iProtect From CounterTeK

Share:
| More

 

The Advanced Stealth P-1210 iProtect From CounterTeK
New Generation Portable Advanced Card Style Bug Detector

A New Generation Advanced Countermeasures Unit In A Credit Card Size

This new generation counter surveillance devise packs features like nothing else in the market place and nanno technology has enabled it to be shrunk down to a credit card pocket size unit! The Stealth P-1210 iProtect from CounterTeK is a card-sized device that belongs to a new generation of personal sweeping equipment when it comes to size and function! It can be carried in a pocket or wallet and will not attract the attention of other people. When it is necessary, it will easily and quickly help you check for the presence of bugging devices in any given area.

• Frequency Coverage: 50~3000 MHz
• Searches for active radio transmitting surveillance devices (RF bugs)
• Detects all kinds of active radio signals including digital signals.
• Discovers the improper use of mobile phones and communication devices for Picking up conversation.
• Detects harmful emissions from GSM-jammers or mini recorder suppressors
• Detects harmful emissions from microwave ovens, communication antennas and other electronic appliances
• 4 working modes: Normal, Sound, Vibro and Sleep
• “Pulse” indicator for recognizing digital transmitters including GSM and DECT
• 8 segment bar-graph indicator for precise measuring of the radio field level and location of a bugging device
• Card style body: Operation driven by micro controller
• Integrated antenna
• Calibrated sensitivity for rejection of background fields
• Power Source: CR2430 lithium battery: “Low battery” indicator
• Size: 55 X 85 X 7 mm

 




USAGE

Sweeping the room
Before starting sweeping, you should carry out some preparation tasks. Firstly, it is necessary to consider the time of the sweep and the situation. Since there are lots of devices that are remotely controlled, it is recommended to carry out a sweep during working hours in real situations when the eavesdropper most wants to listen. It may be necessary to arrange a fictitious meeting. Nobody has to know about the pending search.

Close all drapes in the room. Turn on all the lights and activate any other devices to imitate normal conditions. It is also advisable to turn on a source of sound such as a stereo system or radio. This sound source has two very important functions:
Voice activated transmitters will be activated
Your actions will be masked

1. Leave the room, turn on the Stealth P-1210 and adjust its sensitivity by pressing the ‘ZERO’ button. Before adjusting the sensitivity make sure that there are no working radio transmitters in the close proximity to the unit (1-5 meters) – GSM or radiotelephones, radio transceivers, etc. Otherwise you may set the sensitivity to an excessively low level.

2. Choose the operation mode. For covert procedure use the Normal or Vibro mode. The Normal mode is more convenient for locating the RF source. The Vibro mode allows the operator to avoid constantly watching the bargraph when inspecting areas that are difficult to access. The Sound mode allows the operator to listen to the signal so that he or she can understand more about the source. Note: a loopback effect may appear near an active bugging device in this mode. It is obviously a clear sign of danger for you, but may also allow an eavesdropper to discover your counter surveillance operation.

3. Enter the room holding the Stealth P-1210 and watch its bargraph or pay attention to the vibrator. Turn the lights and other equipment in the room on and off. Walk around the room while watching the indicators or feeling for the Protect’s vibration. The bargraph level, or the frequency of impulses, will increase or decrease when the detector is closer to or farther from a transmitting device.

Probe all objects which may contain a hidden surveillance device. When you get close to an RF bugging device the bargraph of your the Stealth P-1210 will rise (or vibration will appear). The distance of detection may vary depending on the situation. Usually the Protect 1210 will detect an average radio microphone at a distance of 20-60 cm although it is recommended to probe the objects at a proximity of 10 cm. The bargraph can display 10 different levels. The lowest level is shown by the first LED. As the RF level grows, a group of three diodes will scroll up on the bargraph until only the one ‘upper’ LED will remain; in the case where a very high level signal is detected.

You can use the ‘ZERO’ button to decrease the sensitivity gradually when performing the location procedure (finding the source of the RF field). Press this button when the bargraph shows a high level to force the unit to react to a stronger field only. Thus you will find the place with the strongest field.

Please note: if you want to continue sweeping after the location of one bugging device, it is necessary to restore the normal sensitivity of the Stealth P-1210 . Press the ‘ZERO’ button after making sure that the detected transmitter does not affect the unit (It is turned off or is at a sufficient distance away). If you want to restore the maximum sensitivity turn off the Protect 1210 and then turn it on again.

The bargraph may often show an increased level near wires or metal objects. This may not be a bug, but rather the metal acting as an antenna extension. A similar situation may appear in the apertures of windows due to radio waves coming from the outside. In these situations you can decrease the sensitivity by pressing the ‘ZERO’ button.

4. After you have found the exact location of a high field, try the Sound mode if secrecy is not critical. A Loopback effect will clearly confirm the danger. Not depending on the presence of a loopback, start a physical search. Visually inspect and probe each object in the highlighted area. Disassemble, if necessary, lamps, desktop items, telephones, AC outlets, phone outlets. Inspect all power and phone lines carefully. Open books, wardrobes, etc. Remember, that a physical search is a fundamental operation during the sweep.

If you find a bugging device, do not stop! You should continue the search more carefully as eavesdroppers often install more than one device. They may install a so called ‘foolish bug’ which may be easily detected and some other well hidden devices that may have remote control and non-standard modulation.

5. In the modern environment mobile phones are very often used as bugging devices. Therefore if the unit’s “Pulse” indicator starts to light, suspend the search and wait for a while. It could be a signal from a working telephone in a neighboring flat or office. Use the Sound mode to listen to the signal. The GSM signal will have typical ‘buzzing’ sound.

Checking telephone lines
Telephone bugs may be installed anywhere a phone line lays. It may be within the phone set, the phone outlet, connecting box or cable. Most telephone bugs activate only when the receiver is off-the-hook. Therefore the sweeping of phone lines should be carried out only when the receiver is in this state.

Start checking from the phone set. Place the Stealth P-1210 near the set and lift the receiver. Watch for an increase of the RF level (or starting of the vibration). (Please note: It is pointless to test wireless (radio) telephones, for they act exactly like a bugging device themselves due to to the use of radio waves. Only a physical inspection of these items is sufficient to know if they are bugged.

Move the detector along the phone line while keeping it off-the-hook. Check all the outlets and communication boxes. If possible ask a second person to lift the receiver and then hang it up repeatedly. If you see that the RF level changes when the line is activated and deactivated, this is a sign of a bug’s presence. Try to locate the place where the RF level is highest and then perform a physical search.

Working in the Sleep mode

In this mode the Stealth P-1210 wakes up every 3 seconds and checks the current RF environment. If there is an increased level the unit will indicate this with an alarm sound. The detector will stay active until the high level disappears.

Testing people
There are many types of body-carried transmitters. They may broadcast conversations and (or) video signals.
Adjust the sensitivity to the current background level using the ‘ZERO’ button. While carrying the Stealth P-1210 , approach the person. If the level grows, it means that the person is carrying a transmitting device. If you have changed the location re-adjust the sensitivity by pressing the ‘ZERO’ button again at some distance from the person.

Another way to test people is to place the Stealth P-1210 on the desktop. In the Normal mode it will be necessary to watch the bargraph carefully when the person approaches the table and sits down. You can also use the Sleep mode. If the person is carrying an RF transmitter the Stealth P-1210 210 will detect it and produce an alarm.

GSM and DECT detection

Improper use of a mobile telephone can be discovered with the help of the Stealth P-1210 . In this case the “Pulse” indicator will be on while the bargraph fluctuates rapidly.

Other applications

If you cannot inspect a whole room, for example, in a restaurant or someone else’s office, the Stealth P-1210 can be used for checking the closest objects to you. In a restaurant it may be necessary to check the items on a table or the table itself, since they can contain a bugging device. The card-style design suits this operation perfectly.

Detection distance
The detection range of the Stealth P-1210 depends on two major factors:
· The output power of the bug
· The surrounding RF environment, such as radio/TV and communication devices
The level on the display of the Stealth P-1210 will increase as you approach an RF source (or vibration will start). Either a surveillance transmitter or a safe signal (background noise) can cause it to increase. Successful location of a hidden bugging device is accomplished by finding the area which produces the highest level on the bargraph of the Protect 1210. Normally, an active bugging device will be detected at a distance of 20-60 cm .

 

The Advanced Stealth P-1210 iProtect From CounterTeK $355.00
New Generation Portable Advanced Card Style Bug Detector

A New Generation Advanced Countermeasures Unit In A Credit Card Size

HOW TO ORDER:

TOTALLY SECURE 128 BIT ENCRYPTED ONLINE ORDERING!

[Order Online Now]


UPS Insured Shipping (USA) $20.00

 

CounterTeK Cell Phone Safe!
Finally Protection Against Spy Phones
Because Your Cell Phone can Be A Bug!


CounterTek Cell Phone Safe

Mobile phones use digital voice and data exchanges for easy and user friendly information exchanges between parties you wish to exchange voice and data with in the form of photos, files, text. GPS location and more. It's a modern convince in the information age. The problem is, that same information exchange can be easily bugged with software sometimes even remotely without you even knowing it. All of your audio communications and confidential data can be covertly intercepted. The Cell Phone Safe is a countermeasures device that acts as an RF detector and a highly advanced noise masking device that renders any eavesdropping on your cell phone useless. All the criminal eavesdropper will hear is white noise. Just place your cell phone in the Cell Phone Safe and turn the unit on. You then have automatic protection.

Note This And Protect yourself! Modern communications give varied possibilities of information exchange. At the same time these devices can become a dangerous tool for picking up information illegally. A reprogramming of your mobile phone, substitution of it, or being given a modified telephone will give other people access to the data in your telephone, or the ability to listen to all conversations around you from anywhere in the world. The Stealth GSM-SAFE II has been designed to detect the illegal activation of a mobile phone. In addition to this main function, the GSM-Safe II also creates interference to the surrounding area of the telephone’s microphone by generating ‘white noise’ when radio-waves are detected; this noise suppresses the microphone in the telephone rendering it useless.

The CounterTeK Cell Phone Safe has been created as an attractive desktop stand to protect your conversations in case your mobile phone has been modified or changed. Its features include a built-in radio-frequency detector, a controlling scheme and a noise generator which turns on when the phone is active. Therefore, the phone should be kept in the CounterTeK Cell Phone Safe to provide 24 hour indoor protection. Normal calls can be answered in the usual way since you will hear the telephone’s melody or vibration and simply remove it from the stand. Hidden ‘spy’ activations do not produce any sound or vibration and this is where the CounterTeK Cell Phone Safe will protect you. In the event of a ‘spy’ activation the CounterTeK Cell Phone Safe will automatically turn on its noise generator and the listener will hear only this sound. You will also instantly notice your phone’s activation thanks to the built-in LED indicator and the low sound coming from it.

Features And Specifications:
• Automatic generation of audio interference
• Accurate and sensitive detection of GSM 900/1800, CDMA850 and WCDMA2100 (3G, UMTS) by an intelligent • • algorithm of the micro-controller
• Visual and sound indication of different communication protocols
• Produced as an attractive wooden desktop stand
• A new sensitive scheme of detection with pre-selectors provides better detection
• Long battery life of up to 10-15 days when used moderately
• Does not block the mobile network in the area
• Has no adverse effect on health (no electromagnetic waves)
• Compatible with virtually all types of GSM telephones (practically any height and thickness)
• Built-in diode for indication of the active mode and the detected protocol (3 colors)
• Power Source: 2 AAA batteries
• Working time (stand-by/active): 1 month / 18 hours - Current consumption (stand-by/active): 1.2 mA / 50mA

Please Note: Most digital communication devices might have a periodical exchange with the network with small packets of data. This is not a danger, but rather a result of the mobile device’s movement or registering with a network. Only activities with a longer duration may be considered dangerous and should attract your attention.

Make sure you are not the next victim of information leakage and covert eavesdropping through your cell phone by protecting yourself with the Cell Phone Safe now. This new technology keeps you safe from eavesdroppers!

 

CounterTeK Cell Phone Safe : $285.00

HOW TO ORDER:

TOTALLY SECURE 128 BIT ENCRYPTED ONLINE ORDERING!

[Order Online Now]


UPS Insured Shipping (USA) $20.00


 

Portable GSM CounterTek Cell Phone Protection Box

Cell phone devices use easy to access user friendly protocols for accessing voice and data with easy information exchange. It's part of modern day communications. However, the same easy communications access from your smart phone can quickly and easily be modified (sometimes even remotely) that could turn your smartphone into a bug transmitting all of your communications to an eavesdropper. The CounterTeK GSM-box is designed to determine and display the active state of mobile communication (GSM 900/1800, CDMA850, WCDMA2100 (3 g, UMTS) and Wi-Fi/Bluetooth). It automatically creates an acoustic noise shield that will protect your conversations against illegal eavesdropping when you need it! Small and compact, you can cary it with you and use it with your cell phone whereever you go! Just place the GSM-box on top of your cell phone and you are protected!

The CounterTeK GSM-BOX has been designed to detect and indicate the illegal activation of a mobile phone. In addition to this main functions, the CounterTeK GSM-BOX also creates interference to the surrounding area of the telephone’s microphone by generating ‘white noise’ when radio-waves are detected; this noise suppresses the microphone in the telephone rendering it useless.

Features:
• Warns with the 3 LEDs and a sound alarm when the telephone starts exchanging data with the network
• Automatic generation of audio interference
• Accurate and sensitive detection of GSM 900/1800, CDMA850, WCDMA2100 (3G, UMTS)and Wi-Fi/Bluetooth • • by intelligent algorithm of the micro-controller
• Separate visual and sound an indication of different communication protocols
• New convenient ‘credit card-style’ design suitable for pocket use, belt carrying cases, bags, desktop stands, etc.
• A new sensitive scheme of detection with pre-selectors provides better detection distance
• Does Not block the mobile network in the area
• No adverse effect on health (no electromagnetic waves)
• Frequency range of generated interference: 300-5000 Hz (white noise)
• Sound pressure level in the area of the speaker: 90 dB
• Power Sources: 3V, CR2430 - Long battery resource of up to 5 days (low current consumption)
• Dimension: 100x50x5 mm (4x2x0.2 inch)

Specifications:
Detected protocols: GSM 900/1800, CDMA850, WCDMA2100 (3G, UMTS) and Wi-Fi/Bluetooth
Frequency range of generated interference: 300-5000 Hz (white noise)
Sound pressure level in the area of the speaker: 90 dB
Power source: 3V, CR2430 battery
Current consumption: 3 mcA/15mA (standby/noise)
• Dimension: 100x50x5 mm (4x2x0.2 inch)

Please Note: Most digital communication devices might have a periodical exchange with the network with small packets of data. This is not a danger, but rather a result of the mobile device’s movement or registering with a network. Only activities with a longer duration may be considered dangerous and should attract your attention.

 

Portable GSM CounterTek Cell Phone Protection Box :$285.00

HOW TO ORDER:

TOTALLY SECURE 128 BIT ENCRYPTED ONLINE ORDERING!

[Order Online Now]


UPS Insured Shipping (USA) $20.00

 

Voice Keeper Cell Phone Scrambler Voice Encryptor
Keeps Your Cell Phone Conversations Between Two Parties Only

The Voice Keeper Cell Phone Scrambler Voice Encryptor converts human voices into non-interpretable analog noises and transmits the scrambled noises over the unsecured telephone network in Internet and then converts back to human voices on the other end of the line by MDP2 ASIC chip embedded within the wired telephone recorder, mobile phone, bluetooth headset, heads-free set or attached to various types of voice communication devices.

You can protect your privacy on the phone over the unsecured public telephone lines or internet. Your confidential information and valuable intellectual properties should not be exposed to ever-present dangers of wiretapping or eavesdropping attacked that are always around us and must be protected safely by this advanced technology.

Easy to use! Just connect your Voice Keeper Cell Phone Scrambler Voice Encryptor in the mic jack of your cell phone and use it for communication! (Two needed on for each end of the conversation)

Voice Keeper Cell Phone Scrambler Voice Encryptor $349.00

 

HOW TO ORDER:

TOTALLY SECURE 128 BIT ENCRYPTED ONLINE ORDERING!

[Order Online Now]


UPS Insured Shipping (USA) $20.00

 

iPhone iRecovery Stick
Recover Data From Your iPhone - Deleted Contacts, Deleted SMS, Deleted Text Messages, & More
Now works with iPhone 4!

 

Cell Phone Recon
Cell Phone Recon is a ingenious and prudent software that allows you to track, trace and monitor your
mobile phone. It can monitor GSM text messages, call logs, emails sent and received as well as the
geographical location of the phone. Cell Phone Recon allows you to back-up your mobile phone and
have a detailed record of its activity.


SHOP FOR COUNTERMEAURES GEAR BY CATEGORY
What's New In Countermeasures Gear Inexpensive Econo Countermeasures
Bug And RF Detection Gear Wiretap Detection/Phone Privacy
Sound Masking/Jamming And Scrambling Computer Countermeasures
Countermeasures TSCM Sweep Kits UV Light And Other Detection Aids
Video Camera Detection Books And Manuals On Countermeasures

 

Copyright: 2011, Ralph Thomas
All rights reserved including but not limited to photos, artwork,
models, graphics, HTML and copy.

 

Copyright: 2011, Ralph Thomas
All rights reserved including but not limited to photos, artwork,
models, graphics, HTML and copy.

http://www.central-air-conditioner-and-refrigeration.com/images/M_thermostat2.2.jpg