Filtered By
BrochureX
Type of Document [filter]
Results
665 Total
1.0

HVTRX

Document

GOVER N MEN TAL SE CUR ITY SOL UTIO NS Product Information Video Transmission System HVTRX-210 PLL 130 10 000 39 / 41 Miniature Transceiver Systems - Video – 130 Video Transmission System – ...
1.0

Mobile Biometric Platform,

Document

T 1: I ? OUR SYSTEMS SYSTEMS ARE. Mobile Biometric Platform [Mlatform, intel Analysis Management Management Interface lnterfac Platform, Device and Intel 1 h1 - Mobile Mobile Bio e ric Biomet...
1.0

MTrust

Document

RELIABLE EMPL3YEE OR SECURITY RISK? NOT CERTAIN? OUR SYSTEM IS. RECOGNITION SYSTEMS THE SOLUTION RECOGNITION SYSTEMS Manda checks: 5 year employment record Right t o work Criminal record chec...
1.0

CAPsure

Document

a- 256 Element Square Microphone Array - Data Sheet '-L The most important thing we build is trust yii The CAPsure CAPsure is a high high performance tactical Covert Audio Pinpointing designed...
1.0

Eagle 8B, Eagle 8C, Eagle 8D, Eagle 8E

Document

sp ecialists in covert surveilla nce Eagle 8B/8C/8D/8E General Description E A GLE 8B/8C/8D/8E is a n a u dio digit al record er. Th e u nit’s minia t ure siz e m a k es it t h e id e al ch oice f...
1.0

Falcon4

Document

sp ecialists in covert surveilla nce Falcon4 General Description FALC O N4 is o ur sm allest a u dio a n d vid e o digit al record er. Its minia t urise d e nclosure m a k es it t h e id e al o p ...
1.0

Nanocam

Document

sp ecialists in covert surveilla nce Nanocam General Description N a n oca m is o n e o f t h e sm allest self-co n t ain e d digit al ca mcord ers d esig n e d f or u n d ercover o p era tio ns. ...
1.0

Njala

Document

sp ecialists in covert surveilla nce NJALA General Description NJALA is a sim ple, ro b ust a n d diverse a u dio surveilla nce g a t h erin g d evice. NJALA co m es co m ple t e w it h f o ur sin...
1.0

Raven SD

Document

sp ecialists in covert surveilla nce Raven SD General Description Rave n SD is a solid st a t e a u dio/vid e o record er fro m A DS. A m o n gst its f e a t ures are in t ern al or ext ern al mic...
1.0

Viper

Document

sp ecialists in covert surveilla nce Viper General Description Vip er is a n a dva nce d minia t urise d digit al ca mcord er sp ecially d evelo p e d f or milit ary a n d p olice in t ellig e nce...
1.0

NTXR-H

Document

N jala D igit ale r A u dio s e n d e r M o d e ll N T X R - H EIG E N S C H A F T E N 8 K A N Ä LE S E N D ELEIS T U N G 5 0 0 m W BIS 3 W DIGITA LE V E R S C H L Ü S S EL U N G 5 K H z A U DIO B ...
1.0

RMK 129

Document

RMK 129 500 mW Audio transmitter Long range transmission of audio intelligence. Universal base radio-transmitter module for covert applications. High output power of the product provides reliable r...
1.0

Sleuth-Hound

Document

SLEUTH-HOUND SOFTWARE SLEUTH-HOUND SOFTWARE MAIN VIEW POSITIONS HISTORY DATABASE FEATURES: • Remotely control and visualize the GPS position of one or more GPS tracking devices; • Geotracking ac...
1.0

GPON Phantom

Document

GPON Phantom™ Interception Solution for GPON Optical Fiber Lines GPON Phantom™ Tr a c e Sp a n's G P O N Ph a nt o m ™ is a u ni q u e p a ssiv e t a p p in g d e vi c e f or L a wful Int e r c e ...
1.0

DRS, LIMS

Document

- I HardwareSpecifications . Oracle X86 servers, 7 Various configurations from single server appliances tomulti-server clusters . 5 I. a Integrated disk storage (up to 12113) ...
1.0

Scan Surveillance

Document

I & Target Rael-Time Text Mewing Scan Surveillance for Governments Find the needle in the digital haystack! Scan Surveillance analyzes Web and mobile text content in real-time. With Scan Survei...
1.0

Wolfhound

Document

CELLPHONE DETECTOR m 44 HLUTR f-L' - W I O N WolfhoundTM-Lite is a belt-worn, wireless sniffer specifically tuned to the RF signature of common cell phones including PCS, CDMA / WCDMA, GSM a...
1.0

Esri, Analyst's Notebook

Document

Analyst's Notebook - [email protected] Foundation Module UNLEASH THE POWER OF YOUR DATA WITH AN UNPARALLELED ANALYTICAL PICTURE AcceleratingYour Mission. 1 ArcGlS c--r N B b o t - &rP Edition Found...
1.0

Mercure 2

Document

SOLUTIONS INFORMATIQUES D'AIDE A L'ENQUETE ? P,.. La telephonie doit Qtre un atout et non un obstacle dans les enquetes de police MERCURE permet d'analyser des donnees difficilement exploitabl...
1.0

VoiceGrid X

Document

(c 3) Speech g;;?OgY Voice Biometric Solutions: VoiceGridTMStream is a speaker identificationapplication aimed at finding audio files containing the target speakers' voices in a stream of audio ...
1.0

VoiceGrid

Document

$3) Speech a:;l0gY Voice Biometric Solutions: VoiceGridTM VoiceGrid: Nation-wide multimodal biometric system VoiceGrid implements, maintains and automates a universal biometric database system a...
1.0

L1-M1

Document

I ' PACKET -- FORENSIC! Survei implif ied. 1U MODUL ACKMOUNI The LI-M1 is a purpose-built surveillance platform for ernet, IP and HPLS Key Advantages The LI-M1 is tail needs in the areas o...
1.0

BS

Document

l S Ii * m- BP I l 1 Biometric Speaker Spotting System ( B S ~ ) Engine designed f o r integration in large-scale systems - such as intelligence a n d strategic interception systems - spot,...
1.0

ASIS, Automatic Speaker Identification System

Document

Automatic Speaker ldentification System (ASIS) deployed f o r b u i l d i n g centralized voice biometrics databases - dedicated t o l a w enforcement organizations - new to01 f o r identificatio...
1.0

MEK/FS2

Document

V ertrauliche Unterlagen - nur für den B O S-B ereich - Datenblatt zum MEK/FS2 Bestnr.: MEK1032 D er M E K/F S2 ist eine kompakte G P S-F uchsausrüstung mit integrierter Sprachübertragung im schw...
1.0

Q20

Document

220 high Dynamics GP5 Receiver ~ o d u l 7 e W'-- i High dynamics GPS tracking and positioning for Test and Evaluation / Range Safety applications or guidance of missiles and smart munitions The ...
1.0

HINTON

Document

L 3 HINTON Mobile Data Probe The HINTON Mobile Data Probe is used by telecommunications operators and law enforcement agencies to provide regulatory enforcement of lawful interception, and by gov...
1.0

ION Secure Virtual Desktop

Document

ION" Secure Virtual Desktop Computers that access the lnternet for research and investigations are at risk of compromise by online viruses, malware, and other types of malicious code, especially wh...

e-Highlighter

Click to send permalink to address bar, or right-click to copy permalink.

Un-highlight all Un-highlight selectionu Highlight selectionh