1 / 11

GSM Tracking

http://www.comstrac.com/ .ComsTrac Limited specialises in providing professional surveillance and protection equipment for Law Enforcement Agencies, supplying all forms of communication intercept systems, for GSM, CDMA, Satellite, Computer and Standard Telephone Communications.

Download Presentation

GSM Tracking

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. WELCOME TO

  2. ComsTrac Limited  has specialized in the supply of professional surveillance and protection equipment for Cellular Interception, Cellular Tracking and Cellular Monitoring for Law Enforcement Agencies for the last 10 years especially GSM Interception, GSM Monitoring, GSM Interceptor and interception monitoring systems both active and passive versions. We have considerable experience in the supply of all forms of Cellular and Satellite communication intercept and interception monitoring systems, for Cellular Interception, GSM Interception Systems, Passive GSM Interceptors and interception monitoring, Hybrid Active GSM Interceptors and interception monitoring, CDMA, Satellite, Computer and Standard Telephone Communications. We have specialized in the supply of VIP and Convoy protective Jammers, armoured vehicles and protective ballistic clothing to high level clients on 4 continents.

  3. GSM TRACKING

  4. What is GSM? Global System for Mobile (GSM) is a second generation cellular standard developed to cater voice services and data delivery using digital modulation.

  5. GSM Intercept We are delighted to announce the imminent release of CTS MLS (Mobile Location System). Accurate tracking, geo fencing, data base collection of target handsets tactically and strategically. Anywhere in the world at any time. Accuracy down to sector level with final sub 10m accuracy in city centers. Both fully passive and hybrid active systems for the intercept of GSM cellular communications. For any frequency across 850/900/1800/1900Mhz and from 4 channels up to vehicle installed 8700 channel systems. 2G GSM, UMTS and CDMA Protocols are all covered by the range of CTS systems.

  6. Characteristics of GSM Fully digital system using 9000 1SOO MHz frequency band. User terminal authentication for fraud control. Encryption of speech and data transmission over the radio path. Full international roaming capability. Low speed data services. Compatibility with ISDN. Support of Short Message Service (SMS).

  7. Features Provided by GSM Calling Line ID - Incoming telephone number displayed Alternative Line Service -one for personal calls -one for business calls Closed User group -call by dialing last for numbers. Advice for Charge -tally of actual costs of phone calls. Fax & Data -virtual office/professional office Roaming -services and features can follow customers from market to market.

  8. Advantages of GSM Technology Crisper, cleaner quieter calls. Security against fraud and eavesdropping. International Roaming capability in over 100 countries. Efficient use of spectrum. A wide variety of handsets and accessories. Ease of use with over the air activation, and all account information is held in a smart card which can be moved from handset to handset. Advanced features such as Short Messaging and caller ID.

  9. Disadvantages of GSM Incase of GSM, SIM cards, individual authentication keys of the users are stored in the authentication centers. Any person with the rights and qualifications to access to authentication center can manipulate these to impersonate that mobile user. Security algorithms used in GSM e.g. A3, A5, and A8 are all undisclosed algorithms. But researchers have proved that these algorithms cannot guarantee 100% security. Privacy of a call and mystery of a subscriber are only assured on the air interface among the mobile station and the base station subsystem leading to likelihood of eavesdropping of voice data.

  10. CONTACT US Communication Tracking SystemsComsTrac Limited5 Lyttelton RoadLondonN2 0DWTel: +44-208-2018898Fax: +44-845-2802659Email: sales@comstrac.com

  11. THANKS

More Related