You are on page 1of 8

Whitepaper for Gateway interception (G.

I)

Whitepaper for Gateway interception (G.I)


By Yogesh Vats & Deepak Rathore

Mob. No. +91 9215019797 -- www.nimblespy.co.cc-- nimblespylab@gmail.com Page 1


Whitepaper for Gateway interception (G.I)

Contents
1. Overview – Gateway Interception (G.I) technology ...............................................................................

2. Problem ...............................................................................................................................................

3. G.I Solution .........................................................................................................................................

3.1 Decodes– ...........................................................................................................................................

3.2 The Process - .....................................................................................................................................

3.3 Technology / Architecture ..................................................................................................................

3.4 Features – ..........................................................................................................................................

3.5 G.I Advantages .................................................................................................................................

4. Examples from around the world ........................................................................................................

Mob. No. +91 9215019797 -- www.nimblespy.co.cc-- nimblespylab@gmail.com Page 2


Whitepaper for Gateway interception (G.I)

1. Overview – Gateway Interception (G.I) technology

“The Internet has changed the way people communicate with each other- For good as well
as Bad”

Over the past years, the increasing popularity and accessibility of the Internet has caused a
dramatic shift in the way people share information. Today, Internet, e-mail, instant
messaging and IP Telephony have put a whole new world of communication at our
fingertips.

However, with the Internet fast becoming a breeding ground for criminal activity these
ingenious and sophisticated technologies are often used to promote crime, violence and
terror, which compromise the values of human society.

With coordinated attacks becoming a menace plaguing the whole world, Communication
Monitoring has become an instrumental asset to gather vital electronic intelligence data
needed to restrain terrorism and track other such threats to the security of people, assets
and information.

Gateway Interception (G.I) technology obtains real-time information on data and VOIP
packets to gather intelligence against hostile individuals and networks. Similar technology is
already used by law enforcement agencies across the world including Develop country for
real time interception of data.

2. Problem

“Internet’s dark side – Internet’s exploitation by criminals and terrorists”

Traditional interception technologies are fairly standardized with well developed laws and
procedures for the request and implementation of wire taps. However, with the
overwhelming growth of Internet in the country in the last ten years, IP networking has
changed the behaviors of the individuals and businesses, who now take E-mail, chats, Video
conferencing and VOIP as mundane tools of daily communications and information
consumption.

Mob. No. +91 9215019797 -- www.nimblespy.co.cc-- nimblespylab@gmail.com Page 3


Whitepaper for Gateway interception (G.I)
 Illicit Internet activity can take the form of simple E-mail communications between
criminal parties to invoke, for example, insider stock trading, drug deals, or terrorist
acts.
 The widespread broadcast of spam and viruses is another form of criminal E-mail
activity whose perpetrators can be held accountable through IP interception.
 Voice-Over-IP calls and audio/video streaming over the Internet could also carry
criminal traffic that must be intercepted and analyzed to be of any value to the
authorities.
 Target source and destination identities of the information flow are embedded
within the overall flow of data, and must be carefully extracted to remove all
privacy concerns by avoiding the interception of non-target data.

3. G.I Solution
Until now lawful interception (LI) has been based on the user / IP address relation, where the actual
search focuses on the IP address rather than user. However, this approach has become obsolete
and redundant as IP Telephony, Instant Messaging, file exchange networks, and other new
communication technologies come into for

Mob. No. +91 9215019797 -- www.nimblespy.co.cc-- nimblespylab@gmail.com Page 4


Whitepaper for Gateway interception (G.I)
NIMBLESPY LAB has come up with a service based targeting system (G.I) that decodes 100% of

traffic before filtering which enables reliable interception of all voice and data circulating across IP
networks. We use service based targeting which only targets and intercepts data on the following
parameters namely –

 E-mail ID, the mail is sent from


 E-Mail ID, the mail is sent to
 IP address of a Sub ISP to intercept all traffic from a suspicious network
 The keyword content in the mail.

G.I. uses new interception standards and methods for advanced deep packet inspection IP probing
solutions, to extract relevant data and deliver it to the Law Enforcement agencies. The technology
integrates lawful Interception, with Data Mining and Artificial Intelligence to provide a
comprehensive package.

3.1 Decodes–

 Encrypted webmail (includes yahoo, hotmail etc) packets, chats etc


 Encrypted VOIP packets
 Ability to decode a wide range of protocols for reliable capturing of email, webmail, files, IM,
web pages, as well as Р2Р, IPTV streaming, VoIP, video and fax over IP

3.2 The Process –

 Microsoft Windows based workstation with packet sniffing software and a removable
disk drive
 A customized packet interception software to intercept and process all packets
 The processing of packets can be on the basis of –
• E-Mail ID of the sender/receiver
• Keyword Filtering
• IP Address

 All packets would be analyzed and mined on the above mentioned parameters
 A customizable AI module to introduce new rule set and minimize the interception and storage
of irrelevant data

Mob. No. +91 9215019797 -- www.nimblespy.co.cc-- nimblespylab@gmail.com Page 5


Whitepaper for Gateway interception (G.I)

3.3 Technology / Architecture

Mob. No. +91 9215019797 -- www.nimblespy.co.cc-- nimblespylab@gmail.com Page 6


Whitepaper for Gateway interception (G.I)
3.4 Features –

 Effective both for tracking down known targets and for wide area search.
 Can be utilized as a complete interception solution (Probe and Monitoring Center deployed
together) ‐ also on a laptop.
 Immediately displays the result of interception – at any moment within a monitoring session.
 Keyword search in large volumes of traffic in various text encodings!
 Key words search in complex objects:
 MS Office files
 Archives
 PDF files
 Graphics and
 in all the said objects being embedded into any of the above

3.5 G.I Advantages


 Thorough interception on peer‐to‐peer networks
 Advanced processing of VoIP traffic
 Raw data recording for evidence collection.
 Interception and decoding of web mail.
 Strict access control.
 Modular architecture for easy scalability and cost‐effective growth.
 Software‐Based Solution for Reliable Operation and Cost‐Savings
 No proprietary hardware. Our customers can choose any hardware within their make
hardware recommendations based on performance and capabilities required.
 Cost‐savings on hardware modification and upgrade. The use of standard servers allows
upgrading hardware independently from software – which saves our customers a lot of time,
effort, and money.
 Higher processing speed on standard servers. NIMBLESPY LAB’s know‐how approach to
data processing delivers higher system performance as compared with similar hardware
configurations offered by other vendors.

Mob. No. +91 9215019797 -- www.nimblespy.co.cc-- nimblespylab@gmail.com Page 7


Whitepaper for Gateway interception (G.I)

4. Examples from around the world

Carnivore System – Deployed by a Develop Country across Whole area

Carnivore permits access to the email of every customer of an ISP and the email of every person
who communicates using the ISP’s in Develop country. Carnivore is roughly equivalent to a wiretap
capable of accessing the contents of the conversations of all of the phone company's customers,
with the assurance that the Develop country will record only conversations of the specified target.

Mob. No. +91 9215019797 -- www.nimblespy.co.cc-- nimblespylab@gmail.com Page 8

You might also like