top of page

Lawful Interception

SIG-INT (Signal Intelligence) System

Lawful Interception Products

  • Digital Voice and Fax Monitoring System

  • Lawful Interception Solution for Fixed Line

  • Lawful Interception Solution for Cellular Network

  • Lawful IP Monitoring With Https Decoding

  • Submarine Cable Monitoring System

  • Social Media Monitoring

  • Country Wide Network Intelligence and Target Geo-location

Lawful Interception Products - Specifications

Digital Voice and Fax Monitoring System

  • Available in 4, 8, 16,32 and 64 Channel configurations

  • Can be connected to analog telephone lines, VHF/UHF Radios, Speech from microphones and other analog audio sources

  • Real-time listening of any one call while rest of the calls being recorded in the database

  • All recorded messages can be edited and filtered for noise and the actual meaningful message can be amplified for better sound quality

  • Can support setting of up to 10 Mobile Numbers on any Channel with Priority Setting

  • Audio Visual Alarm with Target Name and Number for any higher priority call

  • Automatic link to Phone directory for searching the name and address of dialed and incoming mobile numbers. (Database from local mobile operators to be provided by the customer)

  • Automatic Detection of voice and Fax call

  • LED indication on the front panel gives the current activity of the channels

  • Recording of call along with call related Information (CRI) on a customized database specially built for the application

  • Capable of displaying complete information and playing of recorded calls/audio, sms and viewing of faxes.

Lawful Interception Solution for Fixed Line

  • Supports complete spectrum of product portfolio from Mediation Device to LEMF

  • Empowers intelligence agencies to combat against crime and terrorism

  • End-to-end solution to intercept, monitor and analyse target’s Voice, SMS, Fax, Location and Internet Communications

  • Can serve multiple Law Enforcement Agencies from a single solution

  • Can be integrated with any service provider’s network in the world

  • Supports all type of networks including 2G, 3G, 4G/LTE, 5G (ready) and Fixed Lines network

  • Complies with global LI standards such as ETSI, CALEA and other country specific regulations

  • Equipped with full set of tools to archive, analyse the communications and identify the information to be used as evidence in the courts

  • Real-time listening/viewing of intercepted content

  • Analysis of the stored/archived content such playback/re-viewing

Lawful Interception Solution for Cellular Network

  • Lawful interception of GSM and CDMA networks

  • Can be used for Social Media Monitoring

  • Compliant to Global Standards like ETSI, CALEA and can be adopted to country specific standards

  • Can be integrated with HTTPS Interception module to handle the traffic from HTTPS/SSL secured site like Facebook, Twitter, Gmail, Yahoo mail etc.

  • Can provide Voice, Fax and IP Data including  sent/received e-mail, browsed webpages, Facebook, Twitter and VoIP sessions along with CDR

  • Integrated CDR Analysis Application to provide the associations of the targets automatically

  • Can Intercept minimum single E1 and scalable up to multiple E1’s depending upon the customer requirement

  • Support most of the switch manufactures like Alcatel Lucent, Juniper, Ericsson, Cisco etc

  • Central administration of intercepts and target assignments

  • Can decode more than 180 protocols including mobile protocols

  • Standard compliant delivery of intercepted communications to the appropriate law enforcement agency

  • Comprehensive user management with access rights

  • Authority management and integrated system administration with alarm monitor

Lawful IP Monitoring With Https Decoding

  • Can be used for Social Media Monitoring

  • Compliant to Global Standards like ETSI, CALEA and can be adopted to country specific standards

  • Support Interception and decoding of HTTPS/SSL traffic

  • Can be integrated with HTTPS Interception module to handle the traffic from HTTPS/SSL secured site like Facebook, Twitter, Gmail, Yahoo mail etc.

  • Can provide Emails, browsed Webpages , Chat Sessions, Facebook, Twitter, Gmail, Yahoo Mail, VoIP sessions along with CDR

  • Integrated CDR Analysis Application to provide the associations of the targets automatically

  • Decoding more than 180 protocols including various mobile protocols

  • Instant Message: MSN IM , Yahoo IM , Gtalk, XMPP, Facebook IM

  • Email: POP3, SMTP, Hot Mail , Gmail , Windows Live

  • Social Network: Facebook, Plurk, Twitter, Youtube

  • Other common protocols: HTTP, Telnet, FTP,

  • Deep Content Inspection

  • Reconstructed Content Indexing

  • Protocol Distribution Analysis

  • Advance Search by keyword, time, protocol etc

  • Identity link and communication link analysis

Submarine Cable Monitoring System

  • Completely passive monitoring capability which does not affect the existing communication network

  • Integrated system capable of monitoring all forms of voice from fixed and cellular networks , fax and IP traffic running on submarine cables across the oceans

  • Can decode the IP content up to application layer

  • Can provide Voice, VoIP, SMS, Fax, Email, Browsed Webpages, Downloaded/Uploaded files including email attachments etc.

  • Efficient solution for Social Media Monitoring and Reconstruction.

  • Automatic detection of signals and identification of protocols

  • Eliminates need for multitude of equipment for handling different protocol layers and services

  • Unified easy to use graphical user interface for management of entire system

Social Media Monitoring

  • Can be used to identify the potential terrorists, criminals and anti-social elements by social profiling of their activities.

  • Capable of providing the detailed information suspects and their associates, linkages, activities and locations.

  • The ability to monitor and aggregate new data over time for ongoing enforcement.

  • Can provide actionable intelligence.

  • Monitor individual & group profiles activities, covertly & effectively.

Country Wide Network Intelligence and Target Geo-location

  • Detailed application and web activity log such as Which URLs/Domains were accessed, Which Applications, For how long, By which device and Where is the device?

  • Illegal application identification and blocking

  • Identification and quarantine of infected nodes and phones

  • Country wide DDOS protection

  • Network base AV preventing malware download to Government phones and computers

  • Internet Traffic Regulation

  • Streaming Control

  • Social Network Control

  • Scalable long-term data retention

  • Simple interface for retrieving info by end user

GII_회사 로고 2.png

©️ 2023 GI INTERNATIONAL LLC.

bottom of page