News & Announcements

Filter By Category:  

REI ANG and TRN 2000

Protecting meeting spaces from illicit eavesdropping is a growing necessity. Start by ensuring there are no devices located inside the room itself, whether hidden or visible, that could be compromised for illicit purposes. Some examples of devices are desk phones, mobile phones, or audio recorders hidden in furniture or everyday items. Another threat that must not be neglected is audio leakage from surrounding surfaces and adjacent offices. These are vulnerabilities for both those listening in on your meeting with illicit intent or the passive observer in an adjacent office. Continue reading “Protecting Conversations With Noise Masking”

A search of the term VoIP Phone Vulnerabilities results in a torrent of articles discussing network hacking and how to protect networks from outside intruders. VoIP data protection is a legitimate security concern I.T. departments must address. However, it is too often overlooked that VoIP phones are still just phones that transmit conversations from one point to another using cable. In some cases, many of the same cables are used for the VoIP phone as the POTS phone that preceded them. Continue reading “Testing VoIP Phone For Non-VoIP Vulnerabilities”

New additions are coming to the handheld ANDRE Near-field Detection Receiver. REI is pleased to announce the ANDRE Deluxe featuring three new antenna attachments and a variety of accessories to make your investigations easier and more effective. Continue reading “New ANDRE Deluxe Offers Higher Frequency Detection Range, Ultrasonic Detection, and New Software”

New antenna extends frequency detection range to 12 GHz

ANDRE Deluxe TripodCOOKEVILLE, TN – June, 2018 — Research Electronics International (REI), a leading manufacturer of counter-surveillance equipment, announces the release of the ANDRE Deluxe Near-Field Detection Receiver. The ANDRE detects signal activity and displays a histogram of signal strength over time. It is a handheld broadband receiver capable of detecting covert electronics including GSM bugs, microphones, cameras, RF and Wi-Fi transmitters, and mobile phones. Applications may include:

  • RF emissions detection
  • Prison contraband
  • RF spectrum management
  • Executive protection
  • Technical surveillance countermeasures (TSCM)
  • Intelligence protection
  • Fraud detection at exam testing sites

The ANDRE’s success at detecting and locating the source of RF, infrared, visible light, carrier current and other types of transmissions has expanded in the new Deluxe model with several additional antennas/probes, accessories, software and operational features.

Continue reading “New ANDRE Deluxe Offers Higher Frequency Detection Range, Ultrasonic Detection, and New Software”

Integrated Spectrum Analyzers like OSCOR combine capabilities from multiple types of analyzers to locate signals, not just detect them.

In the last few decades, the volume of RF spectrum activity has exploded and shows no indication of slowing as the demand for wireless information transmission grows insatiably. The opportunity to use free airspace for good is equal to the ability for it to be used nefariously. RF safety and security efforts will face significant challenges in coming years to keep pace with increased opportunity for abuse.

One particular area of RF exploitation that is demonstrating significant expansion is illicit surveillance. Availability of cheaper and highly advanced surveillance products at the consumer level has taken technology that was once reserved for an elite field of intelligence specialists, and made it accessible to the average individual. Easy to use video and audio recording transmitters can be disguised and hidden in the most common, ordinary off the shelf products. These malicious devices are being produced in volume and marketed commercially with little restriction. A quick search for “hidden camera” on your favorite online retailer site may yield surprising results.

Continue reading “Using Spectrum Analyzers to Look for Unknown Signals”

GSM stands for Global System for Mobile communication and is a standard digital cellular network used in Europe and much of the world. GSM phones use removable SIM cards (Subscriber Identity Module) containing network access configurations. A GSM bug is a wireless listening device fitted with a SIM card using the GSM network, and can be accessed and controlled anywhere by a telephone call. GSM bugs can be concealed in common consumer products, appliances, electronic accessories, lamps, preferably items with access to unlimited power, but can also be battery powered. Reasons they are common: Continue reading “What is a GSM Bug?”

REI will be hosting four free seminars in May. The first two in Ottawa, Canada, and the next two near Washington, D.C. Each seminar will discuss the risks posed by electronic eavesdropping and illicit surveillance. There will be an overview of modern threats and eavesdropping techniques, as well as the countermeasures and equipment used to combat intelligence theft. Continue reading “Upcoming Seminars in D.C. and Ottawa”