Feverblock Thermoscanner System
The FeverBlock body temperature control system combines into one
instrument infrared thermal imaging technology with visible light in order to
perform temperature measurement in real time on all the people present
in the wide field of vision and without contact
The conventional approach to human DNA identification requires days to weeks, several highly skilled technicians, and a variety of sensitive, sophisticated, and expensive equipment systems that must be operated and maintained in the laboratory. NetBio’s ANDE (www.ande.com), of which AUS.TECH is the exclusive representative company in Italy, system is a fully integrated Rapid DNA platform that eliminates all these requirements. The ANDE system allows human DNA identification to be completed by nontechnical operators in a fraction of the time needed for conventional analysis, transforming complex laboratory manipulations into automated workflows. The ANDE system consists of the ANDE instrument, a microfluidic (small volume) biochip, and analytical software. In order to support and maintain a traditional DNA laboratory the lab must have the ability to; 1) extract the sample, 2) quantify the sample, 3) amplify the sample, 4) detect the sample, 5) analyze the sample. The ANDE system incorporates a half dozen individual laboratory instruments into a single desktop sized system. Forensic DNA Laboratories also require highly controlled operating environments—the ANDE system has no such requirements and functions inside or outside the laboratory. The ANDE system is a fully integrated portable unit, allowing DNA identification to be performed at the point of need, ensuring that human identification data is generated quickly, where and when it is most essential.
AUS.TECH provides several physical tools for data and communication protection through encryption. Tools includes:
Independence Key – A cryptographic device that allows to encrypt any type of file, to modify and/or open any file received within a Personal Network with a simple “double click”, thanks to the advanced encryption engine and to the variable-block algorithm based on AES 256. Independence Key allows to keep the working habits and it is perfectly integrated with Windows Explorer by Microsoft Windows: a right click to access the menu and another click to put in a safe place and share anything it is wanted. It is not necessary to decrypt the data to read or modify them and It is not necessary to worry about leaving any trace. Just use the usual applications without changing the working habits. IndependeceKey’s driver detects the calls from the applications to a specific encrypted file (for example Microsoft Word trying to open a .docx file) and in real time, if the user’s device knows the key with which the file has been encrypted, it encrypts and decrypts all the data being transferred from the application to the file system and vice versa IndependenceKey is made from Zamac (an aluminum alloy) with its peculiar surface treatment ,called PVD, and nickel free. The tool has an elevated surface hardness > 1,800 HV. It is non-toxic, anallergic and biocompatible. Wear, scratch and corrosion resistant. Weather resistant (salty fog, UV ray, etc.) Alkali, solvent and acid-proof.. Inside Independence Key has a highly integrated printed multilayer circuit with 50-65 μmeters insulations and only 1 mm of thickness. A high density integrated circuit. SMD type electronics with components that are, mainly, class 04-02 on all layers. Once assembled, each circuit is automatically AOI inspected and 100% x-rayed. Independence Key has a peculiar physical feature: it is equipped with a type A USB port (device) 2.0 High Speed (480 Mbps) to be connected to a common PC, and an identical USB 2.0 High Speed Type A port (host) into which other USB device can be connected. The whole hardware low energy consumption enables the Independence Key to supply not only external mass storage devices that are equipped with flash standard memory, but also to other device.
datAshurPRO® – from iStorage, With boot-delay mechanism! No other secure flash drive can offer a super-fast USB 3.0 speed, with increased capacities of up to 64GB, 100% data protection, ease of use whenever, wherever, and on any USB device like the ultra-secure datAshur Pro can! The iStorage datAshur Pro is the world’s most secure, easy to use and affordable USB 3.0 flash drive, employing PIN code access with military grade XTS-AES 256-bit hardware encryption. The datAshur Pro incorporates a rechargeable battery allowing the user to enter a 7-15 digit PIN onto the on-board keypad before connecting the drive to the USB port. All data transferred to the datAshur Pro is encrypted in real-time with the built in hardware encryption engine and is protected from unauthorised access even if your datAshur Pro is lost or stolen. The datAshur Pro automatically locks when unplugged from the host computer or power to the USB port is turned off and can be set to timeout (lock) after a predetermined amount of time. The datAshur Pro operates straight out of the box, does not require any software or drivers to be installed and is compatible with Windows, Mac, Linux, Chrome, Android, Thin Clients and embedded systems. The datAshur Pro delivers drag and drop encryption, plug and play simplicity and can be used with any software. T he datAshur Pro is an investment that will last for years. Its rugged, extruded aluminum, water proof casing protects the drive against physical damage. The internal drive components are also sealed with a tamper proof coating. The datAshur Pro is FIPS 140-2 Level 3, CESG CPA Foundation Level and NLNCSA Level 2 – certifications pending. The tools has a FIPS PUB 197 validated Encryption Algorithm. Available capacities are 8GB, 16GB, 32GB and 64GB.
datAshur SSD® – With software-free operation, cross-platform compatibility, USB 3.0 speed, increased capacities of up to 240GB, plus a host of high-level security features that had never expect to find in a flash drive, datAshur SSD brings a world of advanced data security to your fingertips. This easy to use USB 3.0 flash drive incorporates PIN access with military grade 256-bit AES hardware encryption. datAshur SSD is FIPS 140-2 IL3 certified (certificate number 2431). It has Military grade Full-disk XTS AES 256-bit Hardware Encryption. Available Capacities are 30GB, 60GB, 120GB and 240GB.
AUS.TECH s.r.l. provides to law enforcement and intelligence agencies different technology for tracking and locating. Solutions include : GPS/GSM device, GPS/RF beacon and receivers, RF Beacon and receiver, GPS / Globalstar beacon, GPS Idirium beacon, GSM/UMTS directional finder (handheld and vehicle mounted).
Mobile Phone Monitoring
Complete hand-to-hand solution for Mobile Phone Monitoring and location in 2G (GSM), 3G (UMTS) and 4G (LTE) standards by using the state of art technology. Different solution available (portable, for car, motorbike, drone installation).
Body Worn Cameras
Body-worn video and mobile video for professional use. Reliable end-to-end solutions for video recording and live video streaming via wireless networks (3G, 4G, Wi-Fi). Our solution offers video and streaming products and an integrated platform for live video streaming.
AUS.TECH s.r.l. produces a wide range of forensic vehicle products to meet the specific law enforcement, investigative, intelligence, security and operating needs of police and other law enforcement agencies. AUS.TECH provides law enforcement agencies with hidden power and added strength through its innovative, custom-designed, technologically advanced forensic vehicles. Our current range of products include:
- Units for hostage and anti-terrorism situations;
- Mobile command, control communications and information dissemination vehicles;
- Undercover video surveillance systems;
- Special application vehicles for disaster management, disaster communications, counter-terrorism operations.
RF Jamming Systems
We supply U/VHF, cellular phone jammer, GPS jammer, wireless audio/video/data transmitters, surveillance products, etc. Our production is subject to subcontracting manufacturing from efficient OEM manufacturing plants. We put emphasis on the product development system integration, and ODM/OEM business establishment providing knowledge of product application and integration of different products into a valuable combination.
Search and Rescue Systems
MobileSweep® technology has been developed in order to solve two critical issues related to search and rescue: 1. Ability to accurately locate victims in difficult terrain. 2. Communication between rescue crews and victims in areas without GSM network coverage Search and Rescue System offers following functions:
System enables the user to locate mobile phones within 0.5 meter accuracy. Its range largely depends on the terrain and whether the system is operated from ground or air. The range is up to:
- 1,400 m while operating from the ground
- 3,000 m while operating from a helicopter
System enables the rescue team to send text messages to every cell phone within the operating range simultaneously or to individual cell phones selected from the list. Text messages can either be selected from previously composed standard messages or customized. However sender ID cannot be modified, it will be the same as the search and rescue hotline number.
System can maintain up to 3 simultaneous calls between mobile phones in its range. This function enables communication between rescue teams and people who have gone missing and remained conscious. Additionally, the rescue professionals can use the GSM network created by the system to communicate with each other. Caller ID displayed during every connection is predefined and will be the same as the search and rescue hotline number.
Our System offers two operating modes. Their use largely depends on the type of rescue mission and environment in which the System will be used.
Allows search of all mobile phones in the area specified by the operator from (10 up to 3,000m) In area mode the System generates local GSM network in radius selected by the operator (from 10 to 3,000m). System then registers all active mobile phones located in its range and allows the operator to activate the transmission process in selected phones. Source of the transmission can be traced using directional finders.
Possible applications include:
- Avalanche search and rescue
- Estimating the number of people that might still be present in natural disaster sites, establishing contact and locating them
- Patrolling tourist trails
Enables search of specific mobile phones. In order to use the System in target mode operator has to input basic user information such as IMEI and/or IMSI. In some cases phone number (MSISDN) of the victim will be sufficient, as the System might be able to derive the IMSI number from it. System can generate local GSM network and begin searching for multiple target phones simultaneously, after their basic information have been added to target list. Only phones from the target list will be allowed to register in the network. Upon registration the operator can activate the transmission process in selected phones, and the source can be traced using directional finders.
Possible applications include:
- Searching for specific person or a group of people after receiving a report that they have gone missing. (Basic information is required – phone number (MSISDN) or IMSI/IMEI).
System was developed specifically for search and rescue agencies. This is why from the beginning our team has strived to achieve the greatest degree of resistance to conditions in which it will be used, while simultaneously maintaining high user comfort. Solid water and ash proof B&W case and highest quality connectors that fulfill IP67 waterproof standards produced by NEUTRIK and HUBER+SUHNER guarantee durability of our System. Furthermore, we have developed a rigid custom-made aluminum frame with additional vibroisolation to protect it against shocks that could normally lead to transmission of overloads to electronic system. High user comfort is a result of our close cooperation with European search and rescue agencies. Numerous tests, prototypes and constant feedback proved absolutely invaluable to achieving the current high level of comfort and practicality. Solutions that significantly improve the ergonomics include the custom made construction of antenna mount, design of directional finders and the backpack system. Components are :
- Base Transceiver Station
- Directional and Omnidirectional Antennas
- B&W Outdoor
- System notebook
- Directional Finder
- Directional antenna
AUS.TECH perimeter control system is based upon Fiber Sensys’s alarm sensors and our solutions are ideal for security applications that might be as small as 50 meters to large airports bigger than 25km. AUS.TECH developed special perimeter control application for several prisons, refineries and big international agencies head quarters.
AUS.TECH provides state of the art access control systems for vehicles with an under vehicle surveillance systems associated to Automatic License Plate Recognition and integrated with any existing people access control system.
Drone Detection and Tracking
The high diffusion of drones in recent years has lead to an increase of the risk of unauthorized flights, that can be potentially dangerous for the citizen. The Drone Tracking System created by AUS.TEC s.r.l. creates an area in which is possible to both track the trajectories of drones as well as recognizing the model and the unique MAC address.
It is a passive and non-invasive solution, based on Software Defined Radio (SDR) sensors, which therefore does not create discomfort to the population and does not interfere with other radio systems. The system is also highly configurable and can be integrated with other technologies, provided by third parties, such as cameras, redar and jammers (for the contrast of the done).
This technology offers a great potential that can be spent on public security (big events, port areas, airports, police) and private security (industrial facilities).
More Information To know more about our products and services.