Your Cart

BH04PRO – Event Logging TSCM Detector

MAP-PRICE: $1895

BH04PRO Cyber TSCM Detector

Detection of 2/3/4 & 5G Signals

High Sensitivity up to: -70 dBm (ANT 1) -50 dBm (ANT 2)

Built in Frequency Meter – TURBO Frequency Identification

3 Operation Modes: Search, Oscillograph, Security

TSCM Detection – Live Scanning & Event Logging  in one device.

 

Add to Quote

15 YEARS IN BUSINESS

Trusted by Hundreds of clients domestically and internationally.

NO MINIMUM ORDER

What you need when you need it.

US BASED SUPPORT

Support hours:

Monday to Friday
9AM-5PM MST

SAME DAY SHIPPING IN NORTH AMERICA

Orders received by 1PM MST go out the same day for all US clients.

All Orders ship from our Head Office location in Draper, Utah

MAP PRICING

PBN-TEC adopt a strict MAP pricing policy

  • Detection of 2G/3G/4G/5G Signals
  • Detection of DECT/Bluetooth/GSM/WLAN/WIFI/GPS
  • 3 Operation Modes: Search, Oscillograph, Security
  • Background Subtraction Function
  • 4 Banks of Memory 2,000 signals per Bank
  • PDF Reporting – PC/MAC/Linux Compatible
  • Acoustic Indication
  • Probing Signal
  • Antenna 1 – Frequency Range 10-2400 GHz
  • Antenna 2 – Frequency Range 2400-8000 GHz (High Speed Channel)
  • Dynamic Range – Up to 70 db
  • High Sensitivity up to: -70 dBm (ANT 1) -50 dBm (ANT 2)
  • Built in Frequency Meter – TURBO Frequency Identification
  • Overwatch RF Monitoring Protocols – Security Mode

 

All in one Cyber TSCM Detection – Live Sweep & Event logging System

The BH04PRO Provides users with the most upto date all in one solution for performing a Professional TSCM Sweep.

Combining advanced Live Detection across the whole signal spectrum including 5G and earlier GSM frequencies.

Extremely effective tool for combatting information leakage, built to tackle sophisticated threats which utilize the internet of things – IOT.

BH04PRO has two independent search channels with separate Antennas and a built-in frequency meter which can report and identify frequencies extremely quickly.

 

Operating in Live Environments

Sometimes sterilizing an environment is not possible. In an active environment where transmissions are critical to an organizations ability to be operational, BH04 PRO can still be used by using the Background Subtraction function.

Background subtraction is important in surveys where the location may be close to something like a cell tower operating at 900 MHz, the devices’ ability to memorize and white list specific transmissions, means you can rely on the device to detect actual threats and remember authorized transmissions.

 

Detection of Burst Signals

The Internet of Things (IOT) has transformed Information Leakage and propelled a certain type of unauthorized threat into the hands of almost anyone.

Modern threats utilize WIFI or GSM connectivity, these technologies combined with audio recording capability and long battery life, ensures a threat can remain in place for months on end.

Store and forward systems can be remotely activated to transmit collected audio files.  (Burst Signals)

WIFI/GSM based unauthorized eavesdropping devices can collect data for long periods and then transmit them in just a few minutes.

 

Security Mode – Overwatch Monitoring System

TSCM Live sweeps can only be fully effective if they are conducted over a prolonged period.

Performing Event Logging on the BH04PRO is available under the Security Mode Function on the device.

Activating the Security Mode on BH04PRO and leaving it in a high value location gives security professionals the ability to monitor the radio environment for a longer period than a Live Sweep.

Performing Security Mode accounts for threats such as burst signals which may only transmit at irregular hours, to avoid detection.

 

Event Logging & Activity Reports

Users can view the activity report by connecting BH04PRO to a PC/Mac/Linux computer and generating PDF reports which can show you all frequency events occurring throughout the time the device was monitoring the location.

The report will display:

  1. Type of Frequency
  2. Time of Transmission
  3. Duration of Transmission
  4. Power level of transmission

Security Mode Activity monitoring on BH04PRO can store up to 2,000 signals per memory bank, there are 4 memory banks inside BH04PRO.

 

Live Protection for Environments which need enhanced monitoring – Overwatch Protocols

If no electronic devices are permitted in the meeting to minimize information leakage risk, BH04PRO can be placed in the meeting room and immediately report any threats that may enter the room.

Also ideal for locations where devices like Cell Phones are not permitted.

Use the BH04PRO for constant monitoring of high priority locations.

 

Advanced Functions paired with Ease of Use

BH04 is an advanced system but very easy to operate and extremely easy to transport.

The onboard Frequency counter makes it very easy to identify RF transmissions fast.

The ability to not only detect but identify the transmission gives users the maximum discoverability with super-fast detection speed.

Excellent system for live TSCM sweeping between 10 – 8GHz.

Proactive Approach to TSCM with Event Logging and Live TSCM sweeping all built into one system.

 

Specifications 

Frequency range
  • ANT1 Channel: 10 – 2400 MHz
  • ANT2 Channel: 2400 – 8000 MHz
Sensitivity of frequency meter Up to -50 dBm
Sensitivity
  • ANT1 channel: up to -70 dBm
  • ANT2 channel: up to -55 dBm
Dynamic range
  • ANT1 Channel: 70 dB
  • ANT2 Channel: 55 dB
Operation modes Search, oscillograph, protection
Power consumption Up to 0.6 W
Power 3.5 – 4.2V Li-Pol battery (could be charged by 110/220V mains or by 5V 1A power adapter)
Dimensions 130 х 80 х 16 mm (5.0 x 3.0 x 0.6 in)
Weight 200 g (7.0 oz)

 

     Contents:

  • RF signal detector PBNBH04PRO
  • Antenna 10-2400 MHz (ANT1);
  • Antenna 2400-8000 MHz (ANT2);
  • Power adapter;
  • Mini-USB cord;
  • Headphones;
  • English Manual;
  • Warranty certificate;
  • Foam Cushioned Packaging/Box.

User Groups & Pro-Tips

TSCM Professionals

TSCM Professionals use a wide range of tools which require a big investment, many TSCM systems can pose problems in instances where overseas travel is required.

Customs checks can sometimes prevent certain systems from being authorised for boarding.

TSCM Professionals also face difficulty when performing Event Logging on their clients’ high value locations.

In such instances there is a need for clients to assure a TSCM professional of the security of their device whilst left unmanned at a location, this can pose risks for both parties.

BH04PRO is relatively inexpensive in comparison to many Event Logging systems and provides TSCM professionals with a great option in relation to situations outlined above.

 

Corporate Security

Corporate Security personnel use BH04PRO to proactively monitor high value locations with an organization.

Proactive Corporate security plans provide a TSCM professional with a lot of insights when conducting live sweeps.

The ease of sharing the PDF reports ensures TSCM professionals can gain a strong understanding of the environment before they enter the location.

Corporate Security Personnel can help identify threats using BH04PRO and tracking the usage of high value locations.

 

Secure Environments

Locations such as Prisons can clearly benefit from this type of system. The small form factor and fast detection capabilities can be used in many scenarios.

Checking incoming prison inmates, checking visitors prior to visiting inmates, performing audits for unauthorized digital contraband such as cell phones, etc.

Prisons are an obvious place for this type of solution but more and more with the advancement of IOT, tools like BH04PRO can play a big part in protecting other environments such as data centers and server rooms where a rogue transmission could prove fatal to a companies data center.

 

Vehicle inspections

BH04 can be used to monitor a vehicle for burst signals such as a GPS tracker.

 

Harassment and Stalking Victims

BH04 PRO has been used by multiple victims of harassment and stalking to sniff out rogue transmissions that are capturing and reporting information on a victim’s whereabouts and activities.

 

Requirements & FAQ

Requirements:

Activity Logging can be viewed as a PDF report by connecting device to PC/MAC/Linux

FAQ

Can this TSCM Detector detect 5G signals?

Yes, this TSCM detector detects RF signals across the following frequencies:

Detection of 2G/3G/4G/5G Signals

Detection of DECT/Bluetooth/GSM/WLAN/WIFI/GPS

Which function mode do I use for Event logging?

Set the device to Security mode, ensure all transmissions are isolated or ensure you set the device to remember any transmissions which are authorized.

Leave the device in the high value location for up to 1-3 days and monitor the RF environment.

To view the report:

Plug the device into any PC/MAC/Linux Computer and generate an RF activity report automatically.

 

Can this device detect burst signals?

Yes, this device’s primary function is to detect and record RF transmissions during a TSCM sweep, the system also has advanced memory banks on board for pro-longed monitoring which can very useful for detecting a burst signal.

Is TSCM now a Cyber Security task?

Information leakage can be a concern for both cyber security and Technical Surveillance Countermeasures (TSCM).
Cyber security deals with protecting computer systems, networks, and data from unauthorized access, use, disclosure, disruption, modification, or destruction. Information leakage in the context of cyber security refers to the unauthorized disclosure of sensitive or confidential information through electronic means such as hacking, phishing, or malware attacks, any of these attacks can originate as a result of an unauthorized eaves dropping device being placed inside an organization.

TSCM is the practice of identifying and mitigating threats posed by eavesdropping devices or other forms of technical surveillance. TSCM focuses on protecting information from physical breaches, such as audio or video recording devices, hidden cameras, and wiretaps.

In summary, while information leakage can be a concern for both cyber security and TSCM, the approach to addressing it may differ depending on the source of the threat.

Cyber security focuses on protecting against electronic breaches, while TSCM focuses on physical breaches.
Whilst there is a distinction between the two types of security, the need to ensure co-operation between departments has grown exponentially because of the advancement and sophistication of unauthorized threats penetrating high value locations within organizations.

Event Logging - The Rise of Burst Signals

The Increasing Importance of Event Logging in TSCM Bug Sweeps

 

In the digital age, where technology has become an integral part of our lives, ensuring the security and confidentiality of sensitive information has become more critical than ever before.

Technical Surveillance Countermeasures (TSCM) bug sweeps, are essential for detecting and neutralizing covert eavesdropping devices that pose a significant threat to privacy and security.

Among the various techniques employed in TSCM;

Event logging, has emerged as a vital component to enhance the effectiveness and thoroughness of bug sweeps.

 

This editorial will explore why performing event logging in TSCM is now more critical than ever.

 

Evolving Threat Landscape:

 

The threat landscape has evolved rapidly in recent years, with sophisticated eavesdropping devices and surveillance techniques becoming increasingly accessible.

IOT enabled systems with WIFI and or GSM connectivity, combined with audio and video capture, are widely available.

Traditional Live TSCM sweeps focused primarily on physical inspections but many protection surveys fail to address the potential risks posed by advanced digital surveillance methods.

 

Common Reasons why Event logging May not be Performed:

 

 

  • Cost Prohibitive

Deploying Event Logging systems on site means more time on site, this increases the cost of a full sweep that factors event logging as a threat.

 

  • Expensive Event logging Systems

Traditionally, Event Logging systems were expensive kit, most TSCM specialists do not want to leave a system on site unmanned for security concerns in relation to the device.

On the other hand their clients are also reluctant to provide assurances and cover in the event a device is damaged lost or stolen, whilst onsite.

 

  • Lack of Resources 

Most event logging systems are in the price range of $7000 upto $25000.

TSCM specialists can struggle to get systems on site for many of the reasons mentioned above but also because it is not feasible for many specialists to have so many high cost systems available.

 

  • Lack of Awareness

Clients and even TSCM operatives may not be fully aware of the change in the threat landscape, Event logging is traditionally associated with Threat Level 7+ types of sweeps.

The rapid advancement of IOT enabled devices has pushed what was once considered a sophisticated threat, into a standard one, that is easily accessible and poses a threat to organizations of all sizes.

 

 

BH04PRO was designed to overcome many of the issues outlined above.

 

  • PBN-BH04 PRO is a sub $2000 system.

 

  • The Small compact system can be easily deployed on site unmanned.

 

  • The low cost of this system overcomes the risks associated with leaving kit on site and a clients concerns over the devices security whilst on site

 

  • This system being left onsite unmanned lowers the cost of the inspection and alleviates the need for a TSCM specialist to be on site while event logs are being recorded.

 

  • Specialists can deploy multiple systems in multiple client locations due to competitive cost and reduced risks, associated with this system, compared to higher cost systems

 

The Advanced Digital Threats in Sleep Mode 95% of the Time

 

What is an Advanced Digital Surveillance tool?

 

One such bugging device which utilizes a burst transmission is a Store & Forward Audio/Video recorder.

This type of system collects recordings at specific times and stores them until they are activated or remotely configured to transmit the collected data.

Used correctly, this type of eaves dropping system will be configured to transmit data at an irregular time, out of office hours, when the WIFI or GSM transmission is least likely to be detected.

Systems like this, especially audio, need only a few minutes to transmit data and these systems can normally hold hundreds of hours of file storage with long life batteries, meaning they can be concealed for months on end on a single charge.

Advanced digital surveillance tools are no longer difficult to procure, these systems can be purchased online in any country in the world.

There is no specialist company producing the majority of these threats, there are thousands of options.

By incorporating Event logging in every sweep, TSCM specialists can fully factor the potential threat of Burst signal systems as described above.

 

How do Threats penetrate an Organization?

 

Insider Threats:

Insider Threats are one of the most common reasons a security breach occurs within an organization.

The ease of access and opportunity to deploy eaves dropping devices into a companies confidential quarters is easier for someone like a disgruntled employee or even an employee working hand in hand with a companies rival.

Disgruntled employees are just one example, here is a range of threats that can occur from the inside:

 

Competitors:

Business rivals seeking to gain a competitive advantage might attempt to gather sensitive information about the company’s products, strategies, or upcoming projects.

 

Disgruntled Employees:

Current or former employees who hold grudges against the company may try to sabotage its operations or steal confidential data.

 

Industrial Spies:

Organizations or individuals, sometimes from foreign entities, looking to gain strategic or technological intelligence by infiltrating the company’s premises.

 

Cybercriminals:

Criminal groups or hackers seeking to exploit vulnerabilities in the organization’s security for financial gain or to access valuable data.

 

What can we learn from Event logging Systems like BH04PRO?

 

Digital Footprints:

In today’s interconnected world, every action leaves a digital footprint.

Event logging in TSCM involves capturing and recording various system events, including authorized and unauthorized transmissions.

These digital footprints act as a forensic trail, allowing investigators to reconstruct activities and identify any anomalies or suspicious behaviors.

By meticulously analyzing event logs, TSCM professionals can uncover hidden patterns and uncover potential security breaches that might otherwise go undetected.

 

Proactive Threat Detection:

Event logging empowers TSCM specialists to adopt a proactive approach to threat detection.

Instead of relying solely on physical inspections & reactive measures, event logs provide a continuous monitoring mechanism.

Real-time analysis of event logs enables the identification of unusual or unauthorized activities, such as unexpected network connections, and abnormal data transmissions.

By detecting potential threats in their early stages, TSCM practitioners can swiftly respond, mitigate risks, and protect sensitive information.

 

Auditing and Compliance:

Event logging plays a crucial role in maintaining compliance with regulations and industry standards.

Organizations in sectors such as finance, healthcare, or government often have strict data protection requirements.

By implementing comprehensive event logging practices, organizations can demonstrate due diligence, comply with regulatory obligations, and meet audit requirements.

Event logging monitoring & Detection serves as a valuable source of evidence in the event of a security incident or breach, facilitating investigations and supporting legal proceedings.

With an Event Logging system in place, users may be able to identify when a breach occurred.

 

Note:

Event Logging for Compliance is normally introduced as a result of a data breach event that has already occurred within an organization.

Event Logging systems provide TSCM professionals with an opportunity to become part of the ongoing threat protection plan within an organization as opposed to a reactive one.

 

PBN-BH04 PRO Introduction in North America

Since 2021 PBN-Detect has supplied over 230 Investigation Agencies with the PBN-BH04PRO Event Logging TSCM Detector.

The solution has been demonstrated at multiple industry events including TALI, CALI & SCALI and is available at many specialist security stores around the country.

 

Conclusion:

As the threat landscape continues to evolve, the inclusion of event logging in TSCM bug sweeps has become paramount.

Event logging has the ability to capture digital footprints, enable proactive threat detection, ensure compliance, and support forensic analysis, event logging offers a comprehensive, highly competitive and powerful tool for TSCM practitioners.

Embracing event logging as an integral part of TSCM protocols will enhance security measures, safeguard sensitive information, and provide organizations with the peace of mind they need in an increasingly connected world.

Datasheet

BH04PRO Datasheet

Videos