Filter By Category:  

New additions are coming to the handheld ANDRE Near-field Detection Receiver. REI is pleased to announce the ANDRE Deluxe featuring three new antenna attachments and a variety of accessories to make your investigations easier and more effective. Continue reading “New ANDRE Deluxe Offers Higher Frequency Detection Range, Ultrasonic Detection, and New Software”

New antenna extends frequency detection range to 12 GHz

ANDRE Deluxe TripodCOOKEVILLE, TN – June, 2018 — Research Electronics International (REI), a leading manufacturer of counter-surveillance equipment, announces the release of the ANDRE Deluxe Near-Field Detection Receiver. The ANDRE detects signal activity and displays a histogram of signal strength over time. It is a handheld broadband receiver capable of detecting covert electronics including GSM bugs, microphones, cameras, RF and Wi-Fi transmitters, and mobile phones. Applications may include:

  • RF emissions detection
  • Prison contraband
  • RF spectrum management
  • Executive protection
  • Technical surveillance countermeasures (TSCM)
  • Intelligence protection
  • Fraud detection at exam testing sites

The ANDRE’s success at detecting and locating the source of RF, infrared, visible light, carrier current and other types of transmissions has expanded in the new Deluxe model with several additional antennas/probes, accessories, software and operational features.

Continue reading “New ANDRE Deluxe Offers Higher Frequency Detection Range, Ultrasonic Detection, and New Software”

Integrated Spectrum Analyzers like OSCOR combine capabilities from multiple types of analyzers to locate signals, not just detect them.

In the last few decades, the volume of RF spectrum activity has exploded and shows no indication of slowing as the demand for wireless information transmission grows insatiably. The opportunity to use free airspace for good is equal to the ability for it to be used nefariously. RF safety and security efforts will face significant challenges in coming years to keep pace with increased opportunity for abuse.

One particular area of RF exploitation that is demonstrating significant expansion is illicit surveillance. Availability of cheaper and highly advanced surveillance products at the consumer level has taken technology that was once reserved for an elite field of intelligence specialists, and made it accessible to the average individual. Easy to use video and audio recording transmitters can be disguised and hidden in the most common, ordinary off the shelf products. These malicious devices are being produced in volume and marketed commercially with little restriction. A quick search for “hidden camera” on your favorite online retailer site may yield surprising results.

Continue reading “Using Spectrum Analyzers to Look for Unknown Signals”

GSM stands for Global System for Mobile communication and is a standard digital cellular network used in Europe and much of the world. GSM phones use removable SIM cards (Subscriber Identity Module) containing network access configurations. A GSM bug is a wireless listening device fitted with a SIM card using the GSM network, and can be accessed and controlled anywhere by a telephone call. GSM bugs can be concealed in common consumer products, appliances, electronic accessories, lamps, preferably items with access to unlimited power, but can also be battery powered. Reasons they are common: Continue reading “What is a GSM Bug?”

REI will be hosting four free seminars in May. The first two in Ottawa, Canada, and the next two near Washington, D.C. Each seminar will discuss the risks posed by electronic eavesdropping and illicit surveillance. There will be an overview of modern threats and eavesdropping techniques, as well as the countermeasures and equipment used to combat intelligence theft. Continue reading “Upcoming Seminars in D.C. and Ottawa”

REI’s Business Intelligence Protection Seminars explain the risks posed to businesses and individuals by electronic eavesdropping and illicit surveillance. Wrongful exposure of sensitive  information including merger or acquisition planning, marketing strategies, financial projections, or executive employee behavior can severely harm an organization. The mere perception of compromised information can lead to stock decline, negative publicity, damaged business relationships, and loss of customer confidence. BIPS offer practical instruction and techniques to guard against critical information loss.

Continue reading “Spring 2018 BIPS Announced”