Network Intelligence System
The Internet and mobile revolutions have created tremendous opportunities for all parts of the population to access unlimited information anytime, anywhere. However, it also presents new challenges for Law Enforcement organizations responsible for private and public safety.
Social media and the Internet can be easily abused to propagate incorrect or inappropriate information, including damaging propaganda that can lead to violence and riots. In addition, targeted cyber attacks can disrupt and damage governmental, financial and social digital asset. Criminals and terrorists can hide their dangerous activities by using encrpypted communications such as VPNs to anonymously access dark web resources and VOIP/messenger technologies to communicate with their associates.
NIFTI provides capability to agencies to monitor and/or block dangerous web content and access to deceptive information (fake news) for all or selected users, identified by their mobile numbers. It also allows to analyse and control both clear text and encrypted web traffic. NIFTI is loaded with host of features including regulation of social media usage by specific users in specific locations (e.g. limiting Facebook at places of mass gatherings), geo locating Anonymous targets based on their posts/ tweets.
NIFTI provides a set of additional capabilities, required by law enforcement agencies and regulators, to limit the communications of criminals or suspects, blocking the usage of VPN and access to the dark web, degrading of VOIP call quality of specific individuals to force them to use traditional telephony networks, where their calls can be legally intercepted.
NIFTI also provides capability to meet the national security requirement for protecting digital assets (state networking infrastructure, web sites, information lakes, etc.) against domestic and foreign attacks.
-
- Detailed application and web activity log such as Which URLs/Domains were accessed, Which Applications, for how long, by which device and Where is the device?
- Illegal application identification and blocking.
- Identification and quarantine of infected nodesand phones.
- Country wide DDOS protection.
- Internet Traffic Regulation.
- Streaming Control.
- Social Network Control.
- Country Wide Deep Packet Inspection.
- Full Network Visibility / Target Geo – location based on Social Media activity.
- Country wide MITM / Malware Implementation for HTTPS /SSL Decryption.
- Application usage alert and Control VPN Blocking.
- Social Media Monitoring and Filtering.