Mobile Surveillance System
Key Features

  • Rapid deploy in 5 minutes.

  • Radar integration for detection and tracking of targets.

  • High resolution visible and thermal cameras for long range surveillance day and night.

  • Automatic detection, tracking, and classifying of humans up to 7.5 miles and vehicles up to 10 miles.

  • Deep learning neural net technology for auto-verification of target classification; dramatically reduces nuisance alarms due to animals and weather induced noise.

  • Full Motion live and recorded video.

  • Laser range finder option for precisely locating objects of interest.

  • Laser illuminator for agent intervention using Night Vision Googles.

  • Automatic slew and track targets with PTZ camera.

  • Geospatial map system shows location of detected targets and dropped bundles.

  • Integration with CoT/TAK for sharing target locations, field-of-view coverage, and blue-force tracking.

  • Wifi and Cellular radio options for communications with other trucks and central stations.


The following information was adapted from written testimony of CBP U.S. Border Patrol Acting Chief Ronald Vitiello for a House Committee on Oversight and Government Reform, Subcommittee on National Security, and Subcommittee on Government Operations hearing titled “National Security: Threats at our Borders”

Release Date: 

March 23, 2016


The border environment between the ports of entry is dynamic. Working in conjunction with fixed surveillance assets, mobile technology assets provide flexibility and agility to adapt to changing border conditions and threats. Mobile technologies are deployed in California, Arizona, New Mexico, and Texas as well as several Northern border locations. Along the Southwest border, Mobile Surveillance systems provide long-range mobile surveillance and consist of a suite of radar and camera sensors mounted on standard pickup trucks. An agent deploys with the vehicle to operate the system, which automatically detects and tracks items of interest and provides the agent/operator with data and video of the observed subject.


These systems provide significant security benefits and multiply the capabilities of law enforcement personnel to detect, identify, and respond to suspicious activity and they also assist with public safety along the border. Mobile surveillance technology systems enable agents to position the technology where it is needed at a specific moment, extend their observational capabilities including by helping see through the darkness – and increase the accuracy and speed of response.


Mobile technology is critical to border security operations and through the deployment of these effective technologies, the Border Patrol gains more coverage of fixed surveillance gaps and situational awareness, and increases its ability to adapt to changing conditions and effectively detect, identify, track, and interdict potential threats along the Southwest border. A tailored blend of fixed, mobile and portable surveillance systems that complement one another, increases the Border Patrol’s effectiveness in targeting a response to high-risk areas, enabling rapid response strategies to maximize limited manpower, and adjusting to seasonal/periodic traffic patterns.

PureTech Systems’ Delivering on Orders of its PureActiv Software providing Rapidly Deployable Advanced Surveillance Technology to U.S. Border Patrol

The MVSS platform utilizes PureTech Systems' PureActiv software as its central command and control, providing AI enhanced video detection and classification, user interface display, and sensor collaboration logic for the surveillance suite. The suite consists of visible and thermal cameras, laser illuminators and range finders mounted on telescoping masts located in the back of commercial pickup trucks. The PureActiv software enables detection and classification of intruders up to 6 miles away. Once the PureActiv software automatically identifies an intruder, the system has the ability to automatically track them and quickly provide accurate intruder location on a GIS map to the end user.

Keep Reading>