FREE SHIPPING* on all orders of $75 or more!

Shopper Approved Reviews Widget

U-Spy Product Reviews

U-Spy Product Reviews offer real reviews and discussions about our products as well as other products available
  • Words from the Boss: Cloned Debit Cards Add to ATM Thefts

    Technology makes our lives easier, or at least it's supposed to; yet, as our understanding  improves and complicated processes, such as computer programming, become more user-friendly,  some decide to use these innovations to prey upon others.

    ATM skimming-devices, for instance, have evolved from clunky, obvious pieces of fake auto-bank teller equipment to sleek, undetectable theft devices that are unnoticeable to untrained eyes. As the equipment becomes better, the criminals grow in sophistication, often stealing hundreds of thousands in others' money before being discovered. Read More

  • Chicago's Highway Surveillance System

    The Chicago Police Department, and retiring Mayor Daley, want to take Chicago's surveillance system to the highway. The ambitious plan, announced earlier this year, is to install some 200 cameras along interstate highways between Chicago and Mexico. The camera's function is to take pictures of license plates and cross-reference them to known images of smuggler, drug traffickers, and gun runners. Read More

  • Radio Frequency Identification

    Radio-frequency identification (RFID) is the use of an object (called an RFID tag) applied to or incorporated into a product, animal, or person for the purpose of identification and tracking using radio fequencies.

    RFID is utilized for open-road tolling, making payments using mobile phones,

    The US government utilizes RFID for traffic management, and companies use the technology to keep track of expensive equipment, essentially initiating a surveillance program for inventory.  RFID's future is currently not known due to privacy regulations that may keep many of the applications from moving forward.

    A Westport, CT company--SecureRF--is currently examining applications to use RFID chips to keep track of children via student ID cards using radio frequencies much similar to GPS (although very different technologies).

    Read More

  • GPS Application Leads Police to Thieves

    A recent rash of New Hampshire thefts caused police to investigate and warn the public not to leave valuable items inside vehicles parked in the state's national park areas--especially at trail heads. U.S. Forest Service agents also cautioned visitors to lock their cars.

    A recent investigation was launched after thieves smashed car windows to get into vehicles, stealing electronics and cash.

    Unfortunately for the unwitting criminals, police were able to track down them down within hours due to quick action stemming from a victim's GPS application on his cell phone. Most of these smash-and-grab type cases go unsolved, especially due to the remote locations, time delay between the crime and report, and absence of witnesses to the crime.

    In this case, the victim went to the State Trooper barracks and borrowed a police computer to track the location of his Smartphone; the phone was in a nearby community, and appeared to be with someone walking.

    State Law Enforcement officers called the community's police department, who dispatched officer to the area; the officer spotted a group of juveniles outside the residential area. A local Forest Service special agent also assisted, helping police determine four teens as the likely suspects. Police recovered the majority of property and the teens eventually confessed they'd participated in the crime spree, or were guilty of receiving stolen goods.

    While the case remains under investigation, police expect charges to be filed shortly. Ah, technology!

  • Copyright Office Unleashes iPhone; Legalizes Jailbreaking

    The U.S. Copyright Office announced that jailbreaking (software modifications that liberate iPhones and other handsets to run applications from sources other than those approved by the phone maker) the iPhone, and basically any Apple O/S, is legal. The decision stems from a request by the Electronic Frontier Foundation (EFF) and the new ruling rewrites the Digital Millennium Copyright Act (DMCA). Read More

  • Covert Video Recorders

    Have you ever run into a situation where you needed to take a picture, or record an event on video, but didn’t have your camera with you?
  • Understanding Motion Activated Recording

    Many customers of ours are aware of motion activated recording. This is a function of your video security system that provides recordings only when there is action or activity in the camera screen. Many people incorrectly believe this function is provided by the camera. It's actually the DVR that senses the motion and starts recording when there is action. Any camera will not effect the Motion Activated function. So don't worry about the security camera you buy when considering the Motion Activation feature. Here is how it really works.

    The DVR has several choices of how to record. Motion Activated, Continuous, Timer or Schedule, etc. I don't understand why anyone would choose anything but the first choice, Motion Activated Recording. This means, that in each camera, should any activity be detected, the DVR will record. And usually, the DVR will only record that particular screen. At least the higher quality (all of our DVRs) do. How the technology works is that whenever pixel motion is detected in the screen, the DVR things it is motion. So anything from a bird flying by, a tree or bush blowing in the wind or even an empty bag blowing in the wind. Other undesirable motion detection issues may be TV or PC monitors.

    Another cool function of this Motion Activated Recording is the Mask or Screening feature. Let's say you are shooting outside and there is a large tree or bush in the picture. You have the ability with al of our DVRs to screen or block out the tree. Just going to the Motion Setting area and you will be able to see the blocks or screen (depending on your DVR type) and control the area that sets off recording. You will see the entire screen in the live view or when the desired Motion areas have activity. But the tree blowing in the wind will not effect motion. Use this also for heavily traveled roads that are not critical security areas. If your business or home is near a busy street, the traffic can be eliminated.

    There are other great features too. You can decrease or increase sensitivity as needed in the settings. This could be handy when you have some inconsequential slight motion like reflected lights entering the room through windows and such. A person walking through the screen should set motion recording off even in the lowest of sensitivity settings but you should test the settings before you assume everything is right.

    The whole idea behind these features is to offer you the convenience of not having to watch hours of video when an incident occurred and you are unsure of the time of occurrence. So you walk into your office at 6am and discover a missing object. You can simply play the camera channel or channels that has the view of the missing object and the effort should be easy. Start reviewing your video at the time you know the object was present. As you play, only activity in the camera will be played back. Not the entire time frame.

    Another great benefit is that you will save hard drive space. As you record video, you use up valuable hard drvie space. So if you can economize the amount of recordings you make through motion recording, you will ultimately have more days of recordings on your hard drive before it starts to recycle. This means you can view further back into history to check activity instead of buying a larger or an additional hard drive.

    We hope you found this helpful. For more information, please visit our website's video swcurity section or call us toll free: (888) 338-4545.

7 Item(s)