A listening bug, yes. When we need to hide something, we often go crazy trying to find a place to hide it where no one can discover it. Sometimes, however, one tends to forget that often the best way to hide something is to put it in full view, right there before those who might be looking for it.
Listening Bugs – The One in All
This is especially true in the surveillance field, and there are many environmental bugs concealed in everyday objects, where no one would ever think that a threat might be hiding. For example, thanks to the increasing miniaturization of surveillance technology, a hidden microphone can be contained inside a pen, a desk calculator, or even a belt buckle.
There is a particular model that is contained inside a computer mouse. At first glance it looks like a normal mouse, and indeed it is fully functional, but the secret is on the inside, where along with a sensitive microphone that allows you to intercept conversations inside a room or an office, it contains a SIM card, just like the one of your phone, which is used to send any intelligence and information that it picks up, to a remote listener who can be literally anywhere.
With its voice activation sensor, as soon as a sound is detected, the bug is automatically activated and starts its transmission towards a preset phone number. Moreover, this number can remotely set the operating parameters of the GSM bug, simply by sending an SMS, which is processed as an operation command.
The automatic activation can also happen when the mouse moves, which could signal the fact that the person under surveillance just reached his or her office.
If you want more information about how the Spy Mouse works, we recommend that you visit the Endoacustica website, and contact us for a personal consultation regarding remote monitoring options.