Anda di halaman 1dari 87

COMPANY PROFILE

GRAHA PULO 3RD FLOOR


JALAN BUNCIT RAYA

NOMOR 89 JAKARTA SELATAN

INDONESIA 12740

T: (021) 7970038

E: info@wiracitrainfotek.com

HTTPS://WIRACITRAINFOTEK.COM
PT Wira Citra Infotek is a provider of
cyber defense security and intelligence
data mining software, helping military,
police, intelligence agency, government
and enterprise organizations to neutralize
and prevent terror, crime and cyber
threats.

SUPPORTED BY INTELLIGENCE METHODOLOGY


With more than two decades of With market analysis being our DNA,
extensive industry experience, we knowledge became inherent to our
combine the most advanced existence. Our passion to evaluate the
technology with best practices and breaching patterns and identify
intelligence methodologies to create efficient security solutions products
real-world solutions that help our that safeguard businesses from all the
customers take intelligence security possible breach threats.
to the next level.

W I R A C I T R A I N F O T E K
PRINCIPAL PARTNERS
Thermal Camera Fever Block F2122-TG
Infrared Face Temperature Screening System

NUCTECH infrared face temperature screening system menggabungkan infrared


thermal imaging technology dan visible light imaging technology dalam satu
kesatuan untuk memenuhi pengukuran suhu real-time non kontak, melalui
pengukuran suhu skala besar dan penyaringan.

Didasarkan pada algoritma pembelajaran yang mendalam yang dapat secara


akurat mencari posisi wajah dan menghindari gangguan suhu tinggi lainnya seperti
benda. Sistem dapat digunakan untuk pengukuran suhu tubuh yang cepat dalam
berbagai tempat. Sistem akan secara otomatis memberi peringatan jika suhu
tubuh tidak normal terdeteksi.

High-Precision Integrated Solution


FITUR

PENGUKURAN SUHU STABIL KINERJA TANPA HENTI


Secara tepat menemukan wajah manusia menggunakan Memungkinkan pengukuran suhu dari banyak orang
algoritma pembelajaran yang baik untuk menghindari sekaligus, tanpa harus berhenti dan menunggu, dengan
pengaruh sumber panas yang tidak relevan, dan bekerja lebih dari 120 orang per menit. Mengukur dari jarak aman
stabil saat mendeteksi target yang menggunakan masker. dari 1m ke 5m dan tidak melakukan pengukuran suhu
terhadap orang dengan resiko yang rendah dari infeksi
penyakit.

KALIBRASI OTOMATIS DAN AKURAT KEAMANAN DATA


Kalibrasi suhu otomatis yang sesuai dengan kondisi Data alarm dapat dilacak, menyediakan statistik data suhu
lingkungan untuk mencapai akurasi pengukuran suhu ± harian dan manajemen epidemi yang efisien. Informasi
0,3º C, tanpa pengaturan manual. pribadi dengan suhu normal tidak akan disimpan.

88.5mm 250mm
127mm

91mm

Infrared Camera Resolution 256×192 Measurement Accuracy ≤0.3℃

Field of View 42°× 32°(H×V) Efficiency 60 persons /min

Focal Length 4mm Visible Camera Resolution 1920×1080

Measurement Range 30℃~45℃ Operation Temperature 0℃~40℃

Measurement Distance 1m - 3m Operation Environment indoor

PT WIRA CITRA INFOTEK Copyright 2019 NUCTECH COMPANY LIMITED,All Rights reserved.

Gedung Graha Pulo 3rd Floor Design and specifications are subject to change without notice. Printed in CHINA,January 2020
Jl. Buncit Raya no.89
Jakarta Selatan, Indonesia 12740 NUCTECH HAS BEEN AWARDED THE CERTIFICATE OF QUALITY MANAGEMENT SYSTEM(ISO9001:2008)

P : 081234560084
NUCTECH HAS BEEN AWARDED THE CERTIFICATE OF ENVIRONMENTAL MANAGEMENT SYSTEM (ISO14001:2004)

https://wiracitrainfotek.com NUCTECH HAS BEEN AWARDED THE CERTIFICATE OF OCCUPATIONAL HEALTH AND SAFETY MANAGENENT
ROKID GLASS THERMAL SPECIFICATION
IR SENSOR TYPE : UNCOOLED INFRARED FOCAL PLANE

RESOLUTION : 384 x 288

FRAME RATE : 25Hz

FOV / FOCAL LENGTH : 28.4º x 21.4º / 13MM

TEMPERATURE SENSITIVITY : ≤ 0.04ºC

POWER CONSUMPTION : < 300MW

MEASURING TEMPERATURE RANGE : 30ºC - 45ºC

OPERATING ENVIRONMENT TEMPERATURE RANGE : 10ºC - 40ºC

ACCURACY : ± 0.3ºC WITHIN 2 METERS, ± 0.4ºC AT 4 METER

WEIGHT : < 30 GRAM


ROKID GLASS 2 HARDWARE SPECIFICATION

OPTICS SENSOR AUDIO


40 DEGREE FOV 8MP CMOS IMAGE SENSOR 2 MICROPHONES

MONOCULAR DISPLAY 9-AXIS GYRO STEREO SPEAKER

HIGH RESOLUTION LIGHT SENSOR ACTIVE NOISE CANCELLATION

HIGH CONTRAST PROXIMITY SENSOR

WEIGHT ACCESSIBILITY COMPATIBILITY


GLASS 90 GRAM DETACHABLE COVER PC
DOCK 238 GRAM CORRECTIVE LENS ANDROID 9
ROKID GLASS 1 HARDWARE SPECIFICATION

OPTICS SENSOR AUDIO


30 DEGREE FOV 12MP CMOS IMAGE SENSOR 2 MICROPHONES
MONOCULAR DISPLAY OPTICAL ANTI-SHAKE STEREO SPEAKER
HIGH RESOLUTION ACTIVE NOISE CANCELLATION
HIGH CONTRAST

WEIGHT TRANSMISSION COMPATIBILITY


180 GRAM BLUETOOTH 5.0 PC
WIFI 802.11A/B/G/N/AC ANDROID 7.1
Rokid
Hangzhou Lingban Technology Co.,Ltd
Room 102, No.3, Yixuan Road,
Xixi Yishu Jihe Village,
Wuchang Street,
Yuhang District,
Hangzhou,
China

Certificate of Letter
To whom it may concern,

We woud like to certify that

WIRACITRA INFOTEK
Gedung Graha Pulo 3rd Floor JI. Buncit Raya no. 89 Kel. Kalibata, Kee.
Pancoran Jakarta Selatan, Indonesia 12740

P: +6221-7970038
F: +6221-7900740

https ://wiracitralnfotek.com

is exclusive representative of our company for the project of Pusat Sandi Siber
Angkatan Darat (PUSSANSIAD) in Indonesia.

We have at their disposal our team of engineers and all our experience acquired
around the world with all of our customers.

Thank you very much.

Regards,
NUCTECHTM TR1000QC
HSG Handheld Safe Guard

Creating a safer world

NUCTECHTM TR1000QC is a novel handheld multifunction


detector model based on Ion Mobility Spectrometry (IMS), built
on the 15-years-field-proven TR series. TR1000QC enables users
to detect trace of explosive & drug substances sampled from
passenger & cargo surfaces and “smell” toxic industrial gas &
chemical warfare agents. In addition, the system is integrated
with a nuclear radiation detection module.
Its detection performance and CBRNE-oriented concept makes
it a powerful instrument deployed in aviation security, customs
& borders, critical infrastructure, police & military, etc., as a
trustworthy and reliable part of NUCTECH integrated solutions.

Technical Features

 Designed as next generation IMS system  Very lightweight and compact design

 Non-radioactive ionization source (NRIS)  Automatically self-calibrated

 Detecting explosives and drugs in one analysis  Simple and intuitive software user interface

 Detecting and monitor volatile compounds  Live self-diagnosis system to ease maintenance

 Support non-contact vapor sampling method  Integratable with remote management platforms

 Auto alarm on over-dosed nuclear radiation  Hot-Pluggable batteries for 5 hours standby

 Field-proven extremely low false alarm rate  Reusable sampling swabs and filter materials
NUCTECHTM TR1000QC
HSG Handheld Safe Guard

Technical Data
General Specification
Technical Principle Ion Mobility Spectrometry (IMS)
Ionization Technology Non-radioactive Ionization Source (NRIS)
Analyzing Mode Explosive Mode, Narcotic Mode, Dual Mode, Vapor Mode and Multi Mode
Detectable Explosives* TNT, RDX, PETN, NG, AN, HMTD, HMX, Tetryl, TATP, UN, DNT, BP, etc.
Detectable Narcotics* Cocaine, Heroin, THC, MA, Ketamine, MDMA, Morphine, Amphetamine, LSD, Ephedrine, Fentanyl, etc.
Detectable Volatiles* DMNB, Acetone, DMMP, NH3, HCl, SOx, typical chemical warfare agents (CWA), etc.
Detectable Radiation X-ray and γ-ray (50 keV-1.25 MeV)
Calibration Automatic internal calibration
Verification Standard Verification Pen
Particle sampling with reusable swabs by directly using hand or wand to detect explosives and drugs
Sampling Method Non-contact vapor sampling to detect or continuously evaluate toxic industrial compounds
Background real-time monitor of nuclear radiation dose rate
Sensitivity* Nanogram
False Alarm Rate < 1%
Warm-up Time < 20 minutes
Analysis Time < 8 seconds
Cleanup Time < 15 seconds (typical)
Functions and Configurations
User Interface 4.3” color touch-screen with easy software UI
Readout Pass/Alarm with substance name, signal strength, original spectrum (configurable audio alarm)
Data Interface Ethernet, USB, GPS and Wi-Fi, supporting data transfer via USB or network
Data Storage > 100,000 samples (expandable memory)
Installation Data
Dimensions 411mm(L)×147mm(W)×192mm(H)
Weight < 4 kg
Power Supply 100-240V AC ±10%, 47-63 Hz
Battery 2 Hot-swappable batteries supporting 5 hours operation in total
Operating Temperature -20℃ to +55℃
Operating Humidity 0 to 95% non-condensing
Operating Pressure 60 to 106 kPa
Transportation case Cabin-baggage-size hardened transportation case
* Threat substances and sensitivity setting are subject to regulatory authority and customization

TR1000QC-HSG-EN V19.09
Copyright 2019 NUCTECH COMPANY LIMITED, All Rights reserved. NUCTECH AWARDED THE CERTIFICATE OF QUALITY MANAGEMENT SYSTEM (ISO9001:2015)
Design and specifications are subject to change without notice. NUCTECH AWARDED THE CERTIFICATE OF ENVIRONMENTAL MANAGEMENT SYSTEM (ISO14001:2004)
NUCTECH AWARDED THE CERTIFICATE OF OCCUPATIONAL HEALTH AND SAFETY MANAGEMENT SYSYTEM (GB/T28001-2011)

Address: Gedung Graha Pulo lt. 3


Jl. Warung Buncit Raya no. 89
Phone: 021-7970038
Email: info@wiracitrainfotek.com
Total Solution for Security

NUCTECH CX6040BI
TM

X-RAY INSPECTION SYSTEM


EN

Introduction
The NUCTECHTM CX6040BI X-ray Inspection System comes from the most advanced and best proven CX
product platform, and fully inherits and shares improved image quality with a variety of professional image
enhancement processing functions, ergonomic and friendly user interface, intelligent networking capabilities and
applications, excellent reliability and maintainability.
The CX6040BI has a popular tunnel opening of 606mm wide by 420mm high, as well as a modern outlook and
compact framework design, and it’s the best solution for security and customs requiring screening of hand-held
baggage and parcels at airports, rail transportation stations, critical infrastructures and big events, etc.

Technology Features
■ World-leading image quality with high wire resolution of 40 AWG and steel penetration up to
38mm.
■ Explosives and narcotics detections and alarms according to the atomic number signatures.
■ Threat Image Projection (TIP) ready X-ray system, providing a practical solution for operator
performance monitoring and training, as well as reducing the probability of threats
misses effectively. Advanced material classification:
orange for organic, blue for metal and
■ X-ray leakage around the equipment is close to natural background level, complying with all green for mixed material

international safety and health standards.


■ Ergonomic keyboard and user interface design ensure the efficiency and professionals of
baggage screening operating.
■ High reliable operating and data storage safety are guaranteed by applications of industrial
computer, embedded system, and data access strategy and configurations.
■ Optimized concept of operations, centralized image identify and storage capability
implemented by various network applications. Automatic detection of drugs
■ Modular design and constructions, combined with full built-in diagnostic facilities, make the
system maintenance more economic and efficient.
Technical Specifications
General Specifications
Tunnel Dimensions 606mm(W) × 420mm(H)
Conveyor Speed 0.20m/s
Conveyor Height 680mm
Max. Load 160kg

Image Performance
Wire Resolution 40 AWG
Steel Penetration 38mm
Display Resolution 1280 × 1024

Image Processing System


Color/BW, negative, high/low penetration, organic /inorganic stripping, general NUCTECH COMPANY LIMITED
Image Enhancement Address: 2/F Block A, Tongfang Building,
enhancement, multi-absorptivity, and suspect material enhancement, etc.
Shuangqinglu, Haidian District,
Material Classification According to atomic number signatures Beijing 100084, P.R.China
Tel: +8610 50980999
ROI & Zoom Step/stepless zoom, up to 32 times enlargement Fax:+8610 62788896
Image Recall Preceding images recallable NUCTECH HONG KONG COMPANY LIMITED
Image Storage Capability Up to 50,000 Address: Rooms 1403-04 on the 14th Floor
of China Resources Building, No.26
Harbour Road, Wanchai, Hong Kong
Miscellaneous Functions Tel: +852-27221828
Fax: +852-27221849
Time/date display, counters, user management, system-on/X-ray-on
NUCTECH SYDNEY PTY LTD.
Standard Functions timers, power on self test, built-in diagnostic facilities, dual-direction Address: Suite 404, 77 Dunning Avenue,
scanning, system log, system standby and training, etc. Rosebery NSW 2018 Australia
Tel: +612 96622307/96622317
Explosives/narcotics detections, high-density area alert, threat image
Optional Functions Fax: +612 96622371
projection (TIP)
NUCTECH WARSAW COMPANY
LIMITED SP. Z O. O.
Health and Safety Address: ul. Pandy 18,02-202 Warsaw Poland
Tel: +48 22 6591545
Less than 1µGy/h (5cm from the housing), complying with all published Fax: +48 22 6581483
X-ray Leakage
international standards NUCTECH COMPANY LTD SUC.
Film Safety Guaranteed for high speed film up to ASA/ISO1600 (33DIN) ARGENTINA
Address: ECHEVERRIA 1515, 6A, BELGRANO,
CABA, CP1428. ARGENTINA

Installation Data Tel: 0054-11-4782 2486


Fax: 0054-11-4785 0726-108

Dimensions 2042mm(L) × 850mm(W) × 1301mm(H) NUCTECH COMPANY LIMITED


(VENEZUELA BRANCH)
Weight 640kg
Address: Av. San Juan Bosco, Entre 2da y
Storage Temperature / Humidity -40°C ~ +60°C/ 5% ~ 95% (non-condensing) raTransversal, Centro Altamira, Piso 14,
Ofc."C", Caracas, Venezuela
Operating Temperature / Humidity 0°C ~ +40°C / 5% ~ 95% (non-condensing) Mobile: +58412 321 7001
Power Supply 220VAC/ 110VAC (-15% ~ +10%),50 Hz/60Hz ±3Hz Tel: +58212 261 1050/261 9074
Fax: +58212 261 0618
Power Consumption 0.8kVA
NUCTECH MIDDLE EAST FZE
Note: Image performance specifications are based on test piece complying with CAAC standard. Address: Office 321, Building 5 A, Dubai Airport
Free Zone, P.O.Box 371820, Dubai, U.A.E
Tel: +971-4-2602308
Fax: +971-4-2602306
Email: cuiwei@nuctech.com

Nuctech South Africa (Pty) Ltd.


Address: Unit B13, 5 Galaxy Ave, Linbro Business
Park, Sandton, Johannesburg, South Africa
Tel: +27 (11) 6080480
Fax: +27(11) 6080525

NUCTECH DO BRASIL LTDA.


Address: Rua Bandeira Paulista Road No. 530,
9th floo , room No.91-94, Itaim Bibi
District, São Paulo/SP, Brasil
Tel: +55-11-30785449
Fax: +55 11 30785759

Copyright C 2017 NUCTECH COMPANY LIMITED. All Rights reserved. 170324


Design and specifications are subject to change without notice.
Printed in CHINA, Mar 2017.

NUCTECH HAS BEEN AWARDED THE CERTIFICATE OF QUALITY MANAGEMENT SYSTEM (ISO9001:2000)
NUCTECH HAS BEEN AWARDED THE CERTIFICATE OF ENVIRONMENTAL MANAGEMENT SYSTEM (ISO14001:2004)
NUCTECH HAS BEEN AWARDED THE CERTIFICATE OF OCCUPATIONAL HEALTH AND SAFETY MANAGENENT
SYSYTEM(OHSAS18001:2001)
NUCTECH Checkpoint Vehicle Inspection System integrates

Checkpoint Vehicle
the backscatter vehicle inspection system, the license plate
recognition system and the under vehicle surveillance system,

Inspection System
which could effectively find the contrabands and dangerous
items concealed in vehicles and cargos etc. to achieve
comprehensive and multidimensional inspection.

Work Scenario
Extra-Low Dosage
Dose absorbed by the driver per scan is extremely low, which ensures
the safety of the driver and passenger.

Multi-function Integration
The Inspection System can be integrated with various inspection devices such as License
Plate Recognition System, Under Vehicle Surveillance System etc., hence provides
comprehensive inspection information of the vehicle.

Real-time scanning and powerful functions


Real-time imaging , high resolution image.
Auto-alarm to drugs, explosives and other large organic substances.
Powerful image processing functions such as contrast, brightness adjustment,
enhancement and colorization.

Lightweight structure, easy deployment

Excellent penetration capability

System Composition

V-Tec F100
V-Tec F100 backscatter inspection system is a powerful real-time imaging
inspection system for vehicles, which can quickly check concealed threats
through non-contact scanning.

参数信息
Type of X-ray source X-ray tube
Energy 16KeV/180KeV/225KeV
Penetration 7~9mm steel at 1.5km/h
Spatial resolution 5~7mm @ 1.5m from the scanner
Scanning speed 0.5~10km/h
0~2m @ 0.5m from the scanner 毒品
Max. Dim. Of scanned height 0~2.5m @ 1m from the scanner
0~3m @ 1.5m from the scanner

Absorbed dose to cargo per scan ≤0.1μSv at 5km/h @ 1.5m from the scanner
System size 1.2~2m(L)×0.7~1.2m(W)×1~1.5m(H)
Gross weight 400~1000kg

Creating a safer world


License plate recognition system can accurately recognize license plates
License Plate Recognition System
from different countries, and can automatically or manually control the
barrier bar according to the inspection results of other systems, such as
V-Tec F100, under vehicle surveillance system.

Parameters
Camera 2 million index,1/2.8"progressive scanning,resolution 1920*1080
LPR Vehicle capture rate ≥ 99%, LPR accuracy rate ≥ 99%,
single LPR time ≤ 30ms, vehicle speed range of 0 ~ 20km / h

1 second to action.
Digital Lever The traffic light is equipped, and the deceleration belt type tire breaker

can prevent the vehicle from rushing.

Work Temperature:-35℃~+75℃
Enviorment Humidity:≤95% (No condensation)

Under vehicle surveillance system is embedded in the ground as a whole.


The high-resolution linear CCD imaging scanning technology and image
Under Vehicle Surveillance System
processing technology are used to scan the under of the vehicle to detect
contrabands and threats.

Parameters
Resolution Horizontal≤2 mm/pixel Vertical≤1mm/pixel
Speed ≤30km/h
Detection Range Horizontal Width≥2500 mm Min Distance:100mm
Camera Lens Angle 180 °
Work Enviorment Temperature:-25℃~+55℃
Humidity:≤99% (No condensation)
Trigger Ground induction coil / Photoelectric switch

Software Interface

Copyright 2019 NUCTECH COMPANY LIMITED, All Rights Reserved. NUCTECH COMPANY LIMITED
Design and specifications are subject to change without notice. Address:2/F Block A, Tongfang Building,
Printed in CHINA, Mar 2019. Shuangqinglu, Haidian District, Beijing PRC
NUCTECH HAS BEEN AWARDED THE CERTIFICATE OF QUALITY MANAGEMENT SYSTEM (ISO9001:2008) Postcode:100084
NUCTECH HAS BEEN AWARDED THE CERTIFICATE OF ENVIRONMENTAL MANAGEMENT SYSTEM (ISO14001:2004) Website:http://www.nuctech.com
NUCTECH HAS BEEN AWARDED THE CERTIFICATE OF OCCUPATIONAL HEALTH AND SAFETY MANAGENENT
SYSYTEM(OHSAS18001:2001)
ANALYSIS
SOLUTIONS &
SERVICES

+6281234560084
CENTRAL COMMAND & CONTROL AND ANALYSIS SOLUTION
Introduction
In an increasingly complex and hyperconnected world, Repositories into a central database. The collected data
security and defense organizations need a level of is analyzed using a subsystem. The analysis includes
insight, collaboration and optimization not possible Voice Print Analysis, Image and Video Analysis, Natural
before. To achieve battlespace dominance, you need Language Processing, Link Analysis, Open Source
key intelligence delivered across the full Intelligence and Cryptanalysis. The results of the
communications spectrum. Stratign’s Central analysis are stored as a metadata in the same database
Command and Analysis Solution is an intelligent along with call related information and intercepted
decision support and operations management platform content. Various filters based on all the metadata
which enables the user to Intercept, Collect, Process, information can be created by the users. The system
Analyze and Disseminate intelligence information in will generate reports based on these filters. The
real time. The system collects data from sensors such operators and the administrators will be able to access
as COMIT Systems, ELINT Systems and National Data and react upon this information.

Features
• Stratign’s Central Command and Analysis • Voice Print Analysis includes Speaker
Solutions enable you to Intercept, Collect, Process, Identification, language identification, Keyword
Analyze and Disseminate intelligence information spotting, Gender detection, Emotion detection and
in real time. Age detection.
• The System can integrate existing third-party • Image and Video Analysis include Face
sensors or sensors from Stratign. Recognition, Age, Gender, Identification of vehicle
• Provides visualization and advanced graphical types and registration number etc.
analytics.
• Could be integrated with active jamming systems
operating across the extensive frequency range to
neutralize signals of interest.
• Integrated GIS for situational awareness.
SATELLITE TRUNK TELECOM DATABASE
MONITORING

CELL PHONE RADAR ESM AND RWR


MONITORING

SATELLITE PHONE OTHER NATIONAL


MONITORING DATA REPOSITORIES
NATIONAL ID CRIME RECORD
DATABASE DATABASE

WI-FI, LAWFUL ELINT SYS, TACTICAL


INTERCEPTION EW SYSTEM
SYSTEM

MEDIATION SERVERS

OSINT COMMAND &


CONTROL CENTER

CENTRAL DATABASE

VOICE PRINT
SIGNAL ANALYSIS COMMANDER
ANALYSIS (VPA)

FACE
RECOGNITION

NATURAL LANGUAGE
PROCESSING (NLP)

CHIEF ANALYST
CRYPT ANALYSIS
ANALYSTS
OPEN SOURCE INTELLIGENCE (OSINT)
Introduction
Stratign’s Open Source Intelligence (OSINT) platform Query/Search: Stratign’s solution can take any form
is an innovative cyber intelligence solution designed of input identifier, i.e. either a phone number or
to meet a wide range of operational needs for email address to get all information associated with
enterprises, cyber analytics professionals, banking it. The solution has multiple query/search options
and government agencies. The system is primarily based on mobile number, email, keyword, sentences,
used for national security, law enforcement and group names, etc.
business intelligence functions. The platform is
designed to collect and analyze information gathered Geo-Fencing or Location Based Search: Our
from public, or open sources. The open source technology allows the operator to carryout area
platform includes Social Media, Content Storage searching to get all activities performed or ongoing
Platforms, News Websites, etc. in that geographical area.

Scanning: The system can scan huge numbers of Result Visualization: Stratign's Graphic-Visualizers
data in a matter of few minutes and give the operator provides power to user to get all searched results
the complete picture of the social media accounts into graphical view of relation between targets and
and activities of the target.a activities.

Features
• Mass Profiling: Build a personal profile from similar preferences and common groups
multiple sources in minutes. between suspects at multiple levels.
• Multiple Web Sources: Collect information from • Sentiment analysis capabilities – analyzing the
the widest range of social networks and web target’s posts and identifying feelings and word
aapplications. and context anomalies.
• Geo-political risk analysis. • Identifying potential activity in Deep Web and
• Built-in intelligence workflows supporting the Dark Web.
entire range of operational needs. • TimeLine – viewing and analyzing all target
• Profile Analytics: Performs keyword spotting, posts and social network activities, easily finding
target spotting, track events and discover social the most-liked post and all relations between
connections. targets according to likes, tagging and
comments activity.
• Forensics: Generates a target profile based on
an unknown number extracted from a device at • The system is Fully Scalable and can be
the forensics laboratory. customized to meet the specific requirements &
increased performance demands of the client.
• Link analysis – identifying social connections,
FACIAL RECOGNITION SYSTEM
Introduction
Stratign’s Facial Recognition System is an artificial It can verify a face even if there is a dramatical change
intelligence-based solution capable of identifying or in appearance such as the presence of a beard or
verifying a person from a digital image or a video frame mustache, glasses, a semi covered face, etc. The
from a video source. The system is imperceptible, fast, system can process billions of entries in a facial
and accurate, capable of identifying a person in a crowd database searches with the highest possible accuracy
in a fraction of a second. Its main application areas and speed. It can detect age with 95% accuracy within 5
include defense and intelligence, public safety, years range. The system is also capable of determining
banking, retail, events, access control, and social a person’s gender with 99% accuracy. It can also
networks environment. recognize 7 basic and 50 complex human emotions.
The system incorporates an original liveness detection
Stratign's solution can detect an unlimited number technology allowing to distinguish a real human from a
of faces in an image, which makes it an ideal security photo or video.
solution. The system can detect faces in complex
conditions and is effective even when there is a
significant change in light, posture, and face angle.

Features
• Face Detection: Detects an unlimited number • Attributes: The algorithm extracts the following
of faces in an image even when there is a attributes: gender, age, emotions, glasses,
significant change in light, posture, and face beard etc.
angle. • Liveness: 2D liveness technology based on
• Face Verification: Capable of detecting passive detection ideal for access control.
dramatical change in appearance such as the • OSINT Integration: Integration with Stratign’s
presence of a beard or moustache, glasses, OSINT solution to identify targets based on
a semi covered face, etc. social media profiling.
• Face Identification: Scans 500 million faces less
than 0.3 sec.
NATURAL LANGUAGE PROCESSING (NLP)
Introduction
Stratign’s Natural Language Processing (NLP) solution Word segmentation, Parsing, Sentence breaking
is designed to extract meaningful information from and Stemming.
textual contents. The system employs multiple
levels of text mining, text extraction, natural language Our technology is used in National Security, Intelligence,
processing techniques. Our technology applies Marketing, Recommendation Engines, Customer
computer algorithms to apprehend the meaning of Insights, Knowledge Engines, Relevant Search, Cognitive
texts and uses expert techniques to identify how words Computing. The solution automates, simplifies and
and sentences are constructed. The system evaluates accelerates human understanding from an infinite pool
how the natural language allies with the grammatical of intercepted textual data.
rules, via various techniques such as Lemmatization,

Features
• Extracting entities – such as companies, people, • Fact extraction – to fill databases with structured
dollar amounts, key initiatives, etc. information for analysis, visualization, trending,
• Categorizing content – positive or negative (e.g. or alerts.
sentiment analysis), by function, intention or • Relationship extraction – to fill out graph
purpose, or by industry or other categories for databases to explore real-world relationships.
analytics and trending.
• Clustering content – to identify main topics of
discourse and/or to discover new topics.

VOICE FORENSIC SYSTEM (VFS)


Introduction
Stratign’s VFS is a speech analysis system intended for forensic experts. The system uses Voice Biometric
use by law enforcement, public safety, investigation technology to quickly search and accurately identify
and forensic experts. The platform can handle almost language, speakers and keyword within large amounts
any speech-processing challenge, whether it is the of audio recordings making it ideal for law enforcement
analysis of massive amounts of audio recordings for and intelligence agencies. VPA can also analyze audio
investigation purposes, or just a few audio tracks for files for Speech/Non-speech detection.

Features
• Speaker Identification in signal under analysis • Age detection.
from known database of speaker voice samples. • Based on a client server mode/architecture use of
• Multiple language and dialect identification. standard hardware
• Keyword spotting. • Multi-parallel processing supported.
• Gender detection. • Scalability and Flexible interfaces for the
• Emotion detection. integration of classifiers
CRYPT ANALYSIS
Introduction
Stratign has been indigenously developing and Stratign has successfully broken crypto algorithms
implementing crypto algorithms which are tailor- used in communication networks like GSM, Thuraya,
made to meet the customer requirements for the past Iridium, INMARSAT, etc. Special algorithms like DES
20 years. Over the years, we have worked with various has been deciphered by Stratign. These developments
government and intelligence agencies worldwide in the have been converted into successful products and
field of communication intelligence, signal analysis are being successfully used by various government
and processing. The experience and knowledge gained intelligence agencies worldwide.
over this period is unparalleled.

Features
• Strong tie ups with international crypto analysis • to create
Strong tiesimulation and softwarescrypto
ups with international for appropriate
analysis
resources. decryption.
resources.
• Access to High Speed Performance computing •• Joint Research
Access ActivityPerformance
to High Speed can be initiated between the
computing
and software design. endsoftware
and customerdesign.
and Stratign whereby Stratign
• Dedicated team of in-house experts on Engineers shall be positioned on customer site for a
• Dedicated team of in-house experts on
cryptography Stratign is already creating defined period of operations.
simulations and crypto verification program. • All the required crypto analytical tools applications
and logistics will form the part of the proposal. This
Our Offerings shall include manpower resource and high-speed
computing.
• Establishing a dedicated crypt analysis lab for
carrying out offline analysis, decryption and • The creation of laboratory will provide the end
restoration of recorded encrypted streams. customer with continuous training. The laboratory
• Processing of cipher data using crypt analytical can also be further used by the customer after
knowledge-base, software and processing tools completion of the programmed with Stratign.

HIGH-SPEED COMPUTING
Stratign’s Super Computing Architecture is based on one of Weather Prediction Data Modeling Synthetic Aperture radar
the world's fastest and most efficient high-performance processing etc. Stratign has extensive knowledge base and
computing design use of CPU GPU as a powerful experience in writing customized software applications for
combination for preforming Number Crunching application utilizing efficiently High-Speed Parallel Processing.
for key recovery in Crypto Analytical attacks Seismic Survey

STRATIGN’S HIGH PERFORMANCE COMPUTING USING GPU


• System scalable up to: • System Memory 144TB DDR4
o 1,536 NVIDIA Tesla® V100 Tensor Core GPUs • Networking Mellanox CS7510 Director Switches
o NVIDIA CUDA® Cores 7,864,320 • Storage IBM Spectrum GPFS GS4S
o NVIDIA Tensor Cores 983,040 • Performance (approx.):
o NVSwitches 1,152 o FP64: 12 PFLOPS
o FP32: 25 PFLOPS
o FP16: 200 PFLOPS
The contents of this document are confidential and company proprietary. Any distribution of this document
without prior consent from Stratign is prohibited. The document is intended for Government & Defence usage only.
--
r 21 :w1
\
I I
' / ■
a

• 12

I
c., ..

Accessories Web Dashboard


Directional Antenna: The system can be integrated with a Web Dashboard enables you to handle operations of multiple
specially designed directional antenna. The directional BTS Hunter devices in a single place. The monitoring center
antenna makes cell search more effective by quickly allows you to track and remotely control all devices at once,
identifying the signal source direction. The accessory also offers real-time alerts about suspicious network activity and
features an extra built-in hardware module that allows the provides an enhanced analysis of collected intelligence.
BTS Hunter to perform scanning while the search procedure
is in progress.

••••••••••• t , +6281234560084 ••••••••••••


CELLULAR
INTERCEPTION
SOLUTIONS

+6281234560084
Introduction
From the time of its inception in early 80s, cellular communication technology has gained popularity and has grown
worldwide with approximately 5 billion users currently and is still continuing to grow. The technology also has
changed in the past years and the world has started graduating to 5G technology and talking about 6G technology.
The availability of cellular networks in wide geographical areas and the ease of communication, literally from
anywhere to anywhere, has resulted in even the anti-national elements misusing the technology to carry out
subversive/anti-national activities.

Cellular Interception Solution helps law enforcement authorities to acquire, analyze and manage intercepted
cellular communications such as voice and data. This becomes vital as terrorist and criminal elements rely upon
cellular mobile communications to carry out their nefarious operations.

GSM PASSIVE
MONITORING SOLUTION PASSIVE GSM MONITORING SOLUTION

Introduction
Stratign's Passive Cellular Interception Solution
is the most advanced ‘Off-The-Air’ interception and
monitoring solution that currently exists worldwide.
The system does not transmit any information and
Service Provider Target
hence is completely undetectable either by the
operator or by the target that is being intercepted.

The system can operate on all GSM frequency bands


(850/900/1800/1900MHz) and can decipher A5/0, A5/2
and A5/1 encryption standard in real-time. It can be Passive Interceptor
integrated with Stratign's Active Interception systems
to intercept communications from 3G, 4G or 5G The uplink and downlink signals are intercepted passively.
networks.

Features
• 100% passive system. Presence of the solution • The system automatically handles frequency
cannot be detected by anyone. hopping and handovers.
• Capable of intercepting duplex voice and SMS • Subscriber's location finding relative to the base
communications. station (LAC, BS, sector, distance with its indication
on the digital map.
• Capable of monitoring 2G, 3G, 4G and 5G networks .
• Real-time passive deciphering of A5/1, A5/2, A5/0 • Possibility of finding TMSI/IMSI/IMEI of a known
encrypted signals. MSISDN.
• The system supports FR, EFR, HR and AMR voice • Several STN-SUR GSMP systems can be
codecs. configured in a LAN environment to provide a near
exact physical location of the target and to form a
• Automatic scanning of GSM network parameters
Central Monitoring Station.
in the controlled area (service provider, broadcast
channel no., LAC, cell IDs and signal levels). • Possibility of round-the-clock operation in an auto
mode without the operator involvement.
• Online monitoring up to 32 duplex channels
(scalable as per customer request). • Simplicity of maintenance, which does not require
a deep knowledge, either in the field of computers
• Selection of the targets by different parameters
or in the field of cellular communication systems.
such as IMEI, IMSI, TMSI, target distance from the
base station, type of target handset, target's
dialed & received number (PLMN).
• Interception, monitoring and logging of
communication in stationary or in mobile
environments.
GSM SEMI-ACTIVE
MONITORING SOLUTION
Target Service Provider
Targets are forced to communicate
through the interception system.

Man-in-the-middle

GSM SEMI-ACTIVE MONITORING


SOLUTION
Introduction
Our Semi-Active Cellular Interception Solution is passed on to the actual network via the system & in
designed to intercept 2G, 3G, 4G and 5G the process all the communications are recorded. The
communications between the Base Station (BTS) & system can intercept both incoming & outgoing
the Mobile Handset (MS) using the principle of communications. It can also carry out selective
‘Man-in-the-Middle’. The system emulates the jamming of the communication. The system can
service provider’s BTS, forcing mobiles within the operate on all frequency bands of 2G, 3G &, 4G and 5G
coverage range to log on to it. All the communications cellular networks & decipher A5/0, A5/2 & A5/1
(Voice & SMS) of mobiles logged on to the system is encryption standard in real-time.

Features
• Interception and logging of all 2G, 3G, 4G and 5G • Target list can be created using IMEI, IMSI or
networks across the world and does not require target’s mobile number.
the SIM of any network provider. • Online monitoring up to 4/6/8/12/16/32 duplex
• The system can intercept and monitor all channels (scalable).
communications of the target (SMS, voice, CRI, • Stratign’s Direction Finding equipment can be
location, etc.) till the time it is within the integrated with the system to home in on targets.
coverage range.
• Real-time listening of the intercepted cell
• Real-time interception of GSM communications phone calls.
encrypted using A5/1, A5/2 and A5/3 ciphering
• Possibility of round-the-clock operation in an auto
algorithms.
mode without the operator involvement.
• The system is transparent to the target and the • Operation does not require a deep knowledge,
service provider. either in the field of computers or in the field of
• Modular design of the system allows scaling as cellular communication systems.
per customer requirement. • The system has the capability of spotting
• The system can extract the target’s actual mobile keywords within the received SMS messages or
number. the comments inserted by operators.
• System provides flexibility for the operator to • Multiple systems can be configured in a LAN
modify the ID of selected targets (spoof) for both environment to increase the coverage.
incoming and outgoing calls. • Extensive search feature enabling operators to
perform search based on all call parameters.
• The system features a selective jamming
capability, using which the operator can disable • System is integrable with Stratign’s Voice
certain services of the target like outgoing call, Forensic software (language identification,
incoming call, SMS, SS, etc. speaker identification, gender identification, etc.)
and link analysis tools.
• System provides flexibility to the operator to
make fake call (or send fake SMS) to target. • System can be integrated with Stratign’s OSINT
software.
• Built-in automatic paging to obtain target related
information such as IMSI, TMSI, IMEI, etc.
• No limit on the number of targets that can be
added to the target list.
HYBRID Target Service
SYSTEM OPERATION Provider- BTS

Made Active
Only When Required

Hybrid System Fake BTS

HYBRID MONITORING SOLUTION


Introduction
The Hybrid Cellular Monitoring Solution is a one when required. The active functions present in the
combination of Passive Solution & certain features of system include obtaining the PLMN (actual mobile no.)
Semi-Active Cellular Monitoring Solution. The basic of the target. The hybrid system also allows the
functioning of the system is like the passive system; so operator to carryout spoofing, selective jamming or
the presence of the system cannot be detected during selective denial of services as done in the semi-active
normal operations. The system is turned into an active interception solution.

Features
• 100% passive system, the presence of the system • Automatically detects the ciphering algorithms
cannot be detected by anyone while in passive used on the network and decrypts in real-time.
mode. • Selection of the targets by different parameters
• Capable of monitoring 2G, 3G, 4G and 5G cellular such as IMEI, IMSI, TMSI, target distance from the
network. base station, type of target handset, target’s
• Capable of intercepting voice and SMS dialed & received number (PLMN).
communications. • All the recorded cell phone conversations, call
• Real-time passive deciphering of A5/1, A5/2, A5/0. related information, network information is stored
in hard disk of the processing computer.
• 100% target call monitor rate: The system can
monitor all communications of the target (SMS • Monitoring of both forward and reverse channels
and voice) till he/she is within its coverage range. (duplex conversation).
• Real-time monitoring of 3G/4G/5G networks in the • Subscriber's location finding relative to the base
semi-active mode. station (LAC, BS, sector, distance with possibility
• The system does not require the service provider’s of its indication on the digital map (optional).
SIM card for the operation unlike other active • The system automatically handles frequency
systems. hopping and handovers.
• Built-in automatic paging system to check the • Display current status of receivers (recording/
target presence. scanning) and target numbers.
• System allows to the system operator to make call • Online listing of the cell phone calls.
(or send the SMS) using target identity. • Possibility of round-the-clock operation in an auto
• Automatic Public Numbers (PN) detection for mode without the operator involvement.
registered handsets. • Scanning of GSM network parameters in the
• The system can support FR, EFR, HR and AMR controlled area (service provider, broadcast
voice codecs. channel no., LAC, cell IDs and signal levels).
• Can also be used for selective jamming. System • Target position can be plotted on a GIS Map.
can be used to block: • Simplicity of maintenance, which does not require
o Incoming calls/SMS. a deep knowledge, either in the field of
o Outgoing calls/SMS. computers, or in the field of cellular
o Or both incoming and outgoing on selected communication systems.
targets.
o Supplementary services. • System can be used in conjunction with Direction
Finder to locate the position of the target.
Comparison of Passive GSM Monitoring Solution,
Semi-Active GSM Monitoring Solution & Hybrid Monitoring Solution.

FEATURE PASSIVE SYSTEM SEMI-ACTIVE SYSTEM HYBRID SYSTEM

Mode Completely passive (the presence Semi Active (very difficult


Hybrid.
of Operation of the system cannot be detected). to detect, but not impossible).

Supported
FR, EFR, HR, AMR. FR, EFR, AMR, HR. FR, EFR, HR, AMR.
Voice Codecs

System can be configured to


Multi-Network Independently tunable
Independently tunable receivers monitor multiple service
Simultaneous receivers to any service
to any service provider. providers based on user
Monitoring provider.
requirement.

Depends on the terrain and


Depends on the terrain and line of Depends on the terrain and line
Maximum Distance line of sight and the power
sight & the power transmitted by the of sight, usually up to 500mts,
that can be Covered transmitted by the service
service provider’s BTS. Maximum can but can be increased up to 5kms
by the System provider’s BTS. Maximum can
be up to 14kms. by using power amplifiers.
be up to 14kms for passive mode.

100%. All the intercepted calls


Possibility of missing trans
Possibility of Possibility of missing trans side will be full duplex, which means
side of conversation if the
Intercepting Full of conversation if the target handset that both the trans and receive
target handset is too far from
Duplex Calls is too far from the system. side of the conversation of the
the system.
target will be intercepted.

Passive, hence routing Call is routed through


Call Routing No call routing.
not required. the system.

Possibility of
Not Possible. Possible. Possible.
Spoofing SMS

Possibility of
Not Possible. Possible. Possible.
Spoofing Calls

Possibility of
Retrieval of Public Not Possible. Possible. Possible.
Number

Can be done. During the process, the


system is not fully passive, because
Automatic Target it has to establish a silent call to the
Possible. Possible.
Interrogation target's mobile phone. However,
chances of detection of the silent call
by the target is very rare.

Selective Jamming Not Possible. Possible. Not Possible.


IMSI-CATCHER

Service Provider Target

IMSI-Catcher

Silent call from IMSI-Catcher and target phone response.

Introduction
Intercepting 2G, 3G, 4G and 5G networks by law We offer IMSI-Catcher solution which is designed to
enforcement and defence agencies globally have covertly collect basic identities (IMSI, IMEI) of 2G, 3G,
always been a challenge. With the introduction of 4G and 5G mobile phones working within its coverage
mobile phones with latest technologies and area without the knowledge of the service providers
higher-grade encryption algorithms, it has become and the phone users. This will enable the agencies to
even more difficult for such agencies to intercept or identify the presence of the target in their area of
locate the target phones. operation. The IMSI-Catcher can also be used to
selectively downgrade phones operating in the 3G/4G
The 1st step in interception of any phone is identifying network to GSM operation mode. These phones can
the presence of target phones in the areas of interest. be intercepted by Passive GSM Monitoring Solution.

Features
• Passive and Semi-active type - IMSI/IMEI • Can selectively force mobile phones to 2G/GSM
collection algorithm. operation mode.
• Automatic configuration of transceiver modules • Comprehensive database featuring handsets cross
depending on the RF environment. referenced against IMEIs and networks against
• Full identification of IMSI, IMEI & TMSI information PLMNs.
within its range and dynamic control capabilities, • Compatible with Stratign’s portable
including comprehensive denial of service. Direction-Finding System (optional).
• Displays phone model, country of origin and the • Integrable with Stratign’s PLMN Search System to
network provider. extract phone numbers of the targets (optional).

CDMA MONITORING SOLUTION


Introduction
Our Multi-Channel CDMA Monitoring Solution is a IS-95R, IS-95B, CDMA 2OOO-1X CDMA networks.
compact, innovative and modern CDMA interception CDMA monitoring system mainly consists of receiver
system that can monitor & log CDMA communications & software. The receiver unit takes care of processing
in real-time. The system is available in different of signals intercepted from CDMA network. After
configurations based on the number of channels or processing the signals, it passes the raw data to
systems to monitor simultaneously. All the linked control laptop connected through cable. Control
systems can be configured & controlled from a central software running on the laptop is responsible for
location. This system is a passive high-end, high-tech controlling the receiver unit, recording & storage of
product that intercepts, controls channels & both sides call information and playback of selected call.
of a conversation via traffic channels. It supports
Features
• Automatically detects the live CDMA network • Automatically detects the incoming and outgoing
frequency and logic channels. calls (from base station to mobile or from mobile to
• Automatically measures the base station signal base station).
level and its quality. • Capture and display the dialed-out number.
• Indicator on the GUI gives the current activity of the • Capture and display the ESN number of the target
system. during registration in CDMA networks.
• Online monitoring of voice calls and SMSs. • Monitor and store SMS.
• Capture and store the control channel information. • Display start time of the call.
• Playback of recorded calls. • Display duration of the call.
• Displays call related information while playing the calls.

the mouse. These can be used in dynamic


DIRECTION FINDER SOLUTION environments where the service providers are
changing bands frequently based on the volume
Introduction of traffic or in mobile operations where the
The first step in interception of any phone is identifying operational networks are not known to the users.
the presence of these target phones in the areas of
interest. The next step is to home in on the target and Voice Forensic System (VFS)
apprehend them. IMSI-Catchers can give the likely VFS is a speech analysis system, analyzing audio
location of the target phone with an accuracy of 300m files for speaker identification, language
for 2G and 30m for 3G/4G networks. It would be identification, gender identification and
difficult for the user to home in on the target in a speech/non-speech detection, etc. Our VPA is
crowded/populated area. based on client/server architecture.

Our Direction Finder can be handheld/used covertly to Link Analysis


find the direction of the target phone & home in on to it. Link Analysis is a data analysis technique
used to evaluate relationships/connections
between network nodes, for the user to scan
Features call patterns & derive the call hierarchy.

• Fully passive system, hence, cannot be detected PLMN Number Extractor


by the service provider or the target phone.
• Can be integrated with smart phones to indicate This technology can be used to extract details like
the direction of the target. mobile no., country code, operator name, network
• Can work in conjunction with Stratign’s name & technology 2G, 3G, 4G or 5G.
IMSI-Catcher and active interception solutions.
Cellular Direction Finder
• Easy to operate.
• Allows the user to cover the last mile to Cellular Direction Finder works with the
apprehend the target. Semi-Active Cellular Monitoring System & IMSI
-Catchers. Cellular Direction Finder combined
with a body antenna finds the direction of mobile
stations operating in 2G, 3G, 4G and 5G ranges.
OPTIONAL CONFIGURATIONS
Power Amplifier
Along with Cellular Interception Solutions, you can
additionally configure the below optional supplies for The amplifier (20/40watt) is suitable for
added advantage. GSM base station and repeaters applications in
the cellular frequency range. Amplifiers are
available for GSM 900, 1800, 850 and 1900MHz
Social Media Profiling (OSINT) frequency band.
Social Media Monitoring Solution scans
profiles and keywords on social media High Gain Directional Antenna
platforms, content storage platforms High Gain Directional Antenna is designed to
(e.g. blogs) in minutes & provides instant work with power amplifiers to achieve the
results, saving tremendous time. The input maximum range.
can be mobile numbers or email IDs
Vehicle Integration Kit
SDR BASED CELL PHONE INTERCEPTION Vehicle Integration Kit consists of shock proof
Stratign has developed SDR based receivers 19” rack, shock absorbers, camouflaged
which can be tuned to any of the operational antenna, notebook stand, etc. for the installation
bands for 2G/3G/4G or 5G by a single click of in a car/SUV.
The contents of this document are confidential and company proprietary. Any distribution of this document
without prior consent of Stratign is prohibited. The document is intended for Government & Defence usage only.
CRYPT ANALYSIS TRAINING
Crypt Analysis is decoding the encryption by means of The curriculum for Crypt Analysis training includes:
expertise. We provide professional training for Crypt Analysis
• Introduction to Cryptography, Classical Cryptosystem,
and extend our support throughout the program. Giving an
Crypt Analysis on Substitution Cipher [Frequency
insight into the world of Crypt Analysis, it deals into breaking
Analysis], Play Fair Cipher and Lab Component.
of ciphers and cryptosystems. There are numerous ways
to accomplish cryptoanalysis like brute force, chosen • Block Cipher, Data Encryption Standard [DES], Triple
plaintext and man-in-the-middle attack. You can also learn DES and Modes of Operation, Lab Component and
about Crypt Analysis with a host of web-based resources much more.
available where you would also know in depth about network
security and more.

••••••••••• t., +6281234560084 ••••••••••••


JAMMING
SOLUTIONS

+6281234560084
Introduction
The aim of jamming is to prevent communications by electromagnetic means, or at least to degrade communications
sufficiently to cause delays in transmission and reception. Jammers transmit electromagnetic signals in form of
deliberate radiation, re-radiation or reflection with the objective of impairing the effective use of electronic
communications systems.

Working closely with leading military forces and government agencies, Stratign offers a wide range of jamming and
detection systems, used daily in conflict zones around the world. Stratign offers various configurations of Radio
Jammers as well as RCIED (Radio Controlled Improvised Explosive Devices) Jammers.

DRONE JAMMER
Introduction System Implementation
UAV Quadcopters and drones are becoming a nuisance Stratign’s approach towards countering the UAV threat is
and can compromise your privacy as they are becoming based on a four-step workflow:
cheaper every day and more available. Several incidents
within last few years revealed that there is a rapidly • Detect the potential threat with the best possible
emerging threat caused by small commercially available probability of detection.
UAVs. Nevertheless, the actual threat is not caused by the
UAV itself, but by the payload the UAV is carrying. • Locate the drone on a digital map.

Depending on the category of the UAV, the maximum • Identify the potential threat as an actual threat with
weight of the payload could be 2-3 kg or even more. the least possible false alarm rate.
Harmful payloads could be anything from banners used
for propaganda to cameras or microphones used for • Act on the threat by raising alarms or engaging the
espionage, explosives or biological/chemical substances threat with a counter measure.
and either damage installations or directly harm people.
Finally, the payload could also be contraband.
Features
• The system can detect, locate, identify and disrupt • Jamming system has the capability to jam all types
UAVs navigation system and link-up data to of global navigation satellite systems and to also
5000mt. Shorter range systems are also available. disrupt different UAV command and control
• Capability of locating direction and position of communication links employed by the UAV data links.
drone using multiple RF sensors in tandem • The system can be operated manually or
regarding jamming coverage.
automatically for detection and jamming.
• Active solution capable of handling most of the
• The GNSS jamming system has enough output
commercial drones.
power to jam the whole global navigation
• Highly configurable as static, portable or
satellite systems.
vehicle-based systems based on customer
• Multiple systems can be used to cover larger
requirement.
vulnerable areas close to public places where
• Integrated RF sensor and jammer solution for
civilian access is easy.
instantaneous action on detection of drones.
• The system can be used in both strategic and
• Deployable within a few minutes using ‘Plug and
tactical operation.
Play’ arrangement.
• The jamming system can work against multiple
• Easily deployable in rural and urban environments.
targets (up to 40) at the same time.

NAVIGATION SIGNAL JAMMER


A satellite navigation or SATNAV system is a system of GNSS helps track or guide GNSS enabled devices
satellites that provide autonomous geo-spatial position- such as vehicles, military systems, UAVs, missiles, etc.
ing with global coverage. It allows small electronic It can facilitate civil protection operations in harsh
receivers to determine their location (latitude, and environments, speed up rescue operations and help
altitude/elevation) to high precision (within a few meters) coastguard and border control authorities in navigation
using time signals transmitted along a line of sight by through unknown territories. Success of new age
radio from satellites. security operations depend upon the ability to navigate
correctly to the target locations. However, GNSS can also
The signals also allow the electronic receivers to be used by subversive elements to navigate UAVs to
calculate the current local time to high precision, which deliver explosives or to take photographs of restrict-
allows time synchronization. A satellite navigation ed/protected areas or to control guided missiles. This
system with global coverage may be termed a Global necessitates the need of jamming the GNSS signals to
Navigation Satellite System (GNSS). Some of the protect important installations and to disorient the
operational GNSS systems are GPS (USA), GLONASS advancing force.
(Russia), Galileo (Europe) and BeiDou (China).

System Solution
The all-known GNSS signals operate in the frequency jamming. Stratign uses a unique concept of a
bands established by international agreements, i.e. combination of imitation jamming and retransmission
1160-1300 MHz and 1550-1610 MHz. Some of the GNSS of the GNSS signals received in the specified bands of
services have developed anti-jamming capabilities, frequencies.
however, the jammers of Stratign have been designed to
suppress such receivers also since the frequency bands Stratign’s GNSS Jammer is highly modular in nature
are known. and consists of three parts - Signal Generation Unit,
Output Amplifier Unit and Antennas. The modular
The general methods used for jamming GNSS signals nature makes the jammers very adaptable to the
are barrage jamming, sweep jamming and imitation requirements of different end users.
Features
• Can be used to jam all modern GNSS system. • Highly portable and hence can be deployed in
• Unlike barrage and sweep jamming, Stratign’s short-time frames.
jammers require lesser power due to the • Modular nature of construction makes it highly
scalable with respect to output power, frequency
techniques used.
bands, etc.
• Capable of jamming at extended ranges (>50kms).
administrator in case something goes wrong with
the equipment.

VEHICLE MOUNTED RCIED JAMMER

Remote Control Improvised Explosive Devices (RCIEDs) IEDs. In such a scenario, Stratign’s vehicular jammer
have become a more common threat to military plays a vital role in extending protection against
personnel/VIPs and needs a reliable deterrent. Safety of remotely operated IEDs. Stratign had developed a
such personnel and those involved in VIP protection or vehicle mountable IED signal jammer which can
bomb disposal is of paramount importance for national effectively operate up to a range of 150m-300m radius
security. With advancement in digital technology, the based on the signal environment. The product can be
terrorists and antinational elements are increasingly easily mounted inside a vehicle with roof mounted
using cellular phones or digital radios for detonation of antennas and can operate while on the move.

System Solution
The system is modular in construction with independent jamming antennas. The system cumulative power
RF signal generators covering the complete frequency output varies based on the configuration requested by
band from 20-6000 MHz. Based on the sub bands which the customer. The system comes with a wired remote
are to be jammed which can be selected by the operator, control.
the output from the corresponding RF modules are
amplified using the inbuilt amplifiers and fed to the
Features
• Designed with ultra-broadband frequency bands, system software and system operation can be
20-6000MHz. performed from the driver’s console unit.
• Integrated smart active cooling system allows for • ‘Plug and Play’ design facilitates easy upgradation
continuous operation of the system. and maintenance. Defect in any module will not
• Very effective against most common RF signals. affect the normal operation of other modules.
• Options for active or reactive jamming. • Mil-spec standard casing, shockproof and drop
• System can operate from either battery or resistant, available for the vehicle operations in a
generator system. worst field environment.
• Operators can select the working frequency bands • Each module can be separately set ON/OFF.
and output power of each module through the

MAN-PORTABLE/BACK-PACK
RCIED JAMMER

Back-Pack Jamming System, is designed using casing for easy portability, based on the customer
state-of-the-art technology to ensure the most effective requirement. The system can be effective against
jamming and are equipped with fully integrated broad- RCIEDs operating in the frequency range of 25-3000
band jamming system. MHz and has eight programmable/configurable
frequency bands with a maximum power output of 50W.
It is highly portable and light weight, most suited for
back-pack operations. It can also be mounted on a The design of the Jammer offers great flexibility for
vehicle to provide convoy protection or in pelican type rapid field deployment on both mobile and fixed
platforms.

Features
• Modular construction enables easy maintenance, • Compact size & light weight, making it easier to carry.
repair and upgrade. • Internal rechargeable battery: 24AH.
• Highly portable and suited for rapid deployment. • Systematic Smart Cooling System to ensure
• Waterproof, dust proof, weather-proof ruggedized case. prolonged operation.
• Designed with the most advanced technology. • The general design of the system meets the
military requirements.
INTELLIGENT
CELL PHONE JAMMER
Whitelist

Real BTS

Blacklist

Virtual BTS

Other Mobiles

Coverage Area

Introduction
Unauthorised cellular phone conversations at Whitelist, whereas unauthorized phones will be automat-
sensitive/protected places is a serious threat to security. ically jammed and will be added to the Blacklist.
In such places, there will be a set of people who are
authorised to use cell phones and there will be people The system also collects the model number of the
who are not authorised to use cell phones. phone, service providers parameter like Mobile Country
Code (Mobile Network Code), etc. The system can also
It is possible to jam the cell phone communication in a be integrated with Stratign’s Handheld Direction Finder,
designated area by using traditional Cellular Phone to locate unauthorized phones within the premises.
Jammers. However, these Jammers transmit signals on
the same radio frequencies as mobile phones, The standard system has an operational range of up to
disrupting the communication between the cell phone 500 meters. However, in built up areas, due to screening
base station and the phone, effectively disabling all effect, the ranges may reduce or can create dead zones.
mobile phones within the range of the jammer. In such scenarios or for larger areas, multiple systems
can be deployed in a networked mode and can be
The problem with these Jammers is that they block all controlled centrally through a common GUI.
the cell phone communications within its coverage
range. Even legitimate users will not be able to
communicate, when such jammers are in operation.

Stratign’s Intelligent Cell Phone Jammer System is Features


designed to overcome this major disadvantage and can
• The system can create a white list for subscribers
Whitelist/ Blacklist subscribers. The unique technology
allowed to communicate and automatically denying
used in this jammer allows the operator to selectively
services to all other phones in the area.
block communications of the users within its coverage
• The system is flexible and can be upgraded to cover
range, thus, allowing authorised phones to operate and
larger areas or new 2G/3G/4G/5G networks.
block unauthorised phones.
• There is no limit of phones that can be added to
whitelist.
System Solution • The system can jam all 2G, 3G, 4G and 5G Phones
which are not there in the whitelist.
The system provides the operator with complete control • All the scanned parameters can be stored in a
over GSM phones operating within its premises. The database for future analysis.
system is highly advanced and is capable of automatically • Stratign’s Direction finder can be integrated (optional)
scanning and detecting all active 2G, 3G and 4G mobile to physically locate and capture hidden mobile phones.
phones within its coverage area. During scanning, the • The System can be remotely controlled using LAN or
system automatically collects the handsets SIM WAN.
identities (IMEI and TMSI) which can be used to identify • Multiple systems can be deployed in networked
authorised and unauthorised phones. The operator can mode and controlled centrally to cover larger areas
allow authorised phones by adding them to a GUI based or dead zones.
PRISON JAMMER

Introduction
Unauthorized cellular phone conversations at sensitive • The system jams only the downlink bands, thus,
places like Prisons, Court Houses, Military Facilities etc. enabling normal functioning of the BTS and hence
is a serious threat to security. In most prisons, inmates will not affect normal communication of other cell
are forbidden from possessing and using mobile phones. phones outside the coverage of jammer.
Mobile phones are one of the most smuggled items into • Special waterproof and dustproof, IP55 metal
prisons. They provide inmates the ability to make and aluminum housing for all weather protection.
receive unauthorized phone calls, send email and text • Modular Configuration-Easy for future upgrade and
messages, use social media, and follow news pertaining maintenance.
to their case, among other forbidden uses. They can also • Continuous operation, even in hot climates, with no
use the cell phones to communicate with their handlers time limit.
and share information which can have serious security • Heat sink designing combined with the fans to
ramifications to the prison or the nation. ensure system does not get heated up.
• Open circuit protection (VSWR) ensures that no
Jammer is specially developed for prisons and other system burns out in case of antenna short circuiting
large, delicate premises, for example military and or disconnection.
governmental compounds.This is built into special metal • Directional or Omni directional antenna combination
enclosure and features an efficient "smart active" air used to ensure adequate coverage of the prison area.
filter cooling system that allows the system to operate • System access only by authorized persons through
constantly for 365 days/ 24 hours/ 7 days even under hot secure login.
weather. • Optional UPS and battery backup in case of main
power failure.
Its secure design safeguards the system and ensures
continuous operation of the system without any hinder-
ances from the prison inmates or unauthorized prison Main Applications
personnel.
• Prisons and other large sensitive locations such as
military or governmental compounds.
Features • Oil and Gas Storage Facilities and fields.
• Security Services, Military Units, Secret Services.
• The system is capable of jamming 2G, 3G, 4G and 5G • Museums, Border Patrol and Drug Enforcement,
phones in its area of influence. Customs, etc.
• Multiple systems can be deployed and integrated
over any available TCP/IP local area network and
can be controlled centrally from one terminal. The
equipment supports local or remote control
monitoring.
• The jammer uses DDS technology to give more
effective jamming performance.
• Up to eight frequency bands can be integrated into
one jammer unit.
SATELLITE JAMMER

Stratign's C, X, Ka & Ku band Satellite Jammer is a network. The system caters to VSAT terminals operating
latest development in response to various requirements in C, X, Ka or Ku band and is designed on customer
from customers who are interested in deploying specific requirements. The Static Variant currently
jamming systems and sub-systems to fight terrorism enables the customer to jam communications in an area
and illegal usage of Satellite Spectrum technology. The of 20x20 kms. To jam a bigger area, multiple systems
system is an integrated platform, which can be deployed can be used simultaneously.
on Land (Vehicle, Shelters, and Telecom Towers, etc.),
Air (Aerostats/Balloons) or in sea (Cargo Vessels/Boats). Stratign also offers solutions to jam the uplink signals of
The basic objective of the system is to conduct jamming the satellites thereby disabling the satellite transponder
on Downlink Signals of a frequency of Interest. These completely.
frequencies can be on a TV channel or even of a VSAT
RADIO JAMMER
Troop
Communication

Communication
Vehicle

Vehicle
With Jammer

Stratign's Radio Communication Jammers are intended to provide multiple range of Radio Jammers
to create active barrage jamming in tactical units of the supplied in customized vehicles, single-use artillery
enemy within the frequency range from 20 MHz to 6000 shells and man-pack versions.
MHz. We also have specialized solutions with frequency
range of 1.5 to 120 MHz which covers the frequencies of
all tactical military HF and VHF radios. Stratign is proud
Wi-Fi Jammers

Stratign jammers being modular in nature can be user. The jammer can be configured into highly portable
specifically configured to jam only Wi-Fi links in the carrying cases for operation in outdoor areas with larger
vicinity. These jammers can be effective in small or large coverage distances. The jammer can interfere with both
meeting rooms as the power output is variable by the 2.4 GHz and 5 GHz Wi-Fi networks.

Smart Wi-Fi Jammers

The standard Wi-Fi Jammers will block all Wi-Fi all networks in the area along with their SSID. The
networks in its area of influence. Stratign has developed operator can then disable a specific Wi-Fi network by
a unique solution which will allow blocking of specific the SSID. The other Wi-Fi networks will continue to
Wi-Fi networks by their SSID. The system scans the area work.
for all the available networks and displays the details of
Cell Phone Jammers

Unauthorised use of cell phones in restricted areas is a operator to increase or decrease the coverage area,
cause of serious concern to the LEAs or Security staff based on the on-ground requirement. Multiple such
globally. Stratign provides solutions for jamming cell systems can be networked and controlled from a central
phone communications in a specified area. This area can control centre. Since the jammers are modular, the
range from a small conference room to larger areas frequency bands can be made specific to the country or
such as a restricted area or government offices, etc. The requirement.
power transmitted by the system can be adjusted by the

OUR EXPERTISE
Electronic Warfare (EW)
Customized Solutions

Stratign’s Expertise Domains

Communication Electronic Communication Customized Electronic


Analysis
Surveillance Jamming Security Training & Intelligence
Solutions
(COMINT) System (ECM) (COMSEC) Maintenance (ELINT)

Stratign is a UAE based company established in 2002 rather than products. Further, Stratign has tie-ups with
mainly working in the field of COMINT, ELINT, COMSEC, renowned global R&D institutions to further supplement
ECM and Customized Training for govt. defense and law our existing research capabilities.
enforcement agencies worldwide. We have offices in
UAE, Singapore, India & Egypt and have successfully Stratign has always believed in understanding customer
completed projects in more than 54 countries in Africa, requirements and providing tailormade solutions to
Middle East, South America, and Southeast Asia. meet operational needs. We have an experienced
in-house software development team capable of
Our key skills include design and integration of complex integrating third party systems and software into our
software and hardware solutions. Stratign has a solutions or vice-versa. All our systems are modular in
committed and highly skilled team of researchers, nature and can be configured according to demands of
engineers and technicians who can provide precise, the customer.
tailored solutions for the challenges faced by our
customers globally. We believe in providing solutions
The contents of this document are confidential and company proprietary. Any distribution of this document
without prior consent from Stratign is prohibited. The document is intended for Government & Defence usage only.
Features and Specifications:
• Holistic, best of-all-worlds mobile security platform • Built-in phone book allows secret identity for users along
• Protected against any installation of Spyware, Trojans, with a flexible definition of user exposure policies across
Malwares, Ransomware and Phishing protection. organizational groups.
• Protection against IMSI Catcher/ Wi-Fi Catcher. • Mobile communications archiving for both voice calls and
• Emergency Distruction in case of device compromise. messages.
• Hardware of trust, secure boot loader, and official drivers • Fused governance and control application ensures the safe
• Highly certified architecture with no/ hybrid Google use of corporate devices via configurable security profiles.
services. • Highly Secure & Encrypted Data Storage ensures
• Fused central intelligent and advanced defense controls information stored on the device is only accessible to users
across devices. who enter the password/PIN.
• Runs on a custom built, security-rich operating system, • Detects behavior-based anomaly across Wi-Fi connectivity,
enhanced to address mobile security concerns facing cell tower connectivity, and in applications to discover
enterprises today. evasive attacks.
• Provides security and privacy by encrypting voice over IP • Flexible Deployment Options either as a hosted solution to
calls through ZRTP. reduce operating costs or as an on-premises deployment
• Centralized user groups and policies management console to provide complete control by the customer.
• Military grade security delivers end-to-end messaging
encryption, based on AES256 message encryption with
256-bit key length, and RSA 2048.

••••••••••• t, +6281234560084 ••••••••••••


SATELLITE PHONE
INTERCEPTION
SOLUTIONS

+6281234560084
THURAYA INTERCEPTION
SYSTEM
Introduction
With the advent of Satellite communications, it has legitimate, the extensive geographical coverage
become easy for people to communicate to or from provided by this network makes it more favored by
remote parts of the world where normal communication subversive and criminal groups located in remote
resources are not available. Approximately 2,000 regions or those wishing to avoid fixed wire network
artificial satellites orbiting Earth relay analog and digital interception increased use of Thuraya phones by
signals carrying voice, video, and data to and from one criminal elements are posing a serious problem for
or many locations worldwide. In the modern world, security agencies worldwide, working at intercepting
Satellite communications play a vital role in the global their communication traffic.
telecommunications system. Among the many service
providers, Thuraya is a world’s leading mobile satellite Stratign provides intelligence organizations and national
service provider of Voice, SMS, and Fax services security government agencies with advanced solutions
solutions in remote areas where GSM networks are not for Interception, collection processing and analysis of
available. Thuraya communications. The system is capable of real
time Deciphering Thuraya traffic to provide decoded
Thuraya operates two geostationary satellites and Voice, SMS, FAX and DATA sessions along Geo-Location
provides telecommunications coverage in more than and call-related information of the intercepted
161 countries globally. Thuraya offers a congestion-free terminals.
network that now covers most of the planet - Europe,
the Middle East, North, Central and East Africa, Asia We have developed a unique solution which can locate
and Australia, nearly 60 percent of the world's the presence of Thuraya phone in the area of operation
population. The emergence in the technological features by sending silent calls to the target phone, forcing the
and rapid growth in the subscriber base of Thuraya target to respond without its knowledge.
Satellite Communication System has made Interception
Thuraya Communication very important for Government
intelligence agencies Worldwide.
Whilst most Thuraya communications are perfectly
A. Strategic Thuraya Monitoring Solution
The Strategic Thuraya Interception system is designed The final system configuration will be based on the
and developed as 100% Passive Interception system customer requirement. Coverage of Stratign's Strategic
which is capable of Interception, deciphering and Thuraya Interception System can be extended to
logging Thuraya communication including Voice, SMS monitor full duplex communications beyond 7 spot
and Data. The Strategic Thuraya Interception System is beams with additional groups of up to seven spot
capable of providing both sides of the communication beams, anywhere within the Thuraya coverage area by
(full duplex call), call-related information along with the combining it with multiple Tactical Systems.
location of the Thuraya Phone by Interception of both L
& C-band. System is designed and integrated to The Remote Tactical systems are connected to the
intercept Thuraya Communication from both Thuraya-2 strategic system via an always-on connection such as
and Thuraya-3 satellites. a leased line, WAN, or satellite link (e.g. VSAT). This
allows Remote Tactical systems to work as an
The system can be configured to intercept up to 7 spot integrated part of the strategic system.
beams & 32 duplex calls per spot beam simultaneously.

STRATEGIC THURAYA MONITORING


SOLUTION
LB
and
Dow
nk
wnli LB nlin
n d Do and k
C Ba Upl
C Band ink
k
nd Uplin Downlink
C Ba L Band
Downlink

Thuraya
International
Gateway at
Sharjah (UAE) Thuraya User

C Band Receive L Band Receive


Database Antenna Antenna
Server

Decryptor Down Convertor

Demodulator Demodulator

Decoder Decoder

Operators Receiver
The C band and L band downlink signals are intercepted.

Features
• Intercepts Thuraya Communication from • Intercepts 12 full duplex calls simultaneously
Thuraya 2 and Thuraya 3 Satellites. per spot beam.
• Monitors both C & L band downlink from the
• Automatically scans the available spot beams
Thuraya satellites.
(home and neighboring) and provides the spot
• Modular structure enables configuration of one beam ID, Latitude & Longitude for center of the
system to monitor up to 7 spot beams spot beam, Channel Number, etc.
simultaneously.
• Automatically tunes the demodulator to the • Stratign’s powerful Link Analysis Software is
desired spot beam. also integrable (Optional) with the Tactical
• Automatically detects and identifies the Voice, Thuraya Monitoring System, enabling the
SMS and Fax communication and decrypts the operator to do a Call Relation Analysis.
Voice, SMS and Fax communication almost in • Can be integrated with Stratign’s unique
real time (once the call is completed). Phone Locator System (optional) to find out the
• Location of the target can be mapped on Digital map. presence of target in the area of interest.
• Recorded conversations can be played back at • Capable of intercepting and displaying the
a slower rate for clear understanding of the following information:
conversation. o Spot beam ID
• Detect new switching schema during which new o Date and time of call
frequencies are allocated to L Band and C Band o TMSI/IMSI/IMEI
mapping. o Latitude and longitude of target
(GPS location)
• Can be optionally configured to monitor the C
o Telephone number of called party
band only when L band is not available. o Telephone number of the calling party
• Integrable with Stratign’s Voice Forensic o Direction of the call flow (Incoming Call or
Software (Optional) that can carry out Language Outgoing call
Identification, Speaker Identification, Gender o Call type (Voice or SMS)
Identification, Key Word Spotting, etc. o Duration of call (With start time and end time)

B. Tactical Thuraya Monitoring Solution


Tactical Thuraya Interception, decrypting and logging The ruggedized built of system makes it highly portable
solution, is capable of Interception, deciphering and and ideal for quick tactical deployment. The user-friend-
logging Thuraya traffic including Voice & SMS. The ly GUI and simple system configuration significantly
system is designed to monitor Thuraya communica- reduce the training time required for the operator. In
tions on the L-Band uplink and downlink channels, standard configuration, the system is capable of
the system is completely passive and does not Intercepting up to 7 spot beams and a maximum of 32
interfere with the normal communication and hence duplex calls in each spot beam.
its presence cannot be detected.

TACTICAL
THURAYA Thuraya
Satellite
MONITORING L Ban
d Dow
nlink
SOLUTION
L Ban
d Upli
nk
k
lin

L Band Receive
wn

Antenna
Do

k
lin
nd

Up
Ba

nd
C

Thuraya User
Ba
C

Decryptor
Receiver’s Unit

Main Processing Unit

Thuraya International
Gateway at Sharjah (UAE)
Database Operators
Server

The L band uplink and downlink signals are intercepted.


Features
• Capable of intercepting Thuraya Communication • Integrable with Stratign’s Voice Forensic
from both Thuraya 2 and Thuraya 3 Satellites. Software (Optional) which can carry out
• Modular structure allows configuration of one Language Identification, Speaker Identification,
system to monitor up to 7 spot beams and 32 Gender Identification, Key Word Spotting, etc.
full duplex calls per spot beam simultaneously • Stratign’s powerful Link Analysis Software is
(scalable based on customer requirement). also integrable (Optional) with the Tactical
• Automatically scans the available spot beams Thuraya Monitoring System, enabling the
(home and neighboring) and provides the spot operator to do a Call Relation Analysis.
beam ID, Latitude & Longitude of center of the • Multiple Tactical Thuraya Monitoring Systems
spot beam, Channel Number, etc. can be integrated with a unified control to monitor
• System automatically detects and identifies the a greater number of spot beams/larger area.
Voice, SMS and Fax communications and decrypts • The system is capable of intercepting and
them almost in real time. displaying the following information:
• System intercepts both uplink and downlink at o Spot beam ID.
L band and automatically tunes the demodulator o Date and time of the call.
to the desired spot beam. o TMSI/IMSI/IMEI.
• Location of the target can be mapped on a o Latitude and longitude of target
(GPS location).
digital map.
o Telephone number of the called party and
• Can be integrated with Stratign’s unique Phone calling party.
Locator System (optional) to find out the o Direction of the call flow.
presence of target in the area of interest. (incoming call or outgoing call).
• Recorded conversations can be played back at a o Call type (voice or SMS).
slower rate for clear understanding of the o Duration of the call (start time & end time).
conversation.

ISAT MONITORING SOLUTION

ISAT MONITORING
SOLUTION
L Ba
nd U
plin
k
L Ba
Inmarsat nd D
Satellite own
link
k
lin
wn k
Do lin
d Up ISAT Phone
Ban d Pro User
C n L Band Receive
Ba
C Antenna

Receiver’s Unit Decryptor

Main Processing Unit

Isat
Gateway Database Operators
Server

The L band uplink and downlink signals are intercepted.


ISAT MONITORING SOLUTION
Introduction
Among the many satellite communication providers, A. Strategic ISAT Monitoring Solution
Inmarsat is the world’s leading provider of global The Strategic ISAT Interception Solution is designed
mobile satellite communication services. It delivers and developed as 100% passive interception system
mobile voice and high speed data connectivity which is capable of interception, deciphering and
through the most versatile and reliable commercial logging ISAT communication including voice, SMS,
satellite network in the world. It provides telephone Fax and Data. The strategic solution is capable of
and data services to users worldwide via portable or providing both sides of the communication (full
mobile terminals which communicate to ground
duplex call) & CRI along with the location of the
stations via 11 geo-stationary telecommunication
satellite phone by interception of both L & C bands.
satellites. Whilst most ISAT communications are
perfectly legitimate, the extensive geographical
B. Tactical ISAT Monitoring Solution
coverage provided by this network makes it more
favored by subversive and criminal groups located in Tactical ISAT Interception, decrypting and logging
remote regions or those wishing to avoid fixed wire is capable of interception, deciphering and logging ISAT
network interception. Increased use of ISAT phones communication including voice, SMS, Fax and Data. The
by criminal elements are posing a serious problem system is designed to monitor ISAT communication on
for security agencies worldwide, working at the L band uplink and downlink channels. The system is
intercepting their communication traffic. completely passive and does not interfere with the
Our state-of-the-art passive ISAT Monitoring normal communication and hence the presence of the
Systems can address this situation and provide the system cannot be detected.
intelligence agencies with a clear edge over criminal
elements. Similar to Thuraya interception, Stratign’s The ruggedized built of the system makes it highly
ISAT Interception solutions include two types of portable and ideal for quick tactical deployment. The
monitoring solutions – Strategic as well as Tactical user-friendly GUI and simple system configuration
Monitoring Solution. significantly reduces the training time required for
the operator.

Features
• Monitors Voice, SMS, and Fax communication • The recorded conversations can be searched
from ACeS ISAT Phone, and ISAT Phone Pro. based on call identity parameters.
• Monitors both forward and reverse channels • The system has a unique field for adding call
simultaneously. synopsis.
• Automatically detects, identifies and decrypts • The location of the target can be mapped on
(after the call is completed) the Voice, SMS and a digital map.
Fax communication. • The recorded conversations can be played back
• Modular architecture of the system allows at a slower rate for clear understanding of the
further expansion of the system. conversation.
• Capable of intercepting and displaying the • The system is integrable with Stratign’s Voice
following information: Forensic Software (Optional) which can carry out
o Spot beam ID. Language Identification, Speaker Identification,
o Date and time of the call. Gender Identification, Key Word Spotting, etc.
o TMSI/IMSI/IMEI. • Stratign’s powerful Link Analysis Software is
o Telephone number of the called party. also integrable (optional) with the system, enabling
o Telephone number of the calling party. the operator to do a call relation analysis.
o Call type (Voice or SMS or Fax). • Stratign’s powerful Link Analysis Software is
o Direction of the call flow (Incoming Call or
also integrable (Optional) with the system,
Outgoing call).
o Duration of the call (With start time and end enabling the operator to do a Call Relation
time). Analysis.
• Multiple ISAT Monitoring Systems can be
• System maintains an internal call data record
for each communication with all identity integrated with a unified control to monitor a
parameters that can be intercepted for each call. greater number of spot beams/larger area.
Iridium Monitoring Solution

Other Telephone
Networks
Iridium Iridium
Satellite Satellite
Mobile Mobile
Phone Phone

Iridium Proprietary
Demodulator Protocol Decoding

Decoder

Receiver Database
The L band uplink and downlink Operators
Server
signals are intercepted.

IRIDIUM MONITORING SOLUTION


Introduction
The Iridium satellite constellation is a group of done using the L band spectrum Iridium routes, and
satellites used to provide voice and data coverage to the phone calls through space without the require-
satellite phones, pagers and integrated transceivers ment of routing it to the ground control stations. In
over Earth's entire surface. addition to communicating with the satellite phones
in its footprint, each satellite in the constellation also
The constellation architecture of 66 Iridium satellites maintains contact with two to four adjacent satellites,
ensure that every location on the globe is always and routes data between them, to effectively create a
covered by at least one satellite. Each satellite is large mesh network.
cross-linked to four other satellites, two in the same
orbital plane and two others in adjacent planes. It is The system is designed to intercept voice, fax and
not necessary for the satellite to be in view of the data transmitted through Iridium channels from both
ground station gateway, unless the call is to a PSTN, uplink and downlink at L band. It registers the
as the communication is relayed from satellite to information of the Iridium phones operating within
satellite till it reaches the called Iridium Phone. user’s spot beam & call-related information like call
content and directly classifies voice, fax, data & SMS
Removable Subscriber Identity Modules are used in sessions. It is equipped with state-of-the-art
Iridium phones, much like those used for cellular high-performance decryption module to provide
phones Calls from Iridium phones can be made to processed intelligible output in the form of voice, fax,
any landline or wireless device in the world. data & SMS along with session-related information.
Communication between satellites and handsets is
Features
• System is designed & integrated to intercept o Duration of the call (start time & end time).
Voice, Data and Text Communication from/to o Data information.
Iridium satellite phones. o Fax information.
• System can intercept 32 full duplex calls • The location of the target can be mapped on
simultaneously (scalable based on customer a digital map.
requirement). • The recorded conversations can be played back
• System intercepts both uplink and it at a slower rate for clear understanding of the
automatically tunes the demodulator to the conversation.
desired spot beam. • The system is integrable with Stratign’s Voice
• The system is capable of intercepting and Forensic Software (Optional) which can carry out
displaying the following information: Language Identification, Speaker Identification,
o Date and time of the call. Gender Identification, Key Word Spotting, etc.
o TMSI/IMSI/IMEI. • Stratign’s powerful Link Analysis Software is
o Latitude and Longitude of the target (GPS also integrable (Optional) with the Tactical
location). Thuraya Monitoring System, enabling the
o Telephone number of the called party and operator to do a Call Relation Analysis.
calling party. • Multiple Iridium Monitoring Systems can be
o Direction of the call flow (incoming call integrated with a unified control to monitor a
or outgoing call). greater area.
o Call type (voice or SMS).

UNIFIED SATELLITE PHONE MONITORING SOLUTION


Introduction
In the modern world, satellite communications play The accessibility to communication from remote
a vital role in the global telecommunications system. areas has made satellite communication popular
Among the many service providers, Thuraya, Iridium among terrorist organizations and anti-national
and ISAT Phone Pro are the most widely used Global organizations. This has thrown challenges to the law
Mobile Personal Communication Systems (GMPCS). enforcement agencies and Stratign has developed a
While Thuraya makes use of 2 Nos. of Geo stationary solution to help the government agencies to monitor
satellites for Thuraya 2 and Thuraya 3 networks, ISAT communication from all these three satellites
PhonePro makes use of 12 Geo stationary satellites simultaneously. The system can be configured as a
for providing communication in most parts of the highly portable tactical system or can be used in
world. In contrast, Iridium uses 66 Low Earth Orbit static roles.
(LEO) satellites which works like a honeycomb mesh
to cover the entire globe.
Features
• Unified 100% Passive System which can • Automatically determines and processes
intercept Thuraya, Iridium and ISAT Phone Pro Inter-Beam and Inter Satellite handoffs.
Satellite Phones. • Can provide the full duplex up to 15Kms (LoS)
• Compact rugged system which can be man (extendable using Range Extenders). Whereas
carried and hence can be used for clandestine Simplex call can receive up to 600Km (radius) in
operations. Thuraya, up to 400Km in ISAT Phone Pro and
• Automatic Interception, Decoding and 1000Km (radius) in Iridium.
Decryption of Voice, SMS and Text Traffic from • Can intercept calls initiated from PSTN to
Thuraya 2 or Thuraya 3, Iridium and ISAT Phone Satellite Phone, Satellite Phone to PSTN and
Pro Satellite Phones independently or Satellite Phone to Satellite Phone.
simultaneously (customizable). • In case of Thuraya and ISAT Phone Pro network,
• Capable of intercepting traffic from up to 7 spot system automatically scans the available spot
beams of Thuraya, up to 4 narrow spot beams of beams and provides the spot beam ID, Latitude
ISAT Phone Pro and up to 3 Iridium satellites & Longitude of center of the spot beam, Channel
over the area of operation simultaneously Number for tuning of the demodulators.
(customizable). • In case of Iridium, system automatically tunes
• Pre-integrated for automatic decryption of its receives, after defining the interception
intercepted traffic from Thuraya and ISAT Phone range and its location.
Pro network. • Maintains the internal call data record for each
• Integrated map display allows for geo-location communication with all identity parameters that
of target position and tracking on digital map. can be intercepted for each call.
• System monitors both forward and reverse • Can perform geo-fencing to monitor calls from
channels simultaneously on L-band. a specific area.
• Ruggedized casing and pre-integrated hardware • Can sort and search the content database by
make them a perfect choice for fast and easy date, time, duration of the call, types of files, etc.
field deployment. • Link Analysis tool to discern call pattern.
• Plug and Play capability provides faster • Integrable with Voice Forensic Software
response on mission critical situations to (Speaker Identification, Language Identification,
operators. Key Word Spotting, etc.)
• Provides flexibility to listen to target's call from
the map.
• Automatically scans, detects and monitors
Iridium signals and automatic compensation for
continuously changing Iridium signal Doppler
shift.
OPTIONAL CONFIGURATIONS
Along with Satellite Phone Interception System, you can additionally configure the below technology
for added advantage.

OSINT
(Open Source VPA Link
Intelligence) (Voice Print Analysis) Analysis

Open Source Intelligence (OSINT) VPA is a speech analysis system Link analysis is a data analysis
is the collection and analysis of that can analyze audio files for technique used to evaluate the
information gathered from public, Speech/Non-speech detection, relationships or connections
or open-sources. The Internet and Language identification and between network nodes. This
the rise of social media have made Speaker identification. The Stratign assists the operator to analyze the
OSINT more complex in terms of VPA concept is based on call records and associated
both sources and methods. It can Client/server architecture. metadata to create a clear picture
take a phone number or email id of call hierarchy.
as the input to the system.
OUR EXPERTISE

Communication
Surveillance
(COMINT)

Electronic
Electronic Intelligence
Jamming (ELINT)
System (ECM)

Electronic
Warfare (EW)
Customized
Solutions
Customized
Communication
Training &
Security
Maintenance
(COMSEC)

Analysis
Solutions

Stratign’s Expertise Domains

Stratign is a UAE based company, established in 2002 tailored solutions for the challenges faced by our
mainly working in the field of COMINT, ELINT, COMSEC, customers globally. We believe in providing solutions
ECM and Customized Training for govt. defense and law rather than products. Further, Stratign has tie-ups with
enforcement agencies worldwide. renowned global R&D institutions to further supplement
our existing research capabilities.
We have offices in UAE, Singapore, India & Egypt and
have successfully completed projects in more than 54 Stratign has always believed in understanding customer
countries in Africa, Middle East, South America, and requirements and providing tailormade solutions to
Southeast Asia. meet operational needs. We have an experienced
in-house software development team capable of
Our key skills include design and integration of complex integrating third party systems and software into our
software and hardware solutions. Stratign has a solutions or vice-versa. All our systems are modular in
committed and highly skilled team of researchers, nature and can be configured according to demands of
engineers and technicians who can provide precise, the customer.
The contents of this document are confidential and company proprietary. Any distribution of this document
without prior consent from Stratign is prohibited. The document is intended for Government & Defence usage only.
SATELLITE
TRUNK
INTERCEPTION
SOLUTIONS

+6281234560084
Introduction
Satellites are now an essential part of today's communication technology; thus, interception and monitoring of satellite
communications has become the most crucial task in intelligence agencies. Reliable, portable and robust satellite
monitoring solutions are critical to the success of any intelligence gathering operation.

Stratign's Satellite Interception Solutions are fully integrated interception and analysis platform that helps intelligence
organizations and government agencies to fight against national and international threats. Our flexible, modular and
upgradeable solutions provide effective interception of voice, fax, SMS, high-speed data links and data calls.

Stratign's Satellite Interception Solutions Cover:


• C, X, Ka and Ku Band Trunk Interception Solution
• VSAT Interception Solution
• Satellite Geo-Location Solution

C, X, Ka AND Ku BAND
SATELLITE TRUNK

SATELLITE
TRUNK
MONITORING Satellite operation
in C, Ku, Ka or X Band
CONCEPT

Data Data

Cell phone Cell phone

Fax Fax

VSAT VSAT

National/ International Stratign’s C, Ku, Ka or X Band National/ International


Land line Gateway Satellite Trunk Interception System Gateway Land line

Introduction
Satellites are used by various telecommunication passive mode. This integrated system has been designed
agencies for carrying trunks between countries, cities or to monitor compressed (DCME) and non-compressed
simply between different exchanges. Stratign’s Integrated (non-DCME) telecom carriers from Intelsat, Eutelsat,
Satellite Interception Solution has been designed for the Arabsat, Turksat, etc. The system provides voice, fax and
purpose of providing national intelligence agencies with internet data sessions after decompression. The built-in
the capacity to passively intercept all satellite signals SS7 analysis module performs automatic analysis on the
(C/X/Ka/Ku band) of neighboring countries or between carrier and displays its various identity parameters
cities from within their own country. The offered system is including originating point country, destination point
a powerful tool to monitor satellite communications in a country and call-related information - date, time of call,
called number, etc.
Features
• Interception of domestic & international DCME & • Provides online analysis of SS7 signalling.
non-DCME satellite carriers from C/X/Ka/Ku band. • Interception of domestic and international
• Satellite data acquisition, real-time demodulation, high-speed IP traffic link will provide the following:
decoding and decompression. o E-mails.
• Integrated carrier monitoring for finding new o E-mail attachments like MS word, pdf, zip, jpeg, etc.
signals as well as hidden/discreet satellite signals. o Html pages.
• Automatic classification of DCME type used on o Video files.
targeted carrier by mentioning either PCM, o Audio files.
ADPCM, DTX-2 40 (D, E, F), DTX-2 40 (T), CELTIC, o Downloaded *.doc, *.ppt, *.pdf, *.jpeg, *.zip, etc.
PCME, NCM-501, DX-3000, TC-2000, DTX-360, o FTP.
DTX-600, DX-7000 and DTX-600 IP. • Provides incoming and outgoing numbers.
• Provides plain voice and decoded data. • Standard system configuration can handle minimum
• Automatic decompression after successful 2 x E1carriers from C/X/Ka/Ku band which can be
classification of DCME type. customized as per the customer requirement.
• Provides originating country and destination • System is equipped with 18TB storage and archiving
country (in case of international link). capability which can be customized as per the user’s
• Logging of all decompressed data on the storage requirement.
server (32 E1's in case of DX-7000 Type B).

VSAT MONITORING SOLUTION

VSAT
MONITORING Geo-Stationary
Satellite
CONCEPT

High Capacity Link High Capacity Link


to Internet to Internet

Service Provider’s Subscriber’s VSAT


Satellite Hub Terminal

VSAT Monitoring Solution

Introduction
The system incorporates a highly sophisticated automated correlation and pairing of HUBs with
application to perform automated search and associated terminals, reducing considerable efforts.
classification of VSAT types and provides preview of the The system consists of a combination of multi-channel
transmitted content. This approach significantly reduces receivers, demodulators, decoders, high performance
the time and effort required by the operators to identify decryption hardware, IP processing modules and an
the signals of interest. The system also provides interactive post-processing application.

Features
• Intercepts inbound and outbound traffic through • DES Decryption Unit integrated with the system to
VSAT HUB and terminals operating on C, Ku, Ka provide key recovery and online decryption of
and X bands. content of Hughes DirecWay VSAT transmission.
• System houses high performance multi-channel • System provides plain voice, fax, http pages,
receivers, each one of which can process up to 48 e-mails with attachment, downloaded files, etc.
VSAT frequency channels including up to 4 HUBs as • System has built-in VoIP decoders to decode and
a basic configuration. produce all voice sessions transmitted on voice
• System performs fully automated scanning for over IP.
entire frequency band of satellite of interest. • User-friendly operator GUI to view all RF and
• Automated identification and classification of VSAT traffic information in single console.
carriers, their parameters and information • System is equipped with high capacity storage and
payload. archiving capability.
• System provides a preview of traffic payload from • System can be integrated with text and speech
the scanned VSAT signal. analysis tools based on strong military grade
• The system also provides the location of the algorithms to filter interception based on word
terminal based on the public IP transmitted. and topic spotting, language and speaker
• Automated association and pairing of HUB identification.
transmission with their corresponding VSAT • Modular solution in both hardware and
terminals. software which can be enhanced based on
• Real-time processing of downlink control channels specific customer requirements.
for reception of TDMA and MF-TDMA uplink
transmissions from VSAT terminals. For further details on Protocols/Modems supported, please contact us
at business@stratign.com

SATELLITE GEO-LOCATION SOLUTION

SATELLITE GEO-LOCATION CONCEPT

Different path
lengths give differential Different satellite velocities give
time offset (DTO) Differential Frequency Offset (DFO)

Actually calculates location


ellipse directly from
measurements (lines are conceptual)
Introduction
Satellite Geo-Location Solution is an accurate, fast, and accidental interference, equipment failure, operator error
all-in-one solution for locating ground-to-satellite or intentional abuse.
transmission sources. Powerful, flexible and modular, the
system uniquely blends complex science and algorithms The system receives signals from pairs of satellites and
with sophisticated hardware and DSP processing, using advanced signal processing, determines the time
resulting in an easy-to-use package for locating and offset and frequency offset from the two signal paths,
identifying sources of unfriendly satellite transmissions, translating to a location on the surface of the earth.

Features
• 100% passive Geo-Location Solution as it does not • No reference… means no transmission… means
require own transmitter for reference, unlike other no detection.
Geo-Location Solutions. • Multi target Geo-Location, designed by Stratign,
• Perfect intelligence capability, if conducting provides a location accuracy within a few
Geo-Location on a neighboring country’s satellite kilometers. Other providers are generally
terminal, it is difficult to install a transmitting providing an accuracy of 15kms and above.
terminal for reference in their region/or on their • Can identify the location of the transmitting VSAT
satellite. terminal satellites working in the L, C, X, Ku and Ka
• Unlike other products that provide Geo-Location of frequency bands.
a single target. Stratign’s Geo-Location Solution is • Can display the location of the transmitting VSAT
capable of handling and Geo-Locating multiple terminal on a digital map.
targets at the same time.

OPTIONAL CONFIGURATIONS
Along with our Satellite Interception Solutions, one can additionally configure the below optional supplies for added advantage.

OSINT VPA Link


(Open Source Intelligence) (Voice Print Analysis) Analysis
OPEN SOURCE INTELLIGENCE (OSINT)

SYSTEM ARCHITECTURE Websites

Web Crawler Web Apps


Engine

Social Media

Blogs
Query
Engine
Workstation
Forums
Database OSINT Data
Sources

Dark Web

Introduction
Open-source intelligence (OSINT) is data collected from innovative security and cyber intelligence solution used
publicly available sources to be used in an intelligence to identify threats and meet mission-critical operational
context. Stratign's Social Media Monitoring Solution needs. The platform is a complete suite of modular,
comes with the power of wide range scanning of enterprise-grade intelligence & investigation support
profiles and keywords on social media platforms, applications integrated on a single system.
content storage platforms (e.g. blogs, boards & posts)
in minutes & provides instant results which facilitates Our intelligence-driven, big data platform collects
user to save tremendous time. information from the widest range of sources and is
purpose-built to provide visibility and control for system
The system can collect Open Source Intelligence operators, analysts and investigators in the fight against
(OSINT) from publicly available sources such as terror threats and criminal activities. The system has a
Facebook, WhatsApp, Twitter, Instagram, YouTube, powerful & user-friendly UI and can perform scanning,
Viber, LinkedIn, etc. Data Collection process is query/search, location-based search (Geo-Fencing) &
automated using Deep Web-Int Crawlers or with visualize the result in an easily understandable
chrome extension. Stratign’s OSINT platform is an graphical/textual format.

VOICE PRINT ANALYSIS (VPA)

Customer
VPA Client VPA Client
Client

Web Service Interface VPA Task Manager

VPA Server
Speech Classifier

Speech Classifier

Speech Classifier

Speech Classifier

Speech Classifier

File Storage SQL


Database
Introduction Features
Stratign’s VPA is a speech analysis system intended for • Speaker Identification in signal under analysis
law enforcement, public safety, investigation and from known database of speaker voice samples.
forensic experts. The platform can handle almost any • Multiple language identification from a known
speech-processing challenge, whether it is the analysis database of languages.
of massive amounts of audio recordings for investigation • Keyword spotting.
purposes, or just a few audio tracks for forensic experts. • Gender detection.
The system uses Voice Biometric technology to quickly
• Emotion detection capability.
search and accurately identify language, speakers and
keyword within large amounts of audio recordings • Age detection.
making it ideal for law enforcement and intelligence • Based on a client server mode/architecture use of
agencies. VPA can also analyze audio files for standard hardware.
speech/non-speech detection. • Multi-parallel processing supported.
• Application of standard software in order to
Classification Modules participate in further development.
• Language Identifier • Scalability and flexible interfaces for the integration of
• Speech Detection Module classifiers.
• Gender Detection • Communication via TCP/IP.
• Emotion Detection
• Keyword Spotter

LINK ANALYSIS
Introduction
Stratign’s Intelligent Information Analysis System has phone numbers, e-mail ids, social network IDs, social
been developed to be able to mine the existing contacts, personal webpages, bank transactions, etc.
databases of various monitoring systems of government can be all collated from various mirroring platform
and law enforcement agencies and analyze large databases, can be analyzed both in time and space in
amounts of text, unstructured data & transaction data. order to link their association with events to generate a
location-based information with a chronological
The solution accesses, extracts and semantically sequence.
analyses unstructured data and text from a multitude
of sources, including internet news, websites, social The user can also look for a specific individual,
networking sites, blogs, forums which have been organization, event or incident with a locational context
monitored in various monitoring platforms and existing also. There is an ability to create a user-defined
databases, in a fast, accurate and seamless manner. Operations Picture with greater flexibility to add search
Targets whose personal information like physical parameters for a customized analysis.
address, telephone number, mobile numbers, satellite

Features
• An intelligent decision support and operations • Custom built reporting formats based on the
management platform built around a network customer requirement.
centric geospatial platform. • Geo-Spatial analysis of information with location as
• Capable of mining and analyzing large amount of important parameter for emerging trends/patterns.
text, unstructured and transaction data. • Multi-lingual capability in English and Arabic.
• Provides visualization platform and advanced • Can be linked to existing databases of various
analytics. monitoring platforms.
The contents of this document are confidential and company proprietary. Any distribution of this document
without prior consent of Stratign is prohibited. The document is intended for Government & Defence usage only.
SYSTEM APPROACH phones into the system. The system generates a local GSM
network. The coverage range of this network can be previously
The system uses advanced GSM tracking technology in order specified from 1Om up to 1,OOOm. The system then scans the
to locate the signal transmitted by mobile phones. It has been specified range for cell phones· IDs previously entered by the
created specifically for Search & Rescue agencies that operator. The available cell phones in the range is logged on
frequently operate in extreme environmental conditions. Solid to the system. The operator can then activate transmission
construction of the system guarantees large degree of shock to/from these cell phones. These transmissions can then be
resistance and waterproof shell protects it from adverse tracked using Direction Finders provided with the system.
weather conditions such as rain, ash or excess humidity.

STN-SAR OFFERS TWO MODES


DIRECTION FINDER
The Direction Finder is designed to work along with the SAR
OF OPERATIONS: system to physically locate the target. User can choose the
channel number (fixed frequency] on the SAR system for
1. Random Interception Mode paging to the target phone and try to keep on paging till its
This mode allows search of all mobile phones in the area direction is detected on the Direction Finder.
specified by the operator from 1Om up to 1,OOOm. The system
generates a local GSM network. The coverage range of this During paging, the system forces the mobile handset on
network can be previously specified from 1Om up to 1,OOOm. fixed channels and mobile responds to the paging on the
The system then scans the specified range for cell phones. same channel. As the channel is known to the operator, he
The available cell phones in the range gets logged on to the can program the same channel in the Direction Finder and
SAR system. The operator can then activate transmission start locating the target depending on direction and distance
to/from these cell phones. These transmissions can then be from the object volume level in headphones and bar level of
tracked using Direction Finders provided with the system. the display will change.

2. Target Mode
This mode enables search of previously defined mobile
phones. The operator enters the ID data of target mobile

••••••••••• t, +6281234560084 ••••••••••••


SMS BROADCASTING SYSTEM CONCEPT
Features
• Broadcast warning messages to an agitating/rioting mob. • Increase the visibility of your business by updating
• interested parties about ongoing promotions,
Generate alerts when known targets are in the
sweepstakes, contests, discounts, dynamic schedule
area of interest.
changes, etc.
• Create special outlook system that can detect the
• Simple and fastest way of sharing info with
presence of new handsets in the place of interest and
customers/targets [printed material not required].
send SMS messages for each of them.
• Can be upgraded to intercept calls and SMSs with
• Possible to selectively jam the targets [i.e.
additional hardware integrated into the system.
targeted phones can be denied communication].

••••••••••• t, +6281234560084 ••••••••••••


STRATEGiC DEFENCE TECHNOLOGY

UNMANNED
SYSTEMS

+6281234560084
ABOUT STRATIGN
Stratign is an innovative defense technology innovative mission-critical products, systems
solutions provider company, specializing in and customized & re-engineering solutions
System Engineering, System Integration & for defence communications, encryptions
Design, Software Engineering and Consulting and COMINT/SIGINT/ELINT requirements.
& Maintenance. We design and develop Rigorous R&D and continuous innovations in
specialized cutting-edge equipment to cater
to the diverse requirements of defense and Stratign as a leading organization in this
government intelligence agencies, national domain. All our solutions comply with the
security agencies and law enforcement defense industry standards and can be tailored
government agencies. We are uniquely as per the requirements of our esteemed
positioned to offer the best-in-breed, clients.
WITH

STN-UAV
Fixed Wing

STN-UVH10
Rotary Wing
STN-UVH10
ROTARY WING
STN-UVH10 SPECIFICATIONS
The STN-UVH10 UAV is a high-speed compact helicopter with increased load capacity powered by
the gasoline engine.

wireless network connection.


The complex consist of: The system is provided with:
• STN-UVH10 Drone • Service
• Portable Ground Control Station • Training
• Automatic Tracking Antenna • Documentation
• System Software
• Flight Control Software
• Ground Station Software
• Virtual Flight Simulator

MAIN FUNCTIONS
Some of the currently tested applications for the SAR-sensors include:
• Up to 98% precise in target description
and decomposition and other prohibited activities
• Intelligence and reconnaissance • Search & rescue operations
• Surveillance and observation • Flight operations in degraded visual
• Target acquisition and designation environments
• Subsurface explosive hazards detection
• Border protection • Disaster and emergency response
SPECIFICATIONS
PARAMETER VALUE
Maximum crusing speed 160 km/hr
VNE 209 km/hr
Length 7050 mm
Main rotor diameter 6280 mm
Height 2350 mm
Wheelbase 1500 mm
Engine type Rotax 914 UL
Engine capacity 115HP
Fuel Tank 180 liter/135 kg
25 liter/18.6 kg
Maximum Payload (including fuel) 160 kg
Maximum takeoff weight 500 kg
Empty weight 340 kg
Max. wind speed during takeoff or landing 14 m/s
Rate of Climb 5 m/s
Max. Range (cruising speed 120 km/h) 840 km
Max. Operating Altitude 5000 m
Hovering IGE (ISA) 3500 m
Hovering OGE (ISA) 2500 m
Flight time (max.) Payload - 20 kg 7h
Flight time (max.) Payload - 120 kg 2h
Onboard power supply 12V/24V
Altimeter Radio
Transponder with ADS-B S
TBI (inspections, maintenance) 100 h
Overhaul 1200 h
STN-UAV
FIXED WING
APPLICATION: OPERATIONS:
The STN-UAV drone is used for: The drone STN-UAV is to be exploited under
• IRS - Intelligence, surveillance and the following conditions:
reconnaissance
• Temperature range: -40…+50C
• Video surveillance and monitoring
• Basing: Airdrome (prepared runway)
• Target drone dropping (up to 140 kg) [308 lb]
• Runway length, not less than: 1100m
• Payload delivery and autonomous
(touchdown accuracy-250 m)
transporting
• Runway width, not less than: 25m
• Radio link range extension and
(touchdown accuracy-10 m)
retransmission signals intelligence(SIGINT)
• Takeoff and landing on runway: Fully
• Target pointing and designation
automatic
• Strike drone functions, air-to-ground and
• Ground landing means: Not required
air-to-air modes
• Mapping and intelligence

hydrology etc.)
• Thermal surveillance and monitoring
• M/SAR surveillance and monitoring
• Law enforcement & border control
• SAR surveillance and monitoring
• LIDAR surveillance and monitoring
STN-UVH10 SPECIFICATIONS
Maximum speed 220 km/h
Cruising true speed 160 km/h
Max. climbing speed 5 m/s
Max. climbing speed full load 2.5 m/s
Range distance 4020 km (30 min fuel reserve)
Endurance 28 hours
Max. Endurance with 300 kg payload 21 hours (30 min fuel reserve)
Max. Endurance with 370 kg payload 18 hours (30 min fuel reserve)
Operational ceiling 6000 m
Absolute ceiling 7500 m
Max. load factor permitted (x 1.8) +4 g -2 g
Wingspan 18.7 m
Length 8.7 m
Height 2.8 m
Wheel track 3.19 m
Wheelbase 2.9 m
Wing area 15.6 m2
Aspect ratio 22.5
2.6 m2
Propeller diameter 1.752 m
Empty weight 920 kg
Maximum take-off weight 1350 kg
Fuel tanks capacity 350 L (270 kg)
Max payload 300 kg (more payload acceptable with lower endurance)
Payload with full fuel tank 160 kg
Parachute Ballistic
FLIGHT CONTROL OVERVIEW:

are used:
• Aileron
• Elevator
• Rudder
• Flap
• Spoiler

linked to the control surfaces via a pull-push rod. Every push-pull rod has a provision for the small
length adjustment on the ground.

LANDING GEAR:
TRICYCLE LANDING GEAR:
The landing gear provides support for the vehicle static and ground maneuvering conditions. The
landing gear also reacts to vehicle load forces that are generated during vehicle movement.
The S1-V300-JPE03 has a tricycle landing gear arrangement with NLG shock strut liquid/gas type

• Steering front landing gear with gas absorber

• Hydraulic brakes
• The nose wheel steering system allows autonomous taxing
WHEELS AND BREAKS:

during landing and taxi. Each wheel brake is located on a main landing gear axle. The brake
assembly consists of a single disc and a single piston brake caliper. The pressure supplied to both
the brakes assemblies is from a single brake master cylinder. The master cylinder is actuated
automatically by the autopilot command or manually by the operator input.
THE NOSE LANDING GEAR: THE MAIN LANDING GEAR:
The steerable nose wheel mounted on The MLG consists of a single composite
an air-oil shock strut comprises the
nose gear. The shock strut is secured to
fuselage structure. Nose wheel steering of an MLG. MLG is attached to fuselage
is accomplished by a single push-pull rod longitudinal structural members by means
from the steering servomechanism. A of threaded fasteners.

installed to minimize nose wheel shimmy.


MOBILE GROUND CONTROL UNIT MRAP-GCU
The mobile command and transport module of the unmanned aerial complex STN-UAV is designed
to provide:
• Space for allocation of the communication and control equipment
• Two workplaces for the unmanned aerial system operator and the payload operator
• Directional antenna for telemetry and control communications (100 km*)
• Directional antenna for video and data communications (28 km*)
• Equipment for technical support of unmanned aerial system (transport module)
• For longer transmission ranges refer to the relevant clauses of this proposal
Technical characteristics:
Based on protected military vehicle of the MRAP class:

• Dimensions: length 4050 mm, width 2434 mm, height 2585 mm


• Generator: 15 kW
• Autonomous operating time: 48 h
• Automated work stations: 2+1
MRAP TECHNICAL OVERVIEW

Carrier Dimensions
Length 6700 mm
Width 2590 mm
Roof Height 2750 mm
Wheelbase 3900 mm
Ground Clearance 388 mm
Approach Angle 40o
Departure Angle 40o
Mass
Tare 11500 kg
Payload 3000 kg
GVM 14500 kg
Performance
Max Speed 110 km/h
Turning Circle (Kerb
17.7 m
to Kerb)
Gradeability 60%
Step Climbing 500 mm
Trench Crossing 950 mm
Protection
Ballistic Protection STANAG 4569 Level 3
Land Mine Protection STANAG 4569 Level 4a & 4b
50kg TNT at 5m distance,
IED
1m above ground level

SELF PROTECTION

TURRET MG -12.7 TURRET MG 12.7EU


Main weapons: Main weapons: Machine

NATO
PORTABLE GROUND CONTROL STATION (PGCS)
LAPTOP:
• Command module for Autopilot AP systems based on ultra-rugged GETAC X500 computer
• Equipment for portable, emergency communication and control
• Unmanned aerial system operator and payload operator HMI
• Industrial joystick for payload control
• Preinstalled and set-up software package
Technical characteristics (of laptop):

• Dimensions: length 410 mm, width 290 mm, height 65 mm

• Built from: Magnesium alloy


• Battery: Li-Ion smart battery (8700mAh)
• Extra batteries package module is available optionally
• IP Rating: IP65

• 15.6 inch full HD display


• 3.0 GHz Intel Core i7 dual core processor
HIGH GAIN DIRECTIONAL TRACKING ANTENNA:
Technical characteristics (antenna and command line modem):
• Maximum weight: 8.6 kg
• Mast height: 5 m
• Integrated compass and GPS
• Fully automatic tracking
• Antenna for telemetry
• Video antennas installation ready
• Command module (telemetry modem)
• Storage compartment
STRATEGiC DEFENCE TECHNOLOGY

without prior consent from Stratign is prohibited. The document is intended for Government & Defence usage only.

Anda mungkin juga menyukai