User's Manual

Displaying error reports
Displaying various configuration options as part of the
officers’ configuration screens (which are password
protected, and can optionally be totally disabled remotely
to ensure absolute security)
Four-tamper transmitter support
The 3M Electronic Monitoring ankle and wrist transmitters
(TX-860 / TXS-860) are equipped with four tamper-detection
mechanisms. The transmitter detects and reports when:
The strap is opened or cut (including when done inside
conductive solutions, e.g. salty water)
The transmitter is removed from the offenders’ body,
even without opening or cutting the strap (detected using
the proximity alarm feature, also referred to as "body
alarm").
The transmitter is not moving; this may indicate that the transmitter has either been
removed, or the subject is unconscious.
The case is tampered with; any attempt to open or break the case of the transmitter
is detected.
Installation and activation
The 3M™ Dual Comm RF Monitoring Receiver installation process has been enhanced
and improved:
The standard installation process is quick and automatic, and can be performed at an
offender’s home independent of the central monitoring center personnel.
The receiver unit’s LCD screen displays status information which helps guide the
officer through every step of the installation process. If errors occur, they are easy to
identify and resolve.
The installation and activation process takes only about 5 minutes, when range
testing is not performed. When range testing is performed, the installation typically
takes an additional 3-5 minutes, depending on the thoroughness of the range testing
process.
Advanced configuration options are available using the officer configuration screens.
The unit supports a self-installation option by which an offender can independently
install the receiver unit at his or her home, and the system will automatically verify
whether the offender installed the unit at the proper location.
Encryption
The 3M™ Dual Comm RF Monitoring Receiver unit communication is encrypted using
high secured protocols. The communication between the receiver and the transmitter, as
well as between the receiver and the Data Communication Computer (DCC), are fully
encrypted for full security using the latest encryption algorithms. This ensure that
offenders cannot duplicate transmitter signals in order to deceive the system. The
encryption protects the communication channels against
Eavesdropping
Unauthorized modifications