Sponsored By

Finding the Cell Bug in the BoardroomFinding the Cell Bug in the Boardroom

The problem of cell phone use when not appropriate or not allowed is common and probably under-reported.

Gary Audin

April 27, 2012

3 Min Read
No Jitter logo in a gray background | No Jitter

The problem of cell phone use when not appropriate or not allowed is common and probably under-reported.

Texting under the table--do you know if this is happening? That annoying cell phone tone or vibration distracting the meeting; can it be stopped? Is someone relating what is said in the meeting live to someone else? Not only are these annoying, but they could signal a privacy breach at a meeting. How often has everyone been told to turn off their cell phones but it always seems someone forgets and interrupts the meeting or conference. What you need is a cell phone detector.

There are over 5 billion registered mobile devices registered on networks worldwide. Nearly half of all cell phones now sold are smartphones with voice, video, texting, data transmission, and recording features.

The problem of cell phone use when not appropriate or not allowed is common and probably under-reported. Some examples of cell detector value are:

* Ensuring cell phones are not in use in secure enterprises and government meetings, conference rooms, and boardrooms.

* Detecting cell phones in hospital areas where they are banned, such as the ICU.

* Stopping students from using cell phones during exams to obtain answers or to provide the exam questions to others who will take the exam later.

* A juror and a judge were caught using cell phones during a trial. Cell phone use in the courtroom is usually prohibited.

* Locating cell phones that are in the possession of prisoners who want to conduct business while incarcerated or want to plan their escape.

* Ensuring privacy during meetings in law, medical, psychiatrist, and financial advisor offices.

* Stopping meeting attendees from watching video, reading e-mails, and social networking that distract them from participating and listening during the meeting.

With such a wide range of technologies to detect, discovering one cell technology is not enough. The detector should determine that 2G, 3G, and 4G cell phones are in use. The frequency bands detectable should cover both domestic and international signals from PCS, CDMA/WCDMA, UMTS, GSM and EGSM devices. If you are going to buy a detector, you need to be sure that it will detect voice, texting, video and data transmissions.

However, the distance range for cell devices can cover miles. The detection device should not detect signals beyond about 75 feet, otherwise every cell phone in the building would set off the detector. The better units measure the ambient RF signals in a room so that the detector does not give false alarms. The unit looks for RF signals that are greater than the background/ambient RF noise.

There are a few different types of detectors. There are pocket units that can be easily carried covertly into the room. These units are not visible to the people in the room, which can help find the cell phone policy offenders without their knowledge. If you want such a unit, it should have a battery life of at least 2 hours.

The second type of unit is more overt, but still is small, and can easily be located on a table, shelf or wall. The visibility of this unit may be a visual reminder that will assist in the enforcement of the no-cell policy. Both types of units range in cost from $200 to about $500.

There are many vendors of such detectors, Google "cell phone detectors" and you will find many products and distributors. You will also find news articles on the use and abuse of cell phones demonstrating the value of detectors.

About the Author

Gary Audin

Gary Audin is the President of Delphi, Inc. He has more than 40 years of computer, communications and security experience. He has planned, designed, specified, implemented and operated data, LAN and telephone networks. These have included local area, national and international networks as well as VoIP and IP convergent networks in the U.S., Canada, Europe, Australia, Asia and Caribbean. He has advised domestic and international venture capital and investment bankers in communications, VoIP, and microprocessor technologies.

For 30+ years, Gary has been an independent communications and security consultant. Beginning his career in the USAF as an R&D officer in military intelligence and data communications, Gary was decorated for his accomplishments in these areas.

Mr. Audin has been published extensively in the Business Communications Review, ACUTA Journal, Computer Weekly, Telecom Reseller, Data Communications Magazine, Infosystems, Computerworld, Computer Business News, Auerbach Publications and other magazines. He has been Keynote speaker at many user conferences and delivered many webcasts on VoIP and IP communications technologies from 2004 through 2009. He is a founder of the ANSI X.9 committee, a senior member of the IEEE, and is on the steering committee for the VoiceCon conference. Most of his articles can be found on www.webtorials.com and www.acuta.org. In addition to www.nojitter.com, he publishes technical tips at www.Searchvoip.com.