Name: EKMS 1701, EKMS 1704, EKMS 1770, EKJ 1500, EKJ 1520, EKJ 1601, EKDED 2303, EKFP 2140,

Text: Sophisticated
Electronic Equipment
for the Security Field

•TY & PERSO
CTION

VO

AP

1

DETECTORS
DEACTIVATO
INFORMATIO
DEFENSE & OFFENSE
ERAS
UDI

• Data protection solutions
eration with lea
for organizations and
I enterprises in o
for private customers
• Services and products
elop and provid
cover all areas o f
ass solutions o
security
ption, tapping
mming, surveillanc
•Our products a r e
explosives- and drugs
being sold t o t o p
security organizations rsetection.
••

1161.

I t IOMAIONOF

mai thAmm5cocaptea

19Security Engineering Ltd.

Company Profile
ELKAT is a leading Israel integrator and distributor of sophisticated electronic
equipment for the security field. We also offer protection solutions for organizations
and for private customers.
ELKAT's services and products cover all areas of security, from consulting to
VIP-protection; from quality investigation equipment to highly advanced electronic
surveillance systems. Our products are being sold to top security companies
around the world.
ELKAT has the ability to provide emergency and security solutions: threat
assessment and gap analysis, plans and procedures, crisis management,
emergency operations centers, security planning and design, training and
exercises, VIP protection courses and training.
ELKAT works in cooperation with leading global enterprises in order to develop
and provide first-class solutions of encryption, tapping, jamming, surveillance
and explosives- and drugs detection.
With more then 20 years of experience in the security protection field, we have
the needed experience, know-how and perceptive to answer the demands of
any client. We understand the complexity and sensitivity of the field and guarantee
top-level service to our business clients.
Companies, businesspeople and other institution, who are looking for confident
protection again unsolicited infiltrations and sabotage of their enterprises, will
at ELKAT find the perfect partner who will listen, advice and find suitable solutions
to reduce risks and losses, discover frauds and eliminate threats.
Please contact us at:
ELKAT Security Engineering Ltd.
19 Mikve Israel St, Tel Aviv 65115, Israel
Tel: 972-3-560-4744
Fax:972-3-560-4745
elkat@netvision.co.11
http://www.elkat.call

N
Secur/6/ Engineering Zia'.
19 A
P
MonitorIngEKMS 1701
- GSM 5.1 Half Active
?
t
4
The system specification
1

'The CTS GSM intercept is

d accessories
•ngle or Dual Band GSM
. ' eceivers built into lightweight
I t portable box
s Single or Dual Band GSM BTS

'Passive intercept of A5/2 GSM conversation
*Invisible active intercept of A5/1 GSM conversation
'Passive intercept of SMS
'Archived Data Base Recording
' Exportable Recording Files
*Portable and Tactical
'CTS GSM provides the following features
'Control of Forward and Reverse Voice Channels
'Control of SMS messages
'Automatic computation of session key (Kc) in real time for AS/1
and A5/2 algorithms without disclosing traces to subscriber
'Recording to Hard Disk of Voice Sessions, SMS messages and call
related information
'Subscribers location finding relative to the base station
'Possibility of substituting dialed number to diverted number, if
accepted by network
'Proper operation of system through Frequency Hopping mode
'Targeting feature by capture of user information through software
application and adjusted handset
'Full targeted recording through TMSI, IMSI and IMEI

u
0
1
pportable box
'0 I B M Laptop computer with 2Gb
p
0
li
, , r GSM Intercept
leo Dual band GSM high gain
o
rd
s
w 20 V and 1211 power supply and
o
t
nversion
i
R
e0
1
•The
system can be delivered
t
a
r0 with specification for 4-32 Duo!
h
m
ib r channels.
t
a
u •The number of simultaneous
e
h
n
ci t targets/calls that can be
e recorded is equal to the number
d
li o
f of duplex channels.
t
n
o
u
i l
a
l
n
a
l
tn
o
to
w
p
l
e
i
e
i
n
rn
g
n he System Main Application
g
a
h
a
indow
tp
st
ia
w
r
n
Indicator of BTS operation
e
t
g
Indicator of Cipher operation
i
s
Registered Subscribers List
g
o 4. Button to call up BTS
h
operation
f
t
Recorder window
t
Target Window
w
Active BTS window
a
a Paging Channel
r 9. Mobile stations window
e
P
d o

19 Mikve Israel St, Tel Aviv 65115 Israel
www.elkai.co.il elkal@netvision.co.il

t
A
0 c ) l
1gb
e
A
Monitoring
7
S - CDMA
EKMS 1704
2000
,
e
Tile system contains:
c
• Subsystem of data registration
u
• Subsystem of data processing
r
Subsystem of data stora e
i
t
y
E
n
SA,
gp
.ans.xisti
= M i
.....
,
i
n
e
e
1
1
r
1
The system realizes
the following features:
1
i
1
• Fast scanning of
1 the selected frequency range and identification of basic stations
n
r
by short code
displacement
,
g
.
• Automatic adjustment
on synchronizing channel and determination of system
,
Z
_
time, station number,
and
current parameters of long and short codes.
.
i
• Automatic adjustment on dialing and access control channels.
a
• Automatic adjustment on traffic channels which are selected by base station.
'
• Supervision over forward and reverse channels.
.

• Call selection by IMSI and ESN
• Determination of the mobile radiated rating which is selected by base station.
• Passive automatic decrypting and decoding of the signals in real time
• Automatic detecting, decoding of sessions and recording them on the PC hard
drive
• Automatic registration of call related traffic transmitted messages
• Displaying and recording to the magnetic media of phone conversations
protocols and of call related events that take place in the system controlled area,
including classification according to phone numbers and dates.
• Direction of receiving device (scanning, adjustment to channel frequency and
Pilot PN offset)
• Displaying of the current status of receivers and selection parameters
• Conservation of connection criteria and results of related data base selection
that provides:
• Daily automatic dividing
• Classification and retrieval by selected criteria
• Reproduction of the registered voiced data
• Recording of the system work related events
A

19 Mikve Israel St, Tel Aviv 65115 Israel
wwAk.elkat.co.il elkaWnetvision.cail

N
A
i
,
4

Security Engineering Ltd

Subsystem of data storage is developed for voiced, signal a nd auxiliary data keeping and
also for its granting to the data processing stations on
inquiry. The subsystem stores the most important
system information: voiced files, signal tables, events
• ubsystem of data registration
tables, configuration of the system and its status,
supplies:
reports etc. Aim of the data processing subsystem is to
• Data base conducting
grant data to operator and to provide means for
Displaying of the tract registration
information processing and reports writing. The
status
subsystem itself is a number of work stations used for
• Registration of tasks (not-established
reproducing and processing of speech (work places).
for implementation)
All the stations are connected to the local network and
• Adju_ament of the registration
include speech reproducing devices that are designed
parameters
for specific tasks.
Users' registration with providing of
access to the system using individual
Data processing subsystem provides:
.password, plus differentiation of
• Processing storage and tract status stocking
users' possibilities in functions
• Registration and stocking of users who have access to
implementations.
data handing, distribution of users' functions
General adjustment of the system.
implementation;
Stocking and displaying of sessions
• Creation and elaboration of files that include
registered by processing task.
documentary information
•Including possibility of task list or
• Reproducing of audio data
. registration route displaying.
• Facsimile handing
Stocking of registered events
• Special elaboration and analyze of incoming and (or)
Equipment stocking
registered voiced and facsimile data through
Opportunity of subsidiary
standard and special software that is oriented on
information sources usage
implementation of such tasks (Sound Forge, Cool Edit
• Protection of unsanctioned access
etc.)
• Protection of incompetent actions
• Opportunity of functioning in subsystems created by
user for client's data base supplement
• Registration of information related to user's work
I t Testing of software integrity
• Listing of tasks processing information
• Protection of data from unsanctioned access
• Recording of sessions selected by user to an optical RW media, with possibility of their
further handing on computers with compact-disk reader.
• Adjustment of subsystem parameters
• Listing of event registration
• Testing and diagnosing of equipment and software means status
• Displaying of rout activity signals at the current moment of time in the work station of
rout list data processing that is formed according to the access possibilities of the user who is

AL.__

registered in the given data processing work station

AC

I
.

19 Mikve Israel St, Tel Aviv 65115 Israel
www.elkat.cceikat@)netvision.co.il

i
,
KA
MonitoringS e
c u
EKMS 1770
- Roxy
r i t
y
E
n
g i
n
e
e r
i n
g
L
t
o complex is intended for undercover
The Roxy Ads!

CompositiOn of the s'
• synchronizer unit w a n
Ethernet interface
recording and processing server
operator's workstations
special software
The set's software operates under th
opera • , , s t e m

information gathering during investigative work on communication channels using
ADSL equipment.
The set ensures:
• P h y s i c a l connection to the ADSL line
• R e g i s t r a t i o n and processing of audio and numerical information transmitted
in the low-frequency section of the channel
• R e g i s t r a t i o n and processing of the digital information transmitted using
ADSL equipment.
• A u t o m a t i c determination of the ADSL channel parameters (connection
speed, VPI/VCI setup, type of encapsulation and protocol used)
• C a p t u r i n g user log-on and log-off events and temporary disconnection from
the monitored line
• P r o c e s s i n g data transmitted using IP, TCP, UDP protocols
• P r o c e s s i n g the following protocols: HTTP, FTP, TELNET, POP3, SMTP, ICQ,
MSN, YAHOO MSG, etc. (processing VoIP protocols).
• I d e n t i f i c a t i o n of objects using electronic identifiers (IP and MAC addresses,
e-mail addresses, ICQ number, MSN login, etc.)
• G r a p h i c interface for the operator to observe the recorded and saved
information
• A r c h i v e storage of sessions selected by the operator and utility information
about them
• S t o r a g e of recorded information for a specified time
• T h e automatic verification of recording server's hard disks filling up and
their clean-up, if necessary
• R e a l time operability management and monitoring.
• D i ff e r e n t i a t i n g between access and administration rights
• L o g g i n g the work of all subsystems
• L o g g i n g the work of the operators

19 Mikve Israel St, Tel Aviv 65115 Israel
www.elkat.co.il elkat@netvision.co.il

i
i
c lD
Z0 b 19
i t A

S
Roxy Mail

11-'
1'

O

Mobile complex
of digital registration and processing of modem Internet sessions (FTP,
C
TELN ET, IITTP, E-mail), of sound and special data which is received by analog telephone
U
terminations of general used, dialed up telephone lines ROXY-MAIL

T i

Production
t yfunctions - digital registration and processing of sound and special data, of
modem sessions
that are received via analog lines while operationally-technical events
E
are realized
during
investigative work.
n

g
The complexes
guarantee:
l

• Te c h n o l o g y of realization of operationally-technical events according t o the current
n
legislation
and official documents of organizations carrying out investigative work;

e
e
• Registration
and processing of sound and special data that incomes by analog
r
telephone
terminations of the general used, dialed up telephone lines;
M
• Registration of following information:
g
o AL
n a l o g data;
o F ai c s i m i l e transmission ( V27, V29, V17 protocols);
o F i l e s transmission (FTP);
e
o R e m o t e control (TELNET);
'
o HTTP;
.
o E - m a i l (SMTP, POP3).
• Co-ordination with input lines;
• Reproduction of reiterated sound data;

• Support of V21, V22, V22bis, V23, V32, V32bis, V34, V34bis, V90 modem protocols;
• S u p p o r t of the following OSI protocols:
o Channel level - HDLC, PPP;
o Channel level - HDLC, PPP;
o N e t w o r k level - IPCP, Van Jacobson, IPv4;
o Transport level - TCP, LIDP;
o Session level - SMTP, POP3, IMAP,HTTP,FTP.
• Revision of intercepted information is realized with the help of standard for each
data type: E-Mail - Microsoft Outlook Express, HTTP M i c r o s o f t Internet
Explorer, TELNET t e x t editor, FTP f i l e manager.
The software of complex provides:
• D e p i c t i n g of registration channels status;
• T u n i n g of channel registration parameters;
• M o d i f y i n g of numbers related information;
• G e n e r a l adjusting of subsystem;
• C a l c u l a t i o n and displaying of each channel recorded sessions;
• S e s s i o n events registration;
• Te s t i n g and adjusting of hardware-based part of the complex
19 Mikve Israel St, Tel A v i v 65115 Israel

www.elkatcoil elkat@netvision.co.il

K e l S e c u r i t y Engineering Ltd
19
A
Jammer Systems
Eig 1500 Portable Jammer System
7
The EKI 1500 is based on an advanced RISC Micro?
Controller together with a PLL synthesized
transmitter, in order to ensure minimal interference
outside the desired band, high processing quality,
and reliability. The EKj 1500 has been designed to
work with an internal rechargeable battery 12V.The EKj 1500 has 1W - 30W per
band.
Use of high performance cellular internal omni directional antennas with optimal
power gives the best-cost performance in the market.
The system can block the following frequencies: 800MHz TDMA, CDMA, AMPS,
11DEN1, 900MHzGSM900, NMT, 1800M1-lz DCS IGSM18001, 1900MHz PCS,
2100MHz

Eig 1520 - Mobile Phone Jammer
The EKj 1520 has been designed for blocking
GSM cellular network and all kinds of cellular
.
standards in the world.
6
The EKj 1520 is using state-of-art technology
M
for maximum performance.
A
The unit controlled by Microprocessor for PLL
I
'
programming .The EKj 1520 transmits noise
signal which cut-off all cellular communication
between mobile phones and cell phones. The
jamming radius depends on the strength signal
in given area. All cellular mobile in vicinity of
EKj 1520 will be totally BLOCKED and will not
be able to receive or dial outgoing calls.
When EKI 1520 effect the mobile the display will show "NO SERVICE".
The system can block the following frequencies: 800MHz TDMA, CDMA, AMPS,
UDEN], 900MHzGSM900, NMT, 1800MHz DCS [GSM1800], 1900MHz PCS,
2100MHz.
Out-put power per band: 30W-100W
24VDC regulated or 12VDC
Remote Control
Internal/External Antennas- directional 14 dBi gain Or Omni-Directional
Antenna outputs includes VSWR protector



— 1
1

1 0 1E1 O N E

4

19 Mikve Israel St, Tel Aviv 65115 Israel
www.elkat.co.il elkat@netvision.co.il

1111111.

111
1111011 Wee

N
Security E l 7 § 0 7 6
1
A
6thig
L
t
t
o
Jammer Systems
Elg 1601 -CAR VIP PROTECTION
Very High Output
Power 1000W and up
Modular System
7

?



The EKI 1601 is a vehicle mounted very
high power jammer designed for blocking remote controlled improvised
explosive devices Used by terrorist. The EKj 1601 is using state-of-art technology
for maximum performance and jamming the signals transmits to activate bombs.
The unit controlled by Microprocessor for PLL programming and use unique
modulation technique based on mixed signal for maximum jamming efficiency.
Each module of EKj 1601 transmits unique noise signal which create "firewall"
between the transmitter and its receiver.
The jamming signal is being generated by Multi-VCO chain which results very
high sweeping time along the bands hence create high RF density in each part of
protected frequency band.
Jamming radius of EKj 1601 depends on several conditions such a cells
transmitter frequency and output power, distance to receiver and obstacles
between. System modularity allows flexible usage in different applications.
System Features
Systems have 3 modes of operation:
1. Sweep Mode - jamming the whole frequency band at an ultra-fast Speed
continuous sweeping.
2. Spot Mode - jamming 4 frequencies from list of 10 pre-programmed.
3. Open Communication Window - Allows open communication from 6 preprogrammed options. Thus frequencies can be changed in factory when
customer needs.
- Designed to block wireless communication including
HF, VHF, UHF, SHE', Cellular Networks, Satellite
Phones, GPS etc.
- Output power up to 187W and 150W per band
- Modules of jammer operates separated;
- Separate switch ON/OFF and switch Operation Modes
control for each frequency band.
- External antennas
- Remote control
- Specific signal source per band for maximum
jamming efficiency

19 Mikve Israel St, Tel Aviv 65115 Israel
www.elkat.co.it elkat@netvision.co.ii

Modules Divisio
• Module 1: 2 0 MHz - 1 5 0 MHz;
• Module 2: 1 5 0 MHz - 5 0 0 MHz;
• Module 3: 4 0 0 MHz - 8 0 0 MHz;
• Module 4: 8 0 0 MHz - 1 0 0 0 MHz;
• Module 5: 1 0 0 0 MHz - 1 8 0 0 MHz.
• Module 6: 1 8 0 0 MHz - 2 0 0 0 MHz.
• Module 7: 2 0 0 0 MHz - 2 5 0 0 MHz.

AMIti

l i e A

i---7"

S e c u r / 0 / EngMeering L to'.

Facility and Personal Protection

EKDED 2303 - Personal Scanning
The screening system currently in use
involving metal detectors, undressing, and
gentle prowling is inefficient. What is more, it
is humiliating and fatiguing also requiring a
lot of personnel to be involved yet keeping
the passenger throughput low. These
shortcomings are particularly apparent at
countries of "moderate" climate where
people are dressed and shod warm.
Now the problem has grown into an urgent
one calling for radical changes in the existing
system of screening. The goal of screening is
to detect any suspicious objects (including
non-metal ones) or substances the
possession of which is prohibited by law
making one try to hide them somewhere in
his/her clothes, footwear, on or inside the
body. Special case screening of those who
wear prosthesis, plaster, etc., is also
desirable.
Screeners based on penetrating Roentgen
radiation keeping a person under screening
away from any undressing also allowing an
"easy standing" posture. Besides, there are no
parts hidden to inspection even inside the
body.
Meanwhile the devices are quite definitely to
be the only solution capable of ensuring
efficient and convenient screening. The
challenge of applicability is in making the
dose of radiation negligibly small even in
comparison with the natural radiation
background. In other words, possibility of
super-low-dose examination is the key to a
large-scale application of the X-ray screeners.

I R
A suspicious low-contrast oil. body objects (held in
p
r garments, or on the side) in the
o
i background of densest parts of
1
l 10 the body, as well as inside the
body;
l
,- U l t r a low radiation levels
i less than those of the natural
n radiation figures;
g , S h o r t time of screening
(within several seconds);
Availability of related
• f t w a r e to enable a rapid
image analysis;
, Absence of inspectionrelated inconveniences;
High throughput;
Background radiation in
proximity to the device
may not exceed 1
pEv/hour (that is to be
not higher than radiation
level around the

i,

baggage introscope).

19 Mikve Israel St, Tel Aviv 65115 Israel
www.elkat.co.il elkat@netvision.call

19

V A A e oSecurity
u n
Eng/nee/7
.
/7g L I d

asic Specifica orts
• Maximum height of
scanning: 2000 mm
• Image width: 800 mm
• Channel size
(resolution): Da i t
• Maximum scanning
time:5 sec
• Throughput: 2
persons/minute
• Single-scan radiation
dose:- 0,5*
The figure is equivalent to th
natural radiation dose a
passenger gets within 5
minutes of the flight time.

A knife and a dummy handgun made of 4mm plastic. A piece of explosive is on the
hip.

A piece of soap (on the right), two flat
10-mm-thick pieces of explosive gelatin
(on the left), and a plastic knife (in a
pocket, next to eyeglasses).

19 Mikve Israel St, Tel Aviv 65115 Israel
www.elkat.co.il elkat@netvision.cail

The system enables to check
lightweight hand-luggage, a
passenger cannot or does not want to
leave unkept even for a short time.

CO

N
A
7
0 ( 19
i
.
S
s
?
c)
Facility
and PersonaleProtection
4
a
EKFP 2140
- Electronic
Fence System - Sensor
/
M system designed to handle all aspects of perimeter
A new generation security
protection. It upgradesy any existing fence to the status of an electronic barrier
E
with an exceptional detection
resolution of +/- 10 meters.
n
Wherever perimeter protection and intrusion detection are required, the EKFP
g with a system that is easy to install, operate and
2140 provides the utmost
maintain. The Long lifei sensor units are highly immune to extraneous
environmental factors.n
e
The system was approved
by the Israeli Army Technological unit for the
e
protection of borders, military camps and top secret sites.
r
ADVANTAGES
i
• T h e ELM) 2140 can be installed on almost any type of existing fence.
n
• T h e highest detection rate with the best resolution detection of +/- 10
g
meters.
L
• Maximum performance
with minimum electronic elements.
i
• V e r y Low false-alarm
rate
due to a special software algorithm and long
e
life sensor units' that are highly immune to extraneous environmental
factors.
.

• A l l weather operation.
• U s e r friendly Interface, easy to install and maintain.
• T h e EKFP 2140 Viper can be integrated with other security systems such
as IR sensors, CCTV, PTZ cameras, access control systems, VMD solutions,
wireless communication systems.

System Configuration
Copper W i r e
Communication

II

Wireless
Communication

II

Several p e r i m e t e r control units, all

Several p e r i m e t e r control units, all

In this configuration a wireless m o d e m

connected via f i b e r optic cable.

connected via c o p p e r wired cable

is connected t o the p e r i m e t e r control

In case o f a n intrusion a t t e m p t .

In c a s e o f an intrusion a t t e m p t , t h e

unit, e a c h u n t t c o m m u n i c a t e s t o a

the Perimeter Control Unit sends t h e

Perimeter Control Unit sends the

primary m o d e m , located in t h e Control

intrusion a t t e m p t location v i a f i b e r

intrusion a t t e m p t location v i a t h e

Center, t h u s allowing effective.

optic c a b l e , t o t h e C o n t r o l C e n t e r .

copper wired cable, t o t h e Control

High-speed Wi r e l e s s c o m m u n i c a t i o n .

This c o n f i g u r a t i o n i s c a p a b l e
handling a l l F i b e r O p t i c c a b l e

4
.

Center C o m p u t e r

t v n i • K t r l i P l t h a l f el i n l a v h v h n t l 1

19 Mikve Israel St, Tel Aviv 65115 Israel
ww•.elkat.co.il elkatC(Inetvision.co.il

1

,

SecurityEngineering Ltd
A
N

Theory of Operation
The System is a multifunctional Electronic Perimeter Security system. Employing
state of the art vibration sensors installed on the fence perimeter, the system
monitors and displays intrusion attempts with high degrees of accuracy with low
false alarm rates. Intrusion attempts are displayed on a computer monitoring the
Control Center. The systems vibration sensors are based on the Time Domain
Reflectometer principle (TDR), which displays attempts at penetrating the fence
perimeter with an accuracy of -HO meters.

Fence Types
Barbed Wu e tem,:

Linked Mesh Fence

Decorative Fence

enso
• i n e r t i a ensor - normally close
• Tw i s t e d pair UV protected cable.
• T h e sensors are connected, serially, to the cable.
• Enclosed in high impact plastic, UV protected

4
.

19 Mikve Israel St, Tel Aviv 65115 Israel
www.elkat.co.il elkat@netvision.co.il

Welded Fence

MONITORING SYSTEMS

designed to intercept and track
all communication & internet


* M i k a n ' t r a t t i c tram tn' e air.

2

411,11111gmh.. •
•••••••-•-

4 JAMMING SYSTEMS

• Low/Medium/High power
jammers

*All spectrums jammers
•Mobile a n d s t a t i o n a r y
jammers

-

SCRAMBLERS
AND ENCRYPTORS

.m44
o
telephones and fax.
11
i
V
a
f
o

1
r
3
c
1 1
FACILITY & PERSONAL
e
P
ROMITION
1
l
1
• Perimeter control
l
p
• Personal protection
h
•Biometric, Video and
o
RFD controll
n
•Explosives & d r u g s
e
detections
s
,
More of
P our Products
• VoiceI lie detector • Spy phones • Detectors
& Deactivators • PC special devices • Audio
T
equipment
• Video equipment and cameras
s
Web Site: www.elkat-cmil
,
P O W U M 1811,010t1
MAW OIAMERSOF 0 1 4 1 W

-z

1
,
Tel: +972-3-5604744,
Fax: +972-3-5604745
4

Document Path: ["596-elkat-product-list-sophisticated-electronic.pdf"]

e-Highlighter

Click to send permalink to address bar, or right-click to copy permalink.

Un-highlight all Un-highlight selectionu Highlight selectionh