Objective : 1) To protect Secured extranet used to encrypt all communications. Ia) Securing all exchanges – files / voices and others. b) Use of all network computerization / techniques crypted and secured – (voice-over-IP) c) Securing all personal or system computers – by special SOFTWARE. System allows for: II1 main server per city (7-10) Servers per building / services : 1 server needed for each building for every 10 computers. (see diagram). Crypting all telephone communications between VIP/Officials by mobile phones / using 1 P and all network communications with Libya from Libya or from abroad. 2) To intercept: SOFTWARE and application training requiring 5-6 experts from i2e in Libya. e-mails voice-over-IP e-mails Voice-over-IP
TRACER & INTERCEPT: RECORD
Objective: to become professional interceptors.
GSM Cryptology
1) Protection: Fixed and mobile phones. a) Cards for mobile phones to protect all communications. • n° of cards needed b) Special box for fixed phones to be placed next to phones. • n° of boxes needed 2) Interception: To activate GSM listening. Case 1: mobile not “OFF”. Operator releases information on IMSI or IMEI by giving name only. i2e Software existing – need to determine number to cover to determine “typisation” of programs. Case 2: mobile “OFF”. Need another layer for program – software needed to add on Case 1 software. HF Interception for HF / UHF / VHF 1) Listening recording large bands (wide band) 2) Reception: - all the communication of HF / VHF / UHF . Talkie-walkies. – Private mobile phones. Taxis / ambulances / buses etc. . Using radio – CB – as well as radio listening. Replay, record all users of HF excluding non HF users e.g. GSM.
3) Also available in the form of 40 kg attaché case to be carried – easy transport – autonomous to be able to localise – LOCALISATION – persons using any of above material. See diagram.