15
BINT | SIGINT | ELINT | HUMIN NT | ELINT | HUMINT | CYBINT CYBINT | SIGINT | ELINT | HU HUMINT | CYBINT | SIGINT | BINT | SIGINT | ELINT | HUMIN NT | ELINT | HUMINT | CYBINT CYBINT | SIGINT | ELINT | HU HUMINT | CYBINT | SIGINT | BINT | SIGINT | ELINT | HUMIN T | ELINT | HUMINT | CYBINT CYBINT | SIGINT | ELINT | HU HUMINT | CYBINT | SIGINT | BINT | SIGINT | ELINT | HUMIN NT | ELINT | HUMINT | CYBINT CYBINT | SIGINT | ELINT | HU HUMINT | CYBINT | SIGINT | COMINT PEGASUS INTELLIGENCE 2016 Интеллект Интеллект ความฉลาดทาง Интеллект ความฉลาดทาง ความฉลาดทาง ความฉลาดทาง ความฉลาดทาง インテリジェンス インテリジェンス インテリジェンス sự thông minh sự thông minh ng minh インテリジェンス minh Интел akili akili akili akili inteligencia inteligencia eligencia Intelligence Intelligence Intelligence

CYBINT | SIGINT | ELINT | HUMINT SIGINT - Pegasus … · Signal Analysis System (VHF/UHF) 9 ... SIGINT | ELINT | HUMINT ... · All IMSI detected are logged with the proper associated

Embed Size (px)

Citation preview

Page 1: CYBINT | SIGINT | ELINT | HUMINT SIGINT - Pegasus … · Signal Analysis System (VHF/UHF) 9 ... SIGINT | ELINT | HUMINT ... · All IMSI detected are logged with the proper associated

CYBINT | SIGINT | ELINT | HUMINT SIGINT | ELINT | HUMINT | CYBINT

CYBINT | SIGINT | ELINT | HUMINT HUMINT | CYBINT | SIGINT | ELINT |

CYBINT | SIGINT | ELINT | HUMINT SIGINT | ELINT | HUMINT | CYBINT

CYBINT | SIGINT | ELINT | HUMINT HUMINT | CYBINT | SIGINT | ELINT |

CYBINT | SIGINT | ELINT | HUMINT SIGINT | ELINT | HUMINT | CYBINT

CYBINT | SIGINT | ELINT | HUMINT HUMINT | CYBINT | SIGINT | ELINT |

CYBINT | SIGINT | ELINT | HUMINT SIGINT | ELINT | HUMINT | CYBINT

CYBINT | SIGINT | ELINT | HUMINT HUMINT | CYBINT | SIGINT | ELINT |

COMINT

P E G A S U S I N T E L L I G E N C E 2 0 1 6

Интеллект

Интеллект

ความฉลาดทาง

Интеллект

ความฉลาดทาง

ความฉลาดทาง

ความฉลาดทาง

ความฉลาดทาง

インテリジェンス

インテリジェンス

インテリジェンスsự thông minh

sự thông minh

sự thông minh

インテリジェンス

sự thông minh

Интеллект

akiliakili

akili

akili

inteligencia

inteligencia

inteligencia

Intelligence

Intelligence

Intelligence

CYBINT | SIGINT | ELINT | HUMINT SIGINT | ELINT | HUMINT | CYBINT

CYBINT | SIGINT | ELINT | HUMINT HUMINT | CYBINT | SIGINT | ELINT |

Page 2: CYBINT | SIGINT | ELINT | HUMINT SIGINT - Pegasus … · Signal Analysis System (VHF/UHF) 9 ... SIGINT | ELINT | HUMINT ... · All IMSI detected are logged with the proper associated

CYBINT | SIGINT | ELINT | HUMINT SIGINT | ELINT | HUMINT | CYBINT

CYBINT | SIGINT | ELINT | HUMINT HUMINT | CYBINT | SIGINT | ELINT |

CYBINT | SIGINT | ELINT | HUMINT SIGINT | ELINT | HUMINT | CYBINT

CYBINT | SIGINT | ELINT | HUMINT HUMINT | CYBINT | SIGINT | ELINT |

CYBINT | SIGINT | ELINT | HUMINT SIGINT | ELINT | HUMINT | CYBINT

CYBINT | SIGINT | ELINT | HUMINT HUMINT | CYBINT | SIGINT | ELINT |

CYBINT | SIGINT | ELINT | HUMINT SIGINT | ELINT | HUMINT | CYBINT

CYBINT | SIGINT | ELINT | HUMINT HUMINT | CYBINT | SIGINT | ELINT |

TABLE OF CONTENTS

Spider 23G 3

GSM Monitoring Solutions 5

Satellite Monitoring Solutions 8

Signal Analysis System (VHF/UHF) 9

Gold Lock 12

Fort logic 13

Vault Encrypted Mobile 14

GoldMail 15

CYBINT | SIGINT | ELINT | HUMINT SIGINT | ELINT | HUMINT | CYBINT

CYBINT | SIGINT | ELINT | HUMINT HUMINT | CYBINT | SIGINT | ELINT |

COMINT C O M M U N I C A T I O N SI N T E L L I G E N C E

Page 3: CYBINT | SIGINT | ELINT | HUMINT SIGINT - Pegasus … · Signal Analysis System (VHF/UHF) 9 ... SIGINT | ELINT | HUMINT ... · All IMSI detected are logged with the proper associated

CYBINT | SIGINT | ELINT | HUMINT SIGINT | ELINT | HUMINT | CYBINT

CYBINT | SIGINT | ELINT | HUMINT HUMINT | CYBINT | SIGINT | ELINT |

SPIDER 23G2 G - 3 G I M S I C A T C H E R

The Spider 23G system is a 2G-3G IMSI Catcher that enables the operator to gather a phone’s identity (IMSI, IMEI or

MSISDN), while delivering advanced tools to utilize the gathered information in order to manipulate the target phones.

Spider 23G establishes a new cellular base station, forcing the phones in the area to register to the new cell base station.

During this process, the phone reveals its basic identities such as (IMSI and IMEI, in some cases also MSISDN and TMSI).

Once the phone has registered to the new fake cell, the Spider 23G can also control some phone features.

Spider 23G can shift the phone to 2G from 3G, block the communication (selective jamming), drain the battery and more.

The Spider 23G uses an advanced technology, which allows multi band 2G and 3G simultaneous operation from single

hardware unit.

Database · Spider 23G brings the capability of collecting and storing the Captured information into a dedicated database, which then allows the system to manage a list of targets and alert upon detection of pre-defined target mobile phones.

· Spider 23G also delivers the first stage of smart situation management and intelligence investigation or tracing. It can be integrated into other systems and sensors for producing maximum value of data provided.

Main Features

· Record all IMSI, IMEI, and TMSI Information from phones in the surrounding perimeter.

· Receive mobile phone MSISDM (In some cases).

· Send SMS to captured target phone.

· Alert upon identifying of pre-defined suspected IMSI.

· Remote control and capability to see results on smartphone, tablet or remote laptop.

· Passive mode (no transmission, reception only) for record any IMSI identity when a telephone becomes active.

· All IMSI detected are logged with the proper associated data for later reference.

· Performs standard measurements on connected phones to assist on the phones location.

· Selective jamming - Allows the user to command a hold on the connected phones or release them to the operator network.

· Battery drain for blacklist mobiles.

· Supports all operator frequencies and all phone models.

PEGASUS

Page 4: CYBINT | SIGINT | ELINT | HUMINT SIGINT - Pegasus … · Signal Analysis System (VHF/UHF) 9 ... SIGINT | ELINT | HUMINT ... · All IMSI detected are logged with the proper associated

Pegasus offers a full range of GSM monitoring solutions.

In addition Pegasus provides an extensive array of supplementary products such as:

Jammers (Cellular, WIFI, etc.) Counter Interception Detection IMSI Grabbers & Direction Finders

These solutions are for use by authorized law enforcement forces and governmental agencies.

The Pegasus portfolio of cellular interception systems is designed to handle effectively the challenging environment of mass cellular communication. Pegasus products were built to be stacked and packaged in various configurations and enclosures to best suit the customer requirements. Modes of operations and type of enclosures include compact carry-on systems, wearable covert systems, and up to very large scale vehicular mounted systems.

Pegasus Systems lend themselves to city-wide coverage with hundreds of channels deployed sometimes in conjunction with already deployed safe city video projects.

The Pegasus systems are flexible and scalable in every dimension:

· Number of channels

· Use of channels (downlink or uplink)

· Local RF front ends (“RFE”) as well as remote RFEs, carried or wall mounted

· Local deciphers or central units with remote RFEs

The Pegasus product line of interception systems comes equipped with an intuitive, user-friendly

management application “GUI” displaying each monitored call parameters, location on a map and a variety of

options to manage am SQL type database. This Pegasus Management Application can operate a local

integrated Pegasus Front End(s) and/or a suite of remote Pegasus Front Ends providing coverage of multiple

sites or a whole city.

Custom Tailoring a System

Have special requirements? Please contact us. We can custom tailor solutions to best suit your needs. The building blocks of Pegasus systems are geared to construct small covert systems as well as large scale systems supporting hundreds of monitored channels.There is no ‘One PEGASUS Product’ better than the next; instead, there is a wise decision process that leads to a selection of the system configuration best for your needs!

PEGASUS

GSM MONITORING SYSTEMSP A S S I V E | S E M I - A C T I V E | A C T I V E

Page 5: CYBINT | SIGINT | ELINT | HUMINT SIGINT - Pegasus … · Signal Analysis System (VHF/UHF) 9 ... SIGINT | ELINT | HUMINT ... · All IMSI detected are logged with the proper associated

PEGASUS PASSIVE SYSTEMBest suited when detection of the interception system is not an option.

Pegasus Passive System Never Transmits!It operates in either TARGET or RANDOM mode, intercepting just the call you were expecting (TARGET MODE) or all the traffic in the vicinity of the Pegasus Front End (RANDOM MODE). Of course P6 Intercept can monitor many target cellphones simultaneously and display I calculated location of each target phone, and in fact every call monitored, on a Google map.

Pegasus Passive Interception Systems can be delivered in a variety of sizes, enclosures and configurations. Whether the need is for a 32 channel system or a 200 channel system – Pegasus is here to provide.

PEGASUS SEMI-ACTIVE SYSTEMThis is an extension to Pegasus-Passive system. The functionality of the Pegasus suite of passive systems can be greatly enhanced by supplementing with a semi-active module / feature. Pegasus-Semi-Active features include among other:· Class-mark change · Silent SMS · Spoofed SMS · Obtaining Public Numbers based on TMSI · Black-list / White-list

PEGASUS ACTIVE SYSTEMMan In The Middle (MitM) is a well known method to lure nearby targets to an active system serving as a base-station. The Pegasus Active interception system is designed to screen desired target cellphones and to lure them to register and conduct calls using the Pegasus system as the network node of choice. While hard to detect, Pegasus Active does transmit hence it is suitable when possible detection is taken into account.

USE CASESStandalone UseEither packed in a variety of “Pelican”-like cases OR embed-ded in standard laptops, the Pegasus Interceptor can be carried to a scene by a single individual. System configura-tion range from 8 Duplex to hundreds of channels providing full flexibility of downlink and uplink channels monitored. A variation of the STANDALONE USE would include managing multiple Pegasus Front Ends (instead of an all inclusive case) or inclusion of some or all of the semi-active features available.

SWAT UseSuspected terrorists cells or drug traffic scenes can be effectively monitored by Pegasus Interceptors coupled with multiple Pegasus Front Ends scattered at the suspected scene. A special Terror-Cell Monitor Mode can be activated to target calls associated with a group of subscribers communicating with each other.

Military UseAn individual Pegasus Interceptor is mounted in a combat vest allowing 5 to 10 hours of operations without charge. The Pegasus Interceptor can be operated by the same soldier to detect nearby communication of hostile forces. The system can be fully passive or Semi active in nature making detection nearly impossible.

Covert UseUsing a Laptop, Tablet or an iPhone, the Pegasus Passive (or semi-active) can be operated in covert situations. Either packed in a professional looking case or in wearable config-uration, a Pegasus Interceptor of 30 or 50 channels can be operated for at least 5 hours on battery providing intercept-ed audio of traffic in its near vicinity. The Covert / Wearable Pegasus Interceptor can include a wearable decipher or communicate with a remote decipher for opening intercept-ed calls.

Vehicular Solutions19” racks equipped with shock absorbers are used to host the Pegasus Interception systems in covert trucks or sedans. The vehicle can be parked next to the monitored scene or miles away, obtaining intercepted audio though a mesh of Pegasus Front Ends scattered around the area of suspicious activities. Unlike legacy interception systems, the small size and low power consumption enable operation in small vehicles avoiding attention.

Chase ModePolice units and SWATs would be interested in using Pegasus Intercpetor in Chase Mode. Pegasus Interceptor would follow the target’s handovers and record its progres-sion path providing CELL ID location data.

Safe CityMany cities are monitored these days with a mesh of video cameras transmitting back to a command and control center images and video to better protect the citizens and prevent crime. Pegasus Front End nodes are mounted next to the video cameras and, using the same backbone infrastructure, transmit back to the same command and control center voice data of specific targeted cellphones. Indirectly, such architecture provides for valuable location information coupled with video data, which bring to market the most advanced monitoring / location system out there.

PEGASUS

GSM MONITORING SYSTEMS

Page 6: CYBINT | SIGINT | ELINT | HUMINT SIGINT - Pegasus … · Signal Analysis System (VHF/UHF) 9 ... SIGINT | ELINT | HUMINT ... · All IMSI detected are logged with the proper associated

Please contact one of our professional team to discuss your requirements & identify the best solution for your mission.

Pegasus is able to provide a full range of both tactical & strategic solutions for Thuraya, Iridium, Inmarsat & VSat.SATELLITE MONITORING SYSTEM

PEGASUS

PSIN

SATELLITE

NCS

4GHZ

1.5GHZSCPC from LESNCSA, NCSCfrom NCS

SCPC from MEB4GHZ

LES

Page 7: CYBINT | SIGINT | ELINT | HUMINT SIGINT - Pegasus … · Signal Analysis System (VHF/UHF) 9 ... SIGINT | ELINT | HUMINT ... · All IMSI detected are logged with the proper associated

The signal analysis System (UHF/VHF) (hereinafter referred to as System) is designed to detect and determine the location of communications and telecommunications VHF bandwidth as well as to intercept sematic and signal information.

In terms of tactical use, the Complex allows you to:

· Determine the location of telecommunications facilities in the area with the display on electronic maps in real time*; determine the intensity of the radio traffic (the number of sessions for a fixed unit of time) that is carried out using the identified telecommunications equipment reveal the composition of the radio network(radio directions), with their graphical display on the digital map in real time.

· Determine tactical level of subscribers in the radio network, the principle construction of the radio network (star, ring, each to each, and so on), taking into account the results of analysis of traffic intensity, and the interception of signaling information.

· Routes of radio subscribers’ transference with graphical display of this information, together with the residence time of the subscribers in the control points on the electronic map of the area*.

· Intercept and record the signal and semantic information that circulate in the detected radio networks (radio directions)**.

* Determination of the location of communication and telecommunication as well as routes of radio subscribers’ transference in real time is carried out only in case at least two sub-systems of detection and direction finding are used.

** Interception of semantic information is carried out only in case detected radio networks (radio directions) encryption systems are absent.

COMPLEXComplex Software allows you to:

· Apply to electronic maps information about the location of objects and sources in accordance with the procedures and rules used by the customer;

· To bind objects and sources inflicted on electronic maps to identified emitters database, as well as to repository of recorded information content derived from the interception of these sources;

· Generate reports on the results of the System in which to display:

· Statistical information on the number of detected radiation communications and telecommunications in a particular sector or area * (limited geographic coordinates), the number of detected radio (radio direction), as well as the intensity of the radio traffic in them;

· Graphical information on the location of the identified nodes and subscriber communications in electronic map of the area in accordance with the procedures and rules adopted by the customer;

· Highlighted by the user and documented (transferred in printed form) the information content that confirms the inference of the autopsy System radio-electronic environment.

Design features of the functional part of the System and its antenna systems allow locating it in stationary and mobile performance, as well as on the transport base. Taking into account the wishes of the customer stationary version of the System can be equipped with storage cabinets, remote control means (alarms, CCTV), and mobile and transport options - proof cases. In addition, in all variants of the System making up with the systems of autonomous power supply are foreseen.

PEGASUS

S IGNAL ANALYS IS SYSTEM (UHF/VHF)COMPLEX

Page 8: CYBINT | SIGINT | ELINT | HUMINT SIGINT - Pegasus … · Signal Analysis System (VHF/UHF) 9 ... SIGINT | ELINT | HUMINT ... · All IMSI detected are logged with the proper associated

PEGASUS

COMPLEX | SIGNAL ANALYSIS SYSTEM (UHF/VHF)

· Antenna-feeder subsystem;

· Subsystem of search and direction finding of the sources ("Pelengas");

· Subsystem of sources’ analysis;

· Subsystem of information interception.

It is intended to provide work of the product in fixed, mobile and transport designs. The structure of the antenna-feeder subsystem includes a set of entrance (omnidirectional and directional, fixed and mobile) antennas differ in the design (disco cone, logarithmic, "Yagi") and the operating range, as well as an antenna switch with the set of driven rotary devices for directed antennas.

Sub-system of searching and direction finding is intended for highspeed scan of the user-specified bandwidth and determination of the direction towards identified sources and automatically measuring of its basic parameters (level of the power, bandwidth) and saving the results in the sources' database and display them on the screen using software graphical shell of the System.

Structurally broadband scanning receiver and DF antenna-feeder system, which is the basis of search and DF subsystem implemented in a single protected unit, which is located on the antenna-feeder system and is connected to the rest of the complex power cables (+12 B) and GigabitEthernet. This design feature, as well as the possibility of remote control of the subsystem allows deploy DF network easy and comparatively cheap.

COMPLEX CONSISTS OF FOUR FUNCTIONAL SUBSYSTEMS

Antenna-feeder subsystem

Subsystem of search and direction finding of the sources ("Pelengas")

It is intended to determinate (verificate) power, space, frequency, time and structural parameters of radiation in automatic or manual mode, automatically detect sources belonging to specific communication systems, display the results in a database and using graphical software shells System, as well as recording and storage.

It is intended for constant/periodic monitoring of labeled by user sources, registration of their semantic content and signaling data.

Hardware elements of subsystems of analysis and of intercept sources (except for operator workstations based laptops, as well as monitor, keyboard and "mouse" of the management server) structurally mounted inside the kick boxing and placed in the room (or vehicle).

The subsystem of the analysis of the sources

The subsystem of the information interception

All of the above subsystems are functionally independent, are based on a client-server. Thus, the customer has the ability to determine the list of subsystems that are available in the system.

Page 9: CYBINT | SIGINT | ELINT | HUMINT SIGINT - Pegasus … · Signal Analysis System (VHF/UHF) 9 ... SIGINT | ELINT | HUMINT ... · All IMSI detected are logged with the proper associated

PEGASUS

COMPLEX | SIGNAL ANALYSIS SYSTEM (UHF/VHF)

FULLY LOADED SYSTEM PROVIDES

Automatic search of the radiation in a given frequency band and sector space, taking into account the parameters set by the operator (energy detection threshold, the number of spectral panorama periods during which the light retains its activity)

Automatic measurement of the main power parameters of the radiation (carrier frequency band, energy level, the bandwidth occupied by radiation)

Automatic detection of the direction (direction finding) of the identified sources of radiation

Automatic determination of the system’s location using global GPS navigation system with application to electronic maps

Definition (verification) of space, frequency, time, the structural parameters of radiation, as well as their affiliation to specific systems (standards) communication in both automatic and manual modes

Entering the search results, direction finding and analysis of detected radiation in the source database

Determination of the radiation sources’ location in mode off-line, by analyzing database records of the detected radiation from different positions of one or more Systems, electronic situation display on the electronic maps of the area that are included in a complex agreement with the customer and in a format that is determined by the customer

Determination of the radiation sources’ location in the real time while using two spaced subsystem of the searching and direction finding, mapping the situation on the electronic digital map that are included in a complex agreement with the customer and in a format that is determined by the customer

Filtering and grouping of database records on the radiation parameters, comments, signal information, as well as of an object formed by the user

Formation of reports on the results of the System for the user-defined period of time

Making of the tasks (rules) of automatic processing (filtering, grouping) of the sources included in the database;

Automatic monitoring of user-labeled sources, which is carried out in the background of the System

Automatic saving of the parameters for each identified and brought in a database of radiation, taking into account the results of their definition (verification) in automatic and manual modes

Control user-defined sources with registration of semantic content and information signal

Monitor the proper functioning of the component parts of the complex with the results displayed in the working windows graphical shell program, as well as office files

Comparative analysis of the technical parameters of the received radiation with a database of reference signals systems and communications standards that is included in the System

Page 10: CYBINT | SIGINT | ELINT | HUMINT SIGINT - Pegasus … · Signal Analysis System (VHF/UHF) 9 ... SIGINT | ELINT | HUMINT ... · All IMSI detected are logged with the proper associated

why choose the gold lock ™ solution?

THE WORLD’S LEADING MOBILE ENCRYPTION DEVELOPER

The gold lock™ team of developers are unsurpassed globally in data encryption,P 2 P t r a n s m i s s i o n F O R f i e l d o p e r a t i v e c o m m u n i c a t i o n d e v i c e s .

STRATEGICALLY LOCATED RELAY SERVERS

NO GL 4G CALL, GL4G CHATOR GL 4G PTT DATA STORED

NO CALL DATA RECORDS

TERMS & CONDITIONS: ONLY AVAILABLE FOR PROFESSIONALS

GLOBAL SECURE NETWORKGLOBAL SECURE NETWORKGLOBAL FIRST SOFTWARE ONLY MOBILE ENCRYPTION SOLUTION

GLOBAL FIRST PUBLIC HACKER CHALLENGE

GLOBAL FIRST PUBLIC SECUREMOBILE CARRIER NETWORK

THE PIONEERSTHE PIONEERS

US$250,000 CASH PRIZE

ATTEMPTED BY 5000 +HACKERS & COMPANIES

NO WINNERS‘WE ARE NOT SURPRISED’

HACKER CHALLENGEHACKER CHALLENGE

[email protected]

C O M M U N I C A t i o n S E C U R I T Y

Gold Line Group Ltd offers a unique global delivery model of

innovative, high-quality, security solutions that enable individuals

and organizations to attain sustainable competitive advantage by

effectively defending and securing their communications and IP.

ENCRYPT

gL4G calls gL4G chat gL4G push to talk gL4G contacts

GOLD LOCK™ 4GTRIPLE LAYER ENCRYPTION USING ADVANCED ALGORITHMS

KEY CHANGES EVERY FEW SECONDS - NO BACKDOORS

VISIBLE HASH CODES - PREVENTS MITM ATTACKS

ENCRYPTS VOICE, CHAT AND PUSH TO TALK

SECURE CONFERENCE, CHAT AND PUSH TO TALK

CONTACTS STORED ON A SECURE SERVER, NOT ON PHONE

WORKS ON ALL DATA NETWORKS GLOBALLY

optimiZed for android & iOS gold lock™ IS A REGISTERED TRADEMARK OF GOLD LINE GROUP LTD.

Page 11: CYBINT | SIGINT | ELINT | HUMINT SIGINT - Pegasus … · Signal Analysis System (VHF/UHF) 9 ... SIGINT | ELINT | HUMINT ... · All IMSI detected are logged with the proper associated

TERMS & CONDITIONS: ONLY AVAILABLE FOR PROFESSIONALS optimiZed for android & iOS gold lock™ IS A REGISTERED TRADEMARK OF GOLD LINE GROUP LTD.

WHY CHOOSE THE FORT LOGIC™ SOLUTION?

Fort Logic™ is created & supported BY Leading cyber security specialists in the field of Mobile & Device seucurity

Global Device SecurityGlobal Device Security THE PROFESSIONALSTHE PROFESSIONALS Additonal ServicesAdditonal Services

[email protected]

FORTLOGICE L I T E D E V I C E S E C U R I T Y

Fort Logic has been developed by mobile security specialists with an extensive background in all attack vectors at a military level. This knowledge qualifies our team to actively detect threats & respond & in a real time environment & take action to protect our clients.

E L I T E D E V I C E S E C U R I T Y

SPYWARE KEYLOGGER TROJ ANS

RANSOMWARE WIFI HONEYPOT MALICIOUS APP

PROTECT

Fort Logic Elite Device Security Provides a constant real time solution to protect devices against Spyware, Keyloggers, Trojans, Ransonware, Wifi Honeypot, Malicious apps

obtains covert information about

another's computer activities by

transmitting data covertly from their

DEVICE.

records every keystroke made by a user, especially in

order to gain fraudulent access to passwords and other

confidential info.

A malicious computer program which

misrepresents itself to appear useful,

routine, or interesting in order to persuade a

victim to install it.

prevents or limits users from accessing their system, forcING

victims to pay the ransom to get their

data back

Fake WiFi hotspots designed to route the

target traffic for means of interception.

interfereS with normal SYSTEM

functions or sends personal data to

unauthorized parties over the Internet.

In the digital world we live in today, most of our information resides in our mobile devices. Malicious hacker activity targets the valuable information we possess, passwords, emails, contacts, messages, calls, skype,

whatsapp, facebook, gmail & more… For VIP’s this information needs to be protected.

CLIENTS SUPPORTED GLOBALLY

DAILY MONITORING OF DEVICES

LIVE UPDATES FROM OUR CONTROL CENTRE

THREAT EVENT INVESTIGATION TO TRACE THE SOURCE OF ATTACKS

GUIDED SEMINARS TO POLITICIANS, BUSINESS & MEDIA PEOPLE

CUSTOMIZED ROM & ENCRYPTION SOLUTIONS

DECADES OF COMBINED MILITARY BACKGROUND IN CYBER SECURITY & INTELLIGENCE

MOD, GOVERNMENT & VIP CLIENTS

COMMITED TO PROTECTING YOUR SENSITIVE DATA

Page 12: CYBINT | SIGINT | ELINT | HUMINT SIGINT - Pegasus … · Signal Analysis System (VHF/UHF) 9 ... SIGINT | ELINT | HUMINT ... · All IMSI detected are logged with the proper associated

SECURE

PROTECT

SPYWARE VIRUSES TROJANS RANSOMWARE

PHONE SMS BROWSING BLUETOOTH

UPLOADS DOWNLOADS GPS CAMERA

VAULT OS™ provides an impenetrable Vault clear of Viruses, Spyware, Trojans & Ransomware

VAULT OS™ achieves this by disabling unsecure phone features including Standard Calls, SMS,Browsing, Bluetooth, Uploads, Downloads,

GPS and Camera.

ENCRYPT

why choose the gold lock ™ solution?

gL4G calls gL4G chat gL4G push to talk gL4G contacts

VAULT OS™ UTILISES GOLD LOCK™ 4GTRIPLE LAYER ENCRYPTION USING ADVANCED ALGORITHMS

KEY CHANGES EVERY FEW SECONDS - NO BACKDOORS

VISIBLE HASH CODES - PREVENTS MITM ATTACKS

ENCRYPTS VOICE, CHAT AND PUSH TO TALK

SECURE CONFERENCE, CHAT AND PUSH TO TALK

CONTACTS STORED ON A SECURE SERVER, NOT ON PHONE

WORKS ON ALL DATA NETWORKS GLOBALLY

VAULT OS™ IS CREATED and powered BY GOLD LOCK™. THE WORLD’S LEADING MOBILE ENCRYPTION DEVELOPER

The gold lock™ team of developers are unsurpassed globally in data encryption,P 2 P t r a n s m i s s i o n F O R f i e l d o p e r a t i v e c o m m u n i c a t i o n d e v i c e s .

STRATEGICALLY LOCATED RELAY SERVERS

NO GL 4G CALL, GL4G CHATOR GL 4G PTT DATA STORED

NO CALL DATA RECORDS

VAULToscreated and powered by gold lock™

VA U LT o s

VAULT

O S

VAULT

O S

c r e a t e d a n d p o w e r e d b y g o l d l o c k ™

vault os™ and gold lock™ are REGISTERED TRADEMARKS OF GOLD LINE GROUP LTD. optimiZed for androidTERMS & CONDITIONS: ONLY AVAILABLE FOR PROFESSIONALS

DEVELOPED by THE gold lock™ TEAM, vault os™ transformS AN

android mobile INTO AN un-hackable communicationS

DEVICE USING GOLD LOCK™ 4G

GLOBAL SECURE NETWORKGLOBAL SECURE NETWORKGLOBAL FIRST SOFTWARE ONLY MOBILE ENCRYPTION SOLUTION

GLOBAL FIRST PUBLIC HACKER CHALLENGE

GLOBAL FIRST PUBLIC SECUREMOBILE CARRIER NETWORK

THE PIONEERSTHE PIONEERS

US$250,000 CASH PRIZE

ATTEMPTED BY 5000 +HACKERS & COMPANIES

NO WINNERS‘WE ARE NOT SURPRISED’

HACKER CHALLENGEHACKER CHALLENGE

[email protected]

Page 13: CYBINT | SIGINT | ELINT | HUMINT SIGINT - Pegasus … · Signal Analysis System (VHF/UHF) 9 ... SIGINT | ELINT | HUMINT ... · All IMSI detected are logged with the proper associated

There is an established global need for secure transmission and storage of digital information. Current offerings are cumbersome, slow, piecemeal in operation, restrict file sizes to unacceptably small sizes, are difficult to use and often questionable in the real level of security they offer.

Features provided by GoldMail include:For Electronic-mail, GoldMail provides Military level encryption of all textual information, attachment/s and associated metadata at sender’s discretion;

Ease of operation and compatibility with all popular email systems & operating systems;

Transmission of very large files (single files up to >4.7Gb per file, per attachment) removes current transfer limits using USB sticks or DVD-ROMs;

The ability to store large encrypted files, at rest, using high level encryption so that security is always maintained;

Ability to search through large encrypted files, or hybrid clean-text/encrypted information sources;

Zero software installation for both sender and receiver when exchanging emails;

Highly secure, automatic key management process so users are unaware of key structures, sequences and storage when using the system;

"No-Master Key" security and algorithms built in at the core of the security level, making the overall system highly resistant to external/internal hacking attempts.

SOLUTION

GoldMail is the product of a specialist team focused on information security & encryptionr, with a product set that has a global application, to provide the the ability to secure, retrieve and share data securely with clients via email and to secure and share their common information services generally.

Other applications include medical, accounting, defense and government. GoldMail has the opportunity to become a market leader in securing business communication with significant growth potential, but is currently focusing on the higher tier of Government and Commercial information users..

GoldMail provides a secure, military grade encrypted communications platform incorporating secure email, secure cloud storage, secure (very) large file transfer and secure document search on encrypted files

K e e p i n g y o u r p r i v a t e d a t a p r i v a t e

Page 14: CYBINT | SIGINT | ELINT | HUMINT SIGINT - Pegasus … · Signal Analysis System (VHF/UHF) 9 ... SIGINT | ELINT | HUMINT ... · All IMSI detected are logged with the proper associated

SECURE EMAIL

GoldMail offers a complete end-to-end, secure email system; it currently works on ~90% of the world’s existing computers, smart phones and tablets, without installing external software or hardware.

Using strong encryption, the system can be relied upon to deliver sensitive information, ensuring that only the sender and receiver(s) are able to communicate.

There are NO gaps in the system or individual processes where information is stored without encryption.

Secure Cloud Storage & Key Management:

Without exception, all secure files are stored using strong bank-level encryption. Automatic key management means private correspondence will not fall into unauthorised hands.

GoldMail staff are specifically locked out of the encrypted files to further ensure the utmost client security.

Encryption is only as strong as its weakest link and decryption keys are usually seen as the "weak link" in encrypted security systems. GoldMail decryption keys however, are stored across a multi-jurisdictional array and are never assembled or available in the same place as the emails, they are only combined electronically for the split second to "unlock" an email when needed and then the key is destroyed.

Multiple secure transport layers protect emails while in transit so that strong encryption is in operation from the browser session creating the text in an email and attaching files all the way back to secure storage in the cloud. GoldMail uses an ultra-secure “one-time password” approach. There is NO "master key" in existence, and hence there is none to be stolen or misused.

Every email has a unique key, only used once in the lifetime of the system and used only for one, specific email. Every key structure uses a unique algorithm to ensure they are both non-predictable and non-reusable. Keys are NEVER recycled. Keys are never stored on the same system as secure storage and they are never stored in one piece or in one jurisdiction.

Every email has a unique, single use, one-time pad keying structure. The automatic key management system means that users of the system never need to remember any "keys", they only have to remember their logon and password details, the system does the rest, securely.

SECURE (VERY) LARGE FILE TRANSFER

GoldMail has no limits on the file size it can send, practical file size is dependent on the quality of the internet connection between two points, and the speed of the connection in use..

To allow management control, an overarching Management Control Panel is included in the back end of the Private Cloud desktop to "dial up" a practical local limit, based on available storage and user requirements.

GoldMail has tested, under real world conditions, to 'Send' a DVD full of ~5,000 MS Word documents zipped into a single 4.7Gb file, and then retrieved on a different device in another country. This is the quickest, most secure way to send huge amounts of information across the street, or across the world.

Huge files can take considerable time to move, but they will always get there via GoldMail.

K e e p i n g y o u r p r i v a t e d a t a p r i v a t e

Page 15: CYBINT | SIGINT | ELINT | HUMINT SIGINT - Pegasus … · Signal Analysis System (VHF/UHF) 9 ... SIGINT | ELINT | HUMINT ... · All IMSI detected are logged with the proper associated

SECURE DOCUMENT SEARCH

Large companies have large files and large numbers of emails, and in the case of GoldMail, large amounts of encrypted information using large numbers of decryption keys.

GoldMail has a system to comprehensively search large numbers of encrypted documents, without prior knowledge ofwhat keys are required to "open” a document.

Only users who have "permission", can search documents they did not create or have ownership of, but this feature allows for up to Enterprise-wide searches if the permitted search individual is high enough on the priority list and wide enough on the content access list to allow deep searching.

Permissions and the automatic key management system interact to allow users to search for words or phrases, without the need to know if the information is encrypted.

From the user’s point of view, they choose what to search, set it running, and wait for the result to appear, even when strong encryption is in operation on the items to be searched.

It must be born in mind that searching very large amounts of information can take a very long time to complete, but GoldMail will always complete a search.

Target Market

GoldMail has designed the product with input and advice from data professionals to suit the requirements of Government’s, National Security Agencies & CEO’s of large entities , associations or Departments in the first instance.

GoldMail believes there will be a strong demand from authorised, but “lower level” users as they become aware of the benefits the GoldMail solution provides, be it secure email for communications with lawyers, accountants, Government officers and other professionals for secure document storage, or large file transfer for safe storage of professional documents.

Competitive Advantage

GoldMail is built around a secure encryption protocol, which lack “backdoors” or Master Keys that can be stolen or hacked;GoldMail allows sensitive information to be transferred in a highly secure manner;Virtually any size attachment is accommodated with the certainty that only the sender and a pre-designated receiver of an email will be able to view and read its contents;System users do not need to remember/secure encryption keys, the system itself manages the complexity of the keying structure. Forcing one key, does not allow any other email to be decrypted, and all emails contain no metadata at rest meaning anyone attempting to "hack" the system has to do so blind, with no clues as to if an email contains a patent to make diamonds or to order a pizza for lunch;

From our research we have been unable to find the combination of strong encryption, huge files sizes, secure storage and search, all inside the familiar email format on any other platform or competitor and feel confident in stating that these attribute are not available.

K e e p i n g y o u r p r i v a t e d a t a p r i v a t e