Proposal # xxxxxxxxxxxx. Intercept Jammer. Date:

Similar documents
2018 HSS Development

Advanced Cell / RF / Drone Detection & Countermeasure New Distributor Program

Presen ng the Early Warning Systems: MicroMesh + GlobalMesh

CENTAURS. Tactical Cellular & RF Jamming System System Overview. Prosescan S.A. Madrid CIF: A Web-Site:

Sandboxing Wireless/RF Vulnerability Research of Connected Systems

CELL PHONE JAMMERS. By Priyanjali (472) A.Divya (466) SPHOORTHY ENGINEERING COLLEGE

UNCLASSIFIED//FOR OFFICIAL USE ONLY (U) Table of Contents UNCLASSIFIED//FOR OFFICIAL USE ONLY

NATecS 2017 May, 16 th 17 th. Presentation #22 Opportunities for SDR

Real-Time Spectrum Monitoring System Provides Superior Detection And Location Of Suspicious RF Traffic

Wireless systems. includes issues of

Phantom Dome - Advanced Drone Detection and jamming system

Improving Performance through Superior Innovative Antenna Technologies

Solutions to Prevent Cell Phone Use in Prisons

BHE BONN HUNGARY ELECTRONICS LTD.

Spectrum Monitoring and Geolocation Systems

GSM Interceptor Fast and reliable interception of GSM traffic

Current Systems. 1 of 6

icsa Integrated Communications and Situational Awareness

CellAntenna.

Department of Electronics & Communication Engin. Cell Phone Jammer. P.V.D.Satya murthy (08MR1A0441)

Formation and Cooperation for SWARMed Intelligent Robots

PROFILON SD Protection against Eavesdropping. Full Spectrum Window Protection

BE HEARD ON THE FRONT LINE

Experience with Radio Navigation Satellite Service (RNSS)

VIP-300U TRANSPORTABLE RF JAMMER

TACOT Project. Trusted multi Application receiver for Trucks. Bordeaux, 4 June 2014

Homeland Security Strategies GB Ltd. VIP-400 Series. Wide Band High Power Cellular Jammer

MOBILE COMPUTING 4/8/18. Basic Call. Public Switched Telephone Network - PSTN. CSE 40814/60814 Spring Transit. switch. Transit. Transit.

Communications Interoperability By: Warren K. Gruber Aeroflex / Weinschel

Problem. How we solve the problem.

Brio Macro Security Pvt. Ltd, (Micro Sec.) provides security solutions, turnkey security solutions, professional security solutions to government and

GSM NCN-EG-01 Course Outline for GSM

MAPS for LCS System. LoCation Services Simulation in 2G, 3G, and 4G. Presenters:

39N6E KASTA-2E2 Low-Altitude 3D All-Round Surveillance Radar

TACTICALL VCS AIR OPERATIONS ALL SYSTEMS - ONE INTERFACE

In the continuously changing

INTELLIGENCE MOBILE LOCATOR. World Leader in Supplying INTELLIGENCE Equipment and Training TA08002

Stationary & Cloud jamming Presentation 2013

A Review of Vulnerabilities of ADS-B

Cognitive Radio Networks for Police Applications

RC-IED ECM Lessons Learned and Implementation

I Need Your Cost Estimate for a 10 Year Project by Next Week

New solutions for massive monitoring

SELF OPTIMIZING NETWORKS

CS 6956 Wireless & Mobile Networks April 1 st 2015

Future Soldier Countering Emerging/Future Threats 3D RADAR MULTI-SENSOR by Weibel/CST proprietary 1

RF Management in SonicOS 4.0 Enhanced

DMR. PROFESSIONAL DIGITAL MOBILE RADIO Connections that Count

DJA3000. Cellular Communication Jammer. Installation and Operations Manual. Series DJA3000. Description: Cellular Communication Jammer

I m Dreaming of a Wireless Building

Chapter 1 Introduction to Mobile Computing (16 M)

SURVEY QUESTIONS If you prefer an electronic copy of the survey please contact the Thomas Law Firm by at:

Wireless Sensor Networks

DEEJAM: Defeating Energy-Efficient Jamming in IEEE based Wireless Networks

Innovation that delivers operational benefit

The following connections will be discussed:

Effects of Adversarial Interaction on the Adoption and Adaptation of Disruptive Communications Technologies

TurboVUi Solo. User Guide. For Version 6 Software Document # S Please check the accompanying CD for a newer version of this document

RETINAR SECURITY SYSTEMS Retinar PTR & Retinar OPUS Vehicle Mounted Applications

Enterprise Control Systems Ltd. systems

Surveillance Technologies: efficiency, human rights, ethics Prof. Dr. Tom Sorell, University of Warwick, UK

Chapter 7 GSM: Pan-European Digital Cellular System. Prof. Jang-Ping Sheu

Enterprise Control Systems Ltd. systems

Applying Defence-in-depth to counter RF interferences over GNSS

NETNode IP Mesh Overview. Audio and Video Products Cobham Tactical Communications & Surveillance

Mobile Communication and Mobile Computing

Spectrum Management. Justin Taylor ATS systems

Creating a Public Safety Ecosystem

WAVE 5000 EVERY DEVICE. EVERY NETWORK. EVERY TEAM. CONNECTED LIKE NEVER BEFORE.

2018 Border Challenge Robotics Competition

Wireless and mobile communication

CLICK HERE TO KNOW MORE

Briefing for NPSTC DHS SCIENCE AND TECHNOLOGY 2017 FIRST RESPONDER ELECTRONIC JAMMING EXERCISE. September 6, 2017

xmax Solutions for Public Safety Applications

Bloodhound RMS Product Overview

RAKSA 120 SELECTIVE RF DETECTOR OWNER S MANUAL

Explosive Ordnance Disposal/ Low-Intensity Conflict. Improvised Explosive Device Defeat

Chapter 4. TETRA and GSM over satellite

Which Dispatch Solution?

Communication Systems GSM

Chapter 5 Acknowledgment:

INTEROPERABLE, SECURE GROUP COMMUNICATION

Layerone / 2006 RFID Technology, Security & Privacy. Luiz Eduardo Dos Santos, CISSP luiz AT arubanetworks.com

Test Plan for Hearing Aid Compatibility

Simple Guide to In-Building Coverage Systems

Leveraging Digital RF Memory Electronic Jammers for Modern Deceptive Electronic Attack Systems

Extreme space weather: Geomagnetic storms, GNSS disruptions and the impact on vital functions in society

HTZ warfare MILITARY COMMUNICATION NETWORKS TECHNICAL SPECTRUM MANAGEMENT THE REFERENCE TOOL FOR ELECTRONIC WARFARE & TACTICAL COMMUNICATIONS

Determining Radio Frequency (RF) Coverage for Criminal and Civil Legal Cases

A 5G Paradigm Based on Two-Tier Physical Network Architecture

Comparison ibeacon VS Smart Antenna

Software Defined Radio. Listening to the Bleeps and Bloops around you

LOCALIZATION AND ROUTING AGAINST JAMMERS IN WIRELESS NETWORKS

& REACTIVE RCIED JAMMING

Primer on GPS Operations

MSIT 413: Wireless Technologies Week 10

BROADSHIELD CAPABILITIES OVERVIEW. Beyond the Frontier

Jamming and Spoofing of GNSS Signals An Underestimated Risk?!

External sources of RFI at the GMRT: Methods for control and co-existence with commercial users

PHALANX INTELEGENT SAFETY SYSTEMS

Transcription:

Proposal # xxxxxxxxxxxx Intercept Jammer Date: Presented From: HSS Development 75 S. Broadway White Plains, NY 060 Office: 94-304-4333 www.secintel.com New York Disclaimers: All descriptions of HSS products and systems are published for informative purposes only. Specifications may be subject to change without notice. The information furnished in this document is proprietary to HSS Development. It shall not be disclosed outside the Client for any reason without the prior written approval of HSS. This document shall not be duplicated, used, or disclosed, in whole or in part, for any purpose other than proposal evaluation. In the event of a contract award, or in connection with the submission of such information, the Client shall have the right to see or disclose this information to the extent provided in the contract. This restriction does not limit the Client s right to use data if obtained from any other source without restrictions.

Scope of system HSS Development Inc ( HSS ), in response to an RFI/RFQ from (known as the Purchaser ), has prepared this response for counter surveillance + Responsive Countermeasure Systems.. Introduction to HSS HSS was founded on the need to provide high-tech solutions to combat terrorist and criminal acts. HSS introduced its Electronic CounterMeasures in the early 970 s with several detection and counter surveillance technologies. HSS introduced its RF Jamming technology with the Bomb Ranger defeat systems in the mid 980s. However, HSS was no stranger to radio wave detection technology because HSS designed and built signal radio measurement telemetry in the early 980s, and signal analysis in the late 990s. HSS paved the way for test measurement equipment to solve difficult and challenging issues concerning radio frequency applications. In 200, HSS began dealing with RF Jamming technology to defeat cellular communication links in order to secure areas from electronic theft of information (voice & data). These methods of Electronic Countermeasures increased in demand to include: Detection of radio frequency surveillance equipment Defense against and unauthorized cellular eavesdropping Defeat of RF and cellular based communication monitoring at the Diplomatic, Police, SWAT level, and others.2 The Interceptor Jammer ID220 The ID220 Interceptor Jammer is used to detect unauthorized mobile monitoring systems and then initiate an electronic interference jam wave as a counter attack. This counter attack works to focus on specific bands used by intercept technologies in the region of their operation.

.3 Mobile Protocols & Targeted Technologies The ID220 has the ability to detect active intercept systems that operate on the following commercial protocols: 2G / GSM 3G / UMTS 4G / LTE CDMA.4 Operating Parameters The system is designed to both detect and differentiate between legitimate telecom service providers and false base station technologies. These false BTS markers are found in mobile identity grabbers such as IMSI / IMEI Catchers as well as active audio cellular intercept systems, be they tactical or stationary. Understanding how Tactical Interception works: ) For Active mobile interception systems, the surveillance technology is designed to clone or mimic regular phone networks so that the phones they target believe they are connected to a normal service provider. However, the intercept equipment is actually spoofing the phone providers mobile identifiers so that the targeted phone is unaware that it has connected to a man-in-the middle type of setup. This setup is used to listen to calls, record them, observe text messaging details, as well as collect location information of the phones. This setup can also be used to selectively block the targeted phone from having any phone service at all. 2) For Mobile Identity surveillance and tracking, IMSI Catchers are used to capture mobile phone information, used to both monitor and track a phones private details. The SIM identity can be discovered, and be used to interrogate specific phones, ignoring all random phones and focusing on specific phones. For illegal purposes, IMSI Catchers are both a threat and an infraction on privacy.

.5 Intercept Jammer Users The Intercept Jammer secures sensitive and secret communications of an organization, as well as protects the users from being tracked. Once a system has been deployed, it can provide a layer of security for: High Level Embassy & Consulate users Military Command users Diplomatic Attaches Law Enforcement users Anti-Crime task force teams Political organizational command.6 Multi-Setup Option The Intercept Jammer can be placed at the workplace for those it protects. It can also employ a remote sensor technology to expand the area of operation. This means if a user has a secondary office, or a residence, and there is internet at that area, then this remote front end can operate outside of the range of the primary core system. and sensitive and secret communications of an organization, as well as protects the The solution generally requires a custom installation, and can be provided in the following stages: Stage : Creating a Cell Plan Stage 2: Deploying a system Stage 3: Expanding the range Stage : Creating a Cell Plan The Cell Plan involves a mobile network survey (Site Survey) of the area for primary use. If the area is in an embassy, then that area around that embassy is assessed. Readings are taken of the existing network activities, with a focus on strong and weak Radio Access Technologies in use, at different times of the day. Once the data has been assessed, a site map will be generated, consisting of data pertinent to the system operation in that area. Stage 2: Deploying a system Once the results of the Cell Plan survey have been collected, the data will then clarify how the system should be installed. Factors will take into account: - Range to mobile masts - Density of mobile traffic over time - Building size where the system will be installed - Optional network requirements for multiple front ends to operate by - Optional locations to keep in touch with the core system, should the user require more than just a single system at one location, as well as networking requirements.

Stage 3: Expanding the range The performance of a system can work in a single location, or in multiple locations. For a multi-location installation, the Intercept Detection application can be configured to work by itself, or within a network of multiple end points. These endpoints can be setup to send alerting data to the central unit (core system), which then alerts and logs all detection activities. It has software that can show the user who would connect via laptop or desktop PC, indicating surveillance attempts..7 System Build The Intercept Jammer comes in several configurations, to be used to accomplish the goals of detecting and blocking illegal interceptors. # : The Survey kit: The Survey Kit is an advanced platform used to perform the initial site survey. It scans the Radio Access Technologies in the area, analyzing 2G, 3G and 4G protocols simultaneously (it can observe network parameters of up to four phone net work providers simultaneously). The information it acquires is then able to calibrate the Detection System. The Survey Kit also collects information concerning mobile phone coverage attributes (which are range driven) for each area of system use. The Survey Kit identifies networks with optimal parameters (that phones will gravitate toward) based on network signal strength, as well as other information about the phone's relationship with the towers at that location. # 2: The Intercept Detector: The Intercept Detector scans the local area for all mobile phone network activities. It analyzes both organic service provider characteristics as well as suspicious traces of radio technologies commonly found in active mobile phone interceptors and IMSI Catchers. It compares what it finds and is able to recognize when a technology it has discovered is not supposed to be in operation, namely covertly capturing mobile phone calls as well as mobile identities. It can also identify when a phone is being jammed down from UMTS to GSM. The Intercept Detector then alerts the system operator. The operator is able to look at these alerts, see where they are in relationship to his system, and decide how to proceed. # 3: The Intercept Jammer: The Intercept Jammer is the 3rd part of the system that enables the system operator to jam these types of threats as they attempt to conduct surveillance close-by. Jamming involves a full force radiation of RF interference to attack the protocols emanating from ARFCN on 2G, UARFCN on 3G or EARFCN on 4G LTE. This attack is in essence a denial of service attack on the non-telecom base station (BTS) being used to illegally monitor mobile phones.

2.0 Project Management: Actions + Timing The following gives a breakdown of the me required to ac on the recommended proposal. Task Dura on (Days) Notes Personaliza on and apply customer specific requirements 3 Ini al scan of neighborhood / areas of interest An es mate of the me required to personalize it to the customer s requirements. Analysis of data obtained from ini al scan and crea on of report for recommenda on of installa on sites: Analysis and tes ng regional network data Installa on of government building system units and Central Control Centre so ware Installa on of residence buildings system units. Op onal There may be in country and specific network anomalies that may require accommoda ng a er analysis. This assumes there is an available LAN/Wi Fi network available. It also assumes there is a server with required networking so ware etc. already installed. This can be provided if necessary These would be standalone units but could report back to the Central Control Centre if required Tes ng and customer sign off Total 8 2. Project Management: Hardware + Software Costs Task Intercept Jammer Intercept Jammer year Support Total Number of Units Cost per Unit Cost per Unit (Total) Notes

3.0 Recommendations Although not covered by this initial proposal, the following are recommended to provide a complete, city wide Cellular Network Protection against IMSI Grabbers, Fake Base Stations, Fake Networks and Interception of Mobile Communications. Ongoing Cellular Network Analysis: It is suggested the Intercept Jammer be mounted in law enforcement and other government vehicles. Not only would these help to protect the occupiers of the vehicles communications, but they would also provide a means of continually monitoring and analysis of the cities communications. Endpoint Remote Units: These endpoint units are smaller, with network capabilities to pair / remote access via the user s mobile phone via Bluetooth when in detection mode. They enable the user to have a portable unit that they can carry with them to alert them of any anomalies in the network range, which could be evidence of attempts to IMSI Grab or intercept a phone.

From: HSS Development 75 South Broadway, White Plains, NY. 060 Tel: -94-304-4333 Date Quotation # Valid To F.O.B Terms Qty Item Description Unit Price (US Dollars) Extended Price (US Dollars) ID220 Interceptor Jammer Installation Service Year of Service (maintenance) Subtotal Shipping Total Amount Due