Aappro Ltd GSM detection concepts for March 2010.

Slides:



Advertisements
Similar presentations
RFID Access Control System March, 2003 Softrónica.
Advertisements

Cell Phone Jammer By:- Ganesh Pathak Pallavi Mantri Rohit Patil Pawan Kumar.
SmartASL. Satellite-Managed Asset-Ready Tracker. SmartASL Device Designed for intelligent management of powered and non-powered fixed and movable assets,
 What Is Desktop Virtualization?  How Does Application Virtualization Help?  How does V3 Systems help?  Getting Started AGENDA.
Get Connected BookIT DDM mCheck-In Solution Case Airlines September 28, 2004.
POC Security System High security system combining PIN-on-Card, information security, physical access, control and alarm – all in one system.
CC4100 Active Cellular Intercept Technologies
Poseidon 4002 Rack monitoring 1. Poseidon: Monitor & Control 2.
“Why do we need Security”  Each business has unique security and safety needs, e.g. Inventory Shrinkage and Theft Personal Safety Break Ins Moving Your.
MOTOROLA and the Stylized M Logo are registered in the US Patent and Trademark Office. All other product or service names are the property of their respective.
1 Fox Valley Fire & Safety’s Wireless Radio Network Our customers experience reduced monitoring costs; normally 25% or more. Eliminates expensive phone.
Port of Entry Covert IMSI / IMEI acquisition Mr John Smith DOB 01/04/75 Passport No IMSI IMEI
March ULTIMA Portfolio For Sourcing Wireless Networking Page 1 Your Wireless Network requirements.
Gateplus Time Attendance and Access Control System.
ORATECH gives consulting services about the Information Technologies to its customers at an expert level. Every stage from a current idea to a new created.
T24 Wireless Telemetry Advanced Intelligent Instrumentation.
Senior Design Project 2004/2005 Web Enabled Calling Number Delivery Daniel St. Clair Barron Shurn Professor Soules 10/28/2004.
The Need for an Integrated View of Water Quality Modeling and Monitoring Bruce Kiselica USEPA, Region 2 Second Workshop on Advanced Technologies in Real.
Juniper Bridge Ltd | Suite 5, Crescent House | Yonge Close, Eastleigh | Hampshire SO50 9SX | |
Principles of Information Technology
Wonga example Register Question- What risks do you think businesses face due to IT developments?
Wavion Video Surveillance Solution
What is Influx InfoTech ?. About Influx InfoTech IT products & services company Delivering technology driven business solutions Hi-end infrastructure,
Citadel Security Software Presents Are you Vulnerable? Bill Diamond Senior Security Engineer
InterSwyft Technology presentation. Introduction InterSwyft brings secured encrypted transmission of SMS messages for internal and external devices such.
AGENDA Welcome and introductions Brief introduction to PSI Mobile Technical Overview Demonstration Q and A Next Actions.
Networks and Hackers Copyright © Texas Education Agency, All rights reserved. 1.
WHAT IS JAMMER ?  Jammer are the device by which we can creat a temporary “dead zone”in there immediate proxcimity.  There are three type of jammer.
Wireless or wired connection of the technician’s smartphone to Cable Ties network.
Cullen College of Engineering RFID-Based Solutions for Piping Technology Piping Tech & UH July, 2007.
Objectives Overview Identify the qualities of valuable information Describe various information systems used in an enterprise Identify the components of.
„CS-MINI” THE PORTABLE AND COVERT ACTIVE INFRARED SECURITY SYSTEM.
Computer Concepts 2014 Chapter 5 Local Area Networks.
WvU-Secure Group 10 - Wireless Sensor Network Security System Steven Andryzcik, Daniel Gilmore, Dane Hamilton, and Garrett Michael.
FOX AVL SYSTEM Satellite vehicle locating, tracking and fleet management.
1. Outlines Introduction What is Wi-Fi ? Wi-Fi Standards Hotspots Wi-Fi Network Elements How a Wi-Fi Network Works Advantages and Limitations of Wi-Fi.
Wi-Fi Technology. Agenda Introduction Introduction History History Wi-Fi Technologies Wi-Fi Technologies Wi-Fi Network Elements Wi-Fi Network Elements.
Mohammed F & Aya. Peer-to-peer network are usually common in homes and small businesses and are not necessarily expensive. On a peer-to-peer network each.
Discount Tracking Solutions THE FUTURE OF GPS TRACKING IS HERE!
Smart Vehicle Tracker Installation Guide AVT-2000A V2.10.
MANAGING RISK. CYBER CRIME The use of the internet and developments in IT bring with it a risk of cyber crime. Credit card details are stolen, hackers.
NetModule Cloud Solution Professional M2M Networking out of the Cloud © 2014 NetModule AG Slide 1.
NetModule Cloud Solution Professional M2M Networking out of the Cloud NetModule Cloud Router 1.
POLICE MULTI-FUNCTIONAL GSM UNIT Brief overview. Basic functions  Intellectual blocking of GSM terminals (all, white list, black list)  Interception.
Automated Data Capture Technologies O It is often necessary or convenient to capture data automatically, for example the delivery of a package by an Cable.
Mobile Phone Forensics Michael Jones. Overview Mobile phones in crime The mobile phone system Components of a mobile phone The challenge of forensics.
Sniffer for Detecting Lost Mobiles
Community Patrols of New Zealand National Database.
Estate MANAGEMENT. Estate MANAGEMENT Holistic solution to manage residential villages and estates. Developed by Impro.
PYRESCOM - Mas des Tilleuls Canohès -FRANCE Tél. : +33 (0)4. 68
Welcome To  Home  Products  About Us  Services & Support  Solutions  Contact Us.
GLOBAL SYSTEM FOR MOBILE COMMUNICATION
BlueMAC Travel Time, Origin Destination, Alert Notification, Delay and more…
Configuring Network Devices
Mobile communication methods
Presentation of equipment.
Wireless Network PMIT- By-
Preventative Measures
SRA Memory Grabber Product Description.
Wireless Technologies
SCOTIA Nigeria Limited.
Fuel Cap Reinvented Fueloyal Presents Smart Fuelcap
Ping™ 6.
Mobile communication methods
Wireless Communications MOBILE COMMUNICATIONS Lecture:7
RFID Technology & It’s Uses
RIM Blackberry at SAP Key Benefits / Survey Results April 2004 SAP IT Enterprise Telecommunication Services.
Global system for Mobile Communications
Security in Wide Area Networks
Cellular Telephone Networks
Presentation transcript:

Aappro Ltd GSM detection concepts for March 2010

About Aappro Ltd Aappro is supplier of world-leading specialist GSM hardware and software solutions supplier exclusively for the Police, Military and Law Enforcement community Aappro is fully UK owned and based company We design, build, test and supply products to help protect people and property from the ever-evolving threats of terrorism and criminal activity Our product are developed and built in the UK. We pride ourselves in providing bespoke solutions to meet dynamic requirements

Aappro technology and UK Border control It has become apparent that there a two initial potential uses for Aappro’s new IMSI/IMEI acquisition technology for border control functions Due to the nature of our process all of the barriers preventing use of existing technology have been overcome (including size, speed and value for money)

Why is IMSI/IMEI capture relevant? The number of travellers entering the UK that carry a mobile phone is an ever increasing percentage By detecting a mobile phone’s presence within a concealed area we get a strong indication that there may be a person present By reading the devices IMSI/IMEI we obtain the SIM cards country of origin. This data can be used for individual assessment and wider intelligence gathering

Field scanning of vehicles and containers concept Aappro IMSI/IMEI capture technology allows the external scanning of vehicles and containers for mobile phones It is apparent that the majority of illegal immigrants captured carry mobile phones The detection is fast, discrete and simple to operate. A LGV container can be checked for GSM devices by a single covert operator in <90 seconds Systems can be permanently installed, or used ad-hoc in any location / country (including on ferries and under the Channel Tunnel)

Covert scanning of vehicles and containers concept Covert scanning equipment can be carried by an undercover agent or mounted in a vehicle / motor-bike etc

Installed scanning of vehicles and containers concept ALERT SEARCH VEHICLE

Port of Entry IMSI / IMEI acquisition concept As arriving passengers stand at the passport desk their IMSI and IMEI is read from their phone (overtly or covertly) The data is analysed and any abnormal patterns can be flagged ‘Watch lists’ can be compared and data instantly sent to wider target management systems

Port of Entry IMSI / IMEI acquisition concept Mr John Smith DOB 01/04/75 Passport No IMSI IMEI

Aappro 403 overview The Aappro 403 is a new generation operational IMSI / IMEI Catcher designed for rapid, targeted field use Utilising our exclusive PAF (Patent Applied For) technology the 403 is a major breakthrough in acquisition speed, package size and value The 403 can be used as a stand alone device or integrated into wider data- gathering and geo-tracking systems

Aappro 403 overview cont. We took a green-field approach to IMSE/IMEI acquisition and have been able to negate the need for BTS type analysis. Our process is not hampered by the associated set-up and network analysis time, size, cost and multiple-channel requirements of existing solutions We utilise the lower level GSM protocols (including 999/112/911 functionality) to allow us to connect to any device regardless of its home network configuration By utilising the multi-band capability of all available chip-sets our process is not limited by local network type or frequency

Features System start-up time of >20 seconds, no network analysis required Rapid capture of IMSI/IMEI. Speed of 1-90 seconds from start to capture (average capture time of 45 seconds) Works on any GSM based network, in any country Does not alter network selection if target device is roaming

Features cont. Fully operational in a non-static environment (e.g. moving vehicle) Self-contained, battery powered system for field flexibility 60 degree directional antennas for precise targeting Covert operation using wireless smart-phone or net-book based control system Rugged, field-ready construction throughout Simplified GUI of ease of operation and minimised training time

Applications - IMSI/IMEI target acquisition and intelligence gathering Field operations target acquisition and target IMSI correlation Port of entry customs desk Police vehicles Interview rooms Tube stations Prisons Fixed location ‘known phone’ or ‘white list’ list maintenance and monitoring Secure buildings Military bases Embassy’s

Applications - GSM Lock and Locate TSCM systems Worlds first (and only) active system for finding and locating covert GSM devices within a given environment Utilising directional antennas and range control can find and lock-on to any GSM device Device is taken off its home network preventing any undesired contact Utilising page function device can be put into permanent transmit and quickly located with hand- held GSM detector Device type can be indentified by IMEI (e.g. Siemens Module etc.)

Aappro Ltd GSM detection concepts for March 2010