Intelligence


 

 

THE CRIME INTELLIGENCE STATION
Access Management Analysis Of Firearms-Related Crime Information

1About our partner
WHAT OUR PARTNER DO:
Since its inception in 1999, our partner provides police, prosecutors, policy
makers and advocates the knowledge, tools and techniques necessary to
successfully reduce violent crime. They work with city law departments,
State Attorney General Offices, major police departments, and advocacy
groups to assist them in acquiring, analyzing, and utilizing their
community’s crime-gun information, which has been collected by the
Federal government. Our partner has provided training on their unique
tools and techniques of using gun information to reduce firearms-related
violent crime in jurisdictions nationwide.

WHAT WE OFFER:
Decades of top-level law enforcement and firearm industry experience
developing highly successful firearm-related violent crime reduction programs.
Provides unique consulting services designed to assist law enforcement, policy
makers and public safety advocates in developing tactics, techniques and public
policy proposals aimed at real solutions to our nation’s gun violence and gun
crime epidemic.
Our partners have a proven track record of developing programs that have
produced important crime fighting techniques currently used by federal, state
and local authorities in the fight against of all types of gun crime.

WHY WE ARE NEEDED:
Often overlooked by policy makers and law enforcement is the ‘dynamics’ of
the legitimate firearms market and the influence it has on feeding violent
crime. By making use of our partner extensive knowledge of the firearms
industry, the marketing and distribution of firearms and the diversion of
crime-guns from the legitimate market to the illegal market, policy advocates
can develop intervention strategies that attack gun crime at its very source.
Understanding the early warning signs that criminals leave when acquiring
crime-guns and using them in their deadly trade is invaluable information
necessary in any gun violence reduction strategy. By utilizing proven
techniques developed by them, public safety advocates can tailor
their programs to compliment and supplement current gun
crime reduction initiatives and strategies.

CONCEPT
The CRIME INTELLIGENCE STATION (CIS) is a
methodology designed solution
This unique collaboration provides:
Access Management Analysis
of different crime information to law enforcement
investigators and enhances prosecutorial
success.

A CRIME INTELIGENCE STATION
can be a one-stop platform for increasing investigating proficiency.

It has solutions for:
Intelligence, Combating Terrorism, Border
Security, Criminal Investigations,
Narcotics, Trafficking, Money Laundering,
Telephone Toll Analysis

CIS’s Crime Intelligence Station
The following details the capabilities and benefits of the CRIME
INTELLIGENCE STATION as well as the need for such an analytical
instrument by law enforcement.

Capabilities:
*Recognizes and links many sources of crime-guns, ballistic, and
intelligence information that is available in any jurisdiction and
can be employed to provide leads for any type criminal act.
* Is a local and centralized repository for integrating all firearmsrelated
critical information that is readily accessible to
investigators while in the field or office, efficiently integrating
and analyzing available date that will generate critical
investigative leads. Includes link analysis with visual
representations and pre-models (queries) of CIS’s indicators as
well as allowing the investigator to model data in any fashion
determined necessary.
For example:
* link previously unknown individuals to criminal activity
* identify potential targets for investigation
* identify individuals that provide the source of firearms to
violent areas of a community as well as their suppliers
* identify patterns and trends of criminal activity
* identify previously unknown associates and conspirators
* Provides an automated tool that assists throughout the
investigation and prosecution of cases
* Allows for the control of all data with the station owner
* CRIME INTELLIGENCE STATION internal software allows for easy
importing of data from various informational systems

Benefits
*Increased Officer Safety – Agencies can improve situational
encounters with armed violators through a closer examination of
crime-gun information. Persons involved in gun trafficking as
well as illegal possession and use, including associates, criminal
group affiliations, and other criminal users can be identified
when officers encounter suspects in the field.

Crime Reduction – Agencies can achieve earlier apprehensions of
repeat offenders with use of crime-gun information. When
investigating robbery, homicide, non-fatal shootings, and the
like, early identification of purchasing patterns leads to early
apprehensions and interruption of sources of guns to criminals.
With a small number of sources of guns, patterns can be identified;
many times intervention soon after the sale can prevent crimes
from occurring.
Increase in Available Intelligence – Investigators can receive
leads from immediate crime -gun station analysis. By conducting
the standard queries found within the crime-gun station,
investigators will have the capability to accurately identify viable
suspects for follow-up and include suspects’ last known and best
addresses, vehicles owned or utilized, as well as criminal and other
affiliations
Enhanced Prosecution Rates – Agencies will not only increase
their solution rates, but importantly their conviction rates by
including all pieces of evidence that link the suspect to the
firearm and others involved in the criminal act. An additional byproduct
will be the enhancing the creditability of arresting officers’
testimony by adding supporting evidence outside of the arrest
incident.
 Improvement of Intelligence-Led and Problem Orienting Policing
– State and local supervisors and managers will also possess the
capability to institute prevention and intervention strategies by
performing analysis of the data found within the Crime-Gun
Station. The combining of visual analysis software to the CRIME
INTELLIGENCE STATION provides an efficient method of
determining patterns and trends for performing
predictive analysis to determine optimum
deployment of resources and identifying the most advantageous
strategies.
Improved Public Relations – Agency executives will now possess
the capability of providing the most current facts and statistics,
at any given time, regarding firearms-related violent crime issues
for public consumption.

 

Intelligence

The Security / Intelligence examples discuss how CRIME INTELLIGENCE STATION provides
invaluable tools for assisting government agencies in their mission to secure homeland, infrastructures
and national security.
Developing effective intelligence solutions is critical for government organizations dealing with
national security issues including military operations and various proliferation concerns. It also effects
commercial organizations focused on theft, espionage, or competitive intelligence activities.
Proactively exposing the underlying patterns and behaviors pertaining to security-related areas helps ensure decisive and pre-emptive actions can take place. The intelligence community has long employed advanced technologies to
sift through vast amounts of data looking for connections, relationships, and critical links among their targets.
Patterns are often derived from non-traditional data sources ranging from freetext documents and message intercepts to video clips and audio streams. The systems typically used by the intelligence community are comprehensive and
extremely specialized. They are often built with external support and combine classified information with open-source data to yield better patterns.

 

The CRIME INTELLIGENCE STATION Intelligence Solution

The CRIME INTELLIGENCE STATION (CIS) is a must have tool for accessing
large volumes of diversely formatted data for supporting advanced analytics
and information collaboration. The CIS solution provides more timely, accurate,
and detailed information by which to initiate communication activities, monitor
events, and perform tasks in support of intelligence operations including:

Exposing dominant, weak, or vulnerable entities within a network

Examining the frequency of connections among target entities

Discovering isolated entities within a network

Detecting missing or inconsistent information

Reviewing the commonalities among different entities;

Exposing additional, unknown relationships from multiple sources

Combating Terroris

Terrorism is a global threat influencing the attitude and behavior of a target

 

  • group by threatening – or carrying out – devastating actions. These actions, as
    we have seen, can and do include the use of conventional weapons, biological, chemical, or
    nuclear agents. Today’s terrorism also threatens our economic
    and information resources. Our vulnerability to terrorist attacks expands with our
    growing reliance on information technologies.
    Increased access to information and the centralization of vital components of local, national, and global infrastructure threaten both local and national security.
    Investigating today’s terrorist groups requires inter-agency communication
    and collaboration. It is essential that law enforcement agencies and task forces
    be able to collect and analyze data from multiple data sources in order to
    monitor, penetrate, infiltrate, and prevent terrorist activity. Terrorism is a
    premeditated act that requires detectable preparations including money
    transfers, material purchases and personnel movement. Intelligence works
    against terrorism.The CRIME INTELLIGENCE STATION Combating Terrorism SolutionThe CRIME INTELLIGENCE STATION (CIS) is specifically designed to
    retrieve information from varied formats and sources to expose hidden
    activity and behavior patterns.
    Using the advanced information retrieval capabilities to extract information
    from multiple data sources simultaneously and the powerful data mining,
    visualization and analysis capabilities of CIS allows you to:
    Identify Relationships – uncover interactions and relationships between
    terrorist groups and their members.
    Link Group Members – understand formal and informal organizational
    structures.
    Connect Networks – expose connections between group members, outside
    individuals, other organizations, locations, facilities and communication
    networks.
    Expose Group Operations – show shared assets, materials and supplies for
    carrying out terrorist missions.
    Track Technologies – track different types of technologies used as components
    for manufacturing terrorist weapons.
    Understand Behaviors – track and analyze group behaviors for early detection
    of potential threats.
    Assess Vulnerabilities – evaluate funding resources, recruiting methods,
    communication networks, storage facilities and other resources to uncover
    potential vulnerabilities.Border Security

    Protection of national borders is a critical task in the United States defense plan. million of these people are non-citizens.
    The United States shares 5,525 miles of border with Canada and 1,989 miles of border with Mexico. The
    U.S. maritime border includes 95,000 miles of shoreline, and a 3.4 million square mile exclusive economic zone.
    Every year, more than 500 million people cross our borders to enter the United States. Some 330
    Securing the borders requires the cooperation of several federal agencies – including those responsible for transportation security, immigration control, border patrol, customs, and maritime security – in support of the overall goal of providing Homeland Security.

    The ability to research and share information among and between these agencies is mission-critical.

    The CRIME INTELLIGENCE STATION Border Security Solution
    The Crime Intelligence Station (CIS) is an ideal tool for searching through a wide range of data sources to extract, analyze and visually expose patterns of activity.
    Using the advanced information retrieval capabilities to extract information
    from multiple data sources simultaneously and the powerful data mining,
    visualization and analysis capabilities of CIS allows you to:
    Share Information – give every agent the ability to retrieve information from
    any and every data source available with a single search.
    Visualize Mass Data – expose patterns by reviewing and analyzing thousand of records.
    Summarize – quickly produce frequency counts and statistical information.
    Track and Correlate – compare data values such as names, IDs and addresses
    to track and identify individuals.
    Identify Routes – use geographic data to pinpoint and plot entrance routes.
    Developing effective intelligence solutions is critical for government
    organizations dealing with national security issues, including military
    operations and various proliferation concerns. It also effects commercial
    organizations focused on theft, espionage, or competitive intelligence
    activities.
    Proactively exposing the underlying patterns and behaviors pertaining to
    security-related areas helps ensure decisive and pre-emptive actions can take
    place. The intelligence community has long employed advanced technologies to
    sift through vast amounts of data looking for connections, relationships, and
    critical links among their targets.
    Patterns are often derived from non-traditional data sources ranging from freetext
    documents and message intercepts to video clips and audio streams. The
    systems typically used by the intelligence community are comprehensive and
    extremely specialized. They are often built with external support and combine
    classified information with open-source data to yield better patterns.

    Criminal Investigations

    Developing effective intelligence solutions is critical for government organizations dealing with
    national security issues including military operations and various proliferation concerns. It also effects
    commercial organizations focused on theft, espionage, or competitive intelligence activities.
    Proactively exposing the underlying patterns and behaviors pertaining to security-related areas
    helps ensure decisive and pre-emptive actions can take place. The intelligence community has long employed advanced technologies to sift through vast amounts of data looking for connections, relationships, and critical links among their targets.
    Patterns are often derived from non-traditional data sources ranging from free- text documents and message intercepts to video clips and audio streams. The systems typically used by the intelligence community are comprehensive and extremely specialized. They are often built with external support and combine classified
    information with open-source data to yield better patterns.

    The CRIME INTELLIGENCE STATION Criminal Investigation Solution

    The CRIME INTELLIGENCE STATION (CIS) is an ideal tool for searching through
    vast amounts of data to extract, analyze and visually expose patterns of activity.
    Using the advanced information retrieval capabilities of CIS to extract information
    from multiple data sources simultaneously and the powerful data mining, visualization
    and analysis capabilities of CIS allows you to:
    Access Data – search any and every data source available with a single search.
    Visualize Mass Data – work with thousands of data records with no size limitations.
    Identify Relationships – expose interactions and relationships between all types
    of data, including suspects, organizations, ID numbers, vehicles, etc.
    Find Networks – visually display and analyze clusters of related data.
    Summarize Data – produce statistical information on the fly.
    Track and Correlate – compare data values, such as names, using Soundex and
    other matching algorithms.
    Share Data – rapidly respond to inter-agency data requests.

    Narcotics Trafficking
    every level through a careful coordination of local, state and federal efforts.
    Law enforcement officials must constantly adapt to new situations, make
    greater use of intelligence, stay current with technology, and expand
    cooperation between agencies to be effective in their drug control efforts.
    All levels of law enforcement must employ operational (reactive) and strategic
    (proactive) analysis methods that focus on both short-term and long-term
    goals. In order to effectively perform both types of analysis, law enforcement
    agents must be able to access a wide range of information to uncover hidden
    links between cases which would normally seem unrelated.


    The CRIME INTELLIGENCE STATION Narcotics Trafficking Solution

    The Crime Intelligence Station (CIS) is an ideal tool designed to retrieve
    information from varied formats and sources to expose hidden activity and
    behavioral patterns.
    Using the advanced information retrieval capabilities of CIS to extract
    information from multiple data sources simultaneously and the powerful data
    mining, visualization and analysis capabilities of THE CIS solution allows you to:
    Share Information – give every agent the ability to retrieve information from
    any and every data source available.
    Identify Relationships – uncover interactions and relationships between
    perpetrators and organizations.
    Visualize Mass Data – expose patterns reviewing and analyzing huge amounts of data, with no size limit.
    Discover Patterns – quickly plot and analyze geographic and chorological data.
    Summarize – quickly produce frequency counts and statistical information.
    Track and Correlate – compare data values such as names, IDs and addresses to track and identify individuals.

    Money Laundering

    Criminals launder money to hide criminal activity -everything from drug trafficking to tax evasion -
    that generates the money.
    It is the means that criminals use to legitimize the money billion.
    Although the exact amount of money laundered yearly
    is still not known, experts estimate that money laundering schemes are inthe billions of dollars -
    possibly as high as $100 Money launderers operate through layers of activities designed to hinder the
    detection, investigation and prosecution of their activities. This is often
    accomplished by structuring transactions, establishing businesses specifically
    for the purposes of manipulating accounts, or simply coercing individuals into
    ignoring reporting regulations.
    Additionally, launderers may physically smuggle money out of the country to
    evade tracking.


    The CRIME INTELLIGENCE STATION Money Laundering
    Solution

    The CRIME INTELLIGENCE STATION (CIS) is an indispensable toolset for
    highlighting and tracking suspicious transactions that can expose illegal
    financial activity.
    Using the advanced information retrieval capabilities of CIS to extract
    information from multiple data sources simultaneously and the powerful data
    www.defensetechs.com info@defensetechs.com
    mining, visualization and analysis capabilities of THE CIS solution allows you
    to:
    Access Data – search through and extract information from a wide variety of
    data sources at once.
    Visualize Mass Data – review thousands of financial transactions to identify
    questionable behaviors and unusual filing patterns.
    Expose Structures – identify and display relationships that exist between
    individuals and organization involved in criminal activities.
    Examine Accounts – reveal associations between accounts and people, banks,
    organizations, or other accounts.
    Identify Duplicates – discover indirect relationships that show addresses,
    accounts or ID numbers with multiple users.
    Analyze Transactions – uncover different types of transactions used by
    criminals.
    Pinpoint Exchanges – use chronological and geographic data to target asset seizures.

    Telephone Toll Analysis

    Telephone toll analysis is often underutilized in criminal investigations due to the
    sheer volume of data to be processed.
    When properly conducted, the analysis of telephone activity can single-handedly expose a
    variety of deceitful behaviors including long distance and cellular phone fraud and drug
    trafficking patterns, as well as validate associations between people and
    organizations.
    Data mining technologies allow investigators to uncover linkages between telephone numbers and
    people/organizations to expose complex communication networks, identify
    investigative targets, and track chronological or sequential calling patterns.

    The CRIME INTELLIGENCE STATION Telephone Toll Analysis Solution
    The Crime Intelligence Station (CIS) ideally suited to identifying suspicious
    patterns of telephone activity.
    Using the powerful data mining, visualization and analysis capabilities of the
    GCS solution allows you to:
    Display Intense Activity – show any type of connection between telephone
    numbers to expose the commonality, pathways and networks that form
    between large collections of numbers.
    Develop Frequency Counts – summarize the volume of calls from and between
    telephone numbers.
    Plot Telephone Activity – use proven placement techniques to visually reveal
    multiple patterns.
    Consolidate Registered Numbers – merge or “alias” telephone numbers to view
    any organization, geographic area, or phone exchange as a single element.
    Analyze Relationships – discover existing and emerging networks and their
    relationships.
    Organize Calls – group telephone number by area codes, exchanges,
    subscribers, or any other characteristic to display patterns and trends.

 

 

 

Intelligence Platform
Information Extraction for Actionable Intelligence
Steps towards deployment

1 Introduction
is pleased to present intelligence agencies a turnkey solution to provide intelligence
bodies with a comprehensive secure and reliable system to provide effective and
comprehensive electronic intelligence services to the Agencies of the country.
About
develops and markets a wide range strategic and tactical solutions and products for the
security forces, lawful agencies and intelligence bodies. in-house developed products
monitor the telecommunications networks and generate meaningful sources of
information for intelligence and lawful intercept.
End-to-End Applications
* Lawful Interception – A family of LI application based on signaling passive
probing.
* Intelligence Solutions – A family of strategic and tactical solutions for intelligence
bodies.
* Location – an active location tracking system tracking for subscribers, using a
combination of active query modules and passive probes.
* A-GPS – precise location tracking for subscribers, using a combination of cellular
technology and GPS.
* Probes- TDM & IP probes infrastructure.
* Anti Fraud – A complete suite of Anti Fraud applications for IP and TDM networks.
Vendor reputation and experience
is backed by the Israel Ministry of Defense and we work with the relevant
security/intelligence and telecom operators locally. In addition, worldwide established
Tier 1 operators such as AT&T, Cable & Wireless, Sprint, Telefonica, Vodafone, Reliance
(among others) have trusted their mission critical needs and projects to us. has offices in
Israel and India.

Table of Contents
1 IN TRO DU CTI ON ……. ………. ………. ………. ………. ………. ………. ………. ………. …….. 6
2 OB J ECT I VES O F TH I S DO CUM EN T … ………. ………. ………. ………. ………. ………. …….. 8
3 ABS TRA CT …. ………. ………. ………. ………. ………. ………. ………. ………. ………. …….. 8
4 IN TELL IG EN CE BO DI ES CH AL LENG ES …….. ………. ………. ………. ………. ………. …… 14
5 IN TRO DU CTI ON TO TH E SO LU T IO N. ………. ………. ………. ………. ………. ………. …… 17
6 GA TH ERIN G PRO J EC T IN FO RM ATI O N …….. ………. ………. ………. ………. ………. …… 17
6 .1 Gath erin g In format ion … ……. …… …… …… ……. …… …… …… ……. …… …… …. 18
6 .2 An alyzin g th e collect ed in format ion ….. …… …… …… ……. …… …… …… …. 20
6 .3 Sy stem D esign ….. …… …… ……. …… …… …… ……. …… …… …… ……. …… …… …. 20
6 .4 Commercial Prop osal ….. ……. …… …… …… ……. …… …… …… ……. …… …… …. 22
7 SO L U TI ON DES CR I PTI ON….. ………. ………. ………. ………. ………. ………. ………. …… 24
7. 1 IRMP – Intelligen ce Rules M ana gemen t Plat form ….. …… …… ……. …… …. 25
Co ncept . …… ……. …… …… …… ……. …… …… …… ……. …… …… …… ……. …… …… …… …. 26
Fe atures …… …… ……. …… …… …… ……. …… …… …… ……. …… …… …… ……. …… …… …. 27
Syste m Compo nents Ove rview …… …… …… ……. …… …… …… …… ……. …… …… …. 28
Access co nt rol and use rs management … …… ……. …… …… …… ……. …… …… …. 29
7. 2 Location Trackin g For Intelligen ce ….. ……. …… …… …… ……. …… …… …. 31
8 VI SU A L L IN KS MAPP IN G ….. ………. ………. ………. ………. ………. ………. ………. …… 36
Fu n ction al Capabilitie s …… …… ……. …… …… …… ……. …… …… …… ……. …… …… …. 38
Gen eral des cripti on …… …… …… ……. …… …… …… …… ……. …… ……. …… …… …… …. 40
Visu alizati on ….. ……. …… …… …… ……. …… …… …… ……. …… …… …… ……. …… …… …. 41
M u lti Con tex tu al An alysis … …… ……. …… …… …… ……. …… …… …… ……. …… …… …. 42
9 IN TERCEPT I O N AN D TA RG ETIN G …. ………. ………. ………. ………. ………. ………. …… 43
10 CELL U LA R EX TRA CT O R AN D SELECT I V E JAM M ER ……. ………. ………. ………. …… 47

11 IN T ERN ET DEN I A L O F SERV I CE (DO S) SERVI C E B LO C KI NG …. ………. ………. …… 52
12 UM BR EL LA SO L U TIO N FO R LIS S YS TEM S (PH AS E-2) .. ………. ………. ………. …… 53
13 FI ELD LAP TO P …. ………. ………. ………. ………. ………. ………. ………. ………. …… 57
14 PL ATF O RM HA RDW AR E & SO FT WA RE SPECI F I CATI ON S ……… ………. ………. …… 59
15 PR O BES …. ………. ………. ………. ………. ………. ………. ………. ………. ………. …… 62
15 .1 TDM ATM Probe … …… ……. …… …… …… ……. …… …… …… …… ……. …… …… …. 62
15 .2 IP Prob e .. ……. …… …… …… ……. …… …… ……. …… …… …… ……. …… …… …… …. 69
1 5.3 M ode of Op erati on ……. …… …… …… ……. …… …… …… ……. …… …… …… …. 69
1 5.4 Tech n ical Spe cif i cati on s … …… …… …… ……. …… …… …… ……. …… …… …. 72
1 5.4.1 Key Featu res …… …… ……. …… …… …… ……. …… …… …… ……. …… …… …. 72
1 5.4.2 In tercep ti on Criteri a ….. …… …… …… ……. …… …… …… ……. …… …… …. 73
1 5.4.3 Cap acit y P arame ter s …… …… …… ……. …… …… …… …… ……. …… …… …. 78
Table of Figures
Figure 1: Functional model for lawful interception …………………………………………………………………… 11
Figure 2: Architecture of the LIMS …………………………………………………………………………………………………. 12
Figure 3: Intelligence Platform ……………………………………………………………………………………………………… 24
Figure 4: Rule Builder…………………………………………………………………………………………………………………… 26
Figure 5: Rule Engine Concept ………………………………………………………………………………………………………… 27
Figure 6: Intelligence Location Data Records Extraction …………………………………………………………. 32
Figure 7: Example of Detection of group meeting to plot a crime …………………………………………. 33
Figure 8: Cell & sector & Time Advanced location …………………………………………………………………….. 34
Figure 9: Active location for Intelligence …………………………………………………………………………………….. 35
Figure 10: Correlating location with analysis results …………………………………………………………………. 37
Figure 11: Examples of the Analysis application & Analysis Results ………………………………………. 38

Figure 12: map of the results of analysis ……………………………………………………………………………………… 42
Figure 13: Signaling Monitoring for CDRs LDRs extraction ………………………………………………………… 44
Figure 14: Signaling & Voice links monitoring (CDRs LDRs & Voice) ……………………………………….. 45
Figure 15: IP network Signaling & Content monitoring (IPDRs & Content) ……………………………. 46
Figure 16: BTS Extracting IMSI/IMEI/TA……………………………………………………………………………………….. 48
Figure 17: BTS triangle location tracking ……………………………………………………………………………………. 48
Figure 18: BTS black/white list creation …………………………………………………………………………………….. 49
Figure 19: Service for White Listed Phones …………………………………………………………………………………. 50
Figure 20: DoS for All Other Phones ………………………………………………………………………………………………. 50
Figure 21: Activation of BTS …………………………………………………………………………………………………………… 51
Figure 22: DoS for IP users ……………………………………………………………………………………………………………… 52
Figure 23: Architecture of Umbrella Solution …………………………………………………………………………….. 54
Figure 24: Umbrella Solution activation ……………………………………………………………………………………….. 56
Figure 25: Filed LAPTOP …………………………………………………………………………………………………………….. 58
Figure 26 – Hexa E1/T1 Compact PCI Telecommunication Adapter ……………………………………….. 63

Introduction
is pleased to present intelligence agencies a turnkey solution to provide intelligence
bodies with a comprehensive secure and reliable system to provide effective and
comprehensive electronic intelligence services to the Agencies of the country.
About
develops and markets a wide range strategic and tactical solutions and products for the
security forces, lawful agencies and intelligence bodies. in-house developed products
monitor the telecommunications networks and generate meaningful sources of
information for intelligence and lawful intercept.

 

 

 

Mass Monitoring of IP and Voice Networks

2345



Top