I N T E L L I G E N C E

Terror threats and modern crimes are driven by the use of modern technology and a communication of networks, social media etc. The AGM intelligence division relies on concepts and solutions that focus on improving awareness of the threat, developing capabilities to identify the threat in its early stages, prepare and respond to prevent the terror event. The intelligence cycle is based on the pillars: Collection, Information Storage, Analysis and Dissemination; these make AGM’s core of assessing any project or solution required.

AGM INTELLIGENCE OFFERS TACTICAL OR STRATEGIC HIGH-END, OFF-THE-SHELF PRODUCTS OR CUSTOM TAILORED SOLUTIONS BASED ON YOUR NEEDS.

OUR APPROCH TO EACH PROJECT IS TO PROVIDE THE FULL CYCLE IF REQUIRED, FROM SOLUTION DEFINITION, SYSTEMS INTEGRATION, TRAINING AND AFTER-SALE SUPPORT.

OFF THE AIR INTERCEPTION

Cellular, Satellite, Wi-Fi, HF communication – if it’s in the AIR – it can be tactically intercepted. 

Tactical Interception methods are versatile and require means of signal gathering, signal processing and identifying and deciphering so that the outcome is analyzable.

AGM offers a wide range of solutions with high-performance and capabilities for off the air interception.

CELLULAR GSM/CDMA INTERCEPTION, PASSIVE AND ACTIVE

Wi-Fi INTERCEPTION

SATELLITE AND HF INTERCEPTION

COUNTER IMSI CATCHER

WEB INTELLIGENCE

WE provide OSINT & WebINT comprehensive systems.

The outcomes of the systems are produced from publicly available information which are  collected, stored and analyzed.

Our WEBINT capabilities include:

  • Deep web Mining
  • Virtual HUMINT
  • Social media monitoring and analysis
  • Blogs and automated target monitoring
  • Private crawlers
  • Geolocation web interception

WE offer OFF-THE-SHELF products, NOT a Project.
MODULATED solution allow for scalability and a cost effective adaptation to your needs.

GEO LOCATION TRACKING

The GEO LOCATION system or Mobile Locating System will equip law enforcement agencies with the capability to actively track locations of mobile subscribers worldwide, regardless of the network to which they belong.

System Features:

  • Undetectable by the target and mobile operators, fully transparent – all queries are invisible and can’t be detected by the subscriber.
  • Manual or automatic tracking in real-time via criteria pre-defined by the user which enables automatic long-term tracking of any target or area.
  • Unique business model, flexible and enables End Users to choose a solution that fits their needs and budget.
  • Built for easy integration to the hosting network, thus reducing deployment time and risks.

CLOUD AND APPS INTERCEPTION

Tactical solutions for interception of Cellular and computer data.

Application interception can be achieved in different ways in stealthy manner. Once achieved, such a breach in the app will allow for monitoring and data extraction from cloud and other sources of secured data.

Such solutions are mainly based on malicious malware and remote infections that enable to get intimate information of any target.

BIG DATA AND ANALYTICS TOOLS

The challenge of any good intelligence has always been using the collected information and considering all aspects of the known and unknown information. During the years the information collecting tools and information sources have allowed for mass information gathering while analytics and intelligence insights still rely on a handful of specialists.

What do we offer?

Our goal is to provide you with a powerful and versatile operational tool, Big Data and analysis platform.

Such a solution will enable you to draw operational conclusions and insights from a mass of data (big data) and produce large and vital operational information at any given moment in an automated or predefined fashion.

CYBER PROTECTION

THE CHALLENGE

The threat of cyber-attacks has grown so rapidly that terms like: cyber-crime, cyber weapons, cyber espionage, cyber warfare and hacktivism are very common.

The threat is incredibly serious—and growing. Cyber intrusions are becoming more commonplace, more dangerous, and more sophisticated. One nation’s critical infrastructure, including both private and public sector networks, is targeted by adversaries. Companies are targeted for trade secrets and other sensitive corporate data, and universities for their cutting-edge research and development. Citizens are targeted by fraudsters and identity thieves, and children are targeted by online predators.

This exponential growth of cyber threats on IT and critical infrastructure has made organizations more vulnerable than ever. In today’s complex IT environment, with growing cyber threats, corporate executives are struggling to protect their organizations and mitigate their security risk.

THE SOLUTION

AGM CYBER experts believe that the only solution to cyber-threats is a constant risk assessment and protection system cycle that every agency, organization or company should consider vital for its various IT departments.

With the emergence of targeted attacks and advanced persistent threats, it is clear that a new approach to cyber security is required. Traditional techniques are simply no longer adequate to secure data against cyber-attacks.

We propose a combination of proactive approaches that consist of several factors:

  • Traditional fencing tools (firewall/closed network)
  • Internal network, constant scan tools and honey traps to pop threats to surface.
  • Cyber Radar – Intelligent defense system which seeks out threats aimed at your assets.

Daily number of DDOS attacks on GOV sites

Number of identity thefts per hour

%

% of Cyber-crime, real time detection

Estimated loss of funds per day due to cyber attacks

CYBER FENCING

Out of all the traditional solutions such as firewalls, secured DMZ’s, Anti-virus software, VPN Networks, DATA encryption, GSM encryption and many others, AGM cyber experts will design and integrate the best solution according to the network needs and existing mode of operations.

INTELLIGENT DECEPTION

Accurate detection of attacks in progress, Intelligent Deception, includes Security Visibility and Threat Analysis.

As we understand, there is no 100% prevention; we act as if we are already breached and thus the attacker must be lured out. The proactive approach of deception will ensure the exposure and trapping of such attackers.

CYBER RADAR

This automated technology scanning includes a manually curated set of Web and mainly Darknet sources, providing a fully targeted, actionable source of intelligence.

The Cyber radar tracks Darknet threats, gives immediate notification of compromised company-specific information – employee or customer details, email addresses, passwords and many more. Built in keywords in several languages and new sources are added by our analysts every day in order to ensure that Cyber Radar gives you only the highest quality Darknet information.

DARKNET MONITORING

DANGER IS WHERE WE CAN’T SEE

DARKNET is a part of the web that allows anonymous activities, and thus, mainly the creation of a malicious environment enabling criminal activities, hacking, and terror supporting communication and means.

Our goal is to provide tools that will remove the blinds of such activities and enable you to monitor and track hostile entities and thus prevent the anticipated danger.

Our solutions provide featured tools that allow deep penetration of the DARKNET and monitoring executed by crawlers or avatars that overcome the complexity and stealth environment of the DARKNET.