Details of Equipments

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 3

The survey includes:

Radio Frequency Spectrum Analysis to detect radio transmitters broadcasting audio from the area
of the survey and surrounding areas or from the telephones in the facility;

NLJD (None liner junction detector) for the areas to locate hardwired microphones, inactive
transmitters and other non-RF and non-telephonic eavesdropping devices;

Evaluation of Non-Electronic Vulnerabilities to information gathering.

Thermal imager detection for All electrical currents create heat

1. NLJD (NON-LINER JUNCTION DETECTOR) Inspection

Each area included in the survey is inspected using a NLJD variety of methods to detect a number
of different eavesdropping attacks. The type of attack located during this phase of the survey
includes, but is not limited to:
• Hidden voice activated tape recorders, digital recorders, and minidisc recorders.
• Remotely activated radio transmitters not on at the time of the RF sweep.

• Timer activated radio transmitters not on at the time of the RF sweep.


• Infrared audio and data transmitters.
• Covert video cameras.
• Hardwired microphones using dedicated cables or connected to spare telephone
or LAN cabling.
• Intentional or coincidental paths for audio leakage from the area being inspected
into adjoining areas.
• Contact and spike microphones located in adjoining areas that are picking up
audio from the survey area.
• Vulnerability of each area to audio interception techniques from external sources
such as remote pick-up of room audio from window surfaces.

2. Spectrum Analyzer Radio Frequency Evaluation : Radio frequency sweeps are intended to
detect transmitters operating at the time of the survey.
Transmitters can be low power devices which only have to transmit far enough for their signal to
penetrate to the outside of the building to a concealed receiver or they could be stronger and
transmit several hundred yards.

In order to be certain of detecting low power devices, multiple RF sweeps are made with
overlapping detection ranges. Each area under survey was subject to independent RF sweep
which overlapped with the RF sweeps of adjoining areas.

RF sweeps were made using a software defined radio spectrum analyzer (SDR), Signal Hound
Model BB60C. The spectrum analyzer is controlled by software developed by PDTG, Inc. of
Canada. Their SPIKE system is an automated, rapid scanning system that accurately depicts the
RF spectrum in both real time and over an extended period of time. Several hundred separate
scans of the RF spectrum were made during the survey.

Frequency coverage of each RF sweep is from 9 Hz to 6 GHz. Frequency coverage up to 6


gigahertz assures detection of virtually all types of transmitters which could be deployed in a covert
manner.

A radio frequency sweep will detect the signal from any radio transmitter within the frequency
range of the test equipment. Most, but not all, eavesdropping transmitters transmit analog audio
using FM modulation. These transmitters can be identified by the demodulated audio which will be
recognizable as sound from the areas. Sufficient sound levels were produced in each area in order
to turn on voice actuated (VOX) transmitters.

3. Inspection with Thermal Imaging:

The entire office area was examined with an infrared thermal imaging camera. The camera
detects and displays images based on the amount of infrared energy being emitted. All objects
emit IR energy, based on the temperature of the object. Thermal imaging is used to locate
listening devices by finding the minute amounts of heat that they generate.

4. Video Examination with Bore Scope

To aid in the inspection, a CCD video camera and a bore scope is used. The camera is used to
view into areas that are out of the line of sight of the technician while the bore scope can be
inserted in narrow spaces for video inspections.

The CCTV camera is sensitive to energy in the infrared spectrum. It will detect and aid in the
location of infrared transmitters that may be operating in the survey area at the time of the sweep.
5. Other Aspects

The offices included in the survey were assessed for a variety of non-electronic methods by which
information can be gathered. Identification of non-electronic vulnerabilities to information gathering
includes, but is not limited to:

Document security assessments. Documents left in plain sight are briefly examined to see if they
are marked as sensitive or confidential or if their titles or subjects are obviously of a sensitive
nature. At no time, however, are the contents of the documents examined. Desks, file cabinets,
and other storage containers were checked to see if they were locked and for the adequacy of
their locks.

Document destruction machinery. We check for access to and for the type of document shredders
in the areas.

Vulnerabilities to visual surveillance. The orientation of display and presentation boards, projection
screens and the like were examined to determine if they can be viewed from locations outside of
the facility.

You might also like