Name: FinFisher, FinFly, FinSpy Mobile, LIMS, DRS

Text: li

GAMMAGROUP

THE END-USER1 S VISION IS OUR MISSION

GAMMA
NE\NSLETTER G'l/20'1'1

,,
3AMMAGROUP
AMMA
EWSLETTER Ql/2011

INT RODUCTION & INDEX

Dear Customers,
Our 2011 newsletters show a range of selected equipment from Gamma Group's
capabilities in the fields ofTactical & Strategic Surveillance and Monitoring Systems,
which can operate independently or within a system design. The equipment can be
tested and demonstrated upon request. We look forward to hearing from you.

INDEX
COMPANY PROFILE

2

EXHIBITIONS OVERVIEW 2011

3

IT INTRUSION SEMINARS

4

(GAMMA INTERNATIONAL UK LIMITED)

FINFISHER IT INTRUSION

5

(GAMMA INTERNATIONAL UK LIMITED)

STRATEGIC COMMUNICATIONS MONITORING SOLUTIONS

8

(GAMMA GROUP INTERNATIONAL)

TACTICAL COMMUNICATIONS MONITORING SOLUTIONS

18

(GAMMA GROUP INTERNATIONAL)

TECHNICAL SURVEILLANCE SYSTEMS - VANS/CARS

26

(GAMMA TSE LIMITED)

TECHNICAL SURVEILLANCE EGUIPMENT

34

(GAMMA TSE LIMITED)

DATA RECOVERY & FORENSIC LABORATORY

45

(GAMMA TSE LIMITED)

TECHNICAL SURVEILLANCE COUNTER MEASURES

46

(GAMMA TSE LIMITED)

VIP SECURITY PRODUCTS

49

(G2 SYSTEMS LIMITED)

INTELLIGENCE GATHERING & TECHNICAL TRAINING SERVICES

54

(G2 SYSTEMS LIMITED)

INTELL VIDEO/AUDIO CONCEALMENT COURSES
(G2 SYSTEMS LIMITED)

GAMMA NEWSLETTER Ql /2011

56

ti

GAMMAGROUP

GAMMA
NEWSLETTER Ql/2011

COMPANY PROFILE

GAMMAGROU P

GROWING GAMMA TEAM

Gamma Group is an international manufacturer of
surveillance systems based in Germany and the
United Kingdom, providing advanced technical
surveillance, monitoring solutions and advanced
government training as well as international
consultancy ta National and State Intelligence
Departments and Law Enforcement Agencies .
Since it was founded in 1990, the group has
expanded and now has four separate companies
under its wing: Gamma TSE, Gamma International
GmbH, G2 Systems and Gamma International
UK. ln 2005, Gamma opened a comp any in the
UK specializing in CBRN and VIP security, and in
2006 opened a partner office in Singapore called
Global Surveillance Systems.

ln 2009, Thomas Fisher joined Gamma International
GmbH as th e IP Monitoring Specialist and th e
company has recently released the FinFly IS P
system.
Gamma Group was fortunate ta add Mr. Carlos
Gandini ta its growing team of experts in 2010.
Carlos joined Gamma International GmbH in
October, and is based in Munich, where he heads
th e Sales Department for our exclusive FinFisher
lt Intrusion Portfolio. Since Carlos is fluent in
Spanish, Portuguese, ltali an, English and Germ an,
we plan ta expand Gamma's reach, specificallyto
South America, in the coming years.

EXHIBITIONS IN 2010
GAM MA GROUP OF CO MPANIES
GAMMAGROUP

tl

GAMMAT SE

Te l. +44 1264 332 411
Fax. +44 1264 332 422
[email protected]
www.gammagroup.com

Professiona l Su rveillance

Sales & Consulti ng

Systems Audio /Video Monitoring

Provision o f Services

Product Survei llance Vehicles

Communications Monitoring

Gamma Group had a busy 2010 and exhibited
at all th e ISS Telestrategies exhibitions, which
included, Dub ai, Washington, Prague and Kual a
Lumpur. Gamm a also had a strong presence
at Milipol Qatar and at the HOSDB in th e UK.
Gamma plans ta attend ail the exhibitions again in
2011 . Should you requ ire any further information
about Gamm a or its products please contact:
[email protected]

SALES CONTACT

tl

Brydon Nelson

Te l. +44 7818 446 302
[email protected]
Stepha n Oelkers

G 2SYSTEMS
IT Intrusio n, Sa les & Proj ec t s

Tech nica l Insta llations

Tel. +49 1728425 162

Providing Highest Qua lity
of Operational & Technical

Training

[email protected]
Emmanuel Chagot

Tel. +46 768 66 66 09
[email protected]

Group Al liance

Johnny Debs

The Group allianc e of companie s con sists of:
Gamm aTSE
Gamm a Intern ation al UK
Gamma Internation al GmbH
G2 systems
El aman GmbH
GSS Sing apo re
CBRN Te am Limite d
TS Comms
Fink Sec ure Communications

Te l. +44 7990 572 299
[email protected]
Derek Myers

Tel. +44 1264 332 411
[email protected]
Carlos Gandini

Tel. +49 172 8619001
[email protected] p.com

GAMMA NEWSLETTER 01 /201 1

li

:;AMMAGROUP

AMMA

EXHIBITIONS
OVERVIEW2D11

EWSLETTER Ql/2011

Dates

News & Events

21 -23
Feb. 2011

ISS Wor/dMEA

22-24
Mar. 2011

HOSDB

14-16
June 2011

ISS Wor/d Europe

18 - 21
Oct. 2011

Milipol Paris

On Demand

IT Intrusion S eminars

UAE, Dubaï

ISS World HEA

'

...-.....
Home Office

Farnborough, UK

Prague, Czech

ISSWorld

~

Il

Paris, France

'

Partner Companies

t.rov&c:or

MICRO Î SYSTEMATION

intelligence solutions
A ccelerating Your Mission.

CCIEIHRffl

communications
TRL Technology

+tt tt+

l

l

:::: :::: Po aris Wi re ess
•+++ +++•

•tt tt•

COMMUNICATIONS LTD

.utimaco®
a member of the Sophos Group

Detic~

GAMMA NEWSLETTER Q1 /2011

ti

GAMMA
INTERNATIONAL UK UMITED

GAMMA

IT INTRUSION SEMINARS

NEWSLETTER Ql/2011

FINFISHER IT INTRUSION SEMINARS
lt is with pleasure we are able to offer our
services and provide your esteemed department
with its own exclusive 2-day IT intrusion seminar.
The idea behind the seminar is to introduce the
latest techniques in IT intrusion, which will be
presented by our own team of IT experts.
The 2-day seminar will cover all the theory
and live practical demonstrations as well as
discussions on building up your own IT intrusion
team. On the second day, we will also give a full
demonstration of the FinFisher Intrusion and
Hacking Portfolio and review the entire range of
training courses our company offers.
We attach the following documentation:
• Seminar Invitation
• Seminar Agenda
If this seminar is of interest to you, we would like
to agree on the following points:
• Location of the seminar
• Date of the seminar
• Number of Personnel attending from your side
• Any required security clearance for our
personnel
lt would be a pleasure to speak with you at your
convenience and discuss any issues related to
this sem in ar and provide more information.
Day 1
• What is IT Intrusion?
• Re cent Cases (Attacks on Networks,
Cybercrime and more)
• Common Techn iqu es (Samples on Intrusion
to Infrastructures and Systems)
• Intrusion Techniques
Day 2
• Common Techniques continued
• Government IT Intrusion Solutions
• Real life Intrusion Operations
• FinFisher Portfolio

GAMM A NEWSLETTER 01 /2011

,,
GAMMA

INTERNATIONAL U K LIMITEO

AMMA
EWSLETTER Ql/2011

FIN FISHER
IT INTRUSION

FINFISHER - THE ULTIMATE
INTRUSION PORTFOLIO

PRODUCTS PORTFOLIO

FinFisher is the cutting edge offensive IT Intrusion
portfolio on the market today. With this portfolio,
Gamma provides complementary solutions,
products and advanced training capabilities ta
Government end-users who are seeking world
class offensive techniques for information
gathering from suspects and targets.

FININTRU SION KIT

FinFisher combines specialized areas into
one comprehensive IT Intrusion Portfolio. This
provides the Law Enforcement and Intelligence
Communities with accessto an all -encompassing
range of intrusion capabilities, which can be
used effectively from starting up a new Intrusion
Department ta providing world-class solutions
and training ta enhance existing resources.
The Fin Fisher Portfolio is based on the following
products:
Fin Fisher Tactical IT Intrusion portfolio
• FinUSB Suite : Covertly extracts data from a
computer system
• FinFireWire: Unlocks a running computer
system for instant access
• Finlntrusion Kit: Professional tactical IT
Intrusion Kit
FinFisher Remote Monitoring & Infection Solution
• FinSpy: Remote monitoring solution for
computer systems and mobile phones
• FinFly USB: Infection USB device for
physical access
• FinFly LAN: Tactical infection proxy for local
area networks
• FinFly ISP: Strategic infection proxy for ISP
networks
• FinFly Web : Infection website generation for
remote use
IT Intrusion Training Pro gram
• Fin Training: Training Program for IT Intrusion
and CyberWar Teams

Fin Intrusion Kit was designed and developed by
world -class IT Intrusion specialists that have
over 10 years of experience from working in
several Tiger Teams (Red Teams) in the private
and government sector assessing the security
of different networks and organizations. The
Finlntrusion Kit is the result of creating an upto-date and covert operational kit that can be
used for most common IT Intrusion Operations in
defensive and offensive areas. Current customers
include Military CyberWar Departments,
Intelligence Agencies, Police Intelligence and
other Law Enforcement Agencies.

FINUSB SUITE
The FinUSB Suite is a flexible productthat enables
Law Enforcement and Intelligence Agencies ta
quickly and securely extract forensic information
from computer systems without the requirement
of IT-trained Agents. lt has been used successfully
in operations around the world where valuable
intelligence has been found about Targets in
covert and overt operations.

FINFIREWIRE
FinFireWire is a tactical kit that enables the
operator ta quickly and covertly bypass the
password-protected Login-Screen or Screensaver
and access the Target System without leaving a
trace or harming essential forensic evidence.

FIN SPY
FinSpy is a field -proven Remote Monitoring
Solution that enables Governments ta face
the current challenges of monitoring Mobile
and Security-Aware Targets that regularly
change location, use encrypted and anonymous
communication channels and reside in foreign
countries. When FinSpy is installed on a
computer system or mobile phone it can be
remotely controlled and accessed as soon as it
is connected ta the internet/network, no matter
where in the world the Target System is based.

GA MMA NEWS LETT ER Ql /2011

li

GAMMA

G1ROUP INTERNATIONAL

GAMMA
NEWSLETTER Ql/2011

FIN FISHER
IT INTRUSION

FIN FLY

NEW TRAINING COURSES

FinFly is a set of products that is used for easy
local network and remote infection of target
systems. lts main features include on -the fly infection of executable and screensaver
downloads, triggering software updates for
well known software and infection through
visited websites . After infection, the target
system is fully accessible to Law Enforcement
and Intelligence Agencies.

As part of our FinFisher Training Program,
we have created a set of new cutting -edg e
IT Intrusion courses to caver more tapies
requested by our clients over the past few
months.

FinFly USB
The FinFly USB provides an easy-to -use and
reliable way of installing Remote Monitoring
Solutions on computer systems when physical
access is possible.
FinFly LAN
FinFly LAN was developed to covertly deploy
the Remote Monitoring Solution on target
systems in Local Area Networks (Wired and
Wireless/802.11 ). lt is able to infect Files that are
downloaded by the Target on-the-fly, or infect
the Target by sending fake Software Updates for
popular Software.
FinFlyWeb
Fin Fly Web is designed to help Law Enforcement
and Intelligence Agencies to covertly install
FinSpy on Target Systems through Websites
which install the software by using the Web browser module functionalities.
The product can generate a wide -range of
attack codes that can be implemented into any
given Website and which will infect the Target
System when the website is visited.
FinFly ISP
ln order to achieve greater performance and
enhanced reliability, the FinFly ISP product has
been completely redesigned and developed
from scratch, which resulted in major changes:
• The software has been rewritten from
scratch and offers a more intuitive Interface
and more flexibility
• The existing hardware has been replaced by
high performance servers with programmable
network cards

PRACTICAL SOFTWARE EXPLOITATION
Outline: This course offers practical training
on using exploits for IT Intrusion purposes, e.g.
using the latest Adobe Acrobat exploits to hide
Fin Spy inside PDF files, as well as using software
vulnerabilities to break into secure computer
networks, and more.
Duration: 5 days (Basic) or 10 days (Full)
Pre-Requirements:
• Basic Software Development Knowledge
• Basic Windows/Linux Knowledge
• Basic IT Intrusion Knowledge

PRACTICAL WEB APPLI CATION
EXPLOITATION
Outline: This course foc uses on Web Application
Security and shows many different ways how to
analyze them for security issues, and also to use
them to get remote access to web -servers.
Duration: 5 days (Basic) or 10 days (Full)
Pre-Requirements:
• Basic Web Application Knowledge

PRACTICAL PENETRATI ON TESTIN G
Outline : This course covers a wide-range
of penetration testing examples, which are
conducted through several practical examples.
Duration: 5 days (Basic) or 10 days (Full)
Pre-Requirements:
• Basic IT Intrusion Course

GAMMA NEWSLETTER Ql/ 2011

li

GAMMA

G RDUP INTERNATIONAL.

AMMA
EWSLETTER 01/2011

FINFISHER
IT INTRUSION

FINSPY MOBILE
FinSpy Mobile is an advanced Intrusion system
which once implemented into a Target Phone
guarantees full access to the communication
and built-in features.

Target Features
• Basic Communication Interception, such as
Calls, SMS/MMS, Cali Logs
• Access to stored information, su ch as
Address-Book
• Recording of incoming and outgoing E-Mails
• Location Tracking (Cell IDs and GPS Data)
• Live Surveillance through Silent Calls
• BlackBerry Messenger surveillance
• Supports ail common phones: Symbian 8/9,
BlackBerry, iPhone (jailbreak required).
Android , Windows Mobile and Maemo

Key Features:
• Stealth: Hides software deep inside infected
phone
• Communication: Full monitoring of ail activity
• Location Tracking: Via GPS and Cell -10
• Remote Audio Surveillance: lmplemented
through silent calls
• Supports ail major phones: New Systems are
permanently added

FINSPY MOBILE SETUP
The Fin Spy Mobile server is connected by infected Target Phones over the Internet (GPRS / UMTS / Wi-Fi)
or through the PRI Cards (SMS /Phone Ca lis).

-

Target Phone
1· 1F'hone

Th e infected Target Phon e
communi ca tes through
GPRS/ UMTS/WiFi or
SMS/Voice -call s.

2- Blscl:.BefTY
3- Googlc Andrtllll

'1· Windows Mobile
5· Maemo

Th e Fin Spy Mobil e Master acc epts th e
co nnection s and stores th e data in side
th e databas e.

- _".in_5._PY_AlJ.:!'t _____ _

USER INTERFACE

..

.

The Wh oie System is controlled through the Graphical User Interface.
,_.
...,
, .. , ,,.. . l • ow-tilin •
., ~, ,. j
1
llllll
llllll
llllll

llllll
llllll
llllll
llllll
llllll

..............

& Ou u1tlcM> •

& tlaobalTillM "

& SHwfTllM 'I'

-=~

"""""""""'

""'"'"'''''"
"""'""""""
_,....,,,,,,.
Jli»l1~l&

..,..,_,.,,.

llllll

~11.D»l»JG

llllll

llll0041~l8

---

o+El+o+o+Il+o+o+e+-

.....
....,
000.06

....,

2009-12-0Sll.22.50
20J9- U -0S tl2l.11S

1CW-!1.(le ll-2494

:zoœ.u.œu2ru

Xl0l).. t?-tl8 1l 2100

200f..124' 1UJ:23
200i-U-OS1l:3Jl6

~U.OIU::34'l4

20C$. tZ.0$ 13.34 11S

20Dt-U-Oll13~319

200'J- l2-0e13~l2

~ I Ul8 1l.3&20

20aP-U-Oll ll'l&S9

:xJ08-U-G91337.'°

GPS Tracking

lntercepted SMS
Mobk tlme :

.....

~009-12-08 1322::1()

Server Tlme :

§.009-12-08 13:23:37

OirecUon:

[0utoo1no

[sMi_
Phone Humber:

~·1!62374 0849

Contlct Name :

[

MeHaQe :

1Hey. Mee l a17.

GAMMA NEWSLETTER 01/2011

,,,
GAMMA

GaROUP INTERNATIONAL

GAMMA
NEWSLETTER Q1/2011

STRATEGIC COMMUNICATIONS
MONITORING SOLUTIONS

MONITORING CENTER FOR LAWFUL INTERCEPTION
Gamma Group international is a reputable monitoring system integrator for GSM/3G networks. lts
Monitoring Center (MC) is a system designed ta enable Law EnforcementAgencies (LEA) and government
agencies ta perform Lawful Interception (LI) monitoring in an auditable, secure and reliable manner.
lt handles intercepts of voice and data in fixed and mobile networks, on the internet or other IP networks.
Within the two general forms of intercept, voice and data, it manages a wide range of communication
methods.
The system installations can vary in size from a few computers ta an extensive system of many recorders,
data collectors, system servers and clients, depending on the application. lts complexity ranges from
simple passive connection, ta a single trunk line, to being responsible for monitoring an entire country's
fixed, mobile, NGN and internet networks.
Sophisticated user-rights and access contrai mechanisms have been designed ta meetthe organizational
needs of Law Enforcement and Government Agencies.
The implementation is not rigid and these mechanisms can be used ta su it most organizational structures
and variations within the ETSI standards. The mechanisms also build upon the MS Windows environment
ta offer a se cure but flexible application.
The system performs these monitoring and management tasks from a scalable, distributable and reliable
platform with facilities ta ensure the security of the system and intercepted data. lts architecture is
modular, which allows systems ta be built and scaled as appropriate to the customer's needs.
The Monitoring Center supports a wide-range of fixed and mobile switches, internet ISP and backbone
interception points, NGN networks and mobile IP. lt can decode fax and loca l loop internet from circuit
switched networks and ail popular internet protocols from IP networks.
Through add-on product interfaces, the MC offers its data for further ana lysis and intelligence extraction.
lt is currently in use in more than 60 countries.

-

logn1;y fii 1

oc-ce~s. !i-f'l\llCC! &

IAytJr

1100 O
f(>r

BBA 'l\llMAX WIFI
DSl

1

2G 2 50 JC CSM
r COMA 11 tworks

corivorged
11 twu•k&.

FMC tMS

--------------·---------------··----···-----·--·---------------·

1

cou

1n t c~•111JOn

---·· ·--··--.-------- ----··-

GAMMA NEWSLETTER Q1 /2011

li

GAMMA


GAMMA
NEWSLETTER Ql/2011

STRATEGIC COMMUNICATIONS
MONITORING SOLUTIONS

The FinFly ISP System is designed to remotely install the Remote Monitoring Solution (e.g. FinSpy) on
selected Target Computer Systems by integrating the system into an ISP's IP-network infrastructure.
Optional FinFly ISP Addons include IP Shaping and Blocking.
A FinFly ISP System typically consists of the following Appliances and Functional Groups:
A) Target Infection Server(s)
• FinFly ISP Infection Proxy Server
B) Target Identification Server(s)
• FinFly ISP Target Identification Probe/ RADIUS/ DHCP Probe
C) Management System
• FinFly ISP Management Server
• FinFly ISP Management Workstation
D) Network Equipment
• Bypass Switch Function, Switches, Passive Taps, 19" Server Rack(s), UPS etc .

L__. ·---·-------·- -----------------·-----·----------

f h1Ffy ISP Management System

The FinFly ISP System is managed centrally from the LEA's premises using the FinFly ISP Management
System.
The user will administer targets for infection by entering the appropriate target data via the easyto-use GUI on the Management Workstation. The Management Server will distribute the necessary
commands to the FinFly ISP RADIUS Probes and Infection Proxies deployed in ISP's network.
A Target is added to the FinFly ISP system using its access data-like "dial-in phone no." or "username".
ln case the target has a fixed IP-Address this IP-Address will be entered into the system. ln this
specific case the RADIUS Probes are not involved in the Target Identification process.

GAMMA NEWSLETIER Q1 /2011

li

GAMMA

ŒIRCUP INTERNATIONAL

GAMMA
NEWSLETTER Q1/2011

STRATEGIC COMMUNICATIONS
MONITORING SOLUTIONS

IP MONITORING
FinLI is a Front-End system to capture IP data from IP networks according to the requirements of
Lawful Interception (LI) or Intelligence Monitoring (IM). lt provides the captured IP data to the Law
Enforcement Monitoring Facilities (LEMF) - Monitoring Center - according to several international
standards like ETSI and CALEA (and sorne other formats).
The IP Probe components are based on high -end standard server technology and are deployed in the
IP network (ISP network) using passive tapping devices to ensure working with a 100% copy of the
complete IP traffic without interfering with the network itself. This last point is always a major concern
for network operators.
By using a wide range of sophisticated filtering rnethods, realized with Deep Packet Inspection, Fin LI can
provide the target and/or app lic ation data needed. LI implements many different Target Identific ation
procedures, like RADIUS dialog sniffing or active communication with the AAA-Servers in the access
network to identify the targets of interest currently active in the network.
For Intelligence Monitoring, which is not target based, but related to Application Monitoring (e.g.
identifying and recording of Webmail traffic or specific files transferred vi a the Internet), the Target
Identification is not an issue. ln this case, the IP Probes will inspect the traffic bit by bit to id entify
applications and files and then will provide the data, in addition to the source and destination addresses,
to the Monitoring Center for storage, archiving and evaluation.

Network Operator

LEA

Traiupor t Ntt

ADSL

Target


Coble

ATM



ru.. ,,,.,

t

W lrl



SU

Bullt•l n LI

Net work

- ~tw~ Elements

GAMMA NEWS LETTER Ql /2011

Adrnln
H*ndoverUA

CC&Ull

li

GAMMA

tilROUP INTERNATIONAL

GAMMA
NEWSLETTER Ql/2011

STRATEGIC COMMUNICATIONS
MONITORING SOLUTIONS

LAWFUL INTERCEPTIO N
Lawful Interception (LI) is the legally approved
surveillance of telecommunications services, and
has become an importanttool for law enforcement
agencies (LEAs) around the world for investigating
and prosecuting criminal activities and terrorism.
Most countries have passed laws that require
telecommunications service providers to
support LEAs with duly authorized requests
to identify, monitor, and deliver ail electronic
communications of specified individuals and
groups. While regulations and requirements
vary from country to country, international and
American standardization bodies like ETSI or
ANSI have developed technical standards for
LI that will facilitate the work of LEAs and help
operators and service providers to minimize
their costs. Although various standards for LI use
different terminology, the basic functional model
applies to ail LI standards and to all network and
service types.

The main functions of any LI solution are to
access lnterception-Related Information (IRI)
and Content of Communications (CC) from the
telecommunications network and to deliver the
information in a standardized format via the
handover interface to one or more monitoring
centers of law enforcement agencies. Of course,
before surveillance can take place, interception
requests must be approved and appropriately
provisioned to the Interception Access Points
within the service provider's network, and they
must be carefully and accurately terminated after
the interception authorization expires. ln addition,
high security requirements for LI systems are
essential to prevent possible manipulation and
misuse.

Law Enforcement
Agency
Ullan

'"'C'

h lt f;,

Flxed Network

Mobllo Notwork

ISP (o -mall VolP

IN\. Internai Net\vo1k lfllerfoce
IRI. Interception Rolated lnlormat1on
CC· Content of Communicot1on

)( 1, x2. x3: Internai Ne1work tmotfaces for LI Provis10t1n19. IRI
Rnd CC e,chonge
H1 . H2. H3: Standard hondover interface ro the Low Enlorcemern
Agency for LI Provisioning. /RI an(I CC e.cloonge

-------- - -- ·· - - - -

GAMMA NEWSLETIER 01 / 2011

__ _ _ _____.. _- _ _ _ .J1

,,,
GAMMA

EaROUP INTERNATIONAL.

GAMMA
NEWSLETTER 01/2011

STRATEGIC COMMUNICATIONS
MONITORING SOLUTIONS

DATA RETENTION SYSTEM
Data Retention System refers to the process of storing call detail records and subscriber data for
various telecommunications services for a period of several months and years. Law Enforcement
Agencies and intelligence services regard the access to retained telecoms data as an important
pillar of criminal investigation and the prevention of terrorism. The common objective is to use the
data to identify and trace suspects, uncover social networks among terrorists, orto collect admissible
evidence for court proceedings.
Operation

Law Enforeement

& Administration

Agency

Hl·B

Handover
Interface

COR
Mtd•t!IOf\

RO\lltr

S ·'.lfCh

Sy&ttm

Ux:atron
server

Subtcct>t·
D~l'1 PU.,

KEY FEATURES:





Collects communications data (COR, IPDR) and subscriber data from any telecommunications
network
Retains large amounts of data in a powerful and se cure data warehouse
Provides very fast search and analytics in billions of data records
Automates request processing and delivers data to authorized agencies by fax, e-mail, or
secure IP interfaces
Law Enf0
0.ltcl Rctontlon Sulto

1

Ontn Collocti on

Agency

Rcquest Mnnngement

l·----·--·-- ---------------·----------·~':•_9~-·-------- ---- -- __ ~~rtl~~
&

--- .. -

GAMM A NEWSLETTE R 01 /2011

_,
GAMMA
CilROUP INT E R NAT IONA L.

GAMMA
NEWSLETTER Ql/2011

STRATEGIC COMMUNICATIONS
MONITORING SOLUTIONS

COMMAND CONTROL CENTER, CENTRAL
CONTROL ROOMS, CRISIS MANAGEMENT CENTER
Today's complex contrai centers consist of many individual components. The System is able to caver ail
of the core tasks of a contrai center with a variety of specific praducts. These praducts are, of course,
fuily comparable within the system. Moreover, they are fitted with highly flexible interfaces. Thus, in
addition to the core tasks of a co ntrai center, also ail other tasks and functions can be executed and
integrated under one user interface - integrated Command Control Centers.

When it cornes to the core technologies of a modern command center for public authorities and
organizations with security tasks, the system pravides ail the necessary features and elements.
These include:
• Host computer software
• Geographical information system (GIS)
• Switching technology (radio and emergency cails)
• lntegrating and interfacing ofvarious systems (communication-Tetra and Monitoring systemsAudio-Video-data-Telco, etc.)
The System's core offerings are complemented by special software for the smooth operation of
technical administration in a command center, as weil as the functional and ergonomicaily designed
command center desk.

GAMMA NEWSLETTER Ql /20 11

ti

GAMMA
GIADUP INTERNATIONAL.

GAMMA
NEWSLETTER Ql/2011

STRATEGIC COMMUNICATIONS
MONITORING SOLUTIONS

Easy recording of incidents, recommends resources to the dispatcher and can be used for automatic
warnng processes. Appropriate interfaces for numerous interesting contrai variants.

Geographics Information System (GIS) that visualizes the position of the place of incident/
operation/ etc.
GIS-Data turns into images.

GAMMA NEWS LETTER Ql /2011

If'

GAMMA

QRDUP INTERNATIONAL

GAMMA
NEWSLETTER Q1/2011

STRATEGIC COMMUNICATIONS
MONITORING SOLUTIONS

NEW PORTABLE REM OTE THURAYA
MONITORING SYSTEM (TMS)
A New TMS Portable Remote L-band system
has been launched which can be used with the
existing strategic TMS for increased coverage of
the Thuraya network. Each Remote system can
monitor up to 7 additional spotbeams - expanding
the monitoring capability of your existing strategic
system for increased coverage of a selected area
of interest; a single Remote System could double
the area of coverage. Designed for maximum
portability and rapid deployment, the Remote
System is encased in a ruggedized, modular
casing which can be broken down into 4 in dividua l
components for safe transportation. The portable
design enables the system to be easily relocated
in response to changing targets and areas of
interest. Users can assemble the system and it
can be fully operational in 30 minutes.

INMARSAT/ 1-SAT MONITORING
lnmarsat is the most experienced and widely used satellite in the air sector, sea sector and is gaining
more and more interest in the land sector. The number of subscribers has increased in the last year
and new services have been introduced like ISAT-Phone. Due to these effects the monitoring of
lnmarsat has become important for Lawful authorities.
ISMS (l satPhone Monitoring System) offers a complete solution for the passive monitoring and
interception of the lsatPhone in the air, sea and land network on both a strategic and tactical level.
Using C-band and L-band monitoring, the ISMS can provide national and regional coverage for the
monitoring of lsatPhone, FleetPhone and Land Phone terminais. ln addition to call content, the ISMS
so lution can provide information on the date and tim e of call, the numbers dialled, as well as the call
originator. The system can also provide the interception of fax and data transm issions.
1

lnmura.ot 1-4

1

(4F•) S•tolllto

r

1

,~. ~·//~
/
,/~

/

/

~/

I O•t•••r S~n
L -- . --

/

UGH< DOWNUN K

~~

~

l ~Gt« OOWNl.t
UOHr: UftUHK

':'""~~
-...._

'

~

t••tPh""" Mobile
f.tnhSt11lon (MES)

. -· ---·-----

GAMMA NEWSLETTER 01 /2011

'
11

1

1 --- --- ---- .

li'

GAMMA

SAOUP INTERNA TIO NAL

GAMMA
NEWSLETTER 01/2011

STRATEGIC COMMUNICATIONS
MONITORING SOLUTIONS

PASSIVE A-INTERFACE MONITORING FOR GSM NETWORKS,
PASSIVE MONITORING OF ENTIRE GSM NETWORK
The A interface between the MSC (Mobile Switching Center) and BSC (Base Station Controller)
consists of El or STM-1 trunks. The System solution monitors TOM.
A-Interface links between BSCs and an MSC. lt detects calls and text messages on these links
and captures IRI and uncompressed G.711 A-Law or µ-Law aud io associated with the intercepts.
Monitoring of A-Interfaces may be implemented with PDH (64 duplex El) or SDH gateways (2 x STM-1 ).
ln future, we will also support direct Ethernet interfaces. A deployment unit may be used to monitor
more than one A-Interface and a number of SS7 links at the same time. The A-Interface solution
assumes that TMSls are also unique within the context of a Location Area Code (LAC) and that
the LACs are unique with the context of the PLMN identity. ln cases where TM Sis are not unique,
different name spaces can be configured . lt may not be necessary to monitor ail links between an
MSC and its sub-tended BSCs.
The A-Interface monitoring solution is illustrated in the following diagram .

... 1

........

~-:... ....

,,.. .,."" G11

/~ ,,.,

Alntelf~

.2!_

PON

"'V
, , ./ " ,,,
,,."' ,,..

'

, / Î(.ll HLR - AUO l "
I
MSC

ISUP MAP

EIR

J

VLR
i:
!n·;fl ~,..
64f. 1 1'0HGW

~-+---·~A
tn14rfate

BSO

.....

:·:J--:':.

sn.·.11 <1 SOHGW

.....

'AA'.,,

,o
-•l•-i """'"

~.,

Ceot re

l'-'r

With the A-Interface Monitoring System either specific GSM -ce ll s can be monitored or an entire
GSM network. The system works completely passive and provides mass-storage capabilities and
powerful analysis tools for post processing of huge amounts of data .

GAMMA NEWSLETTER 01 /2011

ti

GAMMA
Q AOU P INTE RNATIONAL

GAMMA
NEWSLETTER Ql/2011

STRATEGIC COMMUNICATIONS
MONITORING SOLUTIONS

WI RELESS LOCATOR SYSTEM (WLS ) FOR GSM/UMTS NETWORKS
WLS is the on ly techno logy that provides high -accuracy mobile location across ai l types of
environments in a highly sca lab le and cost-effective way. The easy-to-deploy, easy-to -manage
solution provides LI applications with the precise location of mobile devices to accuracy within 50
meters, and gives Law Enforcement Agencies (LEAs) rea l-time, post-event, geo -fenced and even
predictive intelligence using mass Location capabi lities.
The Wireless Locator has the following applications:

TARGET-BASED LO CATION
INTERCEPTION
Adding high-accuracy location information to
target-based interception allows LEAs to
monitor fleeing suspects in real-time and track
a historical "bread -crumb trai l" of the wire less
activity of a specific user. The highly-accurate
WLS solution can pinpoint the location of mobile
devices to the exact building.
~

\ ,1•
~-~"'""'

MASS LOCATIO N INTERCEPTION
WLS is the only location technology that enables
accurate mass location of ail devices on a mobile
network. Mass location is especially helpful for
post-event analytics based on historica l archived
data, identifying all wire less activity in an area
over a set period of time. This gives LEAs critical
investigative information about suspects after an
event - such as a bomb going off - including who
was present, who they were talking to and what
they did in the immediate aftermath.

BORD ER-ZONE LOCATION
INTERCEPTION
Border-zone location interception allows an
electronic virtua l fence to be set up around a high
security area or an internationa l border, allowing
LEAs to track the location of wireless devices that
travel in and out of the area. The accuracy of the
WLS so lution ensures that precise locations are
identified along the border zone, preventing even
marginal incursions.

GAMMA NEWSLETTER Ql /2011

..,.. .

'

~

\

\ '.

'.

,,,

"r:( ..,...
c~

Jl

li'

GAMMA

l'.aROUP INT E RNATIONAL

GAMMA
NEWSLETTER Ql/2011

TACTICAL COMMUNICATIONS
MONITORING SOLUTIONS

r- --·--·---- -- -- -·

3GN IMSI CATCHER

F'F"

'""!

3G Blind Cali is a new software feature for the
3GN UMTS system. lt allows 3G phones to be
locked to the 3GN and placed in a UMTS blind/
silent call for tracking purposes. This is the
only way to establish blind calls to phones that
are set in "3G only" mode, and it removes the
reliance on passing the 3G phone to a GSM
system for tracking - the target phone stays
on 3G frequencies at ail times. The 3G -OF can
detect and track the signal from a 3G phone in a
blind call, allowing the OF operator to loc ate it.

-

~-

,., .

... ..

~

.

..

~-·

-

.............

.~

r

~,.,...

·-

Blind Call Features:
• New Acquisition mode for the 3GN and OF target status for 3G phones makes ope ration simple
• Multiple 3G blind calls can be supported by each 3GN Node B
• Automatic 3G power contrai ensures that Node B and phone TX power are continually adjusted
to optimal levels to maintain the blind call
• The 3GN can continue to take registrations from other 3G phones whilst maintaining a blind call
to the target phone
JG Direction Finder Features:
• Provides indication of target RSCP (Received Signal Code Power) to en able operator to judge
distance and bearing to target
• Features gra phical and audio feedback of currenttarget RSCP level for ease of use in
challenging operational scenarios
• Ouick and simple to use with minim al configuration required
i- --

-- -

-· - -·--·

---- --·-· - ---·-· ..

1

The 3GN captures the 3G phone
and places it into a blind call.
The uplink and downlin~ TX
powers a re automat ically
adjusted to opti mise the
connectio n to t he phone.

1

1
1

-

t

~--·

'11~

.

1
1

i

. -- .~- Ov

TI1e 3G-DF locks on to the
uplink signal from the
phone, allowing the DF
operator to track the
phone to its location.

1
1
1
1
1'

- - - - - - - - ----·- ------- -- ·----------- ------------- ___________________J

GAMMA NEWS LETTER Ql/2011

li

GAMMA

G1RDUP INTERNATIONAL

GAMMA
NEWSLETTER Q1/2011

TACTICAL COMMUNICATIONS
MONITORING SOLUTIONS

XPZ WIRELESS IP
The XPZ is normally controlled by a Cat 5 cable that connects the laptop to the XPZ.
We can provide you with our secure wireless IP connection instead of the cable connection, enabling
remote controlling of the XPZ from a safe remote location.
This is possible in different ways:
RF units
• Four channels enabling four links to ope rate in the sa me area
• Secure wireless Link
• Output power of lOOmW
• Simple to deploy and contains a battery (typically last for 2 hours)
• Range extensions by deploying additional units
High Powered Wi Fi units
• Longer range
• High output 10-20W
• lncorporate 3G Router
COFDM MESH units
• Diversity reception to gre atly enhance the range; copes better with multi path condition s
• MESH Network could be linked to www by sec ure 3G router/VPN or satellite connection

The RF unit can be used on four channels
enabling, if necessary, four links to operate ;
in the same area.
The Cat 5 cable can be replaced by a sec ure
wireless link. The RF units only have an
output power of 100mW so the range is
limited but may be more than adequate in
some operational scenarios. Naturally, the
range can be extended with the use of the
appropriate aerials and choice of frequency
band. The units are very simple to deploy and
contain a battery which would typically last
for two hours.

GAM MA NEWS LETTER Ql /2011

• •

li

GAMMA

GIROUP INTERN ATIONAL.

GAMMA
NEWSLETTER Ql/2011

TACTICAL COMMUNICATIONS
MONITORING SOLUTIONS

GSM OFF-AIR TACTICAL SYSTEM INTEGRATION EXAMPLES

Omnidirectîonol
antenna

..

monitor
ontermo

Directional
ontenno

antenne

GAMMA NEWS LETIER 01 /2011

tl

GAMMA

C.ROUP INTERNATIONAL

GAMMA
NEWSLETTER Ql/2011

TACTICAL COMMUNICATIONS
MONITORING SOLUTIONS

CELL ANALYSIS FOR INTELL OPERATORS
The cell analysis system is an advanced Network
Survey Tool that delivers a comprehensive
set of accurate measurements on GSM/PCN/
UMTS and 802.11 wireless Networks. The
cell analysis is supplied with software tools
designed ta collect off-air data relating ta
network coverage. The package provides the
accurate RF measurements needed for digital
investigation or forensic examination, whether
in real -time or for historical analysis. This is
specifically important for intel! operators ta
technically ana lyze the network for optimizing
the use of Off-Air GSM monitoring systems.

1

GIS MAPPING FOR OFF-AIR
GSM MONITORING
When using Off-Air GSM Monitoring system
lin ked ta directional findings, one of the critical
requirements is for the mapping systems
with high resolution details and updated Map
data ta provide accurate readings during the
Endusers intel! operations. With the support of
our Mapping partners, we are able ta provide
exactly this technology, ta enable ta Geo locate targets down ta street levels. For further
inform ation on our mapping facilities please
kindly contact us.

VERSATILE HANDHELD
MEASUREMENT PLATFORM
The unit Pocket 9.0 is a versatile handheld
measurement platform that bath engineers and
nontechnical staff can easily use ta collect
network measurements ta enable intell operators
ta optimize the use of Off-Air GSM monitoring
systems, whenever and wherever the need
arises.
A compact, lightweight, and robust measurement
application, the unit 9.0 runs on various Nokia
devices, enabling tests of GPRS/ EDGE/WCDMA
networks in virtually any location.
This simple, yet powerful tool, provides users
with engineering trace records and a real time visualization of the measured data on the
display scree n. Users can set-up any desired
connection, such as speech calls or video
telephony, exactly as a subscriber would. The
important radio trace and Layer 3 information is
then recorded during the connection sequence.
Trace and logfiles are always recorded, but no
test scripts are executed.

GAMMA NEWSLETIER Ql /2011

li

GAMMA

GIAOUP INTERNATIONAL

GAMMA
NEWSLETTER Q1/2011

TACTICAL COMMUNICATIONS
MONITORING SOLUTIONS

TACTICAL GSM OFF-AIR MONITORING (PASSIVE)
WIDEBAND PASSIVE GSM/GPRS OFFAIR INTERCEPTION SYSTEM
APPLICATION
The system is an advanced multi-band (900, 1800,
450, 850, full rate, half rate Ext. GSM, etc .) fully
passive GSM interceptor designed ta intercept
the entire bidirectional traffic (GSM, GPRS, voice,
data, MMS, SMS, EMS) occurring between Base
Transmitting Stations (BTS) and Mobile Stations
(MS) and located within the system operational
range.
·· -· -- - · .. ·- .... -- As a receive only system, it is totally stealth (no interference with the network) and has high
performances thanks ta a unique architecture. The System offers real -time communication interception
and direct-to-disk recording capabilities. The System is fully programmable and configurable via a
user-friendly GUI including filtering and triggering capabilities.
MAIN FEATURES
Voice and data interception (data GSM/G PRS, SMS/EMS/MMS)
Automatic network and environment analysis for easy system configuration (operators
detection, cell detection ... )
Up ta 256 full duplex simultaneous communication interceptions (voice and data)
Real-time listening of 2 full duplex communications per operator workstation
SYSTEM CAPEBILITIES
2 full duplex (or 4 simplex) bands among GSM450, GSM850, EGSM900, DCS1800, PCS1900
Full band analysis: Simultaneous acquisition of ail channels (374 for DCS1800)
No limit on frequency hopping
Up ta 64 cells simultaneously under surveillance
Exhaustive start of communication detection
Up ta 256 full duplex communication interceptions (voice and data)
Real-time handover management
FILTER ING CAPABILITIES:
Service provider selection
Cell selection : power & quality criteria
Cali selection: uplink power & quality criteria
Service selection: GSM, GPRS, SMS, ln/Out call ...
Target selection: TMSI, IMSI , IMEI, MS-ISDN

UNIT OPTIMIZED FOR MASSIVE
INTERCEPT, FIXED INSTALLATION







Real -time up -to 30,000 intercepted
communications p/hr
Can be upgraded ta handle 37,500
communications p/hr
19" 4U, depth 800 mm
Weight 32 kg
Power supply: 110-230 VAC, 600 W
1 TB for intercepted traffic storage
GAMMA NEWS LETTER 01 /20 11

Il

GAMMA

GIROUP INTERNATIONAL

GAMMA
NEWSLETTER Ql/2011

TACTICAL COMMUNICATIONS
MONITORING SOLUTIONS

Data base
Command
Centre

_U_LJi'!' <1 rea

__ __
1

_,.

..,_ OL_~area
1

Sever al
Laptops
(Adrnin & Op)

PORTABLE UNIT FOR TACTICAL
OPERATIONS
.,
.,
.,
.,
.,
.,

Rea l-time 15,000 intercepted
communications per hour
19" 3U, depth 285 mm
Weight 15 kg
Power supp lv: 24-36 VDC, 350 W
1 TB for intercepted traffic storage
Vehicle lntegrations: Covert antenn a
mounting 81 car insta ll ation kit

Mobile Site

PASSIVE system including
extended storage capacity

Road.-unner

O..cryptor

GAMMA NEWSLETIER Ql/2011

,,,
GAMMA

SROUP INTERNATIONAL

GAMMA
NEWSLETTER Ql/2011

TACTICAL COMMUNICATIONS
MONITORING SOLUTIONS

TACTICAL INTERNET
MONITORING SYSTEM
The System is develop ed to monitor, capture
and eva lu ate internet traffic on a tactical level.
The system does not reduce bandwidth and
speed of the target's connection. lt can be
connected to any ADSL network. The system
supports ADSL and future generation ADSL2
and ADSL2+ pratocols. Two ADSL lin es can be
monitored simu ltaneous ly.

FEATURES OF CAPTURE UNIT:





If needed, the system can capture the complete traffic
MAC address filter options to decrease the data volume
The Capture Unit is contro il ed by remote (encrypted)
Fram ISP side the Capture Unit is invisible

FEATURES OF OPERATOR UNIT (LAPTOP):






Pravid es sub stantial server contrai functions (m aintenance, contra i of capturing services)
Downlo ad data, sort and filter data, manage targets
Law weight and easi ly transported
Can also be used as norma l office laptop
Support of ail modern media and office app li cation s

ANDROID SURVEY APPLICATIONS
We have developed a number of application s
for the Andra id operating system as used on the
Google Nexus 1 phone.
These app li cation wiil ailow the foilowing:
• Scene of crim e survey tool
• Network coverage lo gging, ail networks,
GSM and 3G
• Logg ing of lo ca l WiFi access po ints with
GPS position
• Loca l disp lay of logs on Goog le Earth
• Disp lay on Goog le Earth using exported
KML files
• Interface to any desired Database

GA MMA NEWSLETTER 01 /2011

If'

GAMMA


GAMMA
NEWSLETTER 01/2011

TACTICAL COMMUNICATIONS
MONITORING SOLUTIONS

HIGH PERFORMANCE PORTABLE RADIO MONITORIN G SYSTEM
The unit is housed in a sturdy, high-impact
transport case containing one or two receivers
with associated antenna interfac e circuity, a
power management system and a laptop. The
built-in power management system allows
operation from three sources: mains, vehicle
battery or built-in rechargeable battery. The
entire system is lightweight and easy to carry.
The system can be specified with a single or
dual receiver configuration. ln a dual receiver
setup it is possible to monitor the demodulated
audio signal of the received frequency, without
any interference, which is inherent to the
pseudo-Doppler technique.
The Direction Finding system (OF) employs the
proven pseudo-Doppler method, combined
with statistica l signal processing, to deliver a
cost-effective, yet highly accurate, OF solution
for government, military, law enforcement and
industrial applications.
The entire OF system comprises of fully
integrated receivers, battery, charging unit and
contrai circuitry in a compact sturdy carry case,
ready for quick and easy deployment anywhere,
with or without external power sources.
The fully weather-proof antenna system cornes
with a sturdy tripod and employs 8-pole arrays
for HF/VHF and UHF frequency bands for
maximum accuracy.
The Multichannel Radio Monitoring System
is shipped in a specially designed ruggedized
19" rack-mounted chassis with built-in shock
absorbers, to ensure safe shipping.
The unit can then either be removed from the
enclosure, or operated from inside it. This is
particularly useful for mobile operation.
The system is shown together with a matching
antenna distribution unit which is also suplied
in a similar protective enclosure.
For stationary applications, various rack-mou nt
options are also available, ranging from a sing leunit arrangement (pictured) to large -scale
installations. For these, we provide complete
turn-key solutions, including antennas and
antenna distribution units.

GAMMA NEWSLETTER 01 /2011

li'

GAMMATSE
GAMMA
NEWSLETTER Ql/2011

TECHNICAL SURVEILLANCE
SYSTEMS-VANS/CARS

SURVEILLANCE VANS
We are a company backed by many years of
experience in technical intelligence techniques
and equipment.
We work exclusive ly on behalf of authorized
Government Security Oepartments and Law
Enforcement Agencies. As a result of many
years of "active servi ce" for clients worldwide,
our assistance is highly sought after.
We will in dividually design surveillance vehicles
to your exact requirements, meeting with you at
ail the major milestones durin g the design and
integration process to ensure that each vehicl e,
not only meets your current needs, but can also
be upgraded in line with future technological
developments.
No two surveillance vehicles are alike. These
vehicles are especially designed to meet
individual needs, such as vehicle type, finish,
operational usage, equipment for integration,
etc. Whatever you are looking for, from a very
basic surveillance, command or communications
vehicle, to a comp lete mobi le command and
contrai center, we can provide a complete
design and integration service.

GAMMA NEWS LETTER 01/2011

-

1

tl

GAMMATSE
GAMMA
NEWSLETTER Ql/2011

TECHNICAL SURVEILLANCE
SYSTEMS-VANS/CARS

VAN CONVERSION
VEH ICLE CONVERSION OVERVIEW:

















lncludes: floor, walls, and front bulkhead,
ceiling framing; minimum of 50-mm polar
fi ber insulation. The ope rational area inside
the van has 85 percent ECM screening
Equipment, counters and cabinets,
carpeting, Formica finishing, wiring in
plastic and flexible conduit and junction
boxes are provided
The interior lighting package includes all
necessary equipment and installation
Air exchange system
Bench seat with 2 seatbelts (fitted when
space allows)
Storage pockets
Fixed front bulkhead wall with sliding entry
and exit door; si de door window disguises
video viewing ports, IR Plexiglas inserts
and len s boat
Main operator's contrai panel contrais all
surveillance equipment and also monitors
the battery status and current draw of the
operating equipment
Operator's chair with adjustable back,
360-degree swivel base, rail mounted
Auxiliary Power System
Freon Compressor Powered Law Noise Air
Conditioner
IR Viewing Port Panels

BASIC EQUI PMENT IN STALLATION:











Video Observation System 360° day and night
Specialist Audio Receivers (Digital &
Analog) with Remote Contrai
Video Diversity Receivers plus Outstation
Remote Contrai Links
Audio Contrai System
Video Audio Matrix
Video and Audio Processing of Targets
Command and Contrai Software
Communications Equipment
Vehicle Security Alarm System
Specialist Covert Antenna

GAMMA NEWSLETTER 01 /2011

li

GAMMATSE
GAMMA
NEWSLETTER Ql/2011

TECHNICAL SURVEILLANCE
SYSTEMS-VANS/CARS

COMMUNICATIONS MONITORING
VAN INTEGRATION
Madel 7007 Communications Monitoring
Surveillance Van represents a new era
in communications monitoring platforms
inte grating live off-air monitoring of GSM,
UMTS, OF, Thuraya-Satellite Monitoring and IT
wireless LAN Intrusion. The Commun ications
Monitoring Surveillance Van also provides links
ta the endusers headquarters enab ling onsite surveill ance operations ta be carried out
quickly and effectively. The Commun ication s
Monitoring Surveill ance Van platform can
be in sta lled into various van s (i.e Mercedes
Sprinter, Toyota Hiace or GMC Cargo Van) and
provides operating areas for up ta 3 operators.
lncluded in the van is technical ana lysis and
workshop support areas. The Madel 7007 is
constructed of high quality material and is bu ilt
by craftsmen with over 30 years of experience
in vehicle design and conversion.
Equ ipment Installation Options:
• Active Off-Air System Mobile Version
• Active Off-Air UMTS
• GSM Mobile Tracer & Locator
• GSM Ve hic le Direction Finder
• Thuraya Satellite Monitoring System
• Wireless LAN Interception
• RF Monitoring
• Passive Monitoring
• lncludes floor, walls, and front bulkhead,
ceiling framing; minimum of 50mm polar
fiber in su lation. The operational area in side
the van has some ECM screen ing
• Se cure Storage of Equipment

GAMMA NEWS LETTER Ql /20 11

GAMMA
NEWSLETTER Q1/2011

TECHNICAL SURVEILLANCE
SYSTEMS - VANS/CARS

3G-COFDM-IP MESH
SURVEILLANCE VEHICLES
The Remote Video Surveillance Vehicle System
is designed to allow covert video and audio
survei ll ance of a target area without detection,
allowing greater tlexibility during surveillance
operations.
The system allows the operator to park the
vehicle close to the target's location, house,
office, restaurant, etc . and transmit the
gathered information back to the command
location in a surveillance van, observation point
or another support vehicle.
lt allows the operational surveillance team
to monitor by video, for example, the images
of the target location tram the tour cameras
concea led within the vehicle.
lt allows the survei ll ance team to monitor audio
transmissions tram the target loc ation tram
room or body-worn equipment, and activate
hidden microphones linked to the Remote Case.
lt also al lows the operational surveil lance team
to connect eKternal video and audio equipment
to allow long range observation of a target in a
difficult environment or remote location .
Contrai of the system is by a digital te lemetry
link, which allows full contrai of the camera
selection, pan, tilt, zoom tunctions, as well as
repeat incoming video and audio signa is tram
the room or body-worn systems used by the
undercover surveillance team .
These remote systems are usually titted into
vehicles (saloon cars, 4x4s) that can then
be left unattended in the survei llance area,
transm itting the intelligence information
requ ired to the Command Surveillance Vehicle

1

1

1

1

l Roono~
---.

~-

--·-·-·----

COFDM/IP MESH/3G .
Using our unique Motorbike Remote System,
as part of the total surveillance operation,
allows even greater tlexibility in the covert
surveillance operation . The Motorbike Remote
System allows the surveillance team to link
several video/audio remote systems into the
tota l surveillance concept.

GAMMA NEWSLETTER Gl /2011

'

li

GAMMATSE
GAMMA
NEWSLETTER Q1/2011

TECHNICAL SURVEILLANCE
SYSTEMS-VANS/CARS

COVERT SPEED CONTROL AND
SURVEILLANCE SYSTEM
The Speed Contrai and Enforcement System
is the world's leading mobile surveillance and
speed enforcement brand.
The modular design of the speeding system
allows for a ful l range of system and upgrade
options depending on budget, ranging from a
simple non-video speed measurement system
to solutions encompassing multiple cameras,
MPEG4/H .264 video record ing, radar system
integration and Automatic Number Plate
Recognition (ANPR).
The System consists of four main components:
• Front 10x zoom camera with integral
microphone (18x zoom camera option)
• DVR with Optiona l 3G
• Remote Contrai Unit (RCU)
ACU

Upgrade options may include:
• Up to 3 additional cameras
• GPS antenna, providing vehicle tracking,
speed log and other meta-data information
• Live video streaming via GPRS / 3G
• Remote microphones
• Up to 500 hours of recording

GAMM A NEWS LETTER 01/2011



li

GAMMATSE
GAMMA
NEWSLETTER Ql/2011

TECHNICAL SURVEILLANCE
SYSTEMS - VANS/CARS

WIRELESS IP NETWORK MESH SURVEILLANCE EXAMPLES

1-----·---- --- -- ··---·. ·-·--·------

~-·---

-

Mesh node position on High Rise
building will substantially improve
the coverage of the network.

\
Ali th ese locations have MESH nodes and
thus secure data can be exchanged between
each location whether it be streaming
video, VolP, general data such as emails and

1
1

j___ ------------ _____

phot~gr~phs.__

_ -------- _

HQ Building

Video Surveillance Package
MMI Veh icle Installation
' G -- &~......_

Video Surveillance Vehicl e

Radio Microphone Operation

L_ ·- ---- -- ---- ----- -

of these deployments Io be monitored
and controlled from a PC terminal in the
HQ building
HO Building

-- ----- ------ - - · - - - - - - - - - ---

GAMMA NEWSLETIER Ql/2011

li

GAMMATSE
GAMMA
NEWSLETTER Q1/2011

TECHNICAL SURVEILLANCE
SYSTEMS - VANS/CARS

Smart Phone link to Server

Mesh
Network

MESH network linked to WWW by secure 3G
router/VPN

Networked Work
Stations can
monitor and control
equipment
connected to MESH
nodes

Analogue
camera

and equiprnent connect to
MESH nodes

IP link to MESH ,
Codex and IP 3G, Wi Max etc
recorder in
Pelican case

Any 3G network can be used

Mobile MSC

PCs with access to

the www can also
access the server
Networbd PC• have 4CCUI !Othe NVR

-

fiKed IP address

Clients Server

Quick Deployment Video
Package

GAMMA NEWSLETTER Ql /20 11

li

GAMMATSE
GAMMA
NEWSLETTER Ql/2011

TECHNICAL SURVEILLANCE
SYSTEMS-VANS/CARS

SEGURE MOBILE NETWORKING
This unit provides communications solutions
for scenes without infrastructure or where
infrastructure has been destroyed . lt is flexible,
broadband, secure and versatile, covering
a wide -area and dynamically optimizes a
communications solution. lt is designed for
mobile users, for mobile use in vehicles as well
as being a fixed or portable communications
solution. lt allows transmission data rates of up
to 6.5 MBit/sec for mobile and up to 16 MBit/sec
for stationary use. The unit provides sufficient
throughput for applications su ch as audio, video
and data transmissions. The unit relay feature
allows unproblematic implementation of even
broader ranges . lt ensures the confidentiality,
integrity and authenticity of the transmitted
data at ail times, and uses powerful, officially
approved security mechanisms (in accordance
with BSI guidelines). The use of amplification
mechanisms ensures a range of typically 2 km
between two devices.

.,....._r.P~

.•• .••

~ --'.~~~~~. -- ·-· ·-- -- ·-- ··- ··- ··· ··- ·-- ··• ·-- 11
I~)

ft

,) .

HEADOUARTER

'•.

~

SURVEILLANCE CARS

USERS

J

-------··-------- - - - - - - - - -

GAMMA NEWSLETTER 01 /2011

li

GAMMATSE
GAMMA
NEWSLETTER Q1/2011

TECHNICAL
SURVEILLANCE EGUIPMENT

LONG -RANG E AUDIO CAPTURING & RECORDING SYSTEM
The Madel 6309 Audio Sc op e System is a high-performance aud io capturin g and record in g system
custom ized for the intelligence end-users. The unit all ows an operator ta zoom in on a particu lar
abject and record required sound in mu ch the sa me way as a camera zooms in a picture. Th is makes
the unit an id ea l so lution for separatin g out conversation s in noisy environments. There is bath
fixed and mobile so lution. The core compo nent of the unit is a microphone array composed of 285
individual microphones integrated in a slim 1.5-meter dish.
The exact direction for sound pickup is steered from the vid eo screen without any physical movement
of the dish. The ad vanced signa l processing makes the targeted sound source clearly audible, even
in a noisy environm ent.

ZOOM IN ON SOUND SOURCES POST RECORD IN G
Any audio missed in real-time can be captured late r in replay. Th is unique function is idea l for
crowded places where the operator does not know from whom or where he would like ta separate
the sound until later.
INTUITIVE USER INTERFACE
The system's very intuitive user interface offers fast, acc urate operation of th e unit. The operator
monitors the live on-screen view from the camera, and simply moves the cursor to capture se lected
audio. The trackba ll is used ta follow moving abjects and the jo g wheel ta go back intime for rep lay.
The system supports multiple output chan nels and the operator can se lect up ta five li sten in g zone s
simultaneou sly - bath in real-time and in repl ay. The operator can also choo se ta se lect 'filters ta
eliminate undesirable sound and noise .

Fixed System installed in a room ceiling

Mobile System installed in a car tire

.......ASB

,--- - G

bllCth..,,..

C.b
IC..IH COllCI I

AM D

AMO

........

ASPU

ASPU

Mobile Configuration

........t

""'"'""·

Fixed Configuration

GAM MA NEWSLETTER 01 /2011

If'

GAMMATSE
GAMMA
NEWSLETTER Q1/2011

TECHNICAL
SURVEILLANCE EGlUIPMENT

COMPACT AUDIO SURVEILLANCE
FLUORESCENT LIGHT SYSTEM
The unit is a unique audio surveillance device
capable of operating in hostile environments
where the target utilizes TSCM sweep teams
to clear the area of "bugs". lt utilizes a unique
optical communications link capable of standoff distances of 100m/109yds. Installation merely
requires the insertion of the surveillance lamp in
the target room. With power applied via the lamp's
socket, it collects room audio and transmits it via
the optical link to the remote optical receiver.
Typical 100m/109yds operating range is limited
only by line of sight conditions and environmental
ambient lighting such as sun light or bright street
lighting next to the target window.

r -

IPHONE RECORDER
Fitted inside the new IPhone 3GS or 4 is a digital
audio recorder quite simply giving excellent
audio recording for up to 54 hours.

1

The IPhone can be used with or without the
headphones without any interruption of the
audio.
Recording Time No Compression: 27hours
Recording Time 2-1 Compression: 54 hours
Battery Life: 11 hours standard battery
Download software is to forensic specifications
Records encrypted and "h idden" within the
IPhone.

MINI CAMERA
Available in two versions: vehicle or bodyworn,
producing a 400 x 400 pixel image. The camera
is capable of 30 fps, but the actual fps will be
determined by the recorder. lt has autogain .
The lens will have a 90 degree viewing angle,
and + 90 degrees for the field of view. Generally
75 degrees is enough to see everyone in the
front and back seats of a car if the camera is
mounted in or near the rear view mirror. The
lens is designed to be in focus about 3 feet from
the camera, but will have a large depth of field .
Passengers in the back seat will be in foc us if the
camera is mounted in the rear view mirror.

Vehicle Fitting Version

GAMMA NEWSLETTER Ql /2011

ti

GAMMATSE
GAMMA
NEWSLETTER Ql/2011

TECHNICAL
SURVEILLANCE EGUIPMENT

GSM/GPS TRACKING SYSTEM AS
The Madel 7312 Tracking System AS is a GSM
aud io Transmitterwith an Integrated GPS module,
data logger, movement sensor, switched output
and the option of Aud io record in g. Transmission
of position data occurs vi a SMS, CSD and GPRS
connection. The internai data logg er uses micro
SD card to store the traces. These data can be
also received vi a CSD, GPRS or USB Connection.
The contrai and the configuration of the AS
Tracking device is also possible via SMS, CSD,
GPRS and USB Connection.

3G, GSM, VOIP CALL DIVERTER
Dep loye d in situations where a users true
mobile number needs to be withheld. The Madel
4016-2 3G is a convenient means of providing
untraceable communications for Voice, Text
and Pictures and is ideal for:
• Law Enforcement Informant and Operative
Management
• Intell igence and Counter Intelligence work
• Hostage/Kidnap commu nic ation s
• Witness re loc ation/protection
communications
• Providing undercover operatives a covert
comms recording fac ility
• Cou ntermeasures against GSM/3G loc ation
services
The unit is a se lf-contained remote call diverter for use with GSM and/or 3G networks. lt al lows calls to
a given mobile to be diverted to another mobile or to a VolP termina l, thereby, ensurin g the anonymity
of the called or ca llin g party. Where an incoming call has to be monitored e.g. kidnap scenarios, it
offers digital recording and live monitoring on ai l diverted calls.
Key features of the system are:
• Re ce ive and transmit text messages from any GSM/3G network
• Automatically redire et text/picture messages and audio
• Make a VolP call from anywhere, and appearto be a loca l Mobile
• Internai lo gging of ail received and transmitted messages
• Screen and keyboard user interface
• Redire et to a predetermined number or VolP terminal
• Change predetermined number via text message
• Operates with any 3G/GSM network provider (including pre-paid)
• Totally un der the contrai of the operator. No network involvement
• Compact system, tota lly portable (12v de power requirement)

GAMMA NEWS LETTER 01 /20 11

li

GAMMATSE
GAMMA
NEWSLETTER Ql/2011

TECHNICAL
SURVEILLANCE EBUIPMENT

DIGITAL STEREO RECEIVER INC. IP
The Madel 1031 Stereo Receiver is a handheld
unit providing digital wireless microphone
systems, which offer extremely high quality audio
output. lt is a true dual diversity receiver designed
ta counteract multiple reflections in difficult
radio frequency environments. Dual antennas
and receiver channels operate in parallel with
proprietary circuitry ta identify and select the
better input. Modern Digital Signal Processing
is also employed ta achieve the best possible
resu lts.

l

1
1

l--~-~----

DIGITAL STEREO AUDIO
TRANSMllTIER INC. IP

Sma ller than l4 the size of a credit card and
only 4 mm thick. The tiny transmitter can fit into
practically any concealment. The low power
consumption combined with outstanding stereo
or mono aud io (up ta 8000 Hz response) makes
this transmitter an outstanding performer. The
ultra miniature positive Iock connectors allow
flexibility for microphone interchangeability and
the connections will not corne apart. A milled
aluminum case provides exceptional durability.

1

1

l __ -- ----- BLUETOOTH AUDIO SURVEILLANCE
The Madel 6411 is a multipurpose audio
surveillance system based on Bluetooth wireless
technologies. lt can be used for live surveillance
or as a recording device for audio or GPS
trac king data or as a combination of the two.
Applications:
1. Combined Tracking and Audio Surveillance
2. Simultaneous Live Trac king of Multiple Targets
3. Otticer Safetv (Force Protection)
4.. Room Audio Surveillance

Flatrosponsomicrophone

Speech band passmicrophono

Highposs microphonc

---------

----- -

··- ·-··-

ADVANCED DIGITAL STEREO/AUDIO
SURVEILLANCE SYSTEM
This 6100 system is a full -featured, portable
digital audio listening and recording solution for
Law Enforcement Agents, Intelligence Services
and the Military. The system provides 57 RF
channels and 8 RF repeater channels and is
extremely suitable for multi-location surveillance
operations. The 6100 Series receives, records,
and plays audio tram their transm itters.

GAMMA NEWS LETTER Q1 /2011

If'

GAMMATSE
GAMMA
NEWSLETTER Ql/2011

TECHNICAL
SURVEILLANCE EGlUIPMENT

MOBILE ROUTER
The Madel 104 Mobile Router is an ideal solution
for providing secure global communications ta
your systems, machines or rernote networks.
Using our mobile router there are no distance
limitations, for rernote site monitoring! Ali you
need ta get connected is our Mobile Router
and a SIM Card frorn your mobile internet
service provider. Router includes quick and easy
configuration wizard. The step by step wizard
will help ta set up 3G settings and create a local
wireless network within minutes. Built-in firewall
protects the local network PC's frorn intruders.

AUDIO CONCEALMENT KIT
The 6517 kit includes:
• 1 body-worn recorder
• 1 covert belt recorder
• 1 covert watch recorder
• 1 covert lighter recorder
• 1 covert keyfob recorder
• 1 GSM/recorder for roorns or cars
• 1 covert harness
• 1 set of batteries

MICRO RECORDER KIT
The Madel 6518 Micro Recorder Kit consists
of 2 Micro Recorders, srnall enough for easy
concealrnent, and with capabilities ideal for
multiple scenarios. Ta accornpany the Recorders
are multiple power sources of different sizes,
length of operation life, and power input. The
Kit also cornes with multiple rechargeable
LiPo batteries, rang ing frorn 250rnAh up ta
1Ah, compatible with non-rechargeable 19Ah
batteries and also a mains power supply.

VIDEO RECORDER
CONCEALMENT KIT
The 5626 kit includes:
• 1 body-worn
• 1 video/audio keyfob
• 1 video/audio covert earphone
• 1 video/audio coffee cup
• 1 video/audio srnoke detector
• 1 covert video/audio PCB
• Accessories
• 1 set of batteries

GAMMA NEWS LETTER Q1 /20 11

GAMMA
NEWSLETTER Q1/2011

TECHNICAL
SURVEILLANCE EGUIPMENT

MO DEL 5610 COVERT VIDEO AUDIO RECORD ERS OPTIONS

Model 5610-3
5MP - 8 GB
Recording lime: over 100 minutes
------

___ ,

1

Model 5610 - Pen
2MP - 512 MB

1

Recording lime: Over 2 hours

1

---------·---·

----·--'

Model 5610 - Pen Kit
2MP
Recording Time: Over 2 hours

Model 5610 - Set Kit
5MP-8GB
Recording lime: Over 2 hours
1

L

GAMMA NEWSLETTER Ql /2011

------- - ______!

ti

GAMMATSE
GAMMA
NEWSLETTER Ql/2011

TECHNICAL
SURVEILLANCE EGUIPMENT

VIDEO OBSERVATION CONCEALMENT EXAMPLES
WITH OR WITHOUT TRANSMISSION

GAMMA NEWSLETTER 01 /20 11

li

GAMMATSE
GAMMA
NEWSLETTER Ql/2011

TECHNICAL
SURVEILLANCE EGUIPMENT

MINI TRANSMITIER
The Madel 7320-22 transmitter fits into every
jacket pocket because of its incredibly small
dimensions. lt has an extremely robust, but
nonetheless very lightvveight housing made of
aluminum, and is therefore suitable for almost
ail applications. Specially protected connectors
avoid accidentai disconnections during operation.
The device has 100mW transmission power but
you can increase this power by connecting gain
antennas. The transmitter is available as 1.4 GHz,
2.3GHz and 2.4 GHz device so that you have a
reliable transmission, even if you do not have a
line-of-sight connection betvveen transmitter and
receiver.

MOBILE DIVERSITY RECEIVER
The Madel 7320-23 diversity receiver offers
flexible operation and more. Integrated state of-the-art batteries guarantee long running time
of the receiver without mains power supply, so
that you canope rate the receiver independently
without cables and without installation.
• mobile diversity receiver
• perfect for broadcasters
• for use with V-mount batteries
• MRC - maximum ratio combining
• configuration via OSO
• ea r phone con nectars

DIGITAL COFDM RECEIVER

1

The Madel 7320-24 Mobile video transmission
plays an important raie nowadays. But also
stationary applications are becoming more
advanced, so many users are now looking for
new possibilities. Long-range, reliability and
better video quality - are what the digital COFDM
receivers stand for, from the standard desktop
device to the complex 8 antenna diversity system.

1

1
1
1

.__________ J
MOBILE MINI DIVERSITY RECEIVER
Madel 7320-10, with its small and handy case
with integrated 2-channel diversity receiver,
brilliant TFT display and strong batteries, is the
ideal solution for mobile applications. Available
in 230MHz, 1.4, 2.4, 4.4 and 5.8 GHz., our diversity
systems use a special technique for the
interpretation of unequally received antenna
signais. The "Maximum Ratio Combining" (MRC)
procedure evaluates signais and combines the
best parts in order to obtain a high-quality, failure
free signal.

GAMMA NEWSLETT ER 01/ 2011

,,

GAMMATSE
GAMMA
NEWSLETTER Gl/2011

TECHNICAL
SURVEILLANCE EBUIPMENT

FLYING PLATFORM FOR VIDEO
SURVEILLANCE
The Madel 5030 is an extremely lightweight and
quiet flying surveillance platform. Due ta the
electronic position contrai the AirRobot can be
flown without any pilot experience. The flyin g
surveillance platform can be in the air manually
control led or is fully programmable. If it receives no
commands, it remains at its height and direction,
GPS or optical position system (OPS) controlled.
This allows the pilot ta concentrate fully on his
surveillance mission. Different Cameras for video
surveillance operations are available (Daylight
colour sensor, night vision, digital and Thermal).

\.

ADVANCED LONGJOHN SYSTEM
Designed spec ific al ly for professional
surveillance, Madel 5122 uses the latest series
of ultra low li ght (0.00003 lux) with 'Night Mode'
cameras ta produce unbeatable images in day
and night conditions. The flexible 6 ta 100 x optical
zoom and pan and tilt system al lows targets ta be
monitored at long distances and tracked using the
proportion al pan, tilt and zoom system. De ployable
in minutes and powered by battery or mains, this
rapid deployment system is a powerful too l for any
serious surveillance operation.

HIGH PERFORMANCE
MINIATURE THERMAL CAMERA
The Madel 5214 unit is a high-performance,
miniature therma l imager for real-time imagery
in the 7-14 m spectral range (Long-Wave InfraRed, LWIR). This extremely small and lightweight
camera delivers images of outstanding quality,
at very low power consumption. The unit can be
used for bath standalone app lic ations and for
integrated multi-sensor systems.

INFINITY LENS
The Madel 5215 lnfinity Lenses are the only lenses
in the world that stay in focus throughout th.e
entire image. Conventional lenses have a limited
depth of field, which means they can only foc us
on either the foreground or the background of an
image atone time - never bath. The lnfinity Lens
defies this tradition. Employing revo lutionary
optics technology that can focus on abjects
bath in the foreground and background, the
lnfinity Lens offers massive depth of fie ld (MDF)
meaning the foreground and background of a
shot are in foc us simu ltaneous ly.

GAMMA NEWSLETIER Ql / 2011

li'

GAMMATSE
AMMA
EWSLETTER Ql/2011

TECHNICAL
SURVEILLANCE EGUIPMENT

COVERT UHF DUPLEX VIDEO LINK
SYSTEM WITH OPTIONAL IP LINK
Madel 5824 consist of a digital audio and ana log
video Transmitter. Remote contrai allows the
transmitter and voltage supply ta the camera ta
be switched on/off fram the receiver's contrais.
lt is possible ta connect 3 cameras ta one
transmitter and remotely select between them.
A unique audio encryption key for the digital
audio transmission is available. The receiver
can handle up ta 100 transm itters and each
transmitter is identified by its own seria l number.

CEILING -MOUNT DIRECTIONAL
MICROPHONE ARRAY
Performs audio collection tram a spot directly
underneath system, which has been insta ll ed in
a drap/suspended cei ling grid. Covertly co llects
intelligible audio, even whispers, in noisy
enviranments. Se lf-contained system installs
quicky. Wired or wire less operation. Examp le
usage: lnterview/interaogation raom, booking
desk, prison meeting raom, security vestibule,
cafeteria .

r--·-- · · · -·-----· ···--·--- ..

MULTISTREAM PORTABLE
INTERVIEW RECORDING SYSTEM
The Madel 5616-2 portable DVD MultiStream
Interview Recording system is designed
specifica lly for portable use. lt is housed with in
a lightweight but rabust metal cabinet and is
further pratected by a purpose-made carrying
bag. The bag contains ail necessary accessories
for portable interview applications including a
stereo table microphone, dual-view camera, full
height extend ing tripod and accessories.

'----·-·------ ------------------·

COVERT NIGHT VISION SYSTEM
The Madel 5210 is a powerfu l, multi-purpose
pocket-sized monocular night se ope. The pocket
scope is designed ta be used either as a standalone night vision device or in combination with
a wide variety of standard video, still photo, CCTV
equipment and spotting scopes.
lt is idea lly suited for covert night-time
observation and intelligence-gathering purposes
using standard photographie media, as wel l as
an effective aid ta night-time field missions.
The Madel 5210 employs a choice of image
intensifier tubes characterized by high resolution
and a clear, bright image including auto gated
types.

GAMMA NEWSLEITER 01 / 2011

1;1
GAMMATSE
GAMMA
NEWSLETTER 01/2011

TECHNICAL
SURVEILLANCE EGUIPMENT

GOVERNMENT KEY COPYING SYSTEM
With the Madel 2021 profile cutting system you
can easily produce key blanks yourself. Vou can
also produce a key from a photograph from the
original key or Iock. This system is foremost
developed ta make keys for master Iock systems
and for Iock cylinders with special profiles. The
Profi le Cuttin g System is divided into two parts:
1. Cutting Program with Speed Profile : This
program calculates the key profile and is
absolutely required for the functioning of the
profi le cutting system. As a service for you the
program is already installed in the case from the
mechanic manufacturer, although not activated .

2. Mechanic Unit with Case and Mains Appliance:
This unit is produced by a special mechanic
manufacturer and includes the complete
mechanic motion built in the case of the unit.

Photo of a Iock

Copy of a key made from a photo

Manipulations kit for Dom locks

Dom security locks



+t 1:

Tl f. - l.I,.
'·.·!

....





1

~

1

:. '.

•.•



Si

Fi

111

-~

!

.

~.

EVVA 3KS Lock Decoder

EVVA 3KS sophisticated Iock

GAMM A NEWS LETTER 01 /2011

ti

GAMMATSE
AMMA
EWSLETTER Q1 /2011

DATA RECDVERV
& FORENSIC LABORATORV

DATA RECOVERY &
FORENSIC LABORATORY
Forensic data recovery is not to be confused
with standard data recovery. Data recovery is
the art of retrieving data from a source that is
not eas ily obtainable, (main ly hard disk drives,
memory cards, tapes, RA ID systems etc).
However, Forensic data recovery is different. ln
standard data recovery, the original data source,
(e.g. the dead hard drive) is rebui lt, (if required ),
then an 'image' is taken, at which point the data
recovery technician re-works the data so that it
is useable to the cl ient.

digital forensics

Computer Forensics is the function of utilising
scientifically proven methods to assemble
together and process data found on a digital
device, (computer, hard disk drive, mobi le
phone, memory card etc), and interpretthat data
for possible use in a court of law or other theatre
of investigation. The evidence may assist in the
prosecution of a criminal, help in the defense of
an accused persan, or be of intelligence to an
individual who is seeking knowledge for either
persona! or professiona l reasons .
Mobile phones are consistently used during
manyforms of criminal activity, and byperforming
mobile phone forensics on the cellular network
usage of a particu lar mobile phone it is possible
to trace where and when ca lls were made from.
This is particu larly useful in sta lking type cases,
where a mobile phone has been used to harass
another ind ividual. A mobile phone forensics
firm will be able to trace and quantify phone
uses within the ce llular network.

GAMMA NEWSLETTER 01 /2011

li

GAMMATSE
GAMMA
NEWSLETTER Q1/2011

TECHNICAL SURVEILLANCE
COUNTER-MEASURES

To be effective in

TSCM it is essential to
use tra ined and qu alified people who have
solid background knowledge of surveillance
techniques and use the proper equipment.
Gamma TSE is in a unique position to provide
knowledge and equipment to counter threats
and offer training in the latest equiprnent and
techniques involved in information gathering
and surveillance. The threat level for cables,
LAN and Wireless LAN has increased
dramatically. Although TSCM are described in
more detail in our 2011 catalog, the following is
a brief summary of our new products.

MICRO VIDEO CAMERA DETECTOR

!____________
____
__ ---

·- -- J

GSM/UMTS DETECTION AND
LOCATION SYSTEM
The Madel 7558 system uses active, patented
techniques to find any GSM and UMTS devices in
the areas to be swept. When devices are found
the unit operator can quickly distinguish between
legitimate or authorized mobile phones and GSM
bugging devices. Automated processes, network
surveying, system set up and range selection,
device detection and results analysis make the
system effective and efficient. The system's
database determines the threat level of a suspect
device and is updated on a monthly basis to ensure
the very latest threat information is available.

The Madel 7507-3 is a modern device, whose
functions include: video camera detection,
security support, etc, designed for quick
detection and exact location of secretly
installed indoor micro video cameras, including
cameras with pin-hale lenses. The unit works
on the optical principal and no electromagnetic
and extraneous emissions get in its way.

,---

-- ---- ------- ·-



HANDHELD SPECTRUM ANALYZER
A handheld RF measurement, the 7554 unit
can find radiation sources in any surroundings
from 1MHz to 9.4GHz, including their respective
frequencies and signal strengths, directly
displaying exposure limits. The calculations are
performed unnoticed in the background by a
high-performance DSP (digital signal processor).
This software offers an incredible number of
features, such as multi device capability, high resolution, and a display of channel identifiers,
etc.

GAMMA NEWS LETTE R Q1 /2011

tï'

GAMMATSE
AMMA
EWSLETTER Ql/2011

TECHNICAL SURVEILLANCE
COUNTER-MEASURES

30 X-RAY SOFTWARE
Madel 7539 is used for upgrading mobile X-ray
units from 20 ta 30 imagery. Ali common
types of X-ray image media can be used, even
conventional films and storage foils, in case
they need ta be scanned later on. The digital
20 images, coming from a scanner or an image
converter, can be individually enhanced and
processed into 30 visualization by the 30 X-ray
software. ln the 30 viewing mode, zoom, detail,
pan, tilt and rotation of the stereoscopic image is
changeable by mouse contrai.

X-RAY SCANNING SYSTEM
The Madel 7557 unit is a lightweight, portable,
battery powered x-ray scanning system
designed in co -operation with first responders
and EDO teams ta meet the needs of the field
operative. The slim detector panel is positioned
behind the target; the generator is placed in
front. Quick and simple ta deploy, the system
produces high quality real -time x-ray images
for rapid and accurate decision making.

TSCM PERSONAL KIT
The Madel 7605 TSCM Persona! Kit is designed
ta perform lntermediate Level Technical Counter
Surveillance Measure operations, and contain
equipment used in the 3 main areas of TSCM
Sweeps. Ali concealed in a 'Cabin Baggage'
approved Laptop Case, the TSCM Persona!
Kit will not look out of place being carried into
a hotel, or into an office ensuring a level of
covertness when entering a sweep area.

VIP NON-TECHNICAL TSCM KIT
lt is not always possible ta have a TSCM Team
sweep in an operationally sensitive area. When
travelling abroad, a TSCM Team cannot always
follow their Key Personnel ta ensure their
security. When using Hire Cars, Hotels and other
pub licly accessible areas, Key Personnel cannot
ensure the security oftheir sensitive information.
Concealed in a 'Flight Approved' Laptop
Case, the Madel 7604 TSCM VIP Kit contains
equipment that any non -technical personnel can
operate ta provide a basic level of assurance
that eavesdropping devices are not present.

GAMMA NEWSLETTE R 01/2011

,,

GAMMATSE
GAMMA
NEWSLETTER Ql/2011

TECHNICAL SURVEILLANCE
COUNTER-MEASURES

PORTABLE SPECTRUM AUDIT
Madel 7508 is uniquely differentfrom ail other RF
detection systems as it uses a more advanced
spectrum analyzer with the latest software
technologies to provide accurate results. lt uses
a twin antenna system, whereby one antenna is
placed outsid e the target location and the other
inside. Using the software it is able to show
ail suspicious transmissions that are stronger
in the target location than outside. Standard
frequencies are up to 6GHZ with optional
frequencies up to 26GHz.

ADVANCED LAN/WLAN ANALYZER
Our powerful new advanced mode! 7543
Integrated Network Analyzer gives a clear view
of an entire enterprise - providing visibility into
every piece of hardware, every application,
and every connection on a network. No other
portable tool offers this mu ch vision and all -in one capability to help deploy new technologies
and applications, manage and validate
infrastructure changes, salve network and
application performance issues, and secure
networks tram internai threats. lt shows you
where your network stands today and helps you
accurately assess its readiness forthe changes
you need to make.

FAKE CELL MONITORING DETECTOR
The current method for the interrogation of GSM
subscriber identities and/or equipment is to use
the Madel 4050 Fake cell site, and attract the
target mobiles overto this Fake Cell. The unit can
monitor the LAC, Power levels, and Neighbour
lists for GSM and 3G and C1/C2, in the case of
GSM. The 3G unit will generate an alarm based
on any combination of values monitored ..
Key features of the equipment are:
• Detects bogus Cell sites, possibly being
used for IMSI capture or Call intercept
• Multilevel alarm/ eventtriggers
• Generates alarms vi a Internet or text
message
• 16 channels
• Constant monitoring of selected GSM sites
• Constant monitoring of selected 3G sites
• Remote connection via web interface

GAMMA NEWSLETTER Ql /2011

,,
32SVSTEMS
AMMA

VIP SECURITV PRODUCTS

EWSLETTER Ql/2011

G2 Systems' philosophy is that VIP Security
Products should be offered as a whole range,
offering everything from standalone products
to complete system solutions, including tra ining
to support any government agency's goals of
achieving successful VIP operation s. Our new
catalog provides a comprehensive selection
of advanced VIP equipment. We have put
together a brief selection of products below,
but strongly suggest you view the complete
2011 VIP catalog. To order one please contact:
[email protected]
- VIP Security Products
- VIP Convoy Jammers
- VIP Portable Jammers
- VIP CBRNE Detection
- VI P CBRN Protection
- VIP Security Screening

- r

- VIP Forward Observation
- VIP TSCM Detection
- VIP Secure Communications
- VIP Surveillance Kit
- VIP Personnel & Vehicle Protection
- VI P Training Course

VIP CONVOY JAMMERS
The Mode! 3260-S has been upgraded to cover
the 20 to 6000 MHz frequency range . Electronic
Counter Measures (ECM) or Jamming Systems
provide protection for VIP dignitaries against
attacks by radio contrai. Nobody knows when,
where or on which frequency su ch attacks may
occur, therefore, VIP protection must be at a
very high sophisticated level. As an optional
upgrade we also offer our Hybrid Jammer with
free programmable frequencies between 20 to
500 MH z.

PORTABLE BRIEFCASE GSM/UMTS
The Model 3530-1 Portable Covert GSM
Jamming System is a 4-Band Jammer covering
the frequencies most commonly used by GSM
and 3G Cellular Systems. lt is designed to be
effective within a 25 Meter range within the
target area. The system is unique in that it
does not require any ventilation, making the
unit silent and also covert. As the system does
not require ventilation, it can be operated with
the case fully closed. This means that it can
be placed in any location, be effective and not
draw any undue attention.

GAMMA NEWSLETTER Q1/201 1

li

G2SVSTEMS
GAMMA
NEWSLETTER Ql/2011

VIP SECURITV PRODUCTS

PORTABLE VI P PROTECTION CAS E
Madel 3543 Jammers high power covering ail
frequencies :
· 850-894 COMA
· 450-470 MHz, 15W
· 825-960 MHz, 18W
-1805-1980 MHz, 17W
· 2110-2170 MHz, 15W (caver 3G)
· 2400-2500 MHz, 15W (caver WIFI)
· Total Output power: 80W
· Case size : 56 x 42 x 26 cm (pelican case 1560)
· Programming Software

HIGH POWER MOBILE
JAMMER FOR JAILS
Madel 3533 jammers are based on our long sta nding technological leadersh ip and a
proven jamming technology for jails. Our widely
installed, high-quality product base attests to
our determination to provide high-end, quality
products to customers around the world .
COMA, 850 · 890 MHz, Chan. 1: Power 50 Watt
GSM, 920 · 960 MHz, Chan. 2: Power 50 Watt
GSM ,1800 · 1900 MHz, Chan. 3: Power 50 Watt
UMTS/WIFl/GPS

UNDER VEHICLE SURVEILLANCE
The Madel 5501 Under Vehicle Surveill ance
System is designed for temporary deployment and
portability betvveen sites. The system comprises:
Galvanized Steel Ramp with integral metal
housed cameras and LED illuminators. These can
be color cameras and white LED illuminators, or
monochrome and IR LED illuminators. Contrai/
Monitor Pack is housed in a portable rack mount
case with removable front and rear protection
covers.

ADVANCED HANDHELD
MULTIPURPOSE DETECTOR
The Madel 9102 Advanced Handheld Multi·
Purpose Detector is designed for use by first
responders, homeland security, military soldiers,
law enforcement and forensic chemistry
personnel. lt provides immediate identification of
unknown solids, liquids and mixtures, including
narcotics, explosives, white powders, chem ica l
weapons, WMDs and taxie industrial chemicals
· even through the walls of their containers.
GAMMA NEWS LETTER 01/2011

li

32SVSTEMS
AMMA

VIP SECURITV PRODUCTS

EWSLETTER Ql/2011

BODY SCANNER
The Madel 9140 unit quickly creates a 3-0
black and white si lhouette of the subject that
revea ls concealed abjects. Operators can locate
weapons, explosives, other banned items or even
intellectual property. The unit can be upgraded in
the field ta take advantage of advanced, imagefree Automatic Threat Oetection software that
is enhanced as new threats emerge. The unit
allows operators ta clearly view abjects made
of any material -including liquid, rubber, wire,
plastic, ceramic and metal-weapons, contra band
and other abjects are quickly and easily located.
The system utilizes harmless millimeter waves
ta generate a clear view in seconds, and is ideal
for use anywhere checkpoint security is needed,
such as airports, military bases and border
crossings, courthouses, embassies, prisons and
other government buildings.

PORTABLE WALK THROUGH
METAL DETECTOR
The Madel 9130 is the world's most versatile
walkthrough metal detector as it can be deployed
and transported to virtually any lo cation and
be up and running within five minutes by a
single operator! The Madel 9130 operates from
rechargeable sealed batteries, has zone specitic
detection and is designed for use in demanding
environments. lt is the only multi-zone metal
detector small enough to fit in the boat of a car.
The Madel 9130 is ideal for sporting events,
conferences, schools, VIP security or for any
event or location requiring high discrimination
metal detection combined with ease of use and
total portability.

ADVANCED EXPLOSIVES TRACE
& VAPOR DETECTOR
The Madel 3500 is the world's first explosives
trace handheld based on chemiluminescence.
lt detects military, commercia l, even homemade
explosives, liquid and powdered, such as TATP
and other related peroxides, ICAO taggants,
plastics, ammonium nitrate, black powder, and
other nitrates. lt has high selectivityto explosives
and immunity to weather and environmental
inte rfe re nce.

1
1

-- --------··-·-------- -----·- -- ___!

GAMMA NEWSLETTER Ql /2011

li

G2SVSTEMS
GAMMA

VIP SECURITV PROCUCTS

NEWSLETTER Ql/2011

RADIATION DETECTOR
The Madel 9126 is a complete range of smart
probes to enhance the detection capabilities of
the. system .
Different probes associated to the radiation
survey meter add:
• gamma and beta/gamma contamination
monitoring for vehicles, aircrafts,
personnel, ground
• monitoring personnel alph a contamination
• monitoring alpha contamination wounds
• search and management of gamma
contamination

1

l_
FOOD DETECTION KIT
The Madel 9113-1 Food Po ison Detection Kit
cornes with a set of three separate detectors
and everything needed to ana lyze a food samp le
and record the results for future use or as
evidence . The Food Poison Detection Kit detects
dangerous levels of more than thirty poisons.
The detected poisons include compounds
containing cyanides, azides, chromates and
sulfides (Group 1 Poisons), tha llium, lead,
cadmium and mercury (Group Il Poisons) and
ALL arsen ic-contain in g compounds.

CBRN VAN
·The CBRN Support vehicle is designed to
bring CBRN supp li es to the CBRN incident.
The vehic le can be of any variant or type. We
will help you to work out the equipment that is
required to support a Responders team.
Example:
• Small decontamination equipment
• Spare air cylinders
• Compressor air recharging air cylinders
• Spare CBRN suits/canisters/Boots/Gloves
• Hazard tap/markers
• Spare batteries
• Spare CBRN detectors

EOD VAN
EOD Vehicle is custom-built to incorporate the
best available equipment and en ables operators
to provide a fast response to detect and dispose
of terrorist devices . Each bomb disposa i vehicle
is specia lly modified and is supplied with
an assortment of the most up-to-date IEDD
equipment, depending on cli ent requirements .
A typica l list of components would include the
following: Search Equipment, Scene of Crime/
Forensic Equipment, ldentification/Analysis
Equipment, Protection Equipment.

GAMMA NEWSLETTER 01 /2011

AMMA

VIP SECURITV PRCDUCTS

EWSLETTER Q1/2011

CBRN TH REAT REPORTS - OCTOBER 2010
This report is to help EOD teams that have had no previous experience with chemicals used as terrorist
weapons.
This is the latest information on the capability of using chemicals as a weapon: The main hazard is that
the chemical can travel down the wind line causing high casualty levels.
This document is for EOD teams.
Police forces and intelligence organizations may find this document useful.
Not for members of the public or media use.
This report is based on analysis from Gamma subject matter experts and has no warranty.

GAMMA NEWSLETTER Ql/2011

li

G2SVSTEMS
GAMMA
NEWSLETTER Ql/2011

INTELLIGENCE GATHERING AND
TECHNICAL TRAINING SERVICES

From Gamma lnternational's regional head quarters in the UK, G2 Systems Ltd provides firstclass security training services to governments
and related organizations worldwide . Our
clients also include security and intelligence
organizations recognized by the United
Nations, who seek assistance in improving
their intelligence gathering capabilities
over a variety of disciplines. For a complete
2011 Training Catalog please contact us at:
[email protected]

GOVERNMENTTRAINING SOLUTIONS
1 - CMOE
2 - Intelligence Gathering
3 - Technical Surveillance
4-TSCM
5 - TSCM linked to IT Threats
6 - IT Exploitation Training
7 - Intelligence Analysis
8 - CBRN Threat Awareness

SURVEILLANCE COURSES
1 - Overt Surveillance Techniques
2 - Covert Surveillance Techniques
3 - Operational Surveillance Methods
4 - Intelligence Analysis and Evaluation
5 - Technical and Engineering Support
6 - Audio and Video Surveillance
7 - Concealment Courses
8 - Photographie Surveillance
9 - Audio/Video Processing
10 - Mobile Phone Forensics

IT EXPLOITATION TRAINING
Our IT intrusion training package provides the
government end-userwith up-to-date advanced
IT intrusion tools and techniques to enable
intelligence agencies to obtain information
that can only be obtained by using IT Intrusion
components.
1 - IT Information Warfare
2 - VolP Intrusion
3 - Advanced Intrusion Techniques
4 - Exploitation Techniques
5 - Root-kits Training

GAMMA NEWSLETTER 01 /2011

li

32SVSTEMS
AMMA
EWSLETTER Ql/2011

INTELLIGENCE GATHERING AND
TECHNICAL TRAINING SERVICES

TECHNICAL SURVEILLANCE
COUNTER-MEASURES
The objective of training government TSCM
te ams is for traine es to be aware of ail technical
espionage threats and the procedures of
search and detection.
1 - Latest TSCM Electronic Threats
2 - Prevention of Bugging/lnfiltration
3 - Cable Measurement
4 - Physical Search
5 - RF Measurement
6 - PBX/IT Attacks
7 - Securing IT Facilities and Data

CMOE COURSES
1 - Technical Operations Training
2 - Covert Technical Oeployment
3 - Covert CCTV Oeployment
4 - Advanced Ope rational Drilling
5 - Operational Alarm Defeat
6 - Magnetic Hotel Room Lock-Picking
7 - CCTV and PIR Defeat
8 - Safe Manipulation
9 - 'Silent' Drilling
10 - Explosive Methods of Entry

MAGNETIC CARO COPIER
A fast reliable, portable, easy to use system for
cloning magnetic stripe cards encoded in any
format, such as hotel cards and other access
magnetic swipe card. The Madel 2009 unit
provides fast and efficient access to the data
on a magnetic stripe card, for reading, writing,
cloning and erasing purposes. The system has
two operating modes: field mode and base
mode . Field mode is designed for simplicity
and speed, whilst base mode is designed for
functionality and versatility.

IMPRESSIONING KIT
This kit has been thoughtfully put together
to include ail the essential tools that a CME
operative needs in order to undertake standard
impressioning tasks. lt includes a selection of
especially adapted cylinder plugs to assist mark
identification and accurate spacing during
filing, our designed impressioning handle with
a unique in -handle tool set, and a selection of
common blanks especially prepared and ready
for impressioning .

GAMMA NEWSLETTER 01/2011

If'

G2SVSTEMS
GAMMA
NEWSLETTER Ql/2011

INTELL VIDEO/AUDIO
CONCEALMENTCOURSES

Our Specialist Video/Audio Concealment Training Courses are designed for Technical Surveillance
departments which require their own personnel to be trained on concealment techniques to en able
these specialist skills ta be used in their own departments. The course starts with the basics of
fitting microphones and preamplifiers through ta concealment techniques and installing covert
devices into everyday abjects, rooms and vehicles. Practical exercises also include audio/video
transmission, digital audio/video record ers, concealment of antennas and power supplies. As part of
the course each studentwill receive a concealmenttool kit as well as a full set of practical manuals.
With these skills students will be able ta prepare and install covert devices that are more suited ta
the environment in their own country.

AUDIO CONCEALMENT SYLLABUS
1 - Fitting covert microphones
2 - Producing preamplifiers
3 - Body-worn concealment techniques
4 - Audio deployment in cars
5 - Audio deployment in rooms
6 - Producing concealment installations
7 - Modifying high-tech digital transmitters
8 - Practical surveillance exercises
9 - Modifying GSM phones
10 - Selecting the right power supplies

VIDEO CONCEALMENT SYLLABUS
1 - Fitting covert cameras
2 - Producing preamplifiers and microphones
3 - Selecting the right power supplies
4 - Body-worn video con ce aiment techniques
5 - Video deployment in cars and rooms
6 - Producing video concealment installations
7 - lntegrating video transmitters
8 - Practical surveillance exercises
9 - Through -the-wall -video surveillance
10 - lntegrating video GSM Links

r---------- - - - - - 1

1

GAMMA NEWSLETTER 01 /2011

GAMMA REGIONAL OFFICES : MUNICH - DUBAI - SINGAPORE

ti

GAMMAGROUP

GAMMA HEADQUARTERS
Unit 6, Parnell Court, East Portway lndustrial Estate
Andover, Hampshire, SP 10 3LX
United Kingdom
Tel. +44 1264 332 411
Fax. +44 1264 332 422
[email protected]
www.gammagroup.com

Document Path: ["770_gamma-group_newsletter_gamma-newsletter-q1.pdf"]

e-Highlighter

Click to send permalink to address bar, or right-click to copy permalink.

Un-highlight all Un-highlight selectionu Highlight selectionh