Electronic Equipment & Publications
available from SpyKing


SpyKing offers the finest personal protection, security
& counterintelligence devices available in the world.
Our engineers and staff are dedicated to providing superior, dependable products
that are user friendly and available at reasonable cost.
Our products are designed and built up to a standard,
not down to a price.

Each SpyKing system was designed by technicians with practical field
experience. If you have a specific requirement or application we will be happy to customize
any of our systems to fill your particular need.



THE CROOKBOOK
The most dangerous book ever written! How to get anything and everything you ever wanted for free...and how to get away with it! Everything you'll ever need to know...about beating the system! Over 500 pages.Partial list of topics: Big Brother, Intelligence gathering, How to locate & investigate anyone, How to locate & research anything, How to get free advice from experts, Getting free on-line internet, How to bug someone, How to tap any telephone, How to intercept cellular phones, pagers & fax machines, How to locate & violate any computer, How to detect electronic eavesdropping, Electronic countermeasures, Privacy, How to beat video surveillance, Breaking & Entering, Night vision devices, Counter intelligence, Scrambling & Cryptography, How to hack computers/files/computer systems, Methods of telephone phreaking, Retail scams, How to get free stuff,Ingenious devices that make life more interesting, Privacy & how to get it, How to pick any lock, ATM cards & how to counterfeit them, Pay TV decoder plans, Where to get hacking software for free, How to modify scanners to pick up cellular telephone calls, How to acquire credit cards, How to get unlisted telephone numbers, Self defense-how to kill with your bare hands, Hacking credit reporting agencies, How to get free airline tickets, The complete guide to getting & keeping free cable TV, Scamming ATM's, How to rob anyplace, Hacking voice mail systems, How to steal free cellular telephone service, Merchant fraud, E-mail bombing, Basic guide to defrauding ATM machines, Credit card fraud, Counterfeiting money, Summary of FBI computer systems, Credit card magnetic stripe technology, Law enforcement surveillance transmitter frequencies, How to start your own fake ID business, Highway toll booth scams, Magnetic weapons & HERF guns, How to stash your good stuff & keep it safe! Price: $75.00 - Now available in Electronic Format.

To place an order, contact us by E-Mail at: SpyKing@spyking.com



IS SOMEONE BUGGING YOU?
Are you a target of electronic surveillance? Do you suspect someone is invading your privacy? This is the first "Do-it-Yourself" De-Bugging guide... available to the general public... This guide will teach you how to find bugs & wiretaps! Simple step-by-step instructions... Produced by an expert with 25 years in the business... You will learn HOW bugs and wiretaps are planted, what they look like and how to find them using simple "tricks of the trade" taught by a pro... Guaranteed to help safeguard your privacy... Demonstrations of sophisticated and inexpensive commercially available bugging devices... If you are interested in communications privacy this guide is a must... You don't have to be a victim... You won't find these information anywhere else... This guide is offered exclusively by SpyKing... Order Today! Only $95.00 USD - Electronic Format.

To place an order, contact us by E-Mail at: SpyKing@spyking.com



THE LAW ENFORCEMENT INVESTIGATORS GUIDE TO ELECTRONIC EAVESDROPPING & SURVEILLANCE EQUIPMENT
"Everything you need to know about electronic bugging, wiretapping & intercept gear…" There has been a tremendous increase in the use of electronic surveillance equipment by criminal enterprises… Law enforcement & corporate security directors need to be aware of how surveillance gear is used by criminals and how to identify it… This publication fills an obvious need for a handy reference guide in easy to understand non-technical terms for the investigator charged with identifying surveillance equipment and/or it’s possible use in the facilitation of criminal activity... What is covered: Radio Transmitters & Receivers Body Wires Hardwired Microphones Telephone Recording Telephone Interception Tracking Devices Cellular Interception Pager Interception Infrared Transmitters Laser Monitoring Covert Video Computer Data Interception Technical nomenclature Applicable laws This guide is quickly becoming the "bible" for government, law enforcement agencies and professionals across the country... A Virtual Encyclopedia of Eavesdropping & Surveillance Equipment... Hundreds of devices & sources... You won't find these information anywhere else... This guide is offered exclusively by SpyKing... Order yours today... Price: $295.00 USD - Electronic Format

To place an order, contact us by E-Mail at: SpyKing@spyking.com



SECRETS FROM THE SPY SHOPS
Have you ever walked into a "Spy Shop" and looked at some of the amazing products they carry? They also carry amazing prices! Most stores traditionally "mark-up" prices between 100% and 1500% ... They are a total "rip-off"... This guide tells you where the "Spy Shops" obtain their products that they sell to you for an incredible profit... We provide names, addresses, contact numbers... and images of the products you desire for easy identification... Why pay them? Go to the source yourself and save a TON of money... We provide info on where to obtain: electronic surveillance equipment, privacy devices, covert video products, electronic countermeasures, security equipment and much more... Find out where to buy an automatic telephone recorder normally sold in "Spy Shops" for between $295 - $495. for only $28.00 USD How about a covert video system normally sold for $495-$1495.00 USD for only $120.00 USD... How about 5 watt 4 channel Walkie Talkies normally sold for $495.-$995. each for only $88.00 USD each... These are only a few of the sources in this guide... You won't find these sources anywhere else This guide is offered exclusively by SpyKing... Order today - Price: $95.00 USD - Electronic Format

To place an order, contact us by E-Mail at: SpyKing@spyking.com



TRANSMITTER/TAPE RECORDER DETECTOR
The RTD is a hand-held device approximately the size of a pack of cigarettes that was designed to be worn in a shirt or jacket pocket. The RTD will detect an operating tape recorder or radio transmitter worn by another person or placed in a room and alert you by silently vibrating in your pocket or by LED illumination. Operates on standard 9 volt battery. Up to 15 foot detection range. Discretely scan individuals (using the hidden wristband antenna) for audio or video recorders & audio or video transmitters. The silent mode vibrator alerts only you in the presence of a recorder or bug. The antenna is designed to be worn on the wrist to scan colleagues while shaking hands.

To place an order, contact us by E-Mail at: SpyKing@spyking.com



THE SCOUT
The Scout transmitter detector/locator is one of the simplest tools in the countermeasures industry to use... and it is one of the most useful... Extremely user friendly - Very simple to operate... Locks in on bugging devices automatically immediately alerting you to their presence...Allows the user to check all RF signals in your home, place of business or vehicle... You can even use it while traveling to check hotel rooms, etc. Verify received signals with bar graph LED alert & audio listen-in capability which allows you to verify the authenticity of the signal.. No more guessing... You don't have to be a victim of bugging devices... This easy to use device is great for the novice or professional. You can sweep an office, home or vehicle in a matter of minutes... 5Mhz to 1 Ghz range... Three Year Warranty... Made in America...

To place an order, contact us by E-Mail at: SpyKing@spyking.com



TELEPHONE SECURITY UNIT
Alerts the user to the presence of unauthorized listening devices... Constantly monitors telephone line for outside interception attempts... Places an unfilterable white noise on the line that jams illegal bugging and monitoring devices... Balances telephone line voltages to quickly detect changes caused by intercept devices...Designed to be placed on a single line telephone instrument for constant communications security monitoring. Using voiceband noise masking, the TSU defeats telephone taps by jamming eavesdropping devices which utilize high impedance coupling (resistive, capacitive or inductive), RF bugs, tape recorder activators, direct taps (line interface devices), extension telephones, and lineman's handsets. Moreover, the TSU electronically isolates the telephone and provides protection from hookswitch bypass bugs, RF flooding, infinity devices or electronic triggers. The TSU provides an internal sound replacing the telephone ringer while the telephone is decoupled from the line.

To place an order, contact us by E-Mail at: SpyKing@spyking.com



PORTABLE TELEPHONE SCRAMBLER
The PTS acoustically couples to any telephone instrument handset and protects your telephone conversations from eavesdropping. Use it in the office, home, pay telephone or cellular car phone. Automatically scrambles your conversation in code combinations. The privacy codes are set by the user and can be changed at will. Operates on a 9 volt battery. Clear natural sound quality. Fits all handsets: standard, mobile, cellular and pay phones...13,122 user programmable handshake access codes...Four factory code groups totalling over 52,000 possible codes...Protects your entire telephone conversation from wiretapping and eavesdropping devices...

To place an order, contact us by E-Mail at: SpyKing@spyking.com

SCANLOCK RF DETECTION SYSTEM
The only system on the market capable of detecting a physical surveillance... The Scanlock detects and locates eavesdropping devices quickly... Automatically monitors the radio spectrum and alerts you to the introduction of any new RF signals into your area... Monitors it's area of operation and alerts you to the activation of eavesdropping devices that were dormant or remote activated... Detects microphones that use AC power cables for power and transmission... Completely portable... Can be worn over your shoulder for easy sweep of any area... Described in a leading US publication as the "ultimate piece of countersurveillance gear". Scanlock gives complete protection against radio bugging devices in the range 10KHz to over 4GHz. Its unique fast tuning mode means it can lock to a new signal in a fraction of a second and identify its frequency. Scanlock ECM Plus comes with a complete set of accessories and continues to be the preferred choice for government sweep agencies and security professionals worldwide. Complete protection against all types of radio bugs... Preset or user defined operating modes... Excellent sensitivity and flat wide band performance ... Frequency measurement of locked to signals... Silent operation, remote alarm and real time protection... Simple to use and fully portable ...

To place an order, contact us by E-Mail at: SpyKing@spyking.com



TELEPHONE COMMUNICATIONS ANALYZER
Tests telephone lines and conventional & electronic telephone system for wiretaps, bugging devices and telephone modifications which allow remote or on premises eavesdropping...Tests all switching equipment and associated on-premises wiring...Tests all possible wiring combinations for audio extraction...Multi-tone sweep finds dual-tone activated devices... Portable system comes complete withoperatinf instructions and carrying case. The TCA has been designed for testing both conventional telephones and the new electronic telephones such as the Western Electric Dimension, Horizon, and Northern Telcom SL-1 systems. Tests such as On-Hook Voltage, Off-Hook Voltage, On-Line Listen, Tone Sweep, High Voltage Pulse Test, and All Wire Combination Listen Tests are all accomplished in minimum times. For example, in a 50-wire cable, which is common with a 5-line business telephone, there are 1225 possible 2-wire combinations. With TCA, all can be thoroughly tested within one minute. Furthermore, it tests for and finds all audio paths, even those initiating across a lamp or ringer. New exclusive multitone sweep finds dual tone activated devices.

To place an order, contact us by E-Mail at: SpyKing@spyking.com



NON LINEAR JUNCTION DETECTOR
Detects dormant remote control RF eavesdropping devices...Detects hidden tape recorders, amplifiers and wired microphones buried in walls, furniture or other inanimate objects... Allows TSCM technicians to perform their work quickly and more efficently...saving time and money...This unit detects bugging devices that other units will not. The NLJD is a "must" piece of equipment for the serious TSCM technician. NLJD's are used in conjunction with the physical search. The NLJD is a highly sophisticated countermeasures device which transmits a high frequency energy beam into walls, ceilings, upholstered furniture, books, etc. This energy is sufficient to "illuminate" any non-linear junction such as transistors, diodes and micro-chips - the type used in tape recorders, transmitters, microphones and amplifiers - even when they are not operating at the time. The NLJD is capable of locating even a single, unpowered transistor or diode buried in a plaster wall. Not only does the NLJD allow our technicians to do a more thorough search but it allows them to do it faster - resulting in a considerable savings to the client.

To place an order, contact us by E-Mail at: SpyKing@spyking.com



SAFETY SHIELD
Easily installed underneath wallpaper, paneling. carpet or ceiling tiles... Protects & shields rooms from RF monitoring devices... Electromagnetic emissions are protected within the secure shielded area... Prevents adversaries from intercepting signals emanating from hidden radio transmitters, computer equipment and electronic typewriters... Protects your valuable information...SafetyShield is composed of several composite non-woven materials. A must for every conference and computer room...

To place an order, contact us by E-Mail at: SpyKing@spyking.com



DATASCAN TEMPEST MONITORING SYSTEM
Computers generate several types of radiated electronic fields from various internal components. The strongest of which is the video signal which is amplified to 700 volts before it is fed into the CRT display unit. The DataScan manufactured by SpyKing captures the dominant video signal generated by any computer CRT screen and reconstructs it via a sophisticated antenna system and special television receiver off-premises. Range has exceeded 1000 yards under optimum conditions. The unit is entirely passive in nature. It does not allow the user to access the target computer but rather to monitor via radio wave what is displayed on the target computers CRT screen every time the computer is operational.. The DataScan unit was designed to give TEMPEST technicians an effective method of monitoring TEMPEST shielding effectivness.

DataScan II Convertor

Because of the huge demand for the Datascan system components we have decided to offer the convertor system as a stand alone item. The DataScan convertor will interface with your radio receiver and monitor and allow TEMPEST technicians to check the integrity of their in-place RF shielding to protect eletromagnetic emmisions from TEMPEST monitoring. The DataScan II Convertor offers all reconstruction parameters as the professional DataScan system. Effective range depends on the receiver and antenna system used by technican. Field tests have generated distances in excess of 100 meters with basic scanner type receiver and antenna. DataScan II Convertor system comes with complete instructions including frequencies to monitor. Three year warranty. Made in America.

To place an order, contact us by E-Mail at: SpyKing@spyking.com



SecurDat
Worried about TEMPEST monitoring? Worry no more... SecurDat protects your valuble secrets from TEMPEST monitoring... Tax codes, bank balances and new pharmaceutical formulas are just some of the personal, sensitive and secret data that are constantly being transmitted around the world via millions of keyboards and screens. Millions of computers are processing data that will be printed out by millions of printers. All these components exchange high frequency pulse sequences, resulting in the emission of electromagnetic waves. These waves can escape thus transmitting sensitive information to the outside world. Every unprotected piece of digital equipment transmits its secrets via radio waves. Today, any electronics buff can access other people's data. All it requires is a system of mobile antennas and receivers that are quick and simple to install and can be used unhindered and unnoticed from near or far. Companies, data security experts and public authorities confirm that this form of espionage against trade and industry, banks, lawyers' offices and government authorities is being practised extensively. It is therefore urgent to protect sensitive data against eavesdropping by data pirates. And a simple solution is now available with SecurDat. Now every PC-user can safeguard his data against eavesdropping. Even private individuals, e.g. those who engage in telebanking, may use SecurDat to protect their bank acount details from the curiosity of data pirates. The SecurDat device sees radiation from the computer system and creates a controlled protective field around the PC system. The interfering signal overlays the compromising radiation emitted by the PC system, making it unreadable for data pirates. This innovative apparatus is specially suitable for data security in financial institutions, lawyers' offices, doctors' surgeries, editorial offices and industrial research laboratories. Even existing unprotected electronic cash dispensers can be effectively safeguarded. Private individuals too, who wish to protect sensitive data on their PC system, will welcome SecurDat as a low-cost, simple-to-install and reliable solution. The device can be placed right next to the monitor and will protect all PC system components within a radius of 10 feet from eavesdropping by data pirates. The interference signal emitted by SecurDat is very complex and can not be filtered out, even using professional methods. SecurDat takes up very little space and can easily be set up next to any EDP workstation. The device pocesses all necessary technical approvals for electronic and security devices. There is no known danger to health or other side effects from the interference signal.

To place an order, contact us by E-Mail at: SpyKing@spyking.com



COPYBLOCK - STATIONARY THAT CAN'T BE PHOTOCOPIED!
The risk of security leaks has increased exponentially since the advent of modern photocopy and facsimile machines. Suddenly, anyone with access to a copier or a fax can pull a file, make and transmit copies and refile the original. Who was to know? And how could it be prevented? Financial reports, merger and acquisition information, R&D plans, corporate strategy, medical records and personal data all become fair game for unscrupulous employees, company spies, suppliers or visitors. CopyBlock is a new product developed and manufactured by SpyKing in response to the growing demand for document security. CopyBlock replace normal stationary and protects all hand-written, typed or laser printed data from unauthorized photocopying or faxing.The possibilities are endless! When a CopyBlock document is photocopied all that is reproduced is a totally black image similar to the image depicted.

To place an order, contact us by E-Mail at: SpyKing@spyking.com



ELECTRONIC EAVESDROPPING DETECTION SERVICES
Is someone listening to your conversations? Are you bugged? No? Are you sure? SpyKing offers Electronic Eavesdropping Detection Services to combat the epidemic of illegal eavesdropping facing industry today. Our expert technicians, using State of the Art countermeasures equipment will electronically detect and nullify illegal eavesdropping devices in your home or office. Click here to read our FREE 16 page report "Electronic Eavesdropping & Corporate Espionage". We can assist you in determining if eavesdropping equipment is present in the offices, plant or home. We can also assist you in choosing the proper communications security equipment to guarantee your personal business stays private... SpyKing offers a confidential Technical Security Survey program either on a one-time or regularly scheduled basis. During such a survey, which may be conducted during regular or non-working hours, our experienced staff will search for and locate any clandestine devices that may be present. In addition to a complete physical search, the team uses sophisticated countermeasures receivers, telephone analyzers, and other specialized equipment to electronically "sweep" your facilities. The outcome is a highly confidential report covering the techniques used, the results, and recommendations on what steps might be taken to increase information security. Since our technical staff is qualified in many other security areas, the report will often point out other security weaknesses that should be addressed.

PS: If you are interested in retaining our services, don't call from the suspect telephone or area as your suspicions may alert the eavesdropper to your intended course of action. Be sure to read our FREE report BEFORE you hire anyone!


To place an order, contact us by E-Mail at: SpyKing@spyking.com

back to home page


© Copyright 1995-2000 SpyKing - All Rights Reserved-All Wrongs Revenged