Skip to content
Home
About Us
Products & Services
IMSI CATCHER & INTERCEPTION SYSTEMS
ELECTRONIC COUNTER MEASURES (ECM) “JAMMING”
AUDIO BORDER EAVESDROPPING COUNTER MEASURES
ODIN LASER LISTENER
SURVEILLANCE & COUNTER SURVEILLANCE
BALLISTICS CLOTHING & EQUIPMENT
DRONE DETECTION & COUNTER SOLUTIONS
NIGHT VISION, THERMAL IMAGING & OPTICAL
ANTI RIOT EQUIPMENT
EOD/IEDD EQUIPMENT
DETECTION & XRAY EQUIPMENT
TRAINING SOLUTIONS
Contact
Menu
Home
About Us
Products & Services
IMSI CATCHER & INTERCEPTION SYSTEMS
ELECTRONIC COUNTER MEASURES (ECM) “JAMMING”
AUDIO BORDER EAVESDROPPING COUNTER MEASURES
ODIN LASER LISTENER
SURVEILLANCE & COUNTER SURVEILLANCE
BALLISTICS CLOTHING & EQUIPMENT
DRONE DETECTION & COUNTER SOLUTIONS
NIGHT VISION, THERMAL IMAGING & OPTICAL
ANTI RIOT EQUIPMENT
EOD/IEDD EQUIPMENT
DETECTION & XRAY EQUIPMENT
TRAINING SOLUTIONS
Contact
IMSI CATCHER & INTERCEPTION SYSTEMS
IMSI CATCHER & INTERCEPTION SYSTEMS
Our range of state of the art IMSI Catchers and Interception systems provide real-time covert intelligence gathering of multiple technologies:
IMSI Catcher & Location
(2/3/4/5G – FDD, TDD, LTE+)
Portable
Backpack
Vehicle Mounted
Drone Mounted
TRS Tactical Reconnaissance System
(advanced IMSIC & File Monitoring)
Local or Country-wide monitoring with deployed “capture units”
4 x Wireless or Wireless + Cell capture units supplied per unit
Active or Passive GSM & Satellite Interception Solutions
Active 2/3/4G SDR Monitoring with 2G Voice Intercept
Passive 100% undetectable dual band
Beidou, Thuraya, ISAT, Iridium
SOMI-W1/W2
(Tactically Active Wi-Fi Interceptor)
Interception of http browsing and traffic
Non-encrypted POP3 and SMTP email interception
Interception of FTP traffic
User ID and password interception on HTTPS websites
User ID and password interception for Google/Facebook/etc
Non-encrypted VOIP traffic
WEP cracking with Wi-Fi network password recovery
WPA cracking with Wi-Fi network password recovery
EAP login capture and cracking of hash
SOMI-W2 optional add-on provides specific attacks which are deployed from the target network after access has been granted using SOMI-W1