Security Intel

Casade Defence Systems provide advanced security technology to government law enforcement agencies, the military, and police departments to enhance their investigative and protective capabilities. Our security software and hardware devices, when properly deployed, enable law enforcement personnel to remotely geolocate, track, record and jam communications by malicious actors such as terrorists, kidnappers, cybercriminals and wanted offenders attempting to evade prosecution. Out talented team of IT professionals, software engineers, developers, and cybersecurity experts would lend their decades-long experiences to facilitate investigations, apprehension of suspects, monitoring and detection of threats and vulnerabilities. We have partnered with some of the best producers of security equipment in the industry to offer governments and security agencies the most advanced services available.

The CT Secure Phone

Active Man-in-the-middle GSM Interception System
PICSIX-Active System

About the System

The system allows its operator to either release the captured device back to the real network, or leave it under the system control, monitoring, intercepting and storing all its traffic.

The P6-MITM includes two BTS modules, where each BTS can monitor a different GSM band, allowing extended coverage. Larger configurations are supported including 4 or 6 base stations facilitating simultaneous monitoring of 2 or 3 cellular networks.

When connected to decipher unit (locally or remotely), the system can intercept ciphered calls and SMS (A5/1 and A5/2).

Common Uses

  • Off the Air Interception
  • IMSI/IMEI catching
  • Selective jamming of communication
  • Presence Detection
  • Data Analysis
  • Direction Finding Support
  • Phone manipulation

Main Features

  • Automatic network scan and system setup
  • Cloning of a real cellular network
  • Simulating GSM 850,1900,900,1800 base stations
  • Presence detection of specific mobile devices/targets
  • Real-time calls and SMS interception of A5/0/1/2 cellularnetworks
  • Supports up to 5- 12 full-duplex concurrent calls
  • Supports A5/0 reduction
  • Built-in A5/2 decipher
  • Built or remote- A5/1 decipher
  • Voice and data recording on hard disk
  • Outgoing and incoming call number determination
  • DTMF tones interception
  • Ability to interrupt ongoing calls
  • Ability to selectively prevent calls
  • Manipulate communication (calls & SMSs)
  • Cause any targeted GSM phone transmit an RF-beacon that can be DF located
  • Capturing mobile phones within range and extracting their cellular identifiers (IMSI, IMEI, TMSI, MSISDN)

Passive Interception Platform
PICSIX-passive System

About the System

PICSIX employs a distributed architecture approach coupled with sophisticated use of narrowband receiver banks, jointly providing a state of the art passive interception solution.

The P6-GUI Manager includes a smart map display of nearby base station cells and target mobiles as well as SWAT members on the ground.

P6-Passive can be custom tailored to best fit the customer’s needs.

PICSIX offers a large suite of solutions for interception of Cellular calls and SMS. One of our most popular configurations is a vehicular 19” rack hosting:

  • 96 or 128 Channel passive Front End
  • P6 Central management station
  • Central deciphering device
    PICSIX P6-322 shifting 3G traffic to GSM serving as an IMSI catcher as well
  • Additional 48CH backpack passive system carried by a SWAT member

Main Features

The system monitors the GSM channels for activity, intercepts calls in target and random modes without transmitting, hence, it cannot be detected. P6-Passive can optionally be delivered with some unique
features that do transmit a network-manipulating signal that cannot be detected. Such transmissions may be used to create Black/white lists without making use of MITM active fake cell systems, cancellation of encryption, generation of spoofed text messages etc.

P6-Passive can randomly intercept calls initiated at dozens of cells. Even 30 cells or more can be monitored simultaneously for call/SMS commencing by a single P6-Front-end. As a function of the number of channels used and the number of local and remote Front Ends used (P6FEs) the system can intercept the ENTIRE TRAFFIC (not missing a call) initiated in one to 5 cells, in the small systems, and up to a dozen or more cells in the larger systems equipped with hundreds of channels.

All intercepted calls are recorded and can be played back by the P6-System operator or by any P6 Analysis-Stations even while being recorded.

  • Once a call is intercepted in one of the pre-programmed cells (base-stations) being monitored, the system would follow ALL HAND OVERS even if not in the pre-programmed list.
  • A silent SMS can be generated to any cellphone number for the purpose of obtaining its TMSI Identifier

Active Monitoring System
IMSI/IMEI catcher with mobile number detection

Digital Forensics

General Description

The P6-Catcher pretends to be a legitimate Mobile Network Base Station, which attracts nearby mobile devices and registers them. Once this registration occurs, the P6- CATCHER extracts and records
device identities: IMSI, IMEI, TMSI, and MSISDN (optional).Highly-portable, the P6-CATCHER can be positioned covertly in a surveillance vehicle, or carried in a backpack – offering valuable law enforcement or intelligence gathering opportunity anywhere, anytime.

Features

  • Scan and setup: automatically provides users with ideal parameters for most effective attraction of cellular subscribers.
  • Clone: clones real cellular network.
  • Base Stations: simulates GSM/UMTS/LTE on SDR base stations (each base station supports simulation of any RAT – GSM/UMTS/LTE).
  • Bands: supports single band to quad-band base
    stations.
  • Capture: presence verification of specific mobile
    devices/targets.
  • Beacon / Silent Call: can cause targeted phone to transmit an RF-beacon in a clear channel. The frequency that is being transmitted by the device can then be calibrated into a directional finder, enabling to find the device, either for arrest or search and rescuepurposes. Multiple simultaneous silent calls supported.
  • IDs: capture and recording of cellular identifiers (IMSI, IMEI, TMSI).
  • White list: allows a predefined list of devices to work while all others are denied service.
  • Black list: allows operation in a target-oriented mode, where all phones are released but a predefined list of targets is held/denied service.
  • Downgrading: ability to downgrade targets/ all traffic from LTE or UMTS to GSM.
  • Scheduled Transmission: schedule transmissions with predefined parameters in order to automatically skip from coverage of one operator to another

Partners