SOTL DETECTOR
Government, Military Forces and Multinational Organizations around the world have used OUR DETECTOR for more than 20 years proving good service and value to the fight against terrorism all around the world.
The SOTL DETECTOR if deployed will enhance the operational efficiency of your special operatives by detecting concealed Remotely Controlled Improvised Explosive Devices, Improvised Explosive Devices and any other explosive component concealed in any form from distance of up to 40 meters away.
Radio Controlled Improvised Explosive Device (RCIED) is an Explosive Device which utilizes a radio receiver as a detonation switch. Improvised means, this Explosive weapon was not assembled in a factory, but put together in someone’s house, with commercial electronic parts such as car alarm equipment to mobile cellular phones. However, technology is only part of the solution in the effort to defeat IEDs; experience, training and awareness remain key factors in combating them. For example, there are some signs which may suggest the existence of an IED, such as recently turned-over soil or sand near a road, gas cylinder in a car or an abandoned car beside a road.
It is these signs that require a Counter Explosive Operator to use his or her experience in determining the correct course of action with the aid of a Bomb Detector.
SOTL DETECTOR is intended for detection of various bomb devices/ component on the ground as well as covered by soil, concealed in car and in building structures. The Detector ensures effective detection of the following items:
Transmitting and receiving components of radio-communication, alarm and remote control systems;
Electronic and electro-mechanical timers;
Acoustic, magnetic and optoelectronic sensors and miniature TV-cameras.
It can be used for detection of concealed metallic devices and appliances. The device is highly effective as well in searching electronic items under the soil, concealed in vehicle or building structure.
It is rugged, water proof and withstands any weather conditions. And with long lasting battery life, reliability is never an issue.
Design philosophy
Two-channel high sensitive receiver for 2-nd & 3-rd harmonic reception guarantees an effective reduction of ‘false' alarm, caused by outside metallic objects;
Circular polarization of transmitting & receiving antennas avoids the risk of target loss under the variation of antenna unit orientation.
Four step receiver' sensitivity control (0, -10, -20 and -30 dB) allows operator to adjust adequate Detector' parameters to outer EM-noise conditions.
Transmitter' output adjustment allows operator to suppress probing signal intensity for better operation safety.
For operator' handiness main units of Detector are placed in corresponding pockets of a special vest.
Antenna module is united with control panel and represents a single arrangement with convenient handle.
Reliable and durable rechargeable Ni-Cad battery ensures long-term continuous operation.
Dedicated charger unit provides an optimum operator-free charging mode.
Sturdy weather-dust-proof housing assures right operation in hard environment condition.
SOTL DETECTOR’S Advantages
Long range of RCIED/IEDs bomb detection (up to 40 m).
Discovers bomb concealed by various obstacles.
High searching process output.
Easy handling, up-to-date design, usable display, reasonable weight.
Safe to handle.
Prolong operation time with one set of batteries.
Field service ability.
TECHNICAL SPECIFICATIONS
Probing signal848 MHz frequency
Pulse output power (switchable)
200/30 W
2-nd & 3-rd harmonic sensitivity of the receiver
-150 dB/W (-120 dBm)
Display
Audio & LED
Power source
6 V/ 7Ah Ni-Cad rechargeable battery
Current consumption
No more 500mA
Readiness time
10 min
Continuous operation time (with fully charged battery)
not less 8 h
Operation temperature range
-30° C …+50° C
Weight
5.1 kg
Weight in carrying bag
13.0 kg
PRINCIPLE OF OPERATION
The transmitting antenna sends a HF
electromagnetic signal at frequency F .
When this signal encounters any non
linear junction like semi conductor or
metal oxide metal contact, the signal is
transformed and returned in a form of
high harmonics frequency levels, i.e. at F ,
2F , 3F , 4F , 5F …
The returned signal at
2F and 3F is picked
up by the receiving antenna, passed
through receivers, processed and
presented to an operator in both visual
and audible forms.
Manufactured with self-developed and patented materials based on a ballistic-grade copolymer
Facial Recognition involves use of biometric software application capable of uniquely identifying or verifying a person by comparing and analyzing patterns based on the persons facial contours.
Facial recognition is mostly used for security purpose though there is an increasing interest in its other areas of use. It can be used for everything from surveillance to marketing.
But that’s where it gets complicated. If privacy is important to you, you probably want some control over how your personal information data is used, there are multiple methods in which facial recognition system work, but in general , they work by comparing selected facial features from given image with faces within a database.
Hastearmor has developed worlds fastest and most accurate face recognition algorithms recognized by experts and accepted by customers .
Our products address two major tasks – Security and Customer Data Enrichment. Its main application areas include public safety, banking, retails, events, access control and social network environment.
Our Facial Recognition System uses different parameters to provide in-depth results. It recognizes gender, age, occlusion, emotions and more. Our Facial Recognition Security System reduces crime in a State, City or Organizations and improves public safety by spotting the details of the targets in order to prevent atrocities. Facial Recognition is an essential aspect for companies, financial institutions, government entities and defense entities as they have investigations lined up for different people.
Face Recognition System eases the search for missing people and provides immediate identification of a person including mobile application alerts. Our Facial Recognition Security System ensures ultimate safety at crowded events, public places such as airports, railway stations, malls and other places. In shopping centres and hypermarkets, Facial Recognitions become so easy, preventing shoplifting by the fraud customers. Not just these, but Facial Recognition System assists in access control of commercial and manufacturing facilities in the periphery.
Face recognition System creates and manages a unique multichannel customer communication, enables personalized recommendation for target audience, accumulates accurate data about customer satisfaction, increases average check, descends cost on attracting new customers, tracks customer movement within retail space effectively, as well as does preference analysis for profound customer experience.
Our Face Recognition Security System finds the target in a database among millions of images in less than a second. With its enhanced online services like face and emotion recognition, it takes renders more comfortable, modern and safer to work with. The capabilities of Facial Recognition and data collection allows you to analyze customers’ behavior in hotels and casinos. Personalized advertising can be created based on the data received via video surveillance cameras. Our offline retargeting helps to identify customers with the help of social networking sites data and offers them customized products. You can create personalized photo albums for every participant of the photo! system algorithm automatically sorts out large collections of photos and delivers unforgettable impressions for every participant. The Biometric Identification delivers a higher level of security. Our Facial Recognition Security System’s prevents fraud; you can create your own database of fraudsters or loyal customers, add new people to it, work with your business partners’ similar database also lets you check a database for matches of target and confirming the identity.
Our Voice Print Analysis (VPA) is a speech analysis system intended for use by any law enforcement and intelligence agency. VPA is capable of analyzing audio files for Speech/Non-speech detection, Language identification and Speaker identification. The VPA concept is based on Client/server architecture and is language agnostic.
Features :-
Speaker Identification in signal under analysis from the database of speaker voice samples.
Multiple language identification from a known database of languages.
Easy addition of languages and speakers.
Keyword spotting.
Gender detection.
Emotion detection capability.
Age detection.
Multi-parallel processing supported.
Application of standard software in order to participate in further development.
Scalable and Flexible interfaces for the integration of classifiers.
Communication via TCP/IP.
Crypt Analysis is used to defeat cryptographic security systems and gain access to the contents of encrypted messages, even if the cryptographic key is unknown.
The aim of Crypt Analysis is to obtain the plain message from the intercepted cipher text
Hastearmor has been indigenously developing and implementing crypto algorithms, tailor made according to various customer requirements for the past 16 years.
Over the past many years, we have worked with various Govt. and Intelligence agencies worldwide in the field of Communication Intelligence, Signal Analysis and Processing. The experience and knowledge gained over this period is unparalleled.
Hastearmor has successfully broken crypto algorithms used in communication networks like GSM, Thuraya, Iridium, INMARSAT etc.
Special Algorithms like DES has been broken by Hastearmor .
These developments have been converted into successful products and are being successfully used by various Govt. Intelligence agencies worldwide.
Hastearmor Advantages :-
Strong tie ups with international Crypt Analysis Resources.
Access to High Speed Performance computing and software design.
Dedicated team of in house experts on cryptography Hastearmor is already creating simulations and crypto verification programs.
OSINT – Open-Source INTelligence – In simple words, Collection and correlation of Information/Data using some specific tools/techniques are referred to as open source intelligence.
Example: Asking questions on any search engine or Researching on a topic on any public forums.
Features :-
Instant Result: OSINT solution could achieve targeted results in seconds thereby saving tremendous time.
Global Reach: Open-Source Intelligence can be accessed and employed from anywhere at any time.
Latest Updates: OSINT alerts you when something relevant is posted online, with its live monitoring feature
– you can receive an alert within seconds of the original post being published.
Wide-Range: OSINT platforms can deliver comprehensive results by searching not only on social media platforms, but on blogs, boards, public chat rooms and even many of which are only available on dark web.
Well-Defined: OSINT is greatly useful for organizing surreptitious information into a definite context.
Validated Source: OSINT can authenticate sources promptly.
Uncover Targets: OSINT provides investigation tools that helps in uncovering who is behind a target data.
With the ever-increasing growth of technology, the need to collect information quickly yet specifically arises. OSINT will be an integral component in cyber intelligence. An organization with an appreciation for OSINT values and potential will be most effective in future.
Open Source Intelligence is one of the key facets of comprehending cybersecurity which dominates the world wide web these days. With accurate information from the open source, Open Source Intelligence gives one an edge over competitors and helps to rapidly investigate required details about the people/company in the limelight. Open Source Intelligence are accessible legally by the people without breaching any law or copyright issues.
The OSINT structure boosts decision making, evaluate public perceptions, forecast changes and a lot more. We are also equipped with the expertise to extract information from both, the dark web and the deep web.
OSINT Tools & Techniques
OSINT Tools and Techniques can help us gather information from the various sites in a jiffy, which when manually done can be tedious and long delayed process. Various details about the source can be gathered from the internet using OSINT Tools and Techniques.
OSINT Tools and Techniques include identifying sources of data, collecting data via robotic process automation from closed groups and forums using Avatars, target profiling, data processing, link analysis, threat analysis and reporting.
To give an overview of the Target Management flow, it encompasses details like phone number, name, social media profile, connect with Avatar, enrich profile information, send payload/phishing and collect information. While investigation workflow follows this chronology – topic of interest, create project and find content, identify key influencers or commentators, connect with Avatar, enter close group and identify targets for further investigation.
OSINT Tools & OSINT Techniques are used by government agencies and private companies too. Hence it is important to crystalize which sources are relevant and of use to the organization’s research.
OSINT Tools takes the username as a feed and searches all the websites/online platform at once and lists down all the relevant data one is looking at. So, running multiple tools together can help one to derive all the target related accurate information. Of course, there will be a lot of data; refine and filter what is important and discard the rest.
In a nutshell, Open Source Intelligence is the most common and easily available source of information. Unleash the power of OSINT at its best by capitalizing on the OSINT Tools and Techniques available with us.
Designed to support the weight of an armored vehicle LEVEL 9 (UL 752)
Manufactured with self-developed innovative materials based on a ballistic-grade copolymer