Intelligence Platform
Information Extraction for Action-able Intelligence
Steps towards deployment
All rights Reserved
52886.doc
Accuracy
Every effort has been made to ensure the accuracy of the features and techniques presented in this publication.
Restricted Rights
You may not reproduce, transmit, transcribe, store in a retrieval system, or translate into any language or computer language, in any form or by any means, electronic, mechanical, optical, magnetic, photographic, manual, or otherwise, any part of this publication without the express permission of .
Limitations
This document has the following conditions and restrictions:
This document contains proprietary information belonging to our partner. Such information is supplied solely for assisting explicitly and properly authorized users. No part of its contents may be used for any other purpose, disclosed to any person or firm or reproduced by any means, electronic and mechanical, without the express prior written permission of our partner. No part or parts of this document shall be copied, used for commercial purposes or passed to any third party for any use, without approval of . The text and graphics are for the purpose of illustration and reference only. The specifications on which they are based are subject to change without notice.
Table of Contents
1 Introduction 6
2 Objectives of this document 7
3 Abstract 8
4 Intelligence bodies Challenges 13
5 Introduction to Solution 16
6 Gathering Project Information 16
6.1 Gathering Information 17
6.2 Analyzing the collected information 19
6.3 System Design 19
6.4 Commercial Proposal 21
7 Solution Description 22
7.1 IRMP – Intelligence Rules Management Platform 23
Concept 24
Features 25
System Components Overview 26
Access control and users management 27
7.2 Location Tracking For Intelligence 29
8 Visual Links Mapping 34
Functional Capabilities 36
General description 38
Visualization 39
Multi Contextual Analysis 40
9 Interception and Targeting 41
10 Cellular Extractor and Selective Jammer 45
11 Internet Denial of Service (DoS) Service blocking 49
12 Umbrella Solution for LIS systems (phase-2) 50
13 Field Laptop 54
14 Platform Hardware & Software Specifications 56
15 Probes 59
15.1 TDM ATM Probe 59
15.2 IP Probe 66
15.3 Mode of Operation 66
15.4 Technical Specifications 69
15.4.1 Key Features 69
15.4.2 Interception Criteria 70
15.4.3 Capacity Parameters 75
Table of Figures
Figure 1: Functional model for lawful interception 10
Figure 2: Architecture of the LIMS 11
Figure 3: Intelligence Platform 22
Figure 4: Rule Builder 24
Figure 5: Rule Engine Concept 25
Figure 6: Intelligence Location Data Records Extraction 30
Figure 7: Example of Detection of group meeting to plot a crime 31
Figure 8: Cell & sector & Time Advanced location 32
Figure 9: Active location for Intelligence 33
Figure 10: Correlating location with analysis results 35
Figure 11: Examples of the Analysis application & Analysis Results 36
Figure 12: map of the results of analysis 40
Figure 13: Signaling Monitoring for CDRs LDRs extraction 42
Figure 14: Signaling & Voice links monitoring (CDRs LDRs & Voice) 43
Figure 15: IP network Signaling & Content monitoring (IPDRs & Content) 44
Figure 16: BTS Extracting IMSI/IMEI/TA 46
Figure 17: BTS triangle location tracking 46
Figure 18: BTS black/white list creation 46
Figure 19: Service for White Listed Phones 47
Figure 20: DoS for All Other Phones 48
Figure 21: Activation of BTS 48
Figure 22: DoS for IP users 49
Figure 23: Architecture of Umbrella Solution 51
Figure 24: Umbrella Solution activation 53
Figure 25: Field LAPTOP 54
Figure 26 – Hexa E1/T1 Compact PCI Telecommunication Adapter 60
Introduction
is pleased to present intelligence agencies a turnkey solution to provide intelligence bodies with a comprehensive secure and reliable system to provide effective and comprehensive electronic intelligence services to the Agencies of the country.
About
develops and markets a wide range strategic and tactical solutions and products for the security forces, lawful agencies and intelligence bodies. in-house developed products monitor the telecommunications networks and generate meaningful sources of information for intelligence and lawful intercept.
End-to-End Applications
Lawful Interception – A family of LI application based on signaling passive probing.
Intelligence Solutions – A family of strategic and tactical solutions for intelligence bodies.
Location – an active location tracking system tracking for subscribers, using a combination of active query modules and passive probes.
A-GPS – precise location tracking for subscribers, using a combination of cellular technology and GPS.
Probes- TDM & IP probes infrastructure.
Anti Fraud - A complete suite of Anti Fraud applications for IP and TDM networks.
Vendor reputation and experience
is backed by the Israel Ministry of Defense and we work with the relevant security/intelligence and telecom operators locally. In addition, worldwide established Tier 1 operators such as AT&T, Cable & Wireless, Sprint, Telefonica, Vodafone, Reliance (among others) have trusted their mission critical needs and projects to us. has offices in Israel and India.
was established in 1999 by a group of Israeli entrepreneurs. The company is profitable and quickly made its way to financial independence and fast growth track. As part of the process we entered relationships with the biggest and most renowned telecom vendors as channels to our products. Nevertheless always aimed at independence and in the last years has reinforced its direct sales through establishment of satellite offices in 2 continents and enhancing its product line. This approach has proven to increase the company’s ability to market directly, better understand changing market requirements and eventually in improving the company’s financial performance.
Thanks to technical superiority and uniqueness of our products we still work with all of them and continue to sell OEM products.
In the process, passive probes have been utilized to monitor all of Israel’s 4 mobile operators on a-interface level and on other links; Pelephone, MIRS, Cellcom and Partner/Orange. In some of them replaced incumbents, in most of them few applications have been deployed, and are being continually supported, upgraded and scaled up. 3rd generation technologies have been deployed both on CDMA and GSM networks.
The company has built a reputation of the highest technical skills, innovation, customer orientation, highest products standards and financial independence. Increasing efforts in customer care led to increased customer satisfaction and enabled us to cross and up sell additional products and capacity to most of our customers.
has widely deployed its solution all over the globe both through its partners and independently.
Lawful intercept deployment
Lawful interception solutions (LI) are sold almost in every case to government and security organizations. India is an exception in which regulation imposes on telecom operators the duty to enable Lawful Monitoring on its facilities.
As a world leader in network probing, SS7 and IP passive probes are chosen by competitors as part of their solutions to monitor the networks.
We may mention that passive systems of this nature are sold either in the form of complete end-to-end systems or as OEM products through other market leaders throughout the world.
|