Digiscan Labs Protect 1207i User Manual

USER MANUAL
USER MANUAL
Multi-channel detector
of wireless protocols
Features
The Protect 1207i is a new measuring device which can be successfully used by engineers or counter surveillance specialists as a reliable tool for tracing different digital transmissions such as GSM, Bluetooth, etc. New methods of 'listening and watching' with the help of modern technologies has become widely spread in our times. For example, a tiny GSM transmitter is accessible at practically any internet spy-shop for only 100-200 USD and can listen to all your conversations in the office or at home. And perhaps more importantly the Bluetooth protocol has been specially designed to transmit voices or conver­sations with high quality at a distance of up to 100 m - it can easily be used for bugging.
Portable device for the inspection and location of wireless sources 6 channels of detection for different kinds of protocols Detection of GSM/CDMA/3G/LTE Detection of Bluetooth/Wi-Fi/Wi-Max Can be used for tracing both regular sources and illegal eavesdropping devices 6 bar graphs with 10-segments each, for accurate location of RF sources 4 modes: Silent, Vibration, Visual and Listen 2 levels of sensitivity (attenuator) Extra display shows probable protocol Durable metallic body Microprocessor controlled
Setup mode with selection the threshold level for vibration
824-849 MHz 880-920 MHz 1710-1790 MHz 1920-2000 MHz 2400-2480 MHz
2500-7000 M
Hz
2 Omni-directional antennas
Frequency range (up-link bands) CDMA, LTE800(4G) GSM GSM (DCS) WCDMA, 3G, GSM (PCS), DECT Bluetooth, Wi-Fi Wi-Max/Wi-Fi High/LTE(4G)
Out of band attenuation Antenna Detection distance Operation time Power
Dimensions (without antennas) Weight 217 g
20-45 dB
1-10 meters
10-15 hours
2 AAA (LR03) batteries
120 x 70 x16 mm
2
3
cannot detect such weak and non-continuous signals as Bluetooth, Wi-Fi or Wi-Max. Even more powerful signals like GSM-1800 are also hard to detect because of their low sensitivity at higher frequency ranges.
The only way to reliably detect wireless protocols is to use pre-selector chips (saw filters) which attenuate all other signals except the desired ones. This is the method implemented in the Protect 1207i which has 6 channels for different frequency ranges and can simultaneously detect 6 different kinds of transmissions at a distance much greater than any common RF detectors. Such qualities make the Protect 1207i a very desirable and reliable device during counter surveillance sweeps.
It is recommended that all sources of RF waves are detected in the premises during a search. It is necessary to determine the nature of every source ­whether it is a regular transmitter like a Wi-Fi access point or it has an unclear origin and thus should be inspected and probably removed.
The following are the most probable ways of eavesdropping with the use of wireless protocols:
Ways of eavesdropping
A small box with a SIM-card insert. Can transmit acoustics or conver­sations from a landline telephone to a pre-programmed number via the GSM network. Can be controlled form a pre-programmed number with the help of SMS or programmed from a PC. It is powered from a
GSM/WCDMA/3G/LTE
Has a built-in video camera and can transmit captured still images, video and acoustics. It is usually used for security observation but can also be used for illegal bugging. On the GSM network still images can be transferred with the use of GPRS/EDGE, but 3G
A cellular telephone converted into a 'spy phone' with the help of spe­cial, illegally installed software. The software allows the illegal listener to activate the microphone of the telephone and transmit acoustics to a pre-programmed number. The control of this device is accompli-
The sensitivity of a common RF detector (bug detector) is spread along a wide frequency range, usually 3, or even 6-7 GHz. This means the common detector
GSM baby-monitor/GSM alarm/GSM bug
mains supply and has its own rechargeable backup battery.
GSM/GPRS/EDGE/3G/LTE video camera
allows for the passing of real-time videos.
Spy phone
shed in a similar way - by SMS or from a PC.
4
A small device which is only limited in its size by the desired battery source. If provided with an external power source these devices can achieve a size of 1x1x0.5 cm. They are hardly detectable due to:
1) low power, non-constant transmissions at relatively high frequency ranges; 2) the possibility of remote deactivation thanks to the duplex possibility of Bluetooth; 3) The possibility of gathering information, hol­ding it and then transferring it by remote inquiry during night time -this means that no radio waves are sent during working hours 4) its small size.
A small device which can be installed in a target's car or hidden among their items for personal tracing. Detects its own coordinates with the help of a built-in GPS receiver and then transmits them with the help of the GSM/3G network or can record a trace into its built-in memory. Most of these devices also have a built-in microphone and allow the operator to listen to acoustics in addition to knowing its
Bluetooth
Spy phone Similar to GSM, the acoustics around the telephone can be picked up and transmitted via Bluetooth if the telephone has special 'spy' soft­ware pre-installed.
Wi-Fi/Wi-Max
Wi-Fi bugging device Can transmit acoustics or high quality videos using the standard wireless network. The information can then be easily forwarded onto the Internet and monitored from anywhere in the world. Controlling the device can also be done via the Internet.
Wi-Max bugging device In addition to the possibilities provided by Wi-Fi, Wi-Max gives direct Internet access and a longer coverage distance. This can give the eavesdroppers practically unlimited possibilities in monitoring and control, including transmitting of acoustics, real-time video, remote controlling, collecting information with a fast transfer time, etc.
Spy phone Again, having pre-installed 'spy' software in a mobile phone with Wi-Fi (i.e. a Smartphone) allows the eavesdropper to listen to the surrounding acoustics in real-time or they can initiate the downloa­ding of pre-captured data.
GPS tracker
coordinates.
Bluetooth bugging device
The Protect 1207i has been designed to detect all of the mentioned kinds of bugging devices.
Loading...
+ 8 hidden pages