Choah Technology
Pioneering Progress,
Protecting Excellence

Providing innovative, reliable and world-class solutions to our customer
Get to know us more deeply
Customer-oriented
Our unwavering dedication is to deliver an exceptional customer experience.
Continuous Innovation
We relentlessly pursue fresh and improved methods to enhance customer service.
Pursuit of Excellence
We relentlessly endeavor to attain the highest standards of performance in all our endeavors.
Integrity and Ethics
Honesty and ethical conduct underpin every facet of our operations.
Embracing Collaboration
We firmly believe that collaborative efforts are the cornerstone of achievement.

About Us
CHOAH TECHNOLOGY
With over than 10 years of experience supplying equipment to the Navy and Police Force, Choah Technology Inc. has successfully expanded its scope of business to supplying underwater sonar systems, PAE (Personal Arms and Equipment) and tactical gear for the Navy, Army, Air Forces and the Police.

Years of experience in the industry has enabled Choah Technology Inc. to grow both as a manufacturer and a supplier by establishing cooperation with multiple international companies around the globe and providing our clients with field-proven products of the latest breakthroughs in technology within the defence and law enforcement industries.
Our Products
Tactical Devices
Maritime
Enterprise & Education
Cyber and Security
Big Data Technology
Message Blasting System

WBS 3300 SeriesTactical Next-G WBS-3300 is a tactical tool for broadcasting messages (text, images, videos) via WhatsApp to any mobile device in a certain area. WBS-3300 works independently to find out a WhatsApp user number. WBS-3300 uses a unique approach by utilizing the Machine Learning system to observe and adjust to strict rules on WhatsApp so that the sending process can still operate on large scale and the risk of being blocked can be minimized. This equipment is lightweight and compact in size so it easy to carry and operate in all fields.

Key Features:

  • Fully supports 4G networks for seamless communication
  • Performs automatic translation
  • Compatible with all GSM providers for wide-ranging accessibility
  • Filters active numbers for targeted dissemination
  • Ensures precise delivery to designated destinations
  • Capable of sending text, images, and videos
  • Generates custom reports in PDF or Excel formats for comprehensive analysis
  • Employs AI technology for automatic management of sender numbers, preventing easy blocking during mass dissemination
  • Ability to disseminate messages on the Telegram messaging platform for enhanced reach and engagement.
View More
Jammer Solutions

J6AC Portable Jammer

Preventing the use of cell phones and wireless communications is an essential part of security.

The J6AC portable jammer provides a complete and flexible solution to give protection against unauthorized use of cell phones or wireless communication. This jammer is capable of suppressing 6 (six) frequency bands, with a channel range from 896 to 2700 MHz with an output power attenuation for the entire system and each band. Signal generation technology enables the achievement of high signal interference efficiency and significantly reduces power consumption, minimizing dimensions and weight. This technology allows for a unique approach, combining internal directional antennas and external Omni Antenna interference coverage in one compact system unit. It is ideally used to protect VIP military, police, and special security forces anywhere in the world.

View More
Audio & Video Surveillance

TSK & TSK Compact

Unique professional covert surveillance devices for all operational needs.

TSK and TSK Compact represent a combination of the best systems, providing a comprehensive solution for covert surveillance operations. Both kits include top spec Store & Forward audio and video recorders, camouflaged recorders/transmitters and miniature audio recorders.

While the TSK offers a full range of miniature audio recorders and transmitters, as well as accessories, the TSK Compact features all the top functionalities delivered in a durable compact enclosure.

The TSK and TSK Compact are configured to facilitate an impressive variety of operational scenarios and to offer an essential set of equipment for professional use by the law enforcement, intelligence, anti-terror and other specialised units.

View More
Maritime Intelligence Solution

Glass Ocean

Glass Ocean stands as a cutting-edge maritime intelligence solution, meticulously crafted to bolster situational awareness and proactive monitoring of territorial waters and economic exclusion zones. Designed with state-of-the-art technology, Glass Ocean seamlessly integrates a myriad of components, including AIS, radar, and satellite communication, in its pursuit of enhanced situational awareness. This integration is paramount in ensuring safety and security on the high seas while effectively detecting and thwarting illicit activities.

At the heart of this comprehensive system lies AIS, a mandatory tracking mechanism for the majority of commercial vessels. By employing anomaly detection methodologies, Glass Ocean has the capability to scrutinize Automatic Identification System (AIS) tracks, flagging aberrant vessel behaviors that are often indicative of illegal activities such as drug smuggling, piracy, and illegal fishing.

Glass Ocean is a critical tool adopted by a spectrum of maritime security and surveillance stakeholders, encompassing navies, coastguards, and law enforcement agencies. It serves as an invaluable asset in fortifying maritime security and protecting territorial waters.

View More
Digital Crime Learning Simulation System

LETO-8 is a digital crime learning simulation used to understand the media and deal with digital crime and cyber security threats. With a comprehensive approach using the Cyber Security Integration, Testing & Evaluation Platform, the system enables you to work from a dedicated environment within your own organization, whenever you want.
LETO-8 is designed to work the way you work, with its visual front-end and template-based environment modeling.

View More
Visitor Management System

RODTAMVS

RODTAMVS is an on-premise solution that enables leading businesses to take control of their people flows. It provides a single interface to manage visitors, employees, contractors and anyone else, while improving security, efficiency, compliance and branding. This system enhances visitor's experience, secure assets and streamlines operations.
RODTAMVS provides our clients with a comprehensive visitor management system that covers the entire visiting process as well as a wide range of integration solution.

View More
Digital Risk Protection

Argos

The common external threats towards an organization’s IT infrastructure nowadays are in the form of mimicking brands and logos on phishing sites, unauthorized apps and counterfeit social media accounts to spread malware and steal passwords. Exposed data, like employee or customer credentials, presents opportunities for intruders to infiltrate corporate networks and hijack accounts. Furthermore, third-party partners may inadvertently pose substantial cybersecurity threats.

Leveraging a unique combination of proprietary threat intelligence platform and highly experienced threat intelligence analysts, this platform offers a fresh approach to Digital Risk Protection (DRP) delivering solutions that address the following challenges:

  1. Determine which relevant threats should be considered in order to design an effective cybersecurity defence program
  2. Illustrate the up-to-date cyber risk status to the board and management with a clear action plan
  3. Acquire predictive intelligence to identify intent, techniques and tools to mitigate targeted threats before they materialize
  4. Continuously monitor digital risk exposure that can be exploited by cyber criminals
  5. Detect breaches as they propagate outside the organization perimeter
  6. Gain visibility into attacks targeting your brand and customers that are constantly evolving outside of your network
View More
Online System Disinformation Analysis

Cyabra

The platform is able to expose the threats toward, companies, products, people and places on social platforms by analyzing between real and fake users based on their behavior. Using that analysis, the system generates a comprehensive situational map pinpointing false entities, allowing the system users to understand the promoted false agenda, the scale and scope of the information spread and who the entities behind these efforts are.

The first step in analyzing the inauthenticity of online entities is typing in relevant phrases into the scan bar, hashtags, keywords and specific site links used within the fake post, in addition to the specific timeline desired to investigate. This query then identifies the number of total profiles, real profiles, fake profiles, and bad actors (real users with a negative sentiment), using these terms.

The reach of a disinformation campaign is amplified by utilizing multiple social media sites. In order to combat this, the system analyzes the largest global social media and messaging platforms: Facebook, X (X/Twitter), Instagram, TikTok, YouTube, and WhatsApp.

The platform safeguards your business from threats that may arise by performing social risk analysis, assessment of event and venue risks, to protecting your business executives. It also performs threat detection and mitigation towards attacks such as impersonations, insider threats, social phishing and leaked information.

Another feature that the platform has is to protect your business’ brand towards fake campaigns (identify and report new movements/tags and fake accounts that are targeting your enterprise), detect organized groups aiming to damage your brand through manipulative strategies, and dismantle their efforts, and bad actors spreading false information.

View More
Data Analysis

SentientIQ

SentientIQ combines the latest breakthroughs in artificial intelligence with a multi-modal data set, enabling us to seamlessly transform big data into actionable knowledge. Our advanced system helps you gain access to a wealth of information, effortlessly linked and presented through intuitive graphs and charts.

View More
NBDC System

EIBDC-8

EIBDC-8 is the National Bomb Data Center (NBDC) system used to store information on explosives and incidents intelligence related to chemicals, biology, radiology, and nuclear.

The NBDC consists of a database on combustion and explosives investigations that can be accessed by the appropriate authorities. Incident data is collected in detail, including the chronology of the incident, the victims, the parties involved, and the information about the bomb itself. Bomb detail data includes the category, type, material & material (switch, power, container, etc.), placement, impact, and others.

The system provides systematic tracking of explosives from producer to buyer, to help law enforcement officials to identify the perpetrators involved in the crime, establish the status of stolen goods, and prove ownership. It also provides material safety measures to take against explosives, detecting explosives, rendering safe explosive devices, disposing of explosives, and investigating post-blast scenes.

View More
Real Time OSINT Analysis

Admiralty

The Information Admiralty System is designed for real time analysis and verification of information, classifying the accuracy and credibility of content. This system initiates its process with techniques such as text mining, profiling, sentiment analysis, statistical evaluation, and a comparison engine.

It performs real time assessments of topics by gathering information from social networks like X (formerly known as Twitter), Facebook, and Instagram. Compiling data from various sources within concise time windows—ranging from 20 to 60 minutes and up to the last 24 hours—the system reflects the most current topics from different regions. Topics can be broadly reviewed or narrowed down using specific keywords and search queries.

Keeping a pulse on societal views is crucial for capturing immediate trends and focused subjects from social media and online news.

Multiple verification stages within the Information Admiralty System are employed to examine the consistency of facts, declarations, viewpoints, and phrases within the Open Source Intelligence (OSINT) framework.

View More
Intelligence Cybertroops Management

Deimos

Deimos is a sophisticated software solution designed for the creation and management of specialized entities. These digital assets serve as a powerful tool to assist users in the dissemination of content and the execution of strategic messaging campaigns across social media platforms.

Additionally, Deimos offers the capability to enhance engagement metrics, including likes, replies, and views, across multiple posts within the social media landscape. Harness the potential of Deimos to bolster your influence and strategic initiatives in the digital domain.

At your fingertips, schedule and run wide-reaching campaigns on topics that matter to you. User-defined themes guide these campaigns, drawing content from social media tweets related to the chosen subject. Plus, you can always craft your own content for that personal touch.

View More
Digital Platform & Interaction Management

Vortex

Every organization should have members who are active on social media and can potentially be involved in the organization's interaction. There needs to be a Social Media Digital Platform Management to manage this potential from recruitment, interactions management, monitoring, to rewards.

View More