COMINT
Passive Interception
Passive Interception involves mass mobile monitoring with data mining.
Powerful Features Include:
Situational Awareness: In order to acquire intelligence on a person of interest, Situational Awareness can be used to identify and track a target. Terror suspects and kidnappers can be followed based on their mobile identity or activities. Lists can be databased and indexed to keep track of both targets and the people they associate with.
Alerting: Custom alerts can be generated to track thousands of targets as they enter or exit areas under surveillance. Alerting can tell the surveillance officer while watching / listening, or remotely by sms or email. The system’s mass-collection capability can keep track and alert the officer to the actions of targets under surveillance.
Data Mining: Our monitoring technology is equipped with an engine that takes mobile identities, associates their characteristics, and compares every association with each other in a database environment. Because of this, our technology is able to offer the surveillance officer an efficient method of Data Mining within the confines of hundreds of thousands of intercepted call records within minutes.
Pattern of Life: Each transaction captured is inter-associated with one another in order to build up a history of every mobile device, whether targeted or randomly intercepted by targeting a suspected terrorist or criminal’s mobile device. These transactions are analyzed over time and provide the surveillance officer with calendar data that lend to predictive behavioral analytics of targets during an investigation.
The Passive Collection system is designed as a stationary solution that can be deployed in dangerous areas. It can work with multiple configurations in order to provide expanded collection ranges. It can collect many different variables without cooperation from phone networks, produce mobile identity characteristics, inter-associate all results gathered (with one another) over time, and assign the relevant results to each individual mobile identity.
