The OSCOR Blue is a portable spectrum analyser with a rapid sweep speed and functionality suited for detecting unknown, illegal, disruptive, and anomalous rogue transmissions across a wide frequency range. The OSCOR Blue Spectrum Analyzer is designed to detect illicit eavesdropping signals, perform site surveys for communication systems, conduct radio frequency (RF) emissions analysis, and investigate misuse of the RF spectrum.
Detailed Information: https://reiusa.net/rf-detection/oscor-blue-spectrum-analyzer/
The MESA is a portable, handheld RF receiver that detects known, unknown, illegal, disruptive, or interfering transmissions. The MESA features unsurpassed mobility and ground breaking features, not found in any other spectrum analyser. First in its class, the MESA is purpose built to locate unknown signals throughout a wide frequency range up to 6 GHz. DETECTS: RF Wi-Fi, Bluetooth, Cell phones and Illicit transmissions (Eavesdropping “Bug” Detection).
Detailed Information: https://reiusa.net/rf-detection/mesa-mobility-enhanced-spectrum-analyzer/
Advanced Near-field Detection Receiver
The A.N.D.R.E. Deluxe is a handheld broadband receiver that detects known, unknown, illegal, disruptive, or interfering transmissions. The A.N.D.R.E. Deluxe locates nearby RF, infrared, visible light, carrier current, and other types of transmitters and quickly and discretely identifies threats using its wide range of accessories specifically designed to receive transmissions across a 10 kHz to 6 GHz frequency range. Technical security specialists will appreciate the portability and responsiveness of the A.N.D.R.E. Deluxe. It is an excellent complement to an OSCOR Spectrum Analyzer/Raptor as a preliminary non-alerting tool.
Detailed Information: https://reiusa.net/rf-detection/andre-deluxe-near-field-detection-receiver/
The Raptor RXi is an ultra-fast-scanning counter-surveillance receiver for quickly detecting surveillance transmitters. The RXi scans from 10 kHz to 26GHz in under 4s, detecting even the briefest pulsed transmissions. Two spectrum analyser windows allow the user to simultaneously view the whole spectrum and zoom in on individual frequencies. The RXi is designed as a portable device, allowing reference scans to be easily run in different areas of a building. Using its built-in Ethernet port, the RXi can be operated remotely, allowing sites to be continuously monitored without the need for a site visit. The RXi is fully portable, operating either from an internal rechargeable battery or an external supply. Its integrated antenna system provides excellent wideband performance from 10 kHz to 26GHz.
Kestrel is a highly evolved TSCM specific, operator centric SDR application, with advanced capability to meet TSCM specific and evolving challenges of professional technical operators, working in the private sector, and within the national security apparatus, who are faced with a modern moving target threat model, in combating the growing threats of cyber-espionage. The Kestrel TSCM ® is not a simplistic desktop spectrum analyzer, offering limited capability, but rather, it is a highly deployable, mission scalable, travel friendly full featured TSCM focused product.
Represents a new state-of-the-art capability to rapidly and reliably detect and locate illicit wire taps on both digital and analogue telephone systems.
Provides the capability to perform multiple tests to analyse communication lines for eavesdropping devices.
Includes a built-in automatic switching matrix for testing all pair combinations. For example, if a cable has 8 conductors, there are 28 combinations of pairs to test.
Can automatically switch through all combinations, performing test functions and storing data for comparison.
Detailed Information: https://reiusa.net/telephone-line-inspection/talan-3-0/
The ORION 2.4 HX Non-Linear Junction Detector (NLJD) detects electronic semi-conductor components in walls, floors, ceilings, fixtures, furniture, containers, or other surfaces. The ORION 2.4 HX NLJD is made to detect and locate hidden cameras, microphones, and other electronic devices regardless of whether the surveillance device is radiating, hard wired, or turned off.
Detailed Information: https://reiusa.net/nljd/orion-2-4-hx-nljd/
The Bloodhound is used to detect the following types of espionage attack:
• Amplified wired microphone systems – Eavesdropper-type systems wired directly to the listening post via a twisted pair cabling system.
• Telephone Attacks – Both base band and attacks using R.F. modulation techniques.
• Radio Microphone Attacks.
• Tape Recorder Attacks.
• Video camera surveillance.
These eavesdropping devices contain audio amplifiers, the electric fields of which are detectable by the Bloodhound systems.
The camera provides white LED illumination for color inspection in dark areas (i.e. drop ceilings, behind immovable objects, around corners, other difficult to reach areas and in dark situations).
Detailed Information: https://reiusa.net/video-inspection/vpc-2-0-video-pole-camera/
The Seek ShotPRO is the most advanced thermal imaging camera for professionals. Photos and videos are analysed immediately with new on-board thermography tools. Spot measurements and temperature boxes are created for time-saving reports. Problems are precisely diagnosed with 16x higher resolution.
Mobile devices, which include smart phones and tablet computers, provide increased functionality and ease of use to people, anywhere and anytime. Smart phones are the new computers. These devices contain a tremendous amount of personal and even business information. With rapidly increasing advances in technology, everyday life is starting to depend on these wireless technologies, but it brings greater risk and some unique security threats. Mobile device malware (malicious code) has increased exponentially over the past few years. The sophistication of these exploits has also increased exponentially, making detection and eradication very difficult.
A rogue access point, also referred to as rogue AP, is any Wi-Fi access point installed on a network that is not authorized for operation on that network nor is it under management of the network administrator. Rogue access points often do not conform to wireless LAN (WLAN) security policies and, additionally, can allow anyone with a Wi-Fi device to connect to a network. These access points are usually created to allow a hacker to conduct a man-in-the-middle attack. Rogue access points pose a security threat to large organizations with many employees. This is due to the ability for anyone with access to the premises to install (maliciously or non-maliciously) an inexpensive wireless router that can potentially allow access by unauthorized parties into a secure network - while avoiding detection for extended periods of time.