Cellular Phone Control System for Prisons and Corrective Services Facilities

Size: px
Start display at page:

Download "Cellular Phone Control System for Prisons and Corrective Services Facilities"

Transcription

1 Cellular Phone Control System for Prisons and Corrective Services Facilities ENGAGE CELLGUARD October 2011

2 Table of Contents 1 Introduction ENGAGE CELLGUARD Overview ENGAGE CELLGUARD Main functionality ENGAGE CELLGUARD Prisons solutions Tactical ad-hoc CELLGUARD Fixed CELLGUARD installation Summary... 7 Unauthorized use, duplication, or modification of this document in whole or in part without the written consent of Verint Systems Inc. is strictly prohibited. By providing this document, Verint Systems Inc. is not making any representations regarding the correctness or completeness of its contents and reserves the right to alter this document at any time without notice. Features listed in this document are subject to change. Please contact Verint for current product features and specifications. All marks referenced herein with the or TM symbol are registered trademarks or trademarks of Verint Systems Inc. or its subsidiaries. All rights reserved. All other marks are trademarks of their respective owners Verint Systems Inc. All rights reserved worldwide.

3 1 Introduction Unlawful usage of cellular phones became a major problem in corrective services departments (CSD) and prison authorities (PA) around the world. Cellular phones, small and easy to hide, are smuggled into the inmates' cells and are in use to continue and run the inmates' illegal activities within the prison walls. There are few technologies available in the market for handling this challenge including cellular signal detectors, partial and full site jammers and special handheld phone detectors (similar to metal detectors). The common method of blocking unlawful usages of cellular phones is achieved by jamming of the cellular networks at the prison premise (full or partial). The cell-phone jamming technologies have few disadvantages: Jammers cannot distinguish between legitimate cell phone of unlawful phones. Jammers cannot identify the offender (the owner of the non legitimate cell phone). Jammers cannot know for sure if phones are actually blocked. Jammers cannot be used to collect intelligence on the smuggling patterns and usage patterns of the phone. Jammers can t be use to physically find the cell phones. Jammers blocking is based on power competition with the cellular operator's base station. Verint s ENGAGE CELLGUARD provides CDS/PA with the tools to control the usage of cellular phones, target and block (denial of service) only the unlawful handsets while the legitimate phones in the area can continue to function as normal without any interruption. Furthermore the CELLGUARD provides additional functionalities that are handy in fighting the unlawful usage of phones by inmates. The solution presented in the paper is suitable for GSM/UMTS networks and it is not applicable to CDMA network. Verint Systems Inc. is a global leader in Actionable Intelligence solutions and value-added services. More than 10,000 organizations in over 150 countries use our workforce optimization and security intelligence solutions to improve enterprise performance and make the world a safer place. For more information, visit Page 1

4 2 ENGAGE CELLGUARD Overview ENGAGE CELLGUARD is a portable, stand-alone suite of solutions for tactical or localized communication interrogation and interception of GSM/UMTS mobile handsets over the air (off-air). ENGAGE CELLGUARD remotely interrogates, identifies, locates and intercepts mobile handsets subscribed to GSM or UMTS networks. The ENGAGE CELLGUARD can also establish and capture mobile handsets in a GSM virtual network to conduct tactical communication and/or manipulations over GSM phones. The ENGAGE CELLGUARD tactical design and form factor, along with its sophisticated applications gives Law Enforcement Agencies a powerful tool to track and intercept targets via their mobile handsets. With ENGAGE CELLGUARD law enforcement agencies can perform the following operational tasks: Identify anonymous handsets (IMSI / IMEI / TMSI) without attracting attention. Collect, verify and send alerts if target handsets are identified at scenes such as airports, borders, embassies and prisons. Selectively jam an area or specific phones to isolate target handsets from the GSM and the UMTS public network. Neutralize GSM/UMTS cellular unattended devices completely disable handsets operation. The only way to bring the handset back to service is to manually restart it. Identify the location of a target in GSM and UMTS networks. Additional optional capabilities Covertly record outgoing and incoming calls of a target handset over GSM network, as well as SMS text messages (including in A5.1 networks). Perform different SMS manipulations such as sending fake SMS to targets or sending fake SMS on behalf of the target to any other subscriber or even change the content of an incoming and outgoing SMS. Establish a private GSM network for internal tactical use of the forces (with optional backhaul to external networks) and/or to directly call targets (e.g. in hostage situations). ENGAGE CELLGUARD includes embedded GSM and UMTS modules and a GSM/UMTS scanner. It allows for the interrogation and identity collection of all GSM and UMTS subscribers in the operational area in one unit, with a single unified database managed by a single custom application. Furthermore, it can hand-over UMTS subscribers into the ENGAGE CELLGUARD GSM private network for further operational manipulations such as calls and SMS interception. ENGAGE CELLGUARD system is designed to work under different operating scenarios, with easy, rapid deployment. Page 2

5 3 ENGAGE CELLGUARD Main functionality Monitoring and Detection The CELLGUARD can identify any unauthorized phone as soon as it enters the any area of interest. Every phone is detected by its unique identity (IMSI and IMEI) and investigation can begin to find to whom it belongs or where it has been previously used. Full/Selective Communication Blocking Any phone that is detected can be instantaneously blocked so it will not be able to communicate at all. The blocking depends on the CELLGUARD mode of the operation either full blocking of all the phones, blocking of all phone but a list of allowed phone, blocking only the listed phones while allowing all the rest to operate normally. Not like Jammers in CELLGUARD communication blocking mode the affected phones still indicate a full operator signal and operator logo but calls can t be made. Not like jammers, the blocking coverage is based on a predefined radius and therefore minimizes the interference with the commercial cellular networks surrounding the prison's facilities. Locating Unauthorized Phones The CELLGUARD Silent Call feature allows exact locating of phones within the prison with assistance of dedicated homing devices. This capability helps to pinpoint the cell phone and holder/owner of the phone. The CELLGUARD "silent call" feature is operating in all phone types: GSM phones, UMTS only phones and dual mode phones. Phone Neutralization (Denial of Service) An advanced mode of the CELLGUARD allows insertion of phones into out-of-service mode. Even if the phone will be momentarily out of the CELLGUARD s effective range, it will still be out-of-service and inoperative. The only way to bring such a phone back to service is by restarting it. However, assuming the CELLGUARD keeps transmitting, the phone will turn into out-of-service mode again as soon as it is restarted. This puts the phone in a vicious circle that does not allow any communication. (option) Interception of Voice Calls and SMS Messages With the CELLGUARD it is possible not only to block phones, but if required, also to intercept the phone communication. This advanced man-in-the-middle interception capability is seamless to the monitored subject, the party he is communicating with and the network operator. (option) SMS Catching and Fake SMS Even when no interception module is used, all the SMS messages sent by the captured phones can be read by the CELLGUARD system, while the users will actually believe the SMS messages were sent and arrived to their destination. Furthermore, SMS messages can be sent from the CELLGUARD system to captured phones in behalf of any number, so the monitored subject will believe those are authentic SMS from their mates. The CELLGUARD system, while in interception mode, allow the operator to set the SMS on the fly and to change the content of the outgoing SMS before it reaches its destination or the content of an incoming SMS before it reaches the target. Note: some of the above features are optional and will be disabled if the customer will not choose the purchase this option. Page 3

6 4 ENGAGE CELLGUARD Prisons solutions The main application in Prison is blocking the unlawful usage of phones by inmates. In order to achieve this functionality without interfering with legitimate phone The CELLGUARD application manages two lists, one list of friendly/legitimate phones that shouldn t be affected by the transmission of the system and a second list of un-authorized phones which will always be affected by the system operation and will be blocked from operation (unless the CELLGUARD operator decides otherwise). Phones that are in neither lists will be handles according to the CELLGUARD operation mode either no affect or denial of service. Using this capability the CSD/Prison authority (PA) can choose the desired setting of system according to the legislation and procedures in each and every jail as follows: a. Full blocking (DOS) - in case usage of phones is not allowed to anyone within the prison premise including inmates, visitors and CSD staff the CELLGUARD can be configured for complete denial of service mode in which all the phones within the effective area are block. b. Selective blocking (DOS) for inmates. In this case only CSD/PA staff allowed using the phones within the prison area while any other detected phone will be automatically blocked by the system. In addition the CELLGUARD provided the following optional capabilities that might be required for advanced actions against inmates: a. Locate hidden cell phones b. Interception of voice calls and SMSs c. Warning SMS broadcast for all affected phones. The ENGAGE CELLGUARD can be deployed at prisons in several configurations depending on the operational needs and legislation: a. Tactical ad-hoc CELLGUARD forward/area specific operation b. Fixed installation for full premise coverage. Page 4

7 4.1 Tactical ad-hoc CELLGUARD CELLGUARD is designed for ad-hoc tactical covert operation. The CELLGUARD can be hand carried to the area of interest in the prison premise and remote controlled by a PDA. During the operation the CELLGUARD covers a limited area only and is affecting only the phones within the area. Such deployment can be used in case it is required to block specific ward or performing any operation on specific ward like locating all the hidden phones or intercepting specific inmate/group of inmates. Page 5

8 4.2 Fixed CELLGUARD installation CELLGUARD Fixed installation configuration is installed in a rack connected to centralized cell tower with high gain anttena or distributed anttenas that can covers the whole prison complex. The CELLGUARD power is ammlifiled by a dedicated power amplifier ensureing complete covarage of the compound. The system can operate 24/7 to block all un-authorized phones, covering concurrently 2G and 3G networks of all the service providers and controled by a centerlized administrator workstation. The CELLGUARD administrator will be able to manage the legitimate phones list and the unlawful phones according to the legislations and the operational requirements. In case the system shouldn t in any case interferes with legitimate phones the CELLGUARD administrator should manually add the un-authorized phones to the blocked list. These phones can be identified by time of startup, distance information from the cell etc. The legitimate phones of the prison staff and prisons emploees should be updated in the system s internal list the phones in these list will not be affected by the system in any case. An advanced capability of the CELLGUARD fixed installation alowes automatic identification of unlawful phones withing the prison. The system automaticlly idetifies the unlawful phones by several parametes parameters including RF messurment, network parameters and usage patterns. The system can either alert the CELLGUARD administrator for suspected phones or aotumatlly block the suspected phones. Page 6

9 5 Summary Verint ENGAGE CELLGUARD tactical solutions provide law enforcement and government agencies with a variety of modular, portable, and covert solutions for controlling, blocking, tracking a subjects handsets over GSM and UMTS networks, optionally monitoring calls and SMS s, and locating the mobile handsets of known terrorist, criminals, and suspects in the field. This technology provide corrective services departments/prison authorities with a unique capability for controlling the unlawful usage of cell phones in prisons or corrective services facilities starting from the very basic selective blocking, locating the phones and additional advanced capabilities mentioned in the paper. Verint ENGAGE CELLGUARD is widely used by many law enforcement and government security organizations for many different applications and operational needs, Verint in-house experts can discuss any operation requirement in details and tailor the solution to comply with legislation and guidelines. Page 7

10 Annex A: Prison Success story CELLGUARD has been deployed over the world in more than 40 countries over the past 8 years. There are many success stories that customer s kindly share with us, however we cannot distribute them with other customers due to their sensitive nature. Nevertheless, the case below was published in the media and we have obtained the customers approval to refer it to the CELLGUARD. Success story in Brazil CELLGUARD in prisons The above extract is taken from the official newspaper of the Ministry of Security, of the State of Rio Grande do Sul in Brazil. The article provides a report of a 2 days trial in 4 prisons in Brazil. During the trial 689 GSM phones were detected! In the highlighted paragraph: The equipment of latest technology used for this was given by an Israeli company. It permits to scan the frequency of the cellular working inside the prisons and locate them exactly Page 8

Cell Catcher CC1900 3G Target Identifier + IMSI Catcher + Phone Tracking

Cell Catcher CC1900 3G Target Identifier + IMSI Catcher + Phone Tracking The Cell Catcher model CC1900 tracks criminal cell phones on location, through UMTS networks, collecting and analyzing surveillance data of IMSI and IMEI numbers. 3G UMTS Gateway Technologies The Cell

More information

Testimony of Gerard Keegan CTIA. Before the South Carolina Joint Bond Review Special Subcommittee July 26, 2018

Testimony of Gerard Keegan CTIA. Before the South Carolina Joint Bond Review Special Subcommittee July 26, 2018 Testimony of Gerard Keegan CTIA Before the South Carolina Joint Bond Review Special Subcommittee July 26, 2018 On behalf of CTIA, the trade association for the wireless communications industry, thank you

More information

GSM Interception IMSI Catcher and Voice Interception

GSM Interception IMSI Catcher and Voice Interception GSM Interception IMSI Catcher and Voice Interception Part of the product line Product overview go2intercept passive: GSM interception Passive, massive, of the air. (page 3-4) go2intercept active basic:

More information

The Cellular Interceptor CC2800 Series

The Cellular Interceptor CC2800 Series The Cellular Interceptor CC2800 Series Operational Parameters The Target Mode enables the user to direct cellular interception by variables such as the IMSI, TMSI, or cellular phone number of the suspect.

More information

VMware Technology Overview. Leverage Nextiva Video Management Solution with VMware Virtualization Technology

VMware Technology Overview. Leverage Nextiva Video Management Solution with VMware Virtualization Technology VMware Technology Overview Leverage Nextiva Video Management Solution with VMware Virtualization Technology Table of Contents Overview... 2 Seamless Integration within the IT Infrastructure... 2 Support

More information

IMSI/IMEI Catching & Localization System. (IMSI/IMEI Catcher + Direction Finder)

IMSI/IMEI Catching & Localization System. (IMSI/IMEI Catcher + Direction Finder) IMSI/IMEI Catching & Localization System (IMSI/IMEI Catcher + Direction Finder) About Us Our intelligent, integrated and highly mobile IMSI/IMEI Catching & Localization system is used for identifying the

More information

The telephone supports 2 SIM cards. All functions are available for both SIM cards and have independent settings.

The telephone supports 2 SIM cards. All functions are available for both SIM cards and have independent settings. Samsung C6112 telephone for protection of conversations against control via a GSM service provider as well as via active and semi-active GSM interception complexes, catchers. The telephone supports 2 SIM

More information

OUTSMART ADVANCED CYBER ATTACKS WITH AN INTELLIGENCE-DRIVEN SECURITY OPERATIONS CENTER

OUTSMART ADVANCED CYBER ATTACKS WITH AN INTELLIGENCE-DRIVEN SECURITY OPERATIONS CENTER OUTSMART ADVANCED CYBER ATTACKS WITH AN INTELLIGENCE-DRIVEN SECURITY OPERATIONS CENTER HOW TO ADDRESS GARTNER S FIVE CHARACTERISTICS OF AN INTELLIGENCE-DRIVEN SECURITY OPERATIONS CENTER 1 POWERING ACTIONABLE

More information

Technical Specifications

Technical Specifications Technical Specifications The Goods and Related Services shall comply with following Technical Specifications: 1. Introduction: TECHNICAL SPECIFICATIONS OF IMSI MONITOR/MOBILE TRACKER a. The IMSI MONITOR/MOBILE

More information

Alcatel-Lucent 1357 ULIS

Alcatel-Lucent 1357 ULIS Unified Lawful Interception Suite The adds lawful interception functions to Alcatel-Lucent products, adapting their internal interfaces to the standard lawful interception interfaces of law enforcement

More information

Pegasus NetGuard Mobile Phone Counter Surveillance Systems

Pegasus NetGuard Mobile Phone Counter Surveillance Systems Pegasus NetGuard Mobile Phone Counter Surveillance Systems Hardware and software for Law Enforcement, Government & State Security Organisations Mobile phone interception detection Full spectral analysis

More information

Semi-Active GSM Monitoring System SCL-5020SE

Semi-Active GSM Monitoring System SCL-5020SE Semi-Active GSM Monitoring System SCL-5020SE Technology Introduction: GSM networks are most popular and widespread wireless communication media across the world, having a wide customer base in Europe and

More information

Threat patterns in GSM system. Basic threat patterns:

Threat patterns in GSM system. Basic threat patterns: Threat patterns in GSM system Usage of mobile devices in business simpli es, speeds up and optimizes business processes. However, it is necessary to understand that the more complicated the device is the

More information

PTLGateway Acceptable Use Policy

PTLGateway Acceptable Use Policy 1 PTLGateway Acceptable Use Policy Last Updated Date: 02 March 2018 Acceptable Use Policy Your use of our Services must fall within our Acceptable Usage Policy. Contents Key details... 1 COVERAGE OF THIS

More information

Verint Knowledge Management Solution Brief Overview of the Unique Capabilities and Benefits of Verint Knowledge Management

Verint Knowledge Management Solution Brief Overview of the Unique Capabilities and Benefits of Verint Knowledge Management Verint Knowledge Management Solution Brief Overview of the Unique Capabilities and Benefits of Verint Knowledge Management November 2015 Table of Contents Introduction... 1 Verint Knowledge Management

More information

GLOBAL SYSTEM FOR MOBILE COMMUNICATION (2) ETI2511 Friday, 31 March 2017

GLOBAL SYSTEM FOR MOBILE COMMUNICATION (2) ETI2511 Friday, 31 March 2017 GLOBAL SYSTEM FOR MOBILE COMMUNICATION (2) ETI2511 Friday, 31 March 2017 1 SYLLABUS GSM General architecture and interfaces of cellular system and the PSTN and Internet networks: BTS, MSC, Internetworking,

More information

WZRDnet. A Low-Power Wireless Ad-Hoc Mesh Network for Austere Tactical Environments. February 14, 2018

WZRDnet. A Low-Power Wireless Ad-Hoc Mesh Network for Austere Tactical Environments. February 14, 2018 White Paper TELEGRID Technologies, Inc. WZRDnet A Low-Power Wireless Ad-Hoc Mesh Network for Austere Tactical Environments February 14, 2018 23 Vreeland Road Suite 290 Florham Park, NJ 07932 www.telegrid.com

More information

CTI BioPharma Privacy Notice

CTI BioPharma Privacy Notice CTI BioPharma Privacy Notice Effective: 29 November 2018 Introduction and Scope CTI BioPharma Corp. ( CTI, our, us ) takes the protection of your personal data very seriously. This Privacy Notice (this

More information

Sample BYOD Policy. Copyright 2015, PWW Media, Inc. All Rights Reserved. Duplication, Reproduction or Distribution by Any Means Prohibited.

Sample BYOD Policy. Copyright 2015, PWW Media, Inc. All Rights Reserved. Duplication, Reproduction or Distribution by Any Means Prohibited. Sample BYOD Policy Copyright 2015, PWW Media, Inc. All Rights Reserved. Duplication, Reproduction or Distribution by Any Means Prohibited. SAMPLE BRING YOUR OWN DEVICE POLICY TERMS OF USE This Sample Bring

More information

Legal notice and Privacy policy

Legal notice and Privacy policy Legal notice and Privacy policy We appreciate your interest in us. Below you will find information of legal relevance when visiting this website. In addition, you will find our Privacy Policy, which explains

More information

Basics of GSM in depth

Basics of GSM in depth This document will be helpful for the telecom engineers who deal with GSM as well as for the fresher /interested readers. This document has some advantages over other GSM texts in that it quickly gets

More information

GSME proposals regarding mobile theft and IMEI security

GSME proposals regarding mobile theft and IMEI security GSM Europe The European interest group of the GSM Association http://www.gsmeurope.org GSME proposals regarding mobile theft and IMEI security The question of mobile theft and ways of combating it has

More information

WYANDOTTE MUNICIPAL SERVICES ACCEPTABLE USE POLICY

WYANDOTTE MUNICIPAL SERVICES ACCEPTABLE USE POLICY WYANDOTTE MUNICIPAL SERVICES ACCEPTABLE USE POLICY Wyandotte Municipal Services may modify this Acceptable Use Policy at any time without notifying its users. For this reason, Wyandotte Services High Speed

More information

This Policy applies to all staff and other authorised users in St Therese School.

This Policy applies to all staff and other authorised users in St Therese School. St. Therese School Computer and Internet Policy STAFF Policy Statement All staff and other authorised users of St Therese information and communications technology are to use the technology only in a way

More information

VERINT EFM 8.0 Release Overview

VERINT EFM 8.0 Release Overview VERINT EFM 8.0 Release Overview In January of 2015 Verint will release version 8.0 of the Enterprise Feedback Management (EFM) solution. Verint hosted SaaS customers will receive this update as part of

More information

Nextiva S4300-BR. Installation Guide

Nextiva S4300-BR. Installation Guide Nextiva S4300-BR Installation Guide Unauthorized use, duplication, or modification of this document in whole or in part without the written consent of Verint Systems Inc. is strictly prohibited. By providing

More information

Apex Information Security Policy

Apex Information Security Policy Apex Information Security Policy Table of Contents Sr.No Contents Page No 1. Objective 4 2. Policy 4 3. Scope 4 4. Approval Authority 5 5. Purpose 5 6. General Guidelines 7 7. Sub policies exist for 8

More information

Physical and Environmental Security Standards

Physical and Environmental Security Standards Physical and Environmental Security Standards Table of Contents 1. SECURE AREAS... 2 1.1 PHYSICAL SECURITY PERIMETER... 2 1.2 PHYSICAL ENTRY CONTROLS... 3 1.3 SECURING OFFICES, ROOMS AND FACILITIES...

More information

IP Office Intuity Mailbox Mode User Guide

IP Office Intuity Mailbox Mode User Guide Intuity Mailbox Mode User Guide 15-601130 EN-S Issue 12b - (03 October 2011) 2011 AVAYA All Rights Reserved. Notices While reasonable efforts have been made to ensure that the information in this document

More information

ITU Workshop Combating grey devices. Audrey Scozzaro Ferrazzini Standardisation and Industrial Policy Lead, EMENA Government Affairs 28 June 2016

ITU Workshop Combating grey devices. Audrey Scozzaro Ferrazzini Standardisation and Industrial Policy Lead, EMENA Government Affairs 28 June 2016 ITU Workshop Combating grey devices Audrey Scozzaro Ferrazzini Standardisation and Industrial Policy Lead, EMENA Government Affairs 28 June 2016 Security solutions Qualcomm s vision Theft Deterrence Enterprise

More information

Understanding IMSI Privacy!

Understanding IMSI Privacy! Understanding IMSI Privacy Ravishankar Borgaonkar TU Berlin Swapnil Udar Aalto University Email: darshak@sec.t-labs.tu-berlin.de Blackhat USA 2014, Las Vegas, 7 th August 2014 Overview Unresolved Privacy

More information

Name of Policy: Computer Use Policy

Name of Policy: Computer Use Policy Page: Page 1 of 5 Director Approved By: Approval Date: Reason(s) for Change Responsible: Corporate Services Leadership April 22, Reflect current technology and practice Corporate Services Leadership Leadership

More information

CC6000 Active Intercept

CC6000 Active Intercept CC6000 Active Intercept When real-time intelligence is needed on suspected Terrorist and Criminal Organizations, the CC6000 is the next generation of Active Interception Technologies. This system is able

More information

presents Cell Warden Prison Protocol Beacon Technology DISABLES 100% OF CONTRABAND CELL PHONES

presents Cell Warden Prison Protocol Beacon Technology DISABLES 100% OF CONTRABAND CELL PHONES presents Cell Warden Prison Protocol Beacon Technology DISABLES 100% OF CONTRABAND CELL PHONES NO Talk NO Text SMS TEXT NO Email NO WiFi NO Camera NO Video For More Information Contact John Fischer (770)

More information

EAGLE EYE MC. 1. Introduction

EAGLE EYE MC. 1. Introduction 1. Introduction Worldwide explosion of communication technologies creates a significant challenge for law enforcement agencies, national security organizations and enterprise security responsible for battling

More information

VERINT EFM 15.1 Release Overview

VERINT EFM 15.1 Release Overview VERINT EFM 15.1 Release Overview In September of 2015 Verint will release version 15.1 of the Enterprise Feedback Management (EFM) solution. Verint hosted SaaS customers will receive this update as part

More information

Wireless Network Standard

Wireless Network Standard Last Modified: 10/20/15 Wireless Network Standard Purpose The standard and guidelines described in this document will ensure the uniformity of wireless network access points at the University of Georgia.

More information

Quad BRI GSM Gateway with 8 GSM Ports

Quad BRI GSM Gateway with 8 GSM Ports Quad BRI GSM Gateway with 8 GSM Ports HG-2000/3U Cost Saving Customer Premises Equipment with Carrier Grade Performance Product Description November 2009 Contents Next Page Hypermedia HG-2000/3U 3 Contents

More information

Kodiak Broadband PTT for Public Safety

Kodiak Broadband PTT for Public Safety Kodiak Broadband PTT for Public Safety An Application Brief MOTOROLA SOLUTIONS and KODIAK are trademarks or registered trademarks of Motorola Trademark Holdings, LLC. This document is not an offer, commitment,

More information

Verint Enterprise Feedback Management TM. EFM 15.1 FP3 Release Overview October 2016

Verint Enterprise Feedback Management TM. EFM 15.1 FP3 Release Overview October 2016 Verint Enterprise Feedback Management TM EFM 15.1 FP3 Release Overview October 2016 Table of Contents Welcome to 15.1 FP3... 1 Advanced Dashboard... 1 Custom Filters By Question... 2 Custom Filter Groups...

More information

PRODUCT GUIDE Wireless Intrusion Prevention Systems

PRODUCT GUIDE Wireless Intrusion Prevention Systems PRODUCT GUIDE Wireless Intrusion Prevention Systems The Need for Wireless INTRUSION PREVENTION SYSTEMS A Wireless Intrusion Prevention System (WIPS) is designed to address two classes of challenges facing

More information

The ultimate IP DECT communication devices for voice, text messaging and inhouse mobility

The ultimate IP DECT communication devices for voice, text messaging and inhouse mobility The ultimate IP DECT communication devices for voice, text messaging and inhouse mobility Table of content On-site Wireless telephony on your IP Network 3 Key Applications 6 10 reasons for Business Mobility

More information

Department of Public Health O F S A N F R A N C I S C O

Department of Public Health O F S A N F R A N C I S C O PAGE 1 of 9 Category: Information Technology Security and HIPAA DPH Unit of Origin: Department of Public Health Policy Owner: Phillip McDown, CISSP Phone: 255-3577 CISSPCISSP/C Distribution: DPH-wide Other:

More information

The WiMAX Technology

The WiMAX Technology Page 2 Oeconomics of Knowledge, Volume 2, Issue 2, 2Q 2010 The WiMAX Technology Felician ALECU, PhD, University Lecturer Department of Economic Informatics Academy of Economic Studies, Bucharest, Romania

More information

Department of Public Health O F S A N F R A N C I S C O

Department of Public Health O F S A N F R A N C I S C O PAGE 1 of 7 Category: Information Technology Security and HIPAA DPH Unit of Origin: Department of Public Health Policy Owner: Phillip McDown, CISSP Phone: 255-3577 CISSPCISSP/C Distribution: DPH-wide Other:

More information

Oracle Hospitality Cruise Meal Count System Security Guide Release 8.3 E

Oracle Hospitality Cruise Meal Count System Security Guide Release 8.3 E Oracle Hospitality Cruise Meal Count System Security Guide Release 8.3 E99233-01 August 2018 Copyright 2015, 2018, Oracle and/or its affiliates. All rights reserved. This software and related documentation

More information

Code of Practice. Mobile Spam. 1.0 February Official Document PPC.01. Security Classification Category (see next page)

Code of Practice. Mobile Spam. 1.0 February Official Document PPC.01. Security Classification Category (see next page) Code of Practice Mobile Spam 1.0 February 2006 This is a non-binding permanent reference document of the GSM Association. Security Classification Category (see next page) This is an document. 1.0 Page

More information

IMEI Security Technical Design Principles

IMEI Security Technical Design Principles IMEI Security Technical Design Principles Enabling stolen mobile device blocking V4.0 August 2016 Table of Contents 1. Introduction... 1 2. Device Identity Security... 1 3. Design Principles... 2 4. IMEI

More information

Cellular Site Simulator Usage and Privacy

Cellular Site Simulator Usage and Privacy Policy 609 Cellular Site Simulator Usage and Privacy 609.1 PURPOSE AND SCOPE The purpose of this policy is to set guidelines and requirements pertaining to cellular site simulator technology usage and

More information

Secure Mobility Challenges. Fat APs, Decentralized Risk. Physical Access. Business Requirements

Secure Mobility Challenges. Fat APs, Decentralized Risk. Physical Access. Business Requirements Unified Wireless Switching Enabling a Truly Converged Network White Paper Abstract As businesses scale, traditional wireless network deployments become more complex, more costly and less secure. Users

More information

C A S E S T U D Y D E C E M B E R P R E P A R E D B Y : Iftah Bratspiess

C A S E S T U D Y D E C E M B E R P R E P A R E D B Y : Iftah Bratspiess FINANCIAL INSTITUTES PENETRATION INTO A BANK NETWORK USING TRANSPARENT NETWORK DEVICES C A S E S T U D Y P R E P A R E D B Y : Iftah Bratspiess 2018 Sepio Systems www.sepio.systems US: 11810 Grand Park

More information

Driving the Need for Mobile Device Management (MDM)

Driving the Need for Mobile Device Management (MDM) Driving the Need for Mobile Device Management (MDM) The rapid introduction of smartphones and tablet devices has challenged enterprises to stretch their IT capacities. IT departments are facing significant

More information

TN1070: Verint Master Server Under

TN1070: Verint Master Server Under Technical Note TN1070: Verint Master Server Under VMware 6.0 Publication Date: Monday, May 23, 2016 Products Exposure Level Technical Note Type Description Verint VMS 6.4 SP3 and higher VMware 6.0 Customer

More information

Office Properties Income Trust Privacy Notice Last Updated: February 1, 2019

Office Properties Income Trust Privacy Notice Last Updated: February 1, 2019 General Office Properties Income Trust Privacy Notice Last Updated: February 1, 2019 Office Properties Income Trust ( OPI ) is committed to your right to privacy and to keeping your personal information

More information

Agilent E7478A GPRS Drive Test System

Agilent E7478A GPRS Drive Test System Agilent E7478A GPRS Drive Test System Product Overview Quickly deploy your GPRS networks and manage multiformat environments Our drive test solution doesn t just uncover problems on your GPRS network it

More information

Cleveland State University General Policy for University Information and Technology Resources

Cleveland State University General Policy for University Information and Technology Resources Cleveland State University General Policy for University Information and Technology Resources 08/13/2007 1 Introduction As an institution of higher learning, Cleveland State University both uses information

More information

Experimental Analysis of the Femtocell Location Verification Techniques

Experimental Analysis of the Femtocell Location Verification Techniques Experimental Analysis of the Femtocell Location Verification Techniques Ravishankar Borgaonkar, Kevin Redon and Jean-Pierre Seifert Security in Telecommunication Technical University Berlin and Deutsche

More information

IP Office. IP Office Mailbox Mode User Guide Issue 11b - (15 May 2010)

IP Office. IP Office Mailbox Mode User Guide Issue 11b - (15 May 2010) Mailbox Mode User Guide 15-601131 Issue 11b - (15 May 2010) 2010 AVAYA All Rights Reserved. Notices While reasonable efforts have been made to ensure that the information in this document is complete and

More information

BHIG - Mobile Devices Policy Version 1.0

BHIG - Mobile Devices Policy Version 1.0 Version 1.0 Authorised by: CEO Endorsed By: Chief Operations Officer 1 Document Control Version Date Amended by Changes Made 0.1 20/01/2017 Lars Cortsen Initial document 0.2 29/03/2017 Simon Hahnel Incorporate

More information

WiMAX Forum Requirements for WiMAX BS/WFAP Local Routing of the Bearer Traffic

WiMAX Forum Requirements for WiMAX BS/WFAP Local Routing of the Bearer Traffic 0 0 Requirements for WiMAX BS/WFAP Local Routing of the Bearer Traffic WMF Approved 0-0- WMF-T-0-v0 0 Proprietary Copyright 0. All Rights Reserved. WiMAX FORUM PROPRIETARY WMF-T-0-v0 0 0 0 0 0 Copyright

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy Why is Cleveland Broadband providing this Policy to me? Cleveland Broadband s goal is to provide its customers with the best Internet service possible. In order to help accomplish

More information

Content. Privacy Policy

Content. Privacy Policy Content 1. Introduction...2 2. Scope...2 3. Application...3 4. Information Required...3 5. The Use of Personal Information...3 6. Third Parties...4 7. Security...5 8. Updating Client s Information...5

More information

Nexus8610 Traffic Simulation System. Intersystem Handover Simulation. White Paper

Nexus8610 Traffic Simulation System. Intersystem Handover Simulation. White Paper Traffic Simulation System Intersystem Handover Simulation White Paper Notice Every effort has been made to ensure that the information in this document was accurate at the time of printing. However, the

More information

5. Execute the attack and obtain unauthorized access to the system.

5. Execute the attack and obtain unauthorized access to the system. Describe how a combination of preventive, detective, and corrective controls can be employed to provide reasonable assurance about information security. Before discussing the preventive, detective, and

More information

PRIVACY COMMITMENT. Information We Collect and How We Use It. Effective Date: July 2, 2018

PRIVACY COMMITMENT. Information We Collect and How We Use It. Effective Date: July 2, 2018 Effective Date: July 2, 2018 PRIVACY COMMITMENT Protecting your privacy is very important to Prosci and this privacy policy is our way of providing you with details about the types of information we collect

More information

NYSVMS WEBSITE PRIVACY POLICY

NYSVMS WEBSITE PRIVACY POLICY Your Privacy Rights Effective Date: June 16, 2016 NYSVMS WEBSITE PRIVACY POLICY The New York State Veterinary Medical Society, Inc. and its affiliates ( NYSVMS, we, and us ) recognize the importance of

More information

SECTION SPECIAL SYSTEMS. Website and Construction Cameras

SECTION SPECIAL SYSTEMS. Website and Construction Cameras PART 1 GENERAL SECTION 01121 SPECIAL SYSTEMS 1.01 WORK INCLUDED A. Project Construction Site Cameras and Video Streaming Servers B. Project Web site C. Network & Infrastructure D. Internet Connectivity

More information

Paper on Handling Menace of International Grey Traffic

Paper on Handling Menace of International Grey Traffic Paper on Handling Menace of International Grey Traffic White Paper 01 of 2012 PiRRC In this paper discussion is only about the conventional international voice telephony requiring a license to bring in

More information

Live Broadcast: Video Services from AT&T

Live Broadcast: Video Services from AT&T Delivering your content through the power of the cloud Live Broadcast: Video Services from AT&T Getting your content to your audience is becoming increasingly diverse and complex. Today, people want to

More information

Video Architectures Eyes on the Future: The Benefits of Wireless Technology for Fixed Video Surveillance

Video Architectures Eyes on the Future: The Benefits of Wireless Technology for Fixed Video Surveillance S O L U T I O N PA P E R Video Architectures Eyes on the Future: The Benefits of Wireless Technology for Fixed Video Surveillance Table of Contents Fixed Video Surveillance: The Big Three... 3 Wireless

More information

Ulster University Standard Cover Sheet

Ulster University Standard Cover Sheet Ulster University Standard Cover Sheet Document Title Portable Devices Security Standard 1.5 Custodian Approving Committee Deputy Director of Finance and Information Services (Information Services) Information

More information

Technical Brief. Motorola s MC959B: a new level of carrier independence, device flexibility and return on investment (ROI)

Technical Brief. Motorola s MC959B: a new level of carrier independence, device flexibility and return on investment (ROI) Technical Brief Motorola s MC959B: a new level of carrier independence, device flexibility and return on investment (ROI) The issue: the network-proprietary device Every day, your mobile workforce depends

More information

Defeating IMSI Catchers. Fabian van den Broek et al. CCS 2015

Defeating IMSI Catchers. Fabian van den Broek et al. CCS 2015 Defeating IMSI Catchers Fabian van den Broek et al. CCS 2015 Ren-Jay Wang CS598 - COMPUTER SECURITY IN THE PHYSICAL ckground 3GPP 3GPP 3 rd Generation Partnership Project Encompasses: GSM and related 2G

More information

Vodafone Location Services. Privacy Management Code of Practice. Issued Version V1.0

Vodafone Location Services. Privacy Management Code of Practice. Issued Version V1.0 Vodafone Location Services Privacy Management Code of Practice Issued Version V1.0 Issued Version 1.0 Page 1 of10 17/08/03 August 2003 Vodafone Limited. All rights reserved. CONTENTS 0. Overview.. 3 1.

More information

MONITORING OBLIGATIONS. FULFiL CSP REQUIREMENTS FOR COMMUNICATIONS MONITORING.

MONITORING OBLIGATIONS. FULFiL CSP REQUIREMENTS FOR COMMUNICATIONS MONITORING. MONITORING OBLIGATIONS. FULFiL CSP REQUIREMENTS FOR COMMUNICATIONS MONITORING. DataBridge Flexible communications monitoring Meeting your obligations flexibly As terrorists and organized criminals take

More information

AGREEMENT FOR RECEIPT AND USE OF MARKET DATA: ADDITIONAL PROVISIONS

AGREEMENT FOR RECEIPT AND USE OF MARKET DATA: ADDITIONAL PROVISIONS EXHIBIT C AGREEMENT FOR RECEIPT AND USE OF MARKET DATA: ADDITIONAL PROVISIONS 21. NYSE DATA PRODUCTS (a) SCOPE This Exhibit C applies insofar as Customer receives, uses and redistributes NYSE Data Products

More information

Cellebrite Digital Forensics for Legal Professionals (CDFL)

Cellebrite Digital Forensics for Legal Professionals (CDFL) Global forensic training Course description Level Intermediate Length Two days (14 hours) Training Track Investigative The two-day Cellebrite Digital Forensics for Legal Professionals course is designed

More information

Technical Requirements of the GDPR

Technical Requirements of the GDPR Technical Requirements of the GDPR Purpose The purpose of this white paper is to list in detail all the technological requirements mandated by the new General Data Protection Regulation (GDPR) laws with

More information

PPR TOKENS SALE PRIVACY POLICY. Last updated:

PPR TOKENS SALE PRIVACY POLICY. Last updated: PPR TOKENS SALE PRIVACY POLICY Last updated: 05.03.2018 STATUS AND ACCEPTANCE OF PRIVACY POLICY 1. This Privacy Policy (hereinafter referred to as the Policy ) sets forth the general rules of Participant

More information

2. VIOLATIONS OF ACCESSHOSTING.COM S ACCEPTABLE USE POLICY. b. Harm to minors. Using the Services to harm, or attempt to harm, minors in any way.

2. VIOLATIONS OF ACCESSHOSTING.COM S ACCEPTABLE USE POLICY. b. Harm to minors. Using the Services to harm, or attempt to harm, minors in any way. 1. INTRODUCTION Accesshosting.com's ("AUP") is intended to help enhance the use of the Access Hosting Service by preventing unacceptable use. All users of Accesshosting.com s Access Hosting Services (the

More information

Getting Started Install and Configuration Version 8.2.3

Getting Started Install and Configuration Version 8.2.3 Getting Started Install and Configuration Version 8.2.3 Copyright 2018 PTC Inc. and/or Its Subsidiary Companies. All Rights Reserved. User and training guides and related documentation from PTC Inc. and

More information

INTRODUCTION TO WIRELESS COMMUNICATION

INTRODUCTION TO WIRELESS COMMUNICATION OVERVIEW INTRODUCTION TO WIRELESS COMMUNICATION EVOLUTION FROM 1G TO 4G SYSTEM 5-G WIRELESS SYSTEM FUNCTIONAL ARCHITECTURE FOR 5G MOBILE NETWORKS THE 4A PARADIGM FEATURES OF 5G TECHNOLOGY 5G APPLICATION

More information

IP Office 1603 Phone User Guide

IP Office 1603 Phone User Guide 1603 Phone User Guide 15-601013 Issue 03a - (03 October 2011) 2011 AVAYA All Rights Reserved. Notice While reasonable efforts were made to ensure that the information in this document was complete and

More information

HIPAA Compliance Checklist

HIPAA Compliance Checklist HIPAA Compliance Checklist Hospitals, clinics, and any other health care providers that manage private health information today must adhere to strict policies for ensuring that data is secure at all times.

More information

STRATA Networks. Broadband Internet Access Services. Network Management Practices, Performance Characteristics, and

STRATA Networks. Broadband Internet Access Services. Network Management Practices, Performance Characteristics, and STRATA Networks Broadband Internet Access Services Network Management Practices, Performance Characteristics, and Commercial Terms and Conditions for Mobile Services STRATA Networks ( the Company ) has

More information

Biometric Technology

Biometric Technology Biometric Technology Contents Biometric Technology M2SYS is a leading global provider of biometric technology and software solutions with 16 years of real-world experience. Our experience enables us to

More information

RESOLUTION DIGEST

RESOLUTION DIGEST RESOLUTION 07-02-04 DIGEST Consumer Sales: Service of Process on Designated Agent Amends Business and Professions Code section 17538.5 to provide that personal service of process may be effected via delivery

More information

Mitel MiContact Center Enterprise SMS GATEWAY USER GUIDE. Release 9.2

Mitel MiContact Center Enterprise SMS GATEWAY USER GUIDE. Release 9.2 Mitel MiContact Center Enterprise SMS GATEWAY USER GUIDE Release 9.2 NOTICE The information contained in this document is believed to be accurate in all respects but is not warranted by Mitel Networks

More information

White Paper February McAfee Network Protection Solutions. Encrypted Threat Protection Network IPS for SSL Encrypted Traffic.

White Paper February McAfee Network Protection Solutions. Encrypted Threat Protection Network IPS for SSL Encrypted Traffic. White Paper February 2005 McAfee Network Protection Solutions Encrypted Threat Protection Network IPS for SSL Encrypted Traffic Network IPS for SSL Encrypted Traffic 2 Introduction SSL Encryption Overview

More information

GSMK. Cryptography Network Security. GSMK Oversight SS7 Firewall and Intrusion Detection System

GSMK. Cryptography Network Security. GSMK Oversight SS7 Firewall and Intrusion Detection System Cryptography Network Security GSMK Firewall and Intrusion Detection System GSMK Firewall and intrusion detection system to prevent attacks via interconnect. Protect your Network s Achilles Heel. With the

More information

MASTERCARD PRICELESS SPECIALS INDIA PRIVACY POLICY

MASTERCARD PRICELESS SPECIALS INDIA PRIVACY POLICY Effective Date: 12 September 2017 MASTERCARD PRICELESS SPECIALS INDIA PRIVACY POLICY Mastercard respects your privacy. This Privacy Policy describes how we process personal data, the types of personal

More information

ACCEPTABLE USE POLICY

ACCEPTABLE USE POLICY Great Lakes Energy Connections, Inc. Truestream ACCEPTABLE USE POLICY Contents OVERVIEW... 2 INTRODUCTION... 2 VIOLATION OF THIS ACCEPTABLE USE POLICY... 2 PROHIBITED USES AND ACTIVITIES... 2 CUSTOMER

More information

ELECTRIC APP - PRIVACY POLICY

ELECTRIC APP - PRIVACY POLICY By accessing the website at http://electricchats.com ( Electric Site ) or any Electric mobile application (e.g., Electric ios, or Electric Android,) ( Electric App ) (collectively, the Electric Service

More information

PRIMUS ACCEPTABLE USE POLICY

PRIMUS ACCEPTABLE USE POLICY PRIMUS ACCEPTABLE USE POLICY For purposes of this Agreement, You, users, and account holders are used interchangeably, and where applicable. These terms are subject to the Privileges and Immunities of

More information

The Use of Technology to Enhance Investigation

The Use of Technology to Enhance Investigation The Use of Technology to Enhance Investigation Of High Profile Corruption Cases. Centre for Socio-Legal Studies Objectives By the end of this keynote, participants will be knowledgeable on: 1. Open Source

More information

The challenges, opportunities and setting the framework for 5G EMF and Health

The challenges, opportunities and setting the framework for 5G EMF and Health The challenges, opportunities and setting the framework for 5G EMF and Health 5G, EMF & Health 5 December 2017, Warsaw, Poland Mike Wood - General Manager Telstra EME Strategy, Governance and Risk Management

More information

BERKELEY COLLEGE Social Media Policy

BERKELEY COLLEGE Social Media Policy BERKELEY COLLEGE Social Media Policy Scope This policy applies to all use of social media by Berkeley College students, faculty and staff to represent or discuss matters concerning the College and/or members

More information

1. Approval for Use of OpenPOWER Marks and Trademark License

1. Approval for Use of OpenPOWER Marks and Trademark License OPENPOWER FOUNDATION TRADEMARK AND LOGO USAGE GUIDELINES These Trademark and Logo Usage Guidelines ( Guidelines ) address the authorized uses of s ( OpenPower, OpenPOWER Foundation, or the Foundation )

More information

UNIT-5. GSM System Operations (Traffic Cases) Registration, call setup, and location updating. Call setup. Interrogation phase

UNIT-5. GSM System Operations (Traffic Cases) Registration, call setup, and location updating. Call setup. Interrogation phase UNIT-5 GSM System Operations (Traffic Cases) Registration, call setup, and location updating Call setup Interrogation phase For the interrogation phase The initial address message comes outside the GSM

More information

Smeal College of Business - Central Firewall Rules and Policies

Smeal College of Business - Central Firewall Rules and Policies Smeal College of Business - Central Firewall Rules and Policies 1.0 Purpose The purpose of this policy is to outline the College s use and management of centralized firewall services. This policy will

More information