NET-INT CY4GATE NET-INT is an integrated platform designed for the surveillance and monitoring of phone calls, chats, messages on social networks, forum discussions, emails, instant messaging and VoIP calls. It is an essential platform to support the Intelligence Cycle. NET-INT is based _1 Monitoring Centre The Monitoring Centre is the core of the system. It is designed as a back end structure for the collection and analysis of structured and unstructured data originating from communication surveillance solutions and transmission sources. The Monitoring Centre includes the components shown in the scheme: Player Server Monitoring Captor Probes Mediation Platform The Server is used for the management of information such as recording, decoding, indexing, storage, authentication and management of data coming from all sources. The Player is used for the reproduction of data acquired in any format and from any transmission source. The Mediation Platform and Captor Probes are used for providing the collection of network traffic. CY4GATE S.r.l. cy4gate.com - info@cy4gate.com NET-INT Secure Tunnel Secure Tunnel Secure Tunnel IP 9.1.2.3 IP 4.5.6.7 IP 5.6.7.8 Secure Tunnel IP 8.9.1.2 IP 3.4.5.6 The Virtual Humint is a cyber-based methodology for collecting relevant intelligence information and data in real time. It combines both human and virtual inputs to enable operators to assume numerous virtual identities to infiltrate social networks, blogs, forums, chats and identify threat streams and malicious activities IP 1.2.3.4 _2 Virtual Humint Secure Tunnel Secure Tunnel Secure Tunnel Secure Tunnel Secure Tunnel Secure Tunnel Secure Tunnel Secure Tunnel Management of Virtual Identities _3 Lawful Interceptor The Lawful Interceptor is a solution designed to elude encryption by means of a software directly installed on the device to be remotly monitored. Evidence collection on monitored devices is stealth and transmission of collected data from the device to the server is encrypted and untraceable. The lawful Interceptor is not detectable by the targeted party. CY4GATE Lawful Interceptor uses cutting-edge technology and offers a rich set of advanced features and sophisticated intelligence collection capabilities which are not available in standard interception solutions to: • Penetrate Android, BlackBerry and iOS based devices; • Extract contacts, messages, instant messages, emails, photos, files, locations, passwords and more; • Access password-protected devices; • Retrieve any file from the device for a deeper analysis. abc def ghi jkl mno pqrs tuv wxyz ABC DEF GHI JKL MNO PQRS TUV WXYZ !”§ $%& /() =?* ‘<> #|; ²³~ @`´ ©«» ¤¼× {} abc def ghi jkl mno pqrs tuv wxyz ABC DEF GHI JKL MNO PQRS TUV WXYZ !”§ $%& /() =?* ‘<> #|; ²³~ @`´ ©«» ¤¼× {} abc def ghi jkl mno pqrs tuv wxyz ABC DEF GHI JKL MNO PQRS TUV WXYZ !”§ $%& /() =?* ‘<> #|; ²³~ @`´ ©«» ¤¼× {} abc def ghi jkl mno pqrs tuv wxyz ABC DEF GHIaccusantium JKL MNO PQRS TUV WXYZ !”§ $%& /() =?* ‘<> #|; ²³~ @`´ ©«» ¤¼× {} Sed ut perspiciatis unde omnis iste natus error sit voluptatem doloremque abcabdef jkl mno pqrs tuv wxyz ABCarchitecto DEF GHI JKL MNO PQRS TUV WXYZ !”§ $%& /() =?* laudantium, totam rem aperiam, eaque ipsa quae illoghi inventore veritatis et quasi ‘<> #|;unde ²³~ @`´ ©«»iste ¤¼× {} abc beatae vitae dicta sunt explicabo. Sed ut perspiciatis omnis natus error sit voluptatem def ghi jkl mno pqrs tuv wxyz ABC DEF GHI JKL MNO PQRS TUV WXYZ !”§ $%& /() =?* accusantium doloremque ‘<> #|; ²³~ @`´ ©«» ¤¼× {} abc def ghi jkl mno pqrs tuv wxyz ABC DEF GHI JKL MNO PQRS TUV !”§ $%&veritatis /() =?* ‘<> #|; ²³~architecto @`´ ©«» ¤¼× {}abc def ghi jkl mno pqrs tuv wxyz laudantium, totam rem aperiam, eaque ipsa quae abWXYZ illo inventore et quasi ABC DEF GHI beatae vitae dicta sunt explicabo. SocialNetwork CY4GATE S.r.l. cy4gate.com - info@cy4gate.com