Вы находитесь на странице: 1из 32

Verint GI2

Gi2 Features

2010 Verint Systems Inc. All rights reserved.

Channelyser Function
The Channelyser allows the user to interrogate the local networks
and display the Broadcast information.
This information is used for the configuration of the system
Available
Networks

List of BCCH
detected and
broadcast details

Details of Selected Row


from BCCH List

Graphical
Representation of
the 900 MHz band

Graphical
Representation of
the 1800 MHz band

Channelyser Function
The Channelyser allows the user to interrogate the local networks
for the purpose of collecting and display the network information.
This information is used for the configuration of the system
Different Scans can be selected according to preference and the
installed hardware

Channelyser Function
The Channelyser allows the user to interrogate the local networks
for the purpose of collecting and display the network information.
This information is used for the configuration of the system
Different Scans can be selected according to preference and the
installed hardware
Logs of all scans are stored

RTX Control - GSM


Configurations can be saved
as Presets

Definition of the Broadcast


Network

Tx Output power

Mode Accept or Reject or


Denial Of Service

Channelyser: used for Smart


Channel Selection

GSM Modes Reject Mode


Handsets see our
Transmission
They attempt to
register (LAC Update)
System gathers
handset info
Handset is rejected,
by the system, back
to the Real Network

GSM Modes Accept Mode


Handsets see our
Transmission
They attempt to
register (LAC Update)
System allows all
Registrations &
holds the Phones
Handset Info is
recorded

GSM Modes Denial of Service


Handsets see our
Transmission
They attempt to
register (LAC Update)
System gathers
handset info
Handset is rejected
with DoS & does not
go back to the Real
Network

GSM Lists
The List overrides ANY Mode
i.e. If a Handset is in a List then ONLY the List rule applies to that Phone. The Mode
is ignored by the single handset but still applies to EVERYBODY else.

White List Handsets are always HELD by the System


Black List Handsets are always REJECTED by the System
i.e. Returned to the Real Network.

Denial of Service Handsets will NOT register to that network


until restarted (Power Off and On)
List is defined in the ID Manager

GSM Lists

(Example 1) Reject Mode + White List

Handsets see our


Transmission
They attempt to
register (LAC Update)
All Handsets are
rejected, back to the
Real Network
EXCEPT those in the
White List which is
HELD by the System

Handset in
White List

GSM Lists
Handsets see our
Transmission
They attempt to
register (LAC Update)
System allows the
Registration &
HOLDS all Phones
EXCEPT those in the
Black List

Handset in
Black List

(Example 2) Accept Mode + Black List

GSM Lists

(Example 3) Reject Mode + DoS List

Handsets see our


Transmission
They attempt to
register (LAC Update)
All Handsets are
rejected, back to the
Real Network
EXCEPT those in the
DoS List which will
NOT register with the
real network

Handset in
DoS List

Core Functionality Matrix


Function
Incoming SMS

Description
Intercepted (Can be Forwarded to Target)

System Only

System + Uni

System + BiDi

Outgoing SMS

Intercepted (Can be Forwarded to Recipient)


Viewed Only (not Forwarded to Recipient)

Send Fake SMS

To Captured Handset
From Captured Handset to any Recipient

Incoming Calls

To the Captured Handset

Outgoing Calls

(Note: Uni has Caller ID withheld)

Make Outgoing Calls from Targets Handset

Make incoming Calls to Targets Handset from Laptop

Make Outgoing Calls from Targets Handset using


Laptop

Fake Calls

Make Calls To

Make Calls From


Private Network

*Caller ID is Withheld
** must use 'Send Advertising'

Voice and SMS


Possible
Not Possible

RTX Control
RTX Control is the area where the user defines the transmission
parameters that will be sent to the BTS

There are two types of BTS:


GSM
UMTS
There are two modes of operating:
Manual selection
Channelyser selection
Once the BTS is Initialised and
Transmitting the Gi2 is
Broadcasting with the network
parameters as defined in these
fields.

Identities
MS captured by the Gi2 can be
viewed in the Identities window.
Much information can be readily
found for each captured Identity

Anonymous Phone Protection

When the option is turned off, the following applies:


All anonymous phones are displayed in Identities grid
All anonymous phones data is saved to the database
When the option is turned on, the following applies:
No anonymous phones are displayed in Identities grid
No anonymous phones data is saved to the database

Identity Manager
The Identity Manager allows the
user to define special identities.
These may be law enforcement
agents or known targets

Extra information can be


added for know
Identities, such as Popups, colour, sound alert,
Picture, SMS alert and
Notes.

Identity Manager

IMSI / IMEI Set\Edit IMSI. User may


provide full or partial IMSI number.

% represents multiple missing digits


_ represents a single missing digit (total
must = 15)

SMS Interception
The system can intercept SMS of
Captured MS and control the status
notification (No notification\ Fail\ Success)

Information can then be extracted, IMSI, IMEI, Recipient


phone number, SMSC number, SMS message
Note: USSD information is also intercepted. (Top-up etc)

SMS Alerts
Once a specific identity is captured, the
system can send an SMS alert to specific
phone number.

Note: It is possible to set up a VPN which


then allows users to send SMS to each
other.

Scheduler

The Scheduler is useful for users that need to transmit on


different operators, or for those that need to cycle transmission
between two or more networks and want to do this in an
A Preset
Configuration)
is the
automated way. It is an easy
way(BTS
to save
the presets from
which
as aofTask,
beginning and load themdefined
as tasks
that runs
are part
a session.
several Tasks can then be grouped
as a Session.

Scheduler Cont...

The scheduler is most useful for the following scenarios:


1) GI2 must be hand carried in a covert manner without PDA.
In this scenario, setting the GI2 to run automatically is
necessary
2) GI2M (Multi-BTS) can be set to run automatically on
different network concurrently or sequentially

Silent Call
The Gi2 activates the Targets
Handset as a Beacon. The
changing signal strength can
then be used for Direction
Finding

In combination with
the ICOM or
Spectrum Analyser
this is a very useful
tool for Homing

Target Isolator
The benefit of using the
Target Isolator is that it
moves the Target to a Clear
Channel thus allowing the
Target to remain captured
even while on the move.

Target Isolation can be


applied to multiple targets
simultaneously.

Make Calls To...


A call can be made directly to a captured Target
(incoming call) using the laptop Mic and Speakers

Call from: can be any number the System


operator chooses.
Mic Volume: volume of the users (laptop)
microphone
Speaker Volume: volume of the users (laptop)
speaker
DTMF: is sent an received.

GCRs

Call
Recipient

Target
Phone
(Dialing)

GCRs allow the user to Intercept Voice


and SMS traffic. This is performed by
simulating a Commercial Network and
routing all traffic via the GCR
There are Two Types of GCR:
Uni-directional (Uni)
& Bi-Directional (Bidi).

Real
Network

GCR
Kit

A Uni intercepts Outgoing Calls


A Bidi intercepts Outgoing & Incoming
Calls as well as viewing Outgoing &
Incoming SMSs.
GI2

See the Presentation Gi2 GCRs for


greater Detail

Make Calls From...


When a Bidi GCR is available, (i.e. Target can be
cloned.) then a call can be made from the captured
Targets phone (outgoing call) using the laptop Mic
and Speakers.

Call from: is the real number of the person the


user wishes to call FROM the targets Phone. (Caller
ID will not be withheld)
Mic Volume: volume of the users (laptop)
microphone
Speaker Volume: volume of the users (laptop)
speaker
DTMF: is sent an recieved.

Eavesdropper
Eavesdropper allows the user to
listen to and record audio from a
Captured Targets Handset

Even through the call has


ended, Eavesdropper keeps
the Targets mic open and
records the audio

Eavesdropper can be initiated by


either waiting for the Target to
make / receive a call or can be
forced by using Send Advertising

Gi2 Back Office


Data Retrieval,
Cross Referencing
and Analysis Tool. All
data is available
offline
Querying can be
performed by, Time,
Date, Handset
Characteristics,
Operation and so on.
Databases are easily
managed with full
import / export /
backup functionality.

Multilingual

Interface is available in
multiple Languages

Wireless LAN
802.11B

LAN

For Covert Operations a PDA can be


used to wirelessly connect to the Gi2.
Thus providing an inconspicuous method
of interrogation
All Gi2 Functions can be controlled using
the specially formatted GUI
See the Gi2 Accessories Presentation
for more information

The End

2010 Verint Systems Inc. All rights reserved.

Вам также может понравиться