Line analyser for VoIP testing

July 2017 Security Services & Risk Management, Products & Solutions

In June 2017, Eavesdropping Detection Solutions (EDS) of Centurion became the first professional TSCM company in the world to convert its Talan Telephone Analysers to the new Talan 3 model.

The Talan Version 3 offers advanced VoIP and shielded/earth/ground cable tests. The Talan Telephone and Line Analyser provides many automated tests in a single product to detect and locate illicit surveillance devices (wiretaps and electronic surveillance/eavesdropping products) on telephones, communication and other types of wiring and is the only product of its kind.

Developing technologies and growing acceptance of VoIP telephones have also brought increased opportunity for exploitation. A VoIP phone can be programmed to pass VoIP data, even when it appears inactive; for example, a VoIP phone can be compromised by someone with network access (e.g. IT personnel, hacker) and the ability to turn the microphone on and off, effectively collecting and transmitting room audio undetected.

The Talan 3.0s built-in VoIP Plus+ function performs on-board tests and analysis when connected to an Ethernet network, and determines if the packet traffic has VoIP characteristics. VoIP Plus+ differentiates data generated by a VoIP phone from other network traffic using a patent pending FFT (Fourier Free Transform) algorithm that translates signal activity form the time domain to the frequency domain. VoIP data has a unique frequency pattern that distinguishes it from other network traffic and is displayed in a frequency chart.

A new input panel on Talan 3.0 allows testing of shielded CAT6 cables, earth/ground and power over Ethernet in addition to the all original Talan’s tests. Talan 3.0 tests pairs within standard RJ45 cables, phone cables, lines, etc. against the foil shield that wraps around newer CAT5/6 cables to protect against interference and conductive coupling.

Just like before, with eight conductors cables, the Talan can also test the eight cable conductors against shielding and against an earth/ground conductor, automatically switching through each pair combination in a single pass, or continuously. The types of tests include DMM (Digital Multi-Meter – VDC, VAC, resistance, capacitance), FDR (frequency domain reflectometer), NLJD (non-linear junction detector), RF; and audio.

The Talan is an essential part of a professional TSCM service provider’s equipment kit to test VoIP and modern telephone systems.

For more information or a demonstration contact Steve Coetser, EDS, +27 (0)12 665 2109, [email protected]





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Local manufacturing is still on the rise
Hissco Editor's Choice News & Events Security Services & Risk Management
HISSCO International, Africa's largest manufacturer of security X-ray products, has recently secured a multi-continental contract to supply over 55 baggage X-ray screening systems in 10 countries.

Read more...
Detecting humans within vehicles without opening the doors
Flow Systems News & Events Security Services & Risk Management
Flow Systems has introduced its new product, which detects humans trying to hide within a vehicle, truck, or container. Vehicles will be searched once they have stopped before one of Flow Systems' access control boom barriers.

Read more...
AI camera for all-around AI solutions
Surveillance Products & Solutions
VIVOTEK has expanded its AI security business with the AI entry-tier 9383-Series network camera, a cost-effective solution that allows users to easily recognise attributes of people and cars, thereby enhancing operation and management efficiencies.

Read more...
A standards-based, app approach to risk assessments
Security Services & Risk Management News & Events
[Sponsored] Risk-IO is web-based and designed to consolidate and guide risk managers through the whole risk process. In this article, SMART Security Solutions asks Zulu Consulting to tell us more about Risk-IO and how it came to be.

Read more...
Cybercriminals embracing AI
Information Security Security Services & Risk Management
Organisations of all sizes are exploring how artificial intelligence (AI) and generative AI, in particular, can benefit their businesses. While they are still figuring out how best to use AI, cybercriminals have fully embraced it.

Read more...
Integrate digital solutions to reduce carbon footprint
Facilities & Building Management Security Services & Risk Management
As increasing emphasis is placed on the global drive towards net zero carbon emissions, virtually every industry is being challenged to lower its carbon footprint and adopt sustainable practices.

Read more...
Visualise and mitigate cyber risks
Security Services & Risk Management
SecurityHQ announced its risk and incident management capabilities for the SHQ response platform. The SHQ Response Platform acts as the emergency room, and the risk centre provides the wellness hub for all cyber security monitoring and actions.

Read more...
Powering business resilience and field operations
Infrastructure Products & Solutions
[Sponsored] The Anker 757 Portable Power Station emerges as a strategic asset for businesses looking to overcome power instability and the demand for operational efficiency in remote and field-based environments.

Read more...
Eighty percent of fraud fighters expect to deploy GenAI by 2025
Security Services & Risk Management
A global survey of anti-fraud pros by the ACFE and SAS reveals incredible GenAI enthusiasm, according to the latest anti-fraud tech study by the Association of Certified Fraud Examiners (ACFE) and SAS, but past benchmarking studies suggest a more challenging reality.

Read more...
Deception technology crucial to unmasking data theft
Information Security Security Services & Risk Management
The ‘silent theft’ of data is an increasingly prevalent cyber threat to businesses, driving the ongoing leakage of personal information in the public domain through undetected attacks that cannot even be policed by data privacy legislation.

Read more...