The REI Training Center will finish 2018 having trained the largest number of students ever. Over 50 classes were conducted at the Training Center in Cookeville, Tennessee. Scheduled classes ranged from one to five days in length. In addition to the scheduled training classes at REI, our 6 full-time instructors were kept busy throughout the year with onsite and offsite custom training courses.
Reasons for greater interest
The interest correlates directly to a greater need for quality professional training on ways to protect against information theft and illicit technical surveillance. Continue reading “TSCM Training On The Rise”
Protecting meeting spaces from illicit eavesdropping is a growing necessity. Start by ensuring there are no devices located inside the room itself, whether hidden or visible, that could be compromised for illicit purposes. Some examples of devices are desk phones, mobile phones, or audio recorders hidden in furniture or everyday items. Another threat that must not be neglected is audio leakage from surrounding surfaces and adjacent offices. These are vulnerabilities for both those listening in on your meeting with illicit intent or the passive observer in an adjacent office. Continue reading “Protecting Conversations With Noise Masking”
A search of the term VoIP Phone Vulnerabilities results in a torrent of articles discussing network hacking and how to protect networks from outside intruders. VoIP data protection is a legitimate security concern I.T. departments must address. However, it is too often overlooked that VoIP phones are still just phones that transmit conversations from one point to another using cable. In some cases, many of the same cables are used for the VoIP phone as the POTS phone that preceded them. Continue reading “Testing VoIP Phone For Non-VoIP Vulnerabilities”
New additions are coming to the handheld ANDRE Near-field Detection Receiver. REI is pleased to announce the ANDRE Deluxe featuring three new antenna attachments and a variety of accessories to make your investigations easier and more effective. Continue reading “New ANDRE Deluxe Offers Higher Frequency Detection Range, Ultrasonic Detection, and New Software”
REI uses PnP (Pick and Place) machines to manufacture the circuit boards used in REI products. By upgrading these machines, REI is committed to providing the best technolgically advanced products possible in the near future. Continue reading “REI Advances Internal Technology”
Have you attended REI’s Training Center? If so, you can add those training courses to your LinkedIn profile under the Certifications section. This communicates to peers and potential employers that you’ve successfully completed technical security training at the world’s largest commercial center. Here’s how: Continue reading “Add REI Training To Your LinkedIn Profile”
A. Physical Line Test
The LINE and PHONE ports on the TALAN input panel are used when testing conductivity of analog, digital and VoIP cable conductors. This is where DMM, NLJD, FDR and other line tests can check for conductive anomalies on VoIP cables.
Continue reading “Connecting VoIP to TALAN 3.0”
New antenna extends frequency detection range to 12 GHz
COOKEVILLE, TN – June, 2018 — Research Electronics International (REI), a leading manufacturer of counter-surveillance equipment, announces the release of the ANDRE Deluxe Near-Field Detection Receiver. The ANDRE detects signal activity and displays a histogram of signal strength over time. It is a handheld broadband receiver capable of detecting covert electronics including GSM bugs, microphones, cameras, RF and Wi-Fi transmitters, and mobile phones. Applications may include:
- RF emissions detection
- Prison contraband
- RF spectrum management
- Executive protection
- Technical surveillance countermeasures (TSCM)
- Intelligence protection
- Fraud detection at exam testing sites
The ANDRE’s success at detecting and locating the source of RF, infrared, visible light, carrier current and other types of transmissions has expanded in the new Deluxe model with several additional antennas/probes, accessories, software and operational features.
Continue reading “New ANDRE Deluxe Offers Higher Frequency Detection Range, Ultrasonic Detection, and New Software”
Integrated Spectrum Analyzers like OSCOR combine capabilities from multiple types of analyzers to locate signals, not just detect them.
In the last few decades, the volume of RF spectrum activity has exploded and shows no indication of slowing as the demand for wireless information transmission grows insatiably. The opportunity to use free airspace for good is equal to the ability for it to be used nefariously. RF safety and security efforts will face significant challenges in coming years to keep pace with increased opportunity for abuse.
One particular area of RF exploitation that is demonstrating significant expansion is illicit surveillance. Availability of cheaper and highly advanced surveillance products at the consumer level has taken technology that was once reserved for an elite field of intelligence specialists, and made it accessible to the average individual. Easy to use video and audio recording transmitters can be disguised and hidden in the most common, ordinary off the shelf products. These malicious devices are being produced in volume and marketed commercially with little restriction. A quick search for “hidden camera” on your favorite online retailer site may yield surprising results.
Continue reading “Using Spectrum Analyzers to Look for Unknown Signals”
GSM stands for Global System for Mobile communication and is a standard digital cellular network used in Europe and much of the world. GSM phones use removable SIM cards (Subscriber Identity Module) containing network access configurations. A GSM bug is a wireless listening device fitted with a SIM card using the GSM network, and can be accessed and controlled anywhere by a telephone call. GSM bugs can be concealed in common consumer products, appliances, electronic accessories, lamps, preferably items with access to unlimited power, but can also be battery powered. Reasons they are common: Continue reading “What is a GSM Bug?”