You look at these 007 agents and think: is any of this true? Do they really have such super cars and such interesting gadgets? It is worth saying that although the James Bond films are fiction, in some cases they are very true.

Here we have short review spy gadgets that were in service with the intelligence agencies of various countries. Some were used by the KGB, some by the CIA, and some by other countries that cared about their own. state interests just as much as the superpowers. So, what were the saboteurs, scouts and spies of the past armed with?

The kiss of death

This is not the poisoned lipstick that the compromised spy used to kiss her opponents to death. Everything is much more prosaic: what looks like lipstick is actually a gun with a bullet. Very convenient for urgent matters.

Camera in a button

Ajax is the development of the so-called “bloody gebni”. The lens of this spy camera was placed in a button and was fired from a pocket. In fact, this is just one camera from a huge arsenal of similar tools that were used not only in the USSR, but also in the USA and European countries.

Umbrella for a spy

This is also a KGB development. Who could have guessed that an elegant gentleman with an umbrella in his hands was actually a cold-blooded killer. With the help of such a gadget, the Bulgarian dissident and writer Georgi Markov was eliminated in 1978. He was stabbed with an umbrella at a bus stop and died three days later.

Houdini set

A real spy kit that the intelligence officers hid in... the rectum! It was actively used in the 1960s and gave a chance to free oneself from captivity or crack a safe. We hope that not a single rectal capsule was opened during transportation.

Spy glasses

It is worth saying that the spies well understood what they were getting into. Therefore, in addition to instruments in the anus, many also had cyanide. A small capsule was hidden in the glasses, and if it suddenly happened that a spy was discovered, then he had a choice: die quickly and painlessly or be subjected to severe torture and die anyway.

Hydrocyanic acid gun

A similar pistol was used by Soviet agent Bogdan Stashinsky to eliminate ideologists and leaders of Ukrainian nationalists. This is how Lev Rebet and Stepan Bandera were eliminated in the late 1950s. The gun fired explosive capsules of acid into the victim's face, which inevitably led to cardiac arrest.

Bug in the heel

This is an invention of Romanian intelligence officers who were spying on American diplomats. Americans did not buy anything in local stores; they were sent parcels that were carefully intercepted. And then it’s a matter of technology. Diplomats sometimes could not understand where the information was leaking from, because there were no bugs anywhere.

Transmitter shaped like a poop

This is not dog excrement, as you might initially think, but a disguised CIA radio beacon that guided American bombers to their targets. Such beacons were actively used in the 1970s.

Pipe-gun

This device was used by British special forces during the Second World War. From such a tube it was possible to eliminate the enemy at close range. To make the pipe fire, you just had to turn the mouthpiece.

Steineck camera watch

This watch was collected in post-war Germany. The spy could take pictures while supposedly looking at the time. Unfortunately, it was impossible to focus, so we hoped for luck. The watch held 8 photographs.

Strategic stump

This suspicious thing was discovered in the suburbs of Moscow in the 1970s: an artificial tree stump that intercepted signals from a Soviet missile system and then transmitted it to an American spy satellite. As a result, the KGB officers found the radar, which, by the way, was powered by solar panels. Very expensive technology for that time.

Camera in a pen

In the 70s, even spy cameras had impressive dimensions, but this CIA development was a real revolution. With her help, the traitorous Soviet diplomat Alexander Ogorodnik handed over hundreds of secret documents to the Americans before he was discovered. In the same pen there was also a capsule with poison, which sent Ogorodnik to the next world at the time of his arrest.

Coin cache

Here's a useful coin that could be used to store microfilm. Who would have thought that this was a miniature container that could be opened with a needle? The idea belongs to the KGB.

Coal Bomb

It may look like a piece of coal, but it is actually a disguised explosive. It was enough to throw such coal into the firebox of, say, a steam locomotive or steamship. In the 1940s, a special kit was even developed that could be used to repaint explosives.

Gun in glove

It was developed at the Pentagon during World War II: an operative only had to “slap” the victim on the back to fire a shot. This is how they eliminated enemies without taking off their gloves.

Flask bomb

This flask, instead of cognac or water, was filled with explosives and was used for sabotage behind enemy lines. A sip from this container was fatal not only for the one who was tormented by thirst, but also for everyone who surrounded him.

Spy camera for pigeons

The first drones were alive in the literal sense of the word. In order to determine the enemy's disposition, the scouts sent on a mission... pigeons, to which a miniature camera was attached. Really simple idea and effective implementation.

Cufflinks with a secret

Cufflinks were made like the coins we already wrote about above. Hollow inside, they made it possible to smuggle microfilm containing strategic intelligence information across the border.

Compass button

Who would have thought that ordinary buttons on pants right moment could they become a compass? It was enough to connect them together to determine the desired direction: two points pointed to the north, and one to the south.

Do you think any of this arsenal is used today? We think it’s unlikely, because now the equipment has become much smaller. Perhaps these are some kind of electronic chips... We can only guess! In the meantime, share this article with others and let them take a look at spy gadgets from the past.

Popular wisdom says that a flying word is not a sparrow - you cannot catch it! This proverb is an instruction on protecting information that wise ancestors left for us. The first person to create spy gadgets with his own hands was Prometheus. He made an unauthorized transfer to people of the technology for producing and using fire.

Kings constantly sought to find out about neighboring rulers, merchants and businessmen about competitors and customers, wives about unfaithful husbands, husbands about the list goes on and on...

All these people needed spy stuff. With your own hands, which are very easy to create in our technologically advanced age. Let's look at one of the most available ways espionage using software as an example.

Mobile bugs

IN currently Passions around wiretapping of mobile phones are heating up more and more. What’s interesting here is that the more functional the mobile phone, the easier it is to do spy stuff with your own hands.

It turns out that with the help various programs Can:

Visually photograph the environment;

Conduct video and audio tracking within 10 meters from the mobile device;

Know about all outgoing and incoming phone calls, SMS and emails;

Have an idea of ​​the subscriber’s location with high accuracy;

Remotely turn on the microphone from great distances;

Listen to the conversation even when the battery is removed (this function is possible for modern mobile phones).

The development of mobile phone technology has led to the fact that they have become more like computers than simple means of communication. Therefore, getting into the phone program and creating spy gadgets with your own hands is no longer a problem for programmers. That's why they appeared special programs that allow you to spy on mobile device owners. Let's take a closer look at the most common utility in the entire spy arsenal.

Her Majesty Spy Phone Suite

In terms of speed of installation, the program is reminiscent of spy gadgets for children. After all, you can install and configure it in five minutes. It does not require any additional devices. After installation, you will be able to use subscriber information from any computer connected to the Internet.

You will be able to hear the tapped phone as if it were your own. Except software products, hardware devices that are produced mainly as toys for children are also very interesting.

Spy toys

There is probably no child who would not dream of playing the famous “agent 007”. To make this dream come true, the developers created various spy gadgets. The toys are so interesting that they captivate not only children, but also adults. Among the variety of products, it is especially worth highlighting:

With a flashlight;

Devices for transmitting classified information;

Special “bugs” for listening and tracking;

Motion detectors, etc.

This list can be continued indefinitely.

Spy devices not only provide us necessary information, but also give pleasure from revealing someone’s secret. After all, each of us has a natural sense of curiosity, so why not satisfy it?

The main spy gadgets of our century have become the mobile phone, smartphone, and communicator. There are software systems that monitor all communications of the subscriber on whose phone they are installed: recording and wiretapping telephone conversations, listening to cell phone surroundings, intercepting SMS and location.

Such programs work with any operator cellular communications in any country. Control is carried out via the Internet from anywhere in the world.
Of course, existing anti-spyware antiviruses are also described that allow you to detect and destroy them in your mobile phone. spyware.

Radio amateurs will be interested in the sections of the book that examine both traditional spy and anti-spy stuff. Circuit designs of devices for obtaining information and protecting their information from leakage are presented. The diagrams are accompanied by descriptions, recommendations for assembly and configuration. All these designs are available to home craftsmen.

The book is intended for a wide audience.

Table of contents
Chapter 1. Smartphone, communicator, mobile phone as the main “spy things” of the 21st century.
Chapter 2. Before you start creating spy stuff
Chapter 3. We develop and assemble radio microphones
Chapter 4. We develop and assemble radio microphone detectors
Chapter 5. We develop and assemble jammers for radio microphones
Chapter 6. Removing information from glass and fighting it
Chapter 7. Removing information from a telephone line and combating it
Chapter 8. Professional devices for detecting and suppressing spyware
Chapter 9. Review of Internet resources

Publisher: Science and Technology
Year: 2012
Pages: 304
Russian language
Format: PDF
Quality: excellent
Size: 10 mb
Download: Koryakin-Chernyak S.L. DIY spy stuff
If you find broken links, you can leave a comment, and the links will be restored as soon as possible.

Annotation

The main “spyware” today is the mobile phone. Spyware can monitor activity on mobile device, on which they are installed. Text messages dialed on the phone, incoming and outgoing calls along with the duration of the call, SMS, MMS, email, any data received or transmitted via the Internet, device coordinates - all this will be available for viewing at any time of the day. The best spy programs also listen and record conversations through your mobile device, turning your phone into a real electronic bug.

Of course, existing anti-virus and anti-spyware programs are also described that allow you to detect and destroy spyware on your mobile phone.

The book also examines traditional spyware and anti-spyware things: circuit solutions for devices for obtaining information and protecting your information from leakage are presented. The diagrams are accompanied by descriptions, recommendations for assembly and configuration. All these designs are available to home craftsmen.

The book is intended for a wide audience.

Koryakin-Chernyak S.L.

Chapter 1. Mobile phone as the main “spy thing”

Chapter 2. Protection mobile communications from wiretapping and surveillance

Chapter 3. We develop and assemble radio microphones

Chapter 4. We develop and assemble radio microphone detectors

Chapter 5. We develop and assemble jammers for radio microphones

Chapter 6. Removing information from glass and fighting it

Chapter 7. Removing information from a telephone line and combating it

Chapter 8. Review of Internet resources

Bibliography

List of Internet resources

Koryakin-Chernyak S.L.

"HOW TO ASSEMBLE SPY THINGS WITH YOUR OWN HANDS"

Chapter 1. Mobile phone as the main “spy thing”

What is spyware for mobile phones

Real spyware must have the characteristics of human spies: spying quietly, noticing the smallest details, obtain valuable information, act quickly and hide the slightest traces of your presence.

Unique spy programs for mobile phones, created by experts in the field information security, are suitable for installation on various models of smartphones with the most common mobile operating systems today: Windows Mobile, Symbian and iPhone OS.

Currently, specialists are also developing the best mobile spies and interceptors for operational use. Android systems and Maemo, which are becoming increasingly popular.

Spyware for mobile phonebasic level are able to monitor and partially control activity on the mobile device on which they are installed. As a result, you will have access to view at any time of the day, even in the opposite point of the globe:

Text messages typed on the phone;

Incoming and outgoing calls along with call duration;

SMS, MMS, email;

Any data received or transmitted via the Internet;

Mobile phone coordinates accurate to within a few meters.

In addition to the listed features, the best spy programs are:

Listen and record all conversations via a mobile device;

They can turn your phone into a real electronic bug, listening to your surroundings even when the phone is in standby mode.

The phone spy program is compact, easy to install and use. Such a program does not care about such trifles as changing the SIM card. It continues to transfer data discreetly in all conditions.

Phone spy software will, for example, prevent your children from communicating with people you think are undesirable for them to communicate with.

Note.

Such programs can also be used at an enterprise if it is necessary to monitor the time employees spend in the office, as well as the execution of assigned calls.

Stealing a phone with a mobile spy installed has become much more difficult. After all, this phone continues to transmit data about its location to the servers of the company that sold you the corresponding spyware. At the same time, information about all calls made and messages transmitted is logged, and any activity of the attacker on the stolen phone is noticed.

Spy programs for mobile phones will help you save important information even in case of loss or theft of a mobile phone, blocking the smartphone if necessary, and will also help to catch the intruder.

Let's look at some spyware for mobile phones as an example.

The program's capabilities for listening to the environment cellular GSM Spy Phone Suite

Attention.

By downloading and installing Spy Phone Suite, you agree that the program will not be used in a manner that violates current laws. Installing Spy Phone Suite on another person's phone without his knowledge, intercepting calls and SMS messages may violate the law. Spyline.ru is not responsible for inappropriate use Spy programs Phone Suite. By purchasing an annual license to use and downloading Spy Phone Suite, you agree to the above.

The program provides complete control over any person who has a spy mobile phone. By comparing the data obtained by intercepting SMS messages, call logs and wiretapping conversations on a spy cell phone, you can easily create a detailed picture of where, why, at what time, with whom and for what purpose a person carrying a spy phone goes and does.

Note.

This program is capable of monitoring the communications of the person on whose phone it is installed.

It turns the phone into a real GSM bug, you can call it and, unnoticed by the owner, it will listen to everything that happens around. In addition to wiretapping functions cell phones(their environment) this program is capable of intercepting all SMS messages. Regardless of whether these SMS are incoming or are written by the owner of the spy phone. Any text, in any format, time of sending/reception, phone number of the sender/recipient - all this will be available to you.

If the owner of the spy phone uses the built-in e-mail client, the program will completely duplicate his correspondence and incoming correspondence for you.

The program also allows you to display the coordinates of the controlled phone (Location), by fixing the ID of the cell stations in the area of ​​which it is currently located.

The program is full story all incoming/outgoing calls, with records of call times and duration. If the number is entered in notebook spy phone, not only its number will be displayed, but also the contact name.

Cell phone wiretapping program GSM phones and data interception (SMS, e-mail) works in hidden mode, it is recorded in system kernel and it is almost impossible to detect it.

Installing the program takes no more than 10 minutes. It is delivered by e-mail within 24 hours from the moment the funds are received by the software seller.

Note.

All statistically important data (intercepted SMS, E-mail, Location, call history, etc.) is transferred to your WEBe account and is available to you 24 hours a day from any computer/laptop or phone with HTML support

On the Internet you can find dozens of markets selling spy stuff. Most often, these are semi-anonymous online stores offering consumers Chinese miniature video cameras and voice recorders. Sometimes, however, there are more original spy gadgets: from FM bugs to night vision devices.

The Gadgets-reviews portal decided to systematize information about spy gadgets available to Russian buyers. We do not impose or advertise specific models. The purpose of this material is purely analytical. We are just wondering: to what extent have modern digital technologies, and to what extent they are available to the common consumer.

Our material consists of five parts - a brief legal information on the use of tracking devices, a review of children's gadgets, and three parts devoted to various adult “spy gadgets.”

Gadgets for spy kids

What category of “spy products” is definitely not subject to prosecution by law enforcement is kids spy gadgets. What boy doesn't dream of feeling like a secret agent? Who among us did not organize our own “special operations” as children and hunt down villains in our own yard?

The demand for such games gives rise to supply from the good old Chinese manufacturers. All the same online markets offer parents of future “James Bonds” a large assortment. Some products, of course, are simple toys. But some of them have certain technical potential.

Eavesdropping device Eastcolight 9812 - a locator for immersing yourself in the work of a real spy

Toys for children, first of all, should be educational, help the child socialize and get used to a certain role. That is why the Eastcolight 9812 eavesdropping device will not only provide your child with a lot of fun, but will also help him handle technology in the future and learn to perform certain social roles. The product is a special spy system consisting of a receiver dish (a locator for capturing noise), headphones for listening and a special device for recording audio materials. Thanks to this toy, your child will be able to feel like a real spy on a mission. The downside of the device is that it has replaceable batteries, which tend to discharge and require replacement.

A set of SIMA-LAND Special Forces radios as the best gift for studying radio waves and developing communication skills

Continuing the theme of the comprehensive development of a child, it is impossible not to note a special set of walkie-talkies, with which it is so convenient and pleasant to play spy reconnaissance or war games. The compact device is a real model of military radios transmitting information via radio waves within a radius of one hundred meters. Thanks to them, the baby will be able to communicate with his partner, imagine a special mission, and also carry out reconnaissance. Each device included in the kit is powered by one 9V battery. The main disadvantage is the rather limited range of radios, which is sometimes not enough to complete the “mission”.

Listening device Let's play together

Nothing criminal, just a children's gadget with which you can eavesdrop. Made in the style of the Teenage Mutant Ninja Turtles game. Includes headphones and bug.

Comparison table of spy gadgets

Name

Main characteristics

Price

Eastcolight 9812

Material: durable plastic, child's age: from 7 years, power: AAA batteries, LR41 batteries, telescope magnification: 6X.

SIMA-LAND Special Forces

Type: Walkie-talkie, material: Plastic, power type: 1*9V, range: 100 meters, weight: 197 g.

Listening device Let's play together

Material: durable plastic, child's age: from 7 years, power: LR54 batteries,

Beware, LAW!

We decided to end the review with the problem of the legality of using such devices. WE WARN: even the very fact of purchasing a miniature video camera or bug can end very, very badly for the user. IN Russian Federation officially introduced ban on the sale and purchase of spy equipment. Thus, the law obliges specialized stores to undergo the procedure licensing in the structures of the FSB. Moreover, spy gadgets even include VHF receivers. Every user of goods from such stores must obtain a license!!!

Back in 2011, the Constitutional Court of Russia recognized that it does not contradict the Constitution of the Russian Federation provision of Part 3 of Article 138 of the Criminal Code of the Russian Federation(“illegal production, sale or acquisition of special technical means intended for secretly obtaining information”). The article provides for punishment for the use of so-called bugs - means of secretly obtaining information and espionage. Punishment provided by law - from a fine of up to 200 thousand rubles and up to imprisonment for up to three years.

You may be subject to criminal liability for production, sale or acquisition of equipment intended for secretly obtaining information, but only if these actions are carried out without an appropriate license and if special technical means are developed specifically for the secret, “unobvious” obtaining of information and affect the constitutional rights of the individual.

To such special technical means include, for example, hidden video cameras and hidden microphones, listening devices telephone conversations. According to the law, only law enforcement officers and intelligence agencies have the right to use them in the course of operational-search activities, and the development, purchase and sale of “bugs” is possible only on the basis of a license issued by the FSB of Russia.

There are already known cases of court decisions directed at entrepreneurs selling spy gadgets and even a trial of one pensioner from Novocherkassk who simply bought a spy pen from the “spy gadgets” category on the Internet. Grandfather was detained at the moment of receiving the parcel and was given a year of suspended imprisonment.

The logic of the law is simple: by spying on someone, you are violating their rights. Either warn the person about your intentions, or don’t follow at all. It's hard to argue with this logic! And it is unlikely that we should fight the current rules and organize guerrilla purchases of portable video cameras. Just... be careful and don't rush into purchasing a device if you're not sure you can use it in accordance with existing legislation!