slaider
 

Product categories

slaider
Information Security

Provide reliable security
information products

slaider
Communication network

Provide reliable security
information products

slaider
Integrated information system

Provide reliable security
information products

slaider
Monitoring cyberspace
and an early warning tool

Provide reliable security
information products

slaider
Mobile phone monitoring
and the positioning system

Provide reliable security
information products

slaider
Radio Frequency Detector
and an interference generator

Provide reliable security
information products

» Categories

1. Information Security:

Tel / fax encoder, The channel encoder, SDH encoder, IP encoders, Crypto phone, Encoder for HF radio, Encoder for V / UHF radio, Encoder for V / UHF radio, Safe portable radio station, Military SSD, firewall, IDS, Secure key management system …

 

2. Communication network:

Network Controller, HF radio, V / UHF radio, military headquarters, Mobile platform, Complex communication machine, communication device, Small communication machine …

 

3. Integrated Information System:

Public Security System C4I, Panorama monitoring system, communication system, Information security system, Key protection system, Information Collecting System, positioning, City system of video surveillance, Command and control system, Intelligent transport system, Underbody inspection system, Metal detector frame …

 

4. Cyberspace surveillance and early warning:

Vulnerability Scanning, monitoring problems, Protection against attacks, Deputy Security Officer, Track the source of the attack, Secure login, Always online – without disturbances, Prevention of a DDoS attack, 3D visualization …

 

5. Mobile phone monitoring and positioning system:

Intercept 2G / 3G voice calls and SMS messages, Decryption (required decoder) in real time A5.1, A5.2, Selective locking for registered mobile phones, Collection and collection of IMSI / IMEI identities, A fake call / sms on every registered mobile phone, The positioning of targeted mobile phones in the workspace, The active system creates a fake BTS, The best parameters of communication work are provided, The clone module sends the message to the real BT …

 

6. Radio Frequency Detector and Fault Generator:

Detection of professional wireless listening devices, hidden cameras, mobile phones, remote control, car keys, WiFi, GPS, radio, microphone.
The jammer suppresses the signal from mobile phones, remote-controlled explosive devices, remote-controlled aircraft and drones …

 

7. Digital forensics:

Device for data recovery of hard disks of any kind, A universal device for forensic examinations, Program for data deletion, A universal device for forensic examinations, Mobile forensic investigations, Device for collecting e-mails, A network device for forensic examinations, Analysis field (read-only), 12-way unit, Password recovery systems and more …

Information Security:

 

Tel / fax encoder,
The channel encoder,
SDH encoder,
IP encoders,
Crypto phone,
Encoder for HF radio,
Encoder for V / UHF radio,
Encoder for V / UHF radio,
Safe portable radio station,
Military SSD
firewall
IDS
Secure key management system ...

 

Communication network:

 

Network Controller
HF radio
V / UHF radio
military headquarters
Mobile platform
Complex communication machine
communication device
Small communication machine

Integrated Information System:

 

Public Security System C4I
Panorama monitoring system
communication system
Information security system
Key protection system
Information Collecting System
positioning
City system of video surveillance
Command and control system
Intelligent transport system
Underbody inspection system
Metal detector frame

Cyberspace surveillance and early warning:

 

Vulnerability Scanning
monitoring problems
Protection against attacks
Deputy Security Officer
Track the source of the attack
Secure login
Always online - without disturbances
Prevention of a DDoS attack
3D visualization

Active monitoring and positioning system

 

The active surveillance system was developed to investigate, monitor and track criminal activity. The system provides a monitoring function to track, for example, the location of the destination mobile phone.

 

 

 

 

Main functions:

 

• Intercept 2G / 3G voice calls and SMS messages.
• Real-time decoding A5.1, A5.2,
• Selective locking for registered mobile phones.
• Collect and collect IMSI / IMEI identity.
• Deception call / SMS on each registered mobile phone.
• Positioning of target mobile phones in the work area.

 

Working Theory:

 

• The active system creates an incorrect BTS.
• The best parameters of communication work are provided.
• The clone module transmits the message to the real BTS.

 

 

Passive position monitoring system

 

The passive surveillance system is used for message collection and border surveillance. It provides a feature to monitor voice calls in real time and SMS messages from the GSM network.

 

 

 

 

 

Main functions:

 

• Listening to calls and SMS messages.
• Decryption (required decoder) in real time A5.1, A5.2,
• Mode: Random and Targeted.
• Works secretly and at a great distance.
• Positioning of target mobile phones in the work area.

 

Working theory:

 

• The passive system receives the data from the downlink (BTS) and uplink (mobile phone) from the radio interface.
• It works completely in passive mode, does not affect the settings of the network provider.
• Works secretly (undetectable).

Radio Frequency Detector and Fault Generator:

 

Detection of professional wireless listening devices, hidden cameras, mobile phones, remote control, car keys, WiFi, GPS, radio, microphone.
The jammer suppresses the signal from mobile phones, remote-controlled explosive devices, remote-controlled aircraft and drones.

Write the E-Mail, we will contact you within days.