SlideShare a Scribd company logo
Your security is our priority




Special Tracking System

   Specialized Solution for
Field-Operation Management
Your security is our priority




            Special Tracking System
The Special Tracking System is a specially designed system for the
Management, Command and Control of remote field operations, such as:

Military operations which require accurate information on the location
and status of the soldiers on the field.

Field operation of paramilitary forces such as SWAT-Teams and VIP
protection teams.

Field Operation of Undercover Tracking Missions.
Your security is our priority




 Special Tracking System Elements
The system is comprised of the following elements:

Miniature Tracking Units that are placed on the soldier/agents that
operate on the field.

Tracking Units that are mounted on vehicles that should be tracked and
monitored.

Different types of Command and Control (C4I) Stations – for
Management.

Command and Control of the forces on the field.
Your security is our priority




                           Military Operation
Central Command Stations                                Mobile Command Stations




                                    Cellular
                                    Network          Soldiers Equipped with
                                                     Personnel Tracking Unit




          Combat Vehicles
   Equipped with Ruggedized Units                Combat Vehicles Equipped with
                                                    Friendly Vehicle Units
Your security is our priority




                S.W.A.T. Team Operation
Central Command Stations                                 Mobile Command Stations




                                        Cellular
                                        Network    SWAT Fighters equipped with
                                                     Personnel Tracking Unit




                                                     SWAT Vehicles equipped with
                                                           Tracking Units
                    Hostile Terorists
Your security is our priority




                V.I.P. Protection Operation
Central Command Stations                                 Mobile Command Stations




Uniform Policemen equipped with   Cellular
     Personnel Tracking Unit      Network              Secret Agents equipped with
                                                         Personnel Tracking Unit




              V.I.P. Convoy
             Equipped With                       Vehicles of the Organization
             Tracking Units                  equipped with Friendly Vehicle Units
Your security is our priority




                Covert Tracking Operation
Central Command Stations                     Mobile Command Stations




                           Cellular
                           Network       Covert Agents equipped with
                                          Personnel Tracking Units

   Target Vehicle with
  Covert Tracking Unit


                                          Vehicles of the Organization
                                      equipped with Friendly Vehicle Units
Your security is our priority




                             The Units

Weatherproof               Weatherproof
  V6 Unit                    V8 Unit



                                          V10 Unit




         Weatherproof V10 Unit             Friendly Vehicle Unit
Your security is our priority




      The Tracking Units Structure
The Tracking and location Units contain the following components:

GPS Receiver

Cellular Modem

Motion Sensor

Internal Memory for Data Logging

Audio Microphone (in some of the units)
Your security is our priority




                               The V10 Unit

A compact location unit carried by soldiers or mounted on the bodies of Covert Agents.

The unit can send continuous information regarding the precise location of Soldiers/Covert-
Agents on the field.

Enables to open an Audio Session towards the soldier/covert-agent, in order to monitor his
situation and listen to conversations he is having with different persons on the field.

The unit comes in two possible cases:
- Rigid Weatherproof Case, sealed for weather conditions
- Thin Unsealed Case, enables to better conceal the unit on the body of the Covert Agent.

It is possible to have the unit equipped with a Panic Button.
Your security is our priority




                        The V6 Unit

Specially designed unit for Covert Tracking after Target Vehicles.

A compact and autonomous unit, with internal battery house.

The unit’s case is totally sealed against weather conditions.

The unit includes powerful magnets for easy installation on Target
Tracked Vehicles.
Your security is our priority




                             The V8 Unit

Specially designed unit for Covert Tracking after Target Vehicles.

The unit’s case is even smaller than the V6 unit; however it does not contain an
internal battery.

It is possible to feed the unit with power by either:
- A waterproof External Battery Pack with strong magnets.
- A Power Cable that can be connected to the Vehicle’s Power System (12V/24V).

The unit is totally sealed against weather conditions.

The unit includes powerful magnets for easy installation on Target Tracked Vehicles.
Your security is our priority




              The Friendly Vehicle Unit
Tracking Unit that is installed on the Vehicles of the Military Unit/ Organization.

The unit can be connected to different subsystems of the vehicle.

The unit enables remote monitoring regarding the status of the vehicle, such as:
whether the vehicle’s engine is On/Off, the Vehicle’s doors are Open/Close, etc.

The Unit enables remote control over different systems of the vehicle:
- Turning the vehicle’s lights On/Off.
- Locking the vehicle’s doors, remote activation of the vehicle’s siren, etc.
- Secure shutdown of the vehicle’s engine while the vehicle is in motion.

It is possible to connect to the unit different accessories, such as: a speaker
phone, panic button, and more.
Your security is our priority




    The System’s Command Stations
The system can be operated by a Single Command Center, or by several
Command Centers that can monitor the same operation simultaneously.

The system has two types of Command Centers:
- Central Command Center - mounted on a PC/Server Computer.
- Mobile Command Center - mounted on a Smart Phone.

The Central Command Centers are often mounted on Laptops, in order to
enable full mobility.

It is also possible to install the Command Center on regular Desktop or
Server-Computers – according to the required architecture of the system.
Your security is our priority




      The Command Center Structure
The Communication Module - Manages the communication between the
Command Center and the different End Units on the field.

The Maps Module (GIS) - Enables the display of the End Units on Digital Maps.

It is possible to integrate to the Command Center different types of Digital
Maps, such as:
- Raster Maps
- Vector Maps
- Aerial Photo Maps
- Topographical Maps
- City Maps etc.

The Database Module - Registers all the messages sent by the End Units. Enables
to store and restore all the movements of people and vehicles on the field.
Your security is our priority




           Operation Of The End-Units
The End-Units support two possible modes of tracking, that can be operated in
parallel:
- Real-Time Tracking – The units send immediate location messages to the
Command Center.
- Log Tracking – The location data is registered into the internal memory of the
unit, and can be later downloaded to the Command Center.

The complete setting and command of the units is done by remote control.

The units can send the location messages over the data channel of the cellular
network, or by SMS messages.

The communication between the End-Units and the Command Center is encrypted
in order to protect the nature of data.
Your security is our priority




              The Location Messages
Each location message that is sent from the End-Units to the Command
Center, contain the following information:
The location data.
Timestamp of the location.
Number of available GPS satellites.
Speed and direction of movement.
The battery status.
Bitmap of all the unit’s alerts.
The Cell ID to which the unit is registered.
The serial number of the message.

The data above is sent over a special binary protocol, with the length of only 35
Bytes! (a quarter of an SMS).

The compressed structure of the protocol saves transmission time and therefore
contributes to the prolonged time of operation of the units.
Your security is our priority




                  The System’s Design

The System’s Units were designed with the intent to give a solution to three main
operational demands:

Ease of Use:

The extremely compact size of the units does not restrict the movements of the
soldier/ agent on the field.

The size of the units avoids the detection of the units installed on Covert Agents
and Target Tracked Vehicles.
Your security is our priority




                  The System’s Design
Extended time of operation:

The unit's design includes special hardware and software developments that
enable the unit to work for a prolonged period of time in reference to the energy
pack in use.

The Unit's prolonged operational time surpasses the performance of any similar
system in the world.

Operation Reliability in harsh field conditions:

The units are designed to reliably work under hash field conditions.

The units are currently being used in combat operations by NATO military forces in
known conflicting areas around the world.

More Related Content

What's hot

Ce hv6 module 56 hacking global positioning system
Ce hv6 module 56 hacking global positioning systemCe hv6 module 56 hacking global positioning system
Ce hv6 module 56 hacking global positioning system
Vi Tính Hoàng Nam
 
Recomended ip telephony architecture
Recomended ip telephony architectureRecomended ip telephony architecture
Recomended ip telephony architecture
Feras Ajjawi
 
Grentech surveillance system
Grentech surveillance systemGrentech surveillance system
Grentech surveillance system
bappyni
 
Automated airfield controller system for avoiding air crashes in runway
Automated airfield controller system for avoiding air crashes in runwayAutomated airfield controller system for avoiding air crashes in runway
Automated airfield controller system for avoiding air crashes in runway
IJRES Journal
 
Iommu tracing reviewed
Iommu tracing reviewedIommu tracing reviewed
Iommu tracing reviewed
Samsung Open Source Group
 
B1803050722
B1803050722B1803050722
B1803050722
IOSR Journals
 
Safe flying operations system SFOS
Safe flying operations system   SFOSSafe flying operations system   SFOS
Safe flying operations system SFOS
Marinerz
 
Phantom 3 professional_user_manual_v1.4_en
Phantom 3 professional_user_manual_v1.4_enPhantom 3 professional_user_manual_v1.4_en
Phantom 3 professional_user_manual_v1.4_en
Christin Neumann
 

What's hot (8)

Ce hv6 module 56 hacking global positioning system
Ce hv6 module 56 hacking global positioning systemCe hv6 module 56 hacking global positioning system
Ce hv6 module 56 hacking global positioning system
 
Recomended ip telephony architecture
Recomended ip telephony architectureRecomended ip telephony architecture
Recomended ip telephony architecture
 
Grentech surveillance system
Grentech surveillance systemGrentech surveillance system
Grentech surveillance system
 
Automated airfield controller system for avoiding air crashes in runway
Automated airfield controller system for avoiding air crashes in runwayAutomated airfield controller system for avoiding air crashes in runway
Automated airfield controller system for avoiding air crashes in runway
 
Iommu tracing reviewed
Iommu tracing reviewedIommu tracing reviewed
Iommu tracing reviewed
 
B1803050722
B1803050722B1803050722
B1803050722
 
Safe flying operations system SFOS
Safe flying operations system   SFOSSafe flying operations system   SFOS
Safe flying operations system SFOS
 
Phantom 3 professional_user_manual_v1.4_en
Phantom 3 professional_user_manual_v1.4_enPhantom 3 professional_user_manual_v1.4_en
Phantom 3 professional_user_manual_v1.4_en
 

Viewers also liked

Smart simulation System
Smart simulation SystemSmart simulation System
Smart simulation System
riskis
 
Smart Simulation System Doc
Smart Simulation System DocSmart Simulation System Doc
Smart Simulation System Doc
riskis
 
Smart Simulation System
Smart Simulation SystemSmart Simulation System
Smart Simulation System
riskis
 
Условно-накопительная пенсионная система
Условно-накопительная пенсионная системаУсловно-накопительная пенсионная система
Условно-накопительная пенсионная система
Maxim Olar
 
бг 2016 непрограммные
бг 2016 непрограммныебг 2016 непрограммные
бг 2016 непрограммные
MoreBriz
 
Oracle Service Bus
Oracle Service BusOracle Service Bus
Oracle Service Bus
Shamim bhuiyan
 
1 stampane ploce
1 stampane ploce1 stampane ploce
1 stampane ploceJelenaBg
 
живи, музей
живи, музейживи, музей
живи, музейkravhenko
 
Worbook sesion5
Worbook sesion5Worbook sesion5
Worbook sesion5
Meztli Valeriano Orozco
 
Concept
ConceptConcept
Concept
Figen232
 
Passport for Healthcare Week
Passport for Healthcare WeekPassport for Healthcare Week
Passport for Healthcare Week
Meagan Rudy
 
Jeremiah l mitchel resume
Jeremiah l mitchel resumeJeremiah l mitchel resume
Jeremiah l mitchel resume
Jeremiah Mitchell
 
Sesion9
Sesion9Sesion9
Summer tac gapps
Summer tac gappsSummer tac gapps
Summer tac gapps
Carlos Paez
 
Construction brick types
Construction brick typesConstruction brick types
Construction brick types
vigyanashram
 
Penghargaan
PenghargaanPenghargaan
Penghargaan
syafiq hussin
 
The future we want
The future we wantThe future we want
The future we want
Hadrian Fadilah
 
Dogs Underwater
Dogs UnderwaterDogs Underwater
Dogs Underwater
Mihex
 
Ugly Ugly Cars
Ugly Ugly CarsUgly Ugly Cars
Ugly Ugly Cars
Mihex
 

Viewers also liked (20)

Smart simulation System
Smart simulation SystemSmart simulation System
Smart simulation System
 
Smart Simulation System Doc
Smart Simulation System DocSmart Simulation System Doc
Smart Simulation System Doc
 
Smart Simulation System
Smart Simulation SystemSmart Simulation System
Smart Simulation System
 
Условно-накопительная пенсионная система
Условно-накопительная пенсионная системаУсловно-накопительная пенсионная система
Условно-накопительная пенсионная система
 
бг 2016 непрограммные
бг 2016 непрограммныебг 2016 непрограммные
бг 2016 непрограммные
 
Oracle Service Bus
Oracle Service BusOracle Service Bus
Oracle Service Bus
 
1 stampane ploce
1 stampane ploce1 stampane ploce
1 stampane ploce
 
живи, музей
живи, музейживи, музей
живи, музей
 
Worbook sesion5
Worbook sesion5Worbook sesion5
Worbook sesion5
 
Concept
ConceptConcept
Concept
 
11
1111
11
 
Passport for Healthcare Week
Passport for Healthcare WeekPassport for Healthcare Week
Passport for Healthcare Week
 
Jeremiah l mitchel resume
Jeremiah l mitchel resumeJeremiah l mitchel resume
Jeremiah l mitchel resume
 
Sesion9
Sesion9Sesion9
Sesion9
 
Summer tac gapps
Summer tac gappsSummer tac gapps
Summer tac gapps
 
Construction brick types
Construction brick typesConstruction brick types
Construction brick types
 
Penghargaan
PenghargaanPenghargaan
Penghargaan
 
The future we want
The future we wantThe future we want
The future we want
 
Dogs Underwater
Dogs UnderwaterDogs Underwater
Dogs Underwater
 
Ugly Ugly Cars
Ugly Ugly CarsUgly Ugly Cars
Ugly Ugly Cars
 

Similar to Special tracking system mod

Special tracking system mod rearanjat
Special tracking system mod rearanjatSpecial tracking system mod rearanjat
Special tracking system mod rearanjat
riskis
 
Special tracking system
Special tracking systemSpecial tracking system
Special tracking system
riskis
 
Nightingale_Security_Digital_Brochure
Nightingale_Security_Digital_BrochureNightingale_Security_Digital_Brochure
Nightingale_Security_Digital_Brochure
Tal Turner
 
Nightingale_Security__Company_Profile_Digital_Brochure_Desktop_071916
Nightingale_Security__Company_Profile_Digital_Brochure_Desktop_071916Nightingale_Security__Company_Profile_Digital_Brochure_Desktop_071916
Nightingale_Security__Company_Profile_Digital_Brochure_Desktop_071916
Pierre Ketels
 
Difference Between a Security Camera vs Surveillance Camera.pptx
Difference Between a Security Camera vs Surveillance Camera.pptxDifference Between a Security Camera vs Surveillance Camera.pptx
Difference Between a Security Camera vs Surveillance Camera.pptx
IT Company Dubai
 
Information Technology
Information TechnologyInformation Technology
Information Technology
Muhammad Farhan Javed
 
Omniscout Corporate Overview
Omniscout Corporate OverviewOmniscout Corporate Overview
Omniscout Corporate Overview
DavidGimza
 
Solutions Overview for Security
Solutions Overview for SecuritySolutions Overview for Security
Solutions Overview for Security
Westbase.io
 
Railcover: service concept for increased vehicle availability
Railcover: service concept for increased vehicle availabilityRailcover: service concept for increased vehicle availability
Railcover: service concept for increased vehicle availability
RollingOnRails
 
Types Of Proactive Security Solutions For Self-storage
Types Of Proactive Security Solutions For Self-storageTypes Of Proactive Security Solutions For Self-storage
Types Of Proactive Security Solutions For Self-storage
Nexlar Security
 
The Ultimate Guide to Security Surveillance.docx
The Ultimate Guide to Security Surveillance.docxThe Ultimate Guide to Security Surveillance.docx
The Ultimate Guide to Security Surveillance.docx
PelorusTechnologies
 
Complex safety cloud platform
Complex safety cloud  platformComplex safety cloud  platform
Complex safety cloud platform
Anton Panfilov
 
Caretower's Managed ePO Brochure 180215
Caretower's Managed ePO Brochure 180215Caretower's Managed ePO Brochure 180215
Caretower's Managed ePO Brochure 180215
Merlin Govender
 
Caretower's Managed ePO Brochure 180215
Caretower's Managed ePO Brochure 180215Caretower's Managed ePO Brochure 180215
Caretower's Managed ePO Brochure 180215
Emmerick Gortz
 
2MP IP Security Camera
2MP IP Security Camera2MP IP Security Camera
2MP IP Security Camera
Matrix ComSec
 
Matrix Satatya Ip Video Surveillance
Matrix Satatya Ip Video SurveillanceMatrix Satatya Ip Video Surveillance
Matrix Satatya Ip Video Surveillance
Matrix ComSec
 
ZoneSafe Proximity Warning and Alert Systems
ZoneSafe Proximity Warning and Alert SystemsZoneSafe Proximity Warning and Alert Systems
ZoneSafe Proximity Warning and Alert Systems
Roanna Warren (ACIM)
 
ZoneSafe - Proximity Warning Alert Systems
ZoneSafe - Proximity Warning Alert SystemsZoneSafe - Proximity Warning Alert Systems
ZoneSafe - Proximity Warning Alert Systems
Roanna Warren (ACIM)
 
ZoneSafe - Proximity Warning Alert Systems
ZoneSafe - Proximity Warning Alert SystemsZoneSafe - Proximity Warning Alert Systems
ZoneSafe - Proximity Warning Alert Systems
Roanna Warren (ACIM)
 
Ready rev1
Ready rev1Ready rev1
Ready rev1
mikey_3776
 

Similar to Special tracking system mod (20)

Special tracking system mod rearanjat
Special tracking system mod rearanjatSpecial tracking system mod rearanjat
Special tracking system mod rearanjat
 
Special tracking system
Special tracking systemSpecial tracking system
Special tracking system
 
Nightingale_Security_Digital_Brochure
Nightingale_Security_Digital_BrochureNightingale_Security_Digital_Brochure
Nightingale_Security_Digital_Brochure
 
Nightingale_Security__Company_Profile_Digital_Brochure_Desktop_071916
Nightingale_Security__Company_Profile_Digital_Brochure_Desktop_071916Nightingale_Security__Company_Profile_Digital_Brochure_Desktop_071916
Nightingale_Security__Company_Profile_Digital_Brochure_Desktop_071916
 
Difference Between a Security Camera vs Surveillance Camera.pptx
Difference Between a Security Camera vs Surveillance Camera.pptxDifference Between a Security Camera vs Surveillance Camera.pptx
Difference Between a Security Camera vs Surveillance Camera.pptx
 
Information Technology
Information TechnologyInformation Technology
Information Technology
 
Omniscout Corporate Overview
Omniscout Corporate OverviewOmniscout Corporate Overview
Omniscout Corporate Overview
 
Solutions Overview for Security
Solutions Overview for SecuritySolutions Overview for Security
Solutions Overview for Security
 
Railcover: service concept for increased vehicle availability
Railcover: service concept for increased vehicle availabilityRailcover: service concept for increased vehicle availability
Railcover: service concept for increased vehicle availability
 
Types Of Proactive Security Solutions For Self-storage
Types Of Proactive Security Solutions For Self-storageTypes Of Proactive Security Solutions For Self-storage
Types Of Proactive Security Solutions For Self-storage
 
The Ultimate Guide to Security Surveillance.docx
The Ultimate Guide to Security Surveillance.docxThe Ultimate Guide to Security Surveillance.docx
The Ultimate Guide to Security Surveillance.docx
 
Complex safety cloud platform
Complex safety cloud  platformComplex safety cloud  platform
Complex safety cloud platform
 
Caretower's Managed ePO Brochure 180215
Caretower's Managed ePO Brochure 180215Caretower's Managed ePO Brochure 180215
Caretower's Managed ePO Brochure 180215
 
Caretower's Managed ePO Brochure 180215
Caretower's Managed ePO Brochure 180215Caretower's Managed ePO Brochure 180215
Caretower's Managed ePO Brochure 180215
 
2MP IP Security Camera
2MP IP Security Camera2MP IP Security Camera
2MP IP Security Camera
 
Matrix Satatya Ip Video Surveillance
Matrix Satatya Ip Video SurveillanceMatrix Satatya Ip Video Surveillance
Matrix Satatya Ip Video Surveillance
 
ZoneSafe Proximity Warning and Alert Systems
ZoneSafe Proximity Warning and Alert SystemsZoneSafe Proximity Warning and Alert Systems
ZoneSafe Proximity Warning and Alert Systems
 
ZoneSafe - Proximity Warning Alert Systems
ZoneSafe - Proximity Warning Alert SystemsZoneSafe - Proximity Warning Alert Systems
ZoneSafe - Proximity Warning Alert Systems
 
ZoneSafe - Proximity Warning Alert Systems
ZoneSafe - Proximity Warning Alert SystemsZoneSafe - Proximity Warning Alert Systems
ZoneSafe - Proximity Warning Alert Systems
 
Ready rev1
Ready rev1Ready rev1
Ready rev1
 

More from riskis

RoboScan1MC datasheet
RoboScan1MC datasheetRoboScan1MC datasheet
RoboScan1MC datasheetriskis
 
RoboScan1MC description
RoboScan1MC descriptionRoboScan1MC description
RoboScan1MC description
riskis
 
RoboScan2M Aeria Datasheet
RoboScan2M Aeria DatasheetRoboScan2M Aeria Datasheet
RoboScan2M Aeria Datasheetriskis
 
RoboScan1M brochure
RoboScan1M brochureRoboScan1M brochure
RoboScan1M brochureriskis
 
RoboScan0M brochure
RoboScan0M brochureRoboScan0M brochure
RoboScan0M brochureriskis
 
Roboscan vs. Competition
Roboscan vs. CompetitionRoboscan vs. Competition
Roboscan vs. Competitionriskis
 
Gepard gm6 lynx x
Gepard gm6 lynx xGepard gm6 lynx x
Gepard gm6 lynx x
riskis
 
Gepard presentation
Gepard presentationGepard presentation
Gepard presentation
riskis
 
Car Vip Protection presentation
Car Vip Protection presentationCar Vip Protection presentation
Car Vip Protection presentation
riskis
 
Car Vip Protection
Car Vip ProtectionCar Vip Protection
Car Vip Protection
riskis
 
1804 car vip protection
1804 car vip protection1804 car vip protection
1804 car vip protection
riskis
 
473 tactical cellular jamming system
473 tactical cellular jamming system473 tactical cellular jamming system
473 tactical cellular jamming system
riskis
 
1804 car vip protection
1804 car vip protection1804 car vip protection
1804 car vip protection
riskis
 
475 low power cellular jammer
475 low power cellular  jammer475 low power cellular  jammer
475 low power cellular jammer
riskis
 
473 tactical cellular jamming system
473 tactical cellular jamming system473 tactical cellular jamming system
473 tactical cellular jamming system
riskis
 
472 smart cellular jammer
472 smart cellular jammer472 smart cellular jammer
472 smart cellular jammer
riskis
 
471 1-mobile jammer
471 1-mobile jammer471 1-mobile jammer
471 1-mobile jammer
riskis
 
Doc sms good
Doc sms goodDoc sms good
Doc sms good
riskis
 
Presant
PresantPresant
Presant
riskis
 
Doc sms identica
Doc sms identicaDoc sms identica
Doc sms identica
riskis
 

More from riskis (20)

RoboScan1MC datasheet
RoboScan1MC datasheetRoboScan1MC datasheet
RoboScan1MC datasheet
 
RoboScan1MC description
RoboScan1MC descriptionRoboScan1MC description
RoboScan1MC description
 
RoboScan2M Aeria Datasheet
RoboScan2M Aeria DatasheetRoboScan2M Aeria Datasheet
RoboScan2M Aeria Datasheet
 
RoboScan1M brochure
RoboScan1M brochureRoboScan1M brochure
RoboScan1M brochure
 
RoboScan0M brochure
RoboScan0M brochureRoboScan0M brochure
RoboScan0M brochure
 
Roboscan vs. Competition
Roboscan vs. CompetitionRoboscan vs. Competition
Roboscan vs. Competition
 
Gepard gm6 lynx x
Gepard gm6 lynx xGepard gm6 lynx x
Gepard gm6 lynx x
 
Gepard presentation
Gepard presentationGepard presentation
Gepard presentation
 
Car Vip Protection presentation
Car Vip Protection presentationCar Vip Protection presentation
Car Vip Protection presentation
 
Car Vip Protection
Car Vip ProtectionCar Vip Protection
Car Vip Protection
 
1804 car vip protection
1804 car vip protection1804 car vip protection
1804 car vip protection
 
473 tactical cellular jamming system
473 tactical cellular jamming system473 tactical cellular jamming system
473 tactical cellular jamming system
 
1804 car vip protection
1804 car vip protection1804 car vip protection
1804 car vip protection
 
475 low power cellular jammer
475 low power cellular  jammer475 low power cellular  jammer
475 low power cellular jammer
 
473 tactical cellular jamming system
473 tactical cellular jamming system473 tactical cellular jamming system
473 tactical cellular jamming system
 
472 smart cellular jammer
472 smart cellular jammer472 smart cellular jammer
472 smart cellular jammer
 
471 1-mobile jammer
471 1-mobile jammer471 1-mobile jammer
471 1-mobile jammer
 
Doc sms good
Doc sms goodDoc sms good
Doc sms good
 
Presant
PresantPresant
Presant
 
Doc sms identica
Doc sms identicaDoc sms identica
Doc sms identica
 

Recently uploaded

Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
Pixlogix Infotech
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
TIPNGVN2
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Zilliz
 

Recently uploaded (20)

Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
 

Special tracking system mod

  • 1. Your security is our priority Special Tracking System Specialized Solution for Field-Operation Management
  • 2. Your security is our priority Special Tracking System The Special Tracking System is a specially designed system for the Management, Command and Control of remote field operations, such as: Military operations which require accurate information on the location and status of the soldiers on the field. Field operation of paramilitary forces such as SWAT-Teams and VIP protection teams. Field Operation of Undercover Tracking Missions.
  • 3. Your security is our priority Special Tracking System Elements The system is comprised of the following elements: Miniature Tracking Units that are placed on the soldier/agents that operate on the field. Tracking Units that are mounted on vehicles that should be tracked and monitored. Different types of Command and Control (C4I) Stations – for Management. Command and Control of the forces on the field.
  • 4. Your security is our priority Military Operation Central Command Stations Mobile Command Stations Cellular Network Soldiers Equipped with Personnel Tracking Unit Combat Vehicles Equipped with Ruggedized Units Combat Vehicles Equipped with Friendly Vehicle Units
  • 5. Your security is our priority S.W.A.T. Team Operation Central Command Stations Mobile Command Stations Cellular Network SWAT Fighters equipped with Personnel Tracking Unit SWAT Vehicles equipped with Tracking Units Hostile Terorists
  • 6. Your security is our priority V.I.P. Protection Operation Central Command Stations Mobile Command Stations Uniform Policemen equipped with Cellular Personnel Tracking Unit Network Secret Agents equipped with Personnel Tracking Unit V.I.P. Convoy Equipped With Vehicles of the Organization Tracking Units equipped with Friendly Vehicle Units
  • 7. Your security is our priority Covert Tracking Operation Central Command Stations Mobile Command Stations Cellular Network Covert Agents equipped with Personnel Tracking Units Target Vehicle with Covert Tracking Unit Vehicles of the Organization equipped with Friendly Vehicle Units
  • 8. Your security is our priority The Units Weatherproof Weatherproof V6 Unit V8 Unit V10 Unit Weatherproof V10 Unit Friendly Vehicle Unit
  • 9. Your security is our priority The Tracking Units Structure The Tracking and location Units contain the following components: GPS Receiver Cellular Modem Motion Sensor Internal Memory for Data Logging Audio Microphone (in some of the units)
  • 10. Your security is our priority The V10 Unit A compact location unit carried by soldiers or mounted on the bodies of Covert Agents. The unit can send continuous information regarding the precise location of Soldiers/Covert- Agents on the field. Enables to open an Audio Session towards the soldier/covert-agent, in order to monitor his situation and listen to conversations he is having with different persons on the field. The unit comes in two possible cases: - Rigid Weatherproof Case, sealed for weather conditions - Thin Unsealed Case, enables to better conceal the unit on the body of the Covert Agent. It is possible to have the unit equipped with a Panic Button.
  • 11. Your security is our priority The V6 Unit Specially designed unit for Covert Tracking after Target Vehicles. A compact and autonomous unit, with internal battery house. The unit’s case is totally sealed against weather conditions. The unit includes powerful magnets for easy installation on Target Tracked Vehicles.
  • 12. Your security is our priority The V8 Unit Specially designed unit for Covert Tracking after Target Vehicles. The unit’s case is even smaller than the V6 unit; however it does not contain an internal battery. It is possible to feed the unit with power by either: - A waterproof External Battery Pack with strong magnets. - A Power Cable that can be connected to the Vehicle’s Power System (12V/24V). The unit is totally sealed against weather conditions. The unit includes powerful magnets for easy installation on Target Tracked Vehicles.
  • 13. Your security is our priority The Friendly Vehicle Unit Tracking Unit that is installed on the Vehicles of the Military Unit/ Organization. The unit can be connected to different subsystems of the vehicle. The unit enables remote monitoring regarding the status of the vehicle, such as: whether the vehicle’s engine is On/Off, the Vehicle’s doors are Open/Close, etc. The Unit enables remote control over different systems of the vehicle: - Turning the vehicle’s lights On/Off. - Locking the vehicle’s doors, remote activation of the vehicle’s siren, etc. - Secure shutdown of the vehicle’s engine while the vehicle is in motion. It is possible to connect to the unit different accessories, such as: a speaker phone, panic button, and more.
  • 14. Your security is our priority The System’s Command Stations The system can be operated by a Single Command Center, or by several Command Centers that can monitor the same operation simultaneously. The system has two types of Command Centers: - Central Command Center - mounted on a PC/Server Computer. - Mobile Command Center - mounted on a Smart Phone. The Central Command Centers are often mounted on Laptops, in order to enable full mobility. It is also possible to install the Command Center on regular Desktop or Server-Computers – according to the required architecture of the system.
  • 15. Your security is our priority The Command Center Structure The Communication Module - Manages the communication between the Command Center and the different End Units on the field. The Maps Module (GIS) - Enables the display of the End Units on Digital Maps. It is possible to integrate to the Command Center different types of Digital Maps, such as: - Raster Maps - Vector Maps - Aerial Photo Maps - Topographical Maps - City Maps etc. The Database Module - Registers all the messages sent by the End Units. Enables to store and restore all the movements of people and vehicles on the field.
  • 16. Your security is our priority Operation Of The End-Units The End-Units support two possible modes of tracking, that can be operated in parallel: - Real-Time Tracking – The units send immediate location messages to the Command Center. - Log Tracking – The location data is registered into the internal memory of the unit, and can be later downloaded to the Command Center. The complete setting and command of the units is done by remote control. The units can send the location messages over the data channel of the cellular network, or by SMS messages. The communication between the End-Units and the Command Center is encrypted in order to protect the nature of data.
  • 17. Your security is our priority The Location Messages Each location message that is sent from the End-Units to the Command Center, contain the following information: The location data. Timestamp of the location. Number of available GPS satellites. Speed and direction of movement. The battery status. Bitmap of all the unit’s alerts. The Cell ID to which the unit is registered. The serial number of the message. The data above is sent over a special binary protocol, with the length of only 35 Bytes! (a quarter of an SMS). The compressed structure of the protocol saves transmission time and therefore contributes to the prolonged time of operation of the units.
  • 18. Your security is our priority The System’s Design The System’s Units were designed with the intent to give a solution to three main operational demands: Ease of Use: The extremely compact size of the units does not restrict the movements of the soldier/ agent on the field. The size of the units avoids the detection of the units installed on Covert Agents and Target Tracked Vehicles.
  • 19. Your security is our priority The System’s Design Extended time of operation: The unit's design includes special hardware and software developments that enable the unit to work for a prolonged period of time in reference to the energy pack in use. The Unit's prolonged operational time surpasses the performance of any similar system in the world. Operation Reliability in harsh field conditions: The units are designed to reliably work under hash field conditions. The units are currently being used in combat operations by NATO military forces in known conflicting areas around the world.