Model: Protect 1207I
Multi-channel detector of wireless protocols
Portable device for the inspection and location of wireless sources
6 channels of detection for different kinds of protocols
Detection of GSM/CDMA/3G
Detection of Bluetooth/Wi-Fi/Wi-Max
Can be used for tracing both regular sources and illegal eavesdropping devices
6 bar graphs with 10-segments each, for accurate location of RF sources
4 modes: Silent, Vibration, Visual and Listen
2 levels of sensitivity (attenuator)
Extra display shows probable protocol
Durable metallic body
Microprocessor controlled
The Protect 1207I is a new measuring device which can be successfully used by engineers or counter surveillance specialists as a reliable tool for tracing different digital transmissions such as GSM, Bluetooth, etc. New methods of 'listening and watching' with the help of modern technologies has become widely spread in our times. For example, a tiny GSM transmitter is accessible at practically any internet spy-shop for only 100-200 USD and can listen to all your conversations in the office or at home. And perhaps more importantly the Bluetooth protocol has been specially designed to transmit voices or conversations with high quality at a distance of up to 100 m - it can easily be used for bugging.
The sensitivity of a common RF detector (bug detector) is spread along a wide frequency range, usually 3, or even 6-7 GHz. This means the common detector cannot detect such weak and non-continuous signals as Bluetooth, Wi-Fi or Wi-Max. Even more powerful signals like GSM-1800 are also hard to detect because of their low sensitivity at higher frequency ranges.
The only way to reliably detect wireless protocols is to use pre-selector chips (saw filters) which attenuate all other signals except the desired ones. This is the method implemented in the Protect 1207I which has 6 channels for different frequency ranges and can simultaneously detect 6 different kinds of transmissions at a distance much greater than any common RF detectors. Such qualities make the Protect 1207I a very desirable and reliable device during counter surveillance sweeps.
It is recommended that all sources of RF waves are detected in the premises during a search. It is necessary to determine the nature of every source -whether it is a regular transmitter like a Wi-Fi access point or it has an unclear origin and thus should be inspected and probably removed.
Ways of eavesdropping
The following are the most probable ways of eavesdropping with the use of wireless protocols:
GSM baby-monitor/GSM alarm/GSM bug
GSM/GPRS/EDGE/3G video camera
GSM spy phone
GPS tracker
Bluetooth bugging device
Spy phone with Bluetooth/Wi-Fi function
Wi-Fi bugging device
Wi-Max bugging device
CDMA 850 | CDMA standard |
GSM 900 | GSM 900 standard |
GSM 1900 CDMA 1900 |
GSM 1900 and CDMA 1900 or GSM 1800 |
3G, DECT | WCDMA (UMTS, 3G), most of the modern DECT telephones or as above plus GSM 1900 and CDMA 1900 |
Wi-Fi Bluetooth |
Wi-Fi access points and adapters, Bluetooth devices |
Wi-Max | All transmitters in the range of 3-6GHz, including most kinds of the Wi-Max protocol |
Frequency range (up-link bands) 1. CDMA 2. GSM 3. GSM (DCS) 4. WCDMA, 3G, GSM (PCS), DECT 5. Bluetooth, Wi-Fi 6. Wi-Max | 824-849 MHz 880-920 MHz 1710-1790 MHz 1920-2000 MHz 2400-2480 MHz 3000-6000 MHz |
Out of band attenuation | 20-45 dB |
Antenna | 2 Omni-directional antennas |
Detection distance | 1-10 meters |
Operation time | 10-15 hours |
Power | 2 AAA (LR03) batteries |
Dimensions (without antennas) | 120 x 70 x16 mm |
Weight | 217 g |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() | |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |