Smartphone und Handy Überwachung

 

Jeden einzelnen Tastendruck aufzeichnen, jedes Telefonat mitschneiden, jede SMS auslesen - und mehr.

Computer / PC Überwachung

Windows Keylogger zur Computerüberwachung

Erfahren Sie genau, was an einem Computer gemacht wurde. Mit Tastaturmitschnitt, Screenshotaufzeichnung und Co.

Telefonsicherheit

Abhörsichere Handyverbindung herstellen

Rauchmelder Camera

Getarnte Kamera im Rauchmelder mit leichter Montage und flexibler Ausrichtung
 
 
 
Mini Funk Kamera mit Empfänger
 
 
 
 
 
 
 
 
 
 
 
 
DVR Videoempfänger mit Überwachungsmonitor mit Funk Deckenkamera im Set · Akkulaufzeit bis zu 3 Jahre mit Geräuschaktivierung
Störungsfreie Funkübertragung auf 5,8 GHz zwischen Minikamera mit Videosender und Videoempfänger
 
 
 

Getarnte Kamera

Leistungsstarke Videoüberwachung mit unsichtbaren Nachtsicht-LEDs

Audioüberwachung

Langzeit Audiorecorder zur Audioüberwachung mit bis zu 25 Tagen Standby
 
 
 
Produktsuche:  
  Suchen nach  
 
 

 
GSM Monitoring-System SPYTEC 3000

GSM Monitoring-System SPYTEC 3000

The System for GSM communication monitoring


 

Computerüberwachung per Keylogger

PC Überwachung ist ein wichtiges Stichwort bei der Sicherheit von Firmen und Unternehmen. Wirtschaftsspionage ist in Zeiten des Internets leichter als je zuvor - ein Klick und wichtige Daten werden von einem Ende der Welt ans andere gesendet, ohne dass Sie etwas davon bemerken. Schützen Sie sich vor dieser Art Spionage mit einem Computer Monitoring per Keylogger. Ein solcher Keylogger zeichnet jeden Zugriff auf Ihren PC auf, vom kleinsten Tastenanschlag bis hin zu Bildschirmkopien und sogar Audioaufnahmen aus dem Umfeld des PCs (wenn ein Mikrofon angeschlossen ist.) Die Computerüberwachung ist damit sehr umfangreich, das Monitoring Tool schützt Sie sicher.

Tastatur Rekorder für den privaten Bereich

Aus den zahlreichen Möglichkeiten des Keyloggers ergeben sich auch Anwendungen im Privatbereich. Die Monitoring Software kann z.B. auch dazu verwendet werden, zu schauen, wer am Familien-PC gesessen hat und was er damit angestellt hat. Gerade dann wenn Kinder im Haushalt sind, die selbstständig an den PC dürfen, schadet es nicht, ab und an zu prüfen, welche Webseiten aufgerufen werden oder mit wem die Kinder Kontakt haben. Mit einem solchen Spionprogramm finden Sie heraus, welche Chatdienste genutzt werden und was in den Chats besprochen wurde. Auch Internettelefonie, wie z.B. mit dem Programm Skype durchführbar, kann überwacht werden, so dass Sie nach dem Gespräch eine Audiodatei erhalten und die gesagten Worte anhören können.

Immer dann, wenn Sie das Gefühl haben, jemand anderes nutzt heimlich Ihren PC, können Sie diesem Verdacht auf den Grund gehen, indem Sie den Keylogger zur Computerüberwachung installieren. Gleichzeitig ist die Software aber auch hilfreich, wenn der PC abstürzt, da Tastendrücke gespeichert werden und Eingaben so nicht komplett verloren sind.

 
 
 
 
 
SPYTEC 3000
The system for GSM communication monitoring
 
 
 
 
Das System ist teilweise Exportgenehmigungspflichtig! 
Dieses System ist nur für den Export außerhalb der EU! 
 
 

Hier finden Sie die deutsche Produktbeschreibung zum Handy Überwachungssystem 

The SPYTEC 3000 system is intended for passive (if system encryption is absent of if A5.2 encryption is used) or semi-active (if A5.1 encryption is used) monitoring of GSM 900 and DCS-1800 standard communication systems.
 
The system consists of:
- Receivers unit for 8 – 32 channels;
- Control notebook PC of P4 class (with control and A5.2 deciphering software installed);
- Omni-directional antenna system for 900/1800 MHz bands;
- Directed antenna system for 900/1800 MHz bands;
- Carrying case;
- Connection cables set and power cables for power supply from car battery (9–18 V) and from industrial network 220 V;
- User documentation;
- Installation software (HDD image on DVD – for fast system recovery).
Also the delivery pack includes the Operator Workstation software (OW).
OW provides the procession of following types of information:
– Voice records;
– SMS-messages;
– Fax images;
– Fax text;
– Data transmissions.
OW provides:
– Graphic user interface;
– Analysis of records of communication sessions by viewing or listening them;
– Transcribe features (simultaneous listening ant typing) with possibility to chose the temp of listening of voice records;
– Generation of reports about communication sessions content after review or listening;
– Forming of the requests to the database and data search;
The system can operate either in stationary or mobile variants.
The quantity of channels received and recorded by the system could be from 8 to 32  for one control computer. The requirements to the control computer are: not worse than Pentium4 2 GHz, RAM 2 Gb, DVD (for operation of A5.2 deciphering software). The system software works in Windows 2000/?? OS environment.
An extensive set of selection parameters enables the interception of certain subscriber with high probability.
Receivers with high dynamical range (80 dB) and special methods of signal procession enable to gain the high quality of reception, high level of computation of session key (Kc), high speech intelligibility, the possibility to control the reverse channel at essential distance from subscriber.
The software enables to use the encryption switch off mode together with software search of encryption key, that provides the high percentage of interception in the networks where encryption is used.
Compactness, light weight and low power consumption of the system (power consumption of 16-channel unit is not more then 15 W without control PC and additional power amplifier) enable carrying the system in small case and long operation using car battery without additional power sources.
The presence of transmitter between the components of the system enables its usage for switching of the encryption (if A5.1 encryption is used), and implementation of such modes as forced cancellation of communication session, definition of subscriber’s phone number during the call, substitution of number dialed by the subscriber.
The module structure of the system provides fast repair and the possibility to increase channels quantity easily. 
The SPYTEC 3000 system provides the following features:
• Control of forward and reverse voice channels and SMS messages.
• Fast channels scanning in GSM900/1800 MHz band and definition of control channels numbers and appropriate cellular providers.
• Automatic computation of session key (Kc) in real time for A5.2 algorithm, without any disclosing traces for subscriber.
• The possibility to switch off the encryption including both A5.1 and A5.2, if the controlled network supports the operation of the phones without encryption.
• Recording to HDD of voice sessions, SMS messages and call related information.
• Subscriber’s location finding relatively to the base station (LAC, BS, sector,  distance with accuracy of 550 m) with possibility of its indication on the digital map (optionally).
• Definition of MSISDN – TMSI correlation for the controlled subscriber.
• The possibility of finding of MSISDN number of the controlled subscribed during the call (optionally).
• The possibility to substitute the number, dialled by subscriber without  any disclosing traces for subscriber (optionally).
• Proper operation of the system in networks, using Frequency Hopping mode (in contrast to other monitoring systems).
• Tracing of subscriber’s movement to another base station coverage area ("handover") if the signal from that base station is strong enough on the receiver input.
The extended set of selection criteria:
• Control of all communications;
• By TMSI (IMSI – if transmitted in the air);
• By phone type (classmark);
• By presence of reverse channel, for control of subscribers within the nearby area (100-1500 m from the system);
• By IMEI (if transmitted in the air) at interception of reverse channel;
• By interlocutor’s phone number;
• Selection of communications by distance from the base station;
• Selection of SMS messages only;
• By Ki or Kc of the subscriber (at that the operation in networks, using A5.1 encryption is provided without any disclosing traces); 
• Combination of several selection criteria above.
 
The System Main Application Window
 
Subscriber search and MS-ISDN ? TMSI (IMSI) correlation definition window
 
 
The main technical features of «SPYTEC 3000» system in comparison with other monitoring systems.                       
? Parameter Technical features
1.
 System Name «GA 900/901»
 «Jasmin» /
«G-Track» «SPYTEC 3000»
2. Interception Method Active
( Base station emulation, the communication goes: subscriber – system – base station) Passive
(the system controls the data exchange between MS and BS if encryption is not used or A5.2 encryption is used)
 Passive
(the system controls the data exchange between MS and BS if encryption is not used or A5.2 encryption is used)
Semi-active
(the system controls the data exchange between MS and BS. In strictly defined moments of time it replaces the operation of ?S to switch off the encryption mode)
3. The types of controlled communication systems
 GSM 900/1800
 GSM-900/1800
 GSM900/1800
4.
 The information selection criteria for GSM: - IMSI, IMEI,
- The presence of subscriber in certain zone in present time
- The phone number of called party - IMSI (TMSI),
- IMEI (by reverse channel)
- Ki
Definition of MSISDN to IMSI or TMSI correlation

 - IMSI (TMSI),
- IMEI,
-  MS Classmark,
-  distance to BS,
- counter party MSISDN
- by reverse channel presence,
-  Ki,
-  Ks
Definition of MSISDN to IMSI or TMSI correlation
5. The quantity of controlled channels 1 duplex 
 6 channels for control of service information with possibility of upgrade up to 16 channels,
the quantity of channels available for listening is 1(2) duplex. 8 or 16 duplex channels depending on configuration with possibility of expansion.
The quantity of channels available for listening is equal to quantity of duplex channels.
6. Type or information registered  Service information, registered communication session, SMS
7. Subscriber’s location definition  With accuracy to 550 m or in zone, defined by transmitter power level with possibility to output the information about frequency and time-slot to special direction finder
 With accuracy to cell and distance to BS.
Additionally:
- signal level from MS
 With accuracy to cell and distance to BS.
Additionally:
- signal level from MS,
 -  level of signal, received by MS from neighbour BS.
8. The possibility of deciphering  The system switches off the encryption in zone of its operation Provides decryption by A5/2 algorithm in 1-3 sec.  In passive mode provides  decryption by A5/2 algorithm in 30 msec.
In semi-active mode switches off the A5/1 or ?5/2 encryption by short-term transmissions in zone of controlled base stations, if network supports the operation of MS without encryption.
 
9. The possibility of operation in mobile variant Yes, in standing or moving vehicle Yes, in standing vehicle Yes, in standing or moving vehicle
10. The disclosing factors of system’s operation
 Yes
1. on some models of mobile phones subscriber can see that encryption is switched off
2. the call receiving party can not see the number of calling party,
3.  the bills for communications become smaller,
4.  it is impossible to control the incoming calls, only outgoing calls and SMS can be controlled No
 In passive mode - no 
In semi-active mode - yes :
 - on some models of mobile phones subscriber can see that encryption is switched off
11. The possibility to block subscriber’s communications
 Yes
 No
 Yes
 
mobiltelefon abhören handy abhören software abhören von handy handy sms überwachen police interceptor handy gespräche abhören handy abhören programm handys überwachen handy überwachen software interception records handy abhören sms interception system gsm monitoring handy abhören handy überwachen interception interceptor handys abhören interceptor system abhören handy abhören von handys 
 

12. Main disadvantages 1. The necessity of SIM card presence, which will be charged for all calls of controlled subscriber.
2. Impossibility to control the incoming calls.
3. Difficulty of operation near the base station, because the level of signal from original base station is higher the level of signal from the System.
4. Impossibility to control the subscribers of several providers simultaneously.
5. There is no possibility to increase the quantity of ??? (traffic channels), for simultaneous listening of several subscribers.
6. A lot of disclosing factors.-  1. Interception of subscriber in case if TMSI is used and it is changing at each communication session is possible just in case if subscriber did not left the controlled area.
2. The operation in networks, using frequency Hopping is not supported.
3. The system is tuned for operation in certain country (by cellular network identifiers, transferred in the air).  1. Interception of subscriber in case if TMSI is used and it is changing at each communication session is possible just in case if subscriber did not left the controlled area.
2. In semi-active monitoring mode on some models of mobile phones subscriber can see that encryption is switched off
13. Additional features  The possibility of integration with direction-finding equipment of DDF series, manufactured by Rohde&Schwarz is implemented
  The possibility of simultaneous combined operation with several mobile communications providers
 The possibility of simultaneous combined operation with several mobile communications providers
Additional features:
-replacement of phone number, dialled by subscriber;
- definition of subscriber’s number during the active call;
14. Power consumption  Main Unit -230 Wt
Control computer 20- 50 Wt
 «Jasmin»
Main Unit (8 channels) – up to 250 Wt
«G-Track»
Main Unit – up to 50 Wt
Control computer 20- 50 Wt.
 Main Unit (16-channel) – 20 Wt.
Control computer 20- 50 Wt
 
 
 
Weitere Angebote
   
GSM Spy, Handy Überwachungs Software mit SMS Backup Funktion
GSM SPY ist ein Programm, daß alle Aktivitäten des Handy auf dem es installiert ist, unbemerkt überwacht.