Professional Documents
Culture Documents
Cisa Final
Cisa Final
Cisa Final
Opportunists/
Government Threat Individual criminals 4
Cyber Crime 5
Terrorists 6
Local/ national underworld criminal gangs
7
What CIL will do
Cyber Space Monitoring & Interception:
To keep track of data traffic used by target people
To generate lead to criminal case investigations
To predict intentions of target individuals
Stored internet data traffic analysis
What CIL will do
Social Media Engineering:
For surveillance of interpersonal communication,
For Pre-event analysis and Prediction of occurrence
For post event analysis and lead generation
To monitor public sentiment and public opinion
What CIL will do
Telecom Surveillance:
Creation of man pack mobile tracker
Surveillance of target mobile using IMSI catcher
What CIL will do
Audio/Video Surveillance:
Voice recognition and transcription
To detect movement of criminals in mass populated areas
To detect suspicious movement in mass gatherings, high value places
like airports or diplomatic areas etc.
A single intelligent computer
system equipped with
advanced software and
hardware technology for the
Peoples Republic of
Bangladesh.
Analog Research Auto
Research
Research Unit
Mainframe
Computer
School/college
CIL
university Collection of Mainframe
System
Train/ Bus
Immigration
NID/
passport
Social Banking
Phone call SMS Email driving license
media
ANPR
FACE RECOGNITION
HUMAN COMMUNICATION
OBJECT DETECTION
RLAY INFO Mathematicians
Computer Engineers
Linguistics
Analog Research Auto
Research
Research Unit
Mainframe
Computer
School/college
CIL
university Collection of Mainframe
System
Train/ Bus
Immigration
NID/
passport
Social Banking
Phone call SMS Email driving license
media
System Tools
Internet Traffic Monitoring
Internet Traffic Analyzer
Social Media Engineering
Individual Profiling
Face Recognition Software
Automated Number Plate Recognition
Optical Character Recognition (Bangla & English)
OTT Decryption
Trojan Virus
Web warfare agent
Spectrum Monitoring
IMSI Catcher
Man pack mobile tracker
IP Camera Interceptor
Internet Traffic Monitoring
Web warfare
Trojan Virus
agent
Spectrum Monitoring
Multi-bands and multicell (GSM and Can monitor 850/900/1800/1900 MHz Interception through HTTP
DCS) GSM network Intercepting IP cameras which are
Fast 2G/3G scanner Different parameters for target connected to LAN through physical
Target identification, target acquisition access.
localization, Integrated with 3G & 4G modules Brute force attack if a camera is not
SMS interception, SMS sending, connected to WPA2 encrypted network,
3G -> 2G switch,
mobile disabling,
interception of called numbers,
Wi-Fi Interceptor
Face Detection Network Router
ANPR Limited Access to
Crime Scene Spectrum Monitoring
Crime Report Social Media
Personnel Information Monitoring Software
Gantt Chart: Computer Intelligence Lab
ISO WEEK NUM W1 W2 W3 W4 W5 W6 W7 W8 W9 W10 W11 W12 W13 W14 W15 W16 W17 W18 W19 W20 W21 W22 W23 W24 W25 W26 W27 W28 W29 W30 W31 W32 W33 W34 W35
DAY 02 09 16 23 30 06 13 20 27 05 12 19 26 02 09 16 23 30 07 14 21 28 04 11 18 25 02 09 16 23 30 06 13 20 27
A Individual Profiling Development Testing Period Hardware
Social Media
B
Engineering
Development Testing Period Hardware
C Agent Based Trojan Development Testing Period Hardware
D IMSI Catcher Development
D1 Hardware acquisition D1 Testing Period Hardware
D2 Product Development D2
Face Recognition
E
Software
Development Testing Period Hardware
F OCR Development Testing Period Hardware
G IP Camera Interception Development Testing Period Hardware
H Internet Traffic Analyzer Development Testing Period Hardware
I Web Warfare Agent Development Testing Period Hardware
J OTT Decryption Development Testing period Hardware
Establishment of Main
K
Frame
Development Testing period Hardware
Integration of software &
L
Main Frame
Development Testing Period Hardware
M Project initiation Continued
Tentative Software Development Time (Task wise)
Task Required Time
Individual Profiling 3 Months
Social Media Engineering 3 Months
Trojan 3 Months
IMSI Catcher 3 Months
Face Recognition 3 Months
OCR 6 Months
IP Camera Interception 3 Months
Internet Traffic Analyzer 3 Months
Web warfare Agent 2 Months
OTT Decryption 5 Months
Financial Projection
Item Quantity Unit Price Total Price
Software
Internet Traffic monitoring 1 20,000,000 20,000,000
OTT Decryption 1 27,000,000 27,000,000
Spectrum Monitoring 1 16,000,000 16,000,000
Hardware
Mainframe computer 3 10,000,000 30,000,000
PC 4 176,000 704,000
Online UPS (40 KVA) with 1 hours backup 1 2,000,000 2,000,000
65 TV 4 200,000 800,000
48 TV 12 60,000 720,000
PC Monitor 20 10,000 200,000
Printer 2 42,000 84,000
Furniture
Small work table (18x36x30) 20 6,000 120,000
Monitoring table (24x108x30) 3 15,000 45,000
Financial Projection
Item Quantity Unit Price Total Price
Table for stationary & printer
1 12,000 12,000
(18x48x30)
Small revolving chair 36 4,000 144,000
Rack for hardware & instrument
2 16,000 32,000
(16x48x84)
Dress change locker (16x96x84) 1 24,000 24,000
Cabinet for belongings 1 16,000 16,000
Other Appliances
CCTV Camera with DVR 14 200,000
Air condition (24 ton) 24 35,000 840,000
Double Door Entry 200,000
Internal network solution 1,500,000
Internet connectivity 560,000
Payment Procedure
Advance payment : 40%
Hardware Engineer 1 1 -
Maintenance Engineer 3 2 1
Software Engineer 7 4 3
Software Operator 20 14 6
Clark 3 2 1
Human Resource (Celltron)
Designation No
Software & Hardware Engineer 40
Admin / Management 6
Data handling analyst 30
Recruitment
Application Screening
Preselection Process
Interview
Psychological Background Check
Personal Background Check
Physiological Check
Polygraph Test
Project Location
DGFI Celltron