Trusted intelligence Discovery Corporate, Private and Cyber Investigation Services

Trusted intelligence Discovery Corporate, Private and Cyber Investigation Services

Who: “Mission Intelligence” is an exciting new bespoke corporate investigations and security supplier of intelligence discovery services through the application of our in-house leading edge technology solutions. Why: Corporate and Private clients need a multi-dimensional approach to gain actionable intelligence and insights to ensure they can identify, discover and mitigate risk. How: Through a combination of unique technology and highly skilled security professionals we have put together, tailored to the specific needs of each...

read more

Biometric Technology

Biometric Technology

We develop innovative image and sound processing Technology for biometric identification, people and event tracking, detection of hazardous events, intelligent monitoring solutions, and security applications in general.   This technology integrates added‐value products and high‐end solutions for the security market, which can be customized to the specific needs of a wide range of users,  related to Law Enforcement.   Face recognition for gate access control, access to sensitive data (workstation, tellers, etc.), non cooperative...

read more

Mediation Systems and Lawful Interception Management System

Mediation Systems and Lawful Interception Management System

We provide full system to acquire from TELCO necessary information and data needed by LEA. GR SISTEMI also provides LI management systems,  we have developed one system which is able to capture audio & data sent from a phone operator or IP probe, record files on a server, perform analysis and make all the operations as per request from the law. In order to optimize performance of the system, the main unit is capable, of acquiring  and storing data received from a video source, on IP basis and GPS coordinate.  Therefore...

read more

Electronic Device & Software Solutions

Electronic Device & Software Solutions

We have developed several solutions for law enforcement application, we mainly focus on: Reliability – any electronic device should work in the worst conditions, malfunction should not be acceptable Miniature – sometimes dimension is quite important, in order to meet the restrictions of the ideal place where the device has to work User friendly– a micro electronic device needs easy interface in order to be programmed and used daily Electronic countermeasures – probably the most important point, the way we define some of our equipment...

read more

Software Intruder “VIPER”

Software Intruder “VIPER”

System Intruder is the name of a family of software surveillance agents, characterized by a common set of features and behaviors. Available for several desktop computers and mobile devices HW/SW platforms. Completely customized for each customer, 2 equal System Intruder doesn’t exist. All data is encrypted with strong encryption algorithms.  Available for Microsoft Windows (all versions), Unix/X11, Mac OS X based targets, iOS and Android. All operation can be done from a remote position. More and detailed info are available upon request...

read more