1.4.2 Operating principle is based on measuring electric field power via broadband detector. The Prod-
uct has two independent high-sensitivity measurement channels (10-2400 MHz and 2400-8000 MHz) to cover
the entire possible frequency range where wireless "spy bugs" can be detected; a frequency counter to measure
periodic signal frequency; and the capability of identification of the most common
data transfer protocol
s
based on the special analysis algorithms and digital signal processing. The built-in TFT-display shows the in-
formation as graphs of
average and peak values, oscillograms and numerical values.
It is also possible to turn
on vibration mode indication
of exceeding the preset threshold by the average signal and vibration intensity
control. T
he demodulated sound signal is output through the built-in speaker or headphones, and the volume is
adjustable.
1.4.3 Operating modes of the Product are "Search", "Oscilloscope", "Security".
"Search" mode is used to detect and localize transmitters. In this mode the display shows graphs of
aver-
age and peak values
of measured signal strength. The bug search is performed using a visual assessment of
the current signal level. Presenting information in the form of a signal’s level change graph
on the time curve
allows users to identify the nature of the signal and the type of transmitter. For more convenient localization
of transmitting devices and information analysis, sensitivity and
scanning
adjustments are provided.
The "Oscilloscope" mode is designed to display oscillograms (real-time strength level changes) with
adjustable
scanning
. Viewing the oscillogram is convenient both for general analysis of the radio environment
and studying the nature of the signal of a particular localized transmitter to determine its type.
In "
Security" mode,
the Product
adapts to the ambient background, switching to the standby mode and
further exiting from the standby mode upon detecting new signal sources
. Logged alarm events can be set
by the user and are recorded in non-volatile memory. The Product can be connected to a PC in order to view
and analyze the alarm logbook.
2. Intended use.
2.1
Operating restrictions
.
The product should be protected from mechanical damage, shock, dirt and liquids on its surface.
2.2
Before operating
.
In order to prepare the device for operation you
need to connect receiving antennas ANT1 and ANT2,
as shown in Fig.2.
2.3 Use of the Product.
2.3.1 On and off switching of the Product
To turn the device on, press and hold button (item 8) for 2 seconds in Fig.2. When the device turns on,
you’ll see the screensaver
shown in Fig.3.
Fig.3 –
Screensaver