Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Save to My Library
Look up keyword or section
Like this
20Activity
P. 1
Amesys Eagle Operator Manual Copy

Amesys Eagle Operator Manual Copy

Ratings: (0)|Views: 32,549 |Likes:
Published by rewriting
EAGLE core technology by AMESYS is designed to help Law Enforcement Agencies and Intelligence organization to reduce crime levels, to protect from terrorism threats and to identify new incoming security danger.
see : http://owni.fr/tag/amesys/
EAGLE core technology by AMESYS is designed to help Law Enforcement Agencies and Intelligence organization to reduce crime levels, to protect from terrorism threats and to identify new incoming security danger.
see : http://owni.fr/tag/amesys/

More info:

Categories:Types, Brochures
Published by: rewriting on Sep 06, 2011
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

07/10/2013

text

original

 
 
EAGLE GLINTOPERATOR Manual
Reference : EAGLE / MAN-EAGLE-OPERATOR Version : 1.0Date : 19/03/09State : Draft 
 
 
Reference: EAGLE / MAN-EAGLE-OPERATOR Version 1.0 — 19/03/09Page 2/66 
This document is AMESYS property. It cannot be copied nor communicated to a third party without AMESYS written authorization.
 
1.
INTRODUCTION.....................................................4
1.1.
Concept................................................................4
1.2.
Features...............................................................5
1.3.
Components and Terminology of the MMI..................7
2.
MENUS DESCRIPTION............................................9
2.1.
Home (WEL).......................................................10
2.2.
New Interception Manager (NIM)...........................11
2.2.1.
Search Directives Tab.....................................12
2.2.2.
Pre-classified interception Tabs........................13
2.2.3.
Search Function.............................................15
2.2.4.
Filter Function................................................18
2.2.5.
Graph+ (only for OC)......................................20
2.2.6.
Suspects (only for OC)....................................23
2.2.7.
No-Interest popup..........................................25
2.2.8.
Warnings popup.............................................27
2.3.
Personal Information Management (PIM).................28
3.
INTERCEPTIONS ANALYSIS..................................30
3.1.
Methodology.......................................................30
3.2.
Components and Terminology of an Interception......31
3.2.1.
Technical Data...............................................33
3.2.2.
Technical Specific Data....................................35
3.2.3.
Extra Data.....................................................35
3.2.4.
Relevance note..............................................37
3.2.5.
Transcription.................................................39
3.3.
Categories of Interception.....................................41
 
 
Reference: EAGLE / MAN-EAGLE-OPERATOR Version 1.0 — 19/03/09Page 3/66 
This document is AMESYS property. It cannot be copied nor communicated to a third party without AMESYS written authorization.
 
3.3.1.
Mail..............................................................41
3.3.2.
VoIP.............................................................42
3.3.3.
Chat.............................................................42
3.3.4.
Http.............................................................43
3.3.5.
Search Engine................................................43
3.3.6.
Transfer........................................................43
4.
FREQUENTLY ASKED QUESTIONS (FAQ)...............45
4.1.
Firefox Messages.................................................45
4.1.1.
Secure Connection Failed.................................45
4.1.2.
Offline Mode..................................................48
4.2.
EAGLE Messages..................................................49
4.2.1.
Interception locked by someone else.................49
4.2.2.
At least 2 suspects are needed, sorry................51
4.2.3.
Too many nodes.............................................52
4.2.4.
Cannot retrieve mail.......................................53
4.2.5.
Cannot change password.................................54
4.3.
Cases Study........................................................55
4.3.1.
Junk e-mail...................................................55
4.3.2.
e-Newsletters, Alerts .....................................57
4.3.3.
Notifications..................................................58
4.3.4.
Placeholder in a message................................61
5.
GLOSSARY............................................................62
 

Activity (20)

You've already reviewed this. Edit your review.
1 hundred reads
1 thousand reads

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->