NULLYFYING THE MOBILE THREAT
Aug 09. Criminals and terrorists have also become increasingly savvy at using mobile phones to plan and execute illegal activities (train bombings in Madrid, hotel attacks in Mumbai, etc.)
Identifying who they are and where they are has become increasingly difficult.
Terrorists typically switch SIM cards across multiple phones or simply
purchase new pre-paid phones and replace them every 30 days or so when
planning attacks to limit traceability. It is also not unusual for
criminals to use multiple phones – dedicating each phone for contacting
a single person, so that they do not link multiple people together in
their call logs. Tracing their human interaction to identify who they
are colluding with is therefore currently extremely difficult.
Then, there is the issue of bomb detonation. Security agencies are
currently unable to trace dormant phones that remain stationary for long
periods of time in order to determine if a mobile device has been
stationary for days.
To deal with this growing threat TruePosition have developed technology
that can help to identify the mobile phones of criminals and terrorists
to deliver invaluable intelligence about who they are, where they are,
what they are doing and what they might do next. At its core, the
TruePosition solution provides mobile network intelligence, real-time
surveillance, and geofencing (invisible tripwires of wireless energy
that can be placed around critical infrastructure).
TruePosition can fire-up the mobile phone, locate it, and put it back to sleep, and the target – in this case a criminal or terrorist – is
unaware that they have just been located.
TruePosition has been awarded a multimillion Dollar contract for its
high-accuracy U-TDOA location technology with an overseas government for national security purposes