Products

SECURITY, INTERCEPTION & SURVEILLANCE SYSTEMS

Security, Interception and Surveillance Systems

1. Passive WiFi Monitoring System

Product Name:

Passive WiFi Monitoring System for Interception of one 2.4/5.8 GHz WiFi Network  for Interception of one 2.4/5.8 GHz WiFi Network Consisting of following : • WiFi Receiver Unit • Receiver Control andProcessingModule • HTTPS/SSL

System Description and Usage:

Designed for Interception and reconstruction of IP traffic from both unsecured and secured WiFi networks.
Supports 2.4 GHz or 5 GHz WiFi frequency bands.
Uses proprietary technology to obtain access of targeted network without waiting for new user to connect.
Can break WEP, WPA and WPA2 secured WiFi networks.
Capable of working independent of firewall, antivirus and security updates.
Can intercept the traffic from target devices using different OS like Mac OSX, Windows, iOS, Android, Blackberry, Linux etc.
Single unit to intercept secured (HTTPS/SSL) and unsecured networks.
Can load the legal certificate issued by certificate certifying authorities and also has inbuilt root certificate for Intercepting and Reconstructing HTTPS Traffic.
Can intercept , decode and display the Targets login credentials from the following and many more
Email: Gmail, YahooMail, GMX Mail, Yandex, Mail.ru, Zoho, Country Specific Emails etc
Social Networking: Facebook, Twitter, LinkedIn etc.
Messenger: Skype , Facebook Chat etc.
Can intercept and automatically reconstruct the browsed webpages in the same language, on which it is browsed on the target system.

Application/End User:

Counter Terrorism National Security Narcotics Control.

2. Active Wifi based Android / iOS Intrusion and Device Data Extraction

Product Name:

Active Wifi based Android / iOS Intrusion and Device Data Extraction.

System Description and Usage:

Tactical Form Factor, Zero Click ,100% un-detectability and no trace back, makes this system one of the best Intrusion application to extract all Cloud based information / social media handles  (Facebook , Twitter etc.)/ emails / target geo location / encrypted messaging (Whatsapp / Telegram / Signal / Wechat / Threema etc.) Web pages, Usernames and passwords, All called and Calling phone numbers / SMS , contact list Etc. Target can be in any part of the world. Remote intelligence will be securely sent to the operator without any trace back.

 

Application/End User:

Counter Terrorism

Military Intelligence

National Security

Situational Intel

Narcotics Control

3. Wideband Passive GSM Monitoring System

Product Name:

Wideband Passive GSM Monitoring System

System Description and Usage:

GSM cell phone intercepts have been one of the key systems utilized by Intelligence agencies for Passive Intel acquisition. Available GSM Intercept technology always had a drawback on coverage area as well as number of targets intercepted. Shoghi’s new Wideband GSM intercept system is a Big GAME Changer in this domain. With a coverage range of upto 50 kms, interception of all 1024 GSM sessions, 128 simultaneous call monitoring from 30 BTS , Real-time Decryption, Direction Finding, etc. makes this an absolute must have technology for all Intelligence Community.

Application/End User:

Counter Terrorism National Security Narcotics Control

4. Passive GSM Monitoring System

Product Name:

Passive GSM Monitoring System  A5.1 (2G & 2.5G Network Interception Device)

Configuration: 8 Duplex Channels (Dual band- 900 MHz / 1800MHz or 850 /1900MHz)

  • A5.2 / A5.0 Real Time Decryption

System Description and Usage:

Passive CDMA off-the-air Monitoring System  is designed to monitor Voice, SMS and service channel information from CDMA networks working on IS-95A, IS-95B and CDMA2000-1X technologies. It supports CDMA 450 MHz, 850 MHz and 1900 MHz frequency bands. System is capable of intercepting and recording upto 4 target phones simultaneously from 4 different service providers. The capability of the system in terms of monitoring more than 4 mobile phones simultaneously can be increased by cascading multiple systems.

Application/End User:

Counter Terrorism National Security Narcotics Control

5. Semi Active GSM Monitoring System

Product Name:

Semi Active GSM Monitoring System

Configuration: 4 Duplex Channels + 1 Paging Channel (Frequency Band- 900MHz or 1800MHz)
• A5.2 / A5.0 Real Time decoding. Vehicle Integration Kit
• Simultaneous Monitoring of 4 Targets
• 3G GSM Interception Module

  • 4G GSM Interception Module
  • A5.1 Decryptor

• Vehicle Integration Kit

System Description and Usage:

The Semi Active off-the-air GSM Monitoring System  is designed using cutting edge technology to intercept the Voice, SMS and GPRS data from GSM 2G, 2.5G,3G and 4G/LTE cellular networks. The system support standard GSM, 3G and 4G/LTE frequency bands including 850/900/1800/1900 MHz.The system is equipped with state of art A5.1 hardware decryptor and A5.2 software decryption module to decrypt the intercepted communication in real time. Depending upon the customer requirement, system can be configured to intercept several GSM phones from multiple GSM service providers simultaneously. The standard configuration of the system can monitors 12 phones simultaneously from 5 different service providers.

Application/End User:

Counter Terrorism National Security Narcotics Control

6. Unified Satellite Phone Intercept

Product Name:

Unified Satellite Phone Intercept, Signal Processing and Archival System for THURAYA / ISAT PHONE PRO (Inmarsat) and IRIDIUM Satellite Networks.
The system consists of 3 sub-systems for
• Thuraya Interception (32 channel)  400 Km
• ISAT Phone Pro Interception (32 channel) 700 Km
• Iridium Interception (32 channel) 2000 Km
• Along with RF+ IT infrastructure and Unified Database management application

System Description and Usage:

One Single Platform for intercepting Major Satellite hand Phone devices , like THURAYA / IRIDIUM. The system comes in a tactical Form Factor for easy transportation and deployment. It provides an Effective interception range of 30 – 400 Kms , 32 Simultaneous Receiving channels, Target Geo-location makes it the most sought after tool for collection of Actionable Intelligence.

Application/End User:

Counter Terrorism
Military Intelligence
National Security
Situational Intel
Narcotics Control
Border Security
Coastal Surveillance

7. Unified Satellite Phone Monitoring System : THURAYA / IRIDIUM

Product Name:

Unified Satellite Phone Monitoring System : THURAYA  / IRIDIUM   Subsystem:          The system consists of 2 sub-systems for
• Thuraya Interception (32 channel)  400 Km
• Iridium Interception (32 channel)  2000 Km
• Along with RF+  IT infrastructure and Unified

• Database management application

System Description and Usage:

One Single Platform for intercepting Major Satellite hand Phone devices , like THURAYA / IRIDIUM / ISAT PHONE PRO. The system comes in a tactical Form Factor for easy transportation and deployment. It provides an Effective interception range of 30 – 400 Kms , 32 Simultaneous Receiving channels, Target Geo-location makes it the most sought after tool for collection of Actionable Intelligence.

Application/End User:

Counter Terrorism
Military Intelligence
National Security
Situational Intel
Narcotics Control
Border Security
Coastal Surveillance

8. Kalypso Instant Messaging Application Server

Product Name:

Kalypso Instant Messaging Application Server. Per server can handle up to 500 Subscribers. All internet connectivity for server is as per actuals and is the responsibility of the client. All security mechanisms to be implemented on the server and Internet security has to be provided by the client.

System Description and Usage:

Military Grade Encrypted Messaging (Voice / Text / Video / File sharing etc.) with On Premises Server implementation and Customised Encryption for Enhancing  Secure communication for nations Military / Bureaucracy / Diplomats etc.

Application/End User:

Secure comms
National Security
Diplomatic Security
Military comms Security

9. Strategic Thuraya Monitoring System

Product Name:

Strategic Thuraya Monitoring System  – 2500 Km
7 Spot Beam L+C Band to provide up to 112 duplex calls

  • C & L band RF • 9.3 M C-Band Motorized Antenna
  • L&C Band Thuraya Signal Acquisition & Processing
  •  Thuraya Demodulator / Decryptor Controller
  • Hardware

System Description and Usage:

Country wide and Across border Thuraya communication Interception device with interception range exceeding 2500 kms with one setup. Multiple systems can be cascaded to cover the entire country and Border areas. The system can intercept more 200 channels simultaneously and provide Geo location and each handset for Immediate action.

Application/End User:

Counter Terrorism
Military Intelligence
National Security
Situational Intel
Narcotics Control
Border Security
Coastal Surveillance

10. Tactical IsatPhone Pro Monitoring System

Product Name:

Tactical IsatPhone Pro Monitoring System for up to 32 Channels consists of 700 Km

RF Subsystem: L-band RF

  • Flat Panel L-Band Antenna for IsatPhone Pro Uplink
  • Flat Panel L-Band Uplink Antenna for IsatPhone Pro Downlink
  • Demodulation, Decoding and Decryption

System Description and Usage:

Country wide and Across border Isat Phone communication Interception device with interception range exceeding 700 kms with one setup. Multiple systems can be cascaded to cover the entire country and Border areas. The system can intercept more 200 channels simultaneously and provide Geo location and each handset for Immediate action.

Application/End User:

Counter Terrorism
Military Intelligence
National Security
Situational Intel
Narcotics Control
Border Security
Coastal Surveillance

11. Netshield

Product Name:

Netshield – Effective web filtering in large networks, Content filtering solution nation wide                                                                        • VPN blocking
• Blocking VoIP calls

Blocking Whatsapp voice calls

  • Blocking pornography
  • Blocking Facebook posts
    • Blocking specific tweets
  • Blocking Facebook Messenger
    • Blocking VoIP calls
  • Web proxy blocking

System Description and Usage:

Innovative Countrywide Communication and Content Filtering Device for effectively blocking Encrypted Messaging  / VoIP / Social Media Sites / Pornography etc. in real time. Programmable by the User , the system can be remotely connected to command and control for effective on demand high bandwidth URL filtering.

Application/End User:

National Security
Situational Intel
Political Support
Network Security
Propaganda control

12. VSAT Interception System

Product Name:

VSAT Interception System

System Description and Usage:

Across Border surveillance capability to intercept Military / Diplomatic VSAT networks to achieve immediate Intelligence on Policy / Secret Information Flow for achieving Actionable Intelligence and Strategy planning. Single system to intercept all VSAT types and protocols

Application/End User:

Military Intelligence
National Security
Situational Intel
Border Security
Signal Intelligence

13. Remote Intrusion

Product Name:

Remote Intrusion on Android / iOS devices and Device Data Extraction.

System Description and Usage:

Strategic system to remotely infect and intrude on Target Mobile devices to extract all Cloud based information / social media handles  (Facebook , Twitter etc.)/ emails / target geo location / encrypted messaging (Whatsapp / Telegram / Signal / Wechat / Threema etc.) Web pages, Usernames and passwords, All called and Calling phone numbers / SMS , contact list Etc. Target can be in any part of the world. Remote intelligence will be securely sent to the operator without any trace back.

Application/End User:

Counter Terrorism
Military Intelligence
National Security
Situational Intel
Narcotics Control
Border Security
Cyber Intelligence

14. GSM Backhaul

Product Name:

GSM Backhaul Intercept System

System Description and Usage:

City Wide Passive GSM Intercept system for Across the border GSM Intelligence collection by interception Satellite Link between BTS and BSC. This provide city wide GSM traffic without positioning a tactical GSM interception device in that region.

Application/End User:

Military Intelligence
National Security
Situational Intel
Border Security

15. HF/VHF/UHF Interception System

Product Name:

HF/VHF/UHF Interception System

System Description and Usage:

Integrated Radio Monitoring system to intercept HF /VHF /UHF Military / Naval / Airborne Radio Communication (0.1Mhz – 18 Ghz) and Automated Digital Signal Decoding to provide Actual Voice and Data Traffic. Effective Direction Finding provides Geo- location of Radio Emitters.

Application/End User:

Military Intelligence
National Security
Situational Intel
Border Security
Signal Intelligence

16. C/Ku band Satellite monitoring system

Product Name:

C/Ku band Satellite monitoring system

System Description and Usage:

C/Ku Satellite Monitoring System is designed to intercept International/national telecom carriers, GSM A/Abis links and IP Carriers over satellite which are using C, Ku, X or Ka-Band. In order to reduce the manual effort and time consumed in the analysis of the carriers, system is integrated with Satellite Carrier Analysis module, which automatically performs the scanning on the selected spectrum and provide the list of carriers along with their payload type (i.e DCME, GSM or IP) and characteristics parameters. This provides great help to take decision for monitoring of the carriers of interest.

Application/End User:

Counter Terrorism
Military Intelligence
National Security
Situational Intel

17. Strategic ISAT Interception System- 2500Km

Product Name:

Strategic ISAT Interception System- 2500Km

System Description and Usage:

Country wide and Across border ISAT communication Interception device with interception range exceeding 2500 kms with one setup. Multiple systems can be cascaded to cover the entire country and Border areas. The system can intercept more 200 channels simultaneously and provide Geo location and each handset for Immediate action.

Application/End User:

Counter Terrorism
Military Intelligence
National Security
Situational Intel
Narcotics Control
Border Security
Coastal Surveillance

18. Iridium Interception System- 2400 km

Product Name:

Iridium Interception System- 2400 km

System Description and Usage:

Country wide and Across border Iridium communication Interception device with interception range exceeding 2400 kms with one setup. Multiple systems can be cascaded to cover the entire country and Border areas. The system can intercept more 200 channels simultaneously and provide Geo location and each handset for Immediate action.

Application/End User:

Counter Terrorism
Military Intelligence
National Security
Situational Intel
Narcotics Control
Border Security
Coastal Surveillance

19. Anti Drone System - Quadrcopter- 1-3 kms jamming range

Product Name:

Anti Drone System – Quadrcopter- 1-3 kms jamming range

System Description and Usage:

1-3 kms jamming range

Application/End User:

Counter Terrorism
National Security
Border Security
Coastal Surveillance

20. Anti Drone System- Military Application Detection range - 35- 50 Kms

Product Name:

Anti Drone System- Military Application Detection range – 35- 50 Kms

System Description and Usage:

Jamming Range – 15 kms
GPS Jammed: Gallileo / Glonass/ Compass/ Beidou
Direction finding of Drones / Triangulation / Location Finding on Map
Swarm of Drones can be jammed Simultaneously.. Max 50
Jamming elevation : 60 deg
Friend or Foe Application. Only Jamming Enemy drones
Continuos Search by Built In Radar system

Application/End User:

Counter Terrorism
Military Intelligence
National Security
Situational Intel
Border Security
Coastal Surveillance

21. Vehicular Convoy Jammer 3000

Product Name:

Vehicular Convoy Jammer 3000

System Description and Usage:

Can be deployed to protect military and
VIP team from the road-side remote
improvised explosive device (RCIED)
attack detonated by the terrorists. Operates in the frequency range of
20-3000 MHz covering VHF/UHF, GSM,
CDMA, UMTS, etc. Total output power can be up to 1500
watt.

Application/End User:

Counter Terrorism
Military Intelligence
National Security
VIP Protection

22. Vehicular Convoy Jammer 6000

Product Name:

Vehicular Convoy Jammer 6000

System Description and Usage:

Can be deployed to protect military and
VIP team from the road-side remote
improvised explosive device (RCIED)
attack detonated by the terrorists. Operates in the frequency range of
20-6000 MHz covering VHF/UHF, GSM,
CDMA, UMTS, etc. Total output power can be up to 1500
watt.

Application/End User:

Counter Terrorism
Military Intelligence
National Security
VIP Protection

23. 2G Intelligent Cell Phone Jammer

Product Name:

2G Intelligent Cell Phone Jammer

System Description and Usage:

Operator can Jam selective or all mobiles
from specific service provider or from
multiple service providers depending
upon the system configuration and
operational requirement for 2G

Application/End User:

Counter Terrorism
Military Intelligence
National Security
VIP Protection

24. 2G + 3G Intelligent Cell Phone Jammer

Product Name:

2G + 3G Intelligent Cell Phone Jammer

System Description and Usage:

Operator can Jam selective or all mobiles
from specific service provider or from
multiple service providers depending upon the system configuration and operational requirement for 2G + 3G

Application/End User:

Counter Terrorism
Military Intelligence
National Security
VIP Protection

25. 2G + 3G + 4G/LTE Intelligent Cell Phone Jammer

Product Name:

2G + 3G + 4G/LTE Intelligent Cell Phone Jammer

System Description and Usage:

Can be used for jamming of satellite phones operating on Thuraya, Iridium, Inmarsat, and Globalstrar in local region.
Designed to work on L-band by sending signals to satellite as well as to satellite phones.
Designed to paralyze the communication links between Satellite and Satellite Phones used by Army Divisions, Remote Solders in no GSM and radio coverage zone, Military and Civil Ships etc.
No reception of signal in satellite phones in the vicinity of the Jammer.
Equipped with specialized jamming module to provide effective jamming.
Can jam the multiple satellite phones in ”line-of-site”

Application/End User:

Counter Terrorism
Military Intelligence
National Security
VIP Protection

26. Satellite Phone Jamming System - ( Thuraya and Iridium)

Product Name:
Satellite Phone Jamming System – ( Thuraya and Iridium)

System Description and Usage:

Can be used for jamming of satellite phones operating on Thuraya, Iridium, Inmarsat, and Globalstrar in local region.
Designed to work on L-band by sending signals to satellite as well as to satellite phones.
Designed to paralyze the communication links between Satellite and Satellite Phones used by Army Divisions, Remote Solders in no GSM and radio coverage zone, Military and Civil Ships etc.
No reception of signal in satellite phones in the vicinity of the Jammer.
Equipped with specialized jamming module to provide effective jamming.
Can jam the multiple satellite phones in ”line-of-site”

Application/End User:

Counter Terrorism
Military Intelligence
National Security
VIP Protection

27. NIFTI Network Intelligence , Filtering and Target Identification In order to provide all the necessary tools to cope with the above challenges, an efficient Real Time Networking Analysis and Filtering

Product Name:
NIFTI Network Intelligence , Filtering
and Target Identification In order to provide all the necessary tools to cope
with the above challenges, an efficient Real Time Networking Analysis and Filtering
System Description and Usage:

Monitor & Filter Anti Government Propaganda
– Counter Terrorism
– Control Un-authorised Events
– Expose Fake Identities
– Political Violence
– Information Warfare
– Cyber Crime
– Organised Crime
– Facility and Special Event Security Identify the target / Geo Location / Remote Intrusion & Data extraction from the target device

Application/End User:

Counter Terrorism
Military Intelligence
National Security
Cyber Intelligence
Blocking and
controlling Anti Government Propaganda / Election Support

28. OSINT Open Source Intelligence and Target Profiling Network Intelligence , Filtering and Target Identification In order to provide all the necessary tools to cope with the above challenges, an efficient Real Time Networking

Product Name:
OSINT Open Source Intelligence and Target Profiling
System Description and Usage:

Real Time check on social media discussions.
The only system that can expose any phone number in the world, regardless of location, devices type, operating system, carrier, pre or postpaid etc.
The only system capable of exposing a target identity based on email addresses and social media profiles such as Facebook, Twitter, LinkedIn, Instagram, VK and more
Collects much more information about targets, compared to any other system, because our technology covers thousands of sources that are not web based
Application/End User:

Counter Terrorism
Military Intelligence
National Security
Cyber Intelligence
Blocking and controlling Anti Government Propaganda / Election Support in finding the emotions of people / voters

29. TV / DTH Jamming Systems

Product Name:
TV / DTH Jamming Systems
System Description and Usage:

Jamming TV channels in 400SqKm area to block any tv news/ programmes against Government

Application/End User:

Controlling Anti Government Propaganda / Election Support

30. Command and Control System

Product Name:
Command and Control System
System Description and Usage:

Unified security control and information processing Centre

Application/End User:

Counter Terrorism
Military Intelligence
National Security Cyber Intelligence
Blocking and controlling Anti Government Propoganda / Election Support

Let’s Get Started

Ready To Make a Real Change? Let’s Build this Thing Together!

× How can I help you?