The Stealth Protect 1207i


·   Portable device for the inspection and location of wireless Sources.

·   6 channels of detection for different kinds of protocols.

·   Detection of GSM, CDMA, 3G, Bluetooth, Wi-Fi and Wi-Max.

·   Can be used for tracing both regular sources and illegal RF eavesdropping devices.

·   6 bar graphs with 10 (segments each) for ac curate location of RF sources.

·   4 operation modes: Silent, Vibration, Visual and Beep

·   2 levels of sensitivity selections (attenuator)

·   Extra display shows probable protocol

·   Durable metallic body

·   Microprocessor controlled



·   Frequency range (up-link bands)

o           CDMA                                                  824-849 MHz

o           GSM                                                     880-920 MHz                

o           GSM (DCS)                                           1710-1790 MHz 

o           WCDMA, 3G, GSM (PCS), DECT           1920-2000 MHz

o           Bluetooth, Wi-Fi                                                2400-2480 MHz

o           Wi-Max                                                 3000-6000 MHz

·   Out of band attenuation                               20-45 dB

·   Antenna                                                      2 Omni-directional antennas

·   Detection distance                                      1-10 meters

·   Operation time                                            10-15 hours

·   Power                                                         2 AAA (LR03) batteries

·   Dimensions (without antennas)                     120 x 70 x16 mm

·   Weight                                                        217 g


The Stealth Protect 1207i is a new measuring device which can be successfully used by engineers or counter surveillance specialists as a reliable tool for tracing different digital transmissions such as CDMA, GSM, Bluetooth, etc. New methods of ‘listening and watching’ with the help of modern technologies has become widely spread in our times. For example, a tiny GSM transmitter is accessible at practically any internet spy-shop for only $100~200 USD and can listen to all your conversations in the office or at home. And perhaps more importantly the Bluetooth protocol has been specially designed to transmit voices or conversations with high quality at a distance of up to 100 m – it can easily be used for bugging.


The sensitivity of a common RF detector (bug detector) is spread along a wide frequency range, usually 3 GHz, or even 6-7 GHz. This means the common detector cannot detect such weak and noncontiguous signals as Bluetooth, Wi-Fi or Wi-Max. Even more powerful signals like GSM-1800 are also hard to detect because of their low sensitivity at higher frequency ranges.


The only way to reliably detect wireless protocols is to use preselected chips (saw filters) which attenuate all other signals except the desired ones. This is the method implemented in the Protect Stealth 1207i which has 6 channels for different frequency ranges and can simultaneously detect 6 different kinds of transmissions at a distance much greater than any common RF detectors. Such qualities make the Stealth Protect 1207i a very desirable and reliable device during counter surveillance sweeps.


It is recommended that all sources of RF waves are detected in the premises during a search. It is necessary to determine the nature of every source – whether it is a regular transmitter like a WiFi access point or it has an unclear origin and thus should be inspected and probably removed.


Method to use wireless protocol devices for eavesdropping


§  GSM babymonitor, GSM alarm, GSM bug

§ A small box with a SIMcard inserted. It can transmit acoustics or conversations from a landline telephone to a preprogrammed number via the GSM network.

§  GSM/GPRS/EDGE/3G video camera

§ Has a builtin video camera and can transmit captured still images, video and acoustics. It is usually used for security observation but can also be used for illegal bugging.

§  GSM/CDMA spy phone, GPS tracker

§ A small device which can be installed in a target’s car or hidden among their items for personal tracing. Detects its own coordinates with the help of a builtin GPS receiver and then transmits them with the help of the GSM/3G network or can record a trace into its builtin memory.



§  Bluetooth bugging device, Spy phone

§ A small device which is only limited in its size by the desired battery source. If provided with an external power source, these devices can achieve a size of 1x1x0.5 cm. They are hardly detectable due to many technical facts.


§Wi-Fi, Wi-Max

§  WiFi bugging device

§ It can transmit acoustics or high quality videos using the standard wireless network. The information can then be easily forwarded onto the Internet and monitored from anywhere in the world. Controlling the device can also be done via the Internet.

§  Spy phone,

§  WiMax bugging device

§ In addition to the possibilities provided by WiFi, WiMax gives direct Internet access and a longer coverage distance. This can give the eavesdroppers practically unlimited possibilities in monitoring and control, including transmitting of acoustics, realtime video, remote controlling, collecting information with a fast transfer time, etc.


Operation mode

                                   Silent  Mode

-   used in most cases for covert operation. The operator should watch the bar graphs in this mode

                                   Vibration Mode

-   in this mode the unit’s vibrator turns on when reaching the threshold of any of the 6 bar graphs (the threshold can be selected in the setup mode)

       Visual Mode

-   when the unit tries to recognize what protocol is being transmitted in the current signal and shows the results on the ‘EXTRA DATA’ display

       Listen mode

-   when the unit’s speaker produces a demodulated signal