Counter-PNT: GNSS Electromagnetic Attack and Receive [GEAR]

GNSS Enabled
Our GEAR solution uses state of the art GNSS analysis to determine all possible civil satellite navigation signals present in an area. The GEAR system uses multiple transceiver chips to allow for tailored electromagnetic attack in a proprietary technique that allows for low probability of detection Electromagnetic Attack.

Hardware Focused
We custom design our own MIL-STD and ITAR compliant computer boards and pre-load software without the need for a GUI. Physical switches control all functions of the GEAR system.

Modular Solutions
Customizable build options include different UHF and SHF frequencies, amplifier wattage, and power supply options that allow for modular, tailored solutions to fit your specific need. Proven to be effective against distributed autonomous systems.
ECLIPSE: Counter-Mesh Detection and Attack System
Disrupt Data Backhaul with Additive Noise
Long Term Evolution (LTE) technology is the method of choice for high throughput requirements in mobile communications. The rapid proliferation of LTE-enabled devices allows for public and private use of existing LTE channels as a means of transmitting large amounts of tactical data in the UHF range.
The Solution
Our [IRIS] solution offers counter-LTE services across multiple channels with a proprietary technique that requires no previous knowledge of network or signal properties. This technique is proven to be more effective than barrage jamming, single tone jamming, and multiple-tone jamming.
IRIS: Counter-LTE for Private and Public Networks
Detect and Classify Wireless Repeater Networks
Wireless mesh networks represent a resilient and proliferated network architecture. The congested presence of wireless repeated signals in an area of operations makes it difficult to determine the purpose of detected emissions.
The Solution
Our [ECLIPSE] solution uses distributed sensors to identify potential wireless repeater networks in an area of operations, and delivers a recommended electromagnetic attack pattern to the operator based on signal and network properties.