Name: Welcome to Elaman

Text: CONFIDENTIIAL

Welcome to Elaman

Company Information
ELAMAN is a German based
company established in 2004 with its
headquarters in Munich/Germany.

CONFIDENTIIAL

Our aim
O
i iis to provide
id comprehensive
h
i
security products and solutions,
technical consultancy and services as
well
ell as professional
p ofessio al training
t ai i g for
fo
governments and security agencies.

CONFIDENTIIAL

Elaman GmbH and Gamma Group international The Security Cooperation
Setup, Offices and Market

CONFIDENTIIAL

Focus and Setup

CONFIDENTIIAL

Offices Worldwide

CONFIDENTIIAL

Market and References

Portfolio
• Communications Monitoring
• Special Surveillance Equipment and Solutions (Audio & Video)
• TSCM – Counter Surveillance Equipment & Training

CONFIDENTIIAL

• VIP Protection

CONFIDENTIIAL

Communications
Monitoring

Commu
unication
ns Monitoring

CONFIDENTIIAL

• Overview: Communications Monitoring

• Active GSM/UMTS „off air“
M it i S
Monitoring
Systems,
t
GSM
GSM-Locating
L
ti & Finding
Fi di
GSM / GPRS
93
26

89

89
97

36

Handheld DF

39

CONFIDENTIIAL

UMTS
•IMSI/IMEI catching
•Searching/Scanning & exact Locating
•Interception
•Blocking
•Manipulating

Commu
unication
ns Monitoring

83

Exact locating of targets via triangulation and silent call

Vehicle DF

Vehicle DF

CONFIDENTIIAL

GSM

Commu
unication
ns Monitoring

Handheld DF

Commu
unication
ns Monitoring

CONFIDENTIIAL

Exact locating of targets via triangulation and silent call

Commu
unication
ns Monitoring

CONFIDENTIIAL

Integration Example

Passive & semi active GSM off air
Monitoring Systems
GSM Infrastructure
Mobile Switching
Center (MSC)

Passive
(decryption of 5.0 & 5.2)

CONFIDENTIIAL

BTS
GSM
Target Phone

S i active
Semi
ti
(decryption
of 5.0, 5.1 & 5.2)

Commu
unication
ns Monitoring

PSTN

• Passive Monitoring of Telephone and
Trunk Lines

Zebra G
Gateway

Remote Capture Unit 1

Switching
Centres

Fax
Demod
Server
Modem Demod
Server
Temp File
Storage

Channel
Processor
Server

Utility
Server

NAS Head
Server

Utility
Server
Database
Server

Database
Storage
(CDR)

File
Storage

NAS Head
Servers

Database
Server

Compression
Server
Application +API
Server

Firewall

Remote Capture Unit 2

Zebra Gateway

Master Data Centre

Database
Storage
(CDR)

Archiving
Server

Application +API
Ser er
Server

Fax
Demod
Server

Firewall
Modem Demod
Server
Temp File
Storage

Channel
Processor
Server
NAS Head
Server

Utility
Server
Database
Server

Database
Storage
(CDR)

CONFIDENTIIAL

Compression
Server

Satellite
Systems

Application +API
Server

Firewall

Administrator

User
Workstations

Commu
unication
ns Monitoring

Architecture

Zebra Functionality

24 U
4000 Ch

Commu
unication
ns Monitoring

Record all calls and filter
Equally suited for TDM and IP networks
Extremely high density and high capacity
– 512 stereo E1s (1024 E1 inputs)
– 300,000 bi-directional channels
• Scalable
S l bl and
d distributable
di t ib t bl
• CIC mapping

CONFIDENTIIAL





Portable Monitoring Systems

Commu
unication
ns Monitoring

CONFIDENTIIAL

Portable Monitoring Center „MC to go“

Commu
unication
ns Monitoring

CONFIDENTIIAL

Portable IP Monitoring

IP Shaping & Blocking
CS2000
A Fully programmable device that’s
that s will be connected into IP streams (Ethernet
(Ethernet,
STM 1, STM4, STM16, etc.) to realize:

CONFIDENTIIAL

•Interception of IP traffic
•URL Blocking
•Shaping
Sh i off VoIP
V IP
•Blocking of VoIP and Skype

Commu
unication
ns Monitoring

IP interception, shaping and blocking

Satellite Monitoring
•Thuraya
y

CONFIDENTIIAL

•Inmarsat

Satellitte Monitoring

CONFIDENTIIAL

Satellite
Monitoring,
Monitoring
Thuraya

CONFIDENTIIAL

Thuraya
Coverage map

Satellite
Monitoring,
Monitoring
Thuraya

Strategic Thuraya Monitoring System TMS

Satellitte Monitoring

CONFIDENTIIAL

Marlin Portable Tactical Unit

Satellitte Monitoring

CONFIDENTIIAL

Satellite
Monitoring,
Monitoring
Thuraya

Satellite Monitoring, Thuraya Statistics

Thuraya Activities for
one full day (24 hours)
taken on 11.12.2007 for
nearly all spot beams

CONFIDENTIIAL

Number of calls made
from 92 countries

Satellitte Monitoring

CONFIDENTIIAL

Satellite Monitoring,
Inmarsat

Typical Inmarsat
Monitoring Setup

INMARSAT

6.4GHz
UP

1.6GHz
UP

1.5GHz
DOWN

3.6GHz
DOWN

CONFIDENTIIAL

LAND EARTH STATION
(LES)

1.5GHz
DOWN

INMARSAT MONITORING SYSTEM
(IMS)

MOBILE EARTH STATION
(MES)

•Extensively or selected interception and recording voice, facsimile and data calls
to and from selected terminals
terminals.
•Voice calls may be monitored in real time, or recovered and played back from the
system database.
•Facsimile and data calls may generally be displayed with the simple viewer
incorporated in the system, or exported.
•The generic system is capable of monitoring and recording Inmarsat A, B, C, D, M
and mini-M signals, including High Speed Data (HSD) signals used by B and M4
(GAN) terminals

Satellitte Monitoring

3.6GHz
DOWN

Radio Frequency Monitoring Systems
Tuner
-Wide Band Signal Acqisition & Processing
-Signal analysis
-Automatic detection and classification
-Demodulation & Decoding

CONFIDENTIIAL

Antennas

Work Station for COMINT
signal analysis

Commu
unication
ns Monitoring

Broadband Technology

Radio Frequency Monitoring Systems
MIRA-System Wideband Analyzer for HF/VHF/UHF

Exemplary workstation configuration comprising of PC, two
TFT-displays and an active loudspeaker box.

Commu
unication
ns Monitoring

CONFIDENTIIAL

Reconnaissance, Recording, Analysis

Signal Analysis / Detection / Classification with Virtual Device Technology

-Demodulation
-Decoding

-Time Signal Analysis
-Spectrum
p
Analysis
y

CONFIDENTIIAL

-DF-Analysis

Commu
unication
ns Monitoring

-Classification

Algorithms:
-Wattson Watt (HF)
-Amplitude
Amplitude Corelation (VHF, UHF)

CONFIDENTIIAL

-Interferometer

Commu
unication
ns Monitoring

Broadband Search and Direction Finding Systems

Commu
unication
ns Monitoring

CONFIDENTIIAL

Speech Detection

PABX Monitoring
Universal communications recording solution for many PABX models like
Siemens, Alcatel, Avaya, Mitel, Nortel, NEC, Panasonic, Ericsson, etc.

- Network wide recording of calls, data and fax
within PABX and PABX networks
- Analog and digital inputs up to 384 channels per unit

- Selectable Data Compression

CONFIDENTIIAL

- Scaleable
S
platforms
f

Commu
unication
ns Monitoring

- VoIP recording

Computer Monitoring: IT Intrusion
The FinFisher IT Intrusion tools for IT interception

Components:
•FinFisher USB Suite: - FinFisher HQ (GUI)
- FinFisher 1 (USB Dongle)
- FinFisher 2 (USB Dongle)
- FinFisher 3 (CD)

CONFIDENTIIAL

•FinFisher Remote IT Intrusion Kit (Remote info..)
•FinSpy (Professional Trojan Horse)
•FinFly
F Fl (To
(T infect
f Target
T
PC)
•FinTraining

Commu
unication
ns Monitoring

Usage:
•Information
f
G
Gathering
•PC Surveillance
•IT Intrusion
•Information Exploitation
•Information Interception

Computer Monitoring: IT Intrusion

Commu
unication
ns Monitoring

CONFIDENTIIAL

FinFisher HQ

Computer Monitoring: IT Intrusion
FinFisher 2
(Information Gathering)

Commu
unication
ns Monitoring

CONFIDENTIIAL

FinFisher 1

Computer Monitoring: IT Intrusion
FinFisher 3
2 Bootable CD-Roms:
CD Roms:
1. Removes password for selected Windows user account
2. Securely wipes local hard-disks

•Used for remote information gathering
•Provides up-to-date IT Intrusion environment (e.g. WLAN, Bluetooth, etc.)
•FinTrack operating system

CONFIDENTIIAL

•All major up-to-date IT Intrusion tools

Commu
unication
ns Monitoring

FinFisher
s e Remote
e ote IT Intrusion
t us o Kitt

Computer Monitoring: IT Intrusion
FinSpy

Features:
– Custom Executables
– Bypasses Anti-Virus/Anti-Spyware
Anti Virus/Anti Spyware Software
– Location Tracing
– Scheduled Operations
– Key
K Logging
L
i
– Password Gathering
– Webcam/Microphone Access
– Communication
C
i i Sniffing:
S iffi
• Skype
• Instant Messengers (ICQ, Yahoo, …)
– Other

Commu
unication
ns Monitoring

CONFIDENTIIAL

•Professional Trojan Horse
•Monitor and remotely access one or multiple systems
•All communication is hidden and enciphered

Computer Monitoring: IT Intrusion
FinFly

Trainings
T
i i
•FinTraining: Basic IT Intrusion Courses
•FinTraining Advanced: Exploiting Software
•FinTraining
Fi T i i Advanced:
Ad
d R
Rootkits
ki
•FinTraining Advanced: IT Intrusion VoIP
•FinTraining Advanced: Wireless IT Intrusion
•FinTraining Advanced: Covert Comms

Commu
unication
ns Monitoring

CONFIDENTIIAL

•Used to infect executables while downloading
•Components:
– Transparent HTTP Proxy
– EXE Loader
•Proxy attaches Trojan Horse software to downloaded executables on-the-fly
•ISP Version to come in 2008
•Etc.
•Etc

Link Analysis

Search for hidden relationships and non-trivial communication patterns

A

C
B

T
hidden
middleman „M“

E

M

33

R

D

CONFIDENTIIAL

... Calling partner
... Monitored subscriber
... Individual groups of suspects
Link Analysis

S

Commu
unication
ns Monitoring

40

Commu
unication
ns Monitoring

CONFIDENTIIAL

Link Analysis

Link Analysis

Jammer Systems
Counter Surveillance
Encr ption
Encryption
Detection
IT Security & Forensic
Lockpicking & Silent Drilling
Tracking
Surveillance Vehicles
Recorders
CONFIDENTIIAL

VIP Protection
Audio Surveillance

• Jammer Systems (Low Power)

Counter
Surveillance Jammer
(20Mhz-2,4Ghz)

Low power room GSM jammer,
jammer
(900/1800 Mhz)

Jamme
er System
ms

CONFIDENTIIAL

Medium Power GSM
Room Jammer

• Jammer Systems (High Power)

Remote Controll Unit
Vehicle Installation External View

Wide Band Jammer
25-2500 Mhz 100 Watts
programmable

CONFIDENTIIAL

U Vehicle
Unit
V h l Installation
I
ll

Mission Editor (GUI on PC)

Antennas

• Jammer Systems (High Power)

VIP Protection
High Power
Convoy Jammer

Jamme
er System
ms

CONFIDENTIIAL

(20Mhz- 6 GHz)
250 Watts

• Counter Surveillance
TSCM

Counte
er Surveillance

CONFIDENTIIAL

The Threat

• Encryption

CONFIDENTIIAL

PSTN, GSM, Fax, E1, Email, Harddisc

Encrypttion

SW + HW – based encryption solutions

Detectiion Syste
ems

CONFIDENTIIAL

• Detection Systems
X-Ray

• Detection Systems
CBRN Detection

Handheld for Explosives,
Chemicals and narcotics
Document Scanner

CONFIDENTIIAL

Explosive and
Narcotics Scanner

Scanner for Explosives,
and
dN
Narcotics
ti
Walk Through Detection

• Lock Picking

CONFIDENTIIAL

Car Opening Tools

Stethoscope

Decoder for certain Locks

Lock Picking Sets

Auto Dialer for
Combination Locks

Lock Picking & Silent D
Drilling

C
Covert
Methods
M h d off Entry
E

• Silent Drilling

CONFIDENTIIAL

Manual Low Noise Drilling Kit

Low Noise Drilling System

Automatic Covert Low
Noise Drilling Kit

• Tracking Systens GPS/GSM/GPRS

Box

With Google
Earth Maps

Tracking

CONFIDENTIIAL

Board

Recorders

CONFIDENTIIAL

• Minaturized Recorders (Audio and Video)

• Miniaturized Audio Surveillance

Audio S
Surveilla
ance

CONFIDENTIIAL

Wireless & wired, analogue/digital, remote controlled, encrypted

Video S
Surveilla
ance

CONFIDENTIIAL

• Miniaturized Video Surveillance

• Audio & Video Filtration Systems

Video Enhancement Laboratory

CONFIDENTIIAL

Audio Processing Laboratory

• Surveillance Vehicles
- Mobile Surveillance Platforms integrating command, communication and surveillance
- Audio and Video Surveillance
- Communication systems (GSM, SAT, Trunk Radio, etc.), specialist covered antennas
- AC and heating Systems
- GSM Monitoring Units (Active and passive)
- Tracking Systems

CONFIDENTIIAL

- Remote Control Car Systems

Surveillance Ve
ehicles

CONFIDENTIIAL

• Surveillance Vehicles

• Training
Training services form an important and often
integral part of implementing successful security
operations.
A major factor in our philosophy is the belief that
training and the understanding of products and
technology are critical factors and major strengths
in finding successful security solutions.

CONFIDENTIIAL

Elaman highly trained personnel are called upon by
many government security organisations to give
advice and consultation.
consultation
Elaman have organised and developed a highly
successful training programme designed to
benefit government security personnel at many
levels not only for operational techniques but also
important stages of maintenance.

CONFIDENTIIAL

• Typical Training Courses


Management Training



Operational Training



Technical Training



Covert Concealment



TSCM Basic & Advanced



Document Opening



Lock Picking - Basic & Advanced



Covert Methods of Entry



Insertion Techniques



Video & Photographic Surveillance



Audio Surveillance



Intelligence Data Base



VIP Close Protection

ELAMAN works closely with clients to develop a total system
solution to their needs and to ensure that they are equipped,
a ed aand
d manned
a ed to
o meet
ee the
e formidable
o dab e cchallenges
a e ges in the
e field
ed
trained
of communication.
If you would like further Information about ELAMAN, or would like
to discuss
di
a specific
ifi requirement
i
or project,
j
please
l
contact us at:

CONFIDENTIIAL

Elaman GmbH
G
German
S
Security
i Solutions
S l i
Seitzstr. 23
80538 Munich
Germany
T l +49-89-24
Tel:
49 89 24 20 91 80
Fax: +49-89-24 20 91 81
[email protected]
www.elaman.de

Thank You.

Document Path: ["elaman-company-presentation-04-2008.pdf"]

e-Highlighter

Click to send permalink to address bar, or right-click to copy permalink.

Un-highlight all Un-highlight selectionu Highlight selectionh