SECINTEL

We design, produce, integrate, and support advanced security and intelligence technologies. Our experienced engineers and teams bring powerful solutions to RF and Cyber security environments, supporting:

Cyber Intelligence – Communications Intelligence
Signals Intelligence – Radar Intelligence – Electronic Warfare

  • Cyber Intelligence
  • Communications Intelligence
  • Signals Intelligence
  • Radar Intelligence
  • Electronic Warfare

About Our Technologies

CYBINT technologies focus on the gathering and analyzing of digital and account information from targeted devices. Discovering the digital identity of a suspected target, tracking and monitoring real-time cyber actions, or acquiring chat or voice conversation content over cyber communications are some of the powerful features concerning Cyber Intelligence.
COMINT solutions gather information from mobile calls, texts, and other technologies that send and receive communications. When collecting important information on persons of interest, COMINT platforms are used for both real-time and post-real time investigations.
Communications Intelligence include:
  • Active Interception
  • Passive Collection
  • IMSI Catcher Platforms
  • Cell Catcher 
  • Micro Cell Catcher 
  • UAV IMSI Catcher
Our SIGINT technologies focus on signal receiver architecture to detect, observe, and store random and filtered signals.
How do agencies organize the collection, processing, and analysis of signals? SIGINT users depend on our solutions to expand collection range of both random and targeted signaling, decrypt signals, provide quality results, and archive acquired signals for big data analytics.
RADINT technologies focus on real-time awareness using advanced Radar with visualization, artificial intelligence, and analytics. Incoming threats, be they airborne or on the ground, have a traditional high false positive rate when relying upon radar alone. These Radar Intelligence solutions incorporate a series of processes to confirm with high confidence the presence of inbound threats.
Our technologies for Electronic Warfare involve blocking radio signals used by criminal and terrorist groups to set off remote bombs as well as communicate with one another. Our EW methods defend personnel in and around an area from hostile RF signals used to detonate remote controlled improvised explosive devices. Our communication blocking telemetry, similar to our Electronic Warfare technologies, can initiate denial of service attacks to block cellular and satellite phones as well as consumer radio equipment and commercial drones.