Products
Social Media Monitoring
Social Media Monitoring
NETWORK INTELLIGENCE
Application / End user
Counter Terrorism
Military Intelligence
National Security Cyber Intelligence Blocking and controlling Anti Government
Propaganda
The Internet and mobile revolutions have created tremendous opportunities for all parts of the population to access unlimited information anytime, anywhere. However, it also presents new challenges for Law Enforcement organizations responsible for private and public safety.
This new reality has created the need to monitor and/or block dangerous web content and access to deceptive information (fake news) for all or selected users, identified by their mobile numbers. This includes the ability to analyze and control both cleartext and encrypted web traffic. Regulation of social media usage by specific users in specific locations (e.g. limiting Facebook at places of mass gatherings) can also be very important to ensure public safety. More Importantly , geo locating Anonymous targets based on their posts/ tweets is another capability which enhances the system output on operational level.
CAPABILITIES
In order to provide all the necessary tools to cope with the above challenges, an efficient Real Time Networking Analysis and Filtering solution should include the following set of capabilities:
Data Intelligence – the ability to collect and analyze internet traffic in real time and retain the intelligence for further examination and correlation.
Target Based Geo-Location – the ability to identify Negative posts / content posted on the internet, co-relate the Device used to send and Auto Geolocate on Map.
Content filtering – the ability to analyze HTTP/HTTPS traffic and filter out inappropriate content.
Access and Usage control – the ability to limit or block access to illegal internet resources and limit the usage of illegal or inappropriate applications and tools.
OPEN SOURCE INTELLIGENCE SYSTEM
Open Source Intelligence system
Real Time check on social media discussions.
The only system that can expose any phone number in the world, regardless of location, devices type, operating system, carrier, pre or postpaid etc.
The only system capable of exposing a target identity based on email addresses and social media profiles such as Facebook, Twitter, LinkedIn, Instagram, VK and more
Collects much more information about targets, compared to any other system, because our technology covers thousands of sources that are not web based
Application / End user
Counter Terrorism
Military Intelligence
National Security Cyber Intelligence Blocking and controlling Anti Government Propaganda / Election Support in finding the emotions of people / voters