HSS Development Presents:
Cellular Intercept for COMINT & SIGINT Solutions:
A brief review of our solutions to monitor and intercept
criminal and terrorist communications for Law Enforcement
and Government Agencies only
© 2011 HSS Development.
About the Cellular Interceptor System Configuration:
The Graphic User Interface is how the user observes Cellular Traffic Activity.
The system is designed in a manner that it can retrieve communications encrypted on
the A5.1 standard, and then conduct a Class Mark Modification, passively and
undetectable, in order to:
a) intercept and retrieve without any active footprints
b) overhear the reception of GSM audio and data through the GSM "Open and Listen"
technique
Physical Location of Operation:
The covert nature of the system determined that all antennas be built-in, and not
externally connected with long wiring protruding out of the system's transportable
case. An optional Aerial Antenna with a 1 - 2 meter length can be customized into the
system's design in order to increase the signal strength of the interception capability.
The operator:
- can choose up to 8 Cells (the standard system lets the user choose up to 8 Duplex
Channels)
- can select by Number, Country, Network Provider, Cell ID, Signal Level
- can choose to use Target Mode or Random Mode
If the operator has no Target, the Random Mode is able to pick up Random calls active
in the cellular base station perimeter in proximity to the cellular interceptor.
InterceptionThe Interception Field shows calls that have been picked up. If no calls have been
picked up, the field will remain empty. This corresponds to the system design
based on how many Channels the Cellular Interceptor has been custom ordered
for.
EnvironmentThe Environment Field performs a quick analysis of the Service Providers in the area
where the Cellular Interceptor has been deployed. These Service Providers are online,
actively exchanging voice and data communications with Cellular Handsets, and are
within range of the Cellular Interceptor. In this particular presentation, the first 8
channels consist of the provider who has submitted to the Class Mark Change feature
of the Cellular Interceptor.
EnvironmentThe cellular Service Providers must be indicated and checked off prior to engaging in
Cellular Interception. Checking off those providers who are not scannable means they
will not fall under the confines of interception. If that happens, then those providers
will not be able to recognize the Class Mark Change and will result in an error.
The Operator:
- can choose which calls to listen to
- can flag calls to save as Targets
HistoryThe History Field on the Cellular Interceptor shows the caller data such as the TMSI
number that was picked up by the system.
If a call was listened to, the History will remember that. These can be filed by the
Operator, and retrieved afterwards, in the event they might be Targets of interest.
The History saves caller information into a Database. This
Database stores events of Cellular Activity, and can directly Database stores events of Cellular Activity, and can directly
hold 200 calls in its memory, and possess scalable memory
resources to hold up to 1000 calls in memory.
Externally, using the Digital Voice Logger option, unlimited
volumes of audio calls can be stored.
History Security
For reasons of security, the operator can initialize the Emergency
Purge Feature. Should the system be required to delete any
intercepted audio voice communications or data communications, an
efficient evacuation of the historical file details can be performed.
History (continued)The IMSI number will not be displayed if the caller is too far away from the base station that the Cellular
Interceptor is within range to. In other words, the Cellular Interceptor is monitoring a target within range,
be it one of Random capture, or an intended subject; and that subject is either making or receiving a call.
The system can obtain Subscriber information on that The system can obtain Subscriber information on that
subject because he is within range, but the system cannot
obtain Subscriber information on the other subject who is
not within range. Both must be within range of the system.
Handover - Handoff : Moving between Cellular Network AreasThe Cellular Interceptor is able to observe the numerous handover paths. Should the
target be traveling, the Cellular Interceptor is able to capture each handover in a
geographic zone or cell. In that way, continuous user sessions (phone calls) can be
monitored while the handheld mobile phone is connected to the service provider's
network or affiliate network provider.
Hand-Off Marker
Targets shown are those the system has intercepted.
Interception is not limited to Audio, as the SMS Intercept
Is also operational, no matter what language is used.
Once the call has been completed, the
interception details will remain under this
Target section (storing interception
activity via Event Logger)
Signal Strength EfficiencyInterception can be conducted based on the Signal Strength of the area under
investigation. Therefore, a Signal Strength power level Threshold was established
so that the user could devote the resources of the system to focus on just subjects
within a certain area.
This makes Cellular Intercept investigations more
efficient by leaving out scanned communications
beyond a Threshold level for the vicinity in use.
History Security
Shown here is the Emergency History Security Purge Feature. When
clicking on the DELETE YOUR DATABASE FILES, for reasons of security,
the operator can eliminate all past interception records.
Should the system be required to delete
any intercepted audio voice
communications or data communications,
an efficient evacuation of the historical
file details can be performed.
Learning Field
The Learning Field is the most advanced start-up feature for the Cellular
Interceptor. It enables the operator to "hit the ground running".
The Learning Field lets the Cellular Interceptor recall
metrical data identifying:metrical data identifying:
� who the local service providers are
� their location by base station setup in proximity to the
Cellular Interceptor
� correlated data that can reference Targets of Interest
(stored in the system) who are actively engaged in
communication exchanges with those service providers
© 2011 HSS Development.
Top Related