Skip to main content

Geo F2 'pill bottle' Tracker

FreightWatch Security Net, a provider of embedded cargo and portable surveillance tracking solutions, has received FCC 47 CFR Part 15, Subpart B certification for its Geo F2 'Pill Bottle' location tracker, the first commercial-class Qualcomm inGeo platform-based product
February 3, 2012 Read time: 1 min
2211 FreightWatch Security Net, a provider of embedded cargo and portable surveillance tracking solutions, has received FCC 47 CFR Part 15, Subpart B certification for its Geo F2 'Pill Bottle' location tracker, the first commercial-class 213 Qualcomm inGeo platform-based product.

The Geo F2 is an industrial strength, assisted-GPS tracking product incorporating Qualcomm QSC6055 module technology. With a small pig-tail battery option attached, it can be hidden in a pill bottle, or equally small enclosure, enabling a variety of new covert tracking solutions. With a large-capacity lithium-polymer battery option, the Geo F2 unit can also be deployed in rapid reporting, law enforcement surveillance situations or long-term (more than a year) remote asset location assurance applications.

Combined with the optional integrated Zigbee radio receiver, the Geo F2 becomes a remote, battery-powered sensor data collection and transmission platform.

For more information on companies in this article

Related Content

  • IRD: from the ground up
    September 16, 2021
    IRD is undertaking a comprehensive review of its road safety and monitoring solutions. A series of initiatives is building on the company’s in-pavement expertise, bringing considerable additional value for the customer to the traditional range of products while complementing these with wholly new technologies
  • Technologies to protect connected cars ‘not being utilised’
    August 10, 2016
    A three-year study by IOActive’s Cybersecurity Division has found half of vehicle vulnerabilities could allow cyber attackers to take control of a vehicle - and 71 per cent are ‘easy to exploit’. The research, detailed in a whitepaper, Commonalities in Vehicle Vulnerabilities, is based on real-world security assessments. Technologies which could be exploited include cellular radio, Bluetooth, wi-fi, companion apps, vehicle to vehicle (V2V) radio, onboard diagnostic equipment, infotainment media and Zigbe
  • Why keeping count is so important for traffic management
    November 21, 2023
    Traffic engineers need to have multiple solutions in their toolbox to complete the most accurate and safe data collection programmes possible, explains Wes Guckert of The Traffic Group
  • ITS Australia Awards: finalists revealed
    November 29, 2022
    Cisco, Moovit and Q-Free are among the companies up for 13th ITS Australia Annual Awards