Sensors scan the frequencies used by cell phones as well as many other wireless products. Detecting - and more importantly, locating - these products helps companies and government agencies protect their assets and prevent unauthorized communication in their facilities.
Cell Hound® by ITT Exelis detects and locates all active cell phones located within or near a facility. In addition to cell phones, Cell Hound® will detect devices such as the Amazon Kindle with Whispernet or game consoles that have cellular capabilities. The system utilizes an array of sensors that listen for cell phone activity. When a cellular call is detected, information about the call is transmitted via a standard Ethernet LAN to the central server. The data is processed in real-time by the software, which then displays the location of the cell phone onto a computer monitor.
The technology is based on seven years of technology development focused on finding and locating radio frequency (RF) sources, specifically signals from cell phones.
The system scans all of the cell phone bands to detect active phone calls - both voice and data - and raises an alert when the activity is detected. The information compiled by the sensors is then used to determine the location of the cell phone.
Listed below are some situations where Cell Hound® can help your organization:
• A warden at a prison believes that inmates are somehow getting access to cell phones and other unauthorized wireless contraband. The system will pinpoint the devices when they're used, allowing security guards to confiscate the devices before the inmates can hide or dispose of them.
• A software company believes that someone within the company is sending screenshots and proprietary code to a competitor. The V.P. of Security believes that someone is using the camera on a cell phone to capture images - against company policy - and is emailing the images and code snippets to a third party. Cell Hound® will detect when the employee sends the email via the cell phone and will display the location of that cell phone so that security personnel can find and interview the employee.
A federal agency has a strict policy against cell phone use in restricted areas, but instead of searching the employees and contractors before they enter the area, the agency relies on the employees and contractors to follow the policy. Management and/or the security division can periodically review generated reports to determine if the policy is not being followed. The reports will not only indicate how many times cell phones were used, but will also provide dates and times of the usage, which security personnel may be able to match against their entry and exit logs to determine the offenders.
Cell Hound® — How It Works
Step 1: A cell phone places or receives a voice or data call.
Step 2: Sensors within receiving range of the cell phone detect the activity and record information about the cell phone. The sensors transmit the information they receive over the Ethernet LAN to the server.
Step 3: The server collects the information, compiles it, and analyzes it to determine the location of the cell phone.
Step 4: A Monitor Client running on a workstation communicates in real-time with the server and displays information from the server. The location of the cell phone and other information is displayed in the Monitor Client for security personnel to observe and act upon.
Cell Hound® — About the Sensors
The sensors are distributed throughout a facility. Each sensor is connected to the central server via a standard Ethernet LAN connection. Sensors can be powered by an integrated Power Over Ethernet (PoE) switch or by an external DC power supply.
The PoE function is integrated into the sensors, along with an Ethernet chip. The sensor has two (2) Ethernet ports – one input and one output. The output port allows for connection to another sensor, eliminating the need to run a cable all the way back to the Ethernet switch. When using the PoE function to supply power, a standard Ethernet switch can power a maximum of three (3) sensors per port in a daisy chain configuration, as defined in the IEEE 802.af standard.
Sensors measure 6.24"W x 6.24"H x 1.1"D. They come with brackets for mounting the sensor against a flat surface. An outdoor enclosure is also available for both outdoor use, or for those locations inside a facility where additional physical protection is required.
There are four ports on the sensor:
• Ethernet (2): Two standard LAN cable connections are available. One Ethernet connection is connected to the computer network, while the second connection is used to connect to the next sensor in a daisy chain configuration, if desired (see How it Works for more information).
• Expansion (1): This slot will support future development features.
• Power (1): This port is the 6 volt DC input for the sensor, if the PoE option is not used.
Cell Hound® — About the Software
Cell Hound® software provides several functions:
• Displays ongoing cell phone activity
• Views and replays videos of past activity
• Generates reports from past activity
• Long-term data retention
The software is installed on the server. The server connects to four client software programs, which can be installed on a single computer or on numerous separate computers. Each client provides a different function:
• Monitor: This client is used for day-to-day monitoring real-time and recent cell phone activity.
• Reporter: This software is used to view past activity and to generate reports and videos.
• Manager: This client is used to configure the sensors and software, set authorization levels, and perform system diagnostics.
• Dashboard: This software is used by managers and supervisors to see a high-level view of cell phone activity within a specified period of time across all work shifts.