Name: FinFisher, FinFly ISP, LIMS

Text:
••••
•••••
*: elaman
G

MAN
NEWSLETTERS 04 2010


• • • •
111 • • •

4t9: e 1aman
German Security Solutions

INTRODUCTION & INDEX

Dear Customers,
Our 2010 newsletters show a range of selected equipment from Elaman's capabilities in
the fields of Tactical & Strategic Surveillance and Monitoring Systems,which can operate
independently or within a system design.The equipment can be tested and demonstrated
upon request. We look forward to hearing from you.

INDEX
COMPANYPROFILE

2

EXHIBITIONS OVERVIEW 2010-2011

3

FINFISHER IT INTRUSION

4

STRATEGIC COMMUNICATIONS MONITORING SOLUTIONS

11

STRATEGIC COMMUNICATIONS MONITORING SOLUTIONS
COMMAND & CONTROLCENTER

18

TACTICAL COMMUNICATIONS MONITORING SOLUTIONS

21

TECHNICALSURVEILLANCE SYSTEMS -VANS/CARS

29

TECHNICALSURVEILLANCE EQUIPMENT

34

TECHNICALSURVEILLANCE EQUIPMENT
CMOEEQUIPMENT

43

DATARECOVERY,FORENSIC LABORATORY & ENCRYPTION

45

TECHNICALSURVEILLANCE COUNTER MEASURES

47

VIPSECURITYPRODUCTS

50

INTELLIGENCE GATHERING &TECHNICALTRAINING SERVICES

54

INTELLVIDEO/AUDIO CONCEALMENTCOURSES

56

ELAv.,,[4L

L

i L i u•-


••••
•••••
*: elaman
(ice marl .'n,t,-ur!ty 5,1utik !

COMPANYPROFILE

ELAMAN GmbH is a German based company with
over 15 years of experience in communications
and security requirements for Law Enforcement
Agencies. RAMAN, with its headquarters i n
Munich, Germany, and its subsidiary offices in
Dubai (the United Arab Emirates), specializes in
security requirements for Governments and Law
Enforcement Authorities worldwide. Our aim is
to provide comprehensive security products and
solutions, technical consultancy and services as
well as professional training for our customers.
The company is a proven leader in international
marketing and trading, specializing in defense
technology, communications a n d security.
Through strategic partnerships w i t h many
leading international companies, w e provide
Law Enforcement Agencies alike with unique
technology solutions.

ELAMAN GmbH
Tel: +49 89 24209186
Fax: +49 89 24209181
infoTzAlaman.de
www.olaman.de

SALES CONTACT
Holger Rumscholdt
Tel. +49 170 2208178
[email protected]

Markus Mailer
Tel. +49 151 17323234
[email protected]
Peter Habertheuer
Tel. 4971 50 4560639
[email protected]
Thomas oblingor
Tel. +49 160 9724 2601
thomas.oblingerTvelaman.de

Holger Rumscheidt & Eugen Fissi

Consequently, we have the expertise to offer
solutions using state-of-the-art technology and
comprehensive functions for flawless operation,
training and services, such as:
• Communications Monitoring
• Tactical Audio and Video Surveillance
Equipment
• Surveillance Vehicles
• Counter Surveillance (TSCM)
• I T Intrusion
• SpecialistTraining
• V I P Protection
An essential element o f o u r philosophy i s
the conviction that training as well as both
understanding the products and technology are
critical factors and major strengths in assuring
successful security solutions.

German office established in 1995

Elaman GmbH offers a broad variety of products,
services and customized solutions from several
locations worldwide. We also offer consulting and
training services that meet the requirements of our
customers.
We a r e operating (sales, manufacturing,
development and tehnical support) out of offices
in Europe, Africa, the Middle East and Far East

Dubai office established in 2004

ELAMAN NEWSLETTERS 04 2010

2


••••
w••••

10

German Security Solutions

EXHIBITIONS
OVERVIEW2010-2011

Dates

News & Events

25 - 21

Milipol Qatar

October2010

21 - 23
February 2011

14 - 16
June 2011

Doha, Qatar

BIS' World MBA
UAE,Dubai

ISS World Europe



Prague, Czech

18 - 21
October 2011

Milipol Paris

OnDemand

IT Intrusion Seminar

iSS World t•-/EA
ISS World Et"441
Milipcd
por

Paris, France

ELAMAN NEWSLETTERS CR 2010

3


•••ft
•••••
elamar
FINFISHER IT INTRUSION

FINFISHER IT INTRUSION SEMINAR
It is with pleasure that we offer our services
to provide to your esteemed department an IT
intrusion seminar for 2 days.The theme behind the
seminar is to introduce the latest techniques in IT
intrusion which will be presented by our IT experts.
The 2 day seminar will cover all the theory and live
practical demonstrations as well as discussions
on building up your own IT intrusion team. On the
2nd day we will also do a full demonstration of the
FinFisher Intrusion and Hacking Portfolio as well as
reviewing all the training courses our company can
provide you.
We attach the following documentation
• Seminar Invitation
• Seminar Agenda
If this seminar is of interest to you we would like to
agree on the following points.
• Location of the seminar
• D a t e of the seminar
• Number of Personnel attending from your side
• A n y required security clearance for our
personnel
It would be our pleasure to speak with you any
time at your convenience to discuss any issue ref
to this seminar and to provide more information.
Day1
• W h a t is IT Intrusion?
• Recent Cases (Attacks on Networks,
Cybercrime and more)
• CommonTechniques (Samples on Intrusion to
Infrastructures and Systems)
• Intrusion Technics
Day 2
• CommonTechniques continued
• Government IT Intrusion Solutions
• R e a l like Intrusion Operation
• FinFisher Portfolio

ELAMAN NEWSLETTERS 042010

4


••••
••••••
elaman
German Security S

FINFISHER IT INTRUSION

FinSpy
Spy Mobile Setup
The FinSpy Mobile server is connected by infectedTarget Phones over the Internet ( G M / UMIS /WI-Fi)
or through the PHI Cards (SMS I Phone Calls).

The intectedTarget Phone
communicates through
GPRS/LIMTSANIF1 o r '
SMSNoice-calls

Overawe

••= 043101212 P M

The FinSpy Mobile Master accepts the
connections and stores the data inside the
database

Finbay Monne M a s t e r

FloSpy A g e n t

User Interface
The Whole System is controlled through the graphical User Interlace.
4.6cartee

a

U13

Ty p . •

a



01..000 V

110041000523236
19094100062:s7:9 L e r - e l a n

• m m . 11 0 0 0 3 2 5 2 3 6 S M S
)0113/1 11 / 3 0 : 111 0 0 0 1 2 5 2 3 6

Y a m

Q1!0. 9 8 0 0 4 1 0 0 0 3 2 5 2 3 8

V o t e

• ow

'
qizt

w o o d

10005251M

V

.

• 911C0110008303ll

E M S

Oak 910041000325236

V m e



110311003325231

V a c •

1110.413.

webile lime V

Pilanio4lumbet •

303%

2

C

0

r

3

44122

2 0 0 4 1 2 4 6

A S e , . ler*

i7 00 13 10 49 . L e i . 204131033
13 111-4 2 0 0 9 1 2 - 0 1 1 13200/

004917123745949 2 0 0 9 - 1 2 4 1 133300 2 0 5 9 - 1 2 4 1 1323 37

• 00aPna

J• 0


a

ete 00

oonimanamio

00004
06

.14917923745849

2009.12.08 13 27 11 2 0 D 5 - 1 2 0 8 1325(42

00504

111013103900

2073-12-05 13 3323

103139e0900

2009-1245 13 33 36

200917-06 13 34 34

2001-12-09 13 34 11

20091241 13 39 39



21301

0 • outPng
0• 0

2001-12-01 13.3441

200912-013 13 36 20
70091241 13 37 50

GPSTracking

Intercepted SMS
Mobile Ilene:

2009-12-00 132230

Server T i m :

2009-12-013 1323 37

type •

SMS

Duechon,

Outgomg

Phone Nornbef

00491 762 374 51419

Ceatecl Home
! an•gye

He) H e e l al 7

NOG

ELAMAN NEWSLETTERS 042010

9

,




elaman

STRATEGIC COMMUNICATIONS
MONITORING SOLUTIONS
The FinFly ISP System is designed to remotely install the Remote Monitoring Solution (e.g. Finhsher
FinSpy) on selected Target Computer Systems by integrating the system into an ISP's IP-network
FinSpy)
infrastructure. Finny ISP optional Addons include IP shaping and Blocking.
A FinFly ISP System typically consists of the following Appliances and Functional Groups:
AlTarget
Target Infection Server(s)
• F i n Fly ISP Infection Proxy Server
BITarget Identification Server(s)
• F i n Fly ISPTarget Identification Probe / RADIUS I DHCP Probe
C) Management System
• F i n Fly ISP Management Server
• F i n n y ISP Management Workstation
D) Network Equipment
• Bypass Switch Function, Switches, PassiveTaps, 19" Server Rack(s), UPS etc.
ISP
Inlet
2m10(31

OSLAM

/

F P O , / ISP
inkK Sion M o n Pi
lx 1061

GE passive lap12
Fmny ISP
RADIUS P I O b e

GE passme Tap El
finny ISP
RADIUS Poobe
Finny 15P
Kanagemtni
Workstabon

FuiFI I S P
Kinagement Selves

rainy SSP e m e n t

5

The FinFly ISP System is managed centralized from the lEA's premises using the FinFly ISP Management
System.
The user will administer targets for infection by entering the appropriate target data via the easy to use
GUI on the Management Workstation.The Management Server will distribute the necessary commands
to the FinFly ISP RADIUS Probes and Infection Proxies deployed in ISP's network.
ATarget is added to the Finny ISP system using its access data like "dial-in phone no" or "username
In case the target has a fixed IP-Address this IP-Address will be entered into the system. In this specific
case the RADIUS Probes are not involved in theTarget Identification process.

HAMAN NEWSLETTERS 04 2010

10

••
•••••
*: eiaman


German 5 u

STRATEGIC COMMUNICATIONS
MONITORING SOLUTIONS
u-onit uL iNTERCEPTiuiv
Lawful Interception (LI) is the legally approved
surveillance o f telecommunication services,
and has become an important tool for law
enforcement agencies (LEAs) around the world for
investigating and prosecuting criminal activities
and terrorism. Most countries have passed laws
that require telecommunication service providers
to support LEAs with duly authorized requests to
identify, monitor, and deliver all of the electronic
communications o f specified individuals and
groups. While regulations and requirements
vary from country to country, international and
USAmerican standardization bodies like ETSI
or ANSI have developed technical standards for
LI that will facilitate the work of LEAs and help
operators and service providers to minimize their
costs. Although various standards for LI use
different terminology, the basic functional model
shown in figure 1 applies to all LI standards and
to all network and service types.

1
1
1

The main functions of any LI solution are to
access Interception-Related Information (IRI)
and Content of Communication (CC) from the
telecommunications network and to deliver the
information in a standardized format via the
handover interface to one or more monitoring
centers of law enforcement agencies. Of course,
before surveillance can take place, interception
requests must be approved and appropriately
provisioned to the Interception Access Points
within the service provider's network, and they
must be carefully and accurately terminated after
the interception authorization expires. In addition,
high security requirements for LI systems are
essential to prevent possible manipulation and
misuse.

LihoS'"
2•6. • U M * so
,

41111•111EIMI.



1 1 • 1 1 1 1 1 . . M e

;

cwilum C o n t b

••••1110.

!

.

D I S I f i g 4 0

m i l l lama
RIM NM

Nomad W o w . in1,41.6
Mt . . . m e o w Pooled int...11.0

e t a l di e i l m o r
l
i
awl CC a m e n , .

OC C o m o r e a/

M I P C P G / 1 / 1 1 1 / 1 0 1 P. 0 1 1 . 0 1 . 1 1 1

r

LI Ftwono,..2 11.1

alog CC wallow

Figure 1

ELAMAN NEWSLETTERS 04 2010

11

r


••••
•••••
•: elaman
German Security Scautiook

STRATEGICCOMMUNICATIONS
MONITORING SOLUTIONS
n eq
Data Retention System refers to the process of storing call detail records and subscriber data for various
telecommunication services for a period of several months and years. Law enforcement agencies and
intelligence services regard the access to retained telecom data as an important pillar of criminal
investigation and the prevention of terrorism. The common objective is to use the data to identify and
trace suspects, uncover social networks among terrorists, or to collect admissible evidence for court
proceedings.

n
etaineweiteett

Key Features:
• Collects communications data (CDR, IPDR) and subscriber data from any telecommunications
network
• Retains large amounts of data in a powerful and secure data warehouse
• Provides very fast search and analytics in billions of data records
• Automates request processing and delivers data to authorized agencies by fax, e-mail, or secure IP
interfaces
Doti Retention $ane

t o n ite .

4

Dots
Collocbm
riawoligml

- atetersood
t

Doui l a m e
Illsompoomi
Nods"



nr
• *

RecFnet ibelageonant
I Repotitng

ELAMAN NEWSLETTERS 04 2010

12


••••
•••••
••• elaman
Germs Securitv Solutions

STRATEGIC COMMUNICATIONS
MONITORING SOLUTIONS
NEWPORTABLE REMOTETHURAYA
MONtrmr'r•.!r, ( T r '
A New TMS Portable Remote Lband system
has been launched which can be used with the
existing strategic TMS for increased coverage of
the Thuraya network. Each Remote system can
monitor up to 7 additional spotbeams - expanding
the monitoring capability of your existing strategic
system for increased coverage of a selected area
of interest; a single Remote System could double
the area o f coverage. Designed for maximum
portability and rapid deployment, the Remote
System is encased in a ruggedized, modular
casing which can be broken down into 4 individual
components for safe transportation.The portable
design enables the system to be easily relocated
in response to changing targets and areas of
interest. Users can assemble the system and it
can be fully operational in 30 minutes.
R
Inmarsat is the most experienced and widely used satellite in the air sector, sea sector and is gaining
more and more interest in the land sectorThe number of subscriber has been increased in the last year
and new services have been introduced like ISAT-Phone. Due to these effects the monitoring of Inmarsat
has become important for Lawful authorities.
ISMS flsatPhone Monitoring System) offers a complete solution for the passive monitoring and
interception of the IsatPhone in the air, sea and land network on both a strategic and tactical level. Using
C-band and Lband monitoring, the ISMS can provide national and regional coverage for the monitoring
of IsatPhone, FleetPhone and LandPhone terminals_ In addition to call content, the ISMS solution can
provide information on the date and time of call, the numbers dialled, as well as the call originatorThe
system can also provide the interception of fax and data transmissions.
kunarilill

alarti Srasalta

I 10111 UPLINK

3 S G . . 000011.001

15Gr14 1 3 0

aviO
Gm..., a, S t a g . ;

t a m . .

1•31P1,0.

S.o.t•
gr•gOM 01101S1

ELAMANNEWSLETTERS 04 2010

13


••••
•••••
is elarnan

STRATEGICCOMMUNICATIONS
MONITORING SOLUTIONS
PASSIVEA-INTERFACE MONITORING FOR GSM NETWORKS,
PASSIVE MONITORING OF Er'RE GSM NETWORK
The A interface between the MSC (Mobile Switching Center) and BSC (Base•Station Controller) consists
of El or STM-1 trunks.The System solution monitorsTDM.
A-Interface links between BSCs and a MSC. It detects calls and text messages on these links and
captures IRI and uncompressed 13.711 A-Law or p-Law audio associated with the intercepts. Monitoring
of A-Interfaces may be implemented with PDH (64 duplex El) or SDI-I gateways (2 x STM-I). In the future
we will also support direct Ethernet interfaces. A deployment unit may be used to monitor more than one
A-Interface and a number of SS7 links at the same time. The A-Interface solution assumes thatTMSIs
are also unique within the context of a Location Area Code (LAC) and that the LACs are unique with
the context of the PLMN identity. In cases wflereIMSts are not unique, different name spaces can be
configured. It may not be necessary to monitor all links between an MSC and its sub-tended BSCs.
The A-Interface monitoring solution is illustrated in the following diagram.

With the A-Interface Monitoring System either specific GSM-cells can be monitored or an entire GSM
network, The system works completely passive and provides mass-storage capabilities and powerful
analysis tools for post processing of huge amount of data.

ELAMAN NEWSLETTERS 04 2010

14

• •
i••••
••: elaman


German Security Solutions

STRATEGIC COMMUNICATIONS
MONITORING SOLUTIONS
RELESS LOCA'
WLS is the only technology that provides high-accuracy mobile location, across all types of environments,
in a highly scalable and cost-effective way. The easy-to-deploy, easy-to-manage solution provides LI
applications with the precise location of mobile devices to accuracy within 50 meters, and gives Law
Enforcement Agencies 1LEAs) real-time, post-event, geo-fenced and even predictive intelligence using
mass Location capabilities.
The Wireless Locator has the following applications:

Target-based Location Interception
Adding high-accuracy location information t o
target-based interception allows LEAs to monitor
fleeing suspects in real time and track a historical
"bread-crumb trail" of the wireless activity of a
specific user. The highly-accurate WLS solution
can pinpoint the location of mobile devices to the
, exact building.

Mass Location Interception
WLS is the only location technology that enables
accurate mass location of all devices on a mobile
network. Mass location is especially helpful for
post-event analytics based on historical archived
data, identifying all wireless activity in an area
over a set period of time•This gives LEAs critical
investigative information about suspects after an
event - such as a bomb going off - including who
was present, who they were talking to and what
they did in the immediate afteftrathr

Border-zone Location Interception
Border-zone location interception allows a n
electronic virtual fence to be set up around a high
security area or an international border, allowing
LEAs to track the location of wireless devices that
travel in and out of the area.The accuracy of the
WLS solution ensures that precise locations are
identified along the border zone, preventing even
marginal incursions.

ELAMAN NEWSLETTERS 04 2010

15


••••
•••••
*: eiaman
STRATEGIC COMMUNICATIONS
MONITORING SOLUTIONS



Media Mining Indexer Is a high end speech recognition product that can automate the process of indexing
live news feeds (e.g.TV-channels, broad cashing. Internet live ticker, etc.) and qpItimedia archives in realtime.
The Media Mining Indexer can process speech from multiple sources in various formats and produce
annotated text output in real-time. The XML output is uploaded as input into diverse digital asset
management systems for subsequent multimedia search and retrieval.
The advanced speech technologies can inherently handle variations in speaking styles as well as
recording environments for different domains in various languages (e.g. English, German,Arabic, Russian,
etc.).

Pro

The Media Mining Indexer serves as an extremely cost effective solution for media monitoring needs.
Using SAIL Media Mining Server with Visual Features Extension for:
• Automatic e-mail notification of alerts (get alerts when something happens)
• GeoServer automatic geographical display of events on the globe (for detecting hot spots on the
globe, in a continent or in the country)

t•••••••••••••••••••
• ••••••••••••••••

1

.

• •••• • • • • m.10 • • • • •


••••

• • • • • • ammommulan.

I n m a n I M M O allEINOM16000



-



F





• 250m resolution geographical-data
• Automatic clustering of stories (who is reporting about what)
• Automatic trend analysis (how has media coverage of a person, organization or location changed
over time)



••••• W I E M E n
••••

1



v

o
1

m



.

1

.
1

1

0
1

1

1

1

.

1

1

0 .= 1 = M b
IMMEIEE•



• • • •

•••

.••••1-

,t2

11rrrrrAith

--•;;•-1



- 0

ELAMANNEWSLETTERS 04 2010

I

16

••••••
••• •


s: elaman

• G e r m a n

Security Solutions

STRATEGICCOMMUNICATIONS
MONITORING SOLUTIONS
• Automatic relationship graphs Ishows relations of people, organizations and locations1
• • • • •
0.0•%

-

' =It

-•••••

, I

= N M

-•

• • • a a . o . n . • • • Om
• * • • • • • • • • ••••••m•

.••

•It
-

. • .

1

a








O N E I WA I O I M O I E F I N


V A ,



2

P d i g r a n

M O P

r t ;

:

1

6

0



-g7 1 1 m m aP

plcir

• A l l data available maximum 4 minutes after broadcast
Text Mining Indexer: Text Mining Indexer One-stop shop for meaningful results when searching different
types of data. Search & Retrieve key information contained in emails, electronic documents, and Web
content.
Fully Automated Process: The Text Mining System automates the process of text data indexing and
annotation, which previously was done manually, This reduces costs substantially while increasing
productivity.
Web Pages: The Text Mining System includes the Labs WebCollector, an application that analyses
configurable places on the Internet for web pages and updates.
E-mail: The Text Mining System includes the Labs E-mail Collector, an application that analyses content
of E-mails of configurable POP3 and IMAP user IDs.
Electronic Documents: TheText Mining System includes an electronic document converter that allows
tor indexing at Microsoft Word XP and 2003. HTML and POI' documents.
Instant Access I RealTime Indexing: The indexed results are obtained as soon as content is available.

ELAMAN NEWSLETTERS 04 2010

17


••••
•••••
*: elaman
.1 L u n t )

STRATEGICCOMMUNICATIONS MONITORING SOLUTIONS
COMMAND & CONTROLCENTER
COMMAND CONTROLCENTER, CENTRAL
CONTROLROOMS, CRISIS MANAGEMENT CENTER
Today's complex control centers consist of many individual components.The System is able to cover all of
the core tasks of a control center with a variety of specific products.These products are fully comparable
within the system, of course. Moreover, they are fitted with highly flexible interfaces.Thus, in addition to the
core tasks of a control center, also all other tasks and functions can be executed and integrated under one
user interface - integrated Command Control Centers.

a

When it comes to the core technologies of a modern command center for public authorities and
organizations with security tasks, the system provides all the necessary features and elements This
includes:
• h o s t computer software
• Geographical information system (GIS)
• Switching technology (radio and emergency calls)
• Integrating and interfacing of various systems (communication-Tetra and Monitoring systemsAudio-Video-data-Telco, etc.
The Systems core offerings are complemented by special software for the smooth operation of technical
administration in a command center, as well as the functional and ergonomically designed command
Ti t e r desk.

ELAMAN NEWSLETTERS 04 2010

18

••••
*: elaman
Germ8n Security Solutions

STRATEGIC COMMUNICATIONS MONITORING SOLUTIONS
COMMAND & CONTROLCENTER
Easy recording of incidents, recommends resources to the dispatcher and can be used for automatic warnng
processes. Appropriate interfaces for numerous interesting control variants.

1 MICEZE = 1 • • • = 1 = I I M M I
1 1 = = 3 1 1 1
1 • 2 = = e W---- = = I
=
I
=
I =
EZI=E
W i g i i , 4 G E M = •• - • • • - 6 1 = I M I O
= M B EZL=aliEng=1=1:=11L3=a
IC
1
1
=
1
=
I
.
- ..

••••.,

1•••-41.0
-•••••

M E W

r

• 1 = = = 1 1 0 E M E = E M I S
•• I =
0 = = = n onomin 1 = = = B M E I = E
, M I M E - - M E M 1M M E M
11 = 111 = I I 1 1 = 1 1 • 1 1 = 1 1 E : = I N

= = = = = = l l e
• = 11 • = = = •
Elli = E M I
1=7

— –

1 1 ; = • 1 = 7 M E = M • = = = n 11 : = 111
IMIIIMI M E M M g r
IM=:=M I l L 3 = 1 0 = 1

1

•••• •••

1

• r n •••—••••-•

G

E

mow

:o t



- • - CLIMIIIMINW-J

R

M

5

-

Geographics information system (GIS) that visualizes the position of the place of incident/
Operatrionietc_
GIS-Data turns into images.
• . .
• •



Integration of digital trunk radio networks (Tetra), Data transfer, etc.
•••
I W O NSW . 4 . .

p

.

.1 4111 • • • • • • • •
•• • • • M o o O m

C••

• MIS





.•

•-••••• 10••••

ELAMANNEWSLETTERS 04 2010

19


•••••
•: elaman


612

STRATEGICCOMMUNICATIONS MONITORING SOLUTIONS
COMMAND & CONTROLCENTER
Documentation/ voice-Logging and reporting system

--


BO

11411.aa •

-10•1111111

l

i

r

The Innovative Command Control Center Desks Console

The cockpit shape of the BUS VARICIass with
optimally balanced proportions provides
for good overview efficient working.

Radio Devices and peripheral systems for every use case
1

a

11 . 1 . 111 . 111 . 11 r 1 W

• —

ELAMAN NEWSLETTERS Q4 2010

20

MIN I

4P


• • • •

. "• e 1aman

•• • • • •

Tian

German Security Solutions

tray Solutions

TACTICALCOMMUNICATIONS
MONITORING SOLUTIONS


rr'IS] CATCHER
36 Blind Call is a new software feature for the
36N UMTS system. It allows 36 phones to be
locked to the 3GN and placed in a UMTS blind/
silent call for tracking purposes. This is the only
Way to establish blind calls to phones that are set
in "36 only" mode, and it removes the reliance on
passing the 36 phone to a GSM system fortracking
- the target phone stays on 36 frequencies at all
times.The 36-OF can detect and track the signal
from a 36 phone in a blind call, allowing the OF
operator to locate it.
Blind Call Features:
• N e w Acquisition mode for the 36N and OF target status for 36 phones makes operation simple
• Multiple 36 blind calls can be supported by each 3GN Node B
• Automatic 36 power control ensures that Node B and phone TX power are continually adjusted to
optimal levels to maintain the blind call
• T h e 36N can continue to take registrations from other 36 phones whilst maintaining a blind call to
the target phone
36 Direction Finder Features:
• Provides indication of target RSCP (Received Signal Code Power) to enable operator to judge
distance and bearing to target
• Features graphical and audio feedback of current target RSCP level for ease of use in challenging
operational scenarios
• Quick and simple to use with minimal configuration required

The 30N captures the 30 phone
and places it into a blind call.
The uplink and
powers are automatically
ad)usted to optimise the
connection to the phone.

1



I I 7
- • —0

ammo •





O







The 3G-DF locks on to the
uplink signal from the
phone, allowing the DF
operator to track the
phone to its location.

ELAMAN NEWSLETTERS 04 2010





21




• •••
•••••

Odin&
German Secant

\ T A C T I C A L COMMUNICATIONS
MONITORING SOLUTIONS
XPZWIRELESS IP
The XPZ is normally controlled by a Cat 5 cable that connects the laptop to the XPZ.
We can provide you our secure wireless IP connection instead of the cable connection enabling remote
controlling of the XPZ from a safe remote location.
This is possible in different ways:
RFunits
• F o u r channels enabling four links to operate in the same area
• Secure wireless Link
• Output power of 100mW
• Simple to deploy and contain a battery (typically last for 2 hours)
• Range extensions by deploying additional units
High Powered Wi Fi units
• Longer range
• H i g h output 10-20W
• Incorporate 3G Router
COMM MESH units
• Diversity reception to greatly enhance the range and copes better with multi path conditions
• MESH Network could be linked to vvvvw by secure 36 routerNPN or satellite connection

The IV unit can be used on four channels
enabling if necessary four links to operate
in the same area.
The Cat 5 cable can be replaced by a secure
wireless link. The RF units only have an
output power of 100mW so the range is
limited but may be more than adequate in
some operational scenarios. Naturally, the
range can be extended with the use of the
appropriate aerials and choice of frequency
band. The units are very simple to deploy and
contain a battery which would typically last
for two hours.

ELAMAN NEWSLETTERS 04 2010

1

22

•• •
,••••
•• eiaman


German Security Solutions

TACTICALCOMMUNICATIONS
MONITORING SOLUTIONS
GSMOFF-AIR TACTICALSYSTEM INTEGRATION EXAMPLES

&donna
Omnictrecticdtal I

Netvark
mccatot
antenna

Dpexer

Disetaunal
Ditacticaal
anterna

antenna

ELAMAN NEWSLETTERS 04 2010

23


•••,
••••• •
*: elarnar
dE

TACTICALCOMMUNICATIONS
MONITORING SOLUTIONS
TACTI1',A1 1-1SM-1
1-GSM NARROW BAND MONITORING

v

The unit is an advanced multi-band fully passive
GSM interceptor designed t o intercept the
bidirectional traffic occurring between base
Transmitting Stations IBIS) and Mobile Stations
(MS) and located within the system operational
range_
As a receive only system, the unit is totally stealth
(no interference with the network) and has high
performances thanks to a unique architecture0
It offers real time communication interception (2
duplex voice communications per workstation)
as well as automatic intercepted communication
recording (systematic hard d i s k recording)
capabilities.
triggering
It is fully programmable and configurable via a user-friendly GUI including filtering and
capabilities.
The system consists of three main parts:
• Receiver Unit
• Notebook Computer
• Antenna

2- GSM WIDEBAND MONITORING
The product is a professional solution designed
on the basis of high technologies. It has the
following functional peculiarities:
• Flexible configuration, possibility of a quick
channel capacity extension to multi in one
unit or extensions by means of connecting of
additional Signal Reception and Processing
Units (SRPUs)
• Possibility of operating in a distributed
configuration that makes it possible to
build branched radio monitoring networks
covering large territory (e.g. Borders)
• H i g h sensitivity and a wide dynamic range of the radio reception device
• Capability of operating both in the real-time mode and in the delayed mode with recording all the
data received onto a disc and next session reconstructing
• Possibility of operating in the recording mode as a tactical device (visiting a place where a target is
located with the minimal hardware set)
• Software package includes embedded capabilities for analyzing of recorded communication
sessions and other information

ELAMAN NEWSLETTERS 04 2010

24


••••
••••• •
6: elaman

)man

t i o r m a n Secolay

TACTICALCOMMUNICATIONS
MONITORING SOLUTIONS
GSMNARROW BAND MONITORING

Ut
GSM Network

IP Trail ic
Interceptor

deoe lid Passive
System

iggering

OPTIONAL

REMOTECONTROLLED PASSIVE GSM-MONITORING SYSTEM
Country Border
or
Area of Spec.al !merest

I
,
z, ,.
4 Headouarler
Control oil all Sensor Heads

Structural Schema

,

1

4

I

- - - - - -

A

- - - - - - - - - - teeeet Ceors

I ;

CCe

1

14ZWat

't
1

MOW, Radom"

all the
target is

1

WOrktI•r 00 D e : o o t r

PdoOde Napoli 5 r Control Staten

up to 10 Sensor Heads tor Jul

ELAMAN NEWSLETTERS 042010

25

5

••••
•••••
••• elaman


Gerrtion Sucur.ty Soiuticv

TACTICALCOMMUNICATIONS
MONITORING SOLUTIONS
TACTICALINTERNET
MONITORINGSYSTEM
The System is developed to monitor, capture and
evaluate internet traffic on a tactical level. The
system does not reduce bandwidth and speed of
the targets connection. It can be connected to any
ADSL network. The system supports ADSL and
future generation AOSL2 and ADSL2+ protocols.
Two ADSL lines can be monitored simultaneously.

Features of Capture Unit





I f needed, the system can capture the complete traffic
M A C address filter options to decrease the data volume
T h e Capture Unit is controlled by remote Iencrypted)
F r o m ISP side the Capture Unit is invisible

Features of Operator Unit (Laptop):
• Provides substantial server control functions (maintenance, control of capturing services)
• Download data, sort and filter data, manage targets
• L o w weight and easy transportable
• C a n also be used as normal office laptop
• Support of all modern media and office applications

AN•ripnfr
We have developed a number of applications
for the Android operating system as used on the
Google Nexus 1 phone.
These application will allow the following:
• Scene of crime survey tool
• Network coverage logging, all networks,
GSM and 3G
• Logging of local WiFi access points with GPS
position
• Local display of logs on Google earth
• Display on Google Earth using exported KML
files
• Interface to any desired Database


ELAMAN NEWSLETTERS 042010

26


••••
;•••
ireloman
German Security Solutions

TACTICALCOMMUNICATIONS
MONITORING SOLUTIONS
PORTABLEWIDEBAND RADIO
FREQUENCYMONITORINGSYSTEM
WITH DIRECTION FINDING
The portable wideband Radio Frequency
Monitoring system scanned t h e complete
frequency band from 100 kHz until 30 MHz and
storage this information in a data base.
The Multi-channel Direction finding system with
500 kHz Bandwidth and with a workplace is an
extraordinary system for analyst's Day-To-Day
work. It suits for multi-channel direction finding,
broadband reconnaissance and interception.
It offers a lot o f analysis and classification
capabilities f o r automated a n d interactive
investigations. Each configuration c a n b e
optimized for specific tasks and all configuration
data are stored into a setup file.
Application tor semi mobile use:

The system is open for customer specific analysis
software.

Synchronisation devices, tuners, antenna

connection board, LAN switch, DF server,
Intercept server, Power supply

The system is characterized by the following features:
• M u l t i channel direction finding (Watson Watt) and Wide band HF interception with 500 kHz realtime bandwidth (2000 kHz on request)
• 5 0 0 kHz wideband recording on hard disk e.g. for 300 minutes and disc long-term archiving (2000
kHz, additional storage capacity on request)
• O p e n for customer specific software (virtual device, MATAB)
• Automated hopper detection and de-hopping
• Automated signal classification and activity list
• Modulation type analysis

Two workplaces are suitable to perform both tasks in parallel. One for Online monitoring argf one offline
in-depth analysis.

ELAMANNEWSLETTERS 04 2010

27

•• •
•••••
0: elaman


TACTICALCOMMUNICATIONS
MONITORING SOLUTIONS
HIGHPERFORMANCEPORTABLE RADIO MONITORING SySTENI
The unit is housed i n a sturdy high-impact
transport case containing one or two receivers
with associated antenna interface circuity,
power management system and a laptop. The
built-in power management system allows
operation from three sources: mains, vehicle
battery or built-in rechargeable batteryThe entire
system is light-weight and easy to carry. The
system can be specified with a single or dual
receiver configuration. In a dual receiver setup
it is possible to monitor the demodulated audio
signal of the received frequency, without any
interference, which is inherent to the pseudoDoppler technique.
The Direction Finding system employs t h e
proven pseudo-Doppler method, combined
with statistical signal processing, to deliver a
cost-effective, yet highly accurate OF solution
for government, military, law enforcement and
industrial applications.
The entire OF system comprises of fully integrated
receivers, battery, charging unit and control
circuitry in a compact sturdy carry case, ready
for quick and easy deployment anywhere, with or
without external power sources.
The fully weather-proof antenna system comes
with a sturdy tripod and employs 8-pole arrays tor
HFNHF and UHF frequency bands' for maximum
accuracy.

A

The Multichannel Radio Monitoring System
is shipped in a specially designed ruggedized
19" rack-mounted chassis with built-in shock
absorbers, to ensure safe shipping.
The unit can then be either removed from the
enclosure, or operated from inside it. This is
particularly useful for mobile operation.
The system is shown together with a matching
antenna distribution unit which is also suplied in
a similar protective enclosure.
For stationary applications, various rack-mount
options are also available, ranging from a singleunit arrangements (pictured) t o large-scale
installations. For these, we provide complete turnkey solutions including antennas and antenna
di

ELAMAN NEWSLETTERS 042010

28

•••

‘•••••
*: elaman


• •

nan

the
led
ra
ion
md
ted
trol

TECHNICALSURVEILLANCE
SYSTEMS-VANS/CARS
SURVEILLANCE VANS
We are a company backed by many years of
experience in technical intelligence techniques
and equipment.
We work exclusively on behalf of authorized
Government Security Departments and Law
Enforcement Agencies. As a result of many years
of "active service" for clients worldwide, our
assistance is highly sought after.
We will individually design surveillance vehicles
to your exact requirements, meeting with you at
all the major milestones during the design and
integration process to ensure that each vehicle,
not only meets your current needs, but can also
be upgraded in line with future technological
developments.
No two surveillance vehicles are alike. These
, vehicles a r e especially designed t o meet
individual needs, such as vehicle type, finish,
operational usage, equipment for integration,
etc. Whatever you are looking for, from a very
basic surveillance, command or communications
vehicle, to a complete mobile command and
control center, we can provide a complete design
and integration service.

3dy
1Or

les
for
um

RAMAN NEWSLETTERS 04 2010

29


••••
••••• •
0: elaman
Lw,Litiort.

TECHNICALSURVEILLANCE
SYSTEMS -VANS/CARS
COMMUNICATIONS MONITORING
VAN INTEGRATION
Model 7 0 0 7 Communications Monitoring
Surveillance Van represents a n e w era i n
communications monitoring platforms integrating
live off-air monitoring of GSM, WATS, DF,ThurayaSatellite Monitoring and IT wireless LAN Intrusion.
The Communications Monitoring Surveillance Van
also provides links to the endusers headquarters
enabling on-site surveillance operations t o
be carried o u t quickly and effectively. The
Communications Monitoring Surveillance Van
platform can be installed into various vans fix
Mercedes Sprinter, Toyota Hiace or GMC Cargo
Van) and provides operating areas for up to 3
operators. Included in the van is technical analysis
and workshop support areas.The Model 7007 is
constructed of high quality material and is built
by craftsmen with over 30 years of experience in
vehicle design and conversion.
Equipment Installation Options:
• Active Off - Air System Mobile Version
• Active Off-Air UMTS
• G S M MobileTracer & Locator
• 'GSM Vehicle Direction Finder
• Thuraya Satellite Monitoring System
• Wireless LAN Interception
• R F Monitoring
• Passive Monitoring
• Includes floor, walls, and front bulkhead,
ceiling framing; minimum of 50mm polar fibel
insulation.The operational area inside the
van has some ECM screening
Secure Storage of Equipment
• M I I I I M E M m • • • • • 1111 . 1 *

s o r t * 71111;1
s

ELAMAN NEWSLETTERS 04 2010

30





•: eiaman
(,Cr L r •

TECHNICALSURVEILLANCE
SYSTEMS - VANS/CARS
3G-CORDM-IP MESH
The Remote Video Surveillance Vehicle System
is designed to allow covert video and audio
surveillance of a target area without detection,
allowing greater flexibility during surveillance
operations.
The system allows the operator to park the
vehicle close to the targets location, house,
office, restaurant, etc. and transmit the gathered
information back to the command location in a
surveillance van, observation point or another
support vehicle.
It allows the operational surveillance team to
monitor by video, for example, the images of the
target location from the four cameras concealed
within the vehicle.
It allows the surveillance team to monitor audio
transmissions from the target location from room
or body-worn equipment, and activate hidden
microphones linked to the Remote Case.
It also allows the operational surveillance team
to connect external video and audio equipment
to allow long range observation of a target in a
difficult environment or remote location.
Control of the system is by a digital telemetry link,
which allows full control of the camera selection,
pan, tilt, zoom functions, ias well as repeat
incoming video and audio signals from the room
or body-worn systems used by the undercover
surveillance team.
These remote systems are usually fitted into
vehicles (saloon cars, 4x4s1 that can then
be left unattended i n the surveillance area,
transmitting the intelligence information required
to the Command Surveillance Vehicle COMM/IP
MESH/3G.
Using our unique Motorbike Remote System, as
part of the total surveillance operation, allows
even greater flexibility in the covert surveillance
operation. The Motorbike Remote System allows
the surveillance team t o link several video/
audio remote systems into the total surveillance
concept.

ELAMAN NEWSLETTERS 042010

31

1!al



•••e 1aman

• • • •
• • • • •

k,writzdrecdnly k u l : u n s

TECHNICALSURVEILLANCE
SYSTEMS -VANS/CARS
WIRELESS IP NETWORK MESH SURVEILLANCE EXAMPLES
Mesh node position on High Rise
budding will substantially improve
the coverage of the network

ryom
All these locations have MESH nodes and
thus secure data can be exchanged between
each location w h e t h e r i t be streaming
video, N./01P, general data such as emails and
photographs.

HO Building

g
Video Sui ye !lance Package
Veh cle Installation

A

Video Sur weillance Vehicle

A Wireless IP network •Noulo enable all
of these deployments to be mcnito'ed
Radio Microphone Operation a n d comrolled from a PC terminal in the
HO butiding
HO Bu Icing

ELAMAN NEWSLETTERS 04 2010

tiEL

32

11 . 11111111
ad"

• •• •
•••••
••• elaman


Gt:

TECHNICALSURVEILLANCE
SYSTEMS -VANS/CARS
SECUREMOBILE NETWORKING
se
ye

11



4



This unit provides communications solutions
for scenes without infrastructure o r where
infrastructure has been destroyed. It is flexible,
broadband, secure a n d versatile, covering
a wide-area a n d dynamically optimizes a
communications solution. I t i s designed f o r
mobile users, for mobile use in vehicles as well
as being a fixed or portable communications
solution. It allows transmission data rates of up
to 6,5 MBilisec for mobile and up to 16 MBitisec
for stationary use. The unit provides sufficient
throughput for applications such as audio, video
and data transmissions. The unit relay feature
allows unproblematic implementation of even
broader ranges. It ensures the confidentiality,
integrity and authenticity of the transmitted data
at all times, and uses powerful, officially approved
security mechanisms fin accordance with BSI
guidelines).The use of amplification mechanisms
ensures a range of typically 2 km between two
devices.

•e/
44:s
MERCEDES SPRINTER
CONTROL VD-0(1E

USERS

SURVEILLANCE CARS

ELAMAN NEWSLETTERS 042010

33


••••
•••••
8: elaman
German Security Sultition‘

TECHNICAL
SURVEILLANCE EQUIPMENT
LONG-RANGEAUDIO CAPTURING & RECORDINGSYSTEM
The Model 6309 Audio scope System is a high- performance audio capturing and recording system
customized for the intelligence end-users.The unit allows an operator to zoom in on a particular object
and record required sound in much the same way as a camera zooms in a picture.This makes the unit
an ideal solution for separating out conversations in noisy environments.There is both fixed and mobile
solution.The core component of the unit is a microphone array composed of 285 individual microphones
integrated in a slim 1.5-meter dish.
The exact direction for sound pickup is steered from the video screen without any physical movement
of the dish.The advanced signal processing makes the targeted sound source clearly audible even in a
noisy environment.
ZOOM IN ON SOUND SOURCES POSTRECORDING
Any audio missed in real-time can be captured later in replay.This unique function is ideal for crowded
places where the operator does not know form whom or where he would like to separate the sound until
later.
INTUITIVE USER INTERFACE
The systems very intuitive user interface is offering fast, accurate operation of the unit.The operator
monitors the live on-screen view from the camera, and simply moves the cursor to capture selected
audio. The trackball is used to follow moving objects and the jog wheel to go back in time tor replay.
The system supports multiple output channels and the operator can select up to five listening zones
simultaneously —both in real-time and in replay.The operator can also choose to select filters to eliminate
undesirable sound and noise.

a

Fixed System installed in a room ceiling

Mobile System installed in a car tire

AS

gAb4 . w f o t
Cob
C • C
inmoor,
a

%fa* k
dat,

L
AV;

‘ 1 1 1 1 1

AM

M

P

I

)
1

1

1

1

1

1

0
ASP LI

Mobile Configuration

F

i

x

e

d

Configuration

ELAMAN NEWSLETTERS 04 2010

34

NO


•••
,••••
• e: elamon

an

German Security Solutions

ty Solution

em
ect
jnit
bile
nes
tent
in a

TECHNICAL
SURVEILLANCE EQUIPMENT

The Model 7312Tracking SystemA8 is a GSM audio
Transmitter with an Integrated GPS module, data
logger, movement sensor, switched output and the
option of Audio recording.Transmission of position
data occurs via SMS, CSD and GPRS connection.
The internal data logger is using microS0 card to
store the traces.These data can be also received
via CSO, GPRS or USB Connection. The control
and the configuration of the A8 Tracking device
is also possible via SMS, CSD, GPM and USB
Connection.

no.

tied
until

'ator
cted
play.
)nes
note



Deployed in situations where a user's true mobile
The Model 4016-2 30 is a convenient means of
providing untraceable communications for Voice,
Text and Pictures and is ideal for
• L a w Enforcement Informant and Operative
Management
• Intelligence and Counter Intelligence work
• Hostage/Kidnap communications
• Witness relocation/protection
communications
• Providing undercover operatives a covert
comms recording facility
• Countermeasures against GSM/3G location
services
The unit is a self-contained remote call diverter for use with GSM and/or 30 networks. It allows calls to a
given mobile to be divertecl
called or calling party. Where an incoming call has to be monitored e.g. kidnap scenarios. It offers digital
recording and live monitoring on all diverted calls.
Key features of the system are:
• Receive and transmit text messages from any GSM/36 network
• Automatically redirect text/picture messages and audio
• M a k e a VOIP call from anywhere, and appear to be a local Mobile
• Internal logging of all received and transmitted messages
• Screen and keyboard user interface
• Redirect to a predetermined number orVOIP terminal
• Change predetermined number via text message
• Operates with any 36/GSM network provider (including pre-paid)
• Totally under the control of the operator. No network involvement
• Compact system, totally portable (12v dc power requirement)

ELAMAN NEWSLETTERS 042010

35

S


•••••
*: eiamon


man Security Selutiorut

TECHNICAL
SURVEILLANCE EQUIPMENT
DIGITALSTEREORECEIVER INC, IP
The Model 1031 Stereo Receiver is a handheld
unit providing digital wireless microphone
systems which offer extremely high quality audio
output. It is a true dual diversity receiver designed
to counteract multiple reflections i n difficult
radio frequency environments. Dual antennas
and receiver channels operate in parallel with
proprietary circuitry to identify and select the
better input. Modern Digital Signal Processing
is also employed to achieve the best possible
results.

PIGITALSTERE•
••

)1n

Smaller than 1/4 the size of a credit card and only
4 mm thick. The Model 1030 tiny transmitter can
fit into practically any concealment. The low
power consumption combined with outstanding
stereo or mono audio (up to 8000 Hz response)
make this transmitter an outstanding performer.
The ultra miniature positive lock connectors allow
flexibility for microphone interchangeability and
the connections will not come apart. A milled
aluminum case provides exceptional durability.

811 IETOOTH I D I n SURVEILLANCE
The Model 6411 i s a multipurpose audio
surveillance system based on bluetooth wireless
technologies. It can be used for live surveillance
or as a recording device for audio or GPS tracking
data or as a combination of the two.
Applications:
1.Combined Tracking and Audio Surveillance
2. Simultaneous Live Tracking of MultipleTargets
3. Officer Safety (Force Protection)
4. R oom Audio Surveillance

ADVANCED DIGITAL STEREO/AUDIO
SURVEILLANCESYSTEM

'*r

This 6100 system is a full-featured, portable
digital audio listening and recording solution for
Law Enforcement Agents, Intelligence Services
and the Military. The system provides 57 RF
channels and 8 RF repeater channels and is
extremely suitable for multi-location surveillance
operations. The 6100 Series receives, records,
and plays audio from their transmitters.

ELAMANNEWSLETTERS 04 2010

36

••••
111111 . 1 . 111111111 M 111 7 : 1 4 11 T
German Security Solutions

TECHNICAL
SURVEILLANCE EQUIPMENT

The Model 104 Mobile Router is an ideal solution
for providing secure global communications to
your systems, machines or remote networks.
Using our mobile router there are no distance
limitations, for remote site monitoring! All you
need to get connected is our Mobile Router and
SIM Card from mobile Internet service provider.
Router includes quick and easy configuration
wizard. The wizard step by step will help to set
up 3G settings and create local wireless network
within minutes. Built in firewall protects local
networks PC's from intruders.

The 6517 kit includes:
• 1 body-worn recorder
• 1 covert belt recorder
• 1 covert watch recorder
• 1 covert lighter recorder
• 1 covert keyfob recorder
• 1 GSM/recorder for rooms or cars
• 1 covert harness
• 1 set of batteries

MICROREnCREIEH KIT
The Model 5618 Micro Recorder Kit consists
of 2 Micro Recorders. Small enough for easy
concealment, with capabili‘ies ideal for multiple
scenarios. To accompany the Recorders are
multiple power sources, offering different sizes,
length of operation life, and power input.. The
Kit also comes w i t h multiple rechargeable
LiPo batteries ranging from 250mAh up to lAh.
Compatible with non-rechargeable 19Ah batteries
and also a mains power supply.

CONCEALMF r

111

-rx
Anisiff moist fmetita•

11111

1

The 5626 kit includes:
• 1 body-worn
• 1 video/audio keyfob
• 1 video/audio covert earphone
• 1 video/audio coffee cup
• 1 video/audio smoke detector
• 1 covert video/audio PCB
• Accessories
• 1 set of batteries

RAMAN NEWSLETTERS 04 2010

37


••••
•••••
•••elamon
German Securily Soulitts:

TECHNICAL
SURVEILLANCE EQUIPMENT
MODEL5610COVERTVIDEOAUDIORECORDERSOPTIONS

Model 5610-3
5MP - 8GB
Recording Time: over 100 minutes

Model 5610 - Pen
2MP - 512 MB
Recording Time: Over 2 hours

Model 5610 - Pen Kit
2MP
Recording Time: Over 2 hours

Model 5610 - Set Kit
5MP 8 GB

Recording Time: Over 2 hours

.72

ELAMAN NEWSLETTERS 04 2010

38




••••
.••••
••elaman
e

TECHNICAL
SURVEILLANCE EQUIPMENT
VIDEOOBSERVATION CONCEALMENTEXAMPLES
WITH ORWITHOUT TRANSMISSION

11

P

me

•••
I M E E m b

f l o . E •


• • • • . n . . . •

4

1

1

.

•EMI•E.

HAMAN NEWSLETTERS 04 2010

39




• • • •
• • • •
• • e l =


aman
;irh

TECHNICAL
SURVEILLANCE EQUIPMENT


The Model 7320-22 transmitter fits in every jacket
pocket because of incredible small dimensions..
It has an extremely robust but nonetheless very
light weight housing made of aluminum and is
therefore suitable for almost all applications.
Special protected connectors avoid accidental
disconnections during operation. The device has
100mW transmission power but you can increase
this power by connecting gain antennas. The
I t r a n s m i t t e r is available as 1,4 GHz, 2.36Hz and 2.4
GHz device so that you have a reliable transmis99n
even if you do not have a line-of-sight connectibn
between transmitter and reri•p,
the Model 7320-23 diversity reciever for flexible
operation and more possibilities. Integrated stated-the-art batteries guarantee long running time
of the receiver without mains power supply, so
that you can operate the receiver independently
without cables and without installation efforts.
• mobile diversity receiver
• perfect for broadcasters
• f o r use with V-mourn batteries
• M R C - maximum ratio combining
• configuration via OSD
• e a r phone connectors

Pin
4

The Model 7320-24 Mobile video transmission
plays an important role nowadays. But also
stationary applications become more advanced so
that many users are looking for new possibilities.
Long range, reliability and better video quality —
this is what the digital COMM receivers stand for,
from the standard desktop device to the complex
8 antenna diversity system.
Model 732010 with its small and handy case
with integrated 2-channel diversity receiver,
brilliant 'UT display and strong batteries is the
ideal solution for mobile applications. Available
in 230MHZ, 1.4, 2.4, 4.4 and 5.8 GHz., our diversity
systems u s e a special technique f o r t h e
interpretation o f unequally received antenna
signals. The "Maximum Ratio Combining" (MRC)
procedure evaluates signals and combines the
best parts in order to obtain a high-quality, failure
free signal.

ELAMANNEWSLETTERS 04 2010

40

1



an

• • • • •
(f•

, Solutions



German Security Solutions

TECHNICAL
SURVEILLANCE EQUIPMENT

The Model 5030 is an extremely light weight and
quite flying surveillance platform. Due to the
electronic position control the AirRobot
Robot can be
flown without any pilot experience. The flying
surveillance platform can be in the air manually
controlled or is fully programmable. If receives no
commands, it remains at its height and direction,
GPS or optical position system (OPS) controlled.
This allows the pilot to concentrate fully on his
surveillance mission. Different Cameras for video
surveillance operations are available (Daylight
colour sensor, night vision, digital andThermal),
Designed specifically f o r professional
surveillance, Model 5122 uses the latest series
of ultra low light (0.00003 lux) with 'Night Mode'
cameras to produce unbeatable images in day
and night conditions,The flexible 6 to 100 x optical
zoom and pan and tilt system allows targets to
be monitored at long distances and tracked
using the proportional pan, tilt and zoom system.
Deployable in minutes and powered by battery or
mains, this rapid deployment system is a powerful
tool for any serious surveillance operation.

ible
ate- •
Lime
I, so
!ntly
s.

case
elver,
s the
liable
ersity
the
tenna
MRC)
ts the
allure

• •e 1aman
• • • •

The Model 5214 u n i t is a high-performance,
miniature thermal imager fa?, real-time imagery
in the 1 -14 m spectral range (Long-Wave InfraRed, LWIR).This extremely small and lightweight
camera delivers images of outstanding quality,
at very low power consumption, The unit can be
used for both standalone applications and for
integrated multi-sensor systems,
The Model 5215 Infinity Lenses are the only
lenses in the world that stay in focus throughout
the entire image. Conventional lenses have a
limited depth of field, which means they can only
focus on either the foreground or the background
of an image at one time - never both.The Infinity
Lens defies this tradition. Employing ievolutionary
optics technology that can focus on objects both
in the foreground and background. the Infinity
Lens offers massive depth of field (MIN) meaning
the foreground and background of a shot are in
focus simultaneously.

ELAMANNEWSLETTERS 04 2010

41


• • •


*: e I aman
German Securdy S o m i c s

TECHNICAL
SURVEILLANCE EQUIPMENT
COVEk u r i r L i t i t LLA vilJEO LINK

SYSTEMWITH OPTIONAL IP Uri'
Model 5824 consist otdigital audio and analog
video Transmitter. Remote control allows the
transmitter and voltage supply to the camera to
be switched on/off from the receiver's controls.
It is possible to connect 3 cameras to one
transmitter and remotely select between them. A
unique audio encryption key for the digital audio
transmission is available.The receiver can handle
up to 100 transmitters and each transmitter is
identified by its own serial number.

1
The Model 5514 unit one piece design allows
all components t o b e housed inside t h e
ergonomically designed pistol grip handle. When
in use, no external cable or connections are
required. Battery charging time is approximately
4 hours, allowing about 4 hours of continual "on"
time. Each fiberscope comes complete with a
spare battery to enable extended inspections to
be carried out, external battery charger included.

LTISTr'PAM PPRTABLL
r\n

)
a

I'

COVERTNIGHT VISION SYSTEM

The Model 6513-2 portable END MultiStream
Interview Recording system i s designed
specifically for portable use. I t is housed within
a lightweight but robust metal 'cabinet and is
further protected by a purpose-made carrying
bag. The bag contains all necessary accessories
for portable interview applications including a
stereo table microphone, dual-view camera, full
height extending tripod and accessories.

The Model 5210 is a powerful, multi-purpose
pocket-sized monocular night scope. The pocket
scope is designed to be used either as a standalone night vision device or in combination with
a wide variety of standard video, still photo, CCTV
equipment and spotting scopes.
It i s ideally suited f o r covert night-time
observation and intelligence-gathering purposes
using standard photographic media, as well as an
effective aid to night-time field missions.
The Model 5210 employs a choice of image
intensifier tubes characterized by high resolution
,
•• types.

ELAMANNEWSLETTERS 04 2010

42

• •••
• elaman


lan

German Security Solutions

TECHNICALSURVEILLANCE EQUIPMENT
CMOEEQUIPMENT
I

GOVERNMENT KL'i u r '
With the Model 2021 profile cutting system you can
simply produce key blanks yourself. You can also
produce a key from a photograph from the original
key or lock. This system is foremost developed to
make keys for master lock systems and for lock
cylinders with special profiles.The Profile Cutting
System is divided into two parts:

dg
he
to
no
A
dio
is

earn
vied
ithin
d is
ying
)ri es
ig a
full



1.Cutting Program with Speed Profile:This program
calculates the key profile and is absolutely required
for the functioning of the profile cutting system. As
a service for you the program is already installed
in the case from the mechanic manufacturer,
although not activated.

2. Mechanic Unit with Case and Mains Appliance:
This Mechanic is produced by a special mechanic
manufacturer and includes the complete mechanic
motion build in the case of the unit.

Photo of a lock

Copy of a key made from a photo

cmai Ell z*
co4
Dom security locks

Manipulations kit for nom locks





1
grl
"

-

1 1 1

EVVA3KS Lock Decoder

EVVA3KS sophisticated lock

ELAMAN NEWSLETTERS 042010

43





0a*em1a

• • • •
• • • •

n

German Security Soiuticot

TECHNICALSURVEILLANCE EQUIPMENT
CMOEEQUIPMENT
MAGNETICCARDCOPIER
A fast reliable, portable, easy to use system for
cloning magnetic stripe cards encoded in any
format, such as Hotel cards and other access
magnetic swipe card. The Model 2009 unit
provides fast and efficient access to the data
on a magnetic stripe card, for reading, writing,
cloning and erasing purposes. The system has
two operating modes: field mode and base mode
Feld mode is designed for simplicity and speed,
whilst base mode is designed for functionality
and versatility.

IMPRESSICc
This k i t has been thoughtfully put together
to include all the essential tools that a CME
operative needs in order to undertake standard
impressioning tasks. I t includes a selection
of especially adapted cylinder plugs to assist
mark identification and accurate spacing during
filing, our designed impressioning handle with
a unique in-handle tool set, and a selection of
common blanks especially prepared and ready
for impressioning.

ELAMAN NEWSLETTERS (14 2010

44






• • •



eft •: e amon
• •

• • •

1
German Security Solutions

DATARECOVERY,
FORENSICLABORATORY & ENCRYPTION
DA
FORENSICLABORATORY

forensic data recovery

Forensic data recovery is not to be confused
with standard data recovery. Data recovery is
the art of retrieving data from a source that is
not easily obtainable, (mainly hard disk drives,
memory cards, tapes. RAID systems etc), however,
Forensic data recovery is different. In standard
data recovery, the original data source, (e.g. the
dead hard drive) is rebuilt, lif required), then an
'image' is taken, at which point the data recovery
technician re-works the data so that it is useable
to the client.

, Ilibi
• ••••• a l *mom


/

n i t



-

"kt

tad

digital forensics
Al

Computer Forensics is the function of utilising
scientifically proven methods t o assemble
together and process data found on a digital
device, (computer, hard disk drive, mobile phone,
memory card etc), and interpret that data for
possible use in a court of law or other theatre
of investigation. The evidence may assist in the
prosecution or a criminal, help in the defense of
an accused person, or be of intelligence to an
individual who is seeking knowledge for either
personal or professional reasons.

W

t o o • • • • • f•onliko
• • • • twol•
• • • • • • ,••••••
• • ••••••••••
• • • • • • •
Woad* Fames • ammo, •
• t . m

• 'AllAirr

Loa Ms &worm.
s o Imo • • • • 1111

Mobile phones are consistently used during
many forms of criminal activity, and by performing
mobile phone forensics on the cellular network
usage of a particular mobile phone it is possible to
trace where and when calls Vvere made from.This
is particularly useful in stalking type cases, where
a mobile phone has been used to harass another
individual. A mobile phone forensics firm will be
able to trace and quantify phone uses within the
cellular network.

ELAMANNEWSLETTERSQ42010

45

••••
•••••
eiaman


German Security S o u r t i c

a

DATARECOVERY,
FORENSICLABORATORY & ENCRYPTION
GSMMOBILE INVESTIGATOR/CLONET
The Model 4018 is the complete mobile device
forensic system that is easy to use on a Windows
PC. Our easy to use tools will allow you to
configure your own forensic reports within a
matter of minutes. Just connect the handset
you need to examine and the unified wizard will
guide you through the entire process to produce
a secure, combined, personalized report with your
own branding and logos.
New in this update:
• Support for 169 new devices (total 1618) including 35 CDMA models in the unit Logical
• Support for 22 new untested phones (total
136)
• Support for 114 new devices (total 5541 including 26 GPS devices in the unit Physical
• S I M Id Cloner support including in help file
7 SM
With the addition of encryption,text messages are
provided with unprecedented levels of security.
The Model 5328 removes all intermediate stages
such as secure messaging centers or centralized
back office encryption engines. Messages are
constructed and secured using the senders
handset and standard SMS text messaging. The
recipient is authenticated and then decodes the
message received via standard SMS directly on
their handset. The message is never stored in
the clear and can only be encoded and decoded
using our SIM card.The System can be operated
in COVEHT mode, whereby the mobile looks and
operates as it would without being present. Only
by using a secret activation method does the
system become active*.

wud
SEMI
• Solt

71Zigt

GSMENCRYP tuN
The Model 5325-1 is a GSM encryption device
that can be connected to commercially available
mobile phones using a Bluetooth • interface. It
provides confidential, tap-proof communications
anywhere in the world.The encryption has been
embedded in the unit hardware to avoid the
susceptibility of GSM phones to manipulation.The
unit is the most secure voice encryption device
for mobile communications on the market today.
It features an elegant design, outstanding voice
quality and is easy to use and operate*.

,f?
•* Suspect to Export Approval

ELAMAN NEWSLETTERS 04 2010

46

1

M E 1111 b ,

„••••O• •
"• elamon


German Security Solutions

TECHNICALSURVEILLANCE
COUNTER-MEASURES
To be effective in TSCM it is essential to use trained
and qualified people who have solid background
knowledge of surveillance techniques and use the
proper equipment. Elaman is in a unique position
to provide knowledge and equipment to counter
threats and offer training in the latest equipment
and techniques involved in information gathering
and surveillance.The threat level for cables, LAN
and Wireless LAN has increased dramatically.
Although TSCM are described in more detail in
our 2010 catalog, the following is a brief summary
of our new products:

Mir
The Model 7507-3 is a modern device, which
functions include: video camera detection,
security support, etc, designed for quick detection
and exact location of secretly installed indoor
micro video cameras, including cameras with
pin-hole lenses. The unit works on the optical
principal and no electromagnetic and extraneous
emissions get in its way.

GSM/UMTS DFITCTION AND
LOCATION 'The Model 7558 system uses active, patented
techniques to find any GSM and LIMTS devices
in the areas to be swept. When devices are found
the unit operator can quickly distinguish between
legitimate o r authorized mobile phones and
GSM bugging devices. Aytomated processes,
network surveying, system set up and range
selection, device detection and results analysis
make the system effective and efficient. The
system's database determines the threat level
of a suspect device and is updated on a monthly
basis to ensure the very latest threat information
is available.

pArrYFI r) 5rrA handheld fiF measurement, the 7554 unit can find
radiation sources in any surroundings from 1MHz
to 9.4GHz, including their respective frequencies
and signal strengths, directly displaying exposure
limits.The calculations are performed unnoticed
in the background by a high-pert9rmance DSP
(digital signal processor). This software offers
an incredible number of features, such as multi
device capability, high-resolution, and a display of
channel identifiers, etc.

ELAMAN NEWSLETTERS 04 2010

47




•••••::• •
••• elaman
German Security SO4.1110116
t

TECHNICALSURVEILLANCE
COUNTER-MEASURES
30 X-RAY Su i-1 v
Model 7539 is used for upgrading mobile X-ray
units from 2D to 3D visualizing. All common
types of X-ray image media can be used, even
conventional films and storage foils, in case they
need to be scanned later on.The digital 20 images,
coming from a scanner or an image converter, can
be individually enhanced and processed into 30
visualization by the 3D X-ray software. In the 3D
viewing mode, zoom, detail, pan, tilt and rotation

' I
-4(

o

f

mouse control.
the stereoscopic image i s changeable by

The Model 7551 ,w,1 is a lig. Ime[ght, portable,
battery powered x-ray scanning system designed
in co-operation with first responders and E00
teams to meet the needs of the field operative.
The slim detector panel is positioned behind the
target; the generator is placed in front. Quick and
simple to deploy, the system produces high quality
real-time x-ray images for rapid and accurate
decision making.

The Model 7605 TSCM Personal Kit is designed
for performing Intermediate Level Technical
Counter Surveillance Measure operations.
Containing equipment used in the main 3 areas
of TSCM Sweeps, at a budget making it ideal
for issue t o individual TSCM personnel. All
concealed in a 'Cabin Baggage' approved Laptop
; C a s e , the TSCM Personal Kit will not look out of
place being carried into a hotel, or into an office
ensuring a level covertness when entering a
sweep area.

:IP NON TECHNICAL TSCM KIT
It is not always possible to have a TSCM Team
sweep an operationally sensitive area. When
travelling abroad, a TSCM Team cannot always
follow their Key Personnel t o ensure their
security. When using Hire Cars, Hotels and other
publically accessible areas, Key Personnel cannot
ensure the security of their sensitive information.
Concealed in a 'Flight Approved' Laptop Case, the
Model 7604 TSCM VIP Kit contains equipment
that any non-technical personnel can operate
to provide a basic level o f assurance that
eavesdropping devices are not present.

ELAMAN NEWSLETTERS 042010

4


• • • •



• • • • •

e aman
1

German Secuntv S:

TECHNICALSURVEILLANCE
COUNTER-MEASURES
a

POBimDLE SPECTRLav

i

Model 7508 is uniquely different from all other RF
detection systems as it uses a more advanced
J

technologies to provide accurate results. It uses
a twin antenna system, whereby one antenna is
placed outside the target location and the other
inside. Using the software it is able to show all
suspicious transmissions that are stronger in the
target location than outside. Standard frequencies
are up to 6GHZ with optional frequencies up to
26GHz.
7
Our powerful n e w advanced model 7543
Integrated Network Analyzer gives you a clear
view of your entire enterprise—providing visibility
into every piece of hardware, every application,
and every connection on your network. N o
other portable tool offers this much vision and
all
technologies and applications, manage and
validate infrastructure changes, solve network
and application performance issues, Secure
network from internal threats.
It shows you where your network stands today

and helps you accurately assess its readiness for
the changes you need to make,

.) L U L L

J H I

The current method for the remote interrogation
of GSM subscriber identities and/or equipment
is to use Model 4050 bogus cell site, and lure
the target mobiles over to this Ceil.The unit can
monitor the LAC, Power levels, and Neighbour
lists for GSM and 36 and C1/C2, in the case of
GSM.The 3G unit will generate an alarm based on
any combination of values monitored.
Key features of the equipment are:
• Detects bogus Cell sites, possibly being used
for IMSI capture or Call intercept
• Multilevel alarm/ event triggers
• Generates alarms via Internet or text
message
• 1 6 channels
• Constant monitoring of selected GSM sites
• Constant monitoring of selected 36 sites
• Remote connection via web interface

ELAMAN NEWSLETTERS 04 2010

49



*9
•e 1amar

• • •
• • • • •

VIPSECURITYPRODUCTS

Elaman• philosophy is that VIP Security Products
should be offered as a whole range, offering
everything from standalone products to complete
system solutions, including training to support
any government agency's goals o f achieving
successful VIP operations. Our new 2010 catalog
provides a comprehensive selection of advanced
VIP equipment. We have put together a brief
selection of products below, but strongly suggest
you view the complete 2010 VIP catalog.
To order one please contact:
infoLqielaman.de
-VIP Forward Observation
-VIP TSCM Detection
-VIP Secure Communications
-VIP Surveillance Kit
-VIP Personnel &Vehicle Protection
-VIPTraining Course

VIP Security Products
-VIP Convoy Jammers
-VIP Portable Jammers
-VIP CBRNE Detection
-VIP CBRN Protection
-VIP Security Screening

DIG -,L WIDEBAND
JAMMING SYSTEM

4

Digital Wideband Jamming has become a n
essential part of 1ED protection, whether for
mobile applications such as motorcades but
also for all types of stationary applications in
governmental buildings. Jamming systems can
be used for jamming of RCIEDs to prevent the
activation of radio controlled roadside bombs.
With up to 2.450 Watt of output power our digital
wideband jamming system provides enough
power throughout the whole frequency spectrum
of 20 MHz up to 6.000 MHz (opt. 18.000 MHz) to
really master difficult RCIED scenarios even under
worst conditions. We are taking digital jamming
to the next level and allowing our customers to
individually program their digital jamming system.
Each system can be individually programmed and configured for optimum usage in the respective area
of usage. Based on the free-space-loss formula we can calculate and configure our systems to provide a
100 meters guaranteed protection zone around motorcades in high-threat areas.

ELAMANNEWSLETTERS 042010

50

• • • ,
• • • • • 1

elaman
c•r•.•1 Security So J u a n e

VIPSECURITYPRODUCTS

PORTABLEVIP PROTEL1;uN CASE
Model 3543 Jammers high power covering all
frequencies
-850-894 CDMA
- 450-470 MHz, 15W
-825-960 MHz, -18W
- 1805-1980 MHz, 17W
- 2110-2170 MHz, -15W Icover 3G)
- 2400-2500 MHz, 15W (cover WIFI)
- Total Output power: SOW
- Case size: 56 x 42 x 26 cm (pelican case 1560)
- Programming Software

The Model 3530-1 Portable Covert GSM Jamming
System i s a 4 Band Jammer covering the
frequencies most commonly used by GSM and
3G Cellular Systems. It is designed to be effective
within a 25 Meter range within the target area as
shown below. The system is unique in that it does
not require any ventilation, making the unit silent
and also covert. As the system does not require
ventilation, in can be operated with the case
fully closed. This means that it can be placed in
a located, be effective and not draw any undue
attention.

INnr2NEI-1!r! sliRvrI[LANTF
The Model 5501 Under Vehicle Surveillance
System is designed for temporary deployment and
portability between sites.The system comprises:
Galvanized Steel Ramp with integral metal
housed cameras and LED illuminators.These can
be color cameras and white LED illuminators, or
monochrome and IR LED illuminators. Control/
Monitor Pack is housed in a portable rack mount
case with removable front and rear protection
covers.

ADVANCE, .,ANDHELD
r1 TIP' D E T E C T n P
The Model 9102 Advanced Handheld MultiPurpose Detector is designed for use by first
responders, homeland security, militory soldiers,
law enforcement a n d forensic chemistry
personnel. It provides immediate identification of
unknown solids, liquids and mixtures, including
narcotics, explosives, white powders, chemical
weapons, WMDs and toxic industrial chemicals even through the walls of their containers.

ELAMAN NEWSLETTERS 04 2010

51


• • • •

• • •• •

*: e 1aman

VIPSECURITYPRODUCTS

BODYSCANNER
The Model 9140 unit quickly creates a 3-0
black and white silhouette of the subject that
reveals concealed objects. Operators can locate
weapons, explosives, other banned items or even
intellectual property.The unit can be upgraded in
the field to take advantage of advanced, imagefree Automatic Threat Detection software that
is enhanced as new threats emerge. The unit
allows operators to clearly view objects made
of any material-including liquid, rubber, wire,
plastic, ceramic and metal-weapons, contrabarid
and other objects are quickly and easily located.
The system utilizes harmless millimeter waves
to generate a clear view in seconds, and is ideal
for use anywhere checkpoint security is needed,
such as airports, military bases and border
crossings, courthouses, embassies, prisons and
other government buildings.

PF7ABLE WALK THROUGt
r - I nETFrTrIP
The Model 9130 is the worlds most versatile
walkthrough metal detector as it can be deployed
and transported to virtually any location and
be up and running within five minutes by a
single operator! The Model 9130 operates from
rechargeable sealed batteries, has zone specific
detection and is designed for use in demanding
environments. It is the only multi-zone metal
detector small enough to fit in the boot of a car.
The Model 9130 is ideal for sporting events,
conferences, schools, VIP security or for any
event or location requiring high discrimination
metal detection combined with ease of use and
total portability.

ADVANCED EXPLOSIVESTRACE
'ECTOR
The Model 3500 is the world's first explosives
trace handheld based on chemiluminescence.
t detects military, commercial, even homemade
explosives, liquid and powdered, such as TATP
and other related peroxides, ICAO taggants,
plastics, ammonium nitrate, black powder, and
other nitrates. It has high selectivity to explosives
and immunity to weather and environmental
interference.

ELAMANNEWSLETTERS 04 2010

52

••••

• •
••••
*: elaman


4

VIPSECURITYPRODUCTS

RADIATIONDETECTOR
The Model 9126 is a complete range of smart
probes to enhance the detection capabilities of
the system.
Different probes associated to the radiation survey
meter add:
• gamma and beta/gamma contamination
monitoring for vehicles, airc rafts, personnel,
ground
• monitoring personnel alpha contamination
• monitoring alpha contamination wounds
• search and management of Gamma
contamination

1111111E

The Model 9113-1 Food Poison Detection Kit
comes with a set of three separate detectors and
everything needed to analyze a food sample and
record the results for future use or as evidence,
The Food Poison Detection Kit detects dangerous
levels of more than thirty poisons. The detected
poisons include compounds containing cyanides,
azides, chromates and sulfides (Group I Poisons),
thallium, lead, cadmium and mercury (Group II
Poisons) and ALL arsenic-containing compounds.

m••••1

r,Bnr
The CBRN Support vehicle is designed to bring
CBRN supplies to the CBRN incident, again the
vehicle can be of any variant or type, We will help
you to work out the equipment that is required to
support Responders team.
Example:
• Small decontamination equipment
• Spare air cylinders
• Compressor air recharging air cylinders
• Spare CBRN suits/canisters/Boots/Gloves
• Hazard tap/markers
• Spare battery's
• Spare CBRN detectors

LODVAN
COO Vehicle is custom-built to incorporate the
best available equipment and enables operators
to provide a fast response to detect and dispose
of terrorist devices. Each Bomb disposal vehicle
is specially modified and i s soplied with
an assortment of the most up-to-date IEDD
equipment, depending on client requirements.
A typical list of components would include the
following: Search Equipment, Scene of Crime/
Forensic Equipment, Identification/Analysis
Equipment, Protection Equipment.

ELAMAN NEWSLETTERS (14 20111

53


• • • •
• • • • •

*: e 1aman
SeuuFt

INTELLIGENCEGATHERINGAND
TECHNICALTRAINING SERVICES
From i t s regional headquarters, Elaman
provides first-class security training services
to governments a n d related organizations
worldwide. Our clients also include security and
intelligence organizations recognized b y the
United Nations, who seek assistance in improving
their intelligence gathering capabilities over a
variety of disciplines. For a complete 2010 Training
Catalog please contact us at infoCd)elamartde

rolF!'!ITE'l'INING SOLUTIONS
1-CMOE
2- Intelligence Gathering
3-Technical Surveillance
4-ISOM
5-ISCM linked to IT Threats
6- IT Exploitation Training
7- Intelligence Analysis
8- CBRN Threat Awareness

• 'RVE

;
a



C

T

"

1- Overt SurveillanceTechniques
2- Covert Surveillance Techniques
3- Operational Surveillance Methods
4- Intelligence Analysis and Evaluation
5-Technical and Engineering Support
6- Audio and Video Surveillance
7- Concealment Courses
8- Photographic Surveillance
9- AudioNideo Processing
10- Mobile Phone Forensics

11EXPLUITATiON TRAINIM
Our IT intrusion training package provides the
government end-user with up-to-date advanced
IT intrusion tools and techniques t o enable
intelligence agencies t o obtain information
that can only be obtained by using IT Intrusion
components.
1- IT Information Warfare
2- VolP Intrusion
3- Advanced Intrusion Techniques
4- Exploitation Techniques
5- Root-kitsTraining

RAMAN NEWSLETTERS 04 2010



54

e•o


• • • •

•• e aman

• • • •
(f,



1

G e r m a n Security Solutions

INTELLIGENCEGATHERINGAND
TECHNICALTRAINING SERVICES
tEcHkiiumL
n t ATER-MEASURES

11

The objective o f training government TSCM
teams is for trainees to be aware of all technical
espionage threats and the procedures of search
and detection.
1- Latest TSCM electronic threats
01 2 - Prevention of bugging/infiltration
3- Cable measurement
4- Physical search
5- RF measurement
6- PBX/IT attacks
7- Securing IT facilities and data

1-Technical Operations Training
2- Covert Technical Deployment
3- Covert CCTV Deployment
4- Advanced Operational Drilling
5- Operational Alarm Defeat
6- Magnetic Hotel Room Lock-picking
7- CCTV and PIR Defeat
8- Safe Manipulation
9- 'Silent Drilling
10- Explosive Methods of Entry

ELAMAN NEWSLETTERS 04 2010

55


•••rn
••••• •
6: elamar
INTELLVIDEO/AUDIO
CONCEALMENTCOURSES
Our Specialist Video/Audio
Video/Audio Concealment Training Courses are designed for Technical Surveillance
departments who require their own personnel to be trained on concealment techniques to enable
these specialist skills to be used in their own departments. The course starts with the basics of fitting
microphones and preamplifiers through to concealment techniques and installing covert devices into
everyday objects, rooms and vehicles. Practical exercises also include audio/video transmission, digital
audio/video recorders, concealment of antennas and power supplies. As part of the course each student
will receive a concealment tool kit as well as a be able to prepare and install covert devices that are more suited to the environment in their own country.

AV M CONCEA! ' • •JI SYLIABUS

k••••
oet

1- Fitting covert microphones
2- Producing preamplifiers
3- Body-worn concealment techniques
4- Audio deployment in cars
5- Audio deployment in rooms
6- Producing concealment installations
7- Modifying high-tech digital transmitters
8- Practical surveillance exercises
9- Modifying GSM phones
10- Selecting the right power supplies

r r''

1

1- fitting covert cameras
2- Producing preamplifiers and microphones
3- Selecting the right power supplies
4- Body-worn video concealment techniques
5- Video deployment in cars and rooms
6- Producing video concealment installations
3- Integrating video transmitters
8- Practical surveillance exercises
9-Through-the-wall-video surveillance
10- Integrating video GSM Links

ELAMAN NEWSLETTERS 04 2010

56

ELAMAN GMBH
GERMAN SECURITY SOLUTIONS

ELAMAN REGIONAL OFFICES: MUNICH - DUBAI


••••••••
••
••• elamon

Munich i Germany
Fax: • 49 - 89 - 2 42 09 18 - 1
Tel: • 49 • 89 - 2 42 09 18 - 0

Mail: [email protected] de
www elamantle

rr

Document Path: ["391-elaman-newsletter-governmental-security.pdf"]

e-Highlighter

Click to send permalink to address bar, or right-click to copy permalink.

Un-highlight all Un-highlight selectionu Highlight selectionh