NET-INT - CY4GATE.com

advertisement
NET-INT
CY4GATE NET-INT is an integrated platform designed for the surveillance and monitoring of phone
calls, chats, messages on social networks, forum discussions, emails, instant messaging and VoIP
calls. It is an essential platform to support the Intelligence Cycle.
NET-INT is based
_1 Monitoring Centre
The Monitoring Centre is the core of the system. It is designed as a back end structure for the
collection and analysis of structured and unstructured data originating from communication
surveillance solutions and transmission sources.
The Monitoring Centre includes the components shown in the scheme:
Player
Server
Monitoring
Captor Probes
Mediation Platform
The Server is used for the management of information such as recording, decoding, indexing,
storage, authentication and management of data coming from all sources.
The Player is used for the reproduction of data acquired in any format and from any transmission
source.
The Mediation Platform and Captor Probes are used for providing the collection of network traffic.
CY4GATE S.r.l.
cy4gate.com - info@cy4gate.com
NET-INT
Secure Tunnel
Secure Tunnel
Secure Tunnel
IP 9.1.2.3 IP 4.5.6.7
IP 5.6.7.8
Secure Tunnel
IP 8.9.1.2 IP 3.4.5.6
The Virtual Humint is a cyber-based methodology for collecting relevant intelligence information
and data in real time. It combines both human and virtual inputs to enable operators to assume
numerous virtual identities to infiltrate social networks, blogs, forums, chats and identify threat
streams and malicious activities
IP 1.2.3.4
_2 Virtual Humint
Secure Tunnel
Secure Tunnel
Secure Tunnel
Secure Tunnel
Secure Tunnel
Secure Tunnel
Secure Tunnel
Secure Tunnel
Management of Virtual Identities
_3 Lawful Interceptor
The Lawful Interceptor is a solution designed to elude encryption by means of a software directly
installed on the device to be remotly monitored. Evidence collection on monitored devices is stealth
and transmission of collected data from the device to the server is encrypted and untraceable.
The lawful Interceptor is not detectable by the targeted party.
CY4GATE Lawful Interceptor uses cutting-edge technology and offers a rich set of advanced
features and sophisticated intelligence collection capabilities which are not available in standard
interception solutions to:
•
Penetrate Android, BlackBerry and iOS based devices;
•
Extract contacts, messages, instant messages, emails, photos, files, locations, passwords and more;
•
Access password-protected devices;
•
Retrieve any file from the device for a deeper analysis.
abc def ghi jkl mno pqrs tuv wxyz ABC DEF GHI JKL MNO PQRS TUV WXYZ !Ӥ $%& /()
=?* ‘<> #|; ²³~ @`´ ©«» ¤¼× {} abc def ghi jkl mno pqrs tuv wxyz ABC DEF GHI JKL MNO
PQRS TUV WXYZ !”§ $%& /() =?* ‘<> #|; ²³~ @`´ ©«» ¤¼× {} abc def ghi jkl mno pqrs tuv
wxyz ABC DEF GHI JKL
MNO PQRS TUV WXYZ !”§ $%& /() =?* ‘<> #|; ²³~ @`´ ©«» ¤¼× {} abc def ghi jkl mno pqrs
tuv wxyz
ABC DEF GHIaccusantium
JKL MNO PQRS
TUV WXYZ !”§ $%& /() =?* ‘<> #|; ²³~ @`´ ©«» ¤¼× {}
Sed ut perspiciatis unde omnis iste natus error
sit voluptatem
doloremque
abcabdef
jkl mno pqrs
tuv wxyz
ABCarchitecto
DEF GHI JKL MNO PQRS TUV WXYZ !Ӥ $%& /() =?*
laudantium, totam rem aperiam, eaque ipsa quae
illoghi
inventore
veritatis
et quasi
‘<> #|;unde
²³~ @`´
©«»iste
¤¼×
{} abc
beatae vitae dicta sunt explicabo. Sed ut perspiciatis
omnis
natus
error sit voluptatem
def ghi jkl mno pqrs tuv wxyz ABC DEF GHI JKL MNO PQRS TUV WXYZ !Ӥ $%& /() =?*
accusantium doloremque
‘<> #|; ²³~ @`´ ©«» ¤¼× {} abc def ghi jkl mno pqrs tuv wxyz ABC DEF GHI JKL MNO PQRS
TUV
!Ӥ $%&veritatis
/() =?* ‘<>
#|; ²³~architecto
@`´ ©«» ¤¼× {}abc def ghi jkl mno pqrs tuv wxyz
laudantium, totam rem aperiam, eaque ipsa quae
abWXYZ
illo inventore
et quasi
ABC
DEF GHI
beatae vitae dicta sunt explicabo.
SocialNetwork
CY4GATE S.r.l.
cy4gate.com - info@cy4gate.com
Download