Proposal # xxxxxxxxxxxx. Intercept Jammer. Date:

Size: px
Start display at page:

Download "Proposal # xxxxxxxxxxxx. Intercept Jammer. Date:"

Transcription

1 Proposal # xxxxxxxxxxxx Intercept Jammer Date: Presented From: HSS Development 75 S. Broadway White Plains, NY 060 Office: New York Disclaimers: All descriptions of HSS products and systems are published for informative purposes only. Specifications may be subject to change without notice. The information furnished in this document is proprietary to HSS Development. It shall not be disclosed outside the Client for any reason without the prior written approval of HSS. This document shall not be duplicated, used, or disclosed, in whole or in part, for any purpose other than proposal evaluation. In the event of a contract award, or in connection with the submission of such information, the Client shall have the right to see or disclose this information to the extent provided in the contract. This restriction does not limit the Client s right to use data if obtained from any other source without restrictions.

2 Scope of system HSS Development Inc ( HSS ), in response to an RFI/RFQ from (known as the Purchaser ), has prepared this response for counter surveillance + Responsive Countermeasure Systems.. Introduction to HSS HSS was founded on the need to provide high-tech solutions to combat terrorist and criminal acts. HSS introduced its Electronic CounterMeasures in the early 970 s with several detection and counter surveillance technologies. HSS introduced its RF Jamming technology with the Bomb Ranger defeat systems in the mid 980s. However, HSS was no stranger to radio wave detection technology because HSS designed and built signal radio measurement telemetry in the early 980s, and signal analysis in the late 990s. HSS paved the way for test measurement equipment to solve difficult and challenging issues concerning radio frequency applications. In 200, HSS began dealing with RF Jamming technology to defeat cellular communication links in order to secure areas from electronic theft of information (voice & data). These methods of Electronic Countermeasures increased in demand to include: Detection of radio frequency surveillance equipment Defense against and unauthorized cellular eavesdropping Defeat of RF and cellular based communication monitoring at the Diplomatic, Police, SWAT level, and others.2 The Interceptor Jammer ID220 The ID220 Interceptor Jammer is used to detect unauthorized mobile monitoring systems and then initiate an electronic interference jam wave as a counter attack. This counter attack works to focus on specific bands used by intercept technologies in the region of their operation.

3 .3 Mobile Protocols & Targeted Technologies The ID220 has the ability to detect active intercept systems that operate on the following commercial protocols: 2G / GSM 3G / UMTS 4G / LTE CDMA.4 Operating Parameters The system is designed to both detect and differentiate between legitimate telecom service providers and false base station technologies. These false BTS markers are found in mobile identity grabbers such as IMSI / IMEI Catchers as well as active audio cellular intercept systems, be they tactical or stationary. Understanding how Tactical Interception works: ) For Active mobile interception systems, the surveillance technology is designed to clone or mimic regular phone networks so that the phones they target believe they are connected to a normal service provider. However, the intercept equipment is actually spoofing the phone providers mobile identifiers so that the targeted phone is unaware that it has connected to a man-in-the middle type of setup. This setup is used to listen to calls, record them, observe text messaging details, as well as collect location information of the phones. This setup can also be used to selectively block the targeted phone from having any phone service at all. 2) For Mobile Identity surveillance and tracking, IMSI Catchers are used to capture mobile phone information, used to both monitor and track a phones private details. The SIM identity can be discovered, and be used to interrogate specific phones, ignoring all random phones and focusing on specific phones. For illegal purposes, IMSI Catchers are both a threat and an infraction on privacy.

4 .5 Intercept Jammer Users The Intercept Jammer secures sensitive and secret communications of an organization, as well as protects the users from being tracked. Once a system has been deployed, it can provide a layer of security for: High Level Embassy & Consulate users Military Command users Diplomatic Attaches Law Enforcement users Anti-Crime task force teams Political organizational command.6 Multi-Setup Option The Intercept Jammer can be placed at the workplace for those it protects. It can also employ a remote sensor technology to expand the area of operation. This means if a user has a secondary office, or a residence, and there is internet at that area, then this remote front end can operate outside of the range of the primary core system. and sensitive and secret communications of an organization, as well as protects the The solution generally requires a custom installation, and can be provided in the following stages: Stage : Creating a Cell Plan Stage 2: Deploying a system Stage 3: Expanding the range Stage : Creating a Cell Plan The Cell Plan involves a mobile network survey (Site Survey) of the area for primary use. If the area is in an embassy, then that area around that embassy is assessed. Readings are taken of the existing network activities, with a focus on strong and weak Radio Access Technologies in use, at different times of the day. Once the data has been assessed, a site map will be generated, consisting of data pertinent to the system operation in that area. Stage 2: Deploying a system Once the results of the Cell Plan survey have been collected, the data will then clarify how the system should be installed. Factors will take into account: - Range to mobile masts - Density of mobile traffic over time - Building size where the system will be installed - Optional network requirements for multiple front ends to operate by - Optional locations to keep in touch with the core system, should the user require more than just a single system at one location, as well as networking requirements.

5 Stage 3: Expanding the range The performance of a system can work in a single location, or in multiple locations. For a multi-location installation, the Intercept Detection application can be configured to work by itself, or within a network of multiple end points. These endpoints can be setup to send alerting data to the central unit (core system), which then alerts and logs all detection activities. It has software that can show the user who would connect via laptop or desktop PC, indicating surveillance attempts..7 System Build The Intercept Jammer comes in several configurations, to be used to accomplish the goals of detecting and blocking illegal interceptors. # : The Survey kit: The Survey Kit is an advanced platform used to perform the initial site survey. It scans the Radio Access Technologies in the area, analyzing 2G, 3G and 4G protocols simultaneously (it can observe network parameters of up to four phone net work providers simultaneously). The information it acquires is then able to calibrate the Detection System. The Survey Kit also collects information concerning mobile phone coverage attributes (which are range driven) for each area of system use. The Survey Kit identifies networks with optimal parameters (that phones will gravitate toward) based on network signal strength, as well as other information about the phone's relationship with the towers at that location. # 2: The Intercept Detector: The Intercept Detector scans the local area for all mobile phone network activities. It analyzes both organic service provider characteristics as well as suspicious traces of radio technologies commonly found in active mobile phone interceptors and IMSI Catchers. It compares what it finds and is able to recognize when a technology it has discovered is not supposed to be in operation, namely covertly capturing mobile phone calls as well as mobile identities. It can also identify when a phone is being jammed down from UMTS to GSM. The Intercept Detector then alerts the system operator. The operator is able to look at these alerts, see where they are in relationship to his system, and decide how to proceed. # 3: The Intercept Jammer: The Intercept Jammer is the 3rd part of the system that enables the system operator to jam these types of threats as they attempt to conduct surveillance close-by. Jamming involves a full force radiation of RF interference to attack the protocols emanating from ARFCN on 2G, UARFCN on 3G or EARFCN on 4G LTE. This attack is in essence a denial of service attack on the non-telecom base station (BTS) being used to illegally monitor mobile phones.

6 2.0 Project Management: Actions + Timing The following gives a breakdown of the me required to ac on the recommended proposal. Task Dura on (Days) Notes Personaliza on and apply customer specific requirements 3 Ini al scan of neighborhood / areas of interest An es mate of the me required to personalize it to the customer s requirements. Analysis of data obtained from ini al scan and crea on of report for recommenda on of installa on sites: Analysis and tes ng regional network data Installa on of government building system units and Central Control Centre so ware Installa on of residence buildings system units. Op onal There may be in country and specific network anomalies that may require accommoda ng a er analysis. This assumes there is an available LAN/Wi Fi network available. It also assumes there is a server with required networking so ware etc. already installed. This can be provided if necessary These would be standalone units but could report back to the Central Control Centre if required Tes ng and customer sign off Total 8 2. Project Management: Hardware + Software Costs Task Intercept Jammer Intercept Jammer year Support Total Number of Units Cost per Unit Cost per Unit (Total) Notes

7 3.0 Recommendations Although not covered by this initial proposal, the following are recommended to provide a complete, city wide Cellular Network Protection against IMSI Grabbers, Fake Base Stations, Fake Networks and Interception of Mobile Communications. Ongoing Cellular Network Analysis: It is suggested the Intercept Jammer be mounted in law enforcement and other government vehicles. Not only would these help to protect the occupiers of the vehicles communications, but they would also provide a means of continually monitoring and analysis of the cities communications. Endpoint Remote Units: These endpoint units are smaller, with network capabilities to pair / remote access via the user s mobile phone via Bluetooth when in detection mode. They enable the user to have a portable unit that they can carry with them to alert them of any anomalies in the network range, which could be evidence of attempts to IMSI Grab or intercept a phone.

8 From: HSS Development 75 South Broadway, White Plains, NY. 060 Tel: Date Quotation # Valid To F.O.B Terms Qty Item Description Unit Price (US Dollars) Extended Price (US Dollars) ID220 Interceptor Jammer Installation Service Year of Service (maintenance) Subtotal Shipping Total Amount Due

2018 HSS Development

2018 HSS Development Communications Intelligence - Mobile Collection - Situational Awareness - Tracking Identities Electronic Warfare - RF Jamming - Programmable Applications Prison Solutions - Managed Access - Denial of Service

More information

Advanced Cell / RF / Drone Detection & Countermeasure New Distributor Program

Advanced Cell / RF / Drone Detection & Countermeasure New Distributor Program Advanced Cell / RF / Drone Detection & Countermeasure New Distributor Program RF Detection Kit: HSS is offering a professional Detection Solution with a portable training & presentation package. 1) Vendors

More information

Presen ng the Early Warning Systems: MicroMesh + GlobalMesh

Presen ng the Early Warning Systems: MicroMesh + GlobalMesh Presen ng the Early Warning Systems: MicroMesh + GlobalMesh RF Detection: A Technology Brief concerning the detection of Drones Above + Phones Below, and everything in-between HSS Development 2 The Early

More information

CENTAURS. Tactical Cellular & RF Jamming System System Overview. Prosescan S.A. Madrid CIF: A Web-Site:

CENTAURS. Tactical Cellular & RF Jamming System System Overview. Prosescan S.A. Madrid CIF: A Web-Site: CENTAURS Tactical Cellular & RF Jamming System System Overview Index i. General Description of the System ii. System components iii. Cellular Jamming iv. Wideband Responsive Jamming v. IMSI Catcher vi.

More information

Sandboxing Wireless/RF Vulnerability Research of Connected Systems

Sandboxing Wireless/RF Vulnerability Research of Connected Systems 1 Sandboxing Wireless/RF Vulnerability Research of Connected Systems Michael Calabro 5 October 2016 33rd Annual International Test and Evaluation Symposium Outline What is Wireless Motivating Wireless

More information

CELL PHONE JAMMERS. By Priyanjali (472) A.Divya (466) SPHOORTHY ENGINEERING COLLEGE

CELL PHONE JAMMERS. By Priyanjali (472) A.Divya (466) SPHOORTHY ENGINEERING COLLEGE CELL PHONE JAMMERS By Priyanjali (472) A.Divya (466) SPHOORTHY ENGINEERING COLLEGE CONTENTS What is Jammer? Size of Jammer Why Jammers are used? How Jammer works? What inside the Jammer? Applications of

More information

UNCLASSIFIED//FOR OFFICIAL USE ONLY (U) Table of Contents UNCLASSIFIED//FOR OFFICIAL USE ONLY

UNCLASSIFIED//FOR OFFICIAL USE ONLY (U) Table of Contents UNCLASSIFIED//FOR OFFICIAL USE ONLY Neutralization Land (U) Table of Contents HSS Development MJ5 Modular High Power Jammer MS6 Series Cell Phone Jammers SJ-5000 Stadium Jammers VIP-200M DDS VIP-200M, VIP-200M (2-cont) VIP-250 VIP-256 PC

More information

NATecS 2017 May, 16 th 17 th. Presentation #22 Opportunities for SDR

NATecS 2017 May, 16 th 17 th. Presentation #22 Opportunities for SDR Sales NATecS 2017 May, 16 th 17 th Presentation #22 Opportunities for SDR slide 1 l 2017 N.A.T. GmbH l All trademarks and logos are property of their respective holders Agenda Definition of SDR Levels

More information

Real-Time Spectrum Monitoring System Provides Superior Detection And Location Of Suspicious RF Traffic

Real-Time Spectrum Monitoring System Provides Superior Detection And Location Of Suspicious RF Traffic Real-Time Spectrum Monitoring System Provides Superior Detection And Location Of Suspicious RF Traffic By Malcolm Levy, Vice President, Americas, CRFS Inc., California INTRODUCTION TO RF SPECTRUM MONITORING

More information

Wireless systems. includes issues of

Wireless systems. includes issues of Wireless systems includes issues of hardware processors, storage, peripherals, networks,... representation of information, analog vs. digital, bits & bytes software applications, operating system organization

More information

Phantom Dome - Advanced Drone Detection and jamming system

Phantom Dome - Advanced Drone Detection and jamming system Phantom Dome - Advanced Drone Detection and jamming system *Picture for illustration only 1 1. The emanating threat of drones In recent years the threat of drones has become increasingly vivid to many

More information

Improving Performance through Superior Innovative Antenna Technologies

Improving Performance through Superior Innovative Antenna Technologies Improving Performance through Superior Innovative Antenna Technologies INTRODUCTION: Cell phones have evolved into smart devices and it is these smart devices that have become such a dangerous weapon of

More information

Solutions to Prevent Cell Phone Use in Prisons

Solutions to Prevent Cell Phone Use in Prisons Solutions to Prevent Cell Phone Use in Prisons Submitted to: By HSS Development, Inc. Contact: info@secintel.com www.secintel.com www.prisonjammer.com 2012 2018 HSS Development Inc 1 Index Project Description...3

More information

BHE BONN HUNGARY ELECTRONICS LTD.

BHE BONN HUNGARY ELECTRONICS LTD. WWW.BHE-MW.EU www.bhe-mw.eu 2 TACTICAL RADIO COMMUNICATION NETWORK SPECIAL SERVICES AEROSTAT OBSERVATION SYSTEM R&D CAPABILITIES DEVICES FOR COUNTERMEASURE DEVICES & COMPONENTS www.bhe-mw.eu 3 WELCOME

More information

Spectrum Monitoring and Geolocation Systems

Spectrum Monitoring and Geolocation Systems Spectrum Monitoring and Geolocation Systems CRFS Ltd An overview of contemporary radio spectrum monitoring practice and the sensor and geolocation technologies to meet the emerging challenges White Paper:

More information

GSM Interceptor Fast and reliable interception of GSM traffic

GSM Interceptor Fast and reliable interception of GSM traffic GSM Interceptor Fast and reliable interception of GSM traffic Maximum accuracy, sensitivity and flexibility Total indefectibility Support for all frequency bands User-friendly operation Wide range of antennas

More information

Current Systems. 1 of 6

Current Systems. 1 of 6 Current Systems Overview Radio communications within the State of California s adult correctional institutions are vital to the daily safety and security of the institution, staff, inmates, visitors, and

More information

icsa Integrated Communications and Situational Awareness

icsa Integrated Communications and Situational Awareness icsa Integrated Communications and Situational Awareness The world we live in Governments need affordable state of the art solutions The current world demands a Military and First Responder service that

More information

CellAntenna.

CellAntenna. CellAntenna www.cellantenna.com Good News! CellAntenna. COMPLETE SOLUTIONS for all your communication problems Public Safety Solutions Cell Phone Signal Repeater Kits Nothing scares first responder s more

More information

Department of Electronics & Communication Engin. Cell Phone Jammer. P.V.D.Satya murthy (08MR1A0441)

Department of Electronics & Communication Engin. Cell Phone Jammer. P.V.D.Satya murthy (08MR1A0441) Department of Electronics & Communication Engin Cell Phone Jammer By P.V.D.Satya murthy (08MR1A0441) 1 Contents Introduction How Cell Phone Jammer Works Types of Jamming techniques Design Parameters/ Specification

More information

Formation and Cooperation for SWARMed Intelligent Robots

Formation and Cooperation for SWARMed Intelligent Robots Formation and Cooperation for SWARMed Intelligent Robots Wei Cao 1 Yanqing Gao 2 Jason Robert Mace 3 (West Virginia University 1 University of Arizona 2 Energy Corp. of America 3 ) Abstract This article

More information

PROFILON SD Protection against Eavesdropping. Full Spectrum Window Protection

PROFILON SD Protection against Eavesdropping. Full Spectrum Window Protection PROFILON SD Protection against Eavesdropping Full Spectrum Window Protection Problem: All electronics radiate energy called Signals Leakage through windows and can easily be intercepted Bucket = Office

More information

BE HEARD ON THE FRONT LINE

BE HEARD ON THE FRONT LINE BE HEARD ON THE FRONT LINE DEFENCE SOLUTIONS Unable To Talk Across Comms Devices Tactical operations require the flexibility for troops to communicate from remote locations, while on foot and in vehicles.

More information

Experience with Radio Navigation Satellite Service (RNSS)

Experience with Radio Navigation Satellite Service (RNSS) Experience with Radio Navigation Satellite Service (RNSS) International Satellite Communication Symposium International Telecommunication Union (ITU) Geneva, 13-14 June 2016 MITOME, Takahiro Co-Chair of

More information

VIP-300U TRANSPORTABLE RF JAMMER

VIP-300U TRANSPORTABLE RF JAMMER VIP-300U TRANSPORTABLE RF JAMMER The Transportable RF Jammer model VIP300U uses a proprietary barrage jamming method to defeat remote controlled improvised explosive devices. It works by sending out RF

More information

TACOT Project. Trusted multi Application receiver for Trucks. Bordeaux, 4 June 2014

TACOT Project. Trusted multi Application receiver for Trucks. Bordeaux, 4 June 2014 TACOT Project Trusted multi Application receiver for Trucks Bordeaux, 4 June 2014 Agenda TACOT Context & Solution Technical developments Test & Validation results Conclusions GNSS ease our lives GNSS is

More information

Homeland Security Strategies GB Ltd. VIP-400 Series. Wide Band High Power Cellular Jammer

Homeland Security Strategies GB Ltd. VIP-400 Series. Wide Band High Power Cellular Jammer VIP-400 Series Wide Band High Power Cellular Jammer OVERVIEW 100 Watts per band Blocks all Cellular and SMS communication Wide frequency coverage (800-2700) MHz Dedicated, configurable, user friendly command

More information

MOBILE COMPUTING 4/8/18. Basic Call. Public Switched Telephone Network - PSTN. CSE 40814/60814 Spring Transit. switch. Transit. Transit.

MOBILE COMPUTING 4/8/18. Basic Call. Public Switched Telephone Network - PSTN. CSE 40814/60814 Spring Transit. switch. Transit. Transit. MOBILE COMPUTING CSE 40814/60814 Spring 2018 Public Switched Telephone Network - PSTN Transit switch Transit switch Long distance network Transit switch Local switch Outgoing call Incoming call Local switch

More information

Communications Interoperability By: Warren K. Gruber Aeroflex / Weinschel

Communications Interoperability By: Warren K. Gruber Aeroflex / Weinschel February 06, 2007 Communications Interoperability By: Warren K. Gruber Aeroflex / Weinschel When communication systems are established engineers must account for numerous real world effects and to maintain

More information

Problem. How we solve the problem.

Problem. How we solve the problem. Humanitarian agencies need to trust their personnel are safe and secure at all times. A long range digital radio solution provides reliable voice and data communications for workers in the field, ensuring

More information

Brio Macro Security Pvt. Ltd, (Micro Sec.) provides security solutions, turnkey security solutions, professional security solutions to government and

Brio Macro Security Pvt. Ltd, (Micro Sec.) provides security solutions, turnkey security solutions, professional security solutions to government and Brio Macro Security Pvt. Ltd, (Micro Sec.) provides security solutions, turnkey security solutions, professional security solutions to government and nongovernment agencies, defense, system integrators,

More information

GSM NCN-EG-01 Course Outline for GSM

GSM NCN-EG-01 Course Outline for GSM GSM NCN-EG-01 Course Outline for GSM 1 Course Description: Good understanding of GSM technology and cellular networks is essential for anyone working in GSM or related areas. This course is structured

More information

MAPS for LCS System. LoCation Services Simulation in 2G, 3G, and 4G. Presenters:

MAPS for LCS System. LoCation Services Simulation in 2G, 3G, and 4G. Presenters: MAPS for LCS System LoCation Services Simulation in 2G, 3G, and 4G Presenters: Matt Yost Savita Majjagi 818 West Diamond Avenue - Third Floor, Gaithersburg, MD 20878 Phone: (301) 670-4784 Fax: (301) 670-9187

More information

39N6E KASTA-2E2 Low-Altitude 3D All-Round Surveillance Radar

39N6E KASTA-2E2 Low-Altitude 3D All-Round Surveillance Radar 39N6E KASTA-2E2 Low-Altitude 3D All-Round Surveillance Radar The Kasta-2E2 low-altitude 3D all-round surveillance radar is designed to control airspace and to perform automatic detection, range/azimuth/altitude

More information

TACTICALL VCS AIR OPERATIONS ALL SYSTEMS - ONE INTERFACE

TACTICALL VCS AIR OPERATIONS ALL SYSTEMS - ONE INTERFACE TACTICALL VCS AIR OPERATIONS ALL SYSTEMS - ONE INTERFACE TACTICALL VCS - AIR OPERATIONS > FEATURE OVERVIEW ERIEYE Pilot / Ops Radio REMOTE RADIO SITE WHAT IS TACTICALL VCS? AIR OPERATIONS One central user

More information

In the continuously changing

In the continuously changing PAGE 48 NOVEMBER 2003 FEATURE ARTICLE 802.11a Measurement Techniques and Network Issues by Herb Petrat, Senior Software Engineer, Berkeley Varitronics Systems, Inc. MICROWAVE PRODUCT DIGEST In the continuously

More information

INTELLIGENCE MOBILE LOCATOR. World Leader in Supplying INTELLIGENCE Equipment and Training TA08002

INTELLIGENCE MOBILE LOCATOR.  World Leader in Supplying INTELLIGENCE Equipment and Training TA08002 MOBILE LOCATOR TA08002 Coverage of Uall fouru frequency bands (850, 900, 1800, 1900) 4 wide-band receivers and 64 digital processing receivers Real-time handling of A5/1 and A5/2 encryption types Monitoring

More information

Stationary & Cloud jamming Presentation 2013

Stationary & Cloud jamming Presentation 2013 Stationary & Cloud jamming Presentation 2013 unival group unival group of companies unival group - About us unival group is a Bonn, Germany based group of companies specialized on governmental and corporate

More information

A Review of Vulnerabilities of ADS-B

A Review of Vulnerabilities of ADS-B A Review of Vulnerabilities of ADS-B S. Sudha Rani 1, R. Hemalatha 2 Post Graduate Student, Dept. of ECE, Osmania University, 1 Asst. Professor, Dept. of ECE, Osmania University 2 Email: ssrani.me.ou@gmail.com

More information

Cognitive Radio Networks for Police Applications

Cognitive Radio Networks for Police Applications Spectrum Sharing Solutions Cognitive Radio Networks for Police Applications xg and xmax are registered trademarks of xg Technology, Inc. Copyright 2014, All Rights Reserved. About xg Technology THE COMPANY

More information

RC-IED ECM Lessons Learned and Implementation

RC-IED ECM Lessons Learned and Implementation RC-IED ECM Lessons Learned and Implementation ACT C-IED Conference 21 st of Jun 2016 27/06/2016 NATO UNCLASSIFIED 1 Outline Lessons Learned Implementation Conclusions 27/06/2016 NATO UNCLASSIFIED 2 ECM

More information

I Need Your Cost Estimate for a 10 Year Project by Next Week

I Need Your Cost Estimate for a 10 Year Project by Next Week I Need Your Cost Estimate for a 10 Year Project by Next Week A Case Study in Broad System Analysis: DoD Spectrum Reallocation Feasibility Study, 1755-1850 MHz Momentum From Industry & Response from Government

More information

New solutions for massive monitoring

New solutions for massive monitoring New solutions for massive monitoring ISS World Europe Jean-Philippe LELIEVRE, jean-philippe.lelievre@fr.thalesgroup.com Prague, 3 rd, 1 Evaluation of spectrum activity on theaters 1/2 Military communications

More information

SELF OPTIMIZING NETWORKS

SELF OPTIMIZING NETWORKS SELF OPTIMIZING NETWORKS An LTE network is controlled by a network management system of a wide range of functions, e.g. sets the parameters that the network elements are using manages their software detects

More information

CS 6956 Wireless & Mobile Networks April 1 st 2015

CS 6956 Wireless & Mobile Networks April 1 st 2015 CS 6956 Wireless & Mobile Networks April 1 st 2015 The SIM Card Certain phones contain SIM lock and thus work only with the SIM card of a certain operator. However, this is not a GSM restriction introduced

More information

Future Soldier Countering Emerging/Future Threats 3D RADAR MULTI-SENSOR by Weibel/CST proprietary 1

Future Soldier Countering Emerging/Future Threats 3D RADAR MULTI-SENSOR by Weibel/CST proprietary 1 Future Soldier Countering Emerging/Future Threats 3D RADAR MULTI-SENSOR by 2018-05-23 Weibel/CST proprietary 1 AUTHORITIES CHALLENGES Increasing number of intrusions on critical infrastructures, prisons,

More information

RF Management in SonicOS 4.0 Enhanced

RF Management in SonicOS 4.0 Enhanced RF Management in SonicOS 4.0 Enhanced Document Scope This document describes how to plan, design, implement, and maintain the RF Management feature in SonicWALL SonicOS 4.0 Enhanced. This document contains

More information

DMR. PROFESSIONAL DIGITAL MOBILE RADIO Connections that Count

DMR. PROFESSIONAL DIGITAL MOBILE RADIO Connections that Count DMR PROFESSIONAL DIGITAL MOBILE RADIO // Why Simoco Xd? // Simoco Xd Connections count, and with a history of 90 years radio engineering excellence, Simoco combines innovation in 2 way radio design with

More information

DJA3000. Cellular Communication Jammer. Installation and Operations Manual. Series DJA3000. Description: Cellular Communication Jammer

DJA3000. Cellular Communication Jammer. Installation and Operations Manual. Series DJA3000. Description: Cellular Communication Jammer DJA3000 Cellular Communication Jammer Installation and Operations Manual Series DJA3000 Description: Cellular Communication Jammer Models: DJA3040 and DJA3120 Series DJA3000 up to 4 Bands Thank you for

More information

I m Dreaming of a Wireless Building

I m Dreaming of a Wireless Building I m Dreaming of a Wireless Building AIA Convention presentation June 11, 2004 Presented by Elert & Associates Frank Dolejsi Minnesota Bureau of Criminal Apprehension (BCA) Mark Hoekstra Skyline Exhibits

More information

Chapter 1 Introduction to Mobile Computing (16 M)

Chapter 1 Introduction to Mobile Computing (16 M) Chapter 1 Introduction to Mobile Computing (16 M) 1.1 Introduction to Mobile Computing- Mobile Computing Functions, Mobile Computing Devices, Mobile Computing Architecture, Evolution of Wireless Technology.

More information

SURVEY QUESTIONS If you prefer an electronic copy of the survey please contact the Thomas Law Firm by at:

SURVEY QUESTIONS If you prefer an electronic copy of the survey please contact the Thomas Law Firm by  at: APPENDIX B SURVEY QUESTIONS If you prefer an electronic copy of the survey please contact the Thomas Law Firm by email at: lwthomas@cox.net TCRP J-5, STUDY TOPIC 17-02, LEGAL IMPLICATIONS OF VIDEO SURVEILLANCE

More information

Wireless Sensor Networks

Wireless Sensor Networks DEEJAM: Defeating Energy-Efficient Jamming in IEEE 802.15.4-based Wireless Networks Anthony D. Wood, John A. Stankovic, Gang Zhou Department of Computer Science University of Virginia June 19, 2007 Wireless

More information

DEEJAM: Defeating Energy-Efficient Jamming in IEEE based Wireless Networks

DEEJAM: Defeating Energy-Efficient Jamming in IEEE based Wireless Networks DEEJAM: Defeating Energy-Efficient Jamming in IEEE 802.15.4-based Wireless Networks Anthony D. Wood, John A. Stankovic, Gang Zhou Department of Computer Science University of Virginia Wireless Sensor Networks

More information

Innovation that delivers operational benefit

Innovation that delivers operational benefit DEFENCE & SECURITY Defence and security system developers Rapid evolution of technology poses both an opportunity and a threat for defence and security systems. Today s solutions need to adapt to an everchanging

More information

The following connections will be discussed:

The following connections will be discussed: Leica Viva GNSS CS 10/15 and GS 10/15 Summary This quick guide will go through the several procedures outlining the different methods of communication with the RTK Rover Wizard, manual configurations and

More information

Effects of Adversarial Interaction on the Adoption and Adaptation of Disruptive Communications Technologies

Effects of Adversarial Interaction on the Adoption and Adaptation of Disruptive Communications Technologies Effects of Adversarial Interaction on the Adoption and Adaptation of Disruptive Communications Technologies A Brief Overview SETH LEWIS, TERRY STUDER, MARTIN VOSHELL Mitigating the effects of disruptive

More information

TurboVUi Solo. User Guide. For Version 6 Software Document # S Please check the accompanying CD for a newer version of this document

TurboVUi Solo. User Guide. For Version 6 Software Document # S Please check the accompanying CD for a newer version of this document TurboVUi Solo For Version 6 Software Document # S2-61432-604 Please check the accompanying CD for a newer version of this document Remote Virtual User Interface For MOTOTRBO Professional Digital 2-Way

More information

RETINAR SECURITY SYSTEMS Retinar PTR & Retinar OPUS Vehicle Mounted Applications

RETINAR SECURITY SYSTEMS Retinar PTR & Retinar OPUS Vehicle Mounted Applications RETINAR SECURITY SYSTEMS Retinar PTR & Retinar OPUS Vehicle Mounted Applications 1 The world in the 21 st century is a chaotic place and threats to the public are diverse and complex more than ever. Due

More information

Enterprise Control Systems Ltd. systems

Enterprise Control Systems Ltd. systems Enterprise Control Systems Ltd systems Enterprise Control Systems Ltd (ECS) Specialist design through innovation and technology ECS has developed and supplied COFDM encrypted links for more than 10 years

More information

Surveillance Technologies: efficiency, human rights, ethics Prof. Dr. Tom Sorell, University of Warwick, UK

Surveillance Technologies: efficiency, human rights, ethics Prof. Dr. Tom Sorell, University of Warwick, UK Surveillance Technologies: efficiency, human rights, ethics Prof. Dr. Tom Sorell, University of Warwick, UK Outline How does one justify the use by police of surveillance technology in a liberal democracy?

More information

Chapter 7 GSM: Pan-European Digital Cellular System. Prof. Jang-Ping Sheu

Chapter 7 GSM: Pan-European Digital Cellular System. Prof. Jang-Ping Sheu Chapter 7 GSM: Pan-European Digital Cellular System Prof. Jang-Ping Sheu Background and Goals GSM (Global System for Mobile Communications) Beginning from 1982 European standard Full roaming in Europe

More information

Enterprise Control Systems Ltd. systems

Enterprise Control Systems Ltd. systems Enterprise Control Systems Ltd systems Enterprise Control Systems Ltd (ECS) Specialist design through innovation and technology ECS has developed and supplied COFDM encrypted links for more than 10 years

More information

Applying Defence-in-depth to counter RF interferences over GNSS

Applying Defence-in-depth to counter RF interferences over GNSS Applying Defence-in-depth to counter RF interferences over GNSS IET 5th Oct. 2011 Xavier Bertinchamps - GSA Objective of this presentation Understand Jamming threat on GNSS Propose a comprehensive strategy

More information

NETNode IP Mesh Overview. Audio and Video Products Cobham Tactical Communications & Surveillance

NETNode IP Mesh Overview. Audio and Video Products Cobham Tactical Communications & Surveillance NETNode IP Mesh Overview Audio and Video Products Cobham Tactical Communications & Surveillance NETNode IP MESH Radio NETNode IP Mesh Radio: The Performance of COFDM with the Flexibility of IP Enhanced

More information

Mobile Communication and Mobile Computing

Mobile Communication and Mobile Computing Department of Computer Science Institute for System Architecture, Chair for Computer Networks Mobile Communication and Mobile Computing Prof. Dr. Alexander Schill http://www.rn.inf.tu-dresden.de Structure

More information

Spectrum Management. Justin Taylor ATS systems

Spectrum Management. Justin Taylor ATS systems Spectrum Management Justin Taylor ATS systems What Is Spectrum Management Spectrum management refers to the process of regulating the RF spectrum, either for an entire country or at a particular location

More information

Creating a Public Safety Ecosystem

Creating a Public Safety Ecosystem Creating a Public Safety Ecosystem Synchronizing Human and Digital Intelligence Contents Topics Page Introduction... Secure Data Access and Sharing... The Increasing Role of Citizen Involvement... Social

More information

WAVE 5000 EVERY DEVICE. EVERY NETWORK. EVERY TEAM. CONNECTED LIKE NEVER BEFORE.

WAVE 5000 EVERY DEVICE. EVERY NETWORK. EVERY TEAM. CONNECTED LIKE NEVER BEFORE. EVERY DEVICE. EVERY NETWORK. EVERY TEAM. CONNECTED LIKE NEVER BEFORE. WAVE 5000 enables scalable, enterprise-grade push-to-talk (PTT) on broadband networks and devices so that critical, time-sensitive

More information

2018 Border Challenge Robotics Competition

2018 Border Challenge Robotics Competition 2018 Border Challenge Robotics Competition https://borderchallenge.weebly.com/ Table of Contents Section 1 Introduction... 2 Section 2 The Robot... 2 Robot Overview... 2 Robot Rules... 2 Section 3 The

More information

Wireless and mobile communication

Wireless and mobile communication Wireless and mobile communication Wireless communication Multiple Access FDMA TDMA CDMA SDMA Mobile Communication GSM GPRS GPS Bluetooth Content What is wireless communication? In layman language it is

More information

CLICK HERE TO KNOW MORE

CLICK HERE TO KNOW MORE CLICK HERE TO KNOW MORE Should GNSS Become a National Critical Infrastructure? Ooi Wei Han, Noordin Ahmad, Shahrizal IM National Space Agency (ANGKASA) Ministry of Science, Technology and Innovation (MOSTI)

More information

Briefing for NPSTC DHS SCIENCE AND TECHNOLOGY 2017 FIRST RESPONDER ELECTRONIC JAMMING EXERCISE. September 6, 2017

Briefing for NPSTC DHS SCIENCE AND TECHNOLOGY 2017 FIRST RESPONDER ELECTRONIC JAMMING EXERCISE. September 6, 2017 DHS SCIENCE AND TECHNOLOGY Briefing for NPSTC 2017 FIRST RESPONDER ELECTRONIC JAMMING EXERCISE September 6, 2017 Sridhar Kowdley Program Manager First Responders Group Science and Technology Directorate

More information

xmax Solutions for Public Safety Applications

xmax Solutions for Public Safety Applications Private Mobile Broadband Wireless Networks xmax Solutions for Public Safety Applications xg and xmax are registered trademarks of xg Technology, Inc. Copyright 2014, All Rights Reserved. About xg Technology

More information

Bloodhound RMS Product Overview

Bloodhound RMS Product Overview Page 2 of 10 What is Guard Monitoring? The concept of personnel monitoring in the security industry is not new. Being able to accurately account for the movement and activity of personnel is not only important

More information

RAKSA 120 SELECTIVE RF DETECTOR OWNER S MANUAL

RAKSA 120 SELECTIVE RF DETECTOR OWNER S MANUAL RAKSA 120 SELECTIVE RF DETECTOR OWNER S MANUAL Table of Contents 1. Introduction 6 2. Operating Principle 7 3. Operation Instructions 8 4. Battery Charging 9 5. ON/OFF and Operation 11 6. The Main Menu

More information

Explosive Ordnance Disposal/ Low-Intensity Conflict. Improvised Explosive Device Defeat

Explosive Ordnance Disposal/ Low-Intensity Conflict. Improvised Explosive Device Defeat Explosive Ordnance Disposal/ Low-Intensity Conflict Improvised Explosive Device Defeat EOD/LIC Mission The Explosive Ordnance Disposal/Low-Intensity Conflict (EOD/LIC) program provides Joint Service EOD

More information

Chapter 4. TETRA and GSM over satellite

Chapter 4. TETRA and GSM over satellite Chapter 4. TETRA and GSM over satellite TETRA and GSM over satellite have been addressed a number of times in the first three chapters of the document. Their vital roles in the present project are well

More information

Which Dispatch Solution?

Which Dispatch Solution? White Paper Which Dispatch Solution? Revision 1.0 www.omnitronicsworld.com Radio Dispatch is a term used to describe the carrying out of business operations over a radio network from one or more locations.

More information

Communication Systems GSM

Communication Systems GSM Communication Systems GSM Computer Science Organization I. Data and voice communication in IP networks II. Security issues in networking III. Digital telephony networks and voice over IP 2 last to final

More information

Chapter 5 Acknowledgment:

Chapter 5 Acknowledgment: Chapter 5 Acknowledgment: This material is based on the slides formatted by Dr Sunilkumar S. Manvi and Dr Mahabaleshwar S. Kakkasageri, the authors of the textbook: Wireless and Mobile Networks, concepts

More information

INTEROPERABLE, SECURE GROUP COMMUNICATION

INTEROPERABLE, SECURE GROUP COMMUNICATION INTEROPERABLE, SECURE GROUP COMMUNICATION enables interoperable push-to-talk (PTT) communication across broadband and radio networks and devices so that critical, time-sensitive information flows quickly

More information

Layerone / 2006 RFID Technology, Security & Privacy. Luiz Eduardo Dos Santos, CISSP luiz AT arubanetworks.com

Layerone / 2006 RFID Technology, Security & Privacy. Luiz Eduardo Dos Santos, CISSP luiz AT arubanetworks.com Layerone / 2006 RFID Technology, Security & Privacy Luiz Eduardo Dos Santos, CISSP luiz AT arubanetworks.com What are we talking about today? RFID history Technologies WiFi tags Privacy/ Security Who am

More information

Test Plan for Hearing Aid Compatibility

Test Plan for Hearing Aid Compatibility Test Plan for Hearing Aid Compatibility Version Number 3.1 February 2017 2017 CTIA - The Wireless Association. All rights reserved. CTIA hereby grants to CTIA Authorized Testing Laboratories (CATLs), and

More information

Simple Guide to In-Building Coverage Systems

Simple Guide to In-Building Coverage Systems Simple Guide to In-Building Coverage Systems for Building Owners, Managers and Tenants Accessing high-quality network coverage for mobile phones or tablet devices can be problematic within large buildings

More information

Leveraging Digital RF Memory Electronic Jammers for Modern Deceptive Electronic Attack Systems

Leveraging Digital RF Memory Electronic Jammers for Modern Deceptive Electronic Attack Systems White Paper Leveraging Digital RF Memory Electronic Jammers for Modern Deceptive Electronic Attack Systems by Tony Girard Mercury systems MaRCH 2015 White Paper Today s advanced Electronic Attack (EA)

More information

Extreme space weather: Geomagnetic storms, GNSS disruptions and the impact on vital functions in society

Extreme space weather: Geomagnetic storms, GNSS disruptions and the impact on vital functions in society Extreme space weather: Geomagnetic storms, GNSS disruptions and the impact on vital functions in society Fredrik Marsten Eklöf FOI, Informationssystem fredrik.eklof@foi.se, 0709-277426 Global Navigation

More information

HTZ warfare MILITARY COMMUNICATION NETWORKS TECHNICAL SPECTRUM MANAGEMENT THE REFERENCE TOOL FOR ELECTRONIC WARFARE & TACTICAL COMMUNICATIONS

HTZ warfare MILITARY COMMUNICATION NETWORKS TECHNICAL SPECTRUM MANAGEMENT THE REFERENCE TOOL FOR ELECTRONIC WARFARE & TACTICAL COMMUNICATIONS THE REFERENCE TOOL FOR ELECTRONIC WARFARE & TACTICAL COMMUNICATIONS MILITARY COMMUNICATION NETWORKS ACCURATE BATTLEFIELD SIMULATION TECHNICAL SPECTRUM MANAGEMENT the most comprehensive radio planning solution

More information

Determining Radio Frequency (RF) Coverage for Criminal and Civil Legal Cases

Determining Radio Frequency (RF) Coverage for Criminal and Civil Legal Cases Determining Radio Frequency (RF) Coverage for Criminal and Civil Legal Cases Introduction Both criminal and civil cases use certain techniques to determine whether a mobile phone was either in or not in

More information

A 5G Paradigm Based on Two-Tier Physical Network Architecture

A 5G Paradigm Based on Two-Tier Physical Network Architecture A 5G Paradigm Based on Two-Tier Physical Network Architecture Elvino S. Sousa Jeffrey Skoll Professor in Computer Networks and Innovation University of Toronto Wireless Lab IEEE Toronto 5G Summit 2015

More information

Comparison ibeacon VS Smart Antenna

Comparison ibeacon VS Smart Antenna Comparison ibeacon VS Smart Antenna Introduction Comparisons between two objects must be exercised within context. For example, no one would compare a car to a couch there is very little in common. Yet,

More information

Software Defined Radio. Listening to the Bleeps and Bloops around you

Software Defined Radio. Listening to the Bleeps and Bloops around you Software Defined Radio Listening to the Bleeps and Bloops around you Software Defined Radio in a nutshell Like a FM radio, but can receive a wider radio spectrum range Quick Peek at Radio Frequencies

More information

LOCALIZATION AND ROUTING AGAINST JAMMERS IN WIRELESS NETWORKS

LOCALIZATION AND ROUTING AGAINST JAMMERS IN WIRELESS NETWORKS Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 5, May 2015, pg.955

More information

& REACTIVE RCIED JAMMING

& REACTIVE RCIED JAMMING LIGHTNING THE NEW Hybrid Jammer Generation INTELLIGENT & REACTIVE RCIED JAMMING WE GUARANTEE FOR LARGEST JAMMING DISTANCES FIELD TESTS / DEMONSTRATIONS AVAILABLE The LIGHTNING is a hybrid jamming system

More information

Primer on GPS Operations

Primer on GPS Operations MP Rugged Wireless Modem Primer on GPS Operations 2130313 Rev 1.0 Cover illustration by Emma Jantz-Lee (age 11). An Introduction to GPS This primer is intended to provide the foundation for understanding

More information

MSIT 413: Wireless Technologies Week 10

MSIT 413: Wireless Technologies Week 10 MSIT 413: Wireless Technologies Week 10 Michael L. Honig Department of EECS Northwestern University November 2017 1 Technologies on the Horizon Heterogeneous networks Massive MIMO Millimeter wave Spectrum

More information

BROADSHIELD CAPABILITIES OVERVIEW. Beyond the Frontier

BROADSHIELD CAPABILITIES OVERVIEW. Beyond the Frontier BROADSHIELD CAPABILITIES OVERVIEW Beyond the Frontier BROADSHIELD from Protecting GPS/GNSS critical infrastructure against emerging threats Detects Interference and Spoofing within the GPS signal and GPS

More information

Jamming and Spoofing of GNSS Signals An Underestimated Risk?!

Jamming and Spoofing of GNSS Signals An Underestimated Risk?! Jamming and Spoofing of GNSS Signals An Underestimated Risk?! Alexander Rügamer Dirk Kowalewski Fraunhofer IIS NavXperience GmbH Fraunhofer IIS 1 Source: http://securityaffairs.co/wordpress/wpcontent/uploads/2012/02/spoofing.jpg

More information

External sources of RFI at the GMRT: Methods for control and co-existence with commercial users

External sources of RFI at the GMRT: Methods for control and co-existence with commercial users External sources of RFI at the GMRT: Methods for control and co-existence with commercial users Pravin Ashok Raybole 1 GMRT-NCRA-TIFR P.O Box No. 6, Narayangon, Pune, India. E-mail: pravin@gmrt.ncra.tifr.res.in

More information

PHALANX INTELEGENT SAFETY SYSTEMS

PHALANX INTELEGENT SAFETY SYSTEMS IRJ-HYBRID Intelligent & Reactive RCIED JAMMING NEW Hybrid RCIED JAMMER INTELLIGENT & REACTIVE RADIO-CONTROLLED DESIGNED TO PREVENT IMPROVISED EXPLOSIVE DEVICES Prevent trigger devices from activating

More information