EasyManua.ls Logo

iPROTECT 1217 - Page 6

iPROTECT 1217
16 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
BA ND S
Mobile communication (MBL1, MBL2, MBL3 and MBL4 groups)
The use of mobile communication has a number of advantages for covert surveillance:
1 Broadband channels enable transmission of high quality audio or video
2 There is no need to organize a control post near the surveillance object. The data
transmission is performed via the Internet. Recording into a cloud service is possible.
3 Remote control of the device is possible.
4 A convenient channel for transmitting the position of a vehicle (GPS trackers).
5 The possibility of information accumulation and a quick transmission according to a
schedule, or upon request.
6 The typical nature of the signal is a contributing factor for masking any surveillance.
Thanks to a wide coverage, unlimited distance and high quality of information transmission,
secret surveillance devices are using mobile communications increasingly frequently; while
the mass production of components for developers, such as GSM, 3G, 4G/LTE and 5G modules,
enable the development of cheap and quickly hidden bugging devices with high quality
The main types of the covert surveillance devices that use mobile communication:
A hidden wireless microphone
A hidden spy camera (possibly with a microphone)
An “infected” mobile telephone that transmits video and/or acoustics around itself
without its owner's knowledge
The deliberate use of a telephone for audio or video transmission
GPS trackers (beacons), which enable tracking of a car's coordinates
The iProtect 1217 can detect all types of secret surveillance devices which use mobile
communication and transmit a radio signal during a search.
Signals of DECT cordless phones (DECT group)
This standard was developed for cordless home phones. Most countries have an allocation for
its frequency band. The DECT standard has a high quality of sound transmission and an element
base available for the creation of a hidden spy device. It is possible to modify a household
appliance, for example, a baby monitor, for the purposes of covert surveillance.
The iProtect 1217 detects DECT signals which are active during a search.
ISM signals (ISM group)
ISM bands (Industrial, Science, Medicine) do not require licensing and are used by a number of
household and industrial appliances. The ISM group has the following bands:
433.05-434.79 MHz (Europe)
863-870 MHz (Europe)
902-928 MHz (the USA)
6
transmission of sound, video or location coordinates.
Remote controls, alarm sensors, Smart Home systems, various sensors, etc., function at these
frequencies. LoRa, DASH7, IEE 802.11ah, CC430, NB-IoT protocols and others are used.