Intercepting the communications of people who might threaten the internal security of states is a necessity.
Whether in the context of civil or military actions, it is important to intercept the communications of terrorists or criminals, either by tracking networks or anticipating serious actions or any other information action. Communications resources are in constant development, so it is important to have suitable equipment for each type of communication network.
They are similar to those of the ambient listening. It must be possible to find information about a number of people (draw their profile) and about the people with whom they communicate. In the prison system, interception is often a great help against various malpractices in institutions.
In the military field, the aim is to ensure the safety of troops deployed outside the national territory.
PORTABLE AUTOMATIC SURVEILLANCE EQUIPMENT 25 MHz to 3 GHz (10kHzto 25 MHz as an option)
The COF® 278/P3 a portable system designed to monitor andanalyse the surrounding radiofrequency spectrum (analysis of radiocommunication with the surroundings).Consisting of one searchreceiverand four interception receivers, it performs general tasks suchas automaticsurveillance of frequencybands and monitoring ofpre-defined channels, as well as analysis, demodulation and decoding of more than a hundred standard protocols.
GSM 900/1800 and UMTS TRIBAND MULTI-NETWORK INTERROGATION AND INTERCEPTION SYSTEM
The COF® 597/N is an efficient tactical and device system designed to capture the identifiers of every surrounding mobile phone connected to the GSM and UMTS networks.
In its standard version, the multi-network COF® 597/N includes three base stations for operation in 900 and 1800 MHz GSM bands and in UMTS 2100, simultaneously covering three different operators.
A5.2 and A5.1 PASSIVE G INTERCEPTION SYSTEM
The COF® 597/P88 is a completely passive GSM communications interception system. Its operation is fully transparent within the GSM environment and can never be detected by GSM operators.The interception procedure in no way affects the behaviour of the mobile targets that have no way to detect it.
The system is designed to be operated under all GSM networks using A5.2 or A5.1 encryption algorithms.
Inmarsat AND/OR Thuraya AND/OR Aces-IsatPhonePro PORTABLE TRI-MODE SATELLITE COMMUNICATIONS MONITORING SYSTEM
The COF® 599/xx+ is a rapid deployment portable system designed for full duplex surveillance and interception of Inmarsat,Thuraya and Aces-IsatPhone Pro satellite communications and services. Call interception is totally invisible to both the target mobiles and the satellite networks concerned.
The system enables surveillance and analysis of connections between surrounding Inmarsat, Thuraya or Aces-IsatPhone Pro mobiles and the associated satellite.
Up to six simultaneous communications can be intercepted and recorded depending on operational mode.
Inmarsat AND/OR Thuraya AND/OR Aces-IsatPhonePro FIXED SATELLITE COMMUNICATIONS INTERCEPTION DEVICE
The COF® 599/FTM+ device is designed to intercept satellite mobile phones being used operated within the same oceanic region as that in which it is installed (e.g. AORE).
It consists of all elements needed for surveillance of C and L-band downlinks transmitted by the satellite in the target oceanic region.
PORTABLEIRIDIUM COMMUNICATIONS INTERCEPTION SYSTEM
The COF® 2312 is a system designed for interception of Iridium satellite communications and localization of communicating telephones.IRIDIM is a satellite communication system based on a network of 66 low-orbiting satellites.It is unique in that it covers the whole world, including the poles. The announcement of the modernization of the satellite fleet, scheduled for 2014, puts the usefulness of interception of Iridium communications back on the agenda.
GSM/UMTS/IP/FIXED/ FAX/SAT LAWFUL INTERCEPTION PLATFORM
The COF® 2400 is a comprehensive surveillance platform for conversations exchanged over fixed and mobile (GSM) telephone networks and over the Internet. This platform has therefore provided the authorities with a resource for looking at exchanges between people in their whole territory.
This very powerful technical tool greatly assists states in fighting crime, attempts to destabilize regimes and more generally in their efforts to strengthen national security.