C-UAS for Government, Task Force, Police, & DoD/DoW
Securing National Interests with Cyber-Physical Intelligence
Counter-UAS Solutions
With real-time alerts, device mapping, customizable zones, and whitelist/blacklist logic all in a field-ready tactical counter-UAS kit, the technology suite delivers command-center clarity across complex environments. SAFE Perimeter integrates LOCH with existing infrastructure, offering layered security for weapons and behavioral detection, unauthorized-drone defense, and protection against cyber and cyber-physical attacks.
LOCH is a U.S.-based provider of Wireless Airspace Defense technology, delivering full-spectrum situational awareness and counter-UAS capabilities across cellular, IoT, Wi-Fi, GPS, and RF bands. Our integrated platforms, AirShield and SkyShield, provide persistent detection, attribution, and mitigation of both airborne (UAS) and ground-based wireless threats. AirShield and SkyShield technology suites combine to form a zero-trust wireless perimeter, providing early warning, forensic data, and automated response to unauthorized RF activity or UAS incursions.
These solutions are actively deployed to protect DoD Facilities, TASK Force Precincts, Airports, and Major Event Venues against both cyber-physical and aerial threats within a geofence.
We would be pleased to present a brief demo of our capabilities. Please contact us.
SkyShield Field Drone Detection Tactical Mobile Kit
SkyShield Mobile Units: 360-degree RF Detection Unit with AI and Direction Finding. SkyShield Mobile Hardware/RF Features, 3Kms
Airspace Security: Detect, identify, and mitigate drone threats in long-range and mobile deployments.
Protects Practice & Game Environments: Ensures no unauthorized aerial surveillance.
Range: Detection band: 2.4GHz, 5.2GHz, 5.8GHz, 868 MHz, 900 MHz, 433MHz, RF Direction finding antennas: 2.3 - 2.6GHz and 5.0 - 6.0 GHz. Includes WiFi & GPS.
Software includes: Direction with near-or-far indicator information for all major drones, Identify friend drones and repeat intrusions by SkyShield unique ID number, RF AI to detect and classify unknown / Do-It-Yourself drone threats, Support for 400+ threat models.
AirShield Wireless Defense Security
AirShield Wireless Airspace Defense delivers real-time visibility and threat intelligence across all wireless layers, detecting rogue IoT, 5G, Wi-Fi, and GPS devices that evade traditional network tools. Entities can now proactively identify and categorize all emitting RF devices, enabling them to detect, assess, and prevent risks. RF threats are no longer theoretical-they're walking around disguised as phones, badges, vape pens, AI glasses, and devices like the Flipper Zero, a tool that can clone RFID badges, mimic Bluetooth beacons, and manipulate signal-based infrastructure with alarming ease.
Next-Generation TSCM Alternative: Functions beyond a traditional Technical Surveillance Countermeasures kit.
Signal Control: Ability to whitelist and blacklist all signals within a designated area.
Real-Time Alerts: Detects and reports unauthorized devices (spying tools, cameras, rogue networks).
Cyber Security Reinforcement: Protects wireless attack surfaces, preventing breaches through overlooked access points (e.g., printers, IoT devices).
SkyShield Drone Intelligence & Fingerprinting
360° detection with a 7km range: SkyShield detects drones up to 7km or ~4 miles with its omnidirectional antenna system and programmable software-defined radios.
Airspace Security: Detect, identify, and mitigate drone threats in long-range and mobile deployments.
Protects Practice & Game Environments: Ensures no unauthorized aerial surveillance. Direction with near-or-far indicator information for all major drones, identify friend drones and repeat intrusions by SkyShield unique ID number, RF AI to detect and classify unknown / Do-It-Yourself drone threats, and Support for 400+ threat models.
*Selective Jamming: Selective jamming (smart defense) jams a specific target drone without disrupting others in that range.
Software includes: MIL-STD RF Detection Unit with AI and Direction Finding. SkyShield Hardware/RF
Features: Detection band: 2.4GHz, 5.2GHz, 5.8GHz, 915 MHz, 868 MHz, 433MHz, RF Direction finding: 2.4GHz, 5.2GHz, 5.8GHz.
Own Your Airspace — Without Owning Hardware.
SAFE Perimeter’s DdaaS gives government, police task forces, and DoD/DoW customers a fully managed, long-range drone detection and attribution capability powered by SkyShield™ & AirShield®.
Receive 7 km drone detection, 450+ drone classifications, passive monitoring, and daily reporting — all as a subscription service. ARMY & SEAL tested.
Key Capabilities
7 km detection range per sensor
450+ drone signatures
120+ simultaneous detections
Passive & Zero-Emission
ARMY & SEAL tested — deployments increasing weekly.
What You Get With Drone Detection as a Service (DdaaS)
Mission-ready drone detection, real-time monitoring, and operator attribution — delivered as a managed service.
- Up to 7 km detection range, including tethered, custom, and swarm drones.
- Passive RF monitoring — zero emissions for covert operations.
- Operator attribution + instant alert path reports for investigations.
- Optional selective jamming for authorized agencies.
- Seamless integration with GSOC/JOC/Task Force workflows.
- Layered RF defense for rogue Wi-Fi/Bluetooth/Cellular devices.
DdaaS Packages
Choose the coverage model that matches your authority, mission profile, and deployment tempo.
Standard
- Real-time alerts
- Daily threat summaries
- Single-site or limited deployment
Tactical
- Includes Tactical SkyShield Mobile; TSCM kits
- Surge coverage for protests, ops, VIP events
- Event-based case reports
Enterprise / Multi-Site
- 24/7 SOC escalation & case management
- API + SIEM integrations
- Optional jamming where authorized
- Includes Tactical SkyShield Mobile; TSCM kits; Loch IMSI Catcher™ & SkyWall Jammer Optional Add-On
Ready for a Live Demo?
We’ll show real detections, dashboards, and reports from active government deployments.
PRODUCT SHEET DOWNLOADS & TESTIMONIALS
Loch Catcher™ IMSI Detection, Catch & Locate.
Loch Catcher™ (powered by LOCH Detector™) is a man-portable and UAV-ready IMSI catcher & locator engineered for special operations, law enforcement, and intelligence teams that need to detect, locate, and track mobile devices in any terrain — even with no network coverage.
Detect and log IMSI/IMEI/TMSI for all nearby devices, whitelist/blacklist targets, and pair with directional finders to build a live, actionable picture of the battlespace or incident scene.
What Loch Catcher™ Does
Loch Catcher™ is a smart, autonomous IMSI detection system that can operate as a man-portable unit, covert/vehicle system, or UAV payload — giving teams the ability to see every mobile device in the area, not just what the network exposes.
Core Detection & Intelligence
- Detects and logs IMSI numbers for all nearby cell phones for movement tracking and traffic analysis.
- Supports whitelists, blacklists, and mitigation alert paths for high-value targets.
- Operates even where there is no commercial network coverage or in difficult terrain.
- Acts as a virtual base station, enabling controlled interception and precision disruption when authorized.
- Pairs with handheld Directional Finders (DF) for exact target pinpointing.
Secure, Mission-Ready Architecture
- IP67 enclosure; dual-channel design built to MIL-STD-461F and MIL-STD-810G.
- Data encrypted and stored on the controlling PC — no data persisted on detectors.
- Secure WebSockets (WSS) with TLS/SSL AES-256 for 100% data coverage and integrity.
- Designed for interoperability and network swarm operations.
- Works with online or offline maps for high-reliability field operations.
Loch Catcher™ Case Uses — Detect, Locate, and Track
A single toolkit, five mission profiles. Loch Catcher™ gives government and task-force teams the same underlying capability, tuned to their operational rules of engagement. :contentReference[oaicite:6]{index=6}
1. Law Enforcement Operations
Find suspects, missing persons, and active devices in live environments.
Scenario: Officers deploy Loch Catcher™ to locate phones linked to suspects or missing persons during field operations.
Impact: Real-time tracking, faster response, and improved officer safety in investigations and tactical missions.
Loch Catcher’s Role: Identifies and maps device movement, providing actionable intelligence for coordinated response.
2. Security & Special Intelligence
Monitor restricted zones and events for hostile or foreign devices.
Scenario: Intelligence teams watch secure facilities or events for unauthorized mobile devices that signal surveillance or threat activity.
Impact: Early detection of infiltration attempts and protection of sensitive data and operations.
Loch Catcher’s Role: Continuously scans, classifies, and geolocates anomalies for threat assessment and rapid response.
3. Search & Rescue
Locate missing people in disaster zones and remote areas.
Scenario: Emergency teams use Loch Catcher™ to find devices belonging to missing individuals where infrastructure is damaged or absent.
Impact: Reduced search time, improved survival rates, and better coordination when traditional tracking fails.
Loch Catcher’s Role: Detects and triangulates device signals in low-network environments, giving rescuers live positioning data.
4. Disruptive / Offensive Activities
Controlled disruption of hostile networks — with minimal collateral impact.
Scenario: Authorities disrupt criminal or hostile networks during riots, smuggling, or coordinated cyber-physical operations.
Impact: Breaks communication between threat actors while maintaining civilian connectivity.
Loch Catcher’s Role: Identifies, isolates, and tracks active devices; can impersonate signals to enable lawful, precision disruption.
5. VIP & Executive Protection
Keep motorcades, principals, and private events one step ahead of surveillance.
Scenario: Protective teams deploy Loch Catcher™ around VIPs, motorcades, and secure venues to detect tracking and eavesdropping attempts.
Impact: Prevents hostile surveillance, tracking, and digital intrusion targeting high-value individuals.
Loch Catcher’s Role: Classifies devices in real time, flags suspicious or unknown devices, and provides a live situational map for the detail.
Loch Catcher™ supports:
- Search & Rescue
- Law Enforcement & Investigations
- Cyber-attack response & RF forensics
- Joint task forces and multi-agency operations.
Smart Loch Catcher™ Dashboard & Platforms
The Loch Catcher™ dashboard turns raw RF and cellular data into visual, trackable insight — with deployment options for man-portable kits, vehicles, and UAVs.
Dashboard Benefits
- Captures IMSI, IMEI, and TMSI from nearby devices for rapid target building.
- Imports/exports target lists for mission flexibility and pre-planned ops.
- Uses advanced mapping to pinpoint device locations and movement.
- Integrates with DF for silent call tracking and “proceed to target” workflows.
- Supports remote access from central command and can send broadcast SMS or alerts on flagged devices.
- Enables selective jamming / denial of service where legally authorized.
Deployment Platforms
- MPS (Man Portable System) 2.0 – ruggedized pack or vehicle integration for ground teams. Superior to blunt jamming by building an intelligence picture and allowing friendly whitelisting.
- UAV System 3.2 – low-weight payload for wide-area, airborne ISR; compatible with multiple drone OEMs and airframes.
- Network swarm capable — multiple detectors can cooperate across a mission area.
MPS 2.0 Highlights
- 370 × 235 × 125 mm, ~12 kg; 4 channels, 5 W per channel.
- 1× GPS, 1× Wi-Fi; Ethernet or Wi-Fi interfaces with directed fan cooling.
- 400 MHz–3 GHz across key cellular bands; –15°C to 65°C with software thresholds.
UAV 3.2 Highlights
- 230 × 200 × 48 mm, ~1.6 kg; 2 channels, 5 W per channel; 12 V DC power.
- Passive-cooled by airflow; supports major UAS platforms (DJI, Teledyne FLIR, etc.).
- Network swarm capable; functions even in areas with no network coverage.
Bring Loch Catcher™ Into Your Mission Stack
SAFE Perimeter and LOCH Technologies can deploy Loch Catcher™ as a standalone capability or as part of a broader cyber-physical stack with DdaaS and AirShield®. Request a briefing to see real dashboards, case examples, and deployment options tailored to your ROE.
Contact
SAFE Perimeter
Interested in counter-UAS capabilities?
Fill out some info, and we will contact you shortly. Thank you for your interest.