- Home
- Technology
- Education
- More Topics
- For Uploaders
- Get Started
- Tips & Tricks
- Tools
Slideshare uses cookies to improve functionality and performance, and to provide you with relevant advertising. If you continue browsing the site, you agree to the use of cookies on this website. See our User Agreement and Privacy Policy.
Slideshare uses cookies to improve functionality and performance, and to provide you with relevant advertising. If you continue browsing the site, you agree to the use of cookies on this website. See our Privacy Policy and User Agreement for details.
By functionality and convenience this device doesn't have analogs worldwide.
It can become irreplaceable assistant for people who wants to be safe from unauthorized tapping by competitors and intelligence services in car, office and home.
Do you want to know when your mobile phone transforms from your friend to your enemy and when someone listening you from its help?
Do you want to intervene to intruder to know your conversation by mobile phone?
Do you want to know did peacefully looking visitor bring listening device to your office?
Do you want to know does anyone eavesdrop on your business meeting with your co-workers?
You can get replies for all these questions concerned your information security using
Radio Frequency Detector -Bug Detector
The T163902 combines several most popular devices widely used for information protection. Implementation of state-of-the-art components and microprocessor control allowed us to create a functionally complete and reliable device to satisfy needs of our customers. T163902 has seven built-in modes and functions switched on by means of separate pushbuttons and indicated by respective LEDs:
- Analog Detector mode;
This mode is used for detecting and locating sources of radio-frequency radiation. Near the source of radio-frequency radiation the LEDs begin to light in sequence, and the loudspeaker emits stepwise rising tone.
- Digital Detector mode;
T163902 becomes practically irresponsive to the stationary analog signals. In this mode the field detector responds to radio-frequency signals with the digital modulation, mostly of the GSM standard and other low-speed data transfer protocols. This mode does not ensure guaranteed detection of the radio-frequency radiation sources with high-speed data transfer protocols or can only provide it for conditions of the complete radio silence and the low level of external background interference.
-Analog Detector Waiting mode
(triggered on a radio-frequency analog signal exceeding specified level, with a melody being played);
It is designed to protect the adjacent area from the presence of analog portable or remotely activated hidden listening radio devices. It responds to exceeding the preset threshold level, with a melody being played.
- Digital Detector Waiting mode
(triggered on a radio-frequency digital signal exceeding specified level, with a melody being played);
It is designed to protect the near-field region against insertion of digital portable or remote-activated hidden listening radio devices, as well as the GSM hidden listening radio devices. It responds to crossing of the preset threshold level, with a melody being played.
- White Noise Generator mode;
The noise spectral density can be displaced in either direction.
- White Noise Generator mode on a Analog Detector Signal
(triggered on a radio-frequency analog signal exceeding specified level, with a White Noise generating);
It is designed to protect the adjacent area from the presence of analog portable or remotely activated hidden listening radio devices. It responds to exceeding the preset threshold level, with a White Noise generating.
- White Noise Generator mode on a Digital Detector Signal (triggered on a radio-frequency digital signal exceeding specified level, with a White Noise generating);
It is designed for protection against unauthorized activation of mobile phones when used as tapping (eavesdropping) devices. It responds to exceeding the preset threshold level of the mobile phone radiation. When the threshold is exceeded it generates the acoustic white noise to suppress the microphone section of the protected mobile terminal placed close by.
Note: The jamming distances we mentioned on website are for customer's reference only. The actual jamming distance will be varied depending on the signal strength and the use location and if full charges, etc.
Featured SlideShares |
|
See All |
Featured Topics |
|
See All |
Latest Conferences |
|
Trending in Social Media |
|
Browse SlideShares:
a
b
c
d
e
f
g
h
i
j
k
l
m
n
o
p
q
r
s
t
u
v
w
x
y
z
0
1
2
3
4
5
6
7
8
9
-
Browse Users:
a
b
c
d
e
f
g
h
i
j
k
l
m
n
o
p
q
r
s
t
u
v
w
x
y
z
0
1
2
3
4
5
6
7
8
9
_
×