Specifications

FIELDMARSHAL INTEGRATED SECURITY SERVICES
55
TMP-918-196 – Sistema di Antenna
Direzionale per GSM196
Provides directional detection for 196 unit
Operates over all G8M and UMT8 bands
9dBi forward gain enhances performance / range
Can be used inverted on extension poles
Handle accommodates a full range of DIY poles
Lightweight design for prolonged use
The TMP-918 antenna system is designed to enhance the detection capabilities of
the GSM196 mobile phone detector.
The lightweight assembly (approx 600grams) allows operators to more accurately
pin point the location of an operational phone. The detection characteristics also
allow the unit to reject unwanted signal reflections from other sources. The
antenna effectively amplifies the signals being supplied to the 196 thereby
increasing the range of the unit by as much as 50%.
The assembly can be used, either with the handle or mounted on the operator's
forearm. When used on the forearm, a velcro strap is provided to ensure the
safety of the assembly. For external searching the unit can be inverted and
elevated by means of a variety of standard extension poles which can be fitted
into the hollow handle.
The assembly also incorporates a standard camera fixing so that it can be
attached to a normal photographic tripod.
Use in prisons
The TMP918-196 was designed specifically for use in prisons and can greatly
increase the detection capability. In situations where multiple mobile phones are in
operation on a wing at the same time, it can be difficult to identify the cell
containing an active phone simply by using signal strength alone. The GSM196
when used with the TMP918 allows the officer to a scan specific direction with
rejection of signals in all but the direction the antenna is pointing - see polar plots.
The assembly can be mounted on the officer's forearm who can then simply walk
passed cells on each landing /level. The GSM196 will then indicate which cell(s)
have active phones in them.
Once activity has been detected on a wing the assembly can be setup to monitor
specific parts of the wing from one end over a period of time.
!
!
Phone calls recording and VoIP
telephony System
For inmates
The systems allows for the managing of the inmates phone calls through
authomatic access to authorized personnel only, defininig and managing the
timing determined by law and by the specific Administration.
It allows for real time monitoring , either by listening and through the display, of the
telephone traffic in progress.
• Each call will be recorded in real time and in wav format and the listening will be
possible from any location via remote Internet login password and encrypted VPN.
• The system is modular and applicable even for just a few lines of contemporary
recording.
OPERATING STRUCTURE
The inmates to make phone calls must have cash on their account or into the
account in the jail or it can be paied by the family. It must state the landline
telephone numbers permitted (verified by the competent authorities) by the court.
FEATURES OF THE SYSTEM FROM THE POINT OF VIEW OF THE INMATE
The inmate will receive instructions in various languages accompanied by login
and password and the list of approved phones and their timing. For example:
number 1 the lawyer, n. 2 family home,n. 3 sister at home.
The prisoner shall type the desired number and the system automatically dials the
phone number associated, thus starting the analysis of the allowed time. A
warning message will be sent to the prisoner 2 minutes before the expiry of the
allotted time.
During the call the prison police will listen, speak and decide to interrupt the
communication. The data will not only be readily available in the database, but it
will also be sent via e-mail for the listening from any location accompanied by a
login authorization.
FROM THE POINT OF VIEW OF THE PRISON ADMINISTRATION
Register loading
The court or who is authorized by the server, can access from any location for
data query, including recording listening. The system is controlled from any
internet connection, with its password, and it is possible: access logs containing all
the logs made, listen to the telephone calls, change the software and authorize
people to access the web, ensuring a durable system (phone data backup and
more).