INDONESIA 12740
T: (021) 7970038
E: info@wiracitrainfotek.com
HTTPS://WIRACITRAINFOTEK.COM
PT Wira Citra Infotek is a provider of
cyber defense security and intelligence
data mining software, helping military,
police, intelligence agency, government
and enterprise organizations to neutralize
and prevent terror, crime and cyber
threats.
W I R A C I T R A I N F O T E K
PRINCIPAL PARTNERS
Thermal Camera Fever Block F2122-TG
Infrared Face Temperature Screening System
88.5mm 250mm
127mm
91mm
PT WIRA CITRA INFOTEK Copyright 2019 NUCTECH COMPANY LIMITED,All Rights reserved.
Gedung Graha Pulo 3rd Floor Design and specifications are subject to change without notice. Printed in CHINA,January 2020
Jl. Buncit Raya no.89
Jakarta Selatan, Indonesia 12740 NUCTECH HAS BEEN AWARDED THE CERTIFICATE OF QUALITY MANAGEMENT SYSTEM(ISO9001:2008)
P : 081234560084
NUCTECH HAS BEEN AWARDED THE CERTIFICATE OF ENVIRONMENTAL MANAGEMENT SYSTEM (ISO14001:2004)
https://wiracitrainfotek.com NUCTECH HAS BEEN AWARDED THE CERTIFICATE OF OCCUPATIONAL HEALTH AND SAFETY MANAGENENT
ROKID GLASS THERMAL SPECIFICATION
IR SENSOR TYPE : UNCOOLED INFRARED FOCAL PLANE
Certificate of Letter
To whom it may concern,
WIRACITRA INFOTEK
Gedung Graha Pulo 3rd Floor JI. Buncit Raya no. 89 Kel. Kalibata, Kee.
Pancoran Jakarta Selatan, Indonesia 12740
P: +6221-7970038
F: +6221-7900740
https ://wiracitralnfotek.com
is exclusive representative of our company for the project of Pusat Sandi Siber
Angkatan Darat (PUSSANSIAD) in Indonesia.
We have at their disposal our team of engineers and all our experience acquired
around the world with all of our customers.
Regards,
NUCTECHTM TR1000QC
HSG Handheld Safe Guard
Technical Features
Designed as next generation IMS system Very lightweight and compact design
Detecting explosives and drugs in one analysis Simple and intuitive software user interface
Detecting and monitor volatile compounds Live self-diagnosis system to ease maintenance
Support non-contact vapor sampling method Integratable with remote management platforms
Auto alarm on over-dosed nuclear radiation Hot-Pluggable batteries for 5 hours standby
Field-proven extremely low false alarm rate Reusable sampling swabs and filter materials
NUCTECHTM TR1000QC
HSG Handheld Safe Guard
Technical Data
General Specification
Technical Principle Ion Mobility Spectrometry (IMS)
Ionization Technology Non-radioactive Ionization Source (NRIS)
Analyzing Mode Explosive Mode, Narcotic Mode, Dual Mode, Vapor Mode and Multi Mode
Detectable Explosives* TNT, RDX, PETN, NG, AN, HMTD, HMX, Tetryl, TATP, UN, DNT, BP, etc.
Detectable Narcotics* Cocaine, Heroin, THC, MA, Ketamine, MDMA, Morphine, Amphetamine, LSD, Ephedrine, Fentanyl, etc.
Detectable Volatiles* DMNB, Acetone, DMMP, NH3, HCl, SOx, typical chemical warfare agents (CWA), etc.
Detectable Radiation X-ray and γ-ray (50 keV-1.25 MeV)
Calibration Automatic internal calibration
Verification Standard Verification Pen
Particle sampling with reusable swabs by directly using hand or wand to detect explosives and drugs
Sampling Method Non-contact vapor sampling to detect or continuously evaluate toxic industrial compounds
Background real-time monitor of nuclear radiation dose rate
Sensitivity* Nanogram
False Alarm Rate < 1%
Warm-up Time < 20 minutes
Analysis Time < 8 seconds
Cleanup Time < 15 seconds (typical)
Functions and Configurations
User Interface 4.3” color touch-screen with easy software UI
Readout Pass/Alarm with substance name, signal strength, original spectrum (configurable audio alarm)
Data Interface Ethernet, USB, GPS and Wi-Fi, supporting data transfer via USB or network
Data Storage > 100,000 samples (expandable memory)
Installation Data
Dimensions 411mm(L)×147mm(W)×192mm(H)
Weight < 4 kg
Power Supply 100-240V AC ±10%, 47-63 Hz
Battery 2 Hot-swappable batteries supporting 5 hours operation in total
Operating Temperature -20℃ to +55℃
Operating Humidity 0 to 95% non-condensing
Operating Pressure 60 to 106 kPa
Transportation case Cabin-baggage-size hardened transportation case
* Threat substances and sensitivity setting are subject to regulatory authority and customization
TR1000QC-HSG-EN V19.09
Copyright 2019 NUCTECH COMPANY LIMITED, All Rights reserved. NUCTECH AWARDED THE CERTIFICATE OF QUALITY MANAGEMENT SYSTEM (ISO9001:2015)
Design and specifications are subject to change without notice. NUCTECH AWARDED THE CERTIFICATE OF ENVIRONMENTAL MANAGEMENT SYSTEM (ISO14001:2004)
NUCTECH AWARDED THE CERTIFICATE OF OCCUPATIONAL HEALTH AND SAFETY MANAGEMENT SYSYTEM (GB/T28001-2011)
NUCTECH CX6040BI
TM
Introduction
The NUCTECHTM CX6040BI X-ray Inspection System comes from the most advanced and best proven CX
product platform, and fully inherits and shares improved image quality with a variety of professional image
enhancement processing functions, ergonomic and friendly user interface, intelligent networking capabilities and
applications, excellent reliability and maintainability.
The CX6040BI has a popular tunnel opening of 606mm wide by 420mm high, as well as a modern outlook and
compact framework design, and it’s the best solution for security and customs requiring screening of hand-held
baggage and parcels at airports, rail transportation stations, critical infrastructures and big events, etc.
Technology Features
■ World-leading image quality with high wire resolution of 40 AWG and steel penetration up to
38mm.
■ Explosives and narcotics detections and alarms according to the atomic number signatures.
■ Threat Image Projection (TIP) ready X-ray system, providing a practical solution for operator
performance monitoring and training, as well as reducing the probability of threats
misses effectively. Advanced material classification:
orange for organic, blue for metal and
■ X-ray leakage around the equipment is close to natural background level, complying with all green for mixed material
Image Performance
Wire Resolution 40 AWG
Steel Penetration 38mm
Display Resolution 1280 × 1024
NUCTECH HAS BEEN AWARDED THE CERTIFICATE OF QUALITY MANAGEMENT SYSTEM (ISO9001:2000)
NUCTECH HAS BEEN AWARDED THE CERTIFICATE OF ENVIRONMENTAL MANAGEMENT SYSTEM (ISO14001:2004)
NUCTECH HAS BEEN AWARDED THE CERTIFICATE OF OCCUPATIONAL HEALTH AND SAFETY MANAGENENT
SYSYTEM(OHSAS18001:2001)
NUCTECH Checkpoint Vehicle Inspection System integrates
Checkpoint Vehicle
the backscatter vehicle inspection system, the license plate
recognition system and the under vehicle surveillance system,
Inspection System
which could effectively find the contrabands and dangerous
items concealed in vehicles and cargos etc. to achieve
comprehensive and multidimensional inspection.
Work Scenario
Extra-Low Dosage
Dose absorbed by the driver per scan is extremely low, which ensures
the safety of the driver and passenger.
Multi-function Integration
The Inspection System can be integrated with various inspection devices such as License
Plate Recognition System, Under Vehicle Surveillance System etc., hence provides
comprehensive inspection information of the vehicle.
System Composition
V-Tec F100
V-Tec F100 backscatter inspection system is a powerful real-time imaging
inspection system for vehicles, which can quickly check concealed threats
through non-contact scanning.
参数信息
Type of X-ray source X-ray tube
Energy 16KeV/180KeV/225KeV
Penetration 7~9mm steel at 1.5km/h
Spatial resolution 5~7mm @ 1.5m from the scanner
Scanning speed 0.5~10km/h
0~2m @ 0.5m from the scanner 毒品
Max. Dim. Of scanned height 0~2.5m @ 1m from the scanner
0~3m @ 1.5m from the scanner
Absorbed dose to cargo per scan ≤0.1μSv at 5km/h @ 1.5m from the scanner
System size 1.2~2m(L)×0.7~1.2m(W)×1~1.5m(H)
Gross weight 400~1000kg
Parameters
Camera 2 million index,1/2.8"progressive scanning,resolution 1920*1080
LPR Vehicle capture rate ≥ 99%, LPR accuracy rate ≥ 99%,
single LPR time ≤ 30ms, vehicle speed range of 0 ~ 20km / h
1 second to action.
Digital Lever The traffic light is equipped, and the deceleration belt type tire breaker
Work Temperature:-35℃~+75℃
Enviorment Humidity:≤95% (No condensation)
Parameters
Resolution Horizontal≤2 mm/pixel Vertical≤1mm/pixel
Speed ≤30km/h
Detection Range Horizontal Width≥2500 mm Min Distance:100mm
Camera Lens Angle 180 °
Work Enviorment Temperature:-25℃~+55℃
Humidity:≤99% (No condensation)
Trigger Ground induction coil / Photoelectric switch
Software Interface
Copyright 2019 NUCTECH COMPANY LIMITED, All Rights Reserved. NUCTECH COMPANY LIMITED
Design and specifications are subject to change without notice. Address:2/F Block A, Tongfang Building,
Printed in CHINA, Mar 2019. Shuangqinglu, Haidian District, Beijing PRC
NUCTECH HAS BEEN AWARDED THE CERTIFICATE OF QUALITY MANAGEMENT SYSTEM (ISO9001:2008) Postcode:100084
NUCTECH HAS BEEN AWARDED THE CERTIFICATE OF ENVIRONMENTAL MANAGEMENT SYSTEM (ISO14001:2004) Website:http://www.nuctech.com
NUCTECH HAS BEEN AWARDED THE CERTIFICATE OF OCCUPATIONAL HEALTH AND SAFETY MANAGENENT
SYSYTEM(OHSAS18001:2001)
ANALYSIS
SOLUTIONS &
SERVICES
+6281234560084
CENTRAL COMMAND & CONTROL AND ANALYSIS SOLUTION
Introduction
In an increasingly complex and hyperconnected world, Repositories into a central database. The collected data
security and defense organizations need a level of is analyzed using a subsystem. The analysis includes
insight, collaboration and optimization not possible Voice Print Analysis, Image and Video Analysis, Natural
before. To achieve battlespace dominance, you need Language Processing, Link Analysis, Open Source
key intelligence delivered across the full Intelligence and Cryptanalysis. The results of the
communications spectrum. Stratign’s Central analysis are stored as a metadata in the same database
Command and Analysis Solution is an intelligent along with call related information and intercepted
decision support and operations management platform content. Various filters based on all the metadata
which enables the user to Intercept, Collect, Process, information can be created by the users. The system
Analyze and Disseminate intelligence information in will generate reports based on these filters. The
real time. The system collects data from sensors such operators and the administrators will be able to access
as COMIT Systems, ELINT Systems and National Data and react upon this information.
Features
• Stratign’s Central Command and Analysis • Voice Print Analysis includes Speaker
Solutions enable you to Intercept, Collect, Process, Identification, language identification, Keyword
Analyze and Disseminate intelligence information spotting, Gender detection, Emotion detection and
in real time. Age detection.
• The System can integrate existing third-party • Image and Video Analysis include Face
sensors or sensors from Stratign. Recognition, Age, Gender, Identification of vehicle
• Provides visualization and advanced graphical types and registration number etc.
analytics.
• Could be integrated with active jamming systems
operating across the extensive frequency range to
neutralize signals of interest.
• Integrated GIS for situational awareness.
SATELLITE TRUNK TELECOM DATABASE
MONITORING
MEDIATION SERVERS
CENTRAL DATABASE
VOICE PRINT
SIGNAL ANALYSIS COMMANDER
ANALYSIS (VPA)
FACE
RECOGNITION
NATURAL LANGUAGE
PROCESSING (NLP)
CHIEF ANALYST
CRYPT ANALYSIS
ANALYSTS
OPEN SOURCE INTELLIGENCE (OSINT)
Introduction
Stratign’s Open Source Intelligence (OSINT) platform Query/Search: Stratign’s solution can take any form
is an innovative cyber intelligence solution designed of input identifier, i.e. either a phone number or
to meet a wide range of operational needs for email address to get all information associated with
enterprises, cyber analytics professionals, banking it. The solution has multiple query/search options
and government agencies. The system is primarily based on mobile number, email, keyword, sentences,
used for national security, law enforcement and group names, etc.
business intelligence functions. The platform is
designed to collect and analyze information gathered Geo-Fencing or Location Based Search: Our
from public, or open sources. The open source technology allows the operator to carryout area
platform includes Social Media, Content Storage searching to get all activities performed or ongoing
Platforms, News Websites, etc. in that geographical area.
Scanning: The system can scan huge numbers of Result Visualization: Stratign's Graphic-Visualizers
data in a matter of few minutes and give the operator provides power to user to get all searched results
the complete picture of the social media accounts into graphical view of relation between targets and
and activities of the target.a activities.
Features
• Mass Profiling: Build a personal profile from similar preferences and common groups
multiple sources in minutes. between suspects at multiple levels.
• Multiple Web Sources: Collect information from • Sentiment analysis capabilities – analyzing the
the widest range of social networks and web target’s posts and identifying feelings and word
aapplications. and context anomalies.
• Geo-political risk analysis. • Identifying potential activity in Deep Web and
• Built-in intelligence workflows supporting the Dark Web.
entire range of operational needs. • TimeLine – viewing and analyzing all target
• Profile Analytics: Performs keyword spotting, posts and social network activities, easily finding
target spotting, track events and discover social the most-liked post and all relations between
connections. targets according to likes, tagging and
comments activity.
• Forensics: Generates a target profile based on
an unknown number extracted from a device at • The system is Fully Scalable and can be
the forensics laboratory. customized to meet the specific requirements &
increased performance demands of the client.
• Link analysis – identifying social connections,
FACIAL RECOGNITION SYSTEM
Introduction
Stratign’s Facial Recognition System is an artificial It can verify a face even if there is a dramatical change
intelligence-based solution capable of identifying or in appearance such as the presence of a beard or
verifying a person from a digital image or a video frame mustache, glasses, a semi covered face, etc. The
from a video source. The system is imperceptible, fast, system can process billions of entries in a facial
and accurate, capable of identifying a person in a crowd database searches with the highest possible accuracy
in a fraction of a second. Its main application areas and speed. It can detect age with 95% accuracy within 5
include defense and intelligence, public safety, years range. The system is also capable of determining
banking, retail, events, access control, and social a person’s gender with 99% accuracy. It can also
networks environment. recognize 7 basic and 50 complex human emotions.
The system incorporates an original liveness detection
Stratign's solution can detect an unlimited number technology allowing to distinguish a real human from a
of faces in an image, which makes it an ideal security photo or video.
solution. The system can detect faces in complex
conditions and is effective even when there is a
significant change in light, posture, and face angle.
Features
• Face Detection: Detects an unlimited number • Attributes: The algorithm extracts the following
of faces in an image even when there is a attributes: gender, age, emotions, glasses,
significant change in light, posture, and face beard etc.
angle. • Liveness: 2D liveness technology based on
• Face Verification: Capable of detecting passive detection ideal for access control.
dramatical change in appearance such as the • OSINT Integration: Integration with Stratign’s
presence of a beard or moustache, glasses, OSINT solution to identify targets based on
a semi covered face, etc. social media profiling.
• Face Identification: Scans 500 million faces less
than 0.3 sec.
NATURAL LANGUAGE PROCESSING (NLP)
Introduction
Stratign’s Natural Language Processing (NLP) solution Word segmentation, Parsing, Sentence breaking
is designed to extract meaningful information from and Stemming.
textual contents. The system employs multiple
levels of text mining, text extraction, natural language Our technology is used in National Security, Intelligence,
processing techniques. Our technology applies Marketing, Recommendation Engines, Customer
computer algorithms to apprehend the meaning of Insights, Knowledge Engines, Relevant Search, Cognitive
texts and uses expert techniques to identify how words Computing. The solution automates, simplifies and
and sentences are constructed. The system evaluates accelerates human understanding from an infinite pool
how the natural language allies with the grammatical of intercepted textual data.
rules, via various techniques such as Lemmatization,
Features
• Extracting entities – such as companies, people, • Fact extraction – to fill databases with structured
dollar amounts, key initiatives, etc. information for analysis, visualization, trending,
• Categorizing content – positive or negative (e.g. or alerts.
sentiment analysis), by function, intention or • Relationship extraction – to fill out graph
purpose, or by industry or other categories for databases to explore real-world relationships.
analytics and trending.
• Clustering content – to identify main topics of
discourse and/or to discover new topics.
Features
• Speaker Identification in signal under analysis • Age detection.
from known database of speaker voice samples. • Based on a client server mode/architecture use of
• Multiple language and dialect identification. standard hardware
• Keyword spotting. • Multi-parallel processing supported.
• Gender detection. • Scalability and Flexible interfaces for the
• Emotion detection. integration of classifiers
CRYPT ANALYSIS
Introduction
Stratign has been indigenously developing and Stratign has successfully broken crypto algorithms
implementing crypto algorithms which are tailor- used in communication networks like GSM, Thuraya,
made to meet the customer requirements for the past Iridium, INMARSAT, etc. Special algorithms like DES
20 years. Over the years, we have worked with various has been deciphered by Stratign. These developments
government and intelligence agencies worldwide in the have been converted into successful products and
field of communication intelligence, signal analysis are being successfully used by various government
and processing. The experience and knowledge gained intelligence agencies worldwide.
over this period is unparalleled.
Features
• Strong tie ups with international crypto analysis • to create
Strong tiesimulation and softwarescrypto
ups with international for appropriate
analysis
resources. decryption.
resources.
• Access to High Speed Performance computing •• Joint Research
Access ActivityPerformance
to High Speed can be initiated between the
computing
and software design. endsoftware
and customerdesign.
and Stratign whereby Stratign
• Dedicated team of in-house experts on Engineers shall be positioned on customer site for a
• Dedicated team of in-house experts on
cryptography Stratign is already creating defined period of operations.
simulations and crypto verification program. • All the required crypto analytical tools applications
and logistics will form the part of the proposal. This
Our Offerings shall include manpower resource and high-speed
computing.
• Establishing a dedicated crypt analysis lab for
carrying out offline analysis, decryption and • The creation of laboratory will provide the end
restoration of recorded encrypted streams. customer with continuous training. The laboratory
• Processing of cipher data using crypt analytical can also be further used by the customer after
knowledge-base, software and processing tools completion of the programmed with Stratign.
HIGH-SPEED COMPUTING
Stratign’s Super Computing Architecture is based on one of Weather Prediction Data Modeling Synthetic Aperture radar
the world's fastest and most efficient high-performance processing etc. Stratign has extensive knowledge base and
computing design use of CPU GPU as a powerful experience in writing customized software applications for
combination for preforming Number Crunching application utilizing efficiently High-Speed Parallel Processing.
for key recovery in Crypto Analytical attacks Seismic Survey
• 12
I
c., ..
+6281234560084
Introduction
From the time of its inception in early 80s, cellular communication technology has gained popularity and has grown
worldwide with approximately 5 billion users currently and is still continuing to grow. The technology also has
changed in the past years and the world has started graduating to 5G technology and talking about 6G technology.
The availability of cellular networks in wide geographical areas and the ease of communication, literally from
anywhere to anywhere, has resulted in even the anti-national elements misusing the technology to carry out
subversive/anti-national activities.
Cellular Interception Solution helps law enforcement authorities to acquire, analyze and manage intercepted
cellular communications such as voice and data. This becomes vital as terrorist and criminal elements rely upon
cellular mobile communications to carry out their nefarious operations.
GSM PASSIVE
MONITORING SOLUTION PASSIVE GSM MONITORING SOLUTION
Introduction
Stratign's Passive Cellular Interception Solution
is the most advanced ‘Off-The-Air’ interception and
monitoring solution that currently exists worldwide.
The system does not transmit any information and
Service Provider Target
hence is completely undetectable either by the
operator or by the target that is being intercepted.
Features
• 100% passive system. Presence of the solution • The system automatically handles frequency
cannot be detected by anyone. hopping and handovers.
• Capable of intercepting duplex voice and SMS • Subscriber's location finding relative to the base
communications. station (LAC, BS, sector, distance with its indication
on the digital map.
• Capable of monitoring 2G, 3G, 4G and 5G networks .
• Real-time passive deciphering of A5/1, A5/2, A5/0 • Possibility of finding TMSI/IMSI/IMEI of a known
encrypted signals. MSISDN.
• The system supports FR, EFR, HR and AMR voice • Several STN-SUR GSMP systems can be
codecs. configured in a LAN environment to provide a near
exact physical location of the target and to form a
• Automatic scanning of GSM network parameters
Central Monitoring Station.
in the controlled area (service provider, broadcast
channel no., LAC, cell IDs and signal levels). • Possibility of round-the-clock operation in an auto
mode without the operator involvement.
• Online monitoring up to 32 duplex channels
(scalable as per customer request). • Simplicity of maintenance, which does not require
a deep knowledge, either in the field of computers
• Selection of the targets by different parameters
or in the field of cellular communication systems.
such as IMEI, IMSI, TMSI, target distance from the
base station, type of target handset, target's
dialed & received number (PLMN).
• Interception, monitoring and logging of
communication in stationary or in mobile
environments.
GSM SEMI-ACTIVE
MONITORING SOLUTION
Target Service Provider
Targets are forced to communicate
through the interception system.
Man-in-the-middle
Features
• Interception and logging of all 2G, 3G, 4G and 5G • Target list can be created using IMEI, IMSI or
networks across the world and does not require target’s mobile number.
the SIM of any network provider. • Online monitoring up to 4/6/8/12/16/32 duplex
• The system can intercept and monitor all channels (scalable).
communications of the target (SMS, voice, CRI, • Stratign’s Direction Finding equipment can be
location, etc.) till the time it is within the integrated with the system to home in on targets.
coverage range.
• Real-time listening of the intercepted cell
• Real-time interception of GSM communications phone calls.
encrypted using A5/1, A5/2 and A5/3 ciphering
• Possibility of round-the-clock operation in an auto
algorithms.
mode without the operator involvement.
• The system is transparent to the target and the • Operation does not require a deep knowledge,
service provider. either in the field of computers or in the field of
• Modular design of the system allows scaling as cellular communication systems.
per customer requirement. • The system has the capability of spotting
• The system can extract the target’s actual mobile keywords within the received SMS messages or
number. the comments inserted by operators.
• System provides flexibility for the operator to • Multiple systems can be configured in a LAN
modify the ID of selected targets (spoof) for both environment to increase the coverage.
incoming and outgoing calls. • Extensive search feature enabling operators to
perform search based on all call parameters.
• The system features a selective jamming
capability, using which the operator can disable • System is integrable with Stratign’s Voice
certain services of the target like outgoing call, Forensic software (language identification,
incoming call, SMS, SS, etc. speaker identification, gender identification, etc.)
and link analysis tools.
• System provides flexibility to the operator to
make fake call (or send fake SMS) to target. • System can be integrated with Stratign’s OSINT
software.
• Built-in automatic paging to obtain target related
information such as IMSI, TMSI, IMEI, etc.
• No limit on the number of targets that can be
added to the target list.
HYBRID Target Service
SYSTEM OPERATION Provider- BTS
Made Active
Only When Required
Features
• 100% passive system, the presence of the system • Automatically detects the ciphering algorithms
cannot be detected by anyone while in passive used on the network and decrypts in real-time.
mode. • Selection of the targets by different parameters
• Capable of monitoring 2G, 3G, 4G and 5G cellular such as IMEI, IMSI, TMSI, target distance from the
network. base station, type of target handset, target’s
• Capable of intercepting voice and SMS dialed & received number (PLMN).
communications. • All the recorded cell phone conversations, call
• Real-time passive deciphering of A5/1, A5/2, A5/0. related information, network information is stored
in hard disk of the processing computer.
• 100% target call monitor rate: The system can
monitor all communications of the target (SMS • Monitoring of both forward and reverse channels
and voice) till he/she is within its coverage range. (duplex conversation).
• Real-time monitoring of 3G/4G/5G networks in the • Subscriber's location finding relative to the base
semi-active mode. station (LAC, BS, sector, distance with possibility
• The system does not require the service provider’s of its indication on the digital map (optional).
SIM card for the operation unlike other active • The system automatically handles frequency
systems. hopping and handovers.
• Built-in automatic paging system to check the • Display current status of receivers (recording/
target presence. scanning) and target numbers.
• System allows to the system operator to make call • Online listing of the cell phone calls.
(or send the SMS) using target identity. • Possibility of round-the-clock operation in an auto
• Automatic Public Numbers (PN) detection for mode without the operator involvement.
registered handsets. • Scanning of GSM network parameters in the
• The system can support FR, EFR, HR and AMR controlled area (service provider, broadcast
voice codecs. channel no., LAC, cell IDs and signal levels).
• Can also be used for selective jamming. System • Target position can be plotted on a GIS Map.
can be used to block: • Simplicity of maintenance, which does not require
o Incoming calls/SMS. a deep knowledge, either in the field of
o Outgoing calls/SMS. computers, or in the field of cellular
o Or both incoming and outgoing on selected communication systems.
targets.
o Supplementary services. • System can be used in conjunction with Direction
Finder to locate the position of the target.
Comparison of Passive GSM Monitoring Solution,
Semi-Active GSM Monitoring Solution & Hybrid Monitoring Solution.
Supported
FR, EFR, HR, AMR. FR, EFR, AMR, HR. FR, EFR, HR, AMR.
Voice Codecs
Possibility of
Not Possible. Possible. Possible.
Spoofing SMS
Possibility of
Not Possible. Possible. Possible.
Spoofing Calls
Possibility of
Retrieval of Public Not Possible. Possible. Possible.
Number
IMSI-Catcher
Introduction
Intercepting 2G, 3G, 4G and 5G networks by law We offer IMSI-Catcher solution which is designed to
enforcement and defence agencies globally have covertly collect basic identities (IMSI, IMEI) of 2G, 3G,
always been a challenge. With the introduction of 4G and 5G mobile phones working within its coverage
mobile phones with latest technologies and area without the knowledge of the service providers
higher-grade encryption algorithms, it has become and the phone users. This will enable the agencies to
even more difficult for such agencies to intercept or identify the presence of the target in their area of
locate the target phones. operation. The IMSI-Catcher can also be used to
selectively downgrade phones operating in the 3G/4G
The 1st step in interception of any phone is identifying network to GSM operation mode. These phones can
the presence of target phones in the areas of interest. be intercepted by Passive GSM Monitoring Solution.
Features
• Passive and Semi-active type - IMSI/IMEI • Can selectively force mobile phones to 2G/GSM
collection algorithm. operation mode.
• Automatic configuration of transceiver modules • Comprehensive database featuring handsets cross
depending on the RF environment. referenced against IMEIs and networks against
• Full identification of IMSI, IMEI & TMSI information PLMNs.
within its range and dynamic control capabilities, • Compatible with Stratign’s portable
including comprehensive denial of service. Direction-Finding System (optional).
• Displays phone model, country of origin and the • Integrable with Stratign’s PLMN Search System to
network provider. extract phone numbers of the targets (optional).
+6281234560084
Introduction
The aim of jamming is to prevent communications by electromagnetic means, or at least to degrade communications
sufficiently to cause delays in transmission and reception. Jammers transmit electromagnetic signals in form of
deliberate radiation, re-radiation or reflection with the objective of impairing the effective use of electronic
communications systems.
Working closely with leading military forces and government agencies, Stratign offers a wide range of jamming and
detection systems, used daily in conflict zones around the world. Stratign offers various configurations of Radio
Jammers as well as RCIED (Radio Controlled Improvised Explosive Devices) Jammers.
DRONE JAMMER
Introduction System Implementation
UAV Quadcopters and drones are becoming a nuisance Stratign’s approach towards countering the UAV threat is
and can compromise your privacy as they are becoming based on a four-step workflow:
cheaper every day and more available. Several incidents
within last few years revealed that there is a rapidly • Detect the potential threat with the best possible
emerging threat caused by small commercially available probability of detection.
UAVs. Nevertheless, the actual threat is not caused by the
UAV itself, but by the payload the UAV is carrying. • Locate the drone on a digital map.
Depending on the category of the UAV, the maximum • Identify the potential threat as an actual threat with
weight of the payload could be 2-3 kg or even more. the least possible false alarm rate.
Harmful payloads could be anything from banners used
for propaganda to cameras or microphones used for • Act on the threat by raising alarms or engaging the
espionage, explosives or biological/chemical substances threat with a counter measure.
and either damage installations or directly harm people.
Finally, the payload could also be contraband.
Features
• The system can detect, locate, identify and disrupt • Jamming system has the capability to jam all types
UAVs navigation system and link-up data to of global navigation satellite systems and to also
5000mt. Shorter range systems are also available. disrupt different UAV command and control
• Capability of locating direction and position of communication links employed by the UAV data links.
drone using multiple RF sensors in tandem • The system can be operated manually or
regarding jamming coverage.
automatically for detection and jamming.
• Active solution capable of handling most of the
• The GNSS jamming system has enough output
commercial drones.
power to jam the whole global navigation
• Highly configurable as static, portable or
satellite systems.
vehicle-based systems based on customer
• Multiple systems can be used to cover larger
requirement.
vulnerable areas close to public places where
• Integrated RF sensor and jammer solution for
civilian access is easy.
instantaneous action on detection of drones.
• The system can be used in both strategic and
• Deployable within a few minutes using ‘Plug and
tactical operation.
Play’ arrangement.
• The jamming system can work against multiple
• Easily deployable in rural and urban environments.
targets (up to 40) at the same time.
System Solution
The all-known GNSS signals operate in the frequency jamming. Stratign uses a unique concept of a
bands established by international agreements, i.e. combination of imitation jamming and retransmission
1160-1300 MHz and 1550-1610 MHz. Some of the GNSS of the GNSS signals received in the specified bands of
services have developed anti-jamming capabilities, frequencies.
however, the jammers of Stratign have been designed to
suppress such receivers also since the frequency bands Stratign’s GNSS Jammer is highly modular in nature
are known. and consists of three parts - Signal Generation Unit,
Output Amplifier Unit and Antennas. The modular
The general methods used for jamming GNSS signals nature makes the jammers very adaptable to the
are barrage jamming, sweep jamming and imitation requirements of different end users.
Features
• Can be used to jam all modern GNSS system. • Highly portable and hence can be deployed in
• Unlike barrage and sweep jamming, Stratign’s short-time frames.
jammers require lesser power due to the • Modular nature of construction makes it highly
scalable with respect to output power, frequency
techniques used.
bands, etc.
• Capable of jamming at extended ranges (>50kms).
administrator in case something goes wrong with
the equipment.
Remote Control Improvised Explosive Devices (RCIEDs) IEDs. In such a scenario, Stratign’s vehicular jammer
have become a more common threat to military plays a vital role in extending protection against
personnel/VIPs and needs a reliable deterrent. Safety of remotely operated IEDs. Stratign had developed a
such personnel and those involved in VIP protection or vehicle mountable IED signal jammer which can
bomb disposal is of paramount importance for national effectively operate up to a range of 150m-300m radius
security. With advancement in digital technology, the based on the signal environment. The product can be
terrorists and antinational elements are increasingly easily mounted inside a vehicle with roof mounted
using cellular phones or digital radios for detonation of antennas and can operate while on the move.
System Solution
The system is modular in construction with independent jamming antennas. The system cumulative power
RF signal generators covering the complete frequency output varies based on the configuration requested by
band from 20-6000 MHz. Based on the sub bands which the customer. The system comes with a wired remote
are to be jammed which can be selected by the operator, control.
the output from the corresponding RF modules are
amplified using the inbuilt amplifiers and fed to the
Features
• Designed with ultra-broadband frequency bands, system software and system operation can be
20-6000MHz. performed from the driver’s console unit.
• Integrated smart active cooling system allows for • ‘Plug and Play’ design facilitates easy upgradation
continuous operation of the system. and maintenance. Defect in any module will not
• Very effective against most common RF signals. affect the normal operation of other modules.
• Options for active or reactive jamming. • Mil-spec standard casing, shockproof and drop
• System can operate from either battery or resistant, available for the vehicle operations in a
generator system. worst field environment.
• Operators can select the working frequency bands • Each module can be separately set ON/OFF.
and output power of each module through the
MAN-PORTABLE/BACK-PACK
RCIED JAMMER
Back-Pack Jamming System, is designed using casing for easy portability, based on the customer
state-of-the-art technology to ensure the most effective requirement. The system can be effective against
jamming and are equipped with fully integrated broad- RCIEDs operating in the frequency range of 25-3000
band jamming system. MHz and has eight programmable/configurable
frequency bands with a maximum power output of 50W.
It is highly portable and light weight, most suited for
back-pack operations. It can also be mounted on a The design of the Jammer offers great flexibility for
vehicle to provide convoy protection or in pelican type rapid field deployment on both mobile and fixed
platforms.
Features
• Modular construction enables easy maintenance, • Compact size & light weight, making it easier to carry.
repair and upgrade. • Internal rechargeable battery: 24AH.
• Highly portable and suited for rapid deployment. • Systematic Smart Cooling System to ensure
• Waterproof, dust proof, weather-proof ruggedized case. prolonged operation.
• Designed with the most advanced technology. • The general design of the system meets the
military requirements.
INTELLIGENT
CELL PHONE JAMMER
Whitelist
Real BTS
Blacklist
Virtual BTS
Other Mobiles
Coverage Area
Introduction
Unauthorised cellular phone conversations at Whitelist, whereas unauthorized phones will be automat-
sensitive/protected places is a serious threat to security. ically jammed and will be added to the Blacklist.
In such places, there will be a set of people who are
authorised to use cell phones and there will be people The system also collects the model number of the
who are not authorised to use cell phones. phone, service providers parameter like Mobile Country
Code (Mobile Network Code), etc. The system can also
It is possible to jam the cell phone communication in a be integrated with Stratign’s Handheld Direction Finder,
designated area by using traditional Cellular Phone to locate unauthorized phones within the premises.
Jammers. However, these Jammers transmit signals on
the same radio frequencies as mobile phones, The standard system has an operational range of up to
disrupting the communication between the cell phone 500 meters. However, in built up areas, due to screening
base station and the phone, effectively disabling all effect, the ranges may reduce or can create dead zones.
mobile phones within the range of the jammer. In such scenarios or for larger areas, multiple systems
can be deployed in a networked mode and can be
The problem with these Jammers is that they block all controlled centrally through a common GUI.
the cell phone communications within its coverage
range. Even legitimate users will not be able to
communicate, when such jammers are in operation.
Introduction
Unauthorized cellular phone conversations at sensitive • The system jams only the downlink bands, thus,
places like Prisons, Court Houses, Military Facilities etc. enabling normal functioning of the BTS and hence
is a serious threat to security. In most prisons, inmates will not affect normal communication of other cell
are forbidden from possessing and using mobile phones. phones outside the coverage of jammer.
Mobile phones are one of the most smuggled items into • Special waterproof and dustproof, IP55 metal
prisons. They provide inmates the ability to make and aluminum housing for all weather protection.
receive unauthorized phone calls, send email and text • Modular Configuration-Easy for future upgrade and
messages, use social media, and follow news pertaining maintenance.
to their case, among other forbidden uses. They can also • Continuous operation, even in hot climates, with no
use the cell phones to communicate with their handlers time limit.
and share information which can have serious security • Heat sink designing combined with the fans to
ramifications to the prison or the nation. ensure system does not get heated up.
• Open circuit protection (VSWR) ensures that no
Jammer is specially developed for prisons and other system burns out in case of antenna short circuiting
large, delicate premises, for example military and or disconnection.
governmental compounds.This is built into special metal • Directional or Omni directional antenna combination
enclosure and features an efficient "smart active" air used to ensure adequate coverage of the prison area.
filter cooling system that allows the system to operate • System access only by authorized persons through
constantly for 365 days/ 24 hours/ 7 days even under hot secure login.
weather. • Optional UPS and battery backup in case of main
power failure.
Its secure design safeguards the system and ensures
continuous operation of the system without any hinder-
ances from the prison inmates or unauthorized prison Main Applications
personnel.
• Prisons and other large sensitive locations such as
military or governmental compounds.
Features • Oil and Gas Storage Facilities and fields.
• Security Services, Military Units, Secret Services.
• The system is capable of jamming 2G, 3G, 4G and 5G • Museums, Border Patrol and Drug Enforcement,
phones in its area of influence. Customs, etc.
• Multiple systems can be deployed and integrated
over any available TCP/IP local area network and
can be controlled centrally from one terminal. The
equipment supports local or remote control
monitoring.
• The jammer uses DDS technology to give more
effective jamming performance.
• Up to eight frequency bands can be integrated into
one jammer unit.
SATELLITE JAMMER
Stratign's C, X, Ka & Ku band Satellite Jammer is a network. The system caters to VSAT terminals operating
latest development in response to various requirements in C, X, Ka or Ku band and is designed on customer
from customers who are interested in deploying specific requirements. The Static Variant currently
jamming systems and sub-systems to fight terrorism enables the customer to jam communications in an area
and illegal usage of Satellite Spectrum technology. The of 20x20 kms. To jam a bigger area, multiple systems
system is an integrated platform, which can be deployed can be used simultaneously.
on Land (Vehicle, Shelters, and Telecom Towers, etc.),
Air (Aerostats/Balloons) or in sea (Cargo Vessels/Boats). Stratign also offers solutions to jam the uplink signals of
The basic objective of the system is to conduct jamming the satellites thereby disabling the satellite transponder
on Downlink Signals of a frequency of Interest. These completely.
frequencies can be on a TV channel or even of a VSAT
RADIO JAMMER
Troop
Communication
Communication
Vehicle
Vehicle
With Jammer
Stratign's Radio Communication Jammers are intended to provide multiple range of Radio Jammers
to create active barrage jamming in tactical units of the supplied in customized vehicles, single-use artillery
enemy within the frequency range from 20 MHz to 6000 shells and man-pack versions.
MHz. We also have specialized solutions with frequency
range of 1.5 to 120 MHz which covers the frequencies of
all tactical military HF and VHF radios. Stratign is proud
Wi-Fi Jammers
Stratign jammers being modular in nature can be user. The jammer can be configured into highly portable
specifically configured to jam only Wi-Fi links in the carrying cases for operation in outdoor areas with larger
vicinity. These jammers can be effective in small or large coverage distances. The jammer can interfere with both
meeting rooms as the power output is variable by the 2.4 GHz and 5 GHz Wi-Fi networks.
The standard Wi-Fi Jammers will block all Wi-Fi all networks in the area along with their SSID. The
networks in its area of influence. Stratign has developed operator can then disable a specific Wi-Fi network by
a unique solution which will allow blocking of specific the SSID. The other Wi-Fi networks will continue to
Wi-Fi networks by their SSID. The system scans the area work.
for all the available networks and displays the details of
Cell Phone Jammers
Unauthorised use of cell phones in restricted areas is a operator to increase or decrease the coverage area,
cause of serious concern to the LEAs or Security staff based on the on-ground requirement. Multiple such
globally. Stratign provides solutions for jamming cell systems can be networked and controlled from a central
phone communications in a specified area. This area can control centre. Since the jammers are modular, the
range from a small conference room to larger areas frequency bands can be made specific to the country or
such as a restricted area or government offices, etc. The requirement.
power transmitted by the system can be adjusted by the
OUR EXPERTISE
Electronic Warfare (EW)
Customized Solutions
Stratign is a UAE based company established in 2002 rather than products. Further, Stratign has tie-ups with
mainly working in the field of COMINT, ELINT, COMSEC, renowned global R&D institutions to further supplement
ECM and Customized Training for govt. defense and law our existing research capabilities.
enforcement agencies worldwide. We have offices in
UAE, Singapore, India & Egypt and have successfully Stratign has always believed in understanding customer
completed projects in more than 54 countries in Africa, requirements and providing tailormade solutions to
Middle East, South America, and Southeast Asia. meet operational needs. We have an experienced
in-house software development team capable of
Our key skills include design and integration of complex integrating third party systems and software into our
software and hardware solutions. Stratign has a solutions or vice-versa. All our systems are modular in
committed and highly skilled team of researchers, nature and can be configured according to demands of
engineers and technicians who can provide precise, the customer.
tailored solutions for the challenges faced by our
customers globally. We believe in providing solutions
The contents of this document are confidential and company proprietary. Any distribution of this document
without prior consent from Stratign is prohibited. The document is intended for Government & Defence usage only.
Features and Specifications:
• Holistic, best of-all-worlds mobile security platform • Built-in phone book allows secret identity for users along
• Protected against any installation of Spyware, Trojans, with a flexible definition of user exposure policies across
Malwares, Ransomware and Phishing protection. organizational groups.
• Protection against IMSI Catcher/ Wi-Fi Catcher. • Mobile communications archiving for both voice calls and
• Emergency Distruction in case of device compromise. messages.
• Hardware of trust, secure boot loader, and official drivers • Fused governance and control application ensures the safe
• Highly certified architecture with no/ hybrid Google use of corporate devices via configurable security profiles.
services. • Highly Secure & Encrypted Data Storage ensures
• Fused central intelligent and advanced defense controls information stored on the device is only accessible to users
across devices. who enter the password/PIN.
• Runs on a custom built, security-rich operating system, • Detects behavior-based anomaly across Wi-Fi connectivity,
enhanced to address mobile security concerns facing cell tower connectivity, and in applications to discover
enterprises today. evasive attacks.
• Provides security and privacy by encrypting voice over IP • Flexible Deployment Options either as a hosted solution to
calls through ZRTP. reduce operating costs or as an on-premises deployment
• Centralized user groups and policies management console to provide complete control by the customer.
• Military grade security delivers end-to-end messaging
encryption, based on AES256 message encryption with
256-bit key length, and RSA 2048.
+6281234560084
THURAYA INTERCEPTION
SYSTEM
Introduction
With the advent of Satellite communications, it has legitimate, the extensive geographical coverage
become easy for people to communicate to or from provided by this network makes it more favored by
remote parts of the world where normal communication subversive and criminal groups located in remote
resources are not available. Approximately 2,000 regions or those wishing to avoid fixed wire network
artificial satellites orbiting Earth relay analog and digital interception increased use of Thuraya phones by
signals carrying voice, video, and data to and from one criminal elements are posing a serious problem for
or many locations worldwide. In the modern world, security agencies worldwide, working at intercepting
Satellite communications play a vital role in the global their communication traffic.
telecommunications system. Among the many service
providers, Thuraya is a world’s leading mobile satellite Stratign provides intelligence organizations and national
service provider of Voice, SMS, and Fax services security government agencies with advanced solutions
solutions in remote areas where GSM networks are not for Interception, collection processing and analysis of
available. Thuraya communications. The system is capable of real
time Deciphering Thuraya traffic to provide decoded
Thuraya operates two geostationary satellites and Voice, SMS, FAX and DATA sessions along Geo-Location
provides telecommunications coverage in more than and call-related information of the intercepted
161 countries globally. Thuraya offers a congestion-free terminals.
network that now covers most of the planet - Europe,
the Middle East, North, Central and East Africa, Asia We have developed a unique solution which can locate
and Australia, nearly 60 percent of the world's the presence of Thuraya phone in the area of operation
population. The emergence in the technological features by sending silent calls to the target phone, forcing the
and rapid growth in the subscriber base of Thuraya target to respond without its knowledge.
Satellite Communication System has made Interception
Thuraya Communication very important for Government
intelligence agencies Worldwide.
Whilst most Thuraya communications are perfectly
A. Strategic Thuraya Monitoring Solution
The Strategic Thuraya Interception system is designed The final system configuration will be based on the
and developed as 100% Passive Interception system customer requirement. Coverage of Stratign's Strategic
which is capable of Interception, deciphering and Thuraya Interception System can be extended to
logging Thuraya communication including Voice, SMS monitor full duplex communications beyond 7 spot
and Data. The Strategic Thuraya Interception System is beams with additional groups of up to seven spot
capable of providing both sides of the communication beams, anywhere within the Thuraya coverage area by
(full duplex call), call-related information along with the combining it with multiple Tactical Systems.
location of the Thuraya Phone by Interception of both L
& C-band. System is designed and integrated to The Remote Tactical systems are connected to the
intercept Thuraya Communication from both Thuraya-2 strategic system via an always-on connection such as
and Thuraya-3 satellites. a leased line, WAN, or satellite link (e.g. VSAT). This
allows Remote Tactical systems to work as an
The system can be configured to intercept up to 7 spot integrated part of the strategic system.
beams & 32 duplex calls per spot beam simultaneously.
Thuraya
International
Gateway at
Sharjah (UAE) Thuraya User
Demodulator Demodulator
Decoder Decoder
Operators Receiver
The C band and L band downlink signals are intercepted.
Features
• Intercepts Thuraya Communication from • Intercepts 12 full duplex calls simultaneously
Thuraya 2 and Thuraya 3 Satellites. per spot beam.
• Monitors both C & L band downlink from the
• Automatically scans the available spot beams
Thuraya satellites.
(home and neighboring) and provides the spot
• Modular structure enables configuration of one beam ID, Latitude & Longitude for center of the
system to monitor up to 7 spot beams spot beam, Channel Number, etc.
simultaneously.
• Automatically tunes the demodulator to the • Stratign’s powerful Link Analysis Software is
desired spot beam. also integrable (Optional) with the Tactical
• Automatically detects and identifies the Voice, Thuraya Monitoring System, enabling the
SMS and Fax communication and decrypts the operator to do a Call Relation Analysis.
Voice, SMS and Fax communication almost in • Can be integrated with Stratign’s unique
real time (once the call is completed). Phone Locator System (optional) to find out the
• Location of the target can be mapped on Digital map. presence of target in the area of interest.
• Recorded conversations can be played back at • Capable of intercepting and displaying the
a slower rate for clear understanding of the following information:
conversation. o Spot beam ID
• Detect new switching schema during which new o Date and time of call
frequencies are allocated to L Band and C Band o TMSI/IMSI/IMEI
mapping. o Latitude and longitude of target
(GPS location)
• Can be optionally configured to monitor the C
o Telephone number of called party
band only when L band is not available. o Telephone number of the calling party
• Integrable with Stratign’s Voice Forensic o Direction of the call flow (Incoming Call or
Software (Optional) that can carry out Language Outgoing call
Identification, Speaker Identification, Gender o Call type (Voice or SMS)
Identification, Key Word Spotting, etc. o Duration of call (With start time and end time)
TACTICAL
THURAYA Thuraya
Satellite
MONITORING L Ban
d Dow
nlink
SOLUTION
L Ban
d Upli
nk
k
lin
L Band Receive
wn
Antenna
Do
k
lin
nd
Up
Ba
nd
C
Thuraya User
Ba
C
Decryptor
Receiver’s Unit
Thuraya International
Gateway at Sharjah (UAE)
Database Operators
Server
ISAT MONITORING
SOLUTION
L Ba
nd U
plin
k
L Ba
Inmarsat nd D
Satellite own
link
k
lin
wn k
Do lin
d Up ISAT Phone
Ban d Pro User
C n L Band Receive
Ba
C Antenna
Isat
Gateway Database Operators
Server
Features
• Monitors Voice, SMS, and Fax communication • The recorded conversations can be searched
from ACeS ISAT Phone, and ISAT Phone Pro. based on call identity parameters.
• Monitors both forward and reverse channels • The system has a unique field for adding call
simultaneously. synopsis.
• Automatically detects, identifies and decrypts • The location of the target can be mapped on
(after the call is completed) the Voice, SMS and a digital map.
Fax communication. • The recorded conversations can be played back
• Modular architecture of the system allows at a slower rate for clear understanding of the
further expansion of the system. conversation.
• Capable of intercepting and displaying the • The system is integrable with Stratign’s Voice
following information: Forensic Software (Optional) which can carry out
o Spot beam ID. Language Identification, Speaker Identification,
o Date and time of the call. Gender Identification, Key Word Spotting, etc.
o TMSI/IMSI/IMEI. • Stratign’s powerful Link Analysis Software is
o Telephone number of the called party. also integrable (optional) with the system, enabling
o Telephone number of the calling party. the operator to do a call relation analysis.
o Call type (Voice or SMS or Fax). • Stratign’s powerful Link Analysis Software is
o Direction of the call flow (Incoming Call or
also integrable (Optional) with the system,
Outgoing call).
o Duration of the call (With start time and end enabling the operator to do a Call Relation
time). Analysis.
• Multiple ISAT Monitoring Systems can be
• System maintains an internal call data record
for each communication with all identity integrated with a unified control to monitor a
parameters that can be intercepted for each call. greater number of spot beams/larger area.
Iridium Monitoring Solution
Other Telephone
Networks
Iridium Iridium
Satellite Satellite
Mobile Mobile
Phone Phone
Iridium Proprietary
Demodulator Protocol Decoding
Decoder
Receiver Database
The L band uplink and downlink Operators
Server
signals are intercepted.
OSINT
(Open Source VPA Link
Intelligence) (Voice Print Analysis) Analysis
Open Source Intelligence (OSINT) VPA is a speech analysis system Link analysis is a data analysis
is the collection and analysis of that can analyze audio files for technique used to evaluate the
information gathered from public, Speech/Non-speech detection, relationships or connections
or open-sources. The Internet and Language identification and between network nodes. This
the rise of social media have made Speaker identification. The Stratign assists the operator to analyze the
OSINT more complex in terms of VPA concept is based on call records and associated
both sources and methods. It can Client/server architecture. metadata to create a clear picture
take a phone number or email id of call hierarchy.
as the input to the system.
OUR EXPERTISE
Communication
Surveillance
(COMINT)
Electronic
Electronic Intelligence
Jamming (ELINT)
System (ECM)
Electronic
Warfare (EW)
Customized
Solutions
Customized
Communication
Training &
Security
Maintenance
(COMSEC)
Analysis
Solutions
Stratign is a UAE based company, established in 2002 tailored solutions for the challenges faced by our
mainly working in the field of COMINT, ELINT, COMSEC, customers globally. We believe in providing solutions
ECM and Customized Training for govt. defense and law rather than products. Further, Stratign has tie-ups with
enforcement agencies worldwide. renowned global R&D institutions to further supplement
our existing research capabilities.
We have offices in UAE, Singapore, India & Egypt and
have successfully completed projects in more than 54 Stratign has always believed in understanding customer
countries in Africa, Middle East, South America, and requirements and providing tailormade solutions to
Southeast Asia. meet operational needs. We have an experienced
in-house software development team capable of
Our key skills include design and integration of complex integrating third party systems and software into our
software and hardware solutions. Stratign has a solutions or vice-versa. All our systems are modular in
committed and highly skilled team of researchers, nature and can be configured according to demands of
engineers and technicians who can provide precise, the customer.
The contents of this document are confidential and company proprietary. Any distribution of this document
without prior consent from Stratign is prohibited. The document is intended for Government & Defence usage only.
SATELLITE
TRUNK
INTERCEPTION
SOLUTIONS
+6281234560084
Introduction
Satellites are now an essential part of today's communication technology; thus, interception and monitoring of satellite
communications has become the most crucial task in intelligence agencies. Reliable, portable and robust satellite
monitoring solutions are critical to the success of any intelligence gathering operation.
Stratign's Satellite Interception Solutions are fully integrated interception and analysis platform that helps intelligence
organizations and government agencies to fight against national and international threats. Our flexible, modular and
upgradeable solutions provide effective interception of voice, fax, SMS, high-speed data links and data calls.
C, X, Ka AND Ku BAND
SATELLITE TRUNK
SATELLITE
TRUNK
MONITORING Satellite operation
in C, Ku, Ka or X Band
CONCEPT
Data Data
Fax Fax
VSAT VSAT
Introduction
Satellites are used by various telecommunication passive mode. This integrated system has been designed
agencies for carrying trunks between countries, cities or to monitor compressed (DCME) and non-compressed
simply between different exchanges. Stratign’s Integrated (non-DCME) telecom carriers from Intelsat, Eutelsat,
Satellite Interception Solution has been designed for the Arabsat, Turksat, etc. The system provides voice, fax and
purpose of providing national intelligence agencies with internet data sessions after decompression. The built-in
the capacity to passively intercept all satellite signals SS7 analysis module performs automatic analysis on the
(C/X/Ka/Ku band) of neighboring countries or between carrier and displays its various identity parameters
cities from within their own country. The offered system is including originating point country, destination point
a powerful tool to monitor satellite communications in a country and call-related information - date, time of call,
called number, etc.
Features
• Interception of domestic & international DCME & • Provides online analysis of SS7 signalling.
non-DCME satellite carriers from C/X/Ka/Ku band. • Interception of domestic and international
• Satellite data acquisition, real-time demodulation, high-speed IP traffic link will provide the following:
decoding and decompression. o E-mails.
• Integrated carrier monitoring for finding new o E-mail attachments like MS word, pdf, zip, jpeg, etc.
signals as well as hidden/discreet satellite signals. o Html pages.
• Automatic classification of DCME type used on o Video files.
targeted carrier by mentioning either PCM, o Audio files.
ADPCM, DTX-2 40 (D, E, F), DTX-2 40 (T), CELTIC, o Downloaded *.doc, *.ppt, *.pdf, *.jpeg, *.zip, etc.
PCME, NCM-501, DX-3000, TC-2000, DTX-360, o FTP.
DTX-600, DX-7000 and DTX-600 IP. • Provides incoming and outgoing numbers.
• Provides plain voice and decoded data. • Standard system configuration can handle minimum
• Automatic decompression after successful 2 x E1carriers from C/X/Ka/Ku band which can be
classification of DCME type. customized as per the customer requirement.
• Provides originating country and destination • System is equipped with 18TB storage and archiving
country (in case of international link). capability which can be customized as per the user’s
• Logging of all decompressed data on the storage requirement.
server (32 E1's in case of DX-7000 Type B).
VSAT
MONITORING Geo-Stationary
Satellite
CONCEPT
Introduction
The system incorporates a highly sophisticated automated correlation and pairing of HUBs with
application to perform automated search and associated terminals, reducing considerable efforts.
classification of VSAT types and provides preview of the The system consists of a combination of multi-channel
transmitted content. This approach significantly reduces receivers, demodulators, decoders, high performance
the time and effort required by the operators to identify decryption hardware, IP processing modules and an
the signals of interest. The system also provides interactive post-processing application.
Features
• Intercepts inbound and outbound traffic through • DES Decryption Unit integrated with the system to
VSAT HUB and terminals operating on C, Ku, Ka provide key recovery and online decryption of
and X bands. content of Hughes DirecWay VSAT transmission.
• System houses high performance multi-channel • System provides plain voice, fax, http pages,
receivers, each one of which can process up to 48 e-mails with attachment, downloaded files, etc.
VSAT frequency channels including up to 4 HUBs as • System has built-in VoIP decoders to decode and
a basic configuration. produce all voice sessions transmitted on voice
• System performs fully automated scanning for over IP.
entire frequency band of satellite of interest. • User-friendly operator GUI to view all RF and
• Automated identification and classification of VSAT traffic information in single console.
carriers, their parameters and information • System is equipped with high capacity storage and
payload. archiving capability.
• System provides a preview of traffic payload from • System can be integrated with text and speech
the scanned VSAT signal. analysis tools based on strong military grade
• The system also provides the location of the algorithms to filter interception based on word
terminal based on the public IP transmitted. and topic spotting, language and speaker
• Automated association and pairing of HUB identification.
transmission with their corresponding VSAT • Modular solution in both hardware and
terminals. software which can be enhanced based on
• Real-time processing of downlink control channels specific customer requirements.
for reception of TDMA and MF-TDMA uplink
transmissions from VSAT terminals. For further details on Protocols/Modems supported, please contact us
at business@stratign.com
Different path
lengths give differential Different satellite velocities give
time offset (DTO) Differential Frequency Offset (DFO)
Features
• 100% passive Geo-Location Solution as it does not • No reference… means no transmission… means
require own transmitter for reference, unlike other no detection.
Geo-Location Solutions. • Multi target Geo-Location, designed by Stratign,
• Perfect intelligence capability, if conducting provides a location accuracy within a few
Geo-Location on a neighboring country’s satellite kilometers. Other providers are generally
terminal, it is difficult to install a transmitting providing an accuracy of 15kms and above.
terminal for reference in their region/or on their • Can identify the location of the transmitting VSAT
satellite. terminal satellites working in the L, C, X, Ku and Ka
• Unlike other products that provide Geo-Location of frequency bands.
a single target. Stratign’s Geo-Location Solution is • Can display the location of the transmitting VSAT
capable of handling and Geo-Locating multiple terminal on a digital map.
targets at the same time.
OPTIONAL CONFIGURATIONS
Along with our Satellite Interception Solutions, one can additionally configure the below optional supplies for added advantage.
Social Media
Blogs
Query
Engine
Workstation
Forums
Database OSINT Data
Sources
Dark Web
Introduction
Open-source intelligence (OSINT) is data collected from innovative security and cyber intelligence solution used
publicly available sources to be used in an intelligence to identify threats and meet mission-critical operational
context. Stratign's Social Media Monitoring Solution needs. The platform is a complete suite of modular,
comes with the power of wide range scanning of enterprise-grade intelligence & investigation support
profiles and keywords on social media platforms, applications integrated on a single system.
content storage platforms (e.g. blogs, boards & posts)
in minutes & provides instant results which facilitates Our intelligence-driven, big data platform collects
user to save tremendous time. information from the widest range of sources and is
purpose-built to provide visibility and control for system
The system can collect Open Source Intelligence operators, analysts and investigators in the fight against
(OSINT) from publicly available sources such as terror threats and criminal activities. The system has a
Facebook, WhatsApp, Twitter, Instagram, YouTube, powerful & user-friendly UI and can perform scanning,
Viber, LinkedIn, etc. Data Collection process is query/search, location-based search (Geo-Fencing) &
automated using Deep Web-Int Crawlers or with visualize the result in an easily understandable
chrome extension. Stratign’s OSINT platform is an graphical/textual format.
Customer
VPA Client VPA Client
Client
VPA Server
Speech Classifier
Speech Classifier
Speech Classifier
Speech Classifier
Speech Classifier
LINK ANALYSIS
Introduction
Stratign’s Intelligent Information Analysis System has phone numbers, e-mail ids, social network IDs, social
been developed to be able to mine the existing contacts, personal webpages, bank transactions, etc.
databases of various monitoring systems of government can be all collated from various mirroring platform
and law enforcement agencies and analyze large databases, can be analyzed both in time and space in
amounts of text, unstructured data & transaction data. order to link their association with events to generate a
location-based information with a chronological
The solution accesses, extracts and semantically sequence.
analyses unstructured data and text from a multitude
of sources, including internet news, websites, social The user can also look for a specific individual,
networking sites, blogs, forums which have been organization, event or incident with a locational context
monitored in various monitoring platforms and existing also. There is an ability to create a user-defined
databases, in a fast, accurate and seamless manner. Operations Picture with greater flexibility to add search
Targets whose personal information like physical parameters for a customized analysis.
address, telephone number, mobile numbers, satellite
Features
• An intelligent decision support and operations • Custom built reporting formats based on the
management platform built around a network customer requirement.
centric geospatial platform. • Geo-Spatial analysis of information with location as
• Capable of mining and analyzing large amount of important parameter for emerging trends/patterns.
text, unstructured and transaction data. • Multi-lingual capability in English and Arabic.
• Provides visualization platform and advanced • Can be linked to existing databases of various
analytics. monitoring platforms.
The contents of this document are confidential and company proprietary. Any distribution of this document
without prior consent of Stratign is prohibited. The document is intended for Government & Defence usage only.
SYSTEM APPROACH phones into the system. The system generates a local GSM
network. The coverage range of this network can be previously
The system uses advanced GSM tracking technology in order specified from 1Om up to 1,OOOm. The system then scans the
to locate the signal transmitted by mobile phones. It has been specified range for cell phones· IDs previously entered by the
created specifically for Search & Rescue agencies that operator. The available cell phones in the range is logged on
frequently operate in extreme environmental conditions. Solid to the system. The operator can then activate transmission
construction of the system guarantees large degree of shock to/from these cell phones. These transmissions can then be
resistance and waterproof shell protects it from adverse tracked using Direction Finders provided with the system.
weather conditions such as rain, ash or excess humidity.
2. Target Mode
This mode enables search of previously defined mobile
phones. The operator enters the ID data of target mobile
UNMANNED
SYSTEMS
+6281234560084
ABOUT STRATIGN
Stratign is an innovative defense technology innovative mission-critical products, systems
solutions provider company, specializing in and customized & re-engineering solutions
System Engineering, System Integration & for defence communications, encryptions
Design, Software Engineering and Consulting and COMINT/SIGINT/ELINT requirements.
& Maintenance. We design and develop Rigorous R&D and continuous innovations in
specialized cutting-edge equipment to cater
to the diverse requirements of defense and Stratign as a leading organization in this
government intelligence agencies, national domain. All our solutions comply with the
security agencies and law enforcement defense industry standards and can be tailored
government agencies. We are uniquely as per the requirements of our esteemed
positioned to offer the best-in-breed, clients.
WITH
STN-UAV
Fixed Wing
STN-UVH10
Rotary Wing
STN-UVH10
ROTARY WING
STN-UVH10 SPECIFICATIONS
The STN-UVH10 UAV is a high-speed compact helicopter with increased load capacity powered by
the gasoline engine.
MAIN FUNCTIONS
Some of the currently tested applications for the SAR-sensors include:
• Up to 98% precise in target description
and decomposition and other prohibited activities
• Intelligence and reconnaissance • Search & rescue operations
• Surveillance and observation • Flight operations in degraded visual
• Target acquisition and designation environments
• Subsurface explosive hazards detection
• Border protection • Disaster and emergency response
SPECIFICATIONS
PARAMETER VALUE
Maximum crusing speed 160 km/hr
VNE 209 km/hr
Length 7050 mm
Main rotor diameter 6280 mm
Height 2350 mm
Wheelbase 1500 mm
Engine type Rotax 914 UL
Engine capacity 115HP
Fuel Tank 180 liter/135 kg
25 liter/18.6 kg
Maximum Payload (including fuel) 160 kg
Maximum takeoff weight 500 kg
Empty weight 340 kg
Max. wind speed during takeoff or landing 14 m/s
Rate of Climb 5 m/s
Max. Range (cruising speed 120 km/h) 840 km
Max. Operating Altitude 5000 m
Hovering IGE (ISA) 3500 m
Hovering OGE (ISA) 2500 m
Flight time (max.) Payload - 20 kg 7h
Flight time (max.) Payload - 120 kg 2h
Onboard power supply 12V/24V
Altimeter Radio
Transponder with ADS-B S
TBI (inspections, maintenance) 100 h
Overhaul 1200 h
STN-UAV
FIXED WING
APPLICATION: OPERATIONS:
The STN-UAV drone is used for: The drone STN-UAV is to be exploited under
• IRS - Intelligence, surveillance and the following conditions:
reconnaissance
• Temperature range: -40…+50C
• Video surveillance and monitoring
• Basing: Airdrome (prepared runway)
• Target drone dropping (up to 140 kg) [308 lb]
• Runway length, not less than: 1100m
• Payload delivery and autonomous
(touchdown accuracy-250 m)
transporting
• Runway width, not less than: 25m
• Radio link range extension and
(touchdown accuracy-10 m)
retransmission signals intelligence(SIGINT)
• Takeoff and landing on runway: Fully
• Target pointing and designation
automatic
• Strike drone functions, air-to-ground and
• Ground landing means: Not required
air-to-air modes
• Mapping and intelligence
hydrology etc.)
• Thermal surveillance and monitoring
• M/SAR surveillance and monitoring
• Law enforcement & border control
• SAR surveillance and monitoring
• LIDAR surveillance and monitoring
STN-UVH10 SPECIFICATIONS
Maximum speed 220 km/h
Cruising true speed 160 km/h
Max. climbing speed 5 m/s
Max. climbing speed full load 2.5 m/s
Range distance 4020 km (30 min fuel reserve)
Endurance 28 hours
Max. Endurance with 300 kg payload 21 hours (30 min fuel reserve)
Max. Endurance with 370 kg payload 18 hours (30 min fuel reserve)
Operational ceiling 6000 m
Absolute ceiling 7500 m
Max. load factor permitted (x 1.8) +4 g -2 g
Wingspan 18.7 m
Length 8.7 m
Height 2.8 m
Wheel track 3.19 m
Wheelbase 2.9 m
Wing area 15.6 m2
Aspect ratio 22.5
2.6 m2
Propeller diameter 1.752 m
Empty weight 920 kg
Maximum take-off weight 1350 kg
Fuel tanks capacity 350 L (270 kg)
Max payload 300 kg (more payload acceptable with lower endurance)
Payload with full fuel tank 160 kg
Parachute Ballistic
FLIGHT CONTROL OVERVIEW:
are used:
• Aileron
• Elevator
• Rudder
• Flap
• Spoiler
linked to the control surfaces via a pull-push rod. Every push-pull rod has a provision for the small
length adjustment on the ground.
LANDING GEAR:
TRICYCLE LANDING GEAR:
The landing gear provides support for the vehicle static and ground maneuvering conditions. The
landing gear also reacts to vehicle load forces that are generated during vehicle movement.
The S1-V300-JPE03 has a tricycle landing gear arrangement with NLG shock strut liquid/gas type
• Hydraulic brakes
• The nose wheel steering system allows autonomous taxing
WHEELS AND BREAKS:
during landing and taxi. Each wheel brake is located on a main landing gear axle. The brake
assembly consists of a single disc and a single piston brake caliper. The pressure supplied to both
the brakes assemblies is from a single brake master cylinder. The master cylinder is actuated
automatically by the autopilot command or manually by the operator input.
THE NOSE LANDING GEAR: THE MAIN LANDING GEAR:
The steerable nose wheel mounted on The MLG consists of a single composite
an air-oil shock strut comprises the
nose gear. The shock strut is secured to
fuselage structure. Nose wheel steering of an MLG. MLG is attached to fuselage
is accomplished by a single push-pull rod longitudinal structural members by means
from the steering servomechanism. A of threaded fasteners.
Carrier Dimensions
Length 6700 mm
Width 2590 mm
Roof Height 2750 mm
Wheelbase 3900 mm
Ground Clearance 388 mm
Approach Angle 40o
Departure Angle 40o
Mass
Tare 11500 kg
Payload 3000 kg
GVM 14500 kg
Performance
Max Speed 110 km/h
Turning Circle (Kerb
17.7 m
to Kerb)
Gradeability 60%
Step Climbing 500 mm
Trench Crossing 950 mm
Protection
Ballistic Protection STANAG 4569 Level 3
Land Mine Protection STANAG 4569 Level 4a & 4b
50kg TNT at 5m distance,
IED
1m above ground level
SELF PROTECTION
NATO
PORTABLE GROUND CONTROL STATION (PGCS)
LAPTOP:
• Command module for Autopilot AP systems based on ultra-rugged GETAC X500 computer
• Equipment for portable, emergency communication and control
• Unmanned aerial system operator and payload operator HMI
• Industrial joystick for payload control
• Preinstalled and set-up software package
Technical characteristics (of laptop):
without prior consent from Stratign is prohibited. The document is intended for Government & Defence usage only.