Is business spinning?

It's getting better. Compared to the same quarter last year, sales increased threefold.
 
Did wiretapping scandals and counterterrorism help?

Also, but it was more of a help than a breakthrough. It is a stable growth, without shocks. It certainly helps to make the public more aware of these events.
 
Are Poles paranoid?

We also sell abroad, mainly through Amazon, and I must tell you honestly - we do not stand out from the rest of Europe. It’s not even about paranoia, but about making this equipment cheaper and more affordable.
 
Have you never served people who have seen conspiracies everywhere?

Of course they are, but this is a minority, about one in ten parties. Now I no longer work behind the counter, but when I started my business in 2007, such criminals came along. They thought someone was following them, or a neighbor with a glass overheard them through the wall. Honestly, I’d rather send them to a psychiatrist than to my store. However, I emphasize that most do not.
 
Who then is the remaining nine?
Most often, entrepreneurs and people who suspect someone around them of being dishonest to them.
What do they buy most often?
Depends.

Let’s say I suspect my wife cheated. What do you recommend?
It is necessary to explore how he communicates with a potential lover. For example, a dictaphone can be used for eavesdropping. It looks like a usb key with one small button. We turn it on and put it somewhere and it does its job.
However, if we want to monitor what a partner or partner is doing on the network, then we install special software or hidden  applications on the  phone on the laptop. The process takes about half a minute and then is invisible to the user. It captures screenshots, remembers keystrokes on the keyboard, and collects all the information that can prove a spouse is unfair. Alternatively, we can install a special tracking device on the phone and know where it is now. It is also a popular method for parents who want to know where their children are.
 
 
However, you must first have access to this device.
Obtaining such information poses a risk. No one will put them on a tray. Therefore, such programs are installed for a few seconds to reduce this risk.
Which gender most often checks loyalty?
Half and half with most men. I don’t know what the consequence is, I suspect the ugly sex is simply more interested in technical innovations, but that’s not a particularly big difference. Women also want proof of loyalty or infidelity.
If you go back to entrepreneurs, a lot  of companies  come to you?
Huge. I can’t count how many owners went through the store.
"Nekateri ljudje postanejo zasvojeni s prisluškovanjem. Govorimo o alkoholu in drogah, vendar je želja po nadzoru prav tako močna." Fotografija tiskovni materiali.

"Nekateri ljudje postanejo zasvojeni s prisluškovanjem. Govorimo o alkoholu in drogah, vendar je želja po nadzoru prav tako močna." Fotografija tiskovni materiali.

 
In which industries do they most often exercise control?
Mainly logistics and shipping, but also trade. For example, owners of development offices eavesdrop on representatives of whether they offer their clients their own services and steal clients during the presentation of the apartment. And transport companies check that the driver goes where he needs to go and doesn’t stop in the woods and steal goods.
 
Well, it never happened that thieves used such devices?
Of course, I was at the prosecutor's office several times to testify about the robbery with the courier service. Thieves sometimes install GPS transmitters to track and hit the car at the right time. However, it should be noted that I only sell equipment. Its use is independent of me, as it is with a kitchen knife retailer - it is also not accused of stabbing someone with its product.
 
Do they use them in addition to bandits for more sophisticated crimes?
Very often in industrial espionage. Many entrepreneurs contacted me and noticed that databases or product recipes were starting to disappear from their computers.
We treat each case separately and try to choose the appropriate protection. All you need is the aforementioned eavesdropping or the appropriate encryption software. Thanks to the dam, some of them avoided losses in the amount of one hundred thousand zlotys, as they discovered in time that the partner had intellectual property in order to start their own company, and left the former colleague in the cold. To this day, the shelves in the office are full of bottles of alcohol I received as a thank you for discovering the fraud.
Spying sounds simple.
It may seem so, but it also depends on what devices we use every day.
That's right - if I don't want to be spied on, which is the safest phone?
A good old Nokia like the 3310. There is no built-in memory, so you can't install spyware. Only eavesdropping can help here, but the one that the secret services have access to. Either they connect to the network and impersonate the operator, or they instruct the operator to eavesdrop on a given number.
And if we prefer smartphones?
Iphones are relatively safe, both against civilians and against services. First, it is very difficult to install software outside of the Appstore, there is a lot of gymnastics with it. And secondly, the Polish services have to ask for information from  Apple itself  , and as you know, they are not very willing to share this information with the government. Androids are easier in this respect - everything can be installed there, so it's easiest to "break" them.
 
For now, we’re just talking about how to spy. How to protect yourself from espionage?
It starts with the little things. First, we set the lock on the screens of smartphones and phones. This is the simplest but relatively effective method. If we want to make sure our equipment is clean, we need to inspect it. We issue special scanners in our store and detect if no one has tampered with our smartphone.
If we suspect that someone has eavesdropped on us, we can buy a special detector. It works on the principle of hot-cold. The closer we are to a wave transmitter like a bug, the louder it creaks. However, I recommend a heavier caliber to companies: doors and metal detectors so that no one can bring eavesdroppers to a meeting, as well as acoustic jammers that muffle sounds if someone, for example, tried to eavesdrop from the outside, e.g. with a special stethoscope with a microphone.
And what is the hardest thing to defend against?
Remember the scandal at the Sowa i Friends restaurant?
So.
They were ordinary dictaphones. They just record, it’s impossible to suffocate them because they don’t emit waves. Here you need specialized, very expensive equipment, which is ridiculous by the way. Usually the prices of equipment and surveillance and security cost a similar amount. And for a dictaphone with a range of € 30-137, you need jamming equipment that costs tens of thousands of €.
 

In addition to mandatory cookies, we also use analytical and advertising cookies, as well as social network cookies on the Spy Shop website.

If you agree with this, please click on the I ACCEPT button. For a detailed description and in order to set the use of individual cookies, click on the COOKIE SETTINGS link.

×
Managing cookies on the Spy Shop website
Mandatory cookies

are cookies that are essential for the proper functioning of the website, whereby the transmission of information in the communication network would not be possible without them. These cookies are also necessary in order for us to offer you the services, which are available on our website. They allow you to log in to the user profile, select the language, agree to the terms and conditions and identify the session of the user. We are not obliged to obtain consent for their use.

Analytical cookies

These cookies help us understand how our visitors use our website. They help us improve the user experience and identify user requirements and trends. We only use these cookies if you have explicitly consented to their use.

Advertising cookies

Third-party plug-ins and tools used as cookies enable various functionalities to work, help us analyse the frequency of visits and how the website is used. If an individual does not agree to the use of these cookies, they will not be installed, while it may however happen, that some interesting features of the website will not be available. We only use these cookies if you have explicitly consented to their use.

Social network cookies

These cookies make it possible for us to provide content for posts on social media and record your actions so that we may provide a more personal and enhanced user experience. We use these cookies only if you are logged into a Twitter, Facebook or Google user account when using the website.

1. General information about cookies 1.1. What are cookies?

Cookies are small text files that most modern websites store on the devices of their visitors, i.e. people who access certain websites on the Internet with their devices. The storing of cookies is under the complete control of the user, since users can easily configure their browser to restrict or disable the storage of cookies.

While visiting the website and its subpages and performing operations on the website, your computer, phone or tablet, automatically or after gaining your explicit consent, stores certain cookies through which various data can be recorded.

1.2. How do they work and why we use them?

Each visitor or shopper is assigned a cookie in order to identify him and ensure traceability at the beginning of each use of the online store. The servers provided to the company by the subcontractor automatically collect data on how visitors, shop owners or shoppers use the online store and store this data in the form of an activity log.

The servers store information about the use of the online store, statistics and IP numbers. Data on the use of the online store by shoppers can be used by the company for compiling anonymous statistics that help us improve the user experience as well as market products and / or services through an online store.

Indirectly and upon obtaining consent, the online store may also store external service cookies on the visitor's or shopper's device (e.g. Google Analytics) which are used to collect data on website visits. Regarding external services, the rules and general conditions on the processing of personal data, which are available at the links below, apply.

2. Permission to use cookies

If the settings of the browser with which you visit the website are such, that they accept all cookies, it means that you agree to their use. In case you do not want to use cookies on this website or you want to remove them, you may follow the procedure below. Removing or blocking cookies may result in suboptimal performance of this website.

3. Mandatory and optional cookies and your consent 3.1. We are not required to gain your consent for the use of mandatory cookies:

Mandatory cookies are cookies, that are essential for the proper functioning of the website, whereby the transmission of information in the communication network would not be possible without them. These cookies are also necessary in order for us to offer you the services, which are available on our website. They enable login into the user profile, language selection, agreeing to the terms and conditions and user session identification.

3.2. Cookies that are not necessary for the normal operation of the website, and for which we are obliged to obtain your consent (optional cookies):

Analytical cookies

These cookies help us understand how our visitors use our website. They help us improve the user experience and identify user requirements and trends. We only use these cookies if you have explicitly consented to their use.

Advertising cookies

Third-party plug-ins and tools used as cookies enable various functionalities to work, help us analyse the frequency of visits and how the website is used. If an individual does not agree to the use of these cookies, they will not be installed, while it may however happen, that some interesting features of the website will not be available. We only use these cookies if you have explicitly consented to their use.

Social network cookies

These cookies make it possible for us to provide content for posts on social media and record your actions so that we may provide a more personal and enhanced user experience. We use these cookies only if you are logged into a Twitter, Facebook or Google user account when using the website.

4. How to manage cookies?

You can manage cookies by clicking on the "Cookie settings" link in the footer of the website.

You can also control and change cookie settings in your own web browser.

In case you want to delete cookies from your device, we advise you to follow the described procedures, by doing so, you will most likely limit the functionality of not only our website but also most other websites, as the majority of modern websites use cookies.