Protect-1207i-User-Manual
Protect-1207i-User-Manual
2
home. And perhaps more importantly the Bluetooth protocol has been
specially designed to transmit voices or conversations with high quality
at a distance of up to 100 m - it can easily be used for bugging.
3
Ways of eavesdropping
The following are the most probable ways of eavesdropping with the use
of wireless protocols:
GSM/WCDMA/3G/LTE
GSM baby-monitor/GSM alarm/GSM bug
A small box with a SIM-card insert. Can transmit acoustics or
conversations from a landline telephone to a pre-programmed
number via the GSM network. Can be controlled form a pre-
programmed number with the help of SMS or programmed from
a PC. It is powered from a mains supply and has its own
rechargeable backup battery.
Spy phone
A cellular telephone converted into a 'spy phone' with the help
of special, illegally installed software. The software allows the
illegal listener to activate the microphone of the telephone and
transmit acoustics to a pre-programmed number. The control of
this device is accomplished in a similar way - by SMS or from a
PC.
GPS tracker
A small device which can be installed in a target's car or
hidden among their items for personal tracing. Detects its own
coordinates with the help of a built-in GPS receiver and then
transmits them with the help of the GSM/3G network or can
record a trace into its built-in memory. Most of these devices
also have a built-in microphone and allow the operator to listen
to acoustics in addition to knowing its coordinates.
4
Bluetooth
Bluetooth bugging device
A small device which is only limited in its size by the desired
battery source. If provided with an external power source these
devices can achieve a size of 1x1x0.5 cm. They are hardly
detectable due to:
1) low power, non-constant transmissions at relatively high
frequency ranges; 2) the possibility of remote deactivation
thanks to the duplex possibility of Bluetooth; 3) The possibility
of gathering information, holding it and then transferring it by
remote inquiry during night time - this means that no radio
waves are sent during working hours; 4) its small size.
Spy phone
Similar to GSM, the acoustics around the telephone can be
picked up and transmitted via Bluetooth if the telephone has
special 'spy' software pre-installed.
Wi-Fi/WiMAX
Wi-Fi bugging device
Can transmit acoustics or high quality videos using the standard
wireless network. The information can then be easily forwarded
onto the Internet and monitored from anywhere in the world.
Controlling the device can also be done via the Internet.
Spy phone
Again, having pre-installed 'spy' software in a mobile phone
with Wi-Fi (i.e. a Smartphone) allows the eavesdropper to
listen to the surrounding acoustics in real-time or they can
initiate the downloading of pre-captured data.
WiMAX bugging device
In addition to the possibilities provided by Wi-Fi, WiMAX gives
direct Internet access and a longer coverage distance. This
can give the eavesdroppers practically unlimited possibilities in
monitoring and control, including transmitting of acoustics,
real-time video, remote controlling, collecting information with
a fast transfer time, etc.
The Protect 1207i has been designed to detect all of the mentioned
kinds of bugging devices.
5
Bargraphs
The Protect 1207i has 6, 10-segment, 'SIGNAL STRENGTH' bar graph
indicators providing the following precise information to the operator:
GSM 1800
The closer the unit is to the source of transmission the higher the bar
graph level will be. Some powerful sources may cause full illumination of
the display (this also happens when the unit is in close proximity to a
transmitter). In such cases use the attenuator function (ATT +/ ATT-
buttons) to alter the sensitivity.
It is also recommended to use the attenuator when there are many
background noises in the area which can create difficulties before a
search. Please note: The vibration function will turn on when the SIGNAL
STRENGTH of any of the bar graph indicators approaches the level
selected in the setup mode.
6
Joystick controls and operation mode
The right arrow on the joystick control of the
Protect 1207i is used for selecting the desired
indication method. There are four modes
available:
Silent - used in most cases for covert
operation. The operator should watch the
bar graphs in this mode
Listen mode, when the unit's speaker
produces a demodulated signal
Visual mode, when the unit tries to recognize what protocol is being
transmitted in the current signal and shows the results on the
‘EXTRA DATA' display.
Vibration, in this mode the unit's vibrator turns on when reaching the
threshold of any of the 6 bar graphs (the threshold can be selected
in the setup mode)
The Vibration mode is convenient when probing difficult to reach objects
and places. The operator can work without the necessity of watching the
bar graphs a high RF level will be indicated only by the Protect 1207i's
vibration.
The Visual mode can be turned on when help is needed in detecting what
kind of protocol is being transmitted in the near vicinity. The ‘EXTRA
DATA' display will show the results in this case.
The Listen mode is convenient for a fast search as an experienced
operator may be able to distinguish between different types of signals.
(Please note that this mode is not suitable for covert searches, as the
transmitter will 'hear' sounds in the room.)
The left arrow of the joystick returns the unit to 'SILENT' mode.
Pressing the joystick's button will turn on the Listen mode temporarily
Setup mode
Press and hold the joystick's button and then turn the Protect 1207i
on. Use the arrow up or down to select the threshold level for vibration.
After this procedure has been completed press the joystick's button to
start normal operation.
Power
The Protect 1207i is powered by two AAA (LR03) batteries. It is recom-
mended to use alkaline batteries in order to reach optimal working
duration. The 'LOW BATT' indicator will turn on when the batteries are
nearing exhaustion.
7
Usage
Sweeping the room
Please note that the Protect 1207i is an auxiliary device which detects
communication protocols only. For full, irrefragable results the premises
or vehicleshould be swept with a number of different types of equipment,
including wide-band RF detectors, radio-monitoring scanning systems,
non-linear junction detectors, video-camera detectors, thermal vision
devices, etc.
A wireless detector is an additional but irreplaceable component for
such a professional kit and due to its qualities the Protect 1207i is the
best selection.
Before starting sweeping, some preparation tasks should be carried out.
Firstly, it is necessary to consider the time and individual circumstances
of the sweep. Due to there being lots of devices which are remotely
controlled it is recommended to carry out a sweep during working
hours in real situations when the eavesdropper most wants to listen. It
may be necessary to arrange a fictitious meeting. Nobody has to know
about the pending search.
Close all drapes in the room. Turn on all the lights and activate any
other devices to imitate normal conditions. It is also advisable to turn
on a source of sound such as a stereo system or radio. This sound source
has two very important functions:
Voice activated transmitters will be activated
Your actions will be masked
To avoid false detections turn off all RF transmitting
devices before starting the sweeping procedure:
Wi-Fi routers and Wi-Fi devices
(printers, video cameras, laptops, etc.)
Cordless phones
Cell phones
Bluetooth devices, etc.
1. Enter the room and turn on your Protect 1207i. Watch the bar graphs
and if they show increased levels (more than 4-5 segments), turn on
the attenuator by shifting the joystick in the upper direction (ATT+).
The corresponding LED will show the attenuator has been turned on.
Note: Later you can turn off the attenuator by pushing the joystick
in the opposite direction.
2. Choose the operation mode by sequentially shifting the joystick to the
right:
8
Silent - the default mode which is automatically selected after
turning the unit on. It can also be selected in the sequence of
modes (joystick right) or chosen quickly by shifting the joystick
to the left. This mode is useful when a covert procedure is
necessary.
The Listen mode is more convenient for locating and inspecting
the RF source as the operator can learn about the source by
hearing the demodulated signal. An experienced operator may
be able to distinguish between different kinds of transmission:
Bluetooth gives a 'crackling' sound
Wi-Fi will produce a 'scratching' sound
GSM gives a 'buzzing' (hum)
DECT is heard as an AC transformer hum
Note: The above is a guideline only as the sound may vary
depending on the current mode of transmission and the type of
the protocol used in the specific country.
The Listen mode can be turned on temporarily from any mode
by pressing and holding the joystick's button.
The Visual mode gives extra information to the operator by
showing a suggested protocol on the display. The recognition is
based on analyzing the demodulated signal and is in most cases
sufficiently accurate. Enter this mode when inspecting the RF
source.
The Vibration mode allows the operator to avoid constantly
watching the bar graphs when inspecting areas that are difficult
to access, and to achieve secrecy during a sweeping procedure.
By default the vibration turns on when a constant signal has
reached a bar graph level of 5. You can use the Setup mode to
change this threshold: Firstly, turn off the Protect 1207i by
pressing and holding the joystick's button, then turn the unit on
again in the normal manner. Use the up/down arrow to select
the desired threshold level of vibration. After this procedure has
been completed press the joystick's button to start normal
operation.
3. Move around the room with the Protect 1207i while watching its bar
graphs or paying attention to the vibrator. Turn the lights and
other equipment in the room on and off. Walk around the room,
continuously watching the indicator or feeling for the Protect's
vibration. The bar graph level will increase or decrease when the
detector is closer to, or farther away from a transmitting device.
9
Probe all objects which may contain a hidden surveillance device.
When you get close to an RF transmitting device some of the bar
graphs of your Protect 1207i will rise (or the vibration will appear).
10
search more carefully as eavesdroppers often install more than one
device. They may install a so called 'foolish bug' which may be
easily detected and some other well hidden devices that may have
remote control and non-standard modulation.
Testing people
The Protect 1207i can be used for detecting the following bugs carried
on people:
Mobile phones, set up in the listening mode (intentionally by
establishing a call or secretly with the help of the 'spy software')
Bluetooth transmitters (real listening devices or conventional
Bluetooth devices converted into bugs - headsets, headphones,
etc)
Personal GPS trackers
11
Different kinds of listening and watching devices using communi-
cation protocols for transmission
Testing procedure
If necessary turn on the attenuator. While carrying the
Protect 1207i, approach the person. An increased level on a bar
graph will show activity at the corresponding range, which can
mean the person has a transmitting device. If you change
location you will need to select the necessary attenuator mode
in accordance with the background noise.
Another way of testing people is to place the Protect 1207i
on the desktop and watch the bar graphs carefully when the
person approaches the table and sits down.
12
C) Watch the GSM and 3G bargraphs on the Protect 1207i.
Typical periodical increases might be a sign of the tracker
sending signals to the network. As it was said above it is
unknown what interval can be pre-programmed in the
tracker, but it should be the same during the measurement.
So, if you observe increases on the bargraph with a non-
changing interval, it might be a sign of the presence of
a tracker
D) The vehicle should be moving during the measurements.
For an 'express' variant 30 minutes of testing might be
enough, for a 'deep seeking' drive for 1-2 hours while
watching the detector.
E) Repeat the procedure with the Protect 1207i placed in a
rear part of the car as it is unknown in what part of the car
the tracker might be hidden.
Method 2 (recommended)
This method is more reliable, since it helps to detect trackers even if
they are programmed not to transmit the 'route' but to collect it in the
memory for a future upload under request. This method detects the
GSM/3G modules built into the trackers, forcing them to communicate
with the network. To apply Method 2 it is necessary to have a portable
GSM/3G jammer with an output power not less than 1W per range
(GSM900, GSM1800, 3G – not less than 3W total). But a higher power
will give more reliable results.
13
C) Watch the Protect 1207i' bargraphs to check that the jammer
is working (full level).
D) Drive to another LAC (10-15 km away) and stop your car where
no other phones can be present (i.e. not in a crowded place)
E) While watching the Protect 1207i' bargraphs turn off the
jammer. The levels on the bargraph should drop instantly. If
after the decrease they again show impulses of 1-3 seconds
duration, it means that there is a GSM/3G device nearby. Such
increases are a sign of a tracker.
F) To have a more reliable result you can repeat the procedure by
returning to the initial place with the jammer again turned on
but placed in another side of the vehicle, for example in the
rear. When you arrive, place the 1207i in a rear part too before
turning off the jammer.
Before testing your vehicle for trackers, you can check that you are using
the correct point of measurements and there is another LAC in the area.
Use your own phone, leave it turned on, drive with the jammer turned
on, then turn off the jammer and check with the 1207 if your phone
starts exchanging with the network (increase 1-3 seconds).
Other applications
If you cannot inspect a whole room, for example, in a restaurant or
some-one else's office, the Protect 1207i can be used for checking the
closest objects to you. In a restaurant it may be necessary to check the
items on the table, or the table itself, since they can contain a bugging
device.
Detection distance
The detection range of the Protect 1207i depends on two major factors:
The output power of the transmitter
The surrounding RF environment waves radiating from other
communication devices acting on the frequencies being inspected
by the Protect 1207i.
14
The level on the display of the Protect 1207i will increase as you
approach an RF source (or the vibration will start). Either a surveillance
transmitter or a safe signal (background noise) can cause it to increase.
Successful location of a hidden bugging device is accomplished by
finding the area which produces the highest level on the bar graph of the
Protect 1207i. Normally the Protect 1207i is able to detect a
CDMA/GSM/3G/LTE(4G) signal at a distance of 2-10 meters and
Bluetooth / Wi-Fi / WiMAX /DECT channels at 50-250 cm.
15