Wireless-Detective is a complete and comprehensive Wireless LAN (WLAN) legal interception and forensics investigation solution for the intelligence related units/agencies such as police, military, criminal investigation department, national security department etc. In fact, it is the most reliable solution to trace, identify all illegal Wireless LAN Internet activities or transactions and preserve all of this evidence.
Wireless-Detective is the smallest and lightest WLAN forensics investigation tool available. It consists of a small laptop (12.1 inches monitor screen) with Linux base OS integrated with Wireless-Detective software installed. With that small size (mobility), forensic professional can easily carry it out to any places (such as restaurant, shopping mall, airport, café, hotspot etc.) for legal interception and forensics investigation task without the notice of the public and most importantly, the suspect/target won¡¦t know about it. With the capability to scan all WLAN channels (802.11a/b/g 2.4 GHz and 5 GHz frequency bands) to capture/sniff WLAN traffic from available Wi-Fi networks, decrypt WEP encrypted (WPA-PSK optional module) wireless network (automatically or manually), decode and reconstruct captured WLAN raw data, store the raw data captured and store the reconstructed data in its database, and display them in the original and exact content format, it make it the most complete (All-in-One) WLAN interception and forensic investigation tool. Furthermore, the Wireless-Detective user management interface or GUI (accessed through a browser) is very user friendly, easy to operate and manage.
Wireless-Detective is capable of decoding and reconstruct WLAN Internet traffic in real time such as Email (POP3, SMTP, IMAP), Webmail (Gmail, Yahoo Mail, Windows Live Hotmail etc.), Instant Messaging/Chat (MSN/Windows Live Messenger, Yahoo Messenger, IRC, ICQ, QQ, UT Chat Room, Google Talk Gmail, Skype Voice Log), FTP, P2P, Online Game, TELNET, HTTP (URL Link, Content, Reconstruct, Download/Upload, Video Stream) etc. After the decoding and reconstruction of the captured traffic, it displays them in its menu list according to different protocol/category types in exact or original content format. With capability of search by keyword or search by parameter (conditional search), it allows further forensics investigation and analysis to be carried out. This has proven that Wireless-Detective is an All-in-One system (all WLAN investigation work is conducted in one machine) that can speed up the entire investigation process.
Supplier: E-detective, wireless-detective, VoIP-detective, network investigation toolkit (NIT)
Services: Network forensics and lawful interception total solutions provider
HTTPS/SSL Network Forensics Device (HTTPS/SSL Interceptor) is designed specially for forensics purpose where it is used to decrypt HTTPS/SSL traffic. It can be used by legal enforcement bodies, police, investigation units, forensics firms, government departments for tracking or monitoring suspects HTTP and HTTPS activities (through Internet). HTTPS/SSL Device has E-Detective web reconstruction function (HTTP Link and HTTP Content) integrated into the system which allow the administrator to see the web page content of normal and secured web page. HTTPS/SSL Interceptor can works in two modes: 1. Man in the Middle Attack (MITM); and 2. Offline Method (Decrypting HTTPS raw data with Private Key Available). In MITM method, it acts as a proxy to the targeted PC/suspect. All traffic from the targeted PC or suspect will be redirected to the HTTPS/SSL Interceptor. Therefore, it can collect the genuine certificate from SSL Server if the targeted PC access to the SSL Server. At the mean time, the HTTPS/SSL Interceptor returns with its own generated certificate. In this method, it allows the HTTPS/SSL Interceptor to decrypt the HTTPS traffic. In Offline Method, with the HTTPS raw data captured, HTTPS/SSL Interceptor is capable to decrypt the traffic if the private key is available. Login usernames and passwords like Google or Gmail login, Yahoo Mail login, ebay login etc. can be captured by the HTTPS/SSL Interceptor.
Decision Group launches VOIP-DETECTIVE, VOIP interception and reconstruction tool in 2009. This tool is capable to capture, decode and reconstruct VOIP sessions (RTP sessions). It allows the play back of voice calls on network. Besides, all the voice calls content can be stored and backup for further reference purpose. The supported protocols include SIP (technology that is most commonly used) and H.323. The supported CODECs include G.729, G.711-a law and G.711-u law, G.723, G.726 and ILBC.
E-Detective is a real-time Internet interception, monitoring and forensics system that captures, decodes and reconstructs various types of Internet traffic. It is commonly used for organization Internet and behavioral monitoring, auditing, record keeping, forensics analysis and investigation as well as legal and lawful interception for lawful enforcement agencies such as Police Intelligence, Military Intelligence, Cyber Security Department, National Security Agencies, Criminal Investigation Agencies, Counter Terrorism Agencies etc. It also provides compliance solution for many standards or acts like Sarbanes Oxley Act (SOX), HIPAA, GLBA, SEC, NASD, E-Discovery and many others. E-Detective is capable to decode, reassembly and reconstruct various Internet applications and services such as Email (POP3, IMAP and SMTP), Webmail (Yahoo Mail, Windows Live Hotmail, Gmail etc.), Instant Messaging (Yahoo, MSN, ICQ, QQ, Google Talk, IRC, UT Chat Room, Skype), File Transfer (FTP, P2P), Online Games, Telnet, HTTP (Link, Content, Reconstruct, Upload and Download, Video Streaming), VOIP (optional module) etc.
1.MPEG-4 Video Compression 2.High-sensitivity CCD sensor 3.IR night vision(Range:40m) 4.Motion Detection Alarm 5.Wireless(Wi-Fi/802.11/b/g)
Supplier: Computers, Laptops, Tablets, Mobiles, It Accessories, Projector, Projector Lamps, Projector Screens, Printer, Scanner, Fax & Photocopy Machine, Bar Code Printer, Cartridges & Toners. Server, Ups, Routers, Switches & Components, Security System Products, Cctv Camera , Digital Video Recorder (dvr) , Network Video Recorder (nvr), Network Products Patch Panel, Cable Manager, Faceplate Sc/lc Single/duplex Adaptor, Patch Cord, Modules, Cabinets & Racks, Communication Productspabx System, Ip/analogue Telephone Devices ,audio/video Intercom, Modem, Wireless Access Points, Cabling Products, Cat6 Cable , Cat6a Cable , Fiber Optic Cable Speaker Cable , Rg59 Cable Fire Alarm & Pa Products Public Address Amplifiers, Speakers, Mixer Amplifier, Volume Control, Fire Detection & Alarm System,
Model/item no. : aj-01cd Country of origin : taiwan / china Product description : 1. Use for detecting spy camera 2. Wild-range: include 900, 1200, 1300mhz and 2.4ghz 3. Receiving sensertivity: 500mhz ~ 3ghz 4. Coverage range: 3 meter a radius 5. Signal o/p: red light led flash 6. Battery: 3v. Lr-44 x 2pcs 7. Outlook: keychain type are available, customerdesigns are welcome Function: 1. Detective area: a radius of 3 meter can precisely detect wireless signal of 900/12001300/2400 mhz. 2. Red led flash: the flashing frequency will increase when approaching to the target. 3. Touch-tone design: professional rf detective design press the key only when detection is needed. Such a function can both savepower and prevent interferences of mobile phone's signal. 4. Attach a dey ring: men can wear the key ring and women can wear it on the bag or wear it as a decoration. Application: 1. Pubilc place, dressing rooms, bathrooms or lavatories. 2. Hotel, dormitories, rooms or offices. 3. Any place needs privacy......
Telephone line anti - cut security burglar alarm 1. 10seconds voice and message recorded to transmit an 2. Preset 6 phone numbers which can be dial automatically to inform theft recycling 3. The pir detector can arm or disarm separately 4. Arm or disarm with remote controller or phone in long-distance under password protection. 5. Alarm phone line has a priority when the phone line is engaged 6. With keyboard preset all functions 7. Alarm when phone line is cut 8. Defence indicated with light glitering, total is 13 zones, each zone can be work with more than one hundred sensors by preset same id security code and same frequency 9.Wireless received, high sensitivity, high anti-interfere 10. None of repeating numeral coding, highly sensitivity for controlling objective 11. With dc /ac available, emergency rechargeable battery and power supply built-in, both of that are automatically switched. 12. Mute siren setting Specification: 1) with a built-in siren 2) with two wireless remote controllers (available to order extra more) 3) one wireless magnetic door sensor (available to order extra more) 4) with wireless passive infrared detector (detecting activate distance 8~10meter, detecting activate angle: 120degrees horizontal, 60 degrees vertical) 5) option: wireless smoke detector /gas leakage detector/rolling gap detector /active infrared intruder detector 6) working voltage: ac 220v/240v 7) input voltage: dc 9v or optional 8) standby current: 10ma 9) wireless receiving frequency: 433mhz or 315mhz 10) wireless receiving distance without interference: 100m 11) alarm volume: 110db Package: Box dimensions (l x w x h): 34 x 25 x 7.8cm Carton dimensions (10sets/ctn) (l x w x h): 52.8 x 35.8 x 41cm Weight:0.98kg
Intelligent 32 defend Zones Home Security Burglarproof Alarm System Description 1.10seconds voice and message recorded to transmit an alarm 2. Preset 6 phone numbers which can be dial automatically to inform theft recycling 3. The PIR detector can arm or disarm separately 4. Arm or disarm with remote controller or phone in long-distance under password protection. 5. Alarm phone line has a priority when the phone line is engaged 6. With keyboard preset all functions 7. Alarm when phone line is cut 8. Alarm identify each accessory automatically 9. Double numeral coding and ten thousand of group net integration build-in, anti-interfere along ten thousand of users simultaneously using each other. 10. With DC /AC available, emergency rechargeable battery and power supply build-in, both of that are automatically switched. 11. Mute siren setting. 12. This alarm system can work with all of our other products, like smoke detector, gas decetoe, PIR detector, sensor and so on SPECIFICATION: 1. With A built-in siren 2. With two wireless remote controllers (available to order extra more) 3. One wireless magnetic door sensor (available to order extra more) 4. With wireless infrared detector ( valid detecting distance 8~10meter, detecting activate angle: 120 degrees horizontal, 60 degrees vertical) 5. Option: Wireless smoke detector /gas leakage detector/rolling gap detector /active infrared intruder detector 6. Working voltage: AC 220V/240V 7. Input voltage: DC 9v or optional 8. Standby current: 10mA 9. Wireless receiving frequency: 433/315MHz 10. Wireless receiving distance: 100m 11. Alarm volume: 110dB PACKAGE: Box dimensions (L x W x H): 34 x 25 x 7.8cm Carton dimensions (10sets/ctn) (L x W x H): 52.8 x 35.8 x 41cm