HOW CELL PHONE DETECTION SYSTEMS WORK



Similar documents
ReSound Unite TV FREQUENTLY ASKED QUESTIONS. Setup & Configuration. Use & Operation. Troubleshooting

H ello, I ll be demonstrating

2G vs 3G. CDMA vs GSM DEMYSTIFYING 2G VS 3G CDMA VS GSM

PURDUE UNIVERSITY IT-TELECOMMUNICATIONS CELLULAR PHONES. verizon Wireless Frequently Asked Questions

Beginners Guide to Mobile Technology

SP1790JK 900MHz Wireless Indoor/Outdoor Speakers. User Manual INTRODUCTION FEATURES IMPORTANT SAFETY INFORMATION

1. Power Light: indicates whether AC power is available to the unit. 2. DS (Downstream): indicates downstream connectivity

PiSector Land Line Auto Dial Professional Wireless Alarm System

Using your LED Plus keypad

Get started. Issue 1

10 Hidden IT Risks That Might Threaten Your Law Firm

WIRELESS ALARM SYSTEM WITH TELEPHONE AUTO DIALER

BURGLAR ALARM SYSTEMS BURGLAR ALARM SYSTEMS BURGLAR ALARM SYSTEM EURO ALARM WIRELESS BURGLAR ALARM SYSTEM OASIS

Totally Wireless Video Security

Sensory alerts and multi-alerting systems for the home

IJMIE Volume 2, Issue 5 ISSN:

Mental Health Role Plays

Improving Hospital Security with Integrated Two-way Radios

ASA Storage Room Security Town Hall Meeting, 16 February 2008

WMT-3000 Wireless Transmitter. Owner s Manual

platforms Android BlackBerry OS ios Windows Phone NOTE: apps But not all apps are safe! malware essential

PiSector GSM Cellular Wireless Alarm System

LW A. Wireless Auto Dial Alarm System. Sentry Plus User Manual By Global Gadgets

Wireless LANs vs. Wireless WANs

Wireless Alarm System. Panic Button. User s Manual. Choice ALERT. Control all sensors, accessories and remote transmitters from one location

Accessing AT&T U-verse Web Remote

Wireless LAN Concepts

How To Do a Successful RF Site Survey. Overview

Cell-Phone Silencing Alternatives

Wireless Alarm system s manual

HOME ALARM MONITORING NETWORK GOH SWEE TIAN

RIGHTS OF DEAF AND HARD OF HEARING PEOPLE AT WORK

How To Use A Gps Tracking System

WIRELESS ALARM SYSTEM WITH TELEPHONE AUTO DIALER

ADD/ADHD in the Classroom

Sermon Promise in Unexpected Places Genesis 39:1-23, September 21, 2014

Welcome to the GreatCall Family.

The phrases above are divided by their function. What is each section of language used to do?

How To Make A Multi-User Communication Efficient

Wireless Alarm System. Wireless Keypad. User s Manual. Choice ALERT. Control all sensors, accessories and remote transmitters from one location

CS263: Wireless Communications and Sensor Networks

Security System Owner s Manual

Wireless Broadband Access

User Manual CN2HK LIMITED. Complete Wireless Home Alarm Security System (CK-8806) ENG. Please read this manual before operating this product.

Chapter 3 Cellular Networks. Wireless Network and Mobile Computing Professor: Dr. Patrick D. Cerna

Using Medscribbler mobily on cellular networks

Video Camera Installation Guide

WHAT ELSE CAN YOUR HOME PHONE DO?

EDA-Z5008 & Z5020. Radio Fire Alarm System. User Manual

SwannEye HD Plug & Play Wi-Fi Security Camera Quick Start Guide Welcome! Lets get started.

Guide for Performing a Wireless Site Survey. 2.4 GHz IEEE g/802.11b/

Picture yourself in a meeting. Suppose there are a dozen people

VOICE OVER IP THAT BOOSTS BUSINESS EFFICIENCY- TEN TIPS FOR GETTING IT RIGHT

Nucleus CP810 Sound Processor and Nucleus CR110 Remote Assistant Troubleshooting Guide

THE WINNING ROULETTE SYSTEM.

Understanding Alarm Systems

DCMT-2500 Wireless Transmitter. Owner s Manual

Getting Internet Access on the Road

Wireless Home Security System Product Manual (Model #80355)

Five Mistakes People Make Reading Body Language And Five Nonverbal Signals That Send Positive Messages

WEALTH. The Great Secret of the Ages

What you should know about: Windows 7. What s changed? Why does it matter to me? Do I have to upgrade? Tim Wakeling

Expert Reference Series of White Papers. Wireless Bandwidth Not Necessarily as Advertised COURSES.

FOREIGN MATTER MANAGEMENT 36 QUESTION ASSESSMENT

Troubleshooting Slow Internet Common Causes

GSM Alarm System User Manual

Personal Assistance System Owner's Guide

RF & GPS Tracking. American Sales: 150 S. Adkins Way, Suite 100 Meridian, ID United States. European Sales: Ahventie 4a ESPOO Finland

Parking INFORMATION FOR ASSOCIATES. Advocate Christ Medical Center Advocate Hope Children s Hospital

LDG DTS-4/4R Desktop Coaxial Switch / Remote

Which local broadcast channels can I watch using the Dyle mobile TV service?

Operating Manual Version: 1.0. U.S. Patent Pending

Destiny Destiny Owners Manual

FOR MORE INFORMATION or from a non-telstra phone and say pre-paid telstra.com/ppmbb visit a telstra store or partner

INSTALLATION GUIDE ConnectLine TV Adapter Getting started

SERIES ͲΝΒΣΞ ΒΟΘΖ Swann 2013

No more nuisance phone calls! Internet Control Panel & Weblink Guide

Feel Secure Your Guide to Home Safety

HOW W I R E L E S S T E C H N O L O G Y WORKS

Introductory Concepts

We are confident you will find the PC5132-RS Wireless Receiver a unique and useful control panel enhancement.

Wireless Ethernet LAN (WLAN) General a/802.11b/802.11g FAQ

User s Guide for Polycom CX7000 Systems

AM TRANSMITTERS & RECEIVERS

Vonage Business Buyers Guide

User manual. Your best protection against theft and loss. (Android) Made for

Version 2.0. Camera Placement and Location

Average producers can easily increase their production in a larger office with more market share.

1. What is the main difference between the X3 micro and other Bluetooth headsets? 3. How does the X3 micro use the Bluetooth technology?

Hear Better With FM. Get more from everyday situations. Life is on.

Wireless Alarm System. Window/Door Sensor. User s Manual. Choice ALERT. Control all Sensors & accessories from one location

Features Phone Access Features Web Access emta Quick Reference Guide Troubleshooting Quick Reference Guide...

Rutherford County Schools Bring Your Own Device

How to Pick Best Cell Phone Company in Oakmont. A study by Oakmont PC Users Group and Oakmont Technology Forum John Hamilton & George McKinney

GSM WIRELESS DIGITAL ALARM SYSTEM USER GUIDE. Please read it carefully before installation and operation

Contents TABLE OF. List of Illustrations... IX. Preface... XV. Chapter 1: How the Burglar Breaks into Your Home... 1

User Guide VERIZON WIRELESS HOME PHONE CONNECT

Power over Ethernet (PoE) Explained

AARC-EVAC Portable Hand Held or Fixed Transmitter with SOS assist - ATX43E25 SAFETY ALERT SYSTEMS

Classroom Management Plan for the Resource Room, Grades 4 and 5. Student materials (binders, lesson books, pencils) available in crates as they enter

Transcription:

HOW CELL PHONE DETECTION SYSTEMS WORK By Robert Burchett; Certified Communications Engineer Enterprise Electronics www.cellbusted.com 22826 Mariposa Ave. Torrance CA 90502 310.534.4456 Most everyone knows how a metal detector works by now; in simple terms, you walk between the bars, the magnetometers SEND some magnetic energy to objects on your person, the item disrupts the magnetic field, the detector senses this and alerts. This is the same for detectors from $100 to $10,000 Cell Phone Detectors work exactly the opposite; they LISTEN for the radio signals that come out of the phones. This is completely different and so it is helpful to explain how to deploy them and how they can be a major part of your security procedures to do the best possible job. When in doubt CALL first! What they WILL detect upon: Hearing a phone sending a text Hearing a phone receiving a text (they respond back to the sender) Making a call Receiving a call Registering on the cellular network (more about this later) What they WON T detect upon: Power OFF: Phone is OFF (the transmitter sends nothing, so no cell phone detector can hear it) Passing by: The phone is ON and the wearer simply walks past the detector (but the phone sends nothing at that instant in time since you aren t texting or talking) and that random registration burst probably won t happen exactly at that moment either these are not metal detectors so they can t detect a phone not sending anything nearby. Nothing sent; nothing detected. Bluetooth: The detectors also won t hear Bluetooth; that is a paired communications where the device only transmits the Bluetooth energy under controlled circumstances. So if the phone is ON and their Bluetooth earpiece is paired with it and the phone doesn t ring and you do not make a call then the Bluetooth unit won t transmit; this is done to save that tiny battery inside of the earpiece. WiFi: The detectors don t hear WiFi for essentially the same reason as Bluetooth; if your facility allows you access to WiFi access points and your phone is turned ON and it is permitted to connect to the WiFi then, and only then, will your WiFi transmitter be permitted to be ON. Of course this detector will also detect the Registration burst since that phone is turned ON and we will catch it to be sure; but NOT because of the WiFi. That isn t ON until you connect to the WiFi access point which probably won t ever happen inside of a secure facility. Note that if you decide to use your phone to provide a portable hot spot to other phones in the area since you aren t permitted WiFi then the detector does pick up the cell phone signal easily. How phones register on the network and how we use this fact to catch them. Phones RANDOMLY send pings of short information bursts to the cell network to let it know where they are, request if there are voicemail messages in queue, texts waiting for them, etc. Many of the detectors on the market will not detect these VERY short bursts (about 1/10 of a second) but we do. This is good and bad here is why:

If you walk past the detector with your phone ON (as previously described) and the phone isn t talking, texting or registering then the detector won t hear it this is because the phone has a very small battery and regardless of the fact that it is a cell phone, it won t send radio signals until it needs to; if it did then the battery would go dead in an hour and that would not be useful to any of us. So: when you place the detector inside of a secure area AND then when a concealed phone registers on the network we will let you know that it happened. That is a good thing; no metal detector can do this. These bursts are not at any specific time; we see them from 2 to 5 times per hour; but no one really knows for sure we just lie in wait for them to ping and then alert you accordingly which a metal detector cannot do as you have to be exactly between the bars in order to have them work we must use each machine the correct way to get it to perform the job it was designed to do. When is registration a blessing and a curse at the same time? Cell phone text & voice calls transmitted signals are a managed signal for the most part; this means while you are moving toward a tower the system tells your phone to turn the power down. If you are moving away from it they say turn your power up. This makes your tiny battery last longer and we are all happier for it but then comes the curse part. When a phone loses sight of the cell phone network then it is no longer a managed signal and that can be induced by storage in a locker or below ground. This means that WHEN it does transmit the registration burst (and this can be quite often) the power output will be at MAXIMUM the phone has capability of. Blessing? Sure; that means we can catch them easily. Curse? Yes; that too; since cell phone signals transmit through walls and everyone knows that. When can an unmanged phone signal be a problem? Many facilities require that you put your phone in a locker at the front of the building and then the phone usually loses contact with the network. Should the phone be turned ON when in that locker some of them will begin a series of cries for help or constant registration bursting to try and acquire connectivity. This is an unmanaged call and at full power which can travel several floors or through many walls as it tries to connect; and a detector placed near it will alert on this signal constantly this is NOT a false alert, the detector is simply doing its job and informing you of the event. Be aware & use it to your advantage; not as a problem or issue to be avoided. Where else will this phenomenon occur? Suppose a phone is taken below ground level or inside of any shielded environment where it is on the person, powered up and on standby but can t connect with the network. This phone can constantly attempt to ping the network with repetitive registration bursts over and over trying to contact the system to no avail. Properly placed and monitored detectors will alert on this and inform you immediately despite the fact that no OUTSIDE signal can get in and that means the detector is doing a great job of alerting you to the event. Some facility managers ask why the detector alerts in radio dark areas and this is why. Consider that our very expensive ($5000+) metal detectors can t do this at all no matter the threat level unless you specifically walk between the bars, the fact that our highly engineered cell phone detectors WILL alert you to phones in unauthorized areas can be a major component to your security policy if properly deployed. Where to properly place the detectors for maximum effect is very important; pay close attention here to get the most out of your security detection system with the maximum policy enforcement: You can install them at the door, in front of the entrance to the secure area BUT be aware that nearby (lobby, street, etc.) phones are permitted to be used and these radio signals pass through walls we expect and demand that they do so this is no surprise. We just need to take it into account.

If you want the HIGH DETERRENT factor that our detectors are well known for then by all means place one AT the entrance but be sure to turn it down LOW on sensitivity so it doesn t just alert all day long after a while the personnel will become quite annoyed with it and either unplug it or simply ignore it completely even if it is telling you exactly what you wanted to know. This is the correct way to implement an effective security policy. Get every bit of the deterrent factor you can and then catch the ones that were missed by placing detectors INSIDE of the secure area. This will maximize the investment. Suppose you have a secure area/ part of a building/ room/ floor where phones are NOT allowed and it is below, above or adjacent to a NON-secure area where phones ARE permitted to be used (cafeteria, smoke area, restroom, hall, etc.). This creates manageable issues and must be taken into account. The way to deal with this is to put the detector as FAR away from the non-secure area (don t forget the floor above and below too!) and adjust the detector low enough to try and not hear outside of the protected area while hearing the inside this is a little difficult and here is why: How far away will they detect phones? There is no finite and specific distance that phones will be detected. This is due to the variable power output discussed previously. There are 9 steps of power up/ down that a phone will send out when under control of the network so no one knows what power setting the phones are allowed to send at PLUS: There are several FORMATS of cell phone signals and in order of the most-to-least power being transmitted they are as follows: 1. IDEN (aka: Nextel) has the most power of any digital phone signal (only until next year) 2. GSM (AT&T, T-Mobile, etc.) has the next highest power-per-bit quantity 3. CDMA (Sprint, Verizon, etc.) also known as spread spectrum has a lower power per bit 4. LTE/ HSPA and other 4 th generation (4-G) types of ultra-wide-bandwidth transmissions This means that the detectors will alert on a GSM phone when it is farther away than for example a CDMA phone if both are unmanaged (at maximum power) or managed (variable power but probably lower than full) at the moment of transmission. That makes it difficult to measure exactly where the pickup zones are, how far away we can hear it and alert the incident to you. Handheld detectors; what they do and don t do: Handheld detectors are great for certain specific applications; and, like everything, they have capabilities we employ but need to understand them to get the most from their ability. (We don t call it limitations ). The good parts: Portable, easily carried from one area to another, no requirement to be fixed Bring the detector to the area of perceived problem immediately Lower cost of ownership (they cost a lot less than fixed detectors) Hunt down a bug or surveillance device (camera, wireless mike, GPS tracker, etc.) Expect a handheld detector to pick these types up; they work and work well BUT: The bad parts: Remember that discussion on the 5 ways phones are detected? Well unless one of these is happening at the EXACT instant you walk by with your handheld detector it won t hear a phone

Sometimes people order the handheld detectors to go and search for people carrying phones against the policy; but are unhappy when they don t detect phones. People see you coming with your detector in-hand and don t send texts or talk on their phone AND if the phone isn t registering then the detector won t find them. Don t expect a handheld detector to just find phones in people s pockets for the above stated reasons; use them to find bugs, cameras & trackers that transmit at regular, scheduled intervals. Handhelds cost less because they DO less; (you get what you pay for) Less filtering inside to screen out 2-way radio signals (usually permitted inside) Smaller antenna and only 1 vs. some with multiple antennas = shorter pickup range Fewer controls to manage or fine-tune the unit to accommodate environment changes Get the most out of your security system: If you have lockers; put them under control of the guards and make sure phones are OFF Put a HIGH DETERRENT kit at the door and turn the sensitivity & volume down lower Put detectors INSIDE of the secure area(s) and post the warning signs for maximum effect Walk-test the facility inside and out of the secured areas once the detectors are placed Keep sensitivity high enough to alert but low enough to NOT detect phones outside Want to have the responders notified silently? Order the Silent Remote Option Kits EXAMPLES OF DIFFERENT TYPES OF CELL PHONE/ RF DETECTORS Handheld detectors come in different form-factors and pickup/ alert methods. Remember their capabilities and see the differences in the units shown below: Wideband Unit Class-Act Classroom Pocket Version Wideband Unit: One type of ULTRA-WIDE-BAND RF DETECTOR that is quite popular is the Wideband Detector shown. This unit picks up cameras, bugs, surveillance mikes, GPS trackers etc. that use CELLULAR to transmit out The Class Act (www.class-act.net) pocket detector is designed for covert use like in the classroom where instructors want to be alerted to student s improper use of phones. This unit is very small and alerts the wearer to the detection event by silently vibrating.

COVERT STYLE OF AIR FRESHENER MODEL 710 This unit is OFFICE FRIENDLY and wall mounts or sits on the desk in your conference/ board room environment. Comes with AC power and alkaline battery operation for portable use or where no power outlet is available. OVERT AND UNFRIENDLY POLICY-ENFORCEMENT TYPE: Model 810 on Standby Activated MODEL 810 WITH HIGH DETERRENT KIT IN STANDBY AND ACTIVATED MODES This model comes with the flashing LED illuminated sign stating Cell Phones Are NOT Allowed In This Area which informs the hearing-impaired (for ADA compliance) and also is good for quiet environments) churches, libraries, military conferences, etc. Choose this type when placing it at the ENTRANCE to a secure facility for overt policy enforcement alerting. The obvious nature of it helps your security policy to succeed. This unit is available with Silent Remote Alerting features, so call to discuss them first. This unit is also available with LAN Networking to alert to your computers desktop; call to discuss this.