Have you attended REI’s Training Center? If so, you can add those training courses to your LinkedIn profile under the Certifications section. This communicates to peers and potential employers that you’ve successfully completed technical security training at the world’s largest commercial center. Here’s how: Continue reading “Add REI Training To Your LinkedIn Profile”
A. Physical Line Test
The LINE and PHONE ports on the TALAN input panel are used when testing conductivity of analog, digital and VoIP cable conductors. This is where DMM, NLJD, FDR and other line tests can check for conductive anomalies on VoIP cables.
New antenna extends frequency detection range to 12 GHz
COOKEVILLE, TN – June, 2018 — Research Electronics International (REI), a leading manufacturer of counter-surveillance equipment, announces the release of the ANDRE Deluxe Near-Field Detection Receiver. The ANDRE detects signal activity and displays a histogram of signal strength over time. It is a handheld broadband receiver capable of detecting covert electronics including GSM bugs, microphones, cameras, RF and Wi-Fi transmitters, and mobile phones. Applications may include:
- RF emissions detection
- Prison contraband
- RF spectrum management
- Executive protection
- Technical surveillance countermeasures (TSCM)
- Intelligence protection
- Fraud detection at exam testing sites
The ANDRE’s success at detecting and locating the source of RF, infrared, visible light, carrier current and other types of transmissions has expanded in the new Deluxe model with several additional antennas/probes, accessories, software and operational features.
Integrated Spectrum Analyzers like OSCOR combine capabilities from multiple types of analyzers to locate signals, not just detect them.
In the last few decades, the volume of RF spectrum activity has exploded and shows no indication of slowing as the demand for wireless information transmission grows insatiably. The opportunity to use free airspace for good is equal to the ability for it to be used nefariously. RF safety and security efforts will face significant challenges in coming years to keep pace with increased opportunity for abuse.
One particular area of RF exploitation that is demonstrating significant expansion is illicit surveillance. Availability of cheaper and highly advanced surveillance products at the consumer level has taken technology that was once reserved for an elite field of intelligence specialists, and made it accessible to the average individual. Easy to use video and audio recording transmitters can be disguised and hidden in the most common, ordinary off the shelf products. These malicious devices are being produced in volume and marketed commercially with little restriction. A quick search for “hidden camera” on your favorite online retailer site may yield surprising results.
GSM stands for Global System for Mobile communication and is a standard digital cellular network used in Europe and much of the world. GSM phones use removable SIM cards (Subscriber Identity Module) containing network access configurations. A GSM bug is a wireless listening device fitted with a SIM card using the GSM network, and can be accessed and controlled anywhere by a telephone call. GSM bugs can be concealed in common consumer products, appliances, electronic accessories, lamps, preferably items with access to unlimited power, but can also be battery powered. Reasons they are common: Continue reading “What is a GSM Bug?”
REI will be hosting four free seminars in May. The first two in Ottawa, Canada, and the next two near Washington, D.C. Each seminar will discuss the risks posed by electronic eavesdropping and illicit surveillance. There will be an overview of modern threats and eavesdropping techniques, as well as the countermeasures and equipment used to combat intelligence theft. Continue reading “Upcoming Seminars in D.C. and Ottawa”
Not only can the VPC 2.0 capture video while in use, it also features a built-in microphone. This microphone adds the ability to provide voice descriptions of what the user is seeing. Pairing the audio along with the captured video provides essential context when reviewing the footage at a later time. Continue reading “Tech Note: Recording Audio with VPC 2.0”
REI’s Business Intelligence Protection Seminars explain the risks posed to businesses and individuals by electronic eavesdropping and illicit surveillance. Wrongful exposure of sensitive information including merger or acquisition planning, marketing strategies, financial projections, or executive employee behavior can severely harm an organization. The mere perception of compromised information can lead to stock decline, negative publicity, damaged business relationships, and loss of customer confidence. BIPS offer practical instruction and techniques to guard against critical information loss.
Recently a new OSCOR Firmware update was released on the REI website. This free download is available for the OSCOR Blue and OSCOR Green Spectrum Analyzers. In addition to performance improvements, two file and data operations have been added to the latest firmware.
Frequency Allocation Information
When generating a signal list, the OSCOR will automatically populate the comments field with information about the frequency band that a signal might be a part of for the currently selected ITU region. This information contains known regulatory or other uses of given frequency bands. Depending on the frequency there may be multiple allocations given. The frequency allocation information is also provided anytime that a signal is added to an existing signal list.
The TALAN is capable of detecting VoIP packets on VoIP phone systems using the 10/100 Mbps rate. The TALAN VoIP Test Adapter will force some Gigabit VoIP systems to auto-negotiate to the 10/100 Mbps rate. However, some VoIP network systems may not be fully compatible with the VoIP Test Adapter, or have been set up not to auto negotiate down. Below are compatibility issues that may be encountered and also solutions: