
Lawful Interception
SIG-INT (Signal Intelligence) System
Lawful Interception Products
-
Digital Voice and Fax Monitoring System
-
Lawful Interception Solution for Fixed Line
-
Lawful Interception Solution for Cellular Network
-
Lawful IP Monitoring With Https Decoding
-
Submarine Cable Monitoring System
-
Social Media Monitoring
-
Country Wide Network Intelligence and Target Geo-location
Lawful Interception Products - Specifications
Digital Voice and Fax Monitoring System
-
Available in 4, 8, 16,32 and 64 Channel configurations
-
Can be connected to analog telephone lines, VHF/UHF Radios, Speech from microphones and other analog audio sources
-
Real-time listening of any one call while rest of the calls being recorded in the database
-
All recorded messages can be edited and filtered for noise and the actual meaningful message can be amplified for better sound quality
-
Can support setting of up to 10 Mobile Numbers on any Channel with Priority Setting
-
Audio Visual Alarm with Target Name and Number for any higher priority call
-
Automatic link to Phone directory for searching the name and address of dialed and incoming mobile numbers. (Database from local mobile operators to be provided by the customer)
-
Automatic Detection of voice and Fax call
-
LED indication on the front panel gives the current activity of the channels
-
Recording of call along with call related Information (CRI) on a customized database specially built for the application
-
Capable of displaying complete information and playing of recorded calls/audio, sms and viewing of faxes.
Lawful Interception Solution for Fixed Line
-
Supports complete spectrum of product portfolio from Mediation Device to LEMF
-
Empowers intelligence agencies to combat against crime and terrorism
-
End-to-end solution to intercept, monitor and analyse target’s Voice, SMS, Fax, Location and Internet Communications
-
Can serve multiple Law Enforcement Agencies from a single solution
-
Can be integrated with any service provider’s network in the world
-
Supports all type of networks including 2G, 3G, 4G/LTE, 5G (ready) and Fixed Lines network
-
Complies with global LI standards such as ETSI, CALEA and other country specific regulations
-
Equipped with full set of tools to archive, analyse the communications and identify the information to be used as evidence in the courts
-
Real-time listening/viewing of intercepted content
-
Analysis of the stored/archived content such playback/re-viewing
Lawful Interception Solution for Cellular Network
-
Lawful interception of GSM and CDMA networks
-
Can be used for Social Media Monitoring
-
Compliant to Global Standards like ETSI, CALEA and can be adopted to country specific standards
-
Can be integrated with HTTPS Interception module to handle the traffic from HTTPS/SSL secured site like Facebook, Twitter, Gmail, Yahoo mail etc.
-
Can provide Voice, Fax and IP Data including sent/received e-mail, browsed webpages, Facebook, Twitter and VoIP sessions along with CDR
-
Integrated CDR Analysis Application to provide the associations of the targets automatically
-
Can Intercept minimum single E1 and scalable up to multiple E1’s depending upon the customer requirement
-
Support most of the switch manufactures like Alcatel Lucent, Juniper, Ericsson, Cisco etc
-
Central administration of intercepts and target assignments
-
Can decode more than 180 protocols including mobile protocols
-
Standard compliant delivery of intercepted communications to the appropriate law enforcement agency
-
Comprehensive user management with access rights
-
Authority management and integrated system administration with alarm monitor
Lawful IP Monitoring With Https Decoding
-
Can be used for Social Media Monitoring
-
Compliant to Global Standards like ETSI, CALEA and can be adopted to country specific standards
-
Support Interception and decoding of HTTPS/SSL traffic
-
Can be integrated with HTTPS Interception module to handle the traffic from HTTPS/SSL secured site like Facebook, Twitter, Gmail, Yahoo mail etc.
-
Can provide Emails, browsed Webpages , Chat Sessions, Facebook, Twitter, Gmail, Yahoo Mail, VoIP sessions along with CDR
-
Integrated CDR Analysis Application to provide the associations of the targets automatically
-
Decoding more than 180 protocols including various mobile protocols
-
Instant Message: MSN IM , Yahoo IM , Gtalk, XMPP, Facebook IM
-
Email: POP3, SMTP, Hot Mail , Gmail , Windows Live
-
Social Network: Facebook, Plurk, Twitter, Youtube
-
Other common protocols: HTTP, Telnet, FTP,
-
Deep Content Inspection
-
Reconstructed Content Indexing
-
Protocol Distribution Analysis
-
Advance Search by keyword, time, protocol etc
-
Identity link and communication link analysis
Submarine Cable Monitoring System
-
Completely passive monitoring capability which does not affect the existing communication network
-
Integrated system capable of monitoring all forms of voice from fixed and cellular networks , fax and IP traffic running on submarine cables across the oceans
-
Can decode the IP content up to application layer
-
Can provide Voice, VoIP, SMS, Fax, Email, Browsed Webpages, Downloaded/Uploaded files including email attachments etc.
-
Efficient solution for Social Media Monitoring and Reconstruction.
-
Automatic detection of signals and identification of protocols
-
Eliminates need for multitude of equipment for handling different protocol layers and services
-
Unified easy to use graphical user interface for management of entire system
Social Media Monitoring
-
Can be used to identify the potential terrorists, criminals and anti-social elements by social profiling of their activities.
-
Capable of providing the detailed information suspects and their associates, linkages, activities and locations.
-
The ability to monitor and aggregate new data over time for ongoing enforcement.
-
Can provide actionable intelligence.
-
Monitor individual & group profiles activities, covertly & effectively.
Country Wide Network Intelligence and Target Geo-location
-
Detailed application and web activity log such as Which URLs/Domains were accessed, Which Applications, For how long, By which device and Where is the device?
-
Illegal application identification and blocking
-
Identification and quarantine of infected nodes and phones
-
Country wide DDOS protection
-
Network base AV preventing malware download to Government phones and computers
-
Internet Traffic Regulation
-
Streaming Control
-
Social Network Control
-
Scalable long-term data retention
-
Simple interface for retrieving info by end user