Name: FinFisher, FinSpy Mobile

Text: -...:
V

O•
GAMMAGROUP



FI1f t I N I L I

GAMMA
N E W S L E T T E R S 1314 2 0 1 0

GAIVIMAGROUP
INTRODUCTION & INDEX

Dear Customers,
Our 2010 newsletters show a range of selected equipment from Gamma Groups
capabilities in the fields of Tactical & Strategic Surveillance and Monitoring Systems,
which can operate independently orwithin a system design.The equipment can be tested
and demonstrated upon request. We look forward to hearing from you.

INDEX
COMPANYPROFILE

2

EXHIBITIONS OVERVIEW 2010-2011

3

IT INTRUSION SEMINAR

4

(GAMMA INTERNATIONAL UK LIMITED)

FINFISHER IT INTRUSION

5

(GAMMA INTERNATIONAL UK LIMITED)

STRATEGIC COMMUNICATIONS MONITORING SOLUTIONS

8

(GAMMA GROUP INTERNATIONAL)

TACTICAL COMMUNICATIONS MONITORING SOLUTIONS

1

8

(GAMMA GROUP INTERNATIONAL)

TECHNICALSURVEILLANCE SYSTEMS -VANS/CARS

2

6

(GAMMAISE LIMITED)

TECHNICALSURVEILLANCE EQUIPMENT

3

4

(GAMMATSE LIMITED)

DATARECOVERY & FORENSIC LABORATORY

4

5

(GAMMAISE LIMITED)

TECHNICALSURVEILLANCE COUNTER MEASURES

4

6

(GAMMATSE LIMITED)

VIP SECURITYPRODUCTS

4

9

(62 SYSTEMS LIMITED)

INTELLIGENCE GATHERING &TECHNICALTRAINING SERVICES

5

4

(62 SYSTEMS LIMITED)

INTELLVIDEO/AUDIO CONCEALMENTCOURSES

5

(62 SYSTEMS LIMITED)

GAMMANEWSLETTERS 04 2010

6

GAMMAGROUP

GAMMA
NEWSLETTERSC142010

C O M P A N Y PROFILE

GAMMAGROUP

TROVICOR'S NEW SHOWROOM

Gamma Group is an international manufacturer of
surveillance systems based in Germany and the
United Kingdom, providing advanced technical
surveillance, monitoring solutions and advanced
government training as well as international
consultancy to National and State Intelligence
Departments and Law Enforcement Agencies.
Since it was founded in 1990, the group has
expanded and now has four separate companies
under its wing: GammaTSE, Gamma International
GmbH, G2 Systems and Gamma International
UK. In 2005, Gamma opened a company in the
UK specializing in CBRN and VIP security, and in
2006 opened a partner office in Singapore called
Global Surveillance Systems.

Gamma has established a partnership with
trovicor, formerly Nokia Siemens Networks,
successfully collaborating i n joint ventures,
complementing each other's strengths. trovicor,
which is based in Germany, with offices around
the globe, is the world leader in communications
monitoring centers, and combined with Gamma's
support, have iointly carried out major government
projects worldwide.

cv

citAimAnA

cv

GAMMAGROUP
Tel. + 4 4 1264 332 411
Fax. +44 1264 332 422
infoOgammagrouo.com
wwwgammagroup.com

SALESCONTACT
Brydon Nelson
Tel. +44 7818 446 302
IrOgamme2systems.com
Stephan Oe!kers
Tel. +49 172 8425162
songammagroup.com
Emmanuel Chagot
Tel +46 768 66 66 09
[email protected] corn
Johnny Debs
Tel. +44 7990 572 299
idebsOgammagroup.com

Derek Myers
Tel +44 1264 332 411
[email protected]

Carlos Gandini
Tel. +49 172 8619001
[email protected]

iystecni Audio V i d e o MOnitoiing
Product Surveillance Vehicles

Pro,ibiDn of 5.erViLeS
COIIIMUllitaflOnS Monitoring

The Enduser's Vision is Our Mission

V/mivut
csA
II intrusion 5ales & Pcolects
Technical inttailation,

G2SYSTEIVIS

trovicor h a s implemented a professional
showroom providing l i v e interception a n d
monitoring capabilities, based on true operational
scenarios, which include an airport lounge, a
hotel room and a business office. Government
end-users are welcome to visit these specialist
facilities at trovicor headquarter in Munich. For a
demonstration please contact Mr. Stephan Oelkers
and/or Jesper Mathiesen at trovicor.

Providing Highest goality
on Operational & technical
[raining

In 2009, Thomas Fisher joined Gamma International
GmbH as the IP Monitoring Specialist and has
recently released the FinFly ISP system. I n
October 2010, Carlos Gandini also joined Gamma
International GmbH a s General Manager o f
FinFisher Germany.
The Group alliance of companies consists of.
GammaISE
Gamma International UK
Gamma International GmbH
G2systems
Elaman GmbH
GSS Singapore
CBRNTeam Limited
TS Comms
Fink Secure Communications

GAMMANEWSLETTERS 042010

2

with
works,
itures,
ovicor,
iround
at ions
mma's
nment

sional
and
itional
ige, a
nment
cialist
For a
elkers

Itpr



GAIVIIVIAGROUP

GAMMA
NEWSLETTERSQ42010

EXHIBITIONS
OVERVIEW 2010-2011

Dates N e w s
25 - 27
1
r

Oct. 2010

08 - 10

& Events

Milipol Qatar
Doha, Qatar

ISS World Asia Pacific ISS WorIdj PA 4 z

Dec. 2010 K u a l a Lumpur, Malaysia

21 2 3

ISS World MEA

Feb. 2011

UAE,Dubai

22 - 24
Mar. 2011

HOSDB

14- 16

/SS World Europe

June 2011

18 - 21
Oct. 2011
On Demand

!SS World HEA

Farnborough, UK

Home Office

ISS World E44
E444 4

Prague, Czech

Milipol Paris

Milipol
PARS

Paris, France

IT Intrusion Seminarr

Partner Companies

trovicar

MICRO SYSTE MATI ON

intelligence solutions
Accelerating Your Mission.

COE11-114171

communications
M I _ Technology

Polaris Wireless
XAD
COMMUNICATIONS LTD

utimaco® Detica

7 AVA S Te c h

amember of the Sophos Group

GAMMANEWSLETTERS 04 MO

3

GAMMA
eq

u

t

v

l

i

GAMMA
NEWSLETTERSQ42010

IT I N T R U S I O N S E M I N A R

FINFISHER IT INTRUSION SEMINAR
It is with pleasure that we offer our services
to provide to your esteemed department an IT
intrusion seminar for 2 days.The theme behind the
seminar is to introduce the latest techniques in IT
intrusion which will be presented by our IT experts.
The 2 day seminar will cover all the theory and live
practical demonstrations as well as discussions
on building up your own IT intrusion team. On the
2nd day we will also do a full demonstration of the
FinFisher Intrusion and Hacking Portfolio as well as
reviewing all the training courses our company can
provide you.
We attach the following documentation
• Seminar Invitation
• Seminar Agenda
If this seminar is of interest to you we would like to
agree on the following points.
• Location of the seminar
• D a t e of the seminar
• Number of Personnel attending from your side
• A n y required security clearance for our
personnel
It would be our pleasure to speak with you any
time at your convenience to discuss any issue ref
to this seminar and to provide more information.

1
4

Day1
• W h a t is IT Intrusion?
• Recent Cases (Attacks on Networks,
Cybercrime and more)
• Common Techniques (Samples on Intrusion to
Infrastructures and Systems)
• Intrusion Technics
Day 2
• Common Techniques continued
• Government IT Intrusion Solutions
• R e a l like Intrusion Operation
• FinFisher Portfolio

GAMMANEWSLETTERS 042010

4

GAMMA

OflOLJP I N T E A P P N AT I O N A L

FINFISHER
IT I N T R U S I O N

FINSPY MOBILE
Target Features
• B a s i c Communication Interception like Calls,
SMS/MMS, Call Logs
• Access to stored information like AddressBook
• Recording of incoming and outgoing [-Mails
• LocationTracking (Cell IDs and GPS Data)
• L i v e Surveillance through Silent Calls
• BlackBerry Messenger surveillance
• Supports all common phones: Symbian 8/9,
BlackBerry, iPhone (jailbreak required),
Android, Windows Mobile and Maemo

FinSpy Mobile is an advanced Intrusion system
FinSpy
which once implemented into a Target Phone
guarantees full access to the communication and
built-in features.
Key Features:
• Stealth: Hides software deep inside infected
phone
• Communication: Full monitoring of all activity
• LocationTracking: via GPS and Cell-ID
• Remote Audio Surveillance: Implemented
through silent calls
• Supports all major phones: New Systems are
permanently added

FinSpy Mobile Setup
The FinSpy Mobile server is connected by infectedIarget Phones over the Internet (GPRS / UNITS /Wi-Fi)
or through the PHI Cards (SMS / Phone Calls).
The infectedTarget Phone
communicates through
GPRS/UMTSAA/iFi or
SMSNoice-calls

• • • Ta r g e t P h o n p
C5AP
5 &Kite 4 . 0
4 V4prtrop

F i n S • • Montle M a s t e r

The FinSpy Mobile Master accepts the
connections and stores the data inside the
database

•••• 1-elSpy AqL nt

User Interface
The Whole System is controlled through the graphical User Interface.
• Ap••••• •

• ‘,4, •

A214



a

.319

loma,nows.rs



•••
41•

'

• 11•••••4 •

• ••••••••••••• •

a

mei

• L•alows

010•.•••••ek

•m•Vd,00,11,1
lonswort,.

0.
wow,

a n .

a4.0*
a•oftml,

r. c . t r o o * m

s U e FA41•01

Om, "go •,••••

A * 6 , 0 0.4S0

4•P• IA al tA., AP

111101

INS A.141PUS

104.• 0 1 . PAPallk

AOS11124. IAA

PPMAZ at 'yam:

100101011

- - - M - P

m o w n Wit T1

nonnomm

PROP

•Pmtt PE PAU As

dommm.km

= P M 01.26

AP= n f l .

4111,

1•PAA

Alge•14E PIM",

c,m0

P•PAP•abt•UPA•

4.
Pcms..14.••13.

GPSTracking

Intercepted SMS
N o l a n TOM.

2000l T -OS Z t 1 0

Serve. Thaw

2006WAS

PtpurPE
tpurPE Atunlimpt

• pomp Tom

bon

,01••,amq

D i n a

• Onion Tom •

XPIPIAPAIE1116111

111110.1,1111M1

LIM

• 1:••••• •

• Pim.

-


• ' ,

0••••••••
0040170237454119

£* h c l !Name
We avow

M e , M o a t El

4
GAMMANEWSLETTERS 042010

GAMMA

tiL

GROUP I N T E R N AT I O N A L

GAMMA
NEWSLETTERScm2010

S T R AT E G I C C O M M U N I C A T I O N S
MONITORING SOLUTIONS

MONITORING CENTERFOR LAWFUL INTERCEPTION
Gamma Group international is a reputable monitoring system integrator for GSM/3G networks. Our
Monitoring Center (MC) is a system designed to enable Law EnforcementAgencies (LEA) and government
agencies to perform Lawful Interception (LI) monitoring in an auditable, secure and reliable manner.
It handles intercepts of voice and data in fixed and mobile networks, on the Internet or other IP networks.
Within the two general forms of intercept, voice and data, it manages a wide range of communication
methods.
The system installations can vary in size from a few computers to an extensive system of many recorders,
data collectors, system servers and clients, depending on the application. Its complexity ranges from
simple passive connection, to a single trunk line, to being responsible for monitoring an entire country's
fixed, mobile, NGN and internet networks.
Sophisticated user-rights and access control mechanisms have been designed to meet the organizational
needs of Law Enforcement and Government Agencies.
The implementation is not rigid and these mechanisms can be used to suit most organizational structures
and variations within the ETSI standards.The mechanisms also build upon the MS Windows environment
to offer a secure but flexible application.
The system performs these monitoring and management tasks from a scalable, distributable and reliable
platform with facilities to ensure the security of the system and intercepted data. Its architecture is
modular, which allows systems to be built and scaled as appropriate to the customer's needs.
The Monitoring Center supports a wide-range of fixed and mobile switches, Internet ISP and backbone
interception points, NGN networks and mobile IP It can decode fax and local loop internet from circuit
switched networks and all popular Internet protocols from IP networks.
Through add-on product interfaces, the MC offers its data for further analysis and intelligence extraction.
It is currently in use in more than 60 countries.

LA I:4.
Lep
,,
•••••••

• • • ••••••-•

0

1 1 1 1

P

i

•.1..1 , , , , ,

o

.

.

.

w

1

o

o

dwa

••=••••ott4O,

.....%••••••••



%.10

diEl•

"trawl

. •

e t Eon i n

lokfm) haml
knit ortatotlist

iczens tionockt I cr. •
toys
SBA ~ A I
1 1 1 0

2G 2 5G 3G GSkk
at C00404 olsiworto

•.

conyeagal

GAMMA NEWSLETTERS 04 2010

8

Wil I

GAMMA

GIROUP I N l P P N A T I O N A L

S T R AT E G I C C O M M U N I C A T I O N S
MONITORING SOLUTIONS

Our
ment

The FinFly ISP System is designed to remotely install the Remote Monitoring Solution (e.g. FinFisher
Fin
FinSpy)
on selected Target Computer Systems by integrating the system into an ISP's IP-network
infrastructure. FinFly
Fly ISP optional Addons include IP shaping and Blocking.

forks.
ation

A FinFly ISP System typically consists of the following Appliances and Functional Groups:
A)Target Infection Server(s)
• F i n Fly ISP Infection Proxy Server

•ders,
from

B)Target Identification Server(s)
• F i n Fly ISPIarget Identification Probe / RADIUS / DHCP Probe

ntry's
:ional
tures
ment

C) Management System
• F i n n y ISP Management Server
• FinFly ISP Management Workstation
D) Network Equipment
• Bypass Switch Function, Switches, Passive Taps, 19" Server Racks), UPS etc.

liable
ire is

R i n e ISP
Intection R o n RI
Zr IOGE

DSt AM

bone
ircuit

BRAS

nit AM ACCESS

FthFI ISP
Inlet lion Piney A?
Zr 1061

ction.

ore
Ft

Gf passive Tap r;
finny ISP
RADIUS Po obe g)

GE passive Tap t i
Fbfly ISP
RADIUS , b e ot

teo ISP
RADI
DSE

I

Fel Ely ISP

Mbilagen.nt

A

°

Management Serve,

aaaaa t tor

lair
Feetiv SP IVItt,..16,

The FinFly ISP System is managed centralized from the LEAs premises using the FinFly ISP Management
System.
The user will administer targets for infection by entering the appropriate target data via the easy to use
GUI on the Management Workstation.The Management Server will distribute the necessary commands
to the FinFly ISP RADIUS Probes and Infection Proxies deployed in ISP's network.
ATarget is added to the FinFly ISP system using its access data like "dial-in phone no" or "username7
In case the target has a fixed IP-Address this IP-Address will be entered into the system. In,this specific
case the RADIUS Probes are not involved in theTarget Identification process.

GAMMANEWSLETTERS 04 2010

9

GAMMA

i N O U F I N T E R N AT I O N A L

GAMMA
NEWSLETTERSO42010

S T R AT E G I C C O M M U N I C A T I O N S
MONITORING SOLUTIONS

IPMONITORING
FinLI is a Front-End system to capture IP data from IP networks according to the requirements of Lawful
Interception (LI) or Intelligence Monitoring (IM). It provides the captured IP data to the Law Enforcement
Monitoring Facilities (LEMF)—Monitoring Center according to several international standards like ETSI
and CALEA (and some other formats).
The IP Probe components are based on high-end standard server technology and are deployed in the IP
network (ISP network) using passive tapping devices to ensure working with a 100% copy of the complete
IP traffic without interfering with the network i t s e l f
operators.
By using a wide range of sophisticated filtering methods, realized with Deep Packet Inspection, FinLI
can provide the target and/or application data needed. LI implements many differentTarget Identification
procedures, like RADIUS dialog sniffing or active communication with the AM-Servers in the access
network to identify the targets of interest currently active in the network.
For Intelligence Monitoring, which is nottarget based, but related to Application Monitoring (e.g. identifying
and recording of Webmail traffic or specific files transferred via the Internet), theTarget Identification is not
an issue. In this case, the IP Probes will inspect the traffic bit by bit to identify applications and files and
then will provide the data, in addition to the source and destination addresses, to the Monitoring Center for
storage, archiving and evaluation.

+

LEA

A

u

L

LEW

LiOS

N t ,

Transport Net
- - • • • = o 0 1 • •

tikelF
(oo• to N
a
i

ADSL

Target

C o l

Pa,

I

TAPI. &

PROSEs

Ii

ATM PPP
ATM OW P

VDU
C a l

litha,rot PPPc
oKp

Ad eve,

M M I I M

Cablo

N

Network
Elements

GAMMA NEWSLETTERS 04 2010

1 1 1 1 .

Nbrideltill, (LA

•••.---• C C & POI

10

MMA
SLITTERS(142010

S T R AT E G I C C O M M U N I C AT I O N S
MONITORING SOLUTIONS

LAWFULINTERCEPTION
: Lawful
'cement
ke EIS I

)mplete
letwork

n, FinLI
fication
access

ntifying
nis not
es and
nter for

Lawful Interception (LI) is the legally approved
surveillance o f telecommunication services,
and has become a n important tool for law
enforcement agencies (LEAs) around the world for
investigating and prosecuting criminal activities
and terrorism. Most countries have passed laws
that require telecommunication service providers
to support LEAs with duly authorized requests to
identify, monitor, and deliver all of the electronic
communications o f specified individuals and
groups. While regulations and requirements
vary from country to country, international and
US American standardization bodies like ETSI
or ANSI have developed technical standards for
LI that will facilitate the work of LEAs and help
operators and service providers to minimize their
costs. Although various standards for LI use
different terminology, the basic functional model
shown in figure 1 applies to all LI standards and
to all network and service types.

The main functions of any LI solution are to
access Interception-Related Information (IRI)
and Content of Communication (CC) from the
telecommunications network and to deliver the
information in a standardized format via the
handover interface to one or more monitoring
centers of law enforcement agencies. Of course,
before surveillance can take place, interception
requests must be approved and appropriately
provisioned to the Interception Access Points
within the service provider's network, and they
must be carefully and accurately terminated after
the interception authorization expires. In addition,
high security requirements for LI systems are
essential to prevent possible manipulation and
misuse.

- . 1111

rt•
•••

W

I A

A

W

L

Wollobera O r a =



9

0

1

4



...crab= Dec= a

, NOW a

•.%

1

1

=

C a l m = 1111.

G

a

m

o

w

Plipraralairabba W e =

s b a e p i m erabralA

LEA

o.lilto C • n l a .

V

Po M t n *

A b r a m = arawfaco

ibli b o o r o p s o n Fitammit 1 = = = =
CC C O O S ( of 0 . 1 = m m / r a m .

P l o r a b o r a r a a

INt a a M a m a s Oratwob smarattoo = i t Pralracrarace
doe C C a m r a o r p .
K l 143 S t a i n d m i W i d o w ollortino
A r m y bri i

R

I

a m a

irrawmomot

ang C C ravrarage

Figure1

GAMMA NEWSLETTERS 04 2010

11

GAMMA
OPO

GAMMA
NEWSLETTERS(142010

S T R AT E G I C C O M M U N I C A T I O N S
MONITORING SOLUTIONS



DATARETENTION SYSTEM
Data Retention System refers to the process of storing call detail records and subscriber data for various
telecommunication services for a period of several months and years. Law enforcement agencies and
intelligence services regard the access to retained telecom data as an important pillar of criminal
investigation and the prevention of terrorism. The common objective is to use the data to identify and
trace suspects, uncover social networks among terrorists, or to collect admissible evidence for court
proceedings.

• . 4 1 • • • • 11

21
•••••-•40,ro.•

Key Features:




• Collects communications data (CDR, IPOR) and subscriber data from any telecommunications
network
• Retains large amounts of data in a powerful and secure data warehouse
• Provides very fast search and analytics in billions of data records
• Automates request processing and delivers data to authorized agencies by fax, e-mail, or secure IP
interlaces
_
•mit

DMANMAnion $ufi*

Stema90
iikinsinomord



FINKtIOn


a

Rogo•at Pasnagmr.ni
a Repot imp

GAMMA NEWSLETTERS 04 2010

12

IT

S

tt

i

G
AMMA
1511;OUP i t q l
GAMMA
NEWSLETTERSQ42010

S T R AT E G I C C O M M U N I C A T I O N S
MONITORING SOLUTIONS

COMMAND CONTROLCENTER, CENTRAL
CONTROLROOMS, CRISIS MANAGEMENT CENTER
Today's complex control centers consist of many individual components.The System is able to cover all of
the core tasks of a control center with a variety of specific products.These products are fully comparable
within the system, of course. Moreover, they are fitted with highly flexible interfaces.Thus, in addition to the
core tasks of a control center also all other tasks and functions can be executed and integrated under one
user interface—integrated Command Control Centers.

When it comes to the core technologies of a modern command center for public authorities and
organizations with security tasks, the system provides all the necessary features and elements This
••.
includes:
• H o s t computer software
• Geographical information system (GIS)
• Switching technology (radio and emergency calls)
• Integrating and interfacing of various systems (communication-Tetra and Monitoring systemsAudio-Video-data-Telco, etc.
The Systems core offerings are complemented by special software for the smooth operation of technical
administration in a command center, as well as the functional and ergonomically designed command
center desk.

GAMMANEWSLETTERS 04 2010

13

Vo
G A M M A
Li,ULA-

GAMMA
NEWSLETTERS(1142010

S T R AT E G I C C O M M U N I C A T I O N S
MONITORING SOLUTIONS


Easy recording of incidents, recommends resources to the dispatcher and can be used for automatic warnng
processes. Appropriate interfaces for numerous interesting control variants.

• • = 1 1 = 1 • • • 1
111 C 1 = E 1 = = = 2 = 2
1 = 1
M I M E IME=1111 M a l l =


NM Iii•EnE;1=ZIE

=
1
=
• = 2

.
Mom=
1 = 2

1

1 • = 1 = •
= 1
OL=I1
E : ; ;
0
•• •
:C=M

• = = = = • • • • • = = = • • • •
E D = M i
C Z = M=L=E M C I = I I I 1 = = 1 K Z =
1 = 2
- '
M E M
• • • •
M
E
M
IN=EM

• • • • • • • • • 1111111111111•111 •
,

§ = § c : = 1 E = E mcomm=s o==21
- c
i
s
m
e
ME:=0 ILI=M

O r =

i I = E n = a

1

11111W—milid

: :
•L

e
8

Geographics information system (GIS) that visualizes the position o f the place o f incident/
Operatrionietc.
GIS-Data turns into images.



GAMMA NEWSLETTERS 042010

14

CIROUP I N T E R N A T . : . At L

GAMMA
NEWSLETTERSWI 2010

S T R AT E G I C C O M M U N I C A T I O N S
MONITORING SOLUTIONS

NEWPORTABLE REMOTETHURAYA
MONITORING SYSTEM (TMS)

dent]

A New IMS Portable Remote [band system
has been launched which can be used with the
existing strategic MIS for increased coverage of
the Thuraya network. Each Remote system can
monitor up to
the monitoring capability of your existing strategic
system for increased coverage of a selected area
of interest; a single Remote System could double
the area o f coverage. Designed for maximum
portability and rapid deployment, the Remote
System is encased in a ruggedized, modular
casing which can be broken down into 4 individual
components for safe transportation.The portable
design enables the system to be easily relocated
in response to changing targets and areas of
interest. Users can assemble the system and it
can be fully operational in 30 minutes.

INMARSAT/ I-SAT MONITORING
Inmarsat is the most experienced and widely used satellite in the air sector, sea sector and is gaining
more and more interest in the land sectorThe number of subscriber has been increased in the last year
and new services have been introduced like ISAT-Phone. Due to these effects the monitoring of Inmarsat
has become important for Lawful authorities.
ISMS ilsatPhone Monitoring System) offers a complete solution for the passive monitoring and
interception of the IsatPhone in the air, sea and land network on both a strategic and tactical level. Using
C-band and 1,band monitoring, the ISMS can provide national and regional coverage for the monitoring
of IsatPhone, FleetPhone and LandPhone terminals. In addition to call content, the ISMS solution can
provide information on the date and time of call, the numbers dialled, as well as the call originatorThe
system can also provide the interception of fax and data transmissions.

IMO

.

• 3 0 nt P 3101

I

I O W UPi.1"1

1 00W104.11

3 301te EnVON,Nyt

iszaP3olto 313600
r o d . 3 4 . . 0 o 01E31
G • . • , 54.u.

TZ;LeK
S a l m i . liamassr.,
Spolont 111.1111.t

GAMMANEWSLETTERS 04 2010

15

GAMMA

n r I n u p i N T E g N AT I O N A L

GAMMA
NEWSLETTERSQ42010

S T R AT E G I C C O M M U N I C A T I O N S
MONITORING SOLUTIONS

PASSIVEA-INTERFACE MONITORING FOR GSM NETWORKS,
PASSIVE MONITORING OF ENTIRE GSM NETWORK
The A interface between the MSC (Mobile Switching Center) and BSC (Base Station Controller) consists
of El or STM-1 trunks.The System solution monitorsTDM.
A-Interface links between BSCs and a MSC. It detects calls and text messages on these links and
captures IRI and uncompressed a i l ] A-Law or p-Law audio associated with the intercepts. Monitoring
of A-Interfaces may be implemented with PDH 164 duplex El) or SDH gateways (2 x STM-1). In the future
we will also support direct Ethernet interfaces. A deployment unit may be used to monitor more than one
A-Interface and a number of SS7 links at the same time.The A-Interface solution assumes thatTMSts
are also unique within the context of a Location Area Code (LAC) and that the LACs are unique with
the context of the PLMN identity. In cases where TMSIs are not unique, different name spaces can be
configured. It may not be necessary to monitor all links between an MSC and its sub-tended BSCs.
The A-Interface monitoring solution is illustrated in the following diagram.

ri
MLR
•-•

IP

I — 7

A i r
---unommoono--•

1

•••• • •

YNAU

W.. re

With the A-Interface Monitoring System either specific GSM-cells can be monitored or an entire GSM
network. The system works completely passive and provides mass-storage capabilities and powerful
analysis tools for post processing of huge amount of data.

16

GAMMA NEWSLETTERS 04 2010
•••

d.•

isists

3and
bring
Uture
n one
'MSIs
, with
an be

GSM
ierful

GAMMA
o r q o u p

I N T E R N A .

S T R AT E G I C C O M M U N I C AT I O N S
MONITORING SOLUTIONS

WIRELESSLOCATORSYSTEM (WLS) FOR GSM /NTS NETWORKS
WLS is the only technology that provides high-accuracy mobile location, across all types of environments,
in a highly scalable and cost-effective way. The easy-to-deploy, easy-to-manage solution provides LI
applications with the precise location of mobile devices to accuracy within 50 meters, and gives Law
Enforcement Agencies (LEAs) real-time, post-event, geo-fenced and even predictive intelligence using
mass Location capabilities.
The Wireless Locator has the following applications:

Target-based Location Interception
Adding high-accuracy location information t o
target-based interception allows LEAs to monitor
fleeing suspects in real time and track a historical
"bread-crumb trail" of the wireless activity of a
specific user. The highly-accurate WLS solution
can pinpoint the location of mobile devices to the
exact building.

Mass Location Interception
WLS is the only location technology that enables
accurate mass location of all devices on a mobile
network. Mass location is especially helpful for
post-event analytics based on historical archived
data, identifying all wireless activity in an area
over a set period of time.This gives LEAs critical
investigative information about suspects after an
event - such as a bomb going off including who
was present, who they were talking to and what
they did in the immediate aftermath.


N I S M I M I l l % 11 6

Border-zone Location Interception
Border-zone location interception allows a n
electronic virtual fence to be set up around a high
security area or an international border, allowing
LEAs to track the location of wireless devices that
travel in and out of the area. The accuracy of the
WLS solution ensures that precise locations are
identified along the border zone, preventing even
marginal incursions.

GAMMANEWSLETTERS 04 2010

17

GAMMA
3r1,.

GAMMA
NEWSLETTERSG42010

TA C T I C A L C O M M U N I C AT I O N S
MONITORING SOLUTIONS

3GN IMSI CATCHER
36 Blind Call is a new software feature for the
36N UNITS system. It allows 36 phones to be
locked to the 3GN and placed in a UMTS blind/
silent call for tracking purposes. This is the only
way to establish blind calls to phones that are set
in "36 only" mode, and it removes the reliance on
passing the 36 phone to a GSM systemfor tracking
—the target phone stays on 3G frequencies at all
times.The 36-OF can detect and track the signal
from a 36 phone in a blind call, allowing the OF
operator to locate it.
Blind Call Features:
• N e w Acquisition mode for the 36N and OF target status for 36 phones makes operation simple
• Multiple 36 blind calls can be supported by each 36N Node B
• Automatic 36 power control ensures that Node B and phoneTX power are continually adjusted to
optimal levels to maintain the blind call
• T h e 36N can continue to take registrations from other 36 phones whilst maintaining a blind call to
the target phone
3G Direction Finder Features:
• Provides indication of target RSCP (Received Signal Code Power) to enable operator to judge
distance and bearing to target
• Features graphical and audio feedback of current target RSCP level for ease of use in challenging
operational scenarios
• Quick and simple to use with minimal configuration required

The 3GN captures the 3G phone
and places it into a blind call.
The uplink and
powers are automatically
adjusted to optimise the
connection to the phone.



:

:



.EM•11M.M.

Ob

1

1

owa o w e l l



••••P



m•





The 3G-DF locks on to the
uplink signal from the
Phone, allowing the DF
operator to track the
phone to its location.

GAMMA NEWSLETTERS 04 2010

18



GAMMA

G R O U P I N T I E F I N AT I O N A L

GAMMA
NEWSLETTERSG42010

TA C T I C A L C O M M U N I C AT I O N S
MONITORING SOLUTIONS

XPZWIRELESS IP
The XPZ is normally controlled by a Cat 5 cable that connects the laptop to the XPZ.
We can provide you our secure wireless IP connection instead of the cable connection enabling remote
controlling of the XPZ from a safe remote location.
This is possible in different ways:
IV units
• F o u r channels enabling four links to operate in the same area
• Secure wireless Link
• Output power of 100mW
• Simple to deploy and contain a battery (typically last for 2 hours)
• Range extensions by deploying additional units
High Powered Wi Fi units
• Longer range
• H i g h output 10-20W
• Incorporate 36 Router
COFDM MESH units
• Diversity reception to greatly enhance the range and copes better with multi path conditions
• MESH Network could be linked to www by secure 36 routerNPN or satellite connection

The RF unit can be used on four channels
enabling if necessary four links to operate
in the same area.
The Cat 5 cable can be replaced by a secure
wireless link. The RF units only have an
output power of 100mW so the range is
limited but may be more than adequate in
some operational scenarios. Naturally, the
range can be extended with the use of the
appropriate aerials and choice of frequency
band. The units are very simple to deploy and
contain a battery which would typically last
for two hours.

GAMMANEWSLETTERS(142010

19

GAMMA
NEWSLETTERSQ42010

TA C T I C A L C O M M U N I C AT I O N S
MONITORING SOLUTIONS

GSM OFF-AIR TACTICALSYSTEM INTEGRATION EXAMPLES

Drunidir eCI1C4tai
artlegind

Direcuopal
o r lenna
SUppty MOnitiOf
(24V)

GAMMA NEWSLETTERS 04 2010

20

GAMMA
G q 0 L 11

AMMA
EWSLEFERSG42010

TA C T I C A L C O M M U N I C AT I O N S
MONITORING SOLUTIONS

CELLANALYSIS FOR INTEL OPERATORS
The cell analysis system is an advanced Network
Survey Tool that delivers a comprehensive set of
accurate measurements o n GSM/PCN/UMTS
and 802.11 wireless Networks.The cell analysis is
supplied with software tools designed to collect
off-air data relating to network coverage. The
package provides the accurate RF measurements
needed f o r digital investigation o r forensic
examination, whether in real time or for historical
analysis. This Specifically important for intell
operators to technically analyze the network for
optimizing the use of Off-Air GSM monitoring
systems.

GIS MAPPING FOR OFF-AIR
GSM MONITORING
When using Off-Air GSM Monitoring system
linked to directional findings one of the critical
requirements is for the mapping systems with
high resolution details and updated Map data to
provide accurate readings during the Endusers
intell operations. With t h e Support o f o u r
Mapping partners we are able to provide exactly
this technology to enable to Geo locate targets
down to street levels. For further information on
our mapping facilities please kindly contact us.

VERSATILE HANDHELD
MEASUREMENT PLATFORM
The unit Pocket 9.0 is a versatile handheld
measurement platform t h a t both engineers
and nontechnical staff can easily use to collect
network measurements to enable Intel' operators
to optimize the use of Off-Air GSM monitoring
systems whenever and wherever the need arises.
A compact, light-weight, and robust measurement
application, The unit 9.0 runs on various Nokia
devices, enabling tests of GPRS/ EDGEMCDMA
networks in virtually any location.
This simple yet powerful tool provides users
with engineering trace records and a real time
visualization of the measured data on the display
screen. Users can set-up any desired connection
such as speech calls or video telephony, exactly
as a subscriber would.The important radio trace
and Layer 3 information is then recorded during
the connection sequence. Trace and logfiles are
always recorded, but no test scripts are executed.

GAMMANEWSLETTERS 04 2010

21

P

GAMMA

c . n r. n . I N T E R N AT I O N A L

GAMMA
NEWSLETTERS1242010

TA C T I C A L C O M M U N I C AT I O N S
MONITORING SOLUTIONS

TACTICAL GSM OFF-AIR MONITORING (PASSIVE)
1-GSMNARROWBANDMONITORING
The unit is an advanced multi-band fully passive
GSM interceptor designed t o intercept the
bidirectional traffic occurring between base
Transmitting Stations (BIS) and Mobile Stations
IMS) and located within the system operational
range.
As a receive only system, the unit is totally stealth
(no interference with the network) and has high
performances thanks to a unique architecture.
It offers real time communication interception (2
duplex voice communications per workstation)
as well as automatic intercepted communication
recording (systematic h a r d d i s k recording)
capabilities.
It is fully programmable and configurable via a user-friendly GUI including filtering and triggering
capabilities.
The system consists of three main parts:
• Receiver Unit
• Notebook Computer
• Antenna

Target and other
users are connected
to a Real BTS

4

However they see
the fake BTS

USERS/TARGETS

GAMMANEWSLETTERS 04 2010

22

GAMMA

G/ROUP I N T E R N AT I O N A L

TA C T I C A L C O M M U N I C AT I O N S
MONITORING SOLUTIONS

2- GSM WIDEBAND MONITORING
The product is a professional solution designed
on the basis of high technologies. It has the
following functional peculiarities:
• Flexible configuration, possibility of a quick

channel capacity extension to multi in one
unit or extensions by means of connecting of
additional Signal Reception and Processing
Units (SRPUs)
• Possibility of operating in a distributed
configuration that makes it possible to
build branched radio monitoring networks
covering large territory (e.g. Borders)
• H i g h sensitivity and a wide dynamic range of the radio reception device
• Capability of operating both in the real-time mode and in the delayed mode with recording all the
data received onto a disc and next session reconstructing
• Possibility of operating in the recording mode as a tactical device (visiting a place where a target is
located with the minimal hardware set)
• Software package includes embedded capabilities for analyzing of recorded communication
sessions and other information

k5
1-

r

tI

4

DL

U

L

GSMNetwork

Wideband Passive
System

IPTrattic
Interceptor
OPTIONAL

GAMMANEWSLETTERS 04 2010

23

G
AMMA
r 3 R o , . IN I L1F4A1 C N A
GAMMA
NEWSLETTERSG42010

TA C T I C A L C O M M U N I C AT I O N S
MONITORING SOLUTIONS

TACTICALINTERNET
MONITORINGSYSTEM
The System is developed to monitor, capture and
evaluate internet traffic on a tactical level. The
system does not reduce bandwidth and speed of
the targets connection. It can be connected to any
ADSL network. The system supports ADSL and
future generation ADSL2 and ADSL2+ protocols.
Two ADSL lines can be monitored simultaneously.

Features of Capture Unit:





I f needed, the system can capture the complete traffic
M A C address filter options to decrease the data volume
T h e Capture Unit is controlled by remote (encrypted)
F r o m ISP side the Capture Unit is invisible

Features of Operator Unit (Laptop):
• Provides substantial server control functions (maintenance, control of capturing services)
• Download data, sort and filter data, manage targets
• L o w weight and easy transportable
• C a n also be used as normal office laptop
• Support of all modern media and office applications

ANDROID SURVEYAPPLICATIONS
We have developed a number of applications
for the Android operating system as used on the
Google Nexus 1 phone.
These application will allow the following:
• Scene of crime survey tool
• Network coverage logging, all networks,
GSM and 36
• Logging of local WiFi access points with GPS
position
• Local display of logs on Google earth
• Display on Google Earth using exported KML
files
• Interface to any desired Database

GAMMANEWSLETTERS 04 2010

24

GAMMA

I N T E R N AT I O N A L

GAMMA
NEWSLETTERSI:142010

TA C T I C A L C O M M U N I C AT I O N S
MONITORING SOLUTIONS

HIGHPERFORMANCEPORTABLE RADIO MONITORING SYSTEM
The unit is housed i n a sturdy high-impact
transport case containing one or two receivers
with associated antenna interface circuity,
power management system and a laptop. The
built-in power management system allows
operation from three sources: mains, vehicle
battery or built-in rechargeable battery.The entire
system is light-weight and easy to carry. The
system can be specified with a single or dual
receiver configuration. In a dual receiver setup
it is possible to monitor the demodulated audio
signal of the received frequency, without any
interference, which is inherent to the pseudoDoppler technique.
The Direction Finding system employs t h e
proven pseudo-Doppler method, combined
with statistical signal processing, to deliver a
cost-effective, yet highly accurate DF solution
for government, military, law enforcement and
industrial applications.
The entire DF system comprises of fully integrated
receivers, battery, charging unit and control
circuitry in a compact sturdy carry case, ready
for quick and easy deployment anywhere, with or
without external power sources.
The fully weather-proof antenna system comes
with a sturdy tripod and employs 8-pole arrays for
1-IFA/HF and UHF frequency bands for maximum
accuracy.
The Multichannel Radio Monitoring System
is shipped in a specially designed ruggedized
19" rack-mounted chassis with built-in shock
absorbers, to ensure safe shipping.
The unit can then be either removed from the
enclosure, or operated from inside it. This is
particularly useful for mobile operation.
The system is shown together with a matching
antenna distribution unit which is also suplied in
a similar protective enclosure.
For stationary applications, various rack-mount
options are also available, ranging from a singleunit arrangements fpictured) t o large-scale
installations. For these, we provide complete turnkey solutions including antennas and antenna
distribution units.

GAMMA NEWSLETTERS 04 2010

25

GAN

G A M M AT S E

GAMMA
NEWSLETTERS(142010

TECHNICAL SURVEILLANCE
S Y S T E M S — VA N S / C A R S

SURVEILLANCE VANS

PwAi
o

We are a company backed by many years of
experience in technical intelligence techniques
and equipment.
We work exclusively on behalf of authorized
Government Security Departments and Law
Enforcement Agencies. As a result of many years
of "active service" for clients worldwide, our
assistance is highly sought after.
We will individually design surveillance vehicles
to your exact requirements, meeting with you at
all the major milestones during the design and
integration process to ensure that each vehicle,
not only meets your current needs, but can also
be upgraded in line with future technological
developments.
No two surveillance vehicles are alike. These
vehicles a r e especially designed t o meet
individual needs, such as vehicle type, finish,
operational usage, equipment for integration,
etc. Whatever you are looking for, from a very
basic surveillance, command or communications
vehicle, to a complete mobile command and
control center, we can provide a complete design
and integration service.

4

GAMMA NEWSLETTERS 04 2010

26

G A M M AT S E
TECHNICAL SURVEILLANCE
S Y S T E M S - VA N S / C A R S

VAN CONVERSION
Vehicle Conversion Overview:
• Includes: floor, walls, and front bulkhead,
ceiling framing; minimum of 50-mm polar
fiber insulation.The operational area inside
the van has 85 percent ECM screening
• Equipment, counters and cabinets, carpeting,
Formica finishing, wiring in plastic and
flexible conduit and junction boxes are
provided
• T h e interior lighting package includes all
necessary equipment and installation
• A i r exchange system
• Bench seat with 2 seatbelts (fitted when
space allows)
• Storage pockets
• Fixed front bulkhead wall with sliding entry
and exit door; side door window disguises
video viewing ports, IR Plexiglas inserts and
lens boot
• M a i n operator's control panel controls all
surveillance equipment and also monitors
the battery status and current draw of the
operating equipment
• Operator's chair with adjustable back,
360-degree swivel base, rail mounted
• Auxiliary Power System
• Freon Compressor Powered Low Noise Air
Conditioner
• I R Viewing Port Panels i.•

Basic Equipment Installation:
• Video Observation System 360° day and night
• Specialist Audio Receivers (Digital & Analog)
with Remote Control
• Vi d e o Diversity Receivers plus Outstation
Remote Control Links
• A u d i o Control System
• V i d e o Audio Matrix
• Video and Audio Processing of Targets
• Command and Control Software
• Communications Equipment
• Vehicle Security Alarm System
• Specialist Covert Antenna

GAMMANEWSLETTERSG42010

27

GAIVIIVIIATSE
GAMMA
NEWSLETTERSG42010

GAI
TECHNICAL SURVEILLANCE
S Y S T E M S — VA N S / C A R S

COMMUNICATIONS MONITORING
VAN INTEGRATION

Nw

POI
4•0

Model 7 0 0 7 Communications Monitoring
Surveillance Van represents a n e w era i n
communications monitoring platforms integrating
live off-air monitoring of GSM, UNITS, DF,ThurayaSatellite Monitoring and ITwireless LAN Intrusion.
The Communications Monitoring Surveillance Van
also provides links to the endusers headquarters
enabling on-site surveillance operations t o
be carried Out quickly and effectively. The
Communications Monitoring Surveillance Van
platform can be installed into various vans (i.e
Mercedes Sprinter, Toyota Hiace or GMC Cargo
Van) and provides operating areas for up to 3
operators. Included in the van is technical analysis
and workshop support areas.The Model 7007 is
constructed of high quality material and is built
by craftsmen with over 30 years of experience in
vehicle design and conversion.
Equipment Installation Options:
• A c t i v e Off - Air System Mobile Version
• A c t i v e Off-Air LIMIS
• G S M Mobile Tracer & Locator
• G S M Vehicle Direction Finder
• Thuraya Satellite Monitoring System
• Wireless LAN Interception
• R F Monitoring
• Passive Monitoring
• Includes floor, walls, and front bulkhead,
ceiling framing; minimum of 50mm polar fiber
insulation.The operational area inside the
van has some ECM screening
• Secure Storage of Equipment

28

GAMMANEWSLETTERS 04 2010
-

••••

C A M M AT S E
TECHNICAL SURVEILLANCE
S Y S T E M S — VA N S / C A R S

Iwo°
ikve

40114

3G-COFDM-IP MESH
SURVEILLANCEVEHICES
The Remote Video Surveillance Vehicle System
is designed to allow covert video and audio
surveillance of a target area without detection,
allowing greater flexibility during surveillance
operations.
The system allows the operator to park the
vehicle close to the target's location, house,
office, restaurant, etc. and transmit the gathered
information back to the command location in a
surveillance van, observation point or another
support vehicle.
It allows the operational surveillance team to
monitor by video, for example, the images of the
target location from the four cameras concealed
within the vehicle.
It allows the surveillance team to monitor audio
transmissions from the target location from room
or body-worn equipment, and activate hidden
microphones linked to the Remote Case.
It also allows the operational surveillance team
to connect external video and audio equipment
to allow long range observation of a target in a
difficult environment or remote location.
tXmomile,

Control of the system is by a digital telemetry link,
which allows full control of the camera selection,
pan, tilt, zoom functions, a s well a s repeat
incoming video and audio signals from the room
or body-worn systems used by the undercover
surveillance team.

Riorsgame COW

These remote systems are usually fitted into
vehicles (saloon cars, 4x4s) that can then
be left unattended i n the surveillance area,
transmitting the intelligence information required
to the Command Surveillance Vehicle COFDM/IP
MESH/3G.
Using our unique Motorbike Remote System, as
part of the total surveillance operation, allows
even greater flexibility in the covert surveillance
operation. The Motorbike Remote System allows
the surveillance team t o link several video/
audio remote systems into the total surveillance
concept.

GAMMA NEWSLETTERS 042010

29

G A N I N I AT S E
GAMMA
NEWSLETTERS 04 2010

TECHNICAL SURVEILLANCE
S Y S T E M S - VA N S / C A R S

COVERTSPEED CONTROLAND
SURVEILLANCESYSTEM
The Speed Control and Enforcement System is
the world's leading mobile surveillance and speed
enforcement brand.
The modular design of the speeding system allows
for a full range of system and upgrade options
depending on budget, ranging from a simple nonvideo speed measurement system to solutions
encompassing multiple cameras, MPEG4/1-1.264
video recording, radar system integration and
Automatic Number Plate Recognition (ANPR).
The System consists of four main components:
• F r o n t 10x zoom camera with integral
microphone (18x zoom camera option)
• D V R with Optional 36
• Remote Control Unit (RCU1
Upgrade options may include:
• U p to 3 additional cameras
• G P S antenna, providing vehicle tracking,
speed log and other meta-data information
• L i v e video streaming via GPRS / 36
• Remote microphones
• U p to 500 hours of recording

.1 Distance Travelled
3 Date
4 Police Pilot Mode
5 Time

A

6 Individual Counter*

7Zoom factor %
8 Speed indicators*
,
2 I c e sel by usettkete eg %thick) O f t t e t
6' n o n - w e n n ' video Immo co Miff fret
tamper pouf uy• dence
All speedidesteree ire:kat/cm in km at Oka
to 111000 WA InOlutiOn

GAMMANEWSLETTERS 04 2010

30

G A M M AT S E

GAMMA
NEWSLETTERSCEA2010

TECHNICAL SURVEILLANCE
S Y S T E M S - VA N S / C A R S

WIRELESS IP NETWORK MESH SURVEILLANCE EXAMPLES

to

Mesh node position on High Rise
building will substantially improve
the coverage of th.• network

All these locations have MESH nodes and
thus secure data can be exchanged between
each location w h e t h e r i t be streaming
video. VolP, general data such as m a i l s and
photographs.

HO Building

•-v
Video Surveillance Package
MMI Veh die In dtdllation

Video Surveillance Vehicle

110

opt



A Wireless IP network would enable all
of these deployments to be m d n i t o
Radio tIcrophone Operation a n d controlled from a PC terminal in ihe
HO balding
I-Q Bulding

GAMMA NEWSLETTERSC142010

31

'

G A M M AT S E
GAMMA
NEWSLETTERSG42010

TECHNICAL SURVEILLANCE
S Y S T E M S - VA N S / C A R S

Smart Phone link to Server

Pw

Mesh
Network
*1
--/MESH network linked to WWW by secure 3G
router/VPN

Networked Work
Stations can
monitor and control

Scr vet -VPN link to Router
and equipment connect to
MESH nodes

equipment
connected to MESH
nodes

• Analogue
camera

IP link to MESH
Codex and IP 1 r , W
recorder in
Pelican case

Any 30 network can be used

Mobile MSC

SG link t o

wodwArl vet

WI1
30 PDA

PCs with access to
the www can also
access the server
Networked PCs have access to the tiVrt

Fixed iP address

Clients Server

Quick Deployment Video
Package

GAMMANEWSLETTERS 042010

32

14
G A M IVLATSE
TECHNICAL SURVEILLANCE
S Y S T E M S — VA N S / C A R S

SECUREMOBILE NETWORKING

tot

This unit provides communications solutions
for scenes without infrastructure o r where
infrastructure has been destroyed. It is flexible,
broadband, secure a n d versatile, covering
a wide-area a n d dynamically optimizes a
communications solution. I t i s designed f o r
mobile users, for mobile use in vehicles as well
as being a fixed or portable communications
solution. It allows transmission data rates of up
to 6.5 MBit/sec for mobile and up to 16 MBitisec
for stationary use. The unit provides sufficient
throughput for applications such as audio, video
and data transmissions. The unit relay feature
allows unproblematic implementation o f even
broader ranges. I t ensures the confidentiality,
integrity and authenticity of the transmitted data
at all times, and uses powerful, officially approved
security mechanisms fin accordance with BSI
guidelines).The use of amplification mechanisms
ensures a range of typically 2 km between two
devices.

i

ek(

•-•

MERCEDES SPRINTER
CONTROL VEHICLE

USERS
SURVEILLANCE CARS

GAMMANEWSLETTERS 042010

33

G A I V I M AT S E
GAMMA
NEWSLETTERS(142010 1 S
UC
RH
VN
E II L
TE
C LA A
LN C E E Q U I P M E N T

LONG-RANGEAUDIO CAPTURING & RECORDINGSYSTEM
The Model 6309 Audio scope System is a high- performance audio capturing and recording system
customized for the intelligence end-users.The unit allows an operator to zoom in on a particular object
and record required sound in much the same way as a camera zooms in a picture.This makes the unit
an ideal solution for separating out conversations in noisy environment&Tbere is both fixed and mobile
solution.The core component of the unit is a microphone array composed of 285 individual microphones
integrated in a slim 1.5-meter dish.

- • • • • • • 11

INEMMIIIII
.1•11•1111E

mil=r '
MEP
OMNI ••••
= n a b
1•11111.11,
•••=Eilb
=MEIN.
,


• • • • % 1 • 1111111 6 M 1
,

M

•••••
datiMMIS

E

M

•mm• - - • i m
on
amons

4.M=11
MEMIM

URN

The exact direction for sound pickup is steered from the video screen without any physical movement
of the dish,The advanced signal processing makes the targeted sound source clearly audible even in a
noisy environment.
ZOOM IN ON SOUND SOURCES POST RECORDING
Any audio missed in real-time can be captured later in replay.This unique function is ideal for crowded
places where the operator does not know form whom or where he would like to separate the sound until
later.
INTUITIVE USER INTERFACE
The systems very intuitive user interface is offering fast, accurate operation of the unit, The operator
monitors the live on-screen view from the camera, and simply moves the cursor to capture selected
audio. The trackball is used to follow moving objects and the jog wheel to go back in time for replay.
The system supports multiple output channels and the operator can select up to five listening zones
simultaneously –both in real-time and in replay.The operator can also choose to selectfilters to eliminate
undesirable sound and noise.

4

Fixed System installed in a room ceiling

Mobile System installed in a car tire

to)..udi

4,110

C•11 •
•CAS r Ctccor I

gra

firowdmpt omi•

J
AM)

Mobile Configuration

e

F

i

x

e

d

Configuration

GAMMANEWSLETTERS 04 2010

%wog aC
- IVO

34

(ft

G A M M AT S E
MA
SETTERSQ42010

TECHNICAL
SURVEILLANCE EQUIPMENT

GSM MOBILE INVESTIGATOR/CLONER
stem
bject
,unit
°bile
ones
ment
ina

glEk v o l i s m = i l I
viESNINSINsmil
,
11111P
En,

t
Jvtv0

'Emma a m i s m

Naed

until

Prater
toted
play.
ones
nate

IMmt•

NEIL

•0•011MINIEWMIPMEIMIEMIO
•••• No,
• f t • m i n

1

t,t.OMM

=

=
t

E

1

=
M

t
O

= I n
ISIM/
S I
11•11EM a l
O
M

M
E

E

N
M

&

a

O

A

i
I

111

The Model 4018 is the complete mobile device
forensic system that is easy to use on a Windows
PC. Our easy to use tools will allow you to
configure your own forensic reports within a
matter of minutes. Just connect the handset
you need to examine and the unified wizard will
guide you through the entire process to produce
a secure, combined, personalized report with your
own branding and logos.
New in this update:
• Support for 169 new devices (total 1618) —
including 35 COMA models in the unit Logical
• Support for 22 new untested phones (total
136)
• Support for 114 new devices (total 554) —
including 26 GPS devices in the unit Physical
• S I M Id Cloner support including in help file

SECURE SMS SYSTEM
With the addition of encryption, text messages are
provided with unprecedented levels of security.
The Model 5328 removes all intermediate stages
such as secure messaging centers or centralized
back office encryption engines. Messages are
constructed and secured using the senders
handset and standard SMS text messaging. The
recipient is authenticated and then decodes the
message received via standard SMS directly on
their handset. The message is never stored in
the clear and can only be encoded and decoded
using our SIM card.The System can be operated
in COVERT mode, whereby the mobile looks and
operates as it would without being present. Only
by using a secret activation method does the
system become active*.

11

GSMENCRYPTION DEVICE
The Model 5325-1 is a GSM encryption device
that can be connected to commercially available
mobile phones using a Bluetooth® interface. It
provides confidential, tap-proof communications
anywhere in the world. The encryption has been
embedded in the unit hardware to avoid the
susceptibility of GSM phones to manipulation.The
unit is the most secure voice encryption device
for mobile communications on the market today.
It features an elegant design, outstanding voice
quality and is easy to use and operate*.
• Suspect to Export Approval

GAMMA NEWSLETTERS 04 2010

35

V
G A I V I I V I AT S E

GAMMA
NEWSLETTERS042010

TECHNICAL
SURVEILLANCE EQUIPMENT

GSM/GPSTRACKING SYSTEM A8

AUK

WiMNIffa=
I
a . . . M . 11 • 111
• 1 • 1 = 1 1 1
.1
111.1h•

1 1 1 1 1 . .

1 1 1 1 " o•
Imummor • M B
IMP
m
• MOM S


a

• O r






1 1 .
M E

' N M

6
M

a

• 1 m

1 M • = 1 1 •

t
; ; . =
I
N
• linmM•P
I s m i M I E •

N
I
M
E
. M M . k
• 1111111 0 • M E M I s n i

•AS•••

J r

The Model 7312 Tracking System A8 is a GSM audio
Transmitter with an Integrated GPS module, data
logger, movement sensor, switched output and the
option of Audio recording.Transmission of position
data occurs via SMS, CSD and GPRS connection.
The internal data logger is using microSD card to
store the traces.These data can be also received
via CO, GPRS or USB Connection. The control
and the configuration of the A8 Tracking device
is also possible via SMS, CSD, GPRS and USB
Connection.

woo
1

••• •

••,==, •••• •
IMF
UWE
SUM •

••••Nalth
-.Name

3G, GSM,VOIP CALL DIVERTER
Deployed in situations where a users true mobile
The Model 4016-2 3G is a convenient means of
providing untraceable communications for Voice,
Text and Pictures and is ideal for:
• L a w Enforcement Informant and Operative
Management
• Intelligence and Counter Intelligence work
• Hostage/Kidnap communications
• Witness relocation/protection
communications
• Providing undercover operatives a covert
comms recording facility
• Countermeasures against GSM/3G location
services
The unit is a self-contained remote call diverter for use with GSM and/or 3G networks. It allows calls to a
given mobile to be diverted to another mobile or to a VOIP terminal thereby ensuring the anonymity of the
called or calling party. Where an incoming call has to be monitored e.g. kidnap scenarios, It offers digital
recording and live monitoring on all diverted calls.
Key features of the system are:
• Receive and transmit text messages from any GSM/36 network
• Automatically redirect text/picture messages and audio
• M a k e a VOIP call from anywhere, and appear to be a local Mobile
• Internal logging of all received and transmitted messages
• Screen and keyboard user interface
• Redirect to a predetermined number orVDIP terminal
• Change predetermined number via text message
• Operates with any 36/GSM network provider tincluding pre-paid)
• Totally under the control of the operator. No network involvement
• Compact system, totally portable (12v dc power requirement)

GAMMANEWSLETTERS 04 2010

36

G A I V I M AT S E
TECHNICAL
SURVEILLANCE EQUIPMENT

DIGITALSTEREORECEIVER INC. IP
The Model 1031 Stereo Receiver is a handheld
unit providing digital wireless microphone
systems which otter extremely high quality audio
output. It is a true dual diversity receiver designed
to counteract multiple reflections i n difficult
radio frequency environments. Dual antennas
MENIIP
mmilmo.loa n d receiver channels operate in parallel with
. 1111 M I M E I
yolk •immilui
p r o p r i e t a r y circuitry to identify and select the
11111b.
6.1•1111r
• 1monsi.asmommo
- • . i
b e t t e r input. Modern Digital Signal Processing
NOM•—•
a
i s also employed to achieve the best possible


m

e

,

,t A I M

=

M

.

r

e

s

u

l

t

s

.

lin

41 1 1 •
4 mono4

1

IMMIM1

1

1

1

i.•;;J m u

DIGITALSTEREOAUDIO
TRANSMIITTER INC. IP

11111

I

Smaller than 'A the size of a credit card and only
4 mm thick. The Model 1030 tiny transmitter can
fit into practically any concealment. The low
power consumption combined with outstanding
stereo or mono audio (up to 8000 Hz response)
make this transmitter an outstanding performer.
The ultra miniature positive lock connectors allow
flexibility for microphone interchangeability and
the connections will not come apart_ A milled
aluminum case provides exceptional durability.

BLUETOOTHAUDIO SURVEILLANCE
The Model 6411 i s a multipurpose audio
surveillance system based on bluetooth wireless
technologies. It can be used for live surveillance
or as a recording device for audio or GPS tracking
data or as a combination of the two.
Applications:
1.Combined Tracking and Audio Surveillance
2. Simultaneous LiveTracking of Multiple Targets
3. Officer Safety (Force Protection)
4. R oom Audio Surveillance

Rat Pavans. MK, uchomo
1 1 . 1 1 1 1 .
Sdanal band pass frosrophone

ftwoommatill
t i c s pass oporphone
Alpha Und I I
H 3 , 1 / 02Ornrn
HMS,' if Oil inth

ADVANCED DIGITAL STEREO/AUDIO
SURVEILLANCESYSTEM
t



1
g l i
MO.

=4.1•

-effrr

This 6100 system is a full-featured, portable
digital audio listening and recording solution for
Law Enforcement Agents, Intelligence Services
and the Military. The system 'provides 57 RF
channels and 8 RF repeater channels and is
extremely suitable for multi-location surveillance
operations. The 6100 Series receives, records,
and plays audio from their transmitters.

GAMMA NEWSLETTERS 042010

37

Vi
G A M M AT S E

c.•

GAMMA
NEWSLETTERS IN 2010 I S U R V E I L L A N C E E Q U I P M E N T

MOBILEROUTER

,e•-•

IMP

, Ale

IMM
UMW
I M M I X

=gamma

The Model 104 Mobile Router is an ideal solution
for providing secure global communications to
your systems, machines o r remote networks.
Using our mobile router there are no distance
limitations, for remote site monitoring! All you
need to get connected is our Mobile Router and
SIM Card from mobile internet service provider.
Router includes quick and easy configuration
Nom._ w i z a r d . The wizard step by step will help to set
. . . N N I M M E / t h o
'

.
a
up 3G settings and create local wireless network
WWW
IMP r •
rie
within minutes. Built in firewall protects local
W
1111
Al•=t
d i N E •
networks PC's from intruders.
MINIM
MEIMMt

p

mom

de


AUDIO CONCEALMENT KIT
The 6517 kit includes:
• 1 body-worn recorder
• 1 covert belt recorder
• 1 covert watch recorder
• 1 covert lighter recorder
• 1 covert keyfob recorder
• 1 GSM/recorder for rooms or cars
• 1 covert harness
• 1 set of batteries

MICROREOCRDER KIT

1 •

The Model 5618 Micro Recorder Kit consists
of 2 Micro Recorders. Small enough for easy
concealment, with capabilities ideal for multiple
scenarios. To accompany the Recorders are
multiple power sources, offering different sizes,
length of operation life, and power input.. The
Kit also comes w i t h multiple rechargeable
LiPo batteries ranging from 250mAh up to lAh.
Compatible with non-rechargeable 19Ah batteries
and also a mains power supply.

goo

VIDEORECORDER
CONCEALMENT KIT
The 5626 kit includes:
• 1 body-worn
• 1 video/audio keyfob
• 1 video/audio covert earphone
• 1 video/audio coffee cup
• 1 video/audio smoke detector
• 1 covert video/audio PCB
• Accessories
• 1 set of batteries

GAMMANEWSLETTERS 04 2010

38

G A M IIVIATSE
A
LETTERSG42010

TECHNICAL
SURVEILLANCE EQUIPMENT

MODEL5610COVERTVIDEOAUDIORECORDERSOPTIONS

Model 5610-3
5MP - 8GB
1

.

1

.

4

1

=

Recording Time: over 100 minutes

ink
1

1111116

NEMEMP
U M W
MEP
=EP
•••

,

•-••••••••
a

M
I •

PMEID
-

P


, MMI

O

N

E

I

M

I

E
n
=MEMO
E l t

M••PEMO

Model 5610 - Pen
2MP • 512 MB
Recording Time: Over 2 hours


Model 5610 - Pen Kit
2MP
Recording Time: Over 2 hours

N,

Model 5610 - Set Kit
5MP - 8 GB
Recording Time: Over 2 hours

GAMMANEWSLETTERS 04 2010

39

G A M M AT S E
GAMMA
NEWSLETTERSQ42010

TECHNICAL
SURVEILLANCE EQUIPMENT

VIDEOOBSERVATION CONCEALMENT EXAMPLES
WITH OR WITHOUT TRANSMISSION

a l

a
VEMIlmal
am/EMMEN
Mak ' M E N E M

111 • 111 P
. 0 0 •
omor
ram'

r a o

M M
MraMM1. ,

-





,



anima;

_

M a m a

I n
MI

allialli

=

• ; • = t

1

1

1

1

11121=
.

.

a

J

GAMMA NEWSLETTERS IN 2010



40

V
G A M M AT S E
TECHNICAL
SURVEILLANCE EQUIPMENT

MINITRANSMITTER

pok l e n
11111
.AUM

.

%Mk
" A . e•

%V

no
NM

'

1 1 1 1 1
1 6 1 1 1 1 1 .

M
M
I
N
1 4 6 E M O ,

P
I

•••••
•Ele

D
,

M
A M P

=

B
G

M

a l l • = r = O M %
u m m t onaMMM
,mmank m o k o m m

O

l e

a
1

n o

The Model 7320-22 transmitter fits in every jacket
pocket because of incredible small dimensions..
It has an extremely robust but nonetheless very
light weight housing made of aluminum and is
therefore suitable for almost all applications.
Special protected connectors avoid accidental
disconnections during operation. The device has
100mVI transmission power but you can increase
this power by connecting gain antennas. The
transmitter is available as 1.4 GHz, 2.30Hz and 2,4
GHz device so thatyou have a reliable transmission
even if you do not have a line-of-sight connection
between transmitter and receiver.

MOBILE DIVERSITYRECEIVER
the Model 7320-23 diversity reciever for flexible
operation and more possibilities. Integrated stateof-the-art batteries guarantee long running time
of the receiver without mains power supply, so
that you can operate the receiver independently
without cables and without installation efforts.
• mobile diversity receiver
• perfect for broadcasters
• f o r use with V-mount batteries
• M R C maximum ratio combining
• configuration via OSD
• e a r phone connectors

DIGITAL COMM RECEIVER
The Model 7320-24 Mobile video transmission
plays an important role nowadays. But also
stationary applications become more advanced so
that many users are looking for new possibilities.
Long range, reliability and better video quality —
this is what the digital COMM receivers stand for,
from the standard desktop device to the complex
8 antenna diversity system.

MOBILE MINI DIVERSITYRECEIVER
Model 7320-10 with its small and handy case
with integrated 2-channel diversity receiver,
brilliant TFT display and strong batteries is the
ideal solution for mobile applications. Available
in 230MHZ, 1.4, 2.4, 4.4 and 5.8 GHz., our diversity
systems u s e a special technique f o r t h e
interpretation o f unequally received antenna
signals. The "Maximum Ratio Combining" (MRC)
procedure evaluates signals and combines the
best parts in order to obtain a high-quality, failure
free signal.
GAMMANEWSLETTERS 04 2010

41

1

S
G A M I V I AT S E
GAMMA
NEWSLETTERSC142010

GAP

41,

TECHNICAL
SURVEILLANCE EQUIPMENT



FLYING PLATFORM FORMED
SURVEILLANCE

'NEL

Non._

mommr
w•gliffit
mon
• 1
• M I

o •

t

NiMNIES
unnom
•.BONIElo
VEEN

The Model 5030 is an extremely light weight and
quite flying surveillance platform. Due to the
electronic position control the AirRobot can be
flown without any pilot experience. The flying
surveillance platform can be in the air manually
controlled or is fully programmable. If it receives no
commands, it remains at its height and direction,
GPS or optical position system (UPS) controlled.
This allows the pilot to concentrate fully on his
surveillance mission. Different Cameras for video
surveillance operations are available (Daylight
colour sensor, night vision, digital andTherrnal).

ADVANCED LONGJOHN SYSTEM
Designed specifically f o r professional
surveillance, Model 5122 uses the latest series
of ultra low light (0.00003 lux) with 'Night Mode'
cameras to produce unbeatable images in day
and night conditions.The flexible 6 to 100 x optical
zoom and pan and tilt system allows targets to
be monitored a t long distances and tracked
using the proportional pan, tilt and zoom system.
Deployable in minutes and powered by battery or
mains, this rapid deployment system is a powerful
tool for any serious surveillance operation.

HIGHPERFORMANCE
MINIATURE THERMAL CAMERA
The Model 5214 u n i t is a high-performance,
miniature thermal imager for real-time imagery
in the 7-14 m spectral range (Long-Wave InfraRed, LWIR).This extremely small and lightweight
camera delivers images of outstanding quality,
at very low power consumption.The unit can be
used for both standalone applications and for
integrated multi-sensor systems.

p .

INFINITY LENS
The Model 5215 Infinity Lenses are the only
lenses in the world that stay in focus throughout
the entire image. Conventional lenses have a
limited depth of field, which means they can only
focus on either the foreground or the background
of an image at one time - never both.The Infinity
Lens defies this tradition. Employing revolutionary
optics technology that can focus on objects both
in the foreground and background, the Infinity
Lens offers massive depth of field (MDF) meaning
the foreground and background of a shot are in
focus simultaneously.

GAMMA NEWSLETTERS 04 2010

42



;ional
;eries

diode'
1day
pticaI
ts to
icked
stem.
Ky or
ierful

G A N I M AT S E
GAMMA
NEWSLETTERSG42010

TECHNICAL
SURVEILLANCE EQUIPMENT

COVERTUHF DUPLEX VIDEO LINK
SYSTEMWITH OPTIONAL IP LINK

1

Model 5824 consist of digital audio and analog
video Transmitter. Remote control allows the
transmitter and voltage supply to the camera to
be switched on/off from the receiver's controls.
It is possible t o connect 3 cameras to one
transmitter and remotely select between them. A
unique audio encryption key for the digital audio
transmission is avallable.The receiver can handle
up to 100 transmitters and each transmitter is
identified by its own serial number.

46!

ULTIMATE FIBERSCOPE
The Model 5514 unit one piece design allows
all components t o b e housed inside t h e
ergonomically designed pistol grip handle. When
in use, no external cable or connections are
required. Battery charging time is approximately
4 hours, allowing about 4 hours of continual "on"
time. Each fiberscope comes complete with a
spare battery to enable extended inspections to
be carried out, external battery charger included.

MULTISTREAM PORTABLE
INTERVIEW RECORDINGSYSTEM

irr
11
only
)hout
ve a
only
ound
finity
wary
both
fin ity
3ning

ire in

The Model 6513-2 portable DVD MultiStream
Interview Recording system i s designed
specifically for portable use. I t is housed within
a lightweight but robust metal cabinet and is
further protected by a purpose-made carrying
bag.The bag contains all necessary accessories
for portable interview applications including a
stereo table microphone, dual-view camera, full
height extending tripod and accessories.

COVERTNIGHT VISION SYSTEM
The Model 5210 is a powerful, multi-purpose
pocket-sized monocular night scope. The pocket
scope is designed to be used either as a standalone night vision device or in combination with
a wide variety of standard video, still photo, CCTV
equipment and spotting scopes.
It i s ideally suited f o r covert night-time
observation and intelligence-gathering purposes
using standard photographic media, as well as an
effective aid to night-time field missions.
The Model 5210 employs a choice o f image
intensifier tubes characterized by high resolution
and a clear, bright image including auto gated
types.

GAMMANEWSLETTERS 04 2010

43

G A M M AT S E
GAMMA
NEWSLETTERS al 2010

TECHNICAL
SURVEILLANCE EQUIPMENT

GOVERNMENTKEYCOPYINGSYSTEM
With the Model 2021 profile cutting system you can
simply produce key blanks yourself. You can also
produce a key from a photograph from the original
key or lock.This system is foremost developed to
make keys for master lock systems and for lock
cylinders with special profiles.The Profile Cutting
System is divided into two parts:
lenk
SIMS
MENSES"
•••••• • S h
WISES
,



S
d

• M i n n a

I

P

• • • • • •








••••••••••

- •

=

1

1

t
n t. i• n
1 1t

:

1.Cutting Program with Speed Profile:This program
calculatesthe key profile and is absolutely required
for the functioning of the profile cutting system. As
a service for you the program is already installed
in the case from the mechanic manufacturer,
although not activated.

2, Mechanic Unit with Case and Mains Appliance:
This Mechanic is produced by a special mechanic
manufacturer and includes the complete mechanic
motion build in the case of the unit.

Photo of a lock

Copy of a key made from a photo

179

r

OIMI 1 -

all -))4

-#

Manipulations kit for Dom locks

Dom security locks

EWA 3KS Lock Decoder

EWA 3KS sophisticated lock

4

I



GAMMA NEWSLETTERS 042010

44

Va
G A N I M AT S E

GAMMA
NEWSLETTERS(142010

D ATA RECOVERY
& FORENSIC L A B O R ATO RY

DATARECOVERY &
FORENSICLABORATORY

MINIIIIIIMEMEI gain ' M I M E O
NM.

41mor

odelMr " . • •• N 11111111•••••1011MEEmEll
- w i t • on, IMEL • • , • K
NIP
m l , • O i l l •

11110 • •-... • 11•1 l
M
O
IMO, , lid
i l . • • • • • • di=EI A M M E R ,
i n
= M I & atitOSIN
1
.
1
• • • • • •
1
.
W I

•MWSE. e m o m e r • • • • • • • 1
M
m
a

4

M I
I I I

forensic data recovery

Forensic data recovery is not to be confused
with standard data recovery. Data recovery is
the art of retrieving data from a source that is
not easily obtainable, (mainly hard disk drives,
memory cards, tapes, RAID systems etc), however,
Forensic data recovery is different. In standard
data recovery, the original data source, (e.g. the
dead hard drive) is rebuilt, (if required), then an
'image' is taken, at which point the data recovery
technician re-works the data so that it is useable
to the client.
Computer Forensics is the function of utilising
scientifically proven methods t o assemble
together and process data found on a digital
device, (computer, hard disk drive, mobile phone,
memory card etc), and interpret that data for
possible use in a court of law or other theatre
of investigation. The evidence may assist in the
prosecution or a criminal, help in the defense of
an accused person, or be of intelligence to an
individual who is seeking knowledge for either
personal or professional reasons.
Mobile phones are consistently used during
many forms of criminal activity, and by performing
mobile phone forensics on the cellular network
usage of a particular mobile phone it is possible to
trace where and when calls were made from.This
is particularly useful in stalking type cases, where
a mobile phone has been used to harass another
individual. A mobile phone forensics firm will be
able to trace and quantify phone uses within the
cellular network.

digital forensics
itompoun
• tr••••••• t t m •
• L•••••• LAIldhot
• Complo••••••
• f 4 1 1 • • • •

WM••• Pb••• * n o . . . •
• Itha “••••

,m I &awoke,.
•••• k•••••1111

-dr

Mow ----

Nm•• •r• %mop • •••

• MO

K1

•-octi

GAMMANEWSLETTERS 04 MD

45

A
G A M M AT S E
GAMMA
NEWSLETTERSQ42010

TECHNICAL SURVEILLANCE
COUNTER—MEASURES

lobe effective in TSCM it is essential to use trained
and qualified people who have solid background
knowledge of surveillance techniques and use
the proper equipment. Gamma TSE is in a unique
position to provide knowledge and equipment to
counter threats and offer training in the latest
equipment and techniques involved in information
gathering and surveillance. The threat level for
cables, LAN and Wireless LAN has increased
dramatically. Although TSCM are described in
more detail in our 2010 catalog, the following is a
brief summary of our new products.

MICROVIDEO CAMERADETECTOR
The Model 7507-3 is a modern device, which
functions include: video camera detection,
security support, etc, designed for quick detection
and exact location of secretly installed indoor
micro video cameras, including cameras with
pin-hole lenses. The unit works on the optical
principal and no electromagnetic and extraneous
emissions get in its way.

GSM/UM
LOCATIONSYSTEM
The Model 7558 system uses active, patented
techniques to find any GSM and UMTS devices
in the areas to be swept. When devices are found
the unit operator can quickly distinguish between
legitimate o r authorized mobile phones and
GSM bugging devices. Automated processes,
network surveying, system set up and range
selection, device detection and results analysis
make the system effective and efficient. T h e
system's database determines the threat level
of a suspect device and is updated on a monthly
basis to ensure the very latest threat information
is available.

HANDHELD SPECTRUMANALYZER
A handheld FiF measurement, the 7554 unit can find
radiation sources in any surroundings from 1MHz
to 9.46Hz, including their respective frequencies
and signal strengths, directly displaying exposure
limits. The calculations are performed unnoticed
in the background by a high-performance DSP
(digital signal processor). This software offers
an incredible number of features, such as multi
device capability, high-resolution, and a display of
channel identifiers, etc.

GAMMA NEWSLETTERS 04 20111

46

me

G A M M AT S E
MA
MITERS Q42010

TECHNICAL SURVEILLANCE
COUNTER—MEASURES

3D X-RAY SOFTWARE
Model 7539 is used for upgrading mobile X-ray
units from 20 to 30 visualizing. All common
types of X-ray image media can be used, even
conventional films and storage foils, in case they
need to be scanned later on.The digital 20 images,
coming from a scanner or an image converter, can
be individually enhanced and processed into 3D
visualization by the 3D X-ray software. In the 30
viewing mode, zoom, detail, pan, tilt and rotation
of the stereoscopic image i s changeable by
mouse control.

X-RAY SCANNING SYSTEM
The Model 7557 unit is a lightweight, portable,
battery powered x-ray scanning system designed
in co-operation with first responders and EOD
teams to meet the needs of the field operative.
The slim detector panel is positioned behind the
target; the generator is placed in front. Quick and
simple to deploy, the system produces high quality
real-time x-ray images for rapid and accurate
decision making.

TSCM PERSONNEL KIT
The Model 7605 TSCM Personal Kit is designed
for performing Intermediate Level Technical
Counter Surveillance Measure operations.
Containing equipment used in the main 3 areas
of TSCM Sweeps, at a budget making it ideal
for issue to individual T S C M personnel. All
concealed in a 'Cabin Baggage' approved Laptop
Case, the TSCM Personal Kit will not look out of
place being carried into a hotel, or into an office
ensuring a level covertness when entering a
sweep area.

VIP NON TECHNICAL TSCM KIT
It is not always possible to have a TSCM Team
sweep an operationally sensitive area. When
travelling abroad, a TSCM Team cannot always
follow their Key Personnel t o ensure their
security. When using Hire Cars, Hotels and other
publically accessible areas, Key Personnel cannot
ensure the security of their sensitive information.
Concealed in a 'Flight Approved' Laptop Case, the
Model 7604 TSCM VIP Kit contains equipment
that any non-technical personnel can operate
to provide a basic level o f assurance that
eavesdropping devices are not present.

GAMMA NEWSLETTERS 04 2010

41

G A M M AT S E
GAMMA
NEWSLETTERS 04 2010

I COUNTER—MEASURES

PORTABLESPECTRUM AUDIT
Model 7508 is uniquely different from all other RF
detection systems as it uses a more advanced
spectrum analyzer with the latest software
technologies to provide accurate results. It uses
a twin antenna system, whereby one antenna is
placed outside the target location and the other
inside. Using the software it is able to show all
suspicious transmissions that are stronger in the
target location than outside. Standard frequencies
are up to 6GHZ with optional frequencies up to
26GHz.

ADVANCED LAN/VVLANANALYZER
Our powerful n e w advanced model 7543
Integrated Network Analyzer gives you a clear
view of your entire enterprise providing visibility
into every piece of hardware, every application,
and every connection o n your network. No
other portable tool offers this much vision and
all-in-one capability to help you deploy new
technologies and applications, manage and
validate infrastructure changes, solve network
and application performance issues, Secure
network from internal threats.
It shows you where your network stands today
and helps you accurately assess its readiness for
the changes you need to make.

BOGUSCELLMONITORINGDETECTOR

a

The current method for the remote interrogation
of GSM subscriber identities and/or equipment
is to use Model 4050 bogus cell site, and lure
the target mobiles over to this Cell. The unit can
monitor the LAC, Power levels, and Neighbour
lists for GSM and 36 and C1/C2, in the case of
GSM.The313 unit will generate an alarm based on
any combination of values monitored.
Key features of the equipment are:
• Detects bogus Cell sites, possibly being used
for IMSI capture or Call intercept
• Multilevel alarm/ event triggers
• Generates alarms via Internet or text
message
• 1 6 channels
• Constant monitoring of selected GSM sites
• Constant monitoring of selected 36 sites
• Remote connection via web interface

GAMMA NEWSLETTERS 04 2010

48

••••

G2SYSTEIVIS

MA
SLETTERSQ42010

VIP SECURITY PRODUCTS

62 Systems' philosophy i s that VIP Security
Products should be offered as a whole range,
offering everything from standalone products
to complete system solutions, including training
to support any government agency's goals of
achieving successful VIP operations. Our new
2010 catalog provides a comprehensive selection
of advanced VIP equipment. We have put together
a brief selection of products below, but strongly
suggest you view the complete 2010 VIP catalog.
To order one please contact [email protected]
corn
-VIP Security Products
-VIP
- VIP Convoy Jammers
-VIP Portable Jammers
-VIP CBRNE Detection
-VIP
-VIP CBRN Protection
-VIP Security Screening

-VIP Forward Observation
-VIP
TSCM Detection
-VIP Secure Communications
-VIP Surveillance Kit
-VIP Personnel &Vehicle Protection
-VIPTraining
Course

VIPCONVOY JAMMERS
The Model 3260-S has been upgraded to cover
the 20 to 6000 MHz frequency range. Electronic
Counter Measures (ECM) or Jamming Systems
provide protection for VIP dignitaries against
attacks by radio control. Nobody knows when,
where or on which frequency such attacks may
occur, therefore, VIP protection must be at a very
high sophisticated level. As an optional upgrade
we also offer our Hybrid Jammer with free
programmable frequencies between 20 to 500
MHz.

PORTABLEBRIEFCASE GSM/UMTS
The Model 3530-1 Portable Covert GSM Jamming
System i s a 4 Band Jammer covering t h e
frequencies most commonly used by GSM and
36 Cellular Systems. It is designed to be effective
within a 25 Meter range within the target area as
shown below. The system is unique in that it does
not require any ventilation, making the unit silent
and also covert. As the system does not require
ventilation, in can be operated with the case
fully closed. This means that it can be placed in
a located, be effective and not draw any undue
attention.

GAMMANEWSLETTERS 04 2010

49

G 2 s y s
GAMMA
NEWSLETTERS(142010

VIP SECURITY PRODUCTS

PORTABLE VIP PROTECTION CASE
Model 3543 Jammers high power covering all
frequencies
- 850-894 CDMA
- 450-470 MHz, 15W
- 825-960 MHz, -18W
- 1805-1980 MHz, 17W
- 2110-2170 MHz, -15W (cover 36)
- 2400-2500 MHz, 15W (cover WIR)
- Total Output power: 80W
- Case size: 56 x 42 x 26 cm (pelican case 1560)

- Programming Software

HIGHPOWER MOBILE
JAMMER FOR JAILS
Model 3533 jammers are based on our longstanding technological leadership a n d a
proven jamming technology for jails. Our widely
installed, high-quality product base attests to
our determination to provide high-end, quality
products to customers around the world.
COMA, 850 - 890 MHz, Chan. 1: Power 50 Watt
GSM, 920 - 960 MHz, Chan. 2: Power 50 Watt
GSM 1800 - 1900 MHz, Chan. 3: Power 50 Watt
UMTS/WIFI/GPS

UNDERVEHICLE SURVEILLANCE

a

The Model 5501 Under Vehicle Surveillance
System is designed fortemporary deployment and
portability between sites. The system comprises:
Galvanized Steel Ramp with integral metal
housed cameras and LED illuminators.These can
be color cameras and white LED illuminators, or
monochrome and IR LED illuminators. Control/
Monitor Pack is housed in a portable rack mount
case with removable front and rear protection
covers.

ADVANCED HANDHELD
MULTIPURPOSEDETECTOR
The Model 9102 Advanced Handheld MultiPurpose Detector is designed for use by first
responders, homeland security, military soldiers,
law enforcement a n d forensic chemistry
personnel. It provides immediate identification of
unknown solids, liquids and mixtures, including
narcotics, explosives, white powders, chemical
weapons, WMDs and toxic industrial chemicals even through the walls of their containers.

GAMMANEWSLETTERS 042010

50

longid a
videly
as to
uality

G2SYSTEMS

GAM A
NEW LETTERSQ42010

VIP SECURITY PRODUCTS

BODYSCANNER

(

The Model 9140 unit quickly creates a 3-D
black and white silhouette of the subject that
reveals concealed objects. Operators can locate
weapons, explosives, other banned items or even
intellectual property.The unit can be upgraded in
the field to take advantage of advanced, imagefree Automatic Threat Detection software that
is enhanced as new threats emerge. The unit
allows operators to clearly view objects made
of any material-including liquid, rubber, wire,
plastic, ceramic and metal-weapons, contraband
and other objects are quickly and easily located.
The system utilizes harmless millimeter waves
to generate a clear view in seconds, and is ideal
for use anywhere checkpoint security is needed,
such as airports, military bases and border
crossings, courthouses, embassies, prisons and
other government buildings.

PORTABLE WALK THROUGH
METALDETECTOR
The Model 9130 is the world's most versatile
walkthrough metal detector as it can be deployed
and transported to virtually any location and
be up and running within five minutes by a
single operator! The Model 9130 operates from
rechargeable sealed batteries, has zone specific
detection and is designed for use in demanding
environments. It is the only multi-zone metal
detector small enough to fit in the boot of a car.
The Model 9130 is ideal for sporting events,
conferences, schools, VIP security o r for any
event or location requiring high discrimination
metal detection combined with ease of use and
total portability.

itt



f t !

Aultifirst
diers,
listry
on of
iding
mica!
aIs -



ADVANCED EXPLOSIVES TRACE
&VAPORDETECTOR
The Model 3500 is the world's first explosives
trace handheld based on chemiluminescence.
t detects military, commercial, even homemade
explosives, liquid and powdered, such as TATP
and other related peroxides, ICAO taggants,
plastics, ammonium nitrate, black powder, and
other nitrates. It has high selectivity to explosives
and immunity t o weather and environmental
interference.

GAMMANEWSLETTERS 04 2010

51

G2SYSTEIVIS
GAMMA
NEWSLETTERS(142010

*46

VIP SECURITY PRODUCTS

RADIATION DETECTOR
The Model 9126 is a complete range of smart
probes to enhance the detection capabilities of
the system.
Different probes associated to the radiation survey
meter add:
• gamma and beta/gamma contamination
monitoring for vehicles, aircrafts, personnel,
ground
• monitoring personnel alpha contamination
• monitoring alpha contamination wounds
• search and management of Gamma
contamination

FOODDETECTION KIT
The Model 9113-1 Food Poison Detection Kit
comes with a set of three separate detectors and
everything needed to analyze a food sample and
record the results for future use or as evidence.
The Food Poison Detection Kit detects dangerous
levels of more than thirty poisons. The detected
poisons include compounds containing cyanides,
azides, chromates and sulfides (Group I Poisons),
thallium, lead, cadmium and mercury (Group II
Poisons) and ALL arsenic-containing compounds.

• • •

!E!!5.
Vit'r

CBRNVAN

a,

The CBRN Support vehicle is designed to bring
CBRN supplies to the CBRN incident, again the
vehicle can be of any variant or type. We will help
you to work out the equipment that is required to
support Responders team.
Example:
• Small decontamination equipment
• Spare air cylinders
• Compressor air recharging air cylinders
• Spare CBRN suits/canisters/Boots/Gloves
• Hazard tap/markers
• Spare battery's
• Spare CBRN detectors

ECMVAN
EOD Vehicle is custom-built to incorporate the
best available equipment and enables operators
to provide a fast response to detect and dispose
of terrorist devices. Each Bomb disposal vehicle
is specially modified and i s supplied with
an assortment o f the most up-to-date IEDD
equipment, depending on client requirements.
A typical list of components would include the
following: Search Equipment, Scene of Crime/
Forensic Equipment, Identification/Analysis
Equipment, Protection Equipment.

GAMMANEWSLETTERSG42010

52

G2SYSTEIVIS

GAMMA
NEWSLETTERS 2 0 1 0

VIP SECURITY PRODUCTS

CBRNTHREATREPORTS - OCTOBER2010
This report is to help EOD teams that have had no experience with chemicals used as terrorist weapons.
This is the latest information on the capability of using chemicals as a weapon:— the main hazard is that the
chemical can travel down the wind line causing high casualty levels.
This document is tor EOD teams, Police forces and intelligence organizations may find this document useful.
Not for members of the public or media use.
This report is based on analysis from Gamma subject matter experts and has no warranty.

GAMMA NEWSLETTERS 042010

53

r
G2SYSTEIVIS

GAMMA
NEWSLETTERS(142010

I N T E L L I G E N C E G AT H E R I N G A N D
T E C H N I C A L TRAINING SERVICES

From Gamma International's regional headquarters
in the UK, G2 Systems Ltd provides first-class
security training services to governments and
related organizations worldwide. Our clients also
include security and intelligence organizations
recognized by the United Nations, who seek
assistance in improving their intelligence gathering
capabilities over a variety of disciplines. For a
complete 2010Training Catalog please contact us
at: [email protected]

,
/

'
3
,, - " I
d,--4

a

m
I
I


t
& Ai
t

t

GOVERNMENTTRAINING SOLUTIONS
1-CMOE
2- Intelligence Gathering
3-Technical Surveillance
4-IS CM
5-ISCM linked to IT Threats
6- IT Exploitation Training
7- Intelligence Analysis
8- CBRN Threat Awareness

SURVEILLANCECOURSES
1- Overt SurveillanceTechniques
2- Covert SurveillanceTechniques
3- Operational Surveillance Methods
4- Intelligence Analysis and Evaluation
5-Technical and Engineering Support
6- Audio and Video Surveillance
7- Concealment Courses
8- Photographic Surveillance
9- AudioNideo Processing
10- Mobile Phone Forensics

ITEXPLOITATION TRAINING
Our IT intrusion training package provides the
government end-user with up-to-date advanced
IT intrusion tools and techniques t o enable
intelligence agencies t o obtain information
that can only be obtained by using IT Intrusion
components.
1- IT Information Warfare
2- Vol P Intrusion
3- Advanced Intrusion Techniques
4- Exploitation Techniques
5- Root-kits Training

GAMMA NEWSLETTERS 04 2010

54

the
ced
lble
bon
;ion



G2SYSTEMS

MMA
SLETTERSC142010

I N T E L L I G E N C E G AT H E R I N G A N D
T E C H N I C A L TRAINING SERVICES

TECHNICALSURVEILLANCE
COUNTER-MEASURES
The objective o f training government TSCM
teams is for trainees to be aware of all technical
espionage threats and the procedures of search
and detection.
1- Latest TSCM Electronic Threats
2- Prevention of Bugging/Infiltration
3- Cable Measurement
4- Physical Search
5- RE Measurement
6- PBX/IT Attacks
7- Securing IT Facilities and Data

CMOECOURSES
1-Technical Operations Training
2- Covert Technical Deployment
3- Covert CCW Deployment
4- Advanced Operational Drilling
5- Operational Alarm Defeat
6- Magnetic Hotel Room Lock-Picking
7- CCTV and PIR Defeat
8- Safe Manipulation
9- 'Silent' Drilling
10- Explosive Methods of Entry

MAGNETICCARDCOPIER
A fast reliable, portable, easy to use system for
cloning magnetic stripe cards encoded in any
format, such as Hotel cards and other access
magnetic swipe card. The Model 2009 unit
provides fast and efficient access to the data
on a magnetic stripe card, for reading, writing,
cloning and erasing purposes. The system has
two operating modes: field mode and base mode.
Field mode is designed for simplicity and speed,
whilst base mode is designed for functionality
and versatility.

p
aird •

IMPRESSIONING KIT
This k i t has been thoughtfully put together
to include all the essential tools that a CME
operative needs in order to undertake standard
impressioning tasks. I t includes a selection
of especially adapted cylinder Ougs to assist
mark identification and accurate spacing during
filing, our designed impressioning handle with
a unique in-handle tool set, and a selection of
common blanks especially prepared and ready
for impressioning,

GAMMA NEWSLETTERS 04 2010

55

G 2 s y s

GAMMA
NEWSLETTERS(142010

INTELL VIDEO/AUDIO
C O N C E A L M E N T COURSES

Our Specialist Video/Audio Concealment Training Courses are designed for Technical Surveillance
departments who require their own personnel to be trained on concealment techniques to enable
these specialist skills to be used in their own departments. The course starts with the basics of fitting
microphones and preamplifiers through to concealment techniques and installing covert devices into
everyday objects, rooms and vehicles. Practical exercises also include audio/video transmission, digital
audio/video recorders, concealment of antennas and power supplies. As part of the course each student
will receive a concealment tool kit as well as a full set of practical manuals. With these skills students will
be able to prepare and install covert devices that are more suited to the environment in their own country.

AUDIO CONCEALMENTSYLLABUS
1- Fitting covert microphones
2- Producing preamplifiers
3- Body-worn concealment techniques
4- Audio deployment in cars
5- Audio deployment in rooms
6- Producing concealment installations
7- Modifying high-tech digital transmitters
8- Practical surveillance exercises
9- Modifying GSM phones
10- Selecting the right power supplies

VIDEOCONCEALMENTSYLLABUS
1- Fitting covert cameras
2- Producing preamplifiers and microphones
3- Selecting the right power supplies
4- Body-worn video concealment techniques
5-Video deployment in cars and rooms
6- Producing video concealment installations
7- Integrating video transmitters
8- Practical surveillance exercises
9-Through-the-wall-video surveillance
10- Integrating video GSM Links

GAMMANEWSLETTERS 04 2010

56

GAMMAREGIONALOFFICES MUNICH - DUBAI - SINGAPORE
GAMMA HEADQUARTERS
Unit 6, Parnell Court. East Portway Industrial Estate
Andover, Hampshire, SP 10 31..X
United Kingdom

S

GAMMAGROUP

Tel +44 1264 332 422
Fax 44 1264 332 411
[email protected]
www.gammagroup.com

Document Path: ["794-gamma-group-newsletter-gamma-newsletter-q4.pdf"]

e-Highlighter

Click to send permalink to address bar, or right-click to copy permalink.

Un-highlight all Un-highlight selectionu Highlight selectionh