An End To Smartphone Sneaking?

April 6, 2012

For all of their myriad benefits, smartphones have proven to be a security nightmare in the wrong settings—chief among them, college classrooms (think test-taking), courtrooms, corporate boardrooms, and government secure facilities. In an effort to curb illegal and/or unsecure cell phone use, Berkeley Varitronics Systems recently released its PocketHound™ cell phone detector (see photo).

Boasting a 75-ft range, the PocketHound’s receiver is tuned to the RF signature of all second-generation (2G), third-generation (3G), and fourth-generation (4G) cell phones. Designed to scan for all voice, text, and data transmissions, it applies auto-thresholding technology to compare cellular measurements with the RF noise floor of the environment. Thus, the PocketHound will only be triggered by genuine cell phone use.

Once triggered, alerts can be conveyed via a choice of selectable flashing light-emitting diodes (LEDs) and/or vibrating alerts, enabling the PocketHound to be employed covertly. Smaller than a pack of playing cards, PocketHound’s internal lithium polymer battery and Univeral-Serial-Bus (USB) charging system allow for as much as two hours of continuous runtime.

Sponsored Recommendations

Getting Started with Python for VNA Automation

April 19, 2024
The video goes through the steps for starting to use Python and SCPI commands to automate Copper Mountain Technologies VNAs. The process of downloading and installing Python IDC...

Can I Use the VNA Software Without an Instrument?

April 19, 2024
Our VNA software application offers a demo mode feature, which does not require a physical VNA to use. Demo mode is easy to access and allows you to simulate the use of various...

Introduction to Copper Mountain Technologies' Multiport VNA

April 19, 2024
Modern RF applications are constantly evolving and demand increasingly sophisticated test instrumentation, perfect for a multiport VNA.

Automating Vector Network Analyzer Measurements

April 19, 2024
Copper Mountain Technology VNAs can be automated by using either of two interfaces: a COM (also known as ActiveX) interface, or a TCP (Transmission Control Protocol) socket interface...