Specifications

FIELDMARSHAL INTEGRATED SECURITY SERVICES
27
concentrations.
The SalivaScreen VI will detect other related compounds, too: AMP, THC, MET,
OPI, MTD.
The SalivaScreen VI provides only a preliminary analytical test result. A more
specific alternate chemical method must be used in order to obtain a confirmed
analytical result. Gas chromatography/mass spectrometry (GC/MS) and gas
chromatography/tandem mass spectrometry (GC/MS/MS) are the preferred
confirmatory methods. Professional judgement should be applied to any drug of
abuse test result, particularly when preliminary positive results are indicated.
CRYPTO SYSTEMS
SECURE LOCK
SECURITY PHONES
How Secure Lock Works
Whenever a user needs to make a secure call, or secure text communication, he
or she simply presses and holds the C button in the keyboard to initiate a fully-
encrypted session. The call switches back to standard clear mode when the call is
finished.
Although a simple process for the user to enjoy, the technology behind Secure
Lock is quite impressive.
Whenever a secure session is initiated, our software kicks in to encrypt the voice
or text data using a constantly changing mathematical formula which creates a
1024 bit asymmetric key based on the RSA algorithm, as well as a changing
session key which replaces the encryption every second!
Not only is the Secure Lock encryption software the perfect choice for politicians,
lawyers, police and governmental agencies, executives, and anyone else who
recognizes the need to prevent confidential information from falling into the wrong
hands, but the encryption algorithms we use are so secure that our software has
been licensed by the Israeli Ministry of Defense.
Secure Lock and RSA Impenetrable Protection
While cryptology experts have cracked the RSA 56-bit and 64-bit keys long ago,
no one has been able to crack the 128-bit key since a world-wide distributed
computing effort began on 3 December 2002.
)
USS-900 Narrowband Voice, Fax
and Data Security Features
Secure voice communication when connected to virtually any analog
telephone.
Secure fax communication when connected to any G3 fax machine.
Create secure e-mail attachments ensuring safe confidential
communications.
Secure point-to-point data transfers when connected to computers.
Secure any accessible computer file for safe storage and transportation.
Compact, portable and very easy to operate.
When connected to regular telephones or fax machines the Patented (U.S. Patent
S6,430,691) USS-900 provides high-grade voice, fax and data encryption. When
connected to a computer the USS-900 can secure e-mail attachments, provide
point-to-point data transfer capabilities, and can encrypt any accessible computer
file. The USS-900 is so flexible, diverse, portable and easy to use why would
anyone allow their personal and private communications to be sent over telephone
lines or stored on a computer unprotected. In this day and age, government,
business and personal communications need to be kept confidential, encrypted
information can not be decrypted and read by an unauthorized person.
The USS-900 contains the communication technology and utilizes the ultimate
digital encryption algorithm of the day the CitadelTM CCX. The device is a
compact and portable security system that is very easy to operate.
!
!
ULP-1 - Ultimate Laptop Privacy
Ultimate Laptop Privacy ULP-1, is a breakthrough, high-grade, easy-to-use
hardware based encryption solution. Simply plug it into notebook computers via
the use of a PCMCIA card. This new product protects the integrity of your
computer by ensuring that your private and confidential information stay that way.
Features:
E-Mail and Computer File Encryption with Access Control and Microsoft
Word/Excel Add-in
Secure e-mail attachments ensuring safe, confidential communications.
Secure any computer file when using Windows® 98, 2000, Me or XP.
Prevent access to your computer by removing your ULP-1 card.
Automatic encryption of Microsoft Word and Excel 2000/2002 files.
Stop the spread of unwanted and potentially damaging computer viruses,
when utilizing Microsoft Outlook 2000/2002.
Destroy confidential information; easily wipe files permanently.
Automatic key management system utilizing a complete hardware based
encryption solution.
!
!