geomatrix - wikileaks

26
GeoMatrix Positioning of Mobile Phones System

Upload: others

Post on 03-Apr-2022

44 views

Category:

Documents


0 download

TRANSCRIPT

GeoMatrix Positioning of Mobile Phones System

Geographic intelligence is one of the oldest forms of military

intelligence, and one of the most important.

From earliest times, an accurate knowledge and

appreciation of geographical factors has been an

essential part of strategy and tactics.

In the face of unlimited conceivable

demands from planning and operational

staffs it is essential that the geographic

activities should be carefully guided and

controlled.

Mobile phones have become a crucial

part of our daily life nowadays.

Everyone – from teenagers to old men

owning at least one cell phone.

Mobile phones enables to communicate

and to get huge mass of information.

The GeoMatrix System provides the benefits from the combination of

geographical intelligence and mobile phones location.

GeoMatrix System giving the ability to get mobile phone

poison anywhere around the world.

The GeoMatrix System provides operational agencies the

ability to locate, track and manipulate GSM/UMTS/3G/4G

subscribers covertly virtually anywhere in the world,

including inbound/outbound roamers.

GeoMatrix System is an SS7 protocol based solution that provides accurate, real-time data of suspects

and people of interest by tracking their mobile phone that are totally undetectable by the target and

the mobile networks.

The system stealthily ascertains status, location and

movement of targets of interest; from anywhere in

a city and/or area to the entire country and

beyond borders, pinpointing them with high

accuracy in real-time.

Log in to the web interfaceGet Location

Enter targeted phone number

First layer of the GeoMatrix capabilities are consists of the receiving in real-time targeted

phone identities and status:

o location (longitude and latitude)

o IMSI number

o Home country

o Home operator

o Host country (in case the target is in different country)

and host operator

o LAC and Cell ID

o Phone status (absent/ not reachable/ busy/ idle)

o IMEI (in some cases)

The GeoMatrix powerful capabilities are wrapped with a

convenient user interface which includes the means to

use the GeoMatrix modules.

The system is very simple and intuitive.

It's clean web user interface was designed especially for

the common user and do not require any technical

understanding. In fact, any person with basic computer

experience can operate it.

GeoMatrix is modular; allowing organizations to deploy those modules and services that suit their

requirements best, while potentially leveraging some legacy infrastructure and software tools.

The GeoMatrix is based on six main modules:

o Tasks

o Triggers

o Tracking

o History

o Alerting

o Management

Tasks – collects, analyzes and presents the GeoMatrix results:

Option to locate target using his MSISDM (“regular”) number or IMSI (SIM) number

Enables receiving updated locating using invisible silent SMS that send to his device

Enables seamlessly disconnect the target from the network until he will preform

outgoing call (will not receive calls, SMS or internet connection)

Triggers – a powerful rule based engine from which users can define key criteria to

automatically track a suspect and receive alerts when specific pre-defined conditions occur:

Sub online – in case the target is not connected to the network (the phone is

turned off ) – the system will alert when it returning to the network

GeoFencing – The system will alert when the target entered into specific

zone or moved from specific zone defined by the user

Triggers – a powerful rule based engine from which users can define key criteria to

automatically track a suspect and receive alerts when specific pre-defined conditions occur:

Home country change – enables to get alert when the target travelling to

country different from his home operator country

Distance between two – the system will alert on when two targets getting

close / far away from each other more that distance that the user define (to

find interesting meeting)

Distance between multiple – to get know when a specific group gathered

or dispersed

Alerting – shows all the alert that

the system generated based on

the queries and tasks that were

set up

History – The history module

presents all the queries that were

done, their status and it’s result

Management – this module shows all

the statistics regarding the use of the

system by it’s users. Also manager

hosts all the administration logic and

assist in managing the system access

permissions, various internal

management functions and control

of individual user queries (budgeting,

limitations, etc.)

The system uses GSM SS7 protocol. This protocol suite used by

most telecommunications operators throughout the world to talk

to each other.

Today, due to its structure, the SS7 layer allows the get phones

location. The SS7 protocol enables worldwide coverage of all

GSM/UMTS/3G/4G mobiles served by local networks and enable

effective monitoring of inbound roamers as well as outbound

roamers (local GSM roaming abroad).

SS7 protocol based command state machine, stealthy and fully

transparent without arousing any suspicion or trace – identifiable,

thus cannot be blocked nor filtered.

Our solution employs series of protective layers

are used to completely hide and mask the

tracking process.

The system includes a dynamic M2M SS7

gateway, which connects seamlessly to the mobile

network multi-capability functional nodes.

All data related to queries, suspect lists, phone numbers, query results, etc. are stored only on the

database server, located at the customer site.

All queries are performed using intelligent routing that masks the queries, making it virtually

impossible to monitor or trace the M2M SS7 commands in any manner.

Simple, rapid installation at customer organization site, connecting to a single telecom carrier

to cover the entire country, including all other carriers.

Provides bird's eye view of every suspect using a mobile phone on all networks, including

foreign roaming users, all with pinpoint accuracy.

Provides a secure umbrella of coverage (kilometers wide)

to protect key national assets - parliament, presidential

residence, military sites, and other sensitive locations.

Includes tracking robots to automatically track suspects,

entry/exit of the country or region, proximity to sites of

special interest, and even proximity to other

suspects/parties of interest.

Nationwide coverage of all GSM mobiles served

by local networks including inbound roamers as

well as local GSM roaming abroad.

Stealthy and fully transparent without arousing

any suspicion or trace

Easily accepts import of external suspect lists

Simple, intuitive operation

Advanced yet simple analysis module to monitor

and plot suspect movement over time.

Feature-rich, based on extensive user feedback

and technological expertise

Fully secured communication via IP VPN tunnels

to M2M SS7 hub

Includes a set of well proven modules and

capabilities which allow the operator various

analytics and operational capabilities.

The solution is derived from years of experience

of providing advance intelligence solutions.