Professional Documents
Culture Documents
Cyber Intelligence: A Competence Document
Cyber Intelligence: A Competence Document
Vehere
1629 K Street NW Suite 300,
Washington DC 20006-1631, USA
P +1-202-355-6371
E info@vehere.com
W www.vehere.com
VEHERE.
CUTTING-EDGE
TECHNOLOGY.
NATIONAL SECURITY.
This will be trimmed
We are fortunate enough to
be living in possibly the most
peaceful period in the recorded
history of the world.
Unbelievable.
This will be trimmed
This unprecedented era of peace
is not the result of one country’s
sudden love for another.
Executive
and purchased but also a
significant increase in defence
summary
spending in specialised next-
generation technologies. These
technologies offer the ability to
capture information patterns and
sequences that could compromise
national or global peace. The
result is that countries are placing
a greater emphasis on reading
these patterns and preparing in a
proactive manner to reinforce their
national security systems.
This will be trimmed
The challenge here lies in a
country’s ability to aggregate
diverse information sources,
develop the technology to analyse
Deterrence
these feeds and forecast probable
outcomes. This ability to decode
first
petabytes of data and derive
definitive indications of what could
be in the offing is drawn from a
deep understanding of analytics.
This specialised understanding
The issue of conflict deterrence is of analytics lies at the heart of
drawing upon various information specialised technology companies.
feeds and leads. On the one
hand, countries are engaged in Vehere is one such company,
access of information through possessing a distinctive
disguised surveillance. On the competence in a niche space and
Thisdevelop
helping customers will be trimmed
potent
other hand, an increasing number
of countries are engaging in a security strategies that make the
more subtle – and more effective world a safer place to live in.
– reading of data cross-flows
between geographies. The main
objective of these countries is to
discern patterns that could provide
valuable communication leads to
strengthen their preparedness and
pre-emptive engagement.
The power
of informed
decision-
making
Vehere is a technology-driven
service provider that assists
This will be trimmed customers in developing a range
of preventive measures. These
measures comprise data mining
for the discovery of concealed
relationships in large amounts of
data.
01
Proactive
• Ahead-of-the-curve
• Interactive approach
• Futuristic technologies today
• Facilitates ongoing vigilance
• Proactive simulations-based approach
• Safeguarding clients against every probable
downside
• Getting into the mind of what an adversary
may be plotting
• Focusing on ‘what can be’ rather than ‘what
had happened’
02
Communications
03
Intelligence
• Focusing on all exchanges that can be • Deep knowledge repository in complex data
captured electronically interpretation and visualisation
• Capability comprises capturing, • Proven competitive advantage resulting in
decoding, analysing and reporting insight-enhancing analysis
• Coverage comprises satellite, • Capability directed at the ability to derive
telephony and the internet clarity out of complexity
• Distinctive ability to customise solutions
around client needs (textual or visual)
• Zero data loss
The distinctive
Vehere culture
Vehere is fully aware that its work influences the security of nations and the well-
being of millions. In view of this, the Company brings to its business the highest
standards of governance.
Corporate Confidentialities
• Replicating governance standards • Signing long-term non-disclosure
across locations agreements with employees
• Engaging in selective recruitment by • Implementing impregnable walls
appraising credentials that extend between various sub-teams working
beyond professional qualifications, on the same project
experience and competence
Customer value
• Investing proactively in people,
• Educating customers on the latest
practices, process and infrastructure
intelligence and technological
Project discipline standards
• Utilising proven methodologies and • Promising a substantial
products improvement in delivered solutions
• Institutionalising a rigorous over competitors
commitment that ensures zero • Delivering what is committed
deviation from client specifications • Empowering select senior
• Engaging in preliminary and critical managers with project aggregation
design reviews responsibilities
• Deploying on-site engineers to
provide 24x7 support to customers
Vehere’s
Solutions
Defence
Intelligence
Intelligence Agencies around the world are mandated to
anticipate and prevent emerging threats that may destabilise
nations and global economies.
The Intelligence Community needs solutions that can extract
actionable insights from the ever-increasing volume and type of
data being generated every day, from unstructured data to signals
intelligence without infringing on privacy and an individual’s civil
rights.
Vehere’s solutions for Intelligence enable officers to stay ahead
of the curve, to anticipate and stop perpetrators in their tracks.
Equipping Law Equipping Law Enforcement Officers with Tools that they need to
Investigate and Respond to Crimes as they happen.
Enforcement State Police and Law Enforcement Organisations across the world
Officers with Tools access information in databases, often so diverse that they have
no way to search, view and draw insights from this information
that they need to on a unified search console. To hone in on a suspect and collect
Investigate, Report relevant data on a person or location of interest or on an on-going
criminal case, requires him to literally search for a needle in the
and Respond to haystack.
Crimes as they Vehere’s solutions for Law Enforcement Officers addresses each
Interception and Analysis of Data from Communication Service Providers has become critical for any Law Enforcement &
National Security Agency (LENS) ever since these have become a powerful medium of communication channels between
humans.
With the continual change in communications technology, the Analysis of Content & Metadata by the LENS Agencies has
become more important than just the interception and analysis of the actual call/internet content only.
Vehere’s CommuSAS has been specifically developed as a data fusion platform to service the complex needs of law
enforcement agencies worldwide to gather intelligence and not just to monitor communications channels.
The system has the capability of acquiring signals from diverse sensors, such as satellite, optic fiber, and mobile networks
which carries IP and TDM traffic. These sensors or probes will allow for the interception and recording with metadata
analysis capacity up to 100 Gbps speeds carrying different type of payloads and bandwidths.
Customer Benefits:
• Integrates with various sensors and probes to acquire signals on different media, speeds, encoding and formats
• It analyses the data to ensure that any relevant intelligence is received as early as possible
• Capable of intelligently analyzing the input IP data and filter the same based on various IPDR fields to generate targets of
interest and record the related incident traffic
• The Mediation functionality of the system ensures matching of all targets and delivering information in real time.
Satellite
Network Traffic
Analysis
GSM
Tactical
WiFi
Current
National Vehere Cyber
Enterprise State
Security Cyber Security
Awareness
Lawful
Interception
Strategic
Fibre
Interception
Network
Forensics
Satellite
Interception
• The system has the capability to assemble all the captured packets of targeted sessions for easy and near-original
reconstruction and presentation of intercepted session.
• It has an in-built Metadata analysis system to find potential targets, target groups, linkages and patterns from the mass
IPDRs and use them for real-time filtering as well as for retrospective analysis.
Its Advanced Monitoring Center is user-friendly in that it offers a unified view of all intercepted data, regardless of
their source. No matter what kind of data or from whichever sort of network, the Monitoring Center presents them in a
standardized way because its unique architecture can concurrently handle all technologies. It is both, flexible and scalable
and performs the tasks of monitoring in an auditable, secure, reliable and verifiable manner, to support the intelligence cycle
The Advanced Monitoring Center is the perfect match for Client needs for efficient monitoring and prompt evaluation of all
types of communication – today, tomorrow and after tomorrow.
The CommuSAS handles the following general types of intercepts and manages them in more specific types:
• Internet sessions (Supports 3000+ Protocols)
• Metadata Extraction
• Target Centric Collection of Traffic Content (TC)
• Location-based information
• Monitors Application Leaks
Satellite Strategic Interception Systems
Multi-Service Monitoring
System
Multiservice Satellite Monitoring
System is a portable and tactical unit
for monitoring Thuraya, Iridium and
IsatPhone PRO in the same system.
It is designed for passive interception
and monitoring of traffic and
control channels of Thuraya Mobile
Satellite System (Standard GMR-
1), Iridium Mobile Satellite System,
and IsatPhone PRO Mobile Satellite
System (Standard GMR-2+).
Fiber Optic
Strategic
Interception
Systems
Fibre Optic Strategic Interception Systems
• Conversion of STM/OTU4
• 3000+ protocols
• Behavior analysis
• Big Data Algorithm
IMSI Catcher
IMSI Catcher is a system to trace
celular data (IMSI, IMEI, TMSI) for 2G,
3G and 4G technologies in a specific
locations (airport terminals, prisons
etc.). It has the capability to locate
the phone.
* Restricted item, designed and developed only for Government Law Enforcement Agencies.
Wi-Fi Tactical Interception Systems
Essentials
100G, 10G Protocol Analyzer
IP Protocol Analyzer provides a quick anaylsis of what exists in the fiber. It allows for recording of 5 minutes of traffic.
The Protocol Analyzer helps you with analysing and providing with the following information in the fiber:
• List of Communication and VOIP Protocols based on total bytes and total packets
• Protocol Tag Cloud: depiciting the concentration of the protocol in the stream by the number of related sessions with total
bytes, total packets and number of flows
• List of Source and Destination Mac Addresses
• List of Source and Destination Countries and Cities, with enrichment of ASN Name – plotted on GIS map
• Top Protocols / Application by Volume
• Application Tag Cloud
• Application Over Time
It helps LENS Agencies in determining the feasibility before a larger system is deployed.
Voice Logger system
Voice Logger System is a state-of-the-art multi-channel logger that performs live-listening and recording of voice calls from
various telephony sources such as GSM, PSTN, CDMA networks, etc. It also provides comprehensive user-defined search
and replay capabilities based on Date, Time, Duration, Calling/Called Number, etc.
Bridging the gap between complicated attack methods and cyber technology.
Cyber security is seen as a business enabler. The responsibility of security controls is no longer just enforce preventive/
restrictive policies but to enable Security, Risk Management and, Business leadership take important decisions to safeguard
digital assets and, boost customer/partner confidence in the business. With the focus on external threat-intelligence
driven signature-based controls and, static policies - conventional security tools fall short on enabling security and risk
practitioners to proactively uncover blind spots, security risks and, respond to incidents.
Vehere PacketWorker is an effective Network Situational Awareness solution that helps organizations minimize risk by
accurately detecting and enabling swift response to cyber threats - reducing attacker dwell time. It facilitates efficient
resolution of identified security incidents with concrete evidence, actionable intelligence and response workflow integrations.
Inspired by the self-learning intelligence, this innovation has enabled a fundamental shift in the manner organizations defend
themselves, amid a new era of sophisticated and pervasive cyber-threats.
We are present in key industry verticals such as finance, government, energy, manufacturing, critical infrastructure and
telecom.
Please visit website www.vehere.com/product-categories/cyber-defence-products for more information
WE DON'T JUST
SECURE NETWORKS.
WE SECURE NATIONS
C y b e r I n te l l i g e n c e
Vehere
1629 K Street NW Suite 300,
Washington DC 20006-1631, USA
P +1-202-355-6371
E info@vehere.com
W www.vehere.com