FINFISHER. it intrusion. www.gammagroup.com. Remote Monitoring & Infection Solutions FINSPY QUICK INFORMATION



Similar documents
FINFISHER : GOVERNMENTAL IT INTRUSION AND REMOTE MONITORING SOLUTIONS. FINFISHER. it intrusion

Cyber solutions for the fight against crime

FINFISHER : GovERNmENtal It INtRuSIoN and REmotE monitoring SolutIoNS

Case 1:14-cv CKK Document 26 Filed 07/18/14 Page 1 of 46 UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLUMBIA

PC Surveillance. Hacking. Information Exploitation. Information Interception

Governmental Security Solutions. Elaman The bridge to Trust and Security

FinSpy / User Manual FINUSB SUITE SPECIFICATIONS. FINFISHER: FinSpy 3.00 User Manual

Remote Control System. Budgetary Proposal

Remote Forensic Software. Dr. Michael Thomas DigiTask GmbH, Germany

Remote Maintenance, Support, Home Office and Presentations

Patch Management SoftwareTechnical Specs

Security in the Sauce Labs Cloud

Business and enterprise cloud sync, backup and sharing solutions

Guidance Regarding Skype and Other P2P VoIP Solutions

Enterprise Security with mobilecho

Simple, Secure User Guide for OpenDrive Drive Application v for OS-X Platform May 2015

INSTANT MESSAGING SECURITY

Security in the Sauce Labs Cloud. Practices and protocols used in Sauce s infrastructure and Sauce Connect

FileCloud Security FAQ

Intelligent Logging & Reporting Cyberoam iview Appliance

What are cloud services?

Decryption. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright Palo Alto Networks

SONAR RESELLER TRAINING. Technical Training.. Slides 2 25 Sales Training. Slides 26 35

Saint Martin s Catholic Academy

How to avoid Five Blind Spots in Internet Filtering

How To Use Egnyte

FinIntrusion Kit / Release Notes FINUSB SUITE SPECIFICATIONS. FINFISHER: FinIntrusion Kit 2.2 Release Notes

INCIDENT RESPONSE CHECKLIST

Instructions for use the VPN at the Warsaw School of Economics

Virtual Data Room. From Deal Making to Due Diligence

The friendly All-In-One solution for. Remote Maintenance, Support, Remote Access and Home Office. Simple, fast and secure over the Internet

t/erint en z en CD a: "'- c. ea Q) 0 ~ ~ Q) ea '(3 POWERING ACTIONABLE INTELLIGENCE ~~~> ~ - "'0 s:::: LL. ea (.) (ij.s:::: "'- :t: Q) ea 'E

HIPAA. considerations with LogMeIn

redcoal SMS for MS Outlook and Lotus Notes

2012 Data Breach Investigations Report

RSA Solution Brief. RSA SecurID Authentication in Action: Securing Privileged User Access. RSA Solution Brief

SecureAge SecureDs Data Breach Prevention Solution

ARRIS WHOLE HOME SOLUTION PRIVACY POLICY AND CALIFORNIA PRIVACY RIGHTS STATEMENT

Sophos for Microsoft SharePoint startup guide

An Oracle White Paper September Advanced Java Diagnostics and Monitoring Without Performance Overhead

Cisco ASA 5500 Series Adaptive Security Appliance 8.2 Software Release

TeamViewer 7 Manual Remote Control

VMware Virtual Desktop Manager User Authentication Guide

TeamViewer 10 Manual Remote Control

Administration Catalog

Executive Brief on Enterprise Next-Generation Firewalls

Policy Based Encryption Gateway. Administration Guide

CTC Special Meeting on Communications and IT New York May Thank you very much. I am very pleased to be here to participate in

Advanced Threats: The New World Order

Using Computer Surveillance to Watch Corporate Security and Employee Performance

Server application Client application Quick remote support application. Server application

CompleteView Admin Console Users Guide. Version Revised: 02/15/2008

Injazat s Managed Services Portfolio

ACL Compliance Director FAQ

THE ROLE OF IDS & ADS IN NETWORK SECURITY

Access Your Cisco Smart Storage Remotely Via WebDAV

Helm 4 Windows Event Viewer

kalmstrom.com Business Solutions

EAGLE EYE Wi-Fi. 1. Introduction

The friendly, all-in-one solution for. Remote Maintenance, Support, Remote Access, and Home Office. Simple, fast, and secure over the Internet

Bridgit Conferencing Software: Security, Firewalls, Bandwidth and Scalability

4cast Server Specification and Installation

Protect Your Connected Business Systems by Identifying and Analyzing Threats

Ensuring the security of your mobile business intelligence

TeamViewer 7 Manual Remote Control

On A Network Forensics Model For Information Security

Milestone Federated Architecture TM

WPU-7700 APS MANAGEMENT

Attix5 Pro Overview. V7.x. An overview of the Attix5 Pro product suite.

Security FAQs (Frequently Asked Questions) for Xerox Remote Print Services

Data Sheet: Endpoint Security Symantec Protection Suite Enterprise Edition Trusted protection for endpoints and messaging environments

The Health Insurance Portability and Accountability Act - HIPAA - Using BeAnywhere on a HIPAA context

DISK IMAGE BACKUP. For Physical Servers. VEMBU TECHNOLOGIES TRUSTED BY OVER 25,000 BUSINESSES

Installation and Setup: Setup Wizard Account Information

Table of Contents. OpenDrive Drive 2. Installation 4 Standard Installation Unattended Installation

Analyzing HTTP/HTTPS Traffic Logs

Filtering remote users with Websense remote filtering software v7.6

WICKSoft Mobile Documents for the BlackBerry Security white paper mobile document access for the Enterprise

Citrix Application Streaming. Universal Application Packaging and Delivery Breaking Away from Traditional IT

Best Practices: Implementing Large Scale Collections with F- Response

Goverlan Remote Control

Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)

CC5500 Interceptor HSS DEVELOPMENT INC. HSS Development Inc. 75S Broadway White Plains, NY Tel: Fax:

Sophistication of attacks will keep improving, especially APT and zero-day exploits

idatafax Troubleshooting

Where to get help Skype support is available online at

SCOPE OF SERVICE Hosted Cloud Storage Service: Scope of Service

submit your problem and we will be more than happy to cooperate with you to find the most effective solution.

Useful Tips for Reducing the Risk of Unauthorized. Access for Laser Beam Printers and Small-Office MFPs

Covert Operations: Kill Chain Actions using Security Analytics

VidyoConferencing Network Administrators Guide

innovaphone Delta list V10

LogMeIn HIPAA Considerations

CrashPlan Security SECURITY CONTEXT TECHNOLOGY

Proxy Services: Good Practice Guidelines

Top Five Data Security Trends Impacting Franchise Operators. Payment System Risk September 29, 2009

RenderStorm Cloud Render (Powered by Squidnet Software): Getting started.

TeamViewer 9 Manual Remote Control

Information Security Basic Concepts

Transcription:

FinSpy is a field-proven Remote Monitoring Solution that enables Governments to face the current challenges of monitoring Mobile and Security-Aware Targets that regularly change location, use encrypted and anonymous communication channels and reside in foreign countries. Traditional Lawful Interception solutions face new challenges that can only be solved using active systems like FinSpy: Data not transmitted over any network Encrypted Communications Targets in foreign countries FinSpy has been proven successful in operations around the world for many years, and valuable intelligence has been gathered about Target Individuals and Organizations. When FinSpy is installed on a computer system it can be remotely controlled and accessed as soon as it is connected to the internet/network, no matter where in the world the Target System is based. Usage: Capabilities: Content: Usage Example 1: Intelligence Agency FinSpy was installed on several computer systems inside Internet Cafes in critical areas in order to monitor them for suspicious activity, especially Skype communication to foreign individuals. Using the Webcam, pictures of the Targets were taken while they were using the system. Usage Example 2: Organized Crime QUICK INFORMATION Strategic Operations Tactical Operations Remote Computer Monitoring Monitoring of Encrypted Communications Hardware/Software FinSpy was covertly deployed on the Target Systems of several members of an Organized Crime Group. Using the country tracing and remote microphone access, essential information could be gathered from every meeting that was held by this group. Feature Overview Target Computer Example Features: Bypassing of 40 regularly tested Antivirus Systems Covert Communication with Headquarters Full Skype Monitoring (Calls, Chats, File Transfers, Video, Contact List) Recording of common communication like Email, Chats and Voice-over-IP Live Surveillance through Webcam and Microphone Country Tracing of Target Silent extracting of Files from Hard-Disk Process-based Key-logger for faster analysis Live Remote Forensics on Target System Advanced Filters to record only important information Supports most common Operating Systems (Windows, Mac OSX and Linux) Headquarters Example Features: Evidence Protection (Valid Evidence according to European Standards) User-Management according to Security Clearances Security Data Encryption and Communication using RSA 2048 and AES 256 Hidden from Public through Anonymizing Proxies Can be fully integrated with Law Enforcement Monitoring Functionality (LEMF) For a full feature list please refer to the Product Specifications. www.gammagroup.com FINFISHER it intrusion

Product Components FinSpy Master and Proxy Full Control of Target Systems Evidence Protection for Data and Activity Logs Secure Storage Security-Clearance based User- and Target Management FinSpy Agent Graphical User Interface for Live Sessions, Configuration and Data Analysis of Targets

Access Target Computer Systems around the World Easy to Use User Interface

Live and Offline Target Configuration Full Intelligence on Target System 1. Multiple Data Views 2. Structured Data Analysis 3. Importance Levels for all recorded Files

LICENSES Outline The FinSpy solution contains 3 types of product licenses: A. Update License The Update License controls whether FinSpy is able to retrieve new updates from the Gamma Update server. It is combined with the FinFisher TM After Sales Support module.after expiry, the FinSpy system will still be fully functional but no longer able to retrieve the newest versions and bug-fixes from the FinSpy Update server. B. Agent License The Agent License controls how many FinSpy Agents can login to the FinSpy Master in parallel. Example: 5 Agent Licenses are purchased. FinSpy Agent licenses can be installed on an unlimited number of systems, however Only 5 FinSpy Agent systems can login to the FinSpy Master and work with the data at the same time C. Target License The Target License controls how many FinSpy Targets can be active in parallel. Active refers to activated FinSpy Target installations no matter whether the Target System is online or offline. When FinSpy Target is deployed on a Target System and no Target Licenses are available, the FinSpy Target gets temporary deactivated and no recording and live access will be possible. As soon as a new License is available (e.g. by upgrading the existing License or de-infecting one of the active FinSpy Targets), the Target will be assigned the free license and it will be activated and begin recording and providing live access. Screenshot active Target with License Screenshot inactive Target without License