The Gone Year – The Lost Year? Yeah, Technologically Speaking!
2013 was a bit unsuccessful (to say the least) for the entire tech industry and Silicon Valley, the engine that powers it. Innovation was replaced by financial engineering, mergers and acquisitions, and evasion of regulations. If it’s in the nature of progress to move in leaps, there are necessarily lulls in between.
Let’s have a closer look at what it all means.
Mobile Phones Sector
The newest flagship phones of the industry leaders – Apple and Samsung – weren’t big leaps ahead from the previous versions.
Claims against other companies, not only the high-end ones, have one thing in common – there are no revolutionary breakthrough products unveiled; no pleasing consumer-oriented technological features offered in the new products; outdated design, etc.
The only good thing is the price collapse. Smartphones, as well as good tablets, are cheaper than ever. In 2014, they’ll cost as little as $20 in China; just like high-end televisions.
Wearable Devices Sector
There are certain impediments here too. Google’s Glass headset is a technology in search of an application; God only knows what it can be successfully applied to. As for watches, it’s obvious that smart watches were the biggest letdown of the year. Unlike time which is still the most precious asset.
The Decline of IT Giants
Among the “notorious” names, the most inglorious situation is that of Blackberry; Microsoft, Intel and some other companies follow them in Indian file. Reasons are multiple and various. But that doesn’t alter the fact – “something is rotten in the state of Denmark”.
No Innovation. Just Business.
This year, headlines have been crammed with news on figures, not inventions. Microsoft bought Nokia‘s devices business, foreseeing its unsure future in mobile devices segment. The major news about Apple concerned the company’s tax-avoidance techniques and general failure to deliver any new products of note. Alas.
More Technology = Less Jobs = More Money for a Few
Economists claim that much of what the internet has accomplished in the past 20 years is the impoverishment of the majority of Americans. Robots threatened (and finally took away) jobs not only in the manufacturing; they could do it now in the service sector as well. The overall goal of eliminating workers and their labor protections is quite obvious.
There’s one more unsettling tendency. American tech firms flocked to Ireland in order to avoid regulation; some are explicitly avoiding regulations in the States. No more taxes!
Life is Good for Social Media
Facebook and Twitter have become less attractive than before, due to their purely mechanistic approach to its users’ personal information, and the ever-increasing advertisement video introduction. Thus, yet more money.
Besides, media inflated new hyped (but not necessarily brilliant) ideas in tech, like bitcoin. Managing “big data” became the growth plan of the companies like IBM, despite the fact that most companies aren’t handling data that’s anywhere close to “big”.
The NSA’s internet surveillance is a certain wet blanket for our mobile future. Cisco was the first to reveal its apprehensions on the issue.
The fallout for the tech industry has just begun: the US companies must now prove, especially to foreign customers, that the move to cloud-based services, which necessitates sending all their data through the very same communication nodes to which the NSA has access, won’t put all of their secrets in the hands of the US spymasters by default. Some are still susceptible to a “Big Brother syndrome”.
All in all, PC industry is dying; the expiring year has definitely proved it. New paradigm or shift in computing is here – a mobile one. Let’s hope the New Year will look with favor onto this sphere!
Spying can be carried out not only by means of hardware (see my articles about classical spying equipment) or software (I’ll tell about it later in this article), but by less tangible means. I mean the media of air, water etc. Man has been employing land and water animals and birds to monitor and track the required targets since the ancient times. There are specialized mechanisms to spy in the air or water media as well.
There are interesting cases concerning the air medium, both conventional and non-conventional ones.
Giant Concrete Ears as Weird Spying Artifacts
The massive concrete acoustic mirrors, or “listening ears”, along the southeast coast of England were built in 1920s to intercept the earliest sounds of airborne invasion. These sound mirrors were part of Britain’s national defense strategy. Their parabolic shape collected and magnified sound waves in the air over the English Channel and directed them at a microphone positioned just in front of the parabola; then anti-aircraft defenses were deployed. The mirrors effectively gave Britain a 15-minute warning of an impending attack. The site has three different reflectors: a 200-foot-long curved wall, a 30-foot-tall parabolic dish, and a 20-foot-tall shallow dish.
Nowadays, they are the impressive relics of that epoch of inter-wars fear and the arms race.
Possible Countermeasures for Privacy Breach
The revelations of Edward Snowden, the NSA scandal, as well as the number of recent leaks on privacy breach all over the world lead to the development of overall awareness concerning governmental spying on citizens’ private life. The immediate reaction can range from open outrage, in the case of high-rank politicians, to ridiculous countermeasures undertaken by ordinary Jacks and Joes. Here is one of them.
This summer, Deer Trail, a small Colorado town, was considering a measure that would allow its residents to hunt for federal drones and shoot them down. The Town Board of Trustees (six trustees and the mayor) could vote on the drone ordinance at its regular meeting. If passed, it would legalize the sale of drone hunting licenses for $25 and offer bounties for captured drones. It takes a simple majority vote to pass the ordinance that, though purely symbolically, draws the borderline against privacy infringement. The town Mayor Frank Fields says the purpose of the ordinance would be “to have fun and bring in business, tourism and activities for people in town”.
As far as we know, the ordinance wasn’t passed, but it has created a precedent that can attract the most unusual followers.
Speaking about software for spying, or the so-called spyware, mentioned at the beginning of the article, I cannot but tell you about its efficiency. Nowadays, there are mobile tracking and monitoring applications, like mSpy, that can exert all the functions of a top-rank classical detective or a national counterintelligence agent, and even more. These apps possess numerous functions that allow you to track calls, different types of messages, contacts and events, locations and movements, as well as multimedia data flowing with the help of a humble cell phone. Your target persons (mainly children or employees monitored for the sake of their safety or the security of corporate data respectively) wouldn’t ever guess they’re being monitored. Smart phones can be easily converted into your smart spies, with the help of such a simple application.
Among varied mobile applications, spyware for iOS can run on jailbroken devices ONLY. If you need to spy on an iPhone for a plethora of reasons, you have to jailbreak this device first. Mobile tracking software, especially spy software, is on the rise; one of such useful apps is mSpy – an advanced iPhone tracker. With a jailbroken device and the mSpy app installed on it, you can monitor (as well as filter or block altogether) the online/offline movements and actions of a child or an employee for the reasons of safety and security with the help of your own spy iPhone. But you need to jailbreak it first.
And now, welcome the dear guest! The long-awaited and eagerly-anticipated jailbreak for IOS 7 is here! Being an iPhone tracker user (read about it below), I can say it’s the most precious gift for the forthcoming holidays!
We must be thankful for this present to the popular evad3rs hacker team that has just released their untethered evasi0n iOS 7 jailbreak. And it’s for free, mind it!
The evad3rs team has announced today via Twitter: “Merry Christmas! The iOS 7 jailbreak has been released at http://t.co/wblOSKyLah! All donations will go to @publicknowledge, @eff, and @ffii – evad3rs (@evad3rs) December 22, 2013”.
I’ve written about the great expectations of iPhone fans community concerning this event in one of my posts. We had a close look at the history of jailbreak achievements and its heroes. I wrote about the prize fund raised for iOS 7 jailbreak as well. You see, attempts were numerous, but Apple managed to patch all the exploits that were used by evasi0n through its regular software updates. For instance, the most recent break-through in the jailbreaking process for iOS 7 (released not so long ago in September) was quickly closed with a patch. No later than the previous week, Apple patched an exploit that could have been used for a jailbreak for iOS 7.1, a currently in-development update for iOS devices.
Luckily, there are still heroes in our IT kingdom! Cheers!There appeared one more gap in the seemingly seamless wall erected by Apple before its users. Someday, it can crush the whole dam; the first strike has been just delivered by jailbreak 7 for an iPhone.
Requirements for evasi0n7 jailbreak include:
· A computer, running Windows (XP minimum), Mac OS X (10.6 minimum) or Linux (x86 / x86_64)
· iTunes installed if you’re running Windows
· An iPhone, iPad or iPod running iOS 7.0 through 7.0.4 (you may check in Settings/General/About => Version)
Just to be safe, before the actual jailbreak (promised to take up 5 minutes all in all!), back up your device using iTunes or iCloud so you can recover your data if something goes wrong in the process. This jailbreak is untethered, reboots will be normal; it is unnecessary to attach your iOS device to your computer to re-jailbreak it after a restart.
For iOS jailbreak users, the benefits are multiple. There are numerous alternative app stores, such as Cydia, that host material Apple wouldn’t allow in its own official App Store. Such material includes unsupported third-party applications and other modifications such as themes that compete directly with Apple’s own software or are typically not approved by Apple. For instance, spy software for an iPhone requires jailbreak 7 in any case; do not forget about it if you look for spyware for iOS.
Being a mother of a kid quickly approaching the extremely dire straits of his teenage years, I’m seriously worried about the state of affairs concerning the drugs’ consumption by teenagers. Surfing internet, I came across an interesting article with very disturbing figures. A certain U.S. government report reveals that about 6.5 % of high school seniors smoked marijuana daily in 2013, compared with 6 % in 2003. Students’ attitude toward the drug’s danger becomes slacker with every year. One-third of high school seniors reported smoking marijuana in the last year. Being a responsible mother, I stood aghast at the data taken from the Monitoring the Future report by the National Institutes of Health.
At least, there are some positive changes, though, unfortunately, minor ones. The report reveals that about 40 % of 12th-graders think that regular marijuana use is harmful; last year, that was the opinion of 44.1 % of students. I’m afraid that the reason for such an insignificant change lies in the deficiency of our educational system in general and the stance of every citizen/parent as per the question in particular. But at least, there IS some change.
Luckily for future generations, the percentage of those using cigarettes, alcohol, Ecstasy, inhalants, synthetic cannabinoids, bath salts, and the painkiller Vicodin declined this year. Alas, cocaine and heroin use didn’t change significantly; but total alcohol use continued to decline as well.
For the moment being, medical marijuana is legal in 20 U.S. states. One-third of the 12th-graders using pot obtained the drug with someone else’s prescription; another 6 % of teens got it using their own prescription. Modern technologies being on the rise, it’s as easy as pie for teenagers to obtain what they want.
Bearing this situation in view, I started pondering over the possible solutions of the problem. Of course, one can follow a kid wherever he goes, but this method isn’t cost-effective for any busy parent. Then, there is a much better possibility of online monitoring to help keep kids safe online by setting parental controls, obtaining email and social network passwords, taking away computers and mobile devices or using location-based devices to keep track of teens.
It took me some time and efforts to figure out the best variant. Rough physical measures are senseless; I had a chance to see it for myself. Taking away smth or its outright prohibiting doesn’t let you reach your goal. For any parent, it presupposes maintaining strict parental control for the kids’ safety and keeping in close touch with the kids simultaneously. To my mind, the most adequate parental control in this situation is the usage of mobile devices to keep track of teens. Everyone knows that teens are gadgets-addictive; thus, it’s possible to convert their device into a useful ally for parents.
There are special applications intended for the use on mobile gadgets – flossing cell phones or tablets favored by teens so much. Once installed on the target device, these apps allow monitoring online/offline activities and tracking the whereabouts of the kids. Besides, they give the chance to read, see and hear what the teens do, that is, to literally be at their side without actual staying with them.
Among numerous similar applications, there is one called mSpy. After a profound consideration, I chose it because it has the widest range of features I’m interested in as a mother willing to secure the safety and wellbeing of her only child. In some of my future posts, I can divulge more technical details as per my usage of this app.
The question of respect and care for both young and old is a multifaceted one. “Respect your elders” can mean “Assure your elders’ safety for their sake”. Safety can be assured by monitoring their actions with the aim of preventing harmful consequences. If your parents are safe and sound, you must be a very happy person. But life is cruel, especially for those getting older, weaker and more helpless with every passing year. We do not become younger with time, that’s a commonplace. That is why we ought to take proper care of those who took care of us while we were in the crib.
There are complicated medical cases when elderly people suffer from incurable chronic diseases aggravated by the partial or permanent loss of memory, declining mental alertness, not so agile limbs as before etc. They may even remain active physically, but ailing mentally. They may find themselves lost in the unknown city districts, forget their address, or even worse – get into an accident with no one familiar at their side.
In the case every member of the family is occupied with their own worries, there is no time (and often money) left for the full-fledged care after the elders. What is the way out?
1. The best variant is to hire a well-trained medical person to be in charge of the patient. But it’s not the cheapest one, of course.
2. The second variant is to ask some relatives to extend a helping hand but, surely, they’ve got their own troubles, maybe, even more serious ones.
3. Luckily, there’s one more variant one seldom thinks of at first; it’s to resort to the services of the modern technologies. This era of sky-rocketing technological development, IT engineers devised versatile applications for most diverse needs, both of home and business. This particular problem of the elders’ care has its “digital decision” as well. There are special tracking and monitoring programs to follow the physical whereabouts or online communications of people who cannot claim full responsibility for their actions, being either too young, or too old and weak. All they require is a simple mobile phone and a special app installed on it. No need to follow unhealthy people in the flesh, just track and record their locations and actions remotely with the help of a small device. Your desktop will help you to get the overall picture on the screen.
What this app can do
Technically speaking, this app is simple but extremely effective. Such an application has numerous advantages attuned specifically for tracking people, namely:
a) tracking GPS locations when every movement of a person is displayed at the screen, allowing their quick detection;
b) record surroundings when the external sounds help to establish where the lost person is at the moment;
c) call recordings when one can find out if anyone tries to abuse the target phone (lost, stolen or taken away by force from the weak elderly persons), which helps to clarify the situation etc. It is possible to determine if the phone owner is still the same, and to wipe the phone completely or lock it temporarily in the case of an owner change.
d) photo spying that allows making photos of the surroundings of the target phone. It’s especially useful for finding the traces of the lost people or, at least, their phones; the photos can prompt where these people were situated last.
e) with the help of this app, one can find out the actual state of parents’ health if they are too proud to confide health troubles to their children;
f) this app can reveal the cases when the elders entrust scam artists with great sums of money or implicitly trust mass media ads without knowing the real cost of services (often overestimated or utterly deceptive).
The segment of such mobile applications represents a market niche that is filled with numerous offers, but some of them are more competitive than others, offering the wider choice of useful functions, as well as prices and terms one is utterly comfortable with. For instance, an application called mSpy can be successfully employed to help those who are in need of a 24/7/365 helper to look after disabled, old or ill people.
There are numerous spheres where spying techniques (the very term tinged by negative implications only due to some historic reasons) can be applied with obvious benefits for all the participants.
One of them is food industry.
Food industry “spying”
In 2015, the company Mondelez International is going to debut a grocery shelf that comes equipped with sensors to determine the age and sex of passing customers. The shelf, which is hooked up to Microsoft’s Kinect controller, will be able to use basic facial features, e.g. bone structure, to build a profile of a potential snacker. The company expects the shelf to help funnel more of the right products to the right consumers, and even convince undecideds to commit to an impulse buy by offering well-timed in-store commercials or coupons when the embedded weight sensor learns they’ve picked up an item.
The move is almost certain to make it more difficult to resist certain types of foods. Imagine if the produce aisle starts talking about the beta carotene in carrots. The potential consumers can become bombarded with a plethora of ads, all the time, “Minority Report”-style. The choice will become a bit complicated, just like anything in these complicated times. Thus, you’re to form a well-judged opinion on almost every product in advance.
Another sphere of spying techniques application is animals training and their consequent employment for different purposes.
One of these spheres is a purely scientific research.
The John Downer Productions team created a set of highly realistic robotic penguins to spy on living birds for a recent BBC documentary. Usually, timid birds flee away seeing the approach of a camera team. Robots simplify the life of scientists and film-makers by allowing access to intimate details of birds’ life.
Interesting enough, these robots can remember the identities of individual penguins based on their patterns of spots. They can get blown over and right themselves, fall off a ledge without breaking, and even carry “egg-cams” to drop off at strategic locations.
Besides researches per se, there are defense needs of every particular country. Sometimes, it is necessary to find out important details in circumstances people have no access to. In this case, nonhuman operatives can be deployed: ravens, pigeons, even cats and dogs.
The same methods that lay behind touristic attractions in zoos and circuses formed projects such as training ravens to deposit and retrieve objects, pigeons to warn of enemy ambushes, or even cats to eavesdrop on human conversations. Being pioneered for a national defense sphere, these achievements were widely employed in the TV show commercials later.
Such a company as Animal Behavior Enterprises, or ABE, the off-spring project of governmental research laboratories, undertakes breath-taking efforts to train different animals with the most amazing practical results. Most diverse organizations, from Walt Disney to Florida’s Marineland, were their clients. For instance, they addressed a new Navy program on the training of marine mammals for defense work.
Spying can be called different names and evoke varied implications, but the truth lies in the following – people needed, still do and will always need to find out something about someone. We are an inquisitive species. Thus, spying techniques will always be in demand. For instance, the mobile application mSpy allows knowing about every online/offline action of a target with the help of a cell phone. No need to employ live agents for spying; this app will do it in the most effective manner.
Everyone privy to IT sphere knows that iOS7 is not jailbroken yet. It’s a jail-bird still, as it were.
What’s The Urgent Need?
A great number of businesses and ordinary users depend upon the breakthrough solution for iPhone jailbreak immensely. They are anticipating it with bated breath. There are obvious advantages of jailbreak. Users can have the total freedom to control their own devices. An open source jailbreak for iOS 7 gives users the capability to install what they want and to audit the code they’re using to do so.
Every time Apple releases a new updated OS, the hackers get to work diligently; pretty soon, a new jailbreak is released. As ill luck would have it, several months have passed after the most recent iOS7 release, not followed by any successful hacking attempts. Let’s take a trip down memory lane.
History of Attempts
The iPhone Dev Team (not affiliated with Apple) has released a series of free desktop-based jailbreaking tools for almost every iOS version starting from 2008. It joined its efforts with Chronic Dev Team and pod2g in 2012, quite fruitfully at that (versatile tools for iPad/iPod/iPhone jailbreak). This year, the group of hackers called the evad3rs has already released several tools.
Among outstanding personalities in jailbreaking, there is George Hotz, who undertook his exploits in 2009-2010. Nicholas Allegra (better known as “comex”) released his programs in 2010-2011.
Some Internet sources claim that iJailbreak Pro has already released a paid jailbreak for iOS7 ranging in price from $30-50. Alas, it’s not open source. Thus, we’re still waiting.
Solution Is Under Way Already
As a sort of prod, there is the Device Freedom Prize created: a crowd-funded reward for the first developer(s) who release an open source iOS 7 jailbreak. As per now, there is the sum of $8692 collected; it’s growing visibly with literally every second. Everyone concerned is welcome to add to the fund.
There are respectable judges to evaluate the contribution of an aspirant: Chris Maury, Prize proposer and accessibility advocate; Cory Doctorow, Co-editor of Boing Boing, Author, and DMCA Activist; Kyle Wiens, Co-founder and CEO, iFixit; and Biella Coleman, Professor and Author of Coding Freedom.
The competition site features a very long list of the undisguised contributors (331 at the moment of the article creation) with the exact sums of their contributions, as well as the anonymous donators. Variants of contribution sums (fixed or custom amount) and payment methods are reasoned out as well.
There are several rigid criteria for claiming the prize, and a transparent procedure of its awarding. The prize panel will review all submissions to ensure that they meet the prize criteria. The prize will go to the first person/group that creates and submits a successful solution for iOS 7 jailbreak. 90% of the prize fund will be paid out to the winning submission. If no one claims the prize within 18 months, all donors will be contacted and provided with the instructions as to how to receive a refund.
As it was mentioned above, many companies are looking forward to jailbreak. One of them is mSpy, a mobile software vendor of an iPhone spy app, which contributed to the Device Freedom Prize project as well. It’s interested in the quickest actualization of this undertaking, as mobile software of various types alternative to Apple App Store’s scanty choice doesn’t work on iPhones without jailbreak. Period.
History of Spying Equipment
Briefcase recorders of the 1950s were substituted by transmitters hidden in shoes in the 1960s. By the early 1970s, communication signals were intercepted by bugs hidden in tree stumps. Devices further maintained the tendency of becoming more compact. In the 1980s, tiny transmitters with microphones were hidden in pens; the famous example is James Bond’s pen gun.
All these “mammoths” can be found at the museum now. The International Spy Museum is situated in Washington, DC; Peter Earnest is a former Central Intelligence Agency officer and the executive director of the museum.
Spying Equipment and Technologies Used for Espionage Nowadays
Technology develops at a lightning speed. Many of the espionage technologies are just updated versions of previous inventions: smaller, lighter and much more powerful. Here are only some of the spying munitions:
If you favor receptions and cocktail parties as much as James Bond does, you’ll definitely like this sort of garment. Garrison Bespoke, the renowned tailors company from Toronto, worked alongside suppliers for the US 19th Special Forces in developing the custom bulletproof suit with the use of nanotechnology. It’s comprised of the same carbon nanotubes designed for the US troops’ uniforms in Iraq. The patented suit material is a lot thinner and flexible; 50% lighter than Kevlar, the material commonly used in bullet-proof gear. The entire suit acts like a shield, with nanotubes in the fabric hardening to block force from penetrating through, and still looks like a luxury tuxedo.
History and politics are abundant with the cases described below.
Russian customs agents discovered tea kettles and irons bugged with tiny spyware chips that exploit WiFi connections. The microchips spread spam and malware to WiFi-enabled devices within 200 meters. Taking into consideration the laughable target (homebody tea adepts), this operation could very well be a test for larger actions to plant such microchips. Weave your own intricate conspiracy theory and become a spy-whistleblower (on a whistling tea kettle).
One more case took place in Russia; the country seems to have full-load spies’ capacity. The hosts of the Group of 20 Summit held near St. Petersburg in September 2013 sent world leaders home with gifts designed to keep on giving: memory sticks and recharging cables programmed to spy on their communications. The bugging devices were included in gift bags given to all delegates who attended the summit. There are official Russian denials, of course.
But let’s abandon politics for a moment and address more pleasant things, i.e. movies and their famous spies’ figures.
Cinematic Spies Equipment
A breath-taking cutting-edge technology for spying flashes in a movie and then creeps into everyday reality. The James Bond movie “The Spy Who Loved Me” thrilled us with a car that transformed into a submarine. Recently, it has been sold at a London auction for 550,000 pounds ($865,000). Strangely enough, the sale price was below the auction house’s initial estimate price of 650,000 to 950,000 pounds. Maybe, the reason is that the vehicle (a distinctively-shaped white Lotus Esprit) cannot be exploited on the road, although it is claimed to be a fully operational submarine. Who will steer it, in what waters and for what purpose?
So what’s next in spying? Who knows. THEY might.
Good day to everyone who deals with mSpy! This product is a life-saver, at least in my case it is!
My story is very personal, but I wanted to share it with the general public so that anyone who is in my situation can access the information they need. It may seem boring to some, but to any parent who has been in the situation I found myself in this information could very well be the difference between life and death. I guess I should start by explaining who I am and what my problem is! My name is Dean J. If you find what I have to say useful and if it can help other people who got into the similar situation, I permit you to use my name in retelling this story. I teach Classical Literature at a two-year community college in Cleveland. I’m a typical father who is worried about the well-being of his only son. I love Jerry very much, but it can often seem like he doesn’t care about my efforts in return. I have always tried to do my best as a father, but it seems that somewhere along the road I failed. I have always tried to understand Jerry and his problems, but I guess I missed the most crucial point. I can’t say that I’m a bad father as such, but rather that at times I have not been very attentive or sensitive to his feelings and needs. If you are a parent yourself, then you will understand how painful it is to see your child doing something wrong despite the advice you have tried to give them, especially when you can see them sinking deeper and deeper.
My son’s troubles will be familiar to many. I first began suspecting that my son was taking some kind of drugs some time ago. He changed a great deal; he was not the son that I once knew so well. It all started with him becoming more distant, then his grades suddenly worsened, he got into trouble at school and started lying to us. First it was only minor things, then far greater ones. At the lowest point he was even stealing money although I only discovered this much later. I know now that he was searching for an escape from his feelings and all of the hardships and woes he perceived. I don’t know if he couldn’t find any other way or if he just chose to pretend not to see it.
However, I am getting ahead of myself as I haven’t explained how I discovered the root of Jerry’s problems. One of my colleagues from the college who teaches computer sciences gave me a hint regarding how I could discover the cause of Jerry’s behavior. He’s younger than me, belonging to the internet-savvy generation that seems to surf the web day and night. I personally am far from being such a nerd in IT – at times I am pretty clueless. He told me that he had heard about specialized mobile software developed to collect data from mobile devices and expose the truth in tricky situations, especially in private life: kids, spouses etc. Surely, this was exactly the situation I was in!
I felt relieved at the prospect of a solution, but took extra care to double-check the credentials by visiting review sites. Following my research, mSpy seemed like a decent, respectable company to me. I went ahead and bought the basic subscription since I thought that would be enough to begin with and I was right. My fears were confirmed just mere days after the installation of this application onto Jerry’s iPhone. Jerry had visited his best friend’s party on the weekend and, as it turned out, he had used some illegal substance there. His SMS and calls made that very clear.
When he returned home at dawn I was waiting for him. We had a VERY DIFFICULT conversation, actually, it was more of a fight to begin with and it was the most difficult morning of my life. We ended up grappling with pretty much everything – our views on life, our past relationship, our future expectations, and we differed on everything. I seemed at times like we were groping in the dark for a way out like blind mice in the maze, but in the end, thank God, we managed to discover what seemed like the only thing we still had in common – we both loved each other. That was the starting point we used to reestablish mutual trust. Slowly (VERY SLOWLY INDEED!) but gradually, we started mending our broken family ties. There’s still a long way ahead of us, but I do believe that everything will be OK and I have mSpy to thank.
an extremely grateful father of a wayward 14-year-old son
Do you like cinematograph? What about your favorite movie genre? Is it about spies? If yes, read this article; if no, read it all the same. We’re sure you’ll fall in love with them. Everybody does.
With the decades of James Bond and Jason Bourne movies, TV serials on the detectives Hercule Poirot, Miss Marple and Sherlock Holmes, as well as countless video games and books, spying has embedded itself deep into our popular culture. Let’s drop into their Hall of Glory.
They are so numerous one could hardly count them all. Their categories embrace both existing in real life with the actual prototypes (Mata Hari; Virginia Hall; Josephine Baker) and purely imaginative ones, having literature origin (Hercules Poirot; Miss Marple; Sherlock Holmes; Arsene Lupin; Commissar Maigret; Fantomas) or purely cinematic roots (Ethan Hunt from Mission Impossible series; Mr. & Mrs. Smith; Columbo), men and women (Nikita; Hanna; Evelyn Salt), kids and adults, serious and mock ones (Austin Powers; Johnny English), entire secret agencies and maverick agents, not to speak of other agents belonging to different nations. What category is more efficient? Or, rather, more effective, if to speak about screen images?
Besides an exceptional occupation, exciting details of their private life thrill and attract ordinary people as well. What women/men do they prefer to date? What do they like to eat/drink? How do they spend their free time, if having any? Their favorite brand of…etc etc etc? We like to feel closer to celebrities of all kinds, to be privy to their life, to try their boots on, as it were. Even Bond’s spike boots. You can become an actual spy; it’s easy now, with the wide choice of once top-secret tech “toys” and gadgets available in the shops for ordinary Jacks and Joes.
Spying Procedures: Before and Now
There is the plethora of modern technology-inspired spying means, as well as classical, though a bit outdated, non-technological methods. Which one is more effective in the battle against crime and counterespionage – time-honored experience-validated simple tools or sophisticated gadgets?
Traditional measures, available for humble detectives and low-rank spies, include lying in ambush in any weather, watching a suspect being under cover, following by auto on foot, using a simple camera and a microphone, and employing ordinary weapons like guns or knives.
Advanced means presuppose computers, weirdly modified autos and other minor high-end gadgets developed specifically for the spy stars, like James Bond. Their weapon is a class unto itself. Every tech savvy kid spent countless sleepless nights dreaming about the copycat of James Bond’s pen gun or a shooting cigarette.
Nowadays, these hardware means are fortified by software ones – advanced programs and applications that can do wonder. They are the sophisticated stuff performing miracles better than Harry Potter. There is an umbrella term coined for them – spyware – the term that evokes both primeval fears and hopes of deliverance simultaneously.
It Could Have Been Used by the Real Spies…
There is one app in the market of spyware which creates the impression of belonging to the equipment of an actual spy from classical Hollywood movies. It’s called mSpy. It is enabled to do all the operations a real-life spy can, and even more. Besides, it requires no rest, food or salary.
Follow our blog as the next post will divulge you the detailed information on movie spies’ equipment.