
BASIC CPM-700 RF PROCEDURE
15
REI
CPM-700
BASIC CPM-700 RF PROCEDURE
Surveillance devices use several means to capture information and deliver it
to a “listening post.” A ‘bug’ may transmit information using RF energy to a
listening post. Or it may send information out along ordinary power lines or
phone lines. Information may be analog (modulated onto the signal) or
digital (encoded into a series of 1’s and 0’s that will be de-coded at the
listening post).
Some of the transmission paths that may be used to steal information:
Everywhere in the world, we are surrounded by transmitted signals: Radio
and TV stations, cellular phones, and wireless networks are just a few of the
many electronic devices that use RF energy to transmit information.
The CPM-700 works by helping you to identify which signals are legitimate
signals, and which are threats to your security. To do this, you must first
establish a ‘base-line’ of signals in the ambient environment, and then use
the CPM to find signals that are threats.
Room or
telephone
wiring
‘Bugs’ using
RF transmissions
Acoustic leakage
through walls, onto
windows, and above
ceilings