“I’ve always been fascinated with how things work. That same curiosity that drove my early exploration has made me a relentless scientist, engineer and innovator who sees challenges as opportunities.”
Notable products include Pockethound, a tool that helps educators detect cheating in the classroom, Manta Ray cell phone detector, SentryHound cell phone detection portal and Wolfhound-Pro used by TSCM professionals worldwide to detect and locate unauthorized cell phones.
Scott Schober is a relentless scientist, engineer, and innovator.
- He is determined and follows through with every new project he begins.
- Since he was a child, he always enjoyed taking things apart and creating new things.
- Scott holds numerous patents and has developed more than 50 tools and products that protect and maintain the integrity of information security.
A Few Notable Products:
Pockethound™ is the industry’s most sensitive cell phone detector for it’s size. This award-winning*, passive receiver is no larger or heavier than a deck of cards and specifically tuned to the RF signature of common cell phones including all 2G, 3G and 4G bands.
Manta Ray™ is the answer to the growing problem of unauthorized, illegal, unsecured & contraband cell phone use in correctional facilities, government buildings, corporate environments, financial institutions, universities & law enforcement agencies.
SentryHound™ cell phone detection security portal is triggered when cell phones pass by its sensors. This type of TSCM installation is especially useful for security personnel looking to detect any cell phones as well as some weapons including knives and guns without invasive and time-consuming searches.
Wolfhound™-PRO’s award-winning*, high speed scanning receiver utilizes a multi-band DF antenna system allowing security personnel to locate nearby cell phones in either standby mode* or during active voice, text or data RF transmissions making it the perfect TSCM tool for enforcing your NO WIRELESS security policy.
Scott also collaborates with his customers to design and develop uniquely customized products for their specific security needs. To contact him about custom solutions, email firstname.lastname@example.org.