Proposal # xxxxxxxxxxxx Intercept Jammer Date: Presented From: HSS Development 75 S. Broadway White Plains, NY 060 Office: 94-304-4333 www.secintel.com New York Disclaimers: All descriptions of HSS products and systems are published for informative purposes only. Specifications may be subject to change without notice. The information furnished in this document is proprietary to HSS Development. It shall not be disclosed outside the Client for any reason without the prior written approval of HSS. This document shall not be duplicated, used, or disclosed, in whole or in part, for any purpose other than proposal evaluation. In the event of a contract award, or in connection with the submission of such information, the Client shall have the right to see or disclose this information to the extent provided in the contract. This restriction does not limit the Client s right to use data if obtained from any other source without restrictions.
Scope of system HSS Development Inc ( HSS ), in response to an RFI/RFQ from (known as the Purchaser ), has prepared this response for counter surveillance + Responsive Countermeasure Systems.. Introduction to HSS HSS was founded on the need to provide high-tech solutions to combat terrorist and criminal acts. HSS introduced its Electronic CounterMeasures in the early 970 s with several detection and counter surveillance technologies. HSS introduced its RF Jamming technology with the Bomb Ranger defeat systems in the mid 980s. However, HSS was no stranger to radio wave detection technology because HSS designed and built signal radio measurement telemetry in the early 980s, and signal analysis in the late 990s. HSS paved the way for test measurement equipment to solve difficult and challenging issues concerning radio frequency applications. In 200, HSS began dealing with RF Jamming technology to defeat cellular communication links in order to secure areas from electronic theft of information (voice & data). These methods of Electronic Countermeasures increased in demand to include: Detection of radio frequency surveillance equipment Defense against and unauthorized cellular eavesdropping Defeat of RF and cellular based communication monitoring at the Diplomatic, Police, SWAT level, and others.2 The Interceptor Jammer ID220 The ID220 Interceptor Jammer is used to detect unauthorized mobile monitoring systems and then initiate an electronic interference jam wave as a counter attack. This counter attack works to focus on specific bands used by intercept technologies in the region of their operation.
.3 Mobile Protocols & Targeted Technologies The ID220 has the ability to detect active intercept systems that operate on the following commercial protocols: 2G / GSM 3G / UMTS 4G / LTE CDMA.4 Operating Parameters The system is designed to both detect and differentiate between legitimate telecom service providers and false base station technologies. These false BTS markers are found in mobile identity grabbers such as IMSI / IMEI Catchers as well as active audio cellular intercept systems, be they tactical or stationary. Understanding how Tactical Interception works: ) For Active mobile interception systems, the surveillance technology is designed to clone or mimic regular phone networks so that the phones they target believe they are connected to a normal service provider. However, the intercept equipment is actually spoofing the phone providers mobile identifiers so that the targeted phone is unaware that it has connected to a man-in-the middle type of setup. This setup is used to listen to calls, record them, observe text messaging details, as well as collect location information of the phones. This setup can also be used to selectively block the targeted phone from having any phone service at all. 2) For Mobile Identity surveillance and tracking, IMSI Catchers are used to capture mobile phone information, used to both monitor and track a phones private details. The SIM identity can be discovered, and be used to interrogate specific phones, ignoring all random phones and focusing on specific phones. For illegal purposes, IMSI Catchers are both a threat and an infraction on privacy.
.5 Intercept Jammer Users The Intercept Jammer secures sensitive and secret communications of an organization, as well as protects the users from being tracked. Once a system has been deployed, it can provide a layer of security for: High Level Embassy & Consulate users Military Command users Diplomatic Attaches Law Enforcement users Anti-Crime task force teams Political organizational command.6 Multi-Setup Option The Intercept Jammer can be placed at the workplace for those it protects. It can also employ a remote sensor technology to expand the area of operation. This means if a user has a secondary office, or a residence, and there is internet at that area, then this remote front end can operate outside of the range of the primary core system. and sensitive and secret communications of an organization, as well as protects the The solution generally requires a custom installation, and can be provided in the following stages: Stage : Creating a Cell Plan Stage 2: Deploying a system Stage 3: Expanding the range Stage : Creating a Cell Plan The Cell Plan involves a mobile network survey (Site Survey) of the area for primary use. If the area is in an embassy, then that area around that embassy is assessed. Readings are taken of the existing network activities, with a focus on strong and weak Radio Access Technologies in use, at different times of the day. Once the data has been assessed, a site map will be generated, consisting of data pertinent to the system operation in that area. Stage 2: Deploying a system Once the results of the Cell Plan survey have been collected, the data will then clarify how the system should be installed. Factors will take into account: - Range to mobile masts - Density of mobile traffic over time - Building size where the system will be installed - Optional network requirements for multiple front ends to operate by - Optional locations to keep in touch with the core system, should the user require more than just a single system at one location, as well as networking requirements.
Stage 3: Expanding the range The performance of a system can work in a single location, or in multiple locations. For a multi-location installation, the Intercept Detection application can be configured to work by itself, or within a network of multiple end points. These endpoints can be setup to send alerting data to the central unit (core system), which then alerts and logs all detection activities. It has software that can show the user who would connect via laptop or desktop PC, indicating surveillance attempts..7 System Build The Intercept Jammer comes in several configurations, to be used to accomplish the goals of detecting and blocking illegal interceptors. # : The Survey kit: The Survey Kit is an advanced platform used to perform the initial site survey. It scans the Radio Access Technologies in the area, analyzing 2G, 3G and 4G protocols simultaneously (it can observe network parameters of up to four phone net work providers simultaneously). The information it acquires is then able to calibrate the Detection System. The Survey Kit also collects information concerning mobile phone coverage attributes (which are range driven) for each area of system use. The Survey Kit identifies networks with optimal parameters (that phones will gravitate toward) based on network signal strength, as well as other information about the phone's relationship with the towers at that location. # 2: The Intercept Detector: The Intercept Detector scans the local area for all mobile phone network activities. It analyzes both organic service provider characteristics as well as suspicious traces of radio technologies commonly found in active mobile phone interceptors and IMSI Catchers. It compares what it finds and is able to recognize when a technology it has discovered is not supposed to be in operation, namely covertly capturing mobile phone calls as well as mobile identities. It can also identify when a phone is being jammed down from UMTS to GSM. The Intercept Detector then alerts the system operator. The operator is able to look at these alerts, see where they are in relationship to his system, and decide how to proceed. # 3: The Intercept Jammer: The Intercept Jammer is the 3rd part of the system that enables the system operator to jam these types of threats as they attempt to conduct surveillance close-by. Jamming involves a full force radiation of RF interference to attack the protocols emanating from ARFCN on 2G, UARFCN on 3G or EARFCN on 4G LTE. This attack is in essence a denial of service attack on the non-telecom base station (BTS) being used to illegally monitor mobile phones.
2.0 Project Management: Actions + Timing The following gives a breakdown of the me required to ac on the recommended proposal. Task Dura on (Days) Notes Personaliza on and apply customer specific requirements 3 Ini al scan of neighborhood / areas of interest An es mate of the me required to personalize it to the customer s requirements. Analysis of data obtained from ini al scan and crea on of report for recommenda on of installa on sites: Analysis and tes ng regional network data Installa on of government building system units and Central Control Centre so ware Installa on of residence buildings system units. Op onal There may be in country and specific network anomalies that may require accommoda ng a er analysis. This assumes there is an available LAN/Wi Fi network available. It also assumes there is a server with required networking so ware etc. already installed. This can be provided if necessary These would be standalone units but could report back to the Central Control Centre if required Tes ng and customer sign off Total 8 2. Project Management: Hardware + Software Costs Task Intercept Jammer Intercept Jammer year Support Total Number of Units Cost per Unit Cost per Unit (Total) Notes
3.0 Recommendations Although not covered by this initial proposal, the following are recommended to provide a complete, city wide Cellular Network Protection against IMSI Grabbers, Fake Base Stations, Fake Networks and Interception of Mobile Communications. Ongoing Cellular Network Analysis: It is suggested the Intercept Jammer be mounted in law enforcement and other government vehicles. Not only would these help to protect the occupiers of the vehicles communications, but they would also provide a means of continually monitoring and analysis of the cities communications. Endpoint Remote Units: These endpoint units are smaller, with network capabilities to pair / remote access via the user s mobile phone via Bluetooth when in detection mode. They enable the user to have a portable unit that they can carry with them to alert them of any anomalies in the network range, which could be evidence of attempts to IMSI Grab or intercept a phone.
From: HSS Development 75 South Broadway, White Plains, NY. 060 Tel: -94-304-4333 Date Quotation # Valid To F.O.B Terms Qty Item Description Unit Price (US Dollars) Extended Price (US Dollars) ID220 Interceptor Jammer Installation Service Year of Service (maintenance) Subtotal Shipping Total Amount Due