Home

Awesome

Salamandra Spy Microphone Detection Tool

Salamandra is a tool to detect and locate spy microphones in closed environments. It find microphones based on the strength of the signal sent by the microphone and the amount of noise and overlapped frequencies. Based on the generated noise it can estimate how close or far away you are from the microphone.

Installation

USB SDR Device

To use Salamandra you nee to have a SDR (Software Define Radio) device. It can be any from the cheap USB devices, such as this.

rtl_power software

Salamandra needs the rtl_power software installed in your computer. To install it you can do:

If you don't have ports in your MAC, see port installation

If rtl_power was installed correctly, you should be able to run this command in any console:

rtl_test

And you should see one device detected.

Usage

Basic usage for detecting microphones

./salamandra.py 

This command will use a default threshold of 10.8, a min freq of 100Mhz, a max freq of 400Mhz and sound. You can change the default values with parameters.

Location Mode to find Hidden Microphones

Location Mode from a stored rtl_power file

./salamandra.py -t 0 -a 111 -b 113 -s -f stored.csv

To actually create the file with rtl_power, from 111MHz to 114MHz, with 4000Khz step, gain of 25, integration of 1s and capturing for 5min, you can do:

rtl_power -f 111M:114M:4000Khz -g 25 -i 1 -e 300 stored.csv

Detection Mode (deprecated now). To detect microphones in one pass.

Tips

TODO

  1. Make more clear if there is a detection or not
  2. Separate the FP by
    • Sound generation based on the length of the histogram
    • Discard the frequencies that do not look like analog audio (Equidistant freqs)
  3. Logs in file
  4. Make the execution of rtl_power in another process in the background
  5. Use silent sounds: https://blog.acolyer.org/2018/05/11/inaudible-voice-commands-the-long-range-attack-and-defense/