•  
  •  
< Page 2 of 4 >
WIRELESS INTERCEPTION and TSCM - W i F i   I N T E R C E P T I O N
image-2143481-backpack.jpg

CYBER INTELLIGENCE SOLUTIONS THAT CAN COLLECT DATA FROM TARGETS’ MOBILE PHONE AND WEB ACCOUNTS.

USING INJECTED CYBER AGENTS, ALSO KNOWN AS A "TROJAN APP", OUR SOLUTIONS CAN EXTRACT CHAT APPS, EMAILS, PHOTOS, FILES, CONTACTS, LOCATIONS AND MORE VIA A TWO-STEP OPERATION:


STEP 1 – MITM ATTACK

THE OPERATION COMMENCES WITH MAN-IN-THE-MIDDLE (MITM) INTERCEPTION OVER WiFi, WHICH USES ADVANCED TECHNIQUES TO GAIN ACCESS TO THE TARGETS’ DEVICES TO EFFECTIVELY AND SAFELY INJECT CYBER AGENTS INTO TARGETS’ DEVICES DURING STANDARD DEVICE USE AND BEHAVIOR.


STEP 2 – POST INTERCEPTION

FROM THIS POINT FORWARD, THE INTERCEPTION SYSTEMS RUNNING THE MITM ATTACK ARE NO LONGER REQUIRED AS OUR SOLUTIONS GAIN FULL REMOTE CONTROL OF ALL THE TARGETS’ DATA SOURCES, ENABLING REMOTE DATA EXTRACTION. THE DEPLOYED CYBER AGENTS REMOTELY TRANSMIT THE DATA ON THE DEVICE TO A NOMINATED COMMAND CENTER OR OTHER FIELD DEPLOYABLE DEVICE.
image-2143400-mitm.jpg
image-2143478-mitm2.jpg
< Page 2 of 4 >