Price And Quantity
- 1 Set
- 18.00 - 35.00 USD ($)/Set
- 58*46*12 Millimeter (mm)
- Cash Advance (CA), Cash in Advance (CID), Delivery Point (DP), Letter of Credit (L/C), Letter of Credit at Sight (Sight L/C), Telegraphic Transfer (T/T), Western Union, Paypal
- 10000 Set Per Month
- 15-20 Days
- Contact us for information regarding our sample policy
- Standard Package & OEM Package
- Asia, Australia, Central America, North America, South America, Eastern Europe, Western Europe, Middle East, Africa
- All India
- CE FCC
Imsi catcher, phone detector, MAC detector, traffic analysis, stay duration analysis
Collect information of cellphone nearby and analyze automatically.
How it works?
Mobile phones have become a part for everyone, including bad people.
Simulate the network of all local major operators, constantly scan which mobile phones appear around, record the mobile phone information and time.
Analyze the time rule of each mobile phone, identify acquaintances, strangers, and recognize the risk.
Risk identification method
Key time point analysis:
At the time point of the incident, the mobile phone that appears is most likely the mobile phone of the suspect.Analysis of abnormal time period:
Some people always visit at night when there is nobody, maybe he is familiar with the environment.
Abnormal frequency analysis:
Since I've never known each other, why him is been there?
Alarm and tracking
As soon as we identify the risk, we can alert immediately: let the loss not happen again.
The loss has occurred, we can provide the suspect's mobile phone clues for the relevant authorities to solve the case.