Filtered By
SoftwareX
Hardware or Software? [filter]
3X
Spy Files Release Volume [filter]
Results
79 Total
1.0

ASIS, Automatic Speaker Identification System

Document

Automatic Speaker ldentification System (ASIS) deployed f o r b u i l d i n g centralized voice biometrics databases - dedicated t o l a w enforcement organizations - new to01 f o r identificatio...
1.0

HINTON

Document

L 3 HINTON Mobile Data Probe The HINTON Mobile Data Probe is used by telecommunications operators and law enforcement agencies to provide regulatory enforcement of lawful interception, and by gov...
1.0

ION Secure Virtual Desktop

Document

ION" Secure Virtual Desktop Computers that access the lnternet for research and investigations are at risk of compromise by online viruses, malware, and other types of malicious code, especially wh...
1.0

DeepHarvester,

Document

BrightPlanetm Pioneerrink m - w - ' ,"" Harvest "unknown and hidden" content from the Deep Web. For over ten years, BrightPlanet has been the pioneer in harvesting high quality unstructured c...
1.0

Tartan

Document

The large volume of information that arrives from allsource intelligence can be daunting and, subsequently, impedes the ability to rapidly and accurately identify key individuals and the critical r...
1.0

COGITO

Document

The functions provided by Cogito Categorizer and Cogito Discover enrich documents, CMS and web pages with semantic information and metadata, to make the contents fully accessible, manageable and in...
1.0

NCW-1200

Document

NCW-1200 Network Centric Waveform (NCW) 1.2 Meter Flyaway Terminal The NCW-1200 is a 1.2 meter Ku-band transportable SATCOM At-The-Halt (ATH) transit-case terminal that provides NCW tactical users ...
1.0

DRS

Document

Utimaco DRS™ Automated Data Retention for Telecommunications Service Providers Features Collects communications data (CDR, IPDR) and subscriber data from any telecommunications network Retains lar...
1.0

CYBELS

Document

->> CYBELS: A FULLY OPERATIONAL BOLUTION TO CYBER SECURITY CHALLENOES THALES Cyber security issues are coming from digital information, worldwide networks and applications interconnection as wel...
1.0

GeoMaker, CYBELS, ECHO

Document

THALES >. ......+. . C,'., :'L: :?::*":rr';: .;: .. ..: .... \,./ . *.*; . .. .. .. .. . . . . ,.,>. ........... . ..... ',. . ... , . . . . . . . . .... . . . . . .... ,,. ..!U,*& ". ., X : :S ...
1.0

Vulnerability Research & Intelligence

Document

VU?--• N ® s e cu r t y Vulnerability Research & Intelligence VU?C:Ne security VUPEN Exploits for Law Enforcement Agencies I ' ' Law enforcement agencies need the most advanced IT intrusion ...
1.0

SessionVista

Document

Session Vista CX- 10 CO Information Flow Packets are classified by the DPI Engine according to protocols present within a flow. The Exporter generates IPFlX formatted packets of selected protocol...
1.0

Orion SkyWeb Premium

Document

Orion SkyWeb SkyWeb Premium Orion Premium COElI-IFlm So luti on Advanced Internet-based Tracking Solution 20 11 Data Sheet 2011 Data time, anywhere feat-thne real -time tracking tracking Any tim...
1.0

CP2

Document

hi c:::Ic:::Ic:z,.., ..I"" ~c:z-=h,..,c=1 c=cg'::l '::1..1"" t. Cl: rn..l"" i,....., t. CI:,... ,.....,ctt. ic=,.....,ctl CP2 Features Sheet CP2 vs New Features in Version S This document dis...
1.0

GENESI

Document

Facebook Relations Analysis Target Profiling ~ e n e sPlatform i~~ Via Monticello, 7 04011 April~a(LT) ITALY Tel. +39 06.92710.500- Fax +39 06.927t0.501 - f c E cs-l-te Icjeice "c? ' * l ' . , CS...
1.0

COGITO

Document

Mobile Government Information available to citizens 24/7 Where can I renew my passport? Which pharmacies are open after-hours? Are there any traffic restrictions tomorrow? Citizens often have a ha...
1.0

COGITO

Document

Case history “The wide range of benefits which come from using COGITO's platform for Knowledge Management and Intelligence include: the efficiency of semantic research, a more complete organizatio...
1.0

COGITO

Document

Benefits The ‘Voice of the Customer’ Comes Alive Cogito Monitor guides you through the volatile world of consumer opinions and offers: Cogito Monitor is the leading technology for the automatic d...
1.0

COGITO

Document

Information into insight While technology has given us access to an unlimited amount of information, the ability to extract meaning and insight from data is more difficult than ever before. To take...
1.0

FSNtracks

Document

FreightW~tchF - SECURITY N ~A- U -1 -- - 1 Geofences The FSNtrackslGeofence feature allows users to establish movement rules for both mobile and non-mobile assets, setting geographic boundar...
1.0

Spektor

Document

FORENSIC INTEL L QUICKLY AND AUTOMATICALLY IDENTIFY INTELLIGENCE OR EVIDENCE ON COMPUTERS, REMOVABLE MEDIA & CELL PHONES C !FAST C O V E R S A L L THE BASES Controlled by a simple touch screen ...
1.0

MD-405A

Document

GEOLOCATION NETWORKING FOR THE MD-405A L-3 Linkabit offers a complete Geolocation Networking package for the MD-405A Signals Intelligence (SIGINT) System that incorporates all the features of the R...
1.0

DRS

Document

Utimaco DRS™ Paquete de retención de datos Retención de datos automatizada para proveedores de servicios de telecomunicaciones DRS – w orl dw i de 2 Utimaco DRS™ Retención de datos La retenci...
1.0

LIMS

Document

Utimaco LIMS™ Lawful Interception of Telecommunication Services Benefits Compliance Provides surveillance of all common telecommunication services in fixed and mobile networks, incl. telephony, fa...
1.0

LIMS

Document

Utimaco L I M S ~ ~ Techpaper Lawful Interception with Umbrella Systems Utimaco LIMS'~ Table of contents ..........................................................................................
1.0

A30, Analys 4.0, IP30

Document

A30 ' excellence in telephone interception systems The result of over 10 years' collaborationand exchanges with investigators, the A30* lays down new milestones in terms of usability, efficiency...
1.0

SIS II

Document

U Specialized Audio Editor New interface. New capabilities. The new SIS II includes powerful tools for speech signal analysis, enhanced speech visualization, display and analysis capabilities, ind...
1.0

Observer, NetFlow, sFlow

Document

L’intégration des technologies NetFlow and sFlow® à la plateforme Observer permet de fournir une solution complète d’analyse permettant aussi bien le suivi des performance des application que la me...
1.0

Redirector

Document

Bypass Programmer Guide Silicom Redirector Programmer Guide Linux OS Version 4.0 1 Bypass Programmer Guide REVISION HISTORY Date 29-Jul-08 22-Dec-08 08-Mar-09 29-Jun-09 1  INTRODUCTION .......

e-Highlighter

Click to send permalink to address bar, or right-click to copy permalink.

Un-highlight all Un-highlight selectionu Highlight selectionh