SECURE COMMUNICATIONS
COMPUTER AND CELL PHONE COUNTERMEASURES

Spy Exchange & Security Center
9513 Burnett Road Suite 101, Austin, Texas 78758
Phone 512-719-3595, Fax 512-719-3594
When In Austin, Texas--Stop By Our Huge Showroom

Countermeasures, TSCM, Counterintelligence, Eavesdropping Detection,
Privacy, Communications Security, Bug & Wiretap Detection

CounterTeK tealthTalk
Secure Comunications And Speech System
Great For Two Party Secure Communications And Up To Eight Party Secure Communications

CounterTek Cell Phone Safe-Protects Your Cell Phone from Being Used As a Bug!

Portable GSM CounterTek Cell Phone Protection Box

Voice Keeper Cell Phone Scrambler Voice Encryptor
Keeps Your Cell Phone Conversations Between Two Parties Only

The Advanced Stealth P-1210 iProtect From CounterTeK
New Generation Portable Advanced Card Style Bug Detector
A New Genertation Advanced Countermeasures Unit In A Credit Card Size


SPY COBRA DELUXE PC MONITORING SOFTWARE
The Spy Cobra Deluxe is the Deluxe version of our most popular PC monitoring
software. In addition to monitoring keystrokes and taking screenshots like the Spy Cobra,
this Deluxe version now emails you all of the logged information, so you can access it remotely!

Self Destructing/Disolving Paper
Instantly Disolves when contacted with liquid!

This "spy paper" looks like ordinary paper, but is unique in that it dissolves in just seconds when contacted with liquid, resulting in a useless, non- reconstructible mulch which is far more secured than the output of any standard shredder! You can write or type on this paper normally, but contact it with any liquid, even saliva, and it transforms into a secure mulch.

New!
Invisible Secrets 4

The One Savvy Software Tool For All Your Computer Countermeasures And Privacy Needs! Amazing Diplomatic Level Secure Communications And Tools!


Steganography, Cryptography, Password Manager, Destroy Files, Internet Trace Destructor, Cryptboard, EMail Encryption , IP-to-IP Password Transfer , Application Locker!
Instant Download After Purchase.
Only $39.95

NEW GENERATION DATA RECOVERY STICK
Almost anyone that uses a computer has accidentally deleted something they didn't
want to. It's common knowledge that when you deleted something, even if you empty
your Recycle Bin, the data is not gone. Deleted data can be recovered at any time as long as
new data does not overwrite the old data. Imagine being able to recover the family photo album
you accidentally deleted or being able to check up on what your kids are trying to hide from you.

SIMS Recovery Pro 2

SIM RECOVERY PRO 2 -SIM-V2
NEW! All-in-One SIM Card Reader For Cell Phones

Introducing the all new all-in-one EXTREME FORENSIC edition SIM Recovery Pro 2. The LM024 SIM Recovery Pro is a professional SIM card and iPhone SMS management product for home, office and professional use. It offers full access to the SIM card, and SMS access to the iPhone giving the user increased control. The SIM Recovery Pro 2 forensically examines your SIM card to find and recover deleted test messages that have been saved to SIM card. The iPhone SMS recovery software also included in this product locates and recovers deleted text messages from your iPhone 3, 3GS and 4.

iPhone Recovery

iPhone iRecovery Stick
Recover Data From Your iPhone - Deleted Contacts,
Deleted SMS, Deleted Text Messages, & More

iRecovery Stick is a revolutionary new product designed to recover deleted data from Apple iPhones*. The iRecovery Stick (iRS) is a thumb-drive USB device, about the size of a stick of gum, that will help you recover deleted data as well as other data from your Apple iPhone. Simply connect the iPhone to any PC with the cable included with the iRS and then connect the stick to the same computer through a USB port. Once the two devices are connected; run the built-in software on the iRS and recover the data you are looking for with the click of a button.

Porn Detection Stick

Porn Detection Stick
Grabs Pornographic Images on Your Computer

Paraben's Porn Detection Stick is a thumb drive device that will search through all the images on your computer, scan them for pornographic content, and create a report of suspected pornographic images. It even scans deleted images and Internet cache files so there's no hiding Internet activity. This means even if Internet Explorer cache files are deleted, many images can still be recovered and scanned for pornography. Best of all, no software is installed on the target machine so they don't know you've performed a search. You can even securely delete objectionable images.

Chat Stick

Chat Stick
Find & View Chat Logs on Your Computer

Paraben's Chat Stick is a thumb drive device that will search your entire computer, scan it for chat logs from Yahoo, MSN 6.1, 6.2, 7.0, & 7.5, ICQ 1999-2003b, Trillian, Skype, Hello, & Miranda and create a report in an easy to read format so you can see what your kids or employees are saying to people online.

Cell Phone Recon

Cell Phone Recon
Cell Phone Recon is a ingenious and prudent software that allows you to track,
trace and monitor your mobile phone. It can monitor GSM text messages, call logs,
emails sent and received as well as the geographical location of the phone. Cell Phone
Recon allows you to back-up your mobile phone and have a detailed record of its activity.

Spy Cobra

SPY COBRA
The next generation of computer surveillance systems is here!

Now with TWICE the capacity! 2GB of space! Extremely useful and highly covert, the SpyCobra is
perfect for parents who want to keep an eye on their kids' computer activities, employers who want
to monitor their employees' productivity, or private investigators gathering information. The SpyCobra
is a covert computer logging device that is a giant leap forward in spy technology.

PERSONAL PROPERTY SECURITY WILL NEVER BE THE SAME AGAIN!
NEW RFID TECHNLOGY GIVES YOU NEW BREAKTHROUGH PERSONAL PROPERTY
SECURITY ! MONITORING YOUR VALUABE PROPERTY FOR THEFT OR
ACCIDENTALLY LEAVING IT BEHIND WILL NEVER BE THE SAME AGAIN!

High Tech RFID Tag Alarm System
Electronic Security Protection For Your Laptop, Cell Phone, MP4 Player PDA Or Anything! Never Forget or Lose Your Stuff Again! Keeps track of laptops, cell phones, briefcases, cameras, iPods, briefcases, purses, luggage and other commonly lost or stolen items. It's a wireless electronic "security cable" for your portable valuables!

Portable CD/DVD Countermeasures Data Shredder
The portable CD/DVD shredder works much like a paper shredder in that it renders
information on a CD or DVD completely unreadable! Simply plug the tiny unit into a USB
port of your computer and within a few seconds the data on a CD or DVD is completely destroyed. Simple to use and portable this device is a great tool to have when information
needs to be disposed of its quick and easy.
$38.95

SPY COP! - DETECTS AND
REMOVES SPY SOFTWARE


Spy Cop! The Number One Selling And Most Advanced Software Spy Detection And Removal Tool In The World. Detects And Removes Almost All Covert Surveillance Key Logging Programs Including Eblaster And Spectorsoft

Pro Series Voice Scrambler with 1 Million Codes
MSRP: $795.00 a pair - Your Cost Only Set of Two: $395 (a pair)
With FREE Covert Pen Bug Detector

For absolute secure phone conversations, The Miser utilizes multiple unique encryption algorithms with 1 million user programmable codes to secure voice communication links and provide maximum security. The Miser provides privacy for confidential conversations even if a line is electronically tapped. Eavesdroppers will not be able to decipher the contents of the communication link. The Miser can secure multiple links for conference calling.

Cellphone Sim (Subscriber Identity Module) Recovery Pro
Lets You Recover Information from A Cell Phone! Even Deleted Information!

You can now recover data and text messages from cellular phones using the SIM (Subscriber Identity Module) Recovery Pro. Using this device allows you to save, edit and delete your phone book and short messages. Aside from recovery and retrieve, even of deleted data, an added advantage is to back the information up on your computer. If you change providers or cellular phones this unit allows you to transfer the information to the new SIM card. Great for use on children’s cell phones by restricting dialed out numbers.

SecretDrive
Create Up To 8 Encrypted Virtual Disks On Your Hard Drive


SecretDrive is a small, efficient and reliable program that allows you to create up to 8 encrypted virtual disks. Virtual disk is protected by one of five modern encryption algorithms

Secure Digital Storage
1GB USB 2.0 Fingerprint Reader Flash Drive (Black)


Portable data security! This Fingerprint Reader Flash Drive (commonly referred to as a Pen Drive) features a built-in Sweep-type Fingerprint sensor to secure your data, 1 gigabyte storage capacity and a USB 2.0 interface for quick data transfers!  This Fingerprint Reader Flash Drive offers application features including web auto login to manage the entries of ID and password for the web sites you visit, user settings for fingerprint registration, password settings and fingerprint live time setting, file and folder settings to encrypt or decrypt files and folders and PC lock to prevent others from using your computer while you're away!

Booming New Trend For Countermeasures services!
Spyware Detection And Elimination

The Spyware TSCM Manual
Computer Spyware Technical Surveillance Countermeasures

A Guide For Detecting Hardware And Software Computer Monitoring Spyware Devises. A New Generation And Booming Countermeasures Service
By Robert Pac, CSTSCM Expert

NEW SECTION OPENS FOR 2007!
COMPUTER MONITORING TOOLS FOR INVESTIGATIVE, LAW ENFORCEMENT
AND FORENSIC APPLICATIONS! BOTH HARDWARE AND SOFTWARE

New! Secret Messenger
Place Confidential Messages In Images Only $29.95

Secret Messenger is used to hide text message into images. The images with hidden messages can still be viewed with any conventional image viewer software. They look just like normal images, no loss of quality, no observably change on size. Nobody knows there are messages hidden with images. You can securely send the images to anyone over the Internet. The receiver can then use Secret.

• • Hide Folders® XP Only $29.95

Obtain It -Then Instantly Download! Select unlimited number of folders and files of your choice to hide and protect by a password. In one mouse click your selected folders became invisible: it is impossible to find hidden folders, access any file in them and remove them (even when removing upper-level folders). You may leave your computer unattended without worrying if someone will access your private data. Then just run the program and enter your password - your hidden folders will become visible
instantly.

Amazing 8 GB Or 5 GB Pocket Portable Drive
Take All Your Digital Data With You!
This handy little device is an ideal mobile storage companion! With 8 GB of storage capacity you can carry plenty of evidence, music files, picture images, video content and data files! Its stylish, slim, lightweight design makes it easy to take anywhere! The T one portable 1-inch hard drive is great for students, and people on the GO! Simply plug into an available USB port and let the storage begin! With 8 GB of portable storage in the palm of your hand, taking your data with you just got a little more easier!
Computer Countermeasures At It's Best!
SpyNoMore™, The Only Anti-Spyware You Will Ever Need! Only $29.95


Computer hackers seeking financial gain rather than thrills or notoriety are increasingly flooding the Internet with malicious software code (spyware, adware, key loggers, trojans). They are infecting computers with highly sophisticated programs that record surfing habits, bank passwords and other key financial data and send them to crooks over the Internet. These programs can be hard to spot, disguised in downloads such as toolbars, search engines, browser accessories, screen savers and other seemingly helpful utilities. SpyNoMore anti-spyware safeguards your identity and restores system performance through fast, smart and powerful spyware protection.
Review View Mirror For Computer
Know What's Going On Behind Your Back!


With this monitor rearview mirror, you can see who's coming up behind you or even make sure your hair is in place while you work! Great for the home or the office! Order yours today!


Program Sleuth Only $9.95
Obtain It -Then Instantly Download!
Is your computer running slower then it used to? This powerful program will show you what is really running on your computer. You will be able to stop any program that you cannot recognize. If a program is gobbling up your computers speed and you do not know what it is, Program Sleuth will look it up for you.

Program Sleuth has our exclusive Know-It technology so you need not have to worry about the technical details; it will show you in a clear way only the suspicious programs.

Program Sleuth gives you full control to eliminate problem programs running on your machine, without an annual subscription. You only need to buy it once!

WinShredder - Erase Your Internet History
Why do you need WinShredder? Because your Windows Recycle bin only deletes the file that you see ... not the actual data on your harddrive. Until the file location on your hard disk is overwritten many times, the files can be completely recovered using many available computer programs, or even simple computer commands. Deleted files are the first thing hackers, privacy thieves, and other computer experts look for when they are trying to recover sensitive information from your computer or discarded disks. Also, employers routinely search for 'deleted' files to discover information about employees.
ENCRYPTION PROTECTION VERSION 3.0
The #1 Encryption, Decryption and File Shredder Application on the Market

Are you being monitored? Are you concerned that your private files or emails are being intercepted and read by others? Protect your privacy by encrypting your important files and emails with Encryption Protection 3.0, the popular and very easy to use encryption / decryption software, from Maxion Software. Purchase and download it now!
COMPLETELY GONE DIGITAL FILE SHREDDER
Completely Gone Digital Computer File Shredder
Files intended to be erased are MEANT to be erased without possibility of recovering as such files may contain sensitive and confidential data that may be misuse when fall into wrong hands. Since normal deletion only removes reference to the files but not the physical files themselves, such sensitive and confidential data is highly vulnerable to unauthorized users who have ill intention of misusing such data, like selling such data to competitors or using such data to blackmail the owners.
CLOAK 8.0
Cloak is a powerful security package designed to protect and secure your personal information and documents from prying eyes. Cloak provides different levels of protection by allowing you to compress & encrypt documents, encrypt & hide documents within images, send e-mails that appear completely blank to the naked eye, and also shred & permanently delete files from your system.

Click and Keep Only $29.95
The ultimate E-mail backup software! Protect your e-mail before it's too late! Obtain It -Then Instantly Download!

How long has it been since you backed up your e-mail? What would happen if you lost all of your e-mail? "Click and Keep" is the solution! With just a few clicks your backup is ready. You need only select the e-mail program you use, the data you want to protect, and Click and Keep does the rest! You can also select other options to protect your data, like burning the backup to a CD/DVD, writing it to another drive on the network, a memory card, a USB-stick or any storage medium you prefer. Naturally, your backups can be password protected for an added level of security.

PROFESSIONAL TSCM FORMAIDS KIT ON CD-ROM
Professional Business Forms And Contracts for Electronic
Countermeasures, TSCM Companies

This set of professional business forms is specifically designed for individuals and companies doing technical surveillance countermeasures (TSCM), electronic countermeasures work. This set of forms includes virtually everything necessary to make a professional, complete countermeasures survey (sweep) from the initial client contact, company information, quote instructions and forms, confidentially agreement, final survey (sweep) completion summary forms and more. These are all the forms you should need to operate your countermeasures company with a professional presentation and professional paperwork.

PROFESSIONAL CONFIDENTIALTY AGREEMENTS
Download and print a professional confidentiality agreement for any occasion! Only $9.95
PRIVACY SHREDDER
Privacy Shredder can help you delete all traces of your Internet and computer activities permanently. It can easily and safely delete history, clean the cookies, cache, auto-complete forms and passwords, empty the temporary files and recycle bin, clear the clipboard. It can also erase the traces of popular application programs: MS Office, Media Player, Winzip and so on. Choose Privacy Shredder, protect your privacy day to day! Only $19.95
PRIVACY GUARD
Your History, favorite's folders and private information : passwords, credit card numbers, social security number etc. ; can expose a lot of your private information that you would like to protect. Also, Personal interests sites, banking information, stocks you monitor on line bidding, and auctions you are tracking, your surfing habits both on and off the web. this information can be available to any one who opens your favorite and history folders, be he/she a relative, coworker or some one passing by. Only $24.95
PAL SPY Remover
The Spy Removing Software
Scans and Removes Adware/Spyware! As featured in PC Plus Magazine!Your computer could be infected with SpyWare /AdWare! SpyWare Remover will scan and remove any files that are infecting your PC with Adware/Spyware automatically!
SPY BLOCKER
SpyBlocker Blocks Ads and Prevents tracking capabilities from Adware and Web Sites!
ILLLUSION
Illusion is the the magic of hiding a securely encrypted file invisibly and secretly behind another unimportant file, be it a JPEG, spreadsheet, HTML, or MPEG! ALL IN Illusion!! Illusion provide you a key-protected algorithm to first automatically encrypt and then hide a securely encrypted file seamlessly and secretly behind another "innocent" looking file so that even if your file is intercepted, the file will appear to be, for example, an unimportant family photo, a joke presented in HTML form or presentation software format like PowerPoint, or even a normal screen saver executable file.
EVIDENCE ELIMINATOR WIPES
YOUR COMPUTER CLEAN

Cleaning up your computer these days of it's footprints is a must!

SPYTECH SPAMAGENT

Spytech SpamAgent is a powerful spam filtering and reporting tool that allows you to keep spam from reaching your inbox. SpamAgent comes with over 1500 preset filters to stop spam from reaching your inbox - and allows you to fight back against spam with the click of a button!

SPYTECH SPYLOCK 4.0
Secure Desktop Lock Down And Access Control

Spytech SpyLock is the award winning powerful and secure desktop lock-down system that allows you to quickly and securely lock your PC down while you are away. SpyLock securely locks down your PC desktop to prevent others from accessing your PC - as well as providing content filtering abilities to control what users do on your PC.

 

DIDTHEYREADIT

When you use didtheyreadit, every e-mail that you send is invisibly tracked without alerting the recipient. But when they read your message, you will immediately receive the following information:

When, exactly, your email was opened. How long your email remained opened. Where, geographically, your email was viewed

New Generation Portable High Security Telephone Scramblers- Works With Both Cell Phones And
Land Line Phones

This Telephone Scrambler attaches onto most cellular or land line telephone handsets. It is designed to scramble your conversations over the telephone line by using a unit on each end. This tactical device will protect your conversation from various methods of eavesdropping from wiretaps or electronic bugs.

Professional Series Telephone Analyzer!

There are many different telephone analyzers on the market today. The problem is, they all have some type of gap in their protection schemes. Not the Professional Safe Line Telephone Analyzer And Tap Deactivator. This unit was actually designed by an Israeli government intelligence engineer to secure his own phone lines. Safe Line offers more levels of protection than any other device of it's kind!

Comsec C3i-II
Patented Product Constantly Checks Your Phone Line For Central Station Wiretapping!

While many products perform an efficient job of checking for "on premise" telephone recording devices, the patented Comsec C3i-II is the only unit designed specifically for detection of central station or "down line" taps. Line powered and easy to use, the Comsec C3i-II's rugged heavy duty metal case and long life LED assures years of product life.

New Super Tap Buster
The SuperTap Buster has been designed to automatically detect and disable most forms of wire taping and telephone bugging. The SuperTap Buster is equipped with an LCD voltage meter to allow the user to monitor the phone line conditions. Also included is a red LED that will flash to bring your immediate attention to the possibility of wire tapping on your line. At the same time, your telephone conversation will be automatically cut off by the Super Tap Buster to prevent your voice from being heard or recorded. When the "beep" switch is set to the "ON" position, simultaneously, a continuous warning "beep" will be transmitted to the person on the other end indicating that the conversation has been cut off due to wire tapping or telephone bugging.

Telephone Tap Nullifier

Our telephone tap nullifier has the greatest ability to actually defeat telephone taps! Also the telephone tap nullifier utilizes technology that jams any listening device which use the telephone line to listen to room conversations, This telephone tap nullifier is the ideal device to protect privacy and maintain the security of communication. For use on any telephone or fax line anywhere

TELEPHONE/MODEM LOCKOUT SENTRY

This privacy unit is a very simple and inexpensive devise but it's on the cutting edge! Invented for diplomatic private government conversations in which there are extension lines on the same phone line, this baby locks down your phone or modem line so another extension line or eavesdropping connection can not be picked up. Your telephone conversation then remains private between only you and the person you are talking to.

 

NEW-SHOP FOR COUNTERMEAURES GEAR BY CATEGORY
What's New In Countermeasures Gear Wiretap Detection/Phone Privacy
Inexpensive Econo Countermeasures Sound Masking/Jamming And Scrambling
Bug And RF Detection Gear Computer Countermeasures
Countermeasures TSCM Sweep Kits UV Light And Other Detection Gear
Video Camera Detection Books And Manuals On Countermeasures

 

Spy Exchange & Security Center
9513 Burnett Road Suite 101, Austin, Texas 78758
Phone 512-719-3595, Fax 512-719-3594
When In Austin, Texas--Stop By Our Huge Showroom


Countermeasures, TSCM, Counterintelligence, Eavesdropping Detection,
Privacy, Communications Security, Bug & Wiretap Detection

 

Copyright, 2011, Ralph Thomas
All Rights reserved.