2,500 Watt, bitcoin no devices detected,000 Concurrent Frequencies Constantly Jammed, 15,000 Watt Power Plant. 1 Real Time Cell Phone Interceptor. Used by the USA Federal Government.
PKI, X-509, Encrypted Chat, Encrypted FTP, Encrypted Cut-N-Paste, Key Management, FIPS 140-2 Certified. Encrypted Cell Phones, Encrypted Radios, Encrypted Land Lines, Encrypted Satellite Phones, Encvrypted Fax. Rat Phones allows law enforcement agencies to operate in 2 distinct modes. Victim Mode allows eaves dropping on conversations, and GPS triangulation to locate the owner. The latest addition is Encrypted Conference Calls. VME Terminator H1 now features 3 power sources !
The world’s most powerful bomb jammer now have 3 sources of power: a Built-in 7,500 Watt Generator, a Built-in 7,500 Watt Alternator and a Built-in 500AH Batteries. The vehicle can operate on any single source at full power ! 3 level system, or combined failover, or joined operation. Use the generator when noise level is not an issue.
1 Real Time Interceptor now features directional finder ! 1 Realtime Cell Phone Interceptor now allows interception and manipulation of text messages. It also allows selective blocking of voice channels up or down. The newest addition is a directional finder that allows the law enforcement authorities to find a target phone in a random monitoring mode. VME Spy Phone now features remote monitoring and triangulation !
VME Spy Phone XD now offers 2 new features. The 1st feature is location triangulation by sending a quiet sms to the phone and receiving GPS coordinates using base station triagulation. VME Office 2008 is now multi-lingual ! The VME Office 2008 suite of encryption and digital signature applications now works in more than 10 new languages ! The application can now support many languages and work in the native language in many regions in the world, including menus and content. VME Biodrive now supports Audit Trail ! The VME Biodrive Biometric Flash Storage Device now audit every transaction in an encrypted file, allowing the administrator to verify proper use of the drive and the confidential information stored on it.