Tactical

Satellite Intercept

  • Extracts mobile phone IMSI, IMEI & MSISDN
  • Intercepts SMS, Calls, Data (all -incoming & outgoing)
  • Encrypted or unencrypted data can be stored
  • Tactical off-air solution
  • Multiple target support
  • Targets keep full functionality on mobile devices

Intercept detector

    • IMSI Grabber/Catcher DETECTOR to detect if there is/are interception equipment in surrounding area.
    • Build protection on your Head Quarters as a target by detecting the interception device
    • Give an extra layer of security by acknowledge any attempt to intercept.
    • A customized handphone which and be portable and very easy to operate

Monitoring & Intercept

Fiber Intercept

  • Fiber optic Internet Data Analysis system
  • Ascertain intelligence value of fiber before committing resources
  • Different analysis functions
  • Expandable to a fiber optic interception system
  • Artificial Intelligence Analytic

Cellular Intercept

    • On-net Telephony Monitoring for content and metadata
    • A unified view of communication across mobile and fixed line networks.
    • The versatile network connectivity, feature rich unified user interface, scalable architecture, and flexible deployment to adapted to technology interfaces and topology changes
    • Voice ID

Satellite Intercept

    • Software decoding, de-multiplexing and decompression capabilities for satellite signals
    • Capture content for analysis and target identification
    • Intercept hundreds of satellite carriers simultaneously for intelligence extraction
    • Artificial Intelligence System

Defense System

Moving Target security

    • To move, distribute & conceal the targets
    • The network becomes a dynamic system with moving targets.
    • Users are invisible to the outside world.
    • Every data transmission is encrypted.
    • By the nature of the system, a laterally moving intruder stands out.
    • Provide a HONEY POT to trap the attacker and analyze the behavior and track the attack 

Secure Communication


      • Secure Server 
      • Secure Laptop
      • Secure Handphone 
      • Secure Application & Secure OS (non Commercial) 
      • Secure & Customize CCTV camera system network


    Jamming


      • Camouflage jammer (Painting)
      • Portable jammer (Backpack or Suite case)
      • High power jammer (Vehicle Mounted)
      • Drone and UAS jammer (Portable and Mounted)
      • Reactive and unoticable jamming system