Network Guard offers a robust capability to detect and combat cellular network monitoring and interception. Its real-time analytic engine rapidly identifies and alerts on numerous attack characteristics across 2G, 3G, 4G LTE and CDMA networks. Network Guard offers world-class situational awareness of cellular communication surveillance, interception and attacks and is able to detect and locate cellular network attacks originating from simple DIY-built IMSI Catchers to the most sophisticated nation-state developed interception systems.
Mobile Network Counter Surveillance
Support for a wide variety of mobile telephone technology (GSM, CDMA, UMTS, LTE)
Simultaneous scanning of multiple radio access technologies
Rogue Base Station Detection
IMSI Grabber Detection
Active Interceptor Detection
Web-based command and control
Real-time Comparative Analysis of Previous SurveysCell and GPS antenna options to meet operational requirements
All mobile network data is captured and detailed analysis can be conducted in real-time or offline
Various dynamic mapping tools for visually identifying the threats
Designed and manufactured in the U.S.A.
Multiple alarm alert methodologies (e.g. network SMS, USSD, visual, email)
Distributed endpoints provide for the ability to scan many static locations simultaneously and repetitively
Integrated GPS for accurate positional info
Mobile network survey capability that identifies cell tower location and power levels
What it Does
Network Guard offers a robust capability to detect and combat cellular network monitoring and interception.
Real-time data correlation and analytics engine rapidly identifies and alerts on cellular RF attacks on GSM, WCD-MA, CDMA-2000 and LTE networks
Network Guard is able to detect attacks from simple DIY built IMSI Catchers to the most sophisticated nation-state developed interception systems
No awareness of the enormous interception and surveillance vulnerabilities that mobile communications present
Technology that allows for mobile phone surveillance is widely available in almost every country around the world
Technology being leveraged by nation states, criminal gangs and private investigators
Return On Investment (ROI) to an adversary makes the cost to intercept worth it
How it Works
Network Guard continually surveys all available networks and performs real-time analysis on the collected data.
Anomalous network behaviour is detected by in-depth inspection of broadcast information from base stations.
This level of inspection allows the system to immediately alert when active cellular systems are in-use
The collected data is also stored for further post-mission analytics
Collection is undetectable to protect the user from alerting their adversary to detection
Post mission analysis is rapid, detailed and can be combined with surveys from previous missions to highlight changes in the mobile networks over time
Network Guard is able to detect mobile phone interception, rogue base stations, and multiple mobile network anomalies simultaneously
Remote out-of-band communication over cellular modem
Integrated vector mapping
Multiple export data formats
System can be operated in an autonomous mode
Distributed model allows for many static locations to be scanned repetitively
All visible mobile network data is captured and detailed analysis can be conducted in real-time or at a later time
Multiple alert methodologies (e.g., network, SMS, USSD, visual, email)
Extensible platform to support future mission requirements