The present invention relates to detecting unauthorised radio communications devices.
In restricted areas, radio frequency emissions from particular radio communications devices, for example mobile phones, may be unauthorised, while emissions from other devices, for example handheld radios, may be authorised. Detecting unauthorised radio activity is complicated by telecommunications and privacy laws which prohibit active interception of, or interference with, radio frequency emissions. Another problem is spurious detection of unauthorised devices due to radio frequency interference, for example harmonics, from authorised devices.
What is needed is a solution capable of detecting unauthorised radio communications devices by passively discriminating between authorised and unauthorised radio frequency emissions, as well as interference therebetween.
According to the present invention, there is provided a method for detecting unauthorised radio communications devices, the method including the steps of filtering received radio frequency signals into desired signals having a frequency band characteristic of an unauthorised radio communications device and undesired signals having a different frequency band characteristic of an authorised radio communications device, comparing respective levels of the desired and undesired signals with respective predetermined threshold levels, and generating detection signals indicative of the presence of the unauthorised radio communications device only if the desired signals exceed their predetermined threshold level and the undesired signals do not exceed their predetermined threshold level, thereby passively discriminating between the authorised and unauthorised radio communications devices, and interference therebetween.
The present invention also provides a detector for detecting unauthorised radio communications devices, the detector having at least two parallel bandpass filters for filtering received radio frequency signals, at least one of the filters passing desired signals having a frequency band characteristic of an unauthorised radio communications device and at least one other filter passing undesired signals having a different frequency band characteristic of an authorised radio communications device, the at least two filters being respectively connected to at least two threshold circuits which respectively compare received levels of the desired and undesired signals with respective predetermined threshold levels, and a logic circuit connected to the at least two threshold circuits to generate detection signals indicative of the presence of the unauthorised radio communications device only if the desired signals exceed their predetermined threshold level and the undesired signals do not exceed their predetermined threshold level, thereby passively discriminating between the authorised and unauthorised radio communications devices, and interference therebetween.
The detector can include an antenna to receive radio frequency signals. The antenna can be followed by a low noise amplifier which feeds the filters in parallel.
The logic circuit can include one or more logic gates. The logic circuit can further include a microprocessor which is programmable to selectively process the desired and undesired signals to suppress spurious detection signals.
The present invention further provides a system for detecting unauthorised radio communications devices, the system including a plurality of the above detectors each monitoring a zone of an area, a computer configured to receive signals from the plurality of detectors, and software executable by the computer to process the received signals to display detections of unauthorised radio communications devices within individual zones of the area.
The invention will be further described by way of example only with reference to the accompanying drawings, in which:
The relative sensitivity of the detector to different types of authorised and unauthorised radio communications devices and harmonics interference can be adjusted by selectively tuning the bandpass filters and/or selectively varying the threshold levels of the threshold circuits. For example, the threshold levels of the various signals can be set individually as different equipments tend to have different output powers (e.g. GSM phones typically output about 2 W as opposed to hand held radios which output about 5 W). Further, the detector installation process can include setting the sensitivity of the detectors at each band being monitored to optimise performance under local conditions so the threshold levels can be set, thus varying the effective sensitivity of the detector relative to the various bands being monitored.
Embodiments of the invention are not limited to the illustrated circuit components and radio communications devices, but can be alternatively implemented using any conventional analogue, passive radio frequency circuit components to selectively detect and suppress signals which are characteristic of any conventional devices that use any conventional radio frequency communications protocols.
The system 300 includes a plurality of client detectors 200 positioned in a plurality of locations to be monitored. The detectors 200 are communicatively connected via a wired and/or wireless network 310 to a server controller 320. The detectors 200 communicate among themselves and/or via one or more network hubs 330 to the controller 320. DC power is provided to the detectors 200 via the cabling from the network hubs 330, thereby negating the need to provide a power source at each individual detector 200. This has an advantageous impact on infrastructure requirements where a large number of detectors 200 are installed.
The controller 320 executes server software to process and display information relating to the locations, coverage areas, and detection statuses of respective detectors 200.
Embodiments of the invention are designed to passively detect the presence of activated radio communications devices in areas where such equipment is banned from use, for example, a secure building where mobile phones are banned. Embodiments of detectors consist of a set of passive radio frequency detection receivers tuned to the specific bandwidths of interest, for example, for mobile phone detection, a set of filters tuned to the relevant bands for GSM and CDMA phones. Unlike the mobile phone jamming systems used in some countries but banned in others, embodiments of the invention do not attempt to interfere with the normal operation of mobile phones, rather they set out to detect and locate any phone that is active within the area of interest. Active jamming systems can cause localised interference to third party use of the radio frequency spectrum beyond the area of interest. In the case of the telephony bands, this could be catastrophic if it interfered with an emergency call. Embodiments of the invention merely passively locate the offending device so that human intervention can be applied to stop the offending use. A further advantage of the passive nature of the embodiments of the invention is that unlike jamming systems, there is no easy way for a mobile telephone user to know whether the detection system of the invention is turned on or not, nor is there any easy way to establish the coverage of the detection system or identify any gaps in that coverage. Accordingly, circumvention of the detection system of the invention is inhibited.
Embodiments of the invention do not attempt to decode the detected radio frequency signal but merely note its presence and activate a detection message to the system server. Thus, while other detection devices seek to identify the mobile phone by number, and in some cases to decode and monitor the conversation or message being sent (which has ramifications in regards to the privacy of the individual and thereby constrains their use in many countries), embodiments of the invention do not go beyond passively locating the device.
The simplicity and low cost of embodiments of the detectors compared to more complex and intrusive alternatives makes it ideal for use in large quantities, for example, on a one detector per cell basis in a prison or remand centre. Embodiments of the detectors can be optimised to monitor any conventional radio communications frequency bands that are selectable during manufacture.
As described above, embodiments of the system generate a detection signal within milliseconds of a target communications device outputting any signal within one of the monitored bands. Thus, the system set up to monitor mobile phone activation, will detect and report the transmission activity associated with the initial log on sequence of the phone as it seeks to acquire a link to the mobile network. Embodiments of the system can be supplied as a set of network hub units capable of having up to N detectors hardwired into them. The hub unit then sends the detection as a TCP/IP signal identifying which hub it is and which detector or detectors are reporting activity. The system can be scaled modularly on a hub by hub basis to provide coverage in both small and large scale applications. All DC power can be provided at the network hubs which can then provide power to each individual detector. This is advantageous in system embodiments where large numbers of detectors are installed.
For example, the invention may be implemented in a prison in which handheld radios are authorised for prison guards, and mobile phones are unauthorised for prisoners. In this implementation, the detectors include a specific guard detection circuit to suppress spurious detections that would be triggered by presence of interference in the bands of interest generated as harmonics resulting, for example, from the use of identified radio frequency communications devices operating outside of the frequency bands of interest, such as the walkie talkie devices carried by prison guards.
Some embodiments of the invention are configured to provide a simple detection alarm while others can be configured to provide additional information such as the specific radio frequency band upon which the unauthorised device is communicating. The embodiment described uses hardwired hubs whereas alternative embodiments of the system could provide a serial network connection capability using protocols such as TCP/IP within each detector allowing the detectors to message the server individually if a suitable network infrastructure is available for direct connection to the detectors.
Embodiments of the invention are advantageous in that they:
Embodiments of the detection system software can de-conflict multiple detections (for example, caused by the use of multiple detectors relatively close together) and indicate most likely location based upon pattern of detections generated. The software can display the location as graphic or string information.
Embodiments of the system are capable of detecting various radio communications devices that use the radio frequency spectrum to send information, including Bluetooth devices, wireless LAN equipment, mobile terminals, PDAs, personal CB radio transmitters, and any other communications devices wholly or partially reliant upon radio frequency transmissions. The equipment detected depends upon the selection of filter frequencies in the detectors used. The embodiments described above assume detected frequencies are selected to detect the use of mobile telephones; however, it would be equally possible to set the filters to detect other frequencies such as equipment using wireless LAN frequencies.
Embodiments of the system can be implemented as a long-term or permanent installation in a range of sensitive environments such as correctional facilities, detention centres, holding cells, secure buildings, etc, Embodiments can be implemented by installing detectors in the area(s) required to have detection of mobile telephone usage. The detectors can be installed in a covert or an overt manner, and can be deployed and individually tuned to provide overlapping coverage for each area in frequency bands corresponding to the GSM900/1800/1900/CDMA/WCDMA/3G/UMTS mobile phone bands. Embodiments can be tuned to ignore all mobile telephone base station towers, detecting only the radio frequency energy emanating from the mobile phone handset or terminal. Additional authorised radio activity (such as handheld radios) are able to be ignored (if required) or detected also, depending on requirements. Embodiments of the detectors can be designed in such a way that even turning a mobile telephone on or off would trigger the detector—it is not necessary for the user to even attempt to initiate a voice or data call.
Example infrastructure to support a permanent system embodiment of the invention can include the following:
Embodiments can therefore become a part of a new or established network, and through TCP/IP, relay all detector detection information through the server, to the client software. The client software can provide immediate notification, call logging, time, type, fault, and map overlay views of mobile telephone activity within the deployed area. Embodiments can therefore provide a true “networked mobile telephone detection” capability. In this fashion, the system is capable of monitoring a large number of detectors over an extremely large area. Additionally, embodiments of the system can transfer information via TCP/IP thereby conferring the ability to remotely monitor unauthorised mobile telephone activity in the chosen controlled area on the other side of the world, if required.
Alternatively, embodiments of the detection system of the invention can be implemented in environments that require only temporary monitoring of mobile telephone activity. For example, portable or deployable embodiments can be used:
Deployable system embodiments can include the following:
The functionality of deployable system embodiments is generally similar to the permanent embodiments described above, but the detectors plug into one hub, which then plugs directly into a laptop, with client software only. The deployable system embodiments can be used to detect relatively small areas only, and can be restricted to using a limited number of detectors, for example, no more than ten. Such embodiments are non-intrusive, quickly deployed and provide mobile telephone activity detection in an “operational or tactical” environment.
Embodiments of the system can optionally send and process information about the level or intensity of the detected signal and the frequency band detected thereby allowing better discrimination of the location of the source of the signal.
The invention may also be implemented with detectors having the following properties.
The central systems software may also have the following functionality.
The embodiments have been described by way of example only and modifications are possible within the scope of the claims which follow.
Number | Date | Country | Kind |
---|---|---|---|
2007902548 | May 2007 | AU | national |
Filing Document | Filing Date | Country | Kind | 371c Date |
---|---|---|---|---|
PCT/AU2008/000661 | 5/12/2008 | WO | 00 | 12/21/2011 |