enow.com Web Search

Search results

  1. Results from the WOW.Com Content Network
  2. Covert listening device - Wikipedia

    en.wikipedia.org/wiki/Covert_listening_device

    During World War II, the Nazis took over a Berlin brothel, Salon Kitty, and used concealed microphones to spy on patrons. Also during the war, the British used covert listening devices to monitor captured German fighter pilots being held at Trent Park. In the late 1970s, a bug was discovered in a meeting room at the OPEC headquarters in Vienna.

  3. The Thing (listening device) - Wikipedia

    en.wikipedia.org/wiki/The_Thing_(listening_device)

    The device, embedded in a carved wooden plaque of the Great Seal of the United States, was used by the Soviet government to spy on the US. On August 4, 1945, several weeks before the end of World War II , a delegation from the Young Pioneer Organization of the Soviet Union presented the bugged carving to Ambassador Harriman, as a "gesture of ...

  4. Laser microphone - Wikipedia

    en.wikipedia.org/wiki/Laser_microphone

    On 25 August 2009, U.S. patent 7,580,533 was issued for a device that uses a laser beam and smoke or vapor to detect sound vibrations in free air ("Particulate Flow Detection Microphone based on a laser-photocell pair with a moving stream of smoke or vapor in the laser beam's path"). Sound pressure waves cause disturbances in the smoke that in ...

  5. How often are parents spying on their kids online? - AOL

    www.aol.com/often-parents-spying-kids-online...

    All About Cookies surveyed U.S. parents to learn how many track their children's online activities and physical location, and what the most popular methods are.

  6. OLPC XO - Wikipedia

    en.wikipedia.org/wiki/OLPC_XO

    The XO-1 is designed to be low-cost, small, durable, and efficient. It is shipped with a slimmed-down version of Fedora Linux and a custom GUI named Sugar that is intended to help young children collaborate. The XO-1 includes a video camera, a microphone, long-range Wi-Fi, and a hybrid stylus and touchpad. Along with a standard plug-in power ...

  7. Computer and network surveillance - Wikipedia

    en.wikipedia.org/wiki/Computer_and_network...

    The vast majority of computer surveillance involves the monitoring of personal data and traffic on the Internet. [7] For example, in the United States, the Communications Assistance For Law Enforcement Act mandates that all phone calls and broadband internet traffic (emails, web traffic, instant messaging, etc.) be available for unimpeded, real-time monitoring by Federal law enforcement agencies.

  8. High school coach hid a GoPro in girls’ locker room, WI cops ...

    www.aol.com/news/high-school-coach-hid-gopro...

    A missing towel helped uncover a high school coach’s hidden camera that was recording inside a girls’ locker room, police in Wisconsin said.. The towel belonged to a Janesville Craig High ...

  9. List of spyware programs - Wikipedia

    en.wikipedia.org/wiki/List_of_spyware_programs

    Hermit is a toolkit developed by RCS Lab for government agencies to spy on iOS and Android mobile phones. HuntBar, aka WinTools or Adware.Websearch, was installed by an ActiveX drive-by download at affiliate Web sites, or by advertisements displayed by other spyware programs—an example of how spyware can install more spyware. These programs ...