Digiscan Labs Protect 1207i Podręcznik użytkownika - Strona 3
Przeglądaj online lub pobierz pdf Podręcznik użytkownika dla Czujniki bezpieczeństwa Digiscan Labs Protect 1207i. Digiscan Labs Protect 1207i 12 stron.
The sensitivity of a common RF detector (bug detector) is spread along a wide
frequency range, usually 3, or even 6-7 GHz. This means the common detector
cannot detect such weak and non-continuous signals as Bluetooth, Wi-Fi or
Wi-Max. Even more powerful signals like GSM-1800 are also hard to detect
because of their low sensitivity at higher frequency ranges.
The only way to reliably detect wireless protocols is to use pre-selector chips
(saw filters) which attenuate all other signals except the desired ones. This is
the method implemented in the Protect 1207i which has 6 channels for
different frequency ranges and can simultaneously detect 6 different kinds of
transmissions at a distance much greater than any common RF detectors.
Such qualities make the Protect 1207i a very desirable and reliable device
during counter surveillance sweeps.
It is recommended that all sources of RF waves are detected in the premises
during a search. It is necessary to determine the nature of every source -
whether it is a regular transmitter like a Wi-Fi access point or it has an unclear
origin and thus should be inspected and probably removed.
Ways of eavesdropping
The following are the most probable ways of eavesdropping with the use of
wireless protocols:
GSM/WCDMA/3G/LTE
GSM baby-monitor/GSM alarm/GSM bug
A small box with a SIM-card insert. Can transmit acoustics or conver-
sations from a landline telephone to a pre-programmed number via
the GSM network. Can be controlled form a pre-programmed number
with the help of SMS or programmed from a PC. It is powered from a
mains supply and has its own rechargeable backup battery.
GSM/GPRS/EDGE/3G/LTE video camera
Has a built-in video camera and can transmit captured still images,
video and acoustics. It is usually used for security observation but
can also be used for illegal bugging. On the GSM network still
images can be transferred with the use of GPRS/EDGE, but 3G
allows for the passing of real-time videos.
Spy phone
A cellular telephone converted into a 'spy phone' with the help of spe-
cial, illegally installed software. The software allows the illegal listener
to activate the microphone of the telephone and transmit acoustics to
a pre-programmed number. The control of this device is accompli-
shed in a similar way - by SMS or from a PC.
3