Joined: Thu Jan 24, 2008 11:02 am
| Voice Stress Analysis Lie Detection and Lie Detector technologies used for Truth Verification in the form of Voice Stress Analysis are offered as tools for people who need to know the truth.
This process involves electronic test measurement equipment that observes the human voice, analyzes its characteristics, and then offers the user electronic values to help determine if the voice stress is normal or abnormal.
Making decisions with what people tell you generally need to be based on true statements. The human body can mask truth values in many ways with the exception of the human voice. Therefore, Lie Detectors that utilize Voice Stress Analysis offer a direct method of determining truth or false answers for interview / interrogation practices.
SITG Voice Stress Analyzers can work discretely: used while examining the subject over the phone.
SITG Voice Stress Analyzers can also work in person: used while interviewing the subject at hand. VSA 2000 Lie Detection Lab The VSAâ„¢ 2000 is a Lie Detection Laboratory. It is the next generation in lie detection equipment from SITG. The VSAâ„¢ 2000 utilizes the following technology, enabling users to interview clients or subjects without their knowledge,* affording an effective way to obtain relaxed interviews, allow archiving of all data and evidence, whenever accurate lie detection is necessary.
The VSAâ„¢ 2000 permits remote wireless intelligence gathering and interviewing. It also permits:
Archive logging for post analysis and review
Can be accomplished without subject's knowledge*
Clear LED digital readout as well as printout
Built-in video allows study of body language and enables remote management supervision
Truth Verification accessories for Investigation & Interview Management include:
Ghost WMTTX-4400 wireless microphone
RX-U 500/50 receiver
Mini disc digital recorder
Customized video remote recording
Voice Stress Analysis measures sub-audible micro tremors in the vocal chords to digitally analyze a subject's level of stress. This process does not involve wires to attach or graphs to chart. Simply stated, it requires an interviewer to establish a base line, and a numeric value to attribute to every answer the subject gives. The higher the number, the less truthful the response. Clear, precise digital readouts are given in both LED and printed format.
Results are instantaneous, accurate and thoroughly reliable as an investigative tool.
The VSAâ„¢ 2000 can be used in person or on the phone, in real time, and/or archived for later evaluation. Combining a camera for visual monitoring affords the study of body language and also offers remote management supervision of interrogation. The VSA 2000 Electronic Lie Detection Laboratory comes with instructional video tapes for technical operation and advanced interrogation methods.
The equipment is contained in a rugged, lightweight briefcase that is ready to be deployed pre-planned interrogations or for emergency situations whether in the office or out in the field.
$25,000 Encryption & Voice Privacy With so much business being transacted over the phone, cell phone or by computer, today's sensitive corporate environments demand constant supervision to maintain confidentiality and corporate security.
The SITG commitment to producing effective encryption and security tools is derived from its overall philosophy -- Corporate confidentially isn't a luxury, it is a necessity. Phone, Cell Phone, & Data Encryption: Secure Lineâ„¢ Model SL 700 The Secure Lineâ„¢ 700 is a device that encrypts office and business communications from eavesdroppers trying to listen and monitor them.
Specifically, the SL 700 secures:
Cellular Voice Communications
Single Line Phones
Voice Communications via PBX
Files in any Computer, Network or on the Internet
Point to Point File Transfers (connected to computer)
Compatible with Secure Lineâ„¢ series of products (SL-800, SL-1400, ULP-1)
Connections & Protections:
-The SL 700 connects to ordinary telephone lines, allowing easy encryption of voice communication between other SL 700 units.
-The SL 700 provides a simple method of encrypting computer files.
Select, encrypt, and save files through the SL 700 insuring that important information is kept confidential. The encrypted files can be stored in computer networks or on the Internet.
The SL 700 can protect important information contained in computer hardware as well as securing the communication of an e-mail attachment and point to point file transfers. Connect any cell phone through the RS 232 Jack to the SL 700, insuring cryptographic communications of information between other SL 700's. The SL 700 allows secure, simultaneous voice communication (SVD) and file transfer over ordinary telephone lines.
The SL 700 combines the communication technology of SITG with the Harris corporation's Citadelâ„¢ CCX cryptographic chip. The result is a compact and portable security system that ensures e-mail, voice, fax, and data communications are secure.
$3,000 Phone & Fax Scrambler Model SL 800 The Secure Lineâ„¢ 800 (SL 800) is a device that encrypts communications from eavesdroppers trying to listen and monitor them.
Specifically, the SL 800 secures your:
Single Line Phones
Fax Machine Communications
The SL 800 connects to ordinary telephone lines, allowing easy encryption of voice communication between other SL 800 units.
The SL 800 will encrypt phone conversations, so anyone that begins to eavesdrop on the call will hear unintelligible sounds instead of private information.
The SL 800 will also encrypt fax conversations, so any "accidental fax interceptions" by eavesdroppers will result in their failure to capture information.
The SL 800 connects to ordinary telephone lines, allowing easy encryption of voice communication between Secure Lineâ„¢ 800 units. The Secure Lineâ„¢ 800 provides a simple method of encrypting computer files. Select encrypt and save files through the SL 800 insuring that important information is kept confidential.
Connect any fax machine through the RJ 11C Jack to the SL 800, insuring cryptographic communications of information between the 2 SL 800's. The SL 800 allows secure simultaneous voice communication (SVD) and file transfer over ordinary telephone lines.
The SL 800 combines the communication technology of SITG with the Harris corporation's Citadelâ„¢ CCX cryptographic chip. The result is a compact and portable security system that ensures your e-mail, voice, fax, and data communications are secure.
$5,000 Phone Wiretap Defeat System Model WTT-3000
The Wire Tap Trap is a device designed to defeat phone wiretap equipment such as infinity devices, hook switch bypasses, electronic triggers or other non-standard taps.
It works by electronically isolating your phone from the line it is connected to when the phone is on hook, making the eavesdropping equipment think that your line is not being used, and therefore keep them in standby modes without activating them.
Theory of operation:
Most wire taps are activated when the voltage of your phone line drops as you pick up the receiver. So we installed a voltage regulation system to stabilize the voltage electronically. When you pick up the phone receiver, the voltage on your line remains unchanged, and the tap will not activate itself.
The WTT-3000's LCD display shows you the amount of voltage operating through your line at all times.
The Wire Tap Trap also defeats tape recording devices that may be trying to record your conversations. By creating sine wave interference known as "Pink Noise", the WTT-3000 makes it impossible to record your voice when you use the phone.
Our greatest achievement is that we are able to offer you this sophisticated and powerful tool, while keeping it easy enough for everyone to connect - it fits easily into your executive briefcase, takes only two connections to install and can remain hidden when in use. Simple and effective, the Wire Tap Trap is a necessity for individuals and businesses alike that need to protect their privacy and business secrets.
$2,000 Telephone Security Command Center Model TSCC-1000 The TSCC 1000 is a multi-function phone security system.
-It detects wiretaps and eavesdropping equipment. It enables you (and not a service) to daily examine your phone line security.
-It is designed to defeat phone wiretap equipment such as infinity devices, hook switch bypasses, electronic triggers or other non-standard taps.
Clears your phone of taps and bugs
Keeps your business secrets intact
Protects your privacy
Fights eavesdroppers from recording your phone conversations.
$3,000 Cellular & Satellite Phone Encryption Model SL 1400 What is the SL-1400?
A Digital Encryption module for securing Cellular and Satellite communications.
How does it work?
When connected to a data capable Cellular Phone, Satellite Phone, Global star Satellite User Terminal, or most PBX systems, a secure voice and data encryption process is initiated. Multiple users can participate in this process using the SL 1400 or compatible Secure Lineâ„¢ series systems (such as SL 800, SL 700, or ULP-1).
The SL 1400 operates on battery power or line power for security anywhere. It is very compact, light weight, and easy to operate.
A headset for private, discrete communications is included.
The SL 1400 is flexible, diverse, portable and easy to use. It helps eliminate information theft from eavesdroppers trying to capture the conversations (or data transmissions) sent over cellular or satellite channels by protecting them.
Governments, businesses, and personal communications need to be kept confidential. Information that is restricted must remain restricted.
The SL-1400 joins the communication technology of SITG with various state-of the art encryption platforms including AES, the new advanced encryption standard used by the US Government; the Citadelâ„¢ CCX developed by Harris Corporation; and the Triple DES digital cryptographic logarithm. The SL 1400 is a compact and portable security system that is very easy to operate.
$1,500 Laptop Encryption to Counter Data Interception Model ULP 1 What it is:
The ULP 1 is a Counter-Measure Security Card designed for COMPUTER DEFENSE. It is built into a hardware module that connects to Laptop computers.
It encrypts email files by generating a unique (& random) security key every time you transmit an email to another ULP 1 user.
Secures e-mail attachments, ensuring safe, confidential transmission
Secures computer files (when using WindowsÂ® 98, 2000 or WindowsÂ® Me)
Eliminates your activities trail, and can permanently prohibit others from seeing your activities history.
Controls & stops computer viruses
The ULP 1 eliminates encryption detection . . . Software leaves a trail that can be eventually detected. The ULP 1 eliminates the possibility of being "seen" by computer eavesdroppers.
The ULP 1 is the ultimate laptop privacy tool. It is a high-grade breakthrough and an easy-to-use hardware based encryption solution.
How It Works:
Simply plug it into your laptop - notebook using the PCMCIA slot. It protects the integrity of your computer by ensuring that your private and confidential activities and information stay private & secure.
The ULP-1 uses the highly regarded Triple DES digital cryptographic algorithm.
The ULP-1 easily interfaces with just about any notebook computer providing the ultimate security of computer files and e-mail attachments. It stops the spreading of malicious computer viruses by encrypting Microsoft Outlook 2000 e-mail directories.
$1,500 Computer Supervisory Logging System: Hacker Trap Model HT-100 HT-100 Computer Security Monitoring See What is Leaving Your Computer While You Are "On Line." Millions of People Use On Line Services Every Day. There are Literally Hundreds of Internet Service Providers.
With so much business being transacted over the phone or by computer, today's corporate environment demands constant supervision, and complete record keeping. With the new HT-100, you can have all this and the convenience of portability and economy.
Like its predecessor the Hacker Trap, the HT-100 is a high technology communications system that differentiates between incoming and outgoing data transmissions, and will capture both independently. It automatically stores records of every piece of data sent and received from your PC on a hard drive.
The HT-100 is transparent when connected online. It can be connected directly, via physical connection, at the sending machine. It automatically logs any data in real time and can capture transmitted information for printing. The HT-100 is the most recent in state-of-the-art technology from SITG. It can help to keep your firm on the cutting edge of corporate security.
$4,000 Laser Listening Defeat System LLDS-2000 The LLDS-2000 defeats listening devices by generating and radiating sonic energy. This energy attacks the actual sound waves of human speech as measured by surveillance listening devices such as:
wired microphones buried in walls
contact or spike microphones
transmitters located in AC outlets
laser / microwave surveillance using audio reflection systems by window interception points
Originally developed to counter Audio Laser Measurement devices, the LLDS will distort Infra Red sound readers, microwave bounce technology, as well as audio microphones. The LLDS-2000 protects the user against listening devices that are not detectable by conventional methods.
With the LLDS-2000, the user is able to produce a security blanket of generated noise completely covering private conversations with sound that is unintelligible. The LLDS-2000 is an excellent addition to SITG Electronic Countermeasures, or can stand alone to provide perimeter protection.
An acoustic adapter is included (built into a transductor in the form a transducer) with the LLDS-2000 for coupling walls, ceilings, air ducts, plumbing, windows, etc.
$5,000 Telephone Analyzer Sweep & Location System CCTA-1100 The CCTA-1100 is built to satisfy the demanding standards of the professional and has been specifically designed for search applications which require immediate detection and location of phone taps. It is the only machine capable of pinpointing the exact location of a tap on your phone line.
The 0-6000 Hz sweep test finds any and all inductive and capacitance style telephone taps. The high voltage test is also capable of disabling foreign devices. Test responses include LCD graph display and LCD readout that show telephone line parameters measured numerically, while the LED display indicates if an unauthorized device is connected to the phone line. The CCTA-1100 represents the latest advancement in digital telephone analysis technology. It is the only device which provides a totally automatic method for detecting and locating bugs, wire taps, and other telephone line eavesdropping equipment.
The CCTA-1100 ensures private telephone conversations with the advantage of being user friendly and advanced in its methods of computer controlled analysis. An easy to read LCD display will walk you through its series of tests with a step-by-step guide for maximum effectiveness. All results can be printed out on a standard computer, with the software provided.
$12,000 Computerized Phone Analysis System Model CCTA 1000 The CCTA 1000 is a computerized phone line tap detection system. It scans your telephone lines and performs multiple tests in order to determine if your lines have a suspicious energy reading that might be caused by a wiretap.
Simply press a button and the CCTA 1000 will automatically perform a series of sophisticated tests. In just seconds, eavesdropping devices can be detected and pinpointed within your telephone system.
The CCTA does all the work. Without previous training, you can easily debug your entire phone system - no matter how large or complex.
The CCTA 1000 makes it simple by automatically displaying its own operating instructions every step of the way. It even shows you where connections are to be made with a series of lights.
A digital display shows the last number dialed on your telephone and gives an up-to-date readout of your telephone characteristics.
The CCTA 1000 can also perform an electronic sweep of your premises to detect hidden bugs, transmitters and recorders. An antenna probe plugs in and instantly transforms the CCTA 1000 into a sophisticated sweep system, leading you to the location of hidden eavesdropping devices in your car, home, or office.
The latest state-of-the-art technology makes the CCTA 1000 ultra compact, ultra lightweight. Like no other system, the CCTA 1000 is the first computerized telephone analyzer that's portable. The entire system consists of a single briefcase that can travel easily.
Wherever you go, the CCTA lets you travel in the age of computerized privacy.
$20,000 Tap Alertâ„¢ for Phone Line Bugs Model B400 How would you know if your phones were tapped? How would you know if they were safe to talk on? The B-400 Tap Alertâ„¢ protects your single line phones from eavesdroppers.
The B-400 will indicate if a WIRE TAP has been activated. It automatically records all activity on the line
Features a MASKING SOUND to the line when not in use and automatically stops when a call is placed or received
Uncovers most types of phone taps and bugs including:
Harmonica bugs or Infinity Transmitters
Series or Parallel devices
Hook Switch phone activated bugs
How it works:
The Tap Alertâ„¢ B400 alerts you automatically with an alarm light if a line-activated telephone wiretap has been placed on your line or phone instrument. The alarm light will also illuminate when an extension phone has been picked up anytime, day or night.
If the alarm is activated in your absence, the light will remain intact until you reset the system. This assures you of 24 hour protection against invasion-of-privacy equipment.
The Tap Alertâ„¢ B400 can be left unobtrusively on your desk as a regular accessory or concealed in a drawer or other hidden area.
$2,000 Bug Detection/Electronic Counter Measures ECM Electronic Countermeasures or TSCM uses Bug Detection and Tap Detection technologies for room and phone privacy using bug detectors, signal analyzers, radio receivers, and tap detectors.
Are your conversations bugged? Are your phone conversations wiretapped? Do you have private matters that need to stay private?
Detect surreptitious eavesdropping equipment used illegally to steal secrets and private information. Privacy invading equipment (in the form of Electronic Bugging) can cause serious personal problems, destroy a small or big business, and fuel industrial espionage.
Our technology fights privacy invading eavesdropping equipment such as bugs and wiretaps. They guard your privacy, and secure your conversations. Bug Detector & Locator Model RE-2400 The RE 2400 is a wide range receiver with a built-in distance meter. It picks up radio frequency transmission of bugs and other clandestine transmitters, and provides data to enable a location lock of the transmitter source.
The RE 2400 is designed for rapid scanning of radio frequency bands and provides "sweep" functions for detecting microphone based transmitters.
The RE 2400 also uses acoustic probing to detect microphones, in conjunction with its step-by-step scanning feature to detect radiation based sources. It then analyzes the results of the radio signals it has received and determines the distance to the transmission source.
$4,500 2nd & 3rd Harmonics Non-Linear Junction Detector Model VL-6500M The VL-6500m Non-Linear Junction Detector seeks out and alerts you to the presence of devices with semi-conductors and electronic components, which can range anywhere from a bug to an audio recording device or even a digital recorder.
The VL-6500 is intended for electromagnetic detection and localization of RF transmitters (bugs), microphone amplifiers, audio-recording devices and remote control devices. This device will operate in areas often difficult to access, and detection of sound signals in controlled zones will not be hampered by presence of mobile phones, PC's, telephones, etc.
Detection of radio-electronic devices such as:
â€¢ radio microphones
â€¢ microphone amplifiers
â€¢ portable recorders
â€¢ remote control receivers
â€¢ other units with semiconductor components
â€¢ reception of second and third harmonics
Simultaneous reception of the second and third harmonics allows to differ the "false" semiconductors of metal constructions from artificial (man-made) semiconductors.
$10,000 Video Camera Detector Model VCD-100 Do you ever get the feeling that you are being WATCHED???
The VCD 100 is a Video Camera Detector that alerts you to video camera activity.
It was designed to ensure the privacy of your personal and business dealings, meetings and operations. The VCD-100 uses an LED bar-graph to demonstrate its detection ability when it comes in contact with a Video Camera. It alerts you to the fact that you are under covert video surveillance quickly and noiselessly, the instant a video camera has been activated in your presence.
Palm-Sized Video Camera Detector
Silent & Discreet Vibration Alert
State-of-the-art Detection Circuitry
Field Coil Antenna (extends operating range)
The VCD-100 comes complete with a field coil antenna, increasing its operation.
Along with using the VCD-100 comes the secure knowledge that your privacy can not be compromised by your adversaries.
The entire system fits neatly into an executive-type attachÃ© case. The unit itself is palm-sized and can be easily carried in a coat pocket.
The VCD-100 Video Camera Detector protects you against the modern-day threat to security posed by the proliferation of covert video cameras.
$18,000 Signal Interceptor, Detector, & Analyzer Model ECM SA-1300 The ECMS A-1300 is an electronic Countermeasure Signal Analyzer, designed to detect virtually all clandestine surveillance transmitters (bugs).
The ECMS A-1300 is built with:
a customized spectrum analyzer
a bug detection processor
These 2 segments are used to discover and identify anti-privacy bugs and store all encountered signals in memory for later review, comparison, and reporting.
The ECMS A-1300 is essentially a professional counter surveillance system that is used to counter privacy invasion technology. It can be manually operated, or left in its automatic function mode for unmanned operation over extended periods of time.
How it works:
The system searches a location for hidden listening devices (bugs and other transmitters). It then locks onto their frequencies, performing 6 tests to confirm the presence of a bug, and allows the user to hear what the eavesdropper is listening to (or tape recording.) Built-in demodulators and a large screen LCD display are built into the system for ease of use when examining the search results.
Defines distance and location of bugs (as well as suspicious transmissions)
Detection of covert wireless TV signals as well as digital signals
Bug Detection in real time
Evidence can be stored for later retrieval analysis
Prints out Sweep reports
Extended frequency range from 100KHz to 3GHz
Built in Printer (Prints stored data and reports)
Built in Digital decoder circuitry
Portable & Fully automatic PC-based detection
Weight with batteries 18 lbs
Easy to read 14" LCD Spectrum & Display
$40,000 Hand Held Sweep Detector Model VL-45 The VL 45 is a pocket sized bug detector. It is designed to alert you of the presence of eavesdropping equipment such as Electronic Bugs that capture your voice conversations in rooms and outdoors.
People who invade your business or personal life generally conduct electronic surveillance using Electronic Bugging Equipment. If you have important information that you wish to remain yours, (not for everyone to know), then protect your privacy. In order to secure your conversations, you will need to test the places you generally speak in.
The VL 45 is used by personal and corporate people who want to secure their sensitive information. It was originally designed for business executives to counter information theft by protecting company secrets:
-New product developments
In today's competitive business environment, "bugging" is an unfortunate but very real threat. If you are conducting business, or any other endeavor where discretion is of utmost importance, you need to ask yourself the following questions: Are you bugged? Is a rival stealing your ideas and discovering your secrets? How would you know?
The VL-45 will allow you to locate and verify radio transmitter bugs. Its receiver is supersensitive, enabling you to find even low power transmitter bugs. With the VL-45, you will have confidence of mind and assurance of privacy no matter where you go.
$1,200 Non Linear Junction Detector Model VL-6500 The VL-6500 was built to detect the presence of live & non-working eavesdropping devices and explosive devices hidden inside wood, plastic, brick, walls, floors, even in luggage & under clothing. Specifically, the VL-6500 was designed to detect electronic explosive detonators, bugs, microphones, digital recorders, spy cameras, tape recorders, and video recorders.
How it works: The VL-6500 sends a signal onto a wall, ceiling, etc. and then measures the harmonic frequency level that â€œbounces backâ€ from the surface. The information from the analysis can advise the user to recognize what to look for when searching for surreptitious electronic devices.
Theory of operation: The VL-6500 operates on a method of discriminative search patterns. The VL-6500 can receive different harmonics â€œbounce backsâ€ from the connection points between 2 or more semiconductors. These connection points form a non linear junctions (at their meeting points.) The VL-6500 can also receive natural meeting points (junctions) found when natural metals connect or meet.
Therefore, a rusty nail touching a piece of metal in a wall or an explosives detonator in a suitcase may both reflect harmonics signatures, however, the VL-6500 will provide different measurements. The measurement results when detecting an electronic device such as the detonator will provide a different measurement than the detection of a nail.
Thus, a clear distinction can be made between those two junctions.
Who uses the VL-6500? People serious about countermeasure security: Law enforcement, corporate and professional people, and the diplomatic community.
The VL-6500 also serves as a tool used by SITG Sweep Teams. SITG clients also use the VL-6500 for its precision technology in detecting the smallest traces of electronics.
The VL-6500 will operate in areas often difficult to access. Its ability to detect sound signals (harmonics) in controlled zones will not be hampered by presence of mobile phones, PC's, telephones etc.. Harmonics recognition is verified through headphones.
$12,000 Discreet & Silent Body Worn Bug Alert Model EJ-10M The EJ-10M Pocket Sized Vibrating Bug Alert is a state-of-the-art broadband receiver which scans radio waves for any sign of covert radio transmitter activity. Upon detection, it alerts the user, thereby insuring that private conversations remain private.
Small in size and discreet in operation, the EJ-10M vibrates when an info-thief has activated an audio transmitter. Alerted that a conversation or meeting is being compromised, the user has an option to withhold information, search for the transmitting device, and/or feed misinformation to the eavesdropper.
The EJ-10M operates by sensing even the faintest sources of radio transmissions and giving off an alert via a discreet vibration alarm. This alarm notifies the user of active bugs as well as concealed, body worn transmitters. The sensitivity thumbwheel can tune the unit to screen out spurious background radio activity, while the reception circuits remain active in order to give off warnings of possible threats.
Professionals all over the world trust the EJ-10M to be their silent guardian, continuously monitoring their surroundings for suspicious activity, while indicating when it's safe to speak freely. The EJ-10M Bug Alert System includes the TT-104 test transmitter to simulate radio transmissions and help the user become accustomed to surveillance detection.
$2,000 Multi-Mode Bug & Wiretap Detection System Model ECM-SA 1600 The ECM-SA 1600 is a multi-mode operating Counter surveillance System.
It was designed for detecting and locating "friendly" and "enemy" radio frequency transmission equipment. Enemy systems to counter industrial espionage and information theft, and Friendly systems for communication industry repair (natural and artificial information leaks).
The ECM-SA 1600 is built into a control module, with converter kits to separate the functioning modes. The ECM-SA 1600 has inter-changing modes for multi-feature counter surveillance testing. These multi-test modes work automatically through the use of a converter. The following modes enable quick, accurate detection, geared to finding privacy invading surveillance equipment:
high radio frequency detector - frequency meter
phone line analyzer
infrared radiation detector
low radio frequency magnetic fields detector
The ECM-SA 1600 also has alert features to operate while conducting Counter surveillance testing:
wire acoustic receiver
Test results are displayed on the graphical LCD, and an acoustic control can be heard through either head phones or a built-in speaker. The ECM-SA 1600 operates through the use of a 16-digit membrane keyboard.
The ECM-SA 1600 can also work to receive low frequency signals in the oscillo-graph mode or the spectrum analyzer mode with variation indications to yield test results.
$6,000 PRO TSCM Bug Detection System Model VL-8000 The VL-8000 is designed for the detection of covert listening devices (such as electronic "bugs" that transmit private conversations). It will search a location for hidden listening devices, lock onto their frequencies, and allow you to hear the actual transmissions.
The VL-8000 is the only handheld, portable system that will detect covert listening devices, pinpoint their transmissions, and store their frequencies in memory. The VL 8000 is a high level counter-surveillance receiver. It operates by measuring signal strength and detects virtually all clandestine transmitters through its proprietary built-in decoder circuitry.
-Built-in spectrum analyzer
-Can operate automatically and store signals in memory for later review
-Built-in demodulators (for fast test results)
-Removable Programming Module (RPM - for fast test results)
-law enforcement agents
-people in search of privacy
-ECM Sweep Experts
When protecting sensitive information is critical to oneâ€™s success, the VL 8000 provides the most automatic, reliable and cost effective solution on the market.
$10,000 Counter Surveillance Transmission Receiver Model A-12 The A-12 is a professional Counter-Surveillance Receiver. It can receive clandestine transmissions of any kind within 2 MHz up to 4.2 GHz (with optional frequency extenders.)
The A-12 is used to analyze radio frequency traffic in order to verify radio transmission of electronic bugs and monitoring equipment.
The visual display panel shows a span in one spectral display and allows the operator to tune automatically to any selected RF signal observed. An audio tone also enables one to hear the transmission, giving visual and audio abilities to verify signals.
An audio switch allows instant monitoring of transmissions after they have been observed on the display. The A-12's unique narrow band and wide band performance makes it the best professional choice for electronic countermeasures.
Small size and light weight makes it ideal for portable field use. Four-way power supply accepts 110 or 220 VAC, 12 VDC or internal rechargeable batteries. The A-12 comes with a log periodic antenna and can have additional antennas connected to modify the frequency reception range.
$5,000 Contraband Detection / EOD Our systems sniff out explosives, detect weapons, jam remote controlled detonators, and find contraband on people, inside the human body, in airport luggage, through walls, and within vehicles. Our detection and test systems are efficient and portable, enabling the user to gain quick results, whether used in a fixed location, or out in the field.
[color=black] SITG Portable X-Ray System The SITG Portable X-Ray System is an advanced, lightweight x-ray system used for mobile examinations in order to verify weapons or explosive devices.
It is recognized by police, Explosive Ordinance Disposal EOD personnel, and security authorities as a necessity for 'portable detection' of explosive devices.
The system operates on either main voltage, or from its own internal rechargeable nickel cadmium battery. When used with Polaroid Radiographic film cassettes and processors, detailed radiographs can be produced within minutes of arriving on the scene.
The complete system is contained in one case and can be operated by one technician. The SITG Portable X-Ray System is safe, following normal safety precautions, and easily operated.
The system is also useful for corporate and diplomatic security applications and for VIP protection. Incoming mail, parcels, briefcases, etc. can be radiographed to ascertain the contents of such articles and identify contraband such as drugs, weapons, explosives, etc.
$3,000 Walk Through Weapons Detector Model DP-3 The special design of the DP-3 provides uniform, head-to-toe detection without a floor ramp. This maximum-security walk-through weapons/metal detector will search out the full range of restricted weapons, including the Glock 17 pistol and ferrous (iron)/non-ferrous small-caliber weapons.
It meets and exceeds the National Institute of Law Enforcement and Criminal Justice and Federal Aviation Administration standards.
The DP-3 was designed for easy set up and contains self-balancing antenna sensors. Simplified controls assure easy operation and greatly expand the unit's capability.
The DP-3 can be utilized in every conceivable security situation required of metal/weapons walk-through detectors, from maximum high-level prison security to lower level high-volume flow.
The DP-3 is designed to withstand the rigors of frequent moving; yet it is light enough for easy transport. Operator adjustments are minimal. False alarms from outside sources are virtually eliminated, and the sensitivity of the DP-3 electronic circuitry can be set at the level you need to meet your security demands.
$25,000 Body X-Ray Scanning System Model XR-3000 Body X-Ray Scanning System Model XR-3000
The Terrorist Trap XR-3000 full-body scanner captures and images smuggled objects made of both organic and non-organic materials, whether hidden within clothing, secured in natural cavities of the human body, or ingested. Medically safe, the radiographic scanner will picture guns, both metal and non-metal, knives, plastic and electronic explosives, precious stones and metals. It will store images for evaluation, and files may be forwarded to a supervisor or control center. Also safe for personnel, radiation output is less than that which is received during a one hour airplane flight.
Standard X-Ray Technology and its Limitations:
Electromagnetic hand-held or walk-through devices currently do not detect plastic explosives, non-metal weapons, hazardous materials, or narcotics. These systems are now in use worldwide at airports, border and customs inspection stations, prisons, court houses, embassies, military bases, precious stone mines and processing centers, financial institutions, and even in elite office buildings. However, they do not allow for personal examination, which is often time consuming, inconclusive and impractical.
The XR-3000 Advanced Technology:
The XR-3000 works upon irradiation of passengers with a very narrow flat scanning X-ray beam. Using a highly sensitive multi-element, the X-ray Scanning System is able to yield very clear images of objects on or within the human body. The system provides a visual image on the screen (PC) within 10 seconds, enabling the effective in examining of many people within a high-speed time frame. A second walk through will not be necessary as the system can file all images for further analysis.
Distribution of XR-3000 Scanning Technology is currently directed for use at Airports, Embassies, Nuclear power centers, Prisons, Military installations, Gold / Diamond / Platinum mines, government buildings, etc.
$50,000 Tracking / Recovery Our Tracking Systems help find people who lose their way, people trying to conceal themselves from others, and kidnap victims. Our Tracking Systems offer communication and information exchange abilities and services. Businesses, Governments, and even families can manage their employees and entrusted people with cars and vehicles, giving them live geographic and travel information technology, or just watch them using our Spy Camâ„¢ Video Transmission & Tracking Technology.
SITG Video Systems watch everything that happens. Covert Video does not allow subjects to know they are under surveillance. Overt Video does. To see a video image is to see evidence. To store a video image is to document proof that an event did happen. To analyze video is to verify the facts of real life situations. Tactical GPS System for Surveillance Model TacTrack-1 The TacTrack-1 is an interactive tracking device that helps monitor vehicle location and vehicle functions.
Placed in a vehicle, the TacTrack-1 uses detail-oriented sensors to gather information such as speed and direction of a moving vehicle. The system then correlates this data and combines location data provided by Global Position Satellites, and determination of the target's location is then indicated on a PC (desktop or laptop). You can track vehicles on streets, roads, highways...globally.
The TacTrack-1 enables remote control of numerous vehicle operations right from your PC or laptop. High resolution, full color maps can be viewed on the software and hardware modules you need, and upgrade as needed.
Our unique modular approach allows you to customize your own system so that you never have to pay for functions you don't use.
Receiving printed reports and data analysis is easy, as well as generating information to help you reach your evidence (Police) / productivity (Business) goals.
TacTrack-1 usage scenarios:
-Your factory only received half of the shipment. Did your driver take the other half to resell?
Take immediate action. Make timely informed decisions. Keep your cool in a crisis with the TacTrack-1. Now you really can do five things at once, but this time by remote control and you never have to leave your computer station.
There's a head-on collision on the expressway. How soon can we get an ambulance to the scene?
Emergency Search and Rescue using the TacTrack-1 can save lives. When an accident or vital situation requires immediate response, the TacTrack-1 can pinpoint the location within 10 meters accuracy using simple keyboard commands.
Why did it take your driver 3 hours to make a routine pickup?
With the TacTrack-1 you can be more strategic in business. You can easily save time and money by monitoring employees and driver times and locations.
For Law Enforcement, the TacTrack-1 plays an important role:
Locate stolen goods.
Recover stolen vehicles.
Engage security systems.
Rescue children from abduction.
Government and Law Enforcement agencies have long realized the benefits of global satellite vehicle tracking systems. Now SITG brings you a user-friendly device so that you can have that same pinpoint accuracy, ideal for business or personal use. And you don't have to be a secret agent- all you need is your laptop, a modem, and the TacTrack-1.
$30,000 Fleet Vehicle Tracking System Model FVTS With the FVTS, know exactly how your vehicle is being utilized to be a better manager and you don't have to leave your computer. Prevent cargo theft, get your drivers to stay en route, save fuel - all of this and much more made simple by remote control.
At SITG's laboratories, we have the technology to bring you interactive solutions on a worldwide scale - to cure your fleet management headaches, at the same time increasing your profits.
With the use of sophisticated Satellite Global Tracking, developed by the U.S. Department of Defense, you can pinpoint the position of a vehicle anywhere on earth within 10 meters accuracy.
The remote unit in the vehicle itself picks up the satellite signals.
The signals are sent right to your computer screen, via wireless communication, where numerous remote control functions can be performed all at once.
You have the power to activate alarms, lock/unlock electrical doors, detect unauthorized entry and unscheduled cargo movement. Another advantage - sensors can be attached to the vehicle to monitor temperature, engine performance, and security systems.
All of the accumulated data from the FVTS does not have to be lost.
Our system also provides you with storage on a removable memory card. The data on the card can be easily removed and downloaded through the serial port of your computer. The main benefit of the memory card is that it gives you a cost effective way to generate vehicle usage reports without paying monthly fees for using wireless communications to download data. Of course, the option is yours.
The FVTS is compatible with cellular phones, radio, and modem for easy transmission of essential information. The FVTS literally revolutionizes a wide range of activities by utilizing today's technology so that businesses and consumers can increase productivity and profit. Such technical innovation has never before been so simple.
$45,000 â€“ includes first year of fleet monitoring
$2,000 â€“ yearly renewal fee for fleet monitoring service Body Worn Kidnap Recovery System Model AJ-1800 The AJ-1800 is a Personal Kidnap Recovery Tracking System (PKR). It consists of a transmitter, receiver, and aerial receiver antenna. The AJ-1800 enables you to track and locate any person or object equipped with an activated location beacon transmitter.
The PKR Transmitter is lightweight and durable and will provide 180 days of continued use. It can be activated and de-activated by simply pushing a switch.
The AJ-1800 was originally built to find people. There are 2 types of transmitters used to locate people. The body worn transmitter (able to be sewn into clothing) and the vehicle transmitter (able to be placed on the exterior of a vehicle).
The AJ-1800 is also used for conducting surveillance. Following persons of interest, or those suspected of a crime, the AJ-1800 can be used in a car, helicopter, in order to track vehicles or people on foot. Location and recovery using the AJ-1800 assists in responding to people in trouble, or locating a stolen vehicle.
When conducting this method of tracking, a magnet-mount roof-top antenna is used in conjunction with a hand-held directional antenna. When using the PKR by car for surveillance and location of stolen property, the roof-mount Omni-directional antenna provides long range and ease of use.
The receiver will provide the user with.
$1,500 Night Vision To see in the dark under the cover of night, SITG offers Night Vision Optical Equipment. Used for surveillance, perimeter security, emergency rescue and search operations, boating, camping, and fun. SITG offers an unprecedented range of night vision and thermal imaging devices, so you can "see" or track images and moving targets in total darkness, through rain, clouds, fog, smoke, and even behind natural or man-made barriers. Night Vision Goggles Model Predatorâ„¢ VII-B Predatorâ„¢ VII-B Cyclops Viewer (Gen 2 & 3)
Lightweight - 680 grams
Provides Nitrogen Purging in Field
243mm Field of View
High-light Cutoff Feature
Second Generation Technology
Virtually Maintenance Free
No Infrared Viewer Required
The Predator VII-B Gen II Night Vision Goggles are now available with Advanced 2nd and 3rd Generation image tubes, the versatile Predator VII-B goggles provide the user with comfortable hands-free use.
Advanced 2nd and 3rd Generation image tubes deliver improved system resolution and nearly doubles the luminous gain. The Predator VII-B system provides triple the photo-sensitivity and double the luminous gain of 1st Generation technology extending operation into the near infrared region.
Predator VII-B goggles feature a quick-release lever that permits one-hand mounting, an IR-on indicator, automatic high-light cutoff and low-voltage indicator.
The Predator VII-B comes with a flexible carrying case with shoulder strap and belt mounting clips. An optional rugged shipping/storage case is available.
Photo response is nearly infrared, and it can be operated at starlight levels and below, at 80% performance in accordance with U.S. military specifications.
$3,000 Night Vision Pocket scope / Riflescope Predatorâ„¢ 150 The Predator-150 Night Vision Pocket scope / Riflescope utilizes advanced 2nd Generation technology for high resolutions images, even in virtually dark environments. Better than active viewers, the Predator 150 lets you see in the dark without the need for an infrared illuminator.
This passive night vision device amplifies residual starlight and moonlight 12,000-15,000 times to provide near daylight visual capabilities at night. Lightweight and rugged, the Predator-150 easily attaches to most weapons with an optional rifle mount. External adjustments for windage and elevation provide precise reticule alignment while an internal pattern of marking in the visual field provides a clear aiming point.
The Predator-150 also couples with most photographic equipment, including long-range zoom lenses, with optional camera adapters. The Predator-150 System is designed to withstand extreme handling under rough field conditions. It includes the Predator-150, 3x magnification lens, rugged carrying case and batteries.