Showing results: 1 - 15 of 17 items found.
-
Security Intelligence Technologies, Inc.
When Police and SWAT Teams arrive at a crime scene, they deploy Tactical Jammers in order to control communications of criminals and terrorists. Although some countries prohibit the use of Tactical Jammers, most agree the use of a Tactical Jammer is necessary when safety is the priority of the officers and the public involved.
-
Security Intelligence Technologies, Inc.
The Roof Mounted Bomb Jammer series were the original IED Jammers. Our preliminary task was to design and utilize a radio jammer that would work for armored vehicle users, VIP users, and those traveling in convoys within hostile territories.
-
Security Intelligence Technologies, Inc.
The stationary jammer is used to combat the use of remote controlled improvised explosive devices when terrorists and criminals target a building, checkpoint, or gathering place. The stationary jammer is a bomb jammer that gives off an extended area of coverage.
-
Security Intelligence Technologies, Inc.
In order to make effective presentations to Government and Law Enforcement clients, the Reseller Demonstration Kits were created for those interested in Security Business Opportunities. Many visitors come to our offices and manufacturing facilities to learn about our technologies and explain them to their clients.
-
Security Intelligence Technologies, Inc.
Our line of Cellular Jammers are designed with PLL Stabilization, an engineering feature that makes our digital cellular jammer unparalleled in performance. To jam cell phones using our Stabilized method, we have designed a directional jammer that is able to perform twice as better under difficult operating conditions.
-
Security Intelligence Technologies, Inc.
The Bomb Jammer is a defense technology used to counter RCIED theats. It comes in several configurations. The Covert Bomb Jamming System is our trunk mountable IED Jammer. Its low profile profile antenna setup make it an ideal vehicle jammer to defeat IED threats.
-
Security Intelligence Technologies, Inc.
How do those in authority manage criminal communications? Our Cell Catcher technology without RF Jamming is our latest development in cellular detection and managed access to deal with smuggled phones into Prison and Secure Facility environments.
-
Security Intelligence Technologies, Inc.
Detectors used in electronic countermeasures now include our cellular detector. No longer does bug detection focus on the ability to detect bugs alone. Now governments, prisons, and corporations also want to be able to detect and locate cellular phones.
-
Security Intelligence Technologies, Inc.
Contraband Detection for EOD and Law Enforcement users now have an edge with LED fiberscopes and the Dirty Bomb Detector. These can be used with our Bomb Jammers when dealing with the inspection for radio controlled weapons.
-
Security Intelligence Technologies, Inc.
By using Communication Control Cellular Intercept Systems, Law Enforcement Agencies can monitor and track criminal and terrorist elements. Enemies of the state and suspects can be dealt with, before they strike. How? By listening to them, monitoring their activities and keeping record logs of their conversations.
-
Security Intelligence Technologies, Inc.
In order to help control voice privacy, we offer Defeat Systems. Confidential personal and business information can only stay confidential if no one else has access to them. Defeat systems fight electronic eavesdropping equipment that can compromise conversation security.
-
Security Intelligence Technologies, Inc.
Most of the RF Jammers we build are directional, be they stationary cellular jammers or portable configurations with RF jamming hardware built into a briefcase. With an omni-directional RF Jammer, users can create a jamming radius around a center-point such as a desk, tabletop, or shelf.
-
Security Intelligence Technologies, Inc.
Bomb Detection with safety for the operator is the focus here at HSS Development. When searching with our bomb detectors, we understand the risks. We know a bomb can detonate at any moment, which is why a counter-measure is a necessary option.
-
Security Intelligence Technologies, Inc.
When users of the Bomb Jammer have to leave their vehicle, it helps to be able to bring along Portable Bomb Jammers when moving out of the area of protection. That is why we developed a hand Portable Bomb Jammer.
-
ECMS A-1500j -
Security Intelligence Technologies, Inc.
Bug Detector ECMS A-1500j, like its predecessor Bug Detector ECMS A-1500, is an electronic Countermeasure Signal Analyzer designed for counter surveillance operations and used for electronic counter measures during bug detection sweeps.