Kenosha Reuse Discussion Board   >   KENOSHA, WI   >   Commercial   >   Mechanical   >   Refurbished   >   The best tscm phone bug tap detector . real security.

The best tscm phone bug tap detector . real security.


Telephone Tap / Phone Tap Intercept Detection
with Graphical User Interface & Data Logging
COMSEC C4I DSP TM US Patent 5,142,560 & Patents Pending
US Patent 5,142,560 & Patents Pending
The newest Generation technology COMSEC C4I DSP TM connects to your computer and enables you to print out a visual display of all your telephone line activity. What makes this device so unique is that it enables you to detect down-line taps - even ones originating at the Telephone Company equipment. Most eavesdropping is done by phone, and the majority of professional eavesdropping is done through unscrupulous telephone company employees doing it for some form of personal gain. The COMSEC C4I DSP TM captures and logs the telephone line activity data so you can save; archive, print, email or provide professional graphical reports to lawyers, law enforcement, or your clients if you are a counter-surveillance professional. No need to worry though. If you are moderately technically inclined and can use a computer you will be able to master the ComSec C4i.
COMSEC C4i TM U.S. Patented security products can detect electronically isolated remote extension drawn loops, which are the most sophisticated, threatening, and common type of electronic surveillance that other security devices cannot detect. Detect eavesdropping, espionage, wiretapping and surveillance that previously had been undetectable.
The COMSEC C4i TM U.S. Patented telecommunications security products create an easy to understand electronic signature fingerprint of every telephone call to enable you to detect legal and illegal telephone surveillance previously undetectable.
"Up until now it has been damn close to impossible to identify when a slave or bridge is in use. Common wiretap detectors / defeaters will not indicate such units. Even a TDR ($10,000+) will not show this type of unit if it is placed some distance from the target phone."..."We have located and tested a new countermeasures unit (Patented) that does show the presence of these taps, even if they are located as far away as the Central Office."
Intelligence Incorporated San Mateo, CA
We are concerned about the COMSEC.
The COMSEC C3I [C4i] products detect wiretapping.
U.S. Government Technology Analyst
U.S. Government Agent Houston, TX
Ameritech, Security Chief Chicago, IL
The COMSEC C3I [C4i] products detect sophisticated electronic surveillance.
"The COMSEC C3I products are the the only devices effective against CALEA technology."
* * * * * * * * * * * * * * * * * * * * *
Additional Info About Unique Privacy Threats the ComSec DSP C4i can Detect:
The ComSec DSP C4i uses the only effective method to detect high level taps performed via the telecommunication company central office or remotely via Remote Extension Drawn Loops and/or REMOBS - a built-in system whereby users can silently monitor your phone calls from many access points along the phone wire network. Read more info about these threats taken from writers on the subject:
One of the most popular telephone taps employed by all levels of the law enforcement community was developed in the last few years. This device is known as a slave unit and consists of a capacitively isolated demand-bridging tap. Physically, the slave unit is a combination of an infinity transmitter and a parallel or bridging wiretap. It is usually housed in a small, modular plastic box but can take on other configurations.
Slaves are installed across two telephone lines that are located (physically) near each other. One line is owned (or borrowed) by the operator, the other is the target's phone line. When the operator dials the number of the first line the slave will silently bridge itself across the target's line allowing the operator to hear and/or record both sides of any conversation taking place.
Slaves are used by law enforcement folks because they can easily order up a new phone line and have it appear in the same vicinity as the target's line BUT slaves can also be used by civilians who have an apartment or office in the same building as the target (because the lines will appear in the same junction box or splice board), by those clever enough to employ spare lines or place an order for a buried phone or off-premise extension close to the line to be monitored or by the folks who, for one reason or another, want to spy on someone who lives or works in the place that hosts the target line.
This latter application requires them to simply order up a new phone line that terminates in the same junction box or even runs down the spare pair of the target line.
If the two lines (the target line and the access line) don't appear in close proximity in a multiple box or in a cable, it is possible to access a spare pair by hooking an audio tone generator up to the unused wires and then follow the tone to see if the new pair appears at a terminal box or multiple box that is near the line that is to used as the access line. Another trick for civilians employing slave devices is to bury a telephone in a friendly apartment or office in the same complex as the target line, thus assuring at least one common point between the two lines respectively.
Up until now it has been damn close to impossible to identify when a slave or bridge is in use. Common wiretap detectors / defeators will not indicate such units. Even a TDR ($10,000+) will not show this type of unit if it is placed some distance from the target phone.
We have located and tested a new countermeasures unit (patented) that does show the presence of these taps, even if they are located as far away as the Central Office.
The COMSEC C3I TM [and now the C4i] is the first and only telephone line security device which can detect remote extension drawn loops - the most sophisticated, threatening, and common type of electronic surveillance that other security devices can't detect.
The COMSEC C3I TM [and C4i] is the only security device that can detect legal as well as illegal wiretapping anywhere on the local telephone line - including the Telephone Company's Central Exchange.
* Remote Observation System - REMOBS
Dial the number of a REMOBS unit. Bell is rumored to put them in the 555 information exchanges or on special access trunks (Unreachable except via blue box). A tone will then be heard for approximately 2 seconds and then silence. You must key in (in DTMF) a 2 to 5 digit access code while holding each digit down at least 1 second. If the code is not entered within 5 or 6 seconds, the REMOBS will release and must be dialed again. If the code is accepted supposedly another tone will be heard. A 7 digit subscriber phone number can then be entered (the REMOBS can only handle certain 'exchanges' which are prewired, so usually one machine cannot monitor an entire NPA). The REMOBS will then connect to the subscribers line. The listener will hear the low level idle tone as long as the monitored party is on hook.
Bell has kept the existence of REMOBS very low key. Only in 1974, Bell acknowledged that REMOBS existed. The device was first made public during hearings on "Telephone Monitoring Practices by Federal Agencies" before a subcommittee on government operations. House of Representatives, Ninety-Third Congress, June 1974.
It has since been stated by Bell that the REMOBS devices are used exclusively for monitoring Bell employees such as operators, information operators, etc., to keep tabs on their performance. (Suuureee, we're stupid).
The possible uses of REMOBS are almost as endless as the uses of the self created phone line. Imagine the ability to monitor bank lines etc, just off the top of my head I can think of these applications:
Caution if any reader should discover a REMOBS during his (or her) scanning excursions, please keep in mind the very strict federal laws regarding wiretapping and unauthorized use of private Bell property.
Fits Telephone/Data equipment via RJ-11 Jack.
***The ComSec C4i unit uses a 9 pin COM serial port adapter to connect with your PC or Laptop. If you lack a 9 pin Com Serial Port, contact us for an adapter that will enable you to connect the unit to your computer via a USB port.



The best tscm phone bug tap detector . real security.