Showing 25–48 of 157 results

DDS Bomb Jammer

6bands Portable security DDS signal Bomb Jammer AAT-DDS-6CH

DDS Jammers

DDS Jammers in operation as RF Jammers are built into a briefcase configuration, equipped with a programmable Direct Digital Synthesis processor. DDS Jammers such as model VIP 200M represent a new, portable RF Jamming system used to combat Remote Controlled Improvised Explosive Devices or RCIEDs. DDS Jammers are now replacing existing PLL Synthesized technology found in manual jamming systems because DDS Jammers possess the ability to remain reactive or preprogrammed during the tuning of the digital jammers operation. When RF Jammers integrate DDS Jammer technology, the user is able to broadcast RF Jamming interference on frequencies that do not require to be factory determined. VIP 200M DDS Jammers are user programmable, giving the operator the ability to open and close communication windows for short or long term communications. To view all frequency ranges and specifications, you must register on this site, as all frequency ranges for the DDS Jammer are non-publicized. Using an intensive electromagnetic field, this Radio Frequency Jammer model VIP 200m emits powerful interference. This interference covers the indicated threat frequency bands and cannot be circumvented by filtering. These RF Jammers emit interference designed to prevent radio triggering devices from activating.

Detector Jammer Demonstration Kit

The Detector Jammer Demonstration Kit shows reactive jamming to mobile phones. This demonstration kit is a hybrid of both a cellular detector and cellular jammer. Before any correctional or Government Agency has a jamming system installed, they need to see a live demonstration. The Detector Jammer Demonstration Kit is that live demonstration. It consists of a two-part system that allows easy demonstration of several technologies sought by Government Agencies. Configured in two mil-spec cases, it includes dual functionalities:
  1. A RF receiver dedicated to monitoring the airwaves for communication in cellular bands using an internal application similar to a Spectrum Analyzer with Electronic Countermeasure sweeps abilities
  2. A quad-band Cellular Jamming system (export model) or Denial of Service Control Center (domestic model)

Dirty Bomb Detector

This bomb detector is also a radiation detector used to quickly monitor an area and discover possible radioactive threats. • COMPACT DIRTY BOMB DETECTOR AND RADIATION DETECTOR • CAN BE USED AS A STAND ALONE RADIATION MONITORING SYSTEM • LIMITLESS OPERATION VIA INTERNET • RADIOLOGICAL COMPONENT OF THE SSR 5000/6000/7000 SYSTEM

Drone Defense Detection

Drone Defense Equipment Integrates Drone Detection & Countermeasures System Model: AAT-DAD-002W

Enhanced IED Jammer

The IED Jammer for IED Jamming model VIP 300X is a Bomb Jammer that counters IED attacks from terrorists or insurgents who use Radio Controlled triggers to detonate an IED.  This IED Jammer jams the radio signals sent to the radio receiver of an IED, and helps defend the IED Jammer operators against explosive devices utilizing an RF Transmitter or Radio Frequency Transmitter as a means of detonation. To counter an RCIED attack, the IED or Improvised Explosive Device would need to receive an enhanced level of radio interference from the RCIED Jammer in order to neutralize the remote activation signal and prevent the explosive device from triggering. The VIP 300X emits intensified power to saturate the environment with a strong output of electromagnetic energy similar to a radio wave barrier in the form of interference signals.  This interference blocks radio signals of cell phones, walkie talkies, and satellite phones, all popular communication tools used as triggering mechanisms for remote controlled bombs, RCIEDs, and other radio controlled weapons.

Fiberscopes

Fiberscopes for contraband detection serve as bomb detectors, contraband detectors, and under door scopes for EOD Teams and Swat Teams.

GSM Cellular Interceptor

The GSM Cellular Interceptor now offers a full suite of tracking intelligence and forensic technologies. In addition to non-intrusive intercept of voice and SMS text messages, the GSM Cellular Interceptor may also provide surveillance officers with investigative support mechanisms. With features that operate beyond the capabilities of an IMSI Catcher, interception also involves target identification, call manipulation, and GSM phone tracking.

IpTL Model 70V Series Virtual Secure Remote Access Appliance for VMware, Amazon AWS, Hyper-V, Microsoft Azure

Hi-Performance Virtualized Hosted and cloud Network Application Connectivity

The IpTL 70V eGate Secure Remote Access Appliance and Server is a virtualized connectivity solution for hosted and cloud deployments providing transparent, secure, and controlled access to applications and data.

Built on IpTL’s product-based converged infrastructure technologies the Model 70V Series provides the same network connectivity, application transparency, and tunnel security without the individual hardware overhead, maintenance, and costs of a separate hardware installation.

When to Use

  • Virtualized Server or Cloud environments such VMware ESXi™, Amazon AWS™, Microsoft Hyper-V™, Microsoft Azure™, Oracle VirtualBox™
  • Hybrid-Cloud & Virtual Private Cloud Remote Access
  • Virtualized application integration with walled garden-controlled application access
  • Seamless private cloud to public cloud integration

IPTL Model 7151 Cellular Secure Network Gateway

Semi-Ruggedized Appliance with Integrated Cellular Modem, Reliable VPN/Tunneling, Routing, and Failover

IpTL FastLane™ Model, 7151 Series appliances, tightly integrate a built-in cellular LTE broadband Internet modem along with our full-featured access easy VPN/Tunneling router and connectivity features. Great for IoT/M2M connectivity, Automatic Cellular backup/Internet Failover, Out-of-Band Management, & Remote Branch, the 7151 includes all the expected networking features that need to easily connect over any network. When to use
  • Remote Internet Access over the Cellular Network – ATM machines, Digital Signage, IP Cameras, Access Control
  • Failover to Cellular redundancy protecting your existing Internet connection
  • Secure IoT/M2M connectivity from device-to-cloud with Private IP

IpTL Model 780 Series Secure Network Gateway Expandable to 25 connections with Enhanced Performance, & Redundancy

Expandable Performance Appliance for Point-to-Point or Multipoint with up to 25 connections

The IpTL 780 Series provides an expandable performance concentration point for multisite connectivity. Software scalable with just licenses from 1 to 25 connections the 780 Series provides the connectivity, control, and configuration for your multisite Video, Voice, and data networking requirements. With multi-provider fallback and hot-standby redundancy standards, the 780 Series delivers your application with the right amount of connections, future expandability, and the full power of IpTL’s Trust & Control™.

When to Use

  • Multi-point aggregation for up to 25 remote connections
  • High-Performace Point-to-Point links
  • Expandability – Start small and expand to the number of connections you need
  • Investment protection – no rip out of equipment or changes to remotes – not even a reboot is required

IpTL Model 79R Series Secure Remote Access Appliance Hi-Performance Server with Field Expandable Connections & Redundancy

Hi-Performance Ethernet/IP Server with Field Expandable Connections for data data center, Replication, and Headquarters sites

The IpTL Model 79R Series provides a unified management point for terminating large networks. For larger enterprise applications with many sites or as part of an integrated disaster recovery installation, the Model 79R provides transparency, bandwidth, and flexibility for each of your local or remote network connections.

When to Use

  • Central site aggregation for up to 1,000 remote connections
  • Hi Performance Datacenter-to-Datacenter Links
  • Network Segmentation of Remotes
  • MPLS leased-line link and trunk protection

Laser Listening Defeat System

Originally developed to counter Audio Laser Measurement surveillance devices, the Laser Listening Defeat System will distort Infra Red sound readers,

Manpack Bomb Jammer

240W 8Bands Backpack Military Convoy Protection Anti Bomb Signal Jammer Model:AAT-JMP8-240W

Manpack DDS Jammer

20-6000MHz Manpack IED RCIED DDS Bomb Jammer Model: AAT-DDS-M6B

Manpack IED Bomb Jammer

6bands Manpack IED RCIED Bomb Jammer Model: AAT-IED-6B Manpack

Model 7004 Cellular Secure Network Gateway

Semi-Ruggedized Cellular Secure Network Gateway with integrated LTE Internet, VPN/Tunneling, Routing, & Integrated WAN Failover — AT&T, T-Mobile, & Verizon Certified

IpTL FastLane™ appliances are designed for always-up reliable, secure access connectivity for IoT/M2M, Automatic WAN Failover and restore, & remote branch connectivity. The Model 7004 Cellular Secure Network Gateway provides an embedded certified multicarrier LTE modem, wired Fast-Ethernet connectivity, and secure VPN/Tunneling within a single tightly integrated package. Never worry if you have the right model on hand…now, a single Model 7004 will automatically support AT&T, T-Mobile, or Verizon network connectivity.

Phone Jammer

The Phone Jammer model MS6-35 is a high power jamming device with a tactical nature. Before entering a house or building, law enforcement has the option to deploy cellular jammers. Once they activate the Phone Jammer, they can prevent criminals and terrorists from speaking with one another, and control mobile communications. With its 35 Watts per band, this 3 band Phone Jammer can give off 105 Watts of energy in order to block disable cellular phones in the targeted area. The phone jamming is directional, reducing energy waste by directing the jamming where it is meant to go. Using HSS power stabilization, our Phone Jammer is also made to give off the most efficient form of phone jamming signals. Cellular Jammers with power stabilization can be used in multiple ways with double the efficiency of standard jammers. This system can function as a stationary jammer, yet it is also a portable jammer that comes in a portable case. There is no warm up time, as the unit will operate once the power is activated.

Portable RF Jammer

Portable RF Jammer VIP 200 is a hand held IED Jammer built into a briefcase.  It is designed to transmit RF interference or radio frequency interference in order to block a radio receiver found in a Cellular IED, Satellite Phone IED, Mobile IED, or Radio IED from obtaining any RF trigger signals. These signals are used by terrorists and insurgents to detonate an RCIED or Remote Controlled Improvised Explosive Device. RF Jamming using this portable Bomb Jammer ™ gives the user the edge when trying to avoid an attack from a Remote Controlled IED.  Specific IED ambushes involve a terrorist or insurgent transmitting a detonation command from a landline or cellular phone to a Cellular IED, Mobile IED, or Satellite Phone IED.  In these instances, the phone is connected to an explosive and is detonated on command by someone who can generally see if the victim is within range of the IED. The Bomb Jammer ™ VIP 200 helps block RCIEDs from receiving their detonation signals by saturating the area with RF interference to neutralize the radio receiver, making it almost impossible for any RF signal to penetrate and trigger the explosive IED.

Power Selectable Jammer

The Power Selectable Jammer MS-3 is designed to jam mobile phones for small to medium sized commercial applications, giving the user the ability to increase and decrease the power output. The MS-3 Power Selectable Jammer has an output power of 4 watts, which will effectively block cellular phone signals up to 15m +, depending upon operating conditions. Some of our RF Jammers are built with an internal synchronization module interfaced with a sensitivity control feature. That is feature that enables the user to control the output level of RF Jamming. Built for RF jamming in the consumer, executive, and diplomatic sectors, our cell phone jammer targets not only cellular mobile phones, but GSM listening devices and cellular transmitters hidden in conference rooms, office environments, consulates, embassies, hotel rooms, and other buildings. With superior design, the Power Selectable Jammer keeps your meetings private from gsm transmitters, cellular eavesdropping devices, as well as unauthorized mobile phones.

Prison Jammer

Jammer is a cellular jamming and cellular detection system. Model IJS 6000 is an intelligent cellular Prison Jammer system designed to jam unauthorized cellular phones while permitting authorized cellular phones to operate. With the Prison Jammer, control can be managed over criminal communications in a prison, unauthorized calls in a courthouse, military installation, or specific environments where cell phone activity must be managed. In correctional circles, it is known as the prison jammer or prison jamming system.

Programmable Jammer

The Programmable Jammer is a communications jammer used to negate all types of rf signals. The system can work to

Radio Jammer

Radio Jammer model VIP 300d targets radio detonators with Radio Jammer countermeasures consisting of radio jamming noise or interference. This

RF Jammer

RF Jammer model MS2-POR enhances our line of cellular jammers with directional RF Jamming on specific areas. That means our RF Jammer can focus energy where the user intends to jam, directing RF Jamming signals on areas of concern. This greatly decreases the chance a call will be able to remain in progress, as our RF Jammer now offers this enhanced directional feature. RF Jammer model MS2-POR can be used to jam RF signals for cellular phones all over the world. Some cellular jammers work to disrupt calls based on the principles of RF Jamming that involve a denial of service attack. Yet when dealing with our RF Jammer to target a cell phone, there are other factors involved.