Welcome to the | |||||||||||||||||||||||||||||
Did it work? .... well the laptop thieves evaded a sixty two camera system (all overt and none of it Doktor Jons work), but were caught, arrested and sentenced as a direct result of the images captured on this single hidden camera (example images available soon). The simple fact is that their is practically no end of options for disguising Co-veillance cameras; but wherever they are placed, it must be for the right reasons; and of course, they must be operated in a responsible and thoroughly appropriate manner. If you want a covert camera to operate successfully, the key of course, is very careful planning. If you follow Doktor Jons suggestions on possible target movements, and in particular the theory behind the "Cone of Containment", it should help to identify the cameras key locations, to achieve the best overall quality images. It is important to remember that if a camera is mounted in a false ceiling looking downwards, alignment will need to be absolutely critical; as with many covert operations, some amount of calculation will undoubtedly be required.
To get a better idea about some of the more important factors to consider, "click here" | |||||||||||||||||||||||||||||
IMPORTANT: No material may be reproduced, copied or redistributed from this site, © doktorjon.co.uk 2004 - 2008 Homepage...:...Gateway...:...Technical Gateway....:....Quickfind Index....:....Equipment Directory | |||||||||||||||||||||||||||||