LOCATOR FOR DETECTING DEVICES OF UNAUTHORIZED INFORMATION COLLECTION 



 

 

 

 

 

 

PURPOSE

Locator for detecting devices of unauthorized information collection is used for detecting transceivers of unauthorized information collection by the resonance phenomenon in their antenna systems and supporting filter elements. 

The Locator includes a generating-receiving unit, broadband antenna of 0,3-3 GHz, removable handle, a set of imitators of devices for unathorised information collection, power adaptor and charger for AC network, adaptor power cable, stereo headphones, microwave and USB cables, a strap and special software for data processing (on CD).

 

APPLICATION AREA

  • during activities aimed at localizing radioñontrol devices or other operating units which have a radiocontrol channel

 

TECHNICAL CHARACTERISTICS

Parameters of the autonomous generating-receiving unit

Frequency ranges of probing signals, ÌHz                                                                                                                                               30...3000
Analysis (scanning) time within the whole range, s, no more than  3
Length of radio impulses, ns 20...1000
Adjustment ranges of output power of radiosignals (radioimpulses), dBm, no more than  10...23
Typical impulse power (standardized on the frequency of 300 ÌHz), dBm (mW)
  level 1
  level 2
  level 3
  level 4

3 (2)
13 (20)
20 (100)
24,8 (300)
Charging time (up to 80 % of inner accumulator capacity), h 2
Full-charge time (full charging of inner accumulator), h 3


Broadband antenna parameters 

Frequency range, ÌHz                                                                                                                                                                                    30...3000

 

Parameters of imitators of devices of unauthorized information collection 

Operating frequency of imitators, ÌHz                                                                                                                                               434,5; 1575; 1880; 2450
Quantity of imitators, pcs. 5
Distance of exact detection of any of these five imitators, m, no more than  1
Voltage of the power adaptor and charger for AC network, V 14...16
Duration of operation with fully charged accumulators, h 3
Size
  autonomous generating-receiving unit without strap mounting elements, mm
  broadband antenna, mm
  imitators (without antenna elements), mm

190x138x46
530x430x44
70x45x10
Power from in-built accumulator (Lilon)  

 

Operation conditions

Air temperature, ºÑ                                                                                                                                         +5...+40
Relative air humidity, %, no more than 80

 

OPERATIONAL PRINCIPLE 

The operational principle is analogous to the principle of non-linear locator. The main difference lies in the necessity to consider the possibility of missing the "target" due to the discrepancy in the polarization of the locator antenna and antenna of radiocontrol devices. In order to decrease the probability of target missing due to the antennas polarization discrepancy we would advise to change the nature of the locator antenna movement. 

The operator conducts scanning activities in a zig-zag manner. Doing this, it is important to hold antenna tilted 45 degrees away from true vertical in one scanning direction and -45 decrees when moving in the opposite direction. It is vital to maintain the distance between the antenna and the concealed environment from 0,3 to 0,5 m. 

When any device of unauthorized information collection is detected, a signal is produced. The closer the antenna gets to the detected device, the high is the tone of the signal.

 

DEVELOPER

R&D LAB 5.3 «Materials and components of electronics and superconducting equipment»

 

CONTACTS

6, P.Brovki, 220013, Minsk, Republic of Belarus
☏  +375 17 293 89 39
🖷  +375 17 293 89 39
🖂   nil53@bsuir.edu.by

 

OTHER INNOVATIONS IN THIS AREA

Speech information security device «Priboi»

Speech information security device «Priboi-R»

Electromagnetic-pulse protection device «Impulse-N»

Indoor voice data protection suit «Echo»

Detector – testing complex of computing equipment for the presence of devices of unauthorised opportunities