The Stealth Protect 1207i
· Portable device for the inspection and location of wireless Sources.
· 6 channels of detection for different kinds of protocols.
· Detection of GSM, CDMA, 3G, Bluetooth, Wi-Fi and Wi-Max.
· Can be used for tracing both regular sources and illegal RF eavesdropping devices.
· 6 bar graphs with 10 (segments each) for ac curate location of RF sources.
· 4 operation modes: Silent, Vibration, Visual and Beep
· 2 levels of sensitivity selections (attenuator)
· Extra display shows probable protocol
· Durable metallic body
· Microprocessor controlled
· Frequency range (up-link bands)
o CDMA 824-849 MHz
o GSM 880-920 MHz
o GSM (DCS) 1710-1790 MHz
o WCDMA, 3G, GSM (PCS), DECT 1920-2000 MHz
o Bluetooth, Wi-Fi 2400-2480 MHz
o Wi-Max 3000-6000 MHz
· Out of band attenuation 20-45 dB
· Antenna 2 Omni-directional antennas
· Detection distance 1-10 meters
· Operation time 10-15 hours
· Power 2 AAA (LR03) batteries
· Dimensions (without antennas) 120 x 70 x16 mm
· Weight 217 g
The Stealth Protect 1207i is a new measuring device which can be successfully used by engineers or counter surveillance specialists as a reliable tool for tracing different digital transmissions such as CDMA, GSM, Bluetooth, etc. New methods of ‘listening and watching’ with the help of modern technologies has become widely spread in our times. For example, a tiny GSM transmitter is accessible at practically any internet spy-shop for only $100~200 USD and can listen to all your conversations in the office or at home. And perhaps more importantly the Bluetooth protocol has been specially designed to transmit voices or conversations with high quality at a distance of up to 100 m – it can easily be used for bugging.
The sensitivity of a common RF detector (bug detector) is spread along a wide frequency range, usually 3 GHz, or even 6-7 GHz. This means the common detector cannot detect such weak and noncontiguous signals as Bluetooth, Wi-Fi or Wi-Max. Even more powerful signals like GSM-1800 are also hard to detect because of their low sensitivity at higher frequency ranges.
The only way to reliably detect wireless protocols is to use preselected chips (saw filters) which attenuate all other signals except the desired ones. This is the method implemented in the Protect Stealth 1207i which has 6 channels for different frequency ranges and can simultaneously detect 6 different kinds of transmissions at a distance much greater than any common RF detectors. Such qualities make the Stealth Protect 1207i a very desirable and reliable device during counter surveillance sweeps.
It is recommended that all sources of RF waves are detected in the premises during a search. It is necessary to determine the nature of every source – whether it is a regular transmitter like a Wi‐Fi access point or it has an unclear origin and thus should be inspected and probably removed.
Method to use wireless protocol devices for eavesdropping
§GSM, WCDMA, 3G
§ GSM baby‐monitor, GSM alarm, GSM bug
§ A small box with a SIM‐card inserted. It can transmit acoustics or conversations from a landline telephone to a pre‐programmed number via the GSM network.
§ GSM/GPRS/EDGE/3G video camera
§ Has a built‐in video camera and can transmit captured still images, video and acoustics. It is usually used for security observation but can also be used for illegal bugging.
§ GSM/CDMA spy phone, GPS tracker
§ A small device which can be installed in a target’s car or hidden among their items for personal tracing. Detects its own coordinates with the help of a built‐in GPS receiver and then transmits them with the help of the GSM/3G network or can record a trace into its built‐in memory.
§ Bluetooth bugging device, Spy phone
§ A small device which is only limited in its size by the desired battery source. If provided with an external power source, these devices can achieve a size of 1x1x0.5 cm. They are hardly detectable due to many technical facts.
§ Wi‐Fi bugging device
§ It can transmit acoustics or high quality videos using the standard wireless network. The information can then be easily forwarded onto the Internet and monitored from anywhere in the world. Controlling the device can also be done via the Internet.
§ Spy phone,
§ Wi‐Max bugging device
§ In addition to the possibilities provided by Wi‐Fi, Wi‐Max gives direct Internet access and a longer coverage distance. This can give the eavesdroppers practically unlimited possibilities in monitoring and control, including transmitting of acoustics, real‐time video, remote controlling, collecting information with a fast transfer time, etc.
• Silent Mode
- used in most cases for covert operation. The operator should watch the bar graphs in this mode
• Vibration Mode
- in this mode the unit’s vibrator turns on when reaching the threshold of any of the 6 bar graphs (the threshold can be selected in the setup mode)
• Visual Mode
- when the unit tries to recognize what protocol is being transmitted in the current signal and shows the results on the ‘EXTRA DATA’ display
• Listen mode
- when the unit’s speaker produces a demodulated signal