Skip to main content

The use of mobile telephones as the spying tool


Picture I
https://marxjatalous.blogspot.com/

Kimmo Huosionmaa

Use of the mobile telephones in multiple new purposes have made this thing also very effective spying tool. The mobile telephones 3D-scanning programs use the sonar system of the mobile telephone to create the 3D-models of the targeted piece. But do you know, that the similar systems can modify the mobile telephone very effectively the remote microphone and eavesdrop device, that can break privacy in any house, there is found the window? And behind that window, persons are talking about private talkings.


If some person would speak something, what is private, that kind of remote microphones and spying tools can record those talking, and the target would not notice anything. The resonance of the class can be meter also by using sonar or radar, and that resonance can change as the voice signal by using similar technology as the laser microphones use. Those mobile telephones can fly to the roof, near to the targeted window by using drones, and they can observe everything, what happens in the targeted room. If those systems are covered with new STEALTH-layers, what makes them merge in the background, like chameleons those systems would be invisible. And the active STEALTH uses the small cameras to make pictures from opposite side of the device, what makes them act like chameleons. Those drones can also equip with automatic rifles or submachine guns, and they can use to eliminate any target in the world.


And if the resolution capacity of SONAR is high enough, that system can break any privacy in the world. And the mobile telephones can be used as the eavesdropping device simply by leaving the Whatsapp or some other social media solution on and leaving the telephone in the room, and the voice inside that room would be analyzed by using computer programs. Those programs can separate speech from the back noise very effectively, and that's why even the weakest sounds can transform to normal recording.


This thing can allow that any person can record the voices behind the glass and modern mobile telephones also make photographing in the streets very unseen. That is the reason, why even the highly secret government facilities are not marked themselves by using the "photographing prohibited signs". That kind of signs are actually like red roosters for some photographers, and that's the reason why that sign is not found anywhere except near some military bases. It's impossible to control the photographing in ordinary streets. And for the better information security, those signs are not placed in the streets.

Picture I

https://o.aolcdn.com/images/dims?quality=100&image_uri=http%3A%2F%2Fo.aolcdn.com%2Fhss%2Fstorage%2Fmidas%2Ffe046bab7fb8f9af08ce716ad0b03dda%2F202523229%2Fmicrosoft-mobilefusion.jpg&client=cbc79c14efcebee57402&signature=86ad9c6e0ba7e562d807a0f0a0abf52c72656677

Comments

Popular posts from this blog

The AI-based PCs will replace current PCs quite soon. A Lenovo director says.

    The AI-based PCs will replace current PCs quite soon. A Lenovo director says.   Lenovo plans to replace current PCs by using new AI-based systems. The AI-based PC is the tool that makes computing more powerful, more effective, and safer than ever before. The Kernel-based AI that guards computers and identifies the users are tools that are required at this time of modern computing. The problem with this type of advantage is that if those AI-based system's servers are in China, makes the PC an ultimate control tool. Another thing is that the host who controls servers can use data collected from the users to create military AI applications. Computer games help to create AI that can respond to all types of actions. And AI also can create things like hypersonic lifting bodies and command systems for military tools. Also, AI can create new types of dual-use systems that control drone swarms in marketing situations for making dragon images in the skies. But the same systems can contro

Quantum computers and ultra-fast photonic microchips can danger even the most secure communication.

"Quantum computers could pose a major security risk to current communication systems in 12-15 years with their exponentially greater speed and code-breaking ability. (ScitechDaily, Today’s Most-Secure Communications Threatened by Future Quantum Computers) Quantum computers can break entire binary cryptography. And that makes all communication unsecured. That is one of the greatest threats in quantum computing. And this brings the arms race to the quantum age. The quantum computer can create codes that any binary computer can break. But the quantum computer can also break old-fashioned codes. And that makes it an ultimate weapon and sabotage tool.   Quantum computers can change the measurements of the ammunition in factories by changing the system calibration. Or it can delete databases from the opponent's computer systems. This thing can delete all SIM cards from mobile telephones. In peacetime, the hackers that operate using quantum systems can steal the names of the counter-

The new 3D printers are coin-size systems.

"The tiny device could enable a user to rapidly create customized, low-cost objects on the go, like a fastener to repair a wobbly bicycle wheel or a component for a critical medical operation. Credit: Sampson Wilcox, RLE" (Scitech, Tiny Titan: MIT’s Revolutionary Coin-Sized 3D Printer Fits in Your Pocket) Researchers created a 3D printer that is coin-size. That kind of printer can create things like microchips. But it's possible. Those tiny 3D printers can also work in extremely large-size projects. In simplest models, the 3D printers are positioned on tracks. The 3D printer itself is the tool, that can be part of the modular production systems.  There are visions of high-temperature metal printers installed on the gantry cranes. That makes those crane printers that can make even ship-size things. The crane that the printer controls can move back and forth and the printer can move horizontally. This kind of thing can turn the crane into a high-temperature 3D printer, that