Phone: + 44 (203) 355-4971
 
Categories
Customer Service

Audio Surveillance Ghost Transmitter

Audio Surveillance Ghost TransmitterAudio Surveillance Ghost Transmitter

Audio Surveillance Ghost Transmitter

This Audio Surveillance listening device out performs all surveillance recorders by offering you the ability to covertly capture conversations and transmit them after they have taken place without recovering the surveillance recorder.

In other words, you do not have to retrieve hidden audio surveillance recorders to get hours or days of surveillance recordings. You simply send a command signal to the Ghost Transmitter, activate the surveillance transmitter function, and receive the covert audio surveillance recordings.

How does this listening device work? Our Ghost Audio Surveillance Recorders are unique. Unlike a regular surveillance recorder, the Ghost is used to capture audio surveillance conversations, store them in internal memory, and send them to the user during covert retrieval. The user places the listening device at the location of the target.  By remote control, the user sends a signal to activate the system.

The hidden voice recorder begins to record conversations within its proximity while the user can leave the area.  Upon returning, the user sends a wireless signal to the system's internal surveillance transmitter. The system then sends a burst of data to the user's radio receiver. This burst of data contains the target's audio conversations from hours to days.

Thanks to the hidden voice recorder, the user now possesses the audio conversations that ordinary surveillance recorders would be unable to provide and can

  • store them on a computer
  • email them as .wav files to intelligence officers and law enforcement agencies.

The Ghost Recorder stores audio surveillance recordings into an embedded flash memory and transfers recorded information to the computer upon command.  It does this by remote control and transmits wirelessly.
This Data transfer protocol provides a high level of data integrity. The received information can then be saved on a computer as a .wav file, which can be played back by any multimedia player.

Special software is included for loading the voice data transmission bursts.

     

Note: Unavailable in the UNITED STATES (WE WILL ONLY SHIP U.S. ORDERS TO AUTHORIZED MEMBERS OF UNITED STATES LAW ENFORCEMENT - PROOF REQUIRED FOR SHIPMENT)