99_AMESYS-EAGLE-GLINT-Operator_Manual.pdf

(4194 KB) Pobierz
EAGLE GLINT
OPERATOR Manual
Reference :
EAGLE / MAN-EAGLE-OPERATOR
Version :
1.0
Date :
19/03/09
State :
Draft
1040785033.009.png 1040785033.010.png 1040785033.011.png
1. INTRODUCTION .....................................................4
1.1. Concept................................................................ 4
1.2. Features ............................................................... 5
1.3. Components and Terminology of the MMI.................. 7
2. MENUS DESCRIPTION ............................................9
2.1. Home (WEL) ....................................................... 10
2.2. New Interception Manager (NIM) ........................... 11
2.2.1.
Search Directives Tab ..................................... 12
2.2.2.
Pre-classified interception Tabs ........................ 13
2.2.3.
Search Function ............................................. 15
2.2.4.
Filter Function................................................ 18
2.2.5.
Graph+ (only for OC)...................................... 20
2.2.6.
Suspects (only for OC) .................................... 23
2.2.7.
No-Interest popup .......................................... 25
2.2.8.
Warnings popup ............................................. 27
2.3. Personal Information Management (PIM)................. 28
3.
INTERCEPTIONS ANALYSIS..................................30
3.1.
Methodology ....................................................... 30
3.2. Components and Terminology of an Interception...... 31
3.2.1.
Technical Data ............................................... 33
3.2.2.
Technical Specific Data.................................... 35
3.2.3.
Extra Data..................................................... 35
3.2.4.
Relevance note .............................................. 37
3.2.5.
Transcription ................................................. 39
3.3.
Categories of Interception ..................................... 41
Reference: EAGLE / MAN-EAGLE-OPERATOR
Version 1.0 — 19/03/09
Page 2/66
This document is AMESYS property. It cannot be copied nor communicated to a third party without AMESYS written authorization.
1040785033.012.png
3.3.1.
Mail .............................................................. 41
3.3.2.
VoIP ............................................................. 42
3.3.3.
Chat ............................................................. 42
3.3.4.
Http ............................................................. 43
3.3.5.
Search Engine................................................ 43
3.3.6.
Transfer ........................................................ 43
4.
FREQUENTLY ASKED QUESTIONS (FAQ) ...............45
4.1. Firefox Messages ................................................. 45
4.1.1.
Secure Connection Failed................................. 45
4.1.2.
Offline Mode .................................................. 48
4.2.
EAGLE Messages.................................................. 49
4.2.1.
Interception locked by someone else................. 49
4.2.2.
At least 2 suspects are needed, sorry ................ 51
4.2.3.
Too many nodes............................................. 52
4.2.4.
Cannot retrieve mail ....................................... 53
4.2.5.
Cannot change password................................. 54
4.3. Cases Study ........................................................ 55
4.3.1.
Junk e-mail ................................................... 55
4.3.2.
e-Newsletters, Alerts ... .................................. 57
4.3.3.
Notifications .................................................. 58
4.3.4.
Placeholder in a message ................................ 61
5.
GLOSSARY............................................................62
Reference: EAGLE / MAN-EAGLE-OPERATOR
Version 1.0 — 19/03/09
Page 3/66
This document is AMESYS property. It cannot be copied nor communicated to a third party without AMESYS written authorization.
1040785033.001.png
EAGLE GLINT - OPERATOR MANUAL
1.INTRODUCTION
1.1. C ONCEPT
EAGLE core technology by AMESYS is designed to help Law Enforcement
Agencies and Intelligence organization to reduce crime levels, to protect
from terrorism threats and to identify new incoming security danger.
EAGLE Interception System can be decomposed in distinct parts:
The Probe capturing the traffic
The Data Centre for classification and storage
The Monitoring Centres
Reference: EAGLE / MAN-EAGLE-OPERATOR
Version 1.0 — 19/03/09
Page 4/66
This document is AMESYS property. It cannot be copied nor communicated to a third party without AMESYS written authorization.
1040785033.002.png 1040785033.003.png 1040785033.004.png
 
EAGLE GLINT - OPERATOR MANUAL
1.2. F EATURES
EAGLE system will retrieve the complete protocol information from the Call
Data Record (CDR) and all the attached documents for the following
network protocols:
Mail
SMTP
POP3
IMAP
Webmails
Yahoo! Mail Classic and Yahoo! Mail v2
Hotmail v1 and v2
Gmail
VoIP
SIP / RTP audio conversation
MGCP audio conversation
H.323 audio conversation
Chat
MSN Chat
Yahoo! Chat
AOL Chat
Paltalk
Http
Search Engines
Google
MSN Search
Reference: EAGLE / MAN-EAGLE-OPERATOR
Version 1.0 — 19/03/09
Page 5/66
This document is AMESYS property. It cannot be copied nor communicated to a third party without AMESYS written authorization.
1040785033.005.png 1040785033.006.png 1040785033.007.png 1040785033.008.png
 
Zgłoś jeśli naruszono regulamin