PKI Audio Surveillance Equipment Flyer

Total Page:16

File Type:pdf, Size:1020Kb

PKI Audio Surveillance Equipment Flyer AUDIO SURVEILLANCE EQUIPMENT PKI ELECTRONIC INTELLIGENCE GmbH GERMANY JAaumdimo iSnugr vSeyisltleamncs e Equipment PKI 2205 Room Transmitter Room monitoring requires a small but powerful Specifications: audio transmitter. Latest technology and • Standard frequency: UHF consequently low current consumption allows up • A 427.125 MHz to 15 hrs continuous surveillance operation. Only • B 427.475 MHz by implementation of SMT (surface mount • C 427.825 MHz technology) its extremley small dimensions • others on request could be achieved. Metal housing manufactured • RF output power: 100 mW by rotary-grinding from one metal block provides • Modulation / deviation: NFM at 5 kHz excellent emission characteristics. The placing of • Spurious suppression: better than 50 dB a bug has to happen very quickly. The PKI 2205 • Operation time: 15 hrs / 9V standard battery room transmitter with its external power supply • Microphone internal electret solves the problem, because only the external • Microphone sensitivity: -62 dB battery has to be connected and the unit is ready • Dimensions: (LxWxH) 30x16x8 mm to operate. The PKI 2205 Room Transmitter is available in standard frequencies within UHF band. VHF, SHF or spezial frequencies • This device matches PKI 2225 receiver. are available on request. PKI 2210 Telephone Transmitter If a telephone monitoring operation is on long guaranteed. The installation on the telephone line term basis or access to the target area is should be made in serial mode. Both polarities restricted then the PKI 2210 Telephone are allowed. PKI 2210 is available in standard Transmitter is the perfect solution. It is not UHF. Special frequencies on request. necessary to have direct access to the telephone set. Any location along the telephone line can be Specifications: used for monitoring. This transmitter operates • Quick and easy installation automatically, i.e. the internal off-hook detection • Designed for professional use circuit automatically switches from standby to • Automatic off hook on telephone lines activation and transmission. Only transmitting • Ideal for long term, unattended operation when a telephone conversation takes place, this • Smallest dimensions wireless bug is undetectable. The sensitivity on • Unlimited operation time the telephone line can be adjusted manually. • 5 mW output power Another advantage is its independence from • UHF frequency short-lived power supplies like batteries, so that • External antenna a continuous monitoring of the target area is • Dimensions: 24x14x8 mm • This device matches PKI 2225 receiver. PKI 2215 Stethoscope Transmitter Listening through solid structures as well as surface. The unit is absolutely suitable for through windows is an important task for professional use. The highly sensitive sensor and special operational teams. The PKI 2215 the electronic parts are integrated in a solid metal Professional Stethoscope Transmitter is the case. perfect solution for this purpose. The PKI 2215 has excellent clear audio pick-up and can be Specifications: adapted to the customer´s requirements. On • Monitoring of inaccessible rooms request PKI 2215 can be delivered with • Listening through solid structures like amplification which is adapted to the local walls and windows environment, such as wall thickness and window • Optimal audio performance characteristics. The sensitivity can be adjusted • Metal housing by a miniature trim potentiometer. This • Installation with adhensive paste adjustment also influences the frequency • UHF frequency around 427 MHz characteristic, which means that for walls the • 1 mW output power higher frequency part will be amplified, on • Standard Lithium battery windows vice versa. Additional adjustment is • 24 hours operation time possible by using different thickness of the • Dimensions 64x21x6 mm • This device matches PKI 2225 receiver. adhesive paste between sensor and pick-up Catalogues are available for download at www.pki-electronic.com 2 Copyright even of extracts by PKI ELECTRONIC Audio Surveillance Equipment Jamming Systems Production and Development PKI 2220 Universal analogue and digital receiver Special surveillance operations ask for modern • Channel capacity: 100 and first-class devices that are able to fulfil all • Sensitivity: requirements. In order to guarantee highest WFM -109 dB possible transmission and reception range, this NFM-118 dB receiver offers outstanding input sensitivities. • Audio output power: 300 mW PKI 2220 is not only an analogue receiver but • Power supply: 7,2 VDC Li-pol. also a digital receiver. PKI 2220 can be used Battery 1100 mA/h universally for all PKI transmitter, whether • Audio outlet: lineout, earphones analogue or digital. • Operation time: up to 10 hrs PKI 2220 fits in every pocket and comes with soft • Antenna: SMA-helical antenna wear programming for PC. The delivery is • Dimensions: 120 x 54 x 34 mm including charger, antenna, earplug and • Weight: 300 g instruction manual in English. A recorder • Charger: 12V, 1A connected to PKI 2220 provides entire recording. • Specials: built-in remote control transmitter Specifications: • Frequency: 400 MHz - 446 MHz • Frequency range: • Output power: 440 MHz - 470 MHz low power +10dBm 590 MHz - 650 MHz high power + 18dBm • Frequency step: • Modulation: FSK@100 kHz 5 kHz, 10 kHz, 25 kHz, 100 kHz, 500 kHz • Audio coding: non linear PCM • Modulation: WFM / NFM • Audio dynamic range compression ratio: 15 dB PKI 2225 Professional Pocket Receiver This professional pocket receiver has been • Power supply: 9V block battery developed for the reception of our various PKI • Demodulation: FM narrow band@6 kHz transmitters. With its pocket-size dimension and • Spurious suppression: better than 40 dB high input sensitivity PKI 2225 leaves nothing to • Sensitivity: better than 0,25 µV at 12dB be desired. It is powered by a common 9V block • Frequency stability: battery which allows 8 hours operating time. The better than +/- 2 ppm (0-50°C) extraordinary high input sensitivity of 0,25 µV at • Operating time: 8 hrs 12dB provides longest possible operating range • Squelch range: 0,2µV - 1,5µV between transmitter and receiver. PKI 2225 is • Antenna: 50 ohm available with digital recorder ( PKI 2105 ), with • Weight: 180 g and without loudspeaker in UHF range and 3 • Dimensions: 140 x 77 x 24 mm channels each. • Audio output-socket: headphone and recorder Specifications: • Features included: channel selector, squelch • Frequencies: UHF 370 - 430 MHz control, volume control, antenna connector • Channels: 3 PKI 2230 Digital Telephone Transmitter In many cases of observation the telephone Telephone observation is absolutely unnoticed by conversations have to be monitored. With our the calling parties. PKI 2230 such tasks can easily be done. Due to its very small size and unobtrusive appearance, Specifications: this set is absolutely suitable for professional • Frequency range: UHF band (8 channels) use. No risk of detection during critical • Modulation: GMSK observations. • Transmission speed: 125 kbit/s The digital transmission signal is created and • Output power: 15 mW - 50 mW coded in a digital pseudorandom, so that a • Supply voltage: telephone mains supply highly secured transmission is guaranteed. • Current consumption: not more than 50mA This digital telephone transmitter is installed into • Dimension: 30 x 25 x 20 mm the telephone line once and wireless digital • Weight: 100 g transmission of the telephone conversations of both partners is possible for years. If necessary, this digital telephone transmitter can be activated via radio. This also applies to the transmission power and frequency adjustment. The required • This device matches PKI 2220 receiver. power is supplied by the telephone network. Tel.: +49(0)4154 - 98 96 32 • Fax: +49(0)4154 - 740 16 • E-mail: [email protected] Copyright even of extracts by PKI ELECTRONIC 3 JAaumdimo iSnugr vSeyisltleamncs e Equipment PKI 2235 Digital Stethoscope Transmitter PKI 2235 finds its application where the human light weight and no risk of detection during ear reaches its limits. The digital stethoscope critical observation. The transmission signal is transmitter is very quickly fixed by provided created and coded in a digital pseudorandom, so mastic material. It can be attached to the wall (up that a highly secured transmission is guaranteed. to 50 cm thick), window, door frame etc. The A recorder connected to the receiver provides digital miniature receiver captures the signal entire recording. from a distance of up to 300 m. The integrated • Supply voltage: 3 V battery cell Piezo element is very high sensitive and captures Specifications: • Current consumption: not more than 15 mA acoustic oscillation on hard materials. So even • Frequency range: UHF-band (8 channels) • Dimensions: Ø 28 x 20 mm spoken word is clearly audible. • Modulation: GMSK • Weight: 80 g PKI 2235 set is designed especially for • Transmission speed: 125 kBit/s absolutely professional use only. Small sized, • Output power: 15 mW - 30 mW • This device matches PKI 2220 receiver. PKI 2240 Digital Mains transmitter This device is designed especially for absolutely Specifications: professional use only. Small-sized, light-weight • Frequency range: HF-Band (8 channels) and no risk of detection during critical • Modulation: GMSK observation. The transmission signal is created • Transmission speed: 125 kBit/s and coded in a digital pseudorandom, so that a • Audio signal frequency range: 0,3 - 6 kHz highly secured transmission is guaranteed.
Recommended publications
  • Development of Surveillance Technology and Risk of Abuse of Economic Information
    SCIENTIFIC AND TECHNOLOGICAL OPTIONS ASSESSMENT STOA DEVELOPMENT OF SURVEILLANCE TECHNOLOGY AND RISK OF ABUSE OF ECONOMIC INFORMATION Vol 1/5 Presentation and Analysis 1) Presentation of the four studies 2) Analysis: Data protection and human rights in the European Union and the role of the European Parliament. Document de travail pour le Panel STOA Luxembourg, December 1999 PE 168.184/Vol 1/5/EN Cataloguing data: Title: Vol 1/5: Présentation et analyse 1) Présentation des quatre études 2) Analyse: protection des données et Droit de l'Homme dans l'Union Européenne et rôle du Parlement Européen Workplan Ref.: EP/IV/B/STOA/98/1401 Publisher: European Parliament Directorate General for Research Directorate A The STOA Programme Author: Peggy Becker - visiting researcher Under the supervision of Dick Holdsworth Head of the STOA Team Editor: Mr Dick HOLDSWORTH, Head of STOA Unit Date: Octobre 1999 PE number: PE 168.184 Vol 1/5/EN This document is a working Document for the 'STOA Panel'. It is not an official publication of STOA. This document does not necessarily represent the views of the European Parliament C O N T E N T S Page Introduction ................................................................................................................................... 4 Part One: Presentation of the four studies 1. Study One: The state of the art in Communications Intelligence (COMINT) of automated processing for intelligence purposes of intercepted broadband multi-language leased or common carrier systems and its applicability to COMINT
    [Show full text]
  • Phone-Tapping and the Right to Privacy [Ronald Kakungulu]
    Phone-tapping & the Right to Privacy: A Comparison of the Right to Privacy in Communication in Uganda & Canada R. Kakungulu-Mayambala * Email: [email protected] Table of Contents List of Acronyms................................................................................................2 Abstract ............................................................................................................2 Key Definitions ..................................................................................................3 I. Introduction...................................................................................................4 II. Historical and Legal Conceptions of the Right to Privacy in Uganda. .................5 2.1 History of Phone tapping and Surveillance in Uganda..................................5 III Elemental aspects of the right to privacy in communication in Uganda 1995 - 2008.................................................................................................................7 3.1 The Rationale for the right to privacy in communication..............................7 3.2 Enjoyment of the right to privacy in Uganda for the period 1995 – 2008....9 IV. The Right to Privacy in Communication in Canada and lessons for Uganda.....17 4.1. The Experiences with and approaches to the Right to Privacy in Communication in Canada ............................................................................17 4.2. The Right to Privacy in Communication in Canada and Lessons for Uganda ...................................................................................................................19
    [Show full text]
  • The Supreme Court and Title Iii: Rewriting the Law of Electronic Surveillance
    Journal of Criminal Law and Criminology Volume 74 Article 1 Issue 1 Spring Spring 1983 The uprS eme Court and Title III: Rewriting the Law of Electronic Surveillance Michael Goldsmith Follow this and additional works at: https://scholarlycommons.law.northwestern.edu/jclc Part of the Criminal Law Commons, Criminology Commons, and the Criminology and Criminal Justice Commons Recommended Citation Michael Goldsmith, The uS preme Court and Title III: Rewriting the Law of Electronic Surveillance, 74 J. Crim. L. & Criminology 1 (1983) This Criminal Law is brought to you for free and open access by Northwestern University School of Law Scholarly Commons. It has been accepted for inclusion in Journal of Criminal Law and Criminology by an authorized editor of Northwestern University School of Law Scholarly Commons. 0091-4169/83/7401-1 THE JOURNAL OF CRIMINAL LAW & CRIMINOLOGY . Vol. 74, No. I Copyright © 1983 by Northwestern University School of Law P'ntdin USA. THE SUPREME COURT AND TITLE III: REWRITING THE LAW OF ELECTRONIC SURVEILLANCE MICHAEL GOLDSMITH* I. INTRODUCTION .............................................. 3 II. HISTORICAL ORIGINS OF TITLE III ...................... 7 A. THE ORIGINAL CONSTITUTIONAL FRAMEWORK: OLMSTEAD AND ITS EARLY PROGENY ................ 7 B. THE FEDERAL COMMUNICATIONS ACT OF 1934: STATUTORY PRECURSOR TO TITLE III ................ 10 C. THE REVISED CONSTITUTIONAL FRAMEWORK ........ 13 1. PreliminaqModifiations ........................... 13 2. Berger v. New York and Katz v. United States... 21 III. LEGISLATIVE DESIGN ........................................ 32 A. THE CONTEXT OF REFORM ............................ 32 B. THE MECHANICS OF REFORM .......................... 38 C. TITLE III STANDARDS ................................... 39 1. Prohibitionsand Sanctions .......................... 39 2. Prerequisitesto Lawful Surveillance .................. 41 a. Jurisdictional requirements ................... 41 b. Documentary requirements .................. 42 * Assistant Professor of Law, Vanderbilt Law School.
    [Show full text]
  • Chapter 17. Cellular Network Security
    Chapter 17 Cellular Network Security Peng Liu Pennsylvania State University Thomas F. LaPorta Pennsylvania State University Kameswari Kotapati Pennsylvania State University 1. INTRODUCTION To ensure that adversaries do not access cellular net- works and cause breakdowns, a high level of security Cellular networks are high-speed, high-capacity voice and must be maintained in cellular networks. However, data communication networks with enhanced multimedia though great efforts have been made to improve cellular and seamless roaming capabilities for supporting cellular networks in terms of support for new and innovative ser- devices. With the increase in popularity of cellular vices, greater number of subscribers, higher speed, and devices, these networks are used for more than just enter- larger bandwidth, very little has been done to update the tainment and phone calls. They have become the primary security of cellular networks. Accordingly, these networks means of communication for finance-sensitive business have become highly attractive targets to adversaries, not transactions, lifesaving emergencies, and life-/ mission- only because of their lack of security but also due to the critical services such as E-911. Today these networks ease with which these networks can be exploited to affect have become the lifeline of communications. millions of subscribers. A breakdown in a cellular network has many adverse In this chapter we analyze the security of cellular net- effects, ranging from huge economic losses due to financial works. Toward understanding the security issues in cellu- transaction disruptions; loss of life due to loss of phone calls lar networks, the rest of the chapter is organized as made to emergency workers; and communication outages follows.
    [Show full text]
  • Magazine Says NSA Is Tappiiiig Phones Telex from Britaiii
    A 14 Saturday, July 19, 1980 THE WASHINGTON POST Magazine Says NSAiS Tappiiiig Phones Telex From Britaiii •• , By • Leonard Downie Jr. tion by-Campbell of wiretappintand WsOhlriirtors Pool Foreizn Service other surveillance. `in, Britain i :and,:: E:iNDON, July 18—The British • bases its claims on unnamed sources magazine New Satesman has accused in the British and .American intelli- gence communitiesand on circum-. ' By Richard:Furno—The Washincton Post the U.S. National Security Agency of . using a secret telecOmmuniCations ' stantial evidence about the Menwith Hill station. , , ■• • rants for telephone:.tapping last year. cehier iii northern England to tap tel- : e0116ne and Telex communications • The story noted in detail the tight '. But each wirratrE; 'the contents of throughout EUrope with the help of security and • great secrecy' surround- which are kept secret, apparently cav- era the Subject of what could be a thi'llisitish government.. • communicationing the base, its spike-age' aerials, receiving satellite large ..number of . individual taps. Ve monitoring is carried out on a laige scale with the aid of computers dishes and protective domes, its. so-.Campbell has alleged that many other at,aarASI: 800-employe Menwith H111 phisticated computer and cominfinica•. wiretaps by security agencies. , are not stataion in the Yorkshire moors, ac- tionsequipment , in masslve ..concrete, covered by warrants. blockhouses and its close prnicirnity to In response to political and media cor,ding to the New Statesman, which - following. a series of New attar!: the station the largest civilian and apparent interconnection with a pressure tall relay tower in Britain's micro- • Statesman articiles by Campbell, the surveillance post maintained outside .' .
    [Show full text]
  • Case Law of the European Court of Human Rights Concerning the Protection of Personal Data
    Strasbourg, 15 November 2017 T-PD(2017)23 CASE LAW OF THE EUROPEAN COURT OF HUMAN RIGHTS CONCERNING THE PROTECTION OF PERSONAL DATA The Court’s judgments are accessible on its Internet site (http://www.echr.coe.int) CASE LAW OF THE EUROPEAN CONVENTION ON HUMAN RIGHTS CONCERNING THE PROTECTION OF PERSONAL DATA Contents JUDGMENTS OF THE EUROPEAN COURT OF HUMAN RIGHTS (PRESS RELEASES AND LEGAL SUMMARIES) 1. Eur. Court of HR, Klass and others v. Germany, judgment of 6 September 1978, application no. 5029/71. Law authorising secret services to carry out secret monitoring of communications (postal and telephone).. .................................................................................. 18 2. Eur. Court of HR, Malone v. The United Kingdom, judgment of 2 August 1984, application no. 8691/79. Interception of postal and telephone communications and release of information obtained from “metering” of telephones, both effected by or on behalf of the police within the general context of criminal investigation. .............................................. 21 3. Eur. Court of HR, Leander v. Sweden, judgment of 26 March 1987, application no. 9248/81. Use of information kept in a secret police-register when assessing a person’s suitability for employment on a post of importance for national security. ............................ 24 4. Eur. Court of HR, Gaskin v. The United Kingdom, judgment of 7 July 1989, application no. 10454/83. Refusal to grant former child in care unrestricted access to case records kept by social services……. ......................................................................................................... 27 5. Eur. Court of HR, Kruslin v. France, judgment of 24 April 1990, application no. 11801/85, and Eur. Court of HR, Huvig v. France, judgment of 24 April 1990, application no.
    [Show full text]
  • Development of Surveillance Technology and Risk of Abuse of Economic Information
    6&,(17,),&∃1∋7(&+12/2∗,&∃/237,216∃66(660(17 672∃ ∋(9(/230(172)6859(,//∃1&( 7(&+12/2∗<∃1∋5,6.2)∃%86( 2)(&2120,&,1)250∃7,21 9ΡΟ 3ΥΗςΗΘΛΡΘΘΓ∃ΘΟ∴ςΛς 3ΥΗςΗΘΛΡΘΡΙΚΗΙΡΞΥςΞΓΛΗς ∃ΘΟ∴ςΛς∋ΣΥΡΗΦΛΡΘΘΓΚΞΠΘΥΛϑΚςΛΘΚΗ(ΞΥΡΣΗΘ8ΘΛΡΘΘΓΚΗ ΥΡΟΗΡΙΚΗ(ΞΥΡΣΗΘ3ΥΟΛΠΗΘ ∋ΡΦΞΠΗΘΓΗΥΨΛΟΣΡΞΥΟΗ3ΘΗΟ672∃ /Ξ[ΗΠΕΡΞΥϑ∋ΗΦΗΠΕΗΥ 3(9ΡΟ(1 QA-ST-OA-132-EN-N &ΟΡϑΞΛΘϑΓ 7ΛΟΗ 9ΡΟ3ΥπςΗΘΛΡΘΗΘΟ∴ςΗ 3ΥπςΗΘΛΡΘΓΗςΤΞ∆ΥΗπΞΓΗς ∃ΘΟ∴ςΗΣΥΡΗΦΩΛΡΘΓΗςΓΡΘΘπΗςΗΩ∋ΥΡΛΓΗΟ+ΡΠΠΗΓΘς Ο 8ΘΛΡΘ(ΞΥΡΣπΗΘΘΗΗΥ{ΟΗΓΞ3∆ΥΟΗΠΗΘ(ΞΥΡΣπΗΘ :ΡΥΝΣΟΘ5ΗΙ (3,9%672∃ 3ΞΕΟΛςΚΗΥ (ΞΥΡΣΗΘ 3ΥΟΛΠΗΘ ∋ΛΥΗΦΡΥΗ ∗ΗΘΗΥΟΙΡΥ5ΗςΗΥΦΚ ∋ΛΥΗΦΡΥΗ ∃ 7ΚΗ672∃3ΥΡϑΥ∆ΠΠΗ ∃ΞΚΡΥ 3Ηϑϑ∴%ΗΦΝΗΥΨΛςΛΛΘϑΥΗςΗ∆ΥΦΚΗΥ 8ΘΓΗΥΚΗςΞΣΗΥΨΛςΛΡΘΡΙ∋ΛΦΝ+ΡΟΓςΖΡΥΚ +ΗΓ ΡΙΩΚΗ672∃7ΗΠ (ΓΛΡΥ0Υ ∋ΛΦΝ+2/∋6:257+ +ΗΓΡΙ672∃8ΘΛ ∋Η 2ΦΡΕΥΗ 3(ΘΞΠΕΗΥ 3(9ΡΟ(1 7ΚΛςΓΡΦΞΠΗΘΛςΖΡΥΝΛΘϑ∋ΡΦΞΠΗΘΙΡΥΚΗ672∃3ΘΗΟ,ΩΛςΘΡΘΡΙΙΛΦΛΟΣΞΕΟΛΦΛΡΘΡΙ 672∃ 7ΚΛςΓΡΦΞΠΗΘΓΡΗςΘΡΘΗΦΗςςΥΛΟ∴ΥΗΣΥΗςΗΘΚΗΨΛΗΖςΡΙΚΗ(ΞΥΡΣΗΘ3ΥΟΛΠΗΘ &217(176 3ϑΗ ,ΘΥΡΓΞΦΛΡΘ 3∆Υ2ΘΗ 3ΥΗςΗΘΛΡΘΡΙΚΗΙΡΞΥςΞΓΛΗς 6ΞΓ∴2ΘΗ 7ΚΗςΩΗΡΙΚΗ∆ΥΛΘ&ΡΠΠΞΘΛΦ∆ΛΡΘς,ΘΗΟΟΛϑΗΘΦΗ &20,17ΡΙ ∆ΞΡΠΗΓΣΥΡΦΗςςΛΘϑΙΡΥΛΘΗΟΟΛϑΗΘΦΗΣΞΥΣΡςΗςΡΙΛΘΗΥΦΗΣΗΓ ΕΥΡΓΕΘΓΠΞΟΛΟΘϑΞϑΗΟΗ∆ςΗΓΡΥΦΡΠΠΡΘΦ∆ΥΥΛΗΥς∴ςΗΠςΘΓΛς ΣΣΟΛΦΕΛΟΛ∴Ρ&20,17ΥϑΗΛΘϑΘΓςΗΟΗΦΛΡΘΛΘΦΟΞΓΛΘϑςΣΗΗΦΚ ΥΗΦΡϑΘΛΛΡΘ 6ΞΓ∴7ΖΡ (ΘΦΥ∴ΣΛΡΘΘΓΦΥ∴ΣΡς∴ςΗΠςΛΘΗΟΗΦΩΥΡΘΛΦςΞΥΨΗΛΟΟΘΦΗ∆ςΞΥΨΗ∴ΡΙ ΚΗΗΦΚΘΡΟΡϑ∴ςςΗςςΠΗΘΛςςΞΗς 6ΞΓ∴7ΚΥΗΗ 7ΚΗΟΗϑ∆ΟΛ∴ΡΙΚΗΛΘΗΥΦΗΣΛΡΘΡΙΗΟΗΦΩΥΡΘΛΦΦΡΠΠΞΘΛΦ∆ΛΡΘς ΦΡΘΦΛςΗςΞΥΨΗ∴ΡΙΚΗΣΥΛΘΦΛΣΟΟΗϑ∆ΟΛςςΞΗςΘΓΛΘςΥΞΠΗΘςΞΘΓΗΥ ΛΘΗΥΘΛΡΘΟ(ΞΥΡΣΗΘΘΓΘΛΡΘΟΟΖ 6ΞΓ∴)ΡΞΥ 7ΚΗΣΗΥΦΗΣΛΡΘΡΙΗΦΡΘΡΠΛΦΥΛςΝςΥΛςΛΘϑΙΥΡΠΚΗΣΡΗΘΛΟ ΨΞΟΘΗΥΕΛΟΛ∴ΡΙΗΟΗΦΥΡΘΛΦΦΡΠΠΗΥΦΛ∆ΟΠΗΓΛΡΛΘΗΥΦΗΣΛΡΘ 3∆Υ7ΖΡ ∃ΘΟ∴ςΛς±∋ΣΥΡΗΦΛΡΘΘΓΚΞΠΘΥΛϑΚςΛΘΚΗ(ΞΥΡΣΗΘ8ΘΛΡΘΘΓΚΗ
    [Show full text]
  • Analysis the Use and Misuse of Telephone Taps and Communications Data by Bulgarian Intelligence
    Analysis The use and misuse of telephone taps and communications data by Bulgarian intelligence Alexander Kashumov (Access to Information Program, AIP) Tzvetan Tzvetanov, Minister of Interior in the Citizens for European Development of Bulgaria (GERB) government from 2009-2013, was criticised for widespread unauthorised wiretapping after information was published in the media in 2013. Concerns surfaced following an anonymous complaint registered with the Public Prosecutor’s Office and a former minister’s outspoken allegation, in a television interview, that all GERB cabinet ministers were subject to permenant phone-tapping throughout their time in office. On 15 April 2013, the Prosecutor General told a press conference that his investigation had revealed a lack of oversight within the Internal Ministry Directorate responsible for the technical performance of phone tapping. The investigation’s report was only partly classified as secret, but neither the open nor the secret part of the report was made available to the public. The scandal widely influenced public opinion before the May 2013 parliamentary elections. The context During Bulgaria’s communist past, the secret surveillance of people by the former state security services was common practice. This included the opening of correspondence and the interception of other communications. The purpose and result of this surveillance remains “unclear.” The 1991 Constitution prohibited tracking, taking pictures and the filming or recording of individuals without their knowledge or consent, except in cases prescribed by law (Article 32, para. 2). In addition, Article 34, para. 2 of the Constitution allows interference with correspondence and other communications only when it is necessary for the detection or prevention of serious crime (punishable by imprisonment of more than five years) and when prior permission has been granted by judicial authority.
    [Show full text]
  • U.S. Department of State
    1997 Human Rights Report: Romania Page 1 of 5 The State Department web site below is a permanent electro information released prior to January 20, 2001. Please see w material released since President George W. Bush took offic This site is not updated so external links may no longer func us with any questions about finding information. NOTE: External links to other Internet sites should not be co endorsement of the views contained therein. U.S. Department of State Romania Country Report on Human Rights Practices for 1997 Released by the Bureau of Democracy, Human Rights, and Labor, January 30, 1998. ROMANIA Romania is a constitutional democracy with a multiparty, bicameral parliamentary system, a head of government (prime minister), a directly elected head of state (president), and a separate judiciary. Despite a recent reorganization of the judicial system, the executive branch exercises influence over the judiciary. The Ministry of Internal Affairs supervises the police. The national police have primary responsibility for security, but the Government may call on the army and border guard to assist the police to maintain internal order. The Romanian Intelligence Service (SRI) carries out internal intelligence functions. Elected civilian authorities exercise full control over the security forces, many of whose senior officials were replaced by the Government in 1997. Some police officers committed serious human rights abuses. Romania is a middle-income developing country in transition from a centrally planned to a market economy. In 1996 the private sector accounted for about 52 percent of gross domestic product (GDP) and employed 53.5 percent of the work force, primarily in agriculture and services.
    [Show full text]
  • IMSI-Catcher -Wikipedia Visited on 5/04/2018 Page 1 of 6
    IMSI-catcher -Wikipedia visited on 5/04/2018 Page 1 of 6 IMSI-catcher An International Mobile Subscriber Identity-catcher, or IMSI-catcher, is a telephone eavesdropping device used for intercepting mobile phone traffic and tracking location data of mobile phone users.[1] Essentially a "fake" mobile tower acting between the target mobile phone and the service provider's real towers, it is considered a man-in-the-middle (MITM) attack. The 3G wireless standard has some risk due to mutual authentication required from both the handset and the network.[2] However, sophisticated attacks may be able to downgrade 3G and LTE to non-LTE network services which do not require mutual authentication.[3] IMSI-catchers are used in the United States and other countries by law enforcement and intelligence agencies, but their use has raised significant civil liberty and privacy concerns and is strictly regulated in some countries such as under the German Strafprozessordnung (StPO / Code of Criminal Procedure).[1][4] Some countries do not even have encrypted phone data traffic (or very weak encryption), thus rendering an IMSI-catcher unnecessary. Contents Overview Functionalities Identifying an IMSI Tapping a mobile phone Universal Mobile Telecommunications System (UMTS) Disclosing facts and difficulties Detection and counter-measures See also Footnotes Further reading External links Overview A virtual base transceiver station (VBTS)[5] is a device for identifying the International Mobile Subscriber Identity (IMSI) of a nearby GSM mobile phone and intercepting its calls. It was patented[5] and first commercialized by Rohde & Schwarz in 2003. The device can be viewed as simply a modified cell tower with a malicious operator, and on 4 January 2012, the Court of Appeal of England and Wales held that the patent is invalid for obviousness.[6] https://en.wikipedia.org/wiki/IMSI-catcher 5/4/2018 IMSI-catcher -Wikipedia visited on 5/04/2018 Page 2 of 6 The GSM specification requires the handset to authenticate to the network, but does not require the network to authenticate to the handset.
    [Show full text]
  • Telephone Surveillance Chapter 3 Telephone Surveillance
    Chapter 3 Telephone Surveillance Chapter 3 Telephone Surveillance SUMMARY The public generally expects that telephone on cellular or cordless phones are not conversations are private, and that electronic clearly protected by existing statutory surveillance of telephone calls (sometimes and constitutional prohibitions on the in- known as wiretapping or eavesdropping) is ille- terception of phone calls. gal, except in very narrowly circumscribed law ● Interception of the content of phone calls enforcement and national security investiga- represents a substantial threat to civil lib- tions. But technological innovations now make erties, but also a significant benefit to in- it easier to electronically monitor both the con- vestigative authorities. This balancing is tent of phone calls and phone transactions reflected in the standards and procedures (e.g., number called, time, and place called). presently embodied in Title III for such Furthermore, the new telephone technology interception. was not envisioned when current legal protec- ● New information technologies–e.g., ad- tions were enacted, and thus the statutory pro- vanced pen registers and automatic bill- tection against telephone surveillance is weak, ing equipment—have also greatly increased ambiguous, or nonexistent. the ability to collect and access transac- tional information about telephone calls After reviewing and assessing relevant tech- (e.g., the numbers and places called). nological developments and the statutory ● Transactional information is also not framework, OTA found
    [Show full text]
  • Telephone Tapping in Bangladesh: Violation of Constitutional, Human Rights
    Legal Research On Telephone Tapping in Bangladesh: Violation of Constitutional, Human rights Course Title: Research Monograph Course Code: LAW 812 SUBMITTED BY Researcher Info Researcher ID Md. Rashedujjaman Rashed Batch: 29th (LL.M.) Department of Law 192-38-341 Daffodil International University SUPERVISED BY Mr. Md. Abu Saleh Assistant Professor, LL.M. Department of Law Daffodil International University ©Daffodil International University i DISSERTATION SUBMITTED TO DAFFODIL INTERNATIONAL IN PARTIAL FULFILLMENT OF THE REQUIREMENT FOR THE AWARD OF THE DEGREE MASTER OF LAW 2019-2020 Date of Submission: Department of Law Faculty of Humanities and Social Science Daffodil International University Dhaka, Bangladesh ©Daffodil International University ii Letter of Approval “This is to certify that the work is done "Telephone Tapping in Bangladesh: Violation of Constitutional, Human Rights" is a real work done by done by Md. Rashedujjaman Rashed, ID: 193-38-341, Batch: 29th Department of Law, Daffodil International University, done under my supervision in the partial fulfillment for the research, work is done for the fulfillment of course requirements of Law-812, 812 from the Department of law, Daffodil international University.” ………………………….... Mr. Md. Abu Saleh Assistant Professor, LL.M. Department of Law Daffodil International University ©Daffodil International University iii Declaration I am Md. Rashedujjaman Rashed, the student of LL.M., Hereby do solemnly declare that the work presented in the thesis was completed by me and has not been previously submitted to any other institution. The work I've presented does not breach any copyright. The work was performed by me and was filed in the satisfaction of this requirement for the level of the LL.M.
    [Show full text]