Verint GI2 Gi2 Features 2010 Verint Systems Inc. All rights reserved.
Channelyser Function The Channelyser allows the user to interrogate the local networks and display the Broadcast information. This information is used for the configuration of the system Available Networks List of BCCH detected and broadcast details Graphical Representation of the 900 MHz band Graphical Representation of the 1800 MHz band Details of Selected Row from BCCH List
Channelyser Function The Channelyser allows the user to interrogate the local networks for the purpose of collecting and display the network information. This information is used for the configuration of the system Different Scans can be selected according to preference and the installed hardware
Channelyser Function The Channelyser allows the user to interrogate the local networks for the purpose of collecting and display the network information. This information is used for the configuration of the system Different Scans can be selected according to preference and the installed hardware Logs of all scans are stored
RTX Control - GSM Configurations can be saved as Presets Mode Accept or Reject or Denial Of Service Definition of the Broadcast Network Channelyser: used for Smart Channel Selection Tx Output power
GSM Modes Reject Mode Handsets see our Transmission They attempt to register (LAC Update) System gathers handset info Handset is rejected, by the system, back to the Real Network
GSM Modes Accept Mode Handsets see our Transmission They attempt to register (LAC Update) System allows all Registrations & holds the Phones Handset Info is recorded
GSM Modes Denial of Service Handsets see our Transmission They attempt to register (LAC Update) System gathers handset info Handset is rejected with DoS & does not go back to the Real Network
GSM Lists The List overrides ANY Mode i.e. If a Handset is in a List then ONLY the List rule applies to that Phone. The Mode is ignored by the single handset but still applies to EVERYBODY else. White List Handsets are always HELD by the System Black List Handsets are always REJECTED by the System i.e. Returned to the Real Network. Denial of Service Handsets will NOT register to that network until restarted (Power Off and On) List is defined in the ID Manager
GSM Lists (Example 1) Reject Mode + White List Handsets see our Transmission They attempt to register (LAC Update) All Handsets are rejected, back to the Real Network EXCEPT those in the White List which is HELD by the System Handset in White List
GSM Lists (Example 2) Accept Mode + Black List Handsets see our Transmission They attempt to register (LAC Update) System allows the Registration & HOLDS all Phones EXCEPT those in the Black List Handset in Black List
GSM Lists (Example 3) Reject Mode + DoS List Handsets see our Transmission They attempt to register (LAC Update) All Handsets are rejected, back to the Real Network EXCEPT those in the DoS List which will NOT register with the real network Handset in DoS List
Core Functionality Matrix Function Description System Only System + Uni System + BiDi Incoming SMS Intercepted (Can be Forwarded to Target) Outgoing SMS Intercepted (Can be Forwarded to Recipient) Viewed Only (not Forwarded to Recipient) Send Fake SMS To Captured Handset From Captured Handset to any Recipient Incoming Calls To the Captured Handset Outgoing Calls (Note: Uni has Caller ID withheld) Fake Calls Make Outgoing Calls from Targets Handset Make Calls To Make incoming Calls to Targets Handset from Laptop Make Calls From Make Outgoing Calls from Targets Handset using Laptop Private Network Voice and SMS *Caller ID is Withheld ** must use 'Send Advertising' Possible Not Possible
RTX Control RTX Control is the area where the user defines the transmission parameters that will be sent to the BTS There are two types of BTS: GSM UMTS There are two modes of operating: Manual selection Channelyser selection Once the BTS is Initialised and Transmitting the Gi2 is Broadcasting with the network parameters as defined in these fields.
Identities MS captured by the Gi2 can be viewed in the Identities window. Much information can be readily found for each captured Identity
Anonymous Phone Protection When the option is turned off, the following applies: All anonymous phones are displayed in Identities grid All anonymous phones data is saved to the database When the option is turned on, the following applies: No anonymous phones are displayed in Identities grid No anonymous phones data is saved to the database
Identity Manager The Identity Manager allows the user to define special identities. These may be law enforcement agents or known targets Extra information can be added for know Identities, such as Popups, colour, sound alert, Picture, SMS alert and Notes.
Identity Manager IMSI / IMEI Set\Edit IMSI. User may provide full or partial IMSI number. % represents multiple missing digits _ represents a single missing digit (total must = 15)
SMS Interception The system can intercept SMS of Captured MS and control the status notification (No notification\ Fail\ Success) Information can then be extracted, IMSI, IMEI, Recipient phone number, SMSC number, SMS message Note: USSD information is also intercepted. (Top-up etc)
SMS Alerts Once a specific identity is captured, the system can send an SMS alert to specific phone number. Note: It is possible to set up a VPN which then allows users to send SMS to each other.
Scheduler The Scheduler is useful for users that need to transmit on different operators, or for those that need to cycle transmission between two or more networks and want to do this in an automated way. It is an easy A Preset way (BTS to save Configuration) the presets from is the beginning and load them defined as tasks which that runs are part as a of Task, a session. several Tasks can then be grouped as a Session.
Scheduler Cont... The scheduler is most useful for the following scenarios: 1) GI2 must be hand carried in a covert manner without PDA. In this scenario, setting the GI2 to run automatically is necessary 2) GI2M (Multi-BTS) can be set to run automatically on different network concurrently or sequentially
Silent Call The Gi2 activates the Targets Handset as a Beacon. The changing signal strength can then be used for Direction Finding In combination with the ICOM or Spectrum Analyser this is a very useful tool for Homing
Target Isolator The benefit of using the Target Isolator is that it moves the Target to a Clear Channel thus allowing the Target to remain captured even while on the move. Target Isolation can be applied to multiple targets simultaneously.
Make Calls To... A call can be made directly to a captured Target (incoming call) using the laptop Mic and Speakers Call from : can be any number the System operator chooses. Mic Volume: volume of the users (laptop) microphone Speaker Volume: volume of the users (laptop) speaker DTMF: is sent an received.
GCRs Call Recipient Target Phone (Dialing) GCRs allow the user to Intercept Voice and SMS traffic. This is performed by simulating a Commercial Network and routing all traffic via the GCR There are Two Types of GCR: Uni-directional (Uni) & Bi-Directional (Bidi). Real Network GCR Kit GI2 A Uni intercepts Outgoing Calls A Bidi intercepts Outgoing & Incoming Calls as well as viewing Outgoing & Incoming SMSs. See the Presentation Gi2 GCRs for greater Detail
Make Calls From... When a Bidi GCR is available, (i.e. Target can be cloned.) then a call can be made from the captured Target s phone (outgoing call) using the laptop Mic and Speakers. Call from : is the real number of the person the user wishes to call FROM the targets Phone. (Caller ID will not be withheld) Mic Volume: volume of the users (laptop) microphone Speaker Volume: volume of the users (laptop) speaker DTMF: is sent an recieved.
Eavesdropper Eavesdropper allows the user to listen to and record audio from a Captured Targets Handset Even through the call has ended, Eavesdropper keeps the Target s mic open and records the audio Eavesdropper can be initiated by either waiting for the Target to make / receive a call or can be forced by using Send Advertising
Gi2 Back Office Data Retrieval, Cross Referencing and Analysis Tool. All data is available offline Querying can be performed by, Time, Date, Handset Characteristics, Operation and so on. Databases are easily managed with full import / export / backup functionality.
Multilingual Interface is available in multiple Languages
Wireless LAN 802.11B LAN For Covert Operations a PDA can be used to wirelessly connect to the Gi2. Thus providing an inconspicuous method of interrogation All Gi2 Functions can be controlled using the specially formatted GUI See the Gi2 Accessories Presentation for more information
The End 2010 Verint Systems Inc. All rights reserved.