You are on page 1of 18

ECHO

Global Virtual Sigint System


ECHO
Global Virtual Sigint System

Global Virtual Sigint System


ECHO is a strategic Sigint system which provides
intelligence and law enforcement agencies a
wide, diverse and in-depth information on global
internet users.
Main Capabilities
Echo’s key features

Mass worldwide Intimate targeted Target acquiring based Continuous and retrospect
SIGINT accessibility profiles on assumptions interception
Retrieved Data

01 • Name 02 • Emails • Device list


01 • Gender 02 03
03 • Device model
• Phone number
Age
•Personal • Device version
• Address • Others • OS type
Information Identifiers Devices
• Habits • OS version

04 • IP
04 Current & previous 05
05 06
06 Utilizing all collected
• Browsing history data to provide
locations (up to
• App usage target’s patterns and
GPS accuracy)
Locations • WIFI and cellular identify abnormal
Behavior
carriers info
Patterns
behavior
5

Two Approaches Provided by Echo

Target Centric Approach Data Centric Approach

Filtering based on profile features


Search based in identifier Location-based profiling
Behavioral profiling
6

Target Centric Approach

Target Features Target Locations


Age, gender, address, Current & previous
Single locations (up to GPS
home city, home country
Identifier accuracy)

Target Behavior
Additional
Used devices, app usage, web
Identifiers history, IPs, WIFI connections,
cellular connections
Profile View
Used apps and
Used devices, Physical
visited websites
Devices details Locations

Personal
Information Visited countries

Used IP’s

Internet activity
summary
Activity timeline
Types of connections
8

Data Centric Approach

Target Features Target Locations


Age, gender, address, Current & previous
home city, home country Profile or locations (up to GPS
Group accuracy)

Target Behavior
Used devices, app usage, web
history, IPs, WIFI connections,
cellular connections
Group View
Used devices, Physical
Devices details Locations

Used apps and


visited websites
Operating systems

Activity timeline
Segmentation
Segmentation by
by gender
age
10

Data Centric Approach

Target Features Target Locations


Age, gender, address, Current & previous
home city, home country Profile or locations (up to GPS
Group accuracy)

Target Behavior
Identifiers
Used devices, app usage, web
history, IPs, WIFI connections,
cellular connections
Public Private Internal data

Cloud services

Internet

ISP (WIFI) mISP (3G/4G)

Device
OSINT Private
Public Internal data
systems
• Only what the target decided to share
• Only what is available to the public
• OSINT – Open Source Intelligence Cloud services

ECHO Internet

• Based on internet traffic – any kind


(public, private, internal)
• Not dependent on target decision
• Collects meta-data ISP / mISP

Device
Continuous and retrospect worldwide
interception
Echo allows immediate access to both
historical and real-time target data.

Using Echo, the user can analyze data


collected prior to user’s understanding that
specific profile is a point of interest, due to
the fact that Echo collect the data
Continuously.
Machine Learning Capabilities

Echo utilizes advanced machine learning

capabilities to automatically analyze the huge

amount of data gathered by the system in

order to provide the user with smart patterns

and abnormal behavior alerts, and in order to

maximize the option to find new point of

interests (targets generator)


Key Advantages

Agnostic to device or Mass collection on any internet user, Completely transparent


operating system anywhere and in multiple devices to target

Strategic - from anywhere in “Mass collection” <> Target mode


the world
ECHO as an Enabler -
utilizing 3rd party tools
for remote interception
Summary

Mass worldwide Intimate targeted Target acquiring based Continuous and retrospect
SIGINT accessibility profiles on assumptions interception

You might also like