MSRP III

We Will Bury You - In Caesar We Trust
It is currently Sun Apr 20, 2014 10:52 pm

All times are UTC - 7 hours [ DST ]




Forum locked This topic is locked, you cannot edit posts or make further replies.  [ 12 posts ] 
Author Message
PostPosted: Thu Jan 31, 2008 9:15 am 
Offline
Cives
Cives
User avatar

Joined: Thu Jan 24, 2008 11:02 am
Posts: 316
Now open For Business!!!


Image
Image

Welcome to Security Intelligence Technology Group. We provide reliable, quality security, surveillance and counter-surveillance tools, consulting and training to law enforcement & intelligence agencies, corporate professionals and private individuals responsible for protecting premises, assets, information, executives and family nationwide.

We are referred to in the industry as the "single source" for the widest range of security and surveillance equipment, consulting & training. Security Intelligence Technology Group teams consist of seasoned professionals with decades of expertise. This allows Security Intelligence Technology Group to provide industry leading security products, consulting & training aiding their clients in recognizing potential risks, providing informed security solutions that combat and prevent crime and threats to privacy, safety and security.




SITG Security Specialists

1 Plant manager
4 Foremen
8 Electrical Engineers
6 Computer aided design operators
30 electrical technicians (for assembly of products)
2 Quality control engineers
2 Shipping/receiving clerks
2 Truck drivers with Class A CDL license (for transporting SITG custom armored vehicle to clients)
25 Security installation experts
10 Automotive specialists proficient in metal fabrication and vehicle assembly



SITG Fleet

Image

10 Utility vans for installation teams
2 Semi Trucks with enclosed vehicle hauler trailers
3 5 ton flatbed work trucks to deliver materials to job sites




SITG Services

We are the worldwide leader in security, privacy, and protection support services.

Serving clients from governments, international corporations, high profile people, and private individuals, SITG’s in-depth expertise and seasoned security teams offer services ranging from Bug and Wire-tap Detection, GPS Tracking, and Truth Verification services, as well as world-wide consulting services, custom manufacturing, and intensive hands-on training. Here is a list of services that SITG provides:




Site Surveys and Risk Assessment

Do you have an overall security plan? Is it effective? Is it current? Our technical staff reviews your physical facilities, existing security measures, methods of communications, storage, etc. This serves to warn for potential threats and then to advise solutions for protecting premises, information, assets, trade secrets, even lives. Recommendations will include an overall strategy as well as a suggested list of hi-tech tools for protection, for privacy, for security, and for investigating internal problems and possible criminal activities.
Site surveys for small organizations may be accomplished in a matter of hours. Site surveys for a government wishing to acquire a GSM Cellular Monitoring System, for example, are typically 5 days and would include interviews with key technical representatives, outline of requirements, review of questionnaires, physical survey, environmental & topographical surveys, basic measurements, data collection, review of findings with project manager, etc.
Free consultation.




Feasibility Studies

Feasibility studies, which frequently follow site surveys, are required when your organization understands its deficiencies, and needs to know whether or not reliable solutions can be implemented

(1) Safely
(2) Productively
(3) Financially
(4) Legally
(5) In a timely manner.

The following are simple examples of such studies:

--A municipal building wants to utilize cell phone jammers. How will they affect pagers, pacemakers, other existing communications and RF transmissions? Are there unseen liabilities? How many units will be needed to blanket the specified areas? What will it cost?

--An embassy, military base or prison needs bomb detection and jamming equipment. What will be the ramifications on walkie talkies and internal communication lines? Will internal phone systems and computerized gates still function when the jammers are activated?

--Factory management suspects drug dealing or plant sabotage. Can they install covert video cameras in locker rooms where suspicious activity has been noted?

Free consultation




Competitive Intelligence Consulting

Try on a new suit and stand in front of a mirror. Does it need alterations? Are the colors and designs suitable for your lifestyle? What season is the fabric intended for? Is it durable? Dry clean or wash? Is it in your price range?

There are many different manufacturers of security and surveillance equipment. There are many different levels of proficiency, function, effectiveness, reliability, and cost. Most purchasers cannot possibly research the entire marketplace. We know what’s out there, and we pose the questions you should be asking.

-- Does the product meet your conditions and requirements?
-- Does it match your level of threat
-- Is the equipment "overkill" for your needs?
-- Is it compatible with your existing equipment and security measures?
-- Is it compatible with local services? phone systems, electrical wiring? laws?
-- Is the system expandable for future growth?
-- Does a product offer the same benefits but at double the cost?
-- Is the equipment user friendly or does it demand a technical staff to unravel its mysteries?
-- Will atmospheric conditions affect function?
-- Can it be remotely activated?
-- Can it be used covertly without alerting others?
-- Will the product work as per its specifications?

Generally, as a service to our agents and distributors we offer analyses of products in the marketplace. Depending upon circumstances, this service is also available to government agencies, corporate security officers and end users.

Free consultation .




Bug & Wire Tap Sweep Services

Our tech teams travel to your offices, warehouse, home, boat and wherever needed to protect your privacy. They might even recommend you do not remove an active, unauthorized listening device in order to feed false information and / or track the culprit.

(1) security evaluation of telephone instruments and lines (2) physical search (3) complete report of all illegal bugs and wiretaps, together with areas of potential and actual exposure (4) recommendations for ongoing security measures.

ALSO, our experts offer workshop seminars for those who wish to do their own sweeps, or who wish to become Sweeps Service Providers. These clients will learn the necessary business skills, technical knowledge and about the equipment they will need to protect one’s trade secrets and privacy.

Prices determined on an individual basis based on customers need.




Lie Detection Services

Our VSA® Lie Detection Laboratories provide non-intrusive intelligence gathering systems that measure sub audible micro-tremors in the vocal chords and digitally analyze stress. No wires to attach, no graphs to chart. Interrogations can be accomplished with or without subject’s knowledge, in person, by phone, in real time and/or archived for analysis at a later time.

--LED digital readouts as well as printouts --Instantaneous results --Portable

We provide the equipment, video tape training for interrogation techniques, hidden cameras to catch and analyze body language, and techniques for those who wish to operate their own lie detection investigations.

$5,000 – includes all equipment and training.




GPS Tracking and Fleet Management Services

In the year 2000, the market for Global Positioning Systems (GPS) reached an all-time high of $9 billion, and has since grown in the last few years in leaps and bound. The functions of these systems not only locate vehicles, planes, boats and trains, but will also provide security alerts and protections against mismanagement, breakdowns, delays, and various emergencies.. In other words, we can help you prevent disasters, keep schedules, intercept or reroute at a moments notice, monitor employee productivity, help a company stay ahead of the competition, and insure against the hidden threats to one’s business and livelihood.

Is the truck overheating? Running out of gas in the middle of nowhere? Leaving its intended route? Is someone stealing the cargo? Is the driver speeding?

We can even advise where to find the nearest hospital or all night diner.

Prices determined on an individual basis based on customer need.




GSM Monitoring Seminars

Restricted to authorized government and law enforcement agents, learn all about interception methodologies for capturing cellular telephone conversations on all types of cellular networks including GSM, CDMA, TDMA, and analog systems (AMPS).

This 2-day intensive study session provides an opportunity to evaluate the security marketplace and its tools of the trade. Learn how to determine the size and potential of the market in your specific region or country without hiring expensive consultants, without needing to making substantial commitments of capital. Participants also receive product information, brochures, videos, DC’s, industry books, sales techniques, and marketing materials. See more under "Business Opportunities."

$1,200 Seminar Fee.




Product Demonstrations & Seminars for Personal & Business Security

What new technology and hi-tech security and surveillance equipment and techniques should you know about to protect your assets and lifestyle, your business, executives, and family? Choose hands-on workshops which cover a broad spectrum of security, surveillance and countermeasure equipment, or tailor sessions to your specific needs. You will learn about technology you never knew existed when you examine measures for:


-Combating terrorist and criminal activities
-Wiretap & bug alert & detection
-Privacy protection and secure communication, including scramblers
-Radio Communications
-Contraband detection
-VSA® lie detection
-Investigation tools including audio/video surveillance
-Home, office & perimeter protection
-Executive protection
-Tracking & locating
-Explosives and metal detection

Sessions generally run from ½ day to 3 days, to be selected as applicable.

$600 - ½ day session
$1,200 – full day session
$2,400 – 2 day session
$3,000 – 3 day session




Security Problem Solving Clinic

Do you worry your partner may be conspiring against you? Is the competition stealing your vendor list or clients? Do you suspect an employee of fraudulent activities? Is someone listening into your personal conversations? Are your secrets safe? Are your assets in danger?

Bring us your suspicions and we will help you decide upon a course of action, how to ascertain the truth, whether or not do-it-yourself investigating is an option ... in essence how to best and cost-effectively solve your problems.

$500 Consultation fee.




SITG Engineering Design Services

Our team has nearly half a century experience in providing engineering and design solutions from prototype to completion. We can provide integrated systems developed from your existing structures, and customize your orders for your organizations’ unique requirements.

Our in-house engineering staff also offers reverse engineering as well as short / long run manufacturing. Our quick turn-around experience, as well as high quality production, enables us to offer you superior technology outsourcing at a timely production rate.
If you require re-evolution of your system or product, we can show you what other designs can be configured to yield a better, efficient system.

Price determined on an individual basis based on customers need.

_________________
Image
Captain Of The:
Image
Bio/Bank


Last edited by Joey Mags on Tue Feb 05, 2008 10:54 pm, edited 1 time in total.

Top
 Profile  
 
PostPosted: Thu Jan 31, 2008 9:29 am 
Offline
Cives
Cives
User avatar

Joined: Thu Jan 24, 2008 11:02 am
Posts: 316
SITG Products

Security Intelligence Technology Group is a leading manufacturer and acknowledged industry authority in the security and surveillance industry. With forty years experience, Security Intelligence Technology Group has consistently developed solutions which have become "standards" of the surveillance, counter-surveillance and personal protection industries.

Security Intelligence Technology Group's research, design and engineering teams are dedicated to delivering innovative, trusted solutions. Serving everyone from leaders of nations to individuals who find themselves walking down a dark street, Security Intelligence Technology Group is constantly researching, designing, and producing solutions that assure the protection and security of our clients.




Anti Terrorism & Homeland Security

Reacting to emergency situations requires people to be prepared in advance. That is why we offer safety equipment, helping to secure against Nuclear, Biological, and Chemical warfare agents, as well as terrorist and criminal weaponry.



Image
Explosive Vapor Detector Model CCX 1337

The CCX 1337 is a hand-held explosive vapor detector capable of detecting trace amounts of explosives. The CCX 1337 is used to screen people, luggage, cargo, vehicles, and buildings.

When testing for the presence of explosive material, the CCX 1337 gives real time analysis. When conducting air sampling (for very small amounts of explosive materials), the nominal response time (in real time) is 2 seconds.

The CCX 1337 is lightweight and extremely sensitive. It can detect commercial and military explosives based on:
 TNT
 NG
 PETN
 RDX
 Explosives with EGDN, DMNB markers.
The CCX 1337 does not require any time to warm up. To prevent suspects or terrorists from panicking during a test for explosives, an earphone may be used to mute the audible speaker alarm.
$800




Image
Weapons Metal Detector Model LBD-107

The LBD-107 weapons detector is used to detects all metals, Ferrous and Non-Ferrous. It senses metals in a 360° direction from the point upon scanning a person or an object.

Responses are quick and clear. It will function for 100+ hours before battery replacement is required.

The LBD-107 will not effect cardiac pacemakers.

$400




Image
Gas Mask MK II

The Gas Mask MK II is a basic mask used by Law Enforcement, Civil Defense, and Riot Control personnel. It comes with an NBC filter to protect the user against Nuclear, Biological, and Chemical agents.

The MK II is intended for use during an evacuation of a contaminated area. The MK II filters air for respiration, and also keeps out irritants in order to protect the face, eyes, nose, and mouth.

The MK II gives a clear field of vision, enabling the user to walk or move around and see clearly.

$500




Image
Gas Mask MK III

The MK III is a comfortable, full face, gas mask with a wide view panorama face shield. It is used to provide clean, breathable air in the event that air becomes contaminated. That means that air with NBC (Nuclear, Biological, or Chemical) particles will basically be filtered, enabling fresh air to be available for intake.

Although designed for emergency responders, the MK III is the #1 choice for civilians, executives, and pedestrians who want a high quality Gas Mask in emergency situations.

Features and Benefits

• Halo-Butyl Rubber Construction
• Two Filter Connections
• 5 Point Harness
• Low Resistance while Breathing
• Efficient Communication Speech Diaphragm for talking
• Excellent Visibility, thanks to the MK III's wide view polycarbonate face shield
• A connector mounting on mask's side enables easy attachments to hoses (for filters or other connection hoses). The position of the filter can reduce neck strain.
• An internal silicone surface covering gives the mask a smooth feel, and helps reduce fogging

Protect yourself against chemical and biological agents with the MK Series gas masks.

SITG masks utilize NBC filters to protect you from chemical and biological warfare agents, as well as radioactive dust and highly toxic particles, according to EN 141, i.e. organic gases and vapors, inorganic gases and vapors and inorganic acids.

$600




Image
Gas Mask MK IV

The Gas Mask MK IV was developed to protect scientists and industrial workers, as well as civilians, from dangerous gases, vapors and particles. Working with an NBC filter, the MK IV will protect the user against Nuclear, Biological, and Chemical agents (contaminated dust particles).

The MK IV is intended for use in lab environments, warehouses, and industrial job sites that expose the user to contaminated air particles. In addition, the MK IV is also used by civilians and emergency responders in response to the release in the event that poisonous or toxic gases are released, such as a chemical weapons attack.

The MK IV filters air for respiration, and also keeps out irritants in order to protect the face, eyes, nose, and mouth.

The MK III is a comfortable, full face, gas mask with a wide view panorama face shield. It is used to provide clean, breathable air in the event that air becomes contaminated. That means that air with NBC (Nuclear, Biological, or Chemical) particles will basically be filtered, enabling fresh air to be available for intake.

Features and Benefits

• Panorama face shield for wide visibility
• Full face mask body
• Low Resistance while Breathing
• Excellent Visibility, thanks to the MK III's wide view polycarbonate face shield

Protect yourself against chemical and biological agents with the MK Series gas masks.

SITG masks utilize NBC filters to protect you from chemical and biological warfare agents, as well as radioactive dust and highly toxic particles, according to EN 141, i.e. organic gases and vapors, inorganic gases and vapors and inorganic acids.

$700




Image
Safety Suit for Defense Against Chemical Attacks

The Safety Suite is designed to protect you from many known chemical agents and industrial gasses.

The Safety Suite is used by NATO forces, domestic military, and civilian response agencies. The Safety Suit keeps people safe during an emergency such as an attack or release of toxic chemical agents.

TYVEK or transparent multi-layer plastic sheets are used in the production of the Safety Suit (both protect the user equally). Contour hoods are designed to be used with virtually all models of breathing masks.

The suits are simple to fasten, lightweight and permit freedom of movement. Shrink-wrapped Safety Suits generally have a shelf life of 10 years if packaging is not opened.

$1,500




Image
Radar Imaging Search System SSR-2000

The SSR-2000 is a visual detection system, enabling the user to find explosives, weapons, and drugs, hidden inside walls, floors, cabinets, and other hard to access locations.

The SSR-2000 enables non-destructive security testing to be conducted in unexpected locations with state-of-the-art microwave technology.

With the SSR-2000, the user can move the imaging probe across surfaces such as floors or concrete walls up to 10" thick. Imagery will then be displayed on a laptop or pc, allowing you to identify concealed contraband.

Who uses the SSR-2000?
Explosive Ordnance Disposal EOD applications enable the SSR-2000 to assist police responders, Bomb Disposal units, Bomb Prevention operations, as well as Weapons Inspectors during explosive detection examinations.

$10,000




Image
Package & Letter bomb Detector P&LBD-400

The P&LBD-400 is a Letter-bomb Detector built into a portable briefcase. The P&LBD-400 electronically screens mail for the presence of explosive devices, discreetly and efficiently.

Features:

Audible Alarm alerts you to the presence of an explosive device
Includes advanced sensitivity & battery test indicator
Built into a portable briefcase
User Friendly Operation with No Previous Technical Training
Screens Mail Electronically
Letters and parcels are passed on top of a gate and analyzed for the presence of explosive materials, electrical triggering devices and other ferrous elements used in the construction of a letter bomb.

When the machine's magnetic field is disturbed by the presence of a threatening device, the P&LBD-400 alerts you with an alarm (a discreet tone alarm) which produces a shrill noise.

The P&LBD-400 comes with a fully adjustable sensitivity control in order to calibrate the unit. The P&LBD-400 package and letter bomb detector is easy to use and can be operated by an individual without previous technical training.

Housed in an attractive attaché case for easy concealment and portability, the sophisticated instrument is ideal for use by corporate and government officials.

$5,000




Audio Surveillance, Wireless Microphones, & Recording Systems

SITG Audio Surveillance equipment (found below) can listen, monitor, record, and archive important information. Record conversations for legal evidence gathering, listen to real time conversations in order to help people in discussion forums, take part in and stimulate conversations when you are unable to be physically among them.

SITG Audio Surveillance can also help evaluate threats and safety levels of people in many situations.




Image
WMTX-4400S Super Ghost Audio Transmitter

The WMTX-4400/S is an audio transmitter that broadcasts powerful, clear sound to receivers near by and far away. It is special because it is the smallest and most powerful ENG transmitter available in the world.

Special Features:

Portable and Lightweight
Compatible with Full Range of Receivers
Miniature Size for Discretion
Long Range (Omni-Directional Antenna Technology)
Multi-Channel Capability
Greater Distance
More Power Output
The WMTX-4400/S is unlike any transmitter available. It is 1/8th the size of Cigarette Pack body wire transmitters, so it is very, very small & easy to handle. It employs state-of-the-art surface-mount technology, making it the smallest & best equipped broadcast transmitter in use.

$2,400




Image
The Phantom Voice Logging System

What it is:
The Phantom is a Professional Voice Logging System. It is designed and used for Documenting and Archiving communications, analysis, and retrieval of phone conversations.

Who uses it:
Its multi-featured architecture prepares comprehensive, secure solutions for Commercial Business Archiving & Retrieval, Law Enforcement Surveillance, Civil & Municipal Agencies, Financial Institutions (banks, money management houses, trading floors,) and Air Traffic Controller NC's (nerve centers.)

Business Information Logging
For businesses, corporations, and commercial industries, conversations are recorded and stored, enabling quick, secure, retrieval and analysis.

$2,800




Image
Professional Communications Receiver / Logger Model RXP-1000

The 1000 Channel Receiver is an advanced Communications Receiver. Built into a rugged briefcase, the RXP-1000 can capture and digitally record audio transmissions on over 100,000 frequencies.

Its Sony Digital Recording Module enables the storage on disc of communication conversations of voice and data in digital format. It has a programmable frequency range, operating from .500 KHz to 2.039 GHz.

Specialty Applications

The RXP-1000 is ideal for monitoring multiple transmitters. It allows you to both receive and digitally record transmissions from body wires, transmitters, cordless phones, RF intercoms, and is compatible with all narrow and wide band VHF-UHF and AM / FM analog transmitters.

It is an ideal receiver / recording system for Police and Multi-Task force operations.

Its programmable memory has a 1000 channel capacity.
Internal rechargeable battery operates for up to 4 hours. Getting access to a desired frequency or pre-programmed channel is easily accomplished through the use of either the digital keyboard or the tuning control knob.

The on-board digital mini disc recorder has both standard and slow speed modes for up to
4 hours. The Digital recording system allows you to number each recording and instantaneously retrieve a recorded track.

An automatic voice-activated circuit extends recording time even further. The system comes with receiver, recorder, AVAC, 110/220 VAC adapter, rechargeable battery, LED Charging indicators, internal antenna within a rugged attaché case.

$15,000




Image
Tele-Secretary VLS 4 Advanced Voice Logging System

The Tele-Secretaryâ„¢ VLS-4 is a Miniaturized Logging System used to record incoming and outgoing phone calls in Home or Small Business Environments.

Special Features:

The Tele-Secretaryâ„¢ VLS-4 can:

- Save all calls with time, date, numbers dialed in or out

- Work as a Client / Server System allowing for remote access

- Review, analyze, and bookmark conversations

The Tele-Secretaryâ„¢ VLS-4 can capture, display, and record all interactions on 4 phone lines simultaneously. It has:

- an advanced search function for fast data retrieval.

- a forwarding feature, enabling the user to forward call recordings

- password protection for secure access review.

There are several variations of the Phantom, each using SITG VLS Copy Technology within a multi-channel system, enabling recording, archiving, and transmitting capabilities. It is the perfect solution to handling large volumes of communication storage and management.

$3,500




Image
Wireless Microphone (US Model # WMTTX-4400/F)

Audio Transmitter FCC Approved WMTTX-4400/F The WMTTX 4400/F is a consumer Wireless Microphone designed for everyday use by Reporters, Business Executives, and people who demand a simple, easy to use communication tool.

It can be worn on clothing or handheld in order to listen clearly to of important speakers and vital discussions. It can transmit to a SITG communications receiver and link to a SITG recording system, enabling the conversations or speeches to be saved for later review.

$150




Image
Low Profile Audio Evidence Recording System (Investigator Kit)

The Investigator Kit (Accepted in Court) Designed to discreetly gather high quality voice conversations, the Investigator Kit is the professional system used to record your important information on tape. The capture of clear sound quality increases when used with the hi-tech HF Series amplified microphone (included in the Investigator Kit).

For discreet and covert applications, the Investigator Kit can be used as a pocket recorder, enabling personal conversations to be recorded and saved. The Investigator Kit eliminates lost conversations.

The Investigator Kit records and recalls your discussions, serving as evidence, as proof, as factual verification of what was said on cassette. The Investigator Kit is slim (like a the Credit Card Recording System) and fits in virtually all pockets for body worn use.

Although the HF series microphone is meant to be extendable, the Investigator Kit comes equipped with a built in microphone, and can be used when overt recording is necessary (unconcealed, open voice confirmation in conference rooms, board rooms, and training rooms do not always require unobtrusive wired microphones.)

Extended Recording Time & Sound Quality : The Investigator Kit records extended talk time using standard micro cassettes, made capable by slowing the recording speed of the tape. When making voice recordings, voice quality generally remains clear & reasonable for informative and investigative review; however, when used to record music, the quality can be affected as speed reduction occurs. As the Investigator Kit recording time is increased, the distinction slightly decreases, yet seeing as the unit is being used to record voice rather than music, the recording is still more than acceptable.

Size Benefit Note: The Slim, credit card proportions make this the clearest, smallest recording device available,. It is also very easy to conceal while recording conversations using the internal or external sound amplified microphones.

Two-speed switch selects between 2-hour and 4-hour recording speeds. With the Investigator Kit, you can use the attachable amplified internal speaker, or the pair of external amplified speakers for strong, enhanced sound distribution for playback. The Investigator Kit is housed in a portable briefcase, and includes all the necessary equipment for collecting and playback of speech.

Additional Recorder Specifications:

-Micro-cassette System uses ultra-compact easy-to-obtain micro-cassettes for recording and playback convenience

-Feather Touch Controls are sensitive and logic-controlled for very fast; very easy operation

-Auto Reverse provides uninterrupted recording and playback of both micro-cassette sides

-Detachable Speaker lets you speak playback through the speaker rather than an earphone so several persons can listen

-Metal Case affords extra durability

-LCD Display clearly illustrates tape counter and battery level

-Voice Operated Recording (Off/High/Low) activates the recorder only when audible sound is present; at either a high or low volume sensitivity.

$18,000





Image
Audio Recording System in an Executive Portfolio Model TRP-2

The TRP-2 is an executive portfolio that houses a discreet micro audio recorder and ultra sensitive microphone.

It is used to record clear voice conversations. It is capable of recording on extended time for long conversations.

It is designed to capture clear, high quality discussions (not music).

Features:

Remote Control Activation Switch: The recording unit is located in the zippered pouch and operated by a remote switch located in the periscope light.

Built-in Microphone & Acoustic Pre-amp: The highly sensitive microphone is built into the top of light housing. The power pre-amplifier, enclosed in the light housing, is adjustable for varying recording needs.

Extended Recording Modification: The unit’s motors have been specially calibrated by our engineers to provide up to four hours of recording or playback time on a standard 90 minute micro cassette. For this reason, the recording device supplied with the TRP-2 is the only one compatible with this system.

$4,000





Image
Discreet Digital Conversation Recording System (Digital Investigator Kit)

The Digital Investigator is a professional voice recording system.
It remembers everything said. It can record private & public conversations & messages:

-Room conversations
-Phone conversations: Single-Line, Multi-Line, & Cellular
-It saves your conversations on your PC hard drive (and downloads in a few minutes using the supplied USB interface & software).

The Digital Investigator Kit comes with additional acoustic & download accessories, such as microphones, speakers, earphones, phone single & multi-line phone adapters, download software, USB connection adapter, etc.

$1000




Image
Wireless Microphone with Ultra Long Range Model WMTTX-4400/300

Built for Long Range Transmission, the WMTTX-4400/300 will transmit conversations with minimal interference over very, very long distances.

Features:
The 4400/300 is a 300Mw transmitter. It should not experience any problems due to unforeseen environmental problems such as weather disturbances, land obstacles, or distortion due to fast movements.

The 4400/300 is built into a box for optimum durability and will withstand severe movements.

The 4400/300 can be used stand alone to transmit discussions or conversations, or it can also be used with video camcorders and video cameras.

$200




Image
Phone Call & Number Monitoring System (DNR Telesecretaryâ„¢ Module)

When recording important phone calls, the DNR Tele-secretaryâ„¢ records your call & captures the numbers dialed. The DNR Tele-secretaryâ„¢ Module (designed to work with 3LP, 4LP, & 6LP recording systems) is a micro-processor controlled junction that works with all Counter Spy voice activated Tele-secretaryâ„¢ Systems.

The DNR Tele-secretaryâ„¢ Module is designed to work on any single line phone (touch tone phone lines on a home line or dedicated fax line). It can plug in anywhere on the line or into the phone in use by connection into the supplied 2 into 1 line splitter.

Uses:

Records all of your incoming and outgoing phone conversations

Records & tells you the phone number you dialed. Upon playback, you will actually hear the numbers you dialed by digital voice

Silent and does not interrupt your call with noises or interfering sounds

Prevents false activations using a sensor that detects the presence of a person’s voice (Voice Activation) and the electrical change in voltage when the phone is picked up (anywhere on the line). Only when both are confirmed by the sensor will the DNR Tele-secretary™ Module begin recording.

Can be set to tell you the number in Spanish

Prevents accidental erasing of answering machines (phone voice data messages)

Comes with a (AA) battery that has a 6-month standby life (240 hours recording time)

4,500





Video Surveillance

SITG Video Surveillance Systems can discretely monitor, record, and broadcast real life conditions in order to ensure peace of mind.

SITG Video Systems watch everything that happens. Covert Video does not allow subjects to know they are under surveillance. Overt Video does. To see a video image is to see evidence. To store a video image is to document proof that an event did happen. To analyze video is to verify the facts of real life situations.




Image
Briefcase Recording & Digital Printing System Model CVS 380P

The CVS 380P is a Briefcase Recording System that enables on-site printouts of covert video footage. Modeled after the original CVS 380 Briefcase Recorder, the CVS 380P also retains dynamic features such as:

Hidden Pinhole Spy Camâ„¢
Discrete Activation Switch
Leather or Hard Case Attaché
Battery or AC power (for portable use)
Additional Details:

Covert Use: The CVS 380P will secretly record video footage. It looks like an ordinary briefcase, placed on a table or floor, and discreetly records people, objects, or events, with no one knowing. After video footage has been recorded, hardcopy photographs maybe printed in color. Document abuse of a loved one, illicit activities, and videotape evidence to substantiate proof.

Discreet activation: To begin recording, the CVS 380P is equipped with a subtle switch hidden inside the combination lock. An additional switch is installed on the inside of the briefcase. A pinhole lens and seed microphone implanted into the side of the executive-style attaché case will provide high-resolution recordings with clear quality.

All people will see is a normal briefcase! (Now available in either Italian leather with brass fittings, or durable hard-shell case.) In these disguises, the CVS-380P can remain for hours without drawing unnecessary attention.

Portability:
The CVS 380P offers the flexibility of moving from room to room, building to building. Completely portable, the CVS 380 is powered by rechargeable internal battery pack.

$25,000




Image
Miniature Video Transmitter Model VT-2400

The VT-2400 is a miniature wireless video/audio transmitter designed for transmitting composite NTSC or PAL video and audio signals simultaneously using 2.4GHz wireless technology.

System Components:

VT-2400 transmitter
Attached Omni directional antenna
Combination input cable with connectors for power (nine-volt battery) and audio (RCA)

$150





Image
Digital Video Monitoring, Recording & Transmission System (DVR)

DVR-4 for Video Storage & Management Remote Video Monitoring
The Spy Cam™ DVR is your complete visual surveillance system. It’s a high-tech method of CONTROL using Video Surveillance from anywhere in the world.

Video Recording
The Spy Camâ„¢ DVR gives you REAL TIME viewing via the internet. It can also save the video in its memory for future viewing. Watch TV quality video live (or recorded) from an internet connection.

How Many Cameras can be used?
You may conduct Video Surveillance using multiple camera configurations. The DVR-4 allows up to 4 channels of recording and / or viewing:

The DVR-8 allows 8 channels.
The DVR-16 allows 16 channels.
The DVR-32 allows 32 channels.
The DVR-48 allows 48 channels.
The DVR-64 allows 64 channels.

The Need:
People who require additional video surveillance will need to increase the recording channels. If 8 rooms require 1 Spy Camâ„¢ per room, then a DVR-8 would naturally be the system to use.


Once the DVR program is started, just click on any one of the 4 video icons (or 8, 16, 32, 48, or 64 icons... depending upon how many cameras you want to view), and a Video Window is created which allows you to monitor the location where you have a video camera setup, all in 16 million colors. You can display the video in any size you want and you can easily drag the video window anywhere on your VGA screen. With this versatile system, you can monitor up to 4 different locations simultaneously.

$1,200




Image
Laptop Case Video System with Remote Activation CVS-360

The CVS 360 Video Briefcase is designed for discreet video recording in office or home situations. The complete package of miniature camera, recorder and monitor are concealed within a normal attaché case and stereo speaker, allowing you to take video to places like never before.

Simple and discreet, remote control activation assures covert operation. A pinhole lens and seed microphone implanted into the side of the executive style attaché case will provide a high resolution recording of the boardroom or bedroom. All people will see is a normal briefcase!

In disguise, the CVS 360 can remain for hours without drawing undesired attention...but still offer the flexibility of moving the camera from room to room. Completely portable, the system is powered by a rechargeable internal battery pack. The video briefcase may also be connected to any wall outlet for unlimited use.

Depending on your needs, the CVS 360 can be equipped with an optional low-light or zoom lens to enhance the quality of your recording. Events can be replayed and edited. Monitor the business meeting that requires visual confirmation or the contents of your home. This system provides "picture perfect" documentation with recordings up to 4 hours per VHS tape.

$6,000




Image
Briefcase Camera Recording System Model CVS-380

The CVS 380 is a briefcase with a covert Spy Camâ„¢ connected to a miniature Video Recorder for video surveillance.

Covert Use:
The CVS 380 will secretly record video footage. It looks like an ordinary briefcase, placed on a table or floor, and discreetly records people, objects, or events, with no one knowing. Document abuse of a loved one, illicit activities, and videotape evidence to substantiate proof.

Discreet activation:
To begin recording, the CVS 380 is equipped with a subtle switch hidden inside the combination lock. An additional switch is installed on the inside of the briefcase. A pinhole lens and seed microphone implanted into the side of the executive-style attaché case will provide high resolution recordings with clear quality.

All people will see is a normal briefcase! (Now available in either Italian leather with brass fittings, or durable hard-shell case.) In these disguises, the CVS 380 can remain for hours without drawing unnecessary attention.

Portability:
The CVS 380 offers the flexibility of moving from room to room, building to building. Completely portable, the CVS 380 is powered by rechargeable internal battery pack.

$15,000




Image
Micro Stealth Surveillance Camera Model Spy Camâ„¢ B

The Spy Camâ„¢ B is a high tech, covert surveillance camera. It is compact & discrete, and can be worn on your body or concealed to view an area / event in secret.

Features include:

• High resolution camera
• Low light level operation (for black / white cameras)
• Clear CCD color image filter (for color cameras)
• Easy installation
• No special training to use

$200




Image
Flexible Fiberscope

The Flexible Fiberscope allows you to inspect the most difficult-to-reach places. The semi-rigid gooseneck sheathing can be bent through multiple angles to clear almost any obstruction.

The Fiber optic membranes are made of a flexible material designed to withstand repeated bending and flexing. Inside the sheathing are thousands of thin fiber optic glass strands which transmit an image from one end to the other.

The fiber optics are coherent, meaning that each fiber is at the precise position at both ends of the sheathing. At the remote end there is an objective lens to focus the light and at the viewing end there is a 7X eyepiece to magnify the image.

The eyepiece assembly has an easy adjust focus. For best viewing adequate illumination is required at the objective end upon the subject matter.

$500




Image
FLIR Thermal Imaging Video Observation Model IRTV-445G

IRTV-445G Thermal Video Search Camera & System Law enforcement
Search and rescue
Surveillance
Border patrol
Security
Defense
Navigation
Environmental studies
Structural surveys
This TV-compatible high-resolution infrared thermal imaging system offers a practical, cost-effective alternative to expensive military systems. It enables you to search wide areas and magnify any portion up to 8X while having fast, stabilized directional control of both azimuth and elevation through 360ø.

Clarifies Video through:

total darkness
smoke
haze
poor visibility conditions
The infrared scanner provides both a wide and narrow field of vision. In addition, the unique two step electro-optical zoom increases both image size and thermal sensitivity.

The narrow field and high-power zoom gives the user an effective magnification. Detector spectral sensitivity corresponds to a natural atmospheric transmission window best suited to long-range applications.

The smooth, one-hand pistol grip control contains a proportional pressure joystick for directional control: light pressure moves the gimbals slowly, greater pressure speeds it up. The self-contained control unit puts field of view, zoom, caging, focus, polarity, level, contrast and on/off at the operator's fingertips.

The gimbaled sensor platform is rate stabilized to eliminate vibration and minimize the effects of yaw, pitch and roll for steady line-of-sight control.

The infrared detector elements are cooled by a miniature helium-filled refrigerator unit located inside the gimbaled platform. This "cryocooler" eliminates the need for gas bottles and other accessories used by open cycle cooling systems. Epitomizing compact, lightweight electronics, the easily mounted support electronics module for stabilization and video formatting requires only 9" x 9" x 5".

The Video Monitor displays infrared image, plus azimuth, elevation, field of view, time, date and cool-down status. Image and system parameters are all available on standard output for taping or transmission.

$50,000





Radio Communications

With so much business being transacted over the phone, cell phone or by computer, today's sensitive corporate environments demands constant supervision to maintain confidentiality and corporate security.



Image
Long Range Telephone (Export Model SUPER 2000)

With the Super 2000 Mobile Telephone System you can dial out and receive calls in your car from anywhere in the world. The Super 2000 uses your home or office phone as the base station. The compact handset and cradle fits easily in any car and has most of the modern features of many home telephones - 18 number memory, 3 memory one-touch speed dialing, duplex intercom, ringer/volume control, security code and interface port for fax machine. An optional remote handset allows you to use the system outside your car.

$2,500





Image
Scrambled Walkie Talkie Model X-222

The X-222 Scrambled Walkie -Talkie provides a secure communication link, using a built-in scrambler circuit.

Should anyone have a scanner or attempt to eavesdrop on your conversation, the Voice Privacy feature will prevent them. Instantly, your conversation becomes indecipherable to anyone other than your listening party.

How it works:
All outgoing transmissions are routed through an actual privacy chip (our factory programs) so all outgoing transmissions can be set to work in the Scrambled Mode. The incoming transmissions also go through the chip, enabling simultaneous re-integrating of the transmission, while retaining a clear reception.

Covert Application:
The X-222 is compatible with the Ear Spy / Ear Speak (hardwired & wireless versions) for covert & private communications.

Note: The scrambler circuitry is compatible with most radio transceivers in frequency ranges including CB 27, VHF 136-174, VHF 220-250, and UHF 440-512 MHz and all output powers.

$200 for set of 2




Image
Discreet Wireless Communication Earphone (EarSpy)

[color=dimgray] The EarSpy is an inconspicuous high performance one-way communication system without visible wires or cables. The discreet receiver earpiece fits comfortably inside the ear canal and delivers crystal clear sound that cannot be over herd by others. Compatible with most radio communication equipment the wireless induction coil can be easily hidden beneath your clothing and linked to your radio system.
The EarSpy / Speak system includes the EarSpy and the high quality HF 40 with a customized Push to Talk button matched to your walkie talkie or communication system. The HF-40 is a professional lavaliere microphone that answers the needs of the most demanding sound recording engineer. Its small size and special design permit a variety of uses and fastening locations that make it ideal for unobtrusive appearance and professional use.

$50

_________________
Image
Captain Of The:
Image
Bio/Bank


Top
 Profile  
 
PostPosted: Thu Jan 31, 2008 9:49 am 
Offline
Cives
Cives
User avatar

Joined: Thu Jan 24, 2008 11:02 am
Posts: 316
Voice Stress Analysis

Lie Detection and Lie Detector technologies used for Truth Verification in the form of Voice Stress Analysis are offered as tools for people who need to know the truth.
This process involves electronic test measurement equipment that observes the human voice, analyzes its characteristics, and then offers the user electronic values to help determine if the voice stress is normal or abnormal.

Making decisions with what people tell you generally need to be based on true statements. The human body can mask truth values in many ways with the exception of the human voice. Therefore, Lie Detectors that utilize Voice Stress Analysis offer a direct method of determining truth or false answers for interview / interrogation practices.

SITG Voice Stress Analyzers can work discretely: used while examining the subject over the phone.

SITG Voice Stress Analyzers can also work in person: used while interviewing the subject at hand.




Image
VSA 2000 Lie Detection Lab

The VSAâ„¢ 2000 is a Lie Detection Laboratory. It is the next generation in lie detection equipment from SITG. The VSAâ„¢ 2000 utilizes the following technology, enabling users to interview clients or subjects without their knowledge,* affording an effective way to obtain relaxed interviews, allow archiving of all data and evidence, whenever accurate lie detection is necessary.

The VSAâ„¢ 2000 permits remote wireless intelligence gathering and interviewing. It also permits:

Instantaneous results
Archive logging for post analysis and review
Can be accomplished without subject's knowledge*
Clear LED digital readout as well as printout
Built-in video allows study of body language and enables remote management supervision
Truth Verification accessories for Investigation & Interview Management include:

Ghost WMTTX-4400 wireless microphone
RX-U 500/50 receiver
Mini disc digital recorder
Customized video remote recording
Voice Stress Analysis measures sub-audible micro tremors in the vocal chords to digitally analyze a subject's level of stress. This process does not involve wires to attach or graphs to chart. Simply stated, it requires an interviewer to establish a base line, and a numeric value to attribute to every answer the subject gives. The higher the number, the less truthful the response. Clear, precise digital readouts are given in both LED and printed format.

Results are instantaneous, accurate and thoroughly reliable as an investigative tool.

The VSAâ„¢ 2000 can be used in person or on the phone, in real time, and/or archived for later evaluation. Combining a camera for visual monitoring affords the study of body language and also offers remote management supervision of interrogation. The VSA 2000 Electronic Lie Detection Laboratory comes with instructional video tapes for technical operation and advanced interrogation methods.

The equipment is contained in a rugged, lightweight briefcase that is ready to be deployed pre-planned interrogations or for emergency situations whether in the office or out in the field.

$25,000





Encryption & Voice Privacy

With so much business being transacted over the phone, cell phone or by computer, today's sensitive corporate environments demand constant supervision to maintain confidentiality and corporate security.

The SITG commitment to producing effective encryption and security tools is derived from its overall philosophy -- Corporate confidentially isn't a luxury, it is a necessity.





Image
Phone, Cell Phone, & Data Encryption: Secure Lineâ„¢ Model SL 700

The Secure Lineâ„¢ 700 is a device that encrypts office and business communications from eavesdroppers trying to listen and monitor them.

Specifically, the SL 700 secures:

Cellular Voice Communications
Single Line Phones
Voice Communications via PBX
Files in any Computer, Network or on the Internet
E-mail Attachments
Point to Point File Transfers (connected to computer)
Compatible with Secure Lineâ„¢ series of products (SL-800, SL-1400, ULP-1)
Connections & Protections:
-The SL 700 connects to ordinary telephone lines, allowing easy encryption of voice communication between other SL 700 units.
-The SL 700 provides a simple method of encrypting computer files.

Select, encrypt, and save files through the SL 700 insuring that important information is kept confidential. The encrypted files can be stored in computer networks or on the Internet.

The SL 700 can protect important information contained in computer hardware as well as securing the communication of an e-mail attachment and point to point file transfers. Connect any cell phone through the RS 232 Jack to the SL 700, insuring cryptographic communications of information between other SL 700's. The SL 700 allows secure, simultaneous voice communication (SVD) and file transfer over ordinary telephone lines.

Development Background:
The SL 700 combines the communication technology of SITG with the Harris corporation's Citadelâ„¢ CCX cryptographic chip. The result is a compact and portable security system that ensures e-mail, voice, fax, and data communications are secure.

$3,000




Image
Phone & Fax Scrambler Model SL 800

The Secure Lineâ„¢ 800 (SL 800) is a device that encrypts communications from eavesdroppers trying to listen and monitor them.

Specifically, the SL 800 secures your:

Single Line Phones
Fax Machine Communications
The SL 800 connects to ordinary telephone lines, allowing easy encryption of voice communication between other SL 800 units.

The SL 800 will encrypt phone conversations, so anyone that begins to eavesdrop on the call will hear unintelligible sounds instead of private information.

The SL 800 will also encrypt fax conversations, so any "accidental fax interceptions" by eavesdroppers will result in their failure to capture information.

Connection:
The SL 800 connects to ordinary telephone lines, allowing easy encryption of voice communication between Secure Lineâ„¢ 800 units. The Secure Lineâ„¢ 800 provides a simple method of encrypting computer files. Select encrypt and save files through the SL 800 insuring that important information is kept confidential.

Connect any fax machine through the RJ 11C Jack to the SL 800, insuring cryptographic communications of information between the 2 SL 800's. The SL 800 allows secure simultaneous voice communication (SVD) and file transfer over ordinary telephone lines.

Development Background:
The SL 800 combines the communication technology of SITG with the Harris corporation's Citadelâ„¢ CCX cryptographic chip. The result is a compact and portable security system that ensures your e-mail, voice, fax, and data communications are secure.

$5,000




Image
Phone Wiretap Defeat System Model WTT-3000


The Wire Tap Trap is a device designed to defeat phone wiretap equipment such as infinity devices, hook switch bypasses, electronic triggers or other non-standard taps.

It works by electronically isolating your phone from the line it is connected to when the phone is on hook, making the eavesdropping equipment think that your line is not being used, and therefore keep them in standby modes without activating them.

Theory of operation:

Most wire taps are activated when the voltage of your phone line drops as you pick up the receiver. So we installed a voltage regulation system to stabilize the voltage electronically. When you pick up the phone receiver, the voltage on your line remains unchanged, and the tap will not activate itself.

The WTT-3000's LCD display shows you the amount of voltage operating through your line at all times.

The Wire Tap Trap also defeats tape recording devices that may be trying to record your conversations. By creating sine wave interference known as "Pink Noise", the WTT-3000 makes it impossible to record your voice when you use the phone.

Our greatest achievement is that we are able to offer you this sophisticated and powerful tool, while keeping it easy enough for everyone to connect - it fits easily into your executive briefcase, takes only two connections to install and can remain hidden when in use. Simple and effective, the Wire Tap Trap is a necessity for individuals and businesses alike that need to protect their privacy and business secrets.

$2,000




Image
Telephone Security Command Center Model TSCC-1000

The TSCC 1000 is a multi-function phone security system.

-It detects wiretaps and eavesdropping equipment. It enables you (and not a service) to daily examine your phone line security.

-It is designed to defeat phone wiretap equipment such as infinity devices, hook switch bypasses, electronic triggers or other non-standard taps.

Key Features:

Clears your phone of taps and bugs
Keeps your business secrets intact
Protects your privacy
Fights eavesdroppers from recording your phone conversations.

$3,000




Image
Cellular & Satellite Phone Encryption Model SL 1400

What is the SL-1400?
A Digital Encryption module for securing Cellular and Satellite communications.

How does it work?
When connected to a data capable Cellular Phone, Satellite Phone, Global star Satellite User Terminal, or most PBX systems, a secure voice and data encryption process is initiated. Multiple users can participate in this process using the SL 1400 or compatible Secure Lineâ„¢ series systems (such as SL 800, SL 700, or ULP-1).

The SL 1400 operates on battery power or line power for security anywhere. It is very compact, light weight, and easy to operate.
A headset for private, discrete communications is included.

The SL 1400 is flexible, diverse, portable and easy to use. It helps eliminate information theft from eavesdroppers trying to capture the conversations (or data transmissions) sent over cellular or satellite channels by protecting them.

Governments, businesses, and personal communications need to be kept confidential. Information that is restricted must remain restricted.

Development Background:
The SL-1400 joins the communication technology of SITG with various state-of the art encryption platforms including AES, the new advanced encryption standard used by the US Government; the Citadelâ„¢ CCX developed by Harris Corporation; and the Triple DES digital cryptographic logarithm. The SL 1400 is a compact and portable security system that is very easy to operate.

$1,500




Image
Laptop Encryption to Counter Data Interception Model ULP 1

What it is:
The ULP 1 is a Counter-Measure Security Card designed for COMPUTER DEFENSE. It is built into a hardware module that connects to Laptop computers.

Features:

It encrypts email files by generating a unique (& random) security key every time you transmit an email to another ULP 1 user.
Secures e-mail attachments, ensuring safe, confidential transmission
Secures computer files (when using Windows® 98, 2000 or Windows® Me)
Eliminates your activities trail, and can permanently prohibit others from seeing your activities history.
Controls & stops computer viruses

Stealth Feature:
The ULP 1 eliminates encryption detection . . . Software leaves a trail that can be eventually detected. The ULP 1 eliminates the possibility of being "seen" by computer eavesdroppers.

Privacy:
The ULP 1 is the ultimate laptop privacy tool. It is a high-grade breakthrough and an easy-to-use hardware based encryption solution.

How It Works:
Simply plug it into your laptop - notebook using the PCMCIA slot. It protects the integrity of your computer by ensuring that your private and confidential activities and information stay private & secure.

Strengths:
The ULP-1 uses the highly regarded Triple DES digital cryptographic algorithm.

The ULP-1 easily interfaces with just about any notebook computer providing the ultimate security of computer files and e-mail attachments. It stops the spreading of malicious computer viruses by encrypting Microsoft Outlook 2000 e-mail directories.

$1,500





Image
Computer Supervisory Logging System: Hacker Trap Model HT-100

HT-100 Computer Security Monitoring See What is Leaving Your Computer While You Are "On Line." Millions of People Use On Line Services Every Day. There are Literally Hundreds of Internet Service Providers.

With so much business being transacted over the phone or by computer, today's corporate environment demands constant supervision, and complete record keeping. With the new HT-100, you can have all this and the convenience of portability and economy.

Like its predecessor the Hacker Trap, the HT-100 is a high technology communications system that differentiates between incoming and outgoing data transmissions, and will capture both independently. It automatically stores records of every piece of data sent and received from your PC on a hard drive.

The HT-100 is transparent when connected online. It can be connected directly, via physical connection, at the sending machine. It automatically logs any data in real time and can capture transmitted information for printing. The HT-100 is the most recent in state-of-the-art technology from SITG. It can help to keep your firm on the cutting edge of corporate security.

$4,000




Image
Laser Listening Defeat System LLDS-2000

The LLDS-2000 defeats listening devices by generating and radiating sonic energy. This energy attacks the actual sound waves of human speech as measured by surveillance listening devices such as:

wired microphones buried in walls
contact or spike microphones
transmitters located in AC outlets
laser / microwave surveillance using audio reflection systems by window interception points

Originally developed to counter Audio Laser Measurement devices, the LLDS will distort Infra Red sound readers, microwave bounce technology, as well as audio microphones. The LLDS-2000 protects the user against listening devices that are not detectable by conventional methods.

With the LLDS-2000, the user is able to produce a security blanket of generated noise completely covering private conversations with sound that is unintelligible. The LLDS-2000 is an excellent addition to SITG Electronic Countermeasures, or can stand alone to provide perimeter protection.

An acoustic adapter is included (built into a transductor in the form a transducer) with the LLDS-2000 for coupling walls, ceilings, air ducts, plumbing, windows, etc.

$5,000




Image
Telephone Analyzer Sweep & Location System CCTA-1100

The CCTA-1100 is built to satisfy the demanding standards of the professional and has been specifically designed for search applications which require immediate detection and location of phone taps. It is the only machine capable of pinpointing the exact location of a tap on your phone line.

The 0-6000 Hz sweep test finds any and all inductive and capacitance style telephone taps. The high voltage test is also capable of disabling foreign devices. Test responses include LCD graph display and LCD readout that show telephone line parameters measured numerically, while the LED display indicates if an unauthorized device is connected to the phone line. The CCTA-1100 represents the latest advancement in digital telephone analysis technology. It is the only device which provides a totally automatic method for detecting and locating bugs, wire taps, and other telephone line eavesdropping equipment.

The CCTA-1100 ensures private telephone conversations with the advantage of being user friendly and advanced in its methods of computer controlled analysis. An easy to read LCD display will walk you through its series of tests with a step-by-step guide for maximum effectiveness. All results can be printed out on a standard computer, with the software provided.

$12,000




Image
Computerized Phone Analysis System Model CCTA 1000

The CCTA 1000 is a computerized phone line tap detection system. It scans your telephone lines and performs multiple tests in order to determine if your lines have a suspicious energy reading that might be caused by a wiretap.

Simply press a button and the CCTA 1000 will automatically perform a series of sophisticated tests. In just seconds, eavesdropping devices can be detected and pinpointed within your telephone system.

The CCTA does all the work. Without previous training, you can easily debug your entire phone system - no matter how large or complex.

The CCTA 1000 makes it simple by automatically displaying its own operating instructions every step of the way. It even shows you where connections are to be made with a series of lights.

A digital display shows the last number dialed on your telephone and gives an up-to-date readout of your telephone characteristics.

The CCTA 1000 can also perform an electronic sweep of your premises to detect hidden bugs, transmitters and recorders. An antenna probe plugs in and instantly transforms the CCTA 1000 into a sophisticated sweep system, leading you to the location of hidden eavesdropping devices in your car, home, or office.

The latest state-of-the-art technology makes the CCTA 1000 ultra compact, ultra lightweight. Like no other system, the CCTA 1000 is the first computerized telephone analyzer that's portable. The entire system consists of a single briefcase that can travel easily.

Wherever you go, the CCTA lets you travel in the age of computerized privacy.

$20,000




Image
Tap Alertâ„¢ for Phone Line Bugs Model B400

How would you know if your phones were tapped? How would you know if they were safe to talk on? The B-400 Tap Alertâ„¢ protects your single line phones from eavesdroppers.

The B-400 will indicate if a WIRE TAP has been activated. It automatically records all activity on the line

Features a MASKING SOUND to the line when not in use and automatically stops when a call is placed or received

Uncovers most types of phone taps and bugs including:

Harmonica bugs or Infinity Transmitters
Series or Parallel devices
Hook Switch phone activated bugs
How it works:

The Tap Alertâ„¢ B400 alerts you automatically with an alarm light if a line-activated telephone wiretap has been placed on your line or phone instrument. The alarm light will also illuminate when an extension phone has been picked up anytime, day or night.

If the alarm is activated in your absence, the light will remain intact until you reset the system. This assures you of 24 hour protection against invasion-of-privacy equipment.

The Tap Alertâ„¢ B400 can be left unobtrusively on your desk as a regular accessory or concealed in a drawer or other hidden area.

$2,000





Bug Detection/Electronic Counter Measures ECM

Electronic Countermeasures or TSCM uses Bug Detection and Tap Detection technologies for room and phone privacy using bug detectors, signal analyzers, radio receivers, and tap detectors.

Are your conversations bugged? Are your phone conversations wiretapped? Do you have private matters that need to stay private?

Detect surreptitious eavesdropping equipment used illegally to steal secrets and private information. Privacy invading equipment (in the form of Electronic Bugging) can cause serious personal problems, destroy a small or big business, and fuel industrial espionage.

Our technology fights privacy invading eavesdropping equipment such as bugs and wiretaps. They guard your privacy, and secure your conversations.




Image
Bug Detector & Locator Model RE-2400

The RE 2400 is a wide range receiver with a built-in distance meter. It picks up radio frequency transmission of bugs and other clandestine transmitters, and provides data to enable a location lock of the transmitter source.

The RE 2400 is designed for rapid scanning of radio frequency bands and provides "sweep" functions for detecting microphone based transmitters.

The RE 2400 also uses acoustic probing to detect microphones, in conjunction with its step-by-step scanning feature to detect radiation based sources. It then analyzes the results of the radio signals it has received and determines the distance to the transmission source.

$4,500




Image
2nd & 3rd Harmonics Non-Linear Junction Detector Model VL-6500M

The VL-6500m Non-Linear Junction Detector seeks out and alerts you to the presence of devices with semi-conductors and electronic components, which can range anywhere from a bug to an audio recording device or even a digital recorder.

The VL-6500 is intended for electromagnetic detection and localization of RF transmitters (bugs), microphone amplifiers, audio-recording devices and remote control devices. This device will operate in areas often difficult to access, and detection of sound signals in controlled zones will not be hampered by presence of mobile phones, PC's, telephones, etc.

Detection of radio-electronic devices such as:

• radio microphones

• microphone amplifiers

• portable recorders

• remote control receivers

• other units with semiconductor components

• reception of second and third harmonics

Simultaneous reception of the second and third harmonics allows to differ the "false" semiconductors of metal constructions from artificial (man-made) semiconductors.

$10,000




Image
Video Camera Detector Model VCD-100

Do you ever get the feeling that you are being WATCHED???

The VCD 100 is a Video Camera Detector that alerts you to video camera activity.

It was designed to ensure the privacy of your personal and business dealings, meetings and operations. The VCD-100 uses an LED bar-graph to demonstrate its detection ability when it comes in contact with a Video Camera. It alerts you to the fact that you are under covert video surveillance quickly and noiselessly, the instant a video camera has been activated in your presence.

Features:

Palm-Sized Video Camera Detector
Silent & Discreet Vibration Alert
State-of-the-art Detection Circuitry
Field Coil Antenna (extends operating range)

The VCD-100 comes complete with a field coil antenna, increasing its operation.

Along with using the VCD-100 comes the secure knowledge that your privacy can not be compromised by your adversaries.

The entire system fits neatly into an executive-type attaché case. The unit itself is palm-sized and can be easily carried in a coat pocket.

The VCD-100 Video Camera Detector protects you against the modern-day threat to security posed by the proliferation of covert video cameras.

$18,000




Image
Signal Interceptor, Detector, & Analyzer Model ECM SA-1300

The ECMS A-1300 is an electronic Countermeasure Signal Analyzer, designed to detect virtually all clandestine surveillance transmitters (bugs).

The ECMS A-1300 is built with:

a customized spectrum analyzer
a bug detection processor
These 2 segments are used to discover and identify anti-privacy bugs and store all encountered signals in memory for later review, comparison, and reporting.

The ECMS A-1300 is essentially a professional counter surveillance system that is used to counter privacy invasion technology. It can be manually operated, or left in its automatic function mode for unmanned operation over extended periods of time.

How it works:

The system searches a location for hidden listening devices (bugs and other transmitters). It then locks onto their frequencies, performing 6 tests to confirm the presence of a bug, and allows the user to hear what the eavesdropper is listening to (or tape recording.) Built-in demodulators and a large screen LCD display are built into the system for ease of use when examining the search results.

Features:

Defines distance and location of bugs (as well as suspicious transmissions)
Detection of covert wireless TV signals as well as digital signals
Bug Detection in real time
Evidence can be stored for later retrieval analysis
Prints out Sweep reports
Extended frequency range from 100KHz to 3GHz
Built in Printer (Prints stored data and reports)
Built in Digital decoder circuitry
Portable & Fully automatic PC-based detection
Weight with batteries 18 lbs
Easy to read 14" LCD Spectrum & Display

$40,000





Image
Hand Held Sweep Detector Model VL-45

The VL 45 is a pocket sized bug detector. It is designed to alert you of the presence of eavesdropping equipment such as Electronic Bugs that capture your voice conversations in rooms and outdoors.

People who invade your business or personal life generally conduct electronic surveillance using Electronic Bugging Equipment. If you have important information that you wish to remain yours, (not for everyone to know), then protect your privacy. In order to secure your conversations, you will need to test the places you generally speak in.

Testing Locations:

-Home
-Office
-Car
-Hotels
-Conference Rooms
-Anywhere

The VL 45 is used by personal and corporate people who want to secure their sensitive information. It was originally designed for business executives to counter information theft by protecting company secrets:

-Marketing plans
-New product developments
-Sales promotions
-Sales leads
-Financial reports

In today's competitive business environment, "bugging" is an unfortunate but very real threat. If you are conducting business, or any other endeavor where discretion is of utmost importance, you need to ask yourself the following questions: Are you bugged? Is a rival stealing your ideas and discovering your secrets? How would you know?

The VL-45 will allow you to locate and verify radio transmitter bugs. Its receiver is supersensitive, enabling you to find even low power transmitter bugs. With the VL-45, you will have confidence of mind and assurance of privacy no matter where you go.

$1,200




Image
Non Linear Junction Detector Model VL-6500

The VL-6500 was built to detect the presence of live & non-working eavesdropping devices and explosive devices hidden inside wood, plastic, brick, walls, floors, even in luggage & under clothing. Specifically, the VL-6500 was designed to detect electronic explosive detonators, bugs, microphones, digital recorders, spy cameras, tape recorders, and video recorders.

How it works: The VL-6500 sends a signal onto a wall, ceiling, etc. and then measures the harmonic frequency level that “bounces back” from the surface. The information from the analysis can advise the user to recognize what to look for when searching for surreptitious electronic devices.

Theory of operation: The VL-6500 operates on a method of discriminative search patterns. The VL-6500 can receive different harmonics “bounce backs” from the connection points between 2 or more semiconductors. These connection points form a non linear junctions (at their meeting points.) The VL-6500 can also receive natural meeting points (junctions) found when natural metals connect or meet.

Therefore, a rusty nail touching a piece of metal in a wall or an explosives detonator in a suitcase may both reflect harmonics signatures, however, the VL-6500 will provide different measurements. The measurement results when detecting an electronic device such as the detonator will provide a different measurement than the detection of a nail.

Thus, a clear distinction can be made between those two junctions.

Who uses the VL-6500? People serious about countermeasure security: Law enforcement, corporate and professional people, and the diplomatic community.

The VL-6500 also serves as a tool used by SITG Sweep Teams. SITG clients also use the VL-6500 for its precision technology in detecting the smallest traces of electronics.

The VL-6500 will operate in areas often difficult to access. Its ability to detect sound signals (harmonics) in controlled zones will not be hampered by presence of mobile phones, PC's, telephones etc.. Harmonics recognition is verified through headphones.

$12,000




Image
Discreet & Silent Body Worn Bug Alert Model EJ-10M

The EJ-10M Pocket Sized Vibrating Bug Alert is a state-of-the-art broadband receiver which scans radio waves for any sign of covert radio transmitter activity. Upon detection, it alerts the user, thereby insuring that private conversations remain private.

Small in size and discreet in operation, the EJ-10M vibrates when an info-thief has activated an audio transmitter. Alerted that a conversation or meeting is being compromised, the user has an option to withhold information, search for the transmitting device, and/or feed misinformation to the eavesdropper.

The EJ-10M operates by sensing even the faintest sources of radio transmissions and giving off an alert via a discreet vibration alarm. This alarm notifies the user of active bugs as well as concealed, body worn transmitters. The sensitivity thumbwheel can tune the unit to screen out spurious background radio activity, while the reception circuits remain active in order to give off warnings of possible threats.

Professionals all over the world trust the EJ-10M to be their silent guardian, continuously monitoring their surroundings for suspicious activity, while indicating when it's safe to speak freely. The EJ-10M Bug Alert System includes the TT-104 test transmitter to simulate radio transmissions and help the user become accustomed to surveillance detection.

$2,000




Image
Multi-Mode Bug & Wiretap Detection System Model ECM-SA 1600

The ECM-SA 1600 is a multi-mode operating Counter surveillance System.

It was designed for detecting and locating "friendly" and "enemy" radio frequency transmission equipment. Enemy systems to counter industrial espionage and information theft, and Friendly systems for communication industry repair (natural and artificial information leaks).

The ECM-SA 1600 is built into a control module, with converter kits to separate the functioning modes. The ECM-SA 1600 has inter-changing modes for multi-feature counter surveillance testing. These multi-test modes work automatically through the use of a converter. The following modes enable quick, accurate detection, geared to finding privacy invading surveillance equipment:

high radio frequency detector - frequency meter
phone line analyzer
infrared radiation detector
low radio frequency magnetic fields detector

The ECM-SA 1600 also has alert features to operate while conducting Counter surveillance testing:

vibro-acoustic receiver
acoustic receiver
wire acoustic receiver

Test results are displayed on the graphical LCD, and an acoustic control can be heard through either head phones or a built-in speaker. The ECM-SA 1600 operates through the use of a 16-digit membrane keyboard.

The ECM-SA 1600 can also work to receive low frequency signals in the oscillo-graph mode or the spectrum analyzer mode with variation indications to yield test results.

$6,000




Image
PRO TSCM Bug Detection System Model VL-8000

The VL-8000 is designed for the detection of covert listening devices (such as electronic "bugs" that transmit private conversations). It will search a location for hidden listening devices, lock onto their frequencies, and allow you to hear the actual transmissions.

The VL-8000 is the only handheld, portable system that will detect covert listening devices, pinpoint their transmissions, and store their frequencies in memory. The VL 8000 is a high level counter-surveillance receiver. It operates by measuring signal strength and detects virtually all clandestine transmitters through its proprietary built-in decoder circuitry.

Features:

-Built-in spectrum analyzer
-Can operate automatically and store signals in memory for later review
-Built-in demodulators (for fast test results)
-Removable Programming Module (RPM - for fast test results)
-Microprocessor-controlled

Users include:

-business executives
-law enforcement agents
-people in search of privacy
-detectives
-ECM Sweep Experts

When protecting sensitive information is critical to one’s success, the VL 8000 provides the most automatic, reliable and cost effective solution on the market.

$10,000




Image
Counter Surveillance Transmission Receiver Model A-12

The A-12 is a professional Counter-Surveillance Receiver. It can receive clandestine transmissions of any kind within 2 MHz up to 4.2 GHz (with optional frequency extenders.)

Primary Use:

The A-12 is used to analyze radio frequency traffic in order to verify radio transmission of electronic bugs and monitoring equipment.

The visual display panel shows a span in one spectral display and allows the operator to tune automatically to any selected RF signal observed. An audio tone also enables one to hear the transmission, giving visual and audio abilities to verify signals.

An audio switch allows instant monitoring of transmissions after they have been observed on the display. The A-12's unique narrow band and wide band performance makes it the best professional choice for electronic countermeasures.

Small size and light weight makes it ideal for portable field use. Four-way power supply accepts 110 or 220 VAC, 12 VDC or internal rechargeable batteries. The A-12 comes with a log periodic antenna and can have additional antennas connected to modify the frequency reception range.

$5,000





Contraband Detection / EOD

Our systems sniff out explosives, detect weapons, jam remote controlled detonators, and find contraband on people, inside the human body, in airport luggage, through walls, and within vehicles. Our detection and test systems are efficient and portable, enabling the user to gain quick results, whether used in a fixed location, or out in the field.



Image
[color=black] SITG Portable X-Ray System


The SITG Portable X-Ray System is an advanced, lightweight x-ray system used for mobile examinations in order to verify weapons or explosive devices.

It is recognized by police, Explosive Ordinance Disposal EOD personnel, and security authorities as a necessity for 'portable detection' of explosive devices.

The system operates on either main voltage, or from its own internal rechargeable nickel cadmium battery. When used with Polaroid Radiographic film cassettes and processors, detailed radiographs can be produced within minutes of arriving on the scene.

The complete system is contained in one case and can be operated by one technician. The SITG Portable X-Ray System is safe, following normal safety precautions, and easily operated.

The system is also useful for corporate and diplomatic security applications and for VIP protection. Incoming mail, parcels, briefcases, etc. can be radiographed to ascertain the contents of such articles and identify contraband such as drugs, weapons, explosives, etc.

$3,000





Image
Walk Through Weapons Detector Model DP-3

The special design of the DP-3 provides uniform, head-to-toe detection without a floor ramp. This maximum-security walk-through weapons/metal detector will search out the full range of restricted weapons, including the Glock 17 pistol and ferrous (iron)/non-ferrous small-caliber weapons.

It meets and exceeds the National Institute of Law Enforcement and Criminal Justice and Federal Aviation Administration standards.

The DP-3 was designed for easy set up and contains self-balancing antenna sensors. Simplified controls assure easy operation and greatly expand the unit's capability.

The DP-3 can be utilized in every conceivable security situation required of metal/weapons walk-through detectors, from maximum high-level prison security to lower level high-volume flow.

The DP-3 is designed to withstand the rigors of frequent moving; yet it is light enough for easy transport. Operator adjustments are minimal. False alarms from outside sources are virtually eliminated, and the sensitivity of the DP-3 electronic circuitry can be set at the level you need to meet your security demands.

$25,000




Image
Body X-Ray Scanning System Model XR-3000

Body X-Ray Scanning System Model XR-3000

The Terrorist Trap XR-3000 full-body scanner captures and images smuggled objects made of both organic and non-organic materials, whether hidden within clothing, secured in natural cavities of the human body, or ingested. Medically safe, the radiographic scanner will picture guns, both metal and non-metal, knives, plastic and electronic explosives, precious stones and metals. It will store images for evaluation, and files may be forwarded to a supervisor or control center. Also safe for personnel, radiation output is less than that which is received during a one hour airplane flight.

Standard X-Ray Technology and its Limitations:
Electromagnetic hand-held or walk-through devices currently do not detect plastic explosives, non-metal weapons, hazardous materials, or narcotics. These systems are now in use worldwide at airports, border and customs inspection stations, prisons, court houses, embassies, military bases, precious stone mines and processing centers, financial institutions, and even in elite office buildings. However, they do not allow for personal examination, which is often time consuming, inconclusive and impractical.

The XR-3000 Advanced Technology:
The XR-3000 works upon irradiation of passengers with a very narrow flat scanning X-ray beam. Using a highly sensitive multi-element, the X-ray Scanning System is able to yield very clear images of objects on or within the human body. The system provides a visual image on the screen (PC) within 10 seconds, enabling the effective in examining of many people within a high-speed time frame. A second walk through will not be necessary as the system can file all images for further analysis.

Distribution of XR-3000 Scanning Technology is currently directed for use at Airports, Embassies, Nuclear power centers, Prisons, Military installations, Gold / Diamond / Platinum mines, government buildings, etc.

$50,000





Tracking / Recovery

Our Tracking Systems help find people who lose their way, people trying to conceal themselves from others, and kidnap victims. Our Tracking Systems offer communication and information exchange abilities and services. Businesses, Governments, and even families can manage their employees and entrusted people with cars and vehicles, giving them live geographic and travel information technology, or just watch them using our Spy Camâ„¢ Video Transmission & Tracking Technology.

SITG Video Systems watch everything that happens. Covert Video does not allow subjects to know they are under surveillance. Overt Video does. To see a video image is to see evidence. To store a video image is to document proof that an event did happen. To analyze video is to verify the facts of real life situations.




Image
Tactical GPS System for Surveillance Model TacTrack-1

The TacTrack-1 is an interactive tracking device that helps monitor vehicle location and vehicle functions.

Placed in a vehicle, the TacTrack-1 uses detail-oriented sensors to gather information such as speed and direction of a moving vehicle. The system then correlates this data and combines location data provided by Global Position Satellites, and determination of the target's location is then indicated on a PC (desktop or laptop). You can track vehicles on streets, roads, highways...globally.

The TacTrack-1 enables remote control of numerous vehicle operations right from your PC or laptop. High resolution, full color maps can be viewed on the software and hardware modules you need, and upgrade as needed.

Our unique modular approach allows you to customize your own system so that you never have to pay for functions you don't use.
Receiving printed reports and data analysis is easy, as well as generating information to help you reach your evidence (Police) / productivity (Business) goals.

TacTrack-1 usage scenarios:

-Your factory only received half of the shipment. Did your driver take the other half to resell?

Take immediate action. Make timely informed decisions. Keep your cool in a crisis with the TacTrack-1. Now you really can do five things at once, but this time by remote control and you never have to leave your computer station.

There's a head-on collision on the expressway. How soon can we get an ambulance to the scene?

Emergency Search and Rescue using the TacTrack-1 can save lives. When an accident or vital situation requires immediate response, the TacTrack-1 can pinpoint the location within 10 meters accuracy using simple keyboard commands.

Why did it take your driver 3 hours to make a routine pickup?

With the TacTrack-1 you can be more strategic in business. You can easily save time and money by monitoring employees and driver times and locations.

For Law Enforcement, the TacTrack-1 plays an important role:

Locate stolen goods.
Recover stolen vehicles.
Engage security systems.
Rescue children from abduction.

Government and Law Enforcement agencies have long realized the benefits of global satellite vehicle tracking systems. Now SITG brings you a user-friendly device so that you can have that same pinpoint accuracy, ideal for business or personal use. And you don't have to be a secret agent- all you need is your laptop, a modem, and the TacTrack-1.

$30,000





Image
Fleet Vehicle Tracking System Model FVTS

With the FVTS, know exactly how your vehicle is being utilized to be a better manager and you don't have to leave your computer. Prevent cargo theft, get your drivers to stay en route, save fuel - all of this and much more made simple by remote control.

At SITG's laboratories, we have the technology to bring you interactive solutions on a worldwide scale - to cure your fleet management headaches, at the same time increasing your profits.

With the use of sophisticated Satellite Global Tracking, developed by the U.S. Department of Defense, you can pinpoint the position of a vehicle anywhere on earth within 10 meters accuracy.

The remote unit in the vehicle itself picks up the satellite signals.
The signals are sent right to your computer screen, via wireless communication, where numerous remote control functions can be performed all at once.

You have the power to activate alarms, lock/unlock electrical doors, detect unauthorized entry and unscheduled cargo movement. Another advantage - sensors can be attached to the vehicle to monitor temperature, engine performance, and security systems.

All of the accumulated data from the FVTS does not have to be lost.

Our system also provides you with storage on a removable memory card. The data on the card can be easily removed and downloaded through the serial port of your computer. The main benefit of the memory card is that it gives you a cost effective way to generate vehicle usage reports without paying monthly fees for using wireless communications to download data. Of course, the option is yours.

The FVTS is compatible with cellular phones, radio, and modem for easy transmission of essential information. The FVTS literally revolutionizes a wide range of activities by utilizing today's technology so that businesses and consumers can increase productivity and profit. Such technical innovation has never before been so simple.

$45,000 – includes first year of fleet monitoring
$2,000 – yearly renewal fee for fleet monitoring service




Image
Body Worn Kidnap Recovery System Model AJ-1800

The AJ-1800 is a Personal Kidnap Recovery Tracking System (PKR). It consists of a transmitter, receiver, and aerial receiver antenna. The AJ-1800 enables you to track and locate any person or object equipped with an activated location beacon transmitter.

The PKR Transmitter is lightweight and durable and will provide 180 days of continued use. It can be activated and de-activated by simply pushing a switch.

Primary Use
The AJ-1800 was originally built to find people. There are 2 types of transmitters used to locate people. The body worn transmitter (able to be sewn into clothing) and the vehicle transmitter (able to be placed on the exterior of a vehicle).

Secondary Use
The AJ-1800 is also used for conducting surveillance. Following persons of interest, or those suspected of a crime, the AJ-1800 can be used in a car, helicopter, in order to track vehicles or people on foot. Location and recovery using the AJ-1800 assists in responding to people in trouble, or locating a stolen vehicle.

When conducting this method of tracking, a magnet-mount roof-top antenna is used in conjunction with a hand-held directional antenna. When using the PKR by car for surveillance and location of stolen property, the roof-mount Omni-directional antenna provides long range and ease of use.

The receiver will provide the user with.

$1,500





Night Vision

To see in the dark under the cover of night, SITG offers Night Vision Optical Equipment. Used for surveillance, perimeter security, emergency rescue and search operations, boating, camping, and fun. SITG offers an unprecedented range of night vision and thermal imaging devices, so you can "see" or track images and moving targets in total darkness, through rain, clouds, fog, smoke, and even behind natural or man-made barriers.



Image
Night Vision Goggles Model Predatorâ„¢ VII-B

Predatorâ„¢ VII-B Cyclops Viewer (Gen 2 & 3)

Lightweight - 680 grams
Provides Nitrogen Purging in Field
243mm Field of View
3x Magnification
High-light Cutoff Feature
Second Generation Technology
Virtually Maintenance Free
No Infrared Viewer Required

The Predator VII-B Gen II Night Vision Goggles are now available with Advanced 2nd and 3rd Generation image tubes, the versatile Predator VII-B goggles provide the user with comfortable hands-free use.

Advanced 2nd and 3rd Generation image tubes deliver improved system resolution and nearly doubles the luminous gain. The Predator VII-B system provides triple the photo-sensitivity and double the luminous gain of 1st Generation technology extending operation into the near infrared region.

Predator VII-B goggles feature a quick-release lever that permits one-hand mounting, an IR-on indicator, automatic high-light cutoff and low-voltage indicator.

The Predator VII-B comes with a flexible carrying case with shoulder strap and belt mounting clips. An optional rugged shipping/storage case is available.

Photo response is nearly infrared, and it can be operated at starlight levels and below, at 80% performance in accordance with U.S. military specifications.

$3,000




Image
Night Vision Pocket scope / Riflescope Predatorâ„¢ 150

The Predator-150 Night Vision Pocket scope / Riflescope utilizes advanced 2nd Generation technology for high resolutions images, even in virtually dark environments. Better than active viewers, the Predator 150 lets you see in the dark without the need for an infrared illuminator.

This passive night vision device amplifies residual starlight and moonlight 12,000-15,000 times to provide near daylight visual capabilities at night. Lightweight and rugged, the Predator-150 easily attaches to most weapons with an optional rifle mount. External adjustments for windage and elevation provide precise reticule alignment while an internal pattern of marking in the visual field provides a clear aiming point.

The Predator-150 also couples with most photographic equipment, including long-range zoom lenses, with optional camera adapters. The Predator-150 System is designed to withstand extreme handling under rough field conditions. It includes the Predator-150, 3x magnification lens, rugged carrying case and batteries.

$3,500

_________________
Image
Captain Of The:
Image
Bio/Bank


Top
 Profile  
 
PostPosted: Thu Jan 31, 2008 9:54 am 
Offline
Cives
Cives
User avatar

Joined: Thu Jan 24, 2008 11:02 am
Posts: 316
Defeat & Jamming Systems

In order to help you control your privacy and ensure your safety, we offer defeat and jamming systems.

Secret personal or business information only stay secret if no one else has access to them. These systems fight electronic eavesdropping and also jam dangerous communication equipment used to set off remote controlled bombs.

Systems with jamming and defeat technology include:

Anti-Recording Systems
Anti-Eavesdropping systems (for phone & room conversations)
Bomb-Jamming Systems
Cellular & Communication Jammers




Image
Portable Bomb Jammer VIP-2

The VIP-2 is a portable bomb jammerâ„¢ built into a briefcase, designed to defend against radio-controlled improvised explosive devices or RCIED's used by terrorists, assassins, political dissidents, and criminals. The VIP 2 jams the signals of unauthorized transmitting devices in various frequency ranges used to activate explosive bombs.

Like the PH-3000 that jams hidden video cameras, eavesdropping devices, transmitting from home, car, office, hotel conference room, the VIP-2 blankets entire areas and jams on a larger scale. Rather than analyze the frequencies, the VIP-2 broadcasts intensive radio interference, preempting any hidden or visible remote detonators from activating.

Used by VIP's and explosive ordnance disposal - EOD personnel to jam radio-controlled bombs, the weapons of choice for most terrorists, the VIP-2 acts as a counter-terrorism prevention unit.

If the users are potential targets for assassination, the VIP-2 may save lives. To protect high profile people from criminal, subversive, political, and industrial sabotage networks, the VIP-2 was engineered as a portable Bomb Ranger, movable from a car to home to office, etc.

The VIP-2 is a countermeasure system that defends stationary or mobile users during explosive detection, bomb detection, and bomb disposal circumstances. As a countermeasure system, its technology was designed with the aim of countering groups who commit acts of terrorism, assassination, and criminal murder. It gives the user the edge against radio-controlled weapons. Examples include: Car Bombs, Briefcase, Purse, & Backpack Bombs, Stuffed Doll & Toy Bombs, etc. The VIP-2 acts as a mobile transmitting station, blanketing the vicinity to defend against invisible caches of ammunition and remote controlled bombs (used in ambush or street crime attacks.)

Dangers posed from tactical operation commands (armed with modern commercial and military radio triggers or communications) can now be challenged.

$15,000




Image
Tape Recorder Nullifier Model TRN 100

The TRN 100 is built to counter and defeat eavesdropping equipment such as phone line taps, phone line recorders, remote activated devices on the phone line, and other listening devices.

Background:
It has been estimated that one in ten phones in the corporate world have been tapped, listened to, and in many cases, recorded. The information obtained from illegal taps seriously damage companies, people, careers, and loved ones.

Would you feel comfortable letting a third party hear your discussions? If your answer is no, then the TRN-100 is the simple solution to a very real problem facing all businesses and governments today.

How it works:
-The TRN-100 acts as an information net which buffers all conversations on your phone line from eavesdropping devices.

-By creating a unique sub-audible wave, the system effectively alters the sound of your voice to a garble which cannot be deciphered by the receiving end of a telephone tap.

-Unlike older systems, the advanced phase shift modulation of the TRN-100 does not create a white-noise background but rather an inaudible interference which will not affect the clarity of your conversation.

Countering Eavesdropping:
In any eavesdropping situation it is important to discover the characteristics of the phone tap as well as the habits of those in control of it. These patterns can often lead you to the device itself and in many cases to the operator. For this purpose, the TRN-100 employs a digital readout of line parameters which allows you to monitor sudden changes in your line activity.

These changes would be a clear indication that someone was listening to your conversation. Once a schedule of tap activations has been established, the eavesdropper can be identified by feeding him strategic information which may force him into the open.

The TRN-100 uses standard phone jacks and can be ready for use in five minutes. With the press of one button, the system functions automatically and secures your phone conversations. All devices on the line will be nullified and any recording made of the conversation will be non-communicative.

Conduct your business with confidence. The TRN-100 will guard your privacy from the invisible threat of electronic eavesdropping in a way that is simple, quick and easy. Turn your phone into an information fortress with the TRN-100 and make your conversations private ones.

$1,200




Image
Digital & Analog Recorder Nullifier Model TRN 2000

How do you protect your conversations from being recorded? How do you control who hears what you say, and prevent others from hearing recordings of your words?

The TRN-2000 is a high tech solution to countering digital and audio recording systems.

Features:

* Turns Voice Recordings into Noise
* Built into a Briefcase for Portability
* Remote Control Activation

The TRN-2000 is a portable tape & digital recording suppressor designed to conceal a conversation. As opposed to "white noise" boxes which are generally used in reception areas to prevent people from listening in to meetings being held in adjoining rooms, here is technology that turns anyone's recording of your meetings, business negotiations, and/or personal disclosures into generated noise signals instead of talk.

Built into a briefcase, the TRN-2000 operates in both mobile and stationary modes. The TRN-2000 can be carried to any business gathering, from conference rooms to boardrooms to restaurants. It also comes with remote control for off site activation.

$6,000




Image
Terrorist Trapâ„¢ VIP 16 Jamming System

Designed to monitor radio environments, the Terrorist Trapâ„¢ VIP-16 will detect unauthorized transmissions, and will generate spot jamming signals to prevent communication transmissions of unauthorized radio frequencies.

Terrorist Trap™ VIP-16 is a countermeasure system that searches for transmitting devices in the frequency range of 20 to 960 MHz. (up to 1950MHz – upon customized request).
This system will not only detect radio-controlled bombs transmissions, the weapon of choice for most terrorists, but also will jam that signal with pin point precision.

To identify a suspect transmission and simultaneous generation of spot and barrage jamming. Area of operation – not less than 100 m. Fast scan rate. Principle of operation (standard method of operation).

Once an operator enters the operating mode by specifying frequency bands where they believe the Radio Controlled Improvised Explosive Devices are expected, 2 portions of each transmitter frequency sub band can be assigned.

Once the system is set in Automatic operation the receiver scans the assigned frequency and its sub banks at 1500 MHz per second. If a radio signal is detected as a possible RCIED ( based on a database of possible signals ) the response spot jamming is formed in the background of barrage jamming which is transmitted through the whole frequency band.

The reaction time is 0.025 sec System. The system is comprised of a Man Machine Interface control unit utilizing a lap top, PC running Windows software, Mission control software, transmission modules, RF power amplifiers, and Antennas.

$8,500





Image
Cellular Surveillance & Cell Phone Jammer Model PH-3000

The PH-3000 can block unauthorized cellular phone operation, nullify unauthorized data transfer, and disable audio & video monitoring data transfer via cell phone.

The PH-3000 helps protect home, business, hotel room, conference room, and vehicle from privacy invading cellular phones and surveillance equipment such as bugs and cellular transmitters.

Unlike other cellular block equipment, the PH-3000 is a multi-jamming system, and has the ability to disable cellular phones in the following standards:

AMPS standard operating at 869-894 MHz

GSM standard operating at 925-960 MHz

DCS standard operating at 1805-1880 MHz

ETACS standard operating at 916-949 MHz

Ideal jamming takes place in room environments that are 5 to 20 meters wide, yet the PH-3000 can also work beyond rooms. As a cellular jammer, the effectiveness of the PH-3000 depends upon:

1) The physical placement of the unit.

2) The environment that the subscriber's terminal is being used in.

3) The location of nearest cellular base system.

Should any of these 3 factors effect the performance of jamming, simply moving the location of the PH-3000 can help compensate and improve jamming.

$2,500





Armor & Personal Security

Armored Cars, Armored Vehicles, Armoring Kits, and Body Armor represent the forefront in personal protection.

When people find themselves at the wrong place, at the wrong time, in unsafe environments or situations, it helps to be prepared for the worst.

SITG Personal Security Engineers help perfect Armored Vehicles and Armored Cars so VIP and Law Enforcement can survive under hostile conditions. Bullet resistant cars or bullet proof cars represent the primary facet of personal protection. Secondary protection involves bullet resistant clothing also known as bullet proof vests as well as protection for carrying money and valuables.




Image
Anti-Theft Briefcase Model SB-100

The SB 100 is a customized anti-theft briefcase. SB 100 briefcase models deter theft by:

Loud Alarm siren features
Electric Shock features
Both features have a strong affect on any would be thieves who dare to grab your briefcase. Both features may be activated by remote control, or by a built in motion sensor.

SB 100 cases may be customized within a leather briefcase, or an executive nylon case. SB 100 cases may come with single Alarm or Dual Alarm and Shock features (standard and custom cases are designed at our factory).

The SB 100 safeguards your valuables and / or vital documents.

$500




Image
Body Shield Ballistic Clothing for Security Guards

The Body Shield is a bullet resistant vest. It can be worn under a shirt or jacket. It is made to protect the user against bullets according to NIJ standards Level IIIA.

The Body Shield is a heavy duty, heavy weight, bulky vest. It is very dense, and generally used for personal safety in dangerous environments. Favored by security guards, the Body Shield is an obtrusive vest that may be worn under clothing and normally appear to have a bulky frame, demonstrating that the user is wearing heavy duty armor underneath.

The Body Shield comes in Large and Extra Large sizes.

The Body Shield is generally made of Kevlar. It weighs approximately 5 1/2 - 7 lbs.

The Body Shield covers approximately the front and back of the user (with a minimal partial side coverage).

$800




Image
Window Shield

SECURE-A-GUARD The Most Advanced Security Film Available
Fortifies Windows with 3-Ply Polyester Compound
Special Adhesive Adds Anti-Aging and Ultraviolet Light Protection
Completely Clear Vision from Any Angle
The Secure-A-Guard Window Shield will bewilder thieves and vandals. Amazingly, they can break the glass but can't get through - it takes too long!

Smash and grab burglars depend on quick entry and escape before the police arrive. 10 mil Secure-A-Guard glass makes their mission impossible.

An excellent addition to your security system - or make it your primary window protection. While you sleep your products and possessions are secured.

No-one expects earthquakes, hurricanes, or flying debris from extreme weather conditions, or once-in-a-lifetime impact incidents with windows. Yet they can cause damage - even death - in an instant.

Protect life and property with 10 mil. Secure-A-Guard protection. Have you ever walked into a sliding glass door? Collisions with glass can cause serious injury. Most shards of broken glass actually adhere to the 10 mil coating whether the damage comes from fire, explosives, natural disasters, unpredictable accidents, or children at play.

The Secure-A-Guard Window Shield helps keep the glass in one place. Windows treated with the 10 mil. coating won't be toxic or contribute to a fire. It's self extinguishing and won't break down below 500 - 509øF.

A Small Business Administration study reported that 64% of all thieves gain entry by breaking glass. Both homes and businesses are vulnerable to damage and loss. Now, with 10 mil. Secure-AGuard Window Shields fortifying your windows, foul play can be effectively discouraged.

By installing Secure-A-Guard Window Shields, you protect your family, employees, and property from danger with an invisible and impenetrable shield.

Price to be determined on an individual basis based on customers need.




Image
Bullet Proof Car Kit

Automobile Bullet Proofing Kits for In-Country Installation SITG is proud to announce the availability of armor kits for in-country installation.

Due to exorbitant import taxes or outright restrictions on the importation of fully armored vehicles, we at SITG have mastered the technology of shaping armor to the vehicle instead of the vehicle to the armor, using the lightest weight materials available. This allows ease of installation and a more original looking vehicle.

Using our system will result in lower cost armoring by lowering the import duties as well as eliminating the cost of shipping a vehicle between countries. SITG only uses materials that have been tested and certified by independent laboratories.

We guarantee all materials against defects and certify the performance for all materials supplied. 80-90% of terrorist attacks occur while the victims are traveling by automobile. A terrorist's most prolific weapon is fear... Eliminate fear.

Especially at risk are high profile targets such as diplomats, religious leaders, industrialists, and corporate executives. Our armored sedans, limousines, four-wheel drive, and other vehicles have been protecting the lives of clients and their families throughout the world for more than a decade.

We have provided armored vehicles to Presidents, Government officials, Presidential candidates, Senators, Governors, businesspersons, industrialists, and even the Pope himself.

The name SITG is very well recognized and received in the industry. The transparent armor used in the windows consist of dense ballistic glass laminated to a tough inner spall shield of resilient polycarbonate. This composite is similar to that used in military jet canopies and will take multiple hits from any handgun on the streets today. The lightweight, opaque armor used in the floors, doors, and headliner was developed to protect helicopter pilots in combat with the ability to soak up and dissipate the energy from multiple bullet strikes. Because it is molded to the contours of the car body, the fit is perfect and replacement is easy.

The SITG Do-It-Yourself Kit
The following kit can be offered to a client who resides in a country where importation of the armored passenger vehicle is prohibited by governmental regulation or by exorbitant import duties. SITG can state that this kit will defeat .99 hand guns, .38 special, and lesser ballistic threats if installed behind the existing automobile glass and/or the existing automobile body. SITG can offer no liability, warranty, or guarantee as to the end user application of the armor as it is applied to the automobile as far as total coverage is concerned. We can warranty and guarantee that the armor provided will defeat those declared levels tested according to our testing procedures.

Each kit will come with installation instructions, brackets, fasteners, adhesives, and other material for easy installation. For an additional cost, SITG will send a team of our trained technicians to install materials sold. No guarantee is given on installation unless work is performed by SITG .

$100,000




Image
SITG BULLET PROOF CARS

SITG can refit your own car or custom build a new car; any make, any model; to be virtually Impenetrable to attack.
The outward appearance remains completely unchanged, completely inconspicuous.

1. Transparent bullet proof glass is inserted In all windows. It will protect against up to a .30 caliber carbine. 7.62 nato, and even against instruments such as hammers. bats & hatchets.

2. The entire car is insulated with a revolutionary bullet resistant fabric that's super lightweight and stronger than old fashioned steel reinforcement.

3. Flip-down gun portholes allow you to return fire through the outer layer of the car for self-defense.

4. An undercoating is added to help repel the shock and effects of a land mine, grenade, and other explosive charges.

5. Steel reinforced tires wont deflate when they are first punctured by a bullet, and a special wheel roller can be added in the event that the tire eventually deflates (Run Shot Tires).

6. A hidden tear-gas system can be activated to immobilize attackers.

7. An oil slick emission system can help deter followers with a spill of 20 gallons of oil.

8. The gas tank is enveloped with bullet resistant fabric (as is the battery) to protect against explosion.

9. An emergency oxygen unit can be supplied for cases of smoke or gas inhalation.

10. Reinforced ram bumpers aid when defensive driving techniques are put into use.

11. A cloud of smoke can be released to decrease visibility of the target victim.

12. 600,000 volts can be delivered to anyone attempting to break into the vehicle.

13. Front and rear of the car is equipped with 1,000,000 candlepower lights. When activated, they deter following and drastically decrease target visibility.

Also included:


Built in tracking transmitter allows the car and its passengers to be found in the event of a kidnapping.

An ultra sensitive bomb sniffer can be used to investigate suspicious packages or other items.
Remote start allows you to start the car from a safe distance in order to detonate any ignition controlled explosives.

Hand free infrared goggles can be used while driving in order to see clearly through smoke, gas, fog or on unlit roads.

$350,000 per vehicle – includes delivery charge




SITG can deliver any of its products to anywhere in the continental United States and can send our team members to any location within the continental United States to meet with you regarding your security needs.

_________________
Image
Captain Of The:
Image
Bio/Bank


Top
 Profile  
 
PostPosted: Tue Feb 05, 2008 10:55 pm 
Offline
Cives
Cives
User avatar

Joined: Thu Jan 24, 2008 11:02 am
Posts: 316
Security Intelligence Technology Group as no opened its doors to the public and we are officially open for business.

_________________
Image
Captain Of The:
Image
Bio/Bank


Top
 Profile  
 
PostPosted: Fri Mar 07, 2008 3:41 pm 
Offline
Plebeian
Plebeian
User avatar

Joined: Thu Dec 20, 2007 7:43 pm
Posts: 629
[OOG: Role playing as NPC Felix Fernandez]
Image

[OOG: Purchase was approve by Joey Mags]

Domino’s Lincoln pulled up to the building. It was a known CCS establishment. Totally legit though, Domino was making a purchase. Of course he was not about to enter this little frickus without chest protection. What better business to buy them from then one run by the family. The engine was killed and Felix climbed out sunglasses firm on the bridge of his nose. He walked inside the place not really remembering to remove the glasses. It was indeed plash the show room was something to behold. There were small stations throughout showing off the latest in security technology along with other assorted protection devices. A young guy walked up looking Felix up and down. ”May I help you?”

Felix nodded and slid his glasses off his face and looked the man in the eye. ”I’m here to pick up an order for Domino Berelli…” The guy nodded and asked if Felix would wait a moment. He walked away and disappeared behind a staff only door. Felix too that time to look over the bug locating devices and marvel at the technology that had come out since his last purchase. Shit, now a days they could find anything planted any where. About five minutes after leaving a different guy accompanied the younger sales person. He looked like a manager or supervisor. Felix prepared himself for the worst. ”Sir I wanted to come out and personally let you know your order is ready and if you would be as kind as to pull your vehicle up to one of our loading docks we would be more than happy to load it up for you."

Felix smiled and gave the man a nod. ”No problem, so you want I should pay now?” The well dressed man waved his hand towards the staff only door and moved out of the way. ”Absolutely sir, please follow Jake here. He will get you squared away with a receipt.” Felix followed to a small office just inside the staff only door where Jake sat offering the Syndicate associate a seat. ”How will you be paying for that sir?” Felix whipped out a wad of cash that was given to him by Domino himself. ”Six large right?” the kid looked up at the wad and his mind began to wander on where exactly it came from. It was no secret that he was there to buy thirty bullet proof vests, so it was indeed safe to assume they were not exactly law enforcement. None the less money was money and cash was for sure king. ”Yes, sir…”

The money was placed on the table and Felix stood up, the invoice was put in hands and he left the office. Moments later he was pulling Dom’s Navigator up to the dock where two large cardboard boxes sat. Once they were loaded Felix tipped the two guys who had the most confused look on their face. They must have never been tipped before. Either way Felix was gone and on his way back to the Blagio. Upon arrival he gathered several men who unloaded enough to outfit the men present. Once done, Felix delivered the rest to the warehouse then came back to the Club.

[OOG: I am purchasing 30x Bullet Proof Vests.]

_________________
Image
Image
Bio/Bank
Cocaine - Half Ounces Available, $800 Ounces, and Negotiable Kilos
Weapons - Prices vary, contact for detials

Quote:
I have all the characteristics of the human being, flesh, blood, skin, hair. But not a single clear identifiable emotion, except for greed and disgust… There are no more barriers to cross. All I have in common with the uncontrollable, the insane, the vicious, the evil, all the mayhem I have caused, and my utter indifference toward it I have now surpassed. My pain is constant and sharp, and I do not hope for a better world for anyone. In fact, I want my pain to be inflicted on others; I want no one to escape. But even after admitting this there is no catharsis. My punishment continued to elude me and I gain no deeper knowledge of myself. No new knowledge can be extracted from my telling, this confession has meant nothing…


Top
 Profile  
 
PostPosted: Fri Mar 07, 2008 6:29 pm 
Offline
Caesar (Owner)
Caesar (Owner)
User avatar

Joined: Thu Dec 20, 2007 4:17 pm
Posts: 2951
Location: Earth
Rank: Capo de tutti Capo
Bursting through the doors a white pasty tattooed motherfucker with a gun rampages to the register, aiming the gun and speaking "GIMME ALL YO DAMN MON-E!" The long snake tat on his arm lead right up to his wife beater and then his ear, his jerky movements and trigger happy nature at the pleasure of whomever was behind the register. His gun, just a simple SNS (Saturday Night Special).

-React.

_________________
Image
Help Me Rule The World!

Anyone who donates will be put on a "Donator Page" to honor their contributions. If you want to make a donation over Paypal please PM me.


Top
 Profile  
 
PostPosted: Fri Mar 07, 2008 10:14 pm 
Offline
Plebeian
Plebeian
User avatar

Joined: Thu Dec 20, 2007 7:43 pm
Posts: 629
Jackuul wrote:
Bursting through the doors a white pasty tattooed motherfucker with a gun rampages to the register, aiming the gun and speaking "GIMME ALL YO DAMN MON-E!" The long snake tat on his arm lead right up to his wife beater and then his ear, his jerky movements and trigger happy nature at the pleasure of whomever was behind the register. His gun, just a simple SNS (Saturday Night Special).

-React.



When the call came in little Joey was sitting behind his desk preparing the invoice. ”Yes Mr. Berelli the order is being shipped out right now. We have men in route to install and train on using your new surveillance system.” The phone was hung up and the young salesman went about his business. Once the document was printed he moved to the front desk to collect it and move on to the back and put it with the order that was being loaded on to the Truck. As the door closed to the warehouse Joey could hear someone yelling inside the sales room. He stopped and turned back to listen in, someone was robbing the place. Naturally Joey was not about to go back in to that showroom, he was a pussy through and through. Instead he looked for some one to tell.

Mr. Berelli’s order was pulling out of the shipping bay as Joey reach that area it was too late. The next person was the stockers in the back of the stock warehouse. Inside the truck one of the installers was driving and another was sitting next to him. Both men were discussing the previous night’s piece of pussy. Inside the showroom the even younger counter help was about to piss his pants as he handed over the cash in the drawer. The size of the pistol made no difference the young college student had never had a gun shoved in his face before. The money had been exchanged and the pistol wielding madman mad it for the door. Down and out on his luck he hand no car, no fucking home for that fact.

On foot the guy started to run down the sidewalk. In the truck heading towards the front exit on its way to the Blagio the two men were so engaged with the discussion about the tits the young woman who was violated the night before had they did not se the robbery suspect jump from the curb and run out in front of them. Pistol still in hand the young had no clue until his head was centimeters away from the grill of the truck that he was about to become a hood ornament. It wasn’t until the truck hit what they thought was a speed bump they stopped. ”There’s no speed bumps here…” Climbing out they noticed the robbery suspect’s feet hanging out from under the gas tank of the large Truck. He was dead, seeing what happened Joey jumped from the shipping platform he ran out to join the amazement.

Requests:
The purchase of:
[1x] - Walk Through Weapons Detector Model DP-3 ($25,000)
[10x] - Micro Stealth Surveillance Camera Model Spy Camâ„¢ B ($200)
[1x] - Digital Video Monitoring, Recording & Transmission System (DVR) UB ($1,200)
The accidental death of the robbery suspect.
And that after the police report and all, the installers make the trip to the Blagio and install the security system.
The return of the cash from the register back to the register.
No one at the Security Agency be held accountable for the death of the low life.

_________________
Image
Image
Bio/Bank
Cocaine - Half Ounces Available, $800 Ounces, and Negotiable Kilos
Weapons - Prices vary, contact for detials

Quote:
I have all the characteristics of the human being, flesh, blood, skin, hair. But not a single clear identifiable emotion, except for greed and disgust… There are no more barriers to cross. All I have in common with the uncontrollable, the insane, the vicious, the evil, all the mayhem I have caused, and my utter indifference toward it I have now surpassed. My pain is constant and sharp, and I do not hope for a better world for anyone. In fact, I want my pain to be inflicted on others; I want no one to escape. But even after admitting this there is no catharsis. My punishment continued to elude me and I gain no deeper knowledge of myself. No new knowledge can be extracted from my telling, this confession has meant nothing…


Top
 Profile  
 
PostPosted: Fri Mar 07, 2008 10:30 pm 
Offline
Plebeian
Plebeian
User avatar

Joined: Thu Dec 20, 2007 7:43 pm
Posts: 629
[OOG: Oh, sorry Joey gave whoever could do it the permission to defend for him.]

_________________
Image
Image
Bio/Bank
Cocaine - Half Ounces Available, $800 Ounces, and Negotiable Kilos
Weapons - Prices vary, contact for detials

Quote:
I have all the characteristics of the human being, flesh, blood, skin, hair. But not a single clear identifiable emotion, except for greed and disgust… There are no more barriers to cross. All I have in common with the uncontrollable, the insane, the vicious, the evil, all the mayhem I have caused, and my utter indifference toward it I have now surpassed. My pain is constant and sharp, and I do not hope for a better world for anyone. In fact, I want my pain to be inflicted on others; I want no one to escape. But even after admitting this there is no catharsis. My punishment continued to elude me and I gain no deeper knowledge of myself. No new knowledge can be extracted from my telling, this confession has meant nothing…


Top
 Profile  
 
PostPosted: Mon Mar 10, 2008 9:10 am 
Offline
Plebeian
Plebeian
User avatar

Joined: Thu Dec 20, 2007 7:43 pm
Posts: 629
Ok, I am adjusting my cash for the purchases in my rp. I still want it all even though the story is not graded yet.

_________________
Image
Image
Bio/Bank
Cocaine - Half Ounces Available, $800 Ounces, and Negotiable Kilos
Weapons - Prices vary, contact for detials

Quote:
I have all the characteristics of the human being, flesh, blood, skin, hair. But not a single clear identifiable emotion, except for greed and disgust… There are no more barriers to cross. All I have in common with the uncontrollable, the insane, the vicious, the evil, all the mayhem I have caused, and my utter indifference toward it I have now surpassed. My pain is constant and sharp, and I do not hope for a better world for anyone. In fact, I want my pain to be inflicted on others; I want no one to escape. But even after admitting this there is no catharsis. My punishment continued to elude me and I gain no deeper knowledge of myself. No new knowledge can be extracted from my telling, this confession has meant nothing…


Top
 Profile  
 
PostPosted: Tue Mar 11, 2008 12:23 pm 
Offline
Caesar (Owner)
Caesar (Owner)
User avatar

Joined: Thu Dec 20, 2007 4:17 pm
Posts: 2951
Location: Earth
Rank: Capo de tutti Capo
The crackhead is dead.

_________________
Image
Help Me Rule The World!

Anyone who donates will be put on a "Donator Page" to honor their contributions. If you want to make a donation over Paypal please PM me.


Top
 Profile  
 
PostPosted: Fri Mar 21, 2008 10:51 pm 
Offline
Cives
Cives
User avatar

Joined: Thu Jan 24, 2008 11:02 am
Posts: 316
Now that I had things set up in Chicago, it was time for me to start addressing security issues for our operations. This would be easy enough to manage being that I am an executive of a security technology company. I picked up my cell and contacted the dispatch manager.

Joey: "Yeah hi Tom, this is Joey....how's everything going? Good...glad to hear it. Listen, I am in Chicago and am opening some small businesses up here and I need to install soem security measures for one of them. I want to use the business as a demo site for other potential clients. I am going to need video surveillance equipment, a Terrorist Trapâ„¢ VIP 16 Jamming System, Portable Bomb Jammer VIP-2, three bullet proof vests, bullet proof protective window film and one of the H2 SITG Armored vehicles so I can demo it to a potential buyer. I'll need you to send up an installation team immediately to install the equipment as well. Yes....put everything on the company expense report and Ill square up once I am back in town.....alright....that sounds perfect.....we'll see our team then...thank you."

I gave Tom the address of where the equipment was to be delivered and installed, said a few more words and hung up.

_________________
Image
Captain Of The:
Image
Bio/Bank


Top
 Profile  
 
Display posts from previous:  Sort by  
Forum locked This topic is locked, you cannot edit posts or make further replies.  [ 12 posts ] 

All times are UTC - 7 hours [ DST ]


Who is online

Users browsing this forum: No registered users and 1 guest


You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum

Search for:
Jump to:  
cron
Powered by phpBB® Forum Software © phpBB Group