Cell phones are here to stay. Today practically everybody carries a cell phone. The have become an important part of our everyday lives for both personal and business use.
Our mission is to be the leading provider of cellular phone detection capabilities to both business and government institutions around the world. We are striving to bring a national debate to the growing proliferation of cellphone use in our society today. Using our state of the art products we are hoping to provide individuals and businesses the tools to detect and prevent the use of cellphones in sensitive areas.
This product was created in reaction to the growing use of cellphones around the world, and how that use was beginning to interfere with our daily lives. When businesses tried to find solutions to problems involving cellphones, they found a huge shortcoming in products and services. Hence, our solution was created to supply this need. To date we have sold thousands of products to a very wide audience of businesses and government institutions.
Many of these include, prisons, casinos, embassies, classrooms and testing facilities, oil rigs, conferences, golf clubhouses, computer-rooms, data centers, hospitals, and restaurants, to name just a small few of the vast capabilities of our product. However they have brought about many problems some are annoying but others are far more serious. Below we attempt to categorize the problems and look at some of the solutions for these problems.
* General Annoyance (Restaurants, Movie Theatres, Churches, Trains etc) * Invasion of Privacy (Camera phones in locker rooms, Private functions etc) * Cheating (Phones in exam halls and schools, candidates texting answers etc) * Corporate Security (Cell phones in Board Meetings) * Corporate Theft (Camera phones used for theft of intellectual property rights) * Illegal activity (Coordinating robberies, control of gangs from prisons etc) * Hospitals (Unauthorized use of phones could cause medical equipment to malfunction) * National Security (Cell phones eaves dropping in Embassies, and unauthorized use in government buildings) * Detonation of Bombs and Explosives (Cell phones remotely used setoff bombs designed to kill civilians and military personnel)
This is a feature rich product that also detects the newer phones: 4S, 3G, 4G LTE, CDMA, CDMA2000, GSM, Bluetooth, Zigbee and Wi-Fi etc with provisions made for emerging protocols and standards. Legally detect all cell phones, smart phones, mobile and Wifi devices.
Works out of the box with the ability to customize via the intuitive web interface.
Multiple alerting options (voice alert, LED alert, remote alerting).
Active Monitoring Technology™ (Microprocessor controlled logic with advanced detection control).
Includes multiple power options (Battery, USB Interface, A/C adapter, and Power over Ethernet (POE)).
Benefit from the Cell Phone Detector Professional's ability to detect all cell phones, smart phones, wi-fi and other Mobile communication devices in real time.
The unit can be deployed as a portable device or in can be structurally installed throughout your facility.
The Cell Phone Detector Professional is easy to install and runs out of the box. You can also customize your installation and configuration settings via a simple and intuitive web based menu system that also includes a basic setup wizard.
Multiple alerting options to best suit your environment:
The versatility of the Cell Phone Detector Professional allows you to choose from many alerting options including local audio alert, local visual alert, external alerting and supports an option to send alerts to our feature rich central management software. The intuitive configuration design allows you to mix and match the settings that best suit your environment.
FACT SHEET CELL PHONE DETECTOR (PROFESSIONAL)
Active Monitoring Technology:
High performance and robust design with enhanced security.
At the core of our Active Monitoring Technology™ design the Cell Phone Detector Professional is controlled by a high performance microprocessor ensuring fast switching logic and fewer false positives.
Security is paramount with encrypted messaging between the Cell Phone Detector Professional and the optional management and reporting software.
The Cell Phone Detector Professional includes an internal rechargeable battery that keeps the power running and features such as a tamper proof cover switch to ensure maximum protection and availability at all times.
Frequently Asked Questions:
Q. Are your products legal in all countries?
A. Yes, the unit operates as a detector, it does not listen or interfere with the mobile signals in any way.
Q. How difficult is it to get the Cell Phone Detector (Pro) unit setup and working?
A. The Cell Phone Detector (Pro) is shipped with all the instructions needed to get it operational. The instructions are clear and not very technical, and the unit could be up and running in about five minutes out of the box.
Q. How is the Cell Phone Detector (Pro) powered?
A. The unit is powered with four C-type batteries. It also has the ability to be powered by the AC adapter/transformer.
Q. Do I need any tools to setup the Cell Phone Detector (Pro)?
A. It is recommended that you have a medium sized Philips screwdriver to open the cover and a small flat head screwdriver to make minor adjustments.
Q. What is the range of the Cell Phone Detector (Pro)?
A. The sensitivity of the Cell Phone Detector (Pro) can be adjusted from just a few feet up to about one hundred feet.
Q. Is the Cell Phone Detector (Pro) portable?
A. Yes, the unit is completely portable when using batteries for power.
Q. Will the Cell Phone Detector (Pro) interfere with any other devices?
A. No, as the unit is only a detection device it does not transmit any radio frequencies.
Q. Will the Cell Phone Detector (Pro) detect the wireless LAN in our office?
A. No the unit does not detect or interfere with wireless LAN.
Q. Are there any circumstances where the Cell Phone Detector (Pro) will not work?
A. The Cell Phone Detector (Pro) is designed to detect 90% cell phones using the current technologies in use today. However, with new and emerging technologies, we cannot guarantee that the unit will detect future technologies.
Q. Do you sell cell phone jammers?
A. Absolutely not, cell phone jammers interfere with the cellular signal and are totally illegal in most countries. In most cases illegal use of these items carry huge fines and sometimes prison.
Q. Will it detect the phones in my country?
A. Yes, the Cell Phone Detector (Pro) detects analog and most digital cell phones CDMA, TDMA, GSM and PCS/PCN, 3g and 4g types. (some variants of CDMA on certain networks may not be detected)
Q. What countries do you ship to?
A. Currently we ship to the USA, Canada, European Union countries, Australia and New Zealand. We can ship to other countries with prior arrangements, please contact us directly to arrange this.
Q. What method of payment do you accept for Corporate/Government customers? For corporate customers we accept all major credit cards including purchase orders. However we can provide you with a pro-forma invoice on special request. We can also arrange for Bank transfers including Western Union and Money Gram. Please contact us to arrange any special payment requests.
Q. If I use a Credit Card to make payment, is it secure?
A. Yes, we process all our transactions through authorize.net. All transactions, and information gathering, are completed on our banks secure server. When you are in secure mode, your computer and our server begin communicating, sending data back and forth in an encrypted format. The encryption features of browser software are exceptionally powerful and ensure the security of this data as it is transmitted to our server. Your browser in secure mode will display a URL address beginning "https://" rather than the standard "http://". The "s" stands for "secure." In Netscape Navigator TM (versions 3.0 and earlier), the broken key symbol in the lower left corner of your browser window will become a solid key in secure mode. If you are using Netscape Communicator 4.0TM or higher, look for the padlock in the same space: its open in standard mode and closed in secure mode. In Microsoft Internet Explorer TM, you will see a padlock symbol at the bottom of your browser window when the browser is in secure mode.
Q. Do you ever require private and sensitive information to order?
A. We do not request any information unless it is absolutely necessary to process your order or to track previous orders.
DPL-Surveillance-Equipment.com will not request information such as a social security number, Personal Identification Number(s) (PIN) from a bank or credit card, or a drivers license number.
What is the DPL-Surveillance-Equipment.com policy on privacy? We never sell or share any sensitive personal information, period. We have many customers, government, security organizations and we totally understand why any information leak would be a concern.
Naturally our bank will have to process your credit card information, and the shipping company will need your delivery address to deliver your order.
Use this new RSS Reader / Widget to automatically receive new product and service announcements. Preview the same state-of-the-art surveillance and security equipment Detectives, PI's, the CIA and FBI use.
Surveillance and Security Equipment Demonstration Videos (Watch & Listen):
Enter Coupon Code: "Blogger" and save 5% (Please do not use quotes).
We have a life-time warranty / guarantee on all products. (Includes parts and labor).
Next Generation Anti-Computer Monitoring Spy Solution!
This is a anti-keylogger program that pro-actively detects when any spy program, keylogger, or trojan attempts to log your personal information from your PC. Anti-PC Spy Software provides a level of security unmatched by even the most expensive anti-spyware and anti-virus programs.
The program constantly monitors your computer for keylogging attacks, but uses very little system resources, so it will not slow down your PC. Protect your computer today!
What can the Anti-PC Spy Software do for you?
Anti-PC Spy Software uses special algorithms to protect you and your data against:
* Spy and monitoring software that are used to steal or reveal your data to other parties.
* Extremely dangerous and custom-made keyloggers that steal information you send via your computers- these are favorite tools of cyber-criminals.
KeyLogger Protection (Kernel Mode Also):
The Anti-PC Spy Software Stop-logger: Ensures that whatever your type into your computer is protected against dangerous people who steal your data! Whatever you enter into your computer will not leak to malicious parties.
Webcam Logger Protection:
The Anti-PC Spy Software defends against hackers who would like to seize control of your webcam, even when it is switched off!
The Anti-PC Spy Software guards your registry, your physical memory (RAM), and other sensitive computer parts and processes so that malicious code cannot be injected to seize control of your PC.
The Anti-PC Spy Software "Anti-Network Spy" proactive module prevents dangerous trojans from stealing your private information while conducting important SSL Internet transactions. It also blocks HTTP/HTTPS trojans "user level" as well as POP, SMTP, FTP, and loggers.
Clipboard Logger Protection:
The Anti-PC Spy Software shields sensitive data that can be found on you Windows clipboard as a result of copying, cutting, and pasting. This software ensures that this information will not be under malicious monitoring by other people.
Screen Logger protection:
When you take screen-captures, the Anti-PC Spy Software spots suspicious activity that might reveal sensitive data you enter into your computer such as bank account and credit card information.
Anti Sound Logger (World First):
The Anti-PC Spy Software unique security module that protects your system against VOIP sound trojan loggers. Can be useful when you use instant messengers for voice calls. This module also protect you against voice loggers from your webcam or built-in microphone.
* Intel Pentium 300MHz or higher * 256MB available RAM * 50MB free space on hard drive * CD-ROM drive (for installation) * Internet connection (required for product activation and product updates)
Perfect for parents that want to keep an eye on their kids' internet activities and employers who want to monitor their business computer activity. The Ultimate PC Spy is a computer logging device that's a giant leap forward in technology.
What makes this device different is that it doesn't have to be left plugged into a PC. You plug it into a USB port and within 15 seconds you can install a small piece of software that will log keys , remember websites visited and take screen shots at regular intervals. There's no hardware to detect and when you want to retrieve the information gathered, you just plug the Ultimate PC Spy into the PC again and everything will be uploaded onto it, so you can take it away and examine it later.
- Compatible with Windows XP, Vista, Vista SP1
- 1 GB memory - enough to transfer about 8-10,000 screenshots and a virtually unlimited text log – more than ten years' worth of typing.
- Monitors real-time activity
- Locally stored data is strongly encrypted with a unique key for each device
- Data is stored locally so the Ultimate PC Spy is used only to move temporary data before moving it to another PC to view.
You can buy or rent any of the products (Spy Gadgets, GSM Bugging / Monitoring Devices, Nanny-Cameras, Nanny-Busters, Baby-Sitter Catchers, Etc) from the following categories:
* Access Control Systems * Accessories * Anti-Terrorist Products * Background Searches * Body-Worn Hidden Cameras * Cameras * Detection Devices * Digital Video Recorders * DVR Based Hidden Cameras * Listening Devices * Personal Protection * Tracking Devices * Transmitters/Receivers * Wired Cameras * Wired Hidden Cameras * Wireless Cameras * Wireless Hidden Cameras
Our state-of-the-art listening (gsm bugs) devices will allow you to call from anywhere and listen to what is going on in your home, office or car. Many of our listening devices have voice-activation which means the unit will call you when it detects sound near the unit.
Our high-quality BabySitter cameras will show what's really happening between your children and their nanny/babysitter, even when you're not there.
BabySitter cameras are becoming very popular. More parents are considering using hidden in-home surveillance devices to watch (and listen) to their child's caregiver.
How do they work?
BabySitter cams come in all sizes, shapes and prices, for rental and sale. The devices are incorporated into tiny household items such as teddy bears, smoke detectors, clock-radios, pictures and so on. With our more advanced nanny cameras there is no need to hassle with complicated cameras and VCR wiring or wireless cameras that transmit your images all over the neighborhood! Our new Motion-activated solutions include a (digital video recorder) and are completely self contained, totally secure, and easy to use.
DPL-Surveillance-Equipment.com is a world leader in providing surveillance and security products and services to Government, Law Enforcement, Private Investigators, small and large companies worldwide. We have one of the largest varieties of state-of-the-art surveillance and counter-surveillance equipment including Biometric Identification Systems, Anti-terrorist-related equipment, Personal Protection (recommended for our female customers) and Bug Detection Products.
Buy, rent or lease the same state-of-the-art surveillance and security equipment Detectives, PI's, the CIA and FBI use. Take back control!