New Products in 2012
TSCM Products
The Stealth P-1207i - Multi-channel wireless protocol detector
Features
· Portable device for the inspection and location of wireless Sources.
· 6 channels of detection for different kinds of protocols.
· Detection of GSM, CDMA, 3G, Bluetooth, Wi-Fi and Wi-Max.
· Can be used for tracing both regular sources and illegal RF eavesdropping devices.
· 6 bar graphs with 10 (segments each) for ac curate location of RF sources.
· 4 operation modes: Silent, Vibration, Visual and Beep
· 2 levels of sensitivity selections (attenuator)
· Extra display shows probable protocol
· Durable metallic body
· Microprocessor controlled
Specification
· Frequency range (up-link bands)
o CDMA 824-849 MHz
o GSM 880-920 MHz
o GSM (DCS) 1710-1790 MHz
o WCDMA, 3G, GSM (PCS), DECT 1920-2000 MHz
o Bluetooth, Wi-Fi 2400-2480 MHz
o Wi-Max 3000-6000 MHz
· Out of band attenuation 20-45 dB
· Antenna 2 Omni-directional antennas
· Detection distance 1-10 meters
· Operation time 10-15 hours
· Power 2 AAA (LR03) batteries
· Dimensions (without antennas) 120 x 70 x16 mm
· Weight 217 g
ACU-CPR3: See Through Wall Human Detector
Handheld easy-to-use See through Wall human detector, for the detection of human movement through walls or other solid objects.
FEATURES
· Very fast and simple to use the ACU-CPR3 hand held human movement detector can be operated with just one hand.
· Waterproof and robust construction the ACU-CPR3 see through wall radar is designed for police and military use.
· Intuitive operator interface with graphical display, clear and easy to use, with adjustable back-light for night time use.
· The See Through Wall Human Detector requires minimal operator training.
· Typical accurate detection range of the see through wall radar to a human in a 70 degree sector is 3-5 m behind a 20 cm concrete wall, 10 meters behind an interior wall, 25 meters without any obstacles.
· Sensitivity of the detection of human movement through walls of the device can be easily increased or decreased as needed. Movements such as "fans" etc filtered out and not detected, increasing the accuracy of human detection.
· Operates for more than 10 hours on internal standard batteries.
· Ergonomic, lightweight and robust case size 9/12x20x3 cm and 600 grams.
· Remote Management, up to 7 units can be monitored and controlled via bluetooth software management system.
· Reporting, history file can be accessed for post analysis.
The Stealth Protect Series
The Protect 1203 is a new device, which will detect different types of radio transmitting equipment and inform you by way of a bar graph indicator or silently by a vibrating indicator.
Features
- Reliable and tested device for different sweeping tasks
- Detect both analogue and digital transmissions
- Allows the operator to locate the source
- 10-segment indicator of RF level
- Vibrating signal for concealed indication of a high RF level Adjustable sensitivity
- Frequency range 30—6000 MHz
- Durable duralumin case
- Powered by 2 AAA batteries
- High sensitivity
- Last version includes the 'CITY' antenna; allowing the device to avoid interference from external sources in cities or near broadcasting towers etc.
New detector of wireless protocols and RF transmitters
The Stealth 1206 is a new class of a counter surveillance device. Unlike all typical searching devices it can detect modern ‘hidden’ bugs which use such protocols as Bluetooth, Wi-Fi, GSM and DECT. Such bugs, especially Bluetooth types, are practically undetectable by common RF detectors due to their very low transmitted power and a special type of modulation. The Stealth 1206 uses a separate channel with a high, (2.44GHz) frequency pre-selector to detect and locate Bluetooth and Wi-Fi with a much higher sensitivity. The unit also then processes the demodulated signal in order to identify which protocol has been detected. In addition the unit can detect all ‘classical’ eavesdropping devices and inspect them for the presence of correlation by sending sound impulses.
The Stealth P-1210 is a card-sized device that belongs to a new generation of personal sweeping equipment. It can be carried in a pocket or wallet and will not attract the attention of other people. When it is necessary, it will easily and quickly help you check for the presence of bugging devices in any given area.
The Stealth GSM-BOX II has been designed to detect and indicate the illegal activation of a mobile phone. In addition to this main functions, the Stealth GSM-BOX II also creates interference to the surrounding area of the telephone’s microphone by generating ‘white noise’ when radio-waves are detected; this noise suppresses the microphone in the telephone rendering it useless.
A reprogramming of your mobile phone, substitution of it, or being given a modified telephone will give other people access to the data in your telephone, or the ability to listen to all conversations around you from anywhere in the world. The Stealth GSM-SAFE II has been designed to detect the illegal activation of a mobile phone. In addition to this main function, the GSM-Safe II also creates interference to the surrounding area of the telephone’s microphone by generating ‘white noise’ when radio-waves are detected; this noise suppresses the microphone in the telephone rendering it useless.
The Stealth WEGA-i is unique device which created for professionals in the sphere of the surveillance countermeasures. Thanks to its optical principle the WEGA can discover lenses of all types of covert cameras not depending on their working state. The WEGA’s LED matrix radiates a powerful infrared beam which is then reflected by a video camera’s optics and is easily detected by the operator. The IR-filtering glass built into the WEGA helps the operator to avoid natural reflections from surfaces and concentrate on finding the exact location of a hidden camera.
The Stealth MNG-300 Skeller generates white acoustic noise in the speech frequency range of 250-4500 Hertz. Sound interference is put onto the recording and makes its quality worse. Due to a uniform distribution of white noise along the whole sound range, clearance of the obtained recording is impossible. The unit should be placed near the designated person to be protected. A digital-analog synthesizer is used to produce the noise.
The Stealth DNG-2300 is designed to prevent listening though devices that cannot be detected by conventional countermeasures and installed around the perimeter of a room – wired wall microphones,
contact microphones, AC outlet transmitters and window systems based on the reflection of laser/infrared/microwave beams. It is an excellent addition to high level countermeasures.
It uses a combination of transducers and speakers placed strategically throughout a target area to create a blanket of masking noise that covers private conversations from eavesdropping.
The DRUID is an unique system for providing protection for a human’s speech. Not all listening devices can be detected by existing methods. Remotely controlled radio microphones, wired
microphones, passive resonators, miniature voice recorders – practically all these devices cannot be detected by conventional methods. Even a modern cellular phone may contain a digital voice
recorder; this means that any phone lying on the desktop could be used by an adversary to record a conversation.
The generated audio interference cannot be cleared by any noise-clearance methods. At the same time the produced interference does not create any inconvenience to the participants of the negotiation
thanks to the special headsets. The DRUID headset allows users to hear each other with crystal quality. Each headset can be adjust the level of microphone and earphone for the individual user
and environment.
Car Black Box
Car Black Box is the combination of technologies (Video Cameras, GPS, DVR, G-Shock Sensor) to monitor everything your car does and its environment. It records video and audio, location, date, time, speed, brake application, road conditions, etc. This information can be used to apportion liability in the event of an accident or as evidence in court for defense or prosecution and monitor to correct driver’s behavior for safety.
The recorded information can be reviewed on the viewer application come with the Car Black Box. Many of Viewer application support to save the the A/V data into the commom video format such as Mpeg4 and Avi and images to Jpeg.
More Info