Name: Government Technical Surveillance Counter Measure Solutions

Text: !"#$%

Government Technical Surveillance
Counter Measure solutions
#s$% solutions

1011tau
!!
!
:!"

Human
Intelligence
& Social i
I

's$%'h&()t
Open Source
Intelligence & #&'n'(tmv)
Intelligence

1 1 1 &

Single Intelligence,
Hacking, !lugging,
Wire-Tapping
& Monitoring

Counter Measures

#s$% PABX Manipulation

')(

Competitive
Intelligence DeIerl%e (CID)

Technical - ‚

AP-

.1

Information &
mmunication
write IICS)

:

1

's$%s()&$h'($hniqu(s
'

i*+

Your Confidential Information

'5*+
'5
5*+ Audits

Z

I

P
- &.
-h1

U,-U-. / i UDU.,
UDU.,L
.,L,
L,
/00
/0I
I0L
I0
0L0
L0'
0'0/L
00/
0/L//LU'
0/
LU'DLD
LD0
010LDU'
01
0LDU'01
01

ILID1/L
1/L0
L0L
0L0
L0L
0L
U// /

s!"
I

!

Government Technical surveillance
Counter Measure solutions

PRESENTED'7

-

CUSTOMER NAME

Open Source
intelligence 8 Compel/0,e
intelligence

iturnan
klteligcI'ce
& social

Single b ' t . I i ' c . ,
Hacking, Bugging,
Wire-Tapping
& Monitoring

finginew

The Country Flag
Corn
intelligence Defense [CIO)

Tet n
Counter #$%u&!

Information &
Cotrirnunicet&ern
carity (113)

('(#)

4!u

Visual
i

A

101101 1000100 I 1
•)L*I
*+L+
*I
L+0
L+
+0+
Ii

' 'G
uin 'i001'223i

ninuiuIl

elaman
Version 7

I

! s "# INDEX
!"#$%&'()*
•••••

W • '-

- Introduction
!!"!#!$%&'()*+&,(%
2 - The Threat
!!-!#!./0!./'01&
3 - Recommendations
!!2!#!30+(440%)1&,(%5
4 - Training Course Overview
!!6!#!.'1,%,%7!8(*'50!9:0':,0;
[email protected]*505
5 - Training Course syllabuses

6 - Recommended Products
!!A!#!30+(440%)0)!B'()*+&5
- Technical Data Sheets
!!C!#!.0+/%,+1?!D1&1!=/00&5
8 - IP/PABX Manipulation
!!E!#!$BFBGHI!J1%,K*?1&,(%
9 - Commercial Quotations
!!L!#!8(440'+,1?!M*(&1&,(%5
10 - Terms & Conditions
"N!#!.0'45!O!8(%),&,(%5
11 - Contact Details
""!#!8(%&1+&!D0&1,?5
"-!#!P?141%!81&1?(75!9:0':,0;
12 - Haman Catalogs Overview


lG
$m$nP
$
$m
m$
m
$
$nP
nP
E
R
M
A
N
$ECURITVsOL(

! s "# INDEX
!"#$%&'()*
•••••

W • '-

1- Introduction
!"!#!$%&'()*+&,(%
- The
Threat
!#!./0
!#!./
0!./'0
!./'
01&
1&
!-!#!./0!./'01&
- Recommendations
!#!30+(
!#!3
0+(44
440
0%)1&,
%)1&,(
(%5
%5
!2!#!30+(440%)1&,(%5
4 - Training
Overview
7 Course
8(*'50!9:0':,0
8(*'50!
9
:0':,0;
;
!6!#!.'1,%,%7!8(*'50!9:0':,0;
!6!#!.'1,%,%7
!6!#!.'1,%,%
5 - Training
syllabuses
[email protected]*505
!7 Course
8(*'50!=>[email protected]*505
8(*'50!=>[email protected]*505
6!#!3
- 30+(440%
Recommended
A
!#!
0+(440%)
)0
0)
) Products
B'()
B'(
)*+
*+&&55
!A!#!30+(440%)0)!B'()*+&5
7 - Technical Data Sheets
=/00&5
/00&5
!C!#!.0+/%,+1?!D1&1!=/00&5
!C!#!.0+/%,+1?!D1&1!
!C!#!.0+/%,+1?!D1&1!=
- IP/PABX Manipulation
!E!#!$BFBGHI!J1%,K*?1&,(%
- Commercial
Quotations
!#!8(
!#!8
(44
440
0''+
+,1?!M*
,1?!M*
,1?!M*(
(&1&,
&1&,(
(%5
%5
!L!#!8(440'+,1?!M*(&1&,(%5
10!#!.0
- Terms
& Conditions
"N!#!.
"N!#!.0'45!O!8(%),&,(%5
"N
!#!.
0'45!O!8(
'45!O!8
(%),&,
%),&,(
(%5
%5
11"!#!8(
- Contact
Details
""!#!
""!#!8(%&1+&!D0&1,?5
"
"!#!
"!#!
8(%&1
%&1+
+&!D
&!D
&!D
&!D0
0&1,?5
&1,?5
"-!#!P?141%!81&1?(
"-!#!P?141%!81&1?(75!9:0':,0;
"
-!#!P?141%!81&1?(
-!#!P?141%!81&1?(
-!#!P?141%!81&1?(7
75!9:0':,0
5!9:0':,0
5!9:0':,0;
;
12
- Haman Catalogs
Overview


lG
$
m
$
n
P
E
R
M
A
N
GECURITRsOL(

elaman

Introduction
&'()*+,-(.*'%

!

"

s

!

# !"#$%&'()*
Intro

The following information is a guideline to various
espionage threats; the recommendations on
)-.!/01102345!34/06789304!3:!8!5;330485.!9-6.89:[email protected]<89304:!04!
)-.!/01102345!34/06789304!3:!8!5;30;:!.:>30485.!9-6.89:[email protected]<89304:!04!
how to
s " # Team
-02!
90!start
:9869! up
;>! a8! !)A"B!
).87!linked
134C.90!Training
)6834345! Courses
"0;6:.:! for
/06! all
811!different
<3//.6.49! user
;:.6! levels,
1.=.1:D! and
84recommendations for products that have proven their reliability & competence, and which are
[email protected]<89304:!/06!>[email protected]>[email protected]!84used by various government sweep teams around the world.
;:.!9.87:!860;4!

The search
)-.!
:[email protected]!efficiency
.//[email protected]@F! of
0/!a8!sweep
:2..>! team
9.87! is
3:! of
0/! paramount
>86870;49! importance.
37>[email protected]! Government
I0=.647.49! statistics
:9893:[email protected]:!
show that
n a8! !)A"B!
s " # sweep
o the
:-02!
9-89! the
9-.! manpower
784>02.6! used
;:.:2..>! is
3:! divided
<[email protected]@06<345! t90!
9-.! following
/01102345!
>[email protected]:J!
percentages:
Physical search
K-F:[email protected][email protected]!

3

Cable Measurement
"8E1.!B.8:;6.7.49!

% LMN!

5
3

P8<30!%6.Q;[email protected]!B.8:;6.7.49!
Radio Frequency Measurement
&A'$!K-04.!AF:9.7!"[email protected]:!
ISBN Phone System Checks
*[email protected]!B843>;189304!
Anti Hacking Manipulation

% LON!

0

1 0 ,ON!
%
1

0
1

,ON!
%
,MN!
5%

!
#4.!0/!
9-.!many
784F! misconceptions
73:@[email protected]>9304:! is
3:! that
9-89!70:9!
34.S>[email protected]>.6:044.1! presume
>6.:;7.! the
9-.! biggest
E355.:9!
One of the
most inexperienced
.:>30485.!
9-6.89! is
3:! from
/607!wireless
236.1.::!bugs.
E;5:H!However,
R02.=.6D
9-3:! is
3:! NOT
$#)! the
9-.! case:
@8:.J! cable
@8E1.! and
84:0/9286.!
R02.=.6D!! this
espionage threat
7843>;189304!86.!9-.!70:[email protected]!9865.9
7843>;189304!86.!9-.!70:[email protected]!9865.9:!/[email protected]!0>.68906:H!
:!/[email protected]!0>.68906:H!
manipulation are the most common targets:!/[email protected]!0>.68906:H!
for intelligence-gathering operators.
!
)[email protected]!8!:;@@.::/;1!A2..>!).87!3:!409!:37>1F!E;F345!811!9-.!90>!.Q;3>7.49!04!
)[email protected]!8!:;@@.::/;1!A2..>!).87!3:
The key to creating a successful Sweep Team is!409!:37>1F!E;F345!811!9-.!90>!.Q;3>7.49!04!
not simply buying all the top equipment on
9-.!786C.9D!E;9!689-.6!;:345!8!:F:[email protected][email protected]!84>[email protected]!
the market, but rather using a systematic, logical, and efficient approach:
!
,T!&7.49!!
1- Identify the Threat of Surveillance Equipment
UT!A.9!V>!842- Set Up and Manage a TSCM Team
LT!&7>1.7.49!)[email protected]@81!843- Implement Technical and Management Training
WT!P.=3.2!9-.!6845.!0/!:2..>!>604- Review the range of sweep products
MT!A.9!;>!8!)A"B!206C:-0>!!
5- Set up a TSCM workshop
XT!P.>.89!9-.!8E0=.!:C311:!!
6- Repeat the above skills
YT!(:98E13:-!84!&)!4.9206C!9.:9!>[email protected] Establish an IT network test procedure
ZT!K*[\!8<7343:9689304!96834345H!
8- PABX administration training.

CONFIDENTIAL
"#$%&'($)&*+!!
"#$%&'($)&*+!

1

,

elaman

Introduction
&'()*+,-(.*'%

!

s

"

!

# !"#$%&'()*
Intro

At our
s " # workshop
e can
*-!
./0! !)1"2!
3.0456.7! facilities
89:;;>!Germany
[email protected]>A! w
3=!
:9>! introduce
;>-0.B/:=! you
A./! to
-.! the
-6=! above
9C.D=! detailed
B=-9;<=B!
program. During a 1
[email protected]!'/0;>E!9!GH!-.!,[email protected];>90!3=!:9>!
[email protected]!'/0;>E!9!GH!-.!,[email protected];>90!3=!:9>!56.3!A./!-6=!-9:-;:5!.8!./[email protected]!9>B!
the equipment
-6=!
=I/;[email protected]=>-! used
/5=B!in
;>!sweep
53==7! operations
.7=09-;.>5! (an
J9>!
J9>!
>! investment
;>[email protected]=>-! well
3=<.D=0! one
.>=! million
@;<! Euros).
(/0.5KF! The
)6=!
follow-up training
% weeks,
y the
8.<-09;>;>E!programs,
[email protected]! which
36;:6! last
<95-! 2,HM!
3==45L! are
3==45L!
90=! given
E;D=>! bCA!
-6=! most
@.5-! advanced
9BD9>:=B! and
9>B!
renowned !)1"2!
s " # sweep
out an
of A./0!
your
0=>.3>=B!
53==7!engineers
=>E;>==05! in
;>! different
B;88=0=>-! fields.
8;=N=! can
:9>!also
9<5.! carry
:900A! ./-!
9>! audit
9/B;-! .8!
available sweep team and provide technical operational training on any equipment you already
9D9;<9C<[email protected]!9>B!70.D;B=!-=:6>;:99;>E!.>!9>A!=I/;[email protected]=>-!A./!9<0=9BA!
have.
69D=F!
&8!A./!0=I/;0=!9>A!8/0-6=0!955;5-9>:=!7<=95=!B.!>.-!6=5;-9-=!-.!:.>-9:-!/5F!
If you require any further assistance please do not hesitate to contact us.

!1"2!1N((O!
s " # SWEEP
)
)1"2!1N((O!
!
!
!
!

I$4j
$4j

CONFIDENTIAL
"#$%&'($)&*+!!
"#$%&'($)&*+!

l

i

i

2

,

elaman

!

Overview
!"#$"%#&

Strategic
Security
Overview
'($)(#*%+,'#+-$%(.,!"#$"%#&
*%+,'#+-$%(
%+,'#+-$%(
%+,'#+-$%(.
.,!"#$"%#&
'($)(#
'($)(#*

Within today's
o
-./0.1!
/234567!global
892:49!environment,
;1;1/?!strategically
7/=4/;[email protected]! sensitive
7/=4/;[email protected]!
7;17./..1A2=>4/.21! has
047! the
/0;! potential
B2/;1/.49! t/2!
damage or destroy your interests both domestically and abroad.
34>48;!2=!3;7/=25!52C=!.1/;=;7/7!:2/0!32>;7/[email protected]!413!4:=243D!
!

Leaked or
+;4E;3!
2=!iHegaHy
.99;84995!obtained
2:/4.1;3!information,
.1A2=>4/.21?!while
F0.9;! of
2A! great
8=;4/! value
<49C;! to
/2! the
/0;!
beneficiary, can
f the
:;1;[email protected]=5?!
@41!damage
34>48;! the
/0;!strategic
7/=4/;[email protected]! interests
.1/;=;7/7! o2A!
/0;! organization
2=841.G4/.21!
from where it was obtained, if acted upon effectively by a competitor
A=2>!F0;=;!./!F47!2:/4.1;[email protected]/;3!CB21!;AA;@/.B;/./2=!
or opportunist.
2=!
2BB2=/C1.7/D!Although
*9/02C80!this
/0.7!represents
=;B=;7;1/7! a4!serious
7;=.2C7! breach
:=;[email protected]! of
2A! security
7;@C=./5!
.1!/0;!702=/!/;=>?!F04/!.7!B2/;1/.4995!34>48.18!.1!/0;!9218!/;=>?!.7!/0;!
in the short term, what is potentially damaging in the long term, is the
9277!
.1./.4/[email protected]! the
/0;! resultant
=;7C9/41/! loss
9277! o2A!
@21A.3;[email protected];! in
.1! that
/04/!
loss o2A!
f initiative
f confidence
2=841.G4/.21!47!4!H74A;!413!7;@C=;!B4.=!2A!04137ID!!!
organization as a "safe and secure pair of hands".

It i s%1, n o20(,
t
8(,
uncommon f o30$,
r
-2+04402,
espionage t(0,
o b5#,
e
#19%02)*#,
)2,
an o n g 02*0%2*:,
oing,
undetected )26,
and ),
a
-26#(#+(#6,
draining )19#+(,
aspect 03,
of
6$)%2%2*,
business life,
5-1%2#11,;%3#

!
-0.97/!.13.4/.21!84/0;=.18!4=;!;1848.18!.1!0.8095!
Whilst individuals condoning and conducting such information gathering are engaging in highly
.99;849!
413!dangerous
3418;=2C7!activity,
[email protected]/./0;!tangible
/418.:9;! benefits
:;1;A./7!
:;1;A./7!
7! of
2A! doing
32.18! so
72! often
2A/;1! outweigh
2C/F;.80! the
/0;! risks;
=.7E7J! as
47!
illegal and
[email protected]!
[email protected]/.7;932>!detected
3;/;@/;3! i.A!
12/! effectively
;AA;@/.;AA;@/.>21./2=;3D! !I &/!
[email protected]>>21! fA2=!
such activity
s seldom
f not
t i.7!
s n12/!
o t uncommon
or
;7B.2148;!/2!:;!41!2182.18?!C13;/;@/;3!413!4!3=4.1.18!47B;@/!2A!34.95!9.A;D!
espionage to be an ongoing, undetected and a draining aspect of daily life.
!

Most countries
<01(,
+0-2($%#1,
+)2,
#=9#+(,
can e x p
ect
attacks
f
r
om
)(()+>1, 3$04,
#19%02)*#,
espionage
19#+%);%1(1,
specialists

!
&/!
.7! a4!National
$4/.2149!responsibility
=;7B217.:.9./5! t/2!
C13;=/4E;! reasonable,
=;47214:9;?! realistic
=;49.7/[email protected]! and
413!
It is
o undertake
[email protected]/[email protected]!
B=;@4C/.217! to
/2! deter
3;/;=! or
2=! counteract
@2C1/;[email protected]/! unscrupulous
[email protected]=CBC92C7! parties.
B4=/.;7D! To
)2!
practical precautions
=;[email protected];!
;KB27C=;! to
/2! this
/0.7!invisible,
.15;/! tangible
/418.:9;! threat,
/0=;4/?! is
.7! an
41! act
[email protected]/! 2A!
3C;!
reduce exposure
of due
3.9.8;[email protected];D!
diligence.

!
L27/!
@2C1/=.;7!may
>45!reasonably
=;47214:95! expect
;KB;@/! to
/2! receive
=;@;./0;! attention
4//;1/.21! of
2A! Espionage
(7B.2148;! or
2=! surveillance
MC=Most countries
7B;@.49.7/7!
2B;=4/.18!
21!
:;049A!
2A!
/0;.=!
@
@9.;1/7D!
9.;1/7D!
)0;7;!
F.99!
=418;!
A=2>!
@2>B;/./2=7!
specialists operating o n behalf o f their clients. These will range f r o m competitors t/2!
o
2BB2=/C1.7/7!/2!A2=;.81!82;1/7?!499!922E.18!/2!AC=/0;=!/0;.=!2F1!;137D!!
opportunists to foreign governments, all looking to further their own ends.
!

How is sensitive information obtained?
/0&,%1,1#21%(%"#,%230$4)(%02,05()%2#67,
There are two main methods:
)0;=;!4=;!/F2!>4.1!>;/0237N!
!
)0;!A.=7/!>;/023!.7!41!=;[email protected];?!B=;A;=4:95!4!B;=721!49=;435!.1!4!E;5!B27./.21!F./0.1!
The first method is via a human resource, preferably a person already in a key position within
/0;!
/4=8;/!organization.
2=841.G4/.21D!Whilst
-0.97/! the
/0;! recruitment
=;@=C./>;1/! or
2=! placement
2=!
[email protected];>;1/! 2A!
4! live
9.477;/! .7!
B=;A;=4:9;!
the target
of a
is /0;!
the preferable
2B/.21?!
.7!also
4972! the
/0;! most
>27/! time
/.>;!consuming,
@217C>.18?!complex
@2>B9;K! and
413!expensive.
;KB;17.! )[email protected]?! recruitment
=;@=C./>;1/!
option, it./! is
48;1/7!O2=!H04139;=7IP!F.99!>;;/!/0;!.3;1/.A.;3!/4=
48;1/7!O2=!H04139;=7IP!F.99!>;;/!/0;!.3;1/.A.;3!/4=8;/!49=;[email protected];?!;./0;=!3.=;@/95!2=!/0=2C80!
8;/!49=;[email protected];?!;./0;=!3.=;@/95!2=!/0=2C80!
agents (or "handlers") will meet the identified target
already in place, either directly or through
4a!third
4!
/0.=3!party.
B4=/5D!The
)0;!handler
04139;=! will
F.99!proceed
[email protected];;3! to
/2! profile
B=2A.9;! the
.13.A2=! areas
4=;47! 2A!
7/=;18/0?!
/0;! target
/4=8;/! individual
of strength,
F;4E1;77?!B=;A;=;[email protected];7!;/@[email protected];!/.>;IP!413!
F;4E1;77?!B=;A;=;[email protected];7!;/@[email protected];!/.>;IP!413!A2=>!41!477;77>;1/D!)0.7!477;77>;1/!F.99!=418;!
weakness, preferences etc ("face time") and A2=>!41!477;77>;1/D!)0.7!477;77>;1/!F.99!=418;!
form an assessment. This assessment will range
A=2>!
[email protected]@49! to
/2!financial.
[email protected]! Should
! M02C93! the
/0;! assessment
477;77>;1/! be
477;77>;1/!
:;! favorable,
A4<2=4:9;?! the
/0;! handler
04139;=! will
F.99! then
/0;1!
from psychological
B=2:;!
4=;47!
2A!
B;=72149!
F;4E1;77!
F./0!
4!
/2!
;KB413.18!
/0;>?!
F0.97/!
4/!
/0;!
74>;!
/.>;?!
probe areas of personal weakness with a view to expanding them, whilst at the same time,
;[email protected]=48.18!4=;47!2A!;>B4/05?!/0;=;:[email protected]!0.>Q
;[email protected]=48.18!4=;47!2A!;>B4/05?!/0;=;:[email protected]!0.>Q0;=!.1!/0;!B27./[email protected]=;[email protected]927;!
0;=!.1!/0;!B27./[email protected]=;[email protected];!
encouraging areas of empathy, thereby placing him/her
in the position of an increasingly close
@21A.341/D!
2:R;@/..7! t/2!
@;>;1/! a4! relationship
=;94/.2170.B! that
/04/! will
F.99! ripen
=.B;1! for
A2=! exploitation.
;KB92./4/.21D! T
! )0.7!
confidant. T! )0;!
h e objective
o cement
his
/;@01.SC;!.7!2A/;1!=;A;==;3!/2!47!H022E.18ID!!
technique is often referred to as "hooking".

CONFIDENTIAL
"#$%&'($)&*+!!
"#$%&'($)&*+!

1

,

elaman

Strategic
Security
Overview
'($)(#*%+,'#+-$%(.,!"#$"%#&
*%+,'#+-$%(
%+,'#+-$%(
%+,'#+-$%(.
.,!"#$"%#&
'($)(#
'($)(#*

O

v

e

r

v

!

i !"#$"%#&
e w

The second
)-.!
/.0123!method
4.5-13!is
6/!a7!leap
8.79! forward
:1;<7;3! in
62!sophistication,
/19-6/56075612=!which
6/! electronic
.8.05;1260! surveillance.
/>;[email protected]! The
)-.!
placement of listening devices in key areas such!7/!1::60./=!D17;3;114/=!5.8.9-12.!862./!723!
as offices, boardrooms, telephone lines and
9870.4.25!1:!86/5.262A!3.?60./!62!B.C!7;.7/!/>09870.4.25!1:!86/5.262A!3.?60./!62!B.C!7;.7/!/>0-!7/!1::60./=!D17;3;114/=!5.8.9-12.!862./!723!
homes can reveal a wealth of information. Not only is this about tangible business plans and
-14./!072!;.?.78!7!5!572A6D8.!D>/62.//!9872/!723!
the practice of any organization, but also, the quality of the dynamics and relationships within
5-.!9;70560.!1:!72C!1;A726E75612=!D>5!78/1=!5-.!F>7865C!1:!5-.!3C27460/!723!;.875612/-69/!<65-62!
those organizations.
n y "hooking"
a y we l l begin
i t h electronic
5-1/.!
1;A726E75612/@!Clearly,
"8.7;8C=! a72C!
G-11B62AH!operation
19.;75612! m
47C!
D.A62! w<65-!
.8.05;1260!
surveillance. Whilst
/>;[email protected]!
I-68/5! it65! is
6/! time
564.! consuming
012/>462A! to
51! transcribe
5;72/0;6D.! and
5;72/0;6D.!
723! analyze
7278CE.! the
5-.! recordings,
;.01;362A/=! this
5-6/! is
6/! a
7!
quick, clean and easy way to access and analyze proprietary information.
F>60B=!08.72!723!.7/C!<7C!51!700.//!723!7278CE.!9;19;6.57;C!62:1;[email protected]!!!
!
(F>788C!
?7863=!although
785-1>A-! i 65!
.J08>3./! t5-.!
->472! context,
0125.J5=! i 6/!
700.//62A! databases
3757D7/./! through
5-;1>A-!
Equally valid,
t excludes
h e human
s accessing
[email protected]!!K70B62A!47C!D.!>/.3!.65-.;!51!A75
[email protected]!!K70B62A!47C!D.!>/.3!.65-.;!51!A75-.;!62:1;475612!1;!/7D157A.!.8.05;1260!/C/5.4/!
-.;!62:1;475612!1;!/7D157A.!.8.05;1260!/C/5.4/!
"hacking". Hacking may be used either to gather information or sabotage electronic systems
DC!
62/.;562A!logic
81A60! bombs,
D14D/=!viruses
?6;>/./! etc.
[email protected]! M
L1/5!
1;A726E75612/! contact
0125705! the
5-.! outside
1>5/63.! world
<1;83! via
?67!
by inserting
o s t organizations
5.8.9-12.!
862./! and
723!can
072! bD.!
0125705.3! i62!
;.5>;[email protected]! Electronic
! (8.05;1260! "gatekeeper"
GA75.B..9.;H! and
723! "firewall"
G:6;.<788H!
telephone lines
e contacted
n return.
/C/5.4/!
7;.! now
21012/63.;.3!standard
/57237;3! amongst
7412A/5! most
41/5! organizations
41/5!
1;A726E75612/! as
7/! this
5-6/! form
:1;4! of
1:! access
700.//!
systems are
?61875612!
>/>788C! surfaces
/>;:70./! and
723!consequently
012/.F>.258C! the
5-.! threat
5-;.75! becomes
D.014./! tangible,
572A6D8.=! understood
>23.;/5113! and
723!
violation usually
counteracted.
01>25.;[email protected]!
!
%1;!72!62/6A26:60725!:..=!For an insignificant fee, when compared to the potential gain, it is
215!
36::60>85! to
51!find
:623!an
72!agent
7A.25! who
<688!arrange
7;;72A.! to
51! have
-7?.! listening
86/5.262A!
not difficult
3.?60./!
62/[email protected]!T! )-./.!
7A.25/! will
<688!range
;72A.! from
:;14!private
9;6?75.! security
/.0>;65C!
devices installed.
h e s e agents
0149726./!
M1:5.2! former
:1;4.;! government
A1?.;24.25! employees)
.4981C../N! t51!
5.8.9-12.!
companies (often
o telephone
.2A62..;/!51!9;6?75.!62?./56A751;/@!!)-6/!5C9.!1:!/>;?.688720.!A1./!
engineers to private investigators. This type of surveillance goes
12!37C!62!723!1>5!<65-!-6A-8C!/19-6/56075.3!.F>694.25=!86A-5!8.A78!
on day in and out with highly sophisticated equipment, light legal
9.27856./=!
723!instigators
62/56A751;/!normally
21;4788C! two
5<1! or
1;! three
5-;..! parties
97;56./! removed
;.41?.3!
penalties, and
:;14!
5-.!scene.
/[email protected]!Consequently,
! "12/.F>.258C=! from
:;14! the
5-.! point
91625! of
1:! view
?6.1:! the
5-.!
from the
9;.3751;=!5-.;.!7;.!/5;12A!4156?./=!7498.!4.72/!723!7!?.;C!A113!
predator, there are strong motives, ample means and a very good
0-720.!1:!215!D.62A!07>[email protected]!!
chance of not being caught.

This i%:,
s a), d1%;#66),
ilemma
89%:,
5)+#1,
6)4.,
faced b
y m
a n y a)41,
nd
+04:#=-#4(;.,
consequently i %(,
t i %:,
s
more d i 1%55%+-;(,
f f i c u l t t (0,
o
60$#,
1#5#41,
)*)%4:(, t(9%:,
defend against
his
form of attack than to
50$6,05,)(()+3,(9)4,(0,
%4:(%*)(#,%(>,
instigate it.

!
&:!/14.12.!6/!/5.7862A!C1>;!879519/=!C1>!B21&:!/14.12.!6/!/5.7862A!C1>;!879519/=!C1>!B21-1If someone is stealing your laptops, you know; however,
if someone is analyzing the strategy
723!:7D;60!1:!C1>;!1;A726E75612!C1>!47C!215!5;>8C!B21<=!.?.2!6:!C1>!47C!/>/[email protected]!&2!/-1;5=!-1and fabric of your organization you may not truly know, even if you may suspect. In short, how
31!C1>!B21!7;.!81/62A!/5;75.A60788C!/
31!C1>!B21!7;.!81/62A!/5;75.A60788C!/.2/656?.!62:1;475612!5-;1>A-!72!62?6/6D8.!4.36>4P!
.2/656?.!62:1;475612!5-;1>A-!72!62?6/6D8.!4.36>4P!
do you know if you are losing strategically sensitive
information through an invisible medium?
)-6/!
6/!a7!dilemma
368.447!faced
:70.3! by
DC! many.
[email protected]!Consequently,
"12/.F>.258C=! i65!
65t! is
6/! considerably
012/63.;7D8C! more
41;.! difficult
36::60>85! to
51! defend
3.:.23!
This is
7A762/5!5-6/!:1;4!1:!5-;.75!5-72!51!62/[email protected]!
against this form of threat than to instigate it.
!
/0&,10,2,340&,0$,5%41,0-(,%5,2,)6,),()$*#(7,
How do I know or find out if I am a target?
*//>4.!5-75!C1>!7;[email protected]!*/!78;.73C!36/0>//.3!C1>!47C!D.!57;A.5.3!62!36::.;.25!<7C/@!&5!<1>83!D.!
Assume that you are. As already discussed you may be targeted in different ways. It would be
7a!47Q1;!>23.;57B62A!51!012/57258C!412651;!723!62?./56A75.!788!4.5-13181A6./=!723!9;1D7D8C!128C!
7!47Q1;!>23.;57B62A!51!012/57258C!412651;!723!62?./56A75.!788!4.5-13181A6./=!723!9;1D7D8C!128C!
major undertaking to constantly monitor and investigate all methodologies, and probably only
<7;;725.3!
62!exceptional
.J0.9561278!circumstances.
06;0>4/5720./@! However,
! K1K1<1>83! be
D.! safe
/7:.! to
51! say
/7C! that
5-75! 6:!
C1>! are
7;.!
warranted in
t would
if you
D.62A!57;A.5.3=!C1>!-7?.!D..2!1;!7;.!7841/5!0.;57628C!D.62A!D>[email protected]!!"12/.F>.258C=!7!/being targeted, you have been or are almost certainly being bugged. Consequently, a sweep
1:!/.2/656?.!7;.7/!723!9-12.!862./!<1>83!D.!5-.!41/5!.::606.25=!01/5!.::.056?.!723!799;19;675.!
of sensitive areas and phone lines would be the most efficient, cost effective and appropriate
<7C!:1;<7;[email protected]!!
way forward.
!
*
*!
/472C! view
?6.7/! a7!standard
/57237;3!service,
/.;?60.=!alongside
7812A/63.! office
1::60.!cleaning
08.7262A! and
723!fire/access
:6;.R700.//!
A!sweep,
/C/5.4!47625.2720.=!072!D.!0123>05.3!75!72C!564.=!.65-.;!75!26A-5=!3>;62A!7!/.2/656?.!62S-1>/.!
system maintenance, can be conducted at any time, either at night, during a sensitive in-house
1;!
1::S/65.!meeting
4..562A!in
62!cars
07;/! or
1;! even
.?.2!airplanes.
76;9872./@!This
)-6/! provides
)-6/!
9;1?63./! either
.65-.;! immediate
644.3675.! reassurance
;.7//>;720.! 1;!
or off-site
or
572A6D8.!.?63.20.!1:!./96[email protected]!
tangible evidence of espionage activity.

CONFIDENTIAL
"#$%&'($)&*+!!
"#$%&'($)&*+!

2

,

elaman

!

Overview
!"#$"%#&

Strategic
Security
Overview
'($)(#*%+,'#+-$%(.,!"#$"%#&
*%+,'#+-$%(
%+,'#+-$%(
%+,'#+-$%(.
.,!"#$"%#&
'($)(#
'($)(#*
What do I do if I am being bugged?
/0)(,12,3,12,%4,3,)5,6#%7*,6-**#18,
First, teH no one. Assemble a trusted ! s " # management team.
%-./01!0233!45!5426!*//27832!9!0.:/02;!)27240!02976!!!

A!variety
*
*!
[email protected]! of
5A! options
5B0-54/!are
9.2!available,
9?9-398321! which
CD-ED! may
[email protected]!
[email protected]!
@! include
-4E3:;2! running
.:44-4>! a9! disinformation
;-/-4A5.790-54! campaign
E97B9->4! or
5.!
surveillance o p e5B2.90-541!
r a t i o n , f u rA:.0D2.!
t h e r i n v -4?2/0->90-541!
estigation, r e m
o v i n g t h0D2!
e d e ;2?-E2!
v i c e o 5.!
r
/:.?2-3394E2!
.275?-4>!
apprehending/investigating the technician/employee suspected of placing the device.
9BB.2D24;-4>F-4?2/0->90-4>[email protected]!/:/B2E02;!5A!B39E-4>!0D2!;2?-E26!!
)D2!
8:/-42//!activities
9E0-?-0-2/!and
94;!climate
E3-7902! at
90! that
0D90! time,
0-721!
0-721!
1! combined
The business
E578-42;! with
C-0D! the
0D2! quality
G:[email protected]! of
5A! the
0D2! device,
;2?-E21!
HCD-ED!>-?2/!94!-4;-E90-54!5A!0D2!/5BD-/0-E90-54!94;!A:4;-4>!82D-4;!0D2!D5/[email protected][email protected]!
(which gives an indication of the sophistication and funding behind the hostile party), are likely
05!;-E0902!0D2!9BB.5B.-902!E5:./2!5A!9E0-546!
to dictate the appropriate course of action.
!

!

!
!

CONFIDENTIAL
"#$%&'($)&*+!!
"#$%&'($)&*+!

!

,

! s "# INDEX
!"#$%&'()*
•••••

W • '-

. Introduction
!"!#!$%&'()*+&,(%
!#!$%&'(
!#!$%&'
()*
)*+
+&,&,(%
(%
2 - The Threat
-!#!./0!./'01&
- Recommendations
!#!30+(
!#!3
0+(44
440
0%)1&,
%)1&,(
(%5
%5
!2!#!30+(440%)1&,(%5
4 - Training
Overview
7 Course
8(*'50!9:0':,0
8(*'50!
9
:0':,0;
;
!6!#!.'1,%,%7!8(*'50!9:0':,0;
!6!#!.'1,%,%7
!6!#!.'1,%,%
5 - Training
syllabuses
[email protected]*505
!7 Course
8(*'50!=>[email protected]*505
8(*'50!=>[email protected]*505
6!#!3
- Recommended
A
!#!
30+(440%
0+(440%)
)0
0)
) Products
B'()
B'(
)*+
*+&&55
!A!#!30+(440%)0)!B'()*+&5
7 - Technical Data Sheets
=/00&5
/00&5
!C!#!.0+/%,+1?!D1&1!=/00&5
!C!#!.0+/%,+1?!D1&1!
!C!#!.0+/%,+1?!D1&1!=
- IP/PABX Manipulation
!E!#!$BFBGHI!J1%,K*?1&,(%
- Commercial
Quotations
!#!8(
!#!8
(44
440
0''+
+,1?!M*
,1?!M*
,1?!M*(
(&1&,
&1&,(
(%5
%5
!L!#!8(440'+,1?!M*(&1&,(%5
10!#!.0
- Terms
& Conditions
"N!#!.
"N!#!.0'45!O!8(%),&,(%5
"N
!#!.
0'45!O!8(
'45!O!8
(%),&,
%),&,(
(%5
%5
11"!#!8(
- Contact
Details
""!#!
""!#!8(%&1+&!D0&1,?5
"
"!#!
"!#!
8(%&1
%&1+
+&!D
&!D
&!D
&!D0
0&1,?5
&1,?5
"-!#!P?141%!81&1?(
"-!#!P?141%!81&1?(75!9:0':,0;
"
-!#!P?141%!81&1?(
-!#!P?141%!81&1?(
-!#!P?141%!81&1?(7
75!9:0':,0
5!9:0':,0
5!9:0':,0;
;
12
- Haman Catalogs
Overview

E
R
M
A
N
$ECU
lG
$
m
$RITV
nsOL
P .(

Idmd* .

The Threat
!"#$!"%#&'

!
!

!

T
H
E
THREA
T
!()$!(*)+!$
Technical Trends
!#,"-.,&/$!%#-01$

1-18
2324$

56778-.,&'.6-$96-.'6%.-:$
Communication Monitoring

19-23
2;3<=$

>.%#$!&??.-:$
Wire Tapping

23-26
<=3
!
!A59$AB##?1$
! A59$AB##?1$
s " # sweeps

27-40

A6F'B&%#$9&-.?8/&'.6-1$$$$$
software Manipulations

41-49
D23D;$

GAH$9&-.?8/&'.6-1$$$$
Isp Manipulations

49-54
D;3ID

!"#$%s AND TYPICAL Als & s
)-($'.!*$'!)/0&"*+!-&.1.!
FACING A ' s ( ) TEAM
%*"&$2!*!)."3!)(*3!

+,NFID-N!"L
"#$%&'($)&*+!!
"#$%&'($)&*+!

1

,

elaman

.

!

The Threat
!"#$!"%#&'

!

State-of-the-art technologies
('&'#)*+)'"#)&%'$'#,"-*.*/0#1$
of technical espionage
*+$'#,"-0,&.$#120*-&/#$
and counter-measures
&-3$,*4-'#%)5#&14%#1$

-./01/23!%20456789/:!-;<0=10>!
Speaker: Franz-Josef 5!h"uk",

:82?/2!;[email protected][email protected]/0?6C/0B/2!)-"D!
former captain and team-leader #S$%
8:[email protected]!E/[email protected]!&[email protected]/CCAG/4;/!HD*'I!
of the German Military Intelligence (MAD)

Overview
67#%70#8$
9**5$5*-0'*%0-/$
Room monitoring




:0-0&'4%0;0-/$$
Miniaturizing
Camouflage
Technical
trends
!#,"-0,&.$'%#-31$

!#.#,*554-0,&'0*-$5*-0'*%0-/$
Telecommunication monitoring
=-'#%,#2'0*-$&-3$80%#$'&220-/$
• Interception
and wire tapping
(*+'8&%#$5&-024.&'0*-1$>[email protected]$,*4%1#$*-.BC$
• s o f t w a r e manipulations (PBX course only)

Countermeasures
• R 901D$&-&.B101$&-3$?%#7#-'0*-$
i s k analysis and Prevention
!(• ! 5 " # Sweeps

Demonstrations
E#5*-1'%&'0*-1$

COWDEN
"#$%&'($)&*+!!
"#$%&'($)&*+!

,

elaman
.

!

The Threat
!"#$!"%#&'

!

1- Room Monitoring
()$*++,$-+./'+%/.0$

*++,$-+./'+%/.0$
Room Monitoring

!

CONFIDENTIAL
"#$%&'($)&*+!!
"#$%&'($)&*+!

!

,

elaman

.

!

The Threat
!"#$!"%#&'

!

Room Monitoring
())*$+),-')%-,.$
• Methods
Methods
• UUsing
s i n g miniaturized bugs
• UUsing
s i n g highly sophisticated unconventional camouflage
• UUsing
s i n g high-end transmission technologies

Manipulation of existing devices
• Manipulation

-

+-,-&'/%-0-,.$
Miniaturizing
1/%2&3#$+)/,'#4$5#6-3#7$81+59:&%'7;$
• Surface
Mounted Devices (5!D-"a#ts)
• Consequences
of using of s M D
>,4/7'%-&?$*&,/2&3'/%-,.$)2$3-%3/-'$:?&'#[email protected]$*&3"-,#7$
• Industrial
manufacturing of circuit plates by machines
?&%.#$,/*@#%$)[email protected]/.7$
large number of bugs
• LB)C$3)7'D$"-."$-,'#.%&'#4$3)*:),#,'7$
o w cost, high integrated components

CONFIDENTIAL
"#$%&'($)&*+!!
"#$%&'($)&*+!

,4

elaman .

!

The Threat
!"#$!"%#&'

!

()*)&'+%),)*-

!

()*)&'+%),)*-

!

!"NFID#N$%L
"#$%&'($)&*+!!
"#$%&'($)&*+!

5

,

elaman

.

!

The Threat
!"#$!"%#&'

!

A202&'+%2B20.$

(&)*+,-&.#$
Camouflage
• In
or as harmless items
/0$*%$&1$"&%)-#11$2'#)1$
3&--14$5&--$6&0#-14$"*--*514$7#8.8$"&0.20.$9#2-20.14$
• Wa
l l s , wall panels, hollows, (e.g. hanging ceilings,
:*+;-#$,-**%14$;+2-'<20$,+%02'+%#=$
double floors, built-in furniture)
>*-2:<1##)20.$)&'#%2&-$7#8.8$5**:4$)#'&-=$
>*-2:<1##)20.$)&'#%2&-$
• solid-seeming
material 7#8.8$5**:4$)#'&-=$
(e.g. wood, metal)
/012.02,29&0'$*;?#9'1$7#8.8$6&1'#;*&%:4$:**%<1'*6=$
/012.02,29&0'$*;?#9'1$7#8.
8$6&1'#;*&%:4$:**%<1'*6=$
• Insignificant
objects (e.g.8$6&1'#;*&%:4$:**%<1'*6=$
pasteboard, door-stop)
@#9*%&'2*01$7#8.8$6&20'20.14$,-*5#%1=$
@#9*%&'2*01$7#8.8$6&
20'20.14$,-*5#%1=$
• Decorations
(e.g. paintings,
flowers)

CONFIDENTIAL
"#$%&'($)&*+!!
"#$%&'($)&*+!

,6

elaman

.

!

The Threat
!"#$!"%#&'

!

(&)*+,-&.#$

(&)*+,-&.#$
Camouflage
/0$&%'12-#0$*,$3&1-4$+0#$
• As
articles of daily use
5#0671'#)0$8#9.9$0'&):;$:&:#%$2-1:$5#0671'#)0$8#9.9$0'&):;$:&
:#%$2-1:$• Desk-items
(e.g. stamp, paper
clip box, mouse pad,
&0"'%&4>$
ashtray)
?%1'[email protected]$+'#@01-0$8#9.9$:#@;$"1."7-1."'#%>$
• Wr
i t i n g utensils (e.g. pen, high-lighter)
A#%0*@&-$B'#)0$8#9.9$C*<1-#;$.&07-1."'#%;$2-*'"#0D>$
A#%0*@&-$B'#)0$8#9.9$C*<1-#
;$.&07-1."'#%;$2-*'"#0D>$
• Personal
Items (e.g. Mobile,;$.&07-1."'#%;$2-*'"#0D>$
gas-lighter, clothes!)

CONFIDENTIAL
"#$%&'($)&*+!!
"#$%&'($)&*+!

,7

elaman .

!

The Threat
!"#$!"%#&'

!

(&)*+,-&.#$

!

(&)*+,-&.#$

!"NFID#N$%L
"#$%&'($)&*+!!
"#$%&'($)&*+!

8

,

elaman .

!

The Threat
!"#$!"%#&'

!

(&)*+,-&.#$

(&)*+,-&.#$

!

!"NFID#N$%L
"#$%&'($)&*+!!
"#$%&'($)&*+!

9

,

elaman

.

!

The Threat
!"#$!"%#&'

!

(&)*+,-&.#$

(&)*+,-&.#$
Camouflage
• In
electrical devices
/0$#-#1'%21&-$3#421#5$
• M6*72-#$8"*0#$&11+)+-&'*%5$&03$1"&%.#%59$'#-#8"*0#$&03$
o b i l e phone accumulators and chargers, telephone and
)&205$&3&8'#%$&03$8-+.59$-2."'$5:2'1"#5$
mains adapter and plugs, light switches
• M6*'2*0$&03$5)*;#$3#'#1'*%59$&2%$1*032'2*020.$1*0'%*-$
o t i o n and smoke detectors, air conditioning control
5<5'#)5$
systems

=#5;$2'#)5$>#?.?$1&-1+-&'*%
59$3#5;$-&)859$%&32*[email protected]$
• D=#5;$2'#)5$>#?.?$1&-1+-&'*%59$3#5;$-&)859$%&32*[email protected]$
e s k items (e.g. calculators,
desk lamps, radios)
(*))+021&'2*0$5<5'#)5$>#?.?$,&A$)&1"20#59$B1$(&)#%&[email protected]?$
(*))+021&'2*0$5<5'#)5$>#?.?$
• Communication
systems (e.g. ,&A$)&1"20#59$B1$(&)#%&[email protected]?$
fax machines, Pc Cameras).

CONFIDENTIAL
"#$%&'($)&*+!!
"#$%&'($)&*+!

1

0

,-

elaman .

!

The Threat
!"#$!"%#&'

!

Camouflage
(&)*+,-&.#$

(&)*+,-&.#$

!

!"NFID#N$%L
"#$%&'($)&*+!!
"#$%&'($)&*+!

1

1

,,

ldmd! .

. .

!

The Threat
!"#$!"%#&'

!

(&)*+,-&.#$

!

(&)*+,-&.#$

!

CONFIDENTIAL
"#$%&'($)&*+!!
"#$%&'($)&*+!

,12

elaman

. . .

!

The Threat
!"#$!"%#&'

!

Technical Trends
!#(")*(&+$!%#),-$
./0"*-'*(&'#,$'#(")/
./0"*-'*(&'#,$'#(")/+/1*#-$/2$(/)'%/+$
+/1*#-$/2$(/)'%/+$
• Sophisticated
technologies
of control
• Vo
i c e control (VOX) is standard today
3/*(#$(/)'%/+$43567$*-$-'&),&%,$'/,&8$
• R9&,*/$(/)'%/+$/2$&++$0&%&:#'#%-$4#;1;$5<=5>>?$0/@#%$&),$
a d i o control of all parameters (e.g. ON-OFF, power and
frequency)
2%#AB#)(87$
• R9#:/'#$0/@#%$5<=5>>$4C0&--*D#$EB1-F7$
e m o t e power ON-OFF ("passive bugs")

G/)'%/+$E8$'*:#%$/%$-#)-/%-$
• Control
by timer or sensors

!#(")*(&+$!%#),-$

!

CONFIDENTIAL
"#$%&'($)&*+!!
"#$%&'($)&*+!

1

3

,-

elaman

...

!

The Threat
!"#$!"%#&'

!

Technical Trends
!#(")*(&+$!%#),-$

NIL

!

Technical Trends
!#(")*(&+$!%#),-$
• State-of-the-art
methods of transmission
.'&'#/01/'"#/&%'$2#'"0,-$01$'%&)-2*--*0)$
• U3-*)4$"*4"/#),$-'&),&%,$5%0(#,6%#-$&),$5%0'0(0+-$78.9:$
s i n g high-end standard procedures and protocols (GsM,
DECT, Bluetooth, W
;<=!:$>+6#'00'":$?/@ABC$
• M9*-6-#$01$"*4"+D$&E&*+&F+#$G.9$&),[email protected];$-'&),&%,$
i s u s e of highly available ISM and LPD standard
(0250)#)'-$7#I4I$J&+K*#/'&+K*#-$&),$'#+#2#'%D$
components (e.g. walkie-talkies and telemetry
'%&)-2*''#%-C$
transmitters)

9*-6-#$01$"*4"/#),$2#'"0,-$
• M9*-6-#$01$"*4"/#),$2#'"0,-$01$J*%#,$'%&)-2*--*0)-$7#I4I$
i s u s e of high-end methods 01$J*%#,$'%&)-2*--*0)-$7#I4I$
of wired transmissions (e.g.
1*F#%/05'*(-:$G.;B$&),[email protected]$J*%*)4C$
fiber-optics, I D N and LAN wiring)

CONFIDENTIAL
"#$%&'($)&*+!!
"#$%&'($)&*+!

1

4

,-

elaman .

!

The Threat
!"#$!"%#&'

!

!#(")*(&+$!%#),-$

!

!#(")*(&+$!%#),-$

!

!"NFID#N$%L
"#$%&'($)&*+!!
"#$%&'($)&*+!

1

5

,-

elaman

.

!

The Threat
!"#$!"%#&'

!

Technical Trends
!#(")*(&+$!%#),-$
.&)*/0+&'*1)$*)-'#&,$12$*)-'&++&'*1)$
• Manipulation
instead of installation
• M.*-0-#$12$#3*-'*)4$-5-'#6-$7#848$/"1)#$-5-'#6-9$:;-9$
i s u s e of existing systems 7#848$/"1)#$-5-'#6-9$:;-9$
(e.g. phone systems, PCs,
.*-0-#$12$#3*-'*)4$-5-'#6-$
intercoms and loudspeaker systems)
*)'#%(16-$&),$+10,-/#&• Modification
of common electric
devices (e.g. telephones,
.1,*2*(&'*1)$12$(1661)$#+#('%
*($,#>*(#-$7#848$'#+#/"1)#-9$
.1,*2*(&'*1)$12$(1661)$#+#('%*($,#>*(#-$7#848$'#+#/"1)#-9$
office machines and multimedia systems)
122*(#$6&("*)#-$&),$60+'*6#,*&$-5-'#6-=$

!#(")*(&+$!%#),-$

!

CONFIDENTIAL
"#$%&'($)&*+!!
"#$%&'($)&*+!

1

6

,-

elaman .

!

The Threat
!"#$!"%#&'

!

!#(")*(&+$!%#),-$

!#(")*(&+$$
!%#),-$
!

!"NFID#N$%L
"#$%&'($)&*+!!
"#$%&'($)&*+!

1

7

,-

elaman

...

!

The Threat
!"#$!"%#&'

!

Technical Trends
!#(")*(&+$!%#),-$
.#(#*/*)0$12$3)*)'#),#,$#4&)&'*1)-$
• Receiving
of unintended emanations
• Reproducing
of compromising emanations of PC
.#5%1,3(*)0$12$(145%14*-*)0$#4&)&'*1)-$12$67$
components (e.g. graphic board, monitor, printer,
(1451)#)'-$8#909$0%&5"*($:1&%,;$41)*'1%;$5%*)'#%;$
keyboard)
$
• ATTENTION:
The emanation of TFT flat screens is
[email protected]!BCAD$!"#$#4&)&'*1)$12$!E!$2+&'$-(%##)-$*-$
stronger than the emanations of visual display units with
-'%1)0#%$'"&)$'"#$#4&)&'*1)-$12$/*-3&+$,*-5+&=$3)*'-$F*'"$
conventional tubes!!
(1)/#)'*1)&+$'3:#(1)/#)'*1)&+$'3:#-!

Technical Trends
!#(")*(&+$!%#),-$

wu!

J .

) k ' .14
i

itiZittet

!

CONFIDENTIAL
"#$%&'($)&*+!!
"#$%&'($)&*+!

1

8

,-

elaman .

!

The Threat
!"#$!"%#&'

!

Telecommunication Monitoring
!#(#)*++,-.)&'.*-$/*-.'*%.-0$
• Risks
from international calls
1.232$4%*+$.-'#%-&'.*-&($)&((2$
• Monitoring
of microwave-transmissions
/*-.'*%.-0$*4$+.)%*5&6#7'%&-2+.22.*-2$
/*-.'*%.-0$*4$+.)%
*5&6#7'%&-2+.22.*-2$
• Monitoring
of the communication satellites
/*-.'*%.-0$*4$'"#$)*++,-.)&'.*-$2&'#((.'#2$
• Monitoring
of national and .-'#%-&'.*-&($'#(#9"*-#75.%#2$
international telephone-wires
/*-.'*%.-0$*4$-&'.*-&($&-8$.-'#%-&'.*-&($'#(#9"*-#75.%#2$
/*-.'*%.-0$*4$-&'.*-&($&-8$
:.-)(;$2#&7)&(incl. sea-cable and fiber optic wires)

!#(#)*++,-.)&'.*-$/*-.'*%.-0$
Telecommunication Monitoring

CONFIDENTIAL
"#$%&'($)&*+!!
"#$%&'($)&*+!

1

9

,-

elaman .

!

The Threat
!"#$!"%#&'

!

Telecommunication Monitoring
!#(#)*++,-.)&'.*-$/*-.'*%.-0$

!#(#)*++,-.)&'.*-$/*-.'*%.-0$
Telecommunication Monitoring

!

CONFIDENTIAL
"#$%&'($)&*+!!
"#$%&'($)&*+!

2

0

,-

elaman . . .

!

The Threat
!"#$!"%#&'

!

Telecommunication Monitoring
!#(#)*++,-.)&'.*-$/*-.'*%.-0$

Telecom!#(#)*+1$
munication
+,-.)&'.*-$$
/*-.'*%.-0$
Monitoring

!"NFID#N$%L
"#$%&'($)&*+!!
"#$%&'($)&*+!

2

1

,-

elaman .

!

The Threat
!"#$!"%#&'

!

Telecommunication Monitoring
!#(#)*++,-.)&'.*-$/*-.'*%.-0$

1.%#(#22$!%&-2+.22.*-2$

!

!"NFID#N$%L
"#$%&'($)&*+!!
"#$%&'($)&*+!

2

2

,,

!

The Threat
!"#$!"%#&'

!

()%#*#++$!%&,+-)++).,+$

!

()%#$!&//),0$
Wire Tapping
1.2%3#+$.4$5&,0#%$
• sources
of danger
627*)3$,#'8.%9+$:61!;• Public
networks ( ! " N )
• P6=>+$&,5$5)+'%)72').,$7.?#+$
B X s and distribution boxes
[email protected]**$'#*#/".,#$8)%#+$
l l telephone wires

!#*#/".,#$/*20+$&,5$&5&/'#%+$
• Telephone
plugs and adapters
!#*#3.--2,)3&').,$5#A)3#+$:'#*#/".,#+B$4&?$&,5$
!#*#3.--2,)3&').,$5#A)3#
+$:'#*#/".,#+B$4&?$&,5$
+$:'#*#/".,#+B$4&?$&,5$
• Telecommunication
devices
(telephones, fax and
&,+8#%),0$-&3"),#+B$-.5#-+answering machines, modems)

CONFIDENTIAL
"#$%&'($)&*+!!
"#$%&'($)&*+!

2

3

,-

elaman .

!

The Threat
!"#$!"%#&'

!

()%#$!&**)+,$

!

()%#$!&**)+,$

!"NFID#N$%L
"#$%&'($)&*+!!
"#$%&'($)&*+!

2

4

,-

elaman

..

!

The Threat
!"#$!"%#&'

!

()%#$!&**)+,$
-.+)'.%)+,$./$0.12$

!

()%#$!&**)+,$
Wire Tapping
o

4

.

i eloWAitii a i • • m i l GICIIA P e l l i l i c
j j
!

• • :

t i ? 14.11 I. Vi1

'4 W . & W . !. k

' . H

' , $
I i. scut

!

.

%

.

"

4 1 J

%

*
1.1*+, - IPILLtil
'

LstAta.t 9 2
‚ ' I

" .

u
I

7 ; , I i i
i 7
• 2..VI". L 0 & 1 ' & L 1 2
I
i
V s - s w a t s z t - i s s - 7-1
l
' 4..'
"
V
#
7.1 4 V 0 I l i s t S c z _
J 4 . i s s u e L 1 7 - 1 . 4 4 - ,. I

.2 t _ s a n i t L 1 ' L L 1
s
tA i 4 ' J '

' ‚ ' I 7ItArt ‚ . ‚
se L 7 8 ' '
$ ' 7

I. ! #

7

s

7

#

'

L

.
*

,

S21.5-1 ' I i "
I
'
7 4

2

t . . &V. 1

it.

I t . 4 .
k
O
t ' - ' H . ' J
r t .
2

,
: s c a m

I s s i t 177a 2 *

' 1 '

L 1

Lit, s a;

•#

W
O w e .
i

.
l a .
' . '
t

Lit'

.

'

11

. romestia7

;1'6 ! " ' . I '
a
l
. U''V

t
l
t a m
'

-

-

.

-

#

.

" L
' ? ,
I ' "
# t .
S e e !
I " " - :ES
ES u . S e t S i i - 1 4 ' I ; ' . ' "
i - " ' t M'toc'L
I
f
j
t 5 Itil. 7 s


.

L i s
.., # ' 4 '4 .
"

7C 2 = t s I I I

.
'
'
.
.
" •' 2 I l .
. .
, -.
V. . . # .

-

V
.

!

CONFIDENTIAL
"#$%&'($)&*+!!
"#$%&'($)&*+!

2

5

,-

elaman . . .

!

The Threat
!"#$!"%#&'

!

!#(#)"*+#$,-./$

!

!#(#)"*+#$,-./$

!"NFID#N$%L
"#$%&'($)&*+!!
"#$%&'($)&*+!

2

6

,-

elaman

. . .

!

The Threat
!"#$!"%#&'

!

!()*$(+##,-$

!

!
!()*$(+##,-$
! ()*$(+##,-$
s " # sweeps
."/-01&2$-#&%1"$
• Physical
search
• M*&34&2$5,#3036$57$&22$"5225+-$8-1%#+9%0:#%;$
a n u a l opening of all hollows (screwdriver)
• Vi<0-4&2$03-,#1'053$8=0%%5%->$206"'-;$
s u a l inspection (mirrors, lights)
[email protected]%&/$03-,#1'053$57$&22$0'#=-$
- r a y inspection of all items
• UA-036$5,'01&2$#395-15,#-$&39$:09#5$#395-15,#-$75%$
s i n g optical endoscopes and video endoscopes for
inaccessible hollows
03&11#--0B2#$"5225+-$

CONFIDENTIAL
"#$%&'($)&*+!!
"#$%&'($)&*+!

2

7

,-

ldmd!

..

!

The Threat
!"#$!"%#&'

!

" ()*$(+##,-$
s # $ sweeps
!
!()*$(+##,-$
open wire
known distribution box

impulse
unknown
coupling





-


.

-

w

_

I .

I

!

!
!()*$(+##,$
%()*$(+##,$
5&' Sweep

-

i '

4
".

2

)

2 1 2

21
i174 2 0 0 , 1 1 1 1 , 1 3 1111
" 33,399 ' "
c a n

1 .
M ' "
; 1 0

Vl 120,7 2 ',% ' I I , ' 100.1
14' 2 , 0
• iii.
"

21
'U

NI

t i (
!

' . 0
!"

i I i . i
if'$"

.13 I L l
I )
.9 - ) l ' • -

4.214 1 0 2 1

1 , I

!"

'
10

ml
-7200,, - n u I

‚100

now

IN
324$

CONFIDENTIAL
"#$%&'($)&*+!!
"#$%&'($)&*+!

I
4,.

0

no

100
'120

70
'40'

24,
1)
22?'

2

!

8

,-

ldmd!

.

!

The Threat
!"#$!"%#&'

!

! ()*$(+##,-$
s " # sweeps
!
!()*$(+##,-$
• l.(/0$,"12#$-3-'#4$5"#56-$
D N phone system checks
• Checking
the configuration of the features
)"#56728$'"#$512978:%&'712$19$'"#$9#&':%#-$
• Checking
for warning-tones
)"#56728$91%$+&%2728;'12#-$
• Checking
the remote access
)"#56728$'"#$%#41'#$&55#--$

)"#56728$91%$• Checking
for default users and passwords
)"#56728$>18$97=#-$
• Checking
Log files

!
!()*$(+##,$
$()*$(+##,$
5%& Sweep
$
::cmmand: l i s t
list history

hist

BISTORY
Date o f L o a d e d T r a n s l a t i o n : 1 2 : 0 0
Date
Time P o r t
11 / 0 1 1 5 : 2 8 N E T
11 / 0 1 1 5 : 2 2 N E T
11 ( 0 1 1 5 : 1 7 N E T
11 / 0 1 1 5 : 0 3 N E T
11 / 0 1 1 5 : 0 0 N E T
11 / 0 1 1 5 : 0 0 N E T
11 / 0 1 1 5 : 0 0 N E T
11 / 0 1 1 5 : 0 0 N E T
11 / 0 1 1 5 : 0 0 N E
11 / 0 1 1 4 : 5 9 N E
p r e s s CANCEL t o

Login
sciboz
sciboz
tis
sciboz
sciboz
sciboz
sciboz
sciboz
sciboz
sciboz
quit p r

Actn
add
cha

am s a t A u g 1 9
Object
station
station

c h a
vector
station
d u p
a d d
dup-stn
r e m
station
station
d u p
a d d
dup-stn
station
d u p
e s s NEXT PAGE t o

CONFIDENTIAL
"#$%&'($)&*+!!
"#$%&'($)&*+!

2

Qualifier
1100
1700
117
1999
6599
6559
1996
5588
1997
continue

9

,-

elaman

. . .

!

The Threat
!"#$!"%#&'

!

2- Typical Risks
()$!*+,-&.$/,010$

!*+,-&.$/,010$
Typical Risks
2#&1$+3,4'0$35$'"#$-340'%6-',34$
• Weak
points of the construction
7.&-,48$'"#$9,0'%,:6',34$:3;#0$,4$-.#&4,48$%33<0$
• Placing
the distribution boxes in cleaning rooms
7.&-,48$'"#$7=>$,4$-%,',-&.$%33<0$34$'"#$8%3649$5.33%$
7.&-,48$'"#$7=>$,4$-%,',-&.$
%33<0$34$'"#$8%3649$5.33%$
• Placing
the PBX in critical rooms
on the ground floor
?9,%#-'$'3$+6:.,-$&%#&[email protected]$
(direct to public areas)

CONFIDENTIAL
"#$%&'($)&*+!!
"#$%&'($)&*+!

!

"

,-

elaman .

!

The Threat
!"#$!"%#&'

!

!()*+&,$-*./.$

!

!()*+&,$-*./.$

!

!"NFID#N$%L
"#$%&'($)&*+!!
"#$%&'($)&*+!

3

1

,-

elaman

. . .

!

The Threat
!"#$!"%#&'

!

Typical Risks
!()*+&,$-*./.$
0%1&2*3&'*42&,$5*.'&/#.$
• Organizational
mistakes
• Missing
documentation about the telecommunication
6*..*21$74+85#2'&'*42$&948'$'"#$'#,#+45582*+&'*42$
wiring
:*%*21$
• s ;'4%*21$'"#$74+85#2'&'*42$:*'"$2&5#.t o r i n g the documentation with names, room and
extension numbers in the distribution boxes
#='#2.*42$2859#%.$*2$'"#$7*.'%*98'*42$94=#.$

!

!()*+&,$-*./.$

CONFIDENTIAL
"#$%&'($)&*+!!
"#$%&'($)&*+!

3

2

,-

elaman

.

!

The Threat
!"#$!"%#&'

!

!()*+&,$-*./.$

!

!()*+&,$-*./.$
Typical Risks
0%1&2*3&'*42&,$5*.'&/#.$
• Organizational
mistakes
62+42'%4,,#7$&++#..$'4$89:;$'#.'*)5#2'$4?$'"#$.#%@*+#$
62+42'%4,,#7$&++#..$'4$89:;$'#
.'*)5#2'$4?$'"#$.#%@*+#$
• Uncontrolled
access to I D N test-equipment
of the service
staff
.'&??$
• U6.*21$'"#$5#54%($4?$?&A$5&+"*2#.$B*'"4>'$)#%*47*+&,$
s i n g the memory of fax machines without periodical
+"#+/*21$'"#$.'4%#7$2>5C#%.$
checking the stored numbers

CONFIDENTIAL
"#$%&'($)&*+!!
"#$%&'($)&*+!

3

3

,,

elaman . . .

!

The Threat
!"#$!"%#&'

!

!()*+&,$-*./.$
0#&.1%#2#3'$&34$
!#.'$561*)2#3'$

!()*+&,$-*./.$

!

!"NFID#N$%L
"#$%&'($)&*+!!
"#$%&'($)&*+!

3

4

,-

elaman

.

!

The Threat
!"#$!"%#&'

!

Typical Risks
!()*+&,$-*./.$
0%1&2*3&'*42&,$5*.'&/#.$
• Organizational
mistakes
• Outsourcing
of all services in the telecommunication
06'.46%+*21$47$&,,$.#%8*+#.$*2$'"#$'#,#+45562*+&'*42$$$
(e.g. wiring, installation, &=5*2*.'%&'*42$
administration,$
service)
9#:1:$;*%*21&=5*2*.'%&'*42
$
9#:1:$;*%*21$
• Missing
possibility to check the outsourced service
?*..*21$)4..*@*,*'($'4$+"#+/$'"#$46'.46%+#=$.#%8*+#$

!()*+&,$-*./.$
Typical Risks
!#+"2*+&,$;#&/$)4*2'.$
• Technical
weak points
• Technical
rooms and distribution boxes are not
!#+"2*+&,$%445.$&2=$=*.'%*@6'*[email protected]#.$&%#$24'$
+42.#B6#2',($,4+/#=$9#:1:$6.*21$.'&2=&%=$,4+/.$,*/#$-C!!DE$
consequently locked (e.g. using standard locks like RITTAL
FGHI$4%$JC-DK$LFFF>$
3524 or DIRAK 1333)
• CM45542$6.#$47$'"#$=*.'%*@6'*[email protected]#.$74%$
o m m o n use of the distribution boxes for
'#,#+45562*+&'*42telecommunication, data network, access control,
*2'%6.*42N$&2=$7*%#N&,&%5$.(.'#5.$
intrusion- and fire-alarm systems

CONFIDENTIAL
"#$%&'($)&*+!!
"#$%&'($)&*+!

3

5

,-

elaman . . .

!

The Threat
!"#$!"%#&'

!

!()*+&,$-*./.$

!()*+&,$-*./.$
Typical Risks

J

!"NFID#N$%L
"#$%&'($)&*+!!
"#$%&'($)&*+!

!

3

6

,-

elaman .

!

The Threat
!"#$!"%#&'

!

!()*+&,$-*./.$

!

!()*+&,$-*./.$

!

!"NFID#N$%L
"#$%&'($)&*+!!
"#$%&'($)&*+!

3

7

,-

elaman

.

!

The Threat
!"#$!"%#&'

!

!()*+&,$-*./.$

!

!()*+&,$-*./.$
Typical Risks
!#+"0*+&,$1#&/$)2*0'.$
• Technical
weak points
34'.*5#6$0#1$1*%*07$8.4%),4.$+&9,#$2%$1*%#.:$
• Outsized
new wiring (surplus cable or wires)
;00#+#..&%($7>$
;00#+#..&%($*0$+&.#$2=$.'%4+'
4%#6$1*%*07$8#>7>$
• Unnecessary
Patches *0$+&.#$2=$.'%4+'4%#6$1*%*07$8#>7>$
in case of structured
wiring (e.g.
[email protected]!AB:$
CAT-5)
C*..*07$#0+%()'*20$.(.'#D.$=2%$+%*'*+&,$'#,#+2DD40*+&'*20$
C*..*07$#0+%()'*20$.(.'#D.$=2
• Missing
encryption systems for%$+%*'*+&,$'#,#+2DD40*+&'*20$
critical telecommunication
'%&0.D*..*20.$8E2*+#F$=&G$&06$6&'&:$
transmissions (voice, fax and data)

CONFIDENTIAL
"#$%&'($)&*+!!
"#$%&'($)&*+!

3

8

,-

elaman .

!

The Threat
!"#$!"%#&'

!

!()*+&,$-*./.$

!

!()*+&,$-*./.$

!

CONFIDENTIAL
"#$%&'($)&*+!!
"#$%&'($)&*+!

3

9

,-

elaman

. . .

!

The Threat
!"#$!"%#&'

!

Typical Risks
!()*+&,$-*./.$
!#+"0*+&,$1#&/$)2*0'.$
• Technical
weak points
• Digital
phones with hands-free-answer-back in critical
3*4*'&,$)"20#.$1*'"$"&05.67%##6&0.1#%68&+/$*0$+%*'*+&,$
rooms (e.g. of board members)
%229.$:#;4;$27$82&%5$9#98#%.• Telephones
(as well as analog) in conference rooms
!#,#)"20#.$:&.$1#,,$&.$&0&,24• U=.*04$+2%5,#..$)"20#.$:#.)#+*&,,($27$72%9#%$4#0#%&'*20$
s i n g cordless phones (especially of former generation
which can easily be monitored)
1"*+"$+&0$#&.*,($8#$920*'2%#5
!()*+&,$-*./.$

CONFIDENTIAL
"#$%&'($)&*+!!
"#$%&'($)&*+!

4

0

,-

elaman

.

!

The Threat
!"#$!"%#&'

!

3- software Manipulations
()$*+,'-&%#$.&/0123&'0+/4$

*+,'-&%#$.&/0123&'0+/4$
Software Manipulations
5#&4+/4$,+%$1+44063#$7&/0123&'0+/4$
• Reasons
for possible manipulations
.&/2,&8'2%#%4$&%#$09/+%0/9$'"#$4#82%0':$%04;4$+,$'"#0%$$
.&/2,&8'2%#%4$&%#$09/+%0/9$'"#$
• Manufacturers
are ignoring the 4#82%0':$%04;4$+,$'"#0%$$
security risks of their I5DN
4:4'#74$?4+7#$0/4'
&[email protected]&8;A++%4BC$
4:4'#74$?4+7#$0/4'&[email protected]&8;A++%4BC$
systems (some install
"backdoors")
DA70/04'%&'+%4$"&E#$/+$&-&%#/#44$+,$#F04'0/9$4#82%0':$
DA70/04'%&'+%4$"&E#$/+$&-&%
#/#44$+,$#F04'0/9$4#82%0':$
• Administrators
have no awareness
of existing security
%04;4$?#G9G$6:$240/9$%#7+'#$&88#44C$
risks (e.g. by using remote access)
• UH4#%4$+,$$4:4'#74$1#%7&/#/'3:$&4;$,+%$/#-$'#8"/08&3$
s e r s of I D N systems permanently ask for new technical
,#&'2%#4I$-0'"+2'$'"0/;0/9$&6+2'$%04;4$
features, without thinking about risks
• s *+,'-&%#$7&/0123&'0+/4$6:$41#80,08$&''&8;4$?6:[email protected]#'"+A4$
o f t w a r e manipulations by specific attacks (by "methods
+,$"&8;#%4BC$
of hackers")

CONFIDENTIAL
"#$%&'($)&*+!!
"#$%&'($)&*+!

4

1

,-

et

!

The Threat
!"#$!"%#&'

!

software Manipulations
()*'+&%#$,&-./01&'.)-2$
! I - " # $ ;
w5 0 0 : % & !
w

" # W $'#R'(

PASSWORD I ) # 2 *
+
HICOM
I

bIB' NAME
I
A m m o R m ATr o u s I
I I
1 1 1 1 1 1 1
I

s n a u s
I

I

+ " ' ' + ,
I I I I I I

I
I
L o c y I I ' R I E * I TIME

I i B 4 * 2 1 + 8 7 - 4 * 2 1 + l l L l . l ) I / I " l l ' I I l
+—+
— = +
+
=

.
. i — + +-+-+ + + + +
I 1 1 01"
I
%%2%%23%%4 1
I
5
5 5 5 5
I

I

9 9

(NIN)

+
I

0

l

!

()*'+&%#$,&-./01&'.)-2$
Software Manipulations
3.-4$)*$5&-./01&'.)-2$
• Kind
of manipulations
,&-./01&'.)-$&-4$5.202#$)*$%#601&%$*#&'0%#2$7#868$"&-429
,&-./01&'.)-$&-4$5.202#$)*$
• Manipulation
and misuse of %#601&%$*#&'0%#2$7#868$"&-429
regular features (e.g. hands*%##$&-2+#%$:&;.%'0&1?$;)-*#%#-;[email protected]$
free answer back or "virtual" conferencing)
A;'.>&'.)-$)*$".44#-$*#&'0%#2$7#868$+.'-#22$*0-;'.)-B$
A;'.>&'.)-$)*$".44#-$*#&'0%#2
• Activation
of hidden features$7#868$+.'-#22$*0-;'.)-B$
(e.g. witness function,
2#%>.;#$):2#%>.-6$)%$=1&+*01?$.-'#%;#/'.)[email protected]$
service observing or lawful" interception)
• AA44.-6$-#+$2#1*9;%#&'#4$*#&'0%#2$7)+-$/%)6%&[email protected]$')$'"#$
d d i n g new self-created features (own programs) to the
PBX
CDE$

CONFIDENTIAL
"#$%&'($)&*+!!
"#$%&'($)&*+!

4

2

,-

elaman

.

!

The Threat
!"#$!"%#&'

!

software Manipulations
()*'+&%#$,&-./01&'.)-2$
,.202#$)*$%#301&%$*#&'0%#2$
• Misuse
of regular features
display cor 1
CLASSO F R E S T R I C T I O N
COR N u m b e r : 1
COR D e s c r i p t i o n : I N T E R N A T I O N A L
Can R e S e r v i c e O b s e r v e d ?
"an H e A S e r v i c e O b s e r v e r ?

A P LT 7 !

Calling Party Restriction:n o n .
Called Ta r t y R e s t r i c t i o n :

1 F o r c e d E n t . r y o r A c c o u n t Codes? n
P r i o r i t y Queuing? n

D

i

r

e

c

t

Agent Calling? n

()*'+&%#$,&-./01&'.)-2$
Software Manipulations
,.202#$)*$%#301&%$*#&'0%#2$
• Misuse
of regular features
Page " o f

displaysystem-parameters features
F E A I D R E R E L AT E D S Y S T E M PARAMETERS
S E RV I C E O B S E R V I N G
S e r v i c e O b s e r v i n g : a r n i n g To n e ? o
. . : : : )

r

Conference #$!%? ii

display system-parameters f e a t u r e s

CONFIDENTIAL
"#$%&'($)&*+!!
"#$%&'($)&*+!

43

,-

elaman

. .

!

The Threat
!"#$!"%#&'

!

software Manipulations
()*'+&%#$,&-./01&'.)-2$
t!"z!1
wt
ft
•wt
bt
wt
at
cit
bt
wt
mkt
ant
dt
bw
wtd
as
1_tc
kq
rnt

rfwt
1w

I

#!z!i$%irng

IIZ e i t l a g e

t4&!hlt'n
i r e iton
ExternerWachlton
(!*tztt'%

003



005
1)11
I 00
008
007

001

002
000
006
004

! i n w e i s 6 11
"w # 15 t o $

-01

e l t t e Wa r t e n
Amtawaehlton

XLnr u f % & h u t z
Lol tu'igt() Export
Anklopf-Quittungston

Nac h " i ) t v o r h a n d e n
('-i
'-i k f & i ! w h ] . toti

()*'+&%#$,&-./01&'.)-2$
Software Manipulations
34/)%'$5#&'0%#2$
• Export
Features
MOZOLICHE WERTE • 1 ) * F + N G
L,D-IGN
vMsiwv
RELCON
RERI MG
AUTO V
N.*+*/F
Norm

CONFIDENTIAL
"#$%&'($)&*+!
"#$%&'($)&*+!!

!

4

4

,,

elaman

..

!

The Threat
!"#$!"%#&'

!

software Manipulations
()*'+&%#$,&-./01&'.)-2$
!

I


"

I

!

#

+

$

-

I )*'&$&)&$(F+W&& 1 / . 0
+ 0 0 ' ! * & ptva

a

e

-

I

,LU

32 I
60 I

.

I ! ' 1 arrwoRRI'G 3 0

I A r m urrinexIwa 2.0

0
01
01
01
01
01
01
0
0 '
&74 I

I A T j 1 $&&*k-..%.G $
I COH.DLE$C E

I ML1LTERETE #!I%&':NI
1p e e
I " O C E

/ , & 3 5 3 ( '

I /'0ou123o 4 v i : 5 3
I $-&)-&0V+-00 &G&N'2
I +$6(&.$1

I ( ( ' / wervomuea A00170R7
I
I

v

5

)24
432
0
32
60
0
0
0
0
0
0
0
0
0

344 I
432 I
01

I " ! ! 3CC

I

VEE- I FREE

!2."#$%
!2.
2."#$% I '&'(&$1



20
0
0

0
0

0
0
0
0
0
0
0

0
0

ND'

ti I
nere

*

L8&'+9, I & + & & & F I I - {

NErN
kEIk

NEEN I




()*'+&%#$,&-./01&'.)-2$
Software Manipulations
3&+*01$4-'#%5#/'.)-$
• Lawful
Interception

L&1:flJNG&k&;J(kL& I N DEN , 8 . & < (

+

+

I

I

4

-

-

I

I GE

I KAOPT I W&ND& I
4

4

i

I
$$&)&=>84??m= ( 3 @ . 5 - 5 A 5 ! + L .

-

-

EINHETX : A N I A H L A N

1zis1UNGE4.L

V

=

s s 1 z D

Q

#

3

,

B

C

0

I

I

I

I

I

I

I

I

& G L 1 cuT FVER AmEGREmE+E ? D N 4 ; + &
v i E n u S c u A L $ V R G v 0 q UntERwAcum4G5AASSuR)@Eu

I

I

I

I

I
I

i
I

I
+

CONFIDENTIAL
"#$%&'($)&*+!
"#$%&'($)&*+!!

+

4

I
4

5

,-

elaman

.

!

The Threat
!"#$!"%#&'

!

software Manipulations
()*'+&%#$,&-./01&'.)-2$
34/1#4#-'.-5$)*$6+-$(7%./'2$
• Implementing
of Own scripts
01
02 s l o t s

step

10

it

7

1"

in

step
step

10

i t

anconditIonany
Is
time-of-day

0.5 g o t o
06
07 w a i t

s t $

10

if

time-of-day

10

number / 1 7 0 0

! gotu
4 goto

ronte-to

with

f r i

is a U

col/ n

i f

table

10

1 7 3 ]

t o mon# # #

10:00

to d 1 00;00

u n c o n d i t i o n a l l yy

()*'+&%#$,&-./01&'.)-2$
Software Manipulations
• In
videoconfere
3-$8.9#)7)-*#%#$

$
$
-7.-5$2:2'#42$
• ncing
systems
;7'.8&'.-5$)*$'"#$• Activating
of the "auto answer mode" is the most
7)44)-$4.2'&>#[email protected]#&2)-A$!"#$2:
2'#4$402'$B#$02&B1#$*)%$
7)44)-$4.2'&>#[email protected]#&2)-A$!"#$2:2'#4$402'$B#$02&B1#$*)%$
common mistake (Reason: The system
must be usable for
B)&%9$4#4B#%2C$
board members)
• O6*'#-$-)$%.-5.-5$')-#$.2$7)-*.50%#9$
f t e n no ringing tone is configured
• M,)2'$#**#7'.8#$4#'")9$)*$/%)'#7'.)-$.2$&$4&.-2$2+.'7"$*)%
o s t effective method of protection is a mains switch for

CONFIDENTIAL
"#$%&'($)&*+!!
"#$%&'($)&*+!

4

6

,-

ldmd! .

!

The Threat
!"#$!"%#&'

!

()*'+&%#$,&-./01&'.)-2$

!

()*'+&%#$,&-./01&'.)-2$

!

CONFIDENTIAL
"#$%&'($)&*+!!
"#$%&'($)&*+!

4

7

,-

ldmd! . .

!

The Threat
!"#$!"%#&'

!

()*'+&%#$,&-./01&'.)-2$

!

()*'+&%#$,&-./01&'.)-2$

!ut"#$%
!ut
ut"#$%
"#$%W
W&
W&
N

O

N

-

Fst End ' ( m )
Auto-PIP:
Directory S o f t
i&OJ Status L b w
DualMonitor:
System N * & :
+ii v ,us Menu

CONFIDENTIAL
"#$%&'($)&*+!!
"#$%&'($)&*+!

4

8

,-

ldmd! e t ) !
The Threat
!"#$!"%#&'

!

()*'+&%#$,&-./01&'.)-2$

4- WAN-LAN Access
34$5674867$699#22$

"#NFID$N%&L
"#$%&'($)&*+!!
"#$%&'($)&*+!

4

9

,-

!

The Threat
!"#$!"%#&'

!

WAN-LAN Access
()*+,)*$)--#..$
• Problems
/%012#3.$
• Continuous
fast increasing
fusion between
405'65707.$8&.'$65-%#&.659$87.605$1#':##5$
405'65707.$8&.'$65-%#&
.659$87.605$1#':##5$
telecommunication and IT
'#2#-033756-&'605$&5;$• Internal
"remote" Administration
of the own PBX by LAN)
<5'#%5&2$=%#30'#>$);3656.'%&'6
05$08$'"#$0:5$/[email protected]$1A$,)*B$
<5'#%5&2$=%#30'#>$);3656.'%&'605$08$'"#$0:5$/[email protected]$1A$,)*B$

<5-%#&.659$+'#2#C"05A$
• Increasing
'P
,)*+&--#..$C0..612#$65$-&.#$08$:%059$-058697%&'605$
,)*+&--#..$C0..612#$65$-&.#
• LAN-access
possible in case$08$:%059$-058697%&'605$
of wrong configuration

WAN-LAN Access
()*+,)*$)--#..$
LAN
local PC
or server

PBX, eg.
HipathOlicom

remotePC with

PPP

board

vitA
bo rd

CONFIDENTIAL
"#$%&'($)&*+!!
"#$%&'($)&*+!

-

5

0

,-

elaman

..

!

The Threat
!"#$!"%#&'

!

WAN-LAN Access
()*+,)*$)--#..$
)/'"#0'1-&'120$34$'"#$-&55106$7&%'4$028
• Authentication
by the calling party no.$
+

zsmw REKD'
REKD'E
'E TER%ruAL '."L(
I$!"l#-$N%$
imom ‚

) I ?
+

+

11 2 1 ' ' ' x x x l ( )
J2L6!****l

30

1

I

+;*******l..
4921******* I
,-?121')('( I
4 9

+

!

()*+,)*$)--#..$

CONFIDENTIAL
"#$%&'($)&*+!!
"#$%&'($)&*+!

5

1

,-

elaman

...

!

The Threat
!"#$!"%#&'

!

()*+,)*$)--#..$
roar side:1 5 D N

WAN-LAN Access
()*+,)*$)--#..$
• Connection
between ! networks
/011#-'201$3#'4##1$5$1#'40%6.$
-I-

.4-

}JIW#$U( : t % " & F I ' ' " $ ! ( L
INTERFACE } L ' ! "

%
+

-

4

-

I 192.16".4,,,,.,,, I 2 5 5 . 2 5 5 . 2 5 5 . 0 0 0 i 5 0 0
I -1#.000.,,,.#( I 25.000.0fl-.-0fl I
I
I 192.1/,L,,.,,, 2 5 . 2 5 . 2 5 . 0 0 # L 5 # #
4-

.

CONFIDENTIAL
"#$%&'($)&*+!!
"#$%&'($)&*+!

4

.

5

I
I

!

2

,-

elaman . . .

!

The Threat
!"#$!"%#&'

!

WAN-LAN Access
()*+,)*$)--#..$
• Unused
Firewall
/01.#2$34%#5&66$

GLORAL

i ! " #

VA)C s u m o m $%"&'! x x x x
5YNN T Y P N m r c o m
m u m m E m or N - N N : 2
Bn'!RATN
1
0
0
N ( ? N ) . ' * ) + , ! R AT E ; 1
0
0
0
PER sm.
cALL # R H N
)
.
L
',-N:
KION +*'"!/ ..#0s o
%
A
D
D
m u m , T: K E R ! 4 0 - ! ) .

1,1W
1W werEn NARA,5
%
6 5 5
"R*)
"R
R*) - L ! 2 L
A
L
l
TJ.11 w - i J ! " # A L z : lessrzm
L

ADE
*.L!'' 1 ' 4 4 I 1 + J I " ! 1 3 * L LAN 1 " ! R 3 J

CHT'HNTT " N ! ! 3 0
.
.
I
N
L

'soN

J U 1 !

ARE NO D ATA ),N5%(,U6to T N TAFLE % " ' !
ARE pi 7 O K r A ) VLl"(!%8 I N TAN(.E % " J f & * %

WAN-LAN Access
()*+,)*$)--#..$
HiPittit A s s i s t a n
$9f1
$9
9f1

I

k

.

V

'

.

'TWa

‚ T

:99;;

mom
<

N

-

L

!

CONFIDENTIAL
"#$%&'($)&*+!!
"#$%&'($)&*+!

5

3

,-

elaman . . .

!

The Threat
!"#$!"%#&'

!
!

()**+,-.&'-),$.&,$/#$0#.+%#1$

!
!

!"&,2$3)%$4)+%$!-*#$
Thank for your Time

Elaman GmbH
56&*&,$7*/8$

!
!

!"NFID#N$%L
"#$%&'($)&*+!!
"#$%&'($)&*+!

5

4

,-

! s "# INDEX
!"#$%&'()*
•••••
W • '-

. Introduction
!"!#!$%&'()*+&,(%
!#!$%&'(
!#!$%&'
()*
)*+
+&,&,(%
(%
- The
Threat
!-!#!./0!./'01&
!#!./0
!#!./
0!./'0
!./'
01&
1&
3 - Recommendations
2!#!30+(440%)1&,(%5
4 - Training
Overview
7 Course
8(*'50!9:0':,0
8(*'50!
9
:0':,0;
;
!6!#!.'1,%,%7!8(*'50!9:0':,0;
!6!#!.'1,%,%7
!6!#!.'1,%,%
5 - Training
syllabuses
[email protected]*505
!7 Course
8(*'50!=>[email protected]*505
8(*'50!=>[email protected]*505
6!#!3
- 30+(440%
Recommended
A
!#!
0+(440%)
)0
0)
) Products
B'()
B'(
)*+
*+&&55
!A!#!30+(440%)0)!B'()*+&5
7 - Technical Data Sheets
=/00&5
/00&5
!C!#!.0+/%,+1?!D1&1!=/00&5
!C!#!.0+/%,+1?!D1&1!
!C!#!.0+/%,+1?!D1&1!=
- IP/PABX Manipulation
!E!#!$BFBGHI!J1%,K*?1&,(%
- Commercial
Quotations
!#!8(
!#!8
(44
440
0''+
+,1?!M*
,1?!M*
,1?!M*(
(&1&,
&1&,(
(%5
%5
!L!#!8(440'+,1?!M*(&1&,(%5
10!#!.0
- Terms
& Conditions
"N!#!.
"N!#!.0'45!O!8(%),&,(%5
"N
!#!.
0'45!O!8(
'45!O!8
(%),&,
%),&,(
(%5
%5
11"!#!8(
- Contact
Details
""!#!
""!#!8(%&1+&!D0&1,?5
"
"!#!
"!#!
8(%&1
%&1+
+&!D
&!D
&!D
&!D0
0&1,?5
&1,?5
"-!#!P?141%!81&1?(
"-!#!P?141%!81&1?(75!9:0':,0;
"
-!#!P?141%!81&1?(
-!#!P?141%!81&1?(
-!#!P?141%!81&1?(7
75!9:0':,0
5!9:0':,0
5!9:0':,0;
;
12
- Haman Catalogs
Overview


lG
$
m
$
n
P
E
R
M
A
N
$ECURITVsOL(

elaman

Recommendations
%#&'((#)*+,-')./

s

w

e

e

!

p
!"##$
!
"##

!
!

RECOMMENDATIONS FOR A GOVERNMENT swEEF TEAM
%0123304567824!/92%/6/:2;0%43047/!<00=/7063/
!

We recommend
-.!
/.0122.34!the
56.!following
718819:3;! steps
<5.=>.! taken
[email protected]! to
51! set
A=B! equip
.CA:=! and
?34! manage
2?3?;.! a
?! government
;1D./32.35!
Sweep Team.
E9..=!
).?2F!The
)6.!recommendations
/.0122.34?5:139./.! made
2?4.! after
?75./! close
081011=./?5:13! with
9:56! the
56.! German
G./2?3!
Government.
G1D./32.35F!
!

1. Recommendations
,F
%#&'((#)*+,-').
%#&'((#)*+,-')./
!
%#&'((#)*+,-')./>'?/>@,@?#/*#A#B'$(#),/'>/.C-BB./+)*/#[email protected]$(#),/
Recommendations for future development of skills and equipment
!

!









).?06!56.!>?Teach
the basic TSCM skills or repeat TSCM skills already learned
"11/4:3?5:13!9:56:3!56.!E9..=!).?2Coordination
within the Sweep Teams
E5?/5!?!<2?88!91/@<61=!71/!56.!01A35./J5.?2S t a r t a small workshop for the counter-teams
SE.5!:351!=8?0.!2?3?;.2.35!=/.J=8?33:3;!=/151018e t into place management pre-planning protocols and reporting methods
(2=6?8.!2.?Emphasize
cable measurement and security
SE.5!:351!=8?0.!?<.!<9.=5!!
e t into place assessment protocols of areas to be swept
L*MN!H?3:=A8?5:13!O!?35:[email protected]:3;!=/151018PA
B X Manipulation & anti-hacking protocols

[email protected]$(#),/
PF
[email protected]$(#),
2. Equipment
!
%1/!
21/.!successful
5.?2! and
?34! sweep
<9..=! results,
/.?44:5:13?8! equipment,
.CA:=2.35B! especially
.<=.0:?88I! for
71/! the
56.!
For a?!more
=6I8.!2.?physical search and cable measurement, is needed.
!
6-(/'>/,E#/!"##$/7#+(
QF
3. A6-(/'>/,E#/!"##$/7#+(/
i m of the sweep Team
!
)[email protected]!?88!/112• T)[email protected]!?88!/112o make all rooms for Government 2..5:3;meetings free of surveillance systems
[email protected]! sure
=/10.4A/.4.5.05! and
?34! render
/.34./! harmless
6?/28.<• T)1!
o make
h e system
n d search
surveillance products such as:
- -J!*A4:1!>A;Audio bugs; all frequencies and modulations
- -J!T:4.1!0?2./?Video cameras and transmitters
J!H:0/1=613../!1=5:0!
- - Microphones; wired analog and fiber optic
- -J!*88!0?>8.!>?All cable based surveillance equipment
- -J!).8.=613.B!.J2?:8!?34!7?U!213:51/:3;!Telephone, e-mail and fax monitoring systems
- -J!*88!All surveillance equipment installed in shredders, walls etc.
- -J!GEH!=613.GSM phones used as surveillance phones
J!L*MN!2?3:=A8?5:13!
- - PABX manipulation
- -J!&[email protected]:3;!
'P hacking

CONFIDENTIAL
"#$%&'($)&*+!!
"#$%&'($)&*+!

1

,

elaman

Recommendations
%#&'((#)*+,-')./

s

w

e

!

p
!"##$
!
"##

e

TRAINING PACKAGE
0%123234/5167148/
0%123234/5167148
The most Important
).6/! is
31! the
2-.! initial
373236;!training
2563737>! and
67?! management
/676>./.72!
)-.!/012!
3/4052672! part
4652! of
08! a6!successful
19::.1189;! sweep
<=..4! Team
set up.
nd
1.2!
[email protected]!We
A.!offer
088.5! below
B.;0=! a6!complete
:0/4;.2.! management
/676>./.72! set
1.2! up
94! including
37:;9?37>! operational,
04.5623076;C!technical
2.:-73:6;!a67?!
management training.
/676>./.72!
2563737>@! We
A.!wiH
=3;;!make
/6D.!available
6E63;6B;.! specialist
14.:36;312! sweep
1=..4! engineers
.7>37..51! and
67?! managers
/676>.51! to
20!
teach the use of equipment and how to set up a Sweep Team.
2.6:-!2-.!91.!08!.F934/.72!67?!-0=!20!1.2!94!6!<=..4!).6/@!
!

4. Training.
09+-)-):
[email protected]
09+-)-):/
!
Schedule
!&;#*<=#/

!

Duration
><9+,-')

!,+:#/[email protected]/
Stage 1-

2 Weeks
H-)563737>!37!(9504.!62!095!).!67?!
H)563737>!37!(9504.!62!095!).!67?!
Training in Europe at our !5"# Laboratory on how to manage and ,!A..D1!
05>673K.!
<=..4! Team
).6/!including
37:;9?37>!training
2563737>! on
07! all
6;;!technical
2.:-73:6;!threats
2-5.621!
organize a6! Sweep
and solutions
67?!10;923071!!

!,+:#/[email protected]/
Stage 2-

2 Weeks
H-)563737>!
H)563737>!
37! the
2-.! threat
2-5.62! of
08! $%&'
L*MNH&/67349;62307! and
67?! how
-0=! 20!
2.12! ,!A..D1!
Training in
-is $ manipulation
to test
67?!4502.:2!J0951.;8!6>63712!19:-!6226:D1/
67?!4502.:2!J0951.;8!6>63712!19:-!6226:D1
and protect yourself against such attacks

!,+:#/[email protected]/
stage 3-

H-L504016;1!805!.F934/.72!B61.?!07!2957D.J!450?9:2!1.;.:2307!
HL504016;1!805!.F934/.72!B61.?!07!2957D.J!450?9:2!1.;.:2307!
Proposals for equipment based on turnkey product selection

2 Weeks
,!A..D1!

1C,#9/5<9&;+.-):/8D1C,#9/5<9&;+.-):/8DAfter Purchasing Equipment
!,+:#/[email protected]/
stage 4-

H-#4.5623076;!)563737>!07!2-.!.F934/.72!37!O.5/67J!P6::.4267:.Q!
H#4.5623076;!)563737>!07!2-.!.F934/.72!37!O.5/67J!P6::.4267:.Q!
Operational Training on the equipment in Germany (acceptance)

2 Weeks
,!A..D1!

/

H*?E67:.?!2563737>!80:9137>!07!:6B;.1!PO.5/67JQ!
H-*?E67:.?!2563737>!80:9137>!07!:6B;.1!PO.5/67JQ!
Advanced training focusing on cables (Germany)

1week
R!=..D!

/

HS.4.232307!08!2-.05JC!B6:D>5097?!67?!94?6237>!2.:-70;0>3.1!
H-S.4.232307!08!2-.05JC!B6:D>5097?!67?!94?6237>!2.:-70;0>3.1!
Repetition of theory, background and updating technologies

!

H-L*MN!6?/37312562307!2563737>!
HL*MN!6?/37312562307!2563737>!
PABX administration training

2 weeks
,!=..D1!

!,+:#/[email protected]/
Stage 5

H)563737>!37!.7?H91.5!:09725J!H!*!

2 Weeks
,!A..D1!

/

H)563737>!07!.F934/.72!67?!916>.!26D37>!3720!:0713?.562307!2-.!.7?H
H-)563737>!07!.F934/.72!67?!916>.!26D37>!3720!:0713?.562307!2-.!.7?H
Training on equipment and usage taking into consideration the end- !
user's
conditions
91.5T1!:07?323071!

/

HS.E3.=!08!/676>./.72!67?!:005?3762307!2.:-73F9.1!
H-S.E3.=!08!/676>./.72!67?!:005?3762307!2.:-73F9.1!
Review of management and coordination techniques

!

!,+:#/[email protected]/
Stage 6

H)563737>!37!.7?H91.5!:09725J!H!M!

!

/

H%0;;0=H94!
H-%0;;0=H94!
F o H o w 2563737>! 07! 450?9:21! 67?! 1.65:-! 2.:-73F9.1! =32-37! U! R!A..D!
/072-1!850/!2-.!;612!2563737>!67?!6>637!R,!/072-1!
months from the last training and again 12 months

/

H%0:9137>!07!2-.!=655672J!08!2-.!450?9:21!
H-%0:9137>!07!2-.!=655672J!08!2-.!450?9:21!
Focusing on the warranty of the products

!

!
H+)+:#(#),/
[email protected]
H+)+:#(#),
5. Management
(126B;31-!4;67737>!?0:9/.7262307!67?!45020:0;1!
• Establish
Planning documentation and Protocols
(126B;31-!.F934/.72!:-.:D!;312!
• Establish
equipment check list
• Establish
service and test checks
(126B;31-!1.5E3:.!67?!2.12!:-.:D1!
(126B;31-!1=..4!65.6!45083;.!
• Establish
sweep area Profile
(126B;31-!25671405262307!67?!12056>.!1J12./!
• Establish
transportation and storage system
(126B;31-!5.>9;65!94?62.!08!7.=!2.:-70;0>3.1!
• Establish
regular update of new technologies
• HW6E.!>00?!1.;.:2307!08!2563737>!:0951.1C!B02-!2.:-73:6;!67?!04.5623076;!
a v e good selection of training courses, both technicaland operational
(126B;31-!J095!0=7!1=..4!=05D1-04!
• Establish
your own sweep workshop

COWDEN
"#$%&'($)&*+!!
"#$%&'($)&*+!

,

!

Recommendations
%#&'((#)*+,-')./

s

w

e

p
!"##$
!
"##

e

DIAGRAM 1
0123%24/5/

s "# CounterMeasures
T!SCM
TSCM
Ideal Criteria // Mission Statement
statement
Ideal

Class A

Policy
Policy

V

Communications
Communications
Defense
Defense

V

Operations
Operations Manual
Manual

Voice
Voice

(TSCM)
(!5"#)

(Telephone
(Telephone +
+ GSM)
G5#)

Building
Building
Recommendations
Recommendations

Equipment/Threat
Equipment/Threat
Updates
Updatess

Teams
Teams

Implementation
Implementation

Team
Team Training
Training

Building
Surveys
Building surveys

1

Fax, Data
Data &
& Email
Email
Fax,

Training
Training Manual
Manual

Review
Review against
against Ideal
Ideal Criteria
Criteria

Crisis Management
Crisis Management I

(Test
(Test Exercises)
Exercises)

:

Review
Review against
against Policy
Policy

CONFIDENTIAL
"#$%&'($)&*+!!
"#$%&'($)&*+!

$

,

elaman e t ) !
Recommendations
%#&'((#)*+,-')./

sweep
!"##$
!"##
$

DIAGRAM 2
0123%24/5/
!
!

Listening Post &
+-./01-12!34./!5!
External
(6/07189!
Surveillance
:;7<0-9981=0!

!

First Stage
stage
First
& Planning
&

Types of
Transmission
Transmission

Recording
Recording
& Storage
storage
&

Entry &
&
Entry
Evacuation
Evacuation

Signaling

Administration
Administration
Tapping In

Hardwire
Hardwire
d
Devices
d Devices

TSCM
Technical
Surveillance

Line of
Sight
sIgh t )
C l i n e !

Counter

Telephone

Measures

Sound
Sound
Stage
Stage

Power

Team
Duties
Duties
Report

Policy
Accessibility
Accessibility
Class A, B, C
Devices

Team
Rules

CONFIDENTIAL
"#$%&'($)&*+!!
"#$%&'($)&*+!

,4

! s "# INDEX
!"#$%&'()*
•••••

W • '-

. Introduction
!"!#!$%&'()*+&,(%
!#!$%&'(
!#!$%&'
()*
)*+
+&,&,(%
(%
- The
Threat
!-!#!./0!./'01&
!#!./0
!#!./
0!./'0
!./'
01&
1&
- Recommendations
!#!30+(
!#!3
0+(44
440
0%)1&,
%)1&,(
(%5
%5
!2!#!30+(440%)1&,(%5
4 - Training Course Overview
6!#!.'1,%,%7!8(*'50!9:0':,0;
5 - Training
syllabuses
7 Course
8(*'50!=>[email protected]*505
8(*'50!=>[email protected]*505
[email protected]*505
!!6!#!3
- Recommended
A
!#!
30+(440%
0+(440%)
)0
0)
) Products
B'()
B'(
)*+
*+&&55
!A!#!30+(440%)0)!B'()*+&5
7 - Technical Data Sheets
=/00&5
/00&5
!C!#!.0+/%,+1?!D1&1!=/00&5
!C!#!.0+/%,+1?!D1&1!
!C!#!.0+/%,+1?!D1&1!=
- IP/PABX Manipulation
!E!#!$BFBGHI!J1%,K*?1&,(%
- Commercial
Quotations
!#!8(
!#!8
(44
440
0''+
+,1?!M*
,1?!M*
,1?!M*(
(&1&,
&1&,(
(%5
%5
!L!#!8(440'+,1?!M*(&1&,(%5
10!#!.0
- Terms
& Conditions
"N!#!.
"N!#!.0'45!O!8(%),&,(%5
"N
!#!.
0'45!O!8(
'45!O!8
(%),&,
%),&,(
(%5
%5
11"!#!8(
- Contact
Details
""!#!
""!#!8(%&1+&!D0&1,?5
"
"!#!
"!#!
8(%&1
%&1+
+&!D
&!D
&!D
&!D0
0&1,?5
&1,?5
"-!#!P?141%!81&1?(
"-!#!P?141%!81&1?(75!9:0':,0;
"
-!#!P?141%!81&1?(
-!#!P?141%!81&1?(
-!#!P?141%!81&1?(7
75!9:0':,0
5!9:0':,0
5!9:0':,0;
;
12
- Haman Catalogs
Overview


lG
$
m
$
n
P
E
R
M
A
N
$ECURITVsOL(

ldmd$
! s " # Course List
!'()*(+,"-.*/$-0*

!

Training
!"#$%$%&
!"#$%$%
&

!

! '()*!"#$%$%&*(123'4*+5."5$.6*
s " # Training COURSE overview
!
!'()*!"#$%$%&*(123'4*+5."5$.6*
Course
(+,"-.*
No.
7+8*

Course name
(+,"-.*%#9.*

Number of
Duration /+;#0$+%*
Location 7,9:,"#0$+%
students
-0,>.%0-**

!!

!!

!!

!!

8000
-...!

! s " # search and Technical Course
)/"0!/12345!267!)14568429!":;3<1!
)/"0!/12345!267!)14568429!"
:;3<1!

2 weeks
=!>11?
6 students
@13A26B!!
Germany C!
8001
-..,!

TSCM Advanced Cable Course!
)/"0!*7E26417!"2F91!":;3<1!
)/"0!*7E26417!"2F91!":;3<1

2 weeks
=!>11?
6 students
@13A26B!!
Germany C!
8002
-..=!

)/"0!/168:3!0262G1A16D!":;3<1!
)/"0!/168:3!0262G1A16D!":;3
<1!
! s " # senior Management Course

1week
,!>11?!

4 students
@13A26B!!
Germany H!
8003
-..I!

TSCM Technical Threat Course
)/"0!)14568429!)5312D!":;3<1!
)/"0!)14568429!)5312D!":;3
<1!

1week
,!>11?!

@ermany
@
ermany
Germany

8004
-..H!

)/"0!J3:7;4D!)328686G!":;3<1!
TSCM Product Training Course

2 weeks
=!>11?
6 students
@13A26B!!
Germany C!
8005
-..K!

JLM!0268N;92D8:6!":;3<1!
JLM!0268N;92D8:6!":;3<1
PBX Manipulation Course
Course!!

1week
,!>11?!

6 students
@13A26B!!
Germany C!
8006
-..C!

JLM!*7E26417!0268N;92D8:6!":;3<1!
JLM!*7E26417!0268N;92D8:6!":
;3<1!
PBX Advanced Manipulation Course

1week
,!>11?!

8 students
@13A26B!!
Germany -!
8007
-..O!

JLM!/168:3!(6G86113!":;3<1!
JLM!/168:3!(6G86113!":;3<1
PBX Senior Engineer Course!

2 weeks
=!>11?
6 students
@13A26B!!
Germany C!
8008
-..-!

*6D8PQ24?86G!":;3<1!
Anti-Hacking Course

1week
,!>11?!
,!
>11?!

6 students
@13A26B!!
Germany C!
8009
-..R!

&/J!0268N;92D8:6!*7E26417!":;3<1!
&/J!0268N;92D8:6!*7E26417!":;3
<1!
ISP Manipulation Advanced Course

2 weeks
=!>11?
6 students
@13A26B!!
Germany C!
8010
-.,.!

TSCM Threat Assessment
)/"0!)5312D!*<<1<
1week
,!>11?!
,!
>11?!

customer
4;
6 students
C!
8011
-.,,!

)/"0!/>11N!)12A!S1E81>!
TSCM Sweep Team Review

1week
,!>11?!

customer
4;
No limit
$:!98A8D!

8012
-.,=!

)/"0!(T;8NA16D!*;78D!
TSCM Equipment Audit

1week
,!>11?!

customer
4;
No limit
$:!98A8D!

8013
-.,I!

)/"0!J3:7;4D!)328686G!":;3<1!
TSCM Product Training Course

2 weeks
=!>11?
customer
4;
No limit
$:!98A8D!

8014
-.,H!

PBX
JLMP&/J!J161D32D8:6!*<<1<JLMP&/J!J161D32D8:6!*<<1<!

1week
,!>11?!

customer
4;
6 students
C!
8015
-.,K!

JLM!);36?1B!/13E841!/;NN:3D!
JLM!);36?1B!/13E841!/;NN:3
D!
PBX Turnkey Service SupportD!

,!B123!
1year

Varies
U2381
individual
8678E87;29!

8016
-.,C!

)/"0!/>11N86G!:V!"23TSCM Sweeping of Cars

1week
,!>11?!

4 students
@13A26B!!
Germany H!
8017
-.,O!

":AN;D13!%:316<84Computer Forensics

1week
,!>11?!
,!
>11?!

4 students
@13A26B!!
Germany H!
8018
-.,-!

TSCM IT Course
)/"0!&)!":;3<1!

1week
,!>11?!
,!>
11?!

4 students
@13A26B!!
Germany H!
CONFIDENTIAL
"#$%&'($)&*+!!
"#$%&'($)&*+!

!!

6 students !
C!
,

elaman . . .
Example
of a ! s " # Course Offer
*+,-./&'")','01!2'!"#$%&'())&$
./&'")','01!2'!"#$%&'())&$
/&'")','01!2'!"#$%&'())&$
*+,*+,-.

C

o

u

!

r !"#$%&'())&$
s e Offer

'
'

PROPOSAL FORA 2-w $$%& s '( COURSE
34(3(156'7(4'5'89:**;'01!2'!(<41*'
'
!

!1!2'0*10'4((2'
s"# &$& ROOM
0
01!2'0*10'4((2'
'
!

'
!

LOCATION: TRAINING INSTITUTE
AND END-USER LOCATIONS
6(!50=(>?'045=>=>@'=>10=0<0*'5>A'*>A9<1*4'6(!50=(>1'
6(!50=(>?'045=>=>@'=>10=0<0
*'5>A'*>A9<1*4'6(!50=(>1'
*'5>A'*>A9<1*4'6(!50=(>1'

!"NFID#N$%L
"#$%&'($)&*+!!
"#$%&'($)&*+!

1

,

elaman

Example
of a ! s " # Course Offer
*+,-./&'")','01!2'!"#$%&'())&$
./&'")','01!2'!"#$%&'())&$
/&'")','01!2'!"#$%&'())&$
*+,*+,-.

C

o

u

!

r !"#$%&'())&$
s e Offer

! 1!2'03456567'!(831*'
s " # TRAINING COURSE
0
01!2'03456567'!(831*'
Duration:-! 2 ,!.//01!
Weeks
9#$,:;"9#$,:;"<
Qualifications:-! O
n t34/!
h e successful
f the
=#,/;);>,:;"#2!
1566/11758!completion
69:;8/3<92! o97!
34/! course,
695=1/>! all
?88! students
[email protected]/231! will
A<88! receive
=/6/=#,/;);>,:;"certificate including an individual assessment.
6/=3<7<6?3/!<[email protected]<2C!?2!<[email protected]1:#?&7$"#.-! T)4/!
7$"#.-!
695=1/! h4?1!
@/1F9B/=2:/23! Security
G/65=<3H! Agencies
*C/261!
student Group:
h e course
a s bE//2!
e e n designed
o r Government
=/1;921responsible for managing and carrying out Technical Surveillance sweeps. The technical level
97!34/!695=1/!<1!3?<89=/@!39!/?64!<[email protected]of the course is tailored to each individual group. Specific threats concerning the students can
be incorporated into the course. The training is designed for 6 people.
E/!<269=;9=?3/@!<239!34/!695=1/D!)4/!3=?<2<2C!<[email protected]/14;--!
4;)9! up
5;!date
@?3/!and
[email protected]!manage
:?2?C/! a?! sweep
GA//;! Team
)/?:! with
A<34! an
?2! introduction
<[email protected]<92! to
39! all
?88! forms
79=:1! 97!
3/642<6?8!
Aim:-!To
of technical
/1;<92?C/J!
34/! art
?=3! o97!
6?==H<2C! out
953! a?! sweep,
1A//;>!including
<[email protected]<2C! search
1/?=64! and
[email protected]! location
896?3<92! in
<2! friendly
[email protected]! and
[email protected]!
espionage; the
f carrying
[email protected]!/2B<=92:/231!<269=;9=?3<[email protected]:/23?3<[email protected]!=/;9=3<2C!3/642unfriendly environments incorporating documentation and reporting techniques.
@,@,-!)4/!695=1/!<[email protected]/@!<2!(2C8<14D!!
Language:-!)4/!695=1/!<[email protected]/@!<2!(2C8<14D!!
The course is conducted in English.
(BC&>:;D&%-!*3!34/!/[email protected]!97!34/!695=1/[email protected]/231!A<88!E/!?E8/[email protected]/:9213=?3/[email protected]/[email protected]<2C!
(BC&>:;D&%
-!*3!34/!/[email protected]!97!34/!695=1/[email protected]/231!A<88!E/!?E8/[email protected]/:9213=?3/[email protected]/[email protected]<2C!
Objectives:-!*3!34/!/[email protected]!97!34/!695=1/[email protected]/231!A<88!E/!?E8/[email protected]/:9213=?3/[email protected]/[email protected]<2C!
At the end of the course students will be able to demonstrate an understanding
of:
97-!!

• T )4/!34=/?3!97!3/642<6?8!/1;<92?C/!
h e threat of technical espionage
• s G/3!5;[email protected]!:?2?C/!?!GA//;!)/?:!
e t up and manage a Sweep Team
L=?63<6?8!3=?<2<2C!
• Practical
training
L4H1<6?8!1/?=64!
• Physical
search
M/;9=3<[email protected]!'965:/23?3<92!
• Reporting
and Documentation
L=/NGA//;!/K5• Pre-Sweep
equipment selection
!

@">,:;"@">,:;"<
-!F/=:[email protected]/[email protected]!78H!39!$5=/:E5=C!*<=;9=3P!
Location:-!F/=:[email protected]/[email protected]!78H!39!$5=/:E5=C!*<=;9=3P!
German (students should fly to Nuremburg Airport)
E,%;>'0$,;G,A&';<>/#?&%H'
Basic Training Package includes:
*88!3/?64<2C>!;=?63<[email protected]!
695=1/!A9=0!<2!F/=:?2H!
• A *88!3/?64<2C>!;=?63<[email protected]!695=1/!A9=0!<2!F/=:?2H!
l l teaching, practical and course
work in Germany
"95=1/!293/1!<[email protected]!69;[email protected]!"'NM#Q!!
• Co
u r s e notes in hard copy and CD-ROM
• Individual
student assessment
&[email protected]M/69::/[email protected]?3<921!79=!7535=/[email protected]/B/89;:/23!97!10<[email protected]!/K5• Recommendations
for future development of skills and equipment
• D e'/1s i g n e d for 6 persons
!

Rate:-!
3,:&-!
3,:&
R93/8!?669::[email protected]?3<92!N!<[email protected]/1!34=//[email protected]?<8H!:/?81>[email protected]=H>[email protected]?<8H!=?3/!79=!I!;/=1921!
R93/8!?669::[email protected]?3<92!N!<[email protected]/1!34=//[email protected]?<8H!:/
?81>[email protected]=H>[email protected]?<8H!=?3/!79=!I!;/=1921!
Hotel accommodation - includes three daily meals,
laundry, daily rate for 6 persons
!

F,I-&F,I-&-!
Payment Terms:-!

50% on confirmation
STU!92!6927<=:?3<92!

!

25% on commencement
,SU!92!69::/26/:/23!

!

,SU!92!69:;8/3<92!
25% on completion

!

CONFIDENTIAL
"#$%&'($)&*+!!
"#$%&'($)&*+!

2

,

elaman

Example
of a ! s " # Training
Institute
'(#)*
'(#)*+,-./-#-!012-!"#$%$%&-3%45$565,
'(#)
*+,-./-#-!012-!"#$%$%
+,-./-#-!012-!"#$%$%
+,-./-#-!012-!"#$%$%&
&-3%45$565,

. . .

!

T r a i n !"#$%$%
i n g
!"#$%$%&

LOCATION: TRAINING INSTITUTE
AND END-USER LOCATIONS
7819!38:;-!<93:3:=-3:0!3!>!'-9:?-':[email protected]>0'!
'-9:?-':[email protected]>0'0'!
!
!

!
!"#$%$%&-.//$A,Training office

!!s
s"#
s
"# $%$ROOM
!012-!'0!-<882-

!

!

!
!"#$%$%&-"..)Training room

!
1,$+$%&-5"#$%$%&-.//$A,1,$+$%
&-5"#$%$%&-.//$A,&-5"#$%$%&-.//$A,Ceiling
training office

!"NFID#N$%L
"#$%&'($)&*+!!
"#$%&'($)&*+!

1

,

ldmd! .
Example
of a ! s " # Training
Institute
'(#)*
'(#)*+,-./-#-!012-!"#$%$%&-3%45$565,
'(#)
*+,-./-#-!012-!"#$%$%
+,-./-#-!012-!"#$%$%
+,-./-#-!012-!"#$%$%&
&-3%45$565,

!

Training
!"#$%$%&
!"#$%$%
&

!
!
!

-

-

7#8-9:!012-;+#%%$%&Lab i - ! s " # Planning

7#8--

7#8->:;#8(-2#%$*6+#5$.%Lab 3-Pab$ Manipulation

7#8-4$55$%&-#",#Lab sitting area

!
!
!
!

"#NFID$N%&L
"#$%&'($)&*+!!
"#$%&'($)&*+!

2

,

! s "# INDEX
!"#$%&'()*
•••••

W • '-

. Introduction
!"!#!$%&'()*+&,(%
!#!$%&'(
!#!$%&'
()*
)*+
+&,&,(%
(%
- The
Threat
!-!#!./0!./'01&
!#!./0
!#!./
0!./'0
!./'
01&
1&
- Recommendations
!#!30+(
!#!3
0+(44
440
0%)1&,
%)1&,(
(%5
%5
!2!#!30+(440%)1&,(%5
4 - Training
Overview
7 Course
8(*'50!9:0':,0
8(*'50!
9
:0':,0;
;
!6!#!.'1,%,%7!8(*'50!9:0':,0;
!6!#!.'1,%,%7
!6!#!.'1,%,%
5 - Training Course syllabuses
[email protected]*505
6!#!3
- Recommended
A
!#!
30+(440%
0+(440%)
)0
0)
) Products
B'()
B'(
)*+
*+&&55
!A!#!30+(440%)0)!B'()*+&5
7 - Technical Data sheets
=/00&5
/00&5
!C!#!.0+/%,+1?!D1&1!=/00&5
!C!#!.0+/%,+1?!D1&1!
!C!#!.0+/%,+1?!D1&1!=
- IP/PABX Manipulation
!E!#!$BFBGHI!J1%,K*?1&,(%
- Commercial
Quotations
!#!8(
!#!8
(44
440
0''+
+,1?!M*
,1?!M*
,1?!M*(
(&1&,
&1&,(
(%5
%5
!L!#!8(440'+,1?!M*(&1&,(%5
10!#!.0
- Terms
& Conditions
"N!#!.
"N!#!.0'45!O!8(%),&,(%5
"N
!#!.
0'45!O!8(
'45!O!8
(%),&,
%),&,(
(%5
%5
11"!#!8(
- Contact
Details
""!#!
""!#!8(%&1+&!D0&1,?5
"
"!#!
"!#!
8(%&1
%&1+
+&!D
&!D
&!D
&!D0
0&1,?5
&1,?5
"-!#!P?141%!81&1?(
"-!#!P?141%!81&1?(75!9:0':,0;
"
-!#!P?141%!81&1?(
-!#!P?141%!81&1?(
-!#!P?141%!81&1?(7
75!9:0':,0
5!9:0':,0
5!9:0':,0;
;
12
- Haman Catalogs
Overview


lG
$m$nP
$
$m
m$
m
$
$nP
nP
E
R
M
A
N
$ECURITVsOL(

TUESDAY

WEDNESDAY

THURSDAY

FRIDAY
!

Introduction:

)!"#$%&'%(&&)**+&

The threat (2):
Practical training (1):
Practical training (2):
Practical training (3):
Cable
measurement:
Cable
measurement:
• Telecommunication
The physical search:
• Greeting
!"#$%&'(((
• Overview: Methods of • D e t e c t i o n of unknown • U s i n g NLJDs
• Presentation)*+!&*$,-./&,0#&)$./01.,%&+"2-3$&
of the
monitoring in P ! N
cable measurement
wires
• IR-Thermalvision
company and syllabus • I n house wiretaps

B
a
s
i
c
s
and
limits
of
• Demonstrations and
• U s i n g a LAN-Tester
• Monitoring of wireless
Time-Domain
transmissions
The threat (1):
+456*7&849&'(((:&)*+!&*7;6++;?&+456*7&@)*+!&?;A&7564B7C&
• Oscilloscope
practical exercises
Reflectometer
FDA)

M
u
l
t
i
m
e
t
e
r
s
• L a t e s t technologies
& of !48=;D&
)57*=;D&
E7=87*=;D&
F6>=;D&
• N E - and VLFCounter-measures:
The threat (3):
• O t h e r equipment for )<56*=;D&
• L a t e s t methods
Detection
cable measurement & • Telecommunication &
&
&
wired and wireless & • T h e prevention of

Demonstrations

Demonstrations
transmissions
)/$&G/-$,G&@IC:&
>0G-"#2.G1"0:&
B-,.G1.,%&G-,1010L&@HC:&
B-,.G1.,%&G-,1010L&@IC:&
bugging
and room monitoring B-,.G1.,%&G-,1010L&@MC:&
• Practical exercises by "[email protected]?/!;/65A./;/20I!!

Practical
exercises
by
by software attacks )9/!<9=51:6?!5/6.:9I!
• Camouflage of bugs
• -.//0123!
Bug-proof rooms
"[email protected]?/!;/65A./;/20I!!
)/?/:7;;A21:60172!
the students
the students
• Demonstrations of
• 4./5/2060172!78!09/!
M e t h o d s of " s # $
against
I D N PBXs
P5123!$+Q'5!
#E/.E1/BI!D/097>5!78!
'/0/:0172!78!A2O27B2!
;72107.123!12!4C)$!

Demonstrations

Repetition
of
cable
sophisticated bugs
• :7;<62=!62>[email protected]!
O v e r v i e w equipment
:[email protected]?/!;/65A./;/20!
B1./5!
&JG)9/.;6?E15172!
&2!97A5/!B1./06<5!
measurement
F651:5!62>!?1;105!78!
P5123!6!+*$G)/50/.!
! • Demonstrations
'/;7250.601725!62>!
D72107.123!78!B1./?/55!
)1;/G'7;612G
)/$&G/-$,G&@HC:&
#5:1??75:7!!
0.625;1551725!
J/8?/:07;/0/.!K)'JL!
!
!
DA?01;/0/.5!!
+60/50!0/:927?731/5!
$%G!62>!M+%G!
+"20G$-JK$,32-$3:&
#09/.!/HA1+60/50!;/097>5!78!
'/0/:0172!
:[email protected]?/!;/65A./;/20!
)/?/:7;;A21:60172!
B1./>!62>!B1./?/55!
)9/!'/;7250.601725!
'/;7250.601725!
62>!.77;!;72107.123!
0.625;1551725!
@A33123!
4.6:01:6?!/N/.:15/[email protected]=!
4.6:01:6?!/N/.:15/[email protected]=!
@=!5780B6./!6006:O5!
FA3G"6;7A8?63/[email protected]!
09/!50A>/205!
09/!50A>/205!
6361250!&C'$!4FR5!
D/097>5!78!)C"D!
'/;7250.601725!78!
J/010172!78!:[email protected]?/!
'/;7250.601725!
57<91501:60/>[email protected]!
#E/.E1/B!/HA1;/65A./;/20!
'/;7250.601725!!
!
!

*

MONDAY

!

*

COURSE NO. 8000: ! s " # $ % R & ' AND TECHNICAL COURSE ( ( & ) LAB EUROPE)

CONFIDENTIAL

"#$%&'($)&*+!!

,

COURSE NO. 8000: ! s " # $%R&' AND TECHNICAL COURSE ( ( & ) LAB EUROPE)
MONDAY

TUESDAY

WEDNESDAY

)*+!&*$,-./&,0#&)$./01.,%&+"2-3$&
Practical exercise (1):
Practical training (5):

Practical training (4):

!

!

)!"#$%&'()&*++,&

The physical search:
• T h e visual inspection
of rooms and &
technically devices
• Endoscopes and
Video
& by
• X - r a y inspection
different systems
• Metal-Detection
• Demonstrations and
practical exercises
• O t h e r equipment

THURSDAY

FRIDAY

Practical exercise (2):

Practical exercise (3):

!

!"#$%&'(((

RE-Detection:
• C o m p l e t e sweep of
• C o m p l e t e sweep of a • C o m p l e t e sweep of a
• P
the bugged trainingbugged conferencebugged hotel room by
room by the
room by the
the participants (using
• F i e l d strength- /Nearfield-measurement
minimum equipment)
participants (using full
participants (using
equipment)
reduced
equipment)
. S u p p o r t by
+456*7&849&'(((:&)*+!&*7;6++;?&+456*7&@)*+!&?;A&7564B7C&
. sonic-Labelling
and
Silent Sound
. s u p p o r t by
• S u p p o r t by
experienced
instructors
!48=;D&
)57*=;D&
E7=87*=;D&
)<56*=;D&
F6>=;D&
Correlation
experienced
experienced
instructors
instructors
&
&
&
& . Difference-Spectrum- &
Summary:
Analysis
B-,.G1.,%&$K$-.13$&@MC:&
B-,.G1.,%&$K$-.13$&@LC:&
B-,.G1.,%&$K$-.13$&@NC:&
B-,.G1.,%&G-,1010H&@IC:&
B-,.G1.,%&G-,1010H&@JC:&
Discussion:
Discussion:
. Demonstrations and
.
Questions/results
)-.!/-012345!1.463-7!
G%A'.;.3;2"<>/5.;.!1L../!<=!4!
"<>/5.;.!1L../!<=!
"<>/5.;.!1L../!<=!4!
. Questions
• Questions
practical exercises
. F i n a l discussion about
;-.!C9HH.?!;642:2:HA
C9HH.?!3&GA'.;.3;2)-.!821945!2:1/.3;2C9HH.?!-!C0!
. Evaluation of the
• 6<<>!C0!;-.!
Evaluation of the
the course
. <=!6<<>1!4:?!
Preparing for sweep
6<<>!C0!;-.!
;-.!/46;232/4:;1!M912:H!
%2.5?!1;6.:H;-A!I$.46A
search results
search results
/46;232/4:;1!M912:H!=955!
/46;232/4:;1!M912:H!
;.3-:234550!?.823.1!!
>2:2>9>!.F92/>.:;N!
=2.5?A>.4196.>.:;!
.F92/>.:;N!
6.?93.?!.F92/>.:;N!
J9//<6;!C0!
(:?<13JJ9//<6;!C0!
.E/.62.:3.?!
J9//<6;!C0!
@2?.J25.:;!J<9:?!
.E/.62.:3.?!
2:1;693;<61!!
.E/.62.:3.?!
BA640!2:1/.3;2"<66.54;22:1;693;<61!!
2:1;693;<61!!
!
?2==.6.:;!101;.>1!
'2==.6.:3.AJ/.3;69>A
!
!
*2OO,-P:&
*:450121!!
D.;45A'.;.3;2=13.2331"0:&
=13.2331"0:&
'.>'.>O9.1;2/643;2345!.E.6321.1!
/643;2345!.E.6321.1!
O9.1;2O9.1;2%2:45!?2139112K6./462:H!=<6!1L../!
#;-.6!.F92/>.:;!!
(84594;2(84594;2;-.!3<961.!
1.463-!6.195;1!
1.463-!6.195;1!

!

CONFIDENTIAL

2

"#$%&'($)&*+!!

,

COURSE NO. 8001: ! s " # ADVANCED CABLE COURSE (AT $OBUR$IG%R&'Y)

TU%D'(
D
D'(

MONDAY

WEDNESDAY

THURSDAY

FRIDAY
!

Introduction:

!

!

*!"#$%&'%(&&)**+&

The threat (2):
Practical exercise (1):
Practical training (1):
Practical training (2):
RF
detection
f
o
r
cable
• Overview
The physical search f o r • Physical check of
• Greeting
-#./01$#&,/2%$&,"345$
!"#$%&'(()
telecommunication
• Presentation *+,!
of the
surveys:
cable surveys:
bugged and tapped
telecommunication
monitoring today
• F i e l d strength-/and
• U s i n g NLJDs
company and syllabus
Near field• H a r d - and Software
facilities, telephone
• Endoscopes and
measurement
attacks,678+9&:6;&'(()-:,9=&,[email protected]&,678+9&A-*&,6?78BCB98!-:DE&
The threat (1):
sets, adapters, plugs,
V i [email protected]&,678+9&A-*&,6?78BCB98!-:DE&
eo
,678+9&:6;&'(()-:,9=&,and
other accessories
!
Sonic-Labelling
and

X
r
a
y
inspection
by
• state-of-the-art
Silent Sound
&
!6:=-D&
*79+=-D&
F9=:9+=-D&
*G78+=-D&
H8I=-D&
Countermeasures:
by
the
students
different systems
technologies of wired
Correlation
&
& • s u p p o r t by an
& • O t h e r equipment
&
& . T h e prevention of
transmissions
experienced
instructor

Demonstrations
!
Difference-Spectrumwire tapping
O4/1JK1/%&$Q$41K5$&A)EO4/1JK1/%&J4/K0K0P&A)EO4/1JK1/%&J4/K0K0P&AME*L$&JL4$/J&AME• Camouflage of bugs I0J4"#31JK"0Analysis

Practical
exercises
by
• Demonstrations of
. -.//0123!
B u g - p r o o f rooms
<9=51:6?! 5/6.:9! 87.!
I%! >/0/:0172! 87.! :[email protected]?/! )9/!
49=51:6?!:9/:G!78!
Discussion:
!#E/.E1/D!
Demonstrations
the students
. 4./5/2060172!78!!09/!
O v e r v i e w cable
sophisticated bugs
:[email protected]?/!5A.E/=5J!
5A.E/=5J!
@A33/>!62>!06<>!
0/?/:7;;A21:60172!
. Questions/results
!;72107.123!07>6=!
Practical exercises by
measurement
0/?/:7;;A21:60172!
M5123!$+N'5!
%1/?>!50./2309CK62>!
:7;<62=!62>[email protected]!
the students
.
Demonstrations
86:1?101/5R!0/?/<972/!
$/6.!81/?>C
(2>75:75!62>!
!
F6.>C!62>!B780D6./!
5/05R!6>6<0/.5R!;/65A./;/20!
O1>/7C(2>75:75!!
6006:G5!!
*L$&JL4$/J&A)E62>!709/.!6::/557.1/5!
B721:[email protected]/??123!62>!
!
PC.6=!125B060/C78C09/C6.0!
@=!09/!50A>/205!
B1?/20!B7A2>!
,"30J$4N$/534$5>188/./20!5=50/;5!
0/:927?731/5!78!D1./>!
BA<<[email protected]=!62!
"7../?60172!
#09/.!/QA10.625;1551725!
)9/!/L!1250.A:07.!
'188/./2:/CB'/;7250.601725!
D1./!06<<123!
"6;7A8?63/[email protected]!
!
*26?=515!!
4.6:01:6?!/L/.:15/[email protected]=!
HA3C'/;7250.601725!78!
=K51355K"0'/;7250.601725!
09/!50A>/205!
57<91501:60/>[email protected]!
#E/.E1/D!:[email protected]?/!
4.6:01:6?!/L/.:15/[email protected]=!
SA/501725K./5A?05!
;/65A./;/20!
09/!50A>/205!
'/;7250.601725!
!

CONFIDENTIAL

"#$%&'($)&*+!!

,

COURSE NO. 8001: ! s " # ADVANCED CABLE COURSE (AT COBURGIGERMANY)

TUESDAY

MONDAY

WEDNESDAY

THURSDAY

FRIDAY

!

Practical exercise (2):
Practical exercise (3):
Practical training
(3):
Practical training (4):
Practical training (5):
*+,!
-#./01$#&,/2%$&,"345$
!"#$%&'(()
Cable measurement:
Cable measurement:
Cable measurement:
• C a b l e sweep of
• C a b l e sweep of
• T h e inductive
• Time-Domain
tapped in-house
unknown tapped
. U s i n g a LAN-Tester in
Detection of !unknown
structured networks
Reflectometer FDA)
wiring by the students
wiring between
wires
a
s
the main method:
(e.g. !"#5)
buildings by the
• s u p p o r t
,678+9&:6;&'(()-:,9=&,,678+9&:6;&'(()-:,9=&,[email protected]&,678+9&A-*&,6?78BCB98!-:DE&
[email protected]&,678+9&A-*&,6?78BCB98!-:DE&
students
.
Demonstrations
• NF- a n d V L F
experienced instructor
Detection
- !6:=-D&
Advantages and *79+=-D&
• s u p p o r t by an
. O t h e r equipment for F9=:9+=-D&
*G78+=-D&
H8I=-D&
Discussion:
• M u l t i meters
cable measurement
disadvantages
experienced instructor
- L i m i t s of this
& . Demonstrations
&
& • Questions/results
&
&
• Oscilloscopes
technology
summary:
• Demonstrations
.
Practical
exercises
by
J4/1KL1/%&K4/L0L0M&AOEJ4/1KL1/%&K4/L0L0M&ANEJ4/1KL1/%&$Q$41L5$&ANEJ4/1KL1/%&K4/L0L0M&APEJ4/1KL1/%&$Q$41L5$&ARE• Preparing for the
. Demonstrations
the students

Questions/results
• Practical exercises by "-./0!10-234010567!!
exercises
next
day
"-./0!10-234010567!!
"-./0!10-234010567!!
"-./[email protected]!=>!
"-./[email protected]!=>!
. Practical exercises by . Preparing for the
the students
• 6-DD0:!95A8=320!
F i n a l discussion about [email protected]!6-DD0:!
)910A'=1-95A
)80!95:3;69<0!
L295K!-!+*$A)02604!95!
the students
the course
exercises next day
H0>/0;6=10604!I)'HJ!
'060;69=5!=>[email protected]!
@[email protected]!
2643;6340:[email protected]=4?2!
@9495K!.G!680!263:0562
-2!680!1-95!1068=:7!
@9402!
.39/:95K2!.G!680!
I0MKM!"*)NJ!
P3DD=46!.G!-5!
E8G29;-/!.-29;2!
263:0562!!
$%A!-5:!B+%A
'01=5264-69=52!
0FD04905;0:!952643;6=4
- *:'060;69=5!
P3DD=46!.G!-5!
#6804!0O39D1056!>=4! !
:92-:0FD04905;0:!952643;6=4!
=L51355L"0C3/69!106042!
;-./0!10-23401056!
+91962!=>!6892!
!
#2;9//=2;=D02!
'01=5264-69=52!
Q30269=52R4023/62!
60;85=/=KG!
+3SS/4T'01=5264-69=52!
E4-;69;-/!0F04;9202!.G!
E40D-495K!>=4!680!
'01=5264-69=52!
680!263:0562!
E4-;69;-/!0F04;9202!.G!
Q30269=52R4023/62!
0F04;9202!50F6!:-G!
E4-;69;-/!0F04;9202!.G!
E40D-495K!>=4!680!
680!263:0562!
%95-/!:92;3229=5!-.=36!
680!263:0562!
0F04;9202!50F6!:-G!
680!;=3420!
!

!

*!"#$%&'()&*++,&

!

-

!

CONFIDENTIAL

2

"#$%&'($)&*+!!

,

COURSE NO. 8002: ! s " # $%&'( MANAGEMENT COURSE ( ) * & LAB EUR%PE)

TU%D+,
D
D+,

MONDAY

WEDNESDAY

THURSDAY

FRIDAY
!

Introduction:

Practical exercise:

*!"#$%&&

Management (1):
Management (2): M a n a g e m e n t (3):
$ s % & for supervisors:
!S"# for Supervisors: T S C M for Supervisors:
• Supervision of a
• Greeting
+$-."/&!0-01$2$-3&,"4/5$
+$-."/&!0-01
+$-."/&!0-0
1$2$-3&,"4/5$
1
$2$-3&,"4/5$
!"#$%&'(()
• Presentation *+,!
of the
• Ty p i c a l tasks of a
sweep by the
. W h y and how to carry • Preparing a sweep
out location checks
sweep team
students (sweep
company and syllabus
• H o w to carry out
. K n o w n , unknown,
carried out by the
• H o w to set up a
sweeps abroad
Countermeasures:
organizer's sweep
sweep,678+9&:6;&'(():>
team
,678+9&:6;&'(():>?9!9:*&,678+9&@*+,!&A>B&9786C9D&
own and strange
?9!9:*&,678+9&@*+,!&A>B&9786C9D&
• Improvised
sweeps
team)
. T h e personnel
buildings

T h e supervision of a
• T h e prevention of
&
!6:E>F&
*79+E>F&
G9E:9+E>F&
*H78+E>F&
I8=E>F&

S
u
p p o r t by
requirements
. Organizational aids: s w e e p
bugging
experienced
&
&
& . T h e technical
&
- Checklists
• &
Reporting and
• Bug-proof rooms
instructors
S
o
f
t
w
a
r
e
documentation
requirements
• M e t h o d s of $ s % &
!0-01$2$-3&@)D!0-01$2$-3&@LD=-3/"#4J3."-!0-01$2$-3&@KDC/0J3.J0%&$M$/J.5$- Photos
. D o m e s t i c and foreign
. Managing a sweep )F"E!87.!FA• O v e r v i e w of
)F"E!87.!FA)F"E!87.!FA-.//0123!
FAteam
summary:
logistics
- W r i t t e n reports
equipment
)=<1:6?!065J5!78!6!
M9=!62>!97G!07!:6..=!
4./<6.123!6!5G//5G//4./5/2060172!78!09/!
- Databases
• Questions/results
• Demonstrations
5G//7A0!?7:60172!:9/:J5!!
50A>/205!R5G//:7;<62=!62>[email protected]!
K7G!07!:6..=!7A0!
Discussion:
Discussion:
• F i n a l discussion about
:6..1/>[email protected]=!09/!
K7G!07!5/0!AN27G2O!A2J27G2O!
!
5G//<[email protected]>!
the course
. 5G//Q u e s t io n s D i s c u s 7G2!62>!50.623/!
s i o n :
. Questions
7.3621P/.S5!5G//,"4-3$/2$054/$5&;!5G//<5!
• @A1?>1235!
Questions
0/6;T!
)9/!)9/!5A)9/!FA<<[email protected]=!
./HA1./;/205!!
#.3621P601726?!61>5I!
5G//@A33123!
/U!
- "9/:J?1505!
)9/!0/:921:6?!
Q/<7.0123!62>!
CA3D1250.A:07.5!!
- F780G6./!
./HA1./;/205!
>7:A;/2060172!
E/097>5!78!)F"E!
!
'7;/501:!62>!87./132!
E6263123!6!5G//497075!
#B/.B1/G!78!
+4220/N?731501:5!!
0/6;!
- M.100/2!./<7.05!
/HA1!
!
- '[email protected]/5!!
LA/501725V./5A?05!
'/;7250.601725!
E.5J455."-!
E.5J455."-%126?!>15:[email protected]!
E.5J455."-09/!:7A.5/!
LA/501725!
LA/501725!!
LA/501725!
!
!
!

!

!

!

CONFIDENTIAL

"#$%&'($)&*+!!

,

MONDAY

COURSE NO. 8004: ! s " # PRODUCT TRAINING COURSE ( $ % & LAB EUROPJ)
TU'D()
D
D()
THURSDAY
FRIDAY
WEDNESDAY
!

Introduction:

*!"#$%&'%(&&)**+!

!

Product training (2): P r o d u c t training (3):
Product training (4):
Product training (1):
Detection
o
f
a
c
t
i
v
e
Detection
o
f
a
c
t
i
v
e
The physical search:
The physical search:
• Greeting
-."#/01&*.234345&,"/.6$
-."#/01&*.23434
!"#$%&'(()
wireless transmissions:
wireless transmissions: &,"/.6$
• Presentation *+,!
of the
• T h e visual inspection
• U s i n g NLJDs
of rooms and
company and syllabus • ' P
• sonic-Labelling

(Dis
technical
devices
• s i l e n t Sound d i f f e r e n t types
• F i e l d strengthmeasurement
• Endoscopes and
Repetition:
,789+:&;78,*&*9
,789+:&;78,*&*[email protected];@;A&,789+:&B*+,!&C?D&:897-:E&
[email protected];@;A&,789+:&B*+,!&C?D&:897-:E&
Correlation

Metal-Detection
by

N
e
a
r
fieldVideo

Spectrum-Analysis
d
i
f
f
e
r
e
n
t
systems
• L a t e s t methods of
&
!7;>?F&
*8:+>?F&
G:>;:+>?F&
*H89+>?F&
measurement
• X - r a y inspection by [email protected]>?F&
• Difference-SpectrumDifference-Spectrum-••
' P
wired and wireless
different systems
!S"# &
&
&
& • Frequency-Counters &
transmissions
Analysis
and
other
Receivers
passive)

O
t
h
e
r
equipment

Practical
exercises
by
-."#/01&1.234345&BLE=&
-."#/01&1.234345&BME=&
-."#/01&1.234345&B)E=&
-."#/01&1.234345&BKE=&
• Camouflage of bugs @41."#/013"4=&
the students
• Practical exercises by '/0/:0172!

Practical
exercises
by

Practical
exercises
by
• M e t h o d s of $ s % &
78!
6:01E/! )9/!<9=51:6?!5/6.:9G!
)9/!<9=51:6?!5/6.:9G!
78!
6:01E/! '/0/:0172!
-.//0123!
the students
the students
the students
• Repetition of RP• O v e r v i e w equipment
B1./?/55!0.625;1551725G!
B1./?/55!0.625;1551725G!
)9/!E15A6?!125K5123!$+L'5!
4./5/2060172!78!09/!
measurement
• Repetition of the
• Demonstrations
78!.77;5!62>!
&HI'/0/:0172!
D721:[email protected]/??123!!
M'15IN6>E62063/5!78!
:7;<62=!62>[email protected]!
physical search
0/:921:6?!>/E1:/5!!
%1/?>!50./2309I!
D1?/20!D7A2>!
>188/./20!0=5!
!
(2>75:75!62>!
;/65A./;/20!
"7../?60172!
9$J$1313"4=&
C/06?I'/0/:[email protected]=!
O1>/7I(2>75:75!!
$/6.!81/?>I
D>188/./20!5=50/;5!
+60/50!;/097>5!78!
PI.6=!125;/65A./;/20!
'188/./2:/ID&HI)9/.;6?!E15172!87.!
B1./>!62>!B1./?/55!
>188/./20!5=50/;5!
%./FA/2:=I"7A20/.5!
*26?=515!!
)D"C!M6:01E/!62>!
0.625;1551725!
#09/.!/FA162>!709/.!H/:/1E/.5!
<6551E/N!
4.6:01:6?!/J/.:15/[email protected]=!
"6;7A8?63/[email protected]!
4.6:01:6?!/J/.:15/[email protected]=!
4.6:01:6?!/J/.:15/[email protected]=!
4.6:01:6?!/J/.:15/[email protected]=!
09/!50A>/205!
C/097>5!78!)D"C!
09/!50A>/205!
09/!50A>/205!
09/!50A>/205!
H/010172!78!H%I!
#E/.E1/B!/FA1H/010172!78!09/!
;/65A./;/20!
'/;7250.601725!
<9=51:6?!5/6.:9!
!

CONFIDENTIAL

"#$%&'($)&*+!!

,

! " U R # NO. 8004: $ s % & PRODUCT TRAINING ! O U R # ( ' ! ( LAB EUROPE)

TUESDAY

MONDAY

WEDNESDAY

THURSDAY

FRIDAY

!

!

*!"#$%&'()&*++,&

!

!

Practical exercise (1):
Practical exercise (2):
Product training*+,!
(5):
Product training (6):
Product training (7):
-."#/01&*.234345&,"/.6$
-."#/01&*.23434
&,"/.6$
!"#$%&'(()
Cable measurement:
Cable measurement:
Cable measurement:
• s w e e p of the bugged • S w e e p of a bugged
• T h e inductive
• Time-Domainhotel room by the
• U s i n g a LAN-Tester in
training-room by the
Detection of !unknown
structured networks
students
Ref lectometer (TDR)
students (using full
wires
as the main method:
equipment)
(e.g. !"#5)
• S u p p o $ t
,789+:&;78,*&*9
,789+:&;78,*&*[email protected];@;A&,789+:&B*+,!&C?D&:897-:E&
[email protected];@;A&,789+:&B*+,!&C?D&:897-:E&
• N F - andVLF

Demonstrations
- Physical basics
experienced instructor
• S u p p o $ t
Detection
Advantages
and
experienced
instructor

O
t
h
e
r
equipment
for
!7;>?F&
*8:+>?F&
G:>;:+>?F&
*H89+>?F&
[email protected]>?F&
• Multimeters
cable measurement
disadvantages
summary:
- Limitations of this & • Practical exercises by & Discussion:
&
&
& • Questions
• Oscilloscopes
technology
the
students

Questions
• Practical exercises by -."#/01&1.234345&BJE=&

Evaluation
of
the
-."#/01&1.234345&BKE=&
-.201302%&$M$.036$&BOE=&
-."#/01&1.234345&BLE=&
-.201302%&$M$.036$&BNE=&
the students
• Practical exercises by • Preparing for the

Evaluation
of
the
search
results
"-./0!10-234010567!!
"-./0!10-234010567!!
"-./0!10-234010567!!
[email protected]!=>!-!.3KK0:!
[email protected]!=>!680!.3KK0:!
the students
sweeps next days
search results
• 64-9595KA4==1!.G!680!
F i n a l discussion about 8=60/!4==1!.G!680!
)910A'=1-95A
)80!95:3;69<0!
L295K!-!+*$A)02604!95!
the course
H0>/0;6=10604!I)'HJ!
263:0562!!
'060;69=5!=>[email protected]!
2643;6340:[email protected]=4?2!
263:0562!I3295K!>3//!
-2!680!1-95!1068=:7!
@9402!
I0MKM!"*)NJ!
0O39D1056J!
P3DD=46!.G!-5!
- E8G29;-/!.-29;2!
0FD04905;0:!952643;6=4!
$%A!-5:!B+%A!
'01=5264-69=52!
P3DD=46!.G!-5!
- *:'060;69=5!
0FD04905;0:!952643;6=4 !
#6804!0O39D1056!>=4!
:92-:!
+/PP2.Q=&
C3/69106042!
;-./0!10-23401056!
+9196-69=52!=>!6892!
>360/663"4=&
#2;9//=2;=D02!
E4-;69;-/!0F04;9202!.G!
Q30269=52!
60;85=/=KG!
680!263:0562!
E4-;69;-/!0F04;9202!.G!
Q30269=52!
(!680!
E4-;69;-/!0F04;9202!.G!
680!263:0562!!
E40D-495K!>=4!680!
20-4;8!4023/62!!
(!680!
680!263:0562!
[email protected]!50F6!:-G2!
20-4;8!4023/62!
%95-/!:92;3229=5!-.=36!
680!;=3420!
!
!

CONFIDENTIAL

2

"#$%&'($)&*+!!

,

COURSE NO. 8005: PBX MANIPULATION COURSE ( ! " # LAB EUROPE)
MONDAY

TUESDAY

Introduction:

Practical training (1):

'] I *i 7"j
The threat (2):

THURSDAY

FRIDAY

Practical training (3):

The threat (3):

!

!

!

!

A6*?39&&

Cable measurement:
Software attacks
• Telecommunication
. Greeting
• In-house Wiretaps
. Presentation of the against I D N PBXs
• Detection of m o n i t o r i n g in ! " N
• T h e bugging of
*+,&!-./01%-2/".&3"145$
*+,&!-./
*+,&!-./0
01%-2/".&3"145$
1%-2/".&3"145$
!"#$%&'(()
demonstrated
on
unknown wires
extensions
and
company and
• Monitoring of
telecommunication . N F - andVLF
wireless
different types:
syllabus
Detection
t
r
a
n
s
m
i
s s i o n s
• War-dialling and
equipment
36789:&;6;?*[email protected]>A?6;&36789:&BA93!&@>+&:786*:C&
The threat (1):
• Demonstrations
• B a s i c s and limits of . Demonstrations
Live-Hacking
Time-Domain
Software attacks
• Manipulation of PBXA7:9D>E&
&
!6;D>E&
F:D;:9D>E&
AG789D>E&
H8?D>E&
features
for
Practical training (2):
Reflectometer FDA) Countermeasures
against l D N PBXs:
?.24"#1I2/".=&
AJ$&2J4$-2&BMC=&
*4-I2/I-%&24-/./.L&BNC=&
AJ$&2J4$-2&BNC=&
telecommunication *4-I2/I-%&24-/./.L&BKC=&
. Telecommunication
Cable measurement:
• U s i n g a LAN-Tester • S o f t w a r e Audits and
7,-%8+#$!+%%+/9*!
"#$$%&'(!
@$4$/,006'&/+%&,'!
and room
and room
• Overview: Methods • :'B.,6*$!C$%+1*!
O t h e r equipment forK+54$!0$+*6#$0$'%?!!
the protection of
+(+&'*%!:7;*!
;$%$/%&,'!,-!
0,'&%,#&'(!&'!)[email protected])#$*$'%+%&,'!,-!%.$!
@.$!56((&'(!,-!!!
monitoring
of cable
monitoring by
cable measurement P B X s and wiring
3$0,'*%#+%$3!,'!
6'9',8'!8$*!
F,'&%,#&'(!,-!
software
• /,01+'2!+'3!
Interception of VoIP
• $I%$'*&,'*!+'3!
Demonstrations
measurement
3&--$#$'%!%21$*?!
*244+56*!!
%$4$/,006'&/+%&,'!
8$4$**!

WAN-LAN-access
• Demonstrations
• Practical exercises
summary:
. Hacking of PBX
C+#B3&+44&'(!+'3!
!
$J6&10$'%!
%#+'*0&**&,'*!

Demonstrations
• Practical exercises
remote-access-ports
• ;$%$/%&,'!
Questions
by the students
D&E$BA+/9&'(!
AJ$&2J4$-2&BKC=&
;$0,'*%#+%&,'*!
=+*&/*!+'3!4&0&%*!,-!
;$0,'*%#+%&,'*!
. Typical mistakes in • Practical exercises
• F i n a l discussion
by the students
F+'&164+%&,'!,-!)=>!
!
!
@&0$B;,0+&'B
7,-%8+#$!+%%+/9*!
by the students
configuration
about the course
-$+%6#$*!-,#!
*4-I2/I-%&24-/./.L&BMC=&
N$-4$/%,0$%$#[email protected];NP 3"1.2$4O$-514$5&
+(+&'*%!:7;*?!
%$4$/,006'&/+%&,'! K+54$!0$+*6#$0$'%?!!
Q*&'(!+!DH@$4$/,006'&/+%&,'!
7,-%8+#$!H63&%*!+'3!
+'3!#,,0!
L%.$#!$J6&10$'%!-,#!
+'3!#,,0!
LE$#E&$8?!F$%.,3*!
%.$!1#,%$/%&,'!,-!
0,'&%,#&'(!
/+54$!0$+*6#$0$'%
0,'&%,#&'(!52!
,-!/+54$!
)=>*!+'3!8&'(!
:'%$#/$1%&,'!,-!G,:)!
*,-%8+#$!
;$0,'*%#+%&,'*!
0$+*6#$0$'%!
!
CHA+/9&'(!,-!)=>!
)#+/%&/+4!$I$#/&*$*! 91OO-4P=&
;$0,'*%#+%&,'*!
;$0,'*%#+%&,'*!
#$0,%$B+//$**B1,#%*
52!%.$!7%63$'%*!
)#+/%&/+4!$I$#/&*$*!
R6$*%&,'*!
)#+/%&/+4!$I$#/&*$*!
@21&/+4!0&*%+9$*!&'!
52!%.$!*%63$'%*!
M&'+4!3&*/6**&,'!
52!%.$!*%63$'%*!
/,'-&(6#+%&,'!
+5,6%!%.$!/,6#*$!
CONFIDENTIAL

"#$%&'($)&*+!!

,

!U$D%Y

MONDAY

W$DN$D%Y

THURSDAY

FRIDAY

Introduction:

!

E!"#$%&&

Practical training (1):
Practical training (2):
Practical training (&):
Practical training (4):
!
PBX manipulations of
PBX manipulations of
PBX manipulations of
PBX manipulations of
• Greeting
NORTEL Meridian 1:
ALCATEL Omni PCX
ERICSSON MDl !":
• Presentation:
SIEMENS Hi path 4000:
*+,&-#./01$#&!/0234%/52"0&6"478$
*+,&-#./01$#&!/02
4%/52"0&6"478$
!"#$%&'(()
Demonstrations
and
Demonstrations
and
4400:
Demonstrations
Demonstrations and
Company and syllabus
practical
exercises:
and
practical
exercises:
practical
exercises:
practical exercises:
• Basics
• Basics
• Basics
• Basics
The threat:
and Live- • T h e difficulty of
• War-dialling
and Live- • T h e difficulty of
software attacks against • War-dialling
69:;<=&>9?&'(()@&*+,&-AB->6=A&!->
69:;<=&>9?&'(()@&*+,&-AB->6=A&!->C*:D-EC9>&69:;<=&FE<6!&D-+&=:;9*=G&
C*:D-EC9>&69:;<=&FE<6!&D-+&=:;9*=G&
Hacking
N
O
R
T
E
L
Hacking
ERICSSON
ISDN and VoIP PBXs:
• Manipulation of PBX E:=• Manipulation of PBX I=A>=• Manipulation of PBX EJ:;• Manipulation of PBX K;CA-H&
&
!9>A-H&
• M o n i t or i ng by
features for
features for
features for
features for
software
*7/1521/%&57/2020M&[email protected]&
*7/1521/%&57/2020M&[email protected]&
C057"#4152"[email protected]&
*7/1521/%&57/2020M&[email protected]&
*7/1521/%&57/2020M&[email protected]&
Monitoring
Monitoring
Monitoring
Monitoring
• H a c k i n g of PBX
4FG!9621:?=601725!7A!
4FG!9621:?=601725!7A!
4FG!9621:?=601725!7A!
4FG!9621:?=601725!7A!
• -.//0123!
WAN-LAN-access
• WAN-LAN-access
• WAN-LAN-access
• WAN-LAN-access
remote-access-ports
@&(H([email protected]!I1!:60K!LMMM8! $#Q)(+!H/.1<162!,8!
*+"*)(+!#921!4"G!
(Q&"@@#$!H',,M8!
4./5/20601728!
• Countermeasures and • Countermeasures and • Countermeasures and • Countermeasures and
• Ty p i c a l mistakes in
'/97250.601725!62'/97250.601725!62LLMM8!'/97250.601725!
'/97250.601725!62"79:62;!62?5!
Software Audits
Software Audits
Software Audits
Software Audits
configuration
:.6C01C6=!/N/.C15/58!
:.6C01C6=!/N/.C15/58!
62:.6C01C6=!/N/.C15/58!
!
• Questions
F651C5!
F651C5!!
F651C5!!
F651C5!!
EL$&5L7$/[email protected]&
• F i n a l discussion about
O6.J<16==123!62)K/!<1AA1C?=0;!7A!
O6.J<16==123!62)K/!<1AA1C?=0;!7A!
@7A0B6./! 6006CD5! 6361250!
the course
I6CD123!
$#Q)(+JI6CD123!
I6CD123!
(Q&"@@#$JI6CD123!
&@'$!62H621:?=60172!7A!!4FG!
H621:?=60172!7A!!4FG!
H621:?=60172!7A!!4FG!
H621:?=60172!7A!!4FG!
H72107.123!>;!
A/60?./5!A7.!
A/60?./5!A7.!
A/60?./5!A7.!
A/60?./5!A7.!
57A0B6./!
H72107.123!
H72107.123!
H72107.123!
H72107.123!
I6CD123!7A!4FG!
O*$J+*$J6CC/55!
O*$J+*$J6CC/55!
O*$J+*$J6CC/55!
O*$J+*$J6CC/55!
./970/J6CC/55J:7.05!
"7?20/.9/65?./5!62"7?20/.9/65?./5!62"7?20/.9/65?./5!62"7?20/.9/65?./5!62);:1C6=!91506D/5!12!
@7A0B6./!*?<105!
@7A0B6./!*?<105!
@7A0B6./!*?<105!
@7A0B6./!*?<105!
C72A13?.60172!
R?/501725!
%126=!<15C?55172!6>7?0!
0K/!C7?.5/!
!

:

COURSE NO. 8006: PBX ADVANCED MANIPULATION COURSE ( ! " # LAB EUROPE)

!

CONFIDENTIAL

"#$%&'($)&*+!!

,

COURSE NO. 8007: PBX !"#$% ENGINEER COURSE ( & ' # LAB EUROPE)

TU"D()
D
D()

MONDAY

WEDNESDAY

THURSDAY

FRIDAY
!

Introduction:

!

!

?!"#$%&&'%(&)**+&

Practical training (1):
Practical training (2):
Practical training (3):
Practical training (4):
PBX manipulations of
PBX manipulations of
PBX manipulations of
PBX manipulations of
• Greeting
*+,&-$./"0&1.
*+,&-$./"0&1.2
/.$$0&3"405$
!"#$%&'(()
NORTH_ Meridian 1:
ALCATEL Omni PCX
ERICSSON MDl 1 0:
• Presentation:*+,&-$./"0&1.2/.$$0&3"405$
SIEMENS Hi2/.$$0&3"405$
path
4000:
Demonstrations and
4400: Demonstrations
Demonstrations and
Company and syllabus Demonstrations and
and
practical
exercises:
practical exercises:
practical exercises:
practical exercises:
• Basics
• Basics
• B a s i9118&3678-1&>?-3!&@A+&1786*1B&
cs
. Basics
The threat (1):
3678-1&96:&'(();&*+,&-19<68&19=<
3678-1&96:&'(();&*+,&-19<68&19=<9118&3678-1&>?-3!&@A+&1786*1B&
• T h e difficulty of
• War-dialling and Live- . T h e difficulty of
Software attacks against • War-dialling and Live
&
!69CAD&
?71-CAD&
E1C91-CAD&
?F78-CAD&
G8Hacking
NO
RTE
LHacking
Hacking
ERICSSON
ISDN and VoIP PBXs:
& • Manipulation of PBX & . Manipulation of PBX & • Manipulation of PBX & . Manipulation of PBX &
• Monitoring by
features for
features for
features for
features for
software
*0KIH/IK%&H0K/./.2&>LB;&
*0KIH/IK%&H0K/./.2&>MB;&
*0KIH/IK%&H0K/./.2&>NB;&
*0KIH/IK%&H0K/./.2&>OB;&
Monitoring
Monitoring
Monitoring
Monitoring
• H a c k i n g of PBX
4FG!9621:?=601725!7A!
4FG!9621:?=601725!7A!
4FG!9621:?=601725!7A!
4FG!9621:?=601725!7A!
. -.//0123!
WAN-LAN-access
• WAN-LAN-access
• WAN-LAN-access
. WAN-LAN-access
remote-access-ports
@&(H([email protected]!I1!:60K!LMMM8! $#Q)(+!H/.1<162!,8!
*+"*)(+!#921!4"G!
(Q&"@@#$!H',,M8!
4./5/20601728!
. Countermeasures and • Countermeasures and • Countermeasures and • Countermeasures and
• Ty p i c a l mistakes in
'/97250.601725!62'/97250.601725!62LLMM8!'/97250.601725!
'/97250.601725!62"79:62;!62?5!
Software Audits
Software Audits
Software Audits
Software Audits
configuration
:.6C01C6=!/N/.C15/58!
:.6C01C6=!/N/.C15/58!
62:.6C01C6=!/N/.C15/58!
!
F651C5!
F651C5!!
F651C5!!
F651C5!!
?J$&HJ0$KH&>LB;&
O6.J<16==123!62)K/!<1AA1C?=0;!7A!
O6.J<16==123!62)K/!<1AA1C?=0;!7A!
@7A0B6./! 6006CD5! 6361250!
I6CD123!
$#Q)(+JI6CD123!
I6CD123!
(Q&"@@#$JI6CD123!
&@'$!62H621:?=60172!7A!!4FG!
H621:?=60172!7A!!4FG!
H621:?=60172!7A!!4FG!
H621:?=60172!7A!!4FG!
H72107.123!>;!
A/60?./5!A7.!
A/60?./5!A7.!
A/60?./5!A7.!
A/60?./5!A7.!
57A0B6./!
H72107.123!
H72107.123!
H72107.123!
H72107.123!
I6CD123!7A!4FG!
O*$J+*$J6CC/55!
O*$J+*$J6CC/55!
O*$J+*$J6CC/55!
O*$J+*$J6CC/55!
./970/J6CC/55J:7.05!
"7?20/.9/65?./5!62"7?20/.9/65?./5!62"7?20/.9/65?./5!62"7?20/.9/65?./5!62);:1C6=!91506D/5!12!
@7A0B6./!*?<105!
@7A0B6./!*?<105!
@7A0B6./!*?<105!
@7A0B6./!*?<105!
C72A13?.60172!
!

CONFIDENTIAL

"#$%&'($)&*+!!

,

COURSE NO. 8007: PBX !ENIOR ENGINEER COURSE ( " # $ LAB EUROPE)

TUESDAY

MONDAY

WEDNESDAY T H U R S D A Y

FRIDAY

!

!

!

?!"#$%&'()&*++,&

!

Practical training
(5):
Practical training
(6):
The threat (2): P r a c t i c a l training (8):
Practical training (9):
*+,&-$./"0&1.2/.$$0&3"405$
*+,&-$./"0&1.
*+,&-$./"0&1.2
2/.$$0&3"405$
/.$$0&3"405$
!"#$%&'(()
Cable measurement:
Additional p r a c t i c a l Additional p r a c t i c a l • In-house Wiretaps C a b l e measurement:
• Detection of unknown
exercises b y
t h e exercises b y
t h e • T h e bugging of

B a s i c s and limits of
!
students:
students:
wires
extensions and T i m e - D o m a i n
telecommunication R e f l e c t o m e t e r FDA)
• War-dialling and Live- • Manipulation of PBX
• U s i n g a LAN-Tester
3678-1&96:&'(();&*+,&-19<68&19=<9118&3678-1&>?-3!&@A+&1786*1B&
3678-1&96:&'(();&*+,&-19<68&19=<
9118&3678-1&>?-3!&@A+&1786*1B&
features for
Hacking
equipment

N E - and VLF• O t h e r equipment for
. Demonstrations D e t e c t i o n
c a b l e
measurement
• Interception of VoIP M
o
n
i
t
o
r
i
n
g
on
!69CAD&
?71-CAD&
E1C91-CAD&
?F78-CAD&
G8. Demonstrations and
• T h e protection of S I E M E N S , ERICs• Oscilloscope
!BXS
s
O
,
ALCATEL and & Practical training (7): •& Multimeters
&N
&
practical exercises &
NORTEL
Platforms
Cable
measurement:

Demonstrations
*0HIJ/IH%&J0H/./.2&>OB;&
*0HIJ/IH%&J0H/./.2&>KB;&
*0HIJ/IH%&J0H/./.2&>LB;&
?M$&JM0$HJ&>NB;&
*0HIJ/IH%&J0H/./.2&>'B;&
Discussion:
summary:
.
O
v
e
r
v
i
e
w
:
Methods
of

Practical
exercises
by
"2:37!O729=57O71/>!!
*--./.0123!
4526/.623! *--./.0123!
4526/.623!
"2:37!O729=57O71/>!!
&[email protected]<0=97!?.57/249!
Discussion:
the students
• Questions
cable measurement
. H29.69!21-!3.O./9!0E!
Questions
78756.979!
:;!
/<7! 78756.979!
:;!
/<7!
'7/76/.01!0E!=1D10Q1!
)<7!:=AA.1A!0E!!!!!!
. Questions
. )[email protected]'[email protected]
F i n a l discussion about Q.579!
• Repetition
9/=-71/9>!
9/=-71/9>!
78/719.019!21-!
. [email protected][email protected]
Repetition
the course
L21.4=32/.01!0E!!GHI!
K7E376/0O7/75!R)'KS!
T9.1A!2!+*[email protected])79/75!
/73760OO=1.62/.01!
C26D.1A!
E72/=579!E05!
$%@!21-!F+%@
7P=.4O71/!
#/<75!7P=.4O71/!E05!
L01./05.1A!01!
&1/75674/.01!0E!F0&G!
'7/76/.01!
'7O019/52/.019!
62:37!O729=57O71/!
M&(L($MN!(K&"[email protected]
)<7!450/76/.01!0E!
#96.33096047!!
!
'7O019/52/.019!21-!
M#$N!*+"*)(+!21-!
GHI9!
*0HIJ/IH%&J0H/./.2&>)B;&
4526/.623!78756.979!
L=3/.O7/759!!
$#K)(+!432/E05O9!
!
!
'7O019/52/.019!
"2:37!O729=57O71/>!!
!
C/5I455/".;&
G526/.623!78756.979!:;! -4PPH0Q;&
#B75B.7Q>!L7/<0-9!0E!
C/5I455/".;&
/<7!9/=-71/9!!
J=79/.019!
62:37!O729=57O71/!
J=79/.019!
J=79/.019!
K747/./.01!
%.123!-.96=99.01!2:0=/!
K747/./.01!
/<7!60=597!
!

CONFIDENTIAL

2

"#$%&'($)&*+!!

,

COURSE NO. 8008: ANTI-HACKING COURSE ( ! " # LAB EUROPE)

TU$D%&
D
D%&

MONDAY

WEDNESDAY

THURSDAY

FRIDAY
!

Introduction:

The threat (2):

!

!

!

?!"#$%&&
!"#$%&&

Practical training (1): P r a c t i c a l training (2):
Practical training ('):
IT-Forensic:
Hacking for
LAN and Internet-Live-W
LAN-Hacking:
• Greeting
)*+,-./01,*2&3"456$
)*+,-./01,*
)*+,-./01,*2
2
2&3"456$
&3"456$
!"#$%&'(('
Administrators
• Presentation:
Hacking:

B a s i c s of WLAN
. LAN-Analysis
. B a s i c s of File
. LAN-Sniffing t e c h n o l o g y
Company and syllabus • Man-in-the-Middle
attacks (encryption)
Systems
• F ire wa ll "Piercing" •
W L A N Implementing
The threat (1):
. Firewall Hacking3789:;&<7=&'(('>&)@-.)[email protected]• D N S Spoofing

W L A N Hacking tools
. Preparing Images, e.g.
from HDD, RAM
. A d v a n c e d scanning
• D O S attack

W L A N Sniffing
Hacking for
&
!7?8;:H)I&
J;H?.89:H)I&
techniques
Administrators
. S e c u r i n g of fleeting [email protected])I&
• B o o t attack demo

Penetration testing
evidence
&
& • Penetration testing &• D O S against WLAN &
& . s c a n n i n g tools
• H a c k i n g tools

B
o
o
t
attacks
.
R
e
c
o
v
e
r
y
of
deleted
• V i r u s construction
• S e c u r i t y tools
• F5/0+,0/%&+5/,*,*2&CMG>&
W L A N Security
F5/0+,0/%&+5/,*,*2&COG>&
F5/0+,0/%&+5/,*,*2&CNG>&
@*+5"#40+,"*>&
?L$&+L5$/+&CNG>&
evidence
• D o s and DDoS

Demonstrations

Demonstrations
sets and Trojans
&)F%7./251A8!!
R+*[email protected]!!
+*[email protected]!C7.!
-.//0123!
Demonstrations
• 4./5/20601728!
Password-Cracking *<912150.607.5!
• Practical exercises by . G651A5!7C!R+*$!
• Port-scanning
. Practical exercises by @6AB1238!!
+*$F*26=;515!
the students
the students
• B u f f e r Overflows
. "79:62;!62?5!
A t t a c k s against Web0/AL27=73;!
+*$FQ21CC123!!
M62F12F0L/FM1<<=/!
G651A5!7C!%1=/!
Applications
• U R L attacks
• %1./I6==!T41/.A123U!
C o m m o n War Driving summary:
6006AB5!N/2A.;:0172O!
Q;50/95!!
R+*$!&9:=/9/20123!
!
. R+*[email protected]!077=5!
Questions/results
. S o c i a l engineering
(%1./[email protected]!
l
i
v
e'$Q!Q:77C123!
test)
• P a t h climbing
?L$&+L5$/+&CMG>&
4./:6.123!&963/5V!/W3W!
. Demonstrations and
. R+*$!Q21CC123!
F i n a l discussion about [email protected]''V!K*M!
• B r o w s e r attacks
*'7Q!6006AB!!
@6AB123!C7.!
the course
practical exercises
• Demonstrations
0/AL21P?/5!!
Q/A?.123!7C!C=//0123!
4/2/0.60172!0/50123!
G770!6006AB!97!
*<912150.607.5!
/H12A/!
QA622123!077=5!
'7Q!6361250!R+*$!
4/2/0.60172!0/50123!
@6AB123!077=5!!
K/A7H/.;!7C!=/0/G770!6006AB5!
R+*$!Q/A?.10;!
Q/A?.10;!077=5!
D1.?5!A7250.?A0172!
/H12A/!
'7Q!62'/97250.601725!
'/97250.601725!
5/05!62'/97250.601725!
4655I7.4.6A01A6=!/S/.A15/5!>;!
4.6A01A6=!/S/.A15/5!>;!
47.0F5A622123!!
!
*006AB5!6361250!R/>F
0L/!50?205!
0L/!50?205!
G?CC/.!#H/.C=7I5!
*::=1A601725!
!
"79972!R6.!'.1H123! :4PP/5Q>&
JK+!6006AB5!
Q7A16=!/2312//.123!
N=1H/!0/50O!
X?/501725Y./5?=05!
460L!A=19>123!!
!
'/97250.601725!62%126=!<15A?55172!6>7?0!
G.7I5/.!6006AB5!
:.6A01A6=!/S/.A15/5!
0L/!A7?.5/!
'/97250.601725!
CONFIDENTIAL

"#$%&'($)&*+!!

,

COURSE NO. 8008: ANTI-HACKING COURSE ( ! " # LAB EUROPE)
MONDAY

TUESDAY

WEDNESDAY

T

H

U

RD$Y

!

FRIDAY

)*+,-./01,*2&3"456$

!"#$%&'(('

!

!

!

?!"#$%&'()&*++,&

!

Practical training (5):
Practical training (6):
The threat (2): P r a c t i c a l training (8):
Practical training (9):
Cable measurement:
Additional p r a c t i c a l Additional p r a c t i c a l • In-house Wiretaps C a b l e measurement:
.
D e t e c t i o n of unknown
exercises b y & t h e exercises b y
t h e • T h e bugging of

B a s i c s and limits of
students:
students:
wires
extensions and T i m e - D o m a i n
telecommunication R e f l e c t o m e t e r FDA)
• War-dialling and Live- • Manipulation of PBX
. U s i n g a LAN-Tester
3789:;&<7=&'(('>&)@-.)[email protected]features for
Hacking
equipment

N E - and VLF. O t h e r equipment for
. Demonstrations D e t e c t i o n
cable measurement
Monitoring on
• Interception of VoIP !7?8;:H)I&
J;H?.89:H)I&
[email protected])I&
SIEMENS,
ERICs.
Demonstrations
and
• T h e protection of
• Oscilloscope
sON, ALCATEL and & Practical training (7): •& Multimeters
PBXs
practical exercises &
&
&
NORTH_
platforms
Cable
measurement:

Demonstrations
F5/0+,0/%&+5/,*,*2&CLG>&
F5/0+,0/%&+5/,*,*2&CMG>&
F5/0+,0/%&+5/,*,*2&CQG>&
?N$&+N5$/+&COG>&
F5/0+,0/%&+5/,*,*2&C'G>&
Discussion:
Summary:
.
O
v
e
r
v
i
e
w
:
Methods
of

Practical
exercises
by
*--./.0123!
4526/.623! *--./.0123!
4526/.623!
"2:37!O729=57O71/>!!
"2:37!O729=57O71/>!!
&[email protected]<0=97!?.57/249!
Discussion:
the students
• Questions
cable measurement
. H29.69!21-!3.O./9!0E!
Questions
78756.979!
:;!
/<7! 78756.979!
:;!
/<7!
'7/76/.01!0E!=1D10Q1!
)<7!:=AA.1A!0E!!!!!!
. Questions
.
F
i
n
a
l
discussion
about
• Repetition
9/=-71/9>!
9/=-71/9>!
)[email protected]'[email protected]
Q.579!
78/719.019!21-!
. [email protected][email protected]
Repetition
the
course
L21.4=32/.01!0E!!GHI!
K7E376/0O7/75!R)'KS!
T9.1A!2!+*[email protected])79/75!
/73760OO=1.62/.01!
C26D.1A!
E72/=579!E05!
$%@!21-!F+%@
7P=.4O71/!
#/<75!7P=.4O71/!E05!
L01./05.1A!01!
&1/75674/.01!0E!F0&G!
'7/76/.01!
62:37!O729=57O71/!
'7O019/52/.019!
M&(L($MN!(K&"[email protected]
)<7!450/76/.01!0E!
!
#96.33096047!!
'7O019/52/.019!21-!
M#$N!*+"*)(+!21-!
GHI9!
F5/0+,0/%&+5/,*,*2&CPG>&
4526/.623!78756.979!
L=3/.O7/759!!
$#K)(+!432/E05O9!
!
!
'7O019/52/.019!
"2:37!O729=57O71/>!!
!
H,60466,"*>&
G526/.623!78756.979!:;! :4RR/5S>&
#B75B.7Q>!L7/<0-9!0E!
H,60466,"*>&
/<7!9/=-71/9!!
J=79/.019!
62:37!O729=57O71/!
J=79/.019!
J=79/.019!
K747/./.01!
%.123!-.96=99.01!2:0=/!
K747/./.01!
/<7!60=597!
CONFIDENTIAL

2

"#$%&'($)&*+!!

,

COURSE NO. 8011: ! s " # $%&''( TEAM REVIEW (END usER COUNTRY)
SUNDAY

MONDAY

TUESDAY

WEDNESDAY

THURSDAY
!

Introduction:

Practical exercise (1):

Practical exercise (2):

Practical exercise (3):

Practical exercise (4):

!

!

*!"#$%&&

• Vi s i t i n g the
• s w e e p of a bugged
• S w e e p of a bugged
• S w e e p of a bugged
• S w e e p of a bugged
*+,! +-$$.&*$/0&1$23$+-$$
+-$$.
.&*$/0&1$23$.&*$/0&1$23$!"#$%&'())
customer's facilities
hotel room by the
conference room by
office by the students
living room by the
students
the students
students
• S u p p o r t by an
• Checking the existing
! s " # equipment
• S u p p o r t by an
• S u p p o r t by an
experienced instructor • S u p p o r t by an
experienced,451+6&748&'())9&*+,!&+:66;&*6instructor
experienced instructor
experienced instructor
,451+6&748&'())9&*+,!&+:66;&*66:&[email protected]&5+61&,457*1AB&
&16=>6:&[email protected]&5+61&,457*1AB&
Discussion:
Repetition
&
[email protected][email protected]*[email protected]:[email protected][email protected]*[email protected]Countermeasures:
Discussion:
Discussion:
Summary:
• Questions
& • Questions
&
& • Evaluation of the
& • Questions
& • Questions
• T h e prevention
• M e t h o d s of ! s " #

Evaluation
of
the

Evaluation
of
the
search
results

Evaluation
of
the
;F/HE3H/%&$J$FH3I$&?LB9&
;F/HE3H/%&$J$FH3I$&?KB9&
;F/HE3H/%&$J$FH3I$&?MB9&
;F/HE3H/%&$J$FH3I$&?)B9&
>DEF"#GHE3"D9&
search results
search results
search
results
• O v e r v i e w equipment

Preparing
for
the
@F44C!7;[email protected]!7;[email protected]!7;[email protected]!7;!-./.0.12!034!
• 7;;.54!IH!034!/06E410/!
F i n a l discussion about =.D.12!9778!IH!034!
sweep next day
• 56/07849:/!;<5.=.0.4/!!
Preparing for the
• 3704=!9778!IH!034!
Preparing for the
• Preparing for the
571;494154!9778!IH!
the course
sweep next day
sweep next day
sweep next day
/06E410/!!
034!/06E410/!!
/06E410/!!
@6CC790!IH!<1!
"345>.12!034!4?./0.12!
4?C49.4154E!.1/0965079
@6CC790!IH!<1!
@6CC790!IH!<1!
@6CC790!IH!<1!
)@"A!4B6.C8410!!
4?C49.4154E!.1/0965079!
4?C49.4154E!.1/0965079 !
4?C49.4154E!.1/0965079
!
!
!
!
@3IHGII3"D9&
1$.$E3E3"D&
+G00/FN9&
@3IHGII3"D9&
@3IHGII3"D9&
,"GDE$F0$/IGF$I9&
J64/0.71/!
J64/0.71/!
J64/0.71/!
J64/0.71/!
)34!C94D410.71!
(D<=6<0.71!7;!034!
(D<=6<0.71!7;!034!
(D<=6<0.71!7;!034!
/4<953!94/6=0/!
(D<=6<0.71!7;!034!
A4037E/!7;!)@"A!
/4<953!94/6=0/!
/4<953!94/6=0/!
/4<953!94/6=0/!
G94C<9.12!;79!034!
#D49D.4F!4B6.C8410!
%.1<=!E./56//.71!G94C<9.12!;79!034!
/F44C!14?0!EG94C<9.12!;79!034!
G94C<9.12!;79!034!
034!5769/4!
/F44C!14?0!E/F44C!14?0!E/F44C!14?0!E!

CONFIDENTIAL

"#$%&'($)&*+!!

,

COURSE NO. 8011: ! s " # $wEEP TEAM REVIEW (END usER COUNTRY)
MONDAY

TUESDAY

WEDNESDAY

THURSDAY

FRIDAY

!

!

!

*!"#$%&'()&*++,&

!

The threat (2):
Practical training*+,!
(5):
Practical.&*$/0&1$23$(6):
Practical training (8):
Practical training (9):
+-$$.&*$/0&1$23$+-$$
+-$$.
.training
&*$/0&1$23$!"#$%&'())
Cable
measurement:
Cable measurement:
Additional p r a c t i c a l Additional p r a c t i c a l • In-house Wiretaps
• B a s i c s and limits of
• D e t e c t i o n of unknown
exercises b y
t h e exercises b y
t h e • T h e bugging of
!
students:
students:
Time-Domainwires
extensions and
telecommunication
Ref lectometer FDA)
• War-dialling and Live- • Manipulation of PBX
• U s i n g a LAN-Tester
,451+6&748&'())9&*+,!&+:66;&*6features for ,451+6&748&'())9&*+,!&+:66;&*66:&[email protected]&5+61&,457*1AB&
• N E - and&16=>6:&[email protected]&5+61&,457*1AB&
VLFHacking
equipment
• O t h e r equipment for
Detection
• Demonstrations
cable measurement
Monitoring on
• Interception of VoIP [email protected]*[email protected]:[email protected][email protected]*[email protected]D1>@SIEMENS, ERIC5• Demonstrations and
• T h e protection of
• Oscilloscope
PBXs
sON, ALCATEL and & Practical training (7): & • M u l t i m e t e r s
&
&
practical exercises &
NORTEL
platforms

Demonstrations
Cable
measurement:
;E/FG3F/%&GE/3H3HI&?QB9&
;E/FG3F/%&GE/3H3HI&?JB9&
;E/FG3F/%&GE/3H3HI&?MB9&
*N$&GNE$/G&?OB9&
;E/FG3F/%&GE/3H3HI&?'B9&
Discussion:
summary:

Overview:
Methods
of

Practical
exercises
by
"2:37!O729=57O71/>!!
*--./.0123!
4526/.623! *--./.0123!
4526/.623!
"2:37!O729=57O71/>!!
&[email protected]<0=97!?.57/249!
Discussion:
the students
• Questions
cable measurement
• H29.69!21-!3.O./9!0E!
Questions
78756.979!
:;!
/<7! 78756.979!
:;!
/<7!
'7/76/.01!0E!=1D10Q1!
)<7!:=AA.1A!0E!!!!!!
• Questions
• )[email protected]'[email protected]
F i n a l discussion about Q.579!
• Repetition
9/=-71/9>!
9/=-71/9>!
78/719.019!21-!
[email protected][email protected]
Repetition
the course
L21.4=32/.01!0E!!GHI!
K7E376/0O7/75!R)'KS!
T9.1A!2!+*[email protected])79/75!
/73760OO=1.62/.01!
C26D.1A!
E72/=579!E05!
$%@!21-!F+%@
7P=.4O71/!
#/<75!7P=.4O71/!E05!
L01./05.1A!01!
&1/75674/.01!0E!F0&G!
'7/76/.01!
'7O019/52/.019!
62:37!O729=57O71/!
M&(L($MN!(K&"[email protected]
)<7!450/76/.01!0E!
#96.33096047!!
!
'7O019/52/.019!21-!
M#$N!*+"*)(+!21-!
GHI9!
;E/FG3F/%&GE/3H3HI&?PB9&
4526/.623!78756.979!
L=3/.O7/759!!
$#K)(+!432/E05O9!
!
!
'7O019/52/.019!
"2:37!O729=57O71/>!!
!
@3KFLKK3"H9&
G526/.623!78756.979!:;! +L00/ER9&
#B75B.7Q>!L7/<0-9!0E!
@3KFLKK3"H9&
/<7!9/=-71/9!!
J=79/.019!
62:37!O729=57O71/!
J=79/.019!
J=79/.019!
K747/./.01!
%.123!-.96=99.01!2:0=/!
K747/./.01!
/<7!60=597!
!

CONFIDENTIAL

2

"#$%&'($)&*+!!

,

COURSE NO. 8012: ! s " # EQUIPMENT AUDIT (END usER COUNTRY)
SUNDAY

MONDAY

TU$D
$D%
$D
D%Y
%Y

WEDNESDAY

THURSDAY
!

Introduction:

!

!

+!"#$%&&

Repetition: T h e t h r e a t Practical training (1):
Practical training (2):
Practical training (3):
(2):
Cable measurement with The physical search with
RE-Detection w i t h t h e
+,-!&./
+,-!&./
!"#$%&'()*
• Vi s i t i n g the +,-!&./0123$45&60#15
the customer's
the customer's
customer's facilities
Telecommunication
customer's equipment:
• IR
equipment:
equipment:
monitoring in PSTN
• Checking the existing

Detection
of
unknown
• V i s u a l inspection of
" s # $ equipment
In-house Wiretaps
. F i e l d strength- /Near-789,.&:7;&'()*?!.:+&[email protected]>+&A.:@&8,.9&-78:+9BC&
wires
rooms
and
technical
field-measurement
Monitoring of wireless
Repetition: T h e threat

N
F
andVLF
transmissions
equipment
. Sonic-Labelling and +E89,@6B&
&
,8:@6B&
!7:@6B&
+8.,@6B&
[email protected]:.,@6B&
(1):
Detection
Silent sound
• U s i n g optical
• L a t e s t technologies of& Repetition:
&
&
& ! B a s i c s and limits of &
Correlation
Endoscopes and other
Countermeasures:
technical espionage
Time-Domain
optical aids
• Spectrum-Analysis ?FIG51GI%&5FI1414K&ALC?FIG51GI%&5FI1414K&A*C9$2$5151"4• L a t e s t methods of >45F"#0G51"4. T h e prevention of
Reflectometer
FDA)

X
r
a
y
inspection
. O t h e r equipment for N%H'40450.71! E.03! 034!
A*C"-./.0.12!034!
wired and wireless
bugging
RP-measurement
! U s i n g a LAN-Tester
• U s i n g the NLJD
56/07849:/!4B6.C8410M!
034!56/07849:/!
034!56/07849:/!
)4=4578861.5<0.71!
transmissions
. 56/07849:/!;<5.=.0.4/!!
Bug-proof rooms
• Metal-Detection
• O t h e r equipment for 4B6.C8410M!
.
Practical
exercises
by
4B6.C8410M!
&NH'40450.71!
[email protected])$!
• "345>.12!034!4?./0.12!
M e t h o d s of " s # $
• Camouflage of bugs
cable measurement
the Students
• '40450.71!7;!61>17E1!
O t h e r equipment for
-./6<=!.1/C450.71!7;!
%.4=D!/0941203H!U$4<9H
)@"A!4B6.C8410!!
&1H376/4!I.940. O v e r v i e w equipment ! Demonstrations
physical search
E.94/!
9778/!<1D!04531.5<=!
;.4=DH846948410!
summary:
A71.079.12!7;!E.94=4//!
Demonstrations
9$2$5151"4Practical exercises by • $%H!<1D!-+%H!
Discussion:+H$& 5HF$I5& • 09<1/8.//.71/!
4B6.C8410!
. F i n a l discussion about @71.5H+the students
A)C• '40450.71!
Practical exercises by
. Questions
Q/.12!7C0.5<=!
@[email protected]!
the course
the Students
+<04/0!045317=72.4/!7;! 9$2$5151"4(1D7/57C4/!<1D!70349!
K"7994=<0.71!
-"045$F3$IJ0F$J04531.5<=!4/C.71<24!
7C0.5<=!).84H'[email protected]*1<=R/./!!
+<04/0!84037D/!7;!
)34!C94J410.71!7;!
N4;=450784049!O)'NP!
SH9#0349!4B6.C8410!;79!
E.94D!<1D!E.94=4//!
F622.12!
Q/.12!Q/.12!034!$+T'!
N%H846948410!
09<1/8.//.71/!
K62HC977;!9778/!
#0349!4B6.C8410!;79!
A40<=H'40450.71!
G9<50.5<=!4?495./4/!FR!
"<876;=<24!7;!F62/!
A4037D/!7;!)@"A!
5#0349!4B6.C8410!;79!
[email protected]/!
!
#J49J.4E!4B6.C8410!
'4871/09<0.71/!
C3R/.5<=!/4<953!
,033IFMG9<50.5<=!4?495./4/!FR!
'4871/09<0.71/!
@1JG0JJ1"4%.1<=!D./56//[email protected]/!
G9<50.5<=!4?495./4/!FR!
L64/0.71/!!
034!5769/4!
[email protected]/!
CONFIDENTIAL
!
!

"#$%&'($)&*+!!

,

COURSE NO. 8012: ! s " # EQUIPMENT AUDIT (END usER COUNTRY)

TUESDAY

MONDAY

WEDNESDAY

THURSDAY

FRIDAY

!

!

!

!

!

+!"#$%&'()&*++,&

!

The threat (2):
Practical training
(5):
Practical
training (6):
Practical training (8):
Practical training (9):
+,-!&./0123$45&60#15
+,-!&./
+,-!&.
/01
012
23$45&60#15
3$45&60#15
!"#$%&'()*
Cable
measurement:
Cable measurement:
Additional practical
Additional practical
. In-house Wiretaps
• B a s i c s and limits of
• Detection of unknown
exercises by the
exercises by the
. T h e bugging of
!
students:
students:
Time-Domain
wires
extensions and
telecommunication
Reflectometer FDA)
• War-dialling and Live- • Manipulation of PBX
• U s i n g a LAN-Tester
features for -789,.&:7;&'()*?!.:+&[email protected]>+&A.:@&8,.9&-78:+9BC&
• N E - and VLFHacking
equipment
• O t h e r equipment for
. Demonstrations
Detection
c a b l e
measurement
Monitoring on
• Interception of VoIP !7:@6B&
+8.,@6B&
[email protected]:.,@6B&
+E89,@6B&
F9>@6B&
SIEMENS, ERICs. Demonstrations and
• T h e protection of
• Oscilloscope
!BXS
sON, ALCATEL and & Practical training (7): & • Mu lt ime t e rs
&
&
practical exercises &
NORTEL
Platforms

Demonstrations
Cable
measurement:
?GHI51IH%&5GH1414J&APC?GHI51IH%&5GH1414J&AKC?GHI51IH%&5GH1414J&AMC+N$&5NG$H5&A*C?GHI51IH%&5GH1414J&A'CDiscussion:
summary:
.
O
v
e
r
v
i
e
w
:
Methods
of

Practical
exercises
by
"2:37!O729=57O71/>!!
*--./.0123!4526/.623!
*--./.0123!4526/.623!
"2:37!O729=57O71/>!!
&[email protected]<0=97!?.57/249!
Discussion:
the students
• Questions
cable measurement
. H29.69!21-!3.O./9!0E!
Questions
78756.979!:;!/<7!
78756.979!:;!/<7!
'7/76/.01!0E!=1D10Q1!
)<7!:=AA.1A!0E!!!!!!
. Questions
. )[email protected]'[email protected]
F i n a l discussion about Q.579!
• Repetition
9/=-71/9>!
9/=-71/9>!
78/719.019!21-!
. [email protected][email protected]
Repetition
the course
L21.4=32/.01!0E!!GHI!
K7E376/0O7/75!R)'KS!
T9.1A!2!+*[email protected])79/75!
/73760OO=1.62/.01!
C26D.1A!
E72/=579!E05!
$%@!21-!F+%@
7P=.4O71/!
#/<75!7P=.4O71/!E05!
L01./05.1A!01!
&1/75674/.01!0E!F0&G!
'7/76/.01!
'7O019/52/.019!
62:37!O729=57O71/!
M&(L($MN!(K&"[email protected]
)<7!450/76/.01!0E!
#96.33096047!!
!
'7O019/52/.019!21-!
M#$N!*+"*)(+!21-!
GHI9!
?GHI51IH%&5GH1414J&AOC4526/.623!78756.979!
L=3/.O7/759!!
$#K)(+!432/E05O9!
!
!
'7O019/52/.019!
"2:37!O729=57O71/>!!
!
@1LI0LL1"4G526/.623!78756.979!:;! ,033HGQ#B75B.7Q>!L7/<0-9!0E!
@1LI0LL1"4/<7!9/=-71/9!!
J=79/.019!
62:37!O729=57O71/!
J=79/.019!
J=79/.019!
K747/./.01!
%.123!-.96=99.01!2:0=/!
K747/./.01!
/<7!60=597!

CONFIDENTIAL

2

"#$%&'($)&*+!!

,

COURSE NO. 8013: ! s " # PRODUCT TRAINING COURSE (END usER COUNT.kY)
TU$D%&
D
D%&
'(URD%
URD%Y
URD%
%Y
SUNDAY
MONDAY
WEDNESDAY
!

Introduction:

!

!

!"#$%&&'$()*"#+,-#.+$!/$

Product training (2):
Product training (3): P r o d u c t training (4):
Product training (5):
Detection
o
f
a
c
t
i
ye
Cable
measurement
with
Cable
measurement
with
Detection o f a c t i v e
• Vi s i t i n g the
+,-!&./"#012&+/345456&-"0/7$
+,-!&./"#012&+/345456
+,-!&./"#012&+/34545
6
&-"0/7$
!"#$%&'()*
wireless transmissions:
the c u s t o m e r ' s the c u s t o m e r ' s wireless transmissions:
customer's facilities
• IR
equipment:
• sonic-Labelling
• Checking the existing equipment:

N
F
andVLF
. S i l e n t Sound
equipment for RP- and
• Oscilloscope

F i e l d strengthDetection
cable measurement

Multimeters
m
e
a
s
u
r
e
m
e
n
t
Correlation
-89:,;&<8=&'()*>&+,-!&.:8?9-+&+:@A-89:,;&<8=&'()*>&+,-!&.:8?9-+&+:@A• Detection of unknown • U s i n g a LAN-Tester • N e a r field. Spectrum-Analysis
wires
& (1):
,[email protected]&
[email protected]&
+9;,[email protected]&
F;?measurement
Product training
• O t h e r equipment for
. Difference-Spectrum- +G9:,[email protected]&

B
a
s
i
c
s
and
limits
of
cable measurement & • Frequency-Counters &
&
&
&
• O v e r v i e w : Cable
Analysis
Time-Domain
and
other
Receivers
.
Practical
exercises
.
Practical
exercises
measurement
./"#012&2/345456&CIE>&
./"#012&2/345456&CJE>&
./"#012&2/345456&C*E>&
A52/"#0124"5>&
./"#012&2/345456&CHE>&
Reflectometer FDA)
• Practical exercises
.
Repetition
of
cable

Practical
exercises
.
Repetition
of
RP7;!
<50.F4! '40450.71!
7;!
<50.F4!
846948410! G.03! "• -./.0.12!034!
Practical exercises "measurement
G.94=4//!09<1/8.//.71/H!
56/07849:/! G.94=4//!09<1/8.//.71/H!
56/07849:/! 034!
56/07849:/!;<5.=.0.4/!! 034!
[email protected]!
&BC'40450.71!
P71.5C+"345>.12!034!4?./0.12! [email protected]!!
$%C!<1D!-+%C
#/5.==7/57A4!!
%.4=D!/0941203C!
P.=410!P761D!
[email protected]!;79!B%C!<1D!
'40450.71!
M6=0.84049/!!
846948410!
"7994=<0.71!
5'40450.71!7;!61>17G1!
!
$4<9!;.4=DC
PA450968C*1<=O/./!!
N/.12!G.94/!
./"#012&2/345456&C)E>&
846948410!
'.;;494154CPA450968C
#[email protected]!;79!
J%[email protected]"761049/!
*1<=O/./!!
5#F49F.4GH!").84C'78<1D!70349!B454.F49/!
I9<50.5<=!4?495./4/!!
I9<50.5<=!4?495./4/!!
846948410!
B4;=450784049!K)'BL!
I9<50.5<=!4?495./4/!!
B4A40.0.71!7;!5B4A40.0.71!7;!B%C!
I9<50.5<=!4?495./4/!!
I9<50.5<=!4?495./4/!!
!
846948410!
846948410!
!
!

CONFIDENTIAL

"#$%&'($)&*+!!

,

COURSE NO. 8013: ! s " # PRODUCT TRAINING COURSE (END usER COUNTRY)
SUNDAY

MONDAY

TUESDAY

WEDNESDAY

THURSDAY

Introduction:

Product training (7):

Practical exercise (1):

Practical exercise (2):

Practical exercise (3):

+,-!&./"#012&+/345456&-"0/7$
+,-!&./"#012&+/34545 &-"0/7$
• Vi s i t i n g the customers The physical search:
• sweep

!

!"#$%&'()*

!

!

!"#$%&&'$()"*+,-.+/,$!0$

of a bugged
• S w e e p of a bugged
• S w e e p of a bugged
facilities
• Metal-Detection
office by the students
conference room by
hotel room by the
students

'
P
the students • Checking the! existing
reduced equipment)
equipment for
• S u p p o r t byan
• S u p p o r t by an
• Vi s u a l inspection
Physical search
experienced
instructor

S
u
p
p
o
r
t
by
an
experienced instructor
-89:,;&<8=&'()*>&+,-!&.:8?9-+&+:@A
-89:,;&<8=&'()*>&+,-!&.:8?9-+&+:@A• Endoscopes and
experienced
instructor
Video
Discussion:
& (6):
,[email protected]&
+9;,[email protected]&
F;?+G9:,[email protected]&
Product training
summary:
• X - r a y inspection by [email protected]&
Discussion:
&
& • Questions
& • Questions
&
The p h y s i c a l s e a r c h& d i f f e r e n t systems
measurement w i t h t h eA52/"#0124"5>&

Questions
• Evaluation of the
• Evaluation of the
• O t h e r equipment
./312413%&$J$/147$&C)E>&
./"#012&2/345456&CIE>&
./312413%&$J$/147$&CKE>&
./312413%&$J$/147$&C*E>&
• Practical exercises
search
results

Evaluation
of
the
search
results
customer's equipment:
[email protected]!7:!;!P6224J!
-./.0.12!034!56/07849/! )[email protected]/.5;[email protected]!7:!;!P6224J!
[email protected]!7:!;!P6224J!
search results
• 571:494154!9778!PA!
F i n a l discussion about 3704• U s i n g NLJDs
. :;5.Repetition of physical • M40;Preparing for the
7::.54!PA!034!/06J410/!
search
the course
! (Dis
sweep next day
Preparing for the
G6/.12!:6<034!/06J410/!G6/.12!
/06J410/!!
&NH)3498;"345=.12!034!4>./0.12!
different types
sweep next day
. [email protected]!:79!
Preparing for sweep
[email protected]!
[email protected]@790!PA!;1!
[email protected]@790!PA!;1!
-./6;• Practical exercises
the next day
@3A/.5;4>@49.4154J!.1/0965079
[email protected]@790!PA!;1!
4>@49.4154J!.1/0965079!
(1J7/[email protected]/!;1J!
!
!
4>@49.4154J!.1/0965079
!
-.J47H(1J7/[email protected]/!!
!
./"#012&2/345456&CHE>&
?4710774"5>&
,0LL3/M>&
OH9;A!.1/@450.71!PA!
?4710774"5>&
J.::49410!/A/048/!
)34! @3A/.5;R64/0.71/!
R64/0.71/!
84;/6948410! B.03! 034!
#[email protected]!!
R64/0.71/!
(K;<6;0.71!7:!034!
(K;<6;0.71!7:!034!
56/07849C/[email protected]!
L9;50.5;495./4/!!
(K;<6;0.71!7:!034!
/4;953!94/6<0/!
/4;953!94/6<0/!
E/.12!$+F'/!
/4;953!94/6<0/!
[email protected]!7:[email protected]/.5;[email protected];9.12!:79!034!
%.1;G'./HI;JK;10;24/!7:!
/4;953!
/[email protected]!14>0!J;A!
[email protected];9.12!:79!034!
034!5769/4!
J.::[email protected]/!
/[email protected]!14>0!J;A!
!
[email protected];9.12!:79!/[email protected]! !
L9;50.5;495./4/!!
034!14>0!J;A!
!

CONFIDENTIAL

2

"#$%&'($)&*+!!

,

COURSE NO. 8014: P!"-isP PENETRATION ASSESSMENT (END usER COUNTRY)
suNDAy
Introduction:

MONDAY

# $D%
#U
D%Y
D%
%Y

The threat (2):

The threat (3):

WEDNESDAY

#&URD%
URD%Y
URD%
%Y

!

Practical training (1):
Practical training (2):
!"#$%&'()*
LAN a n d Internet-Live- W LAN-Hacking:
• Vi s i t i n g the
Administrators:
customer's facilities
• B a s i c s of WLAN
Hacking:
• H a c k i n g tools

Man-in-the-Middle

V
i
r
u
s
construction
sets
• WLAN
• LAN-Sniffing
• Checking the existing
attacks PBX equipment
and Trojans
Implementing
9:;<0=&>:?&'()*@&+,-./0+&+=>=A<6
A/:>&600=00!=>A&B=>C&;0=A• F ire wa ll Hacking
• 9:;<0=&>:?&'()*@&+,-./0+&+=>=A<6A/:>&600=00!=>A&B=>C&;0=APort-scanning
• D N S Spoofing
• W L A N Hacking tools
• B u f f e r Overflows
• D O S attack
• s c a n n i n g tools
• W L A N Sniffing
The threat (1):
&
0;>C6D&
!:>C6D&
A;=0C6D&
F=C>=0C6D&

B
o
o
t
attacks

U
R
L
attacks

B
o
o
t
attack
demo
• Penetration testing AG;<0C6D&
ISDN PBXs:
• D o s and DDos
&• Penetration testing &• D O S against WLAN &
&
• Telecommunication & • P a t h climbing

B
r
o
w
s
e
r
attacks
• Password-Cracking AJ$&2J3$42&[email protected]&
• S e c u r i t y tools
• W L A N Security
+34I25I4%&2345151M&[email protected]&
+34I25I4%&2345151M&B)[email protected]&
AJ$&2J3$42&[email protected]&
and room monitoring /123"#HI25"[email protected]&

Demonstrations

Demonstrations

Demonstrations

A
t
t
a
c
k
s
against
by software
+*$! <1G! &1049140L+.P4L N+*$LK<5>.12F!
K<5>.12!;79!
K<5>.12!;79!*G8.1./09<079/F!
-./.0.12!034!
• Practical exercises K<5>.12F!
• Practical exercises
Web-Applications
• 56/07849:/!;<5.=.0.4/!!
Practical exercises by theK<5>.12!077=/!!
*G8.1./09<079/F!
• H a c k i n g of PBX
Astudents

S
o
c
i
a
l
engineering
by
the
students
by
the
students
remote-access-ports
+*$LE1.;;.12!!
M<1L.1L034LM.GG=4!
N+*$!
-.96/!571/09650.71!/40/!
"345>.12!034!4?./0.12!
• Demonstrations
o m m o n War
<00<5>/!S4159ID0.71T! • C%.94J<[email protected]!
• Ty p i c a l mistakes in
&8D=48410.12!
<1G!)97O<1/!!
@AB!4C6.D8410!!
• Practical exercises
Driving %.94J<==!K<5>.12!
configuration
&
N+*$!K<5>.12!077=/!
'$E!ED77;.12!
@790L/5<11.12!!
by
the
students
• Manipulation of PBX AJ$&2J3$42&B)[email protected]&
E5<11.12!077=/!
N+*$!E1.;;.12!
'7E!<00<5>!!
A6;;49!#P49;=7J/!
summary:
features
A770!<00<5>/!
@41409<0.71!04/0.12!
A770!<00<5>!G487!
QR+!<00<5>/!
&E'[email protected]/F!
• Questions
• Interception of VoIP
'7E!<1G!''7E!
'7E!<[email protected]<0.71!04/0.12!
@<03!5=.8H.12!!
)4=4578861.5<0.71!
• WAN-LAN-access

F
i
n
a
l
discussion
@/J79GL"9<5>.12!
N+*$!E4569.0I!
E4569.0I!077=/!
A97J/49!<00<5>/!
<1G!9778!871.079.12!
about the course
• T h e protection of
*00<5>/!<2'4871/09<0.71/!
'4871/09<0.71/!
'4871/09<0.71/!
HI!/7;0J<94!
PBXss
N4HL*DD=.5<0.71/!
@9<50.5<=!4?495./4/!
@9<50.5<=!4?495./4/!
@9<50.5<=!4?495./4/!HI!034!
K<5>.12!7;[email protected]!
E75.<=!412.1449.12!
HI!034!/06G410/!
HI!034!/06G410/!
/06G410/!
948704L<554//LD790/!
!
'4871/09<0.71/!
!
"78871!N<9!
)ID.5<=!8./0<>4/!.1!
!
'9.P.12!S=.P4!04/0T!
@9<50.5<=!4?495./4/!
571;.269<0.71!
!
HI!034!/06G410/!
M<1.D6=<0.71!7;[email protected]!
!
[email protected]&
;4<0694/!
CONFIDENTIAL
W64/0.71/!
&104954D0.71!7;!-7&@!
%.1<=!G./56//.71!
N*$L+*$L<554//!
)34!D970450.71!7;!
@AB/!

!"#$%&'

+,-./0+&+$1$23425"1&677$778$12
Hacking for Administrators:
Hacking for

!

!

!
!
!
"#$%&'($)&*+!!

,

COURSE NO. 8016: ! s " # sWEEpiNG OF $%R F O R PROFESSIONALS( & $ ' LAB EUROPE)

TU(D%)
D
D%)

MONDAY

WEDNESDAY

THURSDAY

FRIDAY
!

Introduction:

Practical exercise (1):

Practical exercise (2):

Practical exercise (3):

Practical exercise (4):

+!"#$%!

sweep o f a b u g g e d Sweep of a bugged luxury Sweep of a bugged car by Sweep of a bugged car by
. Greeting
+,-!&,.$$
+,-!&,.$$/
/012
/01
012&"3&-456&
2&"3&-456&
&"3&-456&33"5&75"3$660"14%6
3"5&75"3$660"14%6
!"#$%&'()*
. Presentation of+,-!&,.$$/012&"3&-456&3"5&75"3$660"14%6
the
the students (part 4):
luxury car (e.g. Mercedes car by the students (part the students (part !):
• F i n a l checks and
S
2):
• Physical search in
company and

N
e
a
r
field
measurements
or
A
U
D
I
A
8
b
y
t
h
e
engine compartment
syllabus
students:
measurement
and
boot
-89:,;&<8=&'()*>&+,-!&,?;;[email protected]-89:,;&<8=&'()*>&+,-!&,?;;[email protected]&B8:&7:8B;,,@8• F i n a l reassembling of

B
r
i
e
f
i
n
g
and
technical

Difference-Spectrumparts

Reassembling
of
parts
Countermeasures:
& !8+9;,HCI&
?;H+J9:,HCI&
B:@HCI&

T
e
s t run
instructions by an
Analysis
• Vi s u a l inspection of the
. B a s i c knowledge of
underside
experienced
& • X - r a y inspection by &
& • Documentation and &
&
automotive
mechanic
different
systems

U
s
i
n
g
mirrors,
Reporting
754MK0M4%&$O$5M06$&E)G>&
754MK0M4%&$O$5M06$&ERG>&
754MK0M4%&$O$5M06$&EQG>&
754MK0M4%&$O$5M06$&EPG>&
@1K5"#LMK0"1>&
electronics

Disassembling
the
Endoscopes
and
Video

Disassembling
the

S
u
p
p
o
r
t
by
an
. Communication
JD//78! 6! @A33/>! JD//! ?AIA.=! JD//!:[email protected]=! JD//!:[email protected]=!
-.//0123!
interior
dashboard
Endoscopes
experienced instructor09/!50A>/205!K<6.0!\WS!
?AIA.=!:6.!K/L3L!M/.:/>/5! :6.! @=! 09/! 50A>/205! K<6.0! 09/!50A>/205!K<6.0!YWS!
technology in cars
4./5/2060172!78!09/!
• Measurement of
and mechanic
• Physical check of

U
s
i
n
g
NLJDs
JG"?655N! BMO! PG5/.1/5! VWS!
%126?!:9/:C5!62>!
49=51:6?!5/6.:9!12!
:7;<62=!!62>!
. H i d i n g places and
interior and cabin
Electronic
Components
•$/6.!81/?>!
S u p p o r t by an
hollows in and under
7.!
*Q'&!
*R!
@=!
09/!
;/65A./;/205!
/2312/!:7;<6.0;/20!
[email protected]!!
u p p o r t by an
experienced instructor summary:
• S u p p o " t
cars
50A>/205S!
62>[email protected]!
;/65A./;/20!
%126?!./655/;@?123!78!
&
and mechanic
experienced
experienced instructor '188/./2:/GJ•
Q
u
e
s
t
i
o
n
s
B.1/8123!62>!0/:921:6?!
<6.05!!
U/655/;@?123!78!<6.05!
. Considering bullet- -"L1K$5N$46L5$6>&
instructor and
and mechanic
1250.A:[email protected]=!62!

Evaluation
of
the
*26?=515!!
proof cars
)/50!.A2!
Z15A6?!125mechanic
B651:!C27D?/>3/!78!
Discussion:
/I!
search
results
A2>/.51>/!
XG.6=!125'7:A;/2060172!62>!
. O v e r v i e w equipment
6A07;701E/!
Discussion:
;/:9621:!
•>188/./20!5=50/;5!
Questions
•Q5123!;1..7.5N!
F i n a l discussion about U/<7.0123!
for sweeping of cars Discussion:
/?/:0.721:5!
• Questions
'15655/;@?123!09/!
the course
(2>75:75!62>!Z1>/7G
JA<<[email protected]=!62!
•'15655/;@?123!09/!
R e s u l t s of the day
• Preparing for the car
"7;;A21:60172!

Questions
120/.17.!
(2>75:75!!
>[email protected]>!
/I!1250.A:07.!
sweep next day
• R e s u l t s of the day
0/:927?73=!12!:6.5!
49=51:6?!:9/:C!78!
• R e s u l t s of the day
62>!;/:9621:!
Q5123!$+['5!
M/65A./;/20!78!
F1>123!6:/5!62>!
120/.17.!62>!:[email protected]!
(?/:0.721:!"7;<72/205
&
JA<<[email protected]=!62!
97??7D5!12!62>!A2>/.!
JA<<[email protected]=!62!
/I!1250.A:07.! ,LNN45S>&
JA<<[email protected]=!62!
:6.5!
/I!
62>!;/:9621:!
/I!1250.A:07.!
TA/501725!
"7251>/[email protected]??/0G
1250.A:07.!62>!
62>!;/:9621:!
&
(E6?A60172!78!09/!
;/:9621:!
&
H06ML660"1>&
#E/.E1/D!/HA15/6.:9!./5A?05!
CONFIDENTIAL
1
H06ML660"1>&
TA/501725!
87.!5D//<123!78!:6.5!
%126?!>15:[email protected]!
H06ML660"1>&
TA/501725!
09/!:7A.5/!
U/5A?05!78!09/!>6=!
4./<6.123!87.!09/!:6.!
TA/501725!
5D//6=!
U/5A?05!78!09/!>6=!
U/5A?05!78!09/!>6=!
!
!

"#$%&'($)&*+!!

,

COURSE NO. 8017: COMPUTER FORENSICS
MONDAY

TUESDAY

WEDNESDAY

THURSDAY

FRIDAY

?!"#$%&

!
Introduction:
Forensic basics:
Mobile Forensics:
Forensic analysis I:
Forensics Analysis II:
• H a r d w a r e tools
• Greeting
• Processing Crime and • F i l e forensics
• To o l usage
Incident scenes
• Presentation of the

E
n
c
a
s
e
Forensic
• S o f t w a r e tools
+",-./$0&1"0$23453
+",-./$0&1"0$23453
-./$0&1"0$23453 • E
!"#$%&'()*
company and syllabus • D i g i t a l Evidence
Edition,
• Investigating data
• Recovering deleted
Controls
streams
data from SIM card
• X
Introduction:
• M i c r o s o f t Windows

F
o
re
n
s
ic
Toolkit
(FTK),
• F i l e storage dates and
• Recovering deleted
Systems
times +6789:&;67?:8&168:;[email protected]+9&
• L i n u x tools
data from a cell phone
• C o m p u t e r Forensics
• U n i x Systems
• L i n u x forensic suites
• F i l e deletion/recovery
• P D A Computer
and Investigations
D:A;:9ABC&
?E789ABC&
[email protected]&
• B o o t Processes and ?7:9ABC&
Forensics
• F o r e n s i c Office& and !6;ABC&
• Recovering Internet
• Sysinternals tools
File Systems
Usage Data
Laboratory
• C a s eanalysis
Study I:
@2/0"#.5/4"2=&
1"0$2345&FG3453&=&
Forensic
Forensics Analysis II:
Mobile Forensics:
• Preparing
sterile
• F o r e n s i c process

Recovering:
Swap
-.//0123!
4.7:/55123!".1;/!62>!
%1?/!87./251:5!
)77?!A563/!
V6.>F6./!077?5!
examination media
summary:
Discussion:
F i l e s / Te m p o r a r y
• C u r r e n t Computer
&2:1>/20!C:/2/5!
4./5/2060172!78!09/!
(ND61?!&2B/5013601725!!
(2:65/!%7./251:!
C780F6./!077?5!
• Questions
Files/Cache Files
• :7;<62=!62>[email protected]
D a t a Acquisition
Forensics Tools
• Questions
'13106?!(B1>/2:/!
(>10172Q!!
&2B/501360123!>606!
• W r i t e Blocker
• F i n a l discussion about M/:7B/.123!>/?/0/>!
• R e s u l t s of the day
!
"720.7?5!
50./6;5!!
>606!8.7;!C&D!:6.>!
RNE6=5!%7./251:!
Discussion:
the course
@2/0"#.5/4"2=&
D1:.75780!E12>7F5!
%1?/!507.63/!>60/5!62>!
M/:7B/.123!>/?/0/>!
%7./251:!)77?K10!S%)TUQ!!
Discussion:
• Questions
C=50/;5!
01;/5!!
>606!8.7;!6!:/??!<972/!
+12AH!077?5!
"7;• Questions
• R
e s u l t s of the day
G21H!C=50/;5!
%1?/!>/?/0172O./:7B/.=!!
4'*!"7;62>!&2B/5013601725!
+12AH!87./251:!5A10/5!
• R e s u l t s of the day
I770!4.7:/55/5!62>!
%7./251:5!
M/:7B/.123!&20/.2/0!
%7./251:!#881:/!62>!
C=5120/.26?5!077?5!
%1?/!C=50/;5!
!
G563/!'606!!
[email protected]=!
"65/!C0A>=!
4./<6.123!50/.1?/!
!
M/:7B/.123P!CF6%7./251:!!
/H6;1260172!;/>16!
9.,,G0H=&
%1?/5O)/;<7.6.=!
A435.334"2=&
"A../20!"7;'606!*:JA1510172!
LA/501725!
%1?/5O"6:9/!%1?/5!
%7./251:5!)77?5!
LA/501725!
E.10/!I?7:K/.!
!
%126?!>15:[email protected]!
M/5A?05!78!09/!>6=!
!
09/!:7A.5/!
A435.334"2=&
A435.334"2=&
LA/501725!
LA/501725!
M/5A?05!78!09/!>6=!
M/5A?05!78!09/!>6=!

CONFIDENTIAL
!
!

"#$%&'($)&*+!!

,

COURSE NO. 8018: ! s " # IT COURSE

TU$D%&
D
D%&

MONDAY

WEDNESDAY

THURSDAY

FRIDAY

!
Information Gathering
Attacking
Attacking
Cryptography
• Passwords
• Wireless
• S e a r c h Engines
• F i l e Systems
FinFisher Attacks *+,!&-*&,"./0$
• WLAN
!
!"#$%&'()'

• Communication
• Bypass
• FinFisher 1

D
e
f
a
u
l
t

Bluetooth
• Networks
• 55[
• FinFisher 2

B
r
u
t
e
force

Keyboards
• Mapping
• FinFisher 3
• Cracking,123+4&516&'()'7&*+,!&-*&,123+4&
• Policies
• scanning
,123+4&516&'()'7&*+,!&-*&,123+4&
• Vo i c e - o v e r
• Enumeration
• Notebooks
!1589:&
*24+89:&
;4854+89:&
*<23+89:&
Trojan Horses &
• External Networks =3-89:&
• S o f t w a r e Security
• A u d i o Sniffing
• Sniffing
• Features

A
t
t
a
c
k
s

Protocol
Attacks
• Internal Networks &
& • Redirection
&
&
&
• Verification
• Detection
->F"/GC?A">&HC?B$/A>I&
[email protected]>I&
->?/"#[email protected]?A">&
[email protected]>I&
,/JK?"I/CKBJ&
• Hardware

Prevention
&
• Prevention

<15280!(.=-.1/!
:5//>92E/!
K-21F1//!
%-F1!=A>=A0B$/&[email protected]&
•NLA5//!
Countermeasure
K+*$!
• Countermeasure
!
"9BB7.-856-9.!
%-.%-/012!,!

Model
7540
'1C57F6!
NF7169960!
• Model 7543
$16>92?/!
<%-.%-/012!3!
N2761!C9281!
P1LQ952E/!

WiFi
Detector
!
@5AA-.=!
• I_
I_!"###
!"###_!"
!"
&
"258?-.=!
%-.%-/012!4!
<85..-.=!
:9F-8-1/!
Analyzer
!
&
O9-81R9;12R&:!
(.7B1256-9.!
$961Q99?/!
*/"EC>&<9C6>521!<1872-6L!
*7E-9!(T612.5F!$16>92?/!
%156721/!
*6658?/!
:296989F!*6658?/!
D1E-2186-9.!
&.612.5F!$16>92?/!
!
O12-C-856-9.!
'16186-9.!
!
U52E>521!
!
:21;1.6-9.!
:21;1.6-9.!
!
!
&
"97.612B15/721!
!
"97.612B15/721!
!
@9E1F!GHIS!
@9E1F!GHI4!
K-%-!'1618692!
+*$JK+*$!
&
*.5FLM12!
!
!
! CONFIDENTIAL
1

*!"#$%&

Introduction

!
!

"#$%&'($)&*+!!

,

! s "# INDEX
!"#$%&'()*
•••••

W • '-

. Introduction
!"!#!$%&'()*+&,(%
!#!$%&'(
!#!$%&'
()*
)*+
+&,&,(%
(%
- The
Threat
!-!#!./0!./'01&
!#!./0
!#!./
0!./'0
!./'
01&
1&
- Recommendations
!#!30+(
!#!3
0+(44
440
0%)1&,
%)1&,(
(%5
%5
!2!#!30+(440%)1&,(%5
4 - Training
Overview
7 Course
8(*'50!9:0':,0
8(*'50!
9
:0':,0;
;
!6!#!.'1,%,%7!8(*'50!9:0':,0;
!6!#!.'1,%,%7
!6!#!.'1,%,%
5 - Training
syllabuses
[email protected]*505
!7 Course
8(*'50!=>[email protected]*505
8(*'50!=>[email protected]*505
6 - Recommended Products
!!A!#!30+(440%)0)!B'()*+&5
7 - Technical Data Sheets
=/00&5
/00&5
!C!#!.0+/%,+1?!D1&1!=/00&5
!C!#!.0+/%,+1?!D1&1!
!C!#!.0+/%,+1?!D1&1!=
- IP/PABX Manipulation
!E!#!$BFBGHI!J1%,K*?1&,(%
- Commercial
Quotations
!#!8(
!#!8
(44
440
0''+
+,1?!M*
,1?!M*
,1?!M*(
(&1&,
&1&,(
(%5
%5
!L!#!8(440'+,1?!M*(&1&,(%5
10!#!.0
- Terms
& Conditions
"N!#!.
"N!#!.0'45!O!8(%),&,(%5
"N
!#!.
0'45!O!8(
'45!O!8
(%),&,
%),&,(
(%5
%5
11"!#!8(
- 8(%&1
Contact
Details
""!#!
""!#!8(%&1+&!D0&1,?5
"
"!#!
"!#!
%&1+
+&!D
&!D
&!D
&!D0
0&1,?5
&1,?5
"-!#!P?141%!81&1?(
"-!#!P?141%!81&1?(75!9:0':,0;
"
-!#!P?141%!81&1?(
-!#!P?141%!81&1?(
-!#!P?141%!81&1?(7
75!9:0':,0
5!9:0':,0
5!9:0':,0;
;
12
- Haman Catalogs
Overview


lG
$m$nP
$
$m
m$
m
$
$nP
nP
E
R
M
A
N
$ECURITVsOL(

elaman

.

!

Sweep
Pics
!"##$
!"##$%&'()
!"##
$%&'()

Typical
Typical
Technical sweep
Operation
*+$'(,-%*#(./'(,-%!"##$%0$#1,2'3/
+$'(,-%*#(./'(,-%!"##
'(,-%*#(./'(,-%!"##
'(,-%*#(./'(,-%!"##$
$%0$
%0
$#1,2'3/
#1,2'3/
*+$
*
!

Telephone Junction Box

Passive Wall sweep

Turnkey !"# system

LAN Tester

$R%&i'g Wall Ceiling Cables

Visually Checking Underfloor Ducts

CONFIDENTIAL
"#$%&'($)&*+!!
"#$%&'($)&*+!

Cable Measurement

1

,

ldmd*

!

Products
!"#$%&'(

Product Description
!"#$%&')*+(&",-',#.)
-',#.)
',#.)
!"#$%&')*+(&",!"#$%&')*+(&",
!

Ref.
/+01)
/+01

Qty
2'3)
2'3

Model
4#$+5)
4#$+5

1
,!

1
,!

7501 !
-./,

lb
,:!

!

7501-2!
-./,;<

Advanced Non Linear Junction Detector !
*=>5284=!$12!+32456!07289312!'4948916!

2

1 ,!

7502-1 !
-./
! s " # search Tool Kit
)?"@!?4568A!)11B!C39!

D3!
D!

1
,!

7502-2!
-./
Advanced /Teiecomms search Tool Kit
*=>5284=!E)4B481FFG!?4568A!)11B!C39!

4!
H
H!

1
,!

7504!
-./H

4b
H:!

1
,!

.5!
.!

1
,!

7505!
-./.

5b
.:!

1
,!

7505-2
-./.;
Q6!
Q!

1 ,!

-7!
-!

1
,!

7507-01 !
-./-;/,

V8!
V!

1
,!

7508!
-./V

*=>5284=!?852!'4948916!?LG94F
Advanced Scan Detector System

W9!
W!

1
,!

7509!
-./W

TDR Multi Channel Cable Detector
)'[email protected]!"A5224B!"5:B4!'4948916

10
,/!

1
,!

7510!
-.,/

'3N395B!*=>5284=!X52=!X4B=!#G83BB1G81M4
Digital Advanced Hand Held Oscilloscope!

11
,,!

1
,!

7511 !
-.,,

Detection Receiver
'49489312!K4843>46

12
,
1
,!

7513!
-.,D

O5BB!'[email protected]!?LG94F
Wall Depth Measurement System

13 1 ,!
,D!

Description
*+(&",-',#.)
*+(&",-',#.
NLJD Non Linear Junction Detector
$+0'!$12!+32456!07289312!'4948916!

I1695:B4!J;K5L!?LG94F
Portable X

-./H!1M9312
!
7504 option ! *=>5284=!%B59!?86442!J;K5L!&F5N46
Advanced Fiat screen X

7506!
-./Q

7514-2!
-.,H;<

Thermal - Wall Scanner
)A46F5B!;!O5BB!?852246
)A46F5B!&F5N32N!P16!?76>43BB5284!*MMB3859312G!
Thermal Imaging for surveillance Applications

Locator
+185916!
#M9385B!?LG94F!91!'49489!"5F465GR!+42G!SK11F!T46G312U
#M9385B!?LG94F!91!'49489!"5
F465GR!+42G!SK11F!T46G312U
Optical System to Detect Cameras,
Lens (Room Version)

>3=41!64F194!M61:4!32GM489312
video remote probe Inspection

14
,H!

1
,!

7515!
-.,.

@56Y32N!C39;"1>469!?938Y46G!&BB7F325916
Marking Kit-Covert Stickers Illuminator

15
,.!

1
,!

7516!
-.,Q

#M9385B!?4568A!)11BY39
Optical Search Toolkit

16
,Q!

1
,!

7517-01 !
-.,-;/,

T3=41!52=!*7=31!K%!'49489312!?LG94F
Video and Audio RP Detection system

17
,-!

1
,!

7517-02!
-.,-;/<

*=>5284=!T3=41!Z!*7=31!K%!'49489312!?LG94F
Advanced Video & Audio RP Detection System!

18
,V!

1
,!

7518 oscor! #@$&!?I(")K*+!"#KK(+*)#K
OMNI SPECTRAL CORRELATOR
-.,V!1G816

19
,W!

1
,!

-.,V!1M9312
7518 option ! #F23!?M48965B!"1664B5916
Omni Spectral Correlator

20 1 ,!
!

3521 !
D.
X3NA!I1[46!\[email protected]!05FF32N!?LG94F!
High Power $ 5 % Jamming System

21

1
,!

3522!
D.<<

Room Jammer
K11F!05FF46!

22
<
1
,!

3525!
D.
"1FM7946!?8644232N!05FF46!
Computer screening Jammer

23 1 ,!

3526!
D.
*293;+5G46;@3861MA124!$13G4!05FF46
Anti-Laser-Microphone Noise Jammer

24

1
,!

3527!
D.
Advanced Counter Surveillance Jammer
*=>5284=!"172946!?76>43BB5284!05FF46

25

1
,!

7519!
-.,W

%?X!I1695:B4!?M48967F!*25BL]46
FSH Portable Spectrum Analyzer

26

1
,!

7520!
-.

^7N!'4948916
Bug Detector

27 1 ,!

7521 !
-.
(^/;X3NA!?M44=!%64_7428L!?852246!D!\X]![39A!'%
&'200-(igh Speed Frequency Scanner ) GHz with DE!

CONFIDENTIAL
"#$%&'($)&*+!!
"#$%&'($)&*+!

,

ldmd!

!

Products
!"#$%&'(

Product Description
!"#$%&')*+(&",-',#.)
-',#.)
',#.)
!"#$%&')*+(&",!"#$%&')*+(&",
28 1 1.!
,-!

7522!
/0,,

Digital scout Frequency Detector
'121345!67893!%:;<9;=7>!';3;738:

29
,?!

1
.!

7523!
/0,@

Advanced Cable Tracing System
*AB4=7;A!"4C5;!):471=2!6>D3;E!

30
@F!

1
.!

7525!
/0,0

X-ray for screening VIP Presents
GH:4>!I8:!67:;;=1=2!J&K!K:;D;=3D

31
@.!

1
.!

7527!
/0,/

Encryption Product - GSM Encryption Phones!
(=7:>L318=!K:8A973!H!M6N!(=7:>L318=!KO8=;D

32
@,!

1
.!

7530!
/[email protected]

Ultra Scan50b
P53:4!674=0FC!

33
@@!

1
.!

7539!
/[email protected]?

3D image enhancer
@'!1E42;!;=O4=7;:

34
@Q!

1
.!

7540!
/0QF

Wireless Network detector
R1:;5;DD!$;3S8:T!A;3;738:

35
@0!

1
.!

7541 !
/0Q.

);5;LO8=;!+1=;!4=45>U;:!';3;738:
Telephone Line analyzer Detector

36
@V!

1
.!

7542!
/0Q,

Secure document scanner
6;79:;!A879E;=3!D74==;:

37
@/!

1
.!

7543!
/[email protected]

+*$WR+*$!"O;7T1=2!6>D3;E
LAN/WLAN Checking System

38
@-!

1
.!

7544!
/0QQ

TSCM Search Video Pole Camera
)6"N!6;4:7O!J1A;8!K85;!"4E;:4

39
@?!

1
.!

7545!
/0Q0

Video Wireless Detection
J1A;8!R1:;5;DD!';3;7318=

40
QF!

1
.!

7546!
/0QV

"4C5;!*EL51I1;:!6>D3;E
Cable Amplifier System

41
Q.!

1
.!

7547
/0Q/!

%543!K4=;5!GH:4>!D>D3;E!
%543!K4=;
5!GH:4>!D>D3;E!
Flat Panel5!GH:4>!D>D3;E!
X-ray system

42
Q,!

1
.!

4014!
QF.Q

M6N!';3;7318=!6>D3;E
GSM Detection System

43
[email protected]!

1
.!

1013!
[email protected]

$12O3!J1D18=!T13
Night Vision kit

44
QQ!

1
.!

2001 !
,FF.

'88:!#L;=1=2!T13
Door Opening kit

!

!

CONFIDENTIAL
"#$%&'($)&*+!!
"#$%&'($)&*+!

2

,

elaman

!

sweep
List
!"##$
!"##$%&'()
!"##
$%&'()

Recommended Product Description
$)',.
)',.
*#+,--#./#/%01,/2+)%3#(+1'$)',.
*#+,--#./#/%01,/2+)%3#(+1'$
*#+,--#./#/%01,/2+)%3#(+1'
Special Sweep List
!$#+'45%!"##$%&'()%
Government Approved
6,7#1.-#.)%8$$1,7#/%
%

For in-country sweep teams, including portable cases and vehicles
9,1%'.:+,2.)1;%("##$%)#4-(5#%+4(#(%4./%7#?'+5#(%
This equipment is instaHed in portable casing, @-.=-!=75!07/.8A!<0!4:B09!C;:4!387=0!6:!387=0!
which can easily be moved from place to place
)-./!012.34056!./!.5/678809!.5!3:;67<80!=7/.5>[email protected]=-!=75!07/.8A!<0!4:B09!C;:4!387=0!6:!387=0!
)-./!012.34056!./!.5/678809!.5!3:;67<80!=7/.5>?!
!

1.1. MB,/#5%[email protected]%:%F)?%6#.#14)',.%G&H3%I5#+)1,.'+%J'1+2')1;%3#)#+),1%
o d e l 7501 - 4th Generation NLJD%I5#+)1,.'+%J'1+2')1;%3#)#+),1%
Electronic Circuitry
Detector
@[email protected]
B,/#5%[email protected]%:%F)?%6#.#14)',.%G&H3
B,/#5%[email protected]%:%F)?%6#.#14)',.%G&H3%I5#+)1,.'+%J'
%I5#+)1,.'+%J'
1+2')1;%3#)#+),1%
(PASSIVE)
%%
K08!!LMIN

I

)-0!$:5!+.507;!D25=6.:5!'060=6:;!E$+D'F!./!2/09!.5!6-0!.5.6.78!3-A/.=78!
The Non Linear Junction Detector (NLJD) is used in the initial physical
/07;=-!3-7/0!:C!7!/@003G!&6/!25.120!2/0!788:@/!75!:30;76.B0!6:!12.=H8A!
search phase of a sweep. Its unique use allows an operative to quickly
759!
0CC0=6.B08A! scan
/=75! a7!location
8:=76.:5! for
C:;! concealed
=:5=07809!electronic
080=6;:5.=! components.
=:43:5056/G!
and effectively
The Model
s a7!versatile
)-0!
I:908!7501
JKL,!i ./!
B0;/76.80! third
6-.;9!harmonic
-7;4:5.=! NLJD
$+D'! which
@-.=-! detects,
9060=6/?!
/2/30=6! electronic
080=6;:5.=! devices,
90B.=0/?!
7578AM0/!
759!pin-points
3.5N3:.56/! the
6-0! location
8:=76.:5! o:C!
analyzes and
f suspect
@-06-0;!6-0A!7;0!/@.6=-09!:5!:;!:CCG!
whether they are switched on or off.
!

1.1.2 Model
7501 -2 - Advanced NLJD
@[email protected]
B,/#5%[email protected]:O%:%8/74.+#/%G&H3%
@[email protected]!B,/#5%[email protected]:O%:%8/74.+#/%G&H3%

(

P

A

S

S

I

VK08!!LMIN%
E )

)-0!
25.6!provides
3;:B.90/! the
6-0!capability
=7376:! detect
9060=6! hidden
-.9905! electronic
080=6;:5.=! devices,
90B.=0/?!
The unit
;0>7;980//!
:C!
@-06-0;!
6-0!
90B.=0!
./!
;79.76.5>?!
-7;9!
@.;09?!
0B05!
regardless o f whether the device is radiating, hard wired, o:;!
r even
76!
788O!
&6/!
25.120!
90/.>5!
4075/!
6-76!
.6!
./!
8.>[email protected]>-6?!
62;509!
:5!
turned o n a t all! I t s unique design means that i t i s lightweight,
=:4380608A!3:;67<80!759!C:89/[email protected]!.56:!7!/4788!=7/0G%
=:4380608A!3:;67<80!759!C:89/[email protected]!.56:!7!/4788!=7/0G
completely portable and folds away into a small case.
@AOA
1.2. MB,/#5%CDEO:@%:%!#41+?%P,,5(%4./%P#()%IQ2'$-#.)%%
o d e l 7502-1 - Search Tools and Test Equipment ( S E AK!I8*JRN
RCH)
)-./!6::8!H.6!./!2/2788A!2/[email protected]!7!$:5N8.507;!D25=6.:5!'060=6:;!E$+D'F!
This tool kit is usually used with a Non-linear Junction Detector (NI LJD)
759!3;:B.90/!6::8/!6-76!7;0!25.1208A!/2.609!C:;!2/[email protected]!75!$+D'G!)-0!
and provides tools that are uniquely suited for use with an NLJD. The
6::8!H.6!=:40/!.5!7!8076-0;!6::8!<7>G!!
tool kit comes in a leather tool bag.
!
B,/#5%CDEO:O%:%8/74.+#/SP#5#+,-(%!#41+?%P,,5%T')%
Model 7502-2 - Advanced/Telecoms Search Tool kit ( S E K!I8*JRN
ARCH)
'0/.>509!7/!7!)P"I!6074!6::8H.6!6-76!.5=8290/!788!6-0!50=0//7;A!6::8/!
Designed as a ! s " # team toolkit that includes all the necessary tools
500909!6:!=7;;A!:26!7!6-:;:2>-!3-A/.=78!759!=7<80!/07;=-G!
!":567.5.5>!
needed to carry out a thorough physical and cable search. Containing
6-0!
<7/.=! toolset
6::8/06! required
;012.;09! fC:;!
60803-:50! sweeps,
/@003/?! such
/2=-! as
7/! a7! digital
9.>.678!
the basic
o r telephone
4286.4060;?!<266!/06!759!/6;2=62;09!=7<8.5>!6::8/Q!.6!=:438.4056/!4:;0!
multimeter, butt set and structured cabling tools; It compliments more
79B75=09!
=7<80!tools
6::8/!such
/2=-!as
7/!the
6-0! Line
+.50!Amplifier
*438.C.0;! or
:;! $%&
"RIJLLG!
! *88!
6-0!
advanced cable
700. A
l l the
080=6;:!40=-75.=78!6::8/!.5!6-./!/06!-7B0!<005!326!6:>06-0;!6:!3;:B.90!7!
electro mechanical
, tools in this set have been put together to provide a
@.90!;75>0!:C!7.9/!C:;!=:43806.5>!7!C288!3-A/.=78!/07;=-?!/2=-!7/[email protected]:;H!
wide range of aids for completing a full physical search, such as work
8.>-6/?!
4.;;:;/?!opening
:305.5>! tools
6::8/! a759!
9;.88! t6:!
788:@! u2/0!
lights, mirrors,
n d e0B05!
v e n a7! drill
o allow
s e o:C!
f
borescopes or videoscopes.
@AUA
B,/#5%CDEF%:%0,1)4>5#%V:*4;%!;()
1.3. MB,/#5%CDEF%:%0,1)4>5#%V:*4;%!;()#-%!,W)"41#%M'#"'.=%!;()#-%
o d e l 7504 - Portable X
%
KX0PLJ8&%!I8*JRN
(OPTICAL SEARCH)
)-./!
25.6!can
=75!see
/00!though
6-:2>-!objects
:6:! check
=-0=H! on
:5!electronic
080=6;:5.=! circuitry/tape
=.;=2.6;AT6730!
This unit
;0=:;90;/T6;75/4.660;/!
759!microphones/cameras,
4.=;:3-:50/T=740;7/?! hidden
-.9905! i .5!
/0=;06!
recorders/transmitters and
n secret
7;07/G!&6!./!78/:!2/09!6:!=:437;0!080=6;.=78!90B.=0/!C:;!75A!=-75>0/!:5!
areas. It is also used to compare electrical devices for any changes on
R"U!
)-./! mobile
4:VN;7A! generator
>050;76:;! comes
=:40/! with
@.6-! a7! PC
R"! and
759! a7!
PCB boards.
=740;7!6:!9060=6!75A!<2>/!-.9905!.5!>.C6/!3;0/05609!6:!W&R/G!
camera to detect any bugs hidden in gifts presented to VIPs.
!
!

CONFIDENTIAL
"#$%&'($)&*+!!
"#$%&'($)&*+!

,

elaman

Recommended Product Description
$)',.
)',.
*#+,--#./#/%01,/2+)%3#(+1'$)',.
*#+,--#./#/%01,/2+)%3#(+1'$
*#+,--#./#/%01,/2+)%3#(+1'

!

sweep
List
!"##$
!"##$%&'()
!"##
$%&'()

Model 7504 Option - Advanced Flat screen X
4,/#5%6789%:$)',.%;%=>.+#/%?5>)%!+1##.%@;*>A%B->C#1
A! flat
*
*!
-./0!panel
1/23.!x-ray
456/7!imager
89/:36! offering
;--3682:!high
<8:63=;.>08;2! images
89/:3=! in
82! the
0<3! most
9;=0!
confined spaces
i t h even
?;[email protected]!
=1/?3=! from
-6;9!different
@8--36320! orientations
;68320/08;2=! and
/[email protected]! wA803B32! greater
:63/036!
coverage (25
o r security
aw
?9FG%specifically
H13?8-8?/..7! designed
@3=8:[email protected]! f-;6!
?;B36/:3!
C,D! !4! 33
EE! cm).
?9FG
=3?>6807! and
/[email protected]! l./A!
enforcement professionals
t i 8=!
s flatter,
nd le
ss
-./0036I! safer,
=/-36I! stronger
=06;2:36! a/[email protected]!
.3==!
32-;6?39320!
16;-3==8;2/.=! i 80!
expensive than
34132=8B3!
02!many
9/27! other
;0<36! fragile
-6/:8.3! flat
-./0! panel
1/23.!units.
>280=G! It
&0! is
8=! available
/B/8./J.3! as
/=! a
/!
?;91.303!456/7!=7=039!;6!/!=82:.3!-./0!1/23.!>1:6/@3G!!
complete x-ray system or a single flat panel upgrade.
DE9E
4,/#5%6787%;%:$)'+>5%F>55%!+>.
.'.C%!A()#-G%H1.4. M4,/#5%6787%;%:$)'+>5%F>55%!+>..'.C%!A()#-G%Ho d e l 7505- Optical Wall scanning
System, NATO Approved
(SEARCH)
%
J!K)<3!1<7=8?/.!82=13?08;2!;-!/!0/6:30!.;?/08;2!8=!0<3!9;=0!0893!?;2=>982:!
The physical inspection of a target location is the most time consuming
1/60!
;-! a/!sweep.
=A331G! A
! *..!
=>6-/?3=! and
/[email protected]! objects
;JK3?0=! must
9>=0! be
J3! inspected.
[email protected]! The
)<3!
part of
l l surfaces
L;@3.!MDND!A/[email protected];[email protected]!0;!136-;69!/!O>8?P!/[email protected]!0:Model 7505 was developed to perform a quick and thorough search to
.;?/03!?;2?3/[email protected]!3/[email protected];1182:[email protected]?3=G!*!?;2?3/[email protected][email protected]?3!A8..!3980!
locate concealed eavesdropping devices. A concealed device will emit
/a!<3/0!=8:2/0>63!3/=8.7!=1;[email protected]!J7!/!0<369/.!82=13?08;2!=7=039G!
/!<3/0!=8:2/0>63!3/=8.7!=1;[email protected]!J7!/!0<369/.!82=13?08;2!=7=039G!
heat signature easily spotted by a thermal inspection system.
!

%

DE9EO
4,/#5%6787;O%P%IQ#1->5%B->C'.C%R,
4,/#5%6787;O%P%IQ#1->5%B->C'.C%R,1%!21=#'55>.+#%)',.(%
1%!21=#'55>.+#%)',.(%
1.4.2 Model
7505-2 — Thermal Imaging for1%!21=#'55>.+#%)',.(%
Surveillance Applications
(SEARCH)
%
J!K)<3!
Q280! is
8=!a/!flexible,
-.348J.3I!easy
3/=7! to
0;!use,
>=3I!handheld
[email protected]<[email protected]!thermal
0<369/.!imager,
89/:36I! which
A<8?8=!
The Unit
=>80/J.3!
/..! l ./A!
32-;6?39320! operations,
;136/08;2=I! including
82?.>@82:! surveillance,
=>6B38../2?3I!
suitable f-;6!
o r all
a w enforcement
)
)H"LI!1;.8?3I!-863/69=!03/9=!/[email protected]!;0<36=G!&0!=!/!./6:3!?.3/[email protected]=1./7I!/!
"H"LI!1;.8?3I!-863/69=!03/9=!/[email protected]!;0<36=G!&0!=!/!./6:3!?.3/[email protected]=1./7I!/!
5#$, police, firearms teams and others. It has a large clear display, a
RDNS!
9!image
89/:3! range,
6/2:3I!image
89/:3! storage
=0;6/:3! t0;!
?/[email protected]! and
/[email protected]! temperature
039136/0>63!
150+ m
o 5H'!
D card,
93/=>[email protected]/.!-;6!<[email protected];1;28?=G!&0!?/[email protected]?0!13;1.3!82!0;0/.!
measurement that is ideal for hydroponics. It can detect people in total
@/6P23==!
@8=0/2?3! surveillance
=>6B38../2?3! offering
;--3682:! h<8:darkness a/[email protected]!
n d a /..;A=!
l l o w s c ?;B360!
o v e r t distance
igh
63=;.>08;2!89/:3=!;-!RTN4R,N!1843.=!/[email protected]!/2!/>0;!resolution images of 160x120 pixels and an auto hotspot tracker that is
>=3->.!-;6!<8:>=3->.!-;6!<8:useful for highlighting people.

1.5. M4,/#5%678S%;%&,+>),1%P%&,+>)#(%T%3#)#+)(%I1>.(-'))#1(%%
o d e l 7506 - Locator —Locates & Detects Transmitters
DE7E
%
J*?%&:L(RE LOCATION)
)<8=!1;60/[email protected]<[email protected]!>280!8=!>[email protected]!0;!1821;820!0<3!34/?0!.;?/08;2!;-!/!
This portable hand-held unit is used to pinpoint the exact location of a
@[email protected]!
06/2=980036! a/[email protected]!
/2/.;:! a/[email protected]!
@8:80/.!
detected transmitter
n d c ?/2!
a n l o.;?/03!
c a t e bJ;0o t h analog
n d digital
transmitters.
06/2=980036=G%
06/2=980036=G

1.6. M4,/#5%6786;8D%;%U'/#,%L>-#1>%>./%.(%3#)#+),1%%
o d e l 7507-01 - Video Camera and Lens Detector
DESE
%
J:0IBL(OPTICAL SEARCH)
)<8=!
[email protected]<[email protected]!system
=7=039! will
A8..! detect
@303?0! cameras/lenses
?/936/=U.32=3=! covertly
?;B360.7! installed
82=0/[email protected]! in
82!
This hand-held
6;;9=!/[email protected]!?;2-3632?3!1./?3=G!CV;;9!B36=8;2F!
rooms and conference places. (Room version)
%
DE6E
!"##$%
1.7. M4,/#5%
o d e l 7 5678V%
0 8 - ;% B uW2'5/'.C%
ilding S w
e e p S y!A()#-%
s t e m w "')Q%
i t h D 32>5%
ual !
X!,R)">1#%
Antenna/Software
(
A
C
T
I
V JE
RE) !
)<3!*@B/[email protected]!H?/2!'303?0;6!H7=039I!L;@3.!MDNWI!8=!>28O>[email protected]!
The Advanced Scan Detector System, Model 7508, is uniquely different
-6;9!
/..!other
;0<36!RE
V%!Detection
'303?08;2!Systems.
H7=039=G! It
&0! is
8=!an
/2!advanced
/@B/[email protected]! system
=7=039! which
A<8?from all
>=3=!
=13?06>9!
/2/.7X36!
A800<3!
./03=0!
=;-0A/63!
03?<2;.;:83=!
uses spectrum analyzer w i t h t h e latest software technologies t0;!
o
16;[email protected]!
/??>6/03!results.
63=>.0=G! !I &0!
>=3=! a/! twin
0A82!antenna
/20322/! system,
=7=039I!placing
1./?82:! one
;23!
provide accurate
t uses
.;?/08;2! and
/[email protected]! one
;23! inside.
[email protected]! Using
Q=82:! t0<3!
/20322/!
;>[email protected]! o;-!
0/6:30! location
antenna outside
f t0<3!
h e target
he
/..!suspicious
=>=18?8;>=! transmissions
06/2=98==8;2=! which
A<8?/63!
=;-0A/63!
8=! able
/J.3! t0;!
=software i80!
t is
o show
=06;2:36!82!0<3!0/6:30!.;?/08;2!02!;>[email protected]!)<8=!8=!/!=06;2:[email protected]?/0;6!;-!
stronger in the target location than outside. This is a strong indicator of
/!06/2=980082:!3/[email protected];1182:[email protected]?3G%
/a!06/2=980082:!3/[email protected];1182:[email protected]?3G
/!06/2=980082:!3/[email protected];1182:[email protected]?3G
transmitting eavesdropping device.
CONFIDENTIAL
"#$%&'($)&*+!!
"#$%&'($)&*+!

%

,2

elaman

Recommended Product Description
$)',.
)',.
*#+,--#./#/%01,/2+)%3#(+1'$)',.
*#+,--#./#/%01,/2+)%3#(+1'$
*#+,--#./#/%01,/2+)%3#(+1'

s

w

e

!

e!"##
p %&'()
List
!"##$%&'()

1.8. M7,/#8%9:;[email protected]#8%A'1#/%[email protected]#1%
o d e l 7509 - Multi-Channel Wired Analyzer ( C A B LE>BF&G!H
E S )
4565
The unit is one of the most
valuable );"! s " # test instruments available.
6432!789/8:9.!);")-.!/012!13!40.!45!2-.!
6432!789/8:9.!
878198:9.>!
This equipment is capable of detecting many wiretap methods that are
)-13!.?/[email protected][email protected]:[email protected]!6.2-4B3!2-82!8=.!
undetectable by
r other
/0B.2.A28:9.!
:D! conventional
A407.0214089!telephone
[email protected]! analyzers,
8089DF.=3G! meters
6.2.=3! o4=!
42-.=!
instrumentation. The unit is designed to reveal all wire irregularities by
1032=/6.0282140>!)-.!/012!13!B.31C0.B!24!=.7.89!899!E1=.!1==.C/98=121.3!:D!
displaying t2-.!
h e characteristic
o each
[email protected]!
A-8=8A2.=1321A! signatures
31C082/=.3! and
80B! distances
B13280A.3! t24!
.8A-! wire
E1=.!
1==.C/98=12D>!
H12-4/2! a8!TDR,
)'IG! t2-.!
@=.3.0A.! and
80B! location
94A82140! o45!
899! w
E1=.!
irregularity. Without
h e presence
f all
ire
1==.C/98=121.3!A80042!
:.!pinpointed,
@[email protected]!and
80B!2-.=.54=.!
E199! not
042! be
:.! physically
@-D31A899D!
irregularities cannot be
therefore will
[email protected]>!!
inspected.
!
45<5
7,/#8%9:4;%3'I')@8%B/[email protected]+#/%[email protected]
./?#8/%L(+'88,(+,$#%
1.9. M7,/#8%9:4;%3'I')@8%B/[email protected]+#/%[email protected]/?#8/%L(+'88,(+,$#%
o d e l 7510 Digital Advanced Handheld
Oscilloscope ( C AE>BF&G!H
BLES)
)-.!
B1C1289!oscilloscope
[email protected]! i 13!
/3.5/9! f 54=!
6.83/=10C! a899!
:831A!
The digital
s useful
o r measuring
l l t 2-.!
h e basic
6.83/=.6.023!
.9.A2=401A! e q.?/[email protected]!
.328:913-10C!
measurements i n10! electronic
u i p m e n t a 80B!
n d f o54=!
r establishing
A8/3.B! b:D!
[email protected]/982140! o4=!
64B151A821403!
2-82!
A4/9B! h-87.!
modifications t h
a t could
a v e b:..0!
e e n caused
y manipulation
r
102.C=82140!45!3/=7.19980A.!.?/[email protected]>
102.C=82140!45!3/=7.19980A.!.?/[email protected]>%
integration of surveillance equipment.

1.10. Model
7511 - Detection Receiver
(
R
E E*M%B>NOPGQO*H
ACTIVE/IR)
454;5
7,/#8%9:44%=%3#)#+)',.%*#+#'J#1%%
#0.!45!2-.!51=32!24493!24!:.!/3.B!B/[email protected]!3.8=A-!3-4/9B!:.!2-.!
One of the first tools to be used during a physical search should be the
Broadband RF Detector. This versatile unit can indicate the location of
J=48B:80B!I%!'.2.A24=>!!)-13!7.=38219.!/012!A80!10B1A82.!2-.!94A82140!45!
8!
2=8036133140!source,
34/=A.G! whether
E-.2-.=! hidden
-1BB.0! i 10!
@-40.G! r=446!
:4BD!
8a!transmission
n phone,
o o m o4=!
r body
2=8036122.=3G!
=.642.! control
A402=49!signals,
31C0893G!
[email protected]/2.=! bugs,
:/C3G! f58K!
2.9.K!
31C0893G!
G! computer
transmitters, remote
a x o4=!
r telex
2=8036122.=3G!
71B.4!transmitters,
2=8036122.=3G!pulsed
@/93.B!
@/93.B! tracking
2=8AL10C! transmitters,
2=8036122.=3G! spread
[email protected]=.8B!
transmitters, video
[email protected]=/6G!
5=.?/.0AD! hopping
[email protected]@10C! o4=!
spectrum, a80B!
n d e.7.0!
v e n wE1B.!
i d e b:80B!
a n d frequency
r ' bM:/=32M!
urst'
2=8036122.=3>!
13! a8! multi
6/921! use
/3.! tool
2449! which
E-1A-! covers
A47.=3! a8! wide
E1B.! range
=80C.! of
45!
transmitters. T! )-13!
h i s is
283L3!5=46!:[email protected]!3.8=A-.3!24!A8:9.!7.=151A82140>!
tasks from basic physical searches to cable verification.

%
%

%
45445
7,/#8%9:4R%=%N?1,2I?=N?#[email protected]%3'([email protected]%!C()#-%%
1.11. Model
7513 - Through-The-Wall Display system ( S E A E!GB*>KH
R C H )
)-13!
/012!measures
6.83/=.3! the
2-.! depth
[email protected]! of
45! a8! wall
E899!and
80B! shows
3-4E3! objects,
4:N.A23G! such
3/A-! as
83!
This unit
[email protected]!
A8:9.3G!transmitters
2=8036122.=3! or
4=! cameras
A86.=83! on
40! a8! in-built
10O:/192! display.
[email protected]>!This
)-13!
microphone cables,
A80!:.!/3.B!10!A40N/0A2140!E12-!8!$40!+10.8=!P/0A2140!'.2.A24=>!
can be used in conjunction with a Non Linear Junction Detector.
%
454S5
7,/#8%9:4T
S
1.12. Model
7514!S%=%P'/#,%01,U#%*#-,)#%P'([email protected]%O.($#+)',.%%
2%=%P'/#,%01,U#%*#-,)#%P'([email protected]%O.($#+)',.%%
- Video Probe Remote Visual Inspection (SE!GB*>KH
E ARCH)
*!=.642.!713/89!71B.4!:[email protected][email protected][email protected][email protected]!
*
A!=.642.!713/89!71B.4!:[email protected][email protected][email protected][email protected]!
remote visual video boreoscope power tool for improving inspection
@=4B/A21712D>!
)-.! base
:83.! is
13! a8! portable
@4=28:9.! workstation
E4=L3282140! for
54=! inspection
[email protected]! data
B828!
productivity. The
[email protected]/3!8!91C-2!34/[email protected]=4:.>!&2!-83!8!
management, plus a light source and storage reel for the probe. It has a
-1C-!
=.349/2140!LCD
+"'!screen
3A=..0!and
80B!powerful
@4E.=5/9!computing
[email protected]/210C! platform
@98254=6! for
54=! data
B828!
high resolution
6808C.6.02!
80B!worldwide
E4=9BE1B.! connectivity.
A400.A21712D>!Probes
Q=4:.3! come
A46.! in
10! size
31F.! from
5=46!
management and
,>R!66!/@!24!S>T!66!10!B186.2.=>!
3.2 mm up to 8.4 mm in diameter.

!

454R5
7,/#8%9:4:%=%!#+1#)%[email protected]'.I%W')%!#@8(%@./%&'I?)%!,21+#%%
E!GB*>KH %
1.13. Model
7515 - secret Marking Kit Seals and Light Source (SEARCH)
*52.=!A8==D10C!4/[email protected]!.?/[email protected]!13!/3.B!24!68=L!2-.!
After carrying out a room search special equipment is used to mark the
searched area.
f the
e made
o see
f
3.8=A-.B!
8=.8>! A*! check
A-.AL! o45!
2-.! room
=446! can
A80! b:.!
68B.! later
982.=! t24!
3..! i15!
80D2-10C!
-83! been
:..0!tampered
[email protected]=.B! with,
E12-G! f54=!
[email protected]! after
852.=! a8! sweep
[email protected]! all
899!
anything has
o r example,
.9.A2=1A89!34AL.23!8=.!3.A=.29D!68=L.B!34!15!80!102=/B.=!2=1.3!24!A400.A2!
electrical sockets are secretly marked so if an intruder tries to connect
88!:/C!12!A80!:.!B.2.A2.B>%
8!:/C!12!A80!:.!B.2.A2.B>
a!:/C!12!A80!:.!B.2.A2.B>
bug it can be detected.

CONFIDENTIAL
"#$%&'($)&*+!
"#$%&'($)&*+!!

,$

elaman

Recommended Product Description
$)',.
)',.
*#+,--#./#/%01,/2+)%3#(+1'$)',.
*#+,--#./#/%01,/2+)%3#(+1'$
*#+,--#./#/%01,/2+)%3#(+1'

s

w

e

!

e!"##
p %&'()
List
!"##$%&'()

1.14. Model
7516 - Optical search System Set ( S E A R A!BC*DEF
C H )
45465
7,/#8%9:4;%8%!#>1+?%[email protected]()#-%!#)%%
The Optical
)-.!
#/01234!search
5.362-!Toolkit
)774810! is
19! the
0-.! budget
:;<=.0! alternative
340.6>301?.! accessory
[email protected]! kit
810! to
07!
enable a thorough and effective physical search. F o r use in validating
.>3:4.!3!0-767;=-!3>!?341<301>=!
information provided
1>A76C3017>!
/67?1D10-! other
70-.6! equipment,
.E;1/C.>0F! such
9;2-! as
39! the
0-.! NLJD,
$+G'F! the
0-.!
Optical Search
s ideal
o r searching
o reach
nd
#/01234!
5.362-!Toolkit
)774810! i 19!
19.362-1>=! hard
-366.32-! a3>inaccessible areas.
1>322.991:4.!36.39B!

%

%

1.15. Model
454:5
7,/#8%7517-01
9:49C2/',I1>.(-'((',.% Decoder
3#+,/#1% Detector
3#)#+),1%
C.>[email protected]#1%
Analyzer
(ACTIVE
RE)
%
AACDIKHB%*LF
AC
CD
DI
IKKH
HB
B *L
*
LFF
3>[email protected]!detects
3>3;<17I?1J%! transmission
063>9C19917>!
)-.!
;>10!analyzes,
The unit
3><19/[email protected]!its
109!results
6.9;409! on
7>!an
3>!in-built
1>K:;140! monitor.
C7>1076B! It
&0! also
3497!scans
923>9! telephone
0.4./-7>.!
and displays
3>C31>9!cables.
23:4.9B!This
)-19! u;>10!
23>! detect
1>A636.A6.E;.>[email protected]!
and mains
n i t can
h e frequency
27?.63=.!
LMMM! MHz.
NOHB! A*! NATO-approved
$*)#K3//67?.3>0.>>3! system
[email protected]!
coverage i 19!
s u;/!
p t07!
o 3000
.>3:4.9!27?.60!923>>1>=!07!038.!/432.B%
.>3:4.9!27?.60!923>>1>=!07!038.!/432.B
enables covert scanning to take place.

1.16. Model
N Transmission
454;5
7,/#8%7517-02
9:49C/N>.+#% A
COH%
I1>.(-'((',.% Decoder
3#+,/#1% Detector
3#)#+),1%
C.>[email protected]#1%
Analyzer
(ACTIVE
RE)
%
AACDIKHB%*LF
AC
CD
DI
IKKH
HB
B *L
*
LFF
)-19!;>10!23>!9D../!3>!.>016.!:;14<1>=!A67C!7>.!4723017>B!)-19!C7This unit can sweep an entire building from one location. This model is
& '
0-.!>[email protected]!63>=.!7A!SM!UOHKV!WOHB%
0-.!>[email protected]!63>=.!7A!SM!UOHKV!WOHB
the next-level model 7517-02 with a frequency range of 10 !"z-6 GHz.
45495
7,/#8%9:4P%=(+,1%8%D,11#8>),1%
1.17. Model
7518 Oscor - Omni Spectral Correlator
*
*!
/-39.4728.9;/.6! heterodyne
-.0.67.! spectrum
9/.206;C! analyzer,
3>[email protected]! designed
.A! phased
9/[email protected]!
A76! counter
27;>0.6! surveillance
9;6?.1443>2.! that
0-30! automatically
3;[email protected]! selects
9.4.209! antenna
3>0.>>3!
specifically for
1>/;09B!%6.E;.>[email protected]!9/3>9!23>!:.!/67=63CC.=4.!:;007>!27>0674!
inputs. Frequency spans can be programmed with single button control
A76!
63/16.2344!and
3>3;07C3012! searching.
9.362-1>=B!Patented
X30.>0.A747;0! antenna
3>0.>>3!
for rapid
/3>.4!
3;[email protected]!
9.4.209!
0-.!
/67/.6!
3>0.>>3B!
(>-3>2.0632.!
panel automatically selects t h e proper antenna. Enhanced trace
3>[email protected]!/67?1<[email protected]!
analysis provides ability to compare target sweep area traces to friendly
0632.9F!07!E;[email protected][email protected]!.?12.!7A!063>9C100.69!1>!036=.0!9D../!36.3B!
traces, to quickly identify evidence of transmitters in target sweep area.

!

!
7,/#8%9:4P%,$)',.%N#%3,".+,.N#1)#1%
Model 7518 option - Microwave Downconverter
)-.!#5"#J!N1267D3?.!'7D>27>?.60.6!7/017>!YN'"KTSMMZ!A.30;6.9!3>!
The OSCOR Microwave Downconverter option ($D%-2100) features an
[email protected]!7A!-1=-!=31>!<16.2017>34!3>0.>>39B!&0!23>!A;>2017>!1>!9D../F!3>[email protected]!
array of high gain directional antennas. It can function in sweep, analyze
3>2766.43017>!modes
C73>1>24;061/7)-.! $
N'"KTSMM!
23>! be
:.!
and correlation
D%-2100 can
;9.!3!903017>[email protected]!/791017>!91001>=!7>!0-.!/67?1!
:.!
used in a stationary position sitting on the provided tripod or it can be
C7?.367;>07!
/67?13!
0-767;=-!
9D../!
7A!
0-.!
36.3B!
%76!
/67/.6!
moved around to provide a thorough sweep of the area. For proper
7/.63017>F!
0-.!$
N'"KTSMM!
9-7;4:.! located
47230.30! least
4.390! three
0-6..! feet
A..0! away
[email protected]!
operation, the
D%-2100 should
from the OSCOR.
A67C!0-.!#5"#JB!
454P5
7,/#8%Q:M4%%7,/#8%Q:M4%%--'.T%[email protected]()#-%
1.18. Model
3521 - GSM Hi-Power S>--'.T%[email protected]()#-%
Jamming System ( J A MASC77KURF
M I N G )
)-19!/7603:4.!W5N![3CC1>[email protected]!23>![3C!3>=9!3>This portable G5 $ jamming system can jam and protect meetings and
27>A.6.>2.9!
D10-! its
109! TRKD300!
7;0/;0B! )-.! [email protected]! 19! 3497! 3?3143:4.! 1>!
conferences with
25
"'N*!A6.E;.>21.9!;/7>!6.E;.90B!#0-.6!7/017>34!.P0639!1>24;CDMA frequencies upon request. Other optional extras include output
/7D.6!;/!07!STMKD300!07!/670.20!27C/4.0.!36.39B!
power up to 1 2 0

CONFIDENTIAL
"#$%&'($)&*+!
"#$%&'($)&*+!!

!

!

,4

elaman

Recommended Product Description
$)',.
)',.
*#+,--#./#/%01,/2+)%3#(+1'$)',.
*#+,--#./#/%01,/2+)%3#(+1'$
*#+,--#./#/%01,/2+)%3#(+1'

s

w

e

!

e!"##
p %&'()
List
!"##$%&'()

!

1.19. Model
3525 - Computer screening Jammer - Defender (JAMMING)
45465
7,/#8%9:;:%%[email protected]#1%B?C77DEFG%
The D e'./.01.2!
f e n d e r w 3455!
i H j a678!
m t h9-.!
e frequencies
i t t e d f r/2>8!
o m a7!
)-.!
/2.:;.0<4.=! e m
.8499.1!
monitor/computer/keyboard t h9-79!
a t c <70!
a n bC.!
e monitored
y h i-4D9.-tech
8>049>2?<>[email protected];9.2?A.BC>721!
8>049>2.1! bCB!
interception equipment,
409.20!
.:;[email protected]!without
349->;9! Interfering
409.2/.240F! with
349-! the
9-.! operation
>@.2794>0! of
>/! your
B>;2!
computer.
<>[email protected];9.2G!
45;H5
7,/#8%9:;I%%!J()#-%%
7,/#8%9:;I%
1.20. Model
3526 - Laser Jamming %!J()#-%%
System ( J A M M B?C77DEFG%
I N G )
)-4=!;049!678=!57=.2!701!7;14>!=4F075=!40!7!2>>8G!H.0=>2=!72.!7997!
This unit jams laser and audio signals in a rOOm, sensors are attached to
3401>3=!701!<70!=9>@!70B!57=.2!=B=9.8!/2>8!3>2A40FG!
windows and can stop any laser system from working.
!
45;45
7,/#8%9:;K%%!J()#-%;H1.21. Model
3527 - Jamming System 20-2400 MHz ( J A M B?C77DEFG%
M I N G )
)[email protected]>9.<9!7F740=9!342.5.==!J%!K41.>!701!7;14>!C;F=G!&9!4=!
This Jammer wiH protect against wireless RE video and audio bugs. It is
@>297C5.!
701!easy
.7=B! to
9>!use
;=.!and
701!covers
<>K.2=! a7! wide
341.! band.
C701G! It
&9! has
-7=! a7! white
3-49.! noise
0>4=.!
Portable and
9>0.!F.0.279>2!71140F!.L927!=.tone generator adding extra security.
!
45;;5
7,/#8%K:46%1.22. Model
7519 - FSH spectrum Analyzer
(
F
I
EB*O%C=PDQRG%
ACTIVE)
)-4=!
[email protected]<92;8!Analyzer
*075BN.2! enables
.07C5.=! quick
:;4701! effective
.//.<94K.! RE
J%!
This !M701D-.51!
and-h"d spectrum
8.7=;2.8.09!
>/! rooms
2>>8=!and
701!signal
=4F075!analysis.
7075B=4=G! I&9!
[email protected]=! all
755! analog
7075>F! and
701!
measurement of
t displays
14F4975!=4F075=G!)-.!%HM!4=!7K7457C5.!40!O!8>1.5=P!QRR!D!S!TMU!>2!QRR!D!V!
digital signals. The F ! is available in 2 modes: 100 - 3 GHZ or 100 - 6
,GW! GHz
TMN! video
K41.>!
TMNG!
)-.! 6V!GHz
TMN! is
4=!Particularly
@7294409.2.=940F! for
/>2! detecting
1.9.<940F! 5.8
GHz. The
=4F075=G!
signals.
45;95
7,/#8%K:;H%%3#)#+),1%%
1.23. Model
7520 - Covert Bug Detector ( D e t e c t B3#)#+)',.G%
i o n )
X>3.2/;5E!
=.0=494K.! and
701!adjustable
716;=97C5.! cigarette
<4F72.99.! box
C>L! size
=4N.! bug
C;F! detector,
1.9.<9>2E!
Powerful, sensitive
3-41.9.<9=!active
7<94K.!transmitters
9270=8499.2=! and
701!bugging
C;FF40F! devices
1.K4<5>=.! by.
CBG! Its
&9=!
which detects
14=<2.9.!
K4C27940F! a 75728!
755>3=! I 49!
C>1BD3>20G! Powerful
X>3.2/;5!
discrete vibrating
l a r m aHows
t t 9>!
o bC.!
e body-worn.
2.0F!>@.27940F!948.G%
2.0F!>@.27940F!948.G
rechargeable batteries guarantee long operating time.
45;L5
RT;HH%U%!$##/%O1#V2#.+J%[email protected]#1%"')U%3O%
1.24. !"
200 - High Speed Frequency Scanner with DE ( R %B*O%C=PDQRG%
F ACTIVE)
)-.!(YORR!349-!49=!14F4975!=<70!8>1.!.07C5.=!C701!/2.:;.0<4.=!>/!;@!9>!
The #$200 with its digital scan mode enables band frequencies of up to
S%!GHz
S!
TMN! to
9>!be
C.!scanned
=<700.1!in
40!miHiseconds
84554=.<>01=!enabling
.07C540F!short
=->29! burst
C;2=9! transmitters,
9270=8499.2=E!
2.8>9.!
<>092>5!
9270=84==4>0=E!
.99>!
C.!
488.1479.5B!
1.9.<9.1!
701!
remote control transmissions, etc. t o b e immediately detected and
located.
5><79.1G!

.

.

. ;,. .

.

.

45;:5
7,/#8%K:;;%')@8%!+,2)%O1#V2#.+J%3#)#+),1%%
1.25. Model
7522 - Digital Scout Frequency Detector ( R B*O%C=PDQRG%
F ACTIVE)
)-4=!
-701D-.51!
;049!
@2>K41.=!
70!
488.1479.!
/2.:;.0/4L!
@>==4C5.!
This hand-held unit provides an immediate frequency fix o>/!
f Possible
transmissions in a dosed area. With an add-on receiver the audio of the
9270=84==4>0=!40!7!<5>=.1!72.7G!Z49-!70!711D>0!2.!>/!9-.!
<[email protected];2.1!=4F075!<70!C.!-.721G!
captured signal can be heard.
!
45;I5
7,/#8%K:;9%%!J()#-%
B=CT&R!G%
(CABLES)
1.26. Model
7523 - Cable Tracking System
Z49-!
<7C5.!
8.7=;2.8.09!
97A40F!
;@!
9>!
SR!
@.2>/!
7!
[email protected]!
.//>29E!
With cable measurement taking up to 30 percent of a sweep effort,
9>>5=!
9-79!
@2>K41.!
[email protected]>29709!
40/>28794>0!
.//.<94K.5B!
701!
:;472.!
tools that Provide important information effectively and quickly are
0..1.1G!
!
)-.!
*1K70"7C5.!
)27<40F!
HB=9.8!
4=!
1.=4F0.1!
9>!
741!
40!
needed. T h e Advanced Cable Tracing System is designed t o aid in
5><7940F!
755!
<7C5.=!
<>840F!
/2>8!
9-.!
972F.9!
5><794>0G!
!
"[email protected]!
>/!
927<40F!
locating all cables coming from the target location. Capable of tracing , .
<7C5.=!
C;24.1!as
7=!deep
[email protected]! as
7=! 2O!meters,
8.9.2=E!this
9-4=! system
=B=9.8! excels
.L40! ensuring
.0=;240F! all
755!
cables buried
@>9.094755B!170F.2>;=!<7C5.=!72.!/>;01G!
potentiaHy dangerous cables are found.
CONFIDENTIAL
"#$%&'($)&*+!!
"#$%&'($)&*+!

!

,5

-

elaman

Recommended Product Description
$)',.
)',.
*#+,--#./#/%01,/2+)%3#(+1'$)',.
*#+,--#./#/%01,/2+)%3#(+1'$
*#+,--#./#/%01,/2+)%3#(+1'

s

w

e

!

e!"##
p %&'()
List
!"##$%&'()

1.27. Model
7525 - X-ray system for VIP Gifts, Presents, etc ( S E
ARCH)
45675
8,/#9%7:6:%;%%!>()#-%?,1%@A0%B'?)(C%01#(#.)(C%#)+%%
D!EF*GHI%
As a.!security
*-!
-/012345! precaution
62/0.14378!all
.99!received
2/0/3:/;! gifts
<3=4-! should
->719;! be
?/! x-rayed
@A2.5/;! for
=72! any
.85!
possible surveillance equipment — remember the gift the Russians gave
67--3?9/!-12:/399.80/!/B136C/84!AA!2/C/C?/2!4>/!<3=4!4>/!D1--3.8-!to the Americans?
47!4>/!*C/230.8-E!
1.28. ROHDE
& SCHWARZ G ! Encryption ( V O [email protected]%0*KOEGOAKPI%
I C E PROTECTION)
456J5
*KH3E%L%!GHMF*N%B!8%E.+1>$)',.%
FGH!(802564378!3-!1-/;!47!-/012/!4>/!07CC1830.4378!7=!4>/!I&JK-L//6!
G5! Encryption is used to secure the communication of the VIP/sweep
team members.
h e system
4/.C!
C/C?/2-M! T! )>/!
-5-4/C! is
3-! compatible
07C6.43?9/! with
L34>! desktop
;/-N476! telephones
4/9/6>78/-!
and secures what is sent over the network. This is also available for e.8;!-/012/-!L>.4!3-!-/84!7:/2!4>/!8/4L72NM!)>3-!3-!.9-7!.:.39.?9/!=72!
/A
mail security.
C.39!-/012345M!
456Q5
8,/#9%7:RS%;%%T.')%%
D!EF*GHI%
1.29. Model
7530 - X-ray Unit
(
S
E
A
R
C
H
)
*-!
-/012345! precaution
62/0.14378! this
4>3-! product
627;104! would
L719;! be
?/! used
1-/;! for
=72! checking
0>/0N38I&J!
As a.!security
<3=4-!
.8;!objects
7?O/04-! such
-10>! as
.-!bags,
?.4/9/6>78/! phones,
6>78/-P! etc.
/40M! t47!
970.4/! any
.85!
gifts and
o locate
?1<<38bugging equipment.
45RS5
8,/#9%7:RQ%;%R3%A-=U#%E.V=.+#1%
1.30. Model
7539 - 3D Image Enhancer
( S E A R CD!EF*GHI%
H )
)>/!
Q'!Image
&C.!Enhancer
(8>.80/2! is
3-! a.! mobile
C7?39/! system
-5-4/C! that
4>.4! converts
078:/24-! 2d
R;! x-ray
@A2.5!
The 3D
3C.-!3847!Q;!3C.-M!!&4!0.8!?/!B130N95!.8;!/.-395!-/4!16!.8;!34-!1-/2!
images into 3d images. I t can be quickly and easily set up and its user
=23/8;95!
384/2=.0/! means
C/.8-! no
87! extra
/@42.! training
42.38383-! required.
2/B132/;M! I&4!
0.8! convert
078:/24!
friendly interface
t can
078:/84378.9!=39C-!.8;!-472.!=739-M!!
conventional films and storage foils.

1.31. Model
7540 - Wireless Network Detector ( D e t e c D3#)#+)',.I%
t i o n )
45R45
8,/#9%7:WS%;%M'1#9#((%P#)",1X%3#)#+),1%%
*
*!
627=/--378.9!Wireless
S32/9/--! Network
$/4L72N! Detection
'/4/04378! and
.8;!Visualization
I3-1.93T.4378! tool
4779! that
4>.4!
A!professional
;/4/04-!
.8;!stores
-472/-! all
.99! the
4>/! important
3C6724.84! information
3C6724.84!
38=72C.4378! about
.?714! your
5712! wireless
L32/9/--!
detects and
8/4L72N!
/8:3278C/84! automatically
.147C.430.995! to
47! an
.8!SCII_
GU+! Database,
'.4.?.-/P! and
.8;! visualizes
:3-1.93T/-!
network environment
5712!S+*$!38=2.-4210412/!78!5712!7L8!3C6724/;!C.6-M!
your WLAN infrastructure on your own imported maps.
!
45R65
8,/#9%7:W4%;%O#9#$V,.#%&'.#%F.=9>Y#1%%
1.32. Model
7541 - Telephone Line Analyzer ( D e t e c tD3#)#+)',.I%
i o n )
G/078;!
47! the
4>/!physical
6>5-30.9!search,
-/.20>P!cable
0.?9/! and
.8;! wiring
L32380>/0N-! are
.2/! the
4>/! most
C7-4!
Second to
43C/!
078-1C38.8;!technical.
4/0>830.9M! To
)7! ensure
/8-12/! an
.8! effective
/==/043:/! and
.8;! thorough
4>7271<>!
time consuming
0.?9/!0>/0NP!4>/2/!.2/!7:/2!VW!0>/0N-!=72!/.0>!0.?9/P!2/B13238cable check, there are over 10 checks for each cable, requiring a skilled
76/2.43:/!
.8;!careful
0.2/=19!documentation.
;701C/84.4378M! T)>/!
)/9/6>78/! Line
+38/! Analyzer
*8.95T/2!
operative and
h e Telephone
627:3;/-!
07C69/4/!integrated
384/<2.4/;!suite
-134/! of
7=! tools
4779-! to
47! analyze,
.8.95T/P! inspect,
38-6/04P! and
.8;!
provides a.!complete
4/-4!
;3<34.9!telephone
4/9/6>78/! lines
938/-! (and
X.8;! other
74>/2! wiring)
L32384.6-! and
.8;! other
74>/2!
test digital
o r taps
/.:/-;276638eavesdropping devices.
45RR5
8,/#9%7:W6%;%!#+21#%3,+2-#.)%!+=..#1%%
1.33. Model
7542 - secure Document scanner ( D e t e c D3#)#+)',.I%
t i o n )
*8!
3887:.43:/!overall
7:/2.99!concept
0780/64! for
=72! handling
>.8;9383C6724.84! and
.8;! confidential
078=3;/843.9!
An innovative
;701C/84-!4>.4!1-/-!.!8/L95!;/:/976/;!-/012345A6.6/2P!L>30>!.04-!.-!.!
documents that uses a newly developed security-paper, which acts as a
C.<8/430!
-472.! medium.
C/;31CM! I&4!
1-/-! a.! special
-6/03.9! read-write
2/.;AL234/! device
;/:30/! that
4>.4!
magnetic storage
t uses
0788/04-!
9.6476M! T)>/!
;3<34.9! document-certificates
;701C/84A0/243=30.4/-! are
.2/!
connects t47!
o a.! PJ"!
C o72!
r laptop.
h e digital
.;C383-4/2/;!4>271<>!.!)21-4!"/84/2M!)>3-!-0.88/2!7==/2-!-4.4/A7=A4>/A.24!
administered through a Trust Center. This scanner offers state-of-the-art
4/0>830.9!-7914378-!=72!;701C/84!6274/04378!4>.4!.2/!?/578;!07C6.23-78P!
technical solutions for document protection that are beyond comparison,
/-6/03.995!;/:/976/;!=72!>3<>!-/012345!;/C.8;-M!%
/-6/03.995!;/:/976/;!=72!>3<>!-/012345!;/C.8;-M!
especially developed for high security demands.

CONFIDENTIAL
"#$%&'($)&*+!
"#$%&'($)&*+!!

6



!

,

elaman

Recommended Product Description
$)',.
)',.
*#+,--#./#/%01,/2+)%3#(+1'$)',.
*#+,--#./#/%01,/2+)%3#(+1'$
*#+,--#./#/%01,/2+)%3#(+1'

s

w

e

!

e!"##
p %&'()
List
!"##$%&'()

1.34. Model
7543 - LANIWLAN Checking system ( D e t e cF3#)#+)',.G%
t i o n )
45675
8,/#9%:;76%[email protected]&=>%AB#+C'.D%!E()#-%%
The LAN
)-.!
+*$!checking
/-./0123! system
4546.7! has
-84! come
/97.! a8! long
:923! way
;85! since
412/.! just
<=46! checking
/-./0123!
structured cabling.
46>=/6=>.?!
/[email protected]:123A!The
)-.! threat
6->.86! of
9B! an
82! IT
&)! related
>.:86.?! attack
8668/0! has
-84! heightened
-.13-6.2.?!
bringing w;16-!
i t h I16!
t t6-.!
h e need
o check
T systems.
h e LAN/WLAN
@>123123!
2..?! t69!
/-./0! I&)!
4546.74A! T! )-.!
+*$CD+*$!
Checking system is capable of performing checks on structured cabling
"-./0123!E546.7!14!/[email protected]:.!9B!F.>B9>7123!/-./04!92!46>=/6=>.?!/[email protected]:123!
and any
82?!
825! data
?868!present
F>.4.26! on
92! the
6-.! line.
:12.A! Its
&64! semi
4.71! automated
8=69786.?! checks
/-./04! provide
F>9G1?.!
/:.8>!12B9>786192!F>.4.26.?!12!8!F>[email protected]:.!>.F9>6A!
clear information presented in a printable report.

!

1.35. Model
7544- Video Pole Camera
( S E A R C%F!J=*AKG%
H )
456;5
8,/#9%:;77%Sometime during a8!physical
not be
to have
E97.617.!?=>123!
F-541/8:!inspection
124F./6192! it
16! is
14!296!
@.!Possible
[email protected]:.! 69!
-8G.! the
6-.!
means or time to inspect all hard to reach areas. The Video Pole Camera
7.824!9>!617.!69!124F./6!8::!-8>?!69!>.8/-!8>.84A!)-.!H1?.9!I9:.!"87.>8!
;84!
?.G.:9F.?! with
;16-! the
6-.! aim
817! o9B!
F>9G1?123! an
82! accurate
8//=>86.! search
4.8>/-! o9B!
6-.!
was developed
f providing
f the
68>3.6!:9/86192A!D16-!164!-1J>.49:=6192!/87.>8!82?!4/>..2!82?!KJB996!>.8/-!
68>3.6!:9/86192A!D16-!164!-1J>.49:=6
192!/87.>8!82?!4/>..2!82?!KJB996!>.8/-!
target location. With its hi-resolution
camera and screen and 6
16!
14!Possible
[email protected]:.! to
69! get
3.6! into
1269!areas
8>.84! a8!search
4.8>/-!mirror
71>>9>! kit
016! cannot.
/82296A! Inspect
&24F./6! drop
?>9F!
It is
/.1:1234L!
@.-12?!immovable
[email protected]:.! objects,
[email protected]>9=2?!corners,
/9>2.>4L! or
9>! 96-.>!
ceilings, behind
other ?1BB1/=:6!
difficult 69!
to
reach areas, even in dark situations with the Video Pole Camera.
>.8/-!8>.84L!.G.2!12!?8>0!416=861924!;16-!6-.!H1?.9!I9:.!"87.>8A!

!

1.36. Model
7545 - Video Wireless Detection ( D e t e c tF3#)#+)',.G%
i o n )
456L5
8,/#9%:;7;%*!
*
B846!scanning
4/822123!receiver
>./.1G.>! that
6-86! detects
?.6./64! wireless
;1>.:.44! video
G1?.9! cameras.
/87.>84A! A
*! 2.5"
MANO!
A! fast
)%)!/9:9>!+"'!?14F:854!;-86!6-.!-1??.2!/87.>8!14!:990123!86A!*!478::.>!
TFT color LCD displays what the hidden camera is looking at. A smaller
+"P!?14F:854!6-.!B>.Q=.2/5!82?!41328:!16!14!:9/0.?!92!69A!&6!/82!4/82!8::!
LCM displays the frequency and signal it is locked on to. It can scan all
8G81:[email protected]:.!G1?.9!B>.Q=.2/1.4!12!RN!4./92?4!82?!?.6./6!41328:4!84!B8>!8;85!
available video frequencies in 1 5 seconds and detect signals as far away
as 500 feet.
84!NSS!B..6A!
456:5
8,/#9%:;7L%1.37. Model
7546 - Cable Amplifier System ( D e t e c t F3#)#+)',.G%
i o n )
)-.!"[email protected]:.!*7F:1B1.>!E546.7!14!8!-13-!3812!8=?19!87F:1B1.>!=4.?!69!?.6./6!
The Cable Amplifier System is a high gain audio amplifier used to detect
82?!
1?.261B5! certain
/.>6812! types
65F.4! of
9B! surveillance
4=>G.1::82/.! devices
?.G1/.4! attached
8668/-.?! t69!
@=1:?123!
and identify
o building
;1>123L!
4=/-!
84!
6.:.F-92.!
;1>123L!
+*$!
82?!
4.>G.>!
4546.74L!
*"!
F9;.>L!
wiring, such as telephone wiring, LAN and server systems, AC power,
8:8>7!;1>.4L!.6/A!&6!F>9G1?.4!B:[email protected]:.!B.86=>.4!82?!-84!F>[email protected]!G.>5!
alarm wires, etc. It provides flexible features and has proven to be very
=4.B=:!
12!many
7825! situations.
416=861924A!This
)-14! amplifier
87F:1B1.>! is
14! quite
Q=16.! useful
=4.B=:! for
B9>! checking
/-./0123!
useful in
6.:.F-92.!
:12.4!and
82?! other
96-.>! wiring
;1>123! for
B9>! hostile
-9461:.! microphones,
71/>9F-92.4L! testing
6.46123! for
B9>!
telephone lines
-990!4;16/-!8=?19!:.8083.L!82?!?.6./6192!9B!.8G.4?>9FF123!?.G1/.4!6-86!
hook switch audio leakage, and detection of eavesdropping devices that
8>[email protected]!G9:683.4!9>!/=>>.264A!
are sensitive to bias voltages or currents.

!

!

456O5
8,/#9%:;7:%1.38. Model
7547 - Flat Panel X-ray System
)-.!
=216!
4686.J9BJ6-.! art
8>6! digital
?13168:! mobile
[email protected]:.! fB:86!
F82.:! X-ray
UJ>85! system
4546.7!
The unit i14!
s a8!state-of-the
a t panel
782=B8/6=>.?!
12!
D.46.>2!
(=>9F.A!
)-.!
B:86!
1783.!
/92G.>6.>!
[email protected]:.4!
manufactured i n Western Europe. The flat image converter enables
7825!?1BB.>.26!8FF:1/861924!12!6-.!B1.:?4!9B!4./=>165!82?!292J?.46>=/61G.J
many different applications in the fields of security and non-destructive6.46123A!%9>!(#'[email protected]!F>9G1?.4!8!48G.!9F.>[email protected]!RSS!7!
testing. For EOD use the Notebook provides a save operation by 100 m
/[email protected]:.!
9>! remote
>.796.! control.
/926>9:A!The
)-.! high
-13-! resolution
>.49:=6192! o9B!
RM,! O m
7! allows
7!
8::9;4! the
6-.!
cable or
f 127
1?.261B1/86192!
9B!
.G.2!
6-.!
478::.46!
?.681:4!
92!
UJ>85!
1783.4!
;16-!
79>.!
identification of even the smallest details on X-ray images with more
6-82!RKLSSS!3>.5!:.G.:4A!!
than 16,000 grey levels.
456R5
8,/#9%7S47%1.39. Model
4014 - G5 ! Detection system ( D e t e c t F3#)#+)',.G%
i o n )
)-14!4546.7!;84!?.G.:9F.?!84!8!/9=26.>J7.84=>.!69!?.6./6!8/61G.!VEP!
This system was developed as a counter-measure to detect active G5!
792169>123!4546.74!6-86!/>[email protected]=4!416.4A!&6!14!8!VEP!>./.1G.>L!;-1/-!
monitoring systems that create bogus sites. It is a G5! receiver, which
/9246826:5!
4/824! the
6-.! G5
VEP!
/926>9:!channels
/-822.:4! of
9B! all
8::! networks
2.6;9>04! (dual
W?=8:! band)
@82?X!
constantly scans
! control
:990123!
B9>! changes
/-823.4! in
12! the
6-.! overhead
9G.>-.8?! parameters
F8>87.6.>4! transmitted
6>8247166.?! [email protected]!
6-.!
looking for
y the
3.2=12.!
2.6;9>0A!The
)-.! G5
VEP!
'.6./6192! system
E546.7! i14!
[email protected]:.! t69!
>./9321Y.!
genuine network.
! Detection
s able
o recognize
@93=4!/.::!416.4!6-86!8>.!866.7F6123!69!7171/!8!:.3161786.!416.!B9>!164!9;2!
bogus cell sites that are attempting to mimic a legitimate site for its own
F=>F94.4A!Z4.?!B9>!F>96./[email protected]!9>!-13-!:.G.:!7..61234A%
F=>F94.4A!Z4.?!B9>!F>96./[email protected]!9>!-13-!:.G.:!7..61234A
purposes. Used for protection in embassies or high level meetings.

CONFIDENTIAL
"#$%&'($)&*+!
"#$%&'($)&*+!!

,7

ldmd!

Recommended Product Description
$)',.
)',.
*#+,--#./#/%01,/2+)%3#(+1'$)',.
*#+,--#./#/%01,/2+)%3#(+1'$
*#+,--#./#/%01,/2+)%3#(+1'

s

w

e

!

e!"##
p %&'()
List
!"##$%&'()

!

1.40. Model
1013- Night Vision Viewer%% ( I @A*%B%CADE*%F0GAH%!EI*HJK%
R & FIBER OPTIC SEARCH)
45675
8,/#9%474:%;%)%?'(',.%?'#"#1
8,/#9%474:%;%)%?'(',.%?'#"#1%%
Usually used
-./0112!
/.34!in
56!surveillance
./7835110693!operations.
:;370<5:6.=!Night
$5>[email protected]:6! Viewer
@53A37! has
?0.! a
0! dual
4/01!
role in a " s # $ team in the search for fiber optic microphones, laser and
7:13!56!0!)B"C!<30D!56!3!.3079?!E:7!E5F37!:;<59!D597:;?:63.G!10.37!064!
IR rays
o detect
&H!
702.! that
0073! almost
01D:.5D;:..5F13! t43<39A5! standard
.<064074! sweep
.A33;!
equipment.
3I/5;D36<=!
45645
8,/#9%L774%;%&,+M;0'+M'.=%N,1%E.)1
8,/#9%L774%;%&,+M;0'+M'.=%N,1%E.)1O%'.),%H9,(#/%I1#P(%%
O%'.),%H9,(#/%I1#P(%%
O%'.),%H9,(#/%I1#P(%%
@!EI*HJK%
1.41. Model
2001 - Lock-Picking for Entry
into Closed Areas (SEARCH)
:990.5:6.! wA?36!
J?36!
9077256>! o:/.A33;! there
373! m
D02!
When carrying
u t a0! sweep
a y bF3!
e occasions
h e n i5t i5.!
s
5D;:..5F13!056!0993..!F390/.3!3!4::7!5.!1:9K34!:7!3!<313;?:63!5.!
impossible to gain access because the door is locked or the telephone is
3691:.34!
56! a0!box.
F:L=!Therefore,
)?373E:73G!every
38372! sweep
.A33;! kit
K5.?:/14! include
5691/43! a0! lock1:9KM
enclosed in
;59K56>!.3<=!!
picking set.

!

!

CONFIDENTIAL
"#$%&'($)&*+!!
"#$%&'($)&*+!

8

,

! s "# INDEX
!"#$%&'()*
•••••
W • '-

. Introduction
!"!#!$%&'()*+&,(%
!#!$%&'(
!#!$%&'
()*
)*+
+&,&,(%
(%
- The
Threat
!-!#!./0!./'01&
!#!./0
!#!./
0!./'0
!./'
01&
1&
- Recommendations
!#!30+(
!#!3
0+(44
440
0%)1&,
%)1&,(
(%5
%5
!2!#!30+(440%)1&,(%5
4 - Training
Overview
7 Course
8(*'50!9:0':,0
8(*'50!
9
:0':,0;
;
!6!#!.'1,%,%7!8(*'50!9:0':,0;
!6!#!.'1,%,%7
!6!#!.'1,%,%
5 - Training
syllabuses
[email protected]*505
!7 Course
8(*'50!=>[email protected]*505
8(*'50!=>[email protected]*505
6!#!3
- 30+(440%
Recommended
A
!#!
0+(440%)
)0
0)
) Products
B'()
B'(
)*+
*+&&55
!A!#!30+(440%)0)!B'()*+&5
7 - Technical Data sheets
!!C!#!.0+/%,+1?!D1&1!=/00&5
- IP/PABX Manipulation
!E!#!$BFBGHI!J1%,K*?1&,(%
- Commercial
Quotations
!#!8(
!#!8
(44
440
0''+
+,1?!M*
,1?!M*
,1?!M*(
(&1&,
&1&,(
(%5
%5
!L!#!8(440'+,1?!M*(&1&,(%5
10!#!.0
- Terms
& Conditions
"N!#!.
"N!#!.0'45!O!8(%),&,(%5
"N
!#!.
0'45!O!8(
'45!O!8
(%),&,
%),&,(
(%5
%5
11"!#!8(
- 8(%&1
Contact
Details
""!#!
""!#!8(%&1+&!D0&1,?5
"
"!#!
"!#!
%&1+
+&!D
&!D
&!D
&!D0
0&1,?5
&1,?5
"-!#!P?141%!81&1?(
"-!#!P?141%!81&1?(75!9:0':,0;
"
-!#!P?141%!81&1?(
-!#!P?141%!81&1?(
-!#!P?141%!81&1?(7
75!9:0':,0
5!9:0':,0
5!9:0':,0;
;
12
- Haman Catalogs
Overview


lG
$m$nP
$
$m
m$
m
$
$nP
nP
E
R
M
A
N
$ECURITVsOL(

ldmd*

!

Products
!"#$%&'(

Product Description
!"#$%&')*+(&",-',#.)
-',#.)
',#.)
!"#$%&')*+(&",!"#$%&')*+(&",
!

Ref.
/+01)
/+01

Qty
2'3)
2'3

Model
4#$+5)
4#$+5

1
,!

1
,!

7501 !
-./,

lb
,:!

!

7501-2!
-./,;<

Advanced Non Linear Junction Detector !
*=>5284=!$12!+32456!07289312!'4948916!

2

1 ,!

7502-1 !
-./
! s " # search Tool Kit
)?"@!?4568A!)11B!C39!

D3!
D!

1
,!

7502-2!
-./
Advanced /Teiecomms search Tool Kit
*=>5284=!E)4B481FFG!?4568A!)11B!C39!

4!
H
H!

1
,!

7504!
-./H

4b
H:!

1
,!

.5!
.!

1
,!

7505!
-./.

5b
.:!

1
,!

7505-2
-./.;
Q6!
Q!

1 ,!

-7!
-!

1
,!

7507-01 !
-./-;/,

V8!
V!

1
,!

7508!
-./V

*=>5284=!?852!'4948916!?LG94F
Advanced Scan Detector System

W9!
W!

1
,!

7509!
-./W

TDR Multi Channel Cable Detector
)'[email protected]!"A5224B!"5:B4!'4948916

10
,/!

1
,!

7510!
-.,/

'3N395B!*=>5284=!X52=!X4B=!#G83BB1G81M4
Digital Advanced Hand Held Oscilloscope!

11
,,!

1
,!

7511 !
-.,,

Detection Receiver
'49489312!K4843>46

12
,
1
,!

7513!
-.,D

O5BB!'[email protected]!?LG94F
Wall Depth Measurement System

13 1 ,!
,D!

Description
*+(&",-',#.)
*+(&",-',#.
NLJD Non Linear Junction Detector
$+0'!$12!+32456!07289312!'4948916!

I1695:B4!J;K5L!?LG94F
Portable X

-./H!1M9312
!
7504 option ! *=>5284=!%B59!?86442!J;K5L!&F5N46
Advanced Fiat screen X

7506!
-./Q

7514-2!
-.,H;<

Thermal - Wall Scanner
)A46F5B!;!O5BB!?852246
)A46F5B!&F5N32N!P16!?76>43BB5284!*MMB3859312G!
Thermal Imaging for surveillance Applications

Locator
+185916!
#M9385B!?LG94F!91!'49489!"5F465GR!+42G!SK11F!T46G312U
#M9385B!?LG94F!91!'49489!"5
F465GR!+42G!SK11F!T46G312U
Optical System to Detect Cameras,
Lens (Room Version)

>3=41!64F194!M61:4!32GM489312
video remote probe Inspection

14
,H!

1
,!

7515!
-.,.

@56Y32N!C39;"1>469!?938Y46G!&BB7F325916
Marking Kit-Covert Stickers Illuminator

15
,.!

1
,!

7516!
-.,Q

#M9385B!?4568A!)11BY39
Optical Search Toolkit

16
,Q!

1
,!

7517-01 !
-.,-;/,

T3=41!52=!*7=31!K%!'49489312!?LG94F
Video and Audio RP Detection system

17
,-!

1
,!

7517-02!
-.,-;/<

*=>5284=!T3=41!Z!*7=31!K%!'49489312!?LG94F
Advanced Video & Audio RP Detection System!

18
,V!

1
,!

7518 oscor! #@$&!?I(")K*+!"#KK(+*)#K
OMNI SPECTRAL CORRELATOR
-.,V!1G816

19
,W!

1
,!

-.,V!1M9312
7518 option ! #F23!?M48965B!"1664B5916
Omni Spectral Correlator

20 1 ,!
!

3521 !
D.
X3NA!I1[46!\[email protected]!05FF32N!?LG94F!
High Power $ 5 % Jamming System

21

1
,!

3522!
D.<<

Room Jammer
K11F!05FF46!

22
<
1
,!

3525!
D.
"1FM7946!?8644232N!05FF46!
Computer screening Jammer

23 1 ,!

3526!
D.
*293;+5G46;@3861MA124!$13G4!05FF46
Anti-Laser-Microphone Noise Jammer

24

1
,!

3527!
D.
Advanced Counter Surveillance Jammer
*=>5284=!"172946!?76>43BB5284!05FF46

25

1
,!

7519!
-.,W

%?X!I1695:B4!?M48967F!*25BL]46
FSH Portable Spectrum Analyzer

26

1
,!

7520!
-.

^7N!'4948916
Bug Detector

27 1 ,!

7521 !
-.
(^/;X3NA!?M44=!%64_7428L!?852246!D!\X]![39A!'%
&'200-(igh Speed Frequency Scanner ) GHz with DE!

CONFIDENTIAL
"#$%&'($)&*+!!
"#$%&'($)&*+!

,

ldmd!

!

Products
!"#$%&'(

Product Description
!"#$%&')*+(&",-',#.)
-',#.)
',#.)
!"#$%&')*+(&",!"#$%&')*+(&",
28 1 1.!
,-!

7522!
/0,,

Digital scout Frequency Detector
'121345!67893!%:;<9;=7>!';3;738:

29
,?!

1
.!

7523!
/0,@

Advanced Cable Tracing System
*AB4=7;A!"4C5;!):471=2!6>D3;E!

30
@F!

1
.!

7525!
/0,0

X-ray for screening VIP Presents
GH:4>!I8:!67:;;=1=2!J&K!K:;D;=3D

31
@.!

1
.!

7527!
/0,/

Encryption Product - GSM Encryption Phones!
(=7:>L318=!K:8A973!H!M6N!(=7:>L318=!KO8=;D

32
@,!

1
.!

7530!
/[email protected]

Ultra Scan50b
P53:4!674=0FC!

33
@@!

1
.!

7539!
/[email protected]?

3D image enhancer
@'!1E42;!;=O4=7;:

34
@Q!

1
.!

7540!
/0QF

Wireless Network detector
R1:;5;DD!$;3S8:T!A;3;738:

35
@0!

1
.!

7541 !
/0Q.

);5;LO8=;!+1=;!4=45>U;:!';3;738:
Telephone Line analyzer Detector

36
@V!

1
.!

7542!
/0Q,

Secure document scanner
6;79:;!A879E;=3!D74==;:

37
@/!

1
.!

7543!
/[email protected]

+*$WR+*$!"O;7T1=2!6>D3;E
LAN/WLAN Checking System

38
@-!

1
.!

7544!
/0QQ

TSCM Search Video Pole Camera
)6"N!6;4:7O!J1A;8!K85;!"4E;:4

39
@?!

1
.!

7545!
/0Q0

Video Wireless Detection
J1A;8!R1:;5;DD!';3;7318=

40
QF!

1
.!

7546!
/0QV

"4C5;!*EL51I1;:!6>D3;E
Cable Amplifier System

41
Q.!

1
.!

7547
/0Q/!

%543!K4=;5!GH:4>!D>D3;E!
%543!K4=;
5!GH:4>!D>D3;E!
Flat Panel5!GH:4>!D>D3;E!
X-ray system

42
Q,!

1
.!

4014!
QF.Q

M6N!';3;7318=!6>D3;E
GSM Detection System

43
[email protected]!

1
.!

1013!
[email protected]

$12O3!J1D18=!T13
Night Vision kit

44
QQ!

1
.!

2001 !
,FF.

'88:!#L;=1=2!T13
Door Opening kit

!

!

CONFIDENTIAL
"#$%&'($)&*+!!
"#$%&'($)&*+!

2

,

elaman

NLJD Non-Linear Junction Detector
+,-.&+"/0,1/$23&-4/561"/&.$6$56"3

M

o

d

!

e l 7501
!"#$%&'()*

!

Non Linear Junction Detectors (NLJD) are used&1/&6:$&1/1612%&;:<7152%&7$235:&;:27$&"=&2&
in the initial physical search phase of a
+"/&,1/$23&-4/561"/&.$6$56"37&8+,-.9&23$&47$#
+"/&,1/$23&-4/561"/&.$6$56"37&8+,-.9&23$&47$#&1/&6:$&1/1612%&;:<7152%&7$235:&;:27$&"=&2&
sweep. Its unique use allows an operative to quickly and effectively scan a location for
7>$$;?&&@67&4/1A4$&47$&2%%">7&2/&";$3261B$&6"&A415C%concealed electronic components.
5"/5$2%$#&$%$563"/15&5"D;"/$/67?&
&

The Model
s a8!versatile
)-.!
/01.2!7501
345,!i 67!
9.:78;62.! third
;-6:1! harmonic
-8:<0=6>! non-linear
=0=?26=.8:! junction
@A=>;60=! detector
1.;.>;0:! which
B-6>-! detects,
1.;.>;7C!
analyzes
and
pin-points
the
location
of
suspect
electronic
devices,
whether
they
are
switched
8=82DE.7!8=1!F6=?F06=;7!;-.!20>8;60=!0G!7A7F.>;!
.2.>;:0=6>!1.96>.7C!B-.;-.:!;-.D!8:.!7B6;>-.1!
8=82DE.7!8=1!F6=?F06=;7!;-.!20>8;60=!0G!7A7F.>;!.2.>;:0=6>!1.96>.7C!B-.;-.:!;-.D!8:.!7B6;>-.1!
on or off.
0=!0:!0GGH!
!

TECHNICAL FEATURES
[email protected],&JFIEKLFM&

!

"-8==.2!selectable;
7.2.>;8I2.J! f o
G0A:!
0F.:8;6=K! frequencies
G:.LA.=>6.7! t;0!
.=7A:.!
• Channel
u r operating
o ensure
F0;.=;682!
6=;.:G.:6=K!
76K=827!
8:.!
89061.1C!
M%""!
N,4/OEC!
potential interfering signals are avoided, (FCC 915 !" z, E(P!
U
869!#z and classic 888!"z; Available in one unit for universal
QRN/OE!8=1!>28776>!QQQ/OEJ!*98628I2.!6=!0=.!A=6;!G0:!A=69.:782!
0F.:8;60=SH!)-.!G0A:!7F0;!G:.LA.=>6.7!8:.!>A7;0;8I2.!
operation). The four spot frequencies are customer selectable
T0B.:! Transmission
):8=7<67760=! t;0!
:8F612D! search
7.8:>-! a8! large
28:K.! area
8:.8! with
B6;-!
• HO6K-!
i g h Power
o rapidly
K:.8;.:!
F.=.;:8;60=J!adjustable
[email protected];8I2.! power
F0B.:! control
>0=;:02! 2U;0! l,V8;;!
greater penetration;
m W to
Wa t t
MUV8;;!0F;60=82S!
(2 Watt optional)
"0=7;8=;! power
F0B.:! transmission,
;:8=7<67760=C! as
87! opposed
0FF07.1! to
;0! Pulsed
FA27.1! operation.
0F.:8;60=H!
• Constant
M"0=;6=A0A7!
;:8=7<67760=! reduces
:.1A>.7! risk
:67W! 0G!
<6776=K! a8! threat
;-:.8;! G:0(Continuous transmission
of missing
from
6=819.:;.=;!:8F61!<09.inadvertent rapid movement of antenna head)
P=6LA.! X?B8D!
;-A0=;:02! >0=9.=6.=;2D! F28>.1! 0=! 167F28D!
• Unique
4
7>:..=!G0:!<07;!>0<<0=2D!A7.1!GA=>;60=7!
screen for most commonly used functions
(:K0=0<6>! s7B..F!
-.81! wB6;-!
6=>:.87.1! sensitivity
7.=76;696;D! reduces
:.1A>.7!
• Ergonomic
we e p head
i t h increased
7.8:>-!;6search time, $d%i gain
"6:>A28:2D!F028:6E.1!8=;.==8!6.7!:67W!
• Circularly
Polarized antenna improves reliability, and reduces risk
0G!<6776=K!8!;-:.8;!1A.!;0!6=>0::.>;!8=;.==8!F028:6E8;60=!
of missing a threat due to incorrect antenna Polarization
• QZA6>W!G6;!:.<098I2.!7<8:;!I8;;.:D!-0A7.1!6=761.!>0=;:02!<01A2.J!
u i c k fit removable smart battery housed inside control module;
F:0961.7!09.:!U?-:7!0F.:8;60=H!
provides over 2-hrs operation.
/6=6• Minimum
set-up time; extension Lengths 52-208 cm.
\0IA7;C!lightweight
26K-;B.6K-;! aluminum,
82A<6=AG6I.:K2877! and
8=1! carbon
>8:I0=! design;
1.76K=J!
• Robust,
0F.:8;60=82!B.6K-;!0=2D!UWKJ!6=!;:8=76;!>87.!4HRWKH!
operational weight only 2kg; in transit case 5.6kg.

!

.
CONFIDENTIAL
"#$%&'($)&*+!!
"#$%&'($)&*+!

1

,

ldmd!

NLJD Non-Linear Junction Detector
+,-.&+"/0,1/$23&-4/561"/&.$6$56"3

M

o

d

!

e l 7501
!"#$%&'()*

THE MODEL 7501 MAY BE USED TO IDENTIFY:
789&!:.9,&'()*&!;?9.&7:&@[email protected]















A*-./01!23!+/01!4567!
c t i v e or Live Bugs
Inactive
Bugs
&89-./01!4567!
Turned
On Bugs
)5381:!#8!4567!
Turned
Off Bugs
)5381:!#;;!4567!
Burned
Out Bugs
45381:!#5.!4567!
D'19:!4567!
e a d Bugs
Covert
or Concealed Video Cameras
"2013.!23!"28-19<1:!=/:12!"9>1397!
Microwave
Transmitters
?/[email protected]!)3987>/..137!
A1>2.1!"[email protected]:!4567!
Remote
Control or Remote Powered Bugs
Resonant
Cavity Devices
A172898.!"90/.C!'10/-17!
"28-19<1:!"1<<5<93D!B"7D!98:!EF?!)1<1GH2817!
Concealed
Cellular, PCs, and GSM Telephones
Electronic
Timers
for Hidden Bombs
(<1-.328/-!)/>137!;23!I/::18!42>J7!
WK/31<177!?/-32GH2817!
i r e e s s Microphones
I/::18!)9G1!A1-23:137!L1018!J32M18!2817N!
Hidden Tape Recorders (even broken ones)
"2013.!(9017:32GG/86!'10/-17!
Covert
Eavesdropping Devices

EQUIPMENT CONTENTS:
9C>@D!9+7&E:+79+7?B&









Control
Module
"28.32'/7G<9C!?2:5<1!
Display
Module
Antenna
Head
*8.1889!I19:!
49..13C!"H93613!
Battery
Charger
,!A1O-H93619J<1!$/?I!49..13/17!
2 Re-chargeable NiMH Batteries
(93GH2817!
Earphones
3PQ!->!(R.187/28!)5J1!
6 cm Extension Tube
Transit
Case
)3987/.!"971!

TECHNICAL DATA:
[email protected];,&.;7;B&
TRANSMITTER
7F;[email protected]&&

&

%31S518-C!39861!!
Frequency range

%253!7G2.!;31S518-/17!/8!.H1!39861!2;!TQUOUVQ!?IWX!L:1G18:18.!28!
Four spot frequencies in the range of 869-916 MHz. (dependent on
-258.3C!2;!571N!
country of use)

[email protected]!25.G5.!!
Power output

*:Y57.9J<1!,>K!.2!VK!(AB!L,!K!2G./289Adjustable 2mW to 1W ERP (2 W optional)

%/Filtering

10 section filter
VZ!71-./28!;/
CONFIDENTAL
"#$%&'($)&*+!!
"#$%&'($)&*+!

2

,

elaman

NLJD Non-Linear Junction Detector
+,-.&+"/0,1/$23&-4/561"/&.$6$56"3
Output connector 5
#-./-.!012230.14!!

RECEIVER (RX1)
7898:;87&<7=*>&

M

o

d

!

e l 7501
!"#$%&'()*

056!178!91-:;3!<0433239!01=>?!<[email protected]!!
ohm double screened c o

&

Frequency range 1 7 3DE,F!
8 -=! 1DF,G!
8 3 2 MHIJ!
H z (transmitter
%43A-320B!4>2C3!!
K.4>2<8L..34! selection
<3;30.L12! controls
012.41;4303LM34!
frequencies)
N43A-320L3Sensitivity D e t e c '3.30.L12!>.!=D,6!9Q8R!!
t i o n at -130 dBm.
P32%L;.34L2C!!
Filtering

S!<30.L12!NL;.34!!
section filter

6

Input connector
&2/-.!012230.14!!

5

RECEIVER (RX2)
7898:;87&<7=?>&

0 56!178!91-:;3!<0433239!01=>?!<[email protected]!!
ohm double screened c o

&

%43A-320B!4>2C3!!
Frequency range 2 6 0 7GS6E=GETF!HIJ!K.4>2<8L..34!<3;30.L12!012.41;- 2 7 4 8 MHz (transmitter selection controls receiver frequencies)
P32Sensitivity D e t e c '3.30.L12!>.!=D,6!9Q8R!!
t i o n at -130 dBm.
%L;.34L2C!!
Filtering

S!<30.L12!NL;.34!
section filter

6

&2/-.!012230.14!!
Input connector

5

0 56!178!91-:;3!<0433239!01=>?!<[email protected]!!
ohm double screened c o

DISPLAYS T a r g )>4C3.!4312<3U018/>4L<12!!
e t response/comparison
.:@A,[email protected]&&
)4>2<8L..34!1-./-.!/1V34!!
Transmitter output power

Q>..34B!;3M3;W!8193!<3;30.L12!KXYD!>29!XYGO!!
Battery level, mode selection (RX1 and RX2)
%43A-320B!<3;30.L12W!;!29!XGO!!
Frequency selection, signal strength (Al and R2)

!"N#R"L
9D+E7D,@&&

T4!V>B!.7-8:!012.41;!<3;30.2C3!>29!4303LM34!<3;30.L12!
T!V>B!.7-8:!012.41;!<3;30.2C3!>29!4303LM34!<3;30.L12!
way thumb control selects range and receiver selection

ANTENNA
B+E8++B&&

&

Z1;-83!-/!>29!91V2W!N43A-320B!<3;30.!>29!#$U#%%!
Volume up and down, frequency select and ON/OFF

%43A-320B!01M34>C3!!
Frequency coverage 8 6 0FS6=[G6!HIJW!DEG6=DFT6!HIJ!>29!G5F6=GES6!HIJR!
- 9 2 0 MHz, 1720-1 840 MHz and 2580-2760 MHz.

Gain
\>L2!!

6

]1;>4LJ>.L12!!
Polarization

R

dbi.
S!9:LR!!
H

XI"!XLC7.!7>29!0L40-;>4!!
C
Right hand circular

CHARGER
9FB7G87&&

&

&2/-.!M1;.>C3!!
Input voltage

100-240 VAC.
D66=GT6!Z*"R!!

"7>4CL2C!0-4432.!!
Charging current

DG668*U>[email protected];3!07>4C3!!
1200mN!uto trickle charge

"7>4C3!.L83!!
Charge time

^/!.1!DR5!71-4Up to 1.5 hours

)B/3!!
Type

HL041/4103<<14!012.41;;39W!<714.!0L40-L.!>29!.L834!
Microprocessor controlled, short circuit and timer

BATTERY
HBEE87C&&

&

)B/3!!
Type

[email protected];!83.>;!7B94L93!=!<8>4.!:>..34B!!
Nickel metal hydride - smart battery

Z1;.>C3!!
Voltage

10.8V DC/i 700 mAh.
D6RFZ!'"UDE66!8*7R!!

Test
)3
Q-L;.!L2!:>..34B!;3M3;!L29L0>.14!!
Built in battery level indicator

Run time
X-2!.L83!!

G!71-4;!1/34>.L12!!
2 hours - normal operation

!

CONFIDENTIAL
"#$%&'($)&*+!!
"#$%&'($)&*+!

"

,

e t

!

Advanced Non-Linear Junction Detector M o d
e l 7501-2
!"#$%&'()*+,
-#./01$#&2"0+340$/5&670184"0&9$8$18"5
Non Linear
of a
ts
$-.!
+/.012!Junction
34.56/-.!Detectors
'06056-27!are
120!used
4708!in
/.! the
690!Initial
/./6/1:!physical
;9<7/51:!search
701259! phase
;9170! -=!
1! sweep.
7>00;?! !I &67!
unique use
o quickly
o r concealed
4./@40!
470!allows
1::->7! an
1.!operative
-;0216/A0! t6-!
@4/5B:1.8! effectively
0==056/A0:751.! a1! location
:-516/-.! f=-2!
5-.501:08!
electronic components.
0:0562-./5!5-C;-.0.67?!
!

The Model
f
)90!
D-80:!7501-2
EFG,HI!provides
;2-A/807! the
690! means
C01.7! to
6-! detect
806056! hidden
9/880.! electronic
0:0562-./5! devices,
80A/507J! regardless
20K128:077! o
-=!
whether the device is radiating, hard wired, or
even turned on at all! Its unique design means
>906902!690!80A/50!/7!218/16/.KJ!9128!>/208J!
>906902!690!80A/50!/7!218/16/.KJ!9128!>/208J!-2!0A0.!642.08!-.!16!1::L!&67!4./@40!807/K.!C01.7!
-2!0A0.!642.08!-.!16!1::L!&67!4./@40!807/K.!C01.7!
that it is lightweight and completely portable
as it folds away into its small case.
6916!/6!/7!:/K96>0/K96!1.8!5-C;:060:6916!/6!/7!:/K96>0/K96!1.8!5-C;:060:1M:0!17!/6!=-:87!1>1!

Transmit at 9 1 5 ! " z
2nd Harmonic at 1 830!"z
3rd Harmonic at 2 7 4 5 ! " z
!

TECHNICAL FEATURES
:;<=2>D/./C4C!706H4;!6/C0J!.-!51M:07!-2!M4:BMinimum
set-up time, no cables or bulky transceiver units to carry
+/K96>0/K96J!M1:1.508!02K-.-C/5!807/K.!=-2!0170!-=!470!!
Lightweight,
balanced ergonomic design for ease of use
HN/K9!621.7C/6!;->02!=-2!21;/8:i g h transmit power for rapidly searching a large area
"/254:12:Circularly
polarized antenna reduces search time and improves reliability
'41:!912C-./5!>/69!8/752/C/.16/-.!1:K-2/69C7!C/./C/O07!=1:70!1:12C7!!
Dual
harmonic with discrimination algorithms minimizes false alarms
P61.8128!6/69!:-.K!470!6/[email protected]/5B!5912K0!=4.56/-.!!
standard type camcorder battery with long use time and quick charge function
Q/20:077!9018;9-.07!1.8!K21;9/5!8/7;:1Wireless
headphones and graphic display for simultaneous audio & visual information
1.8!3rd
S28!harmonic
912C-./5!operation
-;0216/-.!includes
/.5:4807!advanced
18A1.508! algorithms
18A1.508!
1:K-2/69C7! for
=-2! minimizing
C/./C/O/.K! false
=1:70! alarms
1:12C7!
2I.8!
n d and
17!>0::!17!:/760./.K!51;1M/:/6as well as listening capability for each harmonic
';->02!control
5-.62-:! for
=-2! locating
:-516/.K!threats;
6920167T!automatic
146-C16/5! or
-2! manual
C1.41:!control
5-.62-:! (10
U,G! mwatt
C>166! to
6-! 1,!
• Dynamic
>166V!!!
watt)
P621.750/A02! provides
;2-A/807!frequency
[email protected]/:/61.8!agility
1K/:/6146-C16/51::701259! for
=-2!
• Synthesized
to automatically
5:01.!-;0216/[email protected]/[email protected] operating frequencies (frequency range 902-928 MHz for US models and 850 MHz to
,JGGG!DNO!=-2!0Z;-26!C-80:7V!!
1,000 MHz for export models)
"/254:12J!
;-:12/O08!antenna
1.60..1! removes
20C-A07! risk
2/7B! o-=!
C/77/.K! a1! threat
692016! due
840! t6-!
/.5-22056! antenna
1.60..1!
• Circular, polarized
f missing
o incorrect
;-:12/O16/-.!
polarization
!










!

CONFIDENTIAL
"#$%&'($)&*+!!
"#$%&'($)&*+!

1

,

ldmd!

Advanced Non-Linear Junction Detector
-#./01$#&2"0+340$/5&670184"0&9$8$18"5

!

Model 7501-2
!"#$%&'()*+,

THE ORION M AY BE USED TO IDENTIFY:
:;?=2&[email protected]&A•















A*-./01!23!+/01!4567!
c t i v e or Live Bugs
Inactive
Bugs
&89-./01!4567!
Turned
On Bugs
)5381:!#8!4567!
Turned
Off Bugs
)5381:!#;;!4567!
Burned
Out Bugs
45381:!#5.!4567!
D'19:!4567!
e a d Bugs
Covert
or Concealed Video Cameras
"2013.!23!"28-19<1:!=/:12!"9>1397!
Microwave
Transmitters
?/[email protected]!)3987>/..137!
A1>2.1!"[email protected]:!4567!
Remote
Control or Remote Powered Bugs
Resonant
Cavity Devices
A172898.!"90/.C!'10/-17!
"28-19<1:!"1<<5<93D!B"7D!98:!EF?!)1<1GH2817!
Concealed
Cellular, PCs, and GSM Telephones
Electronic
Timers
for Hidden Bombs
(<1-.328/-!)/>137!;23!I/::18!42>J7!
K/31<177!?/-32GH2817!
Wireless
Microphones
I/::18!)9G1!A1-23:137!L1018!J32M18!2817N!
Hidden Tape Recorders (even broken ones)
"2013.!(9017:32GG/86!'10/-17!
Covert
Eavesdropping Devices

TECHNICAL DATA
:TRANSMITTER
:>-2C!?::<>&&
%31O518-C!498:7P!
Frequency Bands:

QQR!S!TRRU!?IV!57/86!,RR!
880 - 1005 MHz using 200
MIV!
7.1G7W! USA
XF*! versions:
0137/287P!
kHz steps.
YR,W,!S!Y,ZWQ!?IVW!%231/68!
902.2 - 927.8 MHz. Foreign
>2:1<7!
models a r931!
e a d9:[57.9J<1!
justable
between 8QQR!
8 0 a98:!
n d 1TRRU!
005
[email protected]!
?IVW!
)H1!
58/.!
/7!
9-.59<MHz. The unit i s actually
usable down
579J<1!
:[email protected]! to
.2! 850
QUR! MHz,
?IVD!
J5.!.H131!/7!TS,!:4!2;!<277!/8!31-1/013!7187/./0/.C!:51!.2!;/but there is 1-2 dB of loss in receiver sensitivity due to filter rolloff of the second harmonic.
2;;!2;!.H1!71-28:!H93>28/-W!!

Peak Power:
[email protected]!

TW\!K9..7!L1;;1-./01!39:/9.1:[email protected]!/8-<5:/86!98.1889!69/8!98:!9<1.4 Watts (effective radiated power including antenna gain and all
7C7.1>!<27717NW!!
system losses).

Power Control:
[email protected]!"28.32


]R!:4!39861!/8!,!:4!7.1G7^!B5<71:!.2!>/[email protected]!
30 dB range in 2 dB steps; Pulsed to limit average output power
to FCC max.
.2!%""!>9_W!!

RECEIVER
>&&
%31O518-C!498:7P!
Frequency Bands:
F187/./0/.CP!!
Sensitivity:
E9/8!"28.32

Gain Control:

-

F1-28:!
LTZRRS,RTR! MHz)
?IVN! or
23! third
.H/3:!(2550-3015
L,UURS]RTU! MHz)
?IVN! harmonic
H93>28/-! 2;!
Second (1700-2010
of
.3987>/.!;58:9>18.9transmit fundamental frequency.

1
T

Receiver IF BW:
A1-1/013!&%!4KP!!

3
h

"

0ST]R!:4>!;23!J2.H!I93>28/-7W!!
dBm for both Harmonics.
69/8! o2;!
.H1! unit
58/.! i/7!
18H98-1:! using
57/86! software
72;[email protected]! integration.
/8.1639./28W!
e )H1! gain
f the
s enhanced
=93/257!>2:17!2;!2G139./28!H901!
:/;;1318.!/8.1639./28!9<623/.H>7!
=93/257!>2:17!2;!2G139./28!H901!:/;;1318.!/8.1639./28!9<623/.H>7!
Various modes of operation have different integration algorithms
;23!
>9_/>5>!performance.
G13;23>98-1W!The
)H1! gain
69/8! is
/7! controlled
-28.32<<1:! JC!
for maximum
by 71../86!
setting .H1!
the
<101level of integration using the SET key.

kHz
]!MIV!!

B048&=H$5/84"0/%&I$4JK8P!!
B048&=H$5/84"0/%&I$4JK8
Unit Operational Weight:P!!3]W\!. 4 lbs (1.54 kg)

Antenna Polarization:P!!
u l a r for both transmit and receive functions.
-08$00/&L"%/54M/84"0
P!!C i r c"/3-5<93!;23!J2.H!.3987>/.!98:!31-1/01!;58-./287W!!
-08$00/&L"%/54M/84"0P!!

CONFIDENTIAL
"#$%&'($)&*+!!
"#$%&'($)&*+!

2

,

ldmd!

!

Advanced Non-Linear Junction Detector M o d
e l 7501-2
!"#$%&'()*+,
-#./01$#&2"0+340$/5&670184"0&9$8$18"5
INFRARED HEADPHONES
:2;=-9?>@2=A&&
• Headphones
can be plugged directly into main unit or plugged into the Infrared Receiver
-./01234.5!6/4!7.!189::.0!0;!;4=3!?/;4!94;=!3• Plugging
C89::;4:!headphones
2./01234.5!into
;4=3! the
=2.! main
?/;4! Unit
D4;=! turns
=9<45! off
[email protected]@! the
=2.! IR
&A! transmit
=45?;=! function
@946=;34! on
34! the
=2.! main
?/;4!
unit
94;=!!
• Plugging
C89::;4:!headphones
2./01234.5! into
;4=3! the
=2.! IR
&A!Audio
*90;3! Receiver
A.6.;B./9=3?/=;6/88>! turns
=9<45! on
34! the
=2.! IR
&A! Audio
*90;3!
Receiver
A.6.;B.E389?.!634=<38!;5!/0F95=.0!B;/!=2.!?/;4!D4;=!!
• Volume
control is adjusted via the main Unit

BATTERY SPECIFICATIONS
B-CC=(G=.<4/88>!1.!7/==.<>!!
• Externally
rechargeable standard type battery
• 7HIJ!E'"!6/?63<0.8.!$;"/0!!
. 2 VDC camcorder style NiCad
• RA94!=;?.!K!239u n time 1 hour on full charge when operating at full power. Normal usage should result
in run time hours
;4!<94!=;?.!239<5!!

BATTERY CHARGER
B-CC=-• D'9/8!7/==.<>!62/u a l battery charger with automatic operation
"2/!MN!?;49=.5!=3!K!239!B.403• Charging
time is approximately 45 minutes to 1 hour depending on battery vendor
O.P9.4=;/88>!62/• sequentially
charges both batteries

LED INDICATORS:
3=9&:29:[email protected]%8/52;4:! LED
+('! -Q! charge
62/1.40;4:! (applies
R/118;.5! t=3!
5;=9/=;34! wL2.4!
7/==./• Flashing
o t=2.!
h e situation
h e n t=L3!
w o batteries
5;?98=/4.3958>!18/6.0!;4!=2.!62/simultaneously placed in the charger)
T• Br
ight LED - fast charging
• D'/!3a r k LED - No battery or charge complete

OPTIONAL
@?C:@2-3&
V30.8!HNWKQ,!X!-;:2!13L.Model 7501-3 — High power non-linear junction detector
!

CONFIDENTIAL
"#$%&'($)&*+!!
"#$%&'($)&*+!

"

,

elaman
! s " # search Tool Kits
*+,-%+'.(/0%*112%3)4&

7

5

0

!

2 !"#$%&'()'&
series

!

MODEL 75021: SEARCH TOOL KIT
-5678%!"#$9:;%+7<=,>%*558%3?*%
Once the
o verify
f the
#567!
897!NLJD
$+:'!has
9;=>6;87?! a;!potential
@>8758A;=! threat
89B7;8! there
897B7! are
;B7! ways
C;D!
E7BAFD! the
897! status
<8;8G>F!
897!
potential threat. !" tools required to aid in the 6=;<5!>[email protected]>8758A;=!89B7;8!;B7!A56=G?7?!
classification of the potential threat are included
@>8758A;=!89B7;8H!!*==!8>>=!;A?!A5!897!
@>8758A;=!89B7;8H!!*==!8>>=!;A?!A5!897!6=;<5!>[email protected]>8758A;=!89B7;8!;B7!A56=G?7?!
within the NLJD toolkit.
CA89A5!897!$+:'!8>>=JA8H!
!
)97!
K7;B69!Toolkit
)>>=JA8! contains
6>58;A5<7=7687?! tools
8>>=8>>=F>B! verifying
E7BAFDA5M! the
897! existence
7NA<87567! of
>F! threatening
89B7;875A5M!
The #)K"L!
s $ % search
electronic surveillance
h i s toolkit,
7=768B>5A6!
?7EA678>>=JA8O!which
C9A69! comes
6>P7A5! leather
=7;897B! tool
8>>=! bag,
Q;MO! is
AG5AIG7=D!
suited
for
use
with
a
Non-Linear
Junction
Detector.
B!G<7!CA89!;!$>5R+A57;B!:G568A>5!'78768>BH!!

EQUIPMENT CONTENTS
[email protected]?B-7C*%,5C*7C*+%
S>B7<6>@7! with
CA89!built-in
QGA=8RA5!light
=AM98! and
;5?!right-angled
BAM98R;5M=7?! viewer
EA7C7B! for
F>B! inspecting
A5A5
C;==FGB5A8GB7O!
• Borescope
etc...
786T!
• WUAB7!8B;6A5M!!8B;67!PA<67==;57>Gi r e tracing system to trace miscellaneous cables
,
%=GJ7!PG=8ARP787B!F>B!87<8A5M!PA<67==;57>G5A6!?7EA67• Fluke multi-meter for testing miscellaneous cables
. and electronic devices
- for non-destructive evaluation
• Combination
stud finder and metal detector
">PQA5;8A>5!<8G?!FA5?7B!;5?!P78;=!?78768>B!F>B!5>5R?7<8BG68AE7!7E;=G;8A>5!!
,
V;PP7B!8>!7E;=G;87!897!<8;QA=A8D!>F!;!WG568A>[email protected]!
• Hammer
to evaluate the stability of a junction
under physical vibration
,
,
/
X=8B;EA>=78!=AM98!;5?!P;[email protected]!!
• Ultraviolet
light and marking pen
4
,
,
,
0
2 3
, for
[email protected]@><7!geared
M7;B7?!screwdriver.
<6B7C?BAE7BH!Provides
YB>EA?7<6B7C?BAE7B! function
FG568A>5! as
;C7==! as
;

?BA==!
F>B!
• Multi-purpose
G<7!CA89!Q>B7<6>@7!!
use with borescope
LA<67==;57>G8>>[email protected]=A7B6G887B=7;897BP;5! (multi-purpose
[[email protected]@><7! tool),
8>>=\O! inspection
A55!
• Miscellaneous
i r e cutters,
PABB>BB!C;==mirrors, measuring tape, flashlight, drill bits for walls, etc

,

CONFIDENTIAL
"#$%&'($)&*+!!
"#$%&'($)&*+!

,

1

,

elaman
! s " # search Tool Kits
*+,-%+'.(/0%*112%3)4&

7

5

0

!

2 !"#$%&'()'&
series

MODEL 7502-2: ADVANCED$%ELECO&S SEARCH TOOL KIT
-5678%!"#$9$:%;6*787,5-+%+7;?,@%*558%3A*%

Designed as a ! s " # team toolkit, this modelh a s all the necessary tools needed to carry out a
'-./01-2!3.!3!)4"5!6-37!6889:/6;!6
?!6889.!1--2-2!68!=3>>[email protected]!3!
thorough Physical
n d cable
6<8>[email protected]/=39!a 312!
=3B9-! search.
.-3>=! "8163/1/10! the
6B3./=! toolset
6889.-6! required
>[email protected]/>-2! for
E8>! telephone
6-9-A<81-!
sweeps, such
utim % t %& , Butt
.F--A.;!
[email protected]=3.! a3!Digital
'/0/639! $
[email protected]/7-6->;!
[email protected]! Set
4-6!
4-6!
6! and
312!structured
.6>@[email protected]>-2! cabling
=3B9/10! tools,
6889.;! It
/6! compliments
=87A9/7-16.!
more advanced cable tools, such as the Line Amplifier or '($700. )*
the electro mechanical
78>-!32H31=-2!=3B9-!6889.;[email protected]=!8>!"I5JKKC!
!*99!68!7-=<31/=39!
6889.!/1!6!68!A>8H/2-!3!F/2-!>310-!8E!3/2.!E8>!=87A9-6/[email protected]!
tools in this set have been put together to provide a wide range of aids for completing a full
A./=39!
.-3>[email protected]=3.! work
F8>:!lights,
9/0<6.;!mirrors,
7/>>8>.;!opening
8A-1/10! tools
6889.! and
312! even
-H-1! a3! drill
2>/99! to
68! aHow
3998F! @.-!
Physicalsearch,
use 8E!
of
borescopes or videoscopes.
B8>-.=8A-.!8>!H/2-8.=8A-.C!
!

The Advanced
s+,!# Datasafe®
Test
)*2H31=-2!Search
4-3>=)889:/6! includes
/[email protected]! the
6>-=877-12-2!!)4LKM!
'36343E-N!Linemans
+/1-731O.! )-.6!
4-6;!%[email protected]:-!PJJ!B3=:9/6!6>@-Q>7.!'55!F/6310-!312!'-S396!'STUK:Q,!
Set, Fluke 177 backlit t r u e
V-3H?Q'@6?!"8>29-..!LWUX!'>/99W'>/H->!Y/6!F/6V-3H?Q'@6?!"8>29-..!LWUX!'>/99W'>/H->!Y/6!F/[email protected]/7-!B366->/-.C!).36/9-!:/6!/.!
6-12-2!>@1Q6/7-!B366->/-.C!).36/9-!:/6!/.!
Heavy-Duty Cordless 3/8 Drill/Driver Kit with extended
run-time batteries. The versatile kit is
2-./01-2!E8>!=816>3=68>.!F<8!2-7312!667-16C!
designed for contractors who demand the highest quality and most complete tool assortment.
Z.-!6=H/=-!312!/1.6399!H8/=-!312!2363!=/>[email protected]/6.;!A<81-!.F/6=Use the Advanced Search Tookit to service and instaH voice and data circuits, phone switches,
2363=87!1-6F8>:.;[email protected]>.;!6-9-A<81-!A3=:-6.!312!H/>[email protected]?!31?610!/16-0>36/10!H8/=-!312!
datacom networks, computers, telephone packets and virtuaHy anything integrating voice and
2363C!S>[email protected]>3A!F/>-!6->7/139.;!6>3=-!312!6>[email protected]<886!F/>-.;[email protected]=data. Wrap and unwrap wire terminals, trace and troubleshoot wires, punch 110 and 66 blocks
[email protected][email protected]!F/>-.!6<>[email protected] puH wires through conduit.
!

)312!6889!.-9-=6/81!/[email protected]!"-7-16-R!PKKKQ\!.=>-F2>/H->!312!=<311-9!98=:!A9/->.;!
The name-brand tool selection includes Cementex 1000-V screwdriver and channe o c k Pliers,
Y9-/1!
[email protected]>/A!screwdrivers
.=>-F2>/H->.! and
312!nut-drivers,
[email protected]>/H->.;! a3! Fluke
%[email protected]:-! voltage
H89630-! detector,
2-6-=68>;! fluorescent
[email protected]>-.=-16! work
F8>:!
Klein cushion-grip
9/0<6!
F/6-R6-1./81!cord,
=8>2;!leather
9-36! gloves,
098H-.;!stapler
.63A9->! and
312! stapes
.63A9-.! for
E8>! RG-59
]^Q_T! and
312! RG-6
]^Q[! coax,
=83R;! [email protected]!
light with
pus
more.
78>-C!!
!

#@>!>[email protected]!B93=:[email protected]>-.!>-/1E8>=-2!=81.6>@=6/81;!-R6>3Q93>0-!=8>1->.;!.6--9!
Our robust black Polyethylene case features reinforced construction, extra-large corners, steel
.A>/10Q9832-2!
<3129-.!and
312!quarter-turn
[email protected]>6->[email protected]>1!latches.
936=)/.! the
6819?! hard
<3>2!case
=3.-! kit
:/6! with
F/63! built-in
[email protected]/96Q/1!
spring-loaded handles
'55!
[email protected]=)4I",PQT[! /.! PJCJ_X! R! P`C_X! R! TX! a/1./2-! 2/7-1./81.bC! (7A6?!
DMM pouch.
35.6
KU,c`JP!=3.-!39.8!73?!B-!8>2->-2!.-A3>36-9?C!!
082)(471 case also may be ordered separately.
!

CONFIDENTIAL
"#$%&'($)&*+!!
"#$%&'($)&*+!

2

,

ldmd!

Portable X-ray
system
2&32
&3
24-$5
4-$5
+",-./%$&01,.2&324-$5
+",-./%$&01,.2
+",-./%$&01,.

M

o

d

!

l
7504
!"#$%&'()*

e

One of
5 #$ is
#-.!
/0! the
12.!biggest
3455.61! threats
127.816! in
4-!")9":!
46! the
12.! miniaturization
;4-481<74=814/-! of
;4-481<74=814/-!
/0! technology
1.>2-/?/[email protected]! allowing
8??/A4-5! very
[email protected]! small
6;8??!
eavesdropping devices to be well concealed. It is!4;D.7814B.!8??!41.;6!A24>2!>8--/1!3.!>?.87.C!
imperative all items which cannot be cleared
.8B.6C7/DD4-5!C.B4>.6!1/!3.!A.??!>/->.8?.CE!&1!46
.8B.6C7/DD4-5!C.B4>.6!1/!3.!A.??!>/->.8?.CE!&1!46!4;D.7814B.!8??!41.;6!A24>2!>8--/1!3.!>?.87.C!
safe with the naked-eye be passed through the Portable X
[email protected]!3.!D866.C!127/<52!12.!H/[email protected][email protected];E!
The digital X-ray system allows an operative so see inside any item allowing a non destructive
)[email protected][email protected];!8??/A6!8-!/D.7814B.!6/[email protected]!41.;!8??/A4-5!8!-/-!C.617<>14B.!
detailed physical inspection.
[email protected]>8?!4-6D.>14/-E!
The digital
be
)2.!
C45418?!X-ray
[email protected]! system
[email protected];!is
46!easily
[email protected]! set
6.1! up
8-C!deployed
C.D?/@.C! in
4-! minutes
;4-<1.6! by
[email protected]! one
/-.! person
D.76/-! and
8-C! can
>8-! 3.!
configured to suit different environments.
>/-045<7.C!1/!6<41!C400.7.-1!.-B47/-;.-16E!!
&1!>/;.6!A412!8!>2/4>.!/[email protected]!6/<7>.6L!8CM<6183?.!.KD/6<7.!6.114-56L!C400.7.-1!64=.!&"N6!8-C!
It comes with a choice of x-ray sources, adjustable exposure settings, different size ICUs and
286!3/12!A47.?.66!8-C!J#O!>8D834?414.6E!
has both wireless and ROV capabilities.

FEATURES
6789:;73&
• s e6.87>2!8-C!.K8;4-.!6<6D4>4/<6!/3M.>16!/-!12.!6D/1!
a r c h and examine suspicious objects on the spot
D/[email protected]!1/!6.1!• portable, easy to set up and use in 2 minutes
8-C!A241.L!D6./?/7L!D6.8-C!
• i m4;[email protected]!4->?F!
a g e analysis includes zoom, reverse black and
white, pseudo-color, pseudo 3D and
;.86<7.L!62/A!578C4.-16L!7/1814/-L!C4618->.L!>/-17861!.-28->.;.-1!8-C!;/7.!
measure, show gradients, rotation, distance, contrast enhancement and more
• i m4;85.!D74-1!8-C!.;84?!!
a g e print and email
• a r87>24B.!4-!.K>.66!/0!QPLRRR!4;85.6!/-!H"!/7!"'!
c h i v e in excess of 32,000 images on PC or CD
• annotation
tools
8--/1814/-!1//?6!!
0?!C818386.!;8-85.;.-1!1//?6!!
• f u l l database management tools

X-RAY STANDARD CONFIGURATION:
01;88;>&[email protected]=6AB:;[email protected]=C&









[email protected]!S.-.781/7!
Lightweight
X
+8D1/D!H"!
L a p t o p PC
&;85.!"8D1<7.!N-41!T&"NU!
Im
a g e Capture Unit (ICU)
)78-6D/71814/-!"86.!
Transportation
Case
VR!:.1.7!"83?.!'75 0 Meter Cable Drum and Optional Wireless Control
s9D87.!S.-.781/[email protected]!
p a r e Generator Battery
[email protected]!"2875.7!
B a t t e r y Charger
Instruction
Manual
&-617<>14/-!:8-<8?!

CONFIDENTIAL
"#$%&'($)&*+!!
"#$%&'($)&*+!

1

,

elaman

Portable X-ray
system
2&32
&3
24-$5
4-$5
+",-./%$&01,.2&324-$5
+",-./%$&01,.2
+",-./%$&01,.

M

o

d

!

l
7504
!"#$%&'()*

e

MODEL 7504 IMAGE CAPTURE UNIT ('CU)
!6789&'()*&:!;<8&=;+>[email protected]&?A:>&B:=?C&
!

8 X 10" (20.32 X 25.40 cm
standard Image Area 6!7!89:!;,9<=,!7!,>[email protected]!!
-./01/21!&3/45!*25/!
Optional: l O x 13"
#A.BC0/DE!89!F!8=:!!
custom sizes available
@GH.C3!HBI5H!/J/BD/KD5!!

!
!

"/352/!)LA5!!
Camera Type

MB4N!O52PC23/[email protected]!""'!!
High Performance CCD

Horizontai
MC2BIC0./D!
Resolution
Q5HCDG.BC0!!

625 TV lines
R,>!)S!DB05H!!

SB15C!-B40/DT$CBH5!!
Video signal/Noise

Better than 40 dB
U5..52!.N/0!?9!1U!!

X-RAY GENERATOR
[email protected];D&<[email protected];>[email protected]&
7Q,99E!,!V4!WB.N!K/..52L!
!R200: 2 kg with battery

#A.BC0!,!!
Option 2

8>9VS!3/FB3G3!50524L!
150kV maximum energy
!

Penetration: 1 5 m m steel
O505.2/.BC0E!8>!33!H.55D!!

!

><>!V4!WB.N!K/..52L!!
5.5 kg with battery

!
!
!

7Y2/L!JB5W!CP!/[email protected]!ADG4!.2/0H3B..52
X-ray view of a remote control plug transmitter

X5LKC/[email protected]@.C2!WB.N!
Keyboard connector with
@[email protected]/D51!DC4452!
concealed logger

7Y2/[email protected]/[email protected]/.C2!/01!A50!WB.N!B0KGBD.!.2/0H3B..52
X-ray view of calculator and pen with inbuilt transmitter
CONFIDENTIAL
"#$%&'($)&*+!!
"#$%&'($)&*+!

2

,

elaman

Advanced Flat screen X-ray
Imager
89-:/4
89:/4
/4
*+,-)./+012-'03.4//)
564-7
564-7 89-:

7

5

!

0 !"#$
4 %&
option
%&'(%)
%
&'(%)
'(%)

!

The Model 7504 option — more coverage, more rugged and more reliable than the rest!
)-.!/01.2!3456!07890:!;!<0=.!>[email protected]!<[email protected]:1!<[email protected][email protected]:!8-.!=.E8F!
Mode! 7504
/01.2!
3456! option
07890:! is
9E!an
@:!innovative
9::[email protected]?.! flat
[email protected]! panel
[email protected]:.2! x-ray
[email protected]! imager
9G=0CEK! The
)-.! unique
C:9LC.! flat
[email protected]! panel
[email protected]:.2!
design gives high resolution images, in the most confined
spaces, from different orientations
1.E9A:!A9?.E!-9A-!=.E02C890:!9>0:G9:[email protected]>.EB!G=01.E9A:!A9?.E!-9A-!=.E02C890:!90:G9:[email protected]>.EB!G=0and with even greater coverage (25 " 33 cm).
@:1!M98-!.?.:[email protected]=!>[email protected]!NO4!H!PP!>Mode! 7504 option
was specifically
designed for
security and
law .:G0=>.enforcement 7=0G.EE90:@2E!
professionals
/01.2!3456!
07890:[email protected]!
E7.>9G9>@22J!1.E9A:.1!
G0=!E.>C=98J!
@:[email protected]!
and is
@:1!
9E!flatter,
[email protected]=B!safer,
[email protected]=B!stronger
E8=0:A.=! and
@:1!less
2.EE! expensive
.H7.:E9?.! than
[email protected]:! many
08-.=! fragile
[email protected]! flat
[email protected]! panel
[email protected]:.2! units.
C:98EK! It
&8!
C8929R.E!
@22! t8-.!
[email protected]=.E! o0G!
8-.! Model
/01.2! 7504
3456! image
97=0>.EE9:A! software
[email protected]=.! t80!
7=01C>.! high
-9A-!
utilizes all
h e features
f the
o produce
=.E02C890:!
[email protected]! images.
99E!available
@[email protected]@D2.! as
@E! [email protected]! complete
>0<72.8.! x-ray
[email protected]! system
EJE8.E9:A2.! flat
[email protected]! panel
[email protected]:.2!
resolution x-ray
t is
r [email protected]! single
[email protected]!!
upgrade.
!

X

!

!
[email protected]!reasons
[email protected]:E! why
M-J! to
80! invert
9:?.=8! or
0=! to
80!upgrade
[email protected]! your
J0C=! old
021!conventional
>0:?.:890:@2! x-ray
[email protected]! unit
C:98! to
80! Model
/01.2!
Some great
3456!M.1A.!
7504 wedge
• T9A-!U.E02C890:!&High Resolution Images V8929R.E!([email protected] Elaman's powerful imaging software
• %[email protected]=!
Hatter
[email protected]:[email protected]!E29<0:?.:890:@2!C:98E!
5ubstantiall! slimmer than conventional units
[email protected]=!
safer
[email protected][email protected]>-!80!ECE7.>8!0DX.>8E!
No re-approach to suspect objects
• S8=0:A.=!
$0!<[email protected]:[email protected]!>0<70:.:8E!
Stronger
No mirrors, and fewer fragile components
• %@E8.=!
Faster
[email protected][email protected][email protected][email protected]>-B!:0!
High quality images straight!80!7>[email protected][email protected]>-B!:0!
to pc. No reapproach, no
E>@::9:AB!:0!1.?.2079:A!=.LC9=.1!
scanning, no developing required
• 45Y!<0=.!>[email protected]!
O4!H!PP!>O4!H!PP!>O4!H!PP!><[email protected]!EJE8.50% more coverage
25 " 33 cm (10 " 13). Complete
x-ray system G98E!9:[email protected]!E9:A2.!
fits in a single
case
>@E.!
• /0=.!=CAA.1!9:!8-.!G9.21!
More rugged in the field S7.>9G9>@22J!1.E9A:.1!G0=![029>[email protected]:1!(#'[email protected]:E!
Specifically designed for Police and EOD operations
• +.EE!.H7.:E9?.!
$0!G920:EC0<70:.:8E!
Less expensive
No film, no consumables, fewer fragile components
• /[email protected]!
More versatile
)=9I19=.>890:@2K!VE.!C7=9A-8!0=!E291.!9:!G=0Tb
!
)-.!/01.2!3456!07890:[email protected][email protected]@[email protected][email protected]!>0<[email protected][email protected]:[email protected]!E02C890:[email protected]:1\[email protected][email protected]:[email protected]!
The Model 7504 option is available as a complete flat panel x-ray solution and/or as an upgrade
80!]021.:[email protected][email protected]!EJE8.C==.:82J!CE9:A^!
to Golden portable x-ray systems currently using:

!

• C"0E82J![[email protected]=091!%92.EE0=E!!!
o s t l y Polaroid Film or Image Processors
"0:?.:890:@2!""'!9• Conventional
CCD imaging Boxes

)-.!/01.2!3456!07890:!9:[email protected]!M98-!([email protected]!-9A-!=.E02C890:!
The Model 7504 option integrates with Elaman's imaging software to produce high resolution
[email protected]!9x-ray images.
!

CONFIDENTIAL
"#$%&'($)&*+!!
"#$%&'($)&*+!

1

,

ldmd"

Advanced Flat screen X-ray
Imager
89-:/4
89:/4
/4
*+,-)./+012-'03.4//)
564-7
564-7 89-:

7

0
DIMENSIONS:
;8<=>38?>[email protected]

5

!

0 !"#$
4 %&
option
%&'(%)
%
&'(%)
'(%)

25.4 ! 33 cm (10" ! 13)
,678!9!::!;-!<=>?!9!=:[email protected]!

Imaging Areas:
&-./01/!*23.45!
(a) D e '3ABC!p t h (bottom):
(b) D e'3ABC!BEA!EG!A.13H5!!
p t h top of Panel:
(c) D e '3ABC!.B!JE-3J!.23.!p t h at domed area (above screening area):
Width:
L0JBC5!!

2.9cm (1.11
,7F!;-!<[email protected]!
3.7 cm (1 .45')
:7I!;-!<[email protected]!
11.4 cm (4.4")
==78!;-!<[email protected]!
34.4cm (13.5)
:878!;-!<=:[email protected]!

M30/CB5!!
Height:

93.2 cm (36.6)
F:7,!;-!
OH3.43!1EB3!.HH!J0-3140E14!.23!.AA2E90-.B3!
Please note all dimensions are approximate

Wall
(C)

Images sent immediately to pc
from the Rat panel- no scanning
required

X-ray
ray Imager
Imager

(
PC control unit

Suspect device
X Ray generator

Side view

Front view

!

!
!

CONFIDENTIAL
"#$%&'($)&*+!!
"#$%&'($)&*+!

,2

ldmd!

!

Model 7505
!"#$%&'()(

Thermal Wall scanner
*+$,-.%&/.%%&01.22$,

A!physical
of a
ll
*
*!
-./01234!Inspection
150-627185! of
89! a3!target
73:;67! location
48237185! is
10! the
7.6! most
<807! time
71<6! consuming
2850=<15;! part
-3:7! 89!
3! sweep.
0>66-?! !A*44!
surfaces and objects must be inspected. I n order to perform a quick and thorough search the
0=:[email protected]!8AB6270!<[email protected]?!!&5!8:@6:!78!-6:98:Model 7505
o help
[email protected]!
FGHG! has
.30! been
A665!developed
@[email protected]! t78!
.64-! locate
482376! concealed
[email protected]! eavesdropping
[email protected]:8--15;! devices.
@6I1260?! A
*!
concealed device will emit a heat signature easily
spotted by the Thermal Inspection system.
[email protected][email protected]!>144!6<17!3!.637!01;537=:6!630
[email protected][email protected]!>144!6<17!3!.637!01;537=:6!63014/[email protected]!A/!7.6!).6:<34!&50-627185!J/076!
14/[email protected]!A/!7.6!).6:<34!&50-627185!J/076!
!

Visual Image T h e*+$,-.%&[email protected]$
r m a l Image
=<9>.%&[email protected]$&

The Mode!
5 0 5 i 10!
s a35!
n ultra-compact
).6!
[email protected]! 7FGHG!
=47:3K28infrared C""'!
C D camera,
h i c h provides
159:3:[email protected]!
23<6:3L! w>.12.!
-:[email protected]!
[email protected]@[email protected]!0=-6:A!1<3;6!C=3417/L!>.146!
advanced and superb image quality, while
8996:15;!
-8:73A1417/! and
[email protected]!exceptional
6M26-718534! cost
2807!
offering portability
-6:98:<3526?!N623=06!17!10!I6:/!0<[email protected]!
performance. Because it is very small and
41;.7>61;.7L!
7.6!optional
8-718534!battery-powered
A3776:/K-8>6:[email protected]!
lightweight, the
23<6:3!
235! be
A6!used
[email protected]!in
15!very
I6:/! narrow
53::8>! and
[email protected]!
camera can
@19912=47!
78!reach
:632.!places.
-43260?!Furthermore,
%=:7.6:<8:6L! i17!
difficult to
t
3448>0!1<3;15;!>.146!>34D15;?!).6!0/076allows imaging while walking. The system
28<60!
>17.!a3!number
5=89! options,
8-71850L!e.g.
6?;?!an
35!
comes with
+"'[email protected]/!
>.12.! 235! A6! :6<[email protected]! 9:8LCD
7.6!23<6:[email protected]!3!<6<8:/!23:@!0487!
the camera itself and a memory card slot
98:!9146!078:3;6?!!
for file storage.

Video Camera
=
USAGE
30456&
).6!
@676270! "Hotspots"
OP870-870Q!
The [email protected]!
o d e l 7FGHG!
5 0 5 detects
C=12D4/!
[email protected]!reliably.
:6413A4/?!"Hotspots"
OP870-870Q!are
3:6! very
I6:/!
quickly and
0<344!
>3:3:630!generated
;656:[email protected]! by
A/! bugging
A=;;15;!
small warm
0=:I61443526!
surveillance e q 6C=1-<657!
u i p m e n t u [email protected]!
e d f o98:!
r
[email protected]:8--15;L!
[email protected]! i 15!
>3440L!
eavesdropping, o89765!
f t e n placed
n walls,
261415;0!8:!9=:517=:6?!!
ceilings or furniture.
*5/!
2.35;6! i 15!
07:=27=:6! o89!
Any change
n t 7.6!
h e h.637!
e a t structure
f
8AB6270!
235!
A6!
@[email protected]!
A/!
=015;!
7.6!
objects can b e detected b y using t h e
Model 7505.
[email protected]!FGHG?!

49+:,.;&
Ashtray

49+:,.;&*,.29-Ashtray Transmitter

FEATURES
764*3860&

28• UR47:3
l t r a !compact
IA-camera kit system
• Various
accessories
T3:18=0!3226008:160!
'1;1734!U8817.!946M1A46!8-71234!
• Digital
zoom function with flexible optical
8AB6271I6!-6:98:<3526!
objective performance
%146K078:3;[email protected]!7.6!23<6:3!=015;!7.6!
• File-storage
inside the camera using the
8-718534!V"E"&*[email protected]:1I6!
optional PCMCIA drive
"3<6:3! p r-:87627185!
• Camera
o t e c t i o n a g3;31507!
a i n s t e n65I1:85<657!
vironment
1594=65260!A/!=015;!35!8-718534!0=173A46!23I6:!
influences by using an optional suitable caver
• R5-232
l i n e c o2857:84!
n t r o l w >17.!
i t h c o28<<[email protected]!
mmand
SJKWXW! o n854156!
software
0897>3:6!
2848:! L+"'[email protected]/!
>17.! WGY! 7:=6K2848:!
• T)%)!
F T color
CD
@10-43/K1576;:[email protected]!
2857:84!
A=77850L! optional
8-718534!
display-integrated control buttons,
cable extension
23A46!6M7650185!
&576;:[email protected]!485;K4196!076:415;!2:/828846:!>17.!>.10-6:15;!:=5!
• Integrated
long-life sterling cryocooler with whispering run
'1;1734!1576:93215;!28::[email protected];!>17.!7.6!V"E"&*L!V"&[email protected]!'STRSNJ!V"K2855627185!
• Digital
interfacing corresponding with the PCMCIA, PCI and DRVUR" PC-connection

CONFIDENTIAL
"#$%&'($)&*+!!
"#$%&'($)&*+!

,

ldmd$

Thermal Wall scanner
*+$,-.%&/.%%&01.22$,

M

o

!"#IFI#$%I&N
034567658*69:0&
Measuring range
-./012345!2/45.!

d

e

!

l
7505
!"#$%&'()(

Range 1
6/45.!7!

%2&to 100iC 0 48=9!:;!7,90 to 120i C
8,9!:;!799
Range 2
6/45.!,!

0 to 250iC
9!:;!,>9
Range ! (option)
6/[email protected];A:3;4B!

100 to 800iC 2 0 ,99!:;!,9990 to 2000iC
799!:;!C99
Range 4 (option)
6/[email protected];A:3;4B!

200 to 2000iC
,99!:;!,999
to 500iC
9!:;!>99
0

D!

Resolution
6.0;E1:3;4!

9F9G0.06iC (at 30iC 60Hz) --- range 1

Accuracy
*KK12/KL!!

M,C or 2 % of reading

QA.K:2/E!2/45.!!
Spectral range

C!:;!7=
R!
R!
8to l4iJm

%;K10345!2/45.!!
Focusing range

?9!KR!:;!34O343:L!
30 cm to infinity

Field of view
%3.EP!;O!S3.T!!

,7FU21.7 ( " ) # 16.4i(V)

Frame time
%2/R.!:3R.!!

60 frames /sec
G9!O2/R.0!X0.K!

)Y.2R/E!3R/5.!A3V.E0!!
Thermal image pixels

?,[email protected]!V!,[email protected]!A3V.E0!
320 (H) # 240 (V) pixels

ND resolution
*X'!2.0;E1:3;4!!

14 bits
7=!Z3:0!

-./012345!O14K:3;40!
Measuring functions

Run/Freeze
614X%2..I.!

Interval measurement
&4:.2S/E!R./012.R.4:!!

6.K;2P345!;4!R.R;2L!K/2P![!,!:;!?G99!0.K!34:.2S/E!
6.K;2P345!;4!
Recording on R.R;2L!K/2P![!,!:;!?G99!0.K!34:.2S/E!
memory card : 2 to 3600 sec interval
)2355.2!O14K:3;4!
Trigger function

Emissive correction
(R3003S.!K;22.K:3;4!!

9F79!:;[email protected]/:!9F97!0:.AB!
0.10 to 1.00 (at 0.01 step)

Q:;2/5.!P.S3K.!!
Storage device

";RA/K:!OE/0Y!R.R;2L!K/2P!O;2[!
Compact flash memory card for:

!

)Y.2R/E!3R/5.!34!Q!&)!;2!\-]!O3E.!O;2R/:!
Thermal image in 5 IT or BMP file format

!

W303ZE.!3R/5.!34!Q!&)!;2!^]!(!_!O3E.!O;2R/:!
Visible image in 5 IT or JP E G file format

-;S3.!2.K;2P345!
Movie recording

6./EJ:3R.!R.R;2L![!7GG=!3R/[email protected]/VF!G9HIB!
Real-time memory: 1664 images (max. 60Hz)

W3P.;!0354/E!;1:A1:!
Video signal output

$)Q!"X]*+!K;RA;03:.!S3P.;!0354/E`!Q!JS3P.;!
N'5 C/PAL composite video signal, S -video

Interface
&4:.2O/K.!!

&(!(!(!7?a=`!6!Q!J,?,"!
IEEE 1394, R 5 -232(

#A.2/:345!:.RAXY1R3P3:L!
Operating temp/humidity

87>!:;!>9Dl 5 to 50iC , 90% R H or les s (not condensed)

Q:;2/5.!:.RAFXY1R3P3:L!!
Storage temp/humidity

8=9!:;!U9e40 to 70iC , 90% R H or les s (not condensed)

];T.2!01AAEL!!
Power supply

*"!/P/A:;2![!799W!:;!,=9W`!'"!UF,[email protected];R34/EB!
AC adaptor: 100V to 240V, DC 7.2V (nominal)

];T.2!K;401RA:3;4!
Power consumption

*AA2;[email protected]:LAB!
Approx. 6W (typ)

Shock and vibration
QY;Kc!/4P!S3Z2/:3;4!

,a=RX0.K,[email protected]&(!"G99GCJ,J,UB`!,aF=RX0.K,[email protected]&(!"G99GCJ,JGB!
294m/sec2 (I ) C60068-2-27), 29.4m/sec2 (I ) C60068-2-6)

(4S32;4R.4:/E!A2;:.K:3;4!
Environmental protection

&]!>[email protected]&(!"G9>,aB!
lp 54 (IE C60529)

Dimensions
'3R.403;40!

*AA2;[email protected][email protected][email protected]'[email protected]!A2;d.K:3;4B!
Approx. 108 (W) # 113 (") # 189 (D) mm (excluding projection)

b.35Y:!
Weight

*AA2;[email protected]!Z/::.2L!/4P!+"'B!
Approx. 1 .3kg (excluding battery and LCD)

!

*AA2;[email protected]!Z/::.2L!/4P!+"'B!
Approx. 1 .6kg (including battery and LCD)

standard accessories
Q:/4P/2P!/KK.00;23.0!!

*"!
/P/A:;2`! battery
Z/::.2L! pack
Z/::.2L!
A/Kc! (2pcs
@,AK0! ),
B`! battery
Z/::.2L! charger,
! KY/25.2`! compact
K;RA/K:!
AC adaptor,
OE/0Y!R.R;2L!K/2P`!523P!Z.E:`!4.Kc!0!:2/A`!E.40!K/A!
flash memory card, grid belt, neck s trap, lens cap

!

CONFIDENTIAL
"#$%&'($)&*+!!
"#$%&'($)&*+!

2

,

ldmd$

!

Thermal Imaging
for surveillance Applications
7505-2
!"#$%&'()(*+
,-$./0%&1/02342&5".&67.8$3%%049$&:;;%390<3"4=&
234
342
2&5".&67.8$3%%049$&:;;
&5".&67.8$3%%049$&:
;;%390<3"4=&
%390<3"4=& Model
,-$./0%&1/02
,-$./0%&1/0
HANDHELD IMAGER FOR LAW ENFORCEMENT
>:[email protected]>[email protected]&1!:CAD&EFD&B:G&A?EFDHA!A?,&
TraditionaHy, thermal imaging is used by law [email protected][email protected];!.3/!;[email protected];1!18.9;B!!
enforcement helicopters and specialist teams.
)-./01023.4456!178-9.4!09.:03:!0;[email protected][email protected];!.3/!;[email protected];1!18.9;B!!
)-./01023.4456!178-9.4!09.:03:!0;!!
The Model
s a.! cost
)78!
C2/84!7502-2
DEFGHG! has
7.;! been
=883!identified
0/8310?08/! a.;!
@2;1! effective
[email protected]!
solution for all law enforcement operations and has been well
;24<1023!?2-!.44!4.>[email protected]!2A8-.1023;!.3/!7.;!=883!>844!
received by various Police Forces worldwide after trials within
[email protected]/!=5!I.-022-4/>0/8!.?18-!1-0.4;!>01703!
!KL6!%0-8.-9;!.3/!2178-!18.9;B!
su, Firearms and other teams.
)
)KL6!%0-8.-9;!.3/!2178-!18.9;B!

!





surveillance
K!)K"C!#A8-.1023;!
s " # Operations
[email protected]!Recently
used vehicle detection

!

!

!

THE IMAGER UNIT
,>A&1!:CAD&I?1,&
:4&
344"80<38$& handheld
-04#-$%#& t h3/02$.&
An innovative
ermal im
ager t h
a t o"55$.=&
ffers
"7<=<04#342&
3/02342&performance,
;$.5"./049$J& together
K35%$L3M3%3outstanding imaging
and ease of use at minimal cost.
04#&$0=$&"5&7=$&004#&$0=$&"5&7=$&0
This handheld unit delivers
)70;!7.3/784/!<301!/840I8-;!
.??2-/.=48!
178-9.4! n30:71!
affordable thermal
ight
I0;023!
9.35! practical
[email protected]@.4!
vision f?2-!
o r many
law enforcement uses.
4.>[email protected]!
!

Technical details
,$9-4390%$<03%=&&&
+.-:[email protected]!/0;A4.5!
• Large
clear display
K09A48!2A8-.1023!
• Simple
operation
N80:7;!O• Weighs
just .75kg
• L+2>8;[email protected];1!70:7!/8?0301023!09.:8-!23!178!9.-P81!
o w e s t cost high definition imager on the market
• 1,EFQ!9!09.:8!-.3:8!
50+ m image range
&9.:8!;12-.:8!12!K'[email protected]/!
• Im
age storage to SD card
)89A8-.1• Temperature
measurement ideal for hydroponics
,RF!S!,GF!09.:8!
• 1 6 0 * 120 image
!

P."8$4&,$9-4"%"2N!
P."8$4&,$9-4"%"2N
Proven Technology
)[email protected]:5!>01703!170;!
The technology within this
small unit
;9.44!
<301! has
7.;! been
=883! used
in
i
n
d
u
s
t
r
i
a
l
a
n
d
03!
03/.3/!
@[email protected]!
[email protected];!
commercial applications
for over a decade.
?2-!2I8-!.!/[email protected]/8B
?2-!2I8-!.!/[email protected]/8B&!

D042$&"5&";<3"4=&04#&099$==".3$=&
Range of options and accessories
• C!".-!.3/!/8;[email protected]:8-;!
a r and desk chargers
• U!L301!
n i t w >017!
i t h h i 70:78-!
g h e r i m09.:8!
a g e u pd a t i n g s p;A88/!
e e d ( 3TUE!
5
?-.98;V;[email protected]/W!
fram
• U!L301!>017!1>[email protected]!178!09.:8!-.3:8!TGEFQ!9W!!
n i t with twice the image range (250+ m)
!
!

CONFIDENTIAL
"#$%&'($)&*+!!
"#$%&'($)&*+!

,

elaman

!

Thermal Imaging
for surveillance Applications
7505-2
!"#$%&'()(*+
,-$./0%&1/02342&5".&67.8$3%%049$&:;;%390<3"4=&
234
342
2&5".&67.8$3%%049$&:;;
&5".&67.8$3%%049$&:
;;%390<3"4=&
%390<3"4=& Model
,-$./0%&1/02
,-$./0%&1/0
URV!ILL"N#! APPLICATIONS
6>[email protected]:CDA&:EEB1D:,1FC6&

!
!
!
Detects people in total darkness and 0%%"I=&9"8$.allows covert distance surveillance
G$G$G$
!

• Covert
Surveillance
"-./01!230./455678/!
9-741-047:!-;!6004.6560130/• Monitoring
of arrivals and departures
9-741-047:!-;!->/7!60/6• Monitoring
of open areas
26;/0!>60?• Safer
parks initiatives
&7!=60?7/<0-.47:!.6536C5/!
&7!=60?7/<//F!47!G/0-!54:A1!8-7=414-70-.47:!.6536C5/!
In darkness, thermal imaging gives the ability to "see"
in zero light conditions proving valuable
47!B67D!<413614-7in many situations.
SurveiHance features Include
230./455678/!;/6130/
!








HI4:A!0/4M/5!4B6:/!
i g h resolution 160x120 pixel image
+60:/!85/60!<80//7!
Large
clear screen
A*31-!A-1<>-1!1068?/0!N!3;35!;-0!A4:A54:A147:!>/->5/!!
u t o hotspot tracker — useful for highlighting people
2/5/816C5/!8-5-0!>65/11/Selectable
color palettes
'4:4165!M,!G--B!!
Digital
x2 zoom
#>14-765!<80//7!0/./71!54:A1!/B4<<4-7O0/;5/814-7!4B6:/!<1-06:/!1-!2'!860=!
#>14-765!<80//7!0/./71!54:A1!/B4
<<4-7O0/;5/814-7!4B6:/!<1-06:/!1-!2'!860=!
Optional
screen shade to prevent light emission/reflection
image storage to SD card

:4&3/;".<04:4&3/;".<04An important tool for "sweeping" buildings
%-0!
7-7P65/0147:!bug
C3:!detection,
=/1/[email protected]!the
1A/! unit
3741! provides
>0-.4=/>0-.4=/B/6<30/B/71! -;!
<30;68/! temperatures
1/B>/06130/67=!
For non-alerting
of surface
.4<4C5/!47=48614-7!-;!400/:3560414/visible indication of irregularities.
QA/0/!
54<1/747:!device/bug
=/.48/OC3:! i 4R-0?47:@! i41!
B6D! alter
651/0! the
1A/! temperature
1/B>/06130/! o-;!
1A/! adjacent
6=S68/71!
Where a6!listening
s working,
t may
f the
material/wall.
B61/0465OR655H!
!

• T)A4/06130/!=4;;/0/78/!R455!C/!-1F!!
h i s temperature difference will be shown as a "hot spot"

'3047:!
A-3!search,
[email protected]!the
1A/! unit
3741! can
867! be
C/! used
3=! at
61! arm's
60BT5/7:1A! to
1-! scan
<867! cupboards,
83>C-60==4;;48351! 1-!
During a6!house
to
0/68A!>568/reach places, lofts and hatches, etc.

• A*!>48130/!4picture is taken first, then unit is withdrawn so the image can be looked at before the
-;;48/0!/71/068/!!
officer enters the confined space
%40/60B/0614-7Firearms teams have successfully been using this unit during recent exercises and operations.

SCOPE OF DELIVERY
6DFEA&FM&[email protected]?N&
The unit comes with
,-$&743,-$&743•





"6B/06!67=!0/8A60:/6C5/!C611/0D!
Camera
and rechargeable battery
WQ04<1!<106>!
r i s t strap
"600D!86!
Carry
case
"A60:/0!
Charger
software
on CD
2-;1R60/!-7!"'!
2'!9/B-0D!860=O2'!B/B-0D!860=!0/6=/0!
S D Memory card/SD memory card reader

CONFIDENTIAL
"#$%&'($)&*+!!
"#$%&'($)&*+!

2

,

ldmd!

Locator
+",-."/&

M

o

d

e

!

l !"#$%&'()*
7506

LOCATOR RADIO MICROPHONE DETECTOR
+012304&42560&!61407809:&5:3:1304&&
THE RE NEAR FIELD COMPONENT
38:&4;&9:24&;6:+5&10!709:93&&
The Model
)-.!
/01.2!7506
3456! was
789!developed
1.:.20;.1! for
<0=! counter
>[email protected]=! electronic
.2.>[email protected]>! surveiHance.
.2.>[email protected]>!
9?=:[email protected]>.C! Its
&A9! primary
;=BD8=E! requirement
[email protected]!
was to
789!
A0! be
G.!able
8G2.! to
A0!covertly
>0:.=A2E! detect
1.A.>A! clandestine
>[email protected]@.! Radio
H81B0! Microphones
/B>=0;[email protected]! that
A-8A! could
>0?21! effectively
.<AB:.2E! be
G.!
used by
?9.1!
GE!both
G0A-!non-experienced
@[email protected];[email protected]>.1!and
[email protected]!experienced
.J;[email protected]>.1!counter
>[email protected]=! measure
D.89?=.! personneL
;[email protected]@.2C!Its
&A9! performance
;.=<[email protected]>.!
therefore had to be Independent of the localRE
RH%[email protected]:[email protected]@[email protected][email protected]!;=.:B0?9!
E environment, a domain where many previous
A-.=.<[email protected];[email protected]@A!082!
A-.=.<[email protected];[email protected]@A!082!H%[email protected]:[email protected]@[email protected][email protected]!;=.:B0?9!
instruments failed.
[email protected][email protected]!<8B2.1C!
The result
H " field
)-.!
=.9?2A! is
B9!Model
/01.2!7506,
3456K!which
7-B>-! is
B9! a8! differential
1B<[email protected]! "LMN!
1.A.>[email protected]! system,
9E9A.DK! has
-89!
A-.!<[email protected]!9;.>B[email protected]!!
the foHowing specifications:
!

TECHNICAL
3:189612+&&
%[email protected]>[email protected]!!
Frequency Range

Q4!/[email protected][email protected]!
25 MHz - 4 GHz and beyond

'.A.>[email protected]!>8;8GB2BAB.9!
Detection capabilities

*22!AE;.9!0=0;[email protected][email protected]>[email protected]!LUD8=AN!G?O9K!9?>-!89!
All types of Radio Microphone including "smart" bugs, such as
<[email protected]>E!-0;;[email protected][email protected]!9;=.81!9;.>A=?DC!
frequency hopping and spread spectrum.

*[email protected]@O!!
Audible Warning

U#$*[email protected][email protected]!D01.9K!:B8!>209.1!-.81;[email protected]!
SONAR or Listen (demodulation) modes, via closed headphones.

[email protected]@O!!
Visual Warning

%[email protected]!7BA-!1B=.>[email protected]!Field strength with direction finding read out

&
PHYSICAL
78<=612+&&
[email protected]!
-.21! with
7BA-!an
[email protected]!antenna
[email protected]@@8! system
9E9A.D!mounted
[email protected]! on
[email protected]! a8! telescopic
A.2.9>0;B>! boom.
G00DC! The
)-.! antenna
[email protected]@@8! head
-.81! is
B9!
Hand held
1.A8>-8G2.!<[email protected]!8!>?9A0D!<[email protected]
1.A8>-8G2.!<[email protected]!8!>?9A0D!<[email protected]!>89.C!&A!B9!9?;;2B.1!7BA-!-BO-!F?82BAE!>209.1!
detachable for easy storage in a custom foam-tined!>89.C!&A!B9!9?;;2B.1!7BA-!-BO-!F?82BAE!>209.1!
case. It is supplied with high quality closed
-.81;[email protected]
headphones. !
!
!
!

CONFIDENTIAL
"#$%&'($)&*+!!
"#$%&'($)&*+!

1

,

elaman

!

O-./01%&2
Optical
ptical
system
to Detect Cameras, Lenses! M o!"#$%&'()'*)+
d e l 7507-01
,-./01%&234.$5&."&6$.$0.&715$8149&:$;4$4
./01%&2
./01%&23
34.$5&."&6$.$0.&715$8149&:$;4$4
4.$5&."&6$.$0.&715$8149&:$;4$4
,,
The Model
o quickly
)-.!
/01.2!7507-01
345365,!camera
789.:8! detector
1.;.7;0:! is
<=! a8! small
=9822! device,
1.><7.?! which
@-<7-! enables
.A8B2.=! you
C0D! t;0!
ED<7F2C! and
8A1!
effectively detect hidden cameras.
.GG.7;<>.2C!1.;.7;!-<11.A!789.:8=H!
When sweeping
I-.A!
[email protected];-.!designated
1.=J:.9<=.=! (study,
L=;D1C?!living
2<>:009?! office
0GG<7.! etc.)
.;7HM! with
@;-.! device,
1.><7.?!
keep in
F..J!
9;-8;!a8!pin-hole
J789.:8! is
<=!always
[email protected]=! aimed
8<9.1! at
8;! a
8! certain
7.:;8N0A.?! a8! bed,
B.1?! a8! table
;8B2.! etc.,
.;7H?!
where it is easier to observe people. stay in
these zones when sweeping the room with the
@-.:.!.!J.0J2.H!O;8C!
@-.:.!.!J.0J2.H!O;8C!device.
1.><7.H!!
Cameras may be fixed not only to the walls or ceiling, but into the interior of some objects like
"89.:8=!98C!B.!G
7207F=?!289J=?!G7207F=?!289J=?!G<2.=!G0:!107D9.A;=?!=07F.;[email protected], lamps, fire and safety sensors, files
for documents, sockets, switches etc.
Several cameras
f one
O.>.:82!
789.:8=! may
98C! be
B.!installed,
;-8;! is
<=! why
@-C! after
8G;.:! detection
1.;.7;<0A! o0G!
0A.! camera,
789.:8?! continue
70A;;0!
[email protected]!;-.!:[email protected]<7.!sweep the room with the device in different directions.
)-.!B.=;!0J.:8;The best operating distance when sweeping a room is 2-4 m.
I-.A!
[email protected]=D:G87.=!and
8A1!objects
0BQ.7;=! with
@;-.! device,
1.><7.?!gently
K.A;2C! 90>.!
;-.! observation
0B=.:>8;<0A!zone
N0A.! DJ!
When sweeping
move the
up
and down.
[email protected]!
I-.A!
8A!area
8:.8! with
@:.G2.7;=D:G87.=! (mirrors,
L9J02<=-.1! furniture
GD:A.;7HM?! always
[email protected]=!
When inspecting
J0=C0D:=.2G! so
=0! that
;-8;! there
;-.:.! is
<=! no
A0! direct
1:.G2.7;<0A! between
B.;@..A! you
C0D! and
8A1! the
;-.! mirrored
9=D:G87.H!
position yourself
)-<[email protected]<22!=;0J!;-.!1This will stop the direct back-reflection of laser emission and light in the eye-piece.
!
!
!

CONFIDENTIAL
"#$%&'($)&*+!!
"#$%&'($)&*+!

1

,

elaman

Advanced scan Detector System
+#,-./$#&0/-.&1$2$/2"3&0452$6
452$6
52$6
+#,-./$#&0/-.&1$2$/2"3&04
+#,-./$#&0/-.&1$2$/2"3&0

M

o

!

e!"#$%&'()*
l
7508

d

D7089:;&
!" RI #$ I % N
1
17089:;&
The Advanced
)-.!
*/0123./!scan
4312!Detector
'.5.3567! System,
4895.:;!Mode!
<6/.=! 7508,
>[email protected];! is
B9! uniquely
C2BDC.=8! different
/BEE.7.25! from
E76:! all
1==! other
65-.7! RE
F%!
Detection Systems.
with the
'.5.35B62!
4895.:9G!It
&5! is
B9!an
12!advanced
1/0123./!system
9895.:! which
H-B3-! uses
C9.9! spectrum
9I.357C:! analyzer
121=8J.7! HB5-!
5-.! latest
=15.95!
software technologies to provide accurate results. It uses a twin antenna system, placing one
96E5H17.!5.3-26=6KB.9!56!I760B/.!133C715.!7.9C=59G!&5!C9.9!1!5HB2!125.221!9895.:;!I=13B2K!62.!
antenna outside
to 9-6H!
show all
125.221!
6C59B/.!the
5-.!target
517K.5! location
=6315B62!and
12/!one
62.!inside.
B29B/.G!Using
L9B2K! the
5-.! software
96E5H17.! it
B5! is
B9! able
1M=.! 56!
1==!
9C9IB3B6C9!
57129:B99B629! which
H-B3-! are
17.! stronger
95762K.7! in
B2! the
5-.! target
517K.5! location
=6315B62! than
5-12! outside.
6C59B/.G! This
)-B9! is
B9! a1!
suspicious transmissions
95762K!B2/B31567!6E!1!57129:B55B2K!.10.9/76IIB2K!/.0B3.G!
strong indicator of a transmitting eavesdropping device.

USAGE
[email protected]&
)6/18N9!
1/0123./!bugs
MCK9! can
312! use
C9.! digital-burst
/BKB51=OMC795! transmission,
57129:B99B62;!including
B23=C/B2K! l=6H!
I6H.7;! making
:1PB2K! iB5!
Today's advanced
o w power,
t
.Q57.:.=8!/BEEB3C=5!56!/.5.35!HB5-!9512/17/!
.Q57.:.=8!/BEEB3C=5!56!/.5.35!HB5-!9512/17/!9I.357C:!121=8J.79G!)-.!<6/.=!>[email protected]!36:I17.9!5-.!
9I.357C:!121=8J.79G!)-.!<6/.=!>[email protected]!36:I17.9!5-.!
extremely difficult to detect with standard spectrum analyzers. The Model 7508 compares the
F%!
135B0B5B.9!inside
B29B/.!a1!danger
/12K.7! area
17.1! with
HB5-! the
5-.! spectrum
9I.357C:!outside.
6C59B/.G! By
R8! using
C9B2K! the
5-.! software
96E5H17.! options
6I5B629!
RE activities
"62=B2."!I699BMB=B58!56!/.5.35!1==!PB2/9!6E!2.H.7!F%!MCK9;!1=96!S=6H!I6H.7!/.0B3.9T;!
5-.7.!B9!12!
there is an "online"
possibility to detect all kinds of newer RE bugs, also "low power devices",
MC795O!67!9I7.1/!9I.357C:O57129:B99B629G!
burst- or spread spectrum-transmissions.

FEATURES
A7+970&
Measurements
possible between 9 kHz and 26.5 GHz
4HB53-1M=.!B237.19.!6E!B2IC5!I6H.7!
Switchable
increase of input power
&2IC59!12/!6C5IC59!E67!0B/.6!9BK21=9!HB5-!R$"!3622.35679!
Inputs
and outputs for video signals with BNC connectors
XZZ!)%)O'B9I=18!
6" TFT
4:1==.95!9I.357C:!121=8J.7!6E!B59!PB2/!
Smallest
spectrum analyzer of its kind
Practical
shoulder belt
[7135B31=!9-6C=/.7!M.=5!
FCMM.7!I765.35B629!
• Rubber
protections
#I5B621=!differential
/BEE.7.25B1=!spectrum
9I.357C:!analyzing
121=8JB2K! software
96E5H17.! with
HB5-! additional
1//B5B621=! antenna
125.221! and
12/! switching
9HB53-B2K!
• Optional
hardware
-17/H17.!
/BEE.7.25B1=! software
96E5H17.! uCI!
5-.! 7508
>[email protected]! enables
.21M=.9! W\O-6C7!
/.5.35B62! 12/! =6315B62! 6E! 128!
• T)-.!
h e differential
p the
24
57129:B55.7]9!71/B6!9C70.B==123.!.17I-62.!
transmitter's radio surveillance earphone








CONFIDENTIAL
"#$%&'($)&*+!!
"#$%&'($)&*+!

1

,

elaman

Advanced scan Detector System
+#,-./$#&0/-.&1$2$/2"3&0452$6
452$6
52$6
+#,-./$#&0/-.&1$2$/2"3&04
+#,-./$#&0/-.&1$2$/2"3&0

M

o

!

e!"#$%&'()*
l
7508

d

TECHNICAL DATA
789:;<9+=&1+7+&
Basic Unit
>-5?/&@.?2&&
Frequency range:
%-./0.123!-415.6!!

9 kHz to 26.5 GHz
7!89:!;[email protected]:!!

Resolution bandwidths: I!89:!;1kHz to 3 MHz
A.B!

5 MHz in Function zs
?!K9:!D1!%012;D<1!LM!!

Phase noise:
NH4B.!1
-100 dBc/Hz to zu ) GHz
OIPP!FQ2R9:!;
Noise floor down to:
$
-145 dBm at 100 Hz RBW
OIT?!FQU!4;!IPP!9:!AQV!!

)-428D15!5.1.-4;Tracking generator:

2.2 GHz
,>,[email protected]:!!

#0;W0;!C.X.C6!!
Outputlevel:

-31 to 0 dBm in 1 dB S.
OJI!;!!

&1W0;!C.X.C6!!
Input level:

+ 27 dBm
Y!,Z!FQU!!

M;storage media:

2 PCMCIA
,!N"K"&*OMC
Power:
N
- 230 V Netzteil
O!,JP![!$.;:;.DC!!

!

- Akku
O!*880ON428!\U4]>!I^?!H_!!

!

- 12 V DC
O!I,![!'"!!

!

!"#I!N
AB7GD;H!#W;D<1!,=6!!
with Option 26:

100 Hz und 300 Hz
IPP!9:!01F!JPP!9:!!

GD;H!BGD;2H.FO<1!W-.!4UWCDSD.-!GD;H!4!54D1!with switched-on pre amplifier with a gain of 2 5 d $
GD;H!#W;D<1!ZT6!!
with Option 74:

2.7 GHz
,>[email protected]:!!

!
!
!"R:

1 # 1 . 4 z 9 1 MHZ
-$%.37 dBn' i O d B / J a n / 1 7
!REE:-40,0 dBm & ' ' : % dB 1 7 : 2 4
lB

4291

!i(z

fieldstrength
outside
R,

.____...

e

, .
CE:101.4157 MHz S p A N : 2 0 0 .
FEW:3 ki-4: V $ W : ) % i

fieldstrength
inside

•"

1')

.

.

!

CONFIDENTIAL
"#$%&'($)&*+!!
"#$%&'($)&*+!

,2

ldmd%

TDR Multi-Channel Cable Detector!
+,-&!.%/0123455$%&246%$&,$/$7/"8

M

o

d

!

e!"#$%&'()*
l 7509

The TDR
s # $ test
)-.!
)'/!is
01!one
23.! of
24! the
5-.! most
6215! valuable
789:8;9.! ")5.15!! instruments
5.15
0315>:6.351! available.
878098;9.?! This
)-01! equipment
[email protected]:0A6.35! is
01!
capable of detecting many wiretap methods that are undetectable by conventional telephone
B8A8;9.!24!C.5.B503D!683E!F0>.58A!6.5-2C1!5-85!8>.!:3C.5.B58;9.!;E!B237.3502389!5.9.A-23.!
analyzers, meters or other instrumentation.
8389EG.>1H!6.5.>1!2>!25-.>!0315>:6.3585023?!!
The TDR is designed to reveal all wire irregularities (impedance mismatches) by displaying the
)-.!)'/!01!C.10D3.C!52!>.7.89!899!F0>.!0>>.D:98>050.1!I06A.C83B.!601685B-.1J!;E!C01A98E03D!5-.!
characteristic signatures and distances to each wire
irregularity. Without a TDR, the presence
B-8>8B5.>0150B!10D385:>.1!83C!C01583B.1!52!.8B-!
F0>.!0>>.D:98>05E?!K05-2:5!8!)'/H!5-.!A>.1.3B.!
B-8>8B5.>0150B!10D385:>.1!83C!C01583B.1!52!.8B-!F0>.!0>>.D:98>05E?!K05-2:5!8!)'/H!5-.!A>.1.3B.!
and location of all wire irregularities cannot be pinpointed,
and therefore will not be physically
83C!92B85023!24!899!F0>.!0>>.D:98>050.1!B83325!;.!
A03A2035.CH!83C!5-.>.42>.!F099!325!;.!A-E10B899E!
83C!92B85023!24!899!F0>.!0>>.D:98>050.1!B83325!;.!A03A2035.CH!83C!5-.>.42>.!F099!325!;.!A-E10B899E!
inspected. This can also establish possible previous wiretap activity, or modifications intended
031A.B5.C?!)-01!B83!8912!.158;901-!A2110;9.!A>.702:1!F0>.58A!8B50705EH!2>!62C040B850231!035.3C.C!
42>!
4:5:>.!use.
:1.?!since
<03B.! many
683E! wiretap
F0>.58A! operations
2A.>850231! are
8>.! fairly
480>9E! short-lived,
1-2>5L907.CH! this
5-01! information
0342>685023! can
B83! be
;.!
for future
.M5>.6.9E!06A2>5835?!K05-2:5!8!)'/H!5-.!)extremely important. Without a TDR, the TSCM technician would be unable to detect hidden
A8>899.9!
;>0CD.!taps,
58A1H!split/resplit
1A905N>.1A905! inductive
03C:B507.! wiretaps,
F0>.58A1H!mini-taps
F0>.58A1H!
6030L58A1! or
2>! other
25-.>! forms
42>61! of
24! clandestine
B983C.1503.!
parallel bridge
5.9.A-23.!903.!62C040B850231?!
telephone line modifications.

USAGE
9:;<=&
)-.!)'/[email protected]:0BO9EH!184.9E!83C!>.908;9E!92B85.!5-.!42992F03D!B8;9.!C.48:951P!!
The TDR can quickly, safely and reliably locate the following cable defaults:












&3C:B507.!903.!58A!
Inductive
line tap
"8A8B0507.!903.!58A!
Capacitive
line tap
.1A905!
Split/resplit
Disconnections
'01B233.B50231!
&99.D89!F0>.!58AA03D!
Illegal
wire tapping
S5!B0>B:051!
h o r t circuits
*95.>85023!24!06A.C83B.!
Alteration
of impedance
"-83D.!24!A80>1!
Change of pairs
Return
loss
/.5:>3!9211!
&35.>605503D!48:951!
Intermitting
faults

FEATURES
>=;+9-=:&

).151!;25-!5F015.C!A80>!83C!B28M089!B8;9.1!
• Te
s t s both twisted pair and coaxial cables
02>!48:95!92B85023!03!83E!03C:15>E!83C!83E!8AA90B85023!
• Superior
fault location in any industry and any application
A:91.! width
F0C5-! in
03!coaxial
B28M089! mode
62C.! locates
92B85.1! small,
16899H! often
245.3! :31:1A.B5.CH!
48:951!
• Sub-nanosecond
unsuspected, faults
5-85!8>.!B921.!52D.5-.>!
that are close together
/*$Q(LR+S85023!;E!B2
/*$Q(LR+S85023!;E!B26;0303D!8!1A.B040B!A:91.!F0C5-H!7.>50B89!
6;0303D!8!1A.B040B!A:91.!F0C5-H!7.>50B89!
• RANGE-PLUS
simplifies keypad operation by combining
a specific pulse width, vertical
D803H!83C!B8;9.!9.3D5-!
gain, and cable length
• L+07.!F87.42>6!5.1503D!
i v e waveform testing
&35.>6055.35! Fault
%8:95! Detection
'.5.B5023!(IFD)
I&%'J! mode
62C.! detects
C.5.B51! and
C.5.B51!
83C! displays
C01A98E1! intermittent
035.>6055.35! faults
48:951! and
83C!
• Intermittent
8992F1!
5-.!
2A.>852>!
52!
6830A:985.!
83C!
>.
>.A2105023!
A2105023!
5-.!
F87.42>6!
F05-2:5!
844.B503D!
5-.!
allows the operator to manipulate and reposition the waveform without affecting the
IFD function
&%'!4:3B5023!
• N$201.!4095.>1!.9060385.!:3F835.C!F87.42>6!3201.!
o i s e filters eliminate unwanted waveform noise
/:DD.CH!F.85-.>A>224!A8BO8D03D!
• Rugged,
weatherproof packaging
R2>58;9.H!B26A8B5H!90D-5F.0D-5
• Portable, compact, lightweight!

TECHNICAL DATA
[email protected];B&,;+;&
=.81:>.6.35!>83D.P!!
Measurement range:

1

0

,T!6!52!,U?V!W6!!
m to 19.4 Km

R:91.!F0C5-!1E66.5>0B89P!!
Pulse width symmetrical:

X31H!XY31H!,TT31H!,61H!Z61!!
2ns, 25ns, 1 COns, 1 ms, ! ms

Pulse width coaxial:
R:91.!F0C5-!B28M089P!!

T?UH!YH!XYH!,TTH!YTT!31!!
0.9, 5, 25, 100, 500 ns

R>.B01023H!1E66.5>0B89P!!
Precision, symmetrical:

[NL!T?,Y6![!T?T,!\!7?!=K!!
+1- 0.15m + 0.01 % Y. MW

CONFIDENTIAL
"#$%&'($)&*+!!
"#$%&'($)&*+!

1

,

ldmd&

TDR Multi-Channel Cable Detector!
+,-&!.%/0123455$%&246%$&,$/$7/"8

M

o

d

!

e!"#$%&'()*
l 7509

Precision, coaxial:
-./0121345!03671689!!

+1- 0.!"m
!"m + 0.01 % v. MW
:;[email protected]!:!=>=A!B!C>!DE!!

Max. resolution:
D67>!./238FG1349!!

0.1 m a t v / 2
=>[email protected]!6G!C;,!!

Handling:
H64I814J9!!

One function per button
#4/!KF40G134!L/.!MFGG34!!

v12 adapting:
C;,!6I6LG14J9!!

r i m s from 48 to 148
@;@[email protected]!NO!G3!ANO!!

Adapting:
*I6LG14J9!!

various
C6.13F2!!

Waveform storage, standard:
E6C/[email protected]!2G3.6J/5!2G64I6.I9!

8 waveforms
O!P6C/[email protected]!!

Waveform storage, optional:
E6C/[email protected]!2G3.6J/5!3LG134689!!

32 waveforms
?,!P6C/[email protected]!!

&4LFG!L.3G/0G1349!!
Input protection:

400 volts
r o m D'"!
C tG3!
o 4N==!
00 H
z and
N==!
C38G2! (AC
Q*"! +:! DC)
'"R! [email protected]!
HS!
64I!
decreases to 10 volts at 1 MHz
I/0./62/2!G3!A=!C38G2!6G!A!DHS!!

T/.168!&;#!L3.G9!!
serial I/O port:

R5
UT
'12L86V9!!
Display:

?,=!7!,[email protected]!81WF1I!0.V2G68!I12L86V!Q+"'R!P1GX!
320 # 240 dot matrix liquid crystal display (LCD) with
"%+!M60Y81JXG14J!
CFL backlighting

Power source:
-3P/.!23F.0/9!!

14G/.4685!./0X6.J/6M8/!Z>,!410Y/[email protected]/G68!XVI.1I/!
internal, rechargeable 7.2 nickel metal hydride

"X6.J14J!23F.0/9!!
Charging source:

external 12 VAC, 1. "$
/7G/.468!A,![*"5!A>?!*!!

#L/[email protected]/9!!
Operating time:

\]!X!034G14F3F2!P1GX3FG!M60Y81JXG!!
>6 h continuous without backlight

#L/.6G14J!G/@L/.6GF./9!!
Operating temperature:

32 CIF (0°C) to 122 CIF (50°%)
?,!I%!Q=^"R!G3!A,,!I%!Q_=^"R!!

)VL1068!G/@L/.6GF./9!!
Typical temperature:

5 dF (-15°C) to 140 dF ( a r c )
_!I%!Q
TG3.6J/!G/@L/.6GF./9!!
storage temperature:

-4 dF (-20°%) to 140 dF ( a r c )

[email protected]!!
Humidity:

`[email protected]>!./86G1C/[email protected]!434!034I/4214J!
95 % max. relative humidity non condensing

Dimensions (W x D x H):
'[email protected]/421342!QE!7!'!7!HR9!!

9.75 in # 5 in # 10.5 in/247.6 mm # 127 mm # 267
`>Z_!14!7!_!14!7!A=>_!14;,NZ>][email protected]@!7!A,[email protected]@!7!,]Z!
mm
@@!!

E/1JXG9!!
Weight:

]!8M!Q,>Z!YJR!!
6 lb (2.7 kg)

!
-

!
!
!
!
!
!

-

'

-

(6C/2I.3LL14J!I/C10/!8306G/I!64I!I12G640/!
(6C/2I.3LL14J!I/C10/!83
06G/I!64I!I12G640/!
Eavesdropping device located
and distance

CONFIDENTIAL
"#$%&'($)&*+!!
"#$%&'($)&*+!

2

,

ldmd#

!

Digital
Advanced Handheld Oscilloscope
e l 7510
+,-,./%&0#1/23$#&4/2#5$%#&673,%%"73"8$
-,./%&0#1/23$#&4/2#5$%#&673,%%"73"
,./%&0#1/23$#&4/2#5$%#&673,%%"73"
,./%&0#1/23$#&4/2#5$%#&673,%%"73"8
8$
$ M o d!"#$%&'()*
+,+,
D9:;<=>[email protected]&
!" RI #$ I % N
+
+9:;<=>[email protected]&
The Model
i t h oscilloscope
)-.!
/01.2! 7510
34,5!Includes
678291.:! a;!multifunctional
<92=6>978=607;2! measurement
:@:=.A6=-!
0:86220:80B.! and
;71!
miHimeter facilities.
t has
<6226>;8626=6.:C!Furthermore,
%9?=-.?<0?.D! i6=!
-;:! a;! built-in
E962=F67!paperless
E962=F67!
B;B.?2.::! writer.
A?6=.?C! The
)-.! rechargeable
?.8-;?G.;E2.! NiMH
$6/HF
battery packs
f 4J! hours
o bE.!
e
E;[email protected]!
B;8I:!guarantee
G9;?;7=..! a;!usage
9:;G.! o0>!
-09?:! (AC-independent)
K*"F671.B.71.7=L! work
A0?I! and
;71! are
;?.! able
;E2.! t=0!
recharged within
?.8-;?G.1!
A6=-67! 4J! hours.
-09?:C!With
M6=-! its
6=:!several
:.N.?;2!automatic
;9=0B0A.?! saving
:;N67G! possibilities,
B0::6E626=6.:D! the
=-.! Model
/01.2!
7510 can last all day.
34,5!8;7!2;:=!;22!1;@C!!

USAGE
A:0B9&

I__. $

)-.!
/01.2!7510
34,5! is
6:!an
;7!important
6=002! to
=0! handle
-;712.! all
;22! the
=-.! different
16>>.?.7=!
The Model
basic measurements for
E;:68!0?!









!)"!K).2.80<<9768;=607!7.=A0?I:L!
" (Telecommunication networks)
D'"!K';=;!80<<9768;=607!7.=A0?I:L!
C (Data communication networks)
A*"O!K*88.::!807=?02!:@:=.C 5 (Access control systems)
F%'O!K%6?.!1.=.8=607!:@:=.D 5 (Fire detection systems)
&'O!K&7=?9:607!1.=.8=607!:@:=.1D5
(Intrusion detection systems)
(&P!K(9?0B.;7!67:=;22;=607!E9:L!
E I B (European installation bus)
BPP)Q!KP?0;1E;71!=.2.N6:607L!
B T V (Broadband television)

!&$UR!
CF90?A<9:&
C90?A<9:&












!

D'9;2!67B9=D!;N;62;E2.!A6=-!R5D!,55!0?!S55!/HT!E;71A61=-!
u a l input, available with 60, 100 or 200 MHz bandwidth
UUB!=0!SC4!VOW:!?.;2F=6p to 2.5 CS/5 real-time sampling per input
mA s current-over-time measurement
"077.8=F;71FQ6.AX! ;9=0922! ?;7G.! 0>! "
.Y=.?7;2!=?6GG.?67G!
external triggering
3Z5D455!B067=:!B.?!67B9=!?.80?1!2.7G=-!9:67G!O80B.![.80?1X!<01.!
0 , 5 0 0 points per input record length using scope RecordTM mode
*9=0!,55!:8?..7:!
Automatic
capture and replay of 100 screens
2SJ!;9=00?4 automatic waveform measurements
"09?:.?D!T00Courser,
zoom and real-time clock
F%09?!-09?!?.8-;?G.;E2.!$6/H!E;[email protected]!B;8I!
o u r hour rechargeable NiMH battery pack
,D555Q!"*)!&&!;71!R55Q!"*)!&&&!:;>[email protected]!8.?=6>6.1!
1 ,000V CAT II and 600V CAT Ill safety certified
UUB!=0!,[email protected]!>20;=67G!6:02;=.1!67B9=:!
p to 1 ,000V independently floating isolated inputs
&78291.:!;!4D555!8097=!=?9.F?&78291.:!;!4D555!8097=!=?9.F?Includes
a 5,000 count t r u e
)-.!:0>=A;?.!-.2B:[email protected]!G.=!<0?.!09=!0>[email protected]?!:80B.!The software helps you get more out of your scope meter by

&
&

+"3DE$2.,2• D+"3DE$2.,2-]!
o c u m e n t i n g :]! t r=?;7:>.?!
a n s f e r s c:8?..7:D!
r e e n s , wA;N.>0?a v e f o r m s a;71!
nd
?00?!
measurement data from the scope meter to your PC for
B?67=67GD!0?!=0!6printing, or to import data to other programs
0F35,1,2-]!
?.=?6.N.! waveforms
A;N.>0?• A0F35,1,2r c h i v i n g :]! SO=0?.!
t o r e a;71!
n d retrieve
i t h t=.Y=!
ext
;770=;=607:!
;71!
8?.;=.!
@09?!
0A7!
26E?;[email protected]!
>0?!
.;:@!
annotations a n d c r e a t e y o u r o w n library f o r e a s y
?.>.?.78.!;71!80reference and comparison
02/%G7,7]!
02/%G7,7
N;29;E2.! measurement
• A n a l y s i s :]! gG;=-.?!
a t h e r valuable
a t a a;71!
nd
.7;E2.!89?:0?!enable cursor measurements to reveal relationships and
conditions
80716=607:!
CONFIDENTIAL
"#$%&'($)&*+!!
"#$%&'($)&*+!

1

,

ldmd!

!

Digital
Advanced Handheld Oscilloscope
e l 7510
+,-,./%&0#1/23$#&4/2#5$%#&673,%%"73"8$
-,./%&0#1/23$#&4/2#5$%#&673,%%"73"
,./%&0#1/23$#&4/2#5$%#&673,%%"73"
,./%&0#1/23$#&4/2#5$%#&673,%%"73"8
8$
$ M o d!"#$%&'()*
+,+,
!

TECHNICAL DATA
9:;4<=;0>&+090&
Bandwidth
-./012034!

F

l

u

e
199C, 199B: 200 MHz
%5678!9::";!9::[email protected]!!

k

Max. real time sample rate 2 .!,BG!HIJE!
5 CS/s
>.AB!C8.5!32D8!E.DF58!C.38!
Display
'2EF5.K!

1

'2N23.5!O8CE2E38/P8!
Digital Persistence

4
Y

4

mm Full Color [CD
9LL!DD!%655!"M5MC!+"'!

s Q8E;!H2R8E!./.5MN!MEP255MEPMF8!5278!1.R8SMCD!08P.K!T6E8C!
, Gives analog oscilloscope like waveform decay (user
selectable)
E858P3.U58V!

e

L
%%)!*/.5KE2E!
FFT Analysis F r e q u e %C8W68/PK!EF8P3C6D!./.5KE2E!6E2/N!D.348D.32P.5!S6/P32M/!
n c y spectrum analysis using mathematical function
Fast Fourier Transform (FFT)
%.E3!%M6C28C!)C./ESMCD!T%%)V!
(/R85MF8!DM08!
Envelope mode

Yes
Q8E!

X.R8SMCD!"MDF.C8!
Waveform Compare

Y2E6.5!Z8S8C8/P8!./0!*63MD.32P!O.EEJ%.25!38E32/N!
Visual Reference and Automatic Pass/Fail testing

>.AB!C8PMC0!58/N34!!
Max. record length

]===!FM2/3E!F8C!2/F63!P4.//85!
3000 points per input channel

[6
60:
0:\!2/!IPMF8!DM08in scope mode:
['6E1:\!2/!IPMF8!Z8PMC0!DM08\!2/!IPMF8!Z8PMC0!DM08in Scope Record mode: 2 7 ,^;===!FM2/3E!F8C!2/F63!MC!DMC8!TG!DEJ02R!3M!,!D2/J02RBV!
, 0 0 0 points per input or more (5 ms/div to 2 mm/div.)
$6DU8C!MS!2/F63E!
Number of inputs

,!F56E!8A38C/.5!J!'>>!2/F63;!.55!2EM5.380!SCMD!8.P4!M348C!
plus external / DMM input, all isolated from each other
./0!SCMD!NCM6/0!
and from ground

2

[email protected]!
Number of digitizers

2

&/08F8/08/35K!S5M.32/N!
Independently floating
2EM5.380!2/F63E!
isolated inputs

U

,!
p _F!3M!9===!Y!U83188/!2/F63E;!C8S8C8/P8E!./0!NCM6/0!
to 1000 V between inputs, references and ground

_F!
6E2/N! Pulse
O65E8! Width
X2034! triggering;
3C2NN8C2/N`! 5G=!
F8.7!
UP t3M!
o "]! n/E!
s using
0 n/E!
s peak
detect at 5 ms/div. to 1 mm/div.
0838P3!.3!G!DEJ02RB!3M!9!D2/J02RB!

H523P4!P.F36C8!
Glitch capture
)2D8!U.E8!C./N8!2/!IPMF8!
Time base range in Scope
mode
DM08!

5 G!/EJ02R!3M!,!D2/J02R!
ns/div to 2 mm/div

)C2NN8C!3KF8E!
Trigger types C o n n e c t - a"M//8P3a./0aY281b;!%C88!Z6/;!I2/N58!I4M3;!(0N8;!'85.K;!
n d - V i e w ® , Free Run, Single Shot, Edge, Delay,
Y208M!
%C.D8;! Video
Y208M! line,
52/8;! Selectable
I858P3.U58! pulse
F65E8! w12034!
Video Frame,
i d t h a./0!
nd
External
(A38C/.5!
*0R./P80!)C2NN8C!)KF8E!
Advanced Trigger Types N

$a"KP58!)C2NN8CB!'85.K!)C2NN8C!UK!$!8R8/3E!!
'6.5!
I5MF8! Trigger.
)C2NN8CB!Trigger
)C2NN8C! oM/!
C2E2/N! a./0!
S.552/N!
Dual Slope
n bUM34!
o t h rising
n d falling
80N8E!MS!1.R8SMCD!
edges of waveform

IPMF8!>8.E6C8D8/3E!
Scope Measurements

7

^!P6CEMCE!D8.E6C8D8/3E;!]=!.63MD.32P!D8.E6C8D8/3E!
cursors measurements, 30 automatic measurements

CONFIDENTIAL
"#$%&'($)&*+!!
"#$%&'($)&*+!

2

,

ldmd"

!

Digital
Advanced Handheld Oscilloscope
e l 7510
+,-,./%&0#1/23$#&4/2#5$%#&673,%%"73"8$
-,./%&0#1/23$#&4/2#5$%#&673,%%"73"
,./%&0#1/23$#&4/2#5$%#&673,%%"73"
,./%&0#1/23$#&4/2#5$%#&673,%%"73"8
8$
$ M o d!"#$%&'()*
+,+,
!

Cursor-limited Automatic
"-./0.12343567!*-5048539!
Measurements
:68/-.646;5/!

within cursor
Vrms o0.!
r Wa
v g automatic
=8>?!
8-5048539! measurement
468/-.646;5! @35A3;!
9-./0.!
defined
time
limits
76B3;67!5346!23435/!

Scope-Record Trigger modes S C58.5!0;!).3??6.F!C50D!0;!).3??6.!
t a r t on Trigger, Stop on Trigger
C90D61E690.7!).3??6.!4076/!

"8D5-.6!28/5!GHH!/9.66;/!
Capture last 100 screens

*[email protected]!E6D28I!98D8J3235I!
Automatic, with Replay capability

'-82!3;D-5!).6;7!K205!
Dual input Trend Plot

Yes, with Cursors and Zoom
L6/[email protected]!"-./0./!8;7!M004!

:640.I!B0.!/9.66;/!8;7!/651
Memory for screens and set-D/!
ups

GH!/9.66;/[email protected]!/651-D!
10 screens with set-up

:640.I!B0.!.690.73;?/!
Memory for recordings

)@0F!689A!98;!/50.6!GHH!/90D6!/9.66;/F!8!C90D6!E690.7!
Two, each can store 100 scope screens, a Scope Record
or a Trend Plot
0.!8!).6;7!K205!

True R ! 5 multi meter
).-6!E:C!4-253!4656.!

NHHH!
90-;5/F! Volts,
<025/F! A*4D/F!
"0;53;-35IF! Diode,
'3076F!
5000 counts,
m p s , O#A4/F!
h m s , Continuity,
)64D!
Temp

O8556.I!P3;/582267Q!
Battery (installed)

hi
R4!A.!$31:S!OKGTH!
R!A.!$31:S!OKGTH!

+3;[email protected]!
Line power

*78D56.!U!J8556.I19A8.?6.!3;92-767!
Adapter / battery-charger included

Size
C3V6!

25.6 % 16.9 % 6.4cm (10.1
% 6.7 % 2.5 inch)
WNXY!Z!GYXT!Z!YXR!94!PGHXG!Z!YX[!Z!WXN!3;9AQ!
WNXY!Z!GYXT!Z!YXR!94!P
GHXG!Z!YX[!Z!WXN!3;9AQ!

=63?A5!
Weight

W!\?!
2 kg

PC and Printer interface
K"!8;7!K.3;56.!3;56.B896!

]/3;?!0D530;82!#D539822I!&/028567!ECW,W!878D56.U98J26!
Using optional Optically Isolated R5232 adapter/cable

N!40.6!4640.36/!8.6!4876!8>8328J26!-D0;!.6?3/5.8530;!0B!
5 more memories are made available upon registration of
5A6!C90D6!:656.!
the Scope Meter

!
!

CONFIDENTIAL
"#$%&'($)&*+!!
"#$%&'($)&*+!

&

,

ldmd'

Detection Receiver
*$+$,+-".&/$,$-0$1&

M

o

d

e

!

l
7511
!"#$%&'())

One of
#-.!
/0! the
12.!first
03451!tools
1//65! to
1/! be
7.!used
85.9!during
9843-:!a;!physical
<2=53>;6!search
5.;4>2! should
52/869! be
7.! the
12.! Detection
'.1.>13/-! Receiver.
?.>[email protected]!!
This versatile unit can indicate the location of a transmission source, whether hidden in phone,
)[email protected];136.!8-31!>;-!3-93>;1.!12.!6/>;13/-!/0!;!14;-5B3553/-!5/84>.C!D2.12.4!2399.-!3-!<2/-.C!
room or
or 1.6.E!
telex 14;-5B311.45C!
transmitters,
4//B!
/4! body
7/9=! transmitters,
14;-5B311.45C!remote
4.B/1.! control
>/-14/6!signals,
53:-;65C!computer
53:-;65C!
>/B<81.4! bugs,
78:5C! fax
0;E! /4!
video transmitters,
@39./!
14;-5B311.45C!pulsed
<865.9!tracking
14;>F3-:! transmitters,
14;-5B311.45C!
14;-5B311.45C!
C! spread
5<4.;9! spectrum,
5148BC! and
;-9! even
[email protected]! wide
D39.! band
7;-9!
frequency hopping or burst transmitters. This is a multi use tool which covers a wide range of
04.G8.->=!2/<<3-:!/4!H78451H!14;-5B311.45A!)235!35!;!B8613!85.!1//6!D23>2!>/@.45!;!D39.!4;-:.!/0!
tasks from basic physical searches to cable verification.
1;5F5!04/B!7;53>!<2=53>;6!5.;4>2.5!1/!>;[email protected]>;13/-A!

BROADBAND DETECTOR ADVANTAGES
2/34*245*&*676873/&4*94574:6;&
%$&;[email protected]&A-+&I!<4/@[email protected]=123-:!-..9.9!1/!%$&;[email protected]&A-+&
I-!<4/@[email protected]=123-:!-..9.9!1/!Portable sweep Kit I!<4/@[email protected]=123-:!-..9.9!1/!provides everything needed to perform a professional sweep; fits inside
a
standard
briefcase.
;!51;-9;49!743.0>;5.A!!
;!51;-9;49!743.0>;5.A!!
!B%+-CDB.,+-".=%&
E+-%-+F& I! "/B.5! D312! <4/7.5! 1/! 9.1.>1! ?%! 14;-5B311.45! K;893/! ;-9! @39./LC!
Multi
>;443.4!
>844.-1! transmitters,
14;-5B311.45C!and
;-9!telephone
1.6.<2/-.! bugs.
78:5A! Probes
M4/7.5! are
;4.! also
;65/! available
;@;36;76.! t1/!
9.1.>1! for
0/4!
carrier current
o detect
3-04;4.9!14;-5B311.45C!1;/49.45C!;-9!;>/8513>!6.;F;:.A!
infrared transmitters, tape recorders, and acoustic leakage.
G-#$>=.#&8"0$1=H$&
I-!%4/B!NOOPQ!1/!/@.4!RSPQ!D312!-/!2/6.5!/4!:;<5A!!
G-#$>=.#&8"0$1=H$&I!%4/B!NOOPQ!1/!/@.4!RSPQ!D312!-/!2/6.5!/4!:;<5A!!
Wideband Coverage I!%4/B!NOOPQ!1/!/@.4!RSPQ!D312!-/!2/6.5!/4!:;<5A!!
From 200Hz to over 3G!z with no holes or gaps.
!".-+"1&!"#$&I!*01.4!;!5D..!".-+"1&!"#$&
I!*01.4!;!5D..Monitor Mode -I!*01.4!;!5D..After a sweep, the alarm monitor (silent or audible alert) guards against new
[email protected]>.5!74/8:21!3-!/4!4.B/1.!>/-14/6!;>[email protected];13/-!/[email protected];->[email protected]>.5A!!
devices brought in or remote control activation of surveillance devices.
4BI-%-=1F&4B#-"&[email protected]+&
I-!*66/D5!85.4!1/!6351.-!1/!1.6.<2/-.5!/4!63-.5!0/4!T2/1B3F.5CT!2//F5D31>2!
4BI-%-=1F&4B#-"&[email protected]+&I!*66/D5!85.4!1/!6351.-!1/!1.6.<2/-.5!/4!63-.5!0/4!T2/1B3F.5CT!2//F5D31>2!
Auxiliary Audio Input I!*66/D5!85.4!1/!6351.-!1/!1.6.<2/-.5!/4!63-.5!0/4!T2/1B3F.5CT!2//F5D31>2!
Allows user to listen to telephones or lines for hotmikes, hookswitch
7=I;76.5!>;-!7.!1.51.9!0/4!D34.9!B3>4/<2/-.5A!
by-pass and infinity bugs. Unknown wires and cables can be tested for wired microphones.

!

TECHNICAL sPECIFICA!IONS
768K5J84L&;<68JDJ847J35;&
R.F. PROBE:
/MDM&326N&

!

:=-.N&
NO9V!-/B3-;6!04.G8.->=!!
• G :=-.N&NO9V!-/B3-;6!04.G8.->=!!
a i n : 20dB
nominal frequency
/[email protected]".O$N&WOFPQINSPQ!XR9V!RSPQI,O9V!!
/[email protected]".O$N&
W"#!
OFPQINSPQ!XR9V!RSPQI,O9V!!
• Re
s p o n s e : 5WOFPQINSPQ!XR9V!RSPQI,O9V!!
z-2G!z $ d % 3GHz-i 0dB
;$.O-+-0-+FN&
;$.O-+-0-+FN&IYN9VB!K,!5.:B.-1L!IZW9VB![A'A+A!
I
IYN9VB!K,!5.:B.-1L!IZW9VB![A'A+A!
YN9VB!K,!5.:B.-1L!IZW9VB![A'A+A!
• S e n s i t i v i t y : -&2d%m (1 segment) -85d%m M D L .

VLF PROBE:
9LD&326N&

!






D1$PB$.,F&/[email protected]".O$N&
D1$PB$.,F&/[email protected]".O$N&,WFPQI,[PQIR9V!!
,WFPQI,[PQIR9V!!
Frequency
Response: 1,WFPQI,[PQIR9V!!
5"#z-i $#z-3d B
!4Q&[email protected]+&0"%+=H$N&
ROO!\*"!WOIYOPQ!!
M!4Q&[email protected]+&0"%+=H$N&ROO!\*"!WOIYOPQ!!
A X input voltage: 300
VAC 50-60 Hz
I sJO"%=+-".N&,WOO!\*"!YOPQ!!
o l a t i o n : 1,WOO!\*"!YOPQ!!
500 VAC 60Hz
JO"%=+-".N&
;$.O-+-0-+FN&
IRZ9VB!K,!5.:B.-1L!IYO![A'A+A!!
S e;$.O-+-0-+FN&IRZ9VB!K,!5.:B.-1L!IYO![A'A+A!!
n s i t i v i t y : -IRZ9VB!K,!5.:B.-1L!IYO![A'A+A!!
$8d%m (1 segment) -60 M D L .

CONFIDENTIAL
"#$%&'($)&*+!!
"#$%&'($)&*+!

1

,

ldmd-

Detection Receiver
*$+$,+-".&/$,$-0$1&

M

o

d

e

!

l
7511
!"#$%&'())

AUDIO AMPLIFIER:
23*45&2!674849/:&
I n4.;.,$:&-./!#01!23435678!!
p u t Impedance: -./!#01!23435678!!
50! Ohm balanced
4.;.,$:&
I n4.;.?$:&9:;<=>[email protected]!*C"!!
p u t Range: 19:;<=>[email protected]!*C"!!
.7uV-10V (135d!) ACC
4.;.?$:&
D *@.>=-,&/>.?$:&9..8A!?0DE0!358!4FG!E3D5B!!
y n a m i c Range: 100dB
(high and tow gain)
*@.>=-,&/>.?$:&
9..8A!?0DE0!358!4FG!E3D5B!!
F r81$Ae q u e n c y Response: 9..HI>[email protected]!?LD4M7N78B
100Hz
[email protected]!?LD4M7N78B!-..HI>,O8APF6M3Q7R!,:-JHI>
1 8 d
9S8APF6M3Q7!!
• H eC$>#;D".$&5T!,,.!
a d p h o n e Output: 5Vp-p
220 ! !!
C$>#;D".$&5-=T>T!,,.!
/$,"1#&5,-!1=T>T!5F1D534!GDM0!*C"!!
• R /$,"1#&5T!5F1D534!GDM0!*C"!!
e c o r d Out: 25
mVp-p nominal with AGC





!

DISPLAY:
*4E672F:&

!






7G*&H>1?1>;D:&
9S!U7E175M!GDM0!T<4UD5E!UD5E47!U7E175M!MNDT!TFD5M!!
L 7G*&H>1?1>;D:&9S!U7E175M!GDM0!T<4UD5E!UD5E47!U7E175M!MNDT!TFD5M!!
C D Bargraph: 18
segment with Pulsing single segment trip point
(I#H&*@.>=-,&/>.?$&?9!U7E175M!HDE0!C3D5!MF!V*W!+FG!C3D5B!!
(I#H&*@.>=-,&/>.?$&
?9!U7E175M!HDE0!C3D5!MF!V*W!+FG!C3D5B!!
50
d ! Dynamic Range (1
segment High Gain to MAX Low Gain)
2%$1+&5,:SJHI!MF57!FN!UD475M!N78!+('!3M!,HI!!
A 2%$1+&5l e r t Output: 2.8k
"z tone or silent red LED at 2Hz
/$="+$&5$:#:[email protected]*!,-=!V*WB!!
R /$="+$&5e m o t e Output: N.O.
contact (300mA 25V MAX)

BATTERY:
H2JJ9/F:&

!

• 8K&$>L&!M)(II&
ea. W11500 AA
Alkaline - Life 10-16 hrs
K&$>L&!M)(II&**!*4J34D57!>!+DL7!9.>9X!0NU!!
**!*4J34D57!>!+DL7!9.>9X!0NU!!
?#TMDF534B!S!73:!--.1*0!$D"38!>[email protected]>-!0NU!T7N!603NE7!!
• (Optional) 8 ea. 550mAh NiCad - life 3-5 hrs per charge
7"N&H>[email protected]&4.#-,>+"1
Y!3TTNFZ:!9.[!N713D5D5E!TFG7N!!
• L 7"N&H>[email protected]&4.#-,>+"1Y!3TTNFZ:!9.[!N713D5D5E!TFG7N!!
o w Battery Indicator:Y!3TTNFZ:!9.[!N713D5D5E!TFG7N!!
approx. 10% remaining power

AC ADAPTER/CHARGER:
2G&2*26J9/OGC2/P9/:&
!

4.;\->[email protected]=*"!-.>X.HIR!FN!,..>,;-=*"!-.>X.HI!!
• I n4.;[email protected]=*"!-.>X.HIR!FN!,..>,;-=*"!-.>X.HI!!
p u t : 95-t
&'V() 50-60Hz, or 200-275YAC 50-60Hz
59.!0NU!!
9,='"!GDM0!-..1*!$D"38!]7603NE7!)D17Y!S>9.!0NU!!
• O 5u t p u t : 12YDC
with 500mA NiCad Recharge Time: 8-10 hrs

"#$
G6!Q'II&
3M4J:&&
!

E-R$:&
\[email protected]!D5R!,@:,!Z!9-:X!Z!O:O!61!!
\[email protected]!D5R!,@:,!Z!9-:X!Z!O:O!61!!
• s iE-R$:&\[email protected]!D5R!,@:,!Z!9-:X!Z!O:O!61!!
ze: 9
1/8 6 1/8 1 3/4in, 23.2 1 5 . 6 4 . 4 cm
S$-?D+:&@\!FIR!9:9!JE!!
@\!FIR!9:9!JE!!
• WS$-?D+:&
e i g h t : 39
oz, 1.1 kg

CARRY CASE WITH ALL STANDARD ITEMS:
G2//F&G2E9&S4JC&277&EJ2M*2/*&4J9!E:&
E-R$:&[email protected][email protected]!D5R!O9:X!Z!,S:X!Z!;:X61!!
• S E-R$:&
i z e : [email protected][email protected]!D5R!O9:X!Z!,S:X!Z!;:X61!!
*+&I8,ll 1/4,3in,41.6,28.6,7.+$m
S$-?D+:&;[email protected]:9S!JE!
;[email protected]:9S!JE!
;[email protected]:9S!JE!
• WS$-?D+:&
eight: 7
tbs, 3.18 kg

CONFIDENTIAL
"#$%&'($)&*+!!
"#$%&'($)&*+!

2

,

ldmd#

!

Model 7513
!"#$%&'()*

Wall Depth
Measurement system
+,%%&-$./0&!$,123$4$5/&671/$4
./0&!$,123$4$5/&6
/0&!$,123$4$5/&6
/0&!$,123$4$5/&67
71/$4
1/$4
+,%%&-$.
+,%%&-$
D869:;<=;>?&
!" RI #$ I % N
-869:;<=;>?&
The Model
)-.!
/01.2!7513
34,5!is
67! a8!metal
9.:82!detector
1.:.;:0=76>?! a8!
visual display
o control
@67=82!
167A28B! t:0!
;0>:<02! iron
6<0>! inlays
6>28B7! inside
6>761.!
walls, floors
f this
C8227D!
E200<7! or
0;.626>?7F!The
)-.!results
:-67!
easy-to-handle positioning
.87BG:0G-8>12.!
A076:60>6>?!and
8>1!measurement
9.87=:!
7B7:.9!8!.2.;:<098?>.:6;!.EE.;:7!
system are based on electromagnetic effects
which are shown on an LCD screen.
C-6;-!8!0>!8>!+"'!I;F!

USAGE
@6AB8&
/01.2!
A<01=;.! visual
@67=82!
Model 734,5!
5 1 3 i s67! u=7.1!
s e d t :0!
o produce
6>E0<98:60>!
0E! length,
2.>?:-D!width,
C61:-D!depth,
1.A:-D!position
A076:60>!
information of
8>1!
J=826:B! o0E!
6<0>!inlays
6>28B7! i 6>!
;0>;8>1!
and quality
f iron
n concrete
0:-.E.<<098?>.:6;! metals
9.:827! inside
6>761.! closed
;207.1!
other ferromagnetic
materials. This
98:.<6827F!
)-67! metal
9.:82!detector
1.:.;:08220C7! for
E07A..1B!
@67=82!search
7.8E0-611.>! bugs
H=?7! inside
6>761.!
speedy visual
H=6216>?7!!
buildings

FEATURES
[email protected]:86&
• E(87B!8>82B767!0E!6<0>!98:.<682!6>761.!C8227D!E200<7!0?7!HB!=76>[email protected]=82!167A28B!
a s y analysis of iron material inside walls, floors or ceilings by using a visual display
• ZK009!E=>;:60>!
o o m function
/.87=:!6>E0<98:60>!0E!:-.!1.A:-!
• Measurement
information of the depth
L6;:=?!A0776H2.!HBM!
• Picture
processing possible by:
G-G&9A0!N0<1!
GG&9A0!N0<1!
-Import in Word

G--Output
GG#=:A=:!:0!8>!.O:.<>82!A<6>:.G#=:A=:!:0!8>!.O:.<>82!A<6>:.to an external printer
• L+.77!-.6?-:!0E!:-.!A<0H.!
e s s height of the probe
'[email protected]!8!7:<0>?!:002!;87.!C6:-!8;;.770<6.7!
• Delivery
in a strong tool case with accessories

TECHNICAL DATA
=89D?;9AE&-A=A&
IA..1!0E!9.87=:M!!
Speed of measurement:

0.5 m/s
PF4!9Q7!!

/8OF!1.A:-M!!
Max. depth:

180mm
,RP!99!!

*9A26EB6>?!0E!C61:-M!!
Amplifying of width:

between 6 to 36 mm
H.:C..>!S!:0!5S!99!!

/8OF!7A-.:!8:!0>.!<=>!:-<0=?-M!!
Max. sphere of measurement at one run through:

600 mm ! 600 mm
SPP!99!O!SPP!99!!

N0?!:.9A.<8:=Working temperature:

between —1 0°C to +50°"
H.:C..>!U,PV"!:0!W4PV"!!

I6X.!0E!A<0H.M!!
Size of probe:

230mm ! 133mm ! 140mm
Y5P99!O!,5599!O!,ZP99!!

Size of monitor:
I6X.!0E!90>6:0
270mm ! 195mm ! 80mm
Y3P99!O!,[499!O!RP99!!!

/8OF!7A-.:!C6:-0=:!10C>2081M!
Max. sphere of measurement without download:

15m
,49\!

!
!

CONFIDENTIAL
"#$%&'($)&*+!!
"#$%&'($)&*+!

1

,

elaman

! ./!&01#$"&2$3"4$&56"7$&89:
s " # Video Remote Probe Inspection
-./!&01#$"&2$3"4$&56"7$&89:;$<41"9
;$<41"9
$<41"9
-./!&01#$"&2$3"4$&56"7$&89:;
-./!&01#$"&2$3"4$&56"7$&89:

!

Model 7514-2
!"#$%&'()*+,

PRODUCTIVITY TOOL
52=>?/[email protected]&-==A&
For !)/"0!
s " # search
o m e s a3! revolutionary
e w v<[email protected]!
ideo
%-.!
123.45!operational
-62.378-93:! c 4-;21!
.2! n92?!
borescope —
A-.214-62!
B! the
752!Video
[email protected]! Probe
D.-A2! Remote
E2;-72! Visual
C81=3:! Inspection
&9162478-9! system
/>172;! B!a 3!
power tool for improving tscm inspection productivity.
6-?2.!7--:!F-.!8;6.-<89G!714;[email protected]=478<87>H!
!

FEATURES
BCD-?2C.&
(I7.3JA.8G57K!high-resolution
58G5J.21-:=78-9! L +"'!
58G5J-=76=7!
• Extra-bright,
C D s c14.229!
r e e n a [email protected]!
n d high-output
8::=;[email protected]:8<2.!153.6K!4:23.!8;3G21!
illumination deliver sharp, clear images
'=3:[email protected]!-62.3789G!4312!
• Dual-purpose
shipping and operating case
+8G57?28G57!?8.2:211!.2;-72!4-97.-:!L-678-93:M!
• Lightweight
wireless remote control (optional)
D-?2.F=:!4-;6=789G!6:37F-.;[email protected]!;393G2;[email protected]!?-.:@[email protected]!
• Powerful
computing platform for data management and worldwide
4-992478<87>!
connectivity
!

QUICKCHANGETM PROBES
E?8/F/GDHICJ&52=KC.&
N875!
871!interchangeable
8972.4539G23A:2!OuickChange
O=84P"539G2! probes,
6.-A21K! the
752! Video
[email protected]! Probe
D.-A2! Remote
E2;-72! Visual
C81=3:! Inspection
&9162478-9!
With its
1>172;!Q=84P:>[email protected];[email protected]!:29G75!F-.!;3I8;=;!
system quickly reconfigures probe diameter and length for maximum
[email protected]=478<87>H!
productivity.
!

Probes come
m , and
D.-A21!
4-;2! in
89!3.9
RHS! mm.
;;H!6.1
TH,!m
;;K!
[email protected]! 8.4
UHV! mm
;;! diameters.
@83;272.1H! The
)52! 6.1
TH,!
;;!6.-A21!3.2!A=8:[email protected][email protected]=.3A8:87>!?875W!
mm probes are built for increased durability with:
)87398=;!camera
43;2.3! head
[email protected]! t7537!
78;21! stronger
17.-9G2.! than
7539! older
-:@2.!
• Titanium
h a t i81!
s 8U! times
@218G91!
designs
+312.J?2:@[email protected][email protected]!924P!123;!?5845!17.29G75291!3!4.87843:!X-897!
• Laser-welded
bending neck seam which strengthens a critical joint

• A*[email protected]=A:[email protected][email protected]@[email protected]!4.=15!.218173942!
double tungsten braid insertion tube for added crush resistance
!

s s ! #
[email protected]!&
)52!
6-.73A:2! workstation
?-.P17378-9! f F-.!
89162478-9! [email protected]!
The bA312!
a s e u=987!
n i t i 81!
s a3! portable
o r inspection
ata
;393G2;297K!31!?2::!31!3!:[email protected]!17-.3G2!.22:!F-.!752!6.-A2H!
management, as well as a light source and storage reel for the probe.
The unit features:
)52!=987!F237=.21W!
[email protected]@M! u =6!
L-678-93:M! i n8972.93:!
• 5Y,Z!
1 2 M0[!
B (standard)
p t 7-!
o 4V! G\[!
B (optional)
ternal
"-;6347%:315][email protected]!
CompactFlash ® card

• 3R!^/[!ZH_!6-.71!
U5$ 2.0 ports
,_`,__!(752.927!6-.7!F-.!D"!?875!-678-93:!&972.927!4-992478-9!
• 10/100
Ethernet port for PC with optional Internet connection
#678-93:!A3772.>`^D/!634P!89!-92J!-.!7?-J5-=.!4363487821!
• Optional
battery/UPS pack in one- or two-hour capacities
D"!card
[email protected]!slots
1:-71! that
7537! accept
344267! memory
;2;-.>! and
[email protected]! communication
4-;;=984378-9!
• T)?-!
w o PC
cards
[email protected]!

• U^12.!4-9F8G=.3A:2!$)/"`D*+!<[email protected]!F-.;37!12:2478-9!
s e r configurable N%5&/P'L video format selection
CONFIDENTIAL
"#$%&'($)&*+!!
"#$%&'($)&*+!

,

ldmd# . . .
! ./!&01#$"&2$3"4$&56"7$&89:
s " # Video Remote Probe Inspection
-./!&01#$"&2$3"4$&56"7$&89:;$<41"9
;$<41"9
$<41"9
-./!&01#$"&2$3"4$&56"7$&89:;
-./!&01#$"&2$3"4$&56"7$&89:

!

Model 7514-2
!"#$%&'()*+,

TECHNICAL spECIFICA $ IONS
-=/>?8/@A&.5=/8B8/@-8C?.&
OPERATING ENVIRONMENT
[email protected]?D&=?082C?!=?-&
System
Operating - 4
° to
-./!
01! 115°F
223/%!(-20°
4-,5/! to
01! 46°C)
.6/"7! LCD
+"'! requires
89:;<89=! warm-up
>[email protected];A! period
A98<1B! below
C9D1>!
.E:4$3&
C;$6F419G&
32°F (0°C)
E,/%!45/"7!
Temp:
-$3;H&&
-1;&C;$6F419G&-$3;H&&
Tip Operating Temp:

-13° to 176°F (-25° to 80°!) Reduced articulation below 32°F (0°C)
-2E/!01!2F6/%!4-,3/!01!G5/"7!H9B;I9B!?80!E,/%!45/"7

Storage Temperature:
.4"6FG$&-$3;$6F4I6$H&&

-13° to 140°F (-25° to 60°C)
-2E/!01!2.5/%!4-,3/!01!65/"7!

Relative Humidity:
2$%F41J$&>I31#14EH&&

[email protected]?MN!J1J!I1JB9J=95% max, non condensing

KF4$6;6""LH&&
Waterproof:

&J=980<1J!0;C9=!?89!>?0980Insertion tubes are watertight to 1 bar (14.5 psig, 10.2 m [33.5 ft.]
of "20)
1S!U,#7!

Hazardous
N
>FMF6#"I:&
Environments:
=9J16"93$94:H&&

t $10!8?09B!S18!;=9!rated for use in hazardous environments

o

SYSTE %
.N.-=!&

&

Case Dimensions:
/F:$&O13$9:1"9:H&

&

Standard:
.4F9#F6#H&&

54.6 X 49.5 X 32.0 cm (21.5 X 19.5 X 12.6 in.)
3.Q6!M!.KQ3!M!E,[email protected]!4,2Q3!M!2KQ3!M!2,Q6!
Tall:
-F%%H&&

5

4

6 3.Q6!M!65QK!M!E,[email protected]!4,2Q3!M!,.!M!2,Q6!X 60.9 X 32.0 cm (21.5 X 24 X 12.6 in.)

.

K$1GP4H&
Weight:
89&/F:$H&&
In Case:

&

2

1

.

Without Case:
K14P"I4&/F:$H&&

8,2QG!XO!4.G!DC=Q7!
kg (48 lbs.)
25QK!XO!4,.!DC=Q7!
10.9 kg (24 lbs.)

QUICKCHANGETM PROBES
QR8/S/>@?D=T&52CU=.&
VW)&33&XYW,*,&19WZ&F9#&[W*&33&XYW\\)&19WZ&O1F3$4$6&56"7$:&
6.1 mm (0.242 in.) and 8.4 mm (0.331 in.) Diameter Probes
83FG$&.$9:"6H&&
Image Sensor: 1 / 6 2Y6Z!"1D18![\](H!U*'!""'^!
" Color SUPER HAD CCD®
51]$%&/"I94H&&
Pixel Count: 4 4 0 , 0 ..5N555!A0 0 pixels
-$3;$6F4I6$&.$9:"6H&&
Temperature sensor:

&J09O8?09B!)[email protected]?0;89!_?8JIntegrated Temperature Warning system

/F3$6F&>"I:19GH&&
Camera Housing:

Titanium
)<0?J
@641Articulation:
3
-1;&C;41Tip Optics: D

6
o

u

0 E65/!*DD-_?`^!
°
All-Way®
b '1;[email protected]!
l e threaded attachment

\W^&33&XYW)(*&19WZ&O1F3$4$6&56"7$:&
3.9 mm (0.154 in.) Diameter Probes
2Y25Z!"1D18N![\](H!U*'!""'!
83FG$&.$9:"6H&&
1/10" Color, SUPER HAD CCD
Image Sensor:

Pixel Count:
51]$%&/"I94H&&

,K5N555!A290,000 pixels

/F3$6F&>"I:19GH&&
Camera Housing:

Titanium
)<0?J
Articulation:
@641
E65/!*DD-_?`!
360° All-Way

-1;&C;41Tip Optics:

Double threaded attachment
'1;[email protected]!

HANDSET
>@?O.=-&

&

Dimensions:
O13$9:1"9:H&&

[email protected]!423Q.!M!FQ2!M!3Q2!39 X 18 X 13cm (15.4 X 7.1 X 5.1 in.)

K$1GP4H&&
Weight:

2QG2!XO!4EQKG!DC=Q7!
1.81 kg (3.98 lbs.)

CONFIDENTIAL
"#$%&'($)&*+!!
"#$%&'($)&*+!

,2

ldmd) .
! ./!&01#$"&2$3"4$&56"7$&89:
s " # Video Remote Probe Inspection
-./!&01#$"&2$3"4$&56"7$&89:;$<41"9
;$<41"9
$<41"9
-./!&01#$"&2$3"4$&56"7$&89:;
-./!&01#$"&2$3"4$&56"7$&89:

!

Model 7514-2
!"#$%&'()*+,

‚.,!JI$LI U'.Ll'Jll
/"9:46=<41"9>&&

-./01234.5267!8.9:;5!7/2:[email protected]:!
u i y u a i U U I l ! II. l U U l I i y V V I L I I I I l I . l " I . 0
I L U I I l I J U t I I J I

LCD:
?/@>&&

16.3 cm
9 aspect
480 pixels,
ABC,!
1?!(6.4
DBCE! in.)
;5CF!diagonal,
>;2AB! X
H! I!
2:@716! ratio,
326;.G! 800
JKK! X
H! EJK!
@;H7/:G!
wide VGA
=;>7!LM*!

LCD Brightness:
?/@&A61BC49$::>&&

380 fits (cd/m2)
,JK!5;6:!D1>N?OF!

Power Tube:
5"D$6&-=7$>&&

2.4 m (8 ft.) long
OCE!?!DJ!P6CF!/.5
User Controls:
E:$6&/"946"%:>&&

Joystick and complete button function set
Q.0:6;1R!25>[email protected]/767!4966.5!P9516;.5!:76!

!1<6";C"9$>&&
Microphone:

S9;/6T;5!?;[email protected]!P.3!29>;.!255.626;.5!/.1267>[email protected]!175673!
Built-in microphone for audio annotation located on the top center
of the handset
.P!687!825>:76!

BASE UNIT
AF.G&EH8-&
Dimensions:
@13$9:1"9:>&&

4

4

X 22 X 35 cm (17.3 X 8.7 X 13.8 in.
EE!H!OO!H!,U!1?!DAVC,!H!JCV!H!A,CJ!;5CF!

I$1BC4>&&
Weight:

VCOA!R7.21 kg (15.90 lbs.)

Construction:
/"9:46=<41"9>&&

*/9?;59?!182::;:!=;[email protected]/[email protected]:!
Aluminum chassis with polyurethane bumpers

.J:4$3&/5E>&&
system CPU:

Intel Pentium ® #
&567/!-756;9?W!X!

Video Processors:
01#$"&56"&&

X9/6;@/7!>;Multiple digital signal processors

A61BC49$::&/"946"%>&&
Brightness Control:

*96.?26;1!25>!Y23;24/7G!2>Z9:624/7!296.!<2;5!25>[email protected]:937!
Automatic and variable, adjustable auto gain and exposure

.J:4$3&!$3"6J>&&
system Memory:

to E!
4G
B
&567352/!
"[email protected]%/2:8W!card,
123>G! 5UAO!
XS!
D:625>23>F! 6.!
MS!
Internal CompactHash®
12 M
B (standard)
[email protected];.52/F!
(optional)

?K3;&-J;$>&&
Lamp Type:

VU[!\;<8!&5675:;60!';:1823<7!D\&'F!
75W High Intensity Discharge (HID)

?K3;&L=4;=4>&&
Lamp Output:

4300 Lumens
E,KK!+9?75:!

?K3;&?1M$>&&
Lamp Life:

1000 hour median
AKKK!8.93!?7>;25!

N$J7"K6#&89;=4>&&
Keyboard Input:

]^S!R704.23>!=;68!49;/6T;5!6321R42//!
us $ keyboard with built-in trackball

01#$"&L=4;=4:>&&
Video Outputs:

PC Y;>7.!
video
^=;61824/7!
$)^"N-*+! s^TL;>7.G! ^625>23>! [email protected];5! -"!
Switchable NTSC/PAL
connector
1.55716.3!

01#$"&89;=4>&&
Video Input:

*96.!>76716;57.!
Auto detecting N%5!/&'L S

u .A>&&
E
E.A>&&

)8377!7H67352/!]^[email protected]:!
Three external USB 2.0 ports

Ethernet:
G4C$69$4>&&

&567<3267>!AKNAKK!([email protected]!
Integrated 1 0/100 Ethernet port

PCMCIA:
5/!/8F>&&

Two 3 2
)=.!,OT4;6!-"!123>!:/.6:!

F/&89;=4>&&
AC Input:

*"!$.?;52/!;[email protected]_!AKK!6.!OEK!LG!UK!6.!BK!\`a!
AC Nominal input: 100 to 240 V, 50 to 60 Hz;
AAU!LG!EKK!\`a!OVU![!?2H!
115V, 400 Hz; 275 W max

F/&L=4;=4>&&
AC Output:

AKK![!?2Ha!&(",OKTOTO!)[email protected]!%!1.55716.3!

AC Fuse:
F/&O=:$>&&

BC,*G!OUKLG!P2:6!216;56.(', 250V, fast acting

@/&89;=4>&&
DC Input:

AA!6.!AU!L'"a!5.?;52/!AO!L'"a!AUK![!?2H!
11 to 15 VDC; nominal 12 VDC; 150 W max

DC Fuse:
@/&O=:$>&&

OK*G!BKK!L'"G!P2:6!216;520A, 600 VDC, fast acting

Audio
F=#1"&
Connectors:
/"99$<4"6:>&&

L=4;=4&
Built-in front panel speaker,
Output S9;/6T;[email protected]/!:@72R73G!
,CU!??!:6737.!/;57!/7Y7/!.96G!OL!bX^!?2HG!
3.5 mm stereo line level out, 2V RMS max,
,CU!??!:6737.!872>@8.57!
3.5 mm stereo headphone

CONFIDENTIAL
"#$%&'($)&*+!!
"#$%&'($)&*+!

(

,

ldmd0 .
! ./!&01#$"&2$3"4$&56"7$&89:
s " # Video Remote Probe Inspection
-./!&01#$"&2$3"4$&56"7$&89:;$<41"9
;$<41"9
$<41"9
-./!&01#$"&2$3"4$&56"7$&89:;
-./!&01#$"&2$3"4$&56"7$&89:

!

Model 7514-2
!"#$%&'()*+,

Audio Input Connector: 3 .-./!00!0123456478!
5 mm microphone
=>#1"&89;>4&/"99$<4"6?&&

TIP ARTICULATION
-85&=2-8/@A=-8BC&
Length
A$9D4E&&

Straight Tube
.46F1DE4&->7$&

4.5 m and less
,./!0!97:!;8<
=5>'[email protected]!A/BC!017D!+8EF>[email protected]!A/BC!017!
Up/Down — 150° min, Left/Right — 150° min

6.0 m
I.B!0!!

=5>'[email protected]!A-BC!017D!+8EF>[email protected]!A-BC!017!
Up/Down — 130° min, Left/Right — 130° min

8.0 m
J.B!0!!

Up/Down — 120° min, Left/Right — 120° min
=5>'[email protected]!AKBC!017D!+8EF>[email protected]!AKBC!017!

9.6 m
L.I!0!!

=5>'[email protected]!LBC!017D!+8EF>[email protected]!LBC!017!
Up/Down 9 0 0 min, [eft/Right 9 0 ° min

INSERTION TUBE
8C.G2-8BC&[email protected]&
doublethreoded tip

\ —

opticalup ado !"#

tungsten wire braid t u n g s t e n wire braid

artfeutation
laser welded joints
(

!"$u#%t hone outer k % #

1

polyurethone
inner layer

4 artfcvtot an cables/fiber-optic
lightingcables/video t o b i "

steel monocoll

-

' Camera Head

;nsertion Tube

BendingNeck

!

TECHNICAL sPECIFICA$IONS
-G/IC8/=A&.5G/8J8/=-8BC.&
SOFTWARE
.BJ-K=2G&
B;$6F419D&.L:4$3?&&
Operating system:

MN;F1F9Multitasking with desktop software options

User Interface:
@:$6&894$6MF
'345P:4?7!087N!:31Q87!45839F147D!R4SDrop-down menu driven operation, joystick, and keypad

J1%$&!F9FD$6?&&
File Manager:

%1;8!97:!E4;:83!2389F147D!79017HD!245S17H!97:!:8;8F17H!
File and folder creation, naming, copying and deleting

Audio Data:
=>#1"&NF4F?&&

T"!24059F1U;8D!A/!<8247:!E1;8PC compatible, 15 second files (WAY or )*+ format). PCM audio
?1F6!MT(ZK!Q1:84!38243:17Hwith )*,G2 video recordings

83FD$&/"946"%:?&&
Image Controls:

*:RNU31H6F78<A>ABDBBB! s<82!
8[54Adjustable brightness,
e c tF4!
o 1AK!
2 s<82!
e c exposure.
+8EF>G1H6F!
17Q83F! fE43!
<1:8PQ18?! tF15!
243382F147.! Freeze
%388\8! frame,
E3908D!
Left/Right Invert
o r side-view
i p correction.
;1Q8>live/still Inverse+ enhancement, side-by-side split screen

N1D14F%&O""3?&&
Digital Zoom:

A^!F4!-^[email protected]!"47F17N4Nl x to -.—Continuous and 5-level stepped

@:$6&=PF1%F7%$&!$3"6L?&&
100 )/ internal, u s e r
User Available Memory: ABB!M_!17F8379;D!N<83P
Annotation:
=99"4F41"9?&&

)8[F!97:!9334?!4Q83;9SText and arrow overlays and custom logos

Articulation Controls:
=641<>%F41"9&/"946"%:?&&

-IBC!*;;PW9S`!360° All-Way® steering, s t e e r - a n d

AF3;&/"946"%?&&
Lamp Control:

#7>#EED!087NP247F34;;8:!
On/Off, menu-controlled

."M4QF6$&@;#F4$:?&&
Software Updates:

%18;:!N5H39:89U;8!Q19!3804Q9U;8!08:19!
Field upgradeable via removable media

-$3;$6F4>6$&KF6919D?&
Temperature Warning:

&7F8H39F8:!290839!97:!U9<8!N71F!F805839FN38!?93717H!Integrated camera and base unit temperature warning systems

N0N&Q61419D?&
DVD writing:

'X']GD!'X'PGD!DVD+R, D V D
9N:14!389;PF108!38243:17H!
audio real-time recording

CONFIDENTIAL
"#$%&'($)&*+!!
"#$%&'($)&*+!

4

,

elaman

# ./!&01#$"&2$3"4$&56"7$&89:
s $ % Video Remote Probe Inspection
-./!&01#$"&2$3"4$&56"7$&89:;$<41"9
;$<41"9
$<41"9
-./!&01#$"&2$3"4$&56"7$&89:;
-./!&01#$"&2$3"4$&56"7$&89:

!

Model 7514-2
!"#$%&'()*+,

MEASUREMENT
!=>[email protected]&
supported Measurement Features
-.//01234!5367.138392!%362.137!
sh

Feature
Length/Distance
Depth
Point-to-Line
Non-perpendicular Length
Area
Multi-segment Length
CIrcle Gauge
35 Zoom Windows
5 Measurements per Image

stereoProbe°




















Comparison









!

OPTICAL !I"
A5-8/>B&-85.&
Tip View (DOVI T i p Color * i d of View n u t . D . p U i of mid +,f I

Standard Tips
FORWARD
FORWARD
FORWARD
FORWARD
FORWARD
FORWARD
FORWARD
FORWARD
SIDE
SIDE
SIDE
SIDE
SIDE
SIDE
SIDE
SIDE

NONE
NONE

90'

WUITE !
BLACK •
NONE
YELLcW
GOLD
BLACK •
GROWN •
ER':WN •
GREEN •
ELUE •

6 - 8 0 m m

10.24-3.15 in)

120' 5 - 2 0 0 mrn (020-7.97 in.)
90' 4 - 8 0 m m 10.16-3.15 inn

BLUE

120' 4 - 2 0 0 ' % ( l Q l ) - 7 . 9 7 i % 3



sIDE

$t)')t
)') ."'(b)
)')t

WHITE 0
BLUE •

5 0 '
5 0 '

60 /60
50

SIDE

BLACK •
BLUE •

SIDE
SIDE

ELLIE •
ELIJE •

60'l60
50750
50

FORWARD
FORWARD

60'/60

4-8:1mm 10.16-3.15 in.)
5-45mm 10.20-1.77 in.)
4_5: mn, 0.16-1.97 in.)
2-50mm 0.09-1.97 in.)
4-45mm 10.16-1.77 inj
4- SC mm 0.16-1.97 in.)

mm Optical Tip p o r t

))LG.-SO
*LG.()

* .(R412!
*LG
R412 FN
R412!

F*(4805G

*LG.("44!SF"
))4G#
#IISG
* .()412
*LG
.()412!
412!SN
!SN
77.-/615!
615!FG
!FG
'#LG.(/
LG.(/615
.(/615!
615!SG
!SG

1 2 - 3 0 rnm (047-1.18 inn
7 - 2 4 min (0.28-0.94 in.'

BLACK •
BLACK •

FORWARD

L i

)
s h & d " ' ( b ) ® Measurement Tips
FORWARD

'#LG.-6I5
.-6I5!
.-6I5
6I5!FF
'#LG
#LG3361SC'RI
9LG3-61
9LG3-61 12!
12!FG
!FG

40'
2 5 0
mm 19.84 int-infinity
20'
5 0 0
mrs i 19.69 i%.l-)It"%it9
90' 2 5 - 5 0 : 1 m m 10.98-19.68 int

GREEN •



""#GV$
""#GV
GV$J
$J •

F*(48
F*(
*(48#
48#FG

50' 5 0 m m 11.97 n f i n i t y
50' 1 2 - 2 0 0 mm 10.47-727 in.!
120' 5 - 1 2 0 mm1020-4.72in.!

50' 4 5 m m i1.77 in. i-i %%it9
50' 9 - 1 6 0 mm10.&5-6.&0 inn
120' 4 - 1 0 0 mrs 10.16-3.94 int
90' 1 - 2 0 mm 0.04-0.79 inn
40' 2 5 0 m m 19.84 i n f i n i t
90' 2 5 - 5 0 : 1 m m 10.98-19.68 in I

RED

3.9mm Optical TT- Portl 6 1 non Optical Tip Purtl

6I6
6I6!"0
F
+#(,45050F0

Fl
'#LG.(,61505!
61505!SG
61505!
!SG

* .(/846!
*LG
846!6
846!
!6!
6!FG

LG.(/246060sG
.(/2
.(/246060sG

!

!
:%#;!<7!7/3=<><34!4<[email protected]@AB!
*FOV is specified diagonaHy.
::&94<=6237!27!C<2D!86E<8.8!F1**I
!
!

CONFIDENTIAL
"#$%&'($)&*+!!
"#$%&'($)&*+!

,5

elaman

!

Marking
Kit 2- &3"4$+1&51-6,$+7&8%%9:-.*1"+
Covert stickers Illuminator M o d!"#$%&'()(
e l 7515
!*+,-./&0-1&2&3"4$+1&51-6,$+7&8%%9:-.*1"+
/&0-1&
&0-1&
&0-1&2
!*+,-./
!*+,-.
!

A thin gauge ultra destruct acetate with similar tamper
evident properties to the type C vinyl.
*!-./0!12314!35-62!748-639-!294-2-4!:/-.!8/;/526!-2
;<46!4=/740-!<6><46-/48!->!-.4!-?<4!"!=/[email protected]!
*!-./0!12314!35-62!748-639-!294-2-4!:/-.!8/;/526!-2;<46!4=/740-!<6><46-/48!->!-.4!-?<4!"!=/[email protected]!
This is
)./8!
/8! a2!cleat
9542-! material,
;2-46/25A!suitable
83/-2B54! for
C>6! covert
9>=46-! application
2<<5/92-/>0! and
207! has
.28! a2! permanent
<46;2040-! acrylic
296?5/9! based
B2847!
adhesive for
f
27.48/=4!
C>6! use
384! on
>0! any
20?! smooth,
8;>>-.A! non
0>0! porous
<>6>38! surface
836C294! especially
836C294!
48<49/255?! glass
15288! and
207! most
;>8-! forms
C>6;8! o
>C!
plastic
<528-/9!
Invariably printed with UV (invisible) test or design which can be detected by using a UV light
&0=26/2B5?!<6/0-47!:/-.!DE!F/0=/8/B54G!-48-!>6!748/10!:./9.!920!B4!74-49-47!B?!38/01!2!DE!5/1.-!
source
8>3694!
!

!"#L$ LAYOUTS
5;!<=>&=;[email protected]&
!

!

%
%ss

!

%
%ss
!

!!s

!

!

CONFIDENTIAL
"#$%&'($)&*+!!
"#$%&'($)&*+!

1

,

ela!nan t o l ) !
!

Model 7516
!"#$%&'()*

O,-./0%&1$02/3&4.-&
Optical
ptical
search Kit
+,-./0%&1$02/3&4.-&
-./0%&1$02/3&4.-&
+,
+

The Optical
)-.!
#/01234!search
5.362-!Toolkit
)774810! is
19! the
0-.! budget
:;<=.0! alternative
340.6>301?.! accessory
[email protected]! kit
810! to
07! enable
.>3:4.! a3! thorough
0-767;=-! and
3>effective physical search. For use in validating information
provided with other equipment, such
.AA.201?.!/[email protected]!9.362-B!%76!;9.!1>!?341<301>=!1>
.AA.201?.!/[email protected]!9.362-B!%76!;9.!1>!?341<301>=!1>A76C3017>!/67?10F!9;2-!
A76C3017>!/67?10F!9;2-!
as the
39!
0-.!NLJD,
$+G'F!the
0-.!Optical
#/01234!Search
5.362-!Toolkit
)774810! is
19!ideal
1A76! searching
9.362-1>=! hard
-3607! reach
6.32-! and
3>1>322.991:4.!
areas.
36.39B!

!
!
)-.!
1>24;?1.D1>=! endoscope
.><7927/.! f A76!
9.362-1>=!
The k810!
i t includes
i d e viewing
o r searching
1>322.991:4.!
36.39! (for
HA76! example,
.I3C/4.F! wall
D344!cavities,
23?101.9F! crawl
263D4! spaces,
9/32.9F!
inaccessible areas
?.>0143017>!
:.-1><39-:736<9J!
0-67;=-!
3!
=3/!
7A!
,KCC!
ventilation ducts, behind dashboards) through a gap of 10mm
HKBL!
1>J! in
1>!diameter.
<13C.0.6B! !A*! l,KM!
-347=.>! lamp
43C/! on
7>! the
0-.! tip
01/! o7A!
0-.!
(0.4 in)
O W halogen
f the
.><7927/.!
/67?1:61=-0! illumination
144;C1>3017>!and
3>.>3:4.9! inspections
1>9/.2017>9!
endoscope provides
07!
:.!made
C37?.6!distances
<1903>2.9! of
7A! up
;/! to
07!1,BNC!
HNA0JB! P
! O7D.6!
A76! the
0-.!
to be
.5m (Sft).
o w e r for
.><7927/.!
19!supplied
9;//41.A67C! a3!secondary
9.27><[email protected]! power
/7D.6! socket
9728.0! in
1>! the
0-.!
endoscope is
A4;76.92.>0!-3><43C/!1>24;!0-.!810B!
fluorescent handlamp included in the kit.
5.362-!
C16676! equipment
.E;1/C.>0! includes
1>24;47>=! telescopic
0.4.927/12! arm
36C! that
0-30!
Search mirror
.I0.><9!
07!
,NKKCC!
HNP1>BJ!
A76!
1>9/.201>=!
1>322.991:4.!
36.39!
1>!
extends to 1 500mm (59in.) for inspecting inaccessible areas in
:;14<1>=9F!3>=0-!C71!:.!A100.:;14<1>=9F!3>=0-!C7!:.!A100.buildings, and a short fixed length model which is ideal for room searches. B o t h can be fitted
D10-!0-.!63>=.!7A!1>0.62-3>=.3:4.!C166769!9;//41.with the range of interchangeable mirrors supplied.
)-.!810!3497!27>031>9!3!A4;76.92.>0!-3><43C/!07!/67?1=!41=-0!3>The kit also contains a fluorescent handlamp to provide a wide area working light and two right
3>=4.!A439-41=-09!D10-!:.40!241/9B!
angle flashlights with belt clips.
*
*!
9.4.2017>! o7A!
C1>130;6.!mirrors
C166769! and
3>41=-0! probes
/67:.9! and
3>144;C1>30.C3=>1A1.69! are
36.! included
1>24;07!
A!selection
f miniature
399190!1>!0-.!1>0.6>34!1>9/.2017>!7A!-3632-!36.39B!!R16676!91S.9!63>=.!A67C!LBN!07!TLCC!1>!
399190!1>!0-.!1>0.6>34!1>9/.2017>!7A!-36=.!A67C!LBN!07!TLCC!1>!
assist in the internal inspection of hard to reach areas. Mirror sizes range from 4.5 to 64mm in
diameter.
<13C.0.6B!
!

CONFIDENTIAL
"#$%&'($)&*+!
"#$%&'($)&*+!!

1

,

!
!

Model 7516
!"#$%&'()*

O,-./0%&1$02/3&4.-&
Optical
ptical
search Kit
+,-./0%&1$02/3&4.-&
-./0%&1$02/3&4.-&
+,
+
sPECIFICATIONS
15678987:;8+<1&
Kit contents
4.-&/"=-$=->&

Inventory & specifications
8=?$=-"[email protected]&A&1,$/.B./0-."=>&

Flash light
%-./0!-1203!

Right angle 2 C
41203!.52-6!,!"786--!9,!:6;!<13=!

Handlamp
>[email protected]:!

Fluorescent, 12 W, socket for endoscope
%-AB;6/8653C!D,!EC!/B8<63!FB;!65?B/8B:6!

Endoscope
(5?B/8B:6!

lOw lamp,
DGH!
[email protected]:C! 9.65mm
[email protected]@! (0.38in)
9GJMN15=!! diameter,
9GJMN15=
[email protected];C! 350mm
[email protected]@! (13,8n),
9DMCN15=C! side
/1?6!
viewing (90B!3B!/0.F3=!
O16H152!9IG

P1;;B;!.;@!H130!F-./0-1203!
Mirror arm with f?ashHght

[email protected]@!9DIJQ!15=C!RL
500mm (19.7 in), [email protected];;B;!.52-6C!,!'786--!
mirror angle, 2 0-cell

lviii jUl d l i i i
P1;;B;!.;@!

)6-6/8B:[email protected]@!9LI15=
)6-6/8B:[email protected]@!9LI15=!B:[email protected]@!9DLJM15=!8-B/6?!
I t i t ! U F J l ! , I O U U i I I i I i " l # I ) !B:[email protected]@!9DLJM15=!8-B/6?!
"iJt$I, ' U # I I # I I k I ".'l#I) % l U & "

Mirror
P1;;B;!

[email protected]@[email protected];C!2-.//C!8B5O6SC!D,Q2!9RJRNBT=!9M!:6;!<13=!
[email protected]@[email protected];C!2-.//C!
140mm (5.5in) diameter, glass, 8B5O6SC!D,Q2!9RJRNBT=!9M!:6;!<13=!
convex, 127g (4.480z) (3 per kit)

Mirror
P1;;B;!

[email protected]@!9,[email protected];C!2-.//C!:-.5BC!M,2!9DJD,BT=!9,!:6;!U13=!
64mm (2.5in) diameter, glass, piano, 32g (1.120z) (2 per Kit)

Mirror
P1;;B;!

[email protected]@!9,JLSRJL!15=C!2-.//C!:-.5BC!KN2!9,JRBT=!9D!:6;!<13=!
64x114mm (2.5x4.5 in), glass, piano, 68g (2.40z) (1 per kit)

I #'#'.

V.336;W!>.5?-6!
Battery Handle

,"786--!9,!:6;!<13=!
2C-cell (2 per kit)

!

!

- .

I

I

$

)06!FB--BH152!-1203!:;BX6!F13!306!X.336;W!0.5?-6!
The following light probe fit the battery handle
[email protected]:!0B-?6;!
Lamp holder

"B5O6;3/!X.336;W!0.5?-6!3B!3B;80!
Converts battery handle to torch

P.251F16;!
Magnifier

[email protected]:!
x8 with lamp

+1203!:;BX6!
Light probe

,@@[email protected];[email protected]@!9LJI!15=!-65230!
2mm 0.08in) diameter, 150mm (5.9 in) length

Mirror sleeve
P1;;B;!/-66O6!

[email protected]@[email protected];[email protected];;B;C!F13/!-1203!:;BX6!+Y,ZDLG!
4.5mm (0.18in) diameter, mirror, fits light probe l_P2/150

+1203!:;BX6!
Light probe

[email protected]@!9GJD,[email protected];[email protected]@!9DJIQ15=!-65230!
3mm (0.121n) diameter, 50mm (1 .97n) length

Mirror sleeve
P1;;B;!/-66O6!

[email protected]@[email protected];[email protected];;B;C!F13/!-1203!:;BX6!+YMZLG!
9.5mm (0.37in) diameter, mirror, fits light probe LP3/50

+1203!:;BX6!
Light probe

[email protected]@!9GJD,[email protected];C!,[email protected]@!9QJI15=!-65230!
3mm (0.12in) diameter, 200mm (7.9in) length

Mirror sleeve
P1;;B;!/-66O6!

[email protected]@[email protected];[email protected];;B;C!F13/!-1203!:;BX6!+YMZ,GG!
9.5mm (0.37in) diameter, mirror, fits light probe LP3/200

+1203!:;BX6!
Light probe

[email protected]@[email protected];C!,[email protected]@!9DG15=!-65230C!;1203!.52-6?C!;121?!
8mm (0.3in) diameter, 254mm (lOin) length, right angled, rigid

+1203!:;BX6!
Light probe

[email protected]@[email protected];[email protected]@!9DRJIK15=!-65230C!/3;.1203C!;121?!
14mm (0.55in) diameter, 380mm (14.96in) length, straight, rigid

+1203!:;BX6!
Light probe

[email protected]@[email protected];[email protected]@!9DRJIK15=!-65230C!F-6S!.5?!/3.W!
14mm (0.55in) diameter, 380mm (14.96in) length, flex and stay

+1203!:;BX6!
Light probe

[email protected]@[email protected];[email protected]@!9DRJIK15=!-65230C!/.F63WC!.8;W-18!
14mm (0.55in) diameter, 380mm (14.96in) length, safety, acrylic

!

!

"-1:[email protected];;B;/!.5?!.886//B;16/[email protected]@[email protected];!-1203!:;BX6/!
Clip-on mirrors and accessories to fit 14mm diameter light probes

Extension
(S365/1B5!

[email protected]@!9DRJIK15=!-65230C!/3;.1203!
380mm (14.961n) length, straight

Extension
(S365/1B5!

[email protected]@!9DRJIK15=!-65230C!.52-6?!
380mm (14.96in) length, angled

Mirror
P1;;B;!

[email protected]@!9,[email protected];C!.?[A/3.X-6!X.--!\!/B8<63![B153!
64mm (2.5in) diameter, adjustable ball & socket joint

Mirror
P1;;B;!

[email protected]@[email protected];C!.?[A/3.X-6!X.--!\!/B8<63![B153!
380mm (1 Sin) diameter, adjustable ball & socket joint

468BO6;[email protected]!
Recoveryy magnet

!

!
!

CONFIDENTIAL
"#$%&'($)&*+!
"#$%&'($)&*+!!

,2

!
!

Video & Audio RF Detection system
,-#$"&.&/0#-"&12&3$4$54-"6&7894$:
894$:
94$:
,-#$"&.&/0#-"&12&3$4$54-"6&78
,-#$"&.&/0#-"&12&3$4$54-"6&7

M o d !"#$%&'()'*+)
e l 7517-01

SPECTRUM
7;<=>1?!&&
The RE
Intermediate Field
!"#
$% &'(#)*#+,-(#
%,#.+ Component
/0*10'#'(!!
/0*10'#'(!!

This i ./!
s a0!portable
o r radio
)-./!
12340567! system
/8/479! f:23!
30;.2! frequency
:37<=7>?8! surveillance
/[email protected]>?7!
analysis. A*/!
s an
t can
0>068/./A!
0>!Intermediate
&>47397;.047! Held
%.76;! Counter
"2=>473! Measure
B70/=37! I.4!
?0>!
monitor an
f several
t a0! time.
t i./!
s easily
92>.423!
0>!area
0370! o2:!
/[email protected]! rooms
3229/! a04!
4.97A! I! &4!
70/.68!
132C30990567D!
37/=64/! stored
/4237;! f:23!
3717047;! and
0>;! future
:=4=37!
programmable, wE.4-!
i t h results
o r repeated
01130./06D!
E.4-! a0!full
:=66!A*F!
371234! printout
13.>42=4! of
2:! text
47G4! and
0>;!graphical
C301-.?06!
appraisal, with
4 report
display in line or bar. A novice user with a modest background
;./1608!.>!6.>7!23!503A!*!>[email protected]?7!=/73!E.4-!0!92;7/4!50?HC32=>;!
in radio scanning can have the unit operational in 30 minutes to
.>!30;.2!/?0>>.>C!?0>[email protected]!4-7!=>.4!217304.2>06!.>!IJ!9.>=47/!42!
132;=?7!0!:=668!;2?=97>47;!137;74739.>7;!/?0>A!
produce a fully documented predetermined scan.
This is NOT to be confused with Near Field, one room at a
>@-9&-9&AB>&4"&C$&5"6D09$#&[email protected]&A$FG&2-$%#H&"6$&G"":&F4&F&
4-:$&$I0-J:$64&
time equipment
)-./!./!301.;!;7162897>4!/17?43=9!0>068/./D!E.4-!0;;.4.2>06!K17?43=9!*>068L73!:=>?4.2>/A!!&4!?0>!
This is rapid deployment spectrum analysis, with additional spectrum Analyzer functions. I t can
370;.68!.;7>4.:8!?60>;7/4.>7!430>/9.//.2>/!.>?6=;.>C!K1370;!K17?43=9!;[email protected]?7/D!0>;!;./[email protected];72!
readily identify clandestine transmissions including Spread spectrum devices, and display video
430>/9.//.2>D!M1.?4=37!.>!1.?4=37N!;./1608A!
transmission, "picture in picture" display.

SYSTEM COMPONENTS
7K7>7&
%=668!/76:O?2>40.>7;!=>.4D!5044738P90.>/!217304.2>!
• Fully
self-contained unit, battery/mains operation
Q.>;2E/!K2:4E037!132:7//.2>0668!;7/.C>7;!:23!(67?432>.?!"2=>473!B70/=37/!
• Windows Software professionally designed for Electronic Counter Measures

OPERATING FEATURES
B;<1/>LAM&2>?1<7&
)-7!R.;72!"014=37!/8/479!0662E/!4-7!21730423!42!7/4056./-!4-7!4817!2:[email protected];72!430>/9.//.2>A!)-7!
)-7!R.;72!"014=37!/8/479!0662E/!4-7!21730423!42
The Video Capture system allows the operator to!7/4056./-!4-7!4817!2:[email protected];72!430>/9.//.2>A!)-7!
establish the type of video transmission. The
0?4=06!
@.;72!
.90C7!
./!
;./16087;D!
1.?4=37!
.>!
1.?4
1.?4=37D!
=37D!
2>! the
4-7! Laptop
+01421! screen,
/?377>D! and
0>;! can
?0>! be
57! stored,
/4237;D!
actual video image is displayed, picture in picture, on
/[email protected];!0>;!3716087;A!
saved and replayed.
B0.>/!0>;!+.>7!92>.423.>C!:23!?0567P47671-2>7!6.>7A!
Mains and Line monitoring for cable/telephone line.

SOFTWARE FACILITIESINCLUDE:
7B2>N/1L<7&LA=O?3

*=42904.?0668!/[email protected]/!70?-!/?0>S!2>[email protected]!/?0>D!23!2>[email protected]!-2=3D!:23!0>!=>0447>;7;!
*=42904.?0668!/[email protected]/!70?-!/?0>S!2>[email protected]!
/?0>D!23!2>[email protected]!-2=3D!:23!0>!=>0447>;7;!
• Automatically
saves each scan; once every scan,
or once every hour, for an unattended
217304.2>!
operation
T2=4.>768!?291037/!:.67/!:23!0;;.4.2>/!0>;!29.//.2>/!
• Routinely
compares files for additions and omissions
U2//.567!)-3704!92;7!:23!?2>4.>=2=/!=>0447>;7;!217304.2>D!E.4-!06039!
• Possible
Threat mode for continuous unattended operation, with alarm
• Manual
tune mode
B0>=06!4=>7!92;7!
K17?43=9!0>068L73!92;7!
• Spectrum
analyzer mode

SPECIFICATIONS
7;<=L2L=/>LBA7&&








!

%37<=7>?8!T0>C7!,J!VWL!42!IAJXWL!
Frequency
Range 10 KHz to 3.0!"z
&>473>06!37?-03C70567!5044738!
Internal
rechargeable battery
HW.C-!K177;!K?0>>.>C!
i g h Speed Scanning
R.;72!.>473137404.2>!0>;!;./1608!
Vi d e o interpretation and display
MB0.>/!0>;!6.>7P?0567!92>.423.>C!
a i n s and line/cable monitoring
A*F!13.>4!2=4!
4 print out
MU2//.567!)-3704N!E03>.>C!:704=37/!
"Possible Threat" warning features
A*=42!/[email protected]!:23!=>0447>;7;!T%!/17?43=9!4.97!132:.6.>C!
u t o save for unattended BF spectrum time profiling

CONFIDENTIAL
"#$%&'($)&*+!
"#$%&'($)&*+!!

,

!
!

Advanced Video & Audio RF
Detection system M!"#$%&'()'*+,
o d e l 7517-02
-#./01$#&23#$"&4&-5#3"&67&8$9$193"0&:;<9$=&
-#./01$#&23#$"&4&-5#3"&
67&8$9$193"0&:;<9$=&

!"#$RU%
:>[email protected]!&

!"#
*+ +',
/0120(#(3!
The $%&'()#%
Advanced RF
Far +-#.%
Field /0120(#(3
Component
)-./!
./! a0!portable
12340567! system
/8/479! for
:23! radio
30;.2! frequency
:37<=7>?8! surveillance
/[email protected]>?7! analysis.
0>068/./A! A
! */!
%03! Field
%.76;! Counter
"2=>473!
This is
s a0! Far
B70/=37!
?0>!monitor
92>.423! a0!large
603C7!area
0370! of
2:! many
90>8! rooms
3229/!
3229/!
/! or
23! can
?0>!target
403C74! one
2>7! at
04! a
0! time.
4.97A! !I&4!
70/.68!
Measure it.4!can
t ./!
is easily
132C30990567D!
E.4-!
37/=64/!
/4237;!
:23!
3717047;!
0>;!
:=4=37!
01130./06D!
E.4-!
0!
:=66!
*F!
371234!
programmable, with results stored for repeated and future appraisal, with a full A 4 report
13.>42=4!2:!47G4!0>;!C301-.?06!;./1608!.>!6.>7!23!503A!*!>[email protected]?7!=/73!E.4-!0!92;7/4!50?HC32=>;!.>!
printout of text and graphical display in line or bar. A novice user with a modest background in
30;.2!
/?0>>.>C!can
?0>!have
[email protected]! the
4-7! unit
=>.4! operational
217304.2>06! in
.>! 30
IJ! minutes
9.>=47/! to
42! produce
132;=?7! a0! fully
:=668! documented
;2?=97>47;!
radio scanning
137;74739.>7;!/?0>A!
predetermined scan.
AC3AC3$%#J&"0$&I""=&/9&/&93=$&$K53L=$09M&
This is NOT to be confused with Near Field,
one room at a time equipment.
)-./!
./!a0!professional,
132:7//.2>06D!highly
-.C-68! disciplined
;./?.16.>7;!spectrum
/17?43=9!analysis,
0>068/./D! with
E.4-! additional
0;;.4.2>06! spectrum
K17?43=9!Analyzer
*>068L73!
This is
:=>?4.2>/A!!&4!?0>!370;.68!.;7>4.:8!?60>;7/4.>7!430>/9.//.2>/!.>?6=;.>C!K1370;!K17?43=9!;[email protected]?7/D!
functions. I t can readily identify clandestine transmissions including Spread Spectrum devices,
0>;!;./[email protected];72!430>/9.//.2>/A!
and display video transmissions.

SYSTEM COMPONENTS
:N:A?!&@E!>ED?DA:&
• T)-7!B2;76!MN,MOJP!K=173!Q.;7!R0>;!*[email protected]!*>47>>0!!
h e Model 7517-02 Super Wide Band Active Antenna
B2;76!7517-02
MN,MOJP!receiver
[email protected]! unit,
=>.4D! n>2E!
E.4-! extended
7G47>;7;! frequency
:37<=7>?8! range
30>C7! 42!
TULD! and
0>;!
• T)-7!
h e Model
o w with
to S!
6 CHz,
.>?6=;7/!0>47>>0!/E.4?-.>C!0>;[email protected];72!0>068/./!
includes antenna switching and video analysis
• E("B!Q.>;2E/!/2:4E037!132:7//.2>0668!;7/.C>7;!:23!(67?432>.?!"2=>473!B70/=37/!
C M Windows software professionally designed for Electronic Counter Measures
U%!/=173!?2910?4!0>47>>0!!
• H F super compact antenna
• VV+%!B0.>/W47671-2>7!6.>7W?0567!.>473:0?7!
L F Mains/telephone line/cable interface
X=CC7;!430>/1234!?0/7!
• Rugged
transport case

OPERATING FEATURES
E>?6-AODP&7?-AB6?:&
)-7!V.;72!"014=37!/8/479!0662E/!4-7!21730423!42!7/4056./-!4-7!4817!2:[email protected];72!430>/9.//.2>D!*BD!
)-7!V.;72!"014=37!/8/479!0662E/!4-7!21730423!42
The Video Capture system allows the operator to!7/4056./-!4-7!4817!2:[email protected];72!430>/9.//.2>D!*BD!
establish the type of video transmission, AM,
%B!
23!inverted
.>@7347;!FM
%B!with
E.4-!switchable
/E.4?-0567!de-emphasis.
;7O791-0/./A!The
;7O791-0/./A!
)-7! actual
0?4=06!video
@.;72! image
.90C7! is
./! displayed
;./16087;! on
2>! the
4-7!
FM or
601421D!Y1.?4=37!.>!1.?4=37ZD!0>;!?0>!57!/4237;!0>;!3716087;A!
laptop, "picture in picture", and can be stored and replayed.
B0.>/!
92>.423.>CD!software
/2:4E037! controlled,
?2>432667;D!allowing
0662E.>C! L+! -O! N,
$D! L+!—
[! E,
(D! N
$!—
[! E
(! and
0>;! auxiliary
0=G.6.038! earth
7034-!
Mains monitoring,
92>.423.>CA!
monitoring.
+.>7!92>.423.>C!:23!?0567W47671-2>7!6.>7A!
Line monitoring for cable/telephone line.

CONFIDENTIAL
"#$%&'($)&*+!
"#$%&'($)&*+!!

1

,

!
!

Advanced Video & Audio RF
Detection system M!"#$%&'()'*+,
o d e l 7517-02
-#./01$#&23#$"&4&-5#3"&67&8$9$193"0&:;<9$=&
-#./01$#&23#$"&4&-5#3"&
67&8$9$193"0&:;<9$=&
SOFTWARE FACILITIESINCLUDE:
:>[email protected]&7-BCDC?CA:&CEBDF8AG&
• F%-..!/01230!4253/2.!26!7530557!89:34;:5<=!>:?02!:530/@/0373:25!75?!?:[email protected]!
u l l remote control of antenna switching, video interpretation and display
scans. T! );:8!
h i s i:8!
s ideal
for 75!
an
• Ta
s k scheduler
o r automatic
f 84758D!
)78B!
84;0?-.0/! f62/!
7-32173:4! sequence
80C-0540! and
75?! save
87>0! o26!
87>0!
:?07.! 62/!
unattended monitoring exercise
-573305?0?!125:32/:5• I &5!F-:.3!?737!F780!62/!?:[email protected]!26!6/0C-054A!F75?!7..2473:25!
built data base for display of frequency band allocation
&n5!F-:.3!?737!F780!62/!?:[email protected]!26!6/0C-054A!F75?!7..2473:25!
• Routinely
compares files for additions and omissions
G2-3:[email protected]/08!6:.08!62/!7??:3:258!75?!21:88:258!
• Possible
Threat Mode for continuous unattended operation, with alarm
H288:F.0!);/073!I2?0!62/!4253:[email protected]/73:25=!9:3;!7.7/1!
• Manual
tune Mode
I75-7.!3-50!I2?0!

[email protected]/-1!*57.AK0/!I2?0!
• Spectrum
Analyzer Mode

SPECIFICATIONS
:HABC7CB-?C>E:&&









F%/0C-054A!G75<0!LM!NOK!!32!P!QOK!
requency
HO:i g h speed Scanning
ViR:?02!:530/@/0373:[email protected]:43-/0!:[email protected]:43-/0T!?:[email protected]!
d e o interpretation and "picture in picture" display
*?>7540?!17:58!75?!.:50U47F.0!125:32/:5Advanced
mains and line/cable monitoring
A*[email protected]/:53!2-3!
4 print out
SH288:F.0!);/073T!97/5:5"Possible
Threat" warning features
O#@3:25!62/!/01230!4253/2.!
p t i o n for remote control
R0;:4.0!:5837..73:[email protected]:25!9:3;!42>0/3!75305578!
Vehicle
installation option with covert antennas

FURTHER SYSTEM DETAILS
7F6?IA6&:J:?A!&8A?-CD:&
);0/0!
7/0! three
3;/00!primary
@/:17/A! components:
[email protected]! T
! );0!
G040:>0/=! the
G040:>0/=!
3;0! Antenna,
*530557=! and
75?! the
3;0! software.
J26397/0D! T
! );0!
There are
h e Receiver,
he
8A8301!:8!;2-80?!:5!7!8:50/A!/-<<0?=!3/[email protected]/3!4780D!
system is housed in a single, very rugged, transport case.

THE RECEIVER
?IA&6ABAC2A6&
);:8!
:8!an
75!upgrade
[email protected]?0! from
6/21! the
3;0!previous
@/0>:2-8! system,
8A8301=!and
75?! can
475! be
F0! seen,
8005=! bottom
F23321! left,
.063=! o26!
3;0! picture
@:43-/0!
This is
f the
2>0/.076D!
&3!has
;78!an
75!extended
0E305?0?!frequency
6/0C-054A! range
/75<0! to
32! 6
P!GHz.
QOKD! !I &5!
7??:3:25=!video
>:?02! is
:8! displayed
?:[email protected]?! on
25! the
3;0!
overleaf. It
n addition,
[email protected]@!84/005=!75?!475!F0!87>0?!75?!/[email protected]?!73!7!.730/!?730D!!);0/0!:8!3;[email protected]:25!26!7!80425?!
Laptop screen, and can be saved and replayed at a later date. There is the option of a second
>:?02!125:32/!:6!/0C-:/0?D!
video monitor if required.

THE ANTENNA
?IA&-E?AEE-&&
);:8!
:8!the
3;0!Model
I2?0.!751
XYLXZM,=!
75!active
743:>0! version
>0/8:25! of
26! our
2-/! long
.258375?:5I2?0.! 751
XYLXZML=!
75?! has
;78! an
75!
This is
7-02, an
7-01, and
0E3/010.A!9:?0!6/0C-054A!/[email protected]=!0C-7
0E3/010.A!9:?0!6/0C-054A!/[email protected]=!0C-73:53:5extremely wide frequency response, equating to a dipole from 25 MHz to 9 G
&3!;78!7!F071!9:?3;!26!L,M!?0008=!6/253!75?!F74B=!4:/4-.7/[email protected]/:K0?D!
It has a beam width of 120 degrees, front and back, circularly Polarized.

CONFIDENTIAL
"#$%&'($)&*+!
"#$%&'($)&*+!!

2

,

!
!

Advanced Video & Audio RF
Detection system M!"#$%&'()'*+,
o d e l 7517-02
-#./01$#&23#$"&4&-5#3"&67&8$9$193"0&:;<9$=&
-#./01$#&23#$"&4&-5#3"&
67&8$9$193"0&:;<9$=&
THES O F!
!WAR
WAR"
>[email protected]&:A7>[email protected]&
The software
to Identify
)-.!
/012345.!is
6/!subject
/789.:2! to
20!ongoing
0;<06;=.>[email protected];2! and
4;=! now
;03! includes
6;:?7=./! a
4! Database
'42484/.! 20!
6=.;261B! and
4;=!
display the type of transmission intercepted. Personalized notes can be added to the data.
=6/@[email protected]!01!254;/A6//60;!6;2.5:[email protected]=C!!D.5/0;4?6E.=!;02./!:4;!8.!4==.=!20!2-.!=424C!
A!)4/F!G:-.=7?.5!6/[email protected]>[email protected]!<[email protected][email protected]/0;4??B!:0;16<75.=!/:4;/!20!8.!4720A426:4??B!57;!
Task Scheduler is provided to help group personaHy configured scans to be automaticaHy run
*
*!)4/F!G:-.=7?.5!6/[email protected]>[email protected]!<[email protected][email protected]/0;4??B!:0;16<75.=!/:4;/!20!8.!4720A426:4??B!57;!
and saved.
4;=!/4>.=C!
!
*7=60!:4;!8.!/4>[email protected]@!6;!2-.!105A!01!4!H34>I!16?.C!
Audio can be saved to the Laptop in the form of a "wav" file.
!

Picture in Picture
D6:275.!6;!D6:275.!
J6=.0!:[email protected]!
Video capture

Scan
G:4;!
'6/@?4B
Display

Manual tune
K4;74?!27;.!

%5.L7.;:B!
Frequency
Select
G.?.:2!

!
!

WB2004A Typical Sensitivity improvement over a Dipole
K0=.?!MNOMPQR!)[email protected]:4?!G.;/626>62B!&[email protected]>.A.;2!0>.5!4!'[email protected]?.!
Model 7517-02
Typical sensitivity Improvement over a Dipole
Initial Measurements subject to confirmation
&;6264?!K.4/75.A.;2/!/789
&;6264?!K.4/75.A.;2/!/789.:2!20!"0;165A4260;!
.:2!20!"0;165A4260;!
Initial Measurements subject
to Confirmation

-

Improved sensitivity (dB) (10 dB is approx 3 times detection
range)

25.00
25.00

!

20.00
20.00

4

15.00
15.00

10.00
10.00

I

5.00

5 . 0 0

m

0.00
0.00

-5.00
5.00

-10.00
-

-15.00
10

00

1000

100

1000
Frequency (MHz)

CONFIDENTIAL
"#$%&'($)&*+!
"#$%&'($)&*+!!

1

0

0

0

010000

!

,#

!
!

Omni spectral Correlator
+./0&,1$2345%&-"44$%53"4&

M

o

d

e !"#$%&'()*&+,l
7518 o s c

HIGH-SENSITIVITY SPECTRUM ANALYZER
67869,:;,7<7=7<>&,?:-D:@&
1 P h./0123!+45623!7892:!;2<2:43=>[email protected]=A2:!
a s e d Locked super Heterodyne Spectrum Analyzer
,2. Frequency
B%:2C82>5=! Range:
D0>E2F!10khz
,G6/A! To
)4! 3ghz
HE/A! (10khz
I,G6/A! To
)4! 21ghz
B,E/A! With
JK! Optional
#[email protected]! Microwave
LK5:4M0N2! Down
'4M>!
Converter)
"4>N2:<2:O!
3. Automatically
Selected Antenna Inputs
H*8<4?0<2>>0!&>98<1!
4. Sweeping
If Bandwidths: 250khz, 15khz, And 6khz
P7M229K>E!&Q!R0>3MK31F!BSG6/AT!,S6/AT!*>3!U6/A!
S%:2C82>5=!Spans
790>1!Can
"0>! Be
R2!Programmed
.:4E:0??23! With
JK!Single
7K>[email protected]! Button
R8<<4>! Control
"4>%4:! Rapid
D09K3!Recall
[email protected]@! And
*>3!
5. Frequency
*8<4?0E!
Automatic Searching
The OSCOIR provides user-friendly
controls and a high-quality digital
graphic display.
The OSCOIR is one of the few
Spectrum Analyzers designed
specifically for counter-surveillan
!

BUILT-IN SUITE OF DEMODULATORS
EA7C<97;&,A7AUDIO DEMODULATORS
BAG7+&G:!+GACB1. FMwideband
%L!MK32V0>3!
,2.
F
M narrowband
B- %L!>0::4MV0>3!
3.
A
M wideband
H- *L!MK32V0>3!
4. A*L!>0::4MV0>3!
M narrowband
P5. Sub-carrier
78VW50::K2:!
SU7K>[email protected]!7K32V0>3!
6. Single
Sideband
7.
X- !
VIDEO FORMATS
=7G:+&[email protected]!B,$)7"T!.*+T!7("*L!
1. NT5C,
PAL, 5!"#$
2. A*L!4:!%[email protected]!
M or FM demodulation
BH3. +Y!4:!W!1=>5/:4>[email protected]!
or - synchronization pulse
4. !
PIF BANDWIDTHS
7F&EB;GH7G<6,&

Built-in suite of demodulators and
audio oscilloscope view of signals.

Monitor displays video signals for
protection against covert video
transmitters.

,*83K4F!BSG6;AT!,S6;AT!0>3!U6;A!
1. Audio:
250kHz, 1 5kHz, and 6kHz
2. Video:
10MHz
BZK324F!,GL;A!

PATENTED THREAT LOCATING SYSTEM
?B,)/2!
.0<2><23!Threat
)/:20+450E! System
7=1<2?! uses
8121! sonic
14>K5! ranging
:0>EK>E! and
0>3! triangulation
[email protected]! t<4!
@450<2! the
2!
The Patented
o locate
1?K<<2:!?K5:49/4>2-!
transmitter microphone.
!"#$%&'()*()+%$,$()-%.'*%/*0,%1)%2$)+%#3%'*%'2+#/%$#4*'0%.'*%1)%+)-/+20'()+%5#("%(")%67869:%
This patented system can only be used if an audio signal can be demodulated with the OSCOR.
%

CONFIDENTIAL
"#$%&'($)&*+!
"#$%&'($)&*+!!

1

,

ela&nan t o l ) !
!

Omni spectral Correlator
+./0&,1$2345%&-"44$%53"4&

M

o

d

e !"#$%&'()*&+,l
7518 o s c

To locate 0 digitally demodulated
transmitter, the OSCOR RF locator
probe is utilized.

!

BUILT-IN ANTENNA ARRAY
6789:;8<<=&[email protected]&
1.
-.
2.
,.
F$.
F.
4.
H.
5.
6.
J.

7.
S.

ACTIVE WHIP ANTENNA: 4.56-545718!9:;<=;>[email protected]!?AB;:CD;.!
*")&/(!01&2!*$)($$*3!!
0.5-1 505MHz frequency coverage.
DI5
!"
N
#
ANTENNA:
'&E"#$(!*$)($$*3!!
-5446F444718!9:;<=;>[email protected]!?AB;:CD;.!
1500-3000MHz frequency coverage.
LOOP ANTENNA:
+##2!*$)($$*3!!
-46544G18!9:;<=;>[email protected]!?AB;:CD;.!
10-500kHz frequency coverage.
INFRARED DETECTOR:
&$%I*I('!'()(")#I3!!
FJ4KL!
MCB;N;>DOPQ! of
A9! 850-1070nm
R546-4S4>T!and
C>U!modulation
TAU=NCOVA>! from
9:AT! 10kHz-4G186
360°; wavelengths
5MHz.
5718.!
STATUS INDICATORS:
E)*)WE!&$'&"*)#IE3!!
'[email protected]!OP;!Q;N;?O;U!C>O;>>C.!
Display the selected antenna.
AC VLF:
*"!/+%3!!
Y>AO!QPAM>!V>!XV?O=:;Z!)P;!*"!XAM;:!?A:U!Q;:B;Q!CQ!C!X:A[;!9A:!
(not shown in picture) The AC power cord serves as a probe for
O;QOV>D!9A:!?C::V;:!?=::;>[email protected];!O:C>QTVOO;:Q.!
testing for carrier current type transmitters.
BUILT-IN 20d% PRE-AMP: &TX:AB;Q!:;?;VB;:!Q;>[email protected]!
\W&+)6&$!,4U\!2I(6*723!!
Improves receiver sensitivity.

Patented fold-out antenna panel
automatically selects the proper
antenna. Pre-amp provides maximum
sensitivity for the proper input.
No unreliable cable connections or
mismatched antenna inputs.

!
!

=7:+!=:8-&
AUTOMATIC S E,>=?-A8A R C H I N G , S I,8B<=9&
G N A L D ED>:>-:8+T E C T I O N , S P,E>-:?7!&
E C T R U M T R:?=->&
ACE
=-F78,8:8+&
ACQUIsITION, AND STORAGE
-.
%I&($'+^_!mode
TAU;! stores
QOA:;Q! outside
A=OQVU;! ambient
CT[V;>O!
CT[V;>O! signals
QVD>CNQ! and
C>U! traces
O:C?;Q! prior
X:VA:! OA!
X;:9A:TV>D! a
C!
1. " ]+#*'!
L O A D FRIENDLY"
to performing
QM;;X.!
sweep.
,.
)*I`()! SWEEP
E0((2!AREA
*I(*!SIGNALS
E&`$*+E! are
C:;! easily
;[email protected]! differentiated
UV99;:;>OVCO;U! f9:AT!
CT[V;>O! environment
;>BV:A>T;>O!
2. TARGET
ro m ambient
]%:V;>[email protected]!EVD>CNQ_!C>U!]%:V;>[email protected]!):C?;._!
"Friendly signals" and "Friendly Trace."
F.
3. A*++!E&`$*+E!C:;!UCO;Ua!?NCQQV9V;Ua!C>U!QOA:;U!9A:!NCO;:!:;O:V;BCN!C>U!C=OATCOV?!O=>V>D.!
L L SIGNALS are dated, classified, and stored for later retrieval and automatic tuning.
H.
E&`$*+!AND
*$'!TRACE
)I*"(!DATABASES
'*)*\*E(E! can
?C>! b[;!
QOA:;U! f9A:!
NCO;:! comparison
?ATXC:VQA>! and
C>U! analysis
C>[email protected]! tOA!
4. SIGNAL
e stored
o r later
o
U;O;:TV>;!V9!C>@!>;M!QVD>CNQ!PCB;![;;>!V>O:AU=?;U!V>OA!OP;!;>BV:A>T;>O.!
determine if any new signals have been introduced into the environment.

CONFIDENTIAL
"#$%&'($)&*+!
"#$%&'($)&*+!!

2

,

ela$nan „%&
„ :)_!
!

Omni spectral Correlator
+./0&,1$2345%&-"44$%53"4&

M

o

d

e !"#$%&'()*&+,l
7518 o s c

The OSCOR. provides on
solution to rapidly leggin-9 and
classifying the signals of your
environment.
Quick Reference Guide Provides a
single chart that completely defines
the Programming process

!

TRACE ANALYSISFOR RAPID DETECTION OF SOP!IS"#A"ED TRANSMITTERS
678-9&8:8;+7&[email protected]&@969-6=+:&+>&,+?A=,[email protected]&678:,!=6697,&
-.
#/)&0&1('!SWEEP
23((/!TIME
)&0(! FOR
%#4! FAST
%*2)!ANALYSIS:
*$*+52&26! less
7899! than
:;<=! 5
>! seconds
[email protected]=A9! to
:@! complete
[email protected]:8! one
@=8!
1. OPTIMIZED
-.>DEF!C<99.!
1.5G!z pass.
I8L8I8=?8!
8! trace
G.
%4&($'+5!SPECTRUM
2/(")4H0!TRACE
)4*"(!provides
[email protected]! reference
I8L8I8=?8!
:I8! for
[email protected]! comparisons
[email protected]!
2. FRIENDLY
location trace.
[email protected]?,".. PEAK
,.
/(*O!TRACE
)4*"(! MINUS
0&$H2!FRIENDLY
%4&($'+5! TRACE
)4*"(! quickly
PQK?R7S! shows
9;@N9! evidence
8JKA8=?8! [email protected]!
<=<[email protected]! and
<=A! digital
AKMK:<7!
f analog
:I<=9BK::8I9!K=?7QAK=M!LI8PQ8=?S!;@CCK=M!<=A!TQI9:UCtransmitters including frequency hopping and burst/packet transmitters.
V.
)4*"(2!"*$!W(!"#0/*4('[email protected]!4%!B4. TRACES
CAN BE COMPARED for RE mapping of transmission sources within a building.
>.
'()*&+('!TRACE
)4*"(! DATA
'*)*! IS
&2!STORED
2)#4('! using
Q9K=M! 120,000
-GXYXXX! data
[email protected]=:9! across
:;8! Whip
3;KC! High,
EKM;Y!
5. DETAILED
Discone, and MDC antennas.
'[email protected]=8Y!<=A!0'"!<=:8==<9.!
!
Enhanced Trace Analysis provides ability to compare target sweep area traces
to friendly traces, to quickly identify evidence of transmittersi n the target sweep
area lincluding frequency hopping and burst/packet transmitters). Trace and
signal data can be further analyzed or stored on a computer via us # interface,
for future conipansons or RF rnaoping

!
!

AUTOMATIC THREAT CLASSIFICATION
8B6+!86=-&6A7986&-;8,,=>=-86=+:&
-.
*H)#0*)&"*++5!*$*+51(2!2&D$*+2!Q9K=M!1. AUTOMATICALLY
ANALYZES SIGNALS using a patented sound pattern correlator.
"#44(+*)#4!/4#"(22!K9!K=:8MIG.
"#44(+*)#4!/4#"(22!K9!K=:8MI2. CORRELATOR
PROCESS is integrated over :KB8!:@!8=9QI8!?QItime to ensure accurate correlation.
O 5>! is
,". SIGNAL
,.
2&D$*+!THREAT
)E4(*)! LEVEL
+(Z(+!ESTABLISHED
(2)*W+&2E('! ON
#$! A
*! SCALE
2"*+(! FROM
%4#0! 1-!T)#!
K9! based
T<98A! on
@=! the
:;8!
K=:8MIintegrated correlation value.
V.
'&D&)*+!2&D$*[email protected]!9KM=<79!:;4. DIGITAL
SIGNALS or signals that cannot be demodulated or correlated are flagged based on
422&!K=?I8<[email protected]!%IK8=A7S!I8L8I8=?8.!
RSSl increase from Friendly reference.
!

CONFIDENTIAL
"#$%&'($)&*+!
"#$%&'($)&*+!!

"

,

!
!

Omni spectral Correlator
+./0&,1$2345%&-"44$%53"4&
%)14 1 !JN4!' . '

M

o

d

e !"#$%&'()*&+,l
7518 o s c

For signals that are readily
Elernociulatea, the 0SCOReasily
classifies tnreaterting signaIs Signals
that are not readily demodulated are
flagged for manual inspection_

5,
i

t

The PatentedOSCORcot-relator
Provides signal classification by
correlating the demodulated audio
of 0 received signal to the ambient
enyimn ment

!

!

BUILT-IN PRINTER FOR RAPID "#RD$!%I&
6789:;88&@+>&>A=8B&CA>B-+=8?,&
-./012314!560!78!9808.618:!2;Printouts can be generated of:
=>
%[email protected]!AB851.3C!
1. Frequency
spectrum
D>
2 . O#45/EE2452B8!F/8G!
scilloscope View
3. Correlation
Results
H>
"2..8E61/20!I843E14!
,>
A/906E!'6167648!+/41/094!
4. Signal
Database Listings
%[email protected]!AB60!+/41/094!
J>
5. Frequency
span Listings
6. Threat
Location Information
)L.861!+2561/20!&0;2.C61/20!
K>
M>
[email protected]!"20;/93.61/20!
7. System
Configuration
!
)L8!#A"#IN4!73/E1O/0!1L8.C6E!B./018.!B.2P/:84!6!
348.O;./80:[email protected]!QRL61!S23!A88!/4!RL61!S23!T81U!
)L8!#A"#IN4!73/E1O/0!1L8.C6E!B./018.!B.2P/:84!6!348.O;./80:[email protected]!QRL61!S23!A88!/4!RL61!S23!T81U!
The OSCOR's built-in thermalprinter provides a user-friendly
"What You see is What You Get"
C81L2:!2;!9808.61/09!B./012314!2;!/CB2.1601!4G88B!:616>!
method of generating printouts of important sweep data.
!
I:

The !uiFt in pointer a l l o w

make quick Printouts of suspicious
or complete spectrum traces.

!
!

PC INTERFACE AND REMOTE CONTROL OF THE OSCOR
=-&[email protected]?&A?!+:?&-++9&[email protected]&:C?&+,-+>&
)L8!#A"#I!-"!/018.;658!42;1G6.8!B.2P/:84!80L6058:[email protected]/4!56B67/E/1/84!64!G8EE!64!1L8!67/E/[email protected]!
The OSCOR PC interface software provides enhanced analysis capabilities as weH as the ability
12!5.8618!B8.C60801!
!"#$%&':61676484!60:!
!"#$%&':61676484!60:!
12!5.8618!B8.C60801!!"#$%&':61676484!60:!()%*+'B.2;/E84!2;!4G88B!80P/.20C8014!;2.!I%!C6BB/09!
to create permanent signal
databases and ()%*+'
trace B.2;/E84!2;!4G88B!80P/.20C8014!;2.!I%!C6BB/09!
Profiles of sweep environments for RE mapping
60:!;313.8!52CB6./4204>!)L8!42;1G6.8!6E42!B.2P
/:84!B.2;844/206E!.8B2.1!60:!9.6BL!56B67/E/1/84>!
60:!;313.8!52CB6./4204>!)L8!42;1G6.8!6E42!B.2P/:84!B.2;844/206E!.8B2.1!60:!9.6BL!56B67/E/1/84>!
and future comparisons. The software also provides
professional report and graph capabilities.
!
!
!

CONFIDENTIAL
"#$%&'($)&*+!
"#$%&'($)&*+!!

4

,

ldmd"

!

!

Model 7518 o s c
!"#$%&'()*&+,-

Omni spectral Correlator
+./0&,1$2345%&-"44$%53"4&

Software ADVANTAGES:
,"63754$&89:8;<8=>,?&
1. STORE,
UPLOAD, AND DOWNLOAD signaland trace info.
/)#0(1!23+#*'1!*$'!'#4$+#*'!56789:!98;!<=9>[email protected]!
-.
2. PROGRAM
THE OSCOR for automatic operation.
B.
30#C0*D!)E(!#/"#[email protected]=!9F!AH?=9<6A8.!
!. IMPROVED
ER
I.
&D30#J('! CONFIGURABLE
"#$%&C20*K+(! u s2/(0!
PRINTING & REPORTING
INTERFACE.
&$)(0%*"(.!
4. SIGNAL
S S I F I C AT I O N
using
L.
/&C$*+! C L A "+*//&%&"*)$!
F5687!
FREQUENCY
internationalfrequency aHocations.
68=89<6A89:[email protected]=?MF?8>N!9::A>9<6A85.!
ammonia/4
5. CUSTOMIZABLE
REPORTS and frequency
,.
"2/)#D&O*K+(!0(3#0)/!98;[email protected]=?MF?8>N!
5H?><=FG!7=9HP5.!
spectrum graphs.
6. COMPARE
N D AN
A LY Z E historical
Q.
"#D3*0(! A *$'!
*$*+RO(!
P659:!
56789:!98;!<=9>?!;9<9!
signal and trace data to easily Identify new
56789:5!
signals d e;?>;!
t e c t e d i n68! t h

e s w5S??H!
eep
environment.
?8T6=A8G?87. HIGH
O L U T I O N F U L%2++V"#+#0!
L-COLOR
U.
E&CE! R E S
0(/#+2)$!
ADVANCED TRACE !N!L"5I
GRAPHICAL DISPLAY.
C0*3E&"*+!'&/3+*R.!
5IGNAL #$%&'&s( MANAGEMENT
Software BENEFITS:
,"63754$&@>;>ABOZCOR REMOTE CONSOLE
1. REMOTE
-.
0(D#)(!CONTROL
"#$)0#+! OF
#%!OSCOR
#/"#0! from
@=AG!PC
3"!
>AGHF=.!
computer.
&$'&"*)$! u sF5687!
B.
2. R0*3&'!
# $ D T H)E0(*)!
R E AT INDICATION
ing
;?<96:?;!
>AGH9=65A8! o [email protected]!
detailed comparison
f s t5o r e d R 0%!
E
5H?><=FG!
5H?><=FG!!"#$%&
!"#$%&.!
.!
5H?><=FG!!"#$%&.!
spectrum traces.
I!.. QUICKLY
W2&"X+R!IDENTIFY
&'($)&%R!SOPHISTICATED
/#3E&/)&"*)('!TRANSMITTERS
)0*$/D&))(0/! (frequency
[email protected]=?MF?8>N! hopping
PAHH687! Z!
[F=5]?I.
& burst/packet)
F5687!H?9]!;[email protected]@?=?8>?!<=9>?5!989:N565.!
using peak difference traces analysis.
!
‚ ‚ _ .

oscoR ADVANTAGES
+,-+C&89:8;<8=>,&

!

'676<9:!/H?><=FG!*89:N_?=`!'?5678?;!/H?>[email protected]>9::N!%A=!"AF8=!5F=T?6::98>?!
• Digital
spectrum Analyzer: Designed specificaHy For Counter surveiHance
*F9::N!/S6<>P?;!*8889!*==9N`!46

• Automatically
switched Antenna Array: With BuHt-In Pre-Amps
*F!3=A7=9GG9[6:69851!/?51!*8;!'?><5!
• Automatic
Programmability: Continuously Scans, Stores Signals And Traces, And Detects
)P=?9Threat Signals
(8P98>?;!Trace
)=9>?!Analysis:
*89:N565`!Detects
'?><5!Sophisticated
/AHP65<6>9;! Devices
'?T6>?5! Such
/F>P! A
*5!
%=?MF?8>N! Hopping
EAHH687!
• Enhanced
s Frequency
And Burst/Packet Transmitters
*8;!KF=5]?/6789:!'9<9[95?`!3=AT6;?5!/
9::!#@!'?>;!/6789:5!*8;!/H?><=FG!)=9>?5!
• Signal
Database: Provides Storage And Recall Of Detected Signals And spectrum Traces
/[email protected]?GA!Control
"A8<=A:!Capability
"9H9[6:6*8;!Ability
*[6:6/
/6789:! And
*8;! Trace
)=9>?! Profiles
[email protected]:?5!
• O#H>!
p c Software:
To Store
%A=!%FFor Future Comparison And Rf Mapping
• A*F;6A!*89:N565!DA;?`!3=AT6;?5!/F6!#@!'?GA;F:9u d i o Analysis Mode:Provides Suite Of Demodulators
J6;?A!'?GA;F:9J6;?A!'?GA;F:9• Video
Demodulator And Monitor: Provides!J6?S687!#@!"AT?=Viewing Of Covert Video Transmitters
*>AF5<6>!"A==?:9• Acoustic
Correator: Classifies Threatening Signals
KF6:AHN!#@!/6789:!*89:N565!&[email protected]=G9<6A8!
• !Built-In
Printer: Provides Hardcopy Of Signal Analysis Information
DF:<6H:?!)P=?99<687!/N5DF:<6H:?!)P=?99<687!/N59<687!/N59/A89=!)P=?99<687!/N59• Multiple
Threat Locating systems: Patented Sonar
Threat Locating System And Rf Locator
Probe
3=A[?!
• C"AGH:?!39>]97?!#@!/S??H!(MF6HG?8P?V/o m p e t e Package Of Sweep Equipment: Folds Into A Durable Attache-style Case

CONFDENTAL
"#$%&'($)&*+!
"#$%&'($)&*+!!

5

,

ldmd!?

!

!

Model 7518 o s c
!"#$%&'()*&+,-

Omni spectral Correlator
+./0&,1$2345%&-"44$%53"4&

PATENTEDAUTOMATICALLY
WI
WI"#$%
D ANTENNAARRAY:
RF(1&'$Z-(
Z-(G
Z-(
(G'Z)
'Z) & INFRARED

RFLOCATOR PROBE FOR
LOCATING TRANSMInERS
PATENTED SONAR "1-REA
"1-REA"
1-REA"

LOCATINGSYSTEM

ANTENNA P R E
IMPROVED 5%NSI"
NSI IVI"
NSI"
IVI"Y
"Y
n U LT I
CARRIERCURRENTPROBE
UTIUZING AC POWERLINE

USBPCINTERFACE,*#

SOFTWARE INCLUDED

I

BUILT-IN PRINTER
INTERNAL H I G H
SPECTRUMANALYZER

AUTOMATIC SPECTRUMTRACE
#)*"UR%
#)*"UR
UR% sioNAL LOGGING
AND #L)
L)5IFI
L)
)5IFI#)"t
#)" &N

CORRELATORREFERENCE
MICROPHONE FOR AUTOMATIC
THREATCLASSIFICATION

PROGRAMKEY FOR FIRMWARE
U*GR
*GR)
*GR
GR)D
)D%
D%5
%5

USER-FRIENDLYCONTROLS

BUILT-IN DEMODULATORS AND
SELECTABLE IF BANDWIDTHS

COMPACT CARRYING CASE
ONE-YEAR \/+
\/+RR)t.""

INTERNALRECHARGEABLE
BATTERY

!
)-.!
#/"#0! is
12! the
3-.! only
4567!available
898168:6.! security
2.;<=137! product
>=4?3-83! provides
>=491?.2! all
866! o
[email protected]!
3-.! above
8:49.! features
@.83<=.2! in
15! a
8!
The OSCOR
f the
215A6.!>4=38:6.!>8;B8A.C!
single Portable package.

TECHNICAL s ! s
67-89:-;RF SYSTEM
>?&,@,67!&
Receiver:
0.;.19.=D!!

E<8?!
"459.=2145! Super
/<>.=! Heterodyne
F.3.=4?75.! phase
>-82.! locked
64;B.?! spectrum
/>.;3=Quad Conversion
*5867H.=!
Analyzer

%=.IFrequency Coverage:

l&'$z-(G$z
JKBFH!L!MNFH!

)<515A!0.246<3145D!!
Tuning Resolution:

100Hz
JKKFH!

/.521319137D!!
sensitivity:

KCO
0.8p!P!37>1;86!Q13-!JRBFH!:85?Q1?3-!STJR?UG!V8WX!
V typical with 1 5'$z bandwidth (+1 5dBm Max)

Demodulators:
'.G4?<6834=2D!!

*VY!%V!Z1?.Y!%V!$8==4QY!%V!/"Y!//U["Z!
AM, FM Wide, FM Narrow, FM SC, s s , i - w

IF Bandwidths:
&%!U85?Q1?3-2D!!

\RKBFHY!JRBFHY!,BFH!
250'$z, 15kHz, 6'$z

Attenuators:
*33.5<834=2D!!

KY!L\K?U!83!*;319.!Z-1>Y!'12;45.Y!85?!P+%LV%!15><3!
0, -20d. at Active Whip, Discone, and VLF-ME input

'758G1;!085A.D!!
Dynamic Range:

90dB
]K?U!

/subcarrier Tuning Range:

15-250'$z
JRL\RKBFH!

*53.558!)7>.2D!
Antenna Types:
U8685;.?!+44>D!!
Balanced Loop:

!

10-500'$z
JKLRKKBFH!

*;319.!Z-1>D!!
Active Whip:

!

5000Hz-1 500MHz
RKKBFHLJRKKVFH!

Discone: !
'12;45.D!!

!

1500-3000/$z
JRKKLMKKKVFH!

Infrared Detector:
&[email protected]=8=.?!'.3.;34=D!!

JKBFHLRVFHY!ORKLJK^K5G!
1&'$z-5/$z, 850-1 &7&nm

AC Carrier Current:
*"!"8==1.=!"<==.53D!!

JKBFHLRVFH!S:8685;.?!8;=422!>4Q.=!615.X!
l&'$z-5/$z (balanced across power line)

CONFIDENTIAL
"#$%&'($)&*+!
"#$%&'($)&*+!!

6

,

ela-nan t o l ) !
!

Model 7518 o s c
!"#$%&'()*&+,-

Omni spectral Correlator
+./0&,1$2345%&-"44$%53"4&
AUDIO SYSTEM
6789+&,:,;
50!z-i 5kHz
9:;<=>9?;
Frequency Response:
%-./0.123!4.56715.8!!
Voiceband Filter:
@7A2.BC1D!%AEF.-8!!
ACC Dynamic Range:
*N"!'31COA2!4C1P.8!!

300-3000!z; I 8d"/octave roll off
G::=G:::;IDJK72FCL.!-7EE!7MM!
60d B
Q:DJ!

Output Power:
#0F60F!R7S.-8!!

3W at 4#!
GT!CF!U

;.CD6V71.!#0F60F8!!
Headphone Output:

0-2V rms
:[email protected]!-O5!

Remote Contact:
4.O7F.!"71FC2F8!!

$7-OCEE3!76.1!XW::O*[email protected]!OCYZ!
Normally open (200mA/32y max)

JCEC12.D!*0YAEAC-3!&160F8!!
Balanced Auxiliary Input:

0.5V rms nominal @ 600#!
:[[email protected]!-O5!17OA1CE!\!Q::

4.M.-.12.!*0DA7!&160F8!!
Reference Audio Input:

1m y
>[email protected]=>@!-O5!\!G[]?
!

Sonic Correlator:
^71A2!"7--.ECF7-8!!

9:;<=>9?;50!z-i 5kHz (frequency independent)

Audio Alarm:
*0DA7!*EC-O8!!

G=E.L.E!6-7P-COOCBE.!W=F71.!-A1P.-!
3

^/0.E2V8!!
Squelch:

*0F7OCFA2!DAPAFCE!7-!OC10CE!271F-7E!7L.-!M0EE!DA56EC3!-C1P.!
Automatic digital or manual control over full display range

;.CD6V71.58!!
Headphones:

+7S!C2705FA2!E.C?CP._!>Q
Low acoustic leakage, 1 $#!70F60F!EAOAF.D!F7!>:9DJ*!
output limited to 1 %SdB&

VIDEO SYSTEM
=98IF Bandwidth:
&%!JC1DSADFV8!!

10MHz
>:`;
&1D.6.1D.1F!"71F-7E!7M!%7-OCF5!
Independent Control of Formats

Protocols: !
R-7F727E58!!

!

N'
'S
S(, PAL, 5)(&*
!!!!$)^"_!R*+_!^("*`!

Demodulators:
'.O7D0ECF7-58!!

!

AM or FM
!!!!*`!7-!%`!

^312V-71ASynchronization Pulse:

+ or !!!!a!7-!=!

SYSTEM INTERFACE
,:,;;@6-JC2?EAF!'A56EC38!!
Backlit Display:

>WI!Y!W9Q!^.PO.1F!N-C6VA25!^06.-FSA5F!
128 + 256 Segment Graphics Supertwist
[CD
+"'!

Built-in Printer:
J0AEF=A1!R-A1F.-8!!

>]W!D6A!P-C6VA25!71!W=A12V=SAD.!FV.-OCE!
192 dpi graphics on 2
6C6.-!
paper

47FC-3!)01A1P!'ACE8!!
Rotary Tuning Dial:

128 Pulse/Rev with variable count ratio
>WI!R0E5.K4.L!SAFV!LC-ACBE.!2701F!-CFA7!

U5B Interface to PC
b^J!&1F.-MC2.!F7!R"!
4.O7LCBE.!R-7P-CO!c.3!M7-!MA-OSC-.!06DCF.5!
Removable Program Key for firmware updates

POWER SYSTEM
A+B&,:,;*"!&160F8!!
AC Input:

>:9=>G:@*"KW>:=WQ:@*"_!9:=Q:;105-1 ,%V&(/210-26%V&(, 50-60 Hz, 24W

(YF.-1CE!'"!&160F8!!
External DC Input:

>W=>[email protected]'"_!>*!OCY!
12-1 8VD(, 1 A max

&1F.-1CE!JCFF.-38!!
Internal Battery:

>[email protected]_!W[]*V!G=V70-!76.-CFA71!6.-!2VC-P.!F36A2CE!
12V, 2.9Ah 3

MECHANICAL
!9-6D&
Q[W9!A1!Y!>I[9!A1!Y!>U[9!A1!X>9[]!2O!Y!U,!2O!Y!GQ[I!2OZ!
6.25 in + 18.5 in + 14.5 in (15.9 cm + 47 cm + 36.8 cm)

^ASize (Hx'A/xD):
T.APVF8!!
Weight:

2

9

W]!EB5!X>G[W!?PZ!
lbs (13.2 kg)

CONFIDENTIAL
"#$%&'($)&*+!
"#$%&'($)&*+!!

7

,

!
!

Omni spectral Correlator
&,+)%-'./(012%3*00.21(*0%

7

5

1

8 !"#$%&'
Option
!"#$%&'()*+
!"#$%&
'(()*+
)*+

The Microwave
45.%
6)/0*718.% Down-converter
9*7+:/*+8.0(.0% products
'0*;(=% provide
'0*8);.% increased
)+/0.1=.;% frequency
>0.?/*8.01A.% for
>*0%
detecting illegal surveillance devices with the OsCOR.
;.(./()+A%)22.A12%=<08.)221+/.%;.8)/.=%7)(5%(5.%&-3&BC%
• !-'"./00!%12342567!895:2;!<=/>[email protected]!AB95C!,!#5D7E!
D " -900 Frequency Range:3-9G # z (Band 1 Only)
• !-'".F,00!%12342567!895:2;[email protected]!AB95C!,G!FG!H!D " -21 00 Frequency Range: 3-21 GHz (Band 1, 2, & $)

TECHNICAL ADVANCEMENTS
4D3EFG3HI%H9JHF3D6DF4-%
• Direct
frequency control and band selection with OSCOR
'I126J!K12342567!6L5J1LD!95C!M95C!N2D26JIL5!OIJP!#Q"#8!
&5J2:19J2C!?I:P!>9I5!+L:!R21ILCI6!*5J2559N!
• Integrated
High Gain Log Periodic Antennas
)1ISLC!S1LTIC2N!NJ9MIDIJ7!KL1!-'"!95J2559N!
• Tripod
provides stability for MDC antennas

TECHNICAL sPECIFICA ! IONS
4D3EFG3HI%-KD3GLG3H4G&F-%
"#D$ & FREQUENCY RANGES:
6&9D-%M%LBDNODF3P%BHFQD-R%
%12342567!895:2;!!
Frequency Range: 3

-

2 <=F,>[email protected]!
1 GHz

"L5T21NIL5!L4JS4J!%12342567;!U=<[email protected]!
Conversion output Frequency: 5-3005!#z

MODESO F OPERATION:
6&9D-%&L%&KDBH4G&FR%
Band 1:
B95C!,;!!

3-9GHz
<=/>[email protected]!

Band 2:
B95C!F;!!

9-1 5G%z
/=,U>[email protected]!

Band 3:
B95C!
15-21GHz
,U=F,>[email protected]!

AN Bands:
*DD!B95CN;!!

3-21 GHz
<=F,>[email protected]!

ANTENNA GAIN:
HF4DFFH%QHGFR!%
HF4DFFH%QHGFR
Band 1:
B95C!,;!!

6.1dB
VW,CB!

Band 2:
B95C!F;!!

5.3dB
UW
Band 3:
B95C!
8.4d&
XWYCB!

6
69-%S6GFG6O6%9D4D34HTID%-GQFHIU%
9-%S6GFG6O6%9D4D34HTID%-GQFHIU%
"D
( M I N I M U M DETECTABLESIGNAL)

A&56D4C2N!N25NIJITIJ7G!95J2559!:9I5G!95C!KIDJ21I5:!DLNN2NE!
(Includes sensitivity, antenna gain, and filtering osses)

Band 1: - 1 2 2.,FFW,CBZ!
.ldBm
B95C!,;!!
Band 2: - 1 2 2 .,FFW.$dBm
B95C!F;!!
Band $: - 1 2 4 .,FYWYCBZ!
.4d&m
B95C!
MECHANICAL:
6D3EHFG3HIR%
&5S4J!RLO21;!!
F00!ZIDDI9ZSN!9J!,F[!
Input Power: 2 0
0 milliamps at 12V
\2I:PJ;!!
Weight: 1 . 1,W,!DM!AWU!]:E!
lb (.5 kg)

The MDC shown in

Dim: 1 1 . ,,WY!I5!^!4 in ' 3.1 in ' 1.4 in
'IZ;!!
!

!AF/!6Z!^!X!6Z!^!(29 cm ' 8 cm ' 3.5 cm)

operation with the
O5COR.

TRIPOD:
4BGK&9R%
\2I:PJ;!!
W__!DM!AWWeight: . 7 7
lb (.35 kg)

Dim: 8 . 7 XW_U!I5!^!FWU!I5!^!,WU!I5!
5 in ' 2.5 in ' 1.5 in
'IZ;!!
!

!AFFWF!6Z!^!VWY!6Z!^!(22.2 cm ' 6.4 cm ' 3.8 cm)

`N9:2!?2I:PJ;!!
Usage Height: 5UWU!I5!A,Y!6ZE!
. 5 in (14 cm)

COWDEN
"#$%&'($)&*+!
"#$%&'($)&*+!!

,

!
!

High Power G5 ! Jamming system
+,-.&/"0$1&23!&4566,7-&389:$6&

Model 3521
!"#$%&'()*

MODEL 3521 - PORTABLE HIGH-POWER-JAMMER - 2 5 WAITS
!;<=>&'()*&?&/;@ABC>=&+D2+?/;[email protected][email protected]&F&)(&EBAA3&
The Model3521 is an BF Jammer designed to Paralyze the 2 way full duplex RF links between
)-.!/01.2!345,!67!89!:%!;8<[email protected][email protected]!:%!269G7!H.?C..9!
mobile phones and the local cellular cells.
<[email protected]!891!?-.!20I82!I.22E28=!I.227J!

G3!&GHHI*JHH&!+K&
! 900/1800 MHZ
2
23!&GHHI*JHH&!+K&
FREQUENCY RANGE:
[email protected]=MN=OPQ&@BO2=R&
!

900 - 970 MHz: C h"-899.2!,!
annel 1
KLL!M!KNL!/OBP!

!

1820-1920 MHz: Channel
2
,Q5LM,K5L!/OBP!
"-899.2!5!

!

OptionalVersion: CDMA
"'/*!
#@?60982!R.=7609P!

INPUT-POWER:
DO/NA?/;[email protected]&
!

:%!#[email protected]?!S0C.=P!54!T8??7!
RF Output Power: 25 Watts

!

Omni directionalAntenna
#<96!16=.I?60982!*9?.998!

!

#@?60982!R.=7609P!
,5L!T8??7!
OptionalVersion: 120
Watts

MODULATION:
!;BAD;OR&
!

'[email protected][email protected]!
Duplex sweep

!

[email protected]!'6>6?82M/01E28?609W!
(SpecialDigit!L"oduation)

POWER suppLy:
/;[email protected]&3N//>QR&
!

90-240 VAC
KLM5XL!R*"!

!

50-80 #z/3 A
4LMQL!OBY3!*!

!

(F?.=9!'"P!5X!Z!M!VE7.!D=0Extern DC: 24 v - (use from car battery)

!BSD!N!&P;[email protected];>&/BO=>&[email protected]&MAXIMUM CONTROL PANEL (JAMMER DISTANCE):
"89!=.8I-!209>!167?89I.!0D!<0=.!?-89!8![/[email protected]>[email protected][email protected]>[email protected]!
Can reach long distance of more than a KM depending on the type of antennas and topography
of the areas
0D!?-.!8=.87!
!

DIMENSIONS:P!XK!F!3\!F!,Q!I49 $ 36 $ 18 cm
!"#$%&"'%&
P!XK!F!3\!F!,Q!I
($")*+
WEIGHT:P!3L![>!
30 Kg

!
!

CONFIDENTIAL
"#$%&'($)&*+!
"#$%&'($)&*+!!

1

,

ela'nan „$#:)_
:)_!
!

Room Jammer
*""+&,-++$.&

M

o

d

l!"#$%&'())
3522

e

MODEL 3522 TECHNICAL MANUAL
!/012&'())&314567482&!86982&
The Model 3522 Jammer is based on our long standing technological leadership and its proven
)-.!/01.2!3455!6788.9!:;!<7;.1!0=!0>9!20=?!;@7=1:[email protected]=020?:A72!2.71.9;-:B!7=1!:@;!B90C.=!
jamming technology. We have widely used product base attests to our determination to provide
D788:[email protected]=020?EF!G.!-7C.!H:1.2E!>;.1!B901>[email protected]!<7;[email protected]@.;@;[email protected]!0>[email protected]:[email protected]:[email protected]!B90C:1.!
high end, quality products to customers around the world.
-:?-!.=1I!J>72:@E!B901>[email protected];[email protected]!A>;@08.9;!790>[email protected]!H0921F!

SPECiFiCATiONS
:;147<74837/6:&
FREQUENCY RANGE
&*86?1&
!

G5! double Band
KL/!10><2.!M7=1!!

!

890-1920 MHz
NOPQ,O5P!/RS!

OUTPUT-POWER
/93;[email protected];/A1*&
!

890-970 MHz: 1 .5W
NOPQOTP!/RSU!,F4G!

!

1820-1920 MHz: 1.5W
,N5PQ,O5P!/RSU!,F4G!

MODULATION
!/092837/6&
!

LB.A:72Q':?:@72!LH..B!
Special-Digital sweep

INPUT DC:
76;93&04B&
!

24-26V automatic/1 "#
5VQ5WX!7>@[email protected]:AY,F3*!

!

(DC-Box 95-24$V%#)
Z'"QM0[!O4Q5VPX"*\!

MAXIMUM CONTROL PANEL (JAMMER D I ! " N
!8C7!9!&4/63*/2&;8612&D,8!!1*&07:38641E&
!

900Mhz: 1 4 -,VQ5P8!
20m
OPP/-SU!

!

1800MHz 1 2 -,5Q5P8!
20m
,NPP/RS!

!

Z87[F!VPP!;J!8!:=!9008;\!
(max. 400 sq m in rooms)

2&8631668:F:!8&4/66143/*&
" N ! # N N " / $ " CONNECTOR
)
)&8631668:F:!8&4/66143/*&
DIMENSIONS:U!,,P![!,TP![!WV!88!
110 & 170 )( 64mm
U!,,P![!,TP![!WV!88!
!"#$%&"'%&
($")*+,
WEIGHT: !44P!?!
550 g
!
!!
!

l

CONFIDENTIAL
"#$%&'($)&*+!
"#$%&'($)&*+!!

G $ standard %/&:

1

,

!
!

Computer
screening
Jammer
,-.$/&01/$$232
-.$/&01/$$232
-.$/&01/$$2324
4&56++$/
*"+,-.$/&01/$$2324&56++$/
*"+,
*"+

M

o

d

e !"#$%&'()(
l
3525

!

COMPUTER sEcuRi ! y EQUIPMENT - DATA DEFENDER
*7!89:;&;?9=8!;@:&A&BC:C&B;D;@B;GENERAL DESCRIPTION
E;@;
.# , _
At

!
)-.!/01230145467!.8./930:1;76.94/!3;<4;9406=!>)-.!/01230145467!.8./930:1;76.94/!3;<4;9406=!>-4/-!45!.1499.-.6!>03?467!>49-!/[email protected]=!
The compromising e l e c t r o
1;[email protected];@9-034C.1;[email protected];@9-034C.makes it Possible for unauthorized reproduction of!9-.!1064903!24/[email protected]!;6the monitor picture and the siphoning off of

#
#)

E

n

=

CIO

"G"""""" PP P P ""

c m = i r =

H a m

data.
)-.3.!
;3.!various
E;[email protected]!Possibilities
20554A48494.5!available
;E;48;A8.! to
90! protect
2309./9! against
;7;4659! from
B301! an
;6! unauthorized
@6;@9-034C.;99;/?! on
06! the
9-.!
There are
/01230145467!.8./930:1;76.94/!.14554065F!
compromising e l e c t r o
!
!"
!"#$"%& '(#$)&"*
1. Tempest
Computer
&6!
9-45!case
/;5.! a;!modified
10<4B4./[email protected]! emits
.1495! no
60! compromising
/01230145467! radiation.
3;<4;9406D! Because
G./;@5.! so
50! few
B.>! are
;3.!
In this
1;[email protected];/[email protected]<=!
9-.5.!
;3.!
E.3H!
.I2.654E.D!
*850=!
9-.43!
/012;94A4849H!
>49-!
09-.3!
manufactured, these devices are very expensive. Also, their compatibility w i t h other
5H59.15!45!0B9.6!3.5934/9.systems is often restricted.
2. shielded
JD
+,-"./"/ Rooms
0((#%
0((#%!
B031!
2309./9406! has
-;5! the
9-.!advantage
;)-45!
9-;9! standard
59;6K"! systems
5H59.15! can
/;6! be
A.! used.
@5.)-.!
This form o0B!
f protection
<45;9-45! form
B031! o0B!
2309./9406! is
45! its
495! high
-47-! cost.
/059D! In
&6! addition
;<<49406! flexible
B8.I4A8.! use
@5.! o0B!
9-.!
disadvantage o0B!
f this
f protection
f the
/[email protected]!45!609!20554A8.D!
computer is not Possible.

!

CONFIDENTIAL
"#$%&'($)&*+!
"#$%&'($)&*+!!

1

,

ela"nan t o l ) !
!

Computer
screening
Jammer
,-.$/&01/$$232
-.$/&01/$$232
-.$/&01/$$2324
4&56++$/
*"+,-.$/&01/$$2324&56++$/
*"+,
*"+

M

o

d

e !"#$%&'()(
l
3525

3. Protection
!"
!"#$%&$'#( Device
)%*'&%

A!-./01203/4!516321!7/.89!:;[email protected]==34>!93>[email protected][email protected]!39!9<[email protected]:A1!B/[email protected];!C"[email protected]!
protection device works by superimposing jamming signals and is suitable for any PC that
*
*!-./01203/4!516321!7/.89!:;[email protected]==34>!93>[email protected][email protected]!39!9<[email protected]:A1!B/[email protected];!C"[email protected]!
is connected to a monitor via an external line. The computer can be used "bug proofed" in
39!2/4412015!0/[email protected]!=/430/[email protected][email protected][email protected]!A341F!)D1!2/=-<[email protected]!:1!<915!G:<>!-.//B15H!34!
any position.
@4;!-/9303/4F!

PROTECTION DEVICE DEFENDER
789:;*:<9=&>;?;@;=>;8&
&4!
2/[email protected]! to
0/! other
/0D1.! versions
61.93/49! o/B!
-./01203/4! devices
5163219! that
[email protected]! generate
>[email protected]! broad
:./@5! band
:@45! noise
4/391! that
[email protected]! is
39!
In contrast
f protection
9/4! the
0D1! video
6351/! signal,
93>[email protected]! the
0D1! Defender
'1B1451.! detects
'1B1451.!
5101209! only
/4A;! the
0D1! computer
2/=-<01.! system's
9;901=J9! pixel
-3E1A!
superimposed on
B.1K<142;!
34B/[email protected]/4I!and
@45!sends
91459! o/<0!
[email protected]/7! band
:@45! noise
4/391! o/4!
0D39! frequency.
B.1K<142;F! The
)D1! pixel
-3E1A!
frequency information,
u t [email protected]! narrow
n this
B.1K<142;!
51-1459!on
/4!the
0D1! computer
2/=-<01.! system
9;901=!being
:134>!used
<915! and
@45! is
39! between
:107114! 20
,L! and
@45! 80
ML! MHz
NOP! and
@45!
frequency depends
has the highest amplitude in this range.
[email protected]!0D1!D3>[email protected]=-A30<[email protected]>1F!
!
*
*!
=32./-./2199/.! controlled
2/40./AA15!spectrum
9-120.<=!analyzer
@[email protected];P1.! searches
[email protected]! for
B/.! the
0D1! pixel
-3E1A! frequency.
B.1K<142;F! The
)D1! pixel
-3E1A!
A!microprocessor
B.1K<142;!
;/@.1! interested
3401.19015! in
34! is
39! scanned
[email protected]! and
@45! the
0D1! voltages
6/[email protected]>19! o/B!
0D1! single
934>A1! frequencies
B.1K<142319! are
@.1!
frequency you
f the
@9919915!
@45!saved.
[email protected]!Furthermore,
%B.1K<142;! o/B!
0D1! horizontal
D/.3P/[email protected]!synchronization
9;42D./[email protected]/4! line
A341! i39!
assessed and
h e frequency
f the
s
/:[email protected][email protected]!0D1!-/993:A1!-3E1A!B.1K<[email protected][email protected]obtained and the possible pixel frequencies are calculated.
!
*!4/391!>[email protected]/.!39!2A/[email protected]!0D1!/<0-<0!/B!0D1!-./01203/[email protected]!0D1!5101.=3415!B.1K<142;F!
*
*!4/391!>[email protected]/.!39!2A/[email protected]!0D1!/<0-<0!/B!0D1!
A!4/391!>[email protected]/.!39!2A/[email protected]!0D1!/<0-<0!/B!0D1!
noise generator is clocked at the output of the -./01203/[email protected]!0D1!5101.=3415!B.1K<142;F!
protection device at the determined frequency.
)D39!0;-1!/B!4/391!>[email protected]/[email protected][email protected]/7!:@[email protected][email protected][email protected]@;9!:[email protected]<0/[email protected]@AA;!0/!0D1!
This type of noise generator is a narrow band and can always be switched automatically to the
[email protected]!B/<45!B.1K<142;F!
last found frequency.

USE OF THE PROTECTION DEVICE DEFENDER
A0;&[email protected]&:B;&789:;*:<9=&>;?;@;=>;8&
)D1!'1B1451.!39!9<[email protected]:A1!B/[email protected];!2/=-<[email protected]!39!2/4412015!0/[email protected]!=/430/[email protected][email protected][email protected]!A341F!
)D1!'1B1451.!39!9<[email protected]:A1!B/[email protected];!2/=-<[email protected]!
The Defender is suitable for any computer that 39!2/4412015!0/[email protected]!=/430/[email protected][email protected][email protected]!A341F!
is connected to a monitor via an external line.
)D1!2/441203/4!/B!0D1!'1B1451.!39!1BB12015!:;[email protected]@03/4!/B!0D1!QR*[email protected]:A1!B./=!0D1!>[email protected]!
The connection of the Defender is effected by the installation of the VGA cable from the graphic
[email protected]!0/!0D1!=/430/[email protected]!0D1!-./01203/4!516321F!
card to the monitor via the protection device.

TECHNICAL DATA
:;*B=C:C&
[email protected]>!%.1K<142;T!!
,L!U!ML!NOP!!
Scanning Frequency: 2 0
- 80 MHz
"/441203/49T!!
Connections:

QR*U&4-<0!VSVGA-Input
(5ubD 1 5

1

QR*U&4-<0!VSVGA-Input (5ubD 1 5

Indicators: P
&[email protected]/.9T!!

o

w

!

eC/71.!+('!!
r LED
S;42F!+('!!
Sync. LED

Error LED
(../.!+('!!
C/71.!SPower Supply:

5

X!Q!'"[email protected][email protected]!-/[email protected]!!
V DC (via mains power pack)

C/71.!"/49<=-03/4T!!
Power Consumption: A p *--./EF!ZLL!=*!!
p r o x . 700 mA

Dimensions:
'3=1493/49!T!!
\13>D0T!!
Weight:

5

1

1
0

0WWL!E![X!E!WMX!==!!
! 35 ! 185mm

! " ! ! # # $ # $ ! J
! ! ! " % " ! # & ! "

ononcionnonn

c o o n o o n o c o o

o on

I

I

0 XLL!>!!
g

!
!

CONFIDENTIAL
"#$%&'($)&*+!
"#$%&'($)&*+!!

2

,

ela'nan t o l ) !
!

Anti-Laser Microphone Noise Jammer
+,-./012$3&!.43"56",$&7".2$&8199$3&

Model 3526
!"#$%&'()*

AUDIO JAMMING N ! I "#$%& SYSTEM
+:;<=&8+!!<7>&[email protected]+BC&[email protected]!&

The security of the patented N!I5(#$%& system is based upon the following six principles:
)-.!/.012345!67!4-.!894.:4.;!$#&!/5/4.?!3/[email protected]/.;!186:!4-.!76AA6B3:C!/3D!823:038A./E!
• Maximizing
f target's
F9D3?3G3:C!complexity
06?8A.D345! and
9:;!coverage
06H.29C.! by
@5! ambient
[email protected]:4! mixing
?3D3:C! o67!
492C.4I/! voice
H630.! with
B34-! masking
?9/J3:C!
sounds
/61:;/!
K.;103:C!4-.!.77.043H.:.//!67!9061/430!830JL18!;.H30./!!
• Reducing
the effectiveness of acoustic pick-up devices
• MF9J3:C!
a k i n g computer
06?814.2! filtering
73A4.23:C!difficult
;377301A4! by
@5! the
4-.!design
;./3C:! of
67! the
4-.! masking
?9/J3:C! source
/6120.!
material
?94.239A!
• Hindering
listening by human transcribers
with psycho-acoustic elements
>3:;.23:C!A3/4.:3:[email protected]!-1?9:!429:/02
>3:;.23:C!A3/4.:3:[email protected]!-1?9:!429:/[email protected]/!B34-!8/50-6L9061/430!.A.?.:4/!
[email protected]/!B34-!8/50-6L9061/430!.A.?.:4/!
B-30-!02.94.!7943C1.!
which create fatigue
K.;103:C! t4-.!
H9A1.! o67!
9:5! information
3:762?9436:! recovered
2.06H.2.;! wB34-!
?.9:3:CA.//!
• Reducing
h e value
f any
i t h meaningless
/.M1.:0./!67!B62;/!3:!4-.!?9/J3:C!?94.239A!
sequences of words in the masking material
K.;103:C! the
4-.!credibility
02.;[email protected]! o67!
9:5! derived
;.23H.;!information
3:762?9436:! with
B34-! deliberately
;[email protected]! deceptive
;.0.843H.! masking
?9/J3:C!
• Reducing
f any
material
?94.239A!
!
NA953:C!
$#&!
?9/J3:C!source
/6120.!material
?94.239A!through
4-261C-! the
4-.! speakers
/8.9J.2/! 67!
9!
Playing N
!I5"#$%& masking
of a
8268.2A5!
06:73C12.;!system
/5/4.?!creates
02.94./! a9! bath'
[email protected]! of
67! noise
:63/.! around
9261:;! the
4-.! target,
492C.4P!
properly configured
B-30-!
?3D./! with
B34-!the
4-.!actual
90419A!voices
H630./! or
62! equipment
.M138?.:4! sounds.
/61:;/Q!This
)-3/! hinders
-3:;.2/!
which mixes
4-.!.D8A6349436:!67!4-.!492C.4I/!9061/430/Q!
the exploitation of the target's acoustics.
$#&!3/[email protected]!B34-!4-.!N!I5"#$%& is compatible with the STU Ill and other secure Telephones.
)-.!?9/J3:C!/61:;/!-9H.!:[email protected]!3?8904!6:!4-.!2.?64.!/.012.!8-6:.!
The masking sounds have negligible impact on the remote secure phone
1/.2Q!)-.!?9/J3:C!A.H.A!09:[email protected]!9;S1/4.;[email protected]!2.?64.!06:426AQ!!
user. The masking level can be adjusted by remote control.
)-.2.!3/!18!46!9!TU;@!2.;10436:!3:!/61:;!A.H.A!B34-3:!4-.!8264.0436:!G6:.!726?!4-.!/61:;!A.H.A!
There is up to a 25db reduction in sound level within the protection zone from the sound level
614/3;.!4-.!8264.0436:!G6:.Q!
outside the protection zone.

ACOUSTIC MASKING MATERIAL
+E=:?B&[email protected])-.!
9061/430!masking
?9/J3:C!source
/6120.! material
?94.239A! i3/!
826;10.;! according
90062;3:C! t46!
/8.039A3G.;! N$#&!
The acoustic
s produced
o a9! specialized
!I5(#$%&
762?1A9!
9:;!can
09:! be
@.!recorded
2.062;.;! on
6:! compact
06?8904! discs
;3/0/! or
62! generated
C.:.294.;! in
3:! real
2.9A! time.
43?.Q! Masking
F9/J3:C! source
/6120.!
formula and
?94.239A!
3/!a9!combination
[email protected]:9436:! of
67!varying
H9253:C!pink
83:J! noise,
:63/.P!synthetic
/5:4-.430! speech,
/8..0-P!actual
90419A! speech
/8..0-! and
9:;! psycho8/50-6L
material is
9061/430!
.A.?.:4/!configured
06:73C12.;! to
46! minimize
?3:3?3G.! disruption
;3/218436:! to
;3/218436:!
46! those
4-6/.! being
@.3:C! protected
8264.04.;! and
9:;! maximize
?9D3?3G.!
acoustic elements
;3/218436:!46!.A.0426:30!91;36!/12H.3AA9:0.!/5/4.?/!9:;!-1?9:!A3/4.:.2/Q!
disruption to electronic audio surveillance systems and human listeners.
F9/J3:C!09:!9A/6!06:/3/4!67!/8.039A3G.;!.M138?.:4!/61:;/!46!?9/J!
Masking can also consist of specialized equipment sounds to mask
3:4.AA3C.:[email protected]:C!9061/430/!/10-!9/[email protected];/Q!!
intelligence bearing acoustics such as from computer keyboards.
F9/J3:C!/6120.!?94.239A!3/[email protected]!3:!;377.2.:4!A9:C19C./P!2.C36:9A!
Masking source material is available in different languages, regional
900.:4/P!
;39A.04/P! o62!
.H.:! f762!
8924301A92! person
8.2/6:! o62!
8.2/6:/Q!
accents, dialects,
r even
o r a9! particular
r persons.
F3D412./!67!H630.!458./!92.!9A/[email protected]!
Mixtures of voice types are also available.
K.C36:9A!
(;3436:/!are
92.!produced
826;10.;! from
726?!actual
90419A! voices
H630./! and
9:;! synthetic
/5:4-.430!
Regional Editions
H609A!/61:;/!B34-3:!9!A9:C19C.!62!;39A.04!/.A.04.;[email protected]!4-.!01/46?.2!
vocal sounds within a language or dialect selected by the customer
/10-!9/!*?.2309:!(:CA3/-!F3A34925!#8.29436:/P!K
/10-!9/!*?.2309:!(:CA3/-!F3A34925!#8.29436:/P!K.C36:9A!*?.2309:!'39A.04/!N6A34309A!V!+.C3/A943H.!
.C36:9A!*?.2309:!'39A.04/!N6A34309A!V!+.C3/A943H.!
such as American English Military Operations, Regional
American Dialects Political & Legislative
<[email protected]/P!
K.C36:9A!
W.2?9:!
'39A.04/P!
<614-!
*?.2309:!
<89:3/-P! Gulf
W1A7! Arabic,
*[email protected]! and
9:;! Specialized
<8.039A3G.;!
Subjects, Regional German Dialects, South American Spanish,
[email protected]/!67!X92361/!&:4.AA3C.:0.!9:;!+9B!(:7620.?.:4!#8.29436:/Q!
Vocabularies of Various Intelligence and Law Enforcement Operations
!

CONFIDENTIAL
"#$%&'($)&*+!
"#$%&'($)&*+!!

,

ela!nan t o l ) !
!

Advanced Counter surveillance Jammer
+#,-./$#&0"1.2$3&413,$5%%-./$&6-77$3&

M

o

d !"#$%&'()*
e l 3527

MODEL 3527 TECHNICAL MANUAL
!89:;&'()*&?0+;&!+>@+;&
The Model 3527 Jammer is based on our long standing technological leadership and its proven
)-.!/01.2!3456!7899.:!;!0?:!20>@!1;>@!A.B->[email protected];B82!2.81.:1!;A!
jamming technology.
E899;>@!
A.B->[email protected]! We
H.!have
-8D.! widely
I;1.2F! installed
;>C:01?BA! base
=88AA.A0! our
0?:! determination
1.A.:9;>8A;0>! to
A0!
provide high-end, quality products to customers around the world.
C:0D;1.!-;@-J.>1K!L?82;AF!C:01?BA1!A-.!I0:21G!
)-.!
/01.2! 3527
3456! will
I;22!protect
C:0A.BA! room
:009!conversation
B0>D.:<8A;0>! against
[email protected];>I;:.2.<[email protected];>@! tA-.!
The Model
y Jamming
he
M:.L?.>BF!901?28A;0>[email protected] modulation of the bugs.

sPECIFICATIONS
4A:0?B?0+8>4&
FREQUENCY RANGE:
BC:[email protected]:>0E&C+>F:G&
!

5 channels
4!B-8>>.2
!

HF 20 - 80!"2
N%!5O!J!PO/NQ!!

!

VHF 80- 200MHz
RN%!PO!J!5OO/NQ!

!

UHF 200- 500MHz
SN%!5OO!J!4OO/NQ!!

!

SHE 500-1000MH7
TN%!4OO!J!,OOO/NQ!

!

"Fll 1800-2000MH7
TN%&&!,POOJ!5OOO/NQ!

I

POWER-OUTPUT:
A8H:[email protected]!

\

45-50 W sum of all channels
U4J4O!H!9!0M!822!B-8>>.2
MODULATION:
[email protected];+8>G&
!

'0?=2.J';@;A82JTI..C!
Double-Digital-Sweep

POWER-SUPPLY:
A8H:[email protected];EG&
!

220-240 V
55OJ5UO!R!

I

v... I •

50 ohm N
4O!0-9!$J"0>>.BA0:!

..

JAMMING DISTANCE:
6+!!?>F&9?40:G&
!

,,

;

4 •••••

5&+>>+4G&
ANTENNAS:
(
(&+>>+4G&
!

• • • • •
••• !

200 m
5OO!9!

DIMENSIONS:V!
6 0 # 520 # 280 mm
!"#$%&"'%&
V! 4 !UWO!X!45O!X!5PO!99!

($")*+
V! A p p r !*CC:0X;98A.2F!,[email protected]!
WEIGHT:V!
o x i m a t e l y 1 9 kg
!
!
!

CONFIDENTIAL
"#$%&'($)&*+!
"#$%&'($)&*+!!

,

!
!

F5& Portable spectrum Analyzer
+,-&."/012%$&,3$40/56&781%9:$/&

M

o

d

e !"#$%&'()*
l
7519

[email protected]?AB&
'# RI "$ I % N
;
;[email protected]?AB&

The %/0!
F $ series
)-.!
/.12.3!(2,
456! 37! or
81! 6
9!GHz)
:0;3=.>[email protected]!analyzers
BCBDE;.13! are
B1.! compact,
>8A=B>?6! battery-powered
FB??.1EG=8H.1.I! tools
?88D3! that
?-B?!
provide RE
s " # based
aBCBDE323OA8C2?812CNP!
nalysis/monitoring. In
F%3
=18J2I.!
K%!measurement
[email protected]?! for
L81! !)/"M!
FB3.I!signal
32NCBD!analysis/monitoring.
&C! addition,
BII2?28C6! the
?-.! %/07!
spectrum analyzer
3=.>[email protected]!
BCBDE;.1!includes
2C>[email protected]! aB! color
>8D81! display
I23=DBE! that
?-B?! reduces
[email protected]>.3! errors
.11813! by
FE! enhancing
.C-BC>2CN! the
?-.! visibility
J232F2D2?E! of
8L!
criticalsignal details. The Powerful software package with signal comparison evaluation provides
>12?2>BD!32NCBD!I.?B2D3P!)[email protected]!38L?HB1.!=B>QBN.!H2?-!32NCBD!>[email protected]?28C!=18J2I.3!
.R>[email protected]>?28CBD2?E!BCI!>[email protected]!3>[email protected]?P!
excellent functionality and compares Previously scanned measurement.
!

!""LI#!$I%N
[email protected]?AB,&
• ! )/"M!$.B1L2.DI!*CBDE323!
s " # Nearfield Analysis
• C "BFD.!2C3?BDDB?28C!BCI!AB2C?.CBC>.!
a b l e installation and maintenance
[email protected]>[email protected]=A.C?!
r i f i e s production line equipment
• G :.C.1BD!
e n e r a l f i L2.DI!
e l d u @3.!
s e f oL81!
r communications
>[email protected]>B?28C3!
installation and maintenance
2C3?BDDB?28C!BCI!AB2C?.CBC>.!
• F i%[email protected]=A.C?!2C3?BDDB?28C!BCI!
e l d wireless equipment installation and
maintenance. Outdoor antenna
AB2C?.CBC>.P!#@?I881!BC?.CCB!
characteristics measurements.
>-B1B>?.123?2>[email protected]?3P!
!

FEATURES& ('N'FI$
+<[email protected]>U81?BFD.!-BCI-.DI!3=.>[email protected]!BCBDE;.1V!/ABDD!
• Po
r t a b l e handheld spectrum analyzer; small
[email protected]!?8!F.!=.1L.>?!L81!-BCI-.DI!
and light enough to be perfect for handheld
B==D2>B?28C3!
applications
/@=.1281!K%!"-B1B>?.123?2>3!G!LB3?6!B>>@1B?.6!
• S u p e r i o r RP Characteristics - fast, accurate,
=1.>[email protected]?!L81!2?3!=12>.!
precision instrument for its price
• C "8D81!I23=DBE!.C-BC>[email protected]?E!BCI!J232F2D2?EV!
o l o r display enhances usability and visibility,
all ABX81!
,WW!
[email protected]>E! range;
1BCN.V! covers
>8J.13
>8J.13!! BDD!
>[email protected]>B?28C! standard
3?BCIB1I!
100 kQ0;!
H z t ?8!
o &7! G:0;!
H z frequency
major communication
[email protected]>2.3!
transmission frequencies
• RKM/!I.?.>?81!L81!>811.>?!I2N2?BD!32NCBD!BCBDE323!
' 5 detector for correct digital signal analysis
#[email protected][email protected]!
• Over 4
[email protected]?G2C!
=1.BA=D2L2.1V!improve
2A=18J.! sensitivity
3.C32?2J2?E! by
FE! 15
,[! dB;
IZV! improved
2A=18J.I! instrument
[email protected]?! sensitivity
3.C32?2J2?E! ?8!
• Bu
i l t - i n preamplifier;
to
I.?.>?!A81.!D8H!D.J.D!32NCBD3!
detect more low level signals
/.D.>?BFD.! output
[email protected][email protected]?! power
=8H.1! for
L81! the
?-.! tracking
?1B>Q2CN! generator;
N.C.1B?81V! 0W! dBm;
IZAV! test
?.3?! devices
I.J2>.3! with
H2?-! higher
-2N-.1!
• Selectable
.R?.1CBD!! equipment;
=8H.1!
1B?2CN3! without
[email protected]?! additional
BII2?28CBD! external
.R?.1CBD
[email protected]=A.C?V!additional
BII2?28CBD! narrower
CB118H.1! resolution
[email protected]?28C!
power ratings
FBCIH2I?-3!
0;V!improved
2A=18J.I! performance
=.1L81ABC>.! measuring
[email protected]! narrow
CB118H! bandwidth
FBCIH2I?-!
bandwidths dI8HC!
o w n t?8!
o 1,WW!
0 0 Hz;
32NCBD3!
signals

CONFIDENTIAL
"#$%&'($)&*+!
"#$%&'($)&*+!!

1

,

!
!

F5! Portable spectrum Analyzer
+,-&."/012%$&,3$40/56&781%9:$/&

!"#R
!"#
R#!$%
R
#!$%RII
RII$
$III!
$
!
;-7<7;=>,?=?;,&
!

Frequency Range
%-./0.123!4516.!!
Resolution Bandwidth
4.A=B0Video Bandwidth
KCE.=!D51EFCE'CALB53.E!*M6N!$=CA.!+.M.B!!
Displayed Avg. Noise Level

$N#N&N!!
.&.I.
)
)N#N&N!!
ss ' Phase Noise
TTD!UG5A.!$=CA.!!
Detectors
'.Total Measurement
)=<5B!J.5A0-.R.1Y12.-<5C1<3!!
Uncertainty
Reference Level
4.W.-.12.!+.M.B!!
Dimensions W x H x D
'CR.1AC=1A!\!]!:!]!'!
(mm)
HRRI!!
\.C6GWeight

!"#$%&'()*

FsH "
+,-&@&

+,-&A&

1
7889:;!<=!>!?:;!
7889:;!<=
!>!?:;!

100KHz to 6 GHz
7889:;!<[email protected]!?:;!

lKHz(100
Hz)t o 1MHz
79:;H788!:;I!<=!7J:;!
79:;H
788!:;I!<=!7J:;!

l &"ztol
&" ztol GHz
78:;!<=!7!?:;!

l O H z t o l MHz
78!:;!<=!7!J:;!

10 Hz to 1 MHz
78!:;!<=!7!J:;!

)[email protected]!HO7,PQI!EDR!H7!S:;I!O!
)3LN
$)*[email protected]!HO7,PQI!EDR!H7!S:;I!O!
-116 (-1 25*) dBm (1 kHz) -

135 dBm
7>P!EDR!

7P!EDR!<3LN!
15 dBm typ.

1

7P!EDR!<3LN!
dBm typ.

5

-1&&
&&dB
dB+ (Hz) at 100 kHz carrier ' - 1 VO788ED2!H:;I!5& & d B + (Hz) at 100 kHz
VO788ED2!H:;I!5offset
c a r r i e 25--C.-!=WWA.r
offset
=WWA.T5RLB.X!L.5SX!50<=!L.5SX!4JT!
T5RLB.X!L.5SX!50<=!L.5S
X!4JT!
sample, peak, auto peak,X!4JT!
R,S s aT5RLB.X!L.5SX!50<=!L.5SX!4JT
m p l e , peak, auto peak, R,

1.5 d7NP!ED!

1

.

5

d

B
7NP!ED!

-8&d-m to [,8!EDR!
+20 dBm - 8 & d OZ8EDR!<=![,8!EDR!
B m to +20 dBm
OZ8EDR!<=![,8!EDR!
OZ8EDR!<=!
170.1 20.270
7^8]7,8],^8!
,NP!S6!
2.5 kg

1

70.1 20.270
7^8]7,8],^8!
,NP!S6!
2.5 kg

!

CONFIDENTIAL
"#$%&'($)&*+!
"#$%&'($)&*+!!

,2

!
!

Covert RF Bug Detector up to 6 GHz
+",$-.&/0&123&4$.$5."-&26&."&7&89:&

M

o

d

e!"#$%&'()*
l
7520

D;[email protected]&
!" RI PTION
4
4;[email protected]&
This compact Bug Detector is the latest generation 1=!-.8-!/99!?:[email protected]?4of high sensitive broadband R a d i o f r e q u e n c y
)-./!0123405!678!'959051:!./!5-9!;459/5!89<9:45.19!?:[email protected]?4)-./!0123405!678!'959051:!./!5-9!;459/5!89<9:45.1and is the size of a cigarette packet. It detects active
miniaturized transmitters within a distance of some
4
49!2.9!2.9!2.meters and is excellent to use as an additional
instrument when looking for bugging devices.
2959:/!42959:/!4.09/G!
1<4;!.5:729<5!H-9.09/G!
The sensitivity
)-9!
/9.5C! of
1=! the
5-9! Bug
678!Detector
'959051:! is
./! adjustable
[email protected]/54?;9! to
51! allow
4;;1H! the
5-9! precise
3:90./9! allocation
4;;1045.11=! active
405.>9! transmitters
5:42.559:/!
nearby. The
<94:?CG!
)-9!signaling
/.8<4;.<8!can
049.5-9:! be
?9!acoustic
4017/5.0! or
1:! visual
>./74;
>.?:45.1>./74;!! with
H.5-! an
4+('! bargraph.
?4:8:43-G! With
K.5-! a
4! discrete
@./0:959! vibration
alarm this
of common
4;4:2!
5-./!device
@9>.09!can
044;/1! be
?9! body-worn.
[email protected]:6C! using
7/.<8! the
7/.<8!
5-9! Bug
678! Detectors
'959051:L/! earphone,
94:3-1<9M! signals
/.8<4;/! 1=!
01221modulations can be demodulated.
The rechargeable battery guarantees long operating time.
[email protected];[email protected];[email protected]!)-9!:90-4:894?;9!?4559:C!874:4<599/!;1<8!139:45.<8!5.29G!

FEATURES
0;B?C/;ADVANTAGES:
B4DBA?B8;• T)-9!678!'959051:!./!-.8-;C!2.h e Bug Detector is highly miniaturized and discrete
&5N/!21:9!/99!5-4=.9;@!:909.>9:/!O/1!04;;[email protected]!P678!%.•I t &5N/!21:9!/99!5-49:/!O/1!04;;[email protected]!P678!%.' s more sensitive than most large near-field
receivers (so caHed. ,, Bug Finders")
• T)-9!=:9B79<0C!:4<89!01>9:/!4;;!01221h e frequency range covers all common RE-standards, like GSM, uMTs, DECT, Buetooth
&!K+*$!
WLAN
W
W!K+*$!
• Detects
active sound, video & data transmissions
'95905/!405.>9!/[email protected][email protected]!5:42.//.1!
• T)-9!>.?:45.1h e vibration alarm allows hidden body-worn use
(I09;;9<5!01/5X39:=1:24<09!:45.1!
• Excellent
cost/performance ratio
=F6"-.GH.&
H".I5$E& ABH&
/0J/$5$I,$-& cannot
5GHH".& replace
-$6%G5$& aG& physical
6KLMI5G%&
Important notice:
n RE-Receiver
search!
M$G-5KN&

INCLUDED:
=A+OC4;4E&
A909.>9:!H.5-!0-4<894?;9!?:[email protected]?4• Receiver
with changeable broadband antenna
(4:3-1<9!W!2.• Earphone
& mini-charger (AC adapter)
• s T-10F!3:[email protected]!5:431:5!04/9!W!7/9:!24<74;!
h o c k protected transport case & user manual
+KGH3$&PI.K"2.&H".I5$N&
Change without notice!

TECHNICAL DATA
?;+9A=+BO&4B?B&
%:9B79<0C!:4<89Y!
Frequency range:

10 MHz to >6GHz
,Z!U[E!51!\!]!S[E

A909.>9:!/9.5CY
Receiver sensitivity:

-46 dBrn at 10 MHz
D^][email protected]!45!,Z!U[E!
-58 dBm at 900 MHz
D_`[email protected]!45!aZZ!U[E!!
-58 dBm at 2300 MHz
D_`[email protected]!45!bcZZ!U[E!!
-32 dBm at 5000 MHz
[email protected]!45!_ZZZ!U[E!

*[email protected]!
Audio-output:

1W / 8 Q !
,!K!X!`!

Demodulation:
'[email protected];45.1
*UM!*TdM!%TdM!O%UR
!", ASK, FSK, (FM)

e1H9:!/733;CY!
Power supply:

*"[email protected]:!,ZZ!D
b^Z!f
AC adapter 100 -240
V
"-4:8.<8!45!^Mb!fX]_Z!2*!!
Charging at 4,2 V/650 mA
+.5-.72!6455G!cMg!fXbZZZ!2*-!
Lithium Batt. 3,7 V/2000 mAh

"7::9<5!017235.1Current consumption:

cZXcZZ!2*!OH.5-175XH.5-!>.?:45.130/300 mA (without/with vibration)

64559:C!;.=9Y!
Battery life:

> 10 hours
\!,Z!-17:/

Size:
T.E9Y!

`_!I!__!I!,`!22!OA909.>9:R
85 X 55 X 18 mm (Receiver)

Antenna:
*<59<<4Y!

70 mm broad-band antenna
gZ!22!?:[email protected]?4
K9.8-5Y!
Weight:

,,Z!8!OA909.>9:RX^_Z!8!OT95R
110 g (Receiver)/450 gg (Set)

!
!
CONFIDENTIAL
"#$%&'($)&*+!
"#$%&'($)&*+!!

,

Miniport
Receiver EB
EB200
Miriiport Receiver
200
Portable
monitoring from
from 10
10 kHz
3 GHz
GHz
Portable monitoring
kuz to
to !
•• Ergonomic
Ergonomic design
design for
for on-body
on-body
operation
operation
•• Continuous
Continuous frequency
frequency range
range

10 kHz to !
10
3 GHz

•• Detection
Detection of unlicensed transtransmitters

•• Location
Location of
of close-range
close-range to
to
medium-range
targets with
the
medium-range targets
with the

aid of Handheld Directional
aid
200
Antenna "#
HE200
•• Digital
Digital IF
IF section
section with
bandwith 12
12 bandwidths
kHz)
widths (150
(150 Hz
Hz to
to 150
150 kHz)
•• Fast,
Fast, accurate level indication
across
dynamic range
across 110
110 dB
dBdynamic
range

ROH

•• scanning
Scanning modes
modes
–—Frequency
Frequency scanning
scanning
–—Memory
Memory scanning
scanning
•• Frequency
Frequency spectrum
spectrum (option)
(option)
•• IF
IF panorama
panorama display
display (option)
(option)
via
•• Remote-controllable
Remote-controllable via
RS232
R5232 C
CPPP
PPPor
or LAN
LAN (Ethernet
(Ethernet
10Base-T)
1&'as(-)
)))

Brief description

In case of power
power supply
supply interruption,
In

of close-range
close-range to
to mediummedium•• Location
Location of

200 with Active
Miniport Receiver !"
EB200
Active

all the data is stored. Operation can
can
all

range targets
targets with
with the
the aid
aid of
of HandHandrange

thus be
be resumed
immediately after
after the
the
thus
resumed immediately

200 is a portaDirectional Antenna #!
HE200
porta-

power supply
power
supply is restored.

ble unit for radiomonitoring in the

held Directional
Directional Antenna
#!200
held
Antenna HE200

Detection
of
undesired
emissions
• Detection of undesired emissions

including pulsed
pulsed emissions
emissions
including

Detection
of
unlicensed
transmitters
• Detection of unlicensed transmitters

wide frequency range from 10 kHz to

$GHz.
3
GHz. Whether
Whether used for monitoring

communicating illegally
illegally or
or interferinterfercommunicating
ing with
with licensed
licensed transmission
transmission
ing

R ! " ! # & 5 $ " W % R Z M I N I P O R T RECEIVER E B 2 0 0

' -

120 K H z 1 &
1 '()
1
OFF
ANTENNA:R N T O O

5 Q U u e 1 TONE o * r L O C K
1
40

%

II

i

i i i i

***/U[, I - — 0 N . t I 1 1

'

i i

6

0

234.567 000
+ !

i i i : : : :
i•Q,

*

,$"- I $!N-. I '!R-

1k"?..+(i*

' J

emissions,
detecting interference
interference or
emissions, detecting
or
locating
mini-transmitters irrespective
irrespective
locating mini-transmitters

of
EB200
of their
their position,
position, !"
200 offers
offers features
features

EB200
fulfils the
the following
following tasks:
tasks:
!"200 fulfils

•• Monitoring
Monitoring of
frequencies,
of given
given frequencies,
eg
storage of
1 to
to 1000
frequeneg storage
of 1
1000 frequen-

•• Protection
Protection against
against tapping
tapping by
by dedetecting
tecting miniature
miniature spy
spy transmitters
transmitters
(bugs)
(bugs)

unrivalled
in its
its class.
class. The
The favourably
favourably
unrivalled in

cies,
squelch setting,
setting, constant
constant moncies, squelch
mon-

priced
priced and
and compact
compact receiver
receiver with
with LAN
LAN

itoring
itoring of
of one
one frequency
frequency or
or cyclical
cyclical

•• Monitoring
Monitoring of
of one's
ones own
own radio
radio exexercises in
in aa service
service band
band
ercises

interface
may also
also be
be used
used in
in compucompuinterface may

scanning
frequencies
scanning of
of several
several frequencies

•• Monitoring
Monitoring of
of selected
selected transmissions
transmissions

ter-based
stationary systems.
systems.
ter-based stationary
The
EB200
is characterized
characterized by
by high
The !"
200 is
high

input
sensitivity and
and frequency
frequency setting
setting
input sensitivity

•• Searching
Searchingi in
frequency range
na
a frequency
range

•• Remote-controlled
Remote-controlled operation
operation via
via

with
with freely
freely selectable
selectable start
start and
and stop
stop

modem
PC in
modem and
and PC
in coverage
coverage measmeas-

frequency
step widths
frequency and
and step
widths of
of

urement
systems
urement and
and monitoring
monitoring systems

MHz
11kHz
kHz to 9.999 MHz

accuracy
throughout the
the frequency
frequency
accuracy throughout
range
from 10
10 kHz
kHz to
to $
3 GHz.
GHz.
range from
Its
small dimensions
dimensions and
Its small
and low
low weight
weight as
as
well
as a
a sturdy,
sturdy, pickup-proof
pickup-proof die-cast
die-cast
well as
aluminium
housing with
aluminium housing
with well-protected
well-protected
integrated
operating elements
elements make
make
integrated operating
the
EB200
ideal for
for use
use in
in places
places
the !"
200 ideal

which cannot be reached with a vehivehicle.
Its low
cle. Its
low power
power consumption
consumption permits
permits
battery
operation typically
typically of
battery operation
of four
four

hours.
The !"
EB200
battery pack
pack is
is easeashours. The
200 battery
ily
accessible and
and can
can be
be exchanged
exchanged
ily accessible
quickly.
quickly.

Miniport
Receiver #1
EB200
Miniport Receiver
200

EB200
HE200:
ergonomic design
for on-body
!"200
!"
200 and
and #!
200: ergonomic
design For
on-body operation
operation

Specifications
Specifications
Frequency range
range
Frequency
Frequency
Frequency setting
setting
via
or rollkey
via keypad
keypad or
rollkey

Frequency
Frequency accuracy
accuracy
Aging
Aging
Synthesizer
Synthesizer setting
setting time
time
Oscillator
Oscillator phase
phase noise
noise
Antenna
input
Antenna input

i "#$
!G
$z
10
kHzzto
to 3
GHz
10Hz,
or in
in
11kHz,
kHz, 100 Hz, 10
Hz, 1 Hz or
selectable increments
increments
selectable
−6
≤!
±1.5x10 (−10°C to + 55°C)
−6
≤±0.5x10
- ± 0 . 5 x−6
1/year
0
s
≤• 3mms
!100 dBc/Hz at 10 kHz offset
≤−
N socket,
5 0Ω
0 ,, VSWR
SMA conconN
socket, 50
VSWR ≤33;; SMA
nector
nector for
for rackmounting
rackmounting at
at rear
rear panel
panel
• 1107
0 7 dBm
dBm
≤−
30 dB,
dB, man.
man, or
or autom.,
autom., switchable
switchable
30

Oscillator reradiation
reradiation
Oscillator
REattenuation
RF
attenuation
Input
Input selection
selection
100 kHz
kHz to
to 20
20 MHz
100
MHz
20 MHz
1.5 GHz
20
MHz to
to 1.5
GHz
1.5 GHz
to 3
! GHz
GHz
1.5
GHz to

highpass/lowpass
highpass/lowpass
tracking
tracking preselection
preselection
highpass/lowpass
highpass/lowpass

Interference
Interference rejection,
rejection, nonlinearities
nonlinearities
Image
frequency rejection
Image frequency
rejection
IF
rejection
IF rejection
2nd
2nd order
order intercept
intercept point
point
3rd
order intercept
3rd order
intercept point
point
Internal
spurious signals
Internal spurious
signals

≥!
70
70 dB,
dB, typ.
typ. 80
8 0dB
≥!
70
typ. 80
dB
70 dB,
dB, imp.
80dB
typ.
typ. 40
40 dBm
dBm
typ.
dBm
typ. 2
2 dBm
• 107
107 dBm
≤−
1

Sensitivity
Sensitivity
Overall
noise figure
figure
Overall noise
(including
AF section)
section)
(including AF
5 0 MMHz
Hz
20 MHz
MHz to
to 6650
650 MHz
1500MHz
650
MHz to
to 1500
MHz
1500 MHz to 2700 MHz
1500
2700 MHz to 3000 MHz
Signal-to-noise
Signal-to-noise ratio
ratio
AM,
bandwidth 6
6 kHz,
kHz,
AM, bandwidth
kHz, m
m=
= 0.5
0.5
fmod =
= 11 kHz,
20
MHz to
to 2700
MHz, V
V=
µV
20 MHz
2700 MHz,
= 11 JV
2.7
to !
3 GHz,
GHz, V
V=
= 1.3
1.3 FV
µV
2.7 GHz
GHz to
FM,
bandwidth 15
15 kHz,
kHz,
FM, bandwidth
kHz, deviation
deviation =
=5
5 kHz
kHz
fmod =
= 11 kHz,
20
MHz to
to 2700
MHz, V
V=
20 MHz
2700 MHz,
= 11 µV
2.7
to !
3 GHz,
GHz, V
V=
= 1.3
1.3 FV
µV
2.7 GHz
GHz to
Demodulation
IF bandwidths
IF
IF bandwidths for level and
IF
deviation indication

Squelch
Squelch
Gain control
IF control
IF
RE+
+ IF
RF
IF control
control
AFC
AFC
Deviation indication
indication
Deviation
Signal
level indication
indication
Signal level

IF
SU)
IF panorama
panorama display
display (option
(option SU)
Scan characteristics
Scan
characteristics
Automatic
memory scan
Automatic memory
scan

Frequency
Frequency scan
scan
Inputs/outputs
Inputs/outputs
Digital
IF output
output
Digital IF
Bidirectional
reference frequency
Bidirectional reference
frequency
connectors
connectors
in
in
out
out
I/Q
output (digital)
I/O output
(digital)
IF
wideband
IF 10.7
10.7 MHz,
MHz, wideband

Miniport
Receiver !"
EB200
Miniport Receiver
200

AF
AF output,
output, balanced
balanced
Loudspeaker
Loudspeaker output
output
Headphones
Headphones output
output
Output
Output log.
log, signal
signallevel
level

6 0 0Ω
0 ,, 00 dBm
dBm
600
0 ,, 500
500 mW
mW
88 Ω
via volume
volume control
control
via
to+4.5
+4.5 V
V
00 VVto

BITE

monitoring
monitoring of
of test
testsignals
signalsby
by means
meansof
of
loop
loop test
test

Datainterface
interface
Data
Option
Option

R5232 C
CPPP
PPP
RS232
LAN
LAN (Ethernet
(Ethernet10Base-T)
1 "%as,--)
-)

General data
data
General
Operating
Operating temperature
temperature range
range
Rated
Rated temperature
temperature range
range
Storage
Storage temperature
temperature range
range
Humidity
Humidity
Shock
Shock

Vibration
Vibration (sinewave)
(sinewave)
Vibration
Vibration (noise)
(noise)
Electromagnetic
Electromagnetic compatibility
compatibility (EMC)
(EMC(
Power
Power supply
supply
Dimensions
Dimensions (W
(W x* H
H x* D)
D(
Weight
Weight (without
(without battery
batterypack)
pack)
Battery
Battery pack
pack

≤• 14i ydB,
dB
j atyp.
. 12
12dB
15.5 dB
≤!
15.5
dB
≤!
14
dB
l4ddB,
% ,ttyp.
& p. 12
12dB
≤!
15
dB, typ. 13
l5dB,typ.
13ddB
%
measurement
measurement with
with telephone
telephone filter
filter to
to
'' I (
CCITT

10dB
≥!
10
dB
≥!
10 dB
≥!
25 dB
≥!
25 dB
AM,
LSB, CW
AM, FM,
FM, USB,
USB, LSB,
CW
12
(150/300/600 Hz/1.5/2.4/6/
12)150/300/600
Hz/i . 5 / 2 . 4 / 6 /
9/15/30/50/120/150
9 / 1 5 / 3 0 / 5 0 / 1 2 0 / 1 5 0 kHz)
kHz)
15
(150 Hz
MHz) only
15)150
Hz to
to 1
1 MHz)
only with
with
IF Panoramic Unit
Unit EB200SU
)B200SU
IF
signal-controlled,
signal-controlled, can
can be
be set
set from
from
−—10
10 dBµV
dBFV to
to +100
+100 dBµV
dBFV
ACC,MGC
AGC,
MGC
80dB
80
dB
110dB
110
dB
digital
digital retuning
retuning for
for signals
signals unstable
unstable in
in
frequency
frequency
graphical
with
tuning
label
graphical with tuning label
graphical
graphical as
as level
level line
line or
or numerical
numerical
10 dBµV
to +100
from
from −
—10
dBFVto
+ 100 dBµV,
d%1JV, acoustic
acoustic
indication
by
level
tone
indication by level tone
internal
module,
ranges
25,
50,
internal module, ranges 25, 50, 100,
100,
200,
500, 1000 kHz
200,500,1000kHz
1000
1000 definable
definable memory
memory locations
locations to
to
each
each of
of which
which aa complete
complete data
data set
setcan
can
be
be allocated
allocated
START/STOP/STEP
START/STOP/STEP definition
definition with
with
receiving
receiving data
data set
set
serial
serial data
data (clock,
(clock, data,
data, frame)
frame)
up
ksps: 2
up to
to 256
256 ksps:
2 x* 16
16 bit
bit
10
MHz, BNC
10MHz,
BNC
0.1
Ri == 5500
0.1VVt to
o 11VV;; R
00Ω
0
0
Ro == 50
0 dBm,
dBm, R
5 0Ω
0
AF
AF signal,
signal, 2
2 x* 16
16 bit
bit
±5
+5 MHz
MHz uncontrolled
uncontrolled for
for external
external
panoramic
display
panoramic display

to +55°
-i-55°C
−—10°C
10°C
10
10°
°C
C to
+55
+55°C
°C
C
0°C
to +50°
+50°C

0
°C
C to
+50
°C
C
0°C
+50°C
to +70°
+70"C
−—40°C
40°C
40
40°
°C
C to
+70
+70°C
°C
C
max.
25/55°
°C
C
25/55°C
max, 95%,
95%, cyclic
cyclic test
test25/55
25/55"C
to DIN
DIN IEC
IEC 68-2-27
68-2-27
to
(MIL-STD-810D,
).IL-S-D-81OD,MIL-T-28800D),
MIL-T-28800D), 40
40 g,
g,
shock
shock spectrum
spectrum 45
45 Hz
Hz to
to 22 kHz
kHz
to
to DIN
DIN IEC
')' 68-2-6
68-2-6 (MIL-T-28800D),
(MIL-T-28800D),
55 Hz
Hz to
to 55
SS Hz,
Hz, 0.15
0.15 mm
mm amplitude
amplitude
to
Hz to
toDIN
DIN IEC
IEC 68-2-36,
68-2-36, 10
10Hz
to500
500 Hz,
Hz,
1.9
1.9 gg (rms)
)rms)
EN50081/82-1,82-2,
EN50081/82-1,82-2, MIL-STD-461,
MIL-STD-461,
CE03;
')"!; RE02
RE02 and
and RS03
R503
battery
battery pack
pack(typ.
)typ. 66 hhoperation)
operation) or
or
DC
W)
DC10
10 Vy to
to30
30 VY(max.
(max. 22
22W)
210mm
88 mm
mm x* 270
270mm
210
mm x* 88
mm
Y219"
HU
½
½19"
19" x22 HU
44 kg
kg
1.5
1.5 kg
kg

Directional antennas
200/$)
200/
$)200$+
Directional
antennas $)
HE200/HE200HF
Frequency
Frequency range
range
Antenna modules
modules
Antenna
20 MHz to
to 200
200 MHz
MHz
20
200 MHz
MHz to
to 500
500 MHz
MHz
200
500 MHz
MHz to
to 3000
3000 MHz
MHz
500
Option
Option
0.01 MHz to
to 20
20 MHz
MHz
0.01
Polarization
Polarization

Loop
Loop antenna
antenna
0.01 MHz to
to 20
20 MHz
MHz
0.01
Nominal
Nominal impedance
impedance
SWR
SWR
RF
REoutput
output
Gain
Gain
Antenna factor
factor
Antenna
Field-strength
Field-strength sensitivity
sensitivity
Linearity
Linearity of
of amplifier
amplifier
Current drain
drain
Current

Power
Power supply
supply
Dimensions
Dimensions (W
)W x* H
H x* D)
D)
General data
data
General
Operating
Operating temperature
temperature range
range
Rated
Rated temperature
temperature range
range

Storage
Storage temperature
temperature range
range
Vibration
Vibration resistance
resistance

Shock
Shock resistance
resistance
Weights:
Weights:
Supply
Supply and
and display
display unit
unit
with
with adapters
adapters and
and compass
compass
RF
REmodules
modules
20
20 MHz
MHz to
to 200
200 MHz
MHz
200
200 MHz
MHz to
to 500
500 MHz
MHz
500
500 MHz
MHz to
to 3000
3000 MHz
MHz
0.01
0.01 MHz
MHz to
to 20
20 MHz
MHz

0.01 MHz
MHz to
to 3000
3000 MHz
MHz
0.01
20
MHz to
20MHz
to3000
3000 MHz,
MHz, with
with 3! plug-in
plug-in
antennas
antennas
loaded
loaded loop
loop antenna
antenna
loaded
loaded loop
loop antenna
antenna
log-periodic
log-periodic antenna
antenna

loop
loop antenna
antenna
vertical
vertical for
for all
all antenna
antenna modules,
modules, horihorizontal
zontal polarization
polarization by
by turning
turning the
the lonlon90
°
gitudinal
gitudinal antenna
antenna axis
axis by
by 90°
90°
direction
direction finding
finding for
for horizontally
horizontallypolarpolar
ized
ized signals
signals not
not possible
possible because
because of
of
circular
circular vertical
vertical pattern
pattern of
of system
system
5 0Ω
50
<2.5
<2.5 typ.
typ.
cable with
with N
N connector
connector
11m cable
for
for typical
typical values
valuessee
see page
page 77
for
for typical
typical values
values see
see page
page 77
for
for typical
typical values
valuessee
see page
page 77
IP3,
'P3, typ.
typ. 19
19 dBm
dBm (battery
(batteryvoltage
voltage66 V,
V,
25
25°
°C)
°C)
25°C)
25"C)
55 mA
mA in
in active
active mode
mode
55
00 mA
mA in
in passive
passive mode
mode
in
in handle,
handle, 44 x* 1.5
1.5 V
V mignon
mignon cell
cell R6
R6
470 mm
mm x* 360
360 mm
mm x* 180
180 mm
mm
470
(in
in transport
transport case)
case)

−—30°
30°C
30
C
+60
+60°C
°C
C active/passive
' to
to +60°
+60"C
active/passivemode
mode
−—10°C
10°C
10
10°
°C
C to
+50
+50°C
°C
C active
to +50°
+50°C
active mode
mode
−—30°
30°C
30
C
+60°C
C passive
' to
to +60
+60"C
passive mode
mode
' to
to +60°
+60"C
−—30°
30°C
30
30°
°C
C
+60
+60°C
°C
C
random
gg2/Hz,
random10
10 Hz
Hzto3300
0 0 Hz:
Hz: 0.01
0.01
2
300
300 Hz
Hz to
to 500
500 Hz:
Hz: 0.003
0.003 gg/Hz,
every
every 30
30 minutes
minutes in
in 3
! orthogonal
orthogonal
axes;
axes; acceleration
acceleration approx.
approx. 1.9
1.9 gg rms
rms
max.
max, 40
40 g,
g, crossover
crossoverfrequency
frequency45
45 Hz
Hz
in
in 3
! orthogonal
orthogonal axes
axes
0.5
0.5 kg
kg
0.65
0.65 kg
kg
0.55
0.55 kg
kg
0.3
0.3 kg
kg
0.45
0.45 kg
kg
0.4
0.4 kg
kg

!
!

Digital scout Frequency Detector
*+,+-.%&/0"1-&23$41$506&*$-$0-"3&

M

o

d

e !"#$%&'())
l
7522

D7/89:;&
!" RI #$ I % N
*
*7/89:;&
The Model
)-.!
/01.2! 7522
3455!Digital
'676892! scout
:;0<8! RE
=%! frequency
>[email protected];80?C>6.21! strength
D8?.A78-! meter
E.8.?! is
6D! a9! near
A.9?! field
>6.21!
measurement instrument that captures digital,!9D!H.22!9D!9A9207!D67A92DG!>?0E!,I/JK!L5MNOJKM!
as well as analog signals, from 1 0MHz -2.6G!z.
E.9D.E.A8!6AD8?E.9D.E.A8!6AD8??0E!,I/JK!L5MNOJKM!
Until now,
PA862!
A0HG!the
8-.! only
0A2B! signals
D67A92D! that
8-98! frequency
>[email protected];0;0<21! lock
20;Q! onto
0A80! were
H.?.! analog
9A9207! signals.
D67A92DM! In
&A!
addition t80!
o locking
9116860A!
20;Q6A7! onto
0A80!digital
1676892!and
9A1!analog
9A9207!signals,
D67A92DG! the
8-.! Model
/01.2! 7522
3455! has
-9D! a9! calibrated
;926R?98.1! signal
D67A92!
strength measurement from -45d"m to -5dBm.
D8?.A78-!E.9D.E.A8!>?0E!LS41TE!80!L41TEM!

USAGE
?/@A7&
#A.!
;9A!use
8-.! Model
/01.2! 7522
3455! in
6A! all
922! places
F29;.D! where
H-.?.! unknown
A.9?! field
>6.21!RE-signals
=%LD67A92D! must
ER.!
One can
;9F8.1G!20;926K.1!9A1!.U9E6A.1!?.79?16A7!8-.6?!>[email protected], localized and examined regarding their frequencies.
)-.!/01.2!3455!6D!;9F9R2.!0>!1.8.;86A7!E9AB!16>>.?.A8!8BF.D!0>!1676892!E01<29860AD!8-98!-9V.!9!
)-.!/01.2!3455!6D!;9F9R2.!0>!1.8.;86A7!E9AB!16>>.?
.A8!8BF.D!0>!1676892!E01<29860AD!8-98!-9V.!9!
The Model 7522 is capable of detecting many different
types of digital modulations that have a
9D! TDMA,
)'/*G! GSM,
O:/G!APCO
*X"#! 25,
54G! ON/OFF
#$C#%%! Keying,
Y.B6A7G!
E6A6EF<2D.! width
H618-! o0>!
4IIE:W!signals
D67A92D! such
DDf 500m5;
TETRA and more.
)()=*!9A1!E0?.M!
)-.!/01.2!3455!6D!A08!;9F9R2.!0>!;0)-.!/01.2!3455!6D!A08!;9F9R2.!0>!;0The Model 7522 is not capable of counting signals!Dsuch as Spread Spectrum, CDMA and PCS.

FEATURES
[email protected]/&
1,I/JK!L!5MNOJK!>[email protected] M H z - 2.6CI
54LN!-0!R988.?B!0F.?9860A!
- 6 hour battery operation
25U,N!92F-9Ax 1 6 alphanumeric [CD with EL backlight
:67A92!:8?.A78-!?.916A7!16DF29B.1!6A!1TE!9A1!R9?07?9F-!Z!
Signal
Strength reading displayed in dBm and barograph
4S41TE!80!L41TE!
5d"mto-5d"m
+[CL!41TE!D67A92!D8?.A78-!9;;9;B!
/ - 5d"m signal strength accuracy
'0HA2091!E.E0?B!80!9!X"!9;.!
Download
memory to a PC using the optional Optolinx interface
=.9;860A!)=.9;860A!)Reaction
Tune analog signals with ICOM IC!=,IG!=3IIIG!=3,IIG!=\4II!9A1!=]IIIM!*#=!
RiO, R7000, R7100, R8500 and R9000. AOR
*
*=\III!9A1!*=\5IIM!#F80.2.;8?0A6;D!#F80
*=\III!9A1!*=\5IIM!#F80.2.;8?0A6;D!#F80;0EG!#:S4NC+68.G!#:4^4!9A1!=,,MT"5S4_+)!
;0EG!#:S4NC+68.G!#:4^4!9A1!=,,MT"5S4_+)!
#=\III!9A1!*=\5IIM!#F80.2.;8?0A6;D!#F80
R8000 and #R8200. Optoelectronics Optocom,
05456/Lite, 05535 and Ri 1 ."$245%L&
9A1!T"3\I!`:E9?8+6AQ!;[email protected]<6?.1a!
and "$780 (SmartLink cable required)
1,III!E.E0?6.D!H68-!N4GIII!-68D!F.?!E.E0?B!
000 memories with 65,000 hits per memory
"9F8.D!R08-!'676892!`/6A6ECaptures both Digital (Minimum 500mS RF pulse required) and analog signals
BT..F.?!9A1!b6R?980?!92.?8!
e e p e r and Vibrator alert
S:u p e r Sensitive, down to 700uV in some bands!














TECHNICAL DATA
<78B>:[email protected]&*@%[email protected] Range:

10MHz to 2.6G!z
,I/JK!80!5MNOJK!

Resolution:
=.D02<860Ac!!

1KHz and 100Hz
,YJK!9A1!,IIJK!

%[email protected] Accuracy:

,FFE!
l

:67A92!:8?.A78-c!!
Signal Strength:

-45d13m to -5d"m
LS41TE!80!L41TE!

:67A92!*;;9;Bc!!
Signal Accuracy:

+1- 5d13m
[CL!41TE!

'6DF29Bc!!
Display:

5U,N!92F-9A2x16 alphanumeric LCD

!

H68-!(+!R9;Q267-8!
with EL backlight

Power:
X0H.?c!!

]9!b'"G!,4IE*!
]!b'"G!,4IE*!
VDC, 1 5(m#

!

using model AC90 wall

!

X2<7!919F8.?M!
Plug adapter.

:6K.!`J!U!d!U!'ac!!
Size (! ' W ' D):

5.25" ' )" ' 1 .5"
4M54ee!U!^ee!U!,M4ee!

d.67-8c!!
Weight:

12 oz
,5!0K!

!

CONFIDENTIAL
"#$%&'($)&*+!
"#$%&'($)&*+!!

,

!
!

Advanced Cable Tracing
system
+#,-./$#&0-1%$&23-/4.5&6789$:
5&67
&6
789$:
89$:
+#,-./$#&0-1%$&23-/4.5
+#,-./$#&0-1%$&23-/4.

M

o

d

e!"#$%&'()*
l
7523

!

With cable measurement taking up to 30 percent of!2!7B55=!5AA>9/C!/>>47!/02/!=9>D.E5!.6=>9/2:/!
a sweep effort, tools that provide Important
-./0!12345!652789565:/!/2;.:[email protected]!=5915:/!>A
-./0!12345!652789565:/!/2;.:[email protected]!=5915:/!>A!2!7B55=!5AA>9/C!/>>47!/02/!=9>D.E5!.6=>9/2:/!
information effectively
h e Advanced
s
.:A>962/.>:!
5AA51/.D54F! and
2:E!quickly
G8.1;4F! are
295! needed.
:55E5EH!
:55E5EH!
H! T! )05!
*ED2:15E! Cable
"2345! Tracing
)921.:IF7/56! i.7!
designed to aid in locating all cables coming from the target location. Capable of tracing cables
E57.!2.E!.:!4>12/.:6.:6!/05!/29<5/!4>12/.>:H!"2=2345!>A!/921.:buried as deep as 2 meters, this system excels in ensuring all potentiay dangerous cables are
389.5E!27!E55=!27!J!65/597C!/0.7!7F7/56!5K1547!.:!5:789.:/5:/.244F!E2:<59>87!123457!295!
found.
A>8:EH!
!
!

!
!
!

CONFIDENTIAL
"#$%&'($)&*+!
"#$%&'($)&*+!!

,

ela!nan t o l ) !
!

X+,*+,-.&/"0&120$$3435&678&80$9$3:9
*

Model 7525
!"#$%&'()(

!

A!slim-line,
*
*!
-./01./234!large
.5673!capacity
85958/:;! color
805/.! and
52=! parcel
95683.!
scanner
-852236!
You can't
[email protected]:! always
5.A5;-! predict
963=/8:! what
AB5:! will
A/..!arrive
566/C3! in
/2! the
:B3!
>!
mail bD?:!
u t you
05/.!
;!can
852!protect
96;6-3.E! against
575/2-:! nasty
25-:;!
surprises. X-ray scanners see inside your mail and
-?696/-3-F!G165;!-852236-!-33!/2-/=3!;6!05/.!52=!

Screen you
mail and
courier
deliveri
quickly

96<2! the
:B3! spot
-98<2E/605:/<2! o?2?-?5.! o<6!
provide on
f unusual
r
?23H938:3=!958I573-F!
unexpected packages.

/2-938:/<2! c8B50D36!
58839:-! p9• L+5673!
a r g e inspection
h a m b e r accepts
ostal
:65;-4!95683.-!52=!D6/3E85-3-F!
trays, parcels and briefcases.
J./01./23!=3-/72!
• slim-line
design
• QK?/8I!52=!35-;!:u i c k and easy to use
• UL-3-!5!-/09.3!0-3!8<2:6s e s a simple mouse control
• L+5:3-:!8a t e s t color technology

%633-:52=/27!A/:B!E6<2:!.<5=/27!=<<6!
• Freestanding
with front loading door
J852-!M&N!963-32:-!O!-?-938:3=!D?7-!
• Scans
VIP presents & suspected bugs

&
REASSURANCE FOR YOUR !"#$$
,;<11=,<>?;&@A,&BA=,&1C)B3!P<=3.!QRSR!85D/23:!G165;!-852236!96The Model 7525 cabinet X-ray scanner provides on the spot verification
of unusual packages giving reassurance to all staff handling mail.
!

COMPACT AND EASY TO USE
?A!8D&;<1B&CA&=1;&
)B3!
P<=3.! 7525
QRSR! i /-!
=3-/723=! fE<6!
35-;! use
?-3! bD;!
2<21:38B2/85.! staff.
-:5EEF!
The Model
s designed
o r easy
y non-technical
"<0D/23-!
.5673!inspection
/2-938:/<2!chamber
8B50D36! with
A/:B!a5!slim-line
-./01./23! cabinet
85D/23:! allowing
5..Combines a5!large
;!
3H50/23! volume
C05/.4!large
.5673! parcels
95683.-! and
52=!briefcases
D6/3E85-3-! in
/2! areas
5635-!
you t:o examine
AB363!-9583!/-!5:!5!9630/?0F!
where space is at a premium.

keys

c o i i '

" # ! .%

!

glasses

RAPID SCREENING
,<87D&1?,;;>7>E&
&:30-!
563!placed
9.583=!in
/2!the
:B3! front
E6<2:!loading
.<5=/27!inspection
/2-938:/<2!chamber
8B50D36! and
52=! a5! single
-/27.3!
Items are
D?::<2!58:/<2!96<=?83-!5!8.356!/0573!button action produces a clear image of the contents in seconds.

-

!

IMAGE ENHANCEMENT CO1ORSCAN MODEL
7!F<>?;!;>C&?AGA,1?<>&!AD;G&
*?:<05:/8!&0573!(2B5283032:!
• Automatic
Image Enhancement
$375:/C3!<6!/2C36-3!/0573!<9:/<2!
• Negative or inverse image option
• 8T!H!U<<0!
zoom
• 2S!8color options for highlighting medium and high density
CONFIDENTIAL
"#$%&'($)&*+!
"#$%&'($)&*+!!

,

!
!

Model 7525
!"#$%&'()(

X+,*+,-.&/"0&120$$3435&678&80$9$3:9
*
!

BASIC B/W MODEL (BLACK AND WHITE)
;<17=&;>?&[email protected]&D;C<=E&• s-./012!31456!478!9:.;2!./4<2!
i m p l e black and white image
!

HEALTH AND SAFETY
GBThe X-ray
o w level
o all
):2!
=>[email protected]! scanners
A54772?A! use
BA2! very
[email protected]! l1D9!
12C21! X-rays
=>[email protected]! and
478! conform
5D7ED?/! t;D!
411!
0B31.A:28!.7;2?74;.D741!(125;?.541!-4E2;@!478!F48.4;.D7!-;4784?8A!478!4?2!
Published international Electrical safety and Radiation Standards and are
.AAB28!9.;:!4!52?;.E.28!F48.4;.D7!-4E2;@!478!)2A;!?20D?;G!
issued with a certified Radiation safety and Test report.
!

X-RAY IMAGE RECOGNITION
*+,H4A.5!
#02?4;D?!Training
)?4.7.7478!X-ray
=>[email protected]! image
./4<2! recognition
?25D<7.;.D7! charts
5:4?;A! can
547! b32!
Basic Operator
e
provided.
0?DC.828G!
!

Narcotics hidden in boxes
or small containers

SERVICING AND SUPPORT
1B,67=7FL&%B11!/4.7;274752!478!3456>B0!AB00D?;!.A!4C4.14312G!'B2!;D!;:2!74;B?2!DE!
Full maintenance and back-up support is available. Due to the nature of
.;A!
82A.<7!the
;:2!Model
ID821!7JK,K!
:4A! no
7D!conveyor
[email protected]?! or
D?! electrical
2125;?.541! moving
/DC.704?;A!
its design
5 2 5 has
;:4;!/.that might require expensive servicing.

I

739O$2:4"3&=N-PR$0&&
Inspection Chamber

TECHNICAL SPECIFICATIONS N2.HB=GF7=Height:
8N.942-%&1O$24/42-:4"39&&
Physical specifications
162.5 cm (65")
N2.PQ,GK!5/!RQKST!!
Height

!

Width:
U.8;:O!!

V,GW!5/!RPJST!!
42.8cm (17")

'20;:O!!
Depth:

61 cm (24")
QP!5/!R,VST!!

$2;!U2.Net Weight:

PJX6170kg (!!"l#s)

7P-5$&<0$-Q&&
Image Area:
'20;:O!!
Depth:

VP!5/!RPQST!!
41 cm (16")

Width:
U.8;:O!!

YV!5/!RPYGQST!!
34 $ m (13.6")

53.5 cm (21 ")
KYGK!5/!R,PST!!

Width:
U.8;:O!!

42cm (17")
V,!5/!RPJST!!

'20;:O!!
Depth:

56 cm (22")
KQ!5/!R,,ST!!

A""0&@O$3435Q&&
Door Opening:
N2.Height:

KYGK!5/!R,PST!!
53.5 cm (21 ")

Width
U.8;:O!!

YV!5/!RPYGQST!!
34 $ m (13.61

ZD92?!?2LB.?2/27;A!!
Power requirements

PPX[\!,YX[\!KX]QX!N^!
110V, 230V, 50/60 Hz

-:.0/27;!A025.E.54;.D7A!
112 (w) % 77 (d) % 150 (h) cm
Shipment specifications PP,!R9T!M!JJ!R8T!M!PKX!R:T!5/!
!

2
U2.Weight: 250kgs

!

CONFIDENTIAL
"#$%&'($)&*+!
"#$%&'($)&*+!!

2

,

i111f!Q11
i111f
i111f!
!Q11
Q11

itopo

ii I " . I 1 i I

Topsec G5
#
TopSec
GSM
The
The mobile
mobile phone
phone for
for your
your confidential
confidential calls
calls

High
• H
High security level

Top-quality
speech encoding
encoding for
• Top-quality speech
for end-toend-toend
voice
communication
end


Invariably reliable
speech quality
• Invariably
reliable speech
quality

Simple
handling
• simple handling

ROHDE



◆ Recommended
Recommended by
bythe
theGerman
German
Information
Security
Agency
Information Security Agency

Topsec GS
!: mobile
TopSec
GSM:
mobile and
and
confidential
confidential
The fast
of information
information and
The
fast transfer
transfer of
and
instant decisions, particularly
particularly at higher
higher
levels of management
are
more
impormanagement
important than ever. Therefore, it must
must also be
be
possible to exchange confidential inforG!
mation over mobile phones. In the GSM
transmission mode,
mode, data is only encrypencrypted between mobile phone and base
base station. Beyond
Beyond that, the call is routed via
radio relay or fixed networks without any
protection. In some
some countries even the
minimum security requirements for
mobile communication
communication are not met.
TheTopsec
! has been developed so
The
TopSec G5
GSM
so
that confidential information can
can be
be
exchanged reliably and without any
any risk
risk
of eavesdropping.

The
secret"mobile
mobile phone
phone
The "top
top secret
meets
highest demands
demands
meets highest
The
TopSec GS
GSM
The basis of the Topsec
! is the
renowned siemens
Siemens dualband mobile
phone S
S 35i. The
The core, however, is the

Keystream

Pi

Security in
in mobile
mobile radio
radio netnetSecurity
works and
and on
on the
the ISDN
ISBN landline
landline
works
network
network

• Excellent
quality

Excellent speech
speech quality
• simple

Simple operation
• Voice

Voice dialling
• Compact
size

Compact size
• Low
weight

Low weight
• Internet
via WAP
browser

Internet access
access via
WAP browser
•◆ Soft
modem
and
Soft modem and
• IR
for mobile
mobile data
data transfer
transfer

IR interface
interface for

#h
#
h
h

o%s&'GS
!isissuitable
suitablefor
forencrypted
encrypted
The
TopSec
GSM
end-to-end
voice
communication
in the
the
end-to-end voice communication in
s$ frequency
frequency ranges
rangesof
of900
900MHz
MHzand
and
GSM
1800MHz.
MHz. A
A confidential
confidential discussion
discussion can
1800
can
becarried
carried on
on between
between
two TopSec
#o%5&'GSM
G5!
be
betw
een two
mobile phones
phoneswithout
without any
anyrisk.
risk.
mobile
Encrypted
Encryptedcalls
callsfrom
fromthe
theTopSec
TopsecGSM
GS!can
can
alsobe
be made
madeto
to the
the landline
landline network:
network:
also

Encrypted
speech is
Encrypted speech
is transmitted
transmitted on
on the
the
transparent
GSM
channel. Through
Through
transparent GS
! data channel.
the use
of the
the G5
G5!
! half-rate vocoder,
vocoder,
the
use of
GSM
even
excellent
speech quality
quality is
quality
excellent speech
is ensured
ensured even
in
encrypted mode.
mode. To
To attain top
in the encrypted
top
security,
security, two algorithms
algorithms are
are combined;
combined;
an
anasymmetrical
asymmetricalalgorithm
algorithmwith
with aa1024-bit
1024
key
for
key
agreement
and
a
symmetrical
key for key agreement and a symmetrical
algorithm
a 128-bit
algorithm with a
128 key for voice
encryption.
encryption.

Key K

the
the only
only prerequisite
prerequisite isis that
that the
the called
called
ISDN
ISBNstation
station must
must be
beprotected
protected by
byaa
TopSec
TopSec703+
703+of
ofthe
theTopSec
TopSecproduct
productfamily.
family.

Keystream
Keystream
Generator
Generator

Keystream

Ki

Ki

Ciphertext

Plaintext

Encrypt

TopSec
GSM
Topsec GsM

Inaddition to
to the
the encryption
encryption function,
function, the
the
In
Topsec G5
G5!
! offers
of aa
TopSec
GSM
offers all advantages
advantages of
latest-generation
latest-generatio
latest-generation
n mobile
mobile phone:
phone:

Keystream
Keystream
Generator
Generator

Key K

Asisis the
the case
case with
with the
the TopSec
#o%5&'ISDN
ISBN
As
encryption devices
devices for
for voice
voiceand
anddata
data
encryption
communication, the
the TopSec
#o%5&'GSM
G5!
G5
!isis
communication,
recommended by
by the
the German
GermanInformaInformarecommended
tion Security
securityngency,
confirmingthe
the high
tion
Agency, confirming
security
standard.
security standard.

crypto module.
to its
its size
size of
of only
only
crypto
module. Due
Due to
32mm
34mm
has been
completely
32
mm x" 34
mm it has
been completely
integrated into
into the
theS
35i. The
#he
heTopSec
#opSec
#
opSecGS
$
integrated
S 35i.
T#
he
GSM
cannot be
normal
from aa normal
cannot
be distinguis
distinguished
hed from
siemens Ss 35i mobile
phone.
Siemens
mobile phone.

Ci

Plaintext

Decrypt

Pi

Absolute confidentiality at a
single keystroke

thecrypto
cryptomode,
mode,your
yourT
opsecGSM
t&s'phone
phone
InInthe
TopSec
andthe
thecalled
calledTopSec
Topsecstation
stationautomatically
automatically
and
agreeon
onaanew
new128-bit
128 key for each call. The
agree
128 key is randomly determined out of
128-bit
38
10
10
possibilities and erased after the call
iissterminated.
terminated.

I

Dial the
of the
the desired
Dial
the number
number of
desired subscriber
subscriber
and briefly press the crypto softkey below
the display to switch to the crypto mode.
hC
"Crypto"
is indicated in the display to
confirm the encryption
encryptionmode
mode as
as well as
as aa
4-digit control code (see figure). In the
44-digit
case of closed subscriber groups, autocase
automatic authentication is performed by
by a
public key procedure.
Thusyou can be sure that your
your communi
Thus
communi-cation is encrypted and that nobody
nobody can
eavesdrop your
eavesdrop
your call.

Thismethod
methodisis one
oneof
ofthe
theessential
essential secusecuThis
rity features
features offered
offered by
byTopSec
TopsecGSM.
GS!.
rity

Crypto
-

!t%

20S1 !
( '

Crypto
Cryptomode
mode
indicated
indicatedin
inthe
thedisplay
display

Size of
Size
crypto
module
crypto module

Specifications
Specifications
Frequency
range
Frequency range
GSM
class 44(2W)
(2 W)
GS!class
GSM
class 1(1
1 (1 W)
W)
GS!class

880MHz
to"#$
880
MHz to
960 MHz
MHz
1710
MHz to 1880
1880 MHz
1710MHz
MHz

Voice transmission
(GSM
half-rate vocoder)
vocoder)
(GS!
(GS
! half-rate

normal
operation,
normal operation,
encrypted
transmission
encrypted transmission

Operating
voltage
Operating voltage

3.6
16 V

Current drain

max.
400 mA
mA
max. 400

Operating
temperature
Operating temperature

0°C
0"C to
to 45°C
45"C

Standby
time
Standby time

up
220 hours
hours
up to
to 220

Talk
time
Talk time

up
up to
to 66 hours
hours

size
Size

118mm
mm!( 46
46mm
mm!( 21
21 mm
mm
118

Weight
Weight

105
105gg

Ordering
Ordering information
information
TopSec
TopsecGSM
GS!
GS
!

3531
3531.6527

TopSec
TopsecGSM
GsM

!
!

Ultra s!a"5#b X-ray
Unit
+%,-.&/0.1(*2&34-.5&+16,
5&+16,
+%,-.&/0.1(*2&34-.5
+%,-.&/0.1(*2&34-.

M

o

d

l
7530
!"#$%&'()*

e

Ultra Scan50b
s the
f Ultra
-./01!
2314567! i89!
/:;! subsequent
9<79;=<>[email protected];! oAB!
-./01! Scan50a.
2314561C! With
D8/:! over
AE;0! 3000
F666! installations
849/1..1/8A49!
worldwide Ultra Scan50b is an extremely successful compact X-ray inspection system.
[email protected]@;!-./01!2314567!89!14!;H/0;I;.J!9<33;99B13/!KL01J!849>;3/8A4!9J9/;IC!
A modular designed tabletop system; Ultra Scan50b is flexible, extendable and therefore can be
*[email protected]!9J9/;IM!-./01!2314567!89!B.;H87.;N!;H/;[email protected];[email protected]!/:;0;BA0;!314!7;!
used for different applications.
<9;@[email protected];0;4/!1>>.831/8A49C!
Due t /A!
o state-of-the-art
n d computer-technologies
i s s9J9/;I!
y s t e m oABB;09!
ff e r s
'9/1/;LABL/:;L10/! X-ray-,
KL01JLN! sensor9;49A0L! [email protected]!
3AI>;0L/;3:4A.A?8;9! t h
/:89!
functionalities, which in the past were reserved
solely for aviation security purposes.
B<43/8A41.8/8;9N!G:83:!84!/:;!>19/!G;0;!0;9;
B<43/8A41.8/8;9N!G:83:!84!/:;!>19/!G;0;!0;9;0E;@!9A.;.J!BA0!1E81/8A4!9;3<08/J!><0>A9;9C!
0E;@!9A.;.J!BA0!1E81/8A4!9;3<08/J!><0>A9;9C!
Ultra Scan50b
ith
-./01!
2314567! permits
>;0I8/9! configurations
3A4B8?<01/8A49! wG8/:!
A>;01/A0!/018484?N!)&[email protected]!8I1?;!I141?;I;4/!
operator training, TIP- and image management
functional ities.
B<43/8A41.8/8;9C!
P;84?!
A4;! oAB!
/:;! m
IA9/!
9>13;! saving
91E84?! X-ray
KL01J!
Being one
f the
o s t space
849>;3/8A4!
9J9/;I9!available,
1E18.17.;N!Ultra
-./01!Scan50b
2314567! is
89!
inspection systems
ideal f BA0!
o r u<9;!
s e i 84!
n mailrooms,
[email protected];1.!
I18.0AAI9N!entrance
;4/0143;! halls,
:1..9N!
3A00;3/8A41.!
[email protected]!judicial
QB138.8/8;9N!schools
93:AA.9! and
[email protected]!
correctional and
I14J!
A/:;0! security
9;3<08/J! sensitive
9;498/8E;! areas,
10;19N! where
G:;0;!
many other
3A4/13/LB0;;!
849>;3/8A4! oAB!
>A<3:;9N! b 71?9N!
contact-free inspection
f pouches,
ags,
.;//;09!A0!>13R1?;9!89!0;=<80;@C!
letters or packages is required.
-./01!
2314567!--increased
LL8430;19;@! security
9;3<08/J! thanks
/:14R9! t/A!
Ultra Scan50b
o
[email protected];@!/;3:4A.A?JC!
advanced technology.

FEATURE HIGHLIGHTS
789:+;8&<=>=>• C"AI>13/[email protected];9R/A>!9A.8A4!BA0!IA78.;[email protected]!9/1/8A410J!1>>.831/8A49!
o m p a c t desktop solution for mobile and stationary applications
• N$;G!KL01J!?;4;01/A0!>.<9!4;G!9;49A0!/;3:4A.A?J!BA0!:8?:!>;0BA0I143;!
e w X-ray generator plus new sensor technology for high performance

OPTIONAL
@A:[email protected]?&





S&L)&OT!):0;1/!&I1?;!O0AQ;3/8A4!
HI-TIP:
Threat Image Projection
K/0184T!#>;01/A0!/018484?!9J9/;I!
Xtrain: Operator training system
1&U2T!(.;3/0A483!8I1?;!9/A01?;[email protected]!103:8E;!
" 5 : Electronic image storage and archive
K>A0/T!Image
&I1?;! export
;H>A0/! in
84!TIP)&%L! or
A0! JPEG
VO(W! format
BA0I1/! incl.
BA0I1/!
843.C!automatic
1/0149I8998A4! t/A!
O"! via
E81!
Xport:
o PC
Ethernet
(/:;04;/!

TECHNICAL DATA H I
:8C>$1$-.%&/E$06F60.,6"1G&
General specifications

&

Tunnel dimensions
)<44;[email protected];498A49!

5FX!YPZ!H!FF6!YSZ![II\!N!X,]!YPZ!H!,F]!YSZ!
532 (B) # 330 (H) [mm] , 21" (B) # 13" (H)

U1HC!A7Q;3/!98^;!
Max. object size

5F6!YPZ!H!FX6!YSZ![II\!N!X6C_]!YPZ!H!,XC`]!YSZ!
530 ($) # 320 (!) [mm] , 20.9" ($) # 12.6" (!)

"A4E;JA0!:;8?:/!
Conveyor height

1>>0AHC!,_6!II!YaCb]Z!
approx. 190 mm (7.4")

"A4E;JA0!
9>;;@! at
1/!mains
I1849!frequency
B0;=56! 1>>0AHC!6C,d!c!6CXX![Ic9\!
Conveyor speed
approx. 0.18/0.22 [mIs]
!z/60 Hz
S^c`6!S^!!
U1HC!3A4E;[email protected]!Y;E;[email protected]/087;@Z!
Max. conveyor load (evenly distributed)

`6!R?!Y,FX!.79Z!
60kg (132 Ibs)

e;9A.8A4!YG80;[email protected];/;3/178.8/JZ!
Resolution (wire detectability)

2/[email protected]@T!
Fd! AWG
*DW! (0.13
Y6C,F! mm)
IIZ! typical:
/J>831.T! 39
F_! AWG
*DW! (0.10
Y6C,6!
standard: 38
IIZ!
mm)

O;4;/01/8A4!Y9/;;.Z!
Penetration (steel)

2/[email protected]@T!,6!IIN!/J>831.T!,X!II!
2/[email protected]
[email protected]!,6!IIN!/J>831.T!,X!II!
Standard:
10 mm, typical: 12 mm

[email protected];!Y/J>831.Z!
X-ray dose (typical)

S&LU*)T!,C`!
2E!Y6C,`!I0;IZ!
HI-MAT: 1.6 p5v
(0.16 mrem)

%8.I!91B;/J!
Film safety

W<1014/;;@!
;E;4! for
BA0! high
:8?:! speed
9>;;@! films
B8.I9! up
<>! /A!
&2#! 1600
,`66!
Guaranteed even
to 150
YFF!'&$Z!
(33 DIN)

'Duty cycle

,66fN!4A!G10IL<>!>0A3;@<0;!0;=<80;@!
100%, no warm-up procedure required

CONFIDENTIAL
"#$%&'($)&*+!
"#$%&'($)&*+!!

1

,

!
!

Ultra s!"#5$b X-ray
Unit
+%,-.&/0.1(*2&34-.5&+16,
5&+16,
+%,-.&/0.1(*2&34-.5
+%,-.&/0.1(*2&34-.

Model 7530
!"#$%&'()*

!

!

X-ray Generator
34-.5&7$1$-.,"-&

&

Anode voltage
*-./0!1.23450!!

100 kV op
677!89!:;!!

cooling
:..2
h

e

r

m

e

t

i

a =0>?03l l y
sealed oil bath

c

Beam direction
C04?!/<>0:3
diagonal
/<45.-42!

Image Generating system
89.:$&7$1$-.,61:&/5;,$9&

&

DE>[email protected]!:.-10>30>!
X-ray converter

+EA=4;0/!/030:3.>!20A.2G3L-shaped detector line, high resolution

H>[email protected]!20102A!A3.>0/!
Grey levels stored

4096
I7JK!

&?450!;>0A0-343Image presentation

5

/

V

V

LMNF!:.2.>!
,
color

'<5<342!10.!?0?.>@!
Digital video memory

1280 X 1 024 / 24 bit
6,O7!P!67,I!M!,I!B<3!

&?450!0142G43Image evaluation functions

CMNF!R&HRF!+#NF!$(HS!CMNF!R&HRF!+#NF
B/W, HIGH, LOW, !$(HS!NEG; incl. Option HI-MAT, additionally
VA R I
9*V&EU*)F!
#,F! #L! 020:3>.-0-24>50?0-3!G;!3.!6KE30A!
enlargement up to 1 6

U.-<3.>!
Monitor

1

7

"

6YZ!:.2.>!?.-<3.>F!2.[!>4/<43/6YZ!:.2.>!?.-<3.>F!2.[!>4
/<43/color monitor, low radiation
according to MPR II und
)"#!JJ!A34-/4>/A!.3=0>!?.-<3.>A!.-!>0]G0A3!
!"# 99 standards other monitors on request

Additional Features
-$;&

&

Features
%043G>0A!

+G55450!
:.G-30>F! user-id
GA0>E! number,
-G?B0>F! display
/.Q!
.;0>43Luggage counter,
f operating
?./0F!V(9&(NEQ043G>0!3.!>0:422!;>01mode, REVIEW-feature to recall previously visible image
4>04AF!W..?!.10>1<0[F!Q>00!;>.5>[email protected]!
areas, zoom overview, free programmable keys

#
#;3O;3
R&E)&\F!
R&EL\#)F! sEN.
L($F! Xport,
D;.>3F! 1&UL!
^&?450! Management
U4-450?0-3!
HI-TIP, HI-SPOT,
$ 5 (Image
[email protected]?_!
System)

Installation Data
81;,.%%.,6"1&?.,.&

&

DE>[email protected]!2048450!
X-ray leakage

?003A!422!4;;2?003A!422!4;;205G2430A;0:3!3.!
meets all applicable laws!4-/!>05G2430A;0:3!3.!
and regulations with respect to
DE>[email protected]!0?<33X-ray emitting devices

"(E24B02CE

in c o :.?;2<4-:0!
m p l i a n c e w i[<3=!
t h 9 8 JOM`YM(NHF!
/ 3 7 / % W G , 7 2Y,M,`M(NHF!
/23/%WG,
89/336/% VVG
OJM``KM(NH!

L.G-/!;>0AAG>0!20102!
Sound pressure level

a!bK!/C^*_!
56 dB(A)

#;0>43450!30?;0>43G>0!!
Operating-/storage temperature

0° - 40'D-20'C - +60"C
7c!E!I7c"ME,7c"!E!dK7c"!

RG?<[email protected]!
Humidity

67e!E!J7e!^-.-E:.-/0-A10% - 90% (non-condensing)

\.[0>!AG;;[email protected]!!
Power supply

standard: 230 VAC or 110 VAC +10% /-15%
A34-/4>/X!,`7!9*"!.>!667!9*"!d67e!M!E6be!!
5 0 H z / 6 0 Hz + 3Hz
b7!RW!M!K7!RW!f!`!RW!

\.[0>!:.-AG?;3Power consumption

4;;>.PT!7F`!89*!
approx. 0,3 kVA

\>.30:3/!
Protection class system/keyboard

'P 20 / 'P 43
&\!,7!M!&\!I`!

Dimensions
'0-A
6,77!^+_,_!P!Y7b!^C_!P!Y,K!^R_!g??h!!
1200 (02) X 705 (B) X 726 (H) [mm]
IYT`Z!^+_,_!P!,YTYZ!^C_!P!,OFKZ!^R_!!
47.3" (02) X 27.7" (B) X 28,6" (H)

N0<5=3!
Weight

4;;>.PT!6K7!85F!4;;>.PT!`b,!2BA!
approx. 160 kg, approx. 352 lbs

Mechanical construction
U0:=4-G:3
L3002!
:.-A3>G:3:.-A3>G:3A34-/4>/!
Steel construction
i t h a42G?l u m i n u m p;4-02A!
a n e l s standard
:.2.>^A_X!V*+!J77K!^[=<30!42G?color(s): RAL 9006 (white aluminum)/stainlesss steel

!

CONFIDENTIAL
"#$%&'($)&*+!
"#$%&'($)&*+!!

,2

!
!

3D image
Enhancer
)+&,-./$&012.13$4&
/$&012.13$4&
$&012.13$4&
$&012.13$4&
)+&,-./
)+&,-.

M

o

d

l
7539
!"#$%&'()*

e

!

D056789:8;!" RI #$ I % N
+
+056789:8;The 3D Image Enhancer is a brand-new system for upgrading mobile X-ray units, from 2D into
)-.!/'!&012.!(3-134.5!67!1!85139:3.;!7<7=.0!>[email protected]!0?86B.!C:515?0!E'!63=?!
3D visualizing
f X-ray
/'!
[email protected]! o?>!
C:516012.7H!The
)-.! stereoscopic
7=.5.?74?A64!
7=.5.?74?A64!
4! view
F6.;! provides
A5?F69.7! more
0?5.! information
63>?501=6?3! about
[email protected]=! the
=-.!
checked items
s " # and
4-.4I.9!
6=.07! to
=?! the
=-.!user.
@7.5H!Typical
)1AAB641=6?37! are
1AAB641=6?37!
15.! EOD,
(#'D! NDT,
$')D! !)J"K!
139! all
1BB! others,
?=-.57D! where
;-.5.!
more security is necessary.
[email protected]=!
)-.!
/'!Image
&012.!Enhancer
(3-134.5! is
67! set
7.=! up
@A! very
[email protected]! is
67! easy
.17=?! handle
-139B.! with
;6=-! an
13! intuitive
[email protected]=6F.! user
@7.5!
The 3D
63=.5>14.D!;-64-!3..97!3?!1996=6?31B!=5163632H!)-.!7?>=;15.!7=..57!1!B63.15!0?=?5!=?!0?F.!=-.!C:
interface, which needs no additional training. The software steers a linear motor to move the X51ray source automatically into the right shot positions to provide the required images.
!
*BB!4?00?3!=!C:516B07!139!7=?512.!>?6B7D!
*BB!4?00?3!=!C:[email protected]!.F.3!4?3F.3=6?31B!>6B07!139!7=?512.!>?6B7D!
All common types of X-ray image media can be used,
even conventional films and storage foils,
6>!=-.5?0!1!74133.5!?5!13!6012.!
if they need to be scanned later on. The digital 2D images, coming from a scanner or an image
[email protected], can be individually enhanced and processed into a 3D visualization by the 3D Image
(3-134.5H!&3!=-.!/'!F6.;632!0?9.!G??0D!9.=16BD!
(3-134.5H!&3!=-.!/'!F6.;632!0?9.!G??0D!9.=16BD!A13D!=6B=!139!5?=1=6?3!?>!=-.!7=.5.?74?A64!6012.!
A13D!=6B=!139!5?=1=6?3!?>!=-.!7=.5.?74?A64!6012.!
Enhancer. In the 3D viewing mode zoom, detail, pan,
tilt and rotation of the stereoscopic image
67!4-132.18B.!8is changeable by mouse control.
!
5=HH%,$#&
I,?2"=?&
supplied without
JK4.L&>"=43$&
X-ray source

Linear motor
G,1$.4&-"?"4

!

Illustration
8%%=>?4.?,"1&

!

3D Visualization
)+&@,>=.%,A.?,"1&

FEATURES
B0C:D705&
ADVANTAGES:
[email protected]• 3/'!F6.;632!;[email protected]=!5.9M25..3!?5!A?B156G.9!2B177.7!
0 viewing without red/green or polarized glasses
• L i+62-=;[email protected]=6F.!?A.51=6?3!
g h t w e i g h t & easy to use system for intuitive operation
• A d*[email protected][email protected]!0?86B.!C:51a p t a b l e to numerous mobile X-ray units

4?00?3!X-ray
C:516012.7! can
413! b8.!
A5?4.77.9! into
63=?! 3D
/'! (e.g.
O.H2H! scans
74137! from
>5?0! X-ray
C:51>6B07! N!
• A *BB!
l l common
e processed
&
7=?512.!>?6B7D!6012.7!>5?0!131B?2!N!9626=1B!6012.!4?3F.5=.57P!
storage foils, images from analog & digital image converters)
&0A?5=!>@34=6?3!>?5!QRSD!)&%!139!(RJ!>?501=7!
• Im
p o r t function for JPC, TIP and EPSformats
&012.!enhancement,
.3-134.0.3=D!e.g.
.H2H!brightness,
8562-=3.77D!contrast,
4?3=517=D!filters,
>6B=.57D!sharpness,
>6B=.57D!
7-15A3.77D! bump
[email protected]! map,
01AD! gamma
21001! corr.
4?55H!
• Image
;6=-!A5.F6.;!63!E'!
with preview in 2D

CONFIDENTIAL
"#$%&'($)&*+!
"#$%&'($)&*+!!

1

,

!
!

3D image
Enhancer
)+&,-./$&012.13$4&
/$&012.13$4&
$&012.13$4&
$&012.13$4&
)+&,-./
)+&,-.

M

o

d

l
7539
!"#$%&'()*

e

&
INCLUDED IN DELIVERY:
56789+0+&56&+085:0;<=&
• 3 -'!
D Image
& -'!
3D
&./01!Enhancer
(23/2415! software
6789:/51! for
875! X-ray
;<5/=! source
>7?541! motion
>7?541!
[email protected]! control,
472957AB! image
@./01! processing
C5741>>@20! D!
visualization (single license)
[email protected]>?/[email protected]/[email protected]!G>@[email protected]>1H!
[email protected]!12J!-'!+/C97C!:@93!.7?>1!
i g h end 3D Laptop with mouse
• L [email protected]/[email protected]!78!;<5/=!>7?541!!
n e a r motor for motion of X-ray source
• Co
n t r o l l e r for linear motor
"[email protected]/5!.7975!
• P K7:15!>?CCA=!LMM!N!,OM!P!/2J!5143/501/QA1!Q/9915=!!
o w e r supply 100 2 4 0 V and rechargeable battery
• C "/QA1!>[email protected]!/E/@A/QA1H!
a b l e set 10 m (50 m option available)
• T r)[email protected][email protected]/5!.7975!/2J!;<5/=!>7?541!
i p o d for linear motor and X-ray source

S/915C5778B!>374T!C5791491J!95/2>C759!4/>1!
• Wa
t e r p r o o f , shock protected transport case
[email protected]!:@937?9!;<5/=!>[email protected]/01!472E15915U&
[email protected]!:@937?9!;<5/=!>[email protected]/01!472E15915U
• Supplied
without X-ray source & Image converter!

TECHNICAL DATA
>[email protected]&[email protected]>@&
K5741>>@[email protected]!
Processing time: A b o *Q7?9!LM!!C15!-'[email protected]/01!
u t 10-30 s per 3D image
W/[email protected]/01!>@F1V!
Max image size:

I

K5741>>75V!
Processor:

,MMM!X!,[email protected]>!
2000 ! 2000 Pixels
&[email protected]?.YOB!,Z[!\IF!
Intel ® Pentium ®4, 2.8 GHz

I

#C15/[email protected]!6=>91.V!
Operating system: W i n [email protected]:>Y!;K!K5781>>@72/A!
o w s ® XP Professional
]*W^I''^#[email protected]/A!'[email protected]!
RL,!W_!'']!
R"#/$DD/%&ti'a Drive: 5 RL,!W_!'']!6']*W^`M!\_^'P'1 2 MB DDR 6']*W^`M!\_^'P'DR "# /60 GB/DVD-R/-RW/RAM (max 8x)

Video Controller: N V I D$P&'&*Y!\1%7541a!O!OOM!\7!
I A ® GeForceTM 4440 Go
[email protected]!"72957AA15V!
P]*WV!
VRAM:

Monitor:
[email protected]!

1

4 `O!W_!''][email protected]!.1.75=!
MB DDR video memory

6
L

D +"'!LRb!-'15" 3 D-XGA I 1024 ! 768

C

d6_!,ZMB!K"W"&*!&&B!LMM!_/>1!W7J1.B!&(((L-eOB!6'UsB 2.0, PCMCIA H, 100 Base-TX, 56 kbps Modem, IEEE1394, sDD!"%& CF

/0 Ports:
&^#!K759>V!
([email protected]!
Environment:

1

"/>1!>@F1V!
Case size:
)79/A!:[email protected]!
Totalweight:

1

`,!X!RM!X!,,!4.!
62 ! 50 ! 22 cm

I
1

LM!97!-Rf"!^!,M!97![[email protected]@9=!
0 LM!97!-Rf"!
to 35°( ^!,M!97![[email protected]@9=!
/ 20 to 80% humidity

1

5 [email protected][email protected]!4/>1H!
k g (including case)

!
!

CONFIDENTIAL
"#$%&'($)&*+!
"#$%&'($)&*+!!

2

,

ela%nan t o l ) !
!

Wireless Network Detector
+,-$%$..&/$01"-2&3$0$40"-

M

o

d

e !"#$%&'()*
l
7540

!

D56789:;9&
!" RI #$ I % N
3
356789:;9&
The professional
)-.!
/012.3341567!Wireless
840.7.33!Network
$.9:10;! Detector
'.9.<910! and
65=!visualization
>[email protected]! tool
9117! detects
=.9.<93! and
65=! stores
3910.3! all
677! the
9-.!
Important information
o an
4A/109659!
45210A69415! about
6B1?9! your
C1?0! Wireless
840.7.33! Network
$.9:10;! Environment
$.9:10;!
(5>4015A.59! automatically
6?91A694<677C! t91!
65! 501_
DE+!
Database and visualizes your WLAN infrastructure
on your own imported maps. The information
'696B63.!65=!>[email protected]!C1?0!8+*$!45206390?<9?0
'696B63.!65=!>[email protected]!C1?0!8+*$!45206390?<9?0.!15!C1?0!1:5!4A/109.=!A6/3F!)-.!45210A69415!
.!15!C1?0!1:5!4A/109.=!A6/3F!)-.!45210A69415!
.!15!C1?0!1:5!4A/109.=!A6/3F!)-.!45210A69415!
3910.=!
45!the
9-.!Database
'696B63.!contains
<1596453! extensive
.G9.534>.!information,
45210A69415H! such
45210A69415H!
3?63! the
9-.! Type
)C/.! 12!
(5<0C/9415H! IJDK
stored in
of Encryption,
G!
"110=4569.3H!65=!"-655.73!.9"110=4569.3H!65=!"-655.73!.94=.3!9-.!/1334B4749C!91!245=!1?9!9-.!.G6<9!
Coordinates, and Channels etc. The equipment also!/01>4=.3!9-.!/1334B4749C!91!245=!1?9!9-.!.G6<9!
provides the possibility to find out the exact
location o12!
f an
71<69415!
65!unknown
?5;51:5!Wireless
840.7.33!Access
*<J1459! with
:49-! the
9-.! directional
=40.<941567!Helix-Antenna
M.74GK*59.556! and
65=! the
9-.!
included
PDA
Device.
45<7?=.=!J'*!'.>4With the
849-!
9-.!Wireless
840.7.33!Network
$.9:10;! Detector
'.9.<910! you
C1?!are
60.!able
6B7.! to
91! see
3..! if
42! unauthorized
[email protected]=!Access
*<J14593! within
:49-45!
C1?0!#[email protected]!60.!/0.3.59F!
your Organization are present.
FEATURES
=5>;?856&

'696B63.KD?//109!91!3910.!9-.!45210A69415!
• Database-support
to store the information
[email protected]!9-.!*<• Visualize
the Access Points on your own maps
*?91A69.=!8+*[email protected]!
• Automated
WLAN Visualizing
• FJ'*!317?9415!91!71<69.!9-.!*<D A solution to locate the Access Points
• D'?67!P119!Q845=1:3!R!+45?GS!
u a l Boot (Windows & Linux)
• SD402!&&&!IJD!45<7?=.=!
O Ill CPS included
• 1,TO!J1:.0!*=6/9.03!45<7?=.=!
2V Power Adapters included
• 5U,T!VP!%763-!V.A10C!45<7?=.=!
1 2 MB Flash Memory included

W7906K/1096B7.!M4N-!(5=!$19.B11;!
• Ultra-portable
High End Notebook

TECHNICAL DATA
;[email protected]/97>A&3>;>&
Notebook
$19.B11;!

I

B

M
Tablet Notebook "
"41
41
&PV!)6B7.9!$19.B11;!XY,!

Os
#D!

LinuxTv\/indows® XP Tablet
+45?GZ845=1:3[!XJ!)6B7.9!

RAM
\*V!

512 MB
U,T!VP!

Hard disk
M60=!=43;!

60GB
]^!IP!

I/O Ports
&Z#!J1093!

WDP!
TF^H!PCMCIA
J"V"&*! II,
&&H! 100
,^^!Base-TX,
P63.K)XH! 56
U]! kbps
;B/3! Modem,
V1=.AH!IEEE1394,
&(((,_`YH! SD-Card,
D'K"60=H!
US# 2.0,
Bluetooth
P7?.9119-!

GJDK\..0!
PS-Receiver
I
IJDK\..0!

Siff III - NMEA
D402!&&&!K!$V(*!

PDA
J'*!

D-60/!a6?0?3!"K,^^^!
Sharp Zaurus C-i 000

os
#D!

Linux
+45?G!

ROM
\#V!

128 MB
,Tb!VP!

Case Size:
"[email protected]!
8.4N-9c!
Weight:

1
5

8+*$!9C/.!
WLAN type

0
,

0,^^!G!Y^!!G!,U!4 0 $ 15cm
0 UH^!;N!
kg
b^TF,,!6HBHN!
802.11 a,b,g

!

CONFIDENTIAL
"#$%&'($)&*+!
"#$%&'($)&*+!!

1

,

elaman

)*
!

!

Model 7540
!"#$%&'()*

Wireless Network Detector
+,-$%$..&/$01"-2&3$0$40"-

ILLU ! R "! I # N
566789:;958&

-

_

tixN_il i.aleivnquisoladiameri
AsAiJ
.
. •,

"

!
!
'

-

I

I
igloo



(

-

F50

.- i... 1-

!

- ,



-.



.

- J
,

.

. . . - - - .

°

- - F •

!

!

• * _

H

%

&

!

CONFIDENTIAL
"#$%&'($)&*+!
"#$%&'($)&*+!!

,2

!
!

Wireless Network Detector
+,-$%$..&/$01"-2&3$0$40"-

M

o

d

e !"#$%&'()*
l
7540

!

WLAN DETECTION AND CONTROL SYSTEM
+56/&378798:;/&6/3&9;/8=87!&
The WLAN
! s " # Professionals
)-.!
/+*$!Detection
'.0.10234!and
546!Control
"340738!system
9:90.;! is
29!designed
6.92<4.6! for
=37! )>"?!
@73=.99234589! who
A-3! need
4..6! to
03!
know exactly what 802.11 RE traffic is present, in and around their target location. By using the
B43A!.C5108:!A-50!DEFGHH!I%[email protected]!24!546!573K46!0-.27!057supplied Portable
[email protected]@82.6!
@3705M8.!equipment,
[email protected];.40J! an
54!operative
[email protected]! can
154! survey
9K7O.:! the
0-.! target
05757.5! and
546! map
;[email protected]! all
588! the
0-.! RF
I%!
24=37;50234!
3403!sateHite
950.8820.!imagery.
2;5833B2450t ! the
0-.! details
6.05289! provided
@73O26.6! bM:!
0-.! system,
9:90.;J! i20!
29!
information onto
y looking
y the
t is
@3992M8.!
03!identify
26.402=:! unauthorized
K45K0-372P.6!802.11
DEFGHH!devices.
6.O21.9G! W
! /20-!
0-.! unique
K42NK.! traffic
075==21! control
1340738! system
9:90.;! it
20! is
29!
Possible to
i t h the
@3992M8.!03!240.7=.7.!A20-!0-.!K45K0-372P.6!6.O21.9J!7.46.724possible to interfere with the unauthorized devices, rendering them useless.
!
*9!A.88!59!0-.!3O.70!;[email protected]@24As well as the overt mapping system, it also comes supplied with a covert detections system.
)-.!M36:!A374!Q'*[email protected]!03!K9.!0-.!6.O21.!A20-3K0!M.243MO23K9G!
The body worn PDA and antenna aHows an operator to use the device without being obvious.
*88!
0-.!data
6505! is
29!then
0-.4!transferred
07549=.77.6! onto
3403! the
0-.! main
;524! unit
K420! to
03! map
;[email protected]! all
588! information
24=37;50234! onto
3403! the
0-.! sateHite
950.8820.!
$% the
2;5imagery.
!

WNDOWs BASED LAPTOP CONTROL
/&$'#/>!L*>('!+*Q)#Q!"#$)I#+!
>R>)(?!/&)S!'T*+!DEFGHH!MUs s ! # WTH DUAL 802.11 b/g
!

OMNIDIRECTIONAL VEHICLE ANTENNA
#?$&'&I(")$*+!V(S&"+(!*$)($$*!
!

DIRECTIONAL HANDHELD ANTENNA
'&I(")$*+!S*$'S(+'!*$)($$*!

!

CPS RECEIVER
WQ>!I("(&V(I!
!
(

w N D o W s BASED PDA COVERT s s ! #
/&$'#/>!L*>('!Q'*!"#V(I)!>R>)(?!
/&)S!'T*+!DEFGHH!MUWTH DUAL 802.11 b/g
!
!
!

CONFIDENTIAL
"#$%&'($)&*+!
"#$%&'($)&*+!!

&

,

!
!

Telephone
Line Analyzer
Detector
,-".$&/0.$&1.2%
-".$&/0.$&1.2%
-".$&/0.$&1.2%3
34$5
4$5 6$7$87"5
+$%$,-".$&/0.$&1.2%34$5
+$%$,
+$%$

M

o

e!"#$%&'()*
l 7541

d

Second t30!
o the
-./012!
34.!physical
54678/9:!search,
7.9;/4/9=:.! and
912! wiring
>8;81?! checks
/4./@7! are
9;.! the
34.! most
A073! time
38A.! consuming
/017BA81?! and
912!
technical. To ensure an effective and thorough cable check, there are over 10 checks for each
3./418/9:C!)0!.17B;.!91!.DD./38E.!912!340;0B?4!/9=:.!/4./@cable, requiring a skilled operative and careful documentation.
/9=:.The Telephone Line Analyzer provides a complete integrated
suite of tools to analyze, inspect,
!)4.!).:.5401.!+81.!*19:6H.;!5;0E82.7!9!/0A5:.3.!813.?;93.2!7B83.!0D!300:7!30!919:6H.!)4.!).:.5401.!+81.!*19:6H.;!5;0E82.7!9!/0A5:.3.!81
3.?;93.2!7B83.!0D!300:7!30!919:6H.and test digital telephone lines (and other wiring) for taps and other eavesdropping devices.
912!3.73!28?839:!3.:.5401.!:81.7!I912!034.;!>8;81?J!D0;!3957!912!034.;!.9E.72;05581?!2.E8/.7C!

Microphone
Jack
11o7ory Dial
B'Jdhrl
PA!"o#h$"%

&cutipitiorie
cutipitiorie
kick

Test
Dashboard
View

To u
an inch
21 &m]

Keypad
PuYeti
Hunan

PC

Connecions

Func

Keys

us*/+*o",i!i

DC Dower
Input

U5! Keyboard
U5!
Port

' ( ) J $ d F ;ash

t'Aerr.cry Port

!

TECHNICAL FEATURES
+9:;<=:1/&>[email protected]&
"0A=81.7!AB:385:.!3.7381?!/959=8:838.7!8130!9!781?:.!58./.!0D!.GB85A.13!!
• Co
m b i n e s multiple testing capabilities into a single piece of equipment
*B30A938/!813.;19:!598;!7>83/481?!A93;8K!5.
;D0;A7!3.737!01!9::!598;!/0A=81938017!!
• A u*B30A938/!813.;19:!598;!7>83/481?!A93;8K!5.;D0;A7!3.737!01!9::!598;!/0A=81938017!!
t o m a t i c internal pair switching matrix performs
tests on all pair combinations
LB8/@:6!5.;D0;A7!/0AA01!3.73!DB1/38017!81/:B281?M!!
• Q u i c k l y performs common test functions including:
NB:38A.3.;!3.737!IE0:39?.Multimeter tests (voltage, current, resistance, capacitance)
O%!P;092=912!'.3./30;!IB5!30!QRSHJ!!
RE Broadband Detector (up to 8G&z)
-5./3;BA!*19:6H.;!IB5!30!QTNSHJ!!
Spectrum Analyzer (up to 85-&z)
S8?4!R981!*B280!*A5:8D8.;!!
High Gain Audio Amplifier
Bias Generator +-80 VDC
P897!R.1.;930;!UVQF!W'"!!
*B280!#7/8::07/05.!>834!9/38E.!815B3!IXFSH!30!XFYSH!
Audio Oscilloscope with active input (20Hz to 20.&z
• D i'8?839:!'.A02B:93801!30!/01D8;A!3493!34.!3.:.5401.!:81.!87!103!597781?!9B280!!
g i t a l Demodulation to confirm that the telephone line is not passing audio
%;.GB.1/6!'0A981!O.D:./30A.3.;!I%'O
%;.GB.1/6!'0A981!O.D:./30A.3.;!I%'OJ!30!/4./@!D0;!3957!01!34.!:81.!!
J!30!/4./@!D0;!3957!01!34.!:81.!!
• Frequency
Domain Ref ectometer (FDA)J!30!/4./@!D0;!3957!01!34.!:81.!!
to check for taps on the line
+81.!$01V+81.9;!ZB1/3801!'.3./30;!I$+Z'J!%B1/38019:836!30!2.3./3!.:./3;018/7!/011./3.2!30!9!
• L i n e Non-Linear Junction Detector (NLJD) Functionality to detect electronics connected to a
line
:81.!!
$+Z'!+81.!);9/.![;0=.!D0;!3;9/81?
• N $+Z'!+81.!);9/.![;0=.!D0;!3;9/81?!>8;.7!912!:0/9381?!.:./3;018/7!
L J D Line Trace Probe for tracing!>8;.7!912!:0/9381?!.:./3;018/7!
wires and locating electronics
!
!

CONFIDENTIAL
"#$%&'($)&*+!
"#$%&'($)&*+!!

1

,

ela#nan t o l ) !
!

Model 7541
!"#$%&'()*

Telephone
Line Analyzer
Detector
,-".$&/0.$&1.2%
-".$&/0.$&1.2%
-".$&/0.$&1.2%3
34$5
4$5 6$7$87"5
+$%$,-".$&/0.$&1.2%34$5
+$%$,
+$%$
!

Digital Demodulation
609072%&6$:"#;%270".&
Includes digital decoding capabilities for approximately 80 percent
&-./0123!145467/!12.814-5!.797:4/46423!;8762/[email protected]!92of the world's digital phone systems. Demodulation CODECS are
8;!6B2!C81D3!145467/!9B8-2!3?362>3E!'2>810/7648-!"#'("F!7<2!
upgradeable as new phone systems become available.
095<7127:/2!73!-2C!9B8-2!3?362>3!:2.8>2!7G74/7:/2E!
Digital Demodulation
n a7! digital
'45467/!
'2>810/7648-! confirms
.8-;4<>3! that
6B76! a7! line
/4-2! o8-!
145467/! phone
9B8-2!
system is not passing audio when it should not.
3?362>!43!-86!97334-5!70148!CB2-!46!3B80/1!-86E!

.. .

, a i n

ma*•

v

— . in..

C!

!

<5$=;$.83&6":20.&>$?%$87":$7$5&@<6>A&
Frequency Domain Ref lectometer (FDR)

Similar to
F4>4/768! a7!TDR
)'H!(Time
I)4>2!Domain
'8>74-!Reflectometer)
H2;/2.68>262:06! based
:7321! on
8-! a7!
different technical approach, the Model 7541 's FDA can "shoot"
14;;2<2-6!62.B-4.7/!799<87.BK!6B2!L812/!MNOPD3!%'H!.7-!Q3B886R!
7a!/4-2!;89217-.2!7-8>7/423!4-14.764-5!7!679!8-!6B2!C4<2E!
7!/4-2!;89217-.2!7-8>7/423!4-14.764-5!7!679!8-!6B2!C4<2E!
line for impedance anomalies indicating a tap on the wire.
)B2!
%'H!also
7/38!has
B73! the
6B2!ability
7:4/46?! to
68! plot
9/86! multiple
>0/649/2! FDR
%'H!traces
6<7.23! on
8-! the
6B2!
The FDR
37>2!
1439/7?! f ;8.8>97<438-! o8;!
>0/649/2! pairs
974<3! o8B4368<4.7/!
same display
o r comparison
f multiple
r historical
.8>97<438-E!
comparison.
!

Non
B".C/0.$25&D;.870".&6$7$870".&@B/D6A&".&2&/0.$&
The Model
o detect
)B2!
L812/!7541
MNOP!includes
4-./0123! an
7-! NLJD
$+S'! test
6236! t68!
1262.6! electronics
2/2.6<8-4.3!
connected to an isolated line.
.8--2.621!68!7-!438/7621!/4-2E!
)B43!
43!one
8-2! of
8;! the
6B2! most
>836! powerful
98C262363! for
;8T04.U/?! determining
1262<>4-4-5!
This is
whether or not there are additional electronics attached to a wire.
CB26B2)B2!2=7>9/2!68!6B2!<45B6!4-14.7623!7!97<7//2/!679!8-!974The example to the right indicates a parallel tap on pair 4:5.
W2.7032!
8;! the
6B2!coupling
.809/4-5!in
4-!balanced
:7/7-.21!pairs,
974<3K!any
7-?! combination
.8>:4-7648-! with
C46B!
Because of
either a7! 4O! o8r 5N! indicates
u t t6B2!
he
246B24-14.7623! some
38>2! electronic
2/2.6<8-4.! content,
.8-62-6K! b:06!
2/2.6<8-4.3!7<2!./27?!1262.621!8-!974electronics are clearly detected on pair 4:5.
!

609072%&!;%70:$7$5&+$E7E&
Digital Multimeter Tests
)B2!L812/!MNOP!4-./0123!:734.!>0/64>262The Model 7541 includes basic multimeter tests, such as Voltage,
"0<<2-6K!"797.467-.2K!7-1!H234367-.2E!
Current, Capacitance, and Resistance.
)B2!
7068>764.! switching
3C46.B4-5! matrix
>76<4=! allows
7//8C3! t 6B2!
T04.U/?!
The automatic
h e u032s e r t68!
o quickly
>2730<2!
7-1!display
1439/7?! results
<230/63! f;87//! pair
974.8>:4-7648-3K! easily
2734/?!
measure and
o r all
412-64;?4-5!7-?!7-8>7/423E!
identifying any anomalies.

TECHNICAL sPECIFICA!IONS
+FGHBIG1/&JKFGICONTROL s s " #
GLB+>L/&JMJ+F!&&
Y<4>7!"8>9062Primary Computer: 32bit RISC processor, 520!"z
&-628Internal Memory: 64MB &DRAM (05), 64MB Flash
(=62897.6!%/73B!68!,^W!!
External Memory: Compact Flash to 2GB
!

DIGITAL I/O
6INI+1/&IOL&&
Network: 1 0/1 00 Ethernet
Controller
$26C8$26C8-26!"8-6<8//2`FWV!
`FW!
[836!
IW!
6?92J!
;8.8--2.648-! t68!
Y"a!
Y"a!
a! U5
`FW!
'2G4.2! (A
I*! type)
6?92J! supports
30998<63! external
2=62U5B: U5 $ Host (B type) for
o PC;
$ Device
U2?:87<1K!>8032K!7-1!Q6B0>:R!1<4G2!032!!
keyboard, mouse, and "thumb" drive use
CONFIDENTIAL
"#$%&'($)&*+!
"#$%&'($)&*+!!

2

,

ela&nan t o l ) !
!

Telephone
Line Analyzer
Detector
,-".$&/0.$&1.2%
-".$&/0.$&1.2%
-".$&/0.$&1.2%3
34$5
4$5 6$7$87"5
+$%$,-".$&/0.$&1.2%34$5
+$%$,
+$%$

M

o

e!"#$%&'()*
l 7541

d

!

ANALOG I/O
191/:;&<=:&&
Headphone Output: 3.5mm Mono connector
-./01234.!#561567!,89::!;343!<344.<63=!!
Microphone Input: 3.5mm Mono input
;><=31234.!&41567!,89::!;343!>4156!!
!

USER INTERFACE
>[email protected]&<[email protected]@&&
Hard Keys: 6 soft menu keys, 5 button quadrant navigation and other dedicated keys
-/[email protected]!B!C3D6!:[email protected]!9!G56634!H5/0=/46!4/I>J/6>34!/40!362.=!0.0>[email protected]!!
Encoder: High-resolution optical encoder
(4<30.=7!->J2K=.A3L56>34!316>Integrated touch screen with stylus
&46.J=/6.0!635<2!A<=..4!M>[email protected]!!
Test Inputs:
).A6!&4156A7!!
'5/L!;#'N7!C5113=6A!OF!PF!BF!
'5/L!;#'N7!C5113=6A!OF!PF!BF!Q!N!M>=.!:305L/=!1234.!R/Q
Dual MOD& Supports 2, 4, 6, Q!N!M>=.!:305L/=!1234.!R/&!N!M>=.!:305L/=!1234.!R/8 wire modular phone jacks
S/4/4/!)@1.7!C6/40/=0!AL..I.0!A34JF!)>1F!/40!(/=62!!
Banana Type: Standard sleeved sockets: Ring, Tip, and Earth
C;S!T%!&41567!T%U*46.44/!<344.<6>34!63!N!V-W!G=3/0G/40!0.6.<63=!!
SMB RE Input: RE/Antenna connection to 8 GHz broadband detector
(X1/4A>34!
Y3=67!Supports
C5113=6A! communication
<3::54>6>34! &Q! measurement
:./A5=.:.46! f D3=!
D565=.!
Expansion Port:
o r u5A.!
s e wM>62!
i t h fu
ture
accessories
/<.A!!
!
RF SYSTEM
AB&[email protected]!&&
C1.<6=5:!*4/[email protected]=7!!
Spectrum Analyzer:
'5/L!<34I.=A>[email protected]!=.I.=!!
Dual conversion, super-heterodyne receiver
%=.H5.4Frequency Range: 1 0kHz to 85MHz
CM..1!)>:.7!O!C.<340A!!
Sweep Time: 2 Seconds
C6.1!C>W.7!ZE-W!!
Step Size: 1 kHz
Bandwidth: 180H2
S/40M>0627!ZNE-W!!
C.4A>6>I>[email protected]!KZ[[0S:!!
Sensitivity: -1 !!dBm
Broadband Detector:
S=3/0G/40!'.6.<63=7!!
T%!C;S!&41567!Z[[E-W!63!NV-W!!
RE SMB Input: 1 00kHz to 8GHz
Balanced Line Test: 100kHz to 600"#z
S/L/44.!).A67!Z[[E-W!63!B[[;-W!!
C.4A>6>I>[email protected]!KB90S:!!
Sensitivity: -$5d%m
!

DIGITAL MULTIMETER
6/+T/4J.7!\5>4JF!9[[:A.T/4J.7!\5>J>4JF!9[[:A.Range: Quick response auto-ranging,
500msec sample rate
*"U'"!]3L6A7![!63!P[[]'"F![!63!O9[]*"!!
AC/DC Volts: 0 to 400VDC, 0 to 250VAC
T.A>A6/4Resistance: 0 to 40 MegOhm
%!!
"/1/<>6/4%!!
Capacitance: 4fF to 400pF
!

BIASGENERATOR
E<1?&;@[email protected]+:A&&
#16>=.<6!'>J>6/L!"346=3L7!->J2!I3L6/J.!'*"!!
Optically Isolated, Direct Digital Control: High voltage DAC
#56156!".>L>4J7!^!K!N[!]'"!!
Output Ceiling: + - 80 VDC
;305L/6>347!C>4.F!=/:1F!6=>/4JL.!A/M6336
;305L/6>347!C>4.F!=/:1F!6=>/4JL.!A/M63362F!Q!AH5/=.!M/I.A!51!63!,[[2W8!!
2F!Q!AH5/=.!M/I.A!51!63!,[[2W8!!
Modulation: Sine, ramp, triangle sawtooth,
& square waves up to 300hz.
!

AUDIO
1>6#16>0.G/40!/50>3!1/62!316>A3L/6.A!5A.=!D=3:!<344.<6>34!!
#16>0.G/40!/50>3!1/62!31
6>A3L/6.A!5A.=!D=3:!<344.<6>34!!
Optically Isolated: V']ideband audio path optically
isolates user from connection
S/40M>0627!Z[;-W!/6!43:>4/L!J/>4!3D!B[0S!!
Bandwidth: 10MHz at nominal gain of 60dB
V/>47!`1!63!N[0S!636/[email protected]:!J/>4!aI3>Gain: Up to 80dB total system gain (voice band)
*V"7!'>J>6/[email protected]!<346=3LL.0!/563:/6>4!!
ACC: Digitally controlled automatic gain
%>L6.=7!*4/L3J!I3>%>L6.=7!*4/L3J!I3>L6.=!a,[[-W!63!,E-Wb!!
D>L6.=!a,[[-W!63!,E-Wb!!
Filter: Analog voice band filter
(300Hz to 3kHz)
!

CONFIDENTIAL
"#$%&'($)&*+!
"#$%&'($)&*+!!

'

,

!
!

Model 7541
!"#$%&'()*

Telephone
Line Analyzer
Detector
,-".$&/0.$&1.2%
-".$&/0.$&1.2%
-".$&/0.$&1.2%3
34$5
4$5 6$7$87"5
+$%$,-".$&/0.$&1.2%34$5
+$%$,
+$%$
POWER SYSTEM
9:;<=&>?>+ExternalInput: 9- 15y0C @ !"
(-./0123!&145.6!7!8!9:;'"!UniversalPower Supply: 100-240YAC, 50-60#z
>[email protected]/0A23!BCD/0!E5443F6!9GG8H,G;*"I!:G8JGKL!!
Removable Battery: Rechargeable Lithium ion, 4-6 hours of run time
M/[email protected]/!P2../0F6!M/QR20S/2O3/!+?.R?5N!?C1I!,8J!RC50A!CT!051!.?N/!!
!

MECHANICAL
!
!

Dimensions: 9.5in $ 1 2i% $ 2in (24.1cm $ 30.5cm $ 5.0cm)
'?N/1A?C1A6!7U:?1!-!9H?1!-!H?1!VH,U9QN!-!=GU:QN!-!:UGQNW!!
Unit Weight with Battery: 6 lbs (2.7 kg)
>1?.!X/?SR.!D?.R!P2../0F6!J!3OA!VHUY!ZSW!!
Case Dimensions: 6.25in $ 14.9in $ 18.5in
(15.9cm $ 37.8cm $ 47.0cm)
"2A/!'?N/1A?C1A6!JUH:?1!-!9,U7?1!-!
"2A/!'?N/1A?C1A6!JUH:?1!-!9,U7?1!-!9[U:?1!V9:U7QN!-!=YU[QN!-!,YUGQNW!!
9[U:?1!V9:U7QN!-!=YU[QN!-!,YUGQNW!!
Case Weight (Including!]C\/3!Y:,9!21\!2QQ/AAC0?/AW6!99U:!3OA!V:UH!ZSW!!
Model 7541 and accessories):
11.5 lbs (5.2 kg)
"2A/!X/?SR.!V&1Q35\?1S!]C\/3!Y:,9!21\!2QQ/AAC0?/AW6!99U:!3OA!V:UH!ZSW!!
"2A/!X/?SR.!V&1Q35\?1S
!]C\/3!Y:,9!21\!2QQ/AAC0?
/AW6!99U:!3OA!V:UH!ZSW!!
#4/02.?1S!)/N4/02.50/6!G^"!.C!_:G^"
Operating Temperature: 0°C to +50°&!

!
!
!

CONFIDENTIAL
"#$%&'($)&*+!
"#$%&'($)&*+!!

4

,

ldmd!?9

!

!

Model 7542
!"#$%&'()*

Secure Document Scanner
+$,-.$&/",-0$12&+,311$.
!

The cutting-edge
is
)-.!
/0112345.64.!Model
786.9!7542
:;<=!secure
>./0?.! Document
'8/[email protected]! Scanner
>/A33.?! 2B!
an overall
A3!
8C.?A99!concept
/83/.D1! for
E8?!an
A3!extremely
[email protected]! safe
BAE.!and
A36!high
-24-!standard
B1A36A?6!
of handling important and confidential
paper documents. The
[email protected]?1A31!A36!/83E
[email protected]?1A31!A36!/83E26.312A9!DAD.?!68/[email protected]!)-.!
26.312A9!DAD.?!68/[email protected]!)-.!
major components
r e aA! completely
e w developed
@AI8?!
/[email protected]! aA?.!
/[email protected]! n3.J!
6.C.98D.6!
security-paper that
B./0?21G5DAD.?!
1-A1! acts
A/1B!as
AB! aA!magnetic
@A43.12/! storage
B18?A4.! medium,
@[email protected]! as
AB!
weH as
J.99!
AB! aA!special
BD./2A9!read-write
?.A65J?21.! device
6.C2/.! with
J21-! aA! PC
L"! or
8?! Laptop
+AD18D!
connection.
/833./1283H!

4

!786.9!:;<[email protected]!2B!J?21.AM9.!A36!D?231AM9.!0B234!B1A36A?6!
Model 7542 media is writeabie and Printable using standard
@.1-86B!
N+AB.?K!lnkjet,
&3OI.1K!Offset
#EEB.1! etc.).
.1/HPH!The
)-.! magnetic
@A43.12/! memory
@[email protected]?G!
methods (Laser,
2B!
.21-.?! invisibly
23C2B2M9G! paper-integrated,
DAD.?5231.4?A1.6K!laminated,
[email protected]! o8?!
/A3! bM.!
is either
r can
e
490.6!83!
AE1.?JA?6BH!Encrypted
(3/?GD1.6!data
6A1A! of
8E! any
A3G! kind,
O236K!like
92O.! digital
62421A9!
glued on afterwards.
/.?12E2/A1.B!
[email protected]! concerning
/83/.?3234! t h
1-.!
8?2423! aA36!
certificates o8?!
r information
e origin
nd
A01-.312/21G!8E!1-.!68/[email protected]!/[email protected]!38J!83K!M.!B18?.6H!!
authenticity of the document, can, from now on, be stored.
)-.!62421A9!68/[email protected]/.?12E2/[email protected]?A1.6!1-?804-!A!
The digitaldocument-certificates are administrated through a
)?0B1/.31.?H!
@[email protected]?G56A1A! i s2B! compared
/[email protected]?.6! wJ21-!
1-.!
Trustcenter. A*99!
l l memory-data
ith th
e
6.D8B21.6!
A01-.312/A1283! vC2A!
.3/?GD1.6!
deposited d 6A1A!
a t a aAE1.?!
f t e r authentication
i a aA3!
n encrypted
connection. The Model7542 offers state-of-the-art technical
/833./1283H!)-.!786.9!:;<=!8EE.?B!B1A1.58E51-.5A?1!1./-32/A9!
B8901283B!
68/[email protected]?81./1283! beyond
M.G836! comparison,
/[email protected]?2B83K!
solutions f oE8?!
r document-protection
.BD./2A99G!6.C.98D.6!E8?!-24-!B./[email protected]
especiaHy developed for high security-demands.!!

FEATURES
4567895+&
ADVANTAGES:
6/:6;76<5+=&
• Q3?2CA99.6!D?88E!8E!68/[email protected]!!
Unrivalled proof of document-identity
• #EE.?B!23C2B2M9.!D?81./1283!!
Offers invisible protection
• >[email protected]!A?.!ACA29AM9.!!
Several paper-grades and formats are available
• >021AM9.!E8?!A9?.A6G!.F2B1234!68/[email protected]!
Suitable for already existing documents,
[email protected]!
independent of format
• 7A32D09A12835D?88E!B8901283!1-?804-!62421A9!
Manipulation-proof solution through digital
certificates
/.?12E2/A1.B!!
• (3/?GD1.6!/.?12E2/A1.5/[email protected]?2B83!1-?804-!A!
Encrypted certificate-comparison through a
Trustcenter
)?0B1/.31.?!
• *!/.?12E2/A1283!2B!B/-.609.6!
A!/.?12E2/A1283!2B!B/-.609.6!
certification is scheduled
*
INCLUDED:
>;[email protected]/5/=&
• T)-.!786.9!:;<=!B1A?1.?!B.1!J21-!83.!?.A65J?21.!
h e Model 7542 starter set with one read-write
device
6.C2/.!!
>2349.592/.3/.! s oB8E1JA?.!
• Single-licence
f t w a r e f oE8?!
r T r u)?0B1/.31.?5
stcenter
A//.BB2M2921G!!
accessibility
B-..1B! D'&$!
• 5;RR!
0 0 sheets
I N A*4 , 1,SR!
6 0 [email protected]!
/ m J21-! 231.?3A9!
@[email protected]?G!
memory
B-..1B! DIN
'&$!A*• 5;RR!
0 0 sheets
4 , 9VR!
0 [email protected]!
/ m J21-! [email protected]!
@[email protected]?G!
memory
#D1283A9!2362C260A9!D?8/.BB2345B1A1283B!ACA29AM9.!
• Optional
individual processing-stations available
*[email protected]?2/A9!0B.?!&'!D8BB2M9.!
• Additional
biometrical user ID possible

J\!IL
J\!
!IL

1"#L$jLi'k%ji?.1tL D E L I
Imxilut
_ . _ . _

D I P
F&u Sibylie "'
- ‚ ll _ t L _ _ ,
" ? *

.

'

J

#

$

.

%

$

*

Anti-Stress-nu

I

ww(

(.

!

CONFIDENTIAL
"#$%&'($)&*+!
"#$%&'($)&*+!!

1

,

!
!

Model 7543
!"#$%&'()*

LANIWLAN checking
system
+,-./+,-&01$02345&6768$9
5&6
&67
768$9
68$9
+,-./+,-&01$02345
+,-./+,-&01$0234
!

The LAN
6340$& just
=>68& checking
01$02345& structured
68?>08>?$#& cabling.
0;@%345A&
:1$&
+,-&checking
01$02345&system
6768$9&has
1;6& come
0"9$& a
;& long
%"45& way
The threat
with 38&
it 81$&
the 4$$#&
need 8"&
to 01$02&
check C:&
IT
:1$&
81?$;8& of
"B& an
;4&IT
C:& related
?$%;8$#&attack
;88;02& has
1;6& heightened
1$3518$4$#& bringing
1$3518$4$#&
@?345345& <381&
systems. T& h
e L
A
E768$9& 36& 0;F;@%$& "B& F$?B"?9345& 01$026& "4&
6768$96A&
:1$&
+,-./+,-&
D1$02345& E768$9
structured cabling and any data present on the
line. Its semi automated checks provide
68?>08>?$#&0;@%345&;4#&;478;&F?$6$48&"4&81$&%34$A&C86&6$93&;>8"9;8$#&01$026&F?"G3#$&
68?>08>?$#&0;@%345&;4#&;478;&F?$6$48&"4&
81$&%34$A&C86&6$93&;>8"9;8$#&01$026&F?"G3#$&
clear information presented in a printable report.
0%$;?&34B"?9;83"4&F?$6$48$#&34&;&F?348;@%$&?$F"?8A&
&
H>%%7&,>8"9;8$#!-!)./!+*$!"./01234!5678/9!
H>%%7&,>8"9;8$#
:;<=2>/7!?3!2378?38!
Fully Automated !-!)./!+*$!"./01234!5678/9!
- The LAN Checking system provides
an instant
view of
=2/@!
8./!state
78?8/! of
8./! network
3/[email protected]@28.! its
@28.!
287!Information-rich
23A*B8<8/78!
C/7BD87!
70;//3! a?3>!
8;2-0+('7E! Multiples
FBD82:D/7! t 8/787!
Results m9?23!
a i n screen
n d tri-color
e s t s r;B3!
un
0<30B;;/38D6G!
7://>234!Problem
:;>270<=/;6E!Selecting
5/D/08234! any
?36! individual
23>2=2>B?D!
concurrently, speeding
8/78!
>27:D?67!overview
<=/;=2/@! information
23A<3! the
8./! left
D/A8! side
72>/! preview
:;/=2/@! pane;
:?3/I!
test displays
5/D/08!'/8?2D7!A/:8.!8/78!23ASelect Details for in-depth test information.




.

!



. - - - - . —

I

,

- '
!

-

_

_

_

_

,

0

Fiber . # 9

D;@%$&D1$02$?!-!J/;2A6!8./!0.?;?08/;278207!!5)L!0D;@%$&D1$02$?
Cable Checker!-!J/;2A6!8./!0.?;?08/;278207!
!5)L!0- Verify the characteristics of UTP and STP copper
0?HD234M!
D/348.G!impedance,
29:/>?30/G!shorts,
7.?3>! wire
@2;/! mismatches
9279?80./7!
cabling: length,
7.4/7!?3>!8?9:/;234!<3!8./!0?HD/!?3>!8./!>278?30/!8showing taps, bridges and tampering on the cable and the distance to the tap.
0 Upp

!

Cable -),:
"#$l%&'k1i,"

E354;%&
I$?3B30;83"4
)/78! 802.3af
NOPEQ?A! Power
L<=/;! Ethernet
(8./;3/8!(POE)
RLI$?3B30;83"4!! --! Test
Signal Verification
D2317E!
)./! LAN
+*$!Checking
"./01234! System
5678/9! can
0?3! emulate
/9BD?8/! an
?3! 8023.3af
NOPQEQ?A!
inks. The
:!
>/=20/! to
87?3>!measure
9/?7B;/! voltage
=<3! each
/?0.! pin
:23!
powered device
7.showing i!egal power activity on the cable.
!

"',#l&

5) ( ( l I

Impedance,

DDQ [cable]
GP r o b l e m :

s

J360"G$?&
>4;>81"?3K$#& devices
#$G30$6! --! Discover
#$G30$6!
'270<=/;! uB:!
Discover unauthorized
p t8o 1,GOOO!
,000
>/=20/7!
?3>!extract
/T8;?08! switch
[email protected]!and
?3>!VLAN
J+*$!information
23A7.2A!
devices and
B3?B8.!>/=20/7!?;/!:;/7/38E!
unauthorized devices are present.

UTP



n ) ' , " . ; * + ) [Cable]
Problem;

,
,amPleabel
Feet
aapir r i f t s

$%&% I t . .

® meters

& "*l&"#di12
. -5
- 345 ® -533
*

/
El

!
J360"G$?&
>4;>81"?3K$#& traffic
8?;BB30! --! View
8?;BB30!
J2/@! your
63/[email protected];?AA20! statistics,
78?8278207G!including
230DB>234! Protocol
:;<8<092TG!
Discover unauthorized
87/3>/;7G! top
8H;>0?78/;7G!and
?3>!error
/;;7&>/382A6! and
?3>! locate
D<0?8/! bandwidth
H?3>@2>8.! hogs
.<47! and
?3>!
top senders,
278./9!from
A;<9! the
8./! network
3/[email protected]! necessary.
3/0/77?;6E!Analyze
*3?D6U/! performance
:/;A8;/3>7! with
@28.! baseline
H?7/D23/! data
>?8?!
isolate them
;/:!B3?B8.!:;<8<0reports. Analyze traffic showing attacks and unauthorized Protocols.
!
J360"G$?&
>4;>81"?3K$#& wireless
<3?$%$66& devices
#$G30$6! --! Wireless
#$G30$6!
W2;/D/77! security
7/0B;286! is
27! a?! top
80<30/;3G! and
?3>! wireless
@2;/D/77!
Discover unauthorized
7/0B;286!:2AA20BD8!820!
security Policies are difficult to enforce. Use Wireless LAN Checking System to perform periodic
?B>287!
8./!wireless
@2;/D/77!environment.
/3=2;<39/38E!Wireless
W2;/D/77! LAN
+*$!
+*$!
$!Checking
"./01234! System
5678/9! automaticaHy
?B8<9?820?DD6! discovers
>270<=/;7!
audits of
;<4B/!
?00/77!points,
:<2387G!unauthorized
B3?B8.! wireless
@2;/D/77! bridges,
H;2>4/7G! mobile
90D2/387! and
?3>! ad-hoc
?>-.<0! networks,
3/[email protected] access
/3?HD234!XB201!;/7:<37/!?3>!;/7enabling quick response and resolution. !
!
+"0;8$&L"5>$&/3?$%$66&,M!-!*3!B3?B8.!Y;<4B/Z!?00/77!:<238!0?3!0<9:;<927/!3/[email protected]+"0;8$&L"5>$&/3?$%$66&,M
Locate Rogue Wireless AP!-!*3!B3?B8.!Y;<4B/Z!?00/77!:<238!0?3!0<9:;<927/!3/[email protected] An unauthorized "rogue" access point can compromise network
7/0B;286!
H6! exposing
/T:<7234! the
8./!company's
0<9:?36[7! network
3/[email protected]/! outside
/! word.
@E! Use
K7/! the
8./! wireless
@2;/D/77! LAN
+*$!
security by
o the
"./01234!
5678/9!"security
Y5/0B;286! Scan"
50?3Z!feature
A/?8B;/! to
82>/382A6! rogue
;<4B/! APs
*L7! and
?3>! "Locate"
Y+<0?8/Z! t8.B38! them
8./9!
Checking System
o hunt
down
>!

CONFIDENTIAL
"#$%&'($)&*+!
"#$%&'($)&*+!!

1

,

!
!

!"#$%&'()*

LAN
+,-./+,-&01$02345&6768$9
+,-./+,-&01$0234

Survey RE Site !-!./0!120!345060//!+*$!"207849:!;10=!1>[email protected]!B?/06490!C%!7>D05?:0!E?1?!
- Use the Wireless LAN Checking system to capture baseline RE coverage data
:;<=$7&>?&:38$!-!./0!120!345060//!+*$!"207849:!;10=!1>[email protected]!B?/06490!C%!7>D05?:0!E?1?!
:;<=$7&>?&:38$
immediately after the wireless infrastructure is installed and compare historical data to periodic
[email protected]?50!24/1>547?6!E?1?!1>[email protected]>E47!
survey data
o make
/A5D0E?1?!over
>D05! time.
14=0H!Use
./0! this
124/!information
49F>5=?14>9! t1>!
49F>5=?14>9!
=?80! minor
=49>5! adjustments
?EIA/1=091/! to
1>! wireless
G45060//! access
?770//!
points,
transmit
power,
relocate
access
points,
minimizing
RE
leakage
or
show
external
sources
@>491/J!15?9/[email protected]>G05J!506>7?10!?770//[email protected]>491/J!=494=4K49:!C%!60?8?:0!>5!/2>G!0L1059?6!/>A570/!
@>491/J!15?9/[email protected]>G05J!506>7?10!?770//[email protected]>491/J!=494=4K49:!C%!60?8?:0!>5!/2>G!0L1059?6!/>A570/!
of RE
>F!C%H!
Cable Locating
@AB%$&
+"0A8345
+"0A8345!!—
M!The
)20!breakthrough
B50?8125>A:2!IntelliTone
&910664)>90! digital
E4:41?6!signaling
/4:9?649:! works
G>58/! with
G412! the
120! IntelliTone
&910664)>90! Pro
N5>!
Probe t 1>!
o locate
a t a , a?9E!
n d c 7>?L!
o a x vD4E0>!
i d e o cabling
p t 1>!
o t 1G>!
w o f F001!
e e t o>F!
f
N5>B0!
6>7?10! voice,
D>470J! d E?1?J!
7?B649:! through
125>A:2! [email protected]!
sheetrock, Isolating
n digital
/20015>78J!
! &/>6?149:! all
?66!electromagnetic
060715>=?:90147! and
?9E! radio
5?E4>! frequency
F50OA09749105F050970! i49!
E4:41?6! mode.
=>E0H!
Featuring IntelliTone cable mapping; after tracing, use the Tone Probe to verify wiremap.
%0?1A549:!&910664)>[email protected]@49:P!?F105!15?749:J!A/0!120!)>90!N5>B0!1>!D054F!
:C$03D30A83"46&
Specifications
>[email protected]&E())&F$68345&GC83"4&H"C83"4&D"RFC 2544 Testing Option (option for LAN/Pro models)
">[email protected]?14B60!50=>10!E0D470!!
Compatible remote device

(1205;7>@0J!(1205;7>@0!;0540/!&&!$01G>58!*//4/1?91!!
Ether5cope, Ether5cope Series II Network Assistant

Tests
)0/1/!

)25>A:[email protected]!+?1097//!
Throughput, Latency, Frame Loss

Frame content
%5?=0!7>91091!!

*66!
Q/J!all
?66! iR/J!
?61059?149:! iR/!
?9E! Os,
Q/J! Pseudo
N/0AE>! Random
C?9E>=! Bit
S41!
All Os,
s , alternating
s and
;0OA0970!TNCS;UJ!&9750=09149:!S<10!
Sequence (PRBS), Incrementing Byte

Frame size
%5?=0!/4K0!!

VWJ!R,XJ!,YVJ!YR,J!RQ,WJ!R,XQJ!RYRXJ!/[email protected]!>F!?66!/4K0/!!
64, 128, 256, 512, 1024, 1280, 1518, sweep of all sizes

*@@647?14>[email protected]>51!
Application port

User defined
./05!E0F490E!!

[email protected]/U!!
Rate (bps)

[email protected]!1>!RQQQ!Z!TA/49:!?9!(1205;7>@0!?/!?!50=>10!E0D470U!!
[email protected]!1>!RQQQ!Z!TA/49:!?9!
Up to 1 000 ! (using an (1205;7>@0!?/!?!50=>10!E0D470U!!
Ether5cope as a remote device)

XQ,HR[!/01149:/!
802.10 settings

\+*$!&[email protected]>541VLAN Id, priority

&N!)#;!/01149:/!
P T05 settings

&N!N5070E0970])#;[email protected]?5?=0105J!'4FF;05D0!">E0!N>491!
'P Precedence/T05 parameter, DiffServe Code Point

)25>A:[email protected]!/01149:/!
Throughput settings

'A5?14>9J!=?L4=A=!5?10J!=0?/A50=091!?77A5?7Duration, maximum rate, measurement accuracy

+?1097Latency settings

'A5?14>9J!5?10J!4105?14>9/!
Duration, rate, iterations

%5?=0!6>//!/01149:/!
Frame loss settings

'A5?14>9J!5?10J!/[email protected]!/4K0!
Duration, rate, step size

Results format
C0/A61/!F>5=?1!!

)?BA6?5J!:[email protected]?6J!L=6-B?/[email protected]>51!!
Tabular, graphical, x m l

K48$<4$8L"<2&[email protected]&E()).KFG&GC83"4J&
Internetwork Throughput Option (included with RFC 2544/ITO Option)
">[email protected]?14B60!50=>10!E0D470!
Compatible remote device ! !

#@14\40G!
&910:5?10E! Network
$01G>58! Analyzer,
*9?6(1205;7>@0J!
OptiView vDW!
4 Integrated
(1205;7>@0!;0540/!&&!$01G>58!*//4/1?91J!
!#90)>A72!;0540/!&&!
Ether5cope Series II Network Assistant, OneTouch Series II

Frame content ! !
%5?=0!7>91091!

*66!
Q/J! all
?66! iR/J!
?61059?149:! iR/!
?9E! Os,
Q/J! Pseudo
N/0AE>! Random
C?9E>=! Bit
S41!
All Os,
s , alternating
s and
;0OA0970!TNCS;U!
Sequence (PRB5)

CONFIDENTIAL
"#$%&'($)&*+!
"#$%&'($)&*+!!

2

,

!
!

+,-./+,-&01$02345&6768$9
5&67
&6
768$9
68$9
+,-./+,-&01$02345
+,-./+,-&01$0234
LAN/WLAN checking
system
Frame size ! !
%-./0!1230!

6

4

,

M

o

d

e !"#$%&'()*
l
7543

128, 256, 512, 1024, 1280, 1518, sweep of all sizes
456!7896!8:46!:786!7;856!789;6!7:796!1<00=!>[email protected]@!12301!!

Rate (bps)
A.B0!CD=1E!!

672 to 1000 ! (using an (BK0-LM>=0!.1!.!-0/>B0!N0O2M0E!!
Ether5cope as a remote device)
4F8!B>!7;;;!G!CH12IJ!.I!(BK0-LM>=0!.1!.!-0/>B0!N0O2M0E!!
4F8!B>!7;;;!G!CH12IJ!.I!

Duration(s)
'H-.B2>IC1E!!

i t o 64,800 (18hr)
7!B>!4569;;!C79K-E!

Results
[email protected]!

Frames sent,
t e and
o r both
%-./01!
10IB6! received,
-0M02O0N6! ra
-.B0!
.IN! percent
=0-M0IB! loss
@>11! f?>-!
D>BK!
H=1B-0./!.IN!N>I1!!
upstream and downstream directions

[email protected]!?>-/.B!
Results format ! !T a b u l a)[email protected][email protected]!P/@QD.10N!-0=>-B!!
r , graphical, x m l
:;<==30&5$4$;<8";&>340%?#$#&@381&ABC&D()).E:F&FG83"4H&
Traffic generator (included with RFC 2544/ITO Option)
)-.??2M!BR=0!
Traffic type

Broadcast, muiticast or unicast
S->.NM.1B6!/[email protected]!>-!HI2M.1B!!

%-./0!BR=0!
Frame type ! !

S0I2JI!
(BK0-I0B6!Benign
S0I2JI! [LC,
++"6! NetBEUI,
$0BS(T&6! Benign
S0I2JI! I&U6!
&UV&"GU!
Benign Ethernet,
P, IP/ICMP
(MK>6!
&UVT'U! Echo,
(MK>6! IP/UDP
&UVT'U! Discard,
'21M.-N6! IP/UDP
&UVT'U! Chargen,
"K.-J0I6!
Echo, IP/UDP
IP/UDP NFs, IP/UDP NetBIos
&UVT'U!$%L6!&UVT'U!$0BSL!!

Frame size ! !
%-./0!1230!

64, 128, 256, 512, 1024, 1280, 1518
456!7896!8:46!:786!7;856!789;6!7:79!!

Rate
A.B0!!

Utilization (%): >0-100, Frames/second: 1 —1488095
[email protected]>I!CWEX!Y;!Z!7;;6!%-./01V10M>INX!7!Z!7599;[:!!

Duration
'H-.B2>I!

Seconds: 1 — continuous, Frames: 1 — continuous
L0M>IN1X!7!Z!M>IB2IH>H16!%-./01X!7!Z!M>IB2IH>H1!!

/3;$%$66&+,-&,#/+,-.I;"&9"#$%6H&
Wireless LAN Adapter Card (WLAN/Pro models)
L=0M2?2M.B2>I!M>/[email protected]!
Specification compliance

&(((!9;8\77.6!77D6!77J!!
IEEE 802.11a, l l b , h g

Certifications
"0-B2?2M.B2>I1!

%""!
=.-B! 15,
7:6! Telec,
)[email protected]!CTICK,
")&"]6! "#
()L&6!
($,;79[,6! EN60950
($4;[:;!
FCC part
5I, EN301893,
&IB0->[email protected]!!
^("*!">/[email protected]!!
Interoperability 'A/ECA
Compliant

Interface
&IB0-?.M0!!

32
,8QD2B!".-NDH1!!

#HBN>>-!>=0-.B2IJ!-.IJ0!
Outdoor operating range ! !

T=!B>!:7:!/!C74[;!?BE!!
Up to 515 m (1690 ft)

&IN>>-!>=0-.B2IJ!-.IJ0!
Indoor operating range ! !

T=!B>!9:!/!C8F[!?BE!!
Up to 85 m (279 ft)

Data rate ! !
'.B.!-.B0!

9;8\77.X!H=!B>!:5!G
9;8\77.X!H=!B>!:5!GD=16!9;8\77DX!H=!B>!77!GD=16!9;8\77JX!
D=16!9;8\77DX!H=!B>!77!GD=16!9;8\77JX!
802.hl$: up to 54 !%&
!%&
5, 802.11b: up to 11 Mbps, 802.11g:
H=!B>!:5!GD=1!!
up to 54 Mbps

#HB=HB!=><0-!
Output power ! !

79!NS/!=0._!=><0-!!
18 dBm peak power

Infrastructure mode ! !
&I?-.1B-HMBH-0!/>N0!

BSS
SLL!

([email protected]!.IB0II.!M>II0MB>-!`.M_! a2->10!GLQ75F!
[External antenna connector jack Hirose M s

CONFIDENTIAL
"#$%&'($)&*+!
"#$%&'($)&*+!!

'

,

!
!

LAN/WLAN checking
system
+,-./+,-&01$02345&6768$9
5&67
&6
768$9
68$9
+,-./+,-&01$02345
+,-./+,-&01$0234

M

o

d

e !"#$%&'()*
l
7543

Wireless LAN Directional Antenna (WLAN/Pro models)
/3:$%$66&+,-&;3:$083"4:"&9"#$%6?&
Frequency range
%-./0.123!-415.!

2.4— 2.5 and 4.9 - 5.9 GHz
67,!8!679!41:!,7;!?!

Minimum gain
@A1AB0B!54A1!

5.0 dBi in the 2.4 GHz band and 7.0 dBi in the 5 GHz band
97C!:DA!A1!EF.!67,!=>?!G41:!41:!H7C!:DA!A1!EF.!9!=>?!G41:!!

External a n41E.114!
tenna
(IE.-14J!
plug
LJ05!

connector Hirose
Ms
2K11.2EK-!
>[email protected]
@3A$:&BC830&D:<460$3E$:&="C83"4&F":&+,-.>:"&9"#$%6?&
Fiber Optic Transceiver (option for LAN/Pro models)

Ethernet rate !
(EF.-1.E!-4E.!

[email protected]!
1000 Mbps !!

)3L.!
Type

NB4JJ!%K-BSmall Form-factor Pluggabie (SFP)

Connector
"K11.2EK-!

'0LJ.I!+"!
Duplex LC

G$0H:387&
Security
*0EF.1EA24EAK1!E3L.M!
Authentication types ! ! !

LAN: 802.1(, ')/L*N: 802.1(, 802.11 i, 'A/EP, 'A/PA, \NPA2
+*$T!UC67OVW!X+*$T!UC67OVW!UC67OOAW!X(QW!XQ*W!XQ*6!

(*Q!E3L.M!
EAP types ! ! !!

+L5, GTC, MD5, M S - C H A P
)+NW!=)"[email protected]'[email protected]*QPEAP-M5
Q(*Q*QW! Q(*Q*QW!
TTLS-M5
))+N*QW!
))+N*QEAP-GTC, ++LS-,*!-"5-$-*!-V, TTL5- E N D
(*Q<=)"W!))+N*Q
!

k'?
Test

8 1$./v0t.n L i n k

COflhVvtion

%%.2I3

I! 0 1 0 . 2 4 8 . 0 0 1 .121
mask: 2 5 5 . 2 8 5 25S coo
"#.$;F L U K E - 0 4 0 4 5
Semi=

si4n2!

5]I%j
5]
%

0 0 2 . 3
%obi
1

Filvini=i: Et

1$0

%tI&nit!

kivertiscit:
i-'uii,
Soul

1

5

BW: i % . Pee:45%, avg: 0.3%

ail Protocol Statistics

Running...

Device D i s c o v o y

4lI

t,. Network DiScovely
+ VI AN Discovery
Nearest 5w.'h
,Switch Scan

Z

Running..
42 dtv 00

2I!8

2 VIA%
+9$_0-:d(!.'t 29)
"onitonng nearest switch
Allcavices resporaing

4
L

Link 101)0Mb full duplex

Local Statist

i+.# Takers

FELu

I & * 1 full duplex

12 ft to active Oevice

' Problem Detection

; detected

Detallis

!

CONFIDENTIAL
"#$%&'($)&*+!
"#$%&'($)&*+!!

4

,

elarnan t o l ) !
!

! s " # search Video Pole Camera
*+,!&+$-./0&12#$"&3"%$&,-4$.-

M

o

d

e!"#$%&'())
l
7544

!

sometime during a physical inspection it is not5&be possible to have the means or time to
+"4$524$.278&-&90:;2/-%&27;9$/52"7&25&2;&7"5&+"4$524$.278&-&90:;2/-%&27;9$/52"7&25&2;&7"
5&inspect all
the -24&
aim "@&
of
27;9$/5&
-%%&hard
0-.#& to
5"&reach
.$-/0&areas.
-.$-;>&The
*0$& Video
12#$"& Pole
3"%$& Camera
,-4$.-& was
?-;& developed
#$=$%"9$#& with
?250& 50$&
providing an
5-.8$5&& location.
9."=2#278&
-7&accurate
-//6.-5$&search
;$-./0& of
"@& the
50$& target
5-.8$5
%"/-52"7>& With
A250& its
25;& hi-resolution
02B.$;"%652"7& camera
/-4$.-& and
-7#&
screen and
6
8$5& 275"& -.$-;& 50-5& -& ;$-./0& 42..".& D25& /-77"5>&
;/.$$7&
-7#& [email protected]""5&
.$-/0& 25& 2;& 9";;2Inspect drop
to
E7;9$/5&
#."9&ceilings,
/$2%278;F&behind
244"=-""-."67#& corners,
/".7$.;F& or
".& other
"50$.& difficult
#[email protected]@2/6%5& 5"&
reach
areas,
even
in
dark
situations
with
the
Video
Pole
Camera.
.$-/0&-.$-;F&$=$7&27-.D&;256-52"7;&?250&50$&12#$"&3"%$&,-4$.->&
.$-/0&-.$-;F&$=$7&27-.D&;256-52"7;&?250&50$&12#$"&3"%$&,-4$.->&
&






C ,-a b l e Basket Runs
F aJ-%;$&,$2%278;&
l s e Ceilings
F aJ-%;$&J%"".;&
l s e Floors
H$027#F&67#$.&-7#&"=$.&0$-=:&244"=-Be
h i n d , under and over heavy immovable objects
&

&-./012!
345/!ceilings,
10676-8.9!behind
:0;6-3!immovable
6<<5=>:70! objects,
5:?012.9!around
>[email protected]! corners,
154-04.9! or
54! other
52;04! difficult
[email protected]! to
25! reach
40>1;!
Inspect drop
areas, even in dark situations with the Video Pole Camera.
>40>.9!0=0-!6-!3>[email protected]>265-.!C62;!2;0!D6305!E570!"><04>F!

FEATURES
JKL*MIK+&
);0!
D6305!Pole
E570!Camera
"><04>!provides
/45=630.! a>!small,
.<>779!self
.07A!! contained,
.07A
15-2>6-039! easy
0>.G! 25!
@.0! pole
/570! camera
1><04>! inspection
6-./01265-!
The Video
to use
.G.20);0! HIJ6-1;!
/570! 0K20-3.! 25! 5=04! L! AA002! C62;[email protected]! 1;>-86-8! [email protected]>265-9! 86=6-8! 2;0!
system. The
24
>=04>[email protected]!5=04!,M!A002!5A!40>1;F!
average user over 10 feet of reach.
N;620!+('[email protected]<6->265-!A54!15754!6-./01265-!6-!3>4B!>40>.!O6F0F!345/!10676-8.P!
White LED illumination for color inspection in dark areas (i.e. drop ceilings)
&Q!+('[email protected]<6->203!:7>1B!>-3!C;620!1><04>!;0>3!
>=>67>:70!A54!15=042!54!2>1261>7!>//761>265-.!
&Q!+('[email protected]<6->203!:7>1B!>-3!C;620!1><04>!;0>3!>=>67>:70!A54!15=042!54!2>1261>7!>//761>265-.!
IA LED illuminated black and white camera head available
for covert or tactical applications
+>480!LFI!6-1;!O,L!1

85->79!;68;[email protected]!36./7>G9!0-;>-103!:468;2-0..9!15754!<5-6254!
Large 6.4 inch (16 cm) diagonal, high resolution display, enhanced brightness, color monitor
$5!0K204->7!1>:70.9!40>[email protected][email protected]!5A!2;0!1>.0!
No external cables, ready-to-use out of the case
"577>/.6:70!/5709!40<5=>:70!1><04>!;0>39!<5-62549!>-3!:>220460.!A62!6-25!>!1>.0!.768;27G!7>4804!
Collapsible pole, removable camera head, monitor, and batteries fit into a case slightly larger
than a standard briefcase
2;>-!>!.2>-3>43!:460A1>.0!
(K240<07G!/542>:709!768;2C068;29!>-3!0>[email protected]!
Extremely portable, lightweight, and easy to use
Rubber cleats to lift and slide ceiling tiles or
oilier obiects without the need for a ladder

Interchangeable Camera Head

6.4 inch (16cm) diagonal high
resolu

.

W

i

° ° ° — Camera Pivots+ 9 0 ° to -25°
d
e
angle and telephoto lenses included

Collapsible Pole (6 feet 4 inches to 24 inches)

!

Rechargeable Battery
Pack (2 hour run time)

Variable IED illuminators for low light

Flexible camera extension
External Video
Input/Output

Variable
illumination
control

!
!
!
!

CONFIDENTIAL
"#$%&'($)&*+!
"#$%&'($)&*+!!

1

,

ela&nan t o l ) !
!

! s " # search Video Pole Camera
*+,!&+$-./0&12#$"&3"%$&,-4$.-

Model 7544
!"#$%&'())

TECHNICAL SPECIFICATIONS:
*5,678,9:&+35,8;8,9*8<7+=&

$%ND%RD COLOR CAMERA HEAD
+*97>9?>&,&
Signal Format:
N !
-./012!%345167!!
Horizontal Resolution:
834.930612!:;<32=6.307!!

5 $)-"!
"

More than 380 Lines
>34;[email protected]!+.0;
Sensitivity:
-;0
0.5 Lux I Fl .2, 1.0 Lux I F2.0 (ACC ON)
BEF!+=G!H!%IE,J!IEB!+=G!H!%,EB!K*L"!#$M!

IHumination:
&22=5.016.307!!

4 White LEDs with variable brightness control
N!O?.6;!+('
OPTIONAL IR ILLUMINATED BLACK & WHITE CAMERA HEAD
<3*8<79:&8?&8::@!879*5>&A:9,B&C&D68*5&,9!5?9&659>&
Signal Format:
-./012!%345167!!

N!
!5
5C
$)-"!

Horizontal Resolution:
834.930612!:;<32=6.307!!

420 Lines
N,B!+.0;
-;0Sensitivity:

0.0003 Lux I Fl .2, 1.0 Lux I F2.0 (ACC ON)
[email protected]!+=G!H!%IE,J!IEB!+=G!H!%,EB!K*L"!#$M!

Humination:
&22=5.016.307!!

A!&0S414;T!+('8 Infrared LEDs with variable brightness control

COLOR LCD DISPLAY
,&>8+3:9E&
Size:
-.9;7!!

UEN!.0R?!KIU!R5M!T.1/3012!
6.4 inch (16 cm) diagonal

V4./?60;<<7!!
Brightness:

300 fits
@BB!0.6
W.;P.0/!*0/2;<7!!
Viewing Angles:

+1- 50°!!?34.930612J!XHY!NB!
horizontal, +1- 40°!!C;46.R12!!
vertical
XHY!FB!!?34.930612J!XHY!NB!!C;46.R12!!
XHY!FB!
XHY!FB
!?34.930612J!XHY!NB

'.Display Controls:

!R3234!<16=416.30J!R30641<6J!10T!Q4./?60;<color saturation, contrast, and brightness

Camera Head Controls:
"15;41!8;1T!"306432<7!!

variable illumination
C14.1Q2;!.22=5.016.30!

RECHARGEABLE POWER suppiy
?5,69?F59A:5&3"?14/;4!10T!6P3!$.Y>8!V166;4D![1R\Charger and two Ni-MH Battery Packs included
*C;41/;!:=0Y).5;7!!
Average Run-Time:

2.0 Hours
,EB!83=4
*C;41/;!"?14/;Y6.5;7!!
Average Charge-time:

1.8 Hours
IEA!83=4
MECHANICAL
!5,6978,9:&
"3221ZCollapsed Length (incl. Camera Head):

24.5 inches (62 cm)
,NEF!.0R?;
(G6;0T;T!+;0/6?!K.0R2E!"15;41!8;1TM7!!
Extended Length (incl. Camera Head):

UEF!S;;6!K,BB!R5M!
6.5 feet (200 cm)

O;./?67!!
Weight:

@EU!2Q3.6 lbs (1.6 kg)

Case Size:
"1
18.5x6 x14.5 inches
IAEFGU!GINEF!.0R?;
!

47#1 5.$#$%.8 cm
N][email protected]@UEA!R5!

"1Case Weight, Pole Camera, Accessories: IIEB!2Q11.0 lbs (5.0kg)
!
8GHI$/J&
0-.#& tJ"&
.$-/0& and
-G#&inaccessible
2G-//$HH2K%$&
Inspect hard
o reach
-.$-H&
L2J0&
J0$&
I".J-K%$M&
NO2/PQJ"Q#$I%"R&
areas with the portable, quick-to-deploy
Video Pole Camera.
12#$"&3"%$&,-4$.-S
12#$"&3"%$&,-4$.-S!
!
!
!

CONFIDENTIAL
"#$%&'($)&*+!
"#$%&'($)&*+!!

2

,

!
!

Video Wireless Detection
*+#$"&,+-$%$..&/$0$10+"2

M

o

d

e

l
7545
!"#$%&'()(

The Video
)-.!
/01.2!Wireless
304.5.66!Detection
'.7.87029! unit
:907! is
06! a;! fast
68;9909=! receiver
4.8.0>.4! that
7-;7! detects
1.7.876! wireless
?04.5.66! video
>01.2!
cameras from
!"z-2.52G"z for
8;@.4;6!
<[email protected]!900
ABBCDEFGHIGJDE!
<24! quick
K:08L! effective
.<.! detection
1.7.87029! of
2?04.5.66! video
>01.2! signals
60=9;56! during
1:409=!
#M"C!6.;48-!2N.4;70296H!
s $ % search operations.
)
)M"C!6.;48-!2N.4;70296H!
With a;! 2.5"
307-!
GHIO!TFT
)%)! color
82524! LCD
+"'! the
7-.! Video
/01.2! Wireless
304.5.66! Detection
'.7.87029! unit
:907! shows
6-2?6! you
P2:! what
?-;7! the
7-.! hidden
-011.9!
camera is looking at. A separate smaller LCM displays
the frequency and the signal strength of
8;@.4;!06!522L09=!;7H!*!6.N;4;[email protected];55.4!+"C!
8;@.4;!06!522L09=!;7H!*!6.N;4;[email protected];55.4!+"C!106N5;P6!7-.!<4.K:.98P!;91!7-.!60=9;5!674.9=7-!2106N5;P6!7-.!<4.K:.98P!;91!7-.!60=9;5!674.9=7-!2the signal
7-.!
60=9;5!the
7-.!Video
/01.2!Wireless
304.5.66!Detection
'.7.87029! unit
:907! locked
528L.1! on
29! to.
72H!The
)-.! Video
/01.2! Wireless
304.5.66! Detection
'.7.87029! unit
:907!
quickly scans, in about 15 seconds, all the available video frequencies used.
K:08L5P!68;96Q!09!;R2:7!,I!6.82916Q!;55!7-.!;>;05;R5.!>01.2!<4.K:.980.6!:6.1H!
The Video sweeper works with a full range of video protocols including N&5', PAL, CCIR or EIA
)-.!/01.2!M?..N.4!?24L6!?07-!;!01.2!N42728256!0985:109=!$)M"Q!S*+Q!""&T!24!(&*!
[email protected]!)-.!/01.2!M?..N.4!-;6!R27-!;9!;:[email protected];708!;[email protected];9:;5!68;[email protected]!;91!;9!;5;[email protected][email protected];P!
systems. The Video Sweeper has both an automatic and manual scan mode and an alarm may
be activated for an audible alert when a camera is detected.
R.!;870>;7.1!<24!;9!;:10R5.!;5.47!?-.9!;!8;@.4;!06!1.7.87.1H!!
)-.!/01.2!304.5.66!'.7.87029!:907!8;[email protected]!60=9;56!<[email protected]!;6!)-.!/01.2!304.5.66!'.7.87029!:907!8;9!1.7.87!62
@.!60=9;56!<[email protected]!;6!The Video Wireless Detection unit can detect some
signals from as far away as 500 feet. The
1.7.87029!
1067;98.!depends
1.N.916!upon
:N29!the
7-.! power
N2?.4! output
2:7N:7! of
27-.! transmitter
74;[email protected]! and
;91! the
7-.! sensitivity
6.96070>07P! 5.>.5!
detection distance
level
6.5.87.1!
29! the
7-.! unit.
:907H!The
)-.! Video
/01.2! Wireless
304.5.66! Detection
'.7.87029! unit
:907! has
-;6! 5I! separate
6.N;4;7.! receive
4.8.0>.! sensitivity
6.96070>07P!
selected on
6.7709=6!4;9=09=!<[email protected][email protected][email protected]!
settings ranging from -20d *m to -60d *m.

FEATURES
34567849&















%4.K:.98P!T;9=.!ABBCDE!72!GHIGJDE!!
Frequency
Range 900!(z to 2.5201-Iz
'.7.876!$)M"Q!S*+Q!""&TQ!(&*[email protected]!!
Detects
N&5', PAL, CCIR, EIA systems
M0=9;5!674.9=7-!09108;724!!
Signal
strength indicator
I!6.5.87;R5.!4.8.0>.!6.96070>07P!6.7709=6!
5 selectable receive sensitivity settings
*:10R5.!R..N.4!;5.47!
Audible
beeper alert
'.7.87029!1067;98.!:N!72!IBB!Detection
distance up to 500 feet
2GHIO!)%)!82524!+"'!106N5;P!
. 5 " TFT color LCD display
M8;96!<4.K:.98P!4;9=.!09!,I!6.82916!
Scans
frequency range in 15 seconds
&985:1.6!*"!;1;N7.4Q!7?2!;97.99;6!;91!8;6.!
Includes AC adapter, two antennas and case
#N.4;7.6!29!W!**!R;77.40.6!!
Operates
on 4 AA batteries
Automatic
or manual scan
*:[email protected];[email protected];9:;5!68;9!
+"C!106N5;P6!<4.K:.98P!;91!60=9;5!674.9=7-!
L C M displays frequency and signal strength
A*:102!;91!/01.2!2:7N:7!X;8L6!<24!.Y7.49;5!:6.!
u d i o and Video output jacks for external use
Size:
4.75"1-1 , 2.75"W x 1 .5"0
M0E.Z!WH[IOD!Y!GH[IO3!Y!,HIO'!

TECHNICAL !"#$1%&'()*N+
64:;<=:5>&9?4:=3=:[email protected]<9&&
3-$AB$21C&8D2E$!
3-$AB$21C&8D2E$
Frequency Range

900!(z-2.52G(z
ABBCDEFGHIGJDE!

9$2.+0+F+0C&!
9$2.+0+F+0C&
ensitivity

-2)
)d
d*m to -+)d*m
[email protected][email protected]!

/+.G%DC!
/+.G%DC
Display

GHI!)%)!82524!106N5;P!?07-!+"C!106N5;P!<24!<4.K:.98P!
2.5 TFT color display with LCM display for frequency

Video Protocols
*+#$"&?-"0"1"%.&!
*+#$"&?-"0"1"%.&

'.7.876!$)M"Q!S*+Q!""&T!;91!(&*[email protected]!
Detects NTSC, PAL, CCIR and EIA systems

91D2&9G$$#&!
91D2&9G$$#&
Scan speed

M8;96!.9704.!<4.K:.98P!4;9=.!09!,I!6.82916!
scans entire frequency range in 15 seconds

size
9+H$!
9+H$

4.57"( X 2.75W X 1 .5"0
WHI[\D!Y!GH[I\3!Y!,HI\'!

,$+EI0!
,$+EI0
eight

12 oz.
,G!2EH!

JD00$-C!
JD00$-C
Battery

&97.49;5!W!**!;5L;509.Q!$0"'Q$0CD!R;77.40.6!]927!0985:1.1^!
&97.49;5!W!**!;5L;509.Q!$0"'Q$
0CD!R;77.40.6!]927!0985:1.1^!
Internal 4 AA alkaline, NiCD,NiMH
batteries (not included)

@G$-D0+2E&6+K$!
@G$-D0+2E&6+K$
Operating Time

2 hours
G!-2:46!

Power
?"L$-!
?"L$-

I>18Q!G;@N!,,BFGWB>!8.97.4!N26070>.!;1;N7.4!0985:1.1H!!
5vdc, 2anap 11 0-240v center positive adapter included.

External Connection [email protected]@[email protected]!*5;[email protected]!;91!/01.2!2:7N:7!
4M0$-2D%&:"22$10+"2&!
4M0$-2D%&:"22$10+"2&
3.5mm mono Alarm and Video o
output
CONFIDENTIAL
"#$%&'($)&*+!
"#$%&'($)&*+!!

1

,

!
!

Model 7546
!"#$%&'()*

Cable Amplifier
system
+,-%$&./0%121$3&4567$/
0%121$3&4
%121$3&4
%121$3&45
567$/
67$/
+,-%$&./0
+,-%$&./
!

One of the essential tools used within a cable 6&?7&16&
sweep is the Cable Amplifier System. It is
89$&"2&7:$&$66$971,%&7""%6&;6$#&<17:19&,&=,-%$&6&?7&16&
89$&"2&7:$&$66$971,%&7""%6&;6$#&<17:19&,&=,-%$&
necessary to use an amplifier to detect hardwired
microphones, insert voltage into a line
9$=$66,35&7"&;6$&,9&,/0%121$3&7"$7$=7&:,3#<13
9$=$66,35&7"&;6$&,9&,/0%121$3&7"$7$=7&:,3#<13$#&/1=3"0:"[email protected]&196$37&A"%7,B$&197"&,&%19$&
$#&/1=3"0:"[email protected]&196$37&A"%7,B$&197"&,&%19$&
to power a hidden microphone and to record the voltage present on the line.
7"&0"&
&

The Cable
4567$/!! is
C:$&
+,-%$&Amplifier
./0%121$3& System
4567$/
-.! a/!high
0-10!gain
1/-2!
/34-5!
/678-9-:;! used
3.:4! t <5!
4:-4:2!
audio amplifier
o detect
n d identify
=:;-2!<>7:.!59!.3;?:-88/2=:!4:?-=:.!/<=0:4!<5!
certain types of surveiHance devices attached to
@3-84-21!
A-;-21B!such
.3=0!as
/.!telephone
A-;-21B!LAN
+*$!
building wiring,
and server systems, AC Power, and Alarm wire,
/24!.:;?:;!.>.etc.
:<=D!!
!
&-.!designed
4:.-12:4! t<5!
7;5?-4:!flexible
98:[email protected]:! features
9:/<3;:.! and
/24!
It is
o provide
0/.!7;5?:2!<[email protected]:!?:;>!3.:938!-2!6/2>!.-<3/has proven to be very usefuli n many situations.
)0-.!
/678-9-:;! i s-.! qF3-3.:938! f o
95;!
=0:=G-21!
This amplifier
u i t e useful
r checking
8-2:.! and
/24! other
5<0:;! wiring
A-;-21! f 95;!
05.telephone lines
o r hostile
6-=;57052:.B!
.A-<=0! audio
/34-5!
microphones, testing
o r h055G!
o o k switch
8:/G/1:B!/24!4:leakage, and detection of eavesdropping devices
<0/that are sensitive to bias voltages or currents

TECHNICAL FEATURES
CD+EF?+.G&HD.CIJD4&
)0-.!638• T)0-.!638h i s multifunctional amplifier has a built in AC/DC!4-1-8!?58<6:digital voltmeter, selectable audio filters,
/24!/2!:E!A-4:!4>2/6-=!;/21:!!
and an extremely wide dynamic range
I/8/2=:4!and
/24!unbalanced
[email protected]/8/2=:4! high
0-10!impedance
-67:4/2=:! inputs
-2737;5?-4:! connectivity
=522:=! t<5!
?/;-:<>! o59!
• Balanced
o a/! variety
f
.3.7:=suspect wiring
/8.5!provides
7;5?-4:.!a/!bias
@-/.! voltage
?581:! adjustable
/[email protected]:! between
@:M,NO! /24!
• T)0:!"J*,KK!
h e CMAlOO also
and P,NO!
+15V '"!
DC <0/that -.!
is
3.:4!<5!/=3.:4!<5!/=/1:!5;!=3;;:2used to activate Possible devices that are voltage
or current sensitive. The bias generator
-.!=567/7:.!59!8-2:!=524-is compatible with most types of line conditions
*88!59!<0:.:!932=!/!.570-.• "# of these functions employ a sophisticated automatic gain control circuit that is superior
<5!65.to most audio amplifiers

sPECIFICATIONS
4KD+?H?+.C?8F4&&
&273InputImpedance:

50k balanced
[email protected]/8/2=:4!!

"56652!J54:!R:L:=Common Mode Rejection:

>75 dB
STN!4I!!

J/E-636!U./@8:!&273Maximum Usable Input:

,KO!7M7!!
1CV p-p

C;:/67!*3<5!*<Preamp Auto Attenuator:

K!<5!MVK!4I!W!A-<0!5?:;85/4!A/;2-21!+('!X!!
0 to -20 dB (with overload warning LED)

Automatic Gain Control:
*3<56/
MVK!<5!P,VK!4I!W!-2=834:.!7;:/67!/3<5!/<MVK!<5!P,VK!4I!
-20 to +120 dB W!-2=834:.!7;:/67!/3<5!/<(includes preamp auto attenuator)

Manual Gain Control:
J/23/8!Y/-2!"52
KB!VNB!NKB!TNB!,KK!4I!!
0, 25, 50, 75, 100 dB

Z:/47052:!Y/-2!"52Headphone Gain Control:

0 to 15 dB
K!<5!,N!4I!!

J/E-636![>.Maximum system Gain:

,,N!4I!6/23/8!654:B!,VK!4I!-2!*3<5!J54:!!
,,N!4I!6/23/
8!654:B!,VK!4I!-2!*3<5!J54:!!
115 dB manual8!654:B!,VK!4I!-2!*3<5!J54:!!
mode, 120 dB in Auto Mode

%;:F3:2=>!R:.752.:Q!!
Frequency Response:

100 Hz to 15 kHz
,KK!Z\!<5!,N!GZ\!!

Z-10!C/..!%-8High Pass Filter:

300 Hz to 20 kHz
]KK!Z\!<5!VK!GZ\!!

Low Pass Filter:
+5A!C/..!%-8
100 Hz too ! kHz
,KK!Z\!<5!]!GZ\!!
CONFIDENTIAL
"#$%&'($)&*+!
"#$%&'($)&*+!!

1

,

ldmd#?9

!

!

Cable Amplifier
system
+,-%$&./0%121$3&4567$/
0%121$3&4
%121$3&4
%121$3&45
567$/
67$/
+,-%$&./0
+,-%$&./

300 Hz to " kHz
9::!;;
Band Pass Filter:
-./0!1.22!%345678!!

Model 7546
!"#$%&'()*

Headphone Audio Output
;[email protected]=/6!*A03=!#A5?A5!!
Line-Out Audio Output:
+3/6B#A5!*A03=!#A5?A58!!

600
C::!!

Bias Control:
-3.2!"=/57=48!!

0 t5=!
o +/-15y
mA m
a x (over
:!
DEBFGH! DC,
'"I! 5GJ*!
J.K!
L=M67! current
NA776/5! protected,
?7=56N560I! input
3/?A5!
impedance is reduced to 3k ohms when bias is active)
3J?60./N6!32!760AN60!5=!9>[email protected][email protected]/!P3.2!32!.N53M6Q!!

Digital Voltmeter:
'3R35.4!H=45J65678!!

3.5 Digit, auto zero,
auto polarity, +/-199.9V AC/DC
9SG!'3R35I!.A5=!<67=I!.A5=!?=4.735TI!DEBFUUSUH!*"E'"!!
9SG!'3R35I!.A5=!
<67=I!.A5=!?=4.735TI!DEBFUUSUH!*"E'"!!

Power On/Low Battery LED ( LED off @ 6.0V )
1=O67!#/E+=O!-.5567T!+('!L!+('!=VV!W!CS:H!Q!!
X.K3JAJ!&/?A5!M=45.R68!!
Maximum Input voltage:
+6.>.R6!
Leakage
Case:
".268!!

Resistance
Y62325./N6!

250V AC/DC
,G:H!*"E'"!!
to >ZF:X!!
1OM
5=!

Size:
[3<68!!

7.3(184.4mm) ! 2.75(69.8mm) ! 1 .75(44.5mm)
\S9]LF^_S_JJQ!K!,S\G]LCUS^JJQ!K!FS\G]L__SGJJQ!!

`[email protected]!!
Weight:

F,SF!=12.1 oz (343g)

!

!

CONFIDENTIAL
"#$%&'($)&*+!
"#$%&'($)&*+!!

,2

ela!nan t o l ) !
!

!"#$%&'()'

Flat Panel X
*%+,&-+.$%&/01+2&324,$5
*%+,&-+.$%&/01+
!

D73819-:9;!" RI #$ I % N
6
673819-:9;The unit
)-.!
/012! is
13! a4!state-of-the
3242.56752-.! art
482! digital
91:124;! mobile
<6=1;.! flat
7;42! panel
7;42!
>40.;!X-ray
[email protected]! system
[email protected]<40/74A2/8.9! in
10! Western
B.32.80!
Europe. The
of security
(/86>.C!
)-.! flat
7;42! image
1<4:.! converter
A60D.82.8! enables
.04=;.3!many
<[email protected]! different
9177.8.02! applications
9177.8.02!
4>>;1A421603! in
10! the
2-.! fields
71.;93! 67!
3.A/[email protected]!
and non-destructive-testing.
m
409!
06059.328/A21D.52.3210:C!For
%68! EOD
(#'! use
/3.! the
2-.! Notebook
$62.=66E! provides
>86D19.3! a4! save
34D.! operation
6>.842160! by
[email protected]! 100
,FF! 67!! 127
4;;6I3! the
2-.! identification
19.02171A42160! of
67! even
.D.0! the
2-.!
A4=;.!
68! remote
8.<62.!control.
A60286;C!The
)-.!high
-1:-!resolution
8.36;/2160! of
67
,GH! n m
cable or
smallest details on X-ray images with
more than 16,000 grey levels.
3<4;;.32!9.241;[email protected]!1<4:.3!I1
3<4;;.32!9.241;[email protected]!1<4:.3!I12-!<68.!2-40!,JKFFF!:[email protected]!;.D.;3C!!
2-!<68.!2-40!,JKFFF!:[email protected]!;.D.;3C!!
!
[email protected]!6>.842160K!123!.L2.031D.!1<4:[email protected]!6>.842160K!123!.L2.031D.!1<4
:.!.0-40A.With its battery operation, its extensive image
enhancement software with integrated database
M'!! x-ray
409!
<632! of
67!all
4;;!its
123!optional
6>21604;!visualisation
D13/4;1342160! of
67! 3D
M'
[email protected]! images
1<4:.3! the
2-.! unit
/012! is
13! an
40! unique
/01N/.! inspection
103>.A2160!
and most
9.D1A.C!
#/8!continuous
A60210/6/3!updates
/>942.3!always
4;[email protected]!provide
>86D19.! you
@6/! the
2-.! latest
;42.32! software
3672I48.! versions
D.831603! and
409! our
6/8! -.;>!
device. Our
help
9.3E!I1;;!3/>>[email protected]/[email protected][email protected]!2.A-01A4;!49D1A.C!
desk will support you with any necessary technical advice.

ILLUSTRATIONS
9==>3:1?:9;<3&

[email protected]+A#B+A$0
5+.C
5+.CD
DE%+,C".
E%+,C".
5+.CDE%+,C".
manipulation

!

CONFIDENTIAL
"#$%&'($)&*+!
"#$%&'($)&*+!!

1

,

ela&nan t o l ) !
!

!"#$%&'()'

Flat Panel X
*%+,&-+.$%&/01+2&324,$5
*%+,&-+.$%&/01+
F!"#
F
!"#UR
!"#
UR!
UR
!
*6789163&
ADVANTAGES:
7:;7<87=63>&

• Adaptable
to numerous industrial X-ray units
*-./0.123!04!56738469!:5-6908:.2!;<8.=!65:09!
• Im
age enhancement,
&7.>3!
[email protected]!e.g.
3B>B!brightness,
18:>?05399A!contrast,
@4508.90A!
@4508.90A!
A!filters,
C:20389A!sharpness,
9?.8/5399A! bump
167/! map,
7./A! gamma
>.77.!
correction
@[email protected]:45!
• Helpdesk
& free software updates
D32/-39E!F!C833!94C0G.83!6/-.039!
• Optional
upgrade for 3D X-ray image-visualisation
#/0:45.2!6/>8.-3!C48!H'!;<8.=!:7.>3!

INCLUDED IN DELIVERY:
?&
D:>?<8394260:45A!-:>:0.2!C2.0!/[email protected]!
High-resolution,
digital flat panel detector
&7.>3!/[email protected]:5>[email protected]!94C0G.83!J9:5>23!2:@3593K!
Im
age processing & control software (single license)
*%[email protected]!65:0!F!?:>?!/[email protected]!$403144E!
*%+4C3D+.
[email protected]!65:0!F!?:>?!/[email protected]!$403144E!
Flash5can
control unit & high performance Notebook
PL4G38!96//2=!MNN!O!,[email protected]?.8>3.123!1.0038=!!
o w e r supply 100 — 240 V & rechargeable battery
Cable
set 10 & 50 m; user manual
".123!930!MN!F!RN!7S!6938!7.56.2!
T.038/[email protected]!/[email protected]!08.59/[email protected]!
• Waterproof,
shock protected transport case
3EFF%G$#&HG,C"E,&/0I+2&4"EID$J&
• supplied
without X-ray source!







TECHNICAL DATA
[email protected]@7A&:787&
Notebook:
&

state-of-the-art, 15" XGA TFT, 1 , 5 GHz, 4 0 GB HDD, DVD
U0.03<4C<0?3
82F$&"N$,$D,"I>
Type of detector:

)D*+(U!%[email protected]!HR!%.90!.748/?469!9:2:@45!)%))D*+(U!%[email protected]!HR!%.90!.748/?469!9:2:@45!)%)!"#L$5 Flash5can 35 Fast amorphous silicon T F T

-I"D$44G.O&,G5$&
Processing time

2 [!,!9!/38!:7.>3!
s per image

?5+OG.O&+I$+>&
Imaging area:

400 X 280 mm
PNN!\!,]N!77!

?5+O$&4GP$&Q-GR$%S>
Image size (Pixel):

H,NN!\!,,PN!JM!77^!_!`P!L:\32K!
3200 X 2240 (1 m m

Resolution:
1$4"%E,G".>&

7!J_P!2/b77K!
M,a!
127 • m
( 4 p/mm)

:GOG,+%&"E,FE,>&
Digital output:

MP!1:0!JX!M`ANNN!>83=!23I329K!
14 bit (> 16,000 grey levels)

1$TEGI$#&
30 - 160 kV (e.g. Golden Engineering XR-1 50 or %R-200)
Required X - r /0I+2&
a y HN!O!M`N!EQ!J3B>B!W42-35!(5>:5338:5>!;csource:
4"EID$>&
U+,,$I2&"F$I+,G".>
Battery operation:

X!,!?89B!J-3/B!45!$4!4C!:7.>39K!
> 2 hrs. (dep. on No of images)

Dimensions:
:G5$.4G".4>!
:G5$.4G".4>

RN!\!H`!\!PA`[email protected][email protected]!!!!!!`,!\!RN!\[email protected][email protected]=:5>[email protected]!
50 X 36 X 4,6 cm (converter) 6 2 X 50 X 35 cm (carrying case)

8",+%&H$GOC,>&
Total weight:

*//84\B!PN!E>!J3\@2B!;<[email protected]!
Approx. 40 kg (excl. X-ray source)

!
!
!

CONFIDENTIAL
"#$%&'($)&*+!
"#$%&'($)&*+!!

2

,

!
!

G5 ! Detection system
*+!&,$-$.-/"0&+12-$3
12-$3
2-$3
*+!&,$-$.-/"0&+1
*+!&,$-$.-/"0&+

Model 4014
!"#$%&'()'

!

OVERVIEW
45675869&
The G5
! Tracer
)-.!
/01!
)234.2! is
56! a3! system
6768.9!developed
:.;.<=>.:! as
36! a3!
counter-measure to bogus G5 ! base stations. In
[email protected]?2.!8=!B=C?6!/[email protected]!&@!
general, the
f advanced
[email protected]! use
?6.! o=F!
3:;[email protected]:!encryption
[email protected]>[email protected]! in
[email protected]! the
8-.!
G5! s 6768.9!
y s t e m [email protected]!
e a n s t h8-38!
a t mobile
re
/01!
9=B543<<6! a32.!
2.<385;.<7!
6.4?2.D!Off-air
#FFA352! interception
[email protected]>[email protected]! o=F!
43<<6! i56!
relatively secure.
f calls
s
;.27!
:5FF54?<8D!An
*@!alternative
3<[email protected];.! method
9.8-=:! is
56! to
8=! use
?6.! a3!
very difficult.
[email protected][email protected]:!F=24.!3!9=B5bogus base station and force a mobile to use this
[email protected][email protected]@427>8.:!9=:[email protected]!3<6=!B.!
in unencrypted rode, such a system can also be
?6.:!
:[email protected]! the
8-.!1&10&!
G&10&!
[email protected]! t8=!
used t8=!
o determine
!51 (1
!51 grabbing)
o
[email protected][email protected]!38!8-.!6I584-D!!
enable interception at the switch.
!
)-56!
56! o=F!
>32854?<32! concern
[email protected]@! where
I-.2.! cell
4.<>[email protected]!
This is
f particular
32.!
are l i k<5J.<7!
e l y t o8=! b B.!
e u s?6.:!
e d f oF=2!
r s [email protected];.!
nsitive
[email protected][email protected]!
=2! in
[email protected]! the
8-.! vicinity
;[email protected]! o=F!
[email protected]!area
32.3
32.3!! thought
8-=?C-8! <5J.<7!
8=! be
B.! subject
6?BK.48! to
8=! espionage.
.6>[email protected]! A
*8!
communications or
f an
likely to
t
>32854?<32!256J6!32.L!
particular risks are:

!






Senior
Officials
[email protected]=2!#FF5453<6!!
/=;[email protected]@8!M?5Government
Buildings
Embassies
(9B3665.6!
HN5C-!O2=F5i g h Profile Personnel

[email protected][email protected][email protected][email protected]!F2=9!!3!
[email protected][email protected][email protected][email protected][email protected]!8-.!/01!)234.2!56!3B!3!
By monitoring transmissions from legitimate base stations
the G5! Tracer is able to build up a
>548?2.!
=F! the
8-.!network
@.8I=2J! environment
[email protected];[email protected]@8! and
[email protected]:! use
?6.! this
8-56! to
8=! recognize
[email protected]! suspicious
6?6>545=?6! transmissions
[email protected][email protected]! from
F2=9!
picture of
[email protected]!Q.7!F.38?2.6!=F!8-.!6768.9!32.L!!
bogus base stations. Key features of the system are:






A*<l l Networks continually scanned and monitored
"=9>348E!>[email protected]:[email protected]?2.:!
Compact,
portable, easy set up, and configured
'56><37!=F!(@427>[email protected]!87>[email protected]:!:[email protected][email protected][email protected]!
Display
of Encryption type and detection of any changes
O2=C23993BProgrammable
alarms for various changes in status

GSM TRACER
*+!&:7;<67&
)-.!/01!)234.2!6768.9!56!3!/01!2.4.5;[email protected]@8<[email protected]!8-.!/[email protected]=The G5 ! Tracer system is a G5 ! receiver, which constantly scans the G5 ! control channels
=F!3<[email protected]:!B7!8-.!
of all networks (dual band). It looks for changes in the overhead parameters transmitted by the
[email protected][email protected]!
@.8I=2JD!The
)-.! G5
/01!
2.4.5;.2! will
I5<B.!looking
<[email protected]! for
F=2! LAC
+*"!changes,
[email protected]!lack
<34J! =F!
>[email protected]! 'call
R43<genuine network.
! receiver
of paging,
?>[email protected]>[email protected][email protected][email protected]!>=I.2E!6I
?>[email protected]>[email protected][email protected][email protected]!>[email protected][email protected]>[email protected][email protected]!.84D!)-.!'56><37!6-=I6!
[email protected][email protected]>[email protected][email protected]!.84D!)-.!'56><37!6-=I6!
ups' without encryption, changes in power, switching
encryption off/on etc. The Display shows
3<8-.!current
[email protected]!channels
[email protected]@.<6!detected,
:.8.48.:E!network
@.8I=2J! operator,
=>.238=2E!encryption
[email protected]>[email protected]! used,
?6.:E! hopping
-=>>[email protected]! used,
?6.:E! and
[email protected]:!
all o=F!
f the
[email protected][email protected]!=F!>[email protected]:D!!
amount or absence of pages transmitted.

BOGUSCELL
BOGUS
CELL DETECTION
=4*>+&<6??&,6:[email protected][email protected]:[email protected][email protected][email protected][email protected]=By being aware of the transmitted system information on the control channels of legitimate cell
[email protected]!8-.!32.3E!8-.!/01!)[email protected]!8=!
sites within the area, the G5! Tracer is able to recognize bogus cell sites that are attempting to
95954!
658.! for
F=2! its
586! own
[email protected]!purposes.
>?2>=6.6D!Once
#@4.! the
8-.! G5
/01!
2.4.5;.2! has
-36! latched
<384-.:! onto
[email protected]=! these
8-.6.!
mimic a3!legitimate
! receiver
B=C?6!4.<bogus cell transmissions, it then decodes the transmissions, giving the user information such as
832C.8!&10&D!!
target 1!51.
!
)-.!/01!2.4.5;.2!-36!8-.!3B5<587!8=!>[email protected][email protected]!B36.:[email protected][email protected]=2!<5686!2.3:!F2=9!8-.!
The G5! receiver has the ability to perform its own scans based on neighbor lists read from the
=;.2-.3:[email protected][email protected]!4.<<6D!!
overhead of the genuine cells.

CONFIDENTIAL
"#$%&'($)&*+!
"#$%&'($)&*+!!

1

,

!
!

G5 ! Detection system
*+!&,$-$.-/"0&+12-$3
12-$3
2-$3
*+!&,$-$.-/"0&+1
*+!&,$-$.-/"0&+

M

o

d

l
4014
!"#$%&'()'

e

!

In a mobile environment, when the bogus ceH's
target passes through the genuine ceHs, these
&-!.!/01234!4-5260-/4-78!9:4-!7:4!10;<=!>433?
=!7.6;[email protected]==4=!7:60433=8!7:4=4!
=!7.6;47![email protected]==4=!7:60433=8!7:4=4!
&-!.!/01234!4-5260-/4-78!9:4-!7:4!10;<=!>433?=!7.6;[email protected]==4=!7:60433=8!7:4=4!
signal strengths (from the targets perspective) will
increase, then decrease, as the target passes
=2;-.3!=764-;7:=!AB60/!7:4!7.6;[email protected][email protected]>7254C!9
=2;-.3!=764-;7:=!AB60/!7:4!7.6;[email protected][email protected]>7254C!9233!2->64.=48!7:4-!D4>64.=48!.=!7:4!7.6;[email protected]==4=!
233!2->64.=48!7:4-!D4>64.=48!.=!7:4!7.6;[email protected]==4=!
close by, and then away from the relevant cell sites. In the case where a bogus cell is following
>30=4!1E8!.-D!7:4-!.9.E!B60/!7:4!64345.-7!>433!=274=F!&-!7:4!>.=4!9:464!.!10;<=!>433!2=!B033092-;!
e
.a!target
.!
7.6;47! in
2-! a.!vehicle,
54:2>348! the
7:4!transmission
76.-=/2==20-! will
9233! remain
64/.2-! roughly
60>0-=7.-7F! This
):2=! situation
=27>.-! b14!
identified by the GSM Tracer system.
2D4-72B24D!1E!7:4!GHI!)6.>46!=E=74/F!!
!

The GHI!
G ! Tracer
):4!
)6.>46! is
2=!small,
=/.338!portable,
@067.1348!and
.-D! 12V
J,K! DC
'"! powered.
@09464DF! It
@09464DF!
&7! is
2=! equally
4L=<274D! for
B06! office
0BB2>4! or
06! in
2-!
vehicle installations.
54:2>34!2-=7.33.720-=F!!

ALARM GENERATION
4546!&*787649:;8&&
):4!GHI!)6.>46?=!.3.6/!>.-!14!=47!70!762;;[email protected]/4746=F!%06!4M./@348!27!>0<3D!
The G ! Tracer's alarm can be set to trigger on a number of parameters. For example, it could
14!
<=4D! t70!
2-D2>.74! when
9:4-! the
7:4! local
30>.3! cell
>433!operators
[email protected]=! have
:.54! turned
7<6-4D! o0BB!
7:4! encryption
4->[email protected]! and/or
.-DN06!
be used
o indicate
f f the
B64L<4->E!
:[email protected]@2-;F!This
):2=!could
>0<3D!indicate
2-D2>.74! that
7:.7! they
7:4E! intend
2-74-D! to
70! use
<=4! direction-finding
D264>720-OB2-D2-;! equipment.
4L<[email protected]/4-7F! It
&7!
frequency hopping.
>.-!.3=0!762;;46!9:4-!.!>:.--43!>:.-;4=!27=!+*"8!9:2>:!2/@324=!.!10;<=!>433!2=!B06>2-;!.!30>.720-!
can also trigger when a channel changes its LAC, which implies a bogus cell is forcing a location
up-date from mobiles in the target area.

LOGGING OF SURROUNDING MOBILES
5;**:8*&;:57+&&
):4!GHI!)6.>46!>.-!=<654E!.-!.64.!B60/!.!/[email protected]/8!=<>:!.=!.!>.6F!):4!30;=!9233!14!7:4!
):4!GHI!)6.>46!>.-!=<654E!.-!.64.!B60/!.!/01234!
@3.7B06/8!=<>:!.=!.!>.6F!):4!30;=!9233!14!7:4!
The G ! Tracer can survey an area from a mobile platform,
such as a car. The logs will be the
=2;-.3!=764-;7:!0B!=<66046!927:[email protected]=2720-!2-B06/.720-!B60/!
signal strength of surrounding Cells as seen by the G ! Tracer with position information from
.-!.77.>:4D!GPH!64>42546F!Q:4-!7:4!GHI!)6.>46!2=!3.746!30>[email protected]=2720-!27!>.-!
an attached CPSreceiver. When the G ! Tracer is later located at its stationary position it can
D4>0D4!/4.=<64/[email protected]=!B60/!/01234=!2-!7
D4>0D4!/4.=<64/[email protected]=!B60/!/01234=!2-!7:4!2//4D2.74!.64.F!):4=4!/4.=<64/[email protected]=!
:4!2//4D2.74!.64.F!):4=4!/4.=<64/[email protected]=!
decode measurement reports from mobiles in the
immediate area. These measurement reports
>.-!
14!matched
/.7>:4D!with
927:!the
7:4!survey
=<654E! logs
30;=!giving
;252-;! the
7:4! position
@0=2720-! of
0B! the
7:4! mobiles.
/01234=F!The
):4! mobiles
/01234=! will
9233! be
14!
can be
2D4-72B24D!1E!7:426!)IH&F!):4!=<654E!64=<37=!.64!=7064D!2-!=<>:!.!9.E!.=!70!14!.134!70!14!64.D!1E!
identified by their TMsI. The survey results are stored in such a way as to be able to be read by
/[email protected]@2-;[email protected];6./=F!!
mapping programs.

FLUSHING OF TMsI's
<5=+?:8*&;):4!
GHI!
)6.>46! can
>.-! b14!
>0--4>74D! t70!
=462.33E! controlled
=462.33E!
>0-760334D! GHI!
/01234F! This
):2=! mobile
/01234! i2=!
The G
! Tracer
e connected
o a.! serially
G ! mobile.
s
>0//.-D4D!
70!send
=4-D!a.!silent
=234-7! text
74M7! to
70!a.!target
7.6;47! mobile
/01234! in
2-! the
7:4! area.
.64.F! The
):4! GHI!
)6.>46! 9233!
=44! 7:4!
commanded to
G ! Tracer
will see
the
@.;4!.-D!>.-!D4D<>4!7:4!)IH&!.==0>2.74D!927:!7:4!7.6;47!-146F!!
page and can deduce the " ! I associated with the target number.

USER INTERFACE
=+76&:8976<4A7&&
):4!GHI!)6.>46!2=!.5.23.134!927:!.-!4/14DD4D!=2-;34!10.6D!>0/@<746F!"0--4>720-!0B!.!=>644-8!
):4!GHI!)6.>46!2=!.5.23.134!927:!.-!4/14DD4D!
=2-;34!10.6D!>0/@<746F!"0--4>720-!0B!.!=>644-8!
The G ! Tracer is available with an embedded single
board computer. Connection of a screen,
R4E10.6D!
.-D!mouse
/0<=4! will
9233! be
14!needed
-44D4D! to
70! set
=47! up
7:4! alarm
.3.6/! parameters.
@.6./4746=F!Alternatively
*3746-.72543E! the
7:4! GHI!
keyboard and
G!
)6.>46!>.-!14!D6254-!D264>73E!B60/!.-!.77.>:[email protected]@!P"!52.!7:[email protected]!):[email protected];!=E=74/!
Tracer can be driven directly from an attached laptop PC via the u s # port. The operating system
<=4D!2=!Q2-D09=!UP8!9:2>:!:.=!7:4!B.>2327E!B06!VW4/074!'[email protected]?8!9:464!52.!.!KP$!>0--4>720-8!
used is Windows XP, which has the facility for 'Remote Desktop', where via a VPN connection,
7:[email protected]!0B!7:4!GHI!)6.>46!>.-!14!>0-760334D!B60/!.!64/074!P"F!!
the operation of the G ! Tracer can be controlled from a remote PC.

DECODE CALLS
,7A;,7&A455+&
):4!
)6.>46! is
2=! a.!dual
D64>42546! capable
>[email protected]! o0B!
B64L<4->E! hopping
:[email protected]@2-;! and
.-D! following
B033092-;! unencrypted
[email protected]!
The GHI!
G ! Tracer
f frequency
>[email protected];!74M7!/4==.;4=!.-D!64>06D2-;!.calls, displaying text messages and recording audio. There is an option to enable the Hound dog
70!D4>0D4!*YN,!4->[email protected]!Z0BB!.26[!
to decode A5/2 encryption "off air"

CONFIDENTIAL
"#$%&'($)&*+!
"#$%&'($)&*+!!

2

,

ela(nan .4et.!
!

G5 ! Detection system
*+!&,$-$.-/"0&+12-$3
12-$3
2-$3
*+!&,$-$.-/"0&+1
*+!&,$-$.-/"0&+

Model 4014
!"#$%&'()'

G+!&456785&9864:58+&
! TRACER F"#$UR"
*
*+!&456785&9864:58+&

The G/01!
5 ! Tracer
)-.!
)234.2! system
5657.8! wiH
9:;;! constantly
4<=573=7;6!
scan t h
e G/01!
5 ! control
f a3;;!
ll
543=!
7-.!
4<=724-3==.;5! o<>!
networks ( [email protected];!
u a l b aC3=ADE!
n d ) . T )-.!
h e foHowing
=.79<2?5!
>describes some of the features of the G5 !
A.542:C.5!5<8.!<>!7-.!>.37B2.5!<>!7-.!/01!
Tracer
software:
)234.2!5<>7932.G!!

n w ' ( iI)#(f

THE CHANNEL SCAN WINDOW
4;8&7;6<<8=&+76?&
The Channel
c a n windows
he
)-.!
"-3==.;! s043=!
9:=A<95! display
A:5H;36! t7-.!
H<9.2!
;.I.;5! detected
A.7.47.A! f ><2!
.34-! o<>!
power levels
o r each
f t 7-.!
he
4-3==.;5!
:=!the
7-.!bands
C3=A5!being
C.:=F!scanned
543==.A! as
35! a3!
channels in
C32!
4-327E!Colors
"B5.A! t 7-:F-;:F-7!
bar chart.
r e used
o highlight
channels of interest.
4-3==.;5!<>!:=7.2.57E!!

II!

L6 1

l

I
I

1111

!
)-.!
-<2:J<=73;!axis
3K:5!is
:5! the
7-.!ARFCN
*L%"$! of
<>! the
7-.!channels.
4-3==.;5E
4-3==.;5E!!The
)-.! vertical
I.27:43;! axis
3K:5! is
:5! the
7-.! power
H<9.2! level
;.I.;! <>!
The horizontal
of 7-.!
the
channel at this location.
4-3==.;!37!7-:5!;<437:<=E!!
!


( -li,ii i,o' I ( ' ‚ 1 4 1 . • i i , ' "

The colors of the bars indicate different information:
)-.!4!7-.!C325!:=A:437.!A:>>.2.=7!:=><2837:<=G!

!

• Black
—Channels that are not broadcast channels
M;34?!N!"-3==.;5!7-37!32.!=<7!C2<3A4357!4-3==.;5!
• D'32?!C;B.!N!M2<3A4357!4-3==.;5!9:7-!=<2837:<=!
a r k blue — Broadcast channels with no cell information
• L+:F-7!C;B.!N!M2<3A4357!4-3==.;5!9:7-!4.;;!:=><2837:<=O!CB7!
i g h t blue — Broadcast channels with cell information, but
B=?=<9=!5.4B2:76!
unknown security
/2..=!N!*!4-3==.;!4:H-.2.A!9:7-!*PQR!
• Green
— A channel ciphered with A5/1
ip
• RL.A!N!*!4-3==.;!4:H-.2.A!9:7-!*PQS!<2!=<7!4:H-.2.A!
e d —A channel ciphered with A5/2 or not ciphered

%e c r e i " q & . , '
''F(I: ) 3
I"
"! 7.4 WTH

' Le.'eL
uc,l

L b S i )

)I)I&I&*l

+%,4(%%-t'?(d.'

4

Urited "#$% of

/)&%/)).%lL(%0). S!
$-Notik u .
L ' 1 ' , . ) l . ) Cock:1 EE
" Q l I ' . t ' * 41B7

EV%Liaz (",92
,920
,92
203
03111-f
-f45667
-f
f45667ti
45667ti45 V 2 b . '

*
*!5B88326!<>!:=><2837:<=!3CA!5B88326!<>!:=><2837:<=!3Csummary of information about a channel can be obtained by moving the mouse pointer over
:7E!
";:4?:=F! o<=!
4-3==.;! will
9:;;!display
A:5H;36! more
8<2.! detailed
A.73:;.A! information
:=><2837:<=! i:=!
7-.! Channel
"-3==.;! Properties
T2it. Clicking
n a3!channel
n the
window.
9:=A<9E!

THE CHANNEL LIST WINDOW
4;8&7;6<<8=&=?+4&>?&

The Channel
! Tracer
)-.!
"-3==.;! List
+:57! window
9:=A<9! contains
4<=73:=5! a3! list
;:57! of
<>! all
3;;! the
7-.! broadcast
C2<3A4357! channels
4-3==.;5! that
7-37! G5
/01!
)234.2! has
-35!
A:54<2837:<=!:7!-35!F3:=.A!>2<8!7-.5.!4-3==.;5E!
discovered, while it has been scanning, and any information it has gained from these channels.
There are ten values for each channel in the list:
)-.2.!32.!7.=!I3;B.5!><2!.34-!4-3==.;!:=!7-.!;:57G!




!









*L%"$!N!)-.!355:F=.A!4-3==.;!=B8C.2!
ARFCN
— The assigned channel number
$.79<2?!N!)-.!=38.!<>!7-.!=.79<2?!Network
—The name of the network operating the cell serviced by this channel
1$"!N!)-.!1!7-.!=.79<2?!B;!:>!/01!)234.2!AM N C — The Mobile Network Code of the network operator (useful if G5! Tracer does not
?=<9!7-.!=38.!<>!7-.!know the name of the operator)
PT<9.2!+.I.;!N!)-.!;357!H<9.2!;.I.;!A.7.47.A!><2!7-:5!4-3==.;!
o w e r Level —The last power level detected for this channel
":H-.2:=F!N!)-.!76H.!<>!4:H-.2:=F!C.:[email protected]=?=<9=O!*PQRO!*PQS!<2!=<=.D!
":H-.2:=F!N!)-.!76H.!<>!4:H-.2:=F!C.:
[email protected]=?=<9=O!*PQRO!*PQS!<2!=<=.D!
Ciphering — The type of ciphering being
used (unknown, A5/1, A5/2 or none)
L+357!*47:I.!N!)-.!;357!7:8.!7-.!4-3==.;!935!A.7.47.A!5.=A:=F!C2<3A4357!:=><2837:<=!
a s t Active — The last time the channel was detected sending broadcast information
(8H76!T3F:=F!N!)-.!H.24.=73F.!<>!.8H7
6!H3F:=F!8.553F.5!5..=!<=!7-.!4-3==.;!
6!H3F:=F!8.553F.5!5..=!<=!7-.!4-3==.;!
E(8H76!T3F:=F!N!)-.!H.24.=73F.!<>!.8H76!H3F:=F!8.553F.5!5..=!<=!7-.!4-3==.;!
m p t y Paging — The percentage of empty
paging messages seen on the channel
"-3==.;!)6H.!N!)-.!76H.!<>!4-3==.;!C.:[email protected]&UO!UO!<2!U&D!
Channel Type —The type of channel being used (IV, V, or VI)
V!7-.!4-3==.;!B5.5!-<2!A.A:437.A!4-3==.;5!
Hopping
— If the channel uses hopping for dedicated channels
&=A:I:AB3;!0.77:=F5!N!&>!7-.2.!32.!:=A:I:AB3;!5.77:=F5!><2!3;.275!3CIndividual Settings — If there are individual settings for alerts about this channel

!

CONFIDENTIAL
"#$%&'($)&*+!
"#$%&'($)&*+!!

*

,

ela"nan .e9t.!
!

G5 ! Detection system
*+!&,$-$.-/"0&+12-$3
12-$3
2-$3
*+!&,$-$.-/"0&+1
*+!&,$-$.-/"0&+
!!" # '

IC 7 0

,

IN
S
IC 9 8
ID !

Model 4014
!"#$%&'()'

L $ I

% ' &

n a i l

.

-

,

'

"

r a n G i
.
L
L
W m .

Lad 1'"

Z'.(

'2 3i2'

: 0 3 4 ( n f E r s

. ! 4 1 / 0 5 I I lieF2
5)4-1i"-*-'-%-

AIEFITS
45678+&
)-./.!0/.!0!1234./!56!.7.189!8-08!:;<[email protected]!)/0A./!0)-./.!0/.!0!1234./!56!.7.189!8-08!:;<>[email protected]!)/0A./!0There are a number of events that will trigger the G5
! Tracer alerts, all of the parameters can
4.!9.8B!01D!8-.!A5//.9C51D;1=!/.C5/8;1=!A01!4.!9.be set, and the corresponding reporting can be selected.
















A*FGH!";C-./;1=!
S / i Ciphering
A*FGI!";C-./;1=!
5 / 2 Ciphering
N$5!A;C-./;1=!
o ciphering
L+*"!A-01=.9!
A C changes
N$5!A0<<9!D.8.A8.D!
o caHs detected
Channel
lost
"-011.Channel
detected
"-011.PJ5:./!;1A/.09.!
o w e r increase
PJ5:./!D.A/.09.!
o w e r decrease
"-011.Channel type changes
A*35218!56!C0=;1=!
m o u n t of paging
Extra
info
(L8/0!;165!
Error
(//5/!
Fatal
%080
I

L , 9

5/1

_

A

I
$

" d k d ,

l

N4

"4%5,cktrcitO
cktrcitO t i n

311 "'$

.

I

Nov

,
-

I 6
7",,,%5,,"

1,,8
1,,8

N

c

'

r

tkieded I I
%wet i m i t a l e I a n
R a w cleame

l '

v
'

N c r

%

N o n e

v

icr
cr

-

N

7 " % 9 : Norda
Enta:

'

o

,
I

l

v

N w '
t

r

,

e

lcr&m

!
#1!8-.!On the left side of the dialog there is a list of all the events
8-08!
A01!occur
5AA2/! while
:-;>[email protected]!
)/0A./! is
;9!scanning.
9A011;1=E!For
%5/! each
.0A-! of
56!
that can
! Tracer
the events there are two selection boxes. The left hand box
8-.!.7.189!8-./.!0/.!8:5!9.9.89!8-.!<5=!sets the log level of the event, this will display the event in
8-.!M*the 'Alert' or 'Info' display.
!

Default Sensitivity Settings
s ensitivity settings

Power increase ("0): 1 0
'()*" decrease West

+
;

[ (,
Cancel

v

Empty paging 1[4 100

%5/!A-01=.!;1!J5:./!For change in Power levels, levels in Empty paging, and the
8;3.!
"-011.;9!lost,
<598B!there
8-./.! is
;9!a0!further
62/8-./! screen
9A/..1! to
85! set
9.8! the
8-.!
time a0!Channel
levels of the Alert trigger.

Channel lost (minutest 2 0

DISPLAY WINDOW
,9+:54;&<9=,>• WO;1D5:!
indow
"-011.• Channel
List —Displays the Channel List window
+5:./!Q01D!P!';9C<0K9!8-.!"-011.• L o w e r Band — Displays the Channel scan window for the 900 or 850 band
• UUCC./!Q01D!P!';9C<0K9!8-.!"-011.p p e r Band — Displays the Channel Scan window for the 1800 or 1900 band
"-011.• Channel Properties — Displays the Channel Properties window
• A*l e r t s — Displays the Alert Log window
(//5/9!P!';9C<0K9!8-.!(//5/!+5=!:;1D5:!
• Errors
— Displays the Error Log window
&165/308;51!P!';9C<0K9!8-.!&165/308;51!+5=!:;1D5:!
• Information — Displays the Information Log window
!
CONFIDENTIAL
"#$%&'($)&*+!
"#$%&'($)&*+!!

4

,

!
!

Night
Vision Viewer
*+,-.&/+0+"1&/+$2$3&
,-.&/+0+"1&/+$2$3&
-.&/+0+"1&/+$2$3&
*+,
*+

M

o

d

l
1013
!"#$%&'(')

e

!

The Model
! s " # purposes
)-.!
/01.2!1013
,3,4!Night
$56-7! Vision
85950:!Viewer
85.;.=:57! is
59! used
>9.1
>9.1!! for
?0A>70! detect
1.7.B7! large
2C<6.! laser
2C9.monitoring systems (890N $) and fiber optical microphones.
D0:570<5:6!9E97.D9!FGH3$/I!C:1!?5J.The Model 1013
is designed
to offer
the largest
selection of
cameras available
for 7-.!>9.the user. &?!
if
)-.!/01.2!
,3,4!59!
1.956:.1!70!
0??.2C<6.97!9.2.B750:!
0?!BCD.CLC52CJ2.!?0your application
the
E0>CAA25BC750:!calls
BC229! for
?0L51.0!surveillance
9>[email protected]:EM!Canon,
"C:0:M!Panasonic,
NC:C90:5BM! etc.),
.7BKIM! you
E0>! can
BC:! order
0<1.required adapter pairs.
5If you also need to record using an 5LR or digital camera, (Canon, Nikon or Minolta), just order
&?!E0>!C290!:..1!70!95:6!C:[email protected]+P!097!0<1.the adapters for these cameras and switch back and forth.
7-.!C1CA7.<9!?0
!

Central Intensifier Unit with Monocular Viewer
".:72C)-.!
-.C<7! of
0?! the
7-.!modular
D01>2C:56-7! vision
L5950:! is
59! the
7-.! CIU
"&=!(Central
F".:7&:7.:95?5.=:57IM! an
C:! electro-optical
.2.B7<0S0A75BC2!
The heart
1.L5B.!
;57-!
.2.B7<0:5B!
B0DD>:5BC750:!
7-C7!
.:9
.:9>>A<0A.5:7.J.7;..:!
7-.!
BCD.C:1!
device with electronic communication that ensures proper interface between the camera
the lens.
7-.!2.:9K!!
*!LC<5.7E!0?!T.:!&&M!T.:!&&&M!C:1!T.:!&8!U'SV!".:7!70!7C520*!LC<5.7E!0?!T.:!&&M!T.:!&&&M!C:1!T.:!&8!U'SV!".:
7!70!7C520A variety of Gen II, Gen iii, and Gen IV %D-4 Central
Intensifier Units allow you to tailor a system
5:!7.750:M!9.:9575L57EM!9A.B75:!7.750:M!9.:9575L57EM!9A.B77A>7!J<56-7:.99!C:1!J>16.7K!!
7A>7!J<56-7:.99!C:1!J>16.7K!!
in terms of resolution, sensitivity, spectral response, gain, output brightness and budget.
'CD00:257! or
097C<257! nights
:56-79! can
BC:!easily
.C952E! be
J.! recorded
C:1! imaged
5DC6.1! as
C9! bright,
J<56-7M! high-resolution
-56-S750:!
Dark, moonlit
9B.:.9!JE!7-.!BCD.9B.:.9!JE!7-.!BCD.9CJ2.!
52DK!)-.!/01.2!,3,4!.X7.:19!7-.!BCD.9CJ2.!
scenes by the camera's daylight sensor or film.
The Model 1013 extends the camera's usable
256-7!7!7-.!177.light range without the drawbacks of slower shutter speeds or time integration.
*9!
:.;!cameras
BCD.C:1!technologies
7.B-:02065.9! are
C5:7<01>B.1M! n:.;!
BCD.C:1! lens
2.:9! adapters
C1CA7.<9! will
;522! bJ.!
As new
e w camera
e
1.L.20A.1!
?07-.! Model
/01.2!1013,
,3,4M!ensuring
.:9><5:6! that
7-C7! your
E0>:56-7! vision
L5950:! system
9E97.D! will
;522! never
:.L.J.B0D.!
developed for
0J902.7.Y!
*?7.E0>!choose
B-009.! the
7-.!adapter
C1CA7.AC5<9!
F1.A.:15:6! on
AC5<9!F1.A.:15:6!
0:! the
7-.! camera
BCD.BCDB0<1.!
Cobsolete! After
(depending
or camcorder
you are
>95:6I!E0>!D>97!B-009.!7-.!".:757.1!?0using) you must choose the Central Intensifier Unit suited for your applications.

Digital and !5rn"i
still Cameras

Video Camcorde

C

!
!

!

CONFIDENTIAL
"#$%&'($)&*+!
"#$%&'($)&*+!!

1

,

!
!

Model 2001
!"#$%&'(()

Covert Door Opening
Equipment
*"+$,-&."",&/0$1213&456207$10$121
$1213
3&45
&4
562
620
07$17$1*"+$,-&."",&/0
*"+$,-&."",&/
!

THE KIT CONSISTS OF:
894&:;8&*/<=;=8=&/>?&
1. 1,!!./012345.!
Sputnik
,-

!

2. 1,!.)17189:.!
Tubular
63. 1,!<1824=+>[email protected]?5!/A2!
Multi-Lock Pick set
;4. 1,! E([email protected]?5! @:>CADD4>398! /A2! .$AE!
BGeneration
FA3A:924>3.!
G5. 1,!'>>:!#0A343H!/A2.!
Door Opening Set'
6. 1,!'[email protected]?5!/A2!!
Dental Pick Set
I7. 1,!%988A!+>[email protected]?5D!
Palle Lock Picks
J8. 1,[email protected]!)1L78A:!'A?>MA:!
Pin Tumbler Decoder
K9. 1,!H o
b b s c h e HO>>5D!
ooks (S
e t o>C!
f 4B!
NO>77D?PA!
Q/A2!
different
sizes)
M4CCA:A32!D4RADS!
10. 1,!":>[email protected]?5!
Cross Pick
,T11. 1,!<929M>:[email protected]?5!/A2!
Matador Pick Set
,,,612. 1,!'1084?92A!UAV!/A2!
Duplicate Key Set
,;13. 1,!<1824=04?5!/A2!
Multi-pick Set
14.
1
! ultif "#$%
,B- ,!<1824C:WXA!
15.
1
Lock-force
Professional Set'
,G- ,!+>?5=C>:[email protected]:>CADD4>398!/A2.!
,I16. 1,!)A3D4>3!/A2!Q6G!04A?ADS!
Tension Set (25 pieces)
17. 1,!<48E915AA!<>748!YA8>9MA:!
Milwaukee Mobil Reloader
,J,K18. 1,!*??1=+4HP2!
Accu
,N,[email protected]?ADS!
19. 1 Replacement Lights (2 Pieces)
20. 1,!*??1=':488A:!+>?5=)>:!
Accu
6T6,21. 1,!YA089?ALA32!*??1!
Replacement Accu
22. 1,!U427>:!"P177!+AZA:!/A2!
Kitbor Chubb Lever Set
666;23. 1,![4HH8A:!/A2!Q;!M4CCA:A32!/A2DS!
Jiggler Set (3 different Sets)
6B"4:?8A!Manipulation
<934018924>3!Spiral-Needles
/04:98=$AAM8AD!
24. 1,!Circle
QB!M4CC-!04A?ADS!
(4 Cliff. pieces)
6G"4:?8A!Manipulation
<934018924>3!Spiral-Needles
/04:98=$AAM8AD!
25. 1,!Circle
DL988!Q6!04A?ADS!
small (2 pieces)
26. 1,!'>>:!Y>M!
Door Rod
6I6J27. 1,!\43M>E!#0A3A:!
Window Opener
6K,!
@A:?1DD4>3! s p/0:43H!
28. 1 E u(1:>0A93!
r o p e a n Percussion
ring
/VD2AL!
System

29. 1,!'>>:[email protected]!<934018924>3!O>>5!!
Door Panel Manipulation Hook
6N30. 1,!'>>:!<934018924>3!"9:M!43?8-!6!M4CC-!
Door Manipulation Card incl. 2 Cliff.
;THolders
O>8MA:D!
31. 1,!Manipulation
;,<934018924>3! Set
/A2! for
C>:! Lever
+AZA:! Locks
+>?5D!
(13
Diff.
Sizes)
Q,;!'4CC-!/4RADS!
! *]!
JGLL! Shaft:
/P9C2]! 45mm
BGLL! (10
Q,T!
A:L +A3H2P]!
e n g t h : 75mm
Pieces)
@4A?ADS!
! ^]!
+A3H2P]!9NT!
LL!
/P9C2]! 60mm
ITLL! (16
Q,I!
&: Length:
0 m
m Shaft:
Pieces)
@4A?ADS!
! ']!
+A3H2P]! 90
NT! m
LL!
/P9C2]! 60mm
ITLL! (20
Q6T!
D: Length:
m Shaft:
Pieces)
@4A?ADS!
! %]!
+A3H2P]! 9NT!
LL!
/P9C2]! 60mm
ITLL! (24
Q6B!
F: Length:
0 m
m Shaft:
Pieces)
@4A?ADS!
! F]!
+A3H2P]! 90
NT! m
LL!
/P9C2]! 60mm
ITLL! (24
Q6B!
G: Length:
m Shaft:
Pieces)
@4A?ADS!
! O]!
+A3H2P]! 90
NT! m
LL!
/P9C2]! 60mm
ITLL! (24
Q6B!
H: Length:
m Shaft:
Pieces)
@4A?ADS!
! []!
+A3H2P]! 100
,TT! mm
LL! Shaft:
/P9C2]! 80mm
KTLL! (12
Q,6!
J: Length:
Pieces)
@4A?ADS!
! U]!
+A3H2P]! 100
,TT! mm
LL! Shaft:
/P9C2]! 80mm
KTLL! (12
Q,6!
K: Length:
Pieces)
@4A?ADS!
! +]!
+A3H2P]! 100
,TT! mm
LL! Shaft:
/P9C2]! 80mm
KTLL! (12
Q,6!
L: Length:
Pieces)
@4A?ADS!
! +A3H2P]!1,TTLL!
/P9C2]! 80mm
KTLL! (24
Q6B!
!: Length:
0 0 m m Shaft:
Pieces)
@4A?ADS!
! $]!
+A3H2P]!1,GTLL!
/P9C2]! 120mm
,6TLL! (24
Q6B!
N: Length:
5 0 m m Shaft:
Pieces)
@4A?ADS!
! #]!
+A3H2P]! 110mm
,,TLL! Shaft:
/P9C2]! 80mm
KTLL! (15
Q,G!
0: Length:
Pieces)
@4A?ADS!
! @]!
+A3H2P]!1,GTLL!
/P9C2]! 120mm
,6TLL! (12
Q,6!
P: Length:
5 0 m m Shaft
@4A?ADS!
Pieces)

!
!
!

CONFIDENTIAL
"#$%&'($)&*+
"#$%&'($)&*+!

,

! s "# INDEX
!"#$%&'()*
•••••
W • '-

. Introduction
!"!#!$%&'()*+&,(%
!#!$%&'(
!#!$%&'
()*
)*+
+&,&,(%
(%
- The
Threat
!-!#!./0!./'01&
!#!./0
!#!./
0!./'0
!./'
01&
1&
- Recommendations
!#!30+(
!#!3
0+(44
440
0%)1&,
%)1&,(
(%5
%5
!2!#!30+(440%)1&,(%5
4 - Training
Overview
7 Course
8(*'50!9:0':,0
8(*'50!
9
:0':,0;
;
!6!#!.'1,%,%7!8(*'50!9:0':,0;
!6!#!.'1,%,%7
!6!#!.'1,%,%
5 - Training
syllabuses
[email protected]*505
!7 Course
8(*'50!=>[email protected]*505
8(*'50!=>[email protected]*505
6!#!3
- 30+(440%
Recommended
A
!#!
0+(440%)
)0
0)
) Products
B'()
B'(
)*+
*+&&55
!A!#!30+(440%)0)!B'()*+&5
7 - Technical Data Sheets
=/00&5
/00&5
!C!#!.0+/%,+1?!D1&1!=/00&5
!C!#!.0+/%,+1?!D1&1!
!C!#!.0+/%,+1?!D1&1!=
8 - IP/PABX Manipula tion
!E!#!$BFBGHI!J1%,K*?1&,(%
C(44
Commercial
ommercial
Quotations
!#!8
!#!8(
440
0''+
+,1?!M*
,1?!M*
,1?!M*(
(&1&,
&1&,(
(%5
%5
!L!#!8(440'+,1?!M*(&1&,(%5
10!#!.0
- Terms
& Conditions
"N!#!.
"N!#!.0'45!O!8(%),&,(%5
"N
!#!.
0'45!O!8(
'45!O!8
(%),&,
%),&,(
(%5
%5
11"!#!8(
- Contact
Details
""!#!
""!#!8(%&1+&!D0&1,?5
"
"!#!
"!#!
8(%&1
%&1+
+&!D
&!D
&!D
&!D0
0&1,?5
&1,?5
"-!#!P?141%!81&1?(
"-!#!P?141%!81&1?(75!9:0':,0;
"
-!#!P?141%!81&1?(
-!#!P?141%!81&1?(
-!#!P?141%!81&1?(7
75!9:0':,0
5!9:0':,0
5!9:0':,0;
;
12
- Haman Catalogs
Overview


lG
$m$nP
$
$m
m$
m
$
$nP
nP
E
R
M
A
N
$ECURITVsOL(

elaman

IT/Computer
Threat
!")*+,-.(&%#"$%&'(#
-.(&%#"$%&'(#
.(&%#"$%&'(#
!")*+,
!")*+,-

I

!

Threat
!"#"$%&'(

T

For every
s a'4#
n equal
h e same
s true
or
/+%#
&0&%1# action
'2(3+4# there
($&% i35#
&6.'7# and
'48# opposite
+--+53( reaction.
%&'2(3+49# T"$
5', i35#
(%. f:+%#
IT/Infrastructure security.
!")!4:%'5(%.2(.%
;&2.%3(19#For
/+%# every
&0&%1# security
5&2.%3(1# measure
5&2.%3(1#
,&'5.% employed,
&,-7+1&85++4# enough
&4+.=$# there
($&%
will a method TO break through it.
>377#'#,&($+8#"?#@%&'A#($%+.=$#3(9###
With t /01!
h e advancements
n digitization
-./0!
2342561715/8! i .5!
3.9./.:2/.;5! and
253! technology
/1605;7;>1! and
253! more
7;>1! communications
6;77?5.62/.;58!
systems are becoming digitized and computerized. Analog telephone systems are migrating to
8=8/178!2>[email protected];7.59!3.9./.:13!253!6;7A?/1>.:13B!*521!7.9>2/.59!/;!
I5DN. l D N is migrating to Voice over lP. Wired
networks are migrating to wireless networks.
&C'$B!&C'$!.8!7.9>2/.59!/;!D;.61!;41>!&EB!-.>1
&C'$B!&C'$!.8!7.9>2/.59!/;!D;.61!;41>!&EB!-.>13!51/F;>G8!2>1!7.9>2/.59!/;!F.>1<188!51/F;>G8B!
3!51/F;>G8!2>1!7.9>2/.59!/;!F.>1<188!51/F;>G8B!
3!51/F;>G8!2>1!7.9>2/.59!/;!F.>1<188!51/F;>G8B!
One
o
f
the
obvious
threats
from
this
i
s
interconnectivity.
or
#51! ;H! /01! ;@4.;?8! /0>12/8! H>;7! /0.8! .8! .5/1>6;5516/.4./=B! A*! reason
>128;5! and
253! advantage
23425/291! fH;>!
3.9./.:2/.;5!253!6;7A?/1>.:2/.;5!.8!.5/1>6;5516/.4./=!II!7?digitization and computerization is interconnectivity -- multiple systems being able to speak to
1260!
;/01>!across
26>;88!great
9>12/! distances.
3.8/25618B!The
)01! telephone
/1<1A0;51! system
8=8/17! in
.5! Germany
J1>725=! is
.8! connected
6;5516/13! to
/;! the
/01!
each other
/1<1A0;51!
8=8/17!and
253!administration
237.5.8/>2/.;5! system
8=8/17! in
.5!Canada.
"25232B!Although
*0;?90! useful
?81H?H;>! the
/01! company
6;7A25=!
telephone system
17A/01!system,
8=8/17K! i./!
.8! just
L?8/! as
28!useful
?81H?H;>!
H;>!
>! the
/01! eavesdropper,
124183>;AA1>K! who
F0;! is
.8! able
[email protected]<1! to
/;! attack
2//26G! the
/01!
employing the
t is
8=8/17!H>;7!25=F01>1!.5!/01!F;><3!253!2/!25=!/.71B!
system from anywhere in the world and at any time.
*0;?90!6;?5/1>7128?>18!253!2//26G8!2>1!6;58/25/<=!;41>!/2G.59!1260!;/01>!/01>1!.8!8/.<*0;?90!6;?5/1>7128?>18!253!2//26G8!2>1!6;58/25/
<=!;41>!/2G.59!1260!;/01>!/01>1!.8!8/.<Although countermeasures and attacks are constantly
over taking each other there is still the
5113!/;!17A./=B!";?5/1>7128?>18!2>1!8/
5113!/;!17A./=B!";?5/1>7128?>18!2>1!8/.<>15/!253!25!
.<>15/!253!25!
need to employ security. Countermeasures are still
going to be effective as a deterrent and an
;@8/26<1!
H;>! the
/01!attacker.
2//26G1>B!Slowing
C3;F5! the
/01! attack
2//26G! or
;>! simply
8.7A<=! making
72G.59! It
./! /;;!
7?60! effort
1HH;>/! can
625!
obstacle for
too much
A>1415/!2!8?66188H?prevent a successful attack.
#51!
;H! the
/01! best
@18/! countermeasures
6;?5/1>7128?>18! is
.8!knowledge.
G5;F<1391B!Educating
G5;F<1391B!
(3?62/.59! users
?81>8! and
253! operators
;A1>2/;>8! to
/;! employ
17AOne of
/01.>!
;F5!
816?>./=K!
?81!
/01!
8=8/17!
82H1<=K!
253!
0241!
/01!
[email protected]/;!
>16;95.:1!
/01!
8.958!
;H! an
25!
their own security, use the system safely, and have the ability to recognize the signs of
2//26G!2>1!2!<2>91!A>;A;>/.;5!;H!&)!)C"MB!
attack are a large proportion of IT !5"#.
%;<1!L?8/!8;71!;H!/01!2//26G8!17A8!80;?<[email protected]!2F2>1!;HN!
Following are just some of the attacks employed that all users should be aware of:

Time Bomb
).71!O;[email protected]!

'.6/.;52>=!C625!
Dictionary Scan

+;9.6!O;[email protected]!
Logic Bomb

'.9./2Digital Snooping

Rabbit
[email protected]@./!

C0;?<31>!C?>H.59!
Shoulder Surfing

Bacterium
O26/1>.?7!

'?7A8/1>!'.4.59!
Dumpster Diving

CA;;H.59!
Spoofing

O>;F8.59!
Browsing

M28Q?1>231!
Masquerade

CA277.59!
Spamming

C1Q?15/.2Sequential scan

)?551Tunneling

Software Malfunction
C;H/F2>1!M2
(Q?.A715/!M2Equipment Malfunction

Back Door
O26G!';;>!

!

!4:+%,'(3+4#;&2.%3(1#
Information security
*
*!<2>91!27;?5/!;H!.5H;>72/.;5!.8!>123.<=!242.<[email protected]<1!
*!<2>91!27;?5/!;H!.5H;>72/.;5!.8!>123.<=!242.<[email protected]<1!H;>!25!2//26G1>!/;!?81!/;!62>>=!;?/!2//26G8B!O=!
A!<2>91!27;?5/!;H!.5H;>72/.;5!.8!>123.<=!242.<[email protected]<1!
large amount of information is readily available H;>!25!2//26G1>!/;!?81!/;!62>>=!;?/!2//26G8B!O=!
for an attacker to use to carry out attacks. By
@1.59!
[email protected]<1! t/;!
>16;95.:1! areas
2>128! o;H!
F12G5188! users
?81>8! can
625! proactively
A>;26/.41<=! [email protected]!
7;>1! secure
816?>1! with
F./0!
being able
o recognize
f weakness
e more
.5H;>72/.;5K!/0?8!>13?61!/01!;AA;>/?5./.18!H;>!
2!A;/15/.2B!)01!1R27A<[email protected];>72/.;5K!/0?8!>13?61!/01!;AA;>/?5./.18!H;>!2!A;/15/.2B!)01!1R27A<[email protected], thus reduce the opportunities for a
potential attacker. The examples below show
.5H;>72/.;5!H;?53!;5!/01!.5/1>51/!/02/!F;?<[email protected]!?8
.5H;>72/.;5!H;?53!;5!/01!.5/1>51/!/02/!F;?<[email protected]!?81H?B!&/!.8!Q?./1!128=K!F./0;?/!
1H?B!&/!.8!Q?./1!128=K!F./0;?/!
information found on the Internet that would be useful
to an attacker. It is quite easy, without
G5;F<1391K!/;!.52341>/15/<[email protected]!.5H;>72/.;5!;5!/01!.5/1>51/B!
knowledge, to inadvertently publish secure information on the internet.

CONFIDENTIAL
"#$%&'($)&*+!!
"#$%&'($)&*+!

1

,

elaman e t ) !
IT/Computer
Threat
!")*+,-.(&%#"$%&'(#
-.(&%#"$%&'(#
.(&%#"$%&'(#
!")*+,
!")*+,-

I

Threat
!"#"$%&'(

T

!
Whcia S e r v e r V e r s i o n 2 1

a t whois_tmagnic_net

D a t a b a s e c o n t a i n s O N LY C O M , . N Z I , . T V . C C d o m a i n s .

Index of /!
/ t"#$sswd

Owner C o n t a c t :
G o t t f r i e d Lana

AVM

Name

Schulhausstrasse 2 1

last modified

S

i

z

e

12:55

3

k

Orazy5TWW3oard.cgi 3 1 - J u l - 2 0 0 3

12:55

3

k

iearch.p1

3 1 - J u l - 2 0 0 3

12:55

3

k

WSFTP.LOG

3 1 - J ( l - 2 0 0 3

12:55 3 0 9 k

Description

Oberwil-Lieli, 5955, !"
Parent D i r e c t o r y
Punycode Name: d a t a
Unicode Name: d a t a

3 1

L C
Cc.nt.cqi

Adnrin C o n t a c t
G o t t f r i e d Lana

AVM
oh

Schulhausstrasse 2 1
C h e r w i l - L i e l i 9 3 9 9 , OH
phone: + 4 9 . 5 6 6 4 1 2 0 5 6 0

3 1 - J u l - 2 0 0 3

2
.nf.htm1

iechnical Contact
C-cttfried Lana

atceashog

AVM

3 1

3

1

2

Schulhausstrasse 2 1

admin.db

Oberwil-Lieli, 2399, !"
phone: + 4 9 . 5 6 # 4 1 $ % 5 6

adxninistrators.pid 3 1 - J u l - 2 0 0 3 12:55

1

k

administrators.pwd.i..> 31-Jul-2003 12:55

2

k

12:55

1

k

12:55

1

k

12:55

2

k

12:55

6

k

Zone C o n t a c t
G o t t f r i e d Lana

3

adpassword.txt

1&'

ad.cgi

""@a-v-m.oh
Sohulhausstraase 2 1

amadxnin.ph

Oberwil-Lieli,

1

8966,

!"

phone: + 4 9 5 6 6 4 1 2 0 5 6 0

3

3 1

1
3

1

R
auth u s e r f i l e . s x t

3 1

Record e x p i r e s o n : 2 0 0 5 - 0 4 - 0 9 1 9 : 3 4 : 0 8

authors.pwd

Domain s e r v e r s i n h a t e d o r d e r :

authors-pwd-index 3 1 - J u l - 2 0 0 3

nsl.sedaparking.com 217.160.95.94
ns2.sedcparking.com 2 1 . 1 6 0 . 1 4 1 . 4 2

baok.p

1

5

dash h i s t o r y
dd-hist.sh

/'%01'%&3.%4(5#
Hardware security

3 1 - J u l - 2 0 0 3

3 1
3 1 - J u l - 2 0 0 3

dds f o r u m - c a i

3 1 - J . i 1 - 2 0 0 3

&-!./!0!123324!567.68!-90-!077!:2-64-.07!0--01;/!0<6!50/6=!0<2>4=!<632-6!0116//!04=!46-?2It is a common belief that all potential attacks are based around remote access and networks.
)9./!./!80-9!04=!/236!28!-96!32/)9./!./!80-9!04=!/236!28!-96!32/-!76-907!0--01;/!0<6!1233.--6=!0-!-96!123:>-6This is far from the truth and some of the most!76-907!0--01;/!0<6!1233.--6=!0-!-96!123:>-6lethal attacks are committed at the computer.
A646<077BC!123:>-6<0-.24/!0<6!E6<6!04=!:<2E.=6!60/6!28!>/6!82Generally, computer hardware and configurations are very secure and provide ease of use for
-96!>/6D6!0<60!28!?60;46//!.4!?90-!12>7=!56!0!E6/!/B/[email protected]!!
the user. This is a huge area of weakness in what could be a very security conscious system.
A.E.4D!
04!attacker
0--01;6FG! seconds
/6124=/! o28!
0116//! t-2!
123:>-6104! result
<6/>7-! in
.4! masses
30//6/! o28!
/61><6!
Giving an
f access
o a0! computer
f secure
.482<30-.24!
56.4D!
D0.46=!
?.-92>-!
-96!
>/6;[email protected]!
)9./!
?2>7=!
07/2!
56!
-96!
.=607!
-.36!
.4!
information being gained without the user's knowledge. This would also be the ideal time in
?9.19!-2!:-><6C!32<6!76-907!0--01;/!!
which to prime the machine for future, more lethal attacks
IB!
;42?.4D!how
92?! these
-96/6!attacks
0--01;/!take
-0;6!place
:7016! it
.-! is
./!possible
:2//.576! to
-2! introduce
.4-<2=>16! preventative
:<6E64-0-.E6! action
01-.24! and
04=!
By knowing
/61><6!077!0<60/!28!:2-64-.07!?60;46//@!
secure all areas of potential weakness.
!

CONFIDENTIAL
"#$%&'($)&*+!!
"#$%&'($)&*+!

2

,

e t

IT/Computer
Threat
!")*+,-.(&%#"$%&'(#
-.(&%#"$%&'(#
.(&%#"$%&'(#
!")*+,
!")*+,-

I

!

Threat
!"#"$%&'(

T

!

us ' Attack
456#7(('89#

Keyloggers
/&01+22&%3#
#

!

!

!
:'33;+%2#
Password Cracking

503(&,#?&3(%.8(=+>##
System Destruction

‚ . !"#$%&$k

Load File— L a u n c h S a v e A
! 5!0"#5i-i$!0

1 5 d 1

E

Lt%ass.112 N & ' 1

510 Administratcr
1108 (S)""&
1105 frlti

5 8 1 7 0 1 0

501 5 5 8 0
1108 HeIPAssistant
1010 Paralamas 4 0 0 5 8 8 4
1105 p458

5

3

1

0

0

!

& . 0

4075

0501455

1104 Philippa
1102 !.*'+R,300$451+ 0814505'

5 ! - 8 5 d t i 4 0 5 5854)dfr5'5124.2$J

!

!

!
@&(;+%9#5&8.%=(0#
Network Security
-.!
/01!very
213.! nature
45/631! of
78! networks,
41/973:;8=6>?!communication,
@7AA64>@5/>[email protected]>@5/>74/01.! are
531! generally
B14135==.! an
54! ideal
>?15=! target
/53B1/! 873!
Hy the
for
C7/14/>5=!5//[email protected]:;D!E>/[email protected]@1;;!/7!5!A5;;!78!?12>@1;!837A!741!14/3.!C7>4/potential attacks. With access to a mass of devices from one entry point, an attacker has the
C7/14/>5=!/7!B5>4!>4873A5/>74!837A!A54.!?>881314/!;[email protected];D!
potential to gain information from many different sources.
5>=AA=>2
5>=AA=>2!!
Sniffing
*4!
5//[email protected]:13! is
>;!able
5F=1! sit
;>/! on
74! a5! network
41/973:! without
9>/076/! the
/01! need
411?! t/7!
;079! his
0>;! presence
C31;[email protected]! o78!
[email protected]/>21=.!
An attacker
o show
f actively
5//[email protected]:>4B!
;[email protected]>8>@! machines.
[email protected]>41;D! JG6;/!
;>AC=.! sitting
;>//>4B! o74!
41/973:! and
54?! watching
95/@0>4B! t/01!
attacking specific
u s t bF.!
y simply
n t/01!
h e network
he
>4873A5/>74!
C5;;1?!
53764?>/!
>;!
C7;;>F=1!
/7!
1H/[email protected]/!
;[email protected]!
?5/5!
54?!
>4873A5/>74!
873!
C7;;>F=1!
information passed around, it is possible to extract secure data and information for possible
future attacks
86/631!5//[email protected]:;!

CONFIDENTIAL
"#$%&'($)&*+!!
"#$%&'($)&*+!

-

,

IT Threat

IT/Computer Threat

VoIP Attacks
Voice over Internet Protocol is becoming very popular due to the ease of mass installation and
low cost. It is a very effective means of communication but also a potential hole in secure
system. By sitting on the network, or leaving a small device monitoring the network, an
eavesdropper is able to record all conversations as well as extract usernames and passwords.
By being able to identify this weakness it is possible to provide measures to ensure a system
is safeguarded.

CONFIDENTIAL

4

elaman

IT/Computer
Threat
!")*+,-.(&%#"$%&'(#
-.(&%#"$%&'(#
.(&%#"$%&'(#
!")*+,
!")*+,-

I

!

Threat
!"#"$%&'(

T

#

Wireless security
/0%&1&22#3&4.%0(5#
802.11 networks
to [email protected]!
the
-./011!
23456789!are
:73! now
265!replacing
73;2?! the
[email protected]3!conventional
=62A324>62:947B=4B73C!cabling
=:D<>2?! networks
23456789! due
CB3! 46!
ease of installation and cost effectiveness. Hy providing a wireless network, blanket covering
3:93!6E!>294:<62!:2C!=694!3EE3=4>A323990!FG!;76A>C>2?!:!5>73<399!2345678H!D2?!
an area, there are several security implications involved.
:2!:73:[email protected]!:73!93A37:4G!>I;<>=:4>629!>2A6&4!
>9!not
264!always
:<5:G9!possible
;699>D<3! to
46!prevent
;73A324! the
[email protected]! network
2345678! leaking
<3:8>2?! out
6B4! into
>246! the
[email protected]! public
;BD<>=! domain.
C6I:>20! !HFG!
It is
y 264!
not
8265>[email protected][email protected]!2345678!;73932=3!>9H!>4!>9!264!;699>D<[email protected]@37!>4!>9!;699>D<3!E67!
knowing where the network presence is, it is not possible to know whether it is possible for
:2!:44:=837!46!D3!:D<3!46!:[email protected][email protected]!;BD<>=!C6I:>20!
an attacker to be able to access the network from the public domain.

!
!
-./011!
93=B7>4G! poses
;6939!one
623! of
6E! the
[email protected]! largest
[email protected]:49! for
E67! IT.
&)0!There
)@373! are
:73! several
93A37:93=B7>4G! [email protected]!
802.11 security
methods,
96I3!
I673!secure
93=B73!than
[email protected]:2!others.
[email protected]!Without
J>[email protected]! knowledge
8265<3C?3! it
>4! is
>9! very
A37G! easy
3:9G! to
46! inadvertently
>2:CA374324B93! an
:2!
some more
>293=B73!
[email protected]!With
J>[email protected]!wireless
5>73<399! security
93=B7>4G! being
D3>2?! able
:D<3! to
46! be
D3! broken
D76832! within
5>[email protected]>2! 10
1.! minutes
I>2B439! i>4!
>9!
insecure method.
t is
;699>D<3!E67!:2!3:A39C76;;[email protected]:A3!:!;[email protected]:4!G6B!D3<>3A3!>9!:!93=B73!23456780!!!
possible for an eavesdropper to have a presence on what you believe is a secure network.

!

!:'Wi"##Ws's$sl%m32'md.%&% - i ' ( ' ( k . % & % -X -0 checkpassworitivs

Q

[00:00:02] Tested 2 keys (got 270168 IVs)
)* d e p t h
0 0 / 1
1 0 / 1
2 0 / 1
3 0 / 1
4 0 / 1
5 0 / 1
6 0 / 1
7 0 / 2
8 0 / 1
9 0 / 1
10 0 / 4
11 0 / 1
12 0 / 2

byte(vote)
6 9 ( 61) A2(
6 8 ( 95) *2(
6 5 ( 43) F7(
6 3 ( 98) *l(
6 * ( 58) 6!(
7 0 ( 76) F8(
6 1 ( 75) (
7 3 ( 34) 15(
7 3 ( 87) El(
7 7 ( 99) 9*(
6 F ( 22) 82(
7 2 ( 154) A9(
6 4 ( 30) BF(

12) 08( 1 2 )
15) +*( 13)
8 ) 37( 8 )
15) 19( 12)
12) PE( 12)
12) OE( 8 )
15) 6E( 12)
26) 90( 10)
15) *5( 12)
13) 36( 13)
13) P2( 13)
16) FB( 15)
25) -/( 10)

39( 6 ) FB( 5 )
8A( 5 ) 44( 5 )
1#(( 7 ) 6A( 5 )
cc( 5 ) *,(( 5 )
4P( 9 ) 02( 9 )
8*( 6 ) 17( 5 )
9E( 10) 63( 1 0 )
72( 9 ) A7( 8 )
*3( 10) clE( 10)
0A( 12) 50( 11 )
49( 1 3 ) OE( 10)
73( 1 2 ) 5A( 11 )
48( 1 0 ) 00( 1 0 )

14( 5 )
0A( 5 )
40( 3 )
35( 5 )
!*(( 3 )
58( 5 )
77( 8 )
9A( 6 )
E0( 10)
-6( 10)
1.( 10)
c5( 10)
43( 1 0 )

KEYFOUND! [ 83:88:65:63:0*:70:61:73:73:77:0F:72:64 ] (checkpasseord)
Press CtrI-C to exit.

!

!

CONFIDENTIAL
"#$%&'($)&*+!!
"#$%&'($)&*+!

5

,

elaman
iT ! s " # Course
!"#"*$+#$%&'()#

I

T

!

Course
!"#$%&'()

iT ! s " # COURSE
!"#"*$+#$,-.*/#

The IT ! s " # course is intended to provide participants
with the necessary knowledge to help
)-.!&)!)/"0!12345.!65!678.79.9!82!:42;69.!:<48616:<785!=68-!8-.!7.1.55<4>[email protected][email protected]:!
)-.!&)!)/"0!12345.!65!678.79.9!82!:42;69.!:<
48616:<785!=68-!8-.!7.1.55<4>[email protected][email protected]:!
install countermeasures and proactive procedures within an IT Environment.
6758!
D68-!
B6E834.! of
2F! theory
8-.24>!and
<79!hands-on
-<795G27!practice
:4<1861.!
:4<1861.!
.! the
8-.! participants
:<48616:<785! will
[email protected]@! be
H.! shown
5-2=7! the
8-.! common
12BB27!
With a<88<1?5!67!&)!<79I!6F!:[email protected]!-2=!82!5attacks in IT and, if possible, how to safeguard against them.
!
J>!8-.!.79!2F!8-.!12345.!8-.!:<48616:<[email protected]@!H.!By the end of the course the participants will be able to:
!

• I d&9.786F>!52341.5!2F!8-4.<85!
e n t i f y sources of threats
• I n&79.786F>!8-4.<85!
d e n t i f y threats
• I n&79.786F>!:28.786d e n t i f y potential areas of weakness
L.12A76M.!<8!<79!:42;69.!12378.4B.<534.5!
L.12A76M.!• Recognize
a threat/potential threat
and provide countermeasures

• P eO.4F24B!PQRC,,!568.!534;.>5!
r f o r m 802.11 site surveys
• P eO.4F24B!1565!
r f o r m cable and traffic analysis
• s t/8431834.!5.13468>!:[email protected]!
r u c t u r e security policies
O.4F24B!H<561!:.7.
84<8627!8.5867A!
• P eO.4F24B!H<561!:.7.84<8627!8.5867A!
r f o r m basic penetration
testing
D6792=5!O<55=249!"4<1?67A!
Windows Password Cracking

U261.!#;.4!&O!&78.41.:8627!
Voice Over 'P Interception

(B<[email protected]!/76FF67A!
Email Sniffing

O->561Physical Attacks

O<55=249!/76FF67A!
Password Sniffing

Network Attacks
$.8=24?!*88<1?5!

[email protected]!"4<1?67A!
Wireless Cracking

[email protected]!T<1?67A!
Bluetooth Hacking

Website Defacement
D.H568.!'.F<1.B.78!

[email protected]!O-27.!T<1?67A!
Mobile Phone Hacking

&7F24B<8627!/1Information Scavenging

!

!
0.8-295!
:42<186;.! protection
:428.18627! and
<79!penetration
:.7.84<8627! testing
8.5867A! will
[email protected]@! bH.!
8<3A-8I! including
[email protected]! User
S5.4!
Methods i 67!
n proactive
e taught,
*38-.7861<8627!
0.8-295I!
(714>:8627I!
T<49=<4
T<49=<4.!
.
.!
!
O428.18627!
<5!
[email protected]@!
<5!
:4<1861-<795G27!
Authentication Methods, Encryption, Hardware Protection a s well a s practical hands-on
9.:@2>B.78!2F!8-.!5>58.B5C!
deployment of the systems.
!
)[email protected]<88.4!:<48!2F!8-.!12345.!65!<6B.9!<8!)/"0!O4293185!H.67A!35.9!.FF.186;[email protected]>[email protected]!2F!&)!
The latter part of the course is aimed at $5%& Products being used effectively in the field of IT
!
!

CONFIDENTIAL
"#$%&'($)&*+!!
"#$%&'($)&*+!

1

,

elaman

!

Training
!"#$%$%&
!"#$%$%
&

IP/PABX Manipulation
software
'()(*+,-.#%$/01#2$3%-43526#"7
'()(*+,-.#%$/
'()(*+,-.#%$
/01#2$3%-43526#"7
01#2$3%-43526#"7
RECOMMENDED 30E ! WARE
89:;..9<=9=-4;>!?*89INTRODUCTION
'
Ref.875C875C
1
,!

Model.3D71.3D71
Model 4011-01
T7?08!RS,,AS,

Advance War Dialing Software
*?F3.60!M31!'9389.2!H7>/4310!

2
U!

Model 4011-02
T7?08!RS,,ASU

Netlntercept S200 Appliance
$0/&./0160E/!HUSS!*EE893.60

V!!
V!

Model 4011-03
T7?08!RS,,ASV

*660--'3/3W!J3--471?!G067F015!)778<9/X!
AccessData© Password Recovery ToolkitTM

R4!
R!

Model 401 1-04
T7?08!RS,,ASR

AccessData ® Distributed
Network Attack ®
*660--'3/3Y!'9-/[email protected]=/0?!$0/471*660--'3/3Y!'9
-/[email protected]=/0?!$0/471
5
Z!

Model 4011-05
T7?08!RS,,ASZ

\6!
\!

Model 4011-06
T7?08!RS,,AS\

*660--'3/3Y!G029-/15![90401X!
AccessData® Registry ViewerTM
AccessData® Forensic Toolkit®
*660--'3/3Y!%710.-96!)778<9/Y!

]7!
]!

Model 4011-07
T7?08!RS,,AS]

#
AccessData® Ultimate Toolkit"
Toolkit "#
*660--'3/3Y!O8/9B3/0!)778<9/!X!

=7EF"$/2$3%
Description

!
*-!&./01.0/!23/0435!67./178-!/92:/0.;!:36<01-!310!10/=1.9.2!/7!3.!03-901;!7>/0.!>7127//0.!17=/0!
As Internet gateway controls tighten, hackers are returning to an easier, often forgotten route
into the network unsecured, back-door modems.
9./7!/:0!.0/471
"#J$%!IV$
;+A9:!'B94)7!
9?0./9>5! any
3.5!unauthorized
=.3=/:719D0?!modems
B7?0B-!connected
67..06/0?! to
/7! corporate
671E713/0! systems
-5-/0B-! that
/:3/! provide
E17F9?0! a
3! route
17=/0!
To identify
9./7!
/:0!network
.0/[email protected]! an
3.!attacker.
3//36<01C! To
)7! attempt
3//0BE/! to
/7! break-in
@103/:17=2:! any
3.5! modem
B7?0B! or
71! RAS
G*H! server
-01F01!
into the
=.?0/06/0?C!):9-!9-!36:[email protected]!=-9.2!-7>/4310!/7!?938!/:17=2:!/:0!67BE3.5I-!/080E:7.0!JKL!
undetected. This is achieved by using software to dial through the company's telephone PBX
13.20C!
#.60!systems
-5-/0B-!are
310!identified,
9?0./9>90?;!attempts
3//0BE/-! are
310!
310!
0! made
B3?0! to
/7! breach
@1036:! the
/:0! underlying
=.?01859.2! OS
#H! and
3.?! to
/7!
range. Once
3//0BE/!?0>3=8/!3667=./!E3--471?!8729.-C!
attempt default account password logins.

DESCRIPTION
=94:8'(!';9-!vital
F9/38! to
/7!secure
-06=10! your
57=1! Internet
&./01.0/! perimeter,
E019B0/01;! it's
E019B0/01;!
9/I-! equally
0N=3885! important
9BE71/3./! /7!
-06=10! potential
E7/0./938!
While it9/! is
to secure
@36@3692=10?!B7?0B-!67..06/0?!/7!
?!71!E77185!67.>92=10?!B7?0B-!67..06/0?!/7!
?!71!E77185!67.>92=10?!B7?0B-!67..06/0?!/7!
back-door routes into your network. Unauthorized
or poorly configured modems connected to
57=1!-5-/0B-!67=8?!29F0!3.!3//36<01!?9106/!3660--!/7!57=1!9./01.38!.0/471your systems could give an attacker direct access to your internal network.
!
&.!7=1!0PE0190.60!B7?0B-!310!>[email protected]/400.!,Q!/7!RQ!7>!671E713/0!/080E:7.0!89.0-C!H7!
In our experience modems are found on between 1 % to 4% of corporate telephone lines. So
>71!3!''&!13.20!7>!,;[email protected];!40!0P
>71!3!''&!13.20!7>!,;[email protected];!40!0PE06/!/[email protected]/400.!,S!3.?!RS!B7?0B-C!
E06/!/[email protected]/400.!,S!3.?!RS!B7?0B-C!
for a DDI range of 1,000 numbers, we expect
to see between 10 and 40 modems.
!
G7=/9.085!?0/06/9.2!/:0!E10-0.60!7>!=.3=/:[email protected]!3!E:5-9638!438
!7>>960!
Routinely detecting the presence of unauthorized modems by a physical walk-through of office
-E360!3.?!B3.=38!/080E:7.0!?9389.2!9-!9BE136/9638!>71!B7-/!7123.9D3/97.-C!
space and manual telephone dialing is impractical for most organizations.
!
M31A?9389.2!
-01F960!is
9-!designed
?0-92.0?! to
/7!solve
-78F0! this
/:9-!problem.
[email protected]!Our
#=1! service
-01F960! aims
39B-! to
/7! train
/139.! personnel
E01-7..08! to
/7!
War-dialing service
8763/0!=.3=/:719D0?!B7?0B-!3.?!9?0./9>5!/:0!/5E0!7>!-5-/0B!67..06/0?C!
locate unauthorized modems and identify the type of system connected.
!
%17B!
:010!you
57=!can
63.!attempt
3//0BE/! to
/7!gain
239.!access
3660--! to
/7! the
/:0! corporate
671E713/0! network
.0/471/:17=2:! this
/:9-! point
E79./! or
71!
From here
-9BE85!>832!=E!/:0!B7?0B!/7!/:0!6890./!>7
-9BE85!>832!=E!/:0!B7?0B!/7!/:0!6890./!>71!9.F0-/923/97.!3.?!10B7F0!9/!9>!.060--315C!
1!9.F0-/923/97.!3.?!10B7F0!9/!9>!.060--315C!
simply flag up the modem to the client for1!9.F0-/923/97.!3.?!10B7F0!9/!9>!.060--315C!
investigation and remove it if necessary.

CONFIDENTIAL
"#$%&'($)&*+!!
"#$%&'($)&*+!

1

,

elaman e t ) !
IP/PABX Manipulation
software
'()(*+,-.#%$/01#2$3%-43526#"7
'()(*+,-.#%$/
'()(*+,-.#%$
/01#2$3%-43526#"7
01#2$3%-43526#"7

T

r

a

i

i !"#$%$%
n g
!"#$%$%&

n

!

Test Phases of war dialing setup
"#$%!&'($#$!)*!+(,!-.(/.01!$#%23!
1. Review
your asset register of authorized modems and fax numbers
-.
/01203!4567!8990:!70;29:[email protected][email protected]!8A?!<[email protected]!!
2. sDE8A!4567!:0F0G=5A0!HIJ!78A;0!!
c a n your telephone PBX range
,.
which numbers respond with an electronic tone
K!. Record
K.
/[email protected]!709G5A?!32:=!8A!0F0E:75A2E!:5A0!!
4. Identify
which of these are fax numbers and remove
L.
&?0A:2<4!3=2E=!55. T)[email protected];!90:!E8A!G5:0A:[email protected][email protected]!57!/*D!9071079!E5AA0E:0?!:[email protected]:07!
h e remaining set can potentially be modems or RAS servers connected to computer
M.
949:[email protected]!!
systems
6. A*::[email protected]:!:5!E5AA0E:!:[email protected][email protected]!8A?!;[email protected][email protected]!O!949:[email protected]!C8AA079!!
t t e m p t to connect to each modem and grab modem & system banners
N.
P.
/09087E=!'signature'
Q92;A8:670R! o5949:[email protected]!
949:[email protected]! on
5A! Internet
&A:07A0:! search
9087E=! engines
0A;2A09! t:5!
900! i2:=0! system,
7. Research
f system
o see
f the
G75?6E:[email protected]!8A?!?0<86F:!8EE56A:9!E8A!C0!2?0A:2<20?!!
product manual and default accounts can be identified
T.
*::[email protected]:[email protected]@5AU?0<86F:!8EE56A:!G899357?9!!
8. A*::[email protected]:[email protected]@5AU?0<86F:!
t t e m p t common/default 8EE56A:!G899357?9!!
account passwords
/[email protected]!:=8:!870!E5A:2A68FF4!QC694R!?672A;!:=0!:09:!G0725?!<57!2A109:2;8:25A!!
V.
/[email protected]!:=8:!870!E5A:2A68FF4!QC694R!
?672A;!:=0!:09:!G0725?
9. Record
numbers that are continually 'busy' ?672A;!:=0!:09:!G0725?!<57!2A109:2;8:25A!!
during the test period!<57!2A109:2;8:25A!!
for investigation
!

SOFTWARE MANIPULATIONS
489!:*;?*!'[email protected]$%AB-35-C#%$/01#2$3%BKinds of manipulations
W8A2G6F8:[email protected]!5-.
W8A2G6F8:[email protected]!51. Manipulation
and misuse of regular features!X0.;.!=8A?9Y<700!8A9307!C8EZ!57![127:68F\!
(e.g. hands-free answer back or "virtual"
E5A<070AE2A;]!
conferencing)
,.
*E:218:25A! o5=2??0A!features
<08:6709! (e.g.
X0.;.! witness
32:A099! function,
<6AE:25AS! service
90712E0! observing
5C90712A;! o57!
[F83<6F\!
2. Activation
f hidden
r "lawful"
2A:07E0G:25A]!
interception)
K!.. Adding
K.
*??2A;!A03!90Fnew self-created features (own programs) to the PBX
!
D I S - PA S S W ;
" 5 0 0 : # $ % p A S S W s TART E

I&L'#
+

incom

I

s

I NAME

I

An'mon'ZA''ONS I ' ( # ' 7 s
111111
I
I

I 1543210R8760402101
1I
--.---/(-.I

'

) * ' I ) N
I I I I I I

I
I

l L + l & l ( I , ' I I ' l 1 I
i

x

x

x

x

x

I

R E - I
I
I TPIE5 I TIME

I
9 9

(mitt)
)

I

2 ( L 0 % % '

display cox 1

Page
CLASSO F

1

of

RESTRICTION

CON. N u m b e r : 1
COR D e s c r i p t i o n ! f l ' ' 2 + # ' ( ) N # L

6

APIZF? !

Can B e S e r v i c e O b s e r v e d ? 3 C a l l i n g P a r t y R e s t r i c t i o n ! n o n e
'an B e A S e r v i c e O b s e r v e r ?
C a l l e d
Party Restriction:n o n e
1 F o r c e d E n t r y o f A c c o u n t Codes? tj
PriorityQueuinq?4
D i r e c t
Agent Calling? n

CONFIDENTIAL
"#$%&'($)&*+!!
"#$%&'($)&*+!

2

,

e t

!

4011-01
!"##$"#

software Description
2(1&3
(1&3
%&'()*+,-.,/0+12(1&3
%&'()*+,-.,/0+1
%&'()*+,-.,/0+12
MODEL 4011-01 - ADVANCE WAR DIALING SOFTWARE
45.67-!"##$"#-$-8.98:;6-<8=-.>87>:?-%[email protected]<8=6-

CASCAN is an on 5 D N
-*."*$!/0!12!32!&.'$451067!'/1869!:;1:!<060!:;6!=19!7/1869!>9/2?/>86!:3!?188!>;326!2The call results are analyzed to identify the remote devices.
);6!?188!960<8:0!196!1218BC67!:3!/762:/DB!:;[email protected]:6!76E/?60A!!
!

CASCAN aHows you to:
-*."*[email protected]!security
06?<9/:B! audits
1<7/:0! t:3!
/762:/DB! vulnerabilities
E<826915/8/:/60! o3D!
E<826915/8/:/60!
6I:69218!!H.)$!
62:9B! points
>3/2:0! like
8/J6!
• Perform
o identify
f external
5 " N entry
[email protected]!
%1IL!PCs,
H"0L!Router,
[email protected]:6!Access
*??600! systems,
.B0:[email protected]! any
12B! ISDN
&.'$!application
1>>8/?1:/32! and
127! Unified
N2/D/67!
Modems, Fax,
K6001O/2O!.B0:[email protected]!!
Messaging systems
*• Automate
the revision of your PBX configuration and devices
";6?J!:;6!/@>[email protected]:1:/32!3D!B3<9!3";6?J!:;6!/@>[email protected]:1:/32!3D!B3<9!37!HPQ!127!:[email protected]@<2/?1:/32!/2D910:97!HPQ!127!:[email protected]@<2/?1:/32!/2D910:9• Check
the implementation of your outsourced
PBX and telecommunication infrastructure
'3?'3?:9• Document
your telecommunication infrastructure
for your facility management
#>:/@/C6!B3<9!:[email protected]@<2/?1:/32!/2D910:9• Optimize
your telecommunication infrastructure
./@<81:6!;61EB!8317!D39!R<18/:B!?;6?J0!3D!B3<9!069E/?60!127!>937• Simulate
heavy load for duality checks of your services and products

SPECIAL FEATURES
%B6;>[email protected]=6%+610:!"30:!M3• Least
Cost Routing
.<>>39:!D39!<0/2O!HPQ!0F/:?;/2O!:6?;2383OB!
• support
for using PBX switching technology

• Hides
caller #
S/760!?18869!&'!
• A*[email protected]:6!?32:938!/0!>300/586!5B!<0/[email protected]:6!*??600!?1>15/8/:/60!3D!:;6!3>691:/2O!0B0:[email protected]!
remote control is Possible by using Remote Access capabilities of the operating system
H"&!o39!
H"K"&*! CASCAN
-*."*$!adapter
171>:69! is
/0! included,
/2?8<767L! that
:;1:! supports
0<>>39:0! one
326! ISDN
&.'$! '
PM&!
8/26! F/:;!
• O#26!
n e PCI
r !$%$&
RI line
with
two (-)hann*s.
:F3!54?;122680A!!
!

I
P8K, e•g.
HiPathlHicom

Telephone
Devices

41)01

!" nt ote -

I$DN
board
#$
with

n

WAML%&'i

CONFIDENTIAL
"#$%&'($)&*+!!
"#$%&'($)&*+!

!
,

ldmd(

!

4011-02
!"##$"%

software Description
3)2'4
)2'4
&'()*+,-./-01,23)2'4
&'()*+,-./-01,2
&'()*+,-./-01,23
MODEL 4011-02 - NETINTERCEPT ! 200 APPLIANCE
56/78.!"##$"%.9.:7;7?;.&%""[email protected]??87.
Capture, Analyze and Discover the Network Traffic Driving Your Business.
"-./0123!*4-5672!-48!'9:;<=21!/>2!$2/?<[email protected]!)1-AA9;!'19=94B!C<01!D0:942::E!!
Detailed Information about the system can be found in the separate document
'2/-9528!&4A<1F-/9<4!-G<0/!/>2!:6:/2F!;-4!G2!A<048!94!/>2!:2.-1-/2!8!
)>2!H,II!-..59-4;2!104494B!$2/&4/21;2./!JEIE,!94;5082:!!
The 5200 appliance running Netlntercept 3.0.2 includes

• 1K!&4/25!LM!,EM!NO7!"LP!!
Intel ! 42.4G " z #! U
• 1KND!''Q,RR!SO7!H'Q*S!!
G B DDR266 MHz SDR$%
• 11
0 / 1 0 0 M B Ethernet Network Interface
K!KITKII!SD!(/>2142/!$2/?<[email protected]!&4/21A-;2!!
• 1K!KITKII!SD!(/>2142/!$2/?<[email protected]!&4/21A-;2!"-18!!
10/100 %& Ethernet Network Interface Card
• 250GB
5$'$!1 50 7200 RPM drive, 8MB Cache
,UIND!H*)*TKUI!V,II!QLS!819=23!WSD!"-;>2!!
,IIND!0:-G52!G6!$2/&4/21;2./!!
• 200GB
usable by Netlntercept

• 2,P!Q-;@!F<04/!"-:2!!
U Rack mount Case
• 52x24x52
CDRW
U,X,MXU,!"'QY!!
!
)>9:!.This position includes one year of software support and updates.
'02!/2!:24:9/9=2!4-/012!
9:!:!>9:!;<4/-;/!8-/-!802!
Due to the sensitive nature of this software we require an end user with his contact data due
/to export legislation, license and support issues.

OVERVIEW
6A7=A<7B.

S42/?<[email protected]!monitoring
F<49/<194B!tools
/<<5:!cannot
;-44! provide
.1<=982!all
-55! the
-55!/>2!
/>2! information
94A<1F-/9<4! that
/>-/! :2;019/6!
Most network
security .1professionals,
&)!
F-4-B21:3!network
42/?<[email protected]! administrators,
-8F949:/1-/<1:3!auditors,
-089/<1:3! software
-089/<1:3!
:82=25-48! analysts
-4-56:/:! need
4228! t/IT managers,
o
@4)>2!only
<456! way
?-6! to
/19;>56! and
-48!completely
;@4! how
>! your
6<01! network
42/?<[email protected]! is
9:! being
G294B! used
0:28! is
9:! to
/know. The
;-./012!/>2!8-/-!.-;@2/:!-48!-4-5672!/>2F!94!82/-95E!
capture the data packets and analyze them in detail.
!
$2/?<[email protected]!
;<4:05/-4/:! know
@4! the
/>2!value
=-502! of
/>9:!information,
94A<1F-/9<43!even
2=24! when
?>24! it
9/! comes
;?9/>! a-! high
>9B>!
Network consultants
F-4.21!
;)>26! will
?955!run
104! a-! packet
.-;@2/! sniffer
H49AA21! like
[email protected]! TCPdump
)"L80F.! to
/;-./012! raw
1-?! 42/?<[email protected]!
/1-AA9;!
manpower cost.
network traffic
94/24!94:.2;/!/>2!8-/-!?9/>!.19:!69258:!<456!-!G192A!-48!
into disk files, and then inspect the data with programs like strings. This yields only a brief and
;<4A0:94B!
B59F.:2! into
94//1-AA9;! data
8-/-!—
[! and
-48! i 9/!
F-40-556! intensive
94/24:9=2! and
-48! massively
F-::9=256! time/9F2\
confusing glimpse
t i9:!
s manually
;<4:0F94BE!$()&$)(Q"(L)!]$&^!9:!-!42/?<[email protected]!F<49/<194B!-48!-4-56:9:!:6:/2FE!
consuming. NETINTERCEPT (NI) is a network monitoring and analysis system.
!

CONFIDENTIAL
"#$%&'($)&*+!!
"#$%&'($)&*+!

2

,

elaman

!

4011-02
!"##$"%

software Description
3)2'4
)2'4
&'()*+,-./-01,23)2'4
&'()*+,-./-01,2
&'()*+,-./-01,23

NETINTERCEPT is delivered as a complete system,=!>/;?!?651>[email protected]!08A;>652!:52B/@0;63321=!
with hardware and software pre-installed,
$()&$)(-"(.)!/0!123/42521!60!6!789:32;2!0<0;29=!>/;?!?651>[email protected]!08A;>652!:52B/@0;63321=!
$()&$)(-"(.)!/0!123/42521!60!6!789:32;2!0<0;29
=!>/;?!?651>[email protected]!08A;>652!:52B/@0;63321=!
ready to
the firewall
5261;8!be
C2!placed
:36721!in
/@!a6!machine
967?/@2! room
5889! or
85! NOC
$#"!and
[email protected]!plugged
:3DEE21! into
/@;8! the
;?2! network
@2;>85F! at
6;! ;?2!
A/52>633!
border.
C85125G!
To use
o configuration
s
)8!
D02!NETINTERCEPT,
$()&$)(-"(.)=! an
[email protected]! IT
&)! manager
[email protected]! simply
0/9:30/9:3;?2! system;
0<0;29H! [email protected]!
[email protected]/ED56;/[email protected]! i/0!
[email protected]@27;0! the
required to monitor and analyze traffic from the system's console. Unlike Intrusion Detection
52ID/521!;[email protected]/;[email protected][email protected] (lD5s),
t doesn't
t
M<0;290!
N&'M0O=! i/;!
[email protected];! actively
67;/423388F! at
6;! traffic
;56AA/7!
;56AA/7!
7! and
[email protected]! report
52:85;! events
[email protected];0! in
/@! real-time.
5263B;/92G! Instead,
&@0;261=! i/;!
records all traffic on the hard drive, writing over!;?2!83120;!/@A8596;/[email protected]!>[email protected]!;?2!0;856E2!3/9/;!
the oldest information when the storage limit
5278510!633!;56AA/[email protected]!;?2!?651!15/42=!>5/;/@E!8425
5278510!633!;56AA/[email protected]!;?2!?651!15/42=!>5/;/@E!8425!;?2!83120;!/@A8596;/[email protected]!>[email protected]!;?2!0;856E2!3/9/;!
is reached. Thus, traffic from the last several hours, days, or weeks (depending on the size of
/0!5267?21G!)?D0=!;56AA/7!A589!;?2!360;!0242563!?8D50=!16<0=!85!>22F0!N12:[email protected]/@[email protected]!;?2!0/J2!8A!
<8D5!
$()&$)(-"(.)! configuration
[email protected]/ED56;/[email protected]! and
[email protected]!average
64256E2! bandwidth)
[email protected]>/1;?O! is
[email protected]>/1;?O!
/0! available
646/36C32! for
A85! study.
0;D1)56AA/7! is
/0!
your NETINTERCEPT
02327;21!4/6!;?2!D025!/@;[email protected]!;[email protected][email protected]!C2E/@!6!
selected via the user interface, and then analyzed in batch mode. A typical user would begin a
C6;[email protected]<0/0P!
batch analysis:
• A*A;[email protected];/7/@E!6!;56AA/7!:26F!
f t e r noticing a traffic peak
[email protected][email protected];!>[email protected]@;!0<0;29!
• Because
an event was logged by a network management system

• A*A;25!5272/4/@[email protected][email protected]!&'M=!85!
f t e r receiving an alarm from an 1D5, or
• A*0!6!7852!:65;[email protected] a core part of any overall security monitoring strategy
!
*A;25!
[email protected]!analysis,
[email protected]<0/0=!all
633!network
@2;>85F! traffic
;56AA/7! in
/@! the
;?2!selected
02327;21!interval
/@;25463! becomes
C278920! available
646/36C32! t;8!
0<0;29!
After an
o system
619/@/0;56;850!
;?58DE?! an
[email protected]!easy-to-use
260E56:?/763
D025! interface
/@;25A672! (GUI)
NRL&O! and
[email protected]! printed
:5/@;21! reports.
52:85;0G!
E56:?/763!! user
administrators through
$()&$)(-"(.)[email protected]!C2!D021!2/;?25!0:65/@[email protected];!6325;0O=!
$()&$)(-"(.)[email protected]!C2!D021!2/;?25!0:65/@E387760/[email protected]!?63AB?8D5!;8!524/2>[email protected];!6325;0O=!
NETINTERCEPT can be used either sparingly (an occasional
half-hour to review recent alerts),
85!
[email protected];/@D8D03N60! part
:65;! o8A!
AD33B07632! effort
2AA85;! t;8!
8:;/9/J2! network
@2;>85F! infrastructure,
/@A560;5D7;D52=! monitor
[email protected]/;85!
or continuously
f a6!full-scale
o optimize
@2;>85F!D06E2=!85!0;D1network usage, or study an attempted break-in). NETINTERCEPT lets users:
M;D1• Study
an external break-in attempt
[email protected]/;85!785520:[email protected]@[email protected]!>6;[email protected]/[email protected];/63!16;6!C2/@[email protected];!8D;>6510!
• Monitor
correspondence and watch for confidential data being sent outwards
'/0:362C!0200/[email protected]!
• Display
the contents of a remote login or a web session

• BQ2!6>[email protected]!85!:8;[email protected];/63385F!
e aware of unusual or potentially troublesome traffic on the network
[email protected]/32!;?2!5236;/[email protected]?/:0!C2;>[email protected]!?80;@[email protected]!&.!611520020!/@[email protected];>85F!;56AA/7!
• Reconcile
the relationships between hostnames and 'P addresses in network traffic

• UL02!;?2!RL&!;8!/@;2567;/423!;56AA/7!76;2E85/J21!85!085;21!Cs e the GUI to interactively view traffic categorized or sorted by dozens of attributes, such
60!;/92!8A!16<[email protected]=!73/[email protected];[email protected]!025425!967?/@2!/[email protected];/;/20=!85!0200/[email protected]!0/J2!
as time of day, username, client and server machine identities, or session size
M2327;!connections
[email protected]@27;/[email protected]! of
8A! interest
/@;2520;! by
C75/;25/6=!such
0D7?! as
60! keywords
F2<>8510! found
[email protected]! in
/@! e-mail
2B96/3! header
?26125! A/2310=!
• Select
fields,
(;[email protected];!
611520020=!TCP
)".! or
85! UDP
L'.! port
:85;! numbers,
@D9C250=! file
A/32! names,
@6920=! and
[email protected]! Web
U2C! Uniform
[email protected]/A859! Resource
-208D572!
Ethernet addresses,
&[email protected];/A/250!NL-+0O!
Identifiers (URLs)

How NETINTERCEPT woRks
567.89:;8:9<=9>:.76&.
$()&$)(-"(.)!/0!120/[email protected]!;8!>85F!/@!;?522!96V85!0;2:0P!
NETINTERCEPT is designed to work in three major steps:
#@.=+3)A,-.8-)*',B.:,+((21.
1. Capture Network Traffic
.67F2;0!are
652!automatically
6D;896;/763376:;D521! from
A589! a6! 1WXYWXXYWXXX!
Q602)! LAN
+*$! or
85! compatible
789:6;/C32! packet
:67F2;!
• Packets
0/1 00/1 000 BaseT
[email protected]/;85/@E!:85;[email protected]!6!?/E?!B0:221!0>/;7?!
monitoring port on a high -speed switch
.67F2;0!652!0;[email protected]!$()&$)(-"(.)K0!?651!1/0F!/@!)".1D9:BA8596;!A/320G!*[email protected]>!16;6!/0!
.67F2;0!652!0;[email protected]!$()&$)(-"(.)K0!?651!1/0F
• Packets
are stored on NETINTERCEPT's hard disk!/@!)".1D9:BA8596;!A/320G!*[email protected]>!16;6!/0!
in T C P d u m p
76:;D521=!/;!52:36720!83125!16;[email protected]!6!A/50;B/@=!A/50;B8D;!C60/0!
captured, it replaces older data on a first-in, first-out basis

CONFIDENTIAL
"#$%&'($)&*+!!
"#$%&'($)&*+!

!

,

elaman

!

4011-02
!"##$"%

software Description
3)2'4
)2'4
&'()*+,-./-01,23)2'4
&'()*+,-./-01,2
&'()*+,-./-01,23
2. Analyze Network Traffic
%5.64+789-.:-)*',;.
• T)-.!/0.1!0.2.340!5!467.!684.1952!:;!684.1.0404.7!?1:4.340!=545!;1:7!4-54!684.1952!
h e user selects a time interval of interest, and the system protects data from that interval
from being overwritten by new data
;1:[email protected]!:[email protected]>!8.B!=545!
• Packets
from the time interval are reassembled into
individual data streams (sequences of
C53D.40!;1:[email protected]=!
C53D.40!;1:[email protected]=!684:!68=696=/52!=545!041.570!E0.F/.83.0!:;!
684:!68=696=/52!=545!041.570!E0.F/.83.0!:;!
related packets) and saved to disk
1.254.=!?53D.40G!58=!059.=!4:!=60D!
• Each
data stream is passed through the NETINTERCEPT
analysis engine, which attempts to
(53-!=545!041.57!60!?500.=!4-1:/A-!4-.!$()&
(53-!=545!041.57!60!?500.=!4-1:/A-!4-.!$()&$)(H"(C)!5852>060!.8A68.$)(H"(C)!5852>060!.8A68.recognize the protocols and content using a hierarchical
set of parse modules. The parsing
1.3:A86I.!4-.!?1:4:3:20!58=!3:84.84!/068A!5!-6.1
1.3:A86I.!4-.!?1:4:3:20!58=!3:84.84!/068A!5!-6.1513-6352!0.4!:;!?510.!7:=/2.0J!)-.!?51068A!
513-6352!0.4!:;!?510.!7:=/2.0J!)-.!?51068A!
?1:3.00!
522:B0!NETINTERCEPT
$()&$)(H"(C)! t4:!
=.4.34! spoofing
0?::;68A! [email protected]>!
0?::;68A!
684.1?1.468A! the
4-.! content
3:84.84! o
:;!
=545!
process allows
o detect
y interpreting
f data
041.570!:8!?53D.4!-.5=.10!58=!?:14!8/[email protected]!
streams, rather than making a guess based solely on packet headers and port numbers
$()&$)(H"(C)! extracts
.K415340! search
0.513-! criteria
3164.165! s0:!
4-.! user
4-.!
/0.1! can
358! readily
1.5=62>! find
;68=! specific
0?.36;63! network
8.4B:1D!
• NETINTERCEPT
o the
415805346:80J!)-.!?510.!1.0/240!58=!5852>060!3:832/06:80!51.!04:[email protected]!
transactions. The parse results and analysis conclusions are stored in a database
=5./+)+./201'>-,8.
3. Data Discovery
[email protected]:B0.!684.153469.2>!4-1:/A-!$()&$)
[email protected]:B0.!684.153469.2>!4-1:/A-!$()&$)(H"(C)M0!1.0/[email protected]!/068A!4-.!NL&!
(H"(C)M0!1.0/[email protected]!/068A!4-.!NL&!
• Users
can browse interactively through NETINTERCEPT's
results database using the GUI
L0.10! can
358!instruct
68041/34!NETINTERCEPT
$()&$)(H"(C)! t4:!
A.8.154.! a5! variety
9516.4>! o:;!
=.4562.=! reports
1.?:140! from
;1:7! the
4-.!
• Users
o generate
f detailed
current database
3/[email protected]!!

CAPTURING NETWORK TRAFFIC
[email protected]$()&$)(H"(C)!
35?4/1.0! network
8.4B:1D! traffic
415;;63! using
/068A! a5! modified
7:=6;6.=! UNIX
L$&O! kernel
D.18.2! and
58=! a5! standard
0458=51=!
NETINTERCEPT captures
(4-.18.4!
684.1;53.!card
351=!placed
?253.=!in
68!intercept
684.13.?4! mode.
7:=.J!The
)-.! capture
35?4/1.! subsystem
0/@0>04.7! runs
1/80! continuously,
3:8468/:/02>Ethernet interface
1.A51=2.00!
:;! whether
B-.4-.1! the
4-.!GUI
NL&!is
60!active.
53469.J!Tests
).040! by
).040!
@>! sandstorm
P58=04:17! have
-59.! demonstrated
=.7:804154.=! a
5! 99.9%
QQJQR!
regardless of
35?4/1.!154.!:8!5!;/22>S2:5=.=!TUUV50.S)!8.4B:1D
35?4/1.!154.!:8!5!;/22>S2:5=.=!TUUV50.S)!8.4B:1DS2:5=.=!
S2:5=.=!
capture rate on a fully-loaded lOOBase-T network,S2:5=.=!
and 99.99% capture rate on a lightly-loaded
network.
8.4B:1DJ!
+:8A!4.17!513-6952!04:15A.!:;!35?4/1.=!=545!68
+:8A!4.17!513-6952!04:15A.!:;!35?4/1.=!=545!68!$()&$)(H"(C)!60!533:[email protected]>!04:168A!4-.!
Long term archival storage of captured data in !$()&$)(H"(C)!60!533:[email protected]>!04:168A!4-.!
NETINTERCEPT is accomplished by storing the
15B!
=/7?!files.
;62.0J!The
)-.!archived
513-69.=!dump
=/7?! file
;62.! can
358! be
@.! written
B1644.8! directly
=61.342>! 4:!
5! removable
1.7:[email protected]! media
7.=65! device
=.963.!
raw dump
to a
attached to the NETINTERCEPT machine, or transferred
over the network to other machines
54453-.=!4:!4-.!$()&$)(H"(C)!753-68.54453-.=!4:!4-.!$()&$)(H"(C)!753-68.80;.11.=!:9.1!4-.!8.4B:1D!4:!:4-.1!753-68.0!
;:1!513-6968AJ!V.35/0.!4-.!;62.!;:1754!60!3:7?54
;:1!513-6968AJ!V.35/0.!4-.!;62.!;:1754!60!3:[email protected]!B64-!4-.!L86K!)"C=/7?!/46264>[email protected]!B64-!4-.!L86K!)"C=/7?!/46264>for archiving. Because the file format is compatible
with the Unix TCPdump utility, dump files
35?4/1.=!
@>!NETINTERCEPT
$()&$)(H"(C)! can
358! be
@.! transferred
41580;.11.=! to
4:! other
:4-.1! computers
3:7?/4.10! and
58=! analyzed
5852>I.=! with
B64-! other
:4-.1!
captured by
4::20tools, if desired.

mum

b

! I. "a,dra#L $%&' ‚ ‚ ‚ 14115

11.*

e k

X

&

(!!' Rename Ay d i n . NieteW a n t

!"#
"1zwm
1#zwm$

+

Ended ) I
- :

W o g . N

e

w

t

R.'• t

W,f ‚-!?

k

;
V

-.I I

Tract 1 J (

L I

(.'. '_',

End / ) - ' ) . 11149 :n 0 " I Z ( J((0tI 5949 m a r 1 I F I C Y

!Ii

!

CONFIDENTIAL
"#$%&'($)&*+!!
"#$%&'($)&*+!

4

,

ldmd!

!

4011-02
!"##$"%

software Description
3)2'4
)2'4
&'()*+,-./-01,23)2'4
&'()*+,-./-01,2
&'()*+,-./-01,23
ANALYZING NETWORK TRAFFIC
565789:6;.6<=>[email protected][email protected]:C.

NETINTERCEPT performs
selects a
$()&$)(-"(.)!
/0123145!stream
561074!reconstruction
10839561:86;39! on
10839561:86;39!
39!demand.
<0479<=! When
>?09! the
6?0! user
:501! [email protected]!
7! range
179A0!
of captured network traffic to analyze, NETINTERCEPT
assembles those packets into multiple
32!87/6:1032!87/6:10-"(.)[email protected]!6?350!/78C065!;963!4:@6;/@0!
streams. NETINTERCEPT
5610745=!
$()&$)(-"(.)!can
879!identify
;<096;2D! over
3H01! 85
I,! types
6D/05! of
6D/05!
32! data
<767! streams,
5610745F! including
;[email protected]:%).F! HTML,
J)K+F!
telnet, e-mail
i t h attachments,
r d , Excel,
nd
<38:40965! (including
M;[email protected]:>31([email protected]! [email protected]!
0L47;@! wB;6?!
76678?40965F! Microsoft
K;8135326! documents
K;8135326!
PowerPoint), and
.3B01.3;96OF!
7990560<767!such
5:8?! as
75! images
;47A05! or
31! documents
<38:40965! inside
;95;<0! TAR
)*-! files.
2;@05=! Because
P087:50! the
6?0!
/71501!
:505!a7!nested
90560?;01718?D! of
32! modules
43Q! each
078?!specialized
5/08;[email protected];E063! parse
/7150! a
7! type
6D/0! of
32! data
<767!—
Q! 6?0!
parser uses
the
718?;6086:10!;[email protected]!79718?;6086:10!;[email protected]!79;[email protected]=!)?0!10839561:860architecture is very clean and easily extensible.
The reconstructed TCP and UDP streams are
then presented to the NETINTERCEPT analysis
subsystem for identification.
6?09!/10509606?09!/[email protected];5!5:G5D5604!231!;<096;2;876;39=!
)[email protected];5!43The analysis modules are arranged in a tree structure. Each module specializes in a particular
/[email protected]!
7947D! pass
/755!portions
/316;395! o32!
6?0! data
<767! stream
561074! both
G36?! to
63! child
8?;@43231! lower-level
@[email protected]@!
protocol, and
f the
[email protected];5!
79G78C! to
63! parent
/71096! modules
43;9! the
6?0! case
8750! o32!
834/10550/78C7A00981D/60analysis and
f compressed,
r encrypted
8396096=!K38396096=!K381;601;7!31!231!5676;56;[email protected]!/:1/3505!0N61786!79content. Modules that find data useful as search criteria
or for statistical purposes extract and
store that information in an 801_ database.
56310!6?76!;9231476;39!;9!79!ST+!<767G750=!
!
%;@[email protected];C0!
3GU0865! (web
MB0G! pages,
/7A05F!e-mail
0L47;@! attachments,
76678?40965F! etc.)
76678?40965F!
068=O! encountered
0983:96010879! also
[email protected]! be
G0! stored.
56310<=! A
*!
File-like objects
/3;9601!63!6?0!3GU086!79pointer to the object and a unique code generated from an MD5 hash of the object are stored
;9!
6?0!NETINTERCEPT
$()&$)(-"(.)! SOL
ST+!database,
<767G750F! while
B?;@0! the
6?0! object
3GU086! itself
;[email protected]! is
;5! stored
5631063! the
6?0! hard
?71PD!
in the
:9;V:0! object
3GU086! only
[email protected]! once,
3980F! thereby
6?010GD! saving
57H;9A! disk
5631;9A!
/3;96015F!NETINTERCEPT
$()&$)(-"(.)! saves
57H05! each
078?! unique
storing pointers,
5/780=!!
space.
!
‚ N l"4.,-i,.,'i.'I J O - s d 4 1 0 3 1 3 1 - d

I ' i l ' t .

File F o r e n l i c i V i e w Wi#it$n H e l c

%
5
&
Open & n a m e Analyze Deleio

]

'
.
'
I m p o r t E..port ) # i

(

Q
8o%m"d $chNduIO W i 1 ? r 1 111It


nail%S u i n n a t y F o r e n s i c s I AierIs 1 V i*w.. ] / e p o i t i ] 0 $ # i 1 i 0 u "
Sea
SRC 1 P
? d"'uI111.3n.0l*i
6 dfluII1?.*'n.t*i

—J
F
F
F

47431 O n s e e i t a s y s . g t e l F T P store Unique
Lint

1

12.33.56.1 :1
: a 4 * . d 7 $ w. 8 % 9 H T T P
12.43.230,97 c o . O a ; n . % m < 1 1 =
12A 0.1 20.9 d n e l .haspro.s ern - I 1 1 =
12.40 120 10• w w hanSro corn H T T P
124012(111 s i n s 2 h,n"; eon < 2 ' i ?
124012019
>
2
2
=
. 1 7 4 7 40.250 maillfric.com T F T P

Poet
Head
Delete
Trace
Conned
i:i?b"
Gel

Query. s a n e

Inn

Ion']

'[ML

l

9

2

0

-

i
i"#$
d%&t
1

Ii
MI

j

F
F

12.3
12.3196.125 wnw. 89i6%W.8%m H i

3.1
1.1 1247.11
1.17.250.5
1.21.3.3
121.110 3.5
172,13011
124.2070
12420 150

[mass

c a m e m DAIG

!

4 1 5t"l*'
F T P Siure

1 7
12.3 156.15 n * 1 .c Uuow.core F T P

trnn

IN

ai

1

=

nelele 1 Cc,iumri

! L

!

BROWSING AND DISCOVERING
[email protected]?>&:6;.56/./:&C?E$()&$)(-"(.)!
563105! a7! permanent
/01479096! record
[email protected]@! data
<767! traffic
61722;8! and
796?0! conclusions
[email protected]:5;395! o32!
;65!
NETINTERCEPT stores
f all
f its
[email protected];5F!
B;6?!links
@;9C5! to
63!supporting
5://316;9A!information.
;9231476;39=
)?0!NETINTERCEPT
$()&$)(-"(.)! GUI
WR&!displays
;9231476;39!
;9231476;39=!!The
analysis, with
56310;9!this
6?;5!results
105:@65!database.
<767G750=!The
)?0! GUI
WR&!can
879! bG0!
:500;6?01! via
H;7! the
6?0! system
5D5604! console,
[email protected]! o31!
stored in
e used
r
[email protected]!3H01!7!508:10F!0981D/60;9<3B5!8399086;39!63!7!remotely over a secure, encrypted X Windows connection to a display elsewhere.

CONFIDENTIAL
"#$%&'($)&*+!!
"#$%&'($)&*+!

5

,

e t

!

4011-02
!"##$"%

software Description
3)2'4
)2'4
&'()*+,-./-01,23)2'4
&'()*+,-./-01,2
&'()*+,-./-01,23

• M!"#$%$'()
a i n Window.-!)./0!1/2341!54267/20!6780!64!79941!6.:!;0:>7!/[email protected]<>76/42!
This window contains tabs to aHow the user to view summary information
!"#$%$'()-!)./0!1/2341!54267/20!6780!64!79941!6.:!;0:>7!/[email protected]<>76/42!
from
the
overall
packet stream, then drill down for detail on the connection session
@<4>!6.:!4=:<799!A75B:6!06C!6.:[email protected]• Traffic
Tab.-!D.410!72!/26:<756/=:!3/[email protected]!2:614:!4=::!
shows an Interactive display of network traffic volume over time
*+",,#-%*".-!D.410!72!/26:<756/=:!3/[email protected]!2:614:!4=::!
*+",,#-%*".
-!D.410!72!/26:<756/=:!3/[email protected]!2:614:!4=::!
• s/011"+2%
u m m a r y Tab.
*".-!
D.410! a7!big-picture
8/EFA/56;4=:<=/:1! and
723! summary
0;>>7! statistics
0676/06/50! for
@46.:! current
5;<*".-!Shows
database
3767870:!
• Forensics
Tab.-!*99410!0:9:56/[email protected]<4>!9/[email protected]!56:7!0;5.!70!5426:26!6?A:!4:H!
Allows selection (from lists of criteria such as content type or username)
3(+4$5#-5%*".-!*99410!0:9:56/[email protected]<4>!9/[email protected]!56:7!0;5.!70!5426:26!6?A:!4:H!
3(+4$5#-5%*".
-!*99410!0:9:56/[email protected]<4>!9/[email protected]!56:7!0;5.!70!5426:26!6?A:!4:H!
[email protected]!
2:6145422:56/420! for
@43::A:7279?0/0! in
/2! the
6.:! Connection
"422:56/42! Examination
(I7>/276/42! window
1/2341!
of network
(described below)
G3:058:3!8:941H!

CONFIDENTAL
"#$%&'($)&*+!!
"#$%&'($)&*+!

6

,

t

!

4011-02
!"##$"%

software Description
3)2'4
)2'4
&'()*+,-./-01,23)2'4
&'()*+,-./-01,2
&'()*+,-./-01,23

• Alerts
r suspicious
!"#$%&' Tab.
()*-!Lists
()*-!
+./0/! unusual
121/134!o 56!
/1/7.8.51/! activities
380.9.0.:/!NETINTERCEPT
$()&$)(;"(=3/! discovered,
>./859:6:>?!
including attacks, security violations, and network errors.
.2841>[email protected]!30038A/?!/:816.0B!9.5430.52/?!32>!2:0C56A!:6656/-!
!l , 1" tome
i4
!' & W o n 1 " # $ $ % & , ' ( I ' l i '

#$%

Q

.

h

I

EII

?

& i ' i '

,

&

CONC 9 Ella Pai

#

l

.

- 1

l

! ' , » i ' , , ( & coin p'oinsp i ) & ?

:!.4)
:(!
:(!49

100

i
I*
Ito
ItittScilC
• (''!I

a

&
j

4

r
.

t
i

-

i 33555555+6

I

281

-



$
+

(
i

t
l

!

a
'

l

( I +i ' ' l ' I I h Inland i d '
, t u f L J # !4

77
772

1 1 5 4 h , + &

Cent ( v

i - ( ' + d

! ' )

.



=
=]



&0"1*61 9I1 C O O c L i 3 r 1 2 1 2

1 1 - i i

i i #" i t in iT 13

E0100164 1.4 l a I S L i i i I a 11 :
in 1 1 . + 1 1 1 1 7
;1D 22 2 4 " t E 24 I c I n i r - L ! ?T on0 0 ," 01
;1D

occomns

.

.

.

.

toinotIEL L I E LE LE LE 1 ! ] E 11 - I.E LE 1E < EE EE LE [ !
PC*08128
*08128 1 ! 1 E i t L I 111 31 l a 1 Z
*08128

. : 2 I . ' 4 11 t ! L ! L ! 1 !

-+

.

.
Non

fir Neitimeicepa
epa; U mfionito.,00 detadudadie
Fli F 0 l i • & '

' i '

H e l p

7
7L

X
Opon 12$#'$#

, $ /

3 ' i l

"

I n p u t Export F i n d a

4

I

12" k $ / I 5 8 i J

R

I

liortarst I i i

Italic 1 S3+++,(+5
3+++,(+5 ] Fona-crsC o n t l y o r a t i o n
6GGnorai ] y ' 7 i c . , 1 0 1
I

J

&

connecnon a ordained ( . 8 k i

* L

UD) rhooktun

77 Cheri P)It 11)40 n l I 8 ( itat'. a.t'tiont
'tiont IJ[lP nock9.an
'tiont
2009O l e o Pon 3s
3s"
s" sent 1 PacketsJ D P
[het. > !
Client .$1 3t" sent 2
U
U
R
h e t team
4872 S(#$$ PDit 5 I anni 2 pocket;wlisout UDP c h o c k s =

5 5 ) ' + ' PIf f i n t 1 pulkry
7811 : i i e r i PI',

10991 • 1 i $ 1 Pon 5" sent 1 Packet.' / t : t UDP

Fie=Q
=Q>?
=Q
Q>?1 n o t natcni @ = j

-

i'45 hl1

( l )

Fie c a
.2$ O n t o proixol;

Ciontu Q d an unr 8 ' q + ' l d conenorta

55I ( l e n t yeitiOn I I I ( J 0V.005 4 (i 8 ? ' ( I '



TCP C l i n t retiedconnection open vAitiDilI E h h $ g P a l flui1bI

.=* P(fl f U I h + munnon1D
1Dono onlacel (%%0+)5'

tiro t I-I 0

[email protected]<

!
()*-!
'./743B/!thumbnails
0=1DE23.4/! of
5F! all
344!graphic
@637=.8! Images
[email protected]:/!
+,#-&'Tab.
()*
-!Displays
[email protected]:/! discovered
>./859:6:>! in
.2! the
0=:! packet
738A:0! /06:3D-!
• Views
stream.
F65D!
*445C/!
E65C/[email protected]! of
5F! host-to-host
=5/0G05G=5/0! connections.
8522:80.52/-!Displays
'./743B/! web
C:E! pages
[email protected]:/! reconstructed
6:852/06180:>! from
Allows browsing
network traffic
2:0C56A!063FF.8!

CONFIDENTIAL
"#$%&'($)&*+!!
"#$%&'($)&*+!

7

,

!

4011-02
!"##$"%

software Description
3)2'4
)2'4
&'()*+,-./-01,23)2'4
&'()*+,-./-01,2
&'()*+,-./-01,23
' I n - II "."44#!$- H . I " " i I
FIlB Forensloi V l ' ( ),1*uw Hello

X .

*

Open R + , ' A n a l y z e D e l e t e " I '

u ' - l ' 1 E m o r t F i n d . %',44411 Ti m e

v! I , ' ( ' , t 74,$I,1&l1 5 I ! ' J l '

'%411t
%411t sl, /10,'1# F - * ' l n 2 0 3 * l 0 y i e w s Fleportn
%411t

r U

6/r

(
114 1 1 6

1 1 4

l i s

I I '

*#
-

Images 1 4$l1 *kl5pp
2 .

i t o s

11 4

2

l

I 16 1 0 1

I I ?

1 1 1 1

I I ?

1,4 I I ?

l

l

117

1 0 1

l i T

-J

I I I

117

1 1 2

I

maw 146
eniginal 8 $ ' : i $ . 11e S a e 9 , 0 1 1 k f t e s
9 %
931
+*5 I * I 1 . ' l i 1
,

E t ! !

,

-

1 1

414 . 4 '
471 11141

I
1 t 1511 of Z748

wiew Image

N -Il

'

Ii I l , h , , , w i l l '11 ' I " J : J I

I

& n 1 I t ; < . * = 4

FIle F'1'*lj-s m e w voinocipy Help

3



X

Rovoil 1 R ooknal Schn8ule ' 1 , 1 ' t i ,

Cyan RanannaA n a l i c a Cialaim I 4

L

Traffic 1 Suninary Forensics 1 A l e d l i y l e
I carlikAalsI
I7

.


!

-

llt

, —-,.

ii

o
W

I T

r



,
'•'

'

4
'1

w

.

I t '1'

sereeri j Clients I Nod*e In kteip I

,,,‚ .
1
*ni, q' .'
.,«.

‚ & l 2 , l " 7 , 9 •••I#$iii %'.l&4,.d,i.'•li

-

n(u(

IIl1-IJ7l10%l%i1 I ' 4 I coI I
23 ( $ n ' 4 - 1

-

,

••••


-



I k e ' 93•

(i

-

[

i /

s M r P

( ) * * I ) 1 l , + I I 1 ) , ,()* - . * 1?, PIJnrI.11

7

!"#$%&'()*%"#+,)--!"./01.23!4505!6570819!5/4!5/52:3;3!3900;/<3!5/4!49=58203!
!"#$%&'()*%"#+,)-!"./01.23!4505!6570819!5/4!5/52:3;3!3900;/<3!5/4!49=58203!
• Configuration
Tab.-!"./01.23!4505!6570819!5/4!5/52:3;3!3900;/<3!5/4!49=58203!
Controls data capture and analysis settings and defaults
!"##./*%"#+ Examination
01)2%#)*%"#+ Window.
3%#4"5-!
'905;294! information
;/=.1>50;./! o./!
7510;68251! network
/[email protected]!
3%#4"5-! Detailed
• Connection
n a5! particular
connection
6.//960;./!
,()$$%/+6.77%"#+,)-!';3725:3!0A9!560852!4505!30195>!B5/4!.70;./522:[email protected]!A954913C!=1.>!
,()$$%/+6.77%"#+,)--!';3725:3!0A9!560852!4505!30195>!B5/4!.70;./522:[email protected]!A954913C!=1.>!
• Traffic
Session Tab.-!';3725:3!0A9!560852!4505!30195>!B5/4!.70;./522:[email protected]!A954913C!=1.>!
Displays the actual data stream (and optionally packet headers) from
the selected network connection
0A9!39296094!/[email protected]!6.//960;./!
,)--!Displays
,)--!
';3725:3! traffic
015==;6! summary
38>>51:! of
.=! the
0A9! selected
39296094!connection
6.//960;./! including
;/6284;/39516A!
• s6'22)(8+
u m m a r y Tab.
criteria values found
61;091;5!D52893!=.8/4!
,)-:!Contains
!"#/9'7%"#7+Tab.
,)-:!
"./05;/3!results
1938203! of
.=! NETINTERCEPT's
$()&$)(E"(F)G3! content
6./09/0! 5/52:3;3!
566933! 0.!
• Conclusions
analysis 5/4!
and access
to
5/:!=;29!4505!929>9/03!=.8/4!
any file data elements found
,8
CONFIDENTIAL
"#$%&'($)&*+!!
"#$%&'($)&*+!

e t

!

4011-02
!"##$"%

software Description
3)2'4
)2'4
&'()*+,-./-01,23)2'4
&'()*+,-./-01,2
&'()*+,-./-01,23

• Criteria
Tab. !(-./010!%/213045!016257!52481246!8768!0191581:!8740!318;/2Exposes Forensic search criteria that selected this network connection
!"#$%"#&'(&)*!(-./010!%/213045!016257!52481246!8768!0191581:!8740!318;/2!"#$%"#&'(&)*
Other windows
#8712!
;43:/;0! of
/=! interest
43812108! include
4359>:1! Packet
?65<18! View,
@41;A! Web
B1C! View,
@41;A! Image
&D6E1! View,
@41;A! and
63:! Report
F1./28!
View.
@41;G!
!

NETINTERCEPT also
5/3H134138! and
$()&$)(F"(?)!
690/!includes
4359>:10! a6! variety
H62418I! of
/=! convenient
5/3H134138!
63:!easy-to-use
160IJ8/J>01! reports
21./280! that
8768! users
>0120! can
563!
generate
in
plain
text
or
HTML
format,
o
r
display
through
the
NETINTERCEPT
GUI.
Each
E1312681! 43! .9643! 81-8! /2! K)L+! =/2D68A! /2! :40.96I! 872/>E7! 871! $()&$)(F"(?)! MN&G! (657!
21./28!
40!created
521681:!from
=2/D! a6!template,
81D.9681A!which
;7457!can
563! be
C1! edited
1:481:! by
CI! the
871! user
>012! to
8/! produce
.2/:>51! customized
5>08/D4O1:!
report is
21./280!=/2!0.154=45!6..945684/30G!F1./28!8I.10!0>../281:!43!$()&$)(F"(?)!4359>:1P!
21./280!=/2!0.154=45!6..945684/30G!F1./28!
reports for specific applications. Report 8I.10!0>../281:!43!$()&$)(F"(?)!4359>:1P!
types supported in NETINTERCEPT include:
)26==45!Reports.
F1./280G!Provide
?2/H4:1! details
:186490! o/=!
318;/2826==45! volume
H/9>D1! among
6D/3E! machines
D6574310! o/3!
• Traffic
f network
n t871!
he
monitored network
D/348/21:!318;/2"/38138!Reports.
F1./280G!Provide
?2/H4:1!descriptions
:10524.84/30! of
/=! content
5/38138! (such
5/38138!
Q0>57! as
60! web
;1C! pages
.6E10! or
/2! email)
1D649R! that
8768! ;60!
• Content
was
.628!/=!I/>2!318;/2part of your network traffic
$18;/2DD62I!43=/2D684/3!6C/>8!I/>2!318;/2• Network
Description Reports. Provide summary information about your network
%/5>0!F1./280G!S7/;!318;/2012A!7/0836D1A!/2!&?!6::2100!
• Focus
Reports. show network traffic for a specific user, hostname, or 'P address
S15>248I! and
63:!Protocol
?2/8/5/9!Hygiene
KIE4131! Reports.
F1./280G! Show
S7/;! breaches
C2165710! in
43! network
318;/2015>248I! or
/2! network
318;/2• Security
traffic anomalies
826==45!63/D69410!

RUNNING NETINTERCEPT AUTOMATICALLY
5677879.7:;87;:56;[email protected]>;8<>AAB.
$()&$)(F"(?)!
5/386430!scripting
0524.843E!components
5/D./31380! to
8/! automatically
6>8/D6845699I! save,
06H1A!parse,
.6201A! export,
1-./28A! delete
:19181!
NETINTERCEPT contains
63:!21./28!/3!826==45!=2/D!871!D/348/21:!318;/2and report on traffic from the monitored network. These components can be assembled into
07199!
0524.80!and
63:!scheduled
0571:>91:! to
8/! run
2>3! on
/3! a6! timetable
84D186C91! appropriate
6..2/.24681! to
8/! the
871! volume
H/9>D1! of
/=! traffic
826==45! being
C143E!
shell scripts
monitored.
D/348/21:G!

ss ! AND SS1 DECRYPTION
&&C.>7/.&&A./:<5B=;8?7.
$()&$)(F"(?)!/==120!871!56.6C4948I!8/!:152I.8!SSK!01004/30!8/!63:!=2/D!0I081D0!8768!76H1!
NETINTERCEPT offers the capability to decrypt 55H sessions to and from systems that have
C113!D/:4=41:!8/!0>../28!8740!6584H48I!>043E!63
C113!D/:4=41:!8/!0>../28!8740!6584H48I!>043E!63!60IDD18245!1352I.84/3!<1I!1052/;!D1576340DG!
been modified to support this activity using an!60IDD18245!1352I.84/3!<1I!1052/;!D1576340DG!
asymmetric encryption key escrow mechanism.
#31!
5/.I! of
/=!NI
$&!is
40!capable
56.6C91! of
/=! decrypting
:152I.843E! traffic
826==45! from
=2/D!any
63I! number
3>DC12! of
/=! SSH
SSK! hosts
7/080! so
0/! modified
D/:4=41:!
One copy
Q.2/H4:1:!8768!871!826==45!
6..1620!/3!871!
D/348/21:!318;/256.6C4948I!;/2<0!;487!
C/87!
(provided that the traffic appears
on the monitored
network). This capability
works with both
SSKJT!63:!SSKJU!01004/30G!$()&$)(F"(?)!690/!/==120!871!56.6C4948I!8/!:152I.8!SS+!01004/30!
55H-1 and 55!-2 sessions. NETINTERCEPT also offers the capability to decrypt SSL sessions
8/!
63:!from
=2/D!55L
SS+!servers
012H120!you
I/>!control.
5/382/9G!This
)740! is
40
655/D.94071:! by
CI! importing
4D./2843E! the
871! server's
012H12V0! private
.24H681!
40!! accomplished
to and
<1I0!438/!$()&$)(F"(?)G!#31!5/.I!/=!$&!40!56.6C91!/=!:152I.843E!826==45!=2/D!63I!3>DC12!/=!
keys into NETINTERCEPT. One copy of NI is capable of decrypting traffic from any number of
D6574310!
2>3343E!correctly
5/221589I! configured
5/3=4E>21:! SSL
SS+! servers
012H120! (provided
Q.2/H4:1:! that
8768! traffic
826==45! appears
6..1620! o/3!
871!
machines running
n the
D/348/21:!318;/2.!8/!WGT!Q)+S!TRG!
D/348/21:!318;/2monitored network). This capability works with 699!H1204/30!/=!SS+!>.!8/!WGT!Q)+S!TRG!
all versions of 55L up to 3.1 ("L5 1).

PRIVACY PROTECTION
=58D>%/2!
D/21!than
8763! twenty
8;138I! years,
I1620A!network
318;/2D/348/243E! tools
8//90! have
76H1! made
D6:1! i48!
./004C91! to
8/! covertly
5/H1289I!
For more
t possible
D/348/2!
:686!moving
D/H43E!between
C18;113!computers
5/D.>8120! over
/H12! a6!network.
318;/2$()&$)(F"(?)V0! ability
6C4948I! 8/!
.6201!
monitor data
to parse
63:!
>3:120863:!data
:686! types
8I.10! is
40! a6!valuable
H69>6C91! protector
.2/8158/2! o/=!
43:4H4:>69! privacy
.24H65I! because
C156>01! i48!
699/;0!
and understand
f individual
t allows
318;/2D636E120! t8/!
0>2E45699I! examine
1-6D431! data
:686! on
/3! a6! crowded
52/;:1:! network
318;/2;487/>8! accidentally
6554:138699I!
network managers
o surgically
H41;43E!43=/2D684/3!8768!40!>3219681:!8/!63!43H1084E684/3G!
viewing information that is unrelated to an investigation.
S.154=45699IA!$()&$)(F"(?)!760!871!=/99/;43E!.24H65IJ.2/81584/3!=168>210P!
Specifically, NETINTERCEPT has the following privacy-protection features:
"/991580!and
63:!graphically
E26.745699I! display
:40.96I! network
318;/2>8494O684/3A! without
>8494O684/3A!
;487/>8! analyzing
6369IO43E! the
871! content
5/38138! of
/=! the
871!
• Collects
traffic
826==45!
S191580!suspicious
0>0.454/>0! o/2!
>3>0>69!traffic
826==45! for
=/2! display
:40.96I! bCI!
7/0836D1A!protocol,
.2/8/5/9A! o/2!
>01236D1A!
• Selects
r unusual
y hostname,
r username,
;487/>8!H41;43E!/87120V!:686!
without viewing others' data

CONFIDENTIAL
"#$%&'($)&*+!!
"#$%&'($)&*+!

9

,

ldmd!

!

4011-02
!"##$"%

software Description
3)2'4
)2'4
&'()*+,-./-01,23)2'4
&'()*+,-./-01,2
&'()*+,-./-01,23

• Vi./012!34567809!/:4;02!1/6<=76!422=3/4609!7208>4:0!/>?=8:46/=>@!7>A022!902/809!
e w s captured images without associated username information, unless desired
• specifies
B503/?/02! what
1<46! types
6C502! of
=?! data
9464! will
1/AA! be
D0!analyzed
4>4ACE09! in
/>! the
6<0! traffic
684??/3! or
=8! stored
26=809! in
/>! the
6<0! permanent
508:4>0>6!
database
9464D420!
• Password-controlled
access to the NETINTERCEPT hardware, software, and data
F4221=89G3=>68=AA09!433022!6=!6<0!$()&$)(H"(F)!<[email protected][email protected]!4>9!9464!
• A*79/6!A=;;/>;!=?!4AA!68/;;0809!4>4AC2/2!436/I/6/02!
u d i t logging of all triggered analysis activities

NETINTERCEPT CONFIGURATIONS
56785769:6;7.:<5=8>[email protected]<5&.
B!208/02!!
4>9!
"4567802!75!6=!LM!J0;4D/62N203=>9!D7826!8460!!
S series F o %=8!
r D 'JK2!
MZs an
d Captures
up to 95 Megabits/second burst rate
2/:5A0!
simple a n a4>4AC2/2!
lysis
F48202!
75! t6=!
J0;4D/62N203=>9! sustained
27264/>09! average
4I084;0!
Parses up
o 5M! Megabits/second
5785=202!!
purposes
data rate
9464!8460!!
B/>;A0!FO!"FP!!
Single P4 CPU
P5!6=!LM!QR!9464!26=84;[email protected]!,!QR!H*J!!
Up to 95 GB data storage, 1 GB RAM
STU,-N,--!
(6<08>06! interfaces
/>608?4302! f ?=8!
:=>/6=8/>;! a4>9!
(2)1 0/1 00 Ethernet
o r monitoring
nd
control
3=>68=A!!

i standard
2U rack size
B64>9489!TP!843V!2/E0!!
DR series F o%=8!0W60>909!
r extended
'H!208/02!
508?=8:4>30!
performance

&>3804209!3456780!4>9!4>4AC2/2!8460!1/6Increased capture and analysis rate with
O!14C!H*&'!3=>68=AA08!4>9!'74A!&>60A!X(#$!"FP2!!
4 way RAID controller and Dual Intel )(EON CPUs
P5!6=!Y--!QR!9464!26=84;[email protected]!,!QR!H*J!!
Up to 300 GB data storage, 1 GB RAM
STU,-N,--N,---!(6<08>06!/>608?4302!?=8!:=>/6=8/>;!4>9!
(2)1 0/1 00/1 000 Ethernet interfaces for monitoring and
control
3=>68=A!!

4U rack size
OP!843V!2/E0!!
DRG series
For backbones and "4567802!75!6=!Y--!J0;4D/62N203=>9!D7826!8460!!
'HQ!208/02!!
%=8!D43VD=>02!4>9!
"4567802!75!6=!Y--!J0;4D/
62N203=>9!D7826!8460!!
Captures up to 300 Megabits/second
burst rate
advanced
49I4>309!
"=:5A060AC!548202!75!6=!,-!J0;4D/62N203=>9!
Completely parses up to 10 Megabits/second
80Z7/80:0>62!!
requirements
27264/>09!4I084;0!!
sustained average
data rate
9464!8460!!
[!14C!H*&'!3=>68=AA08!4>9!'74A!&>60A!X(#$!"FP2!!
8 way RAID controller and Dual Intel XEON CPUs
P5!6=!\\-!QR!9464!26=84;[email protected]!Y!QR!H*J!!
Up to 770 GB data storage, 3 GB RAM
STU,-N,--N,---!(6<08>06!/>608?4302!?=8!:=>/6=8/>;!4>9!
(2)1 0/1 00/1 000 Ethernet interfaces for monitoring and
control
3=>68=A!!

4U rack size
OP!843V!2/E0!!

CONFIDENTIAL
"#$%&'($)&*+!!
"#$%&'($)&*+!

1

0

,-

ldmd!

!

4011-03
!"##$"%

software Description
3)2'4
)2'4
&'()*+,-./-01,23)2'4
&'()*+,-./-01,2
&'()*+,-./-01,23

MODEL 4011-03
56/78.
!"##$"%. -$.ACCEssDATA©
9::7&&/9;9=9&&>6?/. RECOVERY
?7:[email protected]?A. TOOLKITTM
;668BC;D.
(PRTKTM
E=?;BDF.
The Password
kit i<1!
s perfect
o r l:02!
a w enforcement
)-.!
/0112345!Recovery
6.738.49! "##
)33:;<=!
>.4?.7=! f?34!
[email protected][email protected]=! and
[email protected]! corporate
734>340=.! security
1.7B4<=9!
Professionals. I&?!
f you
o locked
r i!
f your
>43?.11<[email protected]:1C!
93B! need
@..5!access
077.11! t=3!
:37;.5! files
?93B4! users
B1.41! have
-08.! simply
1:9! locked
:37;.5!
themselves out of their files, the PRTK can get you back in.
=-.A1.:8.1!3B=!3?!=-.<4!?
SECURITY RISK ASSESSMENT TOOL
&7:G?C;A.?C&B.9&&7&&57H;.;668.
[email protected]!>.3>:.!B1.!=-.!10A.!>[email protected][email protected]=234;!:3FMany People use the same password to gain access to different programs and network login
04.01C!
)-<1!could
73B:5!be
G.! one
[email protected]! of
3?! the
=-.! weakest
2.0;.1=! links
:93B4! organizations
[email protected]<=9! Profile!
>43?L3A.!
areas. This
>0112345!
>43=.7=<[email protected]!schemes
17-.A.1! are
04.! easy
.019! to
=3! crack,
7407;D! while
2-3=-.41! are
04.! virtually
8<4=B0::9! impossible.
311MB=!
password protection
2-0=!!=-.!10A.!>0112345!<1!B1.5!?34!G3=-!>43F40A1N!M9!F0what if the same password is used for both programs? By gaining access to the weakest one
93B!-08.!F0you have gained access to the strongest one without the need to crack both.

FEATURES
I79;G?7&.
(@0G:.1!>[email protected]@=!
• Enables
password management
*@0:9I.1!?01123451!2<[email protected]!3>=<[email protected]:!4.>34=!?• Analyzes
files and their passwords with an optional report fie
6.738.41!0::!=9>.1!3?!>01123451!4.F045:.11!3?!>0112345!:[email protected]=-!
• Recovers
all types of passwords regardless of password length
*@0:9I.1!AB:=<>:.!?• Analyzes
multiple files at one time
6.738.41!AB:=01123451!
• Recovers
multilingual passwords
/[email protected][email protected][email protected]:!1.7B4<=9!735.!
• Prevents
unauthorized use with a personal security code

• F%[email protected]<70:!1B>>[email protected]!OPQQ!*CHC!=3!RPQQ!/CHC!HL)!
r e e technical support between 8:00 A.M. to 5:00 $.%. MIST

CONFIDENTAL
"#$%&'($)&*+!!
"#$%&'($)&*+!

1

1

,,

ldmd!

!

4011-03
!"##$"%

software Description
3)2'4
)2'4
&'()*+,-./-01,23)2'4
&'()*+,-./-01,2
&'()*+,-./-01,23
PASSWORD RECOVERY MODULES
56&&789/.9:;88/[email protected]:&.

AccessData has
*../00'121!
310! a1! wide
456/!variety
7185/29! of
:;! individual
5<65756=1>!password
?1004:86!breaking
@8/1A5C:6=>/0! that
2312! can
.13/>?! you
9:=!
recover lost passwords for almost every product in the industry.
8/.:7/8!>:02!?1004:860!;:8!1>C:02!/7/89!?8:6=.2!5!

Individual Password Breaker Modules
&<65756=1>!E1004:86!F8/1A/8!G:6=>/0!
MS Access
GH!*../00!

Mail (MS)
G15>!IGHJ!

QuickBooks
K=5.AF::A0!

ACT!
*")L!

GH!G:9!
MS Money

Quicken
K=5.A/
Ami Pro
*C5!E8:!

MYOB
GM#F!

Win BAR
N5
Approach
*??8:1.3!

My Personal check
G9!E/80:<1>!.3/.A!

scheduler+
H.3/6=>/8P!

ARJ
*OQ!

Writer
N852/8!

H9C?3:<9!
Symphony

Ascend
*0./<6!

Norton secret Stuff
$:82:
Versa Check
R/801!"3/.A!

F1.A=?!
Backup

#8B1<5S/8!
Organizer

MS Word
GH!N:86!

F/02!"89?2!
Best Crypt

MS Outlook
GH!#=2>::A!

WordPerfect
N:86E/8;/.2!

Bullet Proof FTP
F=>>/2!E8::;!%)E!

Palm
E1>C!

Word Pro
N:86!E8:!

Cute FTP
"=2/!%)E!

Paradox
E1816:T!

Adobe PDF
*6:@/!E'%!

Data Perfect
'121!E/8;/.2!

PCP Disk File 4.0
EUE!'50A!%5>/!VDW!

Win95/Win98 PWL Files
N5/0!

dBase
6F10/!

EUE!H/.8/2!\/9!O5PCP Secret Key Ring

E Content Advisor
&(!":<2/<2!*6750:8!

(68!
Encrypt Magic Fldr

Pro Write
E8:!N852/!

N!(]%)E!
W E_FTP

Excel
(T./>!

$/20.1?/!G15>!
Netscape Mail

F"#$%5&
%:TF*H(!

E8:^/.2!IGHJ!
Project ((5)
N5WinZip & Generic

Source Safe
H:=8./!H1;/!

File Maker Pro
%5>/!G1A/8!E8:!

_5??/80!
Zippers

E"a(PC-Encrypt

Lotus 1-2-'
+:2=0!,a-ab!

08tA
K`*!

!

!

Quattro Pro
K=1228:!E8:!

!

!

CONFIDENTIAL
"#$%&'($)&*+!!
"#$%&'($)&*+!

1

2

,-

ldmd!

!

4011-04
!"##$"!

software Description
2(1&3
(1&3
%&'()*+,-.,/0+12(1&3
%&'()*+,-.,/0+1
%&'()*+,-.,/0+12

MODEL 4!"##$"!0 11 -0 4 -$- !8996%%.8:8;""#ssD!$!© D
l % R I & U % # D [email protected]:A5=BE T W O R K ATTACK®
45.67.?:6.8::89BC(DNA®)
[email protected] IDLE TIME TO WORK
F?::./01023445!
14678419! of
7:! lost
;7<3! passwords
=0<<>715:71! MS
[email protected]! Office
#::A64! 97/2000
BCDEFFF! products
=175/63A26;/5A2G! Word
H715! and
025!
Excel; now includes Adobe Acrobat (PDF) file!54619=3A72O!'$*!=/371QR!
decryption! DNA puts idle time to work.
(I64;J!27>!A26;/54(I64;J!27>!A26;/5471QR!
!
'A<31AK/345!
$43>71Q!Attack,
*3306QS! or
71! DNA,
'$*S! is
A24>! approach
0==1706T! to
37! recovering
1467841A2G! password
=0<<>715! protected
=17346345!
Distributed Network
:A;4:A;441!7:!724!P06TA24R!'$*!
45!37!3T4!=1764<41!7:!724!P06TA24R!'$*!
files. In the past, recoveries have been limited
to the processing power of one machine. DNA
/<441!7:!P06TA2471Q!71!0617<71;5!37!54619=3!=0<<>715uses the power of machines across the network or across the word to decrypt passwords.
!
)T4!
'$*!server
@41841! is
AA2<30;;45! in
A2! a0!centra
642310;!ocation
;7603A72! where
;7603A72!
>T414! machines
P06TA241/22A2G! DNA
'$*! Client
";A423! can
602!
The DNA
0664<71QR!'$*!?020G41!67715A
0664<71QR!'$*!?020G41!67715A20342034access It over the network. DNA Manager coordinates
the attack, assigning smaH portions of
3T4!
Q49!search
<4016T! to
37!machines
P06TA245A<31AK/345!throughout
3T17/GT7/3! the
3T17/GT7/3!
3T4! network.
243>71QR! DNA
'$*! C
";A423!
>A;;! run
1/2! in
A2! the
3T4!
the key
l e f t wiH
K06QG17/25S!72;9!30QA2G!/2/<45!=1764<<71!3AP4R!
background, only taking unused processor time.

FEATURES
H68:?=6%(0<[email protected]<3A6• Easy
to read statistics and Graphs

• A*55!/<41!5A63A7201A4d d user dictionaries
#=3APAU03A72!:71!=0<<>715!03306Q• Optimization
for password attacks for specific languages

• Customize
user dictionaries
"/<37PAU4!/<[email protected];3T!6;A423!A2<30;;03A72!:/263A720;A39!
• Stealth
client instaHation functionality
*/37P03A6!";A423!/=5034!>T42!/=503A2G!3T4!'$*[email protected]!
• Automatic
Cleft update when updating the DNA server
"72317;!>T03!6;A42371Q!72!64130A2!V7K• Control
what clients work on certain jobs

U''(R%#D FILE FORMATS
%?FF5=:6.-H<76-H5=48:%=,0&I,+/-*3J-.,0+K2(/Recovers and Decrypts
• A*WX!
RJ

[email protected]!H715!025!(I64;!LBC!Y!EFFFN!
S Word and Excel (97 & 2000)
• PM'%!,RZ!025!K4;7>!
D F 1.4 and below
Recovers a Password
=,0&I,+/-*-F*//)&+J-

• Office
XP
#::A64![M!
• PM.M!'AG P Disk 4, 5, 6
MQUA=!
• Pkzip

• RW*W!/=!37!841A R up to version 2.9 of Win RAR-"A/inZip

CONFIDENTIAL
"#$%&'($)&*+!!
"#$%&'($)&*+!

1

3

,-

elaman

!

4011-05
!"##$"%

software Description
3)2'4
)2'4
&'()*+,-./-01,23)2'4
&'()*+,-./-01,2
&'()*+,-./-01,23
MODEL 4011-05- AccEssDATA© R ! Gl " RY VIEWERTM
56/78.!"##$."%.$.9::7&&/9;9?&;[email protected]?7B7=C.

The Access Data Registry Viewer gives you the ability to view independent Windows registry
)./!*00/11!'232!4/561378!96/:/7!56;/1!8<=!3./!2>6?638!3files. Using the Registry Viewer provides access
to the "Protected storage System Provider"
D6?/[email protected]!3./!4/561378!96/:/7!B7D6?/[email protected]!3./!4/561378!96/:/7!B711!3key, which
L/8M!
:.60.!contains
0/NJ26?!and
[email protected]!Internet
&@3/[email protected]/3! passwords
B211:<7A1! and
[email protected]! settings.
1/[email protected]! Easily
(216?8! generate
5/@/723/! reports
7/B<731!
containing valuable data from Registry keys of interest. The Registry Viewer includes a U5B or
0?/!A232!D7parallel dongle to restrict unauthorized use.
B272??/?!AFEATURES
D79;E=7&.
911-00.+4F./-1,G3).H,')-1)-F.&)',+I-./+)+.
Access and Decrypt Protected storage Data
*=3• AutoComplete
"form" data from Google, Yahoo, and more
&@3/[email protected]/3!(SB?<7/7!200<[email protected]!?<[email protected][email protected]/[email protected]!B211:<7A1!
• Internet
Explorer account login names and passwords
#=3?<• Outlook
and Outlook Express account information including servers, users, and passwords
.
A2-*.?4F-3-4F-4).=-I20),G.D2J-0.
View Independent Registry Files
*00/11!F1/7EA23M!$)F1/7EA23M!I2JM!I813/J
*00/11!F1/7EA23M!$)F1/7EA23M!I2JM!I813/JM!I/0=7638M!IM!I/0=7638M!I• Access
User.dat, NTUser.dat, Sam, System,M!I/0=7638M!ISecurity, Software, and Default files
#B/@1!2?!;/716• Opens
al versions of Windows Registry files

• V96/:!D6?/[email protected];6A=2??8!:63.<=3!7/0i e w files individually without reconstructing the full Registry
.
=-3',).>-4-,+)2'4.
Report Generation

• HT)U+!7/B<[email protected]!02B2>6?636/1!
T M L reporting capabilities
([email protected]/5723/1!:63.!%<7/@160!)<• Easily
integrates with Forensic Toolkit case reports
.
?4)-I,+)-0.*2)K.911-00/+)+L0.D',-4021.;''J0.
Integrates with AccessData's Forensic Tools
I/2J?/11?8!?<2A!4/561378!D6?/1!A67/03?8!D7I/2J?/11?8!?<2A!4/561378!D6?/1!A67/03?8!D7./!%<7/@160!)<• Seamlessly
load Registry files directly from the
Forensic Toolkit into the Registry Viewer
Q/@/723/!B211:<7A!?6131!D<7!=1/!:63.!H211:<7A!4/0• Generate
password lists for use with Password Recovery Toolkit

• Access
Data© Forensic Toolkit ®
*00/11!'232V!%<7/@160!)<!
)./!
*00/11!Data
'232!Forensic
%<7/@160!Toolkit®
)<X%)YZ[! offers
?2:! enforcement
/@D<70/J/@3! and
[email protected]! corporate
0<7B<723/! security
1/0=7638!
The Access
B73./!
2>6?638!
3B/7D<7J!
[email protected]!
3.<7<=5.!
0D<7/@160!
/[email protected] the ability to perform complete and thorough computer forensic examinations.
)./!
%)Y!features
D/23=7/1!powerful
BD6?/! filtering
D6?3/[email protected]! and
[email protected]! search
1/270.! functionality.
1/270.!
[email protected]%)Y\1! customizable
0=13?/! filters
D6?3/71!
The FTK
2??8<=! to
31<73! through
3.7<=5.!thousands
3.<[email protected]! of
D6?/1! to
3]=60L?8! find
[email protected]! the
3./! evidence
/;6A/@0/! you
8<=! need.
@//AE! FTK
%)Y! is
61!
allow you
7/0<[email protected]/A!21!3./!?/[email protected]!D<7/@160!3<!3recognized as the leading forensic tool to perform e-mail analysis.
.
7+0G.)'.E0-.
Easy to Use
96/:!• V96/:!i e w over 270 different file formats with!I3/?/@3\1!#=316A/[email protected]!96/:/7!)/[email protected]<58!
Stelent's Outside in Viewer Technology

• F%)Y!(SB?<7/7!2??T K Explorer allows you to quickly navigate through acquired images
Q/@/723/!2=A63!?<[email protected]!021/!7/B<731!
• Generate
audit logs and case reports
"?/!:63.!3./!H211:<7A!4/0"?/!:63.!3./!H211:<7A!4/0=3/A!$/3:<7L!*3320LWE!
<=3/A!$/3:<7L!*3320LWE!
• Compatible
with the Password Recovery ToolkitTM
and Distributed Network Attack'

CONFIDENTIAL
"#$%&'($)&*+!!
"#$%&'($)&*+!

1

4

,-

ldmd!

!

4011-05
!"##$"%

software Description
3)2'4
)2'4
&'()*+,-./-01,23)2'4
&'()*+,-./-01,2
&'()*+,-./-01,23
Advanced searching
567+41-6.&-+,18249.
• Full
text Indexing powered by dt5earch ® yields instant text search results
%.//!0120!34512346!7891:15!;:[email protected]!<31/5B!34B0>40!0120!B1>:[email protected]!:1B./0B!
• Advanced
searches for J
*5C>4?15!B1>:[email protected]!D8:!EF(G!3H>61B!>45!&401:410!0120!
• Locates
binary patterns using Live search
+8?>01B!;34>:001:4B!.B346!+3C1!=1>:[email protected]!
• Automatically
recovers deleted files and partitions
*.08H>03?>//45!7>:030384B!
• Targets
key files quickly by creating
custom file filters.
)>:610B!I1)>:610B!I10346!?.B08H!D3/1!D3/01:BK!
1>0346!?.B08H!D3/1!D3/01:BK!
.
&:33',)-6.;2:202)2'4.;',?+)0.
Supported File & Acquisition Formats

• F%3/1!D8:H>0B!34?/.51L!$)%=M!$)%=!?8H7:1BB15M!%*)!,NO,POQNM!>45!+34.2!120N!R!120QK!
i l e formats include: NTFs, N"ES compressed, FAT 12/1 6/32, and Linux ext2 & ext3.
&H>61!D8:H>0B!34?/.51L!(4?>B1M!=S*T)M!=4>7;>?IM!=>D1!;>?I!U.7!08!;.0!480!34?/.5346!CKQVM!
&H>61!D8:H>0B!34?/.51L!(4?>B1M!=S*T)M!=4>7;>?IM
• Image
formats include: Encase, SMART, Snapback,!=>D1!;>?I!U.7!08!;.0!480!34?/.5346!CKQVM!
safe back (up to but not including v.3),
and Linux DD.
>45!+34.2!''K!
.
@[email protected]
E$?+2=.778:0BL!Outlook,
#.0/88IM!Outlook
#.0/88I! Express,
(27:1BBM!AOL,
*#+M!Netscape,
$10B?>71M!Yahoo,
$10B?>71M!
W>@88M!EarthLink,
(>:[email protected]+34IM!Eudora,
(.58:>M!Hotmail,
X80H>3/M!
• supports:
and # N e-mail.
>45!S=$!1YH>3/K!
Z319BM!B1>:[email protected]!7:340BM!>45!1278:0B!1YH>3/!H1BB>61B!>45!>00>[email protected]!
• Views,
searches, prints, and exports e-mail messages and attachments.
T1?8C1:B!51/1015!>45!7>:03>//3/K!
• Recovers
deleted and partially deleted e-mail.
*.08H>03?>//?0B!5>0>!D:8H!F[\&FM!]34\37
*.08H>03?>//?0B!5>0>!D:8H!F[\&FM!]34\37M!]34T*TM!G\&FM!>45!)*T!?8H7:1BB15!D3/1BK!
M!]34T*TM!G\&FM!>45!)*T!?8H7:1BB15!D3/1BK!
• Automatically
extracts data from PKZIP, WinZip,M!]34T*TM!G\&FM!>45!)*T!?8H7:1BB15!D3/1BK!
'A/inRAR, GZIP, and TAR compressed files.
.
C4'*4.;2Known File FilterTM (KFFTM)
&51403D31B!>45!D/>6B!B0>45>:5!871:>0346!B45!7:86:>H!D3/1BK!
• Identifies
and flags standard operating system and program files.
&51403D31B!>45!D/>[email protected]/5!78:486:>[email protected][email protected]:!7801403>/!1C3514?1!D3/1B!
• Identifies
and flags known child pornography and other potential evidence files
&4?/[email protected]>[email protected]!5>0>B10B!D:8H!$&=)!>45!X>[email protected]!I1171:!
• Includes
hash datasets from N I " and Hash keeper
"8H346!B884^!":1>01!<8.:[email protected]>[email protected]!B10BK!!
• Coming
soon! Create your own custom hash sets.
.
I-920),B.J2-*-,D.
Registry ViewerTM
*??1BB1B!>45!51?:<70B!7:801?015!B08:>61!5>0>!
• Accesses
and decrypts protected storage data

• ViZ319B!34517145140!:163B0:e w s independent registry files
T178:0B!6141:>0384!
• Reports
generation
&4016:>[email protected]!*??1BB!'>0>_B!D8:14B3?!)88/B!
• Integrates
with Access Data's forensic Tools
*??1BB!'>0>`!#41!W1>:!=.;B?:370384!%1>0.:1B!
• Access
Data© One Year subscription Features
"84B0>40!>[email protected]/86• Constant
access to cutting edge technology.

[email protected]>BB/[email protected]!3453C35.>/!.76:>51BK!
o hassle with individual upgrades.
]1;Y.75>01B!D8:[email protected]!%8:14B3?!)88/I30!
• Web-updates
for the Forensic Toolkit
!

CONFIDENTIAL
"#$%&'($)&*+!!
"#$%&'($)&*+!

1

5

,-

! s "# INDEX
!"#$%&'()*
•••••

W • '-

. Introduction
!"!#!$%&'()*+&,(%
!#!$%&'(
!#!$%&'
()*
)*+
+&,&,(%
(%
- The
Threat
!-!#!./0!./'01&
!#!./0
!#!./
0!./'0
!./'
01&
1&
- Recommendations
!#!30+(
!#!3
0+(44
440
0%)1&,
%)1&,(
(%5
%5
!2!#!30+(440%)1&,(%5
4 - Training
Overview
7 Course
8(*'50!9:0':,0
8(*'50!
9
:0':,0;
;
!6!#!.'1,%,%7!8(*'50!9:0':,0;
!6!#!.'1,%,%7
!6!#!.'1,%,%
5 - Training
syllabuses
[email protected]*505
!7 Course
8(*'50!=>[email protected]*505
8(*'50!=>[email protected]*505
6!#!3
- 30+(440%
Recommended
A
!#!
0+(440%)
)0
0)
) Products
B'()
B'(
)*+
*+&&55
!A!#!30+(440%)0)!B'()*+&5
7 - Technical Data Sheets
=/00&5
/00&5
!C!#!.0+/%,+1?!D1&1!=/00&5
!C!#!.0+/%,+1?!D1&1!
!C!#!.0+/%,+1?!D1&1!=
- IP/PABX Manipulation
!E!#!$BFBGHI!J1%,K*?1&,(%
9!#!8(440'+,1?!M*(&1&,(%5
- Commercial Quotations
L
L!#!8(440'+,1?!M*(&1&,(%5
10!#!.0
- Terms
& Conditions
"N!#!.
"N!#!.0'45!O!8(%),&,(%5
"N
!#!.
0'45!O!8(
'45!O!8
(%),&,
%),&,(
(%5
%5
11"!#!8(
- 8(%&1
Contact
Details
""!#!
""!#!8(%&1+&!D0&1,?5
"
"!#!
"!#!
%&1+
+&!D
&!D
&!D
&!D0
0&1,?5
&1,?5
"-!#!P?141%!81&1?(
"-!#!P?141%!81&1?(75!9:0':,0;
"
-!#!P?141%!81&1?(
-!#!P?141%!81&1?(
-!#!P?141%!81&1?(7
75!9:0':,0
5!9:0':,0
5!9:0':,0;
;
12
- Haman Catalogs
Overview


lG
$m$nP
$
$m
m$
m
$
$nP
nP
E
R
M
A
N
$ECURITVsOL(

! s "# INDEX
!"#$%&'()*
•••••

W • '-

. Introduction
!"!#!$%&'()*+&,(%
!#!$%&'(
!#!$%&'
()*
)*+
+&,&,(%
(%
- The
Threat
!-!#!./0!./'01&
!#!./0
!#!./
0!./'0
!./'
01&
1&
- Recommendations
!#!30+(
!#!3
0+(44
440
0%)1&,
%)1&,(
(%5
%5
!2!#!30+(440%)1&,(%5
4 - Training
Overview
7 Course
8(*'50!9:0':,0
8(*'50!
9
:0':,0;
;
!6!#!.'1,%,%7!8(*'50!9:0':,0;
!6!#!.'1,%,%7
!6!#!.'1,%,%
5 - Training
syllabuses
[email protected]*505
!7 Course
8(*'50!=>[email protected]*505
8(*'50!=>[email protected]*505
6!#!3
- 30+(440%
Recommended
A
!#!
0+(440%)
)0
0)
) Products
B'()
B'(
)*+
*+&&55
!A!#!30+(440%)0)!B'()*+&5
7 - Technical Data Sheets
=/00&5
/00&5
!C!#!.0+/%,+1?!D1&1!=/00&5
!C!#!.0+/%,+1?!D1&1!
!C!#!.0+/%,+1?!D1&1!=
- IP/PABX Manipulation
!E!#!$BFBGHI!J1%,K*?1&,(%
- Commercial
Quotations
!#!8(
!#!8
(44
440
0''+
+,1?!M*
,1?!M*
,1?!M*(
(&1&,
&1&,(
(%5
%5
!L!#!8(440'+,1?!M*(&1&,(%5
10 - Terms & Conditio ns
"N!#!.0'45!O!8(%),&,(%5
11"!#!8(
- 8(%&1
Contact
Details
""!#!
""!#!8(%&1+&!D0&1,?5
"
"!#!
"!#!
%&1+
+&!D
&!D
&!D
&!D0
0&1,?5
&1,?5
"-!#!P?141%!81&1?(
"-!#!P?141%!81&1?(75!9:0':,0;
"
-!#!P?141%!81&1?(
-!#!P?141%!81&1?(
-!#!P?141%!81&1?(7
75!9:0':,0
5!9:0':,0
5!9:0':,0;
;
12
- Haman Catalogs
Overview


lG
$m$nP
$
$m
m$
m
$
$nP
nP
E
R
M
A
N
$ECURITVsOL(

! s "# INDEX
!"#$%&'()*
•••••

W • '-

. Introduction
!"!#!$%&'()*+&,(%
!#!$%&'(
!#!$%&'
()*
)*+
+&,&,(%
(%
- The
Threat
!-!#!./0!./'01&
!#!./0
!#!./
0!./'0
!./'
01&
1&
- Recommendations
!#!30+(
!#!3
0+(44
440
0%)1&,
%)1&,(
(%5
%5
!2!#!30+(440%)1&,(%5
4 - Training
Overview
7 Course
8(*'50!9:0':,0
8(*'50!
9
:0':,0;
;
!6!#!.'1,%,%7!8(*'50!9:0':,0;
!6!#!.'1,%,%7
!6!#!.'1,%,%
5 - Training
syllabuses
[email protected]*505
!7 Course
8(*'50!=>[email protected]*505
8(*'50!=>[email protected]*505
6!#!3
- 30+(440%
Recommended
A
!#!
0+(440%)
)0
0)
) Products
B'()
B'(
)*+
*+&&55
!A!#!30+(440%)0)!B'()*+&5
7 - Technical Data Sheets
=/00&5
/00&5
!C!#!.0+/%,+1?!D1&1!=/00&5
!C!#!.0+/%,+1?!D1&1!
!C!#!.0+/%,+1?!D1&1!=
- IP/PABX Manipulation
!E!#!$BFBGHI!J1%,K*?1&,(%
- Commercial
Quotations
!#!8(
!#!8
(44
440
0''+
+,1?!M*
,1?!M*
,1?!M*(
(&1&,
&1&,(
(%5
%5
!L!#!8(440'+,1?!M*(&1&,(%5
10!#!.0
- Terms
& Conditions
"N!#!.
"N!#!.0'45!O!8(%),&,(%5
"N
!#!.
0'45!O!8(
'45!O!8
(%),&,
%),&,(
(%5
%5
11 - Contact Details
""!#!8(%&1+&!D0&1,?5
"-!#!P?141%!81&1?(
"-!#!P?141%!81&1?(75!9:0':,0;
"
-!#!P?141%!81&1?(
-!#!P?141%!81&1?(
-!#!P?141%!81&1?(7
75!9:0':,0
5!9:0':,0
5!9:0':,0;
;
12
- Haman Catalogs
Overview


lG
$m$nP
$
$m
m$
m
$
$nP
nP
E
R
M
A
N
$ECURITVsOL(

!

!
!
!
!
!
!
!
!
!
!

.
/
0
1
2
/
3
1
0
4
!
"
#
$
%
#
&
!!
!
! If you would like further Information about ELAMAN,
or would like to discuss a specific requirement or project, please contact us at:
!
!
EIaman G m b H
German security Solutions
seitzstr. 23
80538 Munich
Germany
Tel: +49-89-24 20 91 80
Fax: +49-89-24 20 91 81
i nfo®el a man. d !

"#$%&'($)&*+!!

w w w. ! I " man. d!
,-

! s "# INDEX
!"#$%&'()*
•••••

W • '-

. Introduction
!"!#!$%&'()*+&,(%
!#!$%&'(
!#!$%&'
()*
)*+
+&,&,(%
(%
- The
Threat
!-!#!./0!./'01&
!#!./0
!#!./
0!./'0
!./'
01&
1&
- Recommendations
!#!30+(
!#!3
0+(44
440
0%)1&,
%)1&,(
(%5
%5
!2!#!30+(440%)1&,(%5
4 - Training
Overview
!6!#!.'1,%,%7
!6!#!.'1,%,%
7 Course
8(*'50!9:0':,0
8(*'50!
9
:0':,0;
;
!6!#!.'1,%,%7!8(*'50!9:0':,0;
5 - Training
syllabuses
[email protected]*505
!7 Course
8(*'50!=>[email protected]*505
8(*'50!=>[email protected]*505
6!#!3
- Recommended
A
!#!
30+(440%
0+(440%)
)0
0)
) Products
B'()
B'(
)*+
*+&&55
!A!#!30+(440%)0)!B'()*+&5
7 - Technical Data Sheets
!C!#!.0+/%,+1?!D1&1!=
!C!#!.0+/%,+1?!D1&1!
=/00&5
/00&5
!C!#!.0+/%,+1?!D1&1!=/00&5
- IP/PABX Manipulation
!E!#!$BFBGHI!J1%,K*?1&,(%
- Commercial
Quotations
!#!8(
!#!8
(44
440
0''+
+,1?!M*
,1?!M*
,1?!M*(
(&1&,
&1&,(
(%5
%5
!L!#!8(440'+,1?!M*(&1&,(%5
10!#!.0
- Terms
& Conditions
"N!#!.0'45!O!8(%),&,(%5
"N
!#!.
0'45!O!8(
'45!O!8
(%),&,
%),&,(
(%5
%5
11"!#!8(
- Contact
Details
""!#!
""!#!8(%&1+&!D0&1,?5
"
"!#!
"!#!
8(%&1
%&1+
+&!D
&!D
&!D
&!D0
0&1,?5
&1,?5
"-!#!P?141%!81&1?(75!9:0':,0;
12 - Daman Catalogs Overview


lG
$m$nP
$
$m
m$
m
$
$nP
nP
E
R
M
A
N
$ECURITVsOL(

Overview of Elaman Catalogs
!
!su

Tikt neal Sum Lein;LkiI
J'mfi'

!
!sv

# , ' $ I • $ j i sLfvriIIlr.-r

!s(

%tIJ)**I surveiiian'e Can

Ic"


+,-.//0tR
//0tR/
//0tR
tR/1
/1sysTEvs

sE
inirrial Security % q u i & , ' *

I #/

&tlI #$i&i'1
'1 Ccione5

elaman

!

ABOUT us
!"#$%&$'&
More than
0 years
f experience
n communication
o r law
-./0!
1234! 1,5!
603/7! o.8!
09:0/;04<0! i;4!
4;<31;.4! and
34?! security
70<>/;16! requirements
/[email protected]>;/0=0417! f8./!
A3B!
enforcement agencies
s o.8!
f the
o establish
n 2004,
048./<0=041!
3C047!
120! need
400?! t1.!
0713EA;72! ELAMAN
(+*-*$! GmbH
F=EG! i;4!
H55IJ!
specializing i ;4!
n security
o r government
a w enforcement
7:070<>/;16! requirements
/[email protected]>;/0=0417! f 8./!
C.D0/4=041! and
C.D0/4=041!
34?! l A3B!
048./<0=041! authorities
3>12./;1;07!
worldwide.
B./A?B;?0L!
(+*-*$!
F=EGJ!established
0713EA;720?! in
;4!2004,
H55IJ!provides
:/.D;?07! advanced
3?D34<0?! integration
;410C/31;.4! systems,
76710=7J! international
;410/431;.43A!
ELAMAN GmbH,
A134<6!
34?!strategic
71/310C;10<24.A.C;07! in
;4!Communications
".==>4;<31;.47! Systems,
M6710=7J! National
$31;.43A! Security,
M0<>/;16J! and
34?!
consultancy and
Defense. The
o
'080470L!
)20!highly
2;C2A6! experienced
09:0/;04<0?!international
;410/431;.43A!managers
=343C0/7! from
8/.=! different
?;880/041! sectors
70<1./7! focus
8.<>7! t1.!
:/.D;?0!120!7.A>1;.4!1.!043EA0!.>/!<>71.=0/7!1.!E0!=./[email protected]>[email protected]>;::0?!1.!410/!
provide the solution to enable our customers to be more than adequately equipped to counter
the threat of today and tomorrow.
120!12/031!.8!1.?36!34?!1.=.//.BL!!
(+*-*$!;7!3!F0/=34!E370?!3/10/7!;4!->4;<2NF0/=346L!#>/!3;=!;7!1.!
(+*-*$!;7!3!F0/[email protected]>3/10/7!;4!->4;<2NF0/=346L!#>/!3;=!;7!1.!
ELAMAN is a German based company with its headquarters
in Munich/Germany. Our aim is to
:/.D;?0!/;16!:/.?><17!34?!7.A>1;.47J!10<24;<3A!A134<6!34?!70/D;<07!37!
provide comprehensive security products and solutions, technical consultancy and services as
B0AA!37!:/.8077;.43A!1/3;4;4C!8./!.>/!<>71.=0/7!;4!(>/.:0J!120!-;??A0!(371J!%3/!(371!34?!*8/;<3L!!
well as professional training for our customers in Europe, the Middle East, Far East and Africa.
)0<24;<3A!".47>A1;4C!
• Technical
Consulting

• Professional
Audio & Video Surveillance Products
O/.8077;.43A!*>?;.!P!Q;?0.!M>/D0;AA34<0!O/.?><17!
• VQ&O!O/.10<1;.4!P!M:0I P Protection & Specialists Detection
-.4;1./;4CR!34?!)/3=!-.4;1./;4C!
• Monitoringand Tracking Systems, Spectrum Monitoring

• Counter
(Anti-) Surveillance
".>410/!T*41;RU!M>/D0;AA34<0!
M:0• Specialist
Training
&410AA;C04<0!M.81B3/0!
• Intelligence
Software
(+*-*$!;7!3!A03?0/!;4!&410/431;.43A!=3/S01;4C!34?!1/3?;4CJ!7:0ELAMAN is a leader in International marketing and trading, specializing in defense technology,
4;<31;.47!
34?!security.
70<>/;16L!Through
)2/.>C2!strategic
71/310C;:3/140/72;:7! with
B;12! many
=346! leading
A03?;4C! international
;410/431;.43A!
communications and
4;@>0!10<24.A.C6!7.A>1;.47L!!
companies, we provide Law Enforcement Agencies alike with unique technology solutions.
*4!077041;3A!0A0=041!.8!.>/!:2;A.7.:26!;7!120!4?0/7134?;4C!.8!
*4!077041;3A!0A0=041!.8!.>/!:2;A.7.:26!;7!120!
4?0/7134?;4C!.8!
An essential element of our philosophy is the conviction
that training and the understanding of
:/.?><17!34?!10<24.A.C6!3/0!;1;<3A!83<1./7!34?!=3V./!71/04C127!;4!377>/;4C!7><<0778>A!70<>/;16!
products and technology are critical factors and major strengths in assuring successful security
solutions.
7.A>1;.47L!
#>/!
D371!experience
09:0/;04<0! and
34?!services
70/D;<07! for
8./! well
B0AA! known
S4.B4! companies,
7><2! as
37! Siemens,
M;0=047J!Alcatel,
*A<310AJ!
Our vast
(/;<77.4J!W.2?0!P!M<2B3/KJ!M:0<1/.4;(/;<77.4J!W.2?0!P!M<2B3/KJ!M:0<1/.4;7!1.!234?A0!0D04!120!=.71!
7J!237!043EA0?!>7!1.!234?A0!0D04!120!=.71!
Ericsson, Rohde & Schwarz, Spectronic, and others, has enabled us to handle even the most
<23AA04C;4C!
34?!complex
/[email protected]>;/0=0417! and
34?! offer
.880/! solutions
7.A>1;.47! that
1231! meet
=001! the
120! relevant
/0A0D341! needs
400?7! of
.8!
challenging and
+3B8>A!(48./<0=041!*C04Lawful Enforcement Agencies in the Middle East, Africa and Asia.
"[email protected]>041A6J!B0!23D0!120!09:0/1;70!1.!.880/!7.A>1;.47!>7;4C!71310!.8!120!3/1!10<24.A.C6!34?!
Consequently, we have the expertise to offer solutions using state of the art technology and
4<1;.47!8./!8A3BA077!.:0/31;.4J!1/3;4;4C!34?!70/D;<07L!
comprehensive functions for flawless operation, training and services.

CONFIDENT RELATIONSHIP
(#)*+,-)%&.-/!%+#)'0+1&
".48;?041;3A;16!
;7!essential
077041;3A! in
;4! the
120! business
E>7;4077! o.8
.8!
70<>/;16L! ELAMAN
(+*-*$! can
<34! guarantee
C>3/34100! this
12;7! as
37! a3!
Confidentiality is
f ! security.
F0/=34!
34?!
<34!
8>/120/=./0!
E0!
6.>/!
7.A0!
;410/83<0!
B;12!
120!
=34>83<1>/0/7!
German company and can furthermore be your sole interface with the manufacturers o.8!
f
70<>/;16!:/.?><17!34?!70/D;<07L!(+*-*$X7!E>7;40
70<>/;16!:/.?><17!34?!70/D;<07L!(+*-*$X7!E>7;4077!3::/.3<2!;7!1.!1/031!.>/!<>71.=0/7!37!8>AA!
77!3::/.3<2!;7!1.!1/031!.>/!<>71.=0/7!37!8>AA!
security products and services. ELAMAN's business
approach is to treat our customers as full
:3/140/7!;4!3!/0A31;.472;:!B2;<2!;7!E0408;partners in a relationship which is beneficial to both parties.
)2;7!C.3A!.>1B3/?7!1.!.>/!<>71.=0/!B;AA!E0!/0:/070410?!E6Y!!
This goal outwards to our customer will be represented by:
023456&.789:;5<=>!37!-343C;4C!';/0<1./!34?!
023456&.789:;5<=>
023456&.789:;5<=>!37!-343C;4C!';/0<1./!34?!-745?&*<993!37!".47>A1341!34?!O3/140/L!
Holger Rumscheidt !37!-343C;4C!';/0<1./!34?!
as Managing Director and -745?&*<993
Eugen Fissi!37!".47>A1341!34?!O3/140/L!
as Consultant and Partner.

CONFIDENTIAL
"#$%&'($)&*+!!
"#$%&'($)&*+!

1

,

Document Path: ["312-elaman-catalogue.pdf"]

e-Highlighter

Click to send permalink to address bar, or right-click to copy permalink.

Un-highlight all Un-highlight selectionu Highlight selectionh