GeoMatrix. Positioning of Mobile Phones System



Similar documents
1 Introduction. 2 Assumptions. Implementing roaming for OpenBTS

ETERE SNMP CONSOLE: A centralized, automatic and real-time monitoring of broadcast system networks

Reduce Mobile Phone Expense with Avaya Unified Communications

ISDN (PRI) GSM Gateway

SuperGuard VT-05 Vehicle Tracking Device

TORNADO Solution for Telecom Vertical

Agilent Network Monitoring Content Intercept Manager

BlackBerry Mobile Voice System

Global M2M Platform vodacom.co.za/business

Jarkko Kuisma

How to select the right Marketing Cloud Edition

BlackBerry Mobile Voice System

How To Use Blackberry Mobile Voice System On A Blackberry Phone

Using IPsec VPN to provide communication between offices

Nokia Siemens Networks his 700 Integrated signaling application solutions

11.1. Performance Monitoring

Understanding Mobile Terminated Call Failures

Avaya Unified Communications Can Reduce Cell Phone Expenses

An Oracle White Paper November Typical Key Performance Indicator Reports for Performance Intelligence Centers

The Internet and the Public Switched Telephone Network Disparities, Differences, and Distinctions

In this age of mobile revolution, it is extremely important to stay in touch with technology at all times. Bulk SMS are the fastest way for conveying

The Shift to Wireless Data Communication

Zorba Asset Tracking Solution

Service Description. Ericsson IPX

ESET Mobile Security Windows Mobile. Installation Manual and User Guide

Electronic Service Agent TM. Network and Transmission Security And Information Privacy

Teltonika FM41XX. Configurator v. 1.0

SAS the interoperability test solution

Developing Fleet and Asset Tracking Solutions with Web Maps

INTELLIGENT NETWORK SERVICES MIGRATION MORE VALUE FOR THE

Avaya one-x Mobile User Guide for iphone

Network Security. Chapter 14. Security Aspects of Mobile Communications

Global System for Mobile Communication Technology

Trace Desktop Workforce / Fleet Management System

WAP PUSH, UP.NOTIFY, AND SMS Features and Benefits Comparison

SS7: Locate. Track. Manipulate.

ESET Mobile Security Windows Mobile

I. What is VPN? II. Types of VPN connection. There are two types of VPN connection:

GHEM Secure Access Control

Android Mobile Security with Auto boot Application

HG-4000/3U. VoIP GSM Gateway. Cost Saving Customer Premises Equipment with Carrier Grade Performance. Product Description November 2009

NICE Systems and Avaya provide businesses with Insight from Interactions

McAfee Web Gateway Administration Intel Security Education Services Administration Course Training

Performance Evaluation of Intrusion Detection Systems

Long-Term Evolution. Mobile Telecommunications Networks WMNet Lab

SPYTEC 3000 The system for GSM communication monitoring

The GSM and GPRS network T /301

Chapter 11 Cloud Application Development

CONDIS. IT Service Management and CMDB

@msecnet / Bogdan ALECU

Kaseya 2. User Guide. Version 1.0

GPS Vehicle Tracker USER MANUAL VT-108

Voice Over Internet Protocol (VOIP)

UNDERSTAND YOUR CLIENTS BETTER WITH DATA How Data-Driven Decision Making Improves the Way Advisors Do Business

WHITE PAPER. Gaining Total Visibility for Lawful Interception

Worldwide attacks on SS7 network

Monitor - Analyse - Solve

Quick Start for Network Agent. 5-Step Quick Start. What is Network Agent?

Access Mediation: Preserving Network Security and Integrity

Introducing IBM s Advanced Threat Protection Platform

ELM Security System Electronic Locking & Monitoring

Kaseya 2. User Guide. Version 7.0. English

Smart Anytime, Safe Anywhere. Climax Home Portal Platform. Envisage and Enable a Connected Future

Sierra Wireless AirCard Watcher Help for Mac OS X

AT&T Location Information Services

A vaya IP Office Contact Center Solutions

Physical Infrastructure Management Solutions

GuestWorks. System. The Total Hospitality Communications Solution for Your Guests and Your Business

Clarent your choice is. Perfectly Clear. the clearer. the better. internet. telephony. solutions

Tomás P. de Miguel DIT-UPM. dit UPM

NeoGate VoIP GSM Gateway Applications and Solutions 1

Siemens HiPath ProCenter Multimedia

VEHICLE TRACKING SYSTEM USING GPS. 1 Student, ME (IT) Pursuing, SCOE, Vadgaon, Pune. 2 Asst. Professor, SCOE, Vadgaon, Pune

DRIVE-BY DOWNLOAD WHAT IS DRIVE-BY DOWNLOAD? A Typical Attack Scenario

1 Log visualization at CNES (Part II)

Hypermedia HG-4000/6U. VoIP GSM Gateway. Heavy-duty, Multi-channel, Scalable, Cost-efficient Gateway. Product Description January 2013

Introduction MIND CTI. Overview

Agilent OSS Wireless QoS Manager

EXPANDING THE ROLE OF THE MOBILE NETWORK OPERATOR IN M2M

AMDOCS 2014 EU ROAMING REGULATION III SOLUTION

GSM ATT Modules Simply effective remote control

Deployment Guide: Transparent Mode

How to Choose the Right Industrial Firewall: The Top 7 Considerations. Li Peng Product Manager

OSIX Real-time network performance monitoring.

Advanced Transportation Management Systems

An Introduction to Geocoding:

2N NetStar. Sales guide to services. Version

Market Growth and New Regulations Demand Network Modernization

Chapter 8 Router and Network Management

Application Notes for Configuring QuesCom 400 IP/GSM Gateway with Avaya IP Office using H.323 trunks Issue 1.0

5.0 Network Architecture. 5.1 Internet vs. Intranet 5.2 NAT 5.3 Mobile Network

SMS Gateway. intouchsms. Bulk SMS Services

m!trace gps tracking & tracing m!truck transport management m!field mobile field operations

Philosophy of GIMnet

Transcription:

GeoMatrix Positioning of Mobile Phones System

Geographic intelligence is one of the oldest forms of military intelligence, and one of the most important. From earliest times, an accurate knowledge and appreciation of geographical factors has been an essential part of strategy and tactics. In the face of unlimited conceivable demands from planning and operational staffs it is essential that the geographic activities should be carefully guided and controlled.

Mobile phones have become a crucial part of our daily life nowadays. Everyone from teenagers to old men owning at least one cell phone. Mobile phones enables to communicate and to get huge mass of information.

The GeoMatrix System provides the benefits from the combination of geographical intelligence and mobile phones location. GeoMatrix System giving the ability to get mobile phone poison anywhere around the world. The GeoMatrix System provides operational agencies the ability to locate, track and manipulate GSM/UMTS/3G/4G subscribers covertly virtually anywhere in the world, including inbound/outbound roamers.

GeoMatrix System is an SS7 protocol based solution that provides accurate, real-time data of suspects and people of interest by tracking their mobile phone that are totally undetectable by the target and the mobile networks. The system stealthily ascertains status, location and movement of targets of interest; from anywhere in a city and/or area to the entire country and beyond borders, pinpointing them with high accuracy in real-time.

Log in to the web interface Enter targeted phone number Get Location

First layer of the GeoMatrix capabilities are consists of the receiving in real-time targeted phone identities and status: o location (longitude and latitude) o IMSI number o Home country o Home operator o Host country (in case the target is in different country) and host operator o LAC and Cell ID o Phone status (absent/ not reachable/ busy/ idle) o IMEI (in some cases)

The GeoMatrix powerful capabilities are wrapped with a convenient user interface which includes the means to use the GeoMatrix modules. The system is very simple and intuitive. It's clean web user interface was designed especially for the common user and do not require any technical understanding. In fact, any person with basic computer experience can operate it.

GeoMatrix is modular; allowing organizations to deploy those modules and services that suit their requirements best, while potentially leveraging some legacy infrastructure and software tools. The GeoMatrix is based on six main modules: o Tasks o Triggers o Tracking o History o Alerting o Management

Tasks collects, analyzes and presents the GeoMatrix results: Option to locate target using his MSISDM ( regular ) number or IMSI (SIM) number Enables receiving updated locating using invisible silent SMS that send to his device Enables seamlessly disconnect the target from the network until he will preform outgoing call (will not receive calls, SMS or internet connection)

Triggers a powerful rule based engine from which users can define key criteria to automatically track a suspect and receive alerts when specific pre-defined conditions occur: Sub online in case the target is not connected to the network (the phone is turned off) the system will alert when it returning to the network GeoFencing The system will alert when the target entered into specific zone or moved from specific zone defined by the user

Triggers a powerful rule based engine from which users can define key criteria to automatically track a suspect and receive alerts when specific pre-defined conditions occur: Home country change enables to get alert when the target travelling to country different from his home operator country Distance between two the system will alert on when two targets getting close / far away from each other more that distance that the user define (to find interesting meeting) Distance between multiple to get know when a specific group gathered or dispersed

Alerting shows all the alert that the system generated based on the queries and tasks that were set up History The history module presents all the queries that were done, their status and it s result Management this module shows all the statistics regarding the use of the system by it s users. Also manager hosts all the administration logic and assist in managing the system access permissions, various internal management functions and control of individual user queries (budgeting, limitations, etc.)

The system uses GSM SS7 protocol. This protocol suite used by most telecommunications operators throughout the world to talk to each other. Today, due to its structure, the SS7 layer allows the get phones location. The SS7 protocol enables worldwide coverage of all GSM/UMTS/3G/4G mobiles served by local networks and enable effective monitoring of inbound roamers as well as outbound roamers (local GSM roaming abroad). SS7 protocol based command state machine, stealthy and fully transparent without arousing any suspicion or trace identifiable, thus cannot be blocked nor filtered.

Our solution employs series of protective layers are used to completely hide and mask the tracking process. The system includes a dynamic M2M SS7 gateway, which connects seamlessly to the mobile network multi-capability functional nodes. All data related to queries, suspect lists, phone numbers, query results, etc. are stored only on the database server, located at the customer site. All queries are performed using intelligent routing that masks the queries, making it virtually impossible to monitor or trace the M2M SS7 commands in any manner.

Simple, rapid installation at customer organization site, connecting to a single telecom carrier to cover the entire country, including all other carriers. Provides bird's eye view of every suspect using a mobile phone on all networks, including foreign roaming users, all with pinpoint accuracy. Provides a secure umbrella of coverage (kilometers wide) to protect key national assets - parliament, presidential residence, military sites, and other sensitive locations. Includes tracking robots to automatically track suspects, entry/exit of the country or region, proximity to sites of special interest, and even proximity to other suspects/parties of interest.

Nationwide coverage of all GSM mobiles served by local networks including inbound roamers as well as local GSM roaming abroad. Stealthy and fully transparent without arousing any suspicion or trace Easily accepts import of external suspect lists Simple, intuitive operation Advanced yet simple analysis module to monitor and plot suspect movement over time. Feature-rich, based on extensive user feedback and technological expertise Fully secured communication via IP VPN tunnels to M2M SS7 hub Includes a set of well proven modules and capabilities which allow the operator various analytics and operational capabilities. The solution is derived from years of experience of providing advance intelligence solutions.