTECH III FREQUENCY DETECTOR(Buy/Rent/Layaway)PRO-DTECH III FREQUENCY DETECTOR(Buy/Rent/Layaway)PRO-DTECH III FREQUENCY DETECTOR(Buy/Rent/Layaway)WIRELESS/WIRED HIDDENCAMERA FINDER III(Buy/Rent/Layaway)PRO-DTECH IV FREQUENCY DETECTOR(Buy/Rent/Layaway)Wireless Camera Finder(Buy/Rent/Layaway)MAGNETIC, ELECTRIC, RADIO ANDMICROWAVE DETECTOR(Buy/Rent/Layaway)COUNTERSURVEILLANCE PROBE / MONITOR(Buy/Rent/Layaway)PRO-DTECH FREQUENCY DETECTOR(Buy/Rent/Layaway)RF SIGNAL DETECTOR ( FREQUENCY COUNTER)(Buy/Rent/Layaway)Your questions and comments are greatly appreciated.Monty Henry, Owner (function () { var articleId = fyre.conv.load.makeArticleId(null); fyre.conv.load({}, [{ el: 'livefyre-comments', network: "livefyre.com", siteId: "345939", articleId: articleId, signed: false, collectionMeta: { articleId: articleId, url: fyre.conv.load.makeCollectionUrl(), } }], function() {}); }()); Additional Resources: * Prevention and Detection of Electronic Harassment and Surveillance* Electrical Hyper-Sensitivity: The-Truth!!* How Do I Know If I've Been Bugged? * Targeted Individuals* Operating The Brain By Remote Control* What is BitCoin and How Does It Work?* The Creature From Jekyll Island: This Blog And Video Playlist Explains Why The U.S. Financial System is Corrupt and How It Came To Be That Way* Number of Americans Renouncing Citizenship Surges To Escape Oppressive Tax Rules* Dropping Off The Grid: A Growing Movement In America: Part I* Online Privacy Tools and Tips www.DPL-Surveillance-Equipment.com (function() { var po = document.createElement('script'); po.type = 'text/javascript'; po.async = true; po.src = 'https://apis.google.com/js/plusone.js'; var s = document.getElementsByTagName('script')[0]; s.parentNode.insertBefore(po, s); })();
Click Here Or On Above Image To Reach Our ExpertsHealth-Care CIOs Share Security Best Practices To Prevent Rasomware ThreatsHospital chief information officers say the health-care industry now needs to assume attackers are going to get into hospital networks. The key to avoiding damage, they say, is detection, response and containment.Attackers encrypted data at Methodist Hospital in Henderson, Kentucky and were holding it for ransom, security blogger Brian Krebs reported Wednesday. Additionally, NBC reported that two other hospitals were also recently victims of so-called ransomware attacks. Those attacks comes a little more than a month after Hollywood Presbyterian Medical Center said it had paid hackers 40 bitcoins, about $17,000, after an attack made certain systems unusable for more than two weeks.Methodist Hospital did not respond to a request for comment.Traditionally, hospitals have focused on prevention, Darren Dworkin, chief information officer at Cedars-Sinai told CIO Journal. “You still have to do that, but at the same time you need to acknowledge that stuff will come through so you can detect it, catch it, and contain it,” he said. PRO-DTECH II FREQUENCY DETECTOR(Buy/Rent/Layaway)Another hospital faced a problem with ransomware when a nurse clicked on a bad link, said a CIO who asked not to be identified. By isolating the laptop from the rest of the network, the CIO was able to contain the problem from spreading. These attacks can spread rapidly throughout a network, he said. Related Information: Healthcare Podcasters Talk Security (Blab)The CIO used backups to quickly restore the data. It's crucial to have data that's frequently backed up, he said. The difference between a problem that's caught and quickly handled and one that ends with a hospital paying thousands of dollars to hackers is often good backups.CELLPHONE DETECTOR (PROFESSIONAL)(Buy/Rent/Layaway)Malicious software often enters health-care organizations when an employee clicks on a bad link or downloads a bad attachment. The malicious software then targets unpatched software on the victim's computer. There are many Windows-based systems in health care and the patching of software is notoriously poor, said Scott Donnelly, senior analyst at Recorded Future, a security firm that sells real-time threat intelligence.PRO-DTECH III FREQUENCY DETECTOR(Buy/Rent/Layaway)According to the company's analysis, recent ransomware has targeted vulnerabilities in Adobe Flash Player and Microsoft Silverlight. Mr. Donnelly suggests updating that software as well as Web browsers.PRO-DTECH III FREQUENCY DETECTOR(Buy/Rent/Layaway)The best defense in the short term is to educate employees not to open unexpected attachments, click on any link embedded in an email and not to provide any personal information to unknown callers, said John D. Halamka, chief information officer at Beth Israel Deaconess Medical Center, in an email message.“Millions can be spent on technical security but you're still as vulnerable as the most gullible employee who provides their password in response to a phishing email or inserts an infected USB drive,” he added.PRO-DTECH III FREQUENCY DETECTOR(Buy/Rent/Layaway)Related Story:Virus Infects MedStar Health System's ComputersA virus infected the computer system of MedStar Health on Monday, forcing one of the Washington region's largest health care providers to shut down significant portions of its online operations.Hospital officials acknowledged the breach, which is being investigated by the FBI, but said they had “no evidence that information has been stolen.”“MedStar acted quickly with a decision to take down all system interfaces to prevent the virus from spreading throughout the organization,” spokeswoman Ann Nickels said in a statement. “We are working with our IT and cyber-security partners to fully assess and address the situation. Currently, all of our clinical facilities remain open and functioning.”WIRELESS/WIRED HIDDENCAMERA FINDER III(Buy/Rent/Layaway)The $5 billion health-care system operates 10 hospitals and more than 250 outpatient facilities in the Washington region. It serves hundreds of thousands of patients and employs more than 30,000 people.Hospital staff reported that they were unable to access email or a vast database of patient records.PRO-DTECH IV FREQUENCY DETECTOR(Buy/Rent/Layaway)One employee told The Post that the entire MedStar computer system was inaccessible.“Even the lowest level staff can't communicate with anyone. You can't schedule patients, you can't access records, you can't do anything,” said the woman, who asked that her name not be used because she wasn't authorized to speak about the incident.The woman also said she spoke to two other employees who saw a pop-up on their computer screens stating that they had been infected by a virus and asking for ransom in “some kind of internet currency.” She has not seen the pop-up herself.Though the nature of the MedStar infection remains unclear, Nickels said Monday she had “not been told that it's a ransom situation.”“Ransomware” — a virus that holds systems hostage until victims pay for a key to regain access — has twice been deployed against hospitals in recent cyber attacks.Last month, a hospital in Los Angeles paid hackers $17,000 in bitcoins, an internet currency, to free its system. Two weeks ago, a Kentucky facility announced it was in an “internal state of emergency” after a similar attack.Wireless Camera Finder(Buy/Rent/Layaway)For MedStar, the infection's impact may be widespread as staff members are forced to use paper charts and records.“Everything will be slowed down tremendously,” said a man who has worked closely with the hospital for 15 years. “It's huge.”Appointments and surgeries will be delayed, he said, adding that it will take longer for lab results to come back, patients to receive tests and medications to be ordered.MedStar has not announced how long it expects the system to remain offline.MAGNETIC, ELECTRIC, RADIO ANDMICROWAVE DETECTOR(Buy/Rent/Layaway)Updated 4-11-2016
Click Here Or On Above Image To Reach Our ExpertsCybersecurity Expert Suggests Blockchain To Thwart HackersEveryone should have concerns about cybersecurity as there are many fronts in this battle. Hackers are increasingly targeting not just people's credit card details but also other personal details and critical infrastructure more often than you would think. The worst fear is that terrorists could take out a nuclear plant, causing a disaster like Fukishima. Corporations also target people's data in order to improve sales and expand their customer base. Mass surveillance means that someone might always be listening. Demand for services that ensure cybersecurity will grow rapidly in the years to come and blockchain technology is making multiple advances in addressing these concerns.Guardtime has recently announced its intention to use its own blockchain to secure the UK's energy infrastructure, including nuclear power plants and electricity distribution grids, as well as national flood defences, in partnership with Future Cities Catapult. PRO-DTECH II FREQUENCY DETECTOR(Buy/Rent/Layaway)CEO of Guardtime, Mike Gault, decided to base some of his operation out of Estonia, capitalizing on the talented pool of cryptographers. The key problem he was able to solve was how to protect the integrity of data without keeping secrets to verify whether such data is correct. The blockchain used by Guardtime, although inspired by Bitcoin, differs from virtual currency blockchains; it is based on Keyless Signature Infrastructure (KSI), which improves on the scalability and settlement time. CELLPHONE DETECTOR (PROFESSIONAL)(Buy/Rent/Layaway)This system relies on the integrity of the hash function to ensure integrity of data, allowing it to identify three attributes of data: first, proof of time, i.e. when the asset was actually registered on the Blockchain; second, identity, referring to where the asset was first recorded; and third, authenticity, referring to whether or not the data has been tampered with.PRO-DTECH III FREQUENCY DETECTOR(Buy/Rent/Layaway)The integrity of data in the system, not the confidentiality of data, was attacked at Iran's Natanz nuclear facility by Stuxnet, a malicious computer program, back in 2013. By using KSI digital signatures, Guardtime's blockchain monitors the integrity of digital assets and detects unauthorized changes in software and configurations.PRO-DTECH III FREQUENCY DETECTOR(Buy/Rent/Layaway)Also, by providing a complete chain of the history of the data that is generated and transmitted, a breach can be acted upon in real-time. This is how the technology will prevent attacks such as Stuxnet from hitting critical civilian infrastructure networks in the UK.The technology which Guardtime is employing is already used to secure Estonian IT systems and can be independently verified without having to trust the administrators of the system. Estonia now registers marriages, health records and other sensitive information on a blockchain. Guardtime's KSI Blockchain is best suited to cybersecurity, telecommunications and data management where its industrial capacity sets it apart from other blockchain providers. A move away from public key cryptography means that it is secure against potential threats in the future, such as quantum computing, as hash functions are immune. Also, their offering comes at a time when the nuclear power industry has come under scrutiny with regards to cybersecurity.PRO-DTECH III FREQUENCY DETECTOR(Buy/Rent/Layaway)Another venture is taking a similar approach, aiming to solve the biggest problem in telecommunications; trusting third-parties with sensitive data. BitMessage is an open-source project that has revamped Bitcoin's block-and-transfer system to decentralize and automate encrypted communication. The novel feature is transactional mixing, making it extremely difficult to eavesdrop even if the encrypted data has been captured. Once the project has been brought out of alpha testing, we could see it replace email and other forms of instant messaging. The software is only available on desktops at present but could soon expand to mobiles and other portable devices.WIRELESS/WIRED HIDDENCAMERA FINDER III(Buy/Rent/Layaway)Enigma is also based on the Bitcoin's blockchain and was developed by the MIT to create a marketplace where users can sell the rights to encrypted data without providing access to the underlying data itself.PRO-DTECH IV FREQUENCY DETECTOR(Buy/Rent/Layaway)This project is set to bring ‘perfect secrecy' to the blockchain by breaking data into pieces and mathematically guaranteeing that each of these pieces is masked, random and completely secure.Enigma has already caught the attention of banks, who want to be able to store, analyse and share data without it being revealed to other parties. Their white paper gives an illuminating example of how it can be used to reduce costs and offer a new income stream for customers. A pharmaceutical company looking for patients in clinical trials would be able to scan genomic databases for candidates. With guaranteed privacy and autonomous control, more consumers will feel comfortable selling their data. Wireless Camera Finder(Buy/Rent/Layaway)This will allow greater data-sharing between companies and lead to more value being created by businesses. However, Enigma needs to reach critical mass before the network can start working securely. To help expand the network and gain users, every time someone requests a computation from the Enigma network, they pay a bitcoin fee. The largest fraction of this fee goes to the nodes in the Enigma network as a reward for storing and processing the user's encrypted data.MAGNETIC, ELECTRIC, RADIO ANDMICROWAVE DETECTOR(Buy/Rent/Layaway)BitMessage directly addresses concerns held by many about the overarching power of corporations and governments to snoop on private data.COUNTERSURVEILLANCE PROBE / MONITOR(Buy/Rent/Layaway)Projects such as Enigma will allow consumers to capitalize on the explosion of ‘Big Data' and put more control into what personal data corporations can and cannot access.PRO-DTECH FREQUENCY DETECTOR(Buy/Rent/Layaway)Finally, the KSI Blockchain illustrates how a blockchain can be made resistant to decryption through quantum computing and how to achieve scalability for industrial use. In short, Bitcoin has inspired, and will continue to inspire, some exciting applications that will revolutionize cybersecurity.RF SIGNAL DETECTOR ( FREQUENCY COUNTER)(Buy/Rent/Layaway)Your questions and comments are greatly appreciated.Monty Henry, Owner
Dropping Off The Grid: A Growing Movement In AmericaNow is your chance to flee society. Drop off the grid. Pull a Thoreau. Be you a survivalist, an environmentalist or a cheapskate-ist, you can join the growing movement of Americans embracing off-grid living."There's a desire to step out of the rat race, and in America, that goes very deep in the national psyche," says Nick Rosen, author of "Off the Grid: Inside the Movement for More Space, Less Government, and True Independence in Modern America" and editor of www.off-grid.net. "You know, the pioneering spirit and sturdy self-reliance -- these things which define the American character."For some off-griders, it's a matter of having little or no impact on the environment -- literally living off the power grid. This lifestyle has been championed by celebrities Daryl Hannah and Ed Begley Jr. Then there are those who no longer want to be a blip on the societal radar."Off-grid living is a spectrum that unites greens and survivalists," says Rosen, referring to those who choose to escape city life because they either don't trust the government or don't want it meddling in their affairs.Whether you’re a Civil libertarian or just want to be private, you can relax and worry less about the intrusive State with its Big Brother databases, at least in the UK. Civil servants running the new systems are so incompetent (e.g. the Ministry of Defence stolen laptop) that the biggest fear is them losing your data. But private industry is another matter. From Facebook to Microsoft, They are watching You. Now the US Senate is considering a “do not track” command that could be issued by individual internet users.The Senate Commerce, Science and Transportation Committee held a hearing Wednesday to debate what – if any – privacy protections Internet users should be given. Most of the senators on hand agreed that consumers know little about who or what is tracking their browsing behavior.The UK government is burning $500m a year to build a national ID database that will duplicate the passport system and only cover those of us law abiding enough to register under our real names. Corporate databases will create their own parallel versions, or license government data for their own security checks.But you can take a few steps to protect your privacy. Follow these simple tips, and Big Brother will be no bother:1. How to Get an Anonymous CellphoneGo to a town you have never visited before, to an area with no CCTV cameras and pay a homeless person to buy a pay-as-you-go mobile phone for you. That way no shop will have your image on its CCTV. You will also have an anonymous mobile.In order to keep your anonymity, top it up in a shop with no CCTV outside. Or dispense with the phone altogether and return to the humble payphone, now the preserve of tourists and the super-poor.Even if you stick to your traceable phone, leave it switched off whenever possible to avoid having your movements tracked. Many phones are still traceable, so you need to take the battery out to be certain. If you have a Bluetooth phone, keep the service switched off because this is now being tested for advertising and other marketing activities.2. Hide Your EmailIf you use one of the free, web-based services like Gmail, your communications are being stored to build up a picture of your interests. Instead, you can use a service called Hushmail to send encrypted emails. Or work out a private code with friends you want to communicate with.You do not need an email address of your own. One hacker I spoke to sends emails from cybercafes via The Observer website, using the service which allows anyone to send any article to a friend. He embeds his message into the covering note which goes with the article.Others with their own computer use the free XeroBank browser (in preference to Explorer or Firefox), which includes several privacy-enhancing add-ons and sends all data through a network ‘cloud’ which hides most of the data you normally give away as you use a computer, but at the cost of reduced speed.3. Protect Your Computer FilesThere is sophisticated software that deletes all traces of your activities from your computer. Assuming you don’t have access to this, it is still worth remembering the data about you contained inside each file. Many digital photos, for example, contain within them the serial number of the camera that took them. Word documents contain the name of the author as well as traces of previous drafts.4. Stay Off Spam Mailing ListsEach time you submit your email address to register for a new website, create a special address, either on a free webmail service or on your own email server so you have control over it. Then, if the company later sells your email address or loses it through poor security, you will know exactly who to blame. And you will be able to close the account or block all email to that particular address. Again, Hushmail is useful for this. You can set it up to create these aliases for you.5. Stop Supermarkets Snooping on Your ShoppingSwap your supermarket loyalty card with a friend or acquaintance every few months, after having cashed in any points you have accumulated (treat Oyster and other local transport cards the same way). You lose no benefits and it prevents tracking of specific purchasing patterns (or journeys) tied to your name and address. Use cash more often – save your credit card for emergencies.6. Mess Up Utility Companies’ Marketing PlansLive off-grid, unplugged from the system with solar panels and rainwater harvesting. There are thousands of people living without mains power, water or sewerage, all over the UK and the US, in isolated cottages, behind hedgerows in caravans or in groups of yurts in country fields. And this is not just a movement for tree huggers and climate campers. Many live on boats in towns and cities, and if you live in a flat or house, you can still unplug.Get a laptop with wireless capability. There are plenty of hot spots where you can check your email or browse for free.Thunderbird Mail transfer agent is available free from the same folks that brought you Firefox. The Enigmail plug-in allows encrypted email and file transfer with up to a 4096 bit key. I’ve tested it with Windows, Mac and UNIX for interoperability. Combined with a Gmail account that be configured for TLS (Similar to HTTPS) connections, it makes for a fairly secure package and it’s all free. It won’t stop NSA from reading your mail but will for most everyone else.How does one just disappear off the face of the earth? Is it as simple as moving away to another country? First you have to understand who you are running from. If you are running from an abusive partner, know that they have limited resources and might have a problem if you move out of state or out of the country. If you are running from the FBI for example, understand that these people have unlimited resources and will do everything in your power to hunt you down even if you move to another country.Before going underground, you have to do a few things in order to throw your opposition away from your trail. You have to destroy the "old" you and build a new you. Destroy all photographs you can get possession of. Some of your friends or relatives might be hesitant to give you their photographs but let them understand that the people chasing you might go after them, too, because of their connection to you. They will threaten your loved ones with physical or other forms of abuse if they refuse to hand over photographs. If it is not possible; destroy all the most recent pictures of yourself and leave the old ones. Of course you don't want your face plastered all over the state but if it is an artist's rendition or just an old photo, chances are high that people won't recognize you.Destroy or throw away all your credit cards and ATM cards. Government authorities can pinpoint your location within seconds if you use your magnetic cards. Before going underground, be sure to withdraw all your money from the bank and max out all your credit cards with the things you'll need or you can resell for cash. Do not bring your car with you. That will be the first thing that the opposition will look for. Leave your car in place where car thieves will be and let them strip your car clean to remove any trace of it. If you need transportation, there are a lot of places where you can simply give money and get a new car without any identification required. Just make sure you aren't buying a stolen car or the car itself doesn't violate any safety rules. The last thing you want as you are making your escape is to be pulled over for a simple safety violation.if (WIDGETBOX) WIDGETBOX.renderWidget('66f56d16-759e-496f-bc83-6083e68c5e3d');Get the Surveillance and Security Video Library widget and many other great free widgets at Widgetbox! Not seeing a widget? (More info)if (WIDGETBOX) WIDGETBOX.renderWidget('a37c3242-37e2-4596-9572-786e643c3c89');Get the DPL-Surveillance-Equipment.com widget and many other at ()INTERNET-BASED NANNY SPY CAMERAS (Buy/Rent/Layway)NOW, look in on your home, second home, lake house or office anytime, anywhere from any internet connected PC/Lap-top or Internet active cell phone, including iphone or PDA.Watch your child's caregiver while sitting at a traffic light or lunch meeting, or check on your business security from the other side of the world. Our built-in hidden video features all digital transmissions providing a crystal clear image with zero interference. With the IP receiver stream your video over the internet through your router, and view on either a PC or smart phone. Designed exclusively for DPL-Surveillance-Equipment, these IP hidden wireless cameras come with multiple features to make the user's experience hassle-free.NOW, look in on your home, second home, lake house or office anytime, anywhere from any internet connected PC/Lap-top or Internet active cell phone, including iphone or PDA: http://www.dpl-surveillance-equipment.com/wireless_hidden_cameras.htmlWatch your child's caregiver while sitting at a traffic light or lunch meeting, or check on your business security from the other side of the world. Our built-in hidden video features all digital transmissions providing a crystal clear image with zero interference. With the IP receiver stream your video over the internet through your router, and view on either a PC or smart phone. Designed exclusively for DPL-Surveillance-Equipment, these IP hidden wireless cameras come with multiple features to make the user's experience hassle-free.• Remote Video Access• Video is Recorded Locally To An Installed SD Card (2GB SD Card included)• Email Notifications (Motion Alerts, Camera Failure, IP Address Change, SD Card Full)• Live Monitoring, Recording And Event Playback Via Internet• Back-up SD Storage Up To 32GB (SD Not Included)• SD Card Lock Box With Key So SD Card Can't Be Removed• Digital Wireless Transmission (No Camera Interference)• View LIVE On Your SmartPhone!Includes:* Nanny Cameras w/ Remote View* Wireless IP Receiver* Remote Control* A/C Adaptor* Key ( For SD Card Lock Box)* 2GB SD Card* Ethernet Network CableFACT SHEET: HIDDEN NANNY-SPY (VIEW VIA THE INTERNET) CAMERASSpecifications:Receiver Specs:* Transmission Range of 500 ft Line Of Sight* Uses 53 Channels Resulting In No Interference* 12V Power Consumption* RCA Output* RJ45/Ethernet Port* Supports up to 32gig SD* Key Lock Mechanism To Protect Video DataCamera Specs:* 640x480 / 320x240 up to 30fps* Image Sensor: 1/4" Micron Sensor* Resolution: 720x480 Pixels* S/N Ratio: >45 db* Sensitivity: >11.5V/lux-s @ 550nm* Video System: NTSC* White Balance: Auto Tracking Our New Layaway Plan Adds Convenience For Online ShoppersDPL-Surveillance-Equipment's layaway plan makes it easy for you to buy the products and services that you want by paying for them through manageable monthly payments that you set. Our intuitive calculator allows you to break down your order's purchase price into smaller payment amounts. Payments can be automatically deducted from your bank account or made in cash using MoneyGram® ExpressPayment® Services and you will receive your order once it's paid in full. Use it to plan and budget for holiday purchases, anniversaries, birthdays, vacations and more!DPL-Surveillance-Equipment's Customers can now use the convenience of layaway online to help them get through these tough economic times.We all shop now and then just to face a hard reality -- big credit card bills. However, our latest financing innovation can help you avoid that. Find out why more and more shoppers are checking out DPL-Surveillance-Equipment's e-layaway plan.If you're drooling over a new nanny camera, longing for a GPS tracker, or wishing for that spy watch, but you're strapped for cash and can't afford to do credit, do what Jennie Kheen did. She bought her iPod docking station (hidden camera w/motion-activated DVR) online using our convenient lay-away plan.Our online layaway plan works like the old-fashioned service stores used to offer. But, in Kheen's case, she went to DPL-Surveillance-Equipment.com, found the iPod docking station (hidden camera w/motion-activated DVR), then set up a payment plan."It's automatically drawn from my account," she said. "I have a budget, $208.00 a month.In three months, Kheen had paid off the $650.00 iPod docking station. She paid another 3.9 percent service fee, which amounted to about $25.35 (plus $12.00 for shipping) for a total of $687.35."You pay a little bit each month," Kheen said. "It's paid off when you get it and you don't have it lingering over your head. It's great."Flexible payment terms and automated payments make our layaway plan an affordable and fiscally responsible alternative to credit cards.1. Register:It's quick, easy and FREE! No credit check required!2. Shop:Select the items or service you want and choose "e-layaway" as your payment option. Our payment calculator makes it easy for you to set up your payment terms.3. Make Payments:Payments are made on the schedule YOU set. Check your order status or adjust your payments online in a secure environment.4. Receive Products:Receive the product shortly after your last payment. The best part, it's paid in full... NO DEBT.More Buying Power:* Our lay-away plan offers a safe and affordable payment alternative without tying up your credit or subjecting the purchase to high-interest credit card fees.No Credit Checks or Special Qualifications:* Anyone 18 years old or older can join. All you need is an active bank account.Freedom From Credit Cards:* If you are near or beyond your credit limit or simply want to avoid high interest credit card fees, our e-layaway is the smart choice for you.Flexible Payment Schedules:* Similar to traditional layaway, e-layaway lets you make regular payments towards merchandise, with delivery upon payment in full. Payments are automatically deducted from your bank account or made in cash using MoneyGram® ExpressPayment®A Tool for Planning Ahead:* Our e-layaway makes it easy for smart shoppers like you to plan ahead and buy items such as bug detectors, nanny cameras, audio bugs, gps trackers, and more!No Hidden Charges or Mounting Interest:Our e-layaway makes shopping painless by eliminating hidden charges and monthly interest fees. Our customers pay a flat transaction fee on the initial purchase price.NO RISK:* You have the right to cancel any purchase and will receive a refund less a cancellation fee. See website for details.Security and Identity Protection:DPL-Surveillance-Equipment has partnered with trusted experts like McAfee and IDology to ensure the security and integrity of every transaction. Identity verification measures are integrated into our e-layaway system to prevent fraudulent purchases.Note: Simply Choose e-Lay-Away as a "Payment Option" in The Shopping CartDPL-Surveillance-Equipment.com is a world leader in providing surveillance and security products and services to Government, Law Enforcement, Private Investigators, small and large companies worldwide. We have one of the largest varieties of state-of-the-art surveillance and counter-surveillance equipment including Personal Protection and Bug Detection Products.Buy, rent or lease the same state-of-the-art surveillance and security equipment Detectives, PI's, the CIA and FBI use. Take back control! DPL-Surveillance-Equipment.comPhone: (1888) 344-3742 Toll Free USALocal: (818) 344-3742Fax (775) 249-9320Monty@DPL-Surveillance-Equipment.comGoogle+ and GmailDPLSURVE TwitterDPLSURVEMSN Monty@DPL-Surveillance-Equipment.comAOL Instant MessengerDPLSURVE32SkypeMontyl32Yahoo Instant MessengerMontyi32Alternate Email Addressmontyi32@yahoo.comJoin my Yahoo Group!My RSS Feed
Is This World Actually Ready For Free Energy? Answer, No! if (WIDGETBOX) WIDGETBOX.renderWidget('66f56d16-759e-496f-bc83-6083e68c5e3d');Get the Surveillance and Security Video Library widget and many other great free widgets at Widgetbox! Not seeing a widget? (More info)if (WIDGETBOX) WIDGETBOX.renderWidget('a37c3242-37e2-4596-9572-786e643c3c89');Get the DPL-Surveillance-Equipment.com widget and many other at ()INTERNET-BASED NANNY SPY CAMERAS (Buy/Rent/Layway)NOW, look in on your home, second home, lake house or office anytime, anywhere from any internet connected PC/Lap-top or Internet active cell phone, including iphone or PDA.Watch your child's caregiver while sitting at a traffic light or lunch meeting, or check on your business security from the other side of the world. Our built-in hidden video features all digital transmissions providing a crystal clear image with zero interference. With the IP receiver stream your video over the internet through your router, and view on either a PC or smart phone. Designed exclusively for DPL-Surveillance-Equipment, these IP hidden wireless cameras come with multiple features to make the user's experience hassle-free.NOW, look in on your home, second home, lake house or office anytime, anywhere from any internet connected PC/Lap-top or Internet active cell phone, including iphone or PDA: http://www.dpl-surveillance-equipment.com/wireless_hidden_cameras.htmlWatch your child's caregiver while sitting at a traffic light or lunch meeting, or check on your business security from the other side of the world. Our built-in hidden video features all digital transmissions providing a crystal clear image with zero interference. With the IP receiver stream your video over the internet through your router, and view on either a PC or smart phone. Designed exclusively for DPL-Surveillance-Equipment, these IP hidden wireless cameras come with multiple features to make the user's experience hassle-free.• Remote Video Access• Video is Recorded Locally To An Installed SD Card (2GB SD Card included)• Email Notifications (Motion Alerts, Camera Failure, IP Address Change, SD Card Full)• Live Monitoring, Recording And Event Playback Via Internet• Back-up SD Storage Up To 32GB (SD Not Included)• SD Card Lock Box With Key So SD Card Can't Be Removed• Digital Wireless Transmission (No Camera Interference)• View LIVE On Your SmartPhone!Includes:* Nanny Cameras w/ Remote View* Wireless IP Receiver* Remote Control* A/C Adaptor* Key ( For SD Card Lock Box)* 2GB SD Card* Ethernet Network CableFACT SHEET: HIDDEN NANNY-SPY (VIEW VIA THE INTERNET) CAMERASSpecifications:Receiver Specs:* Transmission Range of 500 ft Line Of Sight* Uses 53 Channels Resulting In No Interference* 12V Power Consumption* RCA Output* RJ45/Ethernet Port* Supports up to 32gig SD* Key Lock Mechanism To Protect Video DataCamera Specs:* 640x480 / 320x240 up to 30fps* Image Sensor: 1/4" Micron Sensor* Resolution: 720x480 Pixels* S/N Ratio: >45 db* Sensitivity: >11.5V/lux-s @ 550nm* Video System: NTSC* White Balance: Auto Tracking Our New Layaway Plan Adds Convenience For Online ShoppersDPL-Surveillance-Equipment's layaway plan makes it easy for you to buy the products and services that you want by paying for them through manageable monthly payments that you set. Our intuitive calculator allows you to break down your order's purchase price into smaller payment amounts. Payments can be automatically deducted from your bank account or made in cash using MoneyGram® ExpressPayment® Services and you will receive your order once it's paid in full. Use it to plan and budget for holiday purchases, anniversaries, birthdays, vacations and more!DPL-Surveillance-Equipment's Customers can now use the convenience of layaway online to help them get through these tough economic times.We all shop now and then just to face a hard reality -- big credit card bills. However, our latest financing innovation can help you avoid that. Find out why more and more shoppers are checking out DPL-Surveillance-Equipment's e-layaway plan.If you're drooling over a new nanny camera, longing for a GPS tracker, or wishing for that spy watch, but you're strapped for cash and can't afford to do credit, do what Jennie Kheen did. She bought her iPod docking station (hidden camera w/motion-activated DVR) online using our convenient lay-away plan.Our online layaway plan works like the old-fashioned service stores used to offer. But, in Kheen's case, she went to DPL-Surveillance-Equipment.com, found the iPod docking station (hidden camera w/motion-activated DVR), then set up a payment plan."It's automatically drawn from my account," she said. "I have a budget, $208.00 a month.In three months, Kheen had paid off the $650.00 iPod docking station. She paid another 3.9 percent service fee, which amounted to about $25.35 (plus $12.00 for shipping) for a total of $687.35."You pay a little bit each month," Kheen said. "It's paid off when you get it and you don't have it lingering over your head. It's great."Flexible payment terms and automated payments make our layaway plan an affordable and fiscally responsible alternative to credit cards.1. Register:It's quick, easy and FREE! No credit check required!2. Shop:Select the items or service you want and choose "e-layaway" as your payment option. Our payment calculator makes it easy for you to set up your payment terms.3. Make Payments:Payments are made on the schedule YOU set. Check your order status or adjust your payments online in a secure environment.4. Receive Products:Receive the product shortly after your last payment. The best part, it's paid in full... NO DEBT.More Buying Power:* Our lay-away plan offers a safe and affordable payment alternative without tying up your credit or subjecting the purchase to high-interest credit card fees.No Credit Checks or Special Qualifications:* Anyone 18 years old or older can join. All you need is an active bank account.Freedom From Credit Cards:* If you are near or beyond your credit limit or simply want to avoid high interest credit card fees, our e-layaway is the smart choice for you.Flexible Payment Schedules:* Similar to traditional layaway, e-layaway lets you make regular payments towards merchandise, with delivery upon payment in full. Payments are automatically deducted from your bank account or made in cash using MoneyGram® ExpressPayment®A Tool for Planning Ahead:* Our e-layaway makes it easy for smart shoppers like you to plan ahead and buy items such as bug detectors, nanny cameras, audio bugs, gps trackers, and more!No Hidden Charges or Mounting Interest:Our e-layaway makes shopping painless by eliminating hidden charges and monthly interest fees. Our customers pay a flat transaction fee on the initial purchase price.NO RISK:* You have the right to cancel any purchase and will receive a refund less a cancellation fee. See website for details.Security and Identity Protection:DPL-Surveillance-Equipment has partnered with trusted experts like McAfee and IDology to ensure the security and integrity of every transaction. Identity verification measures are integrated into our e-layaway system to prevent fraudulent purchases.Note: Simply Choose e-Lay-Away as a "Payment Option" in The Shopping CartDPL-Surveillance-Equipment.com is a world leader in providing surveillance and security products and services to Government, Law Enforcement, Private Investigators, small and large companies worldwide. We have one of the largest varieties of state-of-the-art surveillance and counter-surveillance equipment including Personal Protection and Bug Detection Products.Buy, rent or lease the same state-of-the-art surveillance and security equipment Detectives, PI's, the CIA and FBI use. Take back control! DPL-Surveillance-Equipment.comPhone: (1888) 344-3742 Toll Free USALocal: (818) 344-3742Fax (775) 249-9320Monty@DPL-Surveillance-Equipment.comGoogle+ and GmailDPLSURVE TwitterDPLSURVEMSN Monty@DPL-Surveillance-Equipment.comAOL Instant MessengerDPLSURVE32SkypeMontyl32Yahoo Instant MessengerMontyi32Alternate Email Addressmontyi32@yahoo.comJoin my Yahoo Group!My RSS Feed
Mobile-Blok Cloth (Blocks Cell Phone Signals)Mobile Phone Etiquette:Send the right signal by giving business and dinner partners your undivided attention with this innovative, service-blocking hanky made with silver fibers that effectively block incoming calls and texts. "My phone is off for you," says it all, so you can, too. Cut, sewn, and printed in the USA of fabric made in China. The Mobile-Blok Cloth fabric is conductive (conducts electricity) because it is partially made up of silver fibers. When the fabric creates an unbroken enclosure (when it is wrapped tightly around a phone without any gaps), it creates a phenomenon that is known in science as a "Faraday Cage". This means that any external static electrical field, such as a phone signal, will cause the electrical charges within the conducting fabric to redistribute themselves so as to cancel the field's effects on what is inside. Again, in order for the Mobile-Blok Cloth to work effectively, the fabric must be wrapped tightly around the phone and create an unbroken enclosure.Mobile-Blok Cloth fabric is silver-grey in colorMaterials: 55% silver, 45% nylonDimensions: 10.5" L x 10.5" WHand Wash Only. No Bleach. 120-140 Celsius (Ironing). Hang Dry (Lay Flat)For best results: Wrap phone tightly, and spread this idea!if (WIDGETBOX) WIDGETBOX.renderWidget('66f56d16-759e-496f-bc83-6083e68c5e3d');Get the Surveillance and Security Video Library widget and many other great free widgets at Widgetbox! Not seeing a widget? (More info)if (WIDGETBOX) WIDGETBOX.renderWidget('a37c3242-37e2-4596-9572-786e643c3c89');Get the DPL-Surveillance-Equipment.com widget and many other at ()INTERNET-BASED NANNY SPY CAMERAS (Buy/Rent/Layway)NOW, look in on your home, second home, lake house or office anytime, anywhere from any internet connected PC/Lap-top or Internet active cell phone, including iphone or PDA.Watch your child's caregiver while sitting at a traffic light or lunch meeting, or check on your business security from the other side of the world. Our built-in hidden video features all digital transmissions providing a crystal clear image with zero interference. With the IP receiver stream your video over the internet through your router, and view on either a PC or smart phone. Designed exclusively for DPL-Surveillance-Equipment, these IP hidden wireless cameras come with multiple features to make the user's experience hassle-free.NOW, look in on your home, second home, lake house or office anytime, anywhere from any internet connected PC/Lap-top or Internet active cell phone, including iphone or PDA: http://www.dpl-surveillance-equipment.com/wireless_hidden_cameras.htmlWatch your child's caregiver while sitting at a traffic light or lunch meeting, or check on your business security from the other side of the world. Our built-in hidden video features all digital transmissions providing a crystal clear image with zero interference. With the IP receiver stream your video over the internet through your router, and view on either a PC or smart phone. Designed exclusively for DPL-Surveillance-Equipment, these IP hidden wireless cameras come with multiple features to make the user's experience hassle-free.• Remote Video Access• Video is Recorded Locally To An Installed SD Card (2GB SD Card included)• Email Notifications (Motion Alerts, Camera Failure, IP Address Change, SD Card Full)• Live Monitoring, Recording And Event Playback Via Internet• Back-up SD Storage Up To 32GB (SD Not Included)• SD Card Lock Box With Key So SD Card Can't Be Removed• Digital Wireless Transmission (No Camera Interference)• View LIVE On Your SmartPhone!Includes:* Nanny Cameras w/ Remote View* Wireless IP Receiver* Remote Control* A/C Adaptor* Key ( For SD Card Lock Box)* 2GB SD Card* Ethernet Network CableFACT SHEET: HIDDEN NANNY-SPY (VIEW VIA THE INTERNET) CAMERASSpecifications:Receiver Specs:* Transmission Range of 500 ft Line Of Sight* Uses 53 Channels Resulting In No Interference* 12V Power Consumption* RCA Output* RJ45/Ethernet Port* Supports up to 32gig SD* Key Lock Mechanism To Protect Video DataCamera Specs:* 640x480 / 320x240 up to 30fps* Image Sensor: 1/4" Micron Sensor* Resolution: 720x480 Pixels* S/N Ratio: >45 db* Sensitivity: >11.5V/lux-s @ 550nm* Video System: NTSC* White Balance: Auto Tracking Our New Layaway Plan Adds Convenience For Online ShoppersDPL-Surveillance-Equipment's layaway plan makes it easy for you to buy the products and services that you want by paying for them through manageable monthly payments that you set. Our intuitive calculator allows you to break down your order's purchase price into smaller payment amounts. Payments can be automatically deducted from your bank account or made in cash using MoneyGram® ExpressPayment® Services and you will receive your order once it's paid in full. Use it to plan and budget for holiday purchases, anniversaries, birthdays, vacations and more!DPL-Surveillance-Equipment's Customers can now use the convenience of layaway online to help them get through these tough economic times.We all shop now and then just to face a hard reality -- big credit card bills. However, our latest financing innovation can help you avoid that. Find out why more and more shoppers are checking out DPL-Surveillance-Equipment's e-layaway plan.If you're drooling over a new nanny camera, longing for a GPS tracker, or wishing for that spy watch, but you're strapped for cash and can't afford to do credit, do what Jennie Kheen did. She bought her iPod docking station (hidden camera w/motion-activated DVR) online using our convenient lay-away plan.Our online layaway plan works like the old-fashioned service stores used to offer. But, in Kheen's case, she went to DPL-Surveillance-Equipment.com, found the iPod docking station (hidden camera w/motion-activated DVR), then set up a payment plan."It's automatically drawn from my account," she said. "I have a budget, $208.00 a month.In three months, Kheen had paid off the $650.00 iPod docking station. She paid another 3.9 percent service fee, which amounted to about $25.35 (plus $12.00 for shipping) for a total of $687.35."You pay a little bit each month," Kheen said. "It's paid off when you get it and you don't have it lingering over your head. It's great."Flexible payment terms and automated payments make our layaway plan an affordable and fiscally responsible alternative to credit cards.1. Register:It's quick, easy and FREE! No credit check required!2. Shop:Select the items or service you want and choose "e-layaway" as your payment option. Our payment calculator makes it easy for you to set up your payment terms.3. Make Payments:Payments are made on the schedule YOU set. Check your order status or adjust your payments online in a secure environment.4. Receive Products:Receive the product shortly after your last payment. The best part, it's paid in full... NO DEBT.More Buying Power:* Our lay-away plan offers a safe and affordable payment alternative without tying up your credit or subjecting the purchase to high-interest credit card fees.No Credit Checks or Special Qualifications:* Anyone 18 years old or older can join. All you need is an active bank account.Freedom From Credit Cards:* If you are near or beyond your credit limit or simply want to avoid high interest credit card fees, our e-layaway is the smart choice for you.Flexible Payment Schedules:* Similar to traditional layaway, e-layaway lets you make regular payments towards merchandise, with delivery upon payment in full. Payments are automatically deducted from your bank account or made in cash using MoneyGram® ExpressPayment®A Tool for Planning Ahead:* Our e-layaway makes it easy for smart shoppers like you to plan ahead and buy items such as bug detectors, nanny cameras, audio bugs, gps trackers, and more!No Hidden Charges or Mounting Interest:Our e-layaway makes shopping painless by eliminating hidden charges and monthly interest fees. Our customers pay a flat transaction fee on the initial purchase price.NO RISK:* You have the right to cancel any purchase and will receive a refund less a cancellation fee. See website for details.Security and Identity Protection:DPL-Surveillance-Equipment has partnered with trusted experts like McAfee and IDology to ensure the security and integrity of every transaction. Identity verification measures are integrated into our e-layaway system to prevent fraudulent purchases.Note: Simply Choose e-Lay-Away as a "Payment Option" in The Shopping CartDPL-Surveillance-Equipment.com is a world leader in providing surveillance and security products and services to Government, Law Enforcement, Private Investigators, small and large companies worldwide. We have one of the largest varieties of state-of-the-art surveillance and counter-surveillance equipment including Personal Protection and Bug Detection Products.Buy, rent or lease the same state-of-the-art surveillance and security equipment Detectives, PI's, the CIA and FBI use. Take back control! DPL-Surveillance-Equipment.comPhone: (1888) 344-3742 Toll Free USALocal: (818) 344-3742Fax (775) 249-9320Monty@DPL-Surveillance-Equipment.comGoogle+ and GmailDPLSURVE TwitterDPLSURVEMSN Monty@DPL-Surveillance-Equipment.comAOL Instant MessengerDPLSURVE32SkypeMontyl32Yahoo Instant MessengerMontyi32Alternate Email Addressmontyi32@yahoo.comJoin my Yahoo Group!My RSS Feed
Alien Implant Removed From An American ScientistFull Report On the Alleged Alien Implant Removed From An American Scientist Code-Named "John Smith" Some time ago I wrote an open letter regarding the scientific findings of a possible implant that was removed from a scientist who has been code-named "John Smith."Regarding the above, the report, in PDF format, which documents the findings to which I make reference may be examined by clicking here .However, one key finding can be understood by examining the chart below which shows that the putative implant that was removed from "scientist John Smith" has isotope ratios which are very much different than those which are normally found in terrestrial materials.I thus believe it is proper to say that the removed object has (or had) non-terrestrial isotope ratios. That would be consistent with the object having been constructed in a stellar system other than ours . Regarding the 2.2% isotope shift of the Boron-10 isotope in the examined object, if the shift is due to a weak electron-capture process that leads to Beryllium-10, then the object could have come from a stellar system which began to evolve approximately 100 million years in advance of our solar system. That would be 00.022 * 4.6 Billion Years or roughly 100 million years.It is thus conceivable that the alleged implant came from a civilization that began its stellar evolution roughly 100 million years in advance of ours.Robert W. Koontz Experimental Nuclear Physicist Bio Material Here Open 24/7/365! (888) 344-3742 or (818) 298-3292In this video http://tinyurl.com/yk8xljf we present to you (via our surveillance and security video library) information about our new products, counter-surveillance techniques, industry-news, etc.RSS Reader (Widget) for New Surveillance Product/Service Announcements: http://tinyurl.com/yzg66zjUse this new RSS Reader / Widget to automatically receive new product and service announcements. Preview the same state-of-the-art surveillance and security equipment Detectives, PI's, the CIA and FBI use.Join us on Facebook! (DPLSURVE) http://www.facebook.com/dplsurve Stay Informed!Surveillance and Security Equipment Demonstration Videos (Watch & Listen):Join us on Twitter!We have a life-time warranty / guarantee on all products. (Includes parts and labor).if (WIDGETBOX) WIDGETBOX.renderWidget('19ca7508-009a-4c36-9bdf-cfe89dd8dd67'); Get the DPL-Surveillance-Equipment.com widget and many other great free widgets at Widgetbox! Not seeing a widget? (More info)if (WIDGETBOX) WIDGETBOX.renderWidget('f737b882-45c2-478e-839b-2cf0f9ec679c'); Get the Surveillance and Security Video Library widget and many other great free widgets at Widgetbox! Not seeing a widget? (More info)Use this new RSS Reader / Widget to automatically receive new product and service announcements. Preview the same state-of-the-art surveillance and security equipment Detectives, PI's, the CIA and FBI use.Enter Coupon Code: "Blogger" and save 5% (Please do not use quotes). DPL-Surveillance-Equipment.com is a world leader in providing surveillance and security products and services to Government, Law Enforcement, Private Investigators, small and large companies worldwide. We have one of the largest varieties of state-of-the-art surveillance and counter-surveillance equipment including Personal Protection and Bug Detection Products.Buy, rent or lease the same state-of-the-art surveillance and security equipment Detectives, PI's, the CIA and FBI use. Take back control! DPL-Surveillance-Equipment.comPhone: (1888) 344-3742 Toll Free USALocal: (818) 344-3742Fax (775) 249-9320Monty@DPL-Surveillance-Equipment.comGoogle+ and GmailDPLSURVE TwitterDPLSURVEMSN Monty@DPL-Surveillance-Equipment.comAOL Instant MessengerDPLSURVE32SkypeMontyl32Yahoo Instant MessengerMontyi32Alternate Email Addressmontyi32@yahoo.comJoin my Yahoo Group!My RSS Feed
WALK THROUGH METAL DETECTOR (Rent, Rental, Rentals)Open 24/7/365! (888) 344-3742 or (818) 298-3292 In this video http://tinyurl.com/yk8xljf we present to you (via our surveillance and security video library) information about our new products, counter-surveillance techniques, industry-news, etc.RSS Reader (Widget) for New Surveillance Product/Service Announcements: http://tinyurl.com/yzg66zjUse this new RSS Reader / Widget to automatically receive new product and service announcements. Preview the same state-of-the-art surveillance and security equipment Detectives, PI's, the CIA and FBI use.Join us on Facebook! (DPLSURVE) http://www.facebook.com/dplsurve Stay Informed!Surveillance and Security Equipment Demonstration Videos (Watch & Listen):Join us on Twitter!We have a life-time warranty / guarantee on all products. (Includes parts and labor).if (WIDGETBOX) WIDGETBOX.renderWidget('19ca7508-009a-4c36-9bdf-cfe89dd8dd67'); Get the DPL-Surveillance-Equipment.com widget and many other great free widgets at Widgetbox! Not seeing a widget? (More info)if (WIDGETBOX) WIDGETBOX.renderWidget('f737b882-45c2-478e-839b-2cf0f9ec679c'); Get the Surveillance and Security Video Library widget and many other great free widgets at Widgetbox! Not seeing a widget? (More info)Use this new RSS Reader / Widget to automatically receive new product and service announcements. Preview the same state-of-the-art surveillance and security equipment Detectives, PI's, the CIA and FBI use.Enter Coupon Code: "Blogger" and save 5% (Please do not use quotes). The DPL-PWMD is the world's most versatile walk-through concealed weapons detector.When we say portable we mean a truly dynamic platform capable of being rapidly deployed with in minutes instead of hours. With only one operator the DPL-PWMD can be deployed and transported to virtually any location and be up and running within five minutes! With a battery life of 40 hours, a total weight of less than 100 pounds, and a unique one-person tote configuration when collapsed, the DPL-PWMD will empower you with truly dynamic security solutions.The DPL-PWMD is remarkably user-friendly and simple to operate. We have reduced training time requirements while boosting "split cognition"- that is creating a system so simple to use and reliable that operators are freed up to monitor the activity around them- performing vital crowd-scanning functions instead of having their attention monopolized by running the metal detector unit. The DPL-PWMD's digital I/O, secured access control panel has been designed for intuitive ease-of-use and has a built-in self-diagnostic function that will notify operators immediately if there is a situation requiring attention. The DPL-PWMD features 100 sensitivity settings- giving users an unprecedented array of responsive and variable security magnetometer options!INTELLIGENT USER FRIENDLY CONTROL PANEL WITH PROGRAMMABLE MEMORY• Digital I/OKeypad with security access control (lock out)LED bar graph for target strengthLCD for keypad interaction• Adjustable volume control• Memory feature for location specific user settings• Self test/automatic calibration at turn ON• Last setting memory & audio indicator when turned OFF• Transit counterSPLIT COGNITIVE IN FORM & FUNCTION• Specialized design allows operator to monitor surrounding areasDYNAMIC SINGLE PERSON PORTABILITY• Weighs approximately 90 lbs.• Assemble/disassemble in only 5 minutes• Single person setupEFFECTIVE HEAD TO TOE, ZONE SPECIFIC DETECTION• 3 sensor zones with LEDs100 LEVELS OF ADJUSTABLE SENSITIVITY• Designed to meet your level of needDESIGNED FOR USE IN DEMANDING ENVIRONMENTS• Indoor or outdoor use• ABS polycarbonate alloy - for high impact strength and durability• Battery operated (includes AC adapter & recharge kit)• 40 Hour battery life• Multiple units may work within close proximity to one another• Designed to meet regulatory standards:FAA, NILECJ-0601.00• Designed for EMC compliance (CE)PORTABLE DIMENSIONS• 37” (.9 m) x 23” (.58 m) x 26” (.66 m)ENVIRONMENTAL DESIGN SPECIFICATIONS• Temp -20 C to +70 C (-4F to +158 F)• Relative Humidity 95%• Rainproof IP55• UV resistantWARRANTY• 24 months parts and laborDPL-Surveillance-Equipment.com is a world leader in providing surveillance and security products and services to Government, Law Enforcement, Private Investigators, small and large companies worldwide. We have one of the largest varieties of state-of-the-art surveillance and counter-surveillance equipment including Personal Protection and Bug Detection Products.Buy, rent or lease the same state-of-the-art surveillance and security equipment Detectives, PI's, the CIA and FBI use. Take back control! DPL-Surveillance-Equipment.comPhone: (1888) 344-3742 Toll Free USALocal: (818) 344-3742Fax (775) 249-9320Monty@DPL-Surveillance-Equipment.comGoogle+ and GmailDPLSURVE TwitterDPLSURVEMSN Monty@DPL-Surveillance-Equipment.comAOL Instant MessengerDPLSURVE32SkypeMontyl32Yahoo Instant MessengerMontyi32Alternate Email Addressmontyi32@yahoo.comJoin my Yahoo Group!My RSS Feed
Episode 43 – How to Walk on Fire, Lessons from Anthony Robbins, Lawsuits on Twitter, Free Press Releases, Affiliate Scams, Entrepreneur and DishyMix Podcaster Susan Bratton, Social Media Security Tip, Are Blogs Social Media?, Best Practices for Search Engine Alt Tags and Page Names, Blidgets, Widgetbox, Special GoToMeeting Offer 45 Days Free with code GOLDEN, […]
Will Price Chief Executive Officer, Widgetbox Prior to joining Widgetbox, Will was a Managing Director at Hummer Winblad Venture Partners. Will played a key role in the firm’s investments in Move Networks, Replay Solutions, Mulesource, Star Analytics, Hubpages, Widgetbox, Kwiry, Infopia and SlideRocket. Prior to joining Hummer Winblad, Will was a Senior Vice President with Pequot Ventures, where he focused on investments in information technology. Previously, Will served as CEO and COO of several software start-ups. He has also worked with the Boston Consulting Group, Infinity Financial Technology and Morgan Stanley. Will graduated from Harvard College and earned his M.B.A. from the Kellogg Graduate School of Management at Northwestern University where he graduated at the top of his class.
Will Price Chief Executive Officer, Widgetbox Prior to joining Widgetbox, Will was a Managing Director at Hummer Winblad Venture Partners. Will played a key role in the firm’s investments in Move Networks, Replay Solutions, Mulesource, Star Analytics, Hubpages, Widgetbox, Kwiry, Infopia and SlideRocket. Prior to joining Hummer Winblad, Will was a Senior Vice President with Pequot Ventures, where he focused on investments in information technology. Previously, Will served as CEO and COO of several software start-ups. He has also worked with the Boston Consulting Group, Infinity Financial Technology and Morgan Stanley. Will graduated from Harvard College and earned his M.B.A. from the Kellogg Graduate School of Management at Northwestern University where he graduated at the top of his class.
Here are the highlights for show #19 from January 31, 2008: Apple TV (take 2) update delayed Apple's MacBook Air is officially shipping Amazon strengthens its digital hand with $300 million purchase of Audible PirateBay hit with legal action Firefox share up over 20% in Europe Garmin announces the Nuvifone Acer gobbles up 75% of Packard Bell Internet outage hits two continents Widgetbox secures #8 million in Series B funding