Wasp 2.png

W.A.S.P System,System Deployment  

The W.A..SP system has been designed to be rapidly deployable using W.A.S.P system nodes that can be installed in fixed locations as well as vehicle and trailer mounted and man-portable solutions.


A W.A.S.P system node mast can be configured with a GPS receiver, perimeter radar sensor, surveillance cameras, flood lights, Drone RF Jammer and a public address system comprising microphones, amplifiers and loudspeakers.   Based on the configuration of the system node, network and power management modules are also integrated to enable a range of wide area network connection options and the use of available powers sources at the deployment location.


The W.A.S.P network modules options included connections to a wired network, a self-managed mobile network and satellite communication (SATCOM) gateway connectivity to the W.A.S.P Command and Control (C2) system. 


The W.A.S.P mobile network option is a secure wireless MESH Peer-to-Peer networking system that provides data and video feeds between nodes and automatic data routing based on network health. The mobile WASP system nodes can be set-up in about 20mins and automatically connect via the mobile network to the WASP C2 system to provide real-time situation awareness data to a operations center.


In remote locations the W.A.S.P network module can to connected to a SATCOM gateway to pass data and video feeds via satellite communications directly to a remote control center or to the secure WASPCloudTM which can be accessed by authorized fixed and hand-held mobile devices to provide situation awareness and threat information to supporting assets and agencies.



The W.A.S.P node mast system also integrates a drone RF countermeasure as part of a mast configuration.  The W.A.S.P RF Jamming System has been developed to specifically disrupt UAV/drone control frequencies from 300MHz to 6GHz and GNSS communications. The system is controlled by an operator via the network and includes control of selectable multi-channel jamming and power optimization depending on the allowable operational frequencies within the area of threat.