3. Trace Communication Route and Obtain Related Data
      Methodology and Guidelines of Cyber Crime Investigation

  • Gap between Physical and Cyber Crimes
  • Quest for Investigation on Cyber Crimes

There is no difference between cyber crime and traditional crime in nature. With the advantages of convenience, anonymity and mobility of telecom and Internet, criminals are able to disguise their command center and disrupt the direction of investigation. Lawful enforcement officers need to make more effort in studying crime model and finding the way out to combat criminals.

  • Process Flow for Investigation

    VoIP Tactic Server in Investigation into Cyber Crimes

  • VoIP based Interception and data interception of other 150 Internet services
  • Flexible implementation in multiple telecom operators
  • Intercept all VoIP routes from different sources simultaneously
  • Collect original pcap as well as reconstructed voice data for evidence in court
  • Support all common VoIP protocols such as G.711a-law, G,711µ-law, G.726, G.729, iLBC
  • Meet the requirement of state LI Law, ESTI standards

    E-Detective Tactic Server

    LAN Internet Monitoring, Data Retention, Data Leakage Protection & IP Network Forensics Analysis Solution

    Solution for :

  • Route of Internet Monitoring/Network Behavior Recording Auditing and Record Keeping
  • Forensics Analysis and Investigation,
  • Legal and Lawful Interception (LI)
  • VoIP Tactic Server & Mediation Platform

    E-Detective Standard System Models and Series (Appliance based)

    E-Detective Lawful Interception Solutions

    

  • Sample : VoIP Calls (with Play Back)
  •     Data from E-Detective VoIP Tactic Server

    • Source IP Address
    • Telephone number of caller
    • Telephone number of receivers/victims
    • Date & time of calls
    • Duration of calls
    • Call content