2012年1月15日星期日

Doommiinnaattoorr II//VV - GSM Interception System

Real time interception of GSM traffic

Supports both A5.1 and A5.2 deciphering

Totally transparent and undetectable by the Mobile Operator and the subscriber

Support for all frequency bands

Gathering intelligence information even when target is not using the mobile phone

User-friendly operation

The Dominator I is designed for off-air interception for cellular communication in GSM networks. It provides the interception of 4/6/8 ( or more) simultaneously subscribers that are operating close to the system. The system intercepts and records all outgoing and incoming calls, voice and SMS, to and from the target. The Dominator I is using an active system that captures the IMSI and IMEI of the targets but as it is an active system it is proved fully non detectable modes of operation. The Dominator I operates in Random mode as well as in Target mode. It can filter, track and record only the target operation.

Advantages:

Totally undetectable by the operator and by the user

Intercepts and records all outgoing and incoming calls, voice and SMS.

All target calls are registered in the Mobile Operator billing systems

Pass the caller ID to the target mobile phone.

All traffic (voice and data) is fully encrypted in the air.

Multi Mobile Operators functionality

Easy change of Mobile Operator by changing a parameter only

Interception distance up to 1Km,

Interception operation starts in less than 15 seconds

Correlation tools to detect targets

Analysis tools to search for events

VPN configuration allows operation in different locations and common control center.

Operate with GSM DF system � remote silent activation of a target

Options and extra features

Optional model up to 2Km.

Optional- target Direction Finder � DF subsystem

Optional � target Direction Finder � Homing system

Optional- Dominator V - Split operation: controlling remote interception points via wireless communication

Remote operation � controlling of interception mission via Internet

Target communication manipulation. Block, redirect or change information to or from the target. Change SMS content, Voice call manipulation

Overview

Detecting GSM-standard mobile stations, located within the zone controlled by the System,

Registering traffic (incoming and outgoing communications) from these mobile stations,

Manipulating the state of mobile stations, which have been registered by the system.

The System operates in stealth mode in GSM networks, which use various encoding types (А5.2, А5.1)

The Dominator I system supports

Defining mobile station key parameters - IMSI, IMEI, Kc, etc, which are required for System operation;

Full control over mobile station incoming and outgoing traffic within the System抯 reach zone;

Manipulating the state of mobile stations, including the possibility of identifying the location of a mobile station (target) by activating its transmitter.

The Dominator I range

The dominator I is the only system in the world that can operate in a range between 1-2 Km (with long range option). The system default configuration supports up to 1 Km. The actual system range will be depending on the environment where it is being used. Typically in a heavily built-up urban area the range will be about 150 meters that is because BTS in an urban area covers small area influence on the real capture area of the Dominator I. In more open areas where the cell coverage area is larger the actual interception distances.



The following units are included with the System:

Paging channel stations - to receive from one external network抯 LAC incoming subscribers� call messages, registered in the internal network;

Mobile stations - to support authentication procedure, initiated by the external network, during incoming and outgoing subscribers� calls, registered in the internal network. The mobile stations are automatically tuned to the internal network base station抯 arfcn channel;

Active stations - to interact with the external GSM network on behalf of the subscriber, registered in the internal

Notebook PC to perform the control, storage, information production and analysis tools. The Notebook Pc is handling the real time deciphering function.

没有评论:

发表评论